text
stringlengths 8
5.77M
|
---|
Is there an inter-organ glutathione redox cycle?
Intracellular glutathione redox status is a function of the flux through glutathione peroxidase-glutathione reductase system. Specific activities of these two enzymes in rat liver cytosol and erythrocyte hemolysates were determined. Relative to glutathione peroxidase levels, glutathione reductase activity was about 15-fold more abundant in the rat liver than in erythrocytes. This is suggestive of greater capacity of the liver to reduce oxidised glutathione (GSSG). Based on these results and from the pattern of glutathione efflux from different cells and tissues [Sies, H. & Akerboom, T.P.M. (1984) Methods Enzymol. 105, 445-451], it is speculated that an interorgan glutathione redox cycle may be operative wherein liver is central to the reduction of GSSG and other disulphides.
|
Sign up NOW for our daily Villa newsletter direct to your inbox Subscribe Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email
How Gregg Evans thinks Villa will line up at Dean Court
Goalkeeper: Brad Guzan
Been away at the Gold Cup all summer and only returned last week but is expected to start.
Defence: Alan Hutton, Micah Richards, Ciaran Clark, Jordan Amavi
Hutton is one of only two players likely to start from the FA Cup Final defeat. Clark signed a new contract this week and is a big part of the team.
Richards will wear the captain’s armband and start at centre half. Amavi is set to make his Premier League bow following a £10million move in the summer.
Wingers: Leandro Bacuna, Scott Sinclair
Bacuna is likely to feature is a more attacking role this term. A major source of goals.
Sinclair scored a hat-trick last week and is in good form.
Central midfield: Ashley Westwood, Idrissa Gueye
Westwood is proving to be the vital cog in the middle of the park that keeps the ball rolling, while Gueye is tasked with replacing Fabian Delph. Big boots to fill but he’s up for it.
Forward line: Jordan Ayew, Libor Kozak
Ayew is strong and quick and could do with an early goal to get him up and running.
Kozak has been out for 19 months injured but has been among the goals in pre-season.
Pick YOUR Villa starting XI below!
|
The Nosler Ammo is part of a family of high-grade bullets by Nosler. Manufactured to the highest standards, this ammunition is built for optimum performance. These rounds feature high performance powder, NoslerCustom Brass and AccuBond tips.
AmmoWARNING
You must be 18 or older to purchase shotgun or rifle ammunition and 21 or older to purchase handgun ammunition. All ammunition must be shipped Domestic Ground. Shipping not available for International, DC, and MA residents. Residents of CA, DE, IL, NY and OH, may have additional restrictions. Always make sure you use the correct ammunition for your firearms. Check your state and local laws for any other applicable firearms and ammunition regulations. View full restrictions here.
|
Juampe
Juan Pedro Jiménez Melero (born 31 March 1996), commonly known as Juanpe, is a Spanish footballer who plays for Sevilla Atlético as a central midfielder.
Club career
Born in Jerez de la Frontera, Andalusia, Juanpe was a Cádiz CF youth graduate. On 2 December 2014, he renewed his contract for five seasons, and made his senior debut for the reserves late in the month by coming on as a late substitute in a 2–0 Tercera División home win against CD Mairena.
On 13 January 2016, Juanpe was an unused substitute in a 0–2 Copa del Rey away loss against Celta de Vigo. On 19 August he made his professional debut, replacing Abel Gómez in a 1–1 away draw against UD Almería.
On 1 January 2017, Juampe was loaned to Segunda División B side Atlético Mancha Real, until June.
References
External links
Juanpe profile at Cadistas1910
Category:1996 births
Category:Living people
Category:Sportspeople from Jerez de la Frontera
Category:Spanish footballers
Category:Andalusian footballers
Category:Association football midfielders
Category:Segunda División players
Category:Tercera División players
Category:Cádiz CF B players
Category:Cádiz CF players
Category:Sevilla FC C players
|
Abdominal aortic aneurysectomy after kidney transplantation: case report and review of the literature.
Abdominal aortic aneurysms have been a rare finding in patients who have previously undergone renal transplantation. Previous operative strategies attempting to provide renal allograft protection during aortic cross-clamping have included extra-anatomic permanent as well as temporary bypass, heparin bonded shunts, in situ perfusion cooling of the allograft, and general hypothermia. These maneuvers, although generally successful, have recently been challenged by reports describing no specific protective measures. A case of a 5.0 cm but rapidly expanding abdominal aortic aneurysm in a patient who had undergone a prior successful kidney transplant is presented along with a literature review of 27 available cases on the subject.
|
This cult-favourite lip gloss delivers long-wear lip colour and bold pigment in the same hydrating formula. Infused with nourishing ingredients including Seaweed extract and organic Green Coffee Oil, this gloss will ensure that lips remain bright and beautifully smooth throughout the day.
false
Additional Information
This cult-favourite lip gloss delivers long-wear lip colour and bold pigment in the same hydrating formula. Infused with nourishing ingredients including Seaweed extract and organic Green Coffee Oil, this gloss will ensure that lips remain bright and beautifully smooth throughout the day.
Additional Information
This cult-favourite lip gloss delivers long-wear lip colour and bold pigment in the same hydrating formula. Infused with nourishing ingredients including Seaweed extract and organic Green Coffee Oil, this gloss will ensure that lips remain bright and beautifully smooth throughout the day.
|
Summary of LG T7018AEEP5
6 Motion Technology with 6 different types of motions- Scrubbing, Rolling, Stepping, Swing, Tumbling and Filtration, combines the force of water and the rhythm of motion to cater to all kinds of washing needs. Depending on the type of cloth & dirt level, clothes are washed changing the motions. It also provides you less damaged, less tangled and cleaner clothes.
Turbodrum
The unique technology that knows how to take care of your clothes while giving you the perfect wash. The dual direction rotating drum reduces tangling of clothes which ensures your clothes stay as fresh and new for much longer than ever before. The machine also is now less susceptible to wear and tear giving you a longer life. Turbodrum allows the movement of the drum in the opposite direction of the pulsator, for a doubly-efficient wash action.
I-sensor
The Sensor automatically detects detergent quantity to put by user, water temperature and water hardness so as to make best washing algorithm for washing and rinsing, ultimately giving best washing effect. To give a balanced wash, it is an intelligent sensor which would give the best wash cycle suiting the washing environment.
Air Dry
When the drum rotates the airdry system sucks in air, thereby throwing a blast of air on the clothes. Thus air dry system by removing moisture leaves clothes absolutely free from bad odour & bacteria and also facilitates faster drying of clothes.
Direct Drive Motor
Power is delivered right from the motor to the washer drum without belts, resulting in a highly durable, powerful, and quiet washing machine.
Punch + 3 Pulsator propels detergent-rich water vertically into every thread of fabrics. The 3 mini-pulsator technology, generates powerful microcurrents which ensures better quality wash.
Fuzzy Logic Control
A built in load sensor automatically detects the laundry load and a microprocessor optimizes washing conditions such as ideal water level and washing time. You can set the Wash Program type at Fuzzy and it would sense the appropriate washing method required to give you the best washing performance.
|
On the go and no time to finish that story right now? Your News is the place for you to save content to read later from any device. Register with us and content you save will appear here so you can access them to read later.
Having penned two teen novels in the late 1990s while she was still a teenager herself, Isla Fisher believes she would have become a novelist if her acting career hadn't proved so successful.
But after four years playing Shannon Reed in Home and Away, the Perth-raised actress made the transition to Hollywood and films like Scooby Doo, I Heart Huckabees, Wedding Crashers and fellow Australian Baz Luhrmann's lavish big-screen version of The Great Gatsby. Now the 40-year-old has come full circle, with her first book for children, Marge in Charge.
"When I was 18, my mum encouraged me to write those two books," she recalls, referring to Bewitched and Seduced by Fame, which were published in 1996 when Fisher was 20. "We had so much fun, until it got to collaborating on the love scenes!"
Born in Oman to Scottish parents, Fisher moved to Western Australia when she was 6 years old. Admitting her adopted home of Perth was an isolated place to live, she rode horses and led "a very outdoorsy life", but also developed a keen interest in literature.
Having met at a party in Sydney in 2002, Fisher married Ali G/Bruno creator Sasha Baron Cohen in 2010 and the couple now have three children, 8-year-old Olive, 5-year-old Eluha and 1-year-old Montgomery.
Dreamed up as a way of persuading them to go to sleep, the mischievous Marge has taken on an existence of her own with the publication of Marge in Charge. Citing Roald Dahl, Jeff Kinney, Rachel Renee and fellow actor-turned-author David Walliams, Fisher points out there are plenty of amusing books for the 7-to-10-year-olds but not so much for 4-to-6-year-olds.
"The funnier books, like Horrid Henry, have situations where the parents have no control over the characters' unruliness and name-calling, so I felt there was a hole in the market for that age group with some more innocent sweet humour," says Fisher, who has tailored the book to a younger age group's more limited reading abilities.
"Each book has three short stories inside, which suits the shorter concentration span of the age of the children they are aimed at."
Hired by the mother and father of Jemima and Jake Button to look after their children in their absence, Marge is an anarchic if eventually level-headed influence, initially causing chaos before restoring order just in time for the parents' return.
"Marge has to appear sensible in front of Mummy and Daddy or parents wouldn't understand why Jake and Jemima's mummy and daddy trust her with their kids. But then once they have gone, the fun begins," says Fisher.
"I find that kids are used to other kids misbehaving but when grown-ups do it, they find it hilarious. When Marge misbehaves, it's not in an intentional or mean-spirited way, as she unlocks the other characters' creativity and challenges Jemima's need to follow the rules for rules' sake."
With her rainbow-coloured hair belying her somewhat advanced years, Fisher suggests that Marge's senior status allows her to form a bond with Jemima and Jake.
"The novel is a celebration of generational relationships, as even though Marge is an old lady, she is more fun than other kids of Jake and Jemima's age, and she behaves like she is younger than their mummy and daddy."
Fisher would love to see Marge brought to life on screen but refuses to confirm whether she would play the gregarious babysitter herself in either a big or small-screen adaptation.
After playing a MI6 handler in Baron Cohen's latest film, Grimsby, earlier this year, she'll next be seen in Superbad director Greg Mottola's espionage comedy Keeping Up With the Joneses. "
I play a bored suburban housewife, who is married to Zach Galifianakis," says Fisher, who has also completed work on a dark thriller, Nocturnal Animals, Tom Ford's highly anticipated follow-up to the Oscar-winning A Single Man.
|
Q:
WTForms-Alchemy failing with ARRAY column types
I'm trying to use WTForms-Alchemy to quickly generate a form class version of all my SQLAlchemy model classes, and I'm running into a problem when trying to convert an SQLalchemy class with an ARRAY column type. It throws an UnknownTypeException.
class CubeForm(ModelForm):
class Meta:
model = datadb.Cube
....:
return this error
UnknownTypeException: Unknown type 'FLOAT[]' for column 'specres'
It seems WTForms-Alchemy, and WTForms does not support the ARRAY data type, and have a corresponding Field while SQLalchemy does support it. What's the best way to deal with this? Is there a workaround for this issue, without having to subclass all the necessary WTForm components to build support for arrays? I have many many columns of array datatype, mostly of floats and ints.
I'm just learning Flask-WTF, WTForms, WTForms-Alchemy and am currently trying to see what the advantages are. Any thoughts or help would be appreciated.
A:
The answer to this was that I forked the code and made the changes myself. https://github.com/havok2063/wtforms-alchemy
|
Any thoughts on the recent HOF inductions? I was happy with all three inductees (Tim Raines, Ivan Rodriguez and Jeff Bagwell); I do feel that Raines is a bit of a borderline candidate, but being probably the second-best base-stealer of all time (808 bases with an 85% success rate) along with being a very good lead-off hitter (around 2600 hits, 123 OPS+, .295 batting average with a .385 OBP) was enough for me. Jeff Bagwell probably should have been in years ago - and would have, were it not for some steroid allegations that have no real evidence behind them. Next year we're looking at probable inductions from Trevor Hoffman and Vlad Guerrero (both of whom just missed this year) and the certain first-ballot inductions of Chipper Jones and Jim Thome. There are some big question marks in the next couple of years, though - Andruw Jones, Todd Helton, Omar Vizquel, Johan Santana, Roy Halliday, etc.
As a Tribe fan, I'd be down for Thome and Vizquel getting in. Saw few guys who hit the ball with more power than Thome, and Vizquel was the best shortstop I'd ever seen (was until Francisco Lindor came along).
For my money Barry Bonds should be in the HOF. I don't care that he juiced up. He was insane before the change was noticeable. It's time to put him in IMO.
Retrology wrote:As a Tribe fan, I'd be down for Thome and Vizquel getting in. Saw few guys who hit the ball with more power than Thome, and Vizquel was the best shortstop I'd ever seen (was until Francisco Lindor came along).
For my money Barry Bonds should be in the HOF. I don't care that he juiced up. He was insane before the change was noticeable. It's time to put him in IMO.
Btw I've been to Cooperstown myself. The HOF is really nice.
Vizquel and Andruw Jones are going to be the most interesting candidates because defensive value is harder to quantify - statistical measures for it are getting better but are still vague. Both Vizquel and Jones are in the top ten all-time in defensive WAR and have some offensive qualifications of note (Vizquel has almost 2900 hits and over 400 steals, Jones has 434 home runs) but I think it going to be hard for both of them - Jim Edmonds (who was considered a wizard in center field in his prime and who had better offensive production than either Vizquel or Jones) fell off the ballot in his first year and Alan Trammel recently hit his final year without being inducted. Thome (who is looked upon, like Frank Thomas was a couple of years ago, as a clean slugger in an age of steroids and who is also extremely well-liked by both the fans and the media) will almost certainly be a first-ballot inductee.
Barry Bonds (I seen him play as a kid back in Three Rivers Stadium) and Roger Clemens were HOF-caliber players long before they started juicing, so I don't have a problem with either of them getting in. I'm comfortable leaving a player out if they wouldn't have been good enough to get in without the enhancements - Sammy Sosa, for example.
It's cool that you've actually been to Cooperstown - I plan to go one day myself, hopefully with my Dad.
|
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/base_paths.h"
#include "base/bind.h"
#include "base/bind_helpers.h"
#include "base/files/file_path.h"
#include "base/files/file_util.h"
#include "base/files/scoped_temp_dir.h"
#include "base/macros.h"
#include "base/path_service.h"
#include "base/run_loop.h"
#include "base/threading/thread_task_runner_handle.h"
#include "base/values.h"
#include "components/update_client/component_patcher.h"
#include "components/update_client/component_patcher_operation.h"
#include "components/update_client/component_patcher_unittest.h"
#include "components/update_client/test_installer.h"
#include "components/update_client/update_client_errors.h"
#include "courgette/courgette.h"
#include "courgette/third_party/bsdiff/bsdiff.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace {
class TestCallback {
public:
TestCallback();
virtual ~TestCallback() {}
void Set(update_client::UnpackerError error, int extra_code);
update_client::UnpackerError error_;
int extra_code_;
bool called_;
private:
DISALLOW_COPY_AND_ASSIGN(TestCallback);
};
TestCallback::TestCallback()
: error_(update_client::UnpackerError::kNone),
extra_code_(-1),
called_(false) {}
void TestCallback::Set(update_client::UnpackerError error, int extra_code) {
error_ = error;
extra_code_ = extra_code;
called_ = true;
}
base::FilePath test_file(const char* file) {
base::FilePath path;
PathService::Get(base::DIR_SOURCE_ROOT, &path);
return path.AppendASCII("components")
.AppendASCII("test")
.AppendASCII("data")
.AppendASCII("update_client")
.AppendASCII(file);
}
} // namespace
namespace update_client {
ComponentPatcherOperationTest::ComponentPatcherOperationTest() {
EXPECT_TRUE(unpack_dir_.CreateUniqueTempDir());
EXPECT_TRUE(input_dir_.CreateUniqueTempDir());
EXPECT_TRUE(installed_dir_.CreateUniqueTempDir());
installer_ = new ReadOnlyTestInstaller(installed_dir_.GetPath());
task_runner_ = base::ThreadTaskRunnerHandle::Get();
}
ComponentPatcherOperationTest::~ComponentPatcherOperationTest() {
}
// Verify that a 'create' delta update operation works correctly.
TEST_F(ComponentPatcherOperationTest, CheckCreateOperation) {
EXPECT_TRUE(base::CopyFile(
test_file("binary_output.bin"),
input_dir_.GetPath().Append(FILE_PATH_LITERAL("binary_output.bin"))));
std::unique_ptr<base::DictionaryValue> command_args(
new base::DictionaryValue());
command_args->SetString("output", "output.bin");
command_args->SetString("sha256", binary_output_hash);
command_args->SetString("op", "create");
command_args->SetString("patch", "binary_output.bin");
TestCallback callback;
scoped_refptr<DeltaUpdateOp> op = new DeltaUpdateOpCreate();
op->Run(command_args.get(), input_dir_.GetPath(), unpack_dir_.GetPath(), NULL,
base::Bind(&TestCallback::Set, base::Unretained(&callback)),
task_runner_);
base::RunLoop().RunUntilIdle();
EXPECT_EQ(true, callback.called_);
EXPECT_EQ(UnpackerError::kNone, callback.error_);
EXPECT_EQ(0, callback.extra_code_);
EXPECT_TRUE(base::ContentsEqual(
unpack_dir_.GetPath().Append(FILE_PATH_LITERAL("output.bin")),
test_file("binary_output.bin")));
}
// Verify that a 'copy' delta update operation works correctly.
TEST_F(ComponentPatcherOperationTest, CheckCopyOperation) {
EXPECT_TRUE(base::CopyFile(
test_file("binary_output.bin"),
installed_dir_.GetPath().Append(FILE_PATH_LITERAL("binary_output.bin"))));
std::unique_ptr<base::DictionaryValue> command_args(
new base::DictionaryValue());
command_args->SetString("output", "output.bin");
command_args->SetString("sha256", binary_output_hash);
command_args->SetString("op", "copy");
command_args->SetString("input", "binary_output.bin");
TestCallback callback;
scoped_refptr<DeltaUpdateOp> op = new DeltaUpdateOpCopy();
op->Run(command_args.get(), input_dir_.GetPath(), unpack_dir_.GetPath(),
installer_.get(),
base::Bind(&TestCallback::Set, base::Unretained(&callback)),
task_runner_);
base::RunLoop().RunUntilIdle();
EXPECT_EQ(true, callback.called_);
EXPECT_EQ(UnpackerError::kNone, callback.error_);
EXPECT_EQ(0, callback.extra_code_);
EXPECT_TRUE(base::ContentsEqual(
unpack_dir_.GetPath().Append(FILE_PATH_LITERAL("output.bin")),
test_file("binary_output.bin")));
}
// Verify that a 'courgette' delta update operation works correctly.
TEST_F(ComponentPatcherOperationTest, CheckCourgetteOperation) {
EXPECT_TRUE(base::CopyFile(
test_file("binary_input.bin"),
installed_dir_.GetPath().Append(FILE_PATH_LITERAL("binary_input.bin"))));
EXPECT_TRUE(base::CopyFile(test_file("binary_courgette_patch.bin"),
input_dir_.GetPath().Append(FILE_PATH_LITERAL(
"binary_courgette_patch.bin"))));
std::unique_ptr<base::DictionaryValue> command_args(
new base::DictionaryValue());
command_args->SetString("output", "output.bin");
command_args->SetString("sha256", binary_output_hash);
command_args->SetString("op", "courgette");
command_args->SetString("input", "binary_input.bin");
command_args->SetString("patch", "binary_courgette_patch.bin");
TestCallback callback;
scoped_refptr<DeltaUpdateOp> op =
CreateDeltaUpdateOp("courgette", NULL /* out_of_process_patcher */);
op->Run(command_args.get(), input_dir_.GetPath(), unpack_dir_.GetPath(),
installer_.get(),
base::Bind(&TestCallback::Set, base::Unretained(&callback)),
task_runner_);
base::RunLoop().RunUntilIdle();
EXPECT_EQ(true, callback.called_);
EXPECT_EQ(UnpackerError::kNone, callback.error_);
EXPECT_EQ(0, callback.extra_code_);
EXPECT_TRUE(base::ContentsEqual(
unpack_dir_.GetPath().Append(FILE_PATH_LITERAL("output.bin")),
test_file("binary_output.bin")));
}
// Verify that a 'bsdiff' delta update operation works correctly.
TEST_F(ComponentPatcherOperationTest, CheckBsdiffOperation) {
EXPECT_TRUE(base::CopyFile(
test_file("binary_input.bin"),
installed_dir_.GetPath().Append(FILE_PATH_LITERAL("binary_input.bin"))));
EXPECT_TRUE(base::CopyFile(test_file("binary_bsdiff_patch.bin"),
input_dir_.GetPath().Append(FILE_PATH_LITERAL(
"binary_bsdiff_patch.bin"))));
std::unique_ptr<base::DictionaryValue> command_args(
new base::DictionaryValue());
command_args->SetString("output", "output.bin");
command_args->SetString("sha256", binary_output_hash);
command_args->SetString("op", "courgette");
command_args->SetString("input", "binary_input.bin");
command_args->SetString("patch", "binary_bsdiff_patch.bin");
TestCallback callback;
scoped_refptr<DeltaUpdateOp> op =
CreateDeltaUpdateOp("bsdiff", NULL /* out_of_process_patcher */);
op->Run(command_args.get(), input_dir_.GetPath(), unpack_dir_.GetPath(),
installer_.get(),
base::Bind(&TestCallback::Set, base::Unretained(&callback)),
task_runner_);
base::RunLoop().RunUntilIdle();
EXPECT_EQ(true, callback.called_);
EXPECT_EQ(UnpackerError::kNone, callback.error_);
EXPECT_EQ(0, callback.extra_code_);
EXPECT_TRUE(base::ContentsEqual(
unpack_dir_.GetPath().Append(FILE_PATH_LITERAL("output.bin")),
test_file("binary_output.bin")));
}
} // namespace update_client
|
How specific are negative automatic thoughts to a depressed population? An exploratory study.
This paper is concerned with the relationship between negative or dysfunctional automatic thoughts and dysphoric mood in a non-clinical population. It addresses the question of how specific are these automatic thoughts to a depressed population. Negative automatic thoughts were obtained from 27 normal subjects via a thought-sampling method using the Daily Record of Dysfunctional Thoughts Form (Beck, Rush, Shaw & Emery, 1979) over a two-week period. A thought-content analysis was conducted. The resultant data were compared using X2 with Blackburn & Eunson's (1989) data from depressed patients. The results presented in this paper indicate that basic cognitive distortions occur in a normal population, but differ qualitatively and quantitatively from those found in depressed patients.
|
Do you have a previous version of Office on your system? You may need to completely uninstall it first, reboot the machine, and try the installation again, especially if you had/have Office 2003 on it.
Otherwise, look in your Temp folders for files named similar to Microsoft Office Setup(####).txt where the #### is a 4 digit number starting at 0001. Zip them up and post them somewhere that we can pick them up to see what is going on during your installation.
are you installing from dvd? or you have the setup?
1) copy the full setup (or copy the files from dvd) to the root of your hard drive containing windows like C:
2) open command prompt with admininstrative rights and type cd/
3) Now enter the setup name of the office and hit enter
see if install will be completed this time
|
Newman turns on the style
Josh Newman came away from the north Gala in South Shields with double gold.
The 14-year-old from Billericay turned on the style to win the individual competition. He produced an excellent set to reach the voluntary routine as the top-ranked participant and stepped up a gear to earn a mark of 12.7.
Newman then teamed up with Rhys Northover and dominated the Synchro event, with the pair going on to claim their fourth consecutive success.
Victory in the World Age Games set test event completed a memorable weekend for Newman who now turns his attentions to next month’s National finals.
|
Friendship Relationship Quotes
Friendship relationship quotes are the quotes which express the importance of friendship and are used to teach value of this relationship to people. These quotes can be sent through many means such as by email, SMS, with cards and with flowers etc. Given in the following lines are a few examples of friendship relationship quotes which can be used for reference by anyone.
Sample Friendship Relationship Quotes:
Of all the relationships that one encounters in the period of life, there is no relation which is as precious and special as friendship. This special bond makes our lives rich and so worthwhile and without friends, life seems meaningless.
[notice noticeType=”approved” ]Friendship is a relation which is not influenced by the distance between the friends but by the closeness of the hearts. This is a precious relation, which is even more valuable than the most expensive diamonds. [/notice]
Hold on to your friends as it is your friends who make life wonderful and make us feel special. It is our friends who stand by us in tough times and do not leave us even during difficult phases.
I promise today, to be your friend forever as this relationship, which once starts knows no end. I love you dear friend and will stay by you forever.
[blockquote]You are my strength in the darkest of moments and you are my anchor when my ship loses it balances. Friendship is a power and is the most wonderful gift from god.[/blockquote]
You may have many relatives and you may have a lot of people who love you, but no one can replace the importance of friends in life. I love you my dear friends and will value you through life.
Friendship is a gift, friendship is a sweet song,
Friendship is shade on a sunny day, friendship is rain on a hot afternoon.
You are special my friend.
Friends are selfless creatures who make our lives just so wonderful by just being in it. Friends hold us when we fall, they support us when we stumble, they love us when we are alone and they protect us when in danger.
Friendship is the greatest strength in the world which doesn’t break even under the hardest of forces.
May our friendship be an example for everyone in the world. God bless our relationship and may we always remain friends till the end of eternity.
Today, through this messages I would like to tell you that I value you a lot. Love you dear friend.
|
Q:
Example of a normal variety (or scheme) which is not locally factorial?
I am going to assume that in any case all schemes are Noetherian, separated and integral.
Can someone provide an example of a scheme that is normal but not locally factorial. I know that being locally factorial will imply normal, because UFDs are integrally closed.
I am just curious about the boundary between these two classes of objects.
A:
The simplest example is the coordinate ring $A=\mathbb C [X,Y,Z]/\langle Z^2-X^2-Y^2\rangle$ of the affine cone $V$ given by $Z^2=X^2+Y^2$ in $\mathbb A^3$.
A little down-to-earth calculation done in Shafarevich's Basic Algebraic Geometry ( Vol.1, Chapter II, 5.1, page 125) shows that $A$ is normal.
At a more abstract level we may deduce normality from the fact that $V$ is regular in codimension one and is a complete intersection.
That $A$ (or its localization at any point) is not a UFD is almost evident from the two factorizations $Y^2=(Z+X)(Z-X)$, although some details still need to be checked.
|
myENABLE=false
myHOST=host
myPORT=port
myCHANNEL=channels
myCERT=false
myIDENT=user
mySECRET=secret
myFORMAT=json
|
One Chart Brilliantly Sums Up Citi Bike’s Safety Record
Courtesy of GIS specialist Tom Swanson, this graphic contains the best evidence yet that Citi Bike has not led to an increase in bicyclist injuries.
Using crash information scraped from NYPD PDFs by freelance web developer John Krauss, Swanson was able to map which bicyclist injuries occurred inside the Citi Bike service area. Then he charted those injuries as a percentage of all cyclist injuries in the city. If Citi Bike was leading to a significant increase in injuries to cyclists, you would expect to see the percentage of cyclist injuries in the service area rise after bike-share launched at the end of May 2013.
Instead, Swanson’s chart shows that the share of injuries in the service area is holding steady. Compared to the same months in previous years, there has been almost no deviation from the pre-bike-share state of affairs. We already knew that very few people have been injured riding Citi Bike. Swanson’s chart adds citywide data that helps put that small number of injury crashes in context.
This is all the more remarkable when you consider that people have been making between 30,000 and 40,000 bike-share trips every day, so the bike-share zone almost certainly accounts for a significantly greater share of overall NYC bike trips now than it did before Citi Bike. With the share of bicycling increasing inside the bike-share zone and the share of bike injuries holding steady, Citi Bike is, if anything, making it safer to ride a bike. More evidence of safety in numbers.
Swanson’s charts do show that overall NYC bike injuries have gone up slightly in 2013. But that’s true outside of the Citi Bike zone as well as inside. It could be random fluctuation or there might be real underlying causes, but it’s not due to bike-share.
|
Justin Alexander is widely known for his deep knowledge of the region’s macro economy and political dynamics. He is Chief Economist at MENA Advisors and has been engaged in the Middle East as an economist and political analyst since the late 1990s, including a decade living in the region. In addition to his focus on Gulf Cooperation Council (GCC) countries and Iraq, he is a specialist in the hydrocarbons sector and in political conflicts in the region.
He served as an economic advisor at Qatar's Ministry of Finance and before that as a senior economist at Qatar National Bank. His previous roles also include Middle East economist at the EIU, Constitutional Affairs Officer at the UN Assistance Mission in Iraq and equity analyst at Schroders in London.
He holds degrees from Oxford University (Balliol College) and the University of London (Birkbeck College).
|
Hey y'all, I'm Danielle - the crazy behind this blog, where I share my creative life adventures as I survive life as a momma of 4 superheroes & wife to my best friend & fellow nerd. Life doesn't have to be perfect to be GREAT! You can reach me at danielle (at) busymomshelper.com - ABOUT -
Shamrock Shake
It’s that time of year again. Time for green food, green beer (for some) and green shakes! I read somewhere that the McDonalds Shamrock Shake has 57 ingredients! What?! It’s a shake, that seems like a lot! (that seems like a lot for any recipe) Don’t get me wrong, I love McDonalds just as much as the next person. I’m not really a fan of any fast food, but occasionally, it happens. Sometimes convenience wins. And nothing against their Shamrock Shake, it tastes great. But this one only has a few ingredients, and personally, I always vote for home made.
We’re not Irish, however, we are a family that loves to celebrate! St. Patricks day is the perfect excuse for a vanilla-y, minty, chocalate-y treat! YUM! Plus, bonus… It’s so easy to make!! Just five ingredients if you count the garnish, the shake itself just three. Oh I love easy!
Since my kids were quite young, we’ve made it a tradition to have a shamrock shake on St. Patricks day. They always look forward to it. I’m a believer in ‘everything in moderation’, so while this isn’t healthy, per se, it is a treat that is simple, easy and festive.
One thing I like to do when we are having treats, is make sure we make up the healthy in another area. So we’ll make sure we have plenty of nutrition in our dinner or lunch that day. Shepherd’s Pie is one of our favorite Irish-type meals. I love it because it’s all-inclusive. You got your meat and veggies and starch all in one dish. And, you can make it ahead of time and cook it when you’re ready. Serve it with some fruit and dinner. is. done.
And don’t think this recipe is just for the kids… grown ups will love it too!
Presidents Day Dessert
Celebrate Presidents day with an easy and healthy dessert! What?! Celebrate Presidents day? Who does that? Well, the government does for one. Often, government employees are off, and if you’re kids are as excited about getting the mail as mine, they’ll tell you there’s no mail that day. Technically, it is a National holiday. Many schools are closed that day.
3 Reasons to celebrate
But why celebrate? Whether your kids are home with you, or in school during the day, life is filled with teachable moments. As far as schooling goes, we homeschool, AND we public school. I never thought I’d be doing both, but that’s another topic. When we wrestled with what was best for each child, my heart didn’t want to send them away all day. But, what I realized is just because they’re not with me all day doesn’t mean I’m not involved in their lives. So we make the most of each moment we have. And we love learning! So why not learn about Presidents day?
When my kids were younger, and I was trying to make it through Michigan winters (cold, gray, dreary, mundane, did I mention cold?), I would look for opportunities to celebrate, which would make those dreary days more exciting. For example, we celebrated ground hogs day for a couple of years. My now older children, still ask me “what are we doing for groundhogs day?”
Lastly, it’s an excuse to eat dessert!! Haha! But you can feel good about this presidents day dessert, because it’s good for you. Greek yogurt, anti-oxidant berries, and no sugar added makes this the perfect treat. So let’s recap:
Celebrate Presidents Day because~
It’s a teachable moment
It makes an ordinary day extraordinary
It’s a good excuse for dessert
Not sure what to say about Presidents Day? Here’s some resources made for kids:
Parfaits are super easy to make! All you do is choose your ingredients and layer them in a jar or dish of your choice. In the recipe I’ve put approximate measurements to make 1 parfait. You really just want to layer the yogurt and the fruit, so when you’re making this, just do what looks best to you. It could vary depending on the size jar or dish you are using. In our family, the kids love getting their own jar to eat out of. I don’t know why, but they think that is awesome. You can make these up ahead of time and store them in the fridge. This would also make a great breakfast or snack!
It’s not yet Valentine’s Day, yet I’m seeing random Easter items already popping up in stores. While a part of me is like ‘really, already?’ – another part is like ‘Cadbury Eggs? YES PLEASE!’ While other people go crazy for the jelly beans, I’m all about the Cadbury stuff, and have been since I was little! Last Easter my mom even sent me a package with a TON of them – she’s just awesome like that 🙂 To get a little creative, let’s give this oldie-but-goodie a fresh share: Cadbury Creme Milkshake!
Adapted from Chocolatemoosey.com
Contains affiliate links that help support this blog at no extra cost to you. See our disclosure policy for more info.
Did you know we’re now on Yummly? It’s such a neat place where all you do is ‘Yum’ the recipes you want to keep track of – on ours just check out the purple ‘YUM’ circle to the left. Easy-peasy, right? Be sure to yum all your favorite recipes!
When I first tried this recipe version, we’d just moved to Texas (this was in early 2013) and our old blender didn’t make it. I guess there’s plenty of other things that would be worse to lose in a move! Anywho, we had to buy a crappy blender just to get by – but NOW I have this amazing Nutri Ninja® Auto-iQ Pro Compact System that takes on my most challenging blender tasks! I highly recommend it for this creamy milkshake.
There are technically three ‘steps’ for this Cadbury Creme Milkshake: 1. The fondant cream 2. the whipped cream and 3. the milkshake. Of course, you CAN skip the homemade whipped cream and use store bought, if you’d like!
Fondant Cream
4 tbsp. Corn syrup
2 tbsp. butter, softened
1/2 tsp. Vanilla extract
Pinch of salt
1 1/2 cups Powdered sugar
In a bowl, beat the corn syrup and butter until smooth. Add vanilla, salt and powdered sugar. Beat until well-mixed. Set aside.
Whipped Cream
1/2 cup Heavy whipping cream
1/4 cup Powdered sugar
2 tsp. Vanilla extract
Beat the whipping cream until it starts to thicken, usually a few minutes. Slowly add the powdered sugar and vanilla, continuing to beat until stiff peaks form. Set aside.
Milkshake
2 cups Chocolate ice cream
1/4-1/2 cup Milk
Cadbury egg (optional)
In a blender, blend these (except optional egg) with the fondant cream until smooth. Pour into a glass, top with the whipped cream, and, if desired, crack the Cadbury egg on top as garnish (and more Cadbury egg deliciousness). Enjoy!!!
Please tell me I’m not the only one who believes that apple pie is a completely acceptable breakfast! Anyone else? I’m not saying I’d give it to myself (or my kids) very often – but if we have some of this fresh baked Apple Crumb Cake around, I’ll definitely enjoy it at least ONCE for breakfast….okay, maybe twice.
Whether you like your apple cake warm, cold or the perfect room temperature – you’re bound to enjoy this delish recipe that’s easy to make! I whipped this up first around Thanksgiving (remember when I went crazy with the desserts that month?) and it was the perfect combo of cinnamon & apple goodness.
Ingredients – crumble
1 1/2 cups All-Purpose Flour
1/2 cup Brown Sugar
1/4 cup Sugar
1/2 tsp. Salt
1 tsp. Cinnamon
1/4 tsp. Nutmeg
1/2 cup Butter, melted
1/2 tsp. Vanilla Extract
1 Apple, large, peeled & diced
Ingredients – apple cake
4 tbsp. Butter, soft
1/2 cup Sugar
1 Egg, large
1 tsp. Vanilla
1/2 cup Sour Cream
1 Apple, large, peeled and diced
1 cup All-Purpose Flour
1/4 tsp. Baking Soda
1/4 tsp. Salt
1/2 tsp. Baking Powder
Ingredients – glaze
1/2 cup Powdered Sugar
2 tbsp. Apple Cider
Directions
Preheat oven to 350 Degrees F. Spray an 9-inch springform pan and line with parchment paper. Set aside.
Cake: In a large bowl, cream the butter and sugar until fluffy, add the egg and beat well, then mbeat in the vanilla and sour cream until smooth. In another bowl, mix the flour, baking soda, salt, baking powder and apples until well-combined. Add to the butter mixture and stir lightly just until combined. Spread half the cake batter into the bottom of the prepared pan (will be a very thin layer, don’t worry).
Crumble: In a bowl, whisk all of the crumble ingredients until combined and moist. Sprinkle about 1 cup over the layer in the baking pan. Add the remaining cake batter, then top off with the remaining crumble.
Bake 35-40 minutes, or until an inserted toothpick comes out clean. Remove the outside of the springform pan.
Glaze: whisk together the apple cider and powdered sugar, then drizzle over the cake. Enjoy warm or cold. Store in an airtight container in the fridge.
Is it bad that I’m THRILLED Valentine’s Day is on a Sunday this year? I’d rather Saturday, but as long as it’s a weekend I feel like hubby and I can really relax. No pressure to go out, just be at home with the family, making yummy food ourselves. I whipped up these Red Velvet Cinnamon Rolls last week and he loves them so much, he’s already requesting them again!
Don’t they look amazing? A perfect flavor combo of red velvet, cinnamon filling and a cream cheese frosting drizzle on top. It’s seriously the perfect Valentine’s Day breakfast – and the best part? You can make it ahead of time to avoid the morning rush! That’s right, make it the day before, store it in the fridge overnight, then just bake and enjoy. I love easy overnight breakfast recipes!
To whip up these yourself, just head on over to Thirty Handmade Days where I’m sharing the recipe! And you know what? If you choose to have these for dessert, too, I won’t tell anyone – we did that, too!
It’s apparent by the red and pink filled aisles at the store that Valentine’s Day is creeping up on us, whether we’re ready or not. With everything hubby and I have going on right now, we plan to just be mellow and relax a bit together – but that doesn’t mean we can’t enjoy these super delicious Dr Pepper Cheesecake Shooters for a special Valentine’s dessert!
Not only do these pudding desserts look fun and festive, but they have a perfect blend of cheesecake and pudding flavor – topped with a cute chocolate-covered strawberry, of course! I think that’s my one tradition for Valentine’s day (other than spending time with hubby) – the chocolate-covered strawberries, plus sparkling cider. Give me those, a comfy blanket and my hottie for a relaxing evening in and I’m all set!
Ingredients
12 oz. White Chocolate Chips
1/2 cup Heavy Cream
3/4 cup Dr Pepper
8 oz. (1 package) Cream Cheese, softened
1 regular box Vanilla Instant pudding (or Cheesecake)
Red food coloring
Crushed graham crackers
Sprinkles for garnish, if desired
Chocolate-covered strawberry for topping, if desired
Directions
In a small saucepan, heat the white chocolate chips and heavy cream over low heat. Stir occasionally until it’s smooth, keeping over low heat so it doesn’t burn. Remove from the heat and stir in the Dr Pepper, then allow to cool for about 10-15 minutes.
Once cooled, beat the white chocolate mixture with the cream cheese, pudding and little red food coloring (if desired) until it’s all creamy. Place in the fridge about 10 minutes.
Prepare your cups: if your glasses have empty stems like mine did, you can add some sprinkles for a more festive look. At the base of the cup scoop some graham cracker crumbs (about 1-2 tbsp).
Scoop some pudding mixture into each cup, topping off with a strawberry. Store, covered with plastic wrap, in the fridge until serving.
Check out these other yummy desserts…
I’m a sucker for a delish pudding cookie. Seriously – if we have any in the house, they don’t last long, much to the dismay of my ‘less sweets’ goal! They’re really easy to switch up with new flavors, so after Santa brought us a LOT of chocolate oranges in our stockings for Christmas, Hubby thought we should try adding those to cookies. Genius! These Chocolate Orange Cookies are super simple to make, and have the perfect amount of amazing flavor in every bite!
For those that follow this blog regularly, you probably heard that Hubby doesn’t like most chocolate. Weird, I know, but hey – more for me. He LOVES chocolate oranges, though – to the point that he jokes about cancelling Christmas if he doesn’t get any chocolate oranges. Needless to say, I make certain that Santa doesn’t forget any in his stocking!
You can whip up these yummy pudding cookies super fast – and it’s so nice to make an extra big batch then freeze the extras. Whenever you have a cookie craving, just nab one out of the freezer bag and enjoy!
Ingredients
1 1/2 sticks Butter, softened
3/4 cup Light Brown Sugar, packed
1/4 cup Granulated Sugar
1 Small Package INSTANT Vanilla Pudding (3.4 oz)
2 Eggs
2 tsp. Vanilla
2 1/4 cups All-Purpose Flour
1 tsp. Baking Soda
1 Chocolate Orange, crushed into bits
Note: makes about 32 cookies
Directions
Preheat oven to 350 Degrees F. Spray or line a couple baking sheets, then set aside.
Use a fork (or mixer) to ‘smoosh’ the Butter, both Sugars and Pudding together well. Add the Eggs and Vanilla, mix until combined. Then add the Flour and Baking Soda, mix until well combined. Stir in the Chocolate Orange bits.
Bake for 8-10 minutes, or until barely starting to brown on the edges. Remove, and ENJOY!!!
These moist treats and a hit with the whole family! Next year I plan to buy extra chocolate oranges early so I can whip up a few batches of the pudding cookies and give as gifts – the perfect festive dessert to please everyone!
I love adding an extra dose of ‘spice’ during the holidays! No, not the HOT kind of spice, the cinnamony type that you can’t help but think of Thanksgiving, Christmas or any of those special times of year. This delish Holiday Spice Fruit Salad is just that, and makes the perfect side to any holiday meal!
I not only love the mix of flavors in this dish, such as the tangy apples and sweet grapes mixed with a creamy drizzle of sauce, but also that it’s SUPER simple to make, especially if you incorporate your family to help chop the fruits and mix the dressing!
Ingredients
1 medium Pear, diced
1 cup Red Grapes, cut in half
2 medium Apples, diced
4 tbsp. Fresh Lemon Juice
1/3 cup Yogurt (vanilla is great, but feel free to switch it up)
2 tbsp. Honey
1/2 tsp. Vanilla Extract
1/2 tsp. Cinnamon
1/4 tsp. Ground Nutmeg
1/3 cup Pecans or Walnuts, chopped
Directions
Toss the fruit and nuts in a large bowl gently. Set aside.
In another bowl, mix the remaining ingredients until smooth. Pour over the fruit and again toss gently to coat evenly. Best if served immediately!
We had this back at Thanksgiving, and it was a hit – especially for the kids who LOVE fruit! They even said ‘can I have that one fruit dessert’? Haha – if I can convince them it’s a dessert, then that’s a win to me!
What’s YOUR favorite fruit side dish for a holiday meal?
Merry Christmas, Mamas! Today I’m sharing a Kid-Friendly Christmas Cake-Topper that you and your kiddos can enjoy making, just in time for the special day!
I’m Lynn, from Riggstown Road, and if your life is anything like mine, you have some enthusiastic little helpers when it comes to baking Christmas goodies. So it’s nice when the things we’re making are easy for little hands. (Side-note: At this point, my helpers are becoming better at this stuff than I am. And I am totally ok with that.) 😉 This cake-topper is easy enough for your preschoolers to participate in, fun enough for your older kids to enjoy, and special enough for all of them to feel proud of.
All you need are 3 simple ingredients to create a winter wonderland of trees on top of your favorite cake.
INGREDIENTS
1 box ice cream SUGAR CONES
1 container fluffy WHITE ICING
1 container sparkling white sugar SPRINKLES
DIRECTIONS
Prepare your cake with white icing.
Carefully cut some of the cones to different sizes for different sized trees. (I used a tomato slicing knife.)
Let kids spread icing on the cones, covering completely.
Help kids gently place the “trees” in the “snow” on top of the cake.
Kids can sprinkle the sugar crystals all over the trees and the top of the cake to create “ice” crystals.
Now stand back and admire the prettiness!
Cute enough for company, and trust me, this is waaay easier than decorating cookies!
As you can see, we weren’t too concerned with the rest of our (delicious) cake, but I loved it in all its messy glory. I called it a snow-covered mountain, but the girls were a little unsure about that. They seemed more impressed with their trees. I think sprinkling the sugar was the part that was the most fun for them. It was the, ahem, icing on the cake. 😉
Ever watch Polar express and see the hot chocolate scene and think how amazing that hot chocolate has to be? Every time I watch Polar Express I have to have hot chocolate and now have a recipe for Polar Express Hot Chocolate that is amazing!
This recipe is pretty simple but it does take longer than sticking a cup of water in the microwave and pouring in a packet. This recipe is also very versatile where you can take out things or adjust it to your liking, like when I am in a hurry I will usually just mix a little heavy whipping cream, milk, and hot cocoa mix together. With this recipe you can also have a fun hot chocolate party with your kids or in my case my sister and friends. So try it out, change it up, but grab a cup and the movie Polar Express and enjoy!
Ingredients:
¾ cup heavy whipping cream
½ can of sweetened condensed milk (14 oz.)
¾ cup milk chocolate chips (make sure they are milk because semi and dark make it not so sweet)
Put all ingredients in a medium pot (except for toppings) and stir until chocolate chips are melted. Can also put in a slow cooker.
Once melted take off burner and let cool for 20 – 30 minutes or faster if you put it in the fridge. Usually getting it all melted boils the liquid and no one wants to burn their tongue so just make sure it’s not boiling when you try or your kids try to drink it.
Pour hot chocolate into a cup and top with desired toppings and enjoy!
Polar Express Cupcakes
Now we have our drink for the movie and you can’t watch a movie without some kind of treat. These Polar Express Cupcakes are perfect for those with a sweet tooth. These cupcakes also carry a little surprise in the middle of them.
I use a basic betty crocker cupcake recipe and a vanilla cream cheese frosting, but really you can use whatever recipe you like.
Ingredients:
Cupcakes
2 cups flour
1 teaspoon salt
¼ teaspoon baking powder
1 cup hot water
2/3 cup unsweetened baking cocoa
¾ cup shortening
1 ½ cups sugar
2 eggs
1 teaspoon vanilla
1 bag large marshmallows
Toppings:
Candy canes
Mini chocolate chips
Mini marshmallows
Mini candy canes
Christmas sprinkles
Frosting
½ cup unsalted butter, softened
8 oz cream cheese
1 teaspoon vanilla
4 cups powdered sugar
1 – 4 tablespoons milk (I usually end up using just over 2 tablespoons)
Directions:
Heat oven to 350⁰ F. Place cupcake liners into cooking sheet.
In a separate bowl mix flour, baking soda, salt and baking powder together and set aside. Mix hot water and cocoa together until dissolved; set aside.
In a large mixing bowl beat shortening until creamy, then slowly add sugar about ¼ cup at a time beating well and scraping the sides of the bowl occasionally. Add eggs one at a time mixing well after each. Stir in vanilla.
Alternating between flour mixture and cocoa mixture slowly add to the mixing bowl and mix until well combined.
Cut 12 marshmallows in half and place in the middle of each cupcake, you don’t have to press them all the way down.
Bake 20 – 25 minutes. Marshmallows will have mostly dissolved and look messy but that’s ok because they’ll be covered.
Once you pull the cupcakes out place 1 marshmallow into the crater or you could just place a half marshmallow.
Place cupcakes back into oven for about 3 – 5 minutes just until marshmallows get softened.
Pull out and let cool completely, very important they are cool before you start frosting.
Frosting directions
Place butter in a mixing bowl and cream. Add cream cheese and mix until full combined and smooth.
Add vanilla and powdered sugar and blend on low until fluffy.
Slowly add milk a little at a time until the right consistency.
Beat until fluffy, about 1 – 2 minutes
Decorate! Frost the cupcakes, then add any toppings you would like. To finish it off place a mini candy cane on the side for a “Handle” for a nice Hot Chocolate Cupcake! Try adding ¼ teaspoon mint extract to the cupcakes or frosting for a nice mint flavor!
Hello, and Happy Holidays! This is Stephanie from Steph in Thyme, and today I’m sharing a classic Christmas cookie recipe my family has been baking since I can remember…but modified gluten-free.
This recipe is barely adapted from the Super Spritz Cookie recipe that came with my mom’s Super Spritz electronic cookie press she’s had as long as I can remember (we’re talking 20+ years).
Simple, buttery sugar cookies pressed into a flower design, the centers filled with raspberry jam (with the seeds!). Such a lovely and festive addition to a holiday cookie tray or gift plate. My sisters and I had the job of carefully placing a bit of jam in the center of each cookie, cautious not to overfill as the jam will spill over and fill the cracks of the petals.
My sisters and I had the job of carefully placing a bit of jam in the center of each cookie, cautious not to overfill as the jam will spill over and fill the cracks of the petals.
In place of regular flour, I used King Arthur’s Gluten-Free Multi-Purpose Flour. Bob’s Red Mill 1:1 Gluten-Free Baking Flour is another great gluten-free baking mix. When I use these gluten-free flour mixes in my Christmas cookies, I can’t notice the difference.
I used a cookie press by OXO Good Grips to create the little flower designs. Simple to assemble, use, and clean. A great find at Bed Bath & Beyond.
These gluten-free Christmas sugar cookies are a fun wintery activity with kids. Have fun, and Happy Holidays!
Cream the butter with an electric stand mixer or hand mixer. Add the sugar a little bit at a time as you continue to run the mixer, beating until creamed, fluffy, and light.
Add the egg yolks one at a time, followed by the vanilla and salt. Mix well to combine.
Add the flour 1/3 at a time, mixing well in between until a stiff dough forms.
Assemble and fill the cookie press. Press floral design cookies onto an ungreased cookie sheet about 2 inches apart. Using a chopstick or something similar, create a small hole in the center of each cookie. Fill the hole with about 1/8 tsp raspberry jam.
Bake cookies for 8-10 minutes until very lightly golden brown. They overbake and turn brown quickly, so keep a close eye at the 7 minute mark!
This post is sponsored by Acorn Influence & DASANI Water. All opinions are mine alone.
Do you enjoy wrapping gifts? I seriously LOVE it! Since I make a big deal, almost party-level, about our Christmas wrapping, I thought it’d be from to make it even more ‘magical’ with these TWO delicious and easy-to-make drink recipes: Pomegranate Lemonade & Fruity Sparkle! No alcohol, so even your kids can enjoy these bubbly beverages!
I can’t remember how long ago we started, but it was a tradition for my mom and I (sometimes my dad, unless he was able to find a good excuse to avoid it) to lock ourselves in her room – or the heated garage – and spend hours wrapping EVERYTHING at once. It was so fun listening to music, picking which fun wrapping paper for each gift, checking off lists, and chatting with her. Fun food and drinks was always required – and this year I grabbed a few flavors of DASANI Sparkling Water from Walmart to help me out!
This is the 3rd Christmas since we moved to Texas and I’ve been unable to do a big wrapping party with my mom. I’ll admit, it’s one of those traditions that I dearly miss! Now my ‘parties’ are smaller, since it’s just us, but I still make it a big deal. This year my girl even got to help (not with HER presents, of course!) and we had a really great time! Just one more way you can make the holiday SPARKLE this season is by making even the wrapping part fun, social and TASTY!
The reason I wanted to use DASANI Sparkling Water was not only the amazing taste and bubble, but it’s the perfect mixer because it’s unsweetened, there’s zero calories, and no artificial colors or caffeine. There’s 4 yummy flavors (in 12 packs of 12 oz. cans) to choose from: Lime, Berry, Lemon and Black Cherry.
Pomegranate Lemonade
Ingredients
12 oz. can DASANI Sparkling Water – Lemon
2-3 tbsp. Pomegranate Juice
1 tbsp. Lime Juice
2-3 tbsp. Heavy Cream
Directions: Pour the sparkling water into a tall glass, then add the other ingredients and stir. Enjoy while still cold and sparkling (aka bubbly)!
Fruity Sparkle
Ingredients – makes 2
12 oz. can DASANI Sparkling Water – Berry
9 oz. Mango Nectar Juice
2-3 tbsp. Heavy Cream
2 tbsp. Lime Juice
Directions: Mix all of the ingredients together, then divide into two tall glasses. Enjoy the creamy, smooth flavor!
Note: you CAN leave out the heavy cream for a stronger fruit flavor.
I can’t wait for another Christmas when I can have a wrapping party with my mom – and I’ll be sure to share these drink recipes with her, too! Because the best way to add more magic to a holiday is by making the MEMORIES – like our wrapping craziness!
|
{
"scripts": {
"start": "webpack-dev-server -d",
"build": "webpack --mode none"
},
"devDependencies": {
"@wasm-tool/wasm-pack-plugin": "^0.2.0",
"webpack": "^4.28.1",
"webpack-cli": "^3.2.1",
"webpack-dev-server": "^3.1.14"
}
}
|
The referee Stuart Attwell is surrounded by Watford players after awarding the so-called ghost goal to Reading in 2008. Photograph: Ian Walton/Getty Images
Stuart Attwell has lost his place on the list of Select Group of referees and will return to Football League duty on the national list.
The move, which is said to come by mutual consent, comes after the 29-year-old made a string of high-profile errors after being promoted to the elite group of referees at the start of the 2008-09 season aged 25.
Only weeks into that season Attwell attracted heavy criticism for awarding Reading a so-called ghost goal against Watford when John Eustace had kicked the ball over the byline four yards wide of the goal before it was put back into play by Noel Hunt. Attwell's assistant Nigel Bannister signalled for a goal.
More recently, in December, Attwell sent off Gary Cahill, then of Bolton Wanderers, for fouling Scott Parker only yards over the halfway line, saying he had denied Tottenham Hotspur a clear goalscoring opportunity. The red card was overturned on appeal.
In a statement on Wednesday night Mike Riley, the former referee who is now general manager of Professional Game Match Officials Limited, backed Attwell to improve as a referee and return to the top level. "Throughout his career in the select group Stuart has demonstrated great courage and mental strength in responding to the challenges that he has faced," Riley said.
"He has shown many of the attributes of a top-flight official but the Premier League is an exacting standard with huge demands. It is imperative that PGMOL deliver the best officiating possible to the English game at all levels.
"This is not the end for Stuart. There are several match officials who have returned to the National List and benefited from it. Stuart has a high level of maturity and responsibility and I'm convinced that he has a long-term future as a referee at the very highest level. PGMOL sincerely hopes to be welcoming Stuart back to the select group in the future."
Attwell said: "I have learned a great deal from my involvement in the select group over the last four years and I am now looking forward to building on that valuable experience.
"I strongly believe I have a lot to offer refereeing and I now look forward with commitment and enthusiasm to the new challenge that I am undertaking. This is supported by a determination to continue my career development and return to the select group as soon as possible."
Attwell spent only one year on the national list before his promotion to the select group four years ago. He made his Premier League debut as a referee in the 1-1 draw between Blackburn Rovers and Hull City in August 2008.
After the Watford-Reading game further controversies followed when he was accused of "losing control" of a Derby County v Nottingham Forest derby, having disallowed two Derby goals in the final stages, booking eight players and sending off Forest's Lewis McGugan.
He has also attracted the ire of Wigan Athletic's manager, Roberto Martínez, who accused the referee of lying about his reasons for sending off Gary Caldwell in April 2010, while Stoke City's Danny Higginbotham claimed Attwell could be too easily influenced by players.
Later that year he awarded Liverpool a highly controversial goal against Sunderland. He had awarded the Black Cats a free-kick inside their own half and Michael Turner touched the ball back to Simon Mignolet, apparently for the goalkeeper to take the set piece.
But Attwell ruled the ball active, allowing Fernando Torres to steal in and set up Dirk Kuyt to finish into an unguarded net.
|
Along with an ITN film crew, Observer reporter Ed Vulliamy uncovered the terrifying truth of Serbian-run concentration camps in the Bosnian war. While former Serb leader Radovan Karadzic stands trial at The Hague, Vulliamy is called as a witness – and finds himself cross-examined in a private, close encounter with the man accused of masterminding genocide
The white curtain behind the pane of reinforced glass is raised, and there he is on the other side, not four feet away: wearing a grey jacket and purple tie with a pin attached showing the crest of a double-headed eagle and crossed Cyrillic Cs that stand for "Samo sloga Srbina spasava" – "Only unity saves the Serbs".
It is a tight fit, in the depths of the war crimes tribunal building in The Hague, in the tiny holding cell and visitors' room. On the other side of the thick pane of bulletproof glass is Radovan Karadzic, leader of the Bosnian Serbs during the worst slaughter to blight Europe since the Third Reich, thereafter the world's most wanted fugitive – and now on trial in The Hague. We speak through holes in the glass that he is squeezed against. His American lawyer, Peter Robinson, sits next to him.
On my side of the glass, I share a table with Ann Sutherland, a prosecuting trial attorney for the International Criminal Tribunal for former Yugoslavia (ICTY), due to lead my evidence against Karadzic the next day before the judges, as well as another member of Karadzic's defence team.
This is an interview requested by Karadzic before I give official testimony the following day in open court. Ironically, when the witness unit's call came out of the blue in August 2011, saying that "the defence" had requested an interview, I was driving through pluvial mist up a mountain track in Bosnia to attend the consecration of a small monument to mark a remote mass grave: a crevice into which the bodies of 124 men had been dropped and concealed – a secret well kept by the Serbs for years. The men had been prisoners in concentration camps at Omarska and Keraterm in north-west Bosnia. They had been moved on the very day I arrived, and uncovered the camps along with an ITN crew – 5 August 1992 – to the forest above a hamlet called Hrastova Glavica. Once there, they were taken off buses in groups of three. They were given a last cigarette and shot one by one, their corpses dropped down the cranny in the rock and into the void, to be found and exhumed 15 years later.
I was in The Hague primarily to testify against the man on whose authority I had visited those camps that day: Dr Karadzic. I had also agreed to be interviewed by him – partly out of confusion at the witness unit's phone call that misty day, and partly on the basis that a prosecution witness should be seen by the court to oblige the defence in its requests. And, of course, I was as curious as I was nervous. Somewhere in the back of my mind was the sheer surreality of this encounter.
Karadzic's lawyer, Robinson, began proceedings in the holding cell by saying that, as Karadzic was tired after a day in court, he would ask the initial questions, and have me recall the details of a meeting between myself, the ITN crew and Karadzic two days before we walked through the gates of the Omarska camp. I recounted the strange road to Karadzic's doorstep that summer, four months into Bosnia's carnage, which had begun in April 1992 when the Bosnian Serbs unleashed a hurricane of violence against non-Serbs, carving out an ethnically "pure" swath of territory. In late July 1992, Karadzic appeared on ITN's evening news during yet another fruitless "peace conference" in London, to discuss the slaughter in Bosnia. Karadzic had been questioned about reports of atrocities in concentration camps published in that morning's Guardian. He retorted that they were false, and challenged the paper and ITN to come and see for themselves. I left for Belgrade the next day.
After a delay of several days (while, I now know, the camps were prepared for evacuation and the murder of many inmates), I met Karadzic, outside his headquarters in the Bosnian Serb capital, Pale, at lunchtime on 3 August. He had a weak handshake for someone so reportedly fearsome. Karadzic assured us we would see Omarska. It was, he said, "an investigation centre", while another camp, Trnopolje, was a place where people had come of their own accord – "displaced because their villages had been burned down". We spoke, too, about the camps where Serbs were being held on the other side by Muslim and Croat authorities. There was talk, too, of Serbian history, and its people's long and "celestial" struggle.
We were then passed seamlessly down the chain of command: delivered first into the hands of Karadzic's deputy president, Nikola Koljevic, an Anglophile professor who kept quoting Shakespeare. Koljevic escorted us as far as the largest Bosnian Serb city of Banja Luka, where we were passed on to a Major Milutinovic, who drove us past the incinerated and deserted Bosnian Muslim town of Kozarac to Prijedor, from where the camps were administered. There, we met with the "crisis staff", led by Milomir Stakic and his deputy Milan Kovacevic. And from there we proceeded with the Prijedor police chief and camp commander Zeljko Mejakic through the gates of Omarska, to behold men in various states of shocking decay emerging from a great hangar, being drilled across a yard and into a canteen, where they wolfed down watery bean stew like famished dogs. "I don't want to tell any lies," said a man called Dzemal Paratusic, "but I cannot tell the truth. Thank you for coming." (Paratusic survived, and now lives in Borehamwood, Hertfordshire.)
We were denied access to the rest of the camp despite Karadzic's guarantee, because, explained our hosts: "We have our orders … you can do this and this and that, but not that." And we were bundled out of Omarska and taken to Trnopolje camp, where we found, behind barbed wire, the remarkable sight of men, some skeletal, who had arrived from yet another camp – Keraterm – that morning. There, they said, there had been a terrible massacre one night, of 150 men in a hangar. One prisoner, Fikret Alic, said he had been assigned to loading the bodies on trucks, but had been unable to do so. We left having seen little, but enough to know that a dark horror of vast but inestimable dimensions was unfolding around Prijedor.
Television news footage recorded by ITN on 5 August 1992 of emaciated Bosnian Muslim prisoners at Trnopolje camp in Serb-held Bosnia. Photograph: Reuters/ICTY
The war dragged on another three years, Karadzic's hand eagerly clasped by British and other diplomats beneath the chandeliers of London, Paris and Geneva as he outmanoeuvred them, basked in their friendship and played with their impotence and cynicism, from one abortive peace plan to the next, while the killing on the ground continued. As war ended, in 1995, Karadzic was indicted for genocide and several counts of persecution and crimes against humanity; those same diplomats now baying for his capture.
With time, the awful truth about the camps emerged. Mass graves were uncovered, the bereaved located, and testimony at this tribunal laid bare Omarska's and Trnopolje's secrets: mass murder, and torture, beating, rape, prior to enforced deportation (I had accompanied one of the convoys). The trials at the Hague followed that chain of command down which we had been passed, in reverse: first, Dusko Tadic, a parish-pump killer and torturer who roamed the camps at large; then groups of guards, then Kovacevic, then Stakic – among many others. Koljevic shot himself in 1997. Now here was Karadzic.
For 13 years Karadzic was variously protected by both Serbia and his own Bosnian Serb fiefdom, and by sections of the same international community that were supposedly hunting him. The European Union made his delivery to The Hague a condition for Serbia's consideration for membership and he was arrested in the summer of 2008 – a wild-haired practitioner of alternative herbal medicine hiding behind a false name and a beard, among friends in Belgrade. During my own search for him for the Observer, I had met and drunk with his entourage, a wild and eccentric bunch who compared his writing to Joyce and Dostoyevsky. Nerma Jelacic, now spokesperson for the tribunal in The Hague, and I had been harangued in my rental car as we reached the mountains in which Karadzic had been sheltered above the town of Foca.
But now I sit opposite him – a man charged with "personal" and "superior" criminal responsibility for genocide, extermination, persecution, murder, deportation, unlawful attacks on civilians, violence "the primary purpose of which is to spread terror". In short, he is – allegedly – one of the most proficient mass-murderers of the second half of the 20th century. The prosecutions are roughly divided into three sections: the siege of the Bosnian capital, Sarajevo, between 1992 and 1995; atrocities and ethnic cleansing across the municipalities of Bosnia in that same period, and the massacre of 8,000 men and boys at Srebrenica in 1995.
This investigation at The Hague – the cases against Karadzic and his military counterpart General Ratko Mladic – has been ongoing for 18 years.
On the other side of the bulletproof glass, Karadzic rouses himself. He is courteous, almost jovial, though not quite endearing.
He asks: "Did you get the impression I was accessible" during the war? On that day, yes, certainly. But after finding the camps, I had not been granted permission to travel in his territory. I tell him that "someone dear to you" had withheld authorisation – referring to his daughter Sonja, who ran the press office in Pale.
His initial line of questioning concerns the Omarska camp itself. Did I know it was a "temporary investigation centre" for suspected Muslim fighters? Yes, I know of this claim, I reply. Did I know that 59% of the prisoners in Omarska were sent to a camp for prisoners of war, and 41% were "released to Trnopolje"? No I didn't, until we found the camp.
Did I investigate camps in which Serbian prisoners had been detained? Yes, I did, I reply. Within days of finding Omarska, I was heading for the town of Capljina, and revealed the camp nearby, called Dretelj, run by a Croat-Muslim militia called HOS.
Then, after an hour and a quarter, the "interview" reaches its intended climax. Karadzic produces an old revisionist chestnut of an argument, which claimed that ITN and I had fabricated our reports about the camp at Trnopolje, and that the pictures of prisoners behind barbed wire were those of refugees free to come and go. There was no point in going through it all again: this tired notion advanced by a "media expert", Thomas Deichmann, five years after we found the camp, had been attempted and quashed by successive defendants convicted at successive trials, and had been the subject of a civil court action in London between ITN and the theory's British champion, Living Marxism magazine, in 2000, with the jury finding soundly for ITN.
This revisionist accusation was also endorsed in the late 1990s by British "intellectuals", and has been raised again recently by the distinguished linguistics professor Noam Chomsky. Now Karadzic gives it a whirl: he plays a video of recut Bosnian Serb TV material to make his point. I reply that I was convinced then, and remain convinced, that the men in those pictures were prisoners arrived from Omarska and Keraterm, under guard, and that the camps were real.
I don't sleep that night before my appearance as a witness for the prosecution. I hate doing this; it is disturbing, tremulous, humbling and formidable in its way. As I enter the courtroom the next day I exchange a nod of greeting with Karadzic, who puts on his headphones, raises his eyebrows and makes a facial gesture towards his computer screen, as though to say, "Let's get to it", with gladiatorial fraternity.
On the bench are four judges, with Korean Judge O-Gon Kwon presiding. Ann Sutherland submits evidence from a previous trial, that of Milomir Stakic – sentenced to life, reduced to 40 years on appeal – and outlines the meeting with Karadzic and the discovery of the camps, illustrated with ITN's footage. Of Omarska, in an interview after our discovery of the camp, Karadzic says: "We have 13 prisons and the prison in Omarska is the worst one." Karadzic boasts he could close Omarska "even in two days" if the Muslim side agreed to a prisoner exchange.
In Omarska, there is the film of us trying to see the camp properly – quarters in which we now know thousands of men were crammed, and from which they were called for torture and mass execution – on Karadzic's authority; and being denied access. And now the judges turn to the man who allegedly gave those orders, that he might begin his cross-examination of the witness. Karadzic cuts to the quick: "Do you think that you managed to retain your objectivity?" I try to explain something to the judges: that in the past I have misused the word "objectivity" when I mean "neutrality". "When something is fact-specific, I remain objective," I say, but "I do not attempt to try to be neutral. I'm not neutral between the camp guards and the prisoners, between the raped women and the rapists … I can't in all honesty sit here in court and say I am or want to be neutral over this kind of violence."
Karadzic challenges my use of the word "racialist" to describe his programme – the Muslims of Bosnia are "Serbs who converted to Islam, and that is what Lord [David] Owen thinks as well,", he says. I reply that "the inmates in the camps were either Bosnian Muslims or Croats, and the people running them were Bosnian Serbs … and where I come from, if one self-defined ethnicity seeks to obliterate or clear the territory of all members of another ethnicity and to obliterate any memory of them, that is racialism."
There follows questioning that amounts almost to a general chat about politics: how both Serbs and Croats were, says Karadzic "in favour of a decentralised Bosnia consisting of three entities whereas the Muslim side wanted to have a unitary Bosnia". I agreed with his analysis, but couldn't resist an observation that "there's a jump between the policy and mass murder". Judge Kwon kindly puts an end to this meandering discussion; time for the first break. Then back into the arena. There is no gladiatorial camaraderie from Karadzic this time, as we re-enter the court; his face has hardened, his eyes steeled. And his voice too. Do I remember that Karadzic accepted some of the peace plans? Yes, I remember "endless plans, treaties, none of which amounted to very much on the ground. The killing carried on." Do I know about the "fighting" around Prijedor? My initial article from the camps quotes a prisoner who had been involved. I say that what resistance there was had been subjugated by the time we arrived – this discourse continues a good while.
Then he asks about Omarska, quoting my article: "There was no visible evidence of serious violence, let alone systematic extermination." I reply that we were trying to get into the hangar "where we had suspicions that appalling things were taking place. Hindsight has shown that they were". "How do you know?" asked Karadzic. "I've heard from scores of people who were in Omarska that there was widespread and systematic killing... The tribunal's own record over the years would, I think, suffice."
Karadzic questions the veracity of a quote from a boy talking about a massacre of 200 men in the Keraterm camp. I reply that: "He got the number wrong, but the massacre did take place." Then Karadzic insists: "If I told you, Mr Vulliamy, that none of this is true, and that all those who said anything about killings saw a single killing of a person who was mentally disturbed, would you believe me or would you believe them? … It seems you choose to believe things which are detrimental to the Serbs quite easily."
A single killing? I have to let this sink in. Does he really believe this? "I don't choose to believe things that are detrimental to one side or the other. I don't believe that only one person was killed in Omarska and Keraterm put together … I do believe that very many more than one single mentally disturbed person was killed … Sorry, with respect, I have to say that if you tell me it is only one, I don't believe you, sir. Nothing personal … And the detriment to the Serbs is irrelevant. That's not how I measure these things."
"With all due respect," retorts Karadzic, "it would be relevant if it were true. However, I told you that they all saw a single killing. They all discussed killings, but only saw one." Then we move on to Trnopolje. In my initial report, says Karadzic rightly, I said that Trnopolje could not be called a concentration camp, but I have since changed my mind. Judge Baird, sitting on the end of the bench, asks for clarification.
I try to explain that in the immediate aftermath of our discovery, I thought the invocation of the Holocaust by much of the mass media was not useful to our coverage, and use of the term "concentration camp" encouraged it. But that on reflection "I have decided," I told the bench, "after consultation with people at the Holocaust museum and survivors [of the Holocaust] to use the term very much with reference to its proper definition which comes from the Boer war in South Africa. It's fair to say that Trnopolje was exactly that [a concentration camp], where thousands of civilians were concentrated prior to enforced deportation and death."
Karadzic pushes his theme. Did I know civilians had been "evacuated from a combat zone" to Trnopolje? "That was not deportation … this was evacuation … based on requests made by these persons". I reply that I had been on a deportation convoy "of people who [had] told me something different … that soldiers and policemen had come around to their houses and given them ultimata to leave … The people on the convoy that I travelled with were leaving anything but voluntarily." On the same route four nights later, "large numbers of people were taken off the buses and executed on Mount Vlasic, known to this tribunal as the Vlasic massacre".
By now Karadzic's tone is harsh, combative. He refers again to the accusation that ITN and I somehow "staged" the camp at Trnopolje. Karadzic plays a section of Bosnian Serb TV making a film about us. "Our thesis [is]," he says, "that the fence around the building tools is what we saw … You, in your turn, contest that, right?" "Yes I do. This thesis, as you call it, was advanced in 1996 or 1997, we heard nothing about it between 1992 and that year from you or anyone else … Those men were detained and under guard." And on we go: "Do you see the wheelbarrows?" "I didn't notice them at the time, there were other things to look at … I'm saying that my description of them as prisoners had been proved accurate over and over again."
Karadzic produces the famous picture of the skeletal Fikret Alic behind the barbed-wire fence. "How can you be so certain that this is not just the way he normally looks?" "I know that's not how he normally looks … I met him in Slovenia the following spring, and he was of normal build." "Are you saying that within two months his condition deteriorated so much that he was on the verge of extinction?" "Yes … perhaps the conditions in Keraterm were so appalling that his condition had deteriorated in two months." "Did you see him half naked when you saw him in Ljubljana?" "No, he was clothed".
Karadzic questions my use of the term "mass murder". "Did you establish it yourself, or did you hear it from others and believe it?" "I had met hundreds if not scores of people who have survived the camps, and hundreds if not scores of people bereaved by the camps." "Do you believe that people were also killed in combat?" "Yes, I do, without doubt."
Ed Vulliamy appears as a witness at the Karadzic trial. Photograph: ICTY
Karadzic, justifiably, finds some of the sillier things I have written about him. The first is a headline in a Bosnian magazine: "I live for the day when I'm going to take the stand in The Hague against Karadzic". He asks whether this makes me an impartial witness against him. I don't recall if I had said that or not, but I answer: "No disrespect, I have not lived for this day."
There's another article, even more embarrassing, in which I called Karadzic a "tin-pot tyrant" with a "cocksure swagger". "Do you have any proof that I was a tyrant?" he asks. I concede that he was, indeed, elected on his own territory, though not across Bosnia. And: "Forgive the cocksure swagger," I reply, "You did have one at the time. The language is a little strong, I'll admit." Throughout the exchange, Karadzic pursues his theme of my being "anti-Serb". "The Serbs consider you highly partial, most partial, isn't that right?" To which I reply: "Well if so, that's unfortunate. I am, as I tried to explain when we were talking about neutrality, highly partial about extreme violence. I'm not highly partial about any race of people or ethnicity or whatever. In fact, I'm highly partial against racialism. So I'm not anti-Serb, I'm anti what was done in the name, tragically, of Serbia".
Later, I stress that I took "this allegation of anti-Serbian sentiment extremely seriously" and had "proceeded immediately to investigate camps with Serbian prisoners … and I made it my business to do so in the interests of impartiality, and partiality over the practice of putting people into camps". Judge Morrison intervened: "As you know, Dr Karadzic … it isn't the Serbian people who are indicted in this case, nor the Serbian state. It's you, and you need to concentrate on that reality." To which Karadzic replies: "Thank you, Excellency. However, as things stand, I have been indicted … for everything that every crook did on the ground. I am trying to prove that I had nothing to do with the system whatsoever."
In his parting remarks, Karadzic insists that my descriptions of the terrible state of prisoners in Omarska were made only after President George H Bush had expressed his horror at our discovery. I reply that my original story described the inmates as "horribly thin, raw-boned, some almost cadaverous…"
I can see what Karadzic is driving at: I was glory-hunting, and cranked it up in order to give interviews on radio and win awards. This hurts, and I explain that I care not a damn about giving interviews or winning prizes, and: "Do I wish history had never had Omarska in it? Yes." Complimenting my initial report from the camps, Karadzic adds, at an intense pitch, that "the rest is nothing but a big story, and I'm really sorry that you put yourself in that position and that you were finally proclaimed an anti-Serb". This is searing stuff, and Judge Kwon rules it "necessary comment. Unless [he turns to me] you wish to comment on that." Which I do: "Just to say that I have nothing against the Serbian people whatsoever, my complaint is against what was done in their name."
The following week, I watch another witness facing Karadzic – a doctor whom I had met the day we entered the camps in Trnopolje. Idriz Merdzanic had tried his best to run a "medical centre" in the camp, treating beaten prisoners and raped girls with whatever medicines he could scavenge from surrounding houses. He had been transported to Trnopolje after attempting to treat the wounded, included a badly injured girl of 13, as the Serbs "cleansed" the town of Kozarac, near Prijedor. On the day we visited the camps, he gave ITN an extraordinary interview, on a knife-edge between what he wanted to say and what he felt he could say and live – much of it with a roll of the eyes.
The doctor was ITN's only inmate witness when it sued and defeated Living Marxism at the high court in London over its thesis that Trnopolje was a lie. When I asked the doctor how he felt about those who followed Karadzic's cue in saying reports of the camp were fabricated, he replied: "It's hard to explain my feelings. I have no words for this behaviour. On one hand, we are trying to survive what happened to us, on the other we have these people telling us that it is a lie, that it did not happen. It is hard enough to find words to describe the camps and what happened, but there are no words to describe what these people do."
For a book I am writing, I had visited Merdzanic this summer at home with his family in Kiel, northern Germany. Now working as a surgeon, he said: "I report what I have seen to The Hague, but I never relive it. We do not talk about it, it's a defence mechanism, we lock it away. Everyone has their way of coping, and the experiences are different. Everyone in their own way tries to deal with their own experience of their contact with that hell."
"It is with us all the time," his wife, Amira, added (both her parents were murdered in Prijedor), "and it will be with us all the time until the end of the line. What we do to survive is to keep the door closed."
When the tribunal was established by the UN security council in 1993, its mandate was "to bring to justice those responsible for serious violations of international humanitarian law committed in the former Yugoslavia since 1991". There was an additional charge: "And thus contribute to the restoration and maintenance of peace in the region." This second is an ambitious claim for a court of law, and begs the questions: what has been achieved, and what next, when the trials of Karadzic and Mladic are over?
The mandate is a statement of contrition as well as ambition. For three long, bloody years, Bosnia's war was arguably one of the worst failures of diplomacy the UN has ever endured, along with its mishandling of the genocide in Rwanda, where it also established a tribunal. In its diplomacy, the UN did little more than appease – and often encourage – the pogrom Karadzic is accused of masterminding. UN "protection force" troops stood haplessly by as the slaughter continued, and their commander, General Bernard Janvier, took lunch with Mladic three days before the Srebrenica massacre, which Mladic and Karadzic are accused of ordering; 8,000 men and boys were executed after Dutch UN troops evicted much of the UN-declared "safe area's" population from their compound and looked on as the Serbs separated out males from females, for brazenly obvious motives.
And there is a thread between these origins and what has become a weariness with the tribunal's work on the ground, and among the victims themselves. After Karadzic's arrest in 2008, the streets of Bosnian cities were lined with honking cars, but after that of Ratko Mladic last year, there was no such celebration. The chief prosecutor at The Hague, Serge Brammertz, echoed the wider brief when he said: "These victims have endured unimaginable horrors – including the genocide in Srebrenica – and redress for their suffering is long overdue … We believe that it can have a positive impact on reconciliation in the region." While Sabaheta Fejzic, who lost her son and husband in the Srebrenica massacre, says: "I am not that happy. I was disappointed so many times by the work of the Hague tribunal."
Certainly, the International Criminal Tribunal for the former Yugoslavia has become part of a burgeoning industry of war crimes trials – and a boon to those who would defend war criminals. One British defence lawyer, who had worked on two of the trials, was reported to me as making up to $100,000 a month advising and defending those accused of war crimes around the world. The practice of "fee-splitting" between lavishly paid defence counsel and their criminal clients became so widespread and lucrative by 2002 that it provoked a protest from the US state department. But also groundbreaking achievements are plain to see. Even apart from landmark legal successes, the narrative of Bosnia's catastrophe has been told for history's record by its victims from those blue chairs at the witness stands – even if only to empty press and public galleries. Leaders have been made accountable, international law developed, strengthened, clarified and made applicable to internal conflict.
Mark Harmon is a former public defender in California, who recently retired as senior prosecutor for the ICTY – having been with the tribunal from the start. He has worked on the cases that climbed the pyramids of crime and power in Bosnia, from the days he first muddied his boots on the soil of mass graves in Srebrenica to his work on the Karadzic case. Harmon knows better than anyone how the war Karadzic and Mladic are accused of masterminding was ordered and executed, and how they came to arrive at The Hague.
Harmon recalls the very first trial in 1996 – that of Dusko Tadic, who toured the Omarska and Keraterm camps, killing and beating. There was much criticism at the time about the expense of trying a minnow in the war, and disbelief that Karadzic or Mladic would ever grace the same dock. "Tadic was one of the most important cases," reflects Harmon. "It established the existence of a large crime base, it confirmed the jurisdiction of the tribunal and it established that the violations applied to an internal armed conflict. Tadic shifted the paradigm of protections in international armed conflict to internal armed conflict. The law was set, the platform established that we were capable of trying the cases we were charged to try."
As the crime base was established, and the tribunal scaled the ladders of command towards Karadzic and Mladic, the cases became more dependent, says Harmon, on "access to relevant documents, rather than blood and guts". In September this year, the tribunal convicted Momcilo Perisic, former chief of general staff of the Yugoslav army in Belgrade, a case on which Harmon worked, "which showed a man directing the war from his desk in Serbia – no direct contact with victims at all. Building up the pyramid, the work was based less on the victim testimony of earlier trials than facing down the difficulties of direct government obstruction of our efforts...the trials become more sterile and lose the victims' voice, because the trials at the top, with the likes of Karadzic, are all about proving linkages, with the atrocities already established".
In his most remarkable case, Harmon led the investigation, prosecution and conviction of General Radoslav Krstic, General Mladic's senior officer in command of the Srebrenica massacre. Krstic was one of the very few cases in which the prosecution had a penitent witness from the perpetrating side, a soldier in the Bosnian Serb army called Drazen Erdemovic, who came to The Hague remorseful at what he had done, pleaded guilty and was given a lenient sentence. Thereafter, he testified in numerous Srebrenica cases as a prosecution witness. Erdemovic told the court about unrelenting execution after the fall at Srebrenica, so that the death squads had to mass-murder in shifts. He testified to his wish that he be relieved of his execution duties. Most importantly Erdemovic gave information leading Harmon's chief investigator on the case, Jean Rene Ruez, to an execution site about which the world knew nothing, at the Cultural Centre in the town of Pilica.
"Erdemovic, and the Krstic case, had a huge impact", says Harmon. "This was at a time of total Srebrenica denial by the Serbs. And there was Erdemovic, saying he couldn't kill any more, sitting in a café having a cup of coffee while over the road – closer than the wall of this café here – 500 people were being killed. We would never have known if Erdemovic hadn't told us. As it is, Jean Rene Ruez went to the Pilica Cultural Centre and discovered a grisly massacre scene. Blood smeared the walls, and under the stage of the cultural centre, there were stalactites of coagulated blood". At the same time, Harmon and the investigating teams began to trace the mass graves where the 8,000 executed around Srebrenica were buried, after US Secretary of State Madeleine Albright made the apposite satellite images available. "We were able to see the freshly dug holes – and trace how the Serbs had moved body parts from one mass grave to another to try and conceal the evidence, and lay the ground for exhumations."
Harmon says the wider legacy of the tribunal, as a deterrent for future war crimes and criminals, "is hard to measure. You can't measure deterrence, and we must not overclaim. But it was a pioneering institution; it took some baby steps towards holding people who commit war crimes to account. It developed and refined international law and criminal procedure. The international criminal court down the road is here today because of the success of the International Criminal Tribunal for the former Yugoslavia. If we had failed, it would probably still be in the laboratory. Out of that experiment, people have been trained – inoculated if you will – to become major players in these other tribunals, for the prosecution and the defence – because these cases are about doing justice.
"And I don't think it ever occurred to Karadzic and Mladic, when they were doing these things, that they would be where they are today".
Among the tribunal's critics are people who have a didactic or political interest in undermining it, or like to jeer pointlessly. But there are others who wish it well and have followed its progress. Among the latter is the expert on the landmark trials at Nuremberg that were the ICTY's inspiration – Peter Maguire, author of Law and War, a book about Nuremberg, and another on the genocide in Cambodia.
"The biggest problem facing all of the UN courts today," he says, "is that they were so grossly oversold by human rights advocates during the 1990s. At best, a war crimes trial can convict the guilty and exonerate the innocent in a timely manner. To ask trials to teach historical lessons or provide some form of therapeutic legalism is asking too much of any trial. The idea that war crimes trials can 're-educate' societies is based upon the assumption that the Nuremberg trials did more than punish the guilty and exonerate the innocent, they also transformed Nazis into law abiding democrats. The fact is that neither assumption stands up to analysis."
Maguire argues that "by the end of the 1990s, 'the legacy of Nuremberg' had become little more than a rhetorical tool used to justify any and all war crimes trials and the long march towards an international criminal court with universal jurisdiction. My former teacher, the late Telford Taylor [a prosecutor at Nuremberg], taught me that war crimes prosecutions – under any circumstance – signified failure: failure to act, failure to deter, and finally failure to prevent. Simply put, trials never can make up for disgraceful inaction in the face of preventable atrocities. Nobody in their right mind opposes the punishment of war crimes perpetrators, but coming after the bloodiest century in the history of man, is it enough to seek salvation in new codes of international criminal law and world courts?"
The woman on whose shoulders much of the tribunal's extra-legal mandate – its legacy on the ground – falls, is its head of outreach, Nerma Jelacic – also head of communications for the ICTY. She is from Visegrad, a town on the Drina river in eastern Bosnia, scene of horrific violence. Jelacic's plans are to impact the tribunal's work in a country more torn than at any time during the war: "They involve entrenching the current outreach offices and moving the operation and the defence lines from The Hague to the Balkans: not just to Sarajevo, Zagreb, Belgrade and Pristina - but to the municipalities, the villages themselves.
"The work of the tribunal," she says, "is still being undermined by elements of society which should and could have a healing effect, but they don't: politicians, media, religious leaders - some still maintain the divisions in society. And that is one big machinery to fight against. These divisions are entrenched now and it will take many years for those societies to emerge even partially healed from the traumas they faced. The truth is that no people or nation in former Yugoslavia is ready to see its own reflection; to accept what they see and come to terms with its own past.
"What has happened at the tribunal," adds Jelacic, "is that an unprecedented amount of work has been done by this tribunal and it has changed history. But if you ask anyone 'Has the tribunal brought reconciliation?' the answer is of course, 'No it hasn't.' By itself, it never could have. But if you ask me whether I am going to get to work on unfertile ground and try to bring recognition of the importance of the enormous amount of work done by this court, especially if you compare it to other conflict countries and the attention they received in the 90s, the answer is, 'Yes'."
"What I want to do is to break down the barriers, on the individual basis that a raped Muslim woman has a lot in common with a raped Serbian woman. If people can one day recognise the commonalities between the people who were reaped, beaten, tortured and had their loved ones killed, something of what has happened here at this tribunal will have contributed to that recognition".
Towards the close of our session in the holding cells it seemed churlish for there not to be a little banter with Karadzic. Talk turned to what a "fantasy" Yugoslav football team would have looked like at the next World Cup, had the country not torn itself apart: Vidic of Serbia in defence, Modric of Croatia and Dzeko of Bosnia in attack. "We'd win it," Karadzic says, a keen football fan who was once a psychiatric consultant to the FK Sarajevo football team which now plays in what he calls "Muslim Sarajevo".
Karadzic's final aside in the holding cells is directed towards his prosecutor, Ann Sutherland: "Ah, you see how hard Miss Sutherland is trying to convict me. It will make my freedom even sweeter!"
The War is Dead, Long Live the War by Ed Vulliamy will be published by The Bodley Head in the spring
|
Q:
Computing $\int \sqrt{1+4x^2} \, dx$
It was said that we did not learn how to take this integral in class yet, and that we should just use a graphing utility to find the integral, so being me i took that as a challenge and tried to take it using methods i knew.
$$
\int \sqrt{1+4x^2} dx
$$
$$
\sqrt{1+4x^2} = \sqrt{(2x+1)(2x-1)+2}
$$
$u = 2x-1, du = \frac{1}{2} dx$
$$
\int \sqrt{u(u+2) + 2} du
$$
$$
\int \sqrt{(u+1)^2 + 1} du
$$
Nothing there
$$
\int\sqrt{1+4x^2}dx = x\sqrt{1+4x^2} - \int \frac{4x^2}{\sqrt{1+4x^2}} dx
$$
Tried for a while to put the other integral into a workable form and got nowhere.
So what method is used to take this integral?
A:
Substitute $x = \frac 12 \sinh \phi$ to get
$$\int \sqrt{1+4x^2}\mathrm dx = \int \cosh^2 \phi\ \mathrm d\phi = \int \left(\frac 12 \cosh 2\phi + \frac 12\right)\mathrm d\phi = \frac 18\sinh 2\phi + \frac 12\phi + C = \boxed{\displaystyle\frac x2\sqrt{1+4x^2} + \operatorname{arcsinh}2x + C}$$
Note the similarity between this integral and
$$\int \sqrt{1-4x^2} = \frac x2\sqrt{1-4x^2} + \arcsin 2x + C$$
If you didn't remember the identity $\cosh^2 x = \frac 12\cosh 2x + \frac 12$ you could have used its definition:
$$\cosh^2 x = \frac {\left(e^x + e^{-x}\right)^2} 4$$
It's an easy integral then, but the final substitution is indeed ugly and does not work out as nicely as above.
|
<?xml version="1.0" encoding="UTF-8"?>
3.142
|
# Generated by superflore -- DO NOT EDIT
#
# Copyright Open Source Robotics Foundation
inherit ros_distro_melodic
inherit ros_superflore_generated
DESCRIPTION = "A ROS node for using libsensors to provide diagnostics information about the sensors on a computer system."
AUTHOR = "ROS Orphaned Package Maintainers <[email protected]>"
ROS_AUTHOR = "Mitchell Wills <[email protected]>"
HOMEPAGE = "http://ros.org/wiki/libsensors_monitor"
SECTION = "devel"
LICENSE = "BSD"
LIC_FILES_CHKSUM = "file://package.xml;beginline=8;endline=8;md5=d566ef916e9dedc494f5f793a6690ba5"
ROS_CN = "linux_peripheral_interfaces"
ROS_BPN = "libsensors_monitor"
ROS_BUILD_DEPENDS = " \
${ROS_UNRESOLVED_PLATFORM_PKG_libsensors4-dev} \
diagnostic-updater \
roscpp \
"
ROS_BUILDTOOL_DEPENDS = " \
catkin-native \
"
ROS_EXPORT_DEPENDS = " \
${ROS_UNRESOLVED_PLATFORM_PKG_libsensors4-dev} \
diagnostic-updater \
roscpp \
"
ROS_BUILDTOOL_EXPORT_DEPENDS = ""
ROS_EXEC_DEPENDS = " \
${ROS_UNRESOLVED_PLATFORM_PKG_libsensors4-dev} \
diagnostic-updater \
roscpp \
"
# Currently informational only -- see http://www.ros.org/reps/rep-0149.html#dependency-tags.
ROS_TEST_DEPENDS = ""
DEPENDS = "${ROS_BUILD_DEPENDS} ${ROS_BUILDTOOL_DEPENDS}"
# Bitbake doesn't support the "export" concept, so build them as if we needed them to build this package (even though we actually
# don't) so that they're guaranteed to have been staged should this package appear in another's DEPENDS.
DEPENDS += "${ROS_EXPORT_DEPENDS} ${ROS_BUILDTOOL_EXPORT_DEPENDS}"
RDEPENDS_${PN} += "${ROS_EXEC_DEPENDS}"
# matches with: https://github.com/ros-gbp/linux_peripheral_interfaces-release/archive/release/melodic/libsensors_monitor/0.2.1-1.tar.gz
ROS_BRANCH ?= "branch=release/melodic/libsensors_monitor"
SRC_URI = "git://github.com/ros-gbp/linux_peripheral_interfaces-release;${ROS_BRANCH};protocol=https"
SRCREV = "4f662a6e5e4af9e94f648a5715fef213c5283834"
S = "${WORKDIR}/git"
ROS_BUILD_TYPE = "catkin"
inherit ros_${ROS_BUILD_TYPE}
|
.. sqlalchemy:
Using ``ofxtools`` with SQL
===========================
As of version 0.7, ``ofxtools`` no longer includes the ``ofxalchemy``
subpackage. The nature of its fundamental architectural flaw is well expressed
by this quote from a `moderately reputable source`_:
SQLAlchemy supports class inheritance mapped to databases but it's not
really something that scales well to deep hierarchies. You can actually
stretch this a lot by emphasizing single-table inheritance so that you
aren't hobbled with dozens of joins, but this seems like it is still a very
deep hierarchy even for that approach.
What you need to do here is forget about your whole class hierarchy, and
first design the database schema. You want to persist this data in a
relational database. How? What do the tables look like? For any
non-trivial application, this is where you need to design things from.
OFX is a poor fit for a relational data model, as is obvious to anyone
who's tried to work with its handling of online bill payees or securities
reorganizations. You don't really want to map that mess directly onto your
database tables... the heart of any ORM-based application. A better approach
is to decouple your SQL data model from OFX, which will also allow you better
to handle other financial data formats.
It's recommended to define your own ORM models based on your needs. Import
OFX into Python using the main ``ofxtools.Parser.OFXTree`` parser, extract
the relevant data, and feed it to your model classes. Something like this:
.. code:: python
from sqlalchemy.ext.declarative import declarative_base
from sqlalchemy import (
Column, Integer, String, Text, DateTime, Numeric, ForeignKey, Enum,
)
from sqlalchemy.orm import (relationship, sessionmaker, )
from sqlalchemy import create_engine
from ofxtools.models.i18n import CURRENCY_CODES
from ofxtools.Client import (OFXClient, InvStmtRq, )
from ofxtools.Parser import OFXTree
from ofxtools.models.investment import (BUYSTOCK, SELLSTOCK)
# Data model
Base = declarative_base()
class Account(Base):
id = Column(Integer, primary_key=True)
brokerid = Column(String, nullable=False, unique=True)
number = Column(String, nullable=False)
name = Column(String)
class Security(Base):
id = Column(Integer, primary_key=True)
name = Column(String)
ticker = Column(String)
uniqueidtype = Column(String, nullable=False)
uniqueid = Column(String, nullable=False)
class Transaction(Base):
id = Column(Integer, primary_key=True)
uniqueid = Column(String, nullable=False, unique=True)
datetime = Column(DateTime, nullable=False)
dtsettle = Column(DateTime)
type = Column(Enum('returnofcapital', 'split', 'spinoff', 'transfer',
'trade', 'exercise', name='transaction_type'),
nullable=False)
memo = Column(Text)
currency = Column(Enum(*CURRENCY_CODES, name='transaction_currency'))
cash = Column(Numeric)
account_id = Column(Integer,
ForeignKey('account.id', onupdate='CASCADE'),
nullable=False)
account = relationship('Account', foreign_keys=[account_id],
backref='transactions')
security_id = Column(Integer,
ForeignKey('security.id', onupdate='CASCADE'),
nullable=False)
security = relationship('Security', foreign_keys=[security_id],
backref='transactions')
units = Column(Numeric)
# Import
client = OFXClient('https://ofxs.ameritrade.com/cgi-bin/apps/OFX',
org='Ameritrade Technology Group', fid='AIS',
brokerid='ameritrade.com')
stmtrq = InvStmtRq(acctid='999999999')
response = client.request_statements(user='elmerfudd',
password='T0PS3CR3T',
invstmtrqs=[stmtrq])
parser = OFXTree()
parser.parse(response)
ofx = parser.convert()
# Extract
def make_security(secinfo):
return Security(
name=secinfo.secname, ticker=secinfo.ticker,
uniqueidtype=secinfo.uniqueidtype, uniqueid=secinfo.uniqueid)
securities = {(sec.uniqueidtype, sec.uniqueid): make_security(sec)
for sec in ofx.securities}
stmt = ofx.statements[0]
account = Account(brokerid=stmt.brokerid, number=stmt.acctid)
def make_trade(invtran):
security = securities[(invtran.uniqueidtype, invtran.uniqueid)]
return Transaction(
uniqueid=invtran.fitid, datetime=invtran.dttrade,
dtsettle=invtran.dtsettle, type='trade', memo=invtran.memo,
currency=invtran.currency, cash=invtran.total, account=account,
security=security, units=invtran.units)
trades = [make_trade(tx) for tx in stmt.transactions
if isinstance(tx, (BUYSTOCK, SELLSTOCK))] # dispatch by model class
# Persist
engine = create_engine('')
Session = sessionmaker(bind=engine)
session = Session()
session.add(account)
session.add_all(securities.values())
session.add_all(trades)
session.commit()
.. _moderately reputable source: https://groups.google.com/d/msg/sqlalchemy/a7xeKebSgTE/6m-qdR4BBgAJ
|
The most senior group of editors on the online encyclopaedia has been criticised for censuring both transphobic volunteers and those making accusations of transphobia
A long-running argument over whether the Wikileaks source should be called Bradley or Chelsea Manning in Wikipedia has caused a split among some of its most senior editors.
The arbitration committee – in effect the site’s supreme court – has banned a number of editors from working on articles related to transgender topics or individuals. But while some of those editors were banned for making transphobic comments about Manning, others were given the same punishment for pointing out the bigotry in the first place. As a result, the site been criticised by Trans Media Watch for implying that accusations of transphobia are as bad as actual incidents of transphobia. The online encyclopedia ultimately chose to use the name Chelsea.
The committee’s statements were sparked by a heated argument between editors on the site over whether the article for Chelsea Manning, the Wikileaks source, should exist under her preferred name or under “Bradley Manning”, the name she was using before she came out as transgender in August 2013.
The arbitration committee, a group of senior editors elected by and from Wikipedia’s pool of volunteers which acts as the community’s court of last resort, was called in to make the final decision on which name should be at the top of Manning’s page. It also ruled on the behaviour of several editors who had taken part in the debate.
Two were indefinitely banned from editing “all pages relating to any transgender topic or individual” over discriminatory speech. One, Hitmonchan, had written that “only when his testicles are ripped out of his scrotum … will I call Manning a 'she'”, and the second, IFreedom1212, wrote, among other comments, that “he is clearly mentally unstable and his … desire to be called Chelsea should not be regarded with any merit".
But other editors were also banned from editing trans-related articles after making accusations of transphobia. One of the banned editors, Josh Gorand, argued that Wikipedia’s requirement for consensus isn’t the only one on the site, and that the rules governing biographies of living persons, one of which is to use their preferred name, should also be taken into account. “Especially not a ‘consensus’ of virulently transphobic people who completely ignore Wikipedia policy. We don't move articles because some people hate transgendered people – it's that simple.”
That statement was one of four cited by the committee to demonstrate that Gorand was exhibiting a “battleground approach to the discussion” and to justify banning Gorand indefinitely from editing articles about any transgender topic or individual.
“We feel that Wikipedia's banning of certain editors for calling people transphobic reflects a wider cultural problem whereby identifying someone is prejudiced is seen as worse than being prejudiced,” said Trans Media Watch in response to the bans. “If the arbitration committee thinks that 'transphobe' is a slur, it might want to reflect on why that is.”
“We would like to see Wikipedia demonstrate more self-awareness in its approach to social issues and more consistency in its treatment of cases like this. There are hundreds of pages on Wikipedia about notable people known by names other than their first names, yet we don't see this kind of fuss made in relation to those about, say, George Osborne or Jodie Foster, or even other trans people like Chaz Bono, who was also well known to the public under a different name.”
Following Manning’s announcement, a heated argument broke out on the talk page of her article, where editors discuss potential changes. Wikipedia’s administrators, who are all elected from the general pool of editors on the site, decided that there wasn’t enough consensus for the page to be moved, and locked it under the name “Bradley Manning” pending a decision from the arbitration committee.
But the editor who initially moved the page to Chelsea Manning, Morwen, argues that Wikipedia needs editors to make quick unilateral changes if it is to effectively cover living people. “The ruling has weakened our 'biographies of living people' policy,” she says. “It will make editors more reluctant to take definitive action to remove libel, for example. This can't be a good thing. Personally, I don't think I'm going to be editing about trans stuff in the future.”
Author and Wikipedia editor Philip Sandifer, who was also involved in the argument, criticised the site’s rules for being “a techno-libertarian fantasy”. “The arbitration committee … looked at both sides of this debate and made the unequivocal decision that, in a debate between people trying to think seriously about the ethical considerations involved in being one of the largest websites in the world and a bunch of techno-libertarians playing WikiRules, the real problem was all the uppity trans activists,” Sandifer argued in an angry blog post.
Wikipedia has long been criticised for having an overwhelmingly homogeneous group of editors. In 2011, co-founder Jimmy Wales described the typical Wikipedia editor as a 26-year-old geeky male with a PhD; the site’s own research found that 90% of editors are male. A survey from 2011 found that fewer than 1% of editors self-identified as trans. The survey did not, however, offer editors the abilty to describe themselves as “trans” and “male” or “female” at the same time, which may have skewed the results.
|
Book Hotel Khao Yai Cottage
Ideally located in the prime touristic area of Khao Yai National Park, Khao Yai Cottage promises a relaxing and wonderful visit. Both business travelers and tourists can enjoy the hotel's facilities and services. Service-minded staff will welcome and guide you at the Khao Yai Cottage. Some of the well-appointed guestrooms feature television LCD/plasma screen, internet access – wireless, internet access – wireless (complimentary), non smoking rooms, air conditioning. Enjoy the hotel's recreational facilities, including garden, before retiring to your room for a well-deserved rest. Convenience and comfort makes Khao Yai Cottage the perfect choice for your stay in Khao Yai.
|
Also, I used to make tons of mini sweet breads with fruit and nuts. Freezes well and makes really neat Xmas gifts.
Quoting: Anonymous Coward 25672410
i'm kind of experimenting, so I'll see if it turns out ok before I give you a no-good recipe, but sure, if its ok, I'll share.I'm planning on trying it in the next few days.(looking online for help as well), but also going to try flavoring the sugar water with cloves, nutmeg, etc.
Flavoring sugars (and oils) is awesome iF you have enough of use for that it's,. E.g. Basil and garlic in olive oil is great if you drizzle it on pizzas and salads often enough. Like pApa johns garlic butter USED to be good.Vanilla sugar is fine, adds a bit extra kick, but you can buy vanilla sugar (Oerkter brand - sp?) but I find that it just takes up too much space in the cabinet for something that can just be preplanned for the need.
I do tons of canning, my speciality is meats and soups because of inflated costs, the need for a filling meal, AND I plan to share with others in need.
It helps when you are hunkie (eastern European whose parents were in Stalinist Russia and nazi Germany and learned how to survive) and a son who is a gourmet. Speaking of, my son and I have the next project of smoking meats. Can't wait.
Whatever you do with the juice and juice and pulp but the rindis good too.Lots of recipes call for orange/lemon zest.
You can peel the rind, take off as much of the white pith (that is where the bitterness is) and dry the rind in a dehydrator or the oven as used when a recipe calls for it. When dried like this it can be crumbled or pulverized for the recipe.
Another is to....boil the full rind, spill out the water as it is bitter, boil the rind again (keep doing this until it is not bitter) spilling out the water. When it is citrus, but not bitter, boil the rind with Sugar water on low heat so sugar absorbs into the rind. strain the rind.....use the sugar water for tea or citrus water....and let the rind dry. You can always shake the rind in a Baggie with sugar.
Whatever you do with the juice and juice and pulp but the rindis good too.Lots of recipes call for orange/lemon zest.
You can peel the rind, take off as much of the white pith (that is where the bitterness is) and dry the rind in a dehydrator or the oven as used when a recipe calls for it. When dried like this it can be crumbled or pulverized for the recipe.
Another is to....boil the full rind, spill out the water as it is bitter, boil the rind again (keep doing this until it is not bitter) spilling out the water. When it is citrus, but not bitter, boil the rind with Sugar water on low heat so sugar absorbs into the rind. strain the rind.....use the sugar water for tea or citrus water....and let the rind dry. You can always shake the rind in a Baggie with sugar.
I could coat them in melted chocolate, it sounds good - I had the idea to try to use them in a cake or pudding.
Quoting: Anonymous Coward 27439738
I would just use them on top as decorations, not inside.when you do the candying the right way, it is so hard it will maybe break someones tooth when he bites in there unexpectedly.but as decorations it is really nice !
melted chocolate is the easiest way, what i like best is fresh (not from the can!) pineapple with dark chocolate (70% cacao!) and some chili flakes on it.
grapes are easy to coat in chocolate (look at the little skulls here on my halloween cake)
I would just use them on top as decorations, not inside.when you do the candying the right way, it is so hard it will maybe break someones tooth when he bites in there unexpectedly.but as decorations it is really nice !
melted chocolate is the easiest way, what i like best is fresh (not from the can!) pineapple with dark chocolate (70% cacao!) and some chili flakes on it.
grapes are easy to coat in chocolate (look at the little skulls here on my halloween cake)
|
<?php
/**
* Copyright © Magento, Inc. All rights reserved.
* See COPYING.txt for license details.
*/
namespace Magento\Tax\Model\Layout;
use Magento\Customer\Model\Session as CustomerSession;
use Magento\Framework\View\LayoutInterface;
use Magento\PageCache\Model\DepersonalizeChecker;
/**
* Depersonalize customer data.
*
* @SuppressWarnings(PHPMD.CookieAndSessionMisuse)
*/
class DepersonalizePlugin
{
/**
* @var DepersonalizeChecker
*/
private $depersonalizeChecker;
/**
* @var CustomerSession
*/
private $customerSession;
/**
* @var array
*/
private $defaultTaxShippingAddress;
/**
* @var array
*/
private $defaultTaxBillingAddress;
/**
* @var int
*/
private $customerTaxClassId;
/**
* @param DepersonalizeChecker $depersonalizeChecker
* @param CustomerSession $customerSession
*/
public function __construct(
DepersonalizeChecker $depersonalizeChecker,
CustomerSession $customerSession
) {
$this->depersonalizeChecker = $depersonalizeChecker;
$this->customerSession = $customerSession;
}
/**
* Resolve sensitive customer data if the depersonalization is needed.
*
* @param LayoutInterface $subject
* @return void
*/
public function beforeGenerateXml(LayoutInterface $subject)
{
if ($this->depersonalizeChecker->checkIfDepersonalize($subject)) {
$this->defaultTaxBillingAddress = $this->customerSession->getDefaultTaxBillingAddress();
$this->defaultTaxShippingAddress = $this->customerSession->getDefaultTaxShippingAddress();
$this->customerTaxClassId = $this->customerSession->getCustomerTaxClassId();
}
}
/**
* Change sensitive customer data if the depersonalization is needed.
*
* @param LayoutInterface $subject
* @return void
*/
public function afterGenerateElements(LayoutInterface $subject)
{
if ($this->depersonalizeChecker->checkIfDepersonalize($subject)) {
$this->customerSession->setDefaultTaxBillingAddress($this->defaultTaxBillingAddress);
$this->customerSession->setDefaultTaxShippingAddress($this->defaultTaxShippingAddress);
$this->customerSession->setCustomerTaxClassId($this->customerTaxClassId);
}
}
}
|
Ironing Tables in Workroom
Ironing Tables in Workroom
As we are in our off season and getting ready for the next round of classes in April, we thought we’d share something while we are deconstructed and re-setting things.
The place is a mess, so just look at the tables!
People love our ironing tables in the back of both workrooms. They are large 4 x 8 foot tables with shaped extensions that work well for any sewing project or pressing detail you could think of. We get asked a lot about how they are made, so we thought we’d put this together.
Finished ironing table in use – 121″ drapes.
We started off initially with regular cutting tables from JoAnn Fabrics covered with one of the gridded teflon covers you can buy in the notions section. This worked well enough for a time, but with all the use they get, the teflon became a little worn and the tables got wobbly, so we decided to build something out and up our game a little.
We started off with two 4 x 8 foot pieces of 3/4″ builder’s grade plywood. We knew that we wanted one of the tables to be smaller than the other, so we started with that. We drew on the curves for the edge and then cut it off with a jigsaw. Once we had all of the curves right, we slightly chamfered the upper edge of the lip so that there wouldn’t be a hard edge.
We then took the section we had just cut off and joined it to the end of the remaining piece so that it projected out. We knew that we wanted this second table to have a sleeve board extension and more intricate curves, so after we picked the two sections together we played around with exactly how severe to make the curves. We then cut it out with a jigsaw and chamfered the edges in the same way.
With 1×4 pine lumber we built the framing*. It is simple – a rectangular frame with cross bracing to keep the top from having too much bounce. Once the tops were cut and the frame was screwed together and attached to the underside of the tops, we were ready to install the legs.
These legs came from the base of an old formica launderette’s table. We wanted something industrial and commercial strength without the bulk of a set of industrial cutting-table legs. They are attached at the corners of the frame with bolts through the pine from the inside. We bought locking industrial casters for the feet so that it can be rolled around and the workspace can be reconfigured easily.
Inner leg attachment detail.
Under construction detail.
Extension support detail under ironing table.
Once the table frame was built and the legs were attached, the fun began.
This is where this post will get useful for most people.
We left the plywood raw with no finish so the wood can flex and the finish layer doesn’t fuse to the upper layers or migrate when people are ironing. We thought about putting a sealer or primer on it, but the image of silk dresses ruined by heated finish working its way up through the fibers was too scary. If the wooden base warps or flexes from the heat and moisture, we’ll deal with it then. The tables have been holding steady for a few seasons now, so we’re still good so far.
The under layers are heavy-weight wool blankets we picked up from the thrift store. The nice thing is that they’ve been abraded, shrunken, and used already, so you don’t have to spend money to both buy new yardage and then do it yourself.
These are similar to old army blankets and provide a dense yet flexible base. They’re much better than foam or cotton batting, as they don’t compact and degrade. They stay smooth and stable. Since we’ve built these we’ve replace the covers multiple times, but have never had to pull the tacks and replace the padding. Approach this like upholstery and you will have a long-lived table.
Wool blankets shrunk down and tacked to underside after stretching.
Before we tacked them down to the underside, we washed and dried them, making sure they were still hot and ever so slightly damp as we stretched them over the top. Working in opposite directions with an upholstery stretcher, we were able to balance out the tautness so that the surface was perfectly smooth.
On the table with the sleeveboard extension, we needed to join two blankets together. We did this by stretching the first one and getting it in place and then stretching the other one, trimming it and stitching them together in a butt seam with a ladder stitch. If you try to use a lapped seam or a regular seam, you are going to end up with a ridge. You want this flat.
Ladder stitch joining wool padding layers.
The padding is stretched and pieced, then we use white denim that has been washed in hot water and laid on damp and hot from the dryer. When we attach it, we use the wrong side of the fabric up because it is smoother and flatter; you don’t have the texture of the twill interfering with delicate fabrics and abrading or embossing your work. This has worked really well.
The shaped ends can be hard to stretch and tack the denim down to, so we use an old upholster’s trick and create “handles” that are sewn down by machine just outside of what will be the edge of the table’s curve. These help pull and ease the fabric so that the edge is smooth for that shoulder seam you are trying to get just right or the wool you are trying to wrestle and beat into a cloche.
Tabs or flanges machine-sewn to help reinforce and pull fabric tight over table top.
Detail of upholsteryFinished underside construction detail of long table.Construction detail of severe curved edge on long table.
We use cotton denim that is the cheapest we can find because we replace our covers once or twice a year, but that’s because they get so much abuse. If you make one of these yourself, it should last longer than that unless you are a sewing maniac.
And that’s about it. If you are in Chicago and want some help with making one, let us know. Tchad is happy to show you in more details.
Finished end of long table.
Finished ironing table in use – 121″drapes.
Finished ironing tables.
Finished ironing tables.
Finished shape, end of shorter table.
*There is only one thing we would change about this project:
Even though it is heavier and more expensive, we would have gone for oak (oak species doesn’t matter) for strength and stability. The corners of the frames have to be adjusted once or twice a year to account for the compression of the pine.
|
Coronary artery angioplasty for treatment of peri-operative myocardial ischaemia.
Increasing numbers of elderly patients with severe co-existing medical diseases undergo major surgery. With these patients there is also an accompanying risk of age-related cardiovascular complications such as life-threatening myocardial ischaemia. We present a patient who suffered a myocardial infarction after a hemicolectomy and suffered a cardiac arrest in the recovery room. The therapeutic options available (e.g. coronary artery bypass grafting, acute percutaneous coronary angioplasty and peri-operative thrombolysis) are discussed and the successful management of the case by coronary angioplasty and stent implantation is described.
|
Currently, the deployment of HSDPA technologies in Time-Division Synchronization Code Division Multiple Access (TD-SCDMA) and Wideband Code Division Multiple Access (WCDMA) systems has provided a higher data rate, a shorter service response time and improved service reliability.
A transmission channel introduced in the TD-SCDMA and WCDMA HSDPAs is a High Speed Downlink Shared Channel (HS-DSCH), which is used as a bearer of higher layer data from a User Equipment (UE) and corresponds to a physical channel of High Speed Physical Downlink Shared Channel (HS-PDSCH).
The Adaptive Modulation and Coding (AMC) technology deployed in the HSDPA is mainly applied to the HS-DSCH, so that a UE in an advantageous position may be provided with a higher data rate with the combination of the AMC and the Hybrid Automatic Repeat reQuest (HARQ), thereby improving an average throughput of a cell.
Furthermore, with the AMC modulation scheme without changing the transmission power, the transmission power of a Base Station is sufficiently utilized. When a channel for a UE is of a relatively high quality, higher order modulation and a higher coding rate are used at a network side and the UE is assigned with a higher data rate; and when the channel for the UE is degraded, lower order modulation and a lower coding rate are used at the network side and the UE is assigned with a lower data rate.
However, no power control is performed in the HS-DSCH of the prior art. When the transmission power of the Base Station is excessively high and exceeds a dynamic range of a receiver in the UE, the receiver in the UE may be saturated, so that the receiving performance is degraded. Furthermore, when the channel for the UE has a high quality and the transmission in the HS-DSCH is at the predetermined power, the Signal-to-Noise Ratio (SNR) may be higher than that required for the highest transmission rate of the UE, thus, system interference is increased, throughput of the cell is decreased and the power is wasted.
|
What does ahimsa mean
When we speak about yoga we also speak about 10 principles: Yama and Niyama, the ten rules of behaviour and lifestyle of the yogi, which do not actually prescribe “things” to do or not to do, but rather suggest contexts and situations, to apply in our lives.
Patanjali mentions 5 (Yama) and 5 (niyama), among which ahimsa, non-violence,which is the most important: the concept of himsa (the word means “violence” in Sanskrit and the “a” in front is the deprivation) brings major disturbances to the mind, and since the purpose of yoga is the control of the mind, everything that can disturb it must be limited or eliminated altogether.
WHAT DOES AHIMSA MEAN AND HOW IS IT APPLIED TO DAILY LIFE
Ahimsa therefore means non-violence
Non-violence towards things, people, animals in every sense of the word; this is ahimsa. It means not doing harm to anyone or anything.
Our actions, words and thoughts must not contain aggressiveness or violence and even being glad of the trouble of others is in some way a form of violence.
Ahimsa means non-violence even in thought: it is therefore necessary to amend not only the violent actions but also the violent thoughts and/or that may in some way generate violence.
If in today’s society it is practically impossible to always act without violence, following ahimsa means to begin a path, and if we do not manage to avoid doing harm at all we can at least commit ourselves to cause it the least possible.
HOW IS NON-VIOLENCE APPLIED TO YOGA?
All 10 principles arise in the context of yoga and yogini i.e. one who takes a path, but in order to understand in depth non-violence we must start from understanding what it means to do yoga and the postures or asanas.
When we speak of asanas we talk about: stability and comfort; a pose should be maintained in a stable manner (i.e. still, without tremors and for long time) and comfortable. Where “comfortable” means without effort, hence we must identify the parts of the body that actually have to work to maintain the position and try to relax all the others. Thus energy will be saved and the asanas may be maintained in a comfortable way.
The no effort in this case is non-violence; listening to the own body, without sudden movements, without exaggeration, without in any way causing violence to our body.
A non-violent attitude is also not having negative thoughts towards ourselves of judgment as for example:”I’ll never do this” “I am too stiff” “I can’t bend etc “
In addition each student or teacher should apply the non-violence attitude everyday of their life both in the real and virtual world.
If you want to take a look at this yogic discipline, its philosophy and asana, you can begin with the ebook YOGA FOR EVERYONE.
If you want to learn more about yoga, on the discipline and the basic asanas, than go to the simple guide
|
The ADENORA blouse is a black jersey with shirt-front in plissed white voile. This style features 3/4 sleeve, voile collar, and repeat of the motif on the cuff. This style comes in the signature colors of ANNE FONTAINE, Black & White.
|
bark collar english bulldog Fundamentals Explained
bark collar english bulldog Fundamentals Explained
Radio Doggy fence specialist due to the fact 2009, Western Pet Merchandise are actually guarding dogs and avoiding livestock trauma while using radio dog collars.
How it works: At the 1st bark, Pet Pawsabilities™ PET680V Anti-bark Collar applies a short warning tone. If a 2nd bark takes place in just 30 seconds, a more powerful tone is sounded. Through the 3rd bark, a far more powerful tone is sounded along with a small, delicate vibration. This pattern is repeated by seven correction stages. The main two levels are only with a progressive warning tone.
Safe and sound AND Successful Our quit bark training process is completely automated its controlled by a microprocessor distinguishing your Pet dog’s bark from other noises and quickly stops barking in a single minute.
Sally incorporates a present-day practice which teaches practically two hundred youthful Doggy owners to prepare their dogs in obedience and
I borrowed a shock collar when my woman pyr was with regards to the very same age. She lived With all the goats and generally was wonderful, but when she was bored she would chase the goats, and occasionally she would chase the chickens and Engage in slightly 'far too much' (two above played, useless chickens). She acquired 2 or three challenging shocks more than another 7 days in the middle of the chase. It's possible 1 or 2 a couple of months later on. These dogs are smart.
...... Alright, ok, an excessive amount info. Be grateful your pup is alerting you of needing to go out. In the event the pup is yowling soon after getting now absent exterior, you should take into consideration nighttime crating and ear imp source plugs on your own til this increases ...... and it will
Even though the English Bulldog's look can be relatively intimidating, it's among the gentlest of dogs. Just exactly the same it'll see off any intruder, and couple of would danger a close come across which has a dog courageous more than enough to bait a bull. It can be referred to as an incredibly affectionate and reliable animal, gentle with kids, but known for its braveness and its great guarding capabilities. Bullheaded and established, this breed can be very persistent. They don't hand over effortlessly. Bulldogs are very much a people's Doggy, trying to find out human consideration and loving each and every bit it will get!! Many human focus is required with the breed's contentment. Some English Bulldogs is usually a bit dominating and want an proprietor who is aware of how to Display screen sturdy leadership and understands alpha canine actions. A Bulldog who understands its spot in the human pack is sweet to, and responsible with all people.
After he gets from the behavior of the 1 bark warn, you'll be able to sit inside of and shout a "great boy" out to him in the window.
I agree you are able to fence off a small location to your LGD to consume by himself. We did that for our GP for awhile... We now have goats that like Doggy food items He has become Alright taking in beside the goats.. He now just pushes them absent every time they Opt for his food stuff without the need of remaining intense toward them.
How to enhance your Great Dane's lifespan and preserve him from receiving extremely significant which has a healthy and nutritious diet.
They really like barking, so to some extent It's important to let them get away with it, and check just how much and how frequently by directing the habits.
In case your Pet dog spends his working day acting like he’s king on the roost, then it's possible he sees himself as a real lionhearted variety! In that circumstance, you’d much better get him a mane to go together with that commanding Angle.
|
Marriage Visa
Applications for receiving residence permit for marriage visa in Turkey in line with laws from Turkish consulates in the countries of which the foreigners are national or in the countries where the foreigners live legally will be put into practice in the near future. Foreigners currently make residence permit applicants to the governorships of the cities where they will reside until this stage begins to be applied.
All persons with a valid residence permit may enter or leave our country by being exempted from visa requirements. If a foreigner who is staying in Turkey by virtue of a residence permit still maintains the conditions of residence such foreigner may extend the residence permit thereof from the governorships of the cities where they reside without leaving the country at the end of the residence permit period or may be granted a residence permit a new situation if they meet the conditions for another residence permit.
Family residence permits are granted to the foreign spouse of the sponsor in Turkey, or the minor children of the sponsor or the spouse thereof who need care.
The sponsor must meet the following conditions in order that the spouse thereof can receive a residence permit:
- The sponsor must provide a valid health insurance covering all family members,
- The sponsor must have a monthly income in any case not less than the minimum wage in total corresponding not less than one third of the minimum wage per each family member,
- The sponsor must submit proof of not having been convicted of any crime against family during the five years preceding the application with a criminal record certificate,
- The sponsor must have been residing in Turkey for at least one year on a residence permit,
- The sponsor have been registered with the address based registration system.
If the sponsor has more than one spouse, this permission can be granted only to one of the spouses and all the children.
Family residence permits are granted for a maximum of two years at a time and this period cannot exceed the sponsor's residence permit. Children under 18 years of age residing in Turkey within the purview of family residence permit, are entitled to receive education in primary and secondary education institutions. Children who reside by this permission for at least three years may switch to a short-term residence permit if they desire after they become 18 years old. If a foreigner who has received a residence permit is divorced from the sponsor of thereof, the foreign spouse may obtain a short-term residence permit if such spouse has stayed in Turkey for at least three years. However, these conditions are not sought for foreign spouse who have been determined as victims due to domestic violence by court orders.
Family residence permit is canceled if the person who resides in Turkey does not anymore have the conditions sought have Article 35 of the relevant law or if the person has been abroad for a total of one hundred to be eighty days in the last year and if it is detected by the provincial governorships that the marriage has been made in order to receive residence permit. Citizenship of persons who have become citizen through fake marriage is also canceled.
In addition to family residence permit, there are also other types of residence permits such as short-term residence permits, student residence permits, long-term residence permits, humanitarian residence permits and human trafficking victimization residence permits.
According to article 35 of foreigners and international protection law no. 6458:
The sponsor has to provide the following conditions while requesting a family residence permit:
- The sponsor must have a monthly income in any case not less than the minimum wage in total corresponding not less than one third of the minimum wage per each family member,
- The sponsor must ) live in accommodation conditions appropriate to general health and safety standards corresponding to the number of family members and to have medical insurance covering all family members
- The sponsor must submit proof of not having been convicted of any crime against family during the five years preceding the application with a criminal record certificate,
- The sponsor must have been residing in Turkey for at least one year on a residence permit;
- The sponsor must have been registered with the address based registration system.
The condition that sponsor must be residing in Turkey since at least one year with a residence permit does not apply for those who have a residence permit or work permit for scientific research, who are within the scope of Article 28 of Law No. 5901 or who are married to Turkish citizens.
The following requirements are sought for foreign citizens who will require a family residence permit in order to stay with the sponsor in Turkey:
- The foreign citizen must not marry in order to receive a family residence permit,
- Each of the spouses has reached the age of eighteen,
- Not to be included within the scope of Article 7.
The conditions stated in the first paragraph of this Article may not be requested for refugees and persons residing under secondary protection status in Turkey.
Law No. 6458, Article 7;
Foreigners who shall be refused to enter into Turkey and turned are those:;
- who do not hold a passport, a travel document, a visa or, a residence or a work permit or, such documents or permits has been obtained deceptively or, such documents or permits are false.
- whose passport or travel document expires sixty days prior to the expiry date of the visa, visa exemption or the residence permit.
- without prejudice to paragraph 2 of Article 15 of Law No. 6458, foreigners listed in paragraph one of Article 15 even if they are exempted from a visa
Actions in connection with this Article shall be notified to foreigners who are refused entry. This notification shall also include information on how foreigners would effectively exercise their right of appeal against the decision as well as other legal rights and obligations applicable in the process.
Article 15 of Law 6458;
Visa shall be refused for those foreigners whose/ who;
- passport or travel document is not valid at least sixty days beyond the expiry date of the visa requested,
- are banned from entering Turkey;
- are considered undesirable for reasons of public order or public security;
- are identified to have a disease posing public health threat;
- are suspects of or, are convicted of, a crime(s) that are subject to extradition pursuant to agreements to which the Republic of Turkey is a party to;
- are not covered with a valid medical insurance for the duration of their stay;
- fail to supply proof of the reason for their purpose of entry into, transit from or stay in Turkey;
- do not possess sufficient and sustainable resources [for the duration of their stay,
- would refuse to pay receivables, originating from overstaying the duration of visa or a previous residence permit duration or, that should be enforced and collected pursuant to the Law on the Procedure of Collection of Public Receivables № 6183 of 21/07/1953 or, debts and fines Part Two Foreigners 29 enforced pursuant to the Turkish Penal Code № 5237 of 26/09/2004,
Visas may be granted with the consent of the minister for persons who, although covered by Article 15, are entitled to a visa.
Provisions as to refusal, cancelation or non-renewal of family residence permits are set out in Article 36 of Law on Foreigners and International Protection No. 6458. Under the following cases a family residence permit shall not be granted, shall be cancelled if has been issued, and shall not be renewed when:
- short-term residence permit [application] is refused when the conditions for obtaining a family residence permit no longer apply,
- there is a valid removal decision or an entry ban to Turkey in respect to the foreigner;
- it is determined that the family residence permit is used for purposes other than of those it is issued for;
- the person requesting the family residence permit lived outside of Turkey for longer than one hundred and twenty days in total during the year preceding the application..
Provisions as to family residence permit through marriage of convenience are set out in Article 37 of Law on Foreigners and International Protection No. 6458. According to this;
Where there is reasonable doubt prior to granting or renewing a family residence permit the governorates shall investigate whether the marriage have been entered into solely for the purpose of obtaining a family residence permit. When it is so determined upon investigation family residence permit shall not be granted or, cancelled if has been issued.
Following the issuance of a family residence permit the governorates may carry out inspections in order to establish whether the marriage is of convenience.
Residence permits obtained through a fraudulent marriage and cancelled later, shall not count towards the summing of residence durations stipulated in this Law.
|
a day in the life of Hyderabad
So, you get down from the plane, train or bus and this is your first day in our pearl city. What do you do? Here are ten things that you must do in Twin cities.
1. You would be dying of hunger and need that food for energy.so, there are 5 star hotels and small little ones too. However if you know a friend who lives here ask him to take you to Srinagar Colony. To the babai who serves Ghee idli.The idli melts in your mouth and the chutney takes you to heaven. There is no place to sit here, you stand take you plate ans finish the plate. Licking fingers after that is common around here! All for a mere sum of 10.
2. Now that you stomach is full and you would like to tour the city. Catch an auto, do not take a cab.Hyderabd can be enjoyed in an auto only. Ask him to take you to Charminar, climb up that minar, and see the gate on the right and the Jamal Masjid on the left and the four roads that lead to the old and new city. Relax click photos.
3. now, get down and take a left, you might be awestruck for say a min.the crowd will take you straight to the Laad Bazaar the Market for Bangles. You will find every variety of bangles here. Pick up a few pinks for Rs 10 or the Red’s for Rs 10000.They might ask you to pay Rs.100 for a bangel that costs Rs.10.The trick- Just stick to this. If they say it is Rs 30 as them for Rs 15.That is the bargain trend here in the Bazaar.
4. Ok we done with the Minar and the Bazaar. Now we hungry again! What do we do? We go to have biryani in any place. For example Bawarchi.Vegetarians beware you will se meat, meat and meat around.However, you do get veg biryani.Eat your heart out. Try the biryani with bagara baingan and mirchi ka salan.
5. Desert anyone, where do we go. We go to Famous ice cream to have home made ice creams. Famous ice cream is famous for fresh fruit icecream.They serve home made ice cream and that too for a price of Rs 10 not more than 20 for 2.They are open all round the year and you have to taste this one. Do not miss this ask a frnd to take you there and enjoy the crowd and the ice cream which is a crowd puller….
thnx a lot for the mssg.it is sad that 6 people had to die cause of this.the situation is under control now.however,the whole city is in tension.i was driving back home at 8.30 pm and the city had this errie look.i am sure that we hyderabadi’s can move on and tell the “ones” who caused this tension to buzz off.
I am safe and the city is tryng to be normal.hope to see peace soon.thnx a ton…
Photos
Recent Comments
Hyderabad in Mourning?sk I like city of hyderabad. I would like to share with you a cool website I came across recently in google search...Hrishikesh Barua The positive aspect of this sad occurrence is the restraint that people have shown in the weeks...sarath u r right deepthi i agreed with ur opinins its inhuman no one supports this way 4r reaching thr gosls.
|
So, does that mean there won't be a cool Alice clone army? Or was it just those select clones that were mutated. Hopefully it's the latter.
And while I was reading Isaac's monologue there, I was really confused at first till I read the ego line and outright laughed at the ultimate super douche part. Typical Anise and her ability to mock opponents despite dire circumstances, always so fun to read.
I still don't understand how the hell she's able to go to sleep like that...
Oh well, when she wakes up she is gonna be torn apart by Rain (both physically and verbally), might as well sleep in peace (even if that peace is a bloody and gorey room that probably smells horrible) while she can.
No jokes when I say that I just finished re-reading this story not even an hour ago. This is just crazy. Thank you to you and the universe for bring me this next chapter so soon after. Can't wait for the next update on any of your story's. Ps your work is awesome :)
Kinda wish I had the opportunity to go study abroad, well I've had chances but it's always been so damn expensive.
And damn, when I was first reading this I was hoping you would keep Angie alive, she reminded me so much of Newt in Aliens. Was looking forward to seeing her gush over Rain and Anise's relationship again.
Really liking the friendship Anise and Kmart are developing, Anise needs some extra support that's not Buck or Rain.
Hopefully LJ won't be stupid this time around and hide his bite. He would have to be really dumb seeing as they have a lot of antivirus. Then again, would the super zombies be more infectious than the normal ones? not sure...
|
import sourcemaps from 'rollup-plugin-sourcemaps';
import license from 'rollup-plugin-license';
const path = require('path');
export default {
output: {
format: 'es',
sourcemap: true
},
plugins: [
sourcemaps(),
license({
sourceMap: true,
banner: {
file: path.join(__dirname, 'license-banner.txt'),
encoding: 'utf-8',
}
})
],
onwarn: () => { return }
}
|
Q:
Index two sets of columns in an array
I am trying to slice columns out of an array and assign to a new variable, like so.
array1 = array[:,[0,1,2,3,15,16,17,18,19,20]]
Is there a short cut for something like this?
I tried this, but it threw an error:
array1 = array[:,[0:3,15:20]]
This is probably really simple but I can't find it anywhere.
A:
Use np.r_:
Translates slice objects to concatenation along the first axis.
import numpy as np
arr = np.arange(100).reshape(5, 20)
cols = np.r_[:3, 15:20]
print(arr[:, cols])
[[ 0 1 2 15 16 17 18 19]
[20 21 22 35 36 37 38 39]
[40 41 42 55 56 57 58 59]
[60 61 62 75 76 77 78 79]
[80 81 82 95 96 97 98 99]]
At the end of the day, probably only a little less verbose than what you have now, but could come in handy for more complex cases.
A:
For most simple cases like this, the best and most straightforward way is to use concatenation:
array1 = array[0:3] + array[15:20]
For more complicated cases, you'll need to use a custom slice, such as NumPy's s_, which allows for multiple slices with gaps, separated by commas. You can read about it here.
Also, if your slice follows a pattern (i.e. get 5, skip 10, get 5 etc), you can use itertools.compress, as explained by user ncoghlan in this answer.
|
Share this post
Link to post
Share on other sites
iamtheky 771
iamtheky 771
_ArrayDelete() adds a great deal of execution time to your script and is generally used for those who no little about the Array datatype, or more correlative, those who have no concern for execution time and find it effective and easy to maintain?
Share this post
Link to post
Share on other sites
guinness 1,479
guinness 1,479
_ArrayDelete() adds a great deal of execution time to your script and is generally used for those who no little about the Array datatype, or more correlative, those who have no concern for execution time and find it effective and easy to maintain?
|
key01 = {$var}
key02 = { $var }
key03 = {
$var
}
key04 = {
$var}
## Errors
# ERROR Missing variable identifier
err01 = {$}
# ERROR Double $$
err02 = {$$var}
# ERROR Invalid first char of the identifier
err03 = {$-var}
|
TGFbeta inhibits LPS-induced chemokine mRNA stabilization.
The mechanisms involved in anti-inflammatory action of transforming growth factor beta (TGFbeta) have been examined by evaluating its effect on chemokine gene expression in mouse macrophages. Lipopolysaccharide (LPS)-stimulated expression of the CXC chemokines KC and MIP-2 was selectively reduced by TGFbeta in a time- and protein synthesis-dependent process. While TGFbeta had a modest effect on transcription of the KC and MIP-2 mRNAs as measured by nuclear run-on, it had no effect on LPS-stimulated luciferase expression driven by the KC promoter nor on the activation of nuclear factor kappaB (NFkappaB) DNA-binding activity and transactivation function. Interestingly, KC mRNA levels were markedly reduced by TGFbeta treatment in cells transfected with KC genomic or cDNA constructs driven from either the KC or cytomegalovirus (CMV) promoters, demonstrating the importance of sequences within the mature mRNA and suggesting that suppression may involve a posttranscriptional mechanism. In support of this possibility, LPS stimulation prolonged the half-life of KC mRNA and this stabilization response was blocked in cells treated with TGFbeta. Examination of KC mRNA expressed under control of a tetracycline-responsive promoter demonstrated that TGFbeta prevented stabilization of KC mRNA, in response to LPS but did not alter KC mRNA half-life directly. KC mRNA stabilization by LPS was dependent on activation of p38 mitogen-activated protein kinase (MAPK) activity, and TGFbeta treatment inhibited p38 MAPK activation. These findings support the hypothesis that TGFbeta-mediated suppression of chemokine gene expression involves antagonism of LPS-stimulated KC mRNA stabilization via inhibition of p38 MAPK.
|
Spectrum of disease and outcome of complicated diverticular disease.
Diverticular disease is a common entity. The presentation, investigations performed, and management are variable. Our objectives were to assess the presentation, extent of disease, and treatment of a cohort of patients with colonic diverticulitis. All patients with a diagnosis of diverticulitis over a 9-year period were reviewed. Patients were assessed as to age, sex, presenting symptoms, diagnostic studies, extent of disease, treatment, and outcome. Over a 9-year period (1992 to 2001), 192 patients were admitted with a diagnosis of colonic diverticulitis. The mean age was 61 years (range 28 to 90); 113 of 192 (59%) were female. The mean duration of symptoms prior to presentation was 14 days (range 1 to 270 days). One hundred eighteen of 192 (61%) had a previous documented attack of diverticulitis. Of the investigations performed 128 of 192 (66.7%) had a computed tomography (CT) scan of the abdomen and pelvis, 37 of 192 (20%) underwent a contrast enema, 61 of 192 (32%) underwent colonoscopy and 2 of 192 (1%) underwent a small bowel series. The abnormal findings on the CT scan were as follows: diverticular abscess (16%), diverticulitis (37%), diverticulosis without inflammation (15%), free air (10%) and fistula (1%). The locations of the diverticular abscesses were: pelvic (36%), pericolic sigmoid (36%), and "other," which included interloop (28%). Preoperative abscess drainage occurred in 10 of 192 (5%), which were either percutaneous, 6 of 192 (3%), or transrectal, 4 of 192 (2%). Nine of 192 (6%) presented with a fistula, colovesical fistulae (3%), colocutaneous (1%), enterocolic (1%), or colovaginal (1%). Overall, 73 of 192 (38%) underwent surgery. All patients undergoing surgery had a resection of their colon. The operative findings were localized abscess in 16 of 73 (22%), purulent/feculent peritonitis in 12 of 73 (17%), and phlegmon in 10 of 73 (14%). Sixty-seven of 73 (92%) had a primary resection with anastomosis; 38 of 67 (56%) had a protecting stoma. Five of 73 (7%) patients were found to have an unsuspected carcinoma. Overall, 29 of 192 (15%) developed a complication related to diverticulitis. Morbidity was 15.1%, of which 34% was infection related. Four of 192 patients (2%) died. In our experience, most patients presented with abdominal pain predominantly in the left lower quadrant. The symptoms were present on average of 14 days, most were female (59%), and most patients had a previous attack of diverticulitis. The commonest investigation performed was a CT scan (66.7%); however, other investigations were performed, for example, barium enemas. The practice of resection and primary anastomosis for acute diverticulitis has an acceptable morbidity and mortality. For high-risk anastomoses, a covering loop ileostomy and not a Hartmann's procedure is preferred. Surgery remains safe for the majority of patients and is associated with resolution of symptoms. We believe that because of the high number of patients in our series who had a previous attack of diverticulitis, therapy should be focused on preventing recurrent and virulent attacks by earlier operative intervention.
|
Q:
How can I get the Unicode codepoint represented by an integer in Swift?
So I know how to convert String to utf8 format like this
for character in strings.utf8 {
// for example A will converted to 65
var utf8Value = character
}
I already read the guide but can't find how to convert Unicode code point that represented by integer to String. For example: converting 65 to A. I already tried to use the "\u"+utf8Value but it still failed.
Is there any way to do this?
A:
If you look at the enum definition for Character you can see the following initializer:
init(_ scalar: UnicodeScalar)
If we then look at the struct UnicodeScalar, we see this initializer:
init(_ v: UInt32)
We can put them together, and we get a whole character
Character(UnicodeScalar(65))
and if we want it in a string, it's just another initializer away...
1> String(Character(UnicodeScalar(65)))
$R1: String = "A"
Or (although I can't figure out why this one works) you can do
String(UnicodeScalar(65))
|
Abstract
The long-term treatment outcome of 248 bipolar patients in an out-patient lithium programme was assessed. Over half of the patients (138 or 56%) had no affective episodes in the year observed. Patients were divided into outcome groups according to GAS scores: the outcome for 40% of patients was good, for 41% fair, and for 19% poor. More frequent psychiatric admissions before starting lithium treatment was the best predictor of poor outcome, followed by a negative affective style in the family and lower social class. Current alcohol and drug abuse was associated with poor outcome. Although familial and psychosocial factors were significantly associated with outcome, the findings suggest there may be inherent differences in the pathophysiology of bipolar disorder reflected in an increased frequency of episodes which account for a large variance in lithium treatment outcome.
|
Nyaaa ~ By Litshin Watch
10 Favourites 2 Comments 1K Views
Long time no posting here (i'm not dead lol )
You probably forgot about this oc since it's been so long i didn't draw him
It's Leon (HE IS BACK YEAH! ) *ahem*
IMAGE DETAILS Image size 2491x2607px 3.72 MB Show More
Published : Sep 20, 2017
|
Q:
Python - Scrubadub.clean not working - Cannot properly scrub text PII + HTTP Error 503
I'm sorry and this is probably a basic question but as I am learning scrubadub and trying to get it work myself on Jupyter notebook. It kept showing - HTTP Error 503: Service Unavailable
This is what I input, which is exactly the same as the scrubadub documentation.
text = u"John is a cat"
scrubadub.clean(text, replace_with='placeholder')
u"{{NAME}} is a cat"
And this is the error message I got:
HTTPError Traceback (most recent call last)
<ipython-input-92-5b0754baae94> in <module>()
1 text = u"John is a cat"
----> 2 scrubadub.clean(text, replace_with='placeholder')
3 u"{{NAME}} is a cat"
/anaconda3/lib/python3.7/site-packages/scrubadub/__init__.py in clean(text, cls, **kwargs)
14 cls = cls or Scrubber
15 scrubber = cls()
---> 16 return scrubber.clean(text, **kwargs)
/anaconda3/lib/python3.7/site-packages/scrubadub/scrubbers.py in clean(self, text, **kwargs)
55 clean_chunks = []
56 filth = Filth()
---> 57 for next_filth in self.iter_filth(text):
58 clean_chunks.append(text[filth.end:next_filth.beg])
59 clean_chunks.append(next_filth.replace_with(**kwargs))
I also tried below code here and I get error messages as well, I'm guessing if I missing any arguments in the code...
import scrubadub
class MyFilth(scrubadub.filth.base.Filth):
type = 'mine'
class MyDetector(scrubadub.detectors.base.Detector):
filth_cls = MyFilth
def iter_filth(self, text):
# do something here
pass
scrubber = scrubadub.Scrubber()
scrubber.add_detector(MyDetector)
text = u"My stuff can be found there"
scrubadub.clean(text)
u"{{MINE}} can be found there."
StopIteration Traceback (most recent call last)
/anaconda3/lib/python3.7/site-packages/scrubadub/detectors/base.py in iter_filth(self, text)
21 if self.filth_cls.regex is None:
---> 22 raise StopIteration
23 for match in self.filth_cls.regex.finditer(text):
StopIteration:
The above exception was the direct cause of the following exception:
RuntimeError Traceback (most recent call last)
<ipython-input-94-2cc23d003da7> in <module>()
11
12 text = u"My stuff can be found there"
---> 13 scrubadub.clean(text)
14 u"{{MINE}} can be found there."
/anaconda3/lib/python3.7/site-packages/scrubadub/__init__.py in clean(text, cls, **kwargs)
14 cls = cls or Scrubber
15 scrubber = cls()
---> 16 return scrubber.clean(text, **kwargs)
A:
There is an open issue for the same on github as scrubadub seems to not working very good with python 3.7 which you are currently using.
I was able to reproduce it with 3.7 without a notebook as well. So it is a notebook issue for sure.
As an interim solution, changing your env to 3.6 (or worst case 2.7 highly not recommended) works.
https://github.com/datascopeanalytics/scrubadub/issues/40Stop Iteration issue
|
“The occult war is when the forces of worldwide subversion lead from behind the scenes, adopting means that almost always elude ordinary methods of investigation. The notion of an occult war belongs to a tridimensional vision of history, to a history considered not according to the two dimensional surface of apparent causes, events, and leaders, but otherwise, depending on the third dimension of depth, the subterranean direction, that retrieves the decisive forces and influences which are often not even ascribable to the simple human element, whether individual or collective.”
Oh look its the Holocau$t card, as nations around the world are forbidden to enact the same kind of ethnocentric policies which Israel takes for granted.
Jewish leaders call for ban on Greek nationalism; Greek PM promises law against questioning the “Holocaust”Link
“Antonis Samaras, traitor and current Prime Minister of Greece, promised Jewish leaders that he would introduce a new law to prevent parties which question the “Holocaust” from running for parliament in Greece.”
“WJC President Lauder called upon the Greek parliament to outlaw the Greek nationalist party, Golden Dawn.”
“Chavez invested Venezuela’s oil wealth into social programs including state-run food markets, cash benefits for poor families, free health clinics and education programs. But those gains were meager compared with the spectacular construction projects that oil riches spurred in glittering Middle Eastern cities, including the world’s tallest building in Dubai and plans for branches of the Louvre and Guggenheim museums in Abu Dhabi.”
According to the Merriam-Webster’s English dictionary, the meaning of the word ‘eugenics’ is simply “a science that deals with the improvement (as by control of human mating) of hereditary qualities of a race or breed”. There exists no agenda in eugenics beyond the application of stock-breeding to humans, which means that some form of eugenics is probably compatible with all religions and cultures, indeed cultures have been practicing eugenics for thousands of years (often without a comparable term), and eugenics doesn’t prescribe a means or even in itself a definition of which traits are eugenic. Nonetheless, leaving aside value judgements out of the question as much as is possible, there is a value-neutral measure of what is eugenic – the fitness of the population, in the sense that would be understood by conservation biologists, is not a social construct.
Why, then, do eugenicists get my back up when I read them on the internet? It’s for three reasons that I can think of, which are their lack of understanding of the relevant science, they feel attracted to the famous anti-eugenic straw man of the ‘war against the weak’ and live in such an agenda-driven unreality that they can’t see eugenic programs would, if applied in the present social climate of Cultural Marxism, actually be used against themselves and their offspring.
Lets give online eugenics a reality check to see how well it stands up to scrutiny – the Spartans and the Nazis may not have valued all human lives equally but nonetheless the lives of their own people possessed value until it was demonstrated otherwise. Amazonian tribes practice infanticide to increase the fitness of the group, but it isn’t the general position – forcing a mother to kill her own baby is clearly a punishment inflicted for exceptional, inappropriate reproductive behaviour that threatens the survival of a subsistence society. When you get to pseudo-eugenicists decrying that human lives are assumed to have inherent value at all unless there’sa reason otherwise, which isn’t the belief that all human life has equal value, we’re dealing with the pathological and, if there’s an allele that predisposed them to think like that, with the dysgenic.
Much of the appeal of pseudo-eugenics is at the emotional rather than the rational level. Online eugenicists are famously outspoken in support of what are known as anti-dysgenic or negative eugenic measures, whilst they say next to nothing in support of positive eugenics. This is because poorly reasoned pseudo-eugenics is an outlet for them to vent frustration at society. There isn’t really a serious argument to consider there, just a boring and parrot-like repetition of Freakonomics-like half-truths by people unable to understand the sciences even at the most basic level. An informative irony here is that many of these people who talk about eugenics, which is related to breeding, never seem to have sex or offspring themselves. It must be very frustrating for such beta male basement dwellers, to see all those ‘cads’ out-reproducing dads whilst they’re watching porn on their computers. These people often see dominant, traditional alpha males as though they were omega thugs, one wonders why that might be.
Moving from psychology to philosophy, let us consider the following proposition as an analogy to common pseudo-eugenic thinking about social issues.
“Black people should be allowed to own guns, because black criminals mostly shoot one another, and therefore we should overlook the white victims of black gun criminals as a collateral damage of criminal blacks wiping themselves out. We should encourage blacks to own firearms (or, at the very least, tolerate the ready availability of firearms to black criminals).”
Most people would, hopefully, see the above logic as insane, especially if they are white advocates. Anyone who would argue for such a thing would be turning a blind eye to the damage being inflicted upon their own people, out of their irrational resentment towards outsiders. Yet this is precisely the thinking of people who follow the crazy Freakonomics line of argument even after the author admitted his argument was false. Even worse than gun violence, liberalised abortion particularly hollows out individuals with eugenic traits – either abortion should be very strictly regulated for the proper purposes (as it is in Iran), or access to the procedure should be forbidden at all costs. Effective modern contraception is also abused too often by those we wish to have more children.
As for the argument about single mothers (ie. regardless of race), this is quite clearly moral aggression and misplaced altruistic punishment. Regardless of intent, by downplaying the role of society as well as heredity in the life choices of individuals from a given background. Targeting entire communities for negative eugenics isn’t the same as targeting the more harmful members of those communities such as drug addicts, of course this is anti-white and offensive where the support for grassroots activism would be strongest. People who believe that perfectly healthy white children should be burned as hospital waste because it will save money for society are an undesirable artifact of a society that good people won’t wish to preserve. I don’t want to sound like a feminist here, but I’d choose honest single mothers signing on for state benefits over the genetic load of resentful basement dwellers, any time I might be forced to choose.
If we look at the strange logic of pseudo-eugenics, it commits a confusion along the lines of is and ought – their argument assumes (contra Galton, and history itself) that antinatalist measures will be taken up by those who they see as bad people, whilst those they see as good people will embrace their own way of thinking. I’m sure I don’t need to point out the error in this kind of thinking. Along the same lines they like to insist that, if the good people aren’t breeding, its because of indoctrination by feminism and related social movements which in turn, implicitly suggests that the desirable people would instantly start to behave as the pseudo-eugenicists think they should, if only they could be shown the light of pseudo-eugenics to set them free. There is no thought given to the possibility that societies might be predisposed to nonsense like feminism as a consequence of antinatalist trends. If all human behaviours are natural then tendencies that evolved as a means to control population size in the ancient past have now kicked into self-destructive overdrive because of excess affluence – Japan has a birthrate below replacement, but how many women in Japan have been exposed to feminist perspectives? Japan has however suffered from the same kind of excessive affluence disintegrating the west.
Those who support social approval for methods such as abortion that violate the organic bonds of parenthood, or amount to the pre-emptive executions of those who may not yet turn out criminal, are in outright violation of our culture and such people require their twisted values to be re-educated. Every life of one of our own people, who can at the very least contribute through inclusive fitness, really is ‘sacred’, for want of a better word, not for sentimental reasons but because we have an interest in our own survival. And this means that, when the time comes, those who have treated white offspring as trash will need to be ‘removed’ from the breeding stock.
“Traditionalist conservative Roger Scruton recently penned an excellent article, “Bring Back Stigma,” which vividly chronicles the decline of social stigma and the absurd and insufferable consequences of living in a shameless society. It’s a fine read, but it’s also paleoconservative in the worst possible way. He dabbles in heresy with his lamentation that “the only binding law is the law of the market.” In doing so, he deserves credit for performing the revolutionary act of identifying capitalism as a cardinal cause of our misfortune rather than the solution contemporary “conservatives” and libertarians imagine it to be.
Imagine how infuriating it would be, though, to go to a hospital where the doctors eloquently opine on every symptom of the disease, describing each blister and boil with elegance and flair. Imagine sitting there on the table in the gown for hours and hours as they describe the similarities between your own condition and the condition of former patients, validating your suffering and even providing insightful perspectives and prognoses. Mr. Scruton fully agrees that the current social order is derelict and diseased, but he’ll never diagnose it. He’ll never prescribe a treatment. All he can do and all he will ever do is lament that things are not as they ought to be.
The time has long past for a Burkean retreat to the past. There’s no norm left to conform to. The wise old men and little old ladies of today formulated their politics during the height of the Sexual Revolution. To be conservative is to embrace vintage liberalism. Taboos against identitarianism, hierarchy, and antisemitism are baked into all but the most ancient and marginalized Western traditions. It would be nice if we could merely ape all the symptoms of a healthy and cohesive community, but you can’t cure a disease by willing away or suppressing its effects. Diseases are cured by isolating the root causes and the mechanisms, then resolving those problems.“
“In essence, his argument is that we must take risks and make sacrifices on behalf of a community which is virulently opposed to everything we stand for. His prescription is worse than useless, it’s harmful. It’s enabling a decadent and alienated anti-community. We set ourselves up as their prudish foils, expose ourselves to their contempt, and make their lives easier with our unreciprocated altruism. It’s like helping a whore put her skirt back on after each performance and fancying ourselves champions of modesty and virtue. It’s like trying to teach a cannibal table manners while he’s boiling you in his pot.”
“In many countries in Europe opposition to mass immigration is growing, and several nationalist parties have won spots in democratic assemblies. In many cases these so-called nationalist parties have distinguished themselves as highly critical of Muslim immigration and Islamization, while calling themselves “anti-racists” and saying they accept immigration if the migrants adapt themselves to the European host nations’ cultures. The latest development is the so-called “Counter Jihad” movement, with grassroots organizations like the English Defence League, which brings together thousands of young people in spectacular, aggressive demonstrations against Islamization.
In parallel with this, older nationalist parties are demonized and attacked through infiltration and the spreading of rumors. In many places, competing “nationalist” parties have emerged. In England, the British Freedom Party has grown at the British National Party’s expense. In Belgium, the New Flemish Alliance (NVA) has grown at the expense of the Vlaams Belang.
Common to all the new parties is cultural nationalism, aggressive anti-Islamism, and strong support for Israel’s and America’s most aggressive Zionist forces.
We are not lovers of Muslim immigration and Islamization, but there would be major problems with mass immigration even if not a single Muslim came.
“Daniel Freedman was a professor of anthropology at the University of Chicago. For his doctoral thesis, he did adoption studies with dogs. He had noticed that different dog breeds had different personalities, and thought it would be interesting to see if personality was inborn, or if it was somehow caused by the way in which the mother raised her puppies.”
“He decided to try the same thing with human infants of different breeds. Excuse me, different races. He looked at newborn babies in a hospital in San Francisco where his first child had been born. He compared Cantonese babies with babies of Northern European origin. The division of sexes was the same, the mothers were the same age, they had about the same number of previous children, and they had been administered the same drugs in the same amounts during labor.”
“White babies started to cry more easily, and once they started, they were more difficult to console. Chinese babies adapted to almost any position in which they were placed; for example, when placed face down in their cribs, they tended to keep their faces buried in the sheets rather than immediately turning to one side, as the Caucasian babies did. They briefly pressed the baby’s nose with a cloth, forcing him to breath with his mouth. Most white (and black) babies fight this maneuver by immediately turning away or swiping at the cloth with their hands, and this is reported in Western pediatric textbooks as normal. While the average Chinese baby would simply lay on his back, breathing through the mouth, accepting the cloth without a fight.“
“Later, he looked at Navaho babies: they’re like Chinese, only more so.
Japanese babies are like Chinese, but less so: more irritable, but not as irritable as white kids.”
I don’t know whether I’m banned from AltRight or not because I can’t post there anymore, however someone named ‘ConantheContrarian’ has personally asked me a question so here’s my response in case they want a reply from me. I’ve also replied to someone else named ‘stormrung e’ who raised dome interesting points as a reply to me. Incidentally I have an anonymous mailbox if you have any questions to ask that you think might deserve my time replying, I won’t mind.
ConantheContrarian:“Skadhi, if I read your comments correctly, you are not an American. Whatever the case, who would be your ideal candidate for president of the USA? Just curious.”
Me:
I’m British and I don’t follow American politics all that closely in the first place, besides all that I oppose electoral democracy on principle. However none of the big four American parties – Republican, Democrat, Libertarian, Green – actually appeal to me that much. Economically I’m a leftist because I support socially minded economic policies such as restrictions on banks and corporations, as well as state support for the most vulnerable in society. But on several social issues I’m closer to conservatives, especially as regards the family and reproduction. Out of the four I’m maybe closest to the Greens, but I still doubt I’m that close to them.
My perception of the UK and America is that lassez faire social liberalism has undermined the procreative and humanistic basis of our society whilst lassez faire ‘conservatives’ have undermined its economic basis simultaneously through their own parallel ideologies. Furthermore I see the social conservatism of Republicans/Tories and the social justice of the Democrats/Labour to be obviously insincere judging from their past records of empty promises. You could just say I’m not gullible.
Someone else named ‘stormrung e’ also replied to me about my ‘participating in what has become a line of thought dominated by agenda-driven unreality’. So I had a think about that.
stormrung e:“First, refer to what Roman Bernard has written above.
But let me answer your question: Because by joining in a critique of European colonialism, you are participating in what has become a line of thought dominated by agenda-driven unreality.
For European civilization, the Age of Empire was a golden age.The United States realized this and when they became strong enough and defeated the weakening Spanish, embarked upon influencing Asian countries for their national good. This decision by a majority white U.S. had long-lasting influence on the region, and may be the primary reason why many Asian countries are booming today. (Source: The Hungry World-America’s Cold War Battle Against Hunger in Asia.)
So, if you join in the shallow leftist critique of European colonialism you deny, like leftists, the many good things it brought to the colonized peoples. You also miss the fact that the Bolivarian Revolution, like its Soviet father, is an imperialist project itself.
And you completely miss the fact, which nationalists should intimately understand, that the Bolivarian Revolution and International Socialism funds, supports, and invigorates its brother movements for indigenous rights and anti-white ethnic nationalism in the guise as anti-colonialism. (Source: Frenchness and the African Diaspora and From Toussaint To Tupac-The Black International Since the Age of Revolution.)
This is a plague of vision, as there are even some pro-Soviet, pro-Stalin nationalists who hate Jews to the point they will defend Stalin’s empire even though it enslaved the white countries surrounding Russia. White countries who were more than happy to be rid of the Soviet mess.
But this is endemic in left-wing thinking, which white nationalism seems to be dominated by today. I am wondering if Greg Johnson will be defending the ANC next. He should, because Chavez is a protege of Castro and old Fidel (along with the KGB) threw a lot of support to the ANC and their intellectual and strategic vanguard, the South African Communist Party (SACP). I don’t think any of these left-wing nationalists want to make the argument that the ANC and the South Africa they have created is worthy of our alliance and sympathies, do they?
They may! But if they do, let me end with a quote by Joe Slovo, the head of the SACP, whose name is on a lot of buildings and housing projects in South Africa today.
From a 1986 interview with the BBC:
BBC: But, can I ask what is a legitimate target?
Slovo – I think a legitimate target is the enemy and enemy is basically in uniform, but not all in Uniform. For example in the rural areas, our judgement is that virtually the whole farming community is part of the South African Defence Force.
White – Is it the white farming community?
Slovo – The white farming community… They live with their wives, they live with their children, but I believe in that case it is not acting (against) civilian targets when one acts against those people who are part of the enemy’s military machine in the countryside.”
Me:
Besides the fact my ancestors were subject to European colonialism (against other white Europeans), and our liberation was supported by the Axis and also by Mosley, I don’t agree that the age of the European empires was a Golden Age for the peoples that supposedly benefited. In Victorian Britain, this was the age of child chimney sweeps, the Highland Clearances, and various other kinds of one-sided exploitation that hardly constitute a golden age for whites in my mind.
I don’t think that anyone fair would wish to deny that colonialism helped the colonised in many ways, or that the native people in vast parts of the world (especially Africa) were better off under imperialism than they have been under dictatorship since. Nonetheless, those same societies are now being contaminated by ideas from the west that arrived thanks to the introduction into their lands of a western culture that was becoming debased – the Age of Empires was an age of capitalism and the time of Marx and Engels. Clearly Devi’s observation that ‘their fight is also our fight’ if foreigners share our ideals has never been more true, precisely because of the political effects of globalism upon formerly unconnected societies.
In the white homelands and even in the former ‘white dominions’, ethnic conflicts and disputes with indigenous minorities are naturally very rare and, when they actually do occur, are about ‘whites vs. whites’ rather than of ‘us vs. them’. For example in Sweden, a fuss is made over the rights of Sami reindeer herders as a means to stir up the dog-whistle kind of ethnocentrism, creating a red herring to detract public anger from the more deserving target of race replacement and rape by far more recent arrivals than themselves.
I do however agree with ‘stormrung e’ mind you about the kneejerk anti-Semitic Stalinists and I concur that anyone who supports someone like Slovo is not someone who shares our fight in the way Savitri Devi would have approved of.
Incidentally, if anyone is curious, what Roman Bernard wrote and that ‘stormrung e’ refers to (and that I pretty much approve of) was that we shouldn’t dwell on victimhood and that any non-western ethnies who see our people as racial enemies of kind are not worth supporting.
Mircea Eliade, although he was a brilliant scholar of comparative religion, was quite an odious individual in his private life. People like to present him as some kind of revolutionary right wing thinker, either to claim him as ‘one of ours’ or to denounce him as a fascist, as though any kind of involvement in right wing European circles during the 1930s or 1940s is tantamount to someone personally going round gassing six million Jews or something.
Yes, Eliade did have well known links to the Iron Guard both through his personal connections and political pragmatism but he was never a hardcore rightist or a great political thinker, and much his genuine thought was actually contrary to a lot of what the mainstream Romanian nationalist movements were saying at the time. People nowadays look back at Eliade with rose tinted spectacles to reclaim him as a nice respectable nationalist they can show to people, but because those rose tinted spectacles are unreliable lenses they form the subject of this piece.
In truthfulness, the source of Eliade’s borderline acceptability as a thinker is that he denounced racism and anti-Semitism, and was also a huge fan of Mohandas Gandhi, to whom we shall return later. Outside the political sphere, Eliade collaborated with known Marxist figures only to be accused and mauled by them later on as you might expect – they only sought to use him for entryism, you see. There is a lesson in here somewhere, but its only one we’re already familiar with a million times over. Politically, far from being a great thinker, Eliade was pretty damned naive and clues explaining Eliade’s present semi-respectability relative to well known but demonised figures (such as Devi or Evola) have to be found elsewhere than within his political insights.
Despite preaching Orthodox Christianity and all of its mores to he Kingdom of Romania, Saint Mircea knocked up his future wife Nina whilst they were still courting and he suggested that she ‘get rid of it’, which she did, following his advice – later causing her to die of uterine cancer as she deserved. In case anyone is wondering why Eliade suggested such a thing to a woman he would later marry, the pregnancy was actually inconvenient to him because he was fucking someone better looking at the same time. Would you want your own daughter to be dating a good Christian patriot like Mircea?
Of course its because Eliade talked a lot about ‘love’ that no one ever dwells upon what a jerk he actually was, it is simply acknowledged as a matter of mere biographical trivia that his selfishness and immaturity actually caused his own wife’s death. Such handwavium is quite unlike the readiness of people to judge his unsentimental friend Julius Evola who is merely alleged to have refused to support an illegitimate boy who was born to an Argentinian woman he once knew, and who was possibly his (but, the story goes, possibly not), this being purely on the allegations of Gelli’s very dubious biography that no one takes seriously as a source on Evola’s life regarding anything else.
Actually this brings up the subject of ‘Great Soul’ Gandhi again, because when Gandhi’s own wife was dying he refused on religious grounds to let her take the medicine that could have saved her life. Yet years later when it was Gandhi’s own turn to lie dying, he quaffed some quinine himself on the reasoning of ‘that’s different’. This completely odious bit of hypocrisy usually gets send down into the memory hole to present Gandhi in the best possible light, and the reasoning behind such a selective cultural memory seems to be because he spoke about nonviolence a lot.
A similar interpretation would explain why Eliade has a semi-respectability today that many of his contemporaries on the political right aren’t allowed to share in. Mohandas Gandhi was lovable because he said nice things, but the non-pacifist revolutionary Sunhas Chandra Bose didn’t. Baron Julius Evola wasn’t very lovable either, unlike Mircea Eliade who did say the kind of things that can earn one a pass from our leftist masters. The rule is that whenever someone is weak and sentimental in character and says only unthreatening things, all the shit in their life is guaranteed to get whitewashed after their death should anyone remember them, not unlike the way piss might run from a duck’s back.
But the facts speak for themselves. At the risk of sounding like a feminist, both Eliade and Gandhi controlled the lives of the women round them in ways that quite literally left them dead. And this is not spirituality but evil. And, at at the risk of sounding callous or sociopathic, their self-righteous messages of ‘love’ were nothing but sentimental and disgusting tools created to achieve a selfish end, as is any other such message for all morality, whether we wish it to be so or not, is ultimately a means of control.
Apart from Mircea Eliade’s contribution to the study of religion, as a character he had very few redeeming characteristics, making him indeed the Gandhi of the right.
Looking into a mirror can bring you out of your cave, and for Marxists and Libertarians their caves are their preferred secular cults of lies that opportunists created to fill the fill the hole left in society by the death of God.
Mussolini said that every anarchist is a baffled dictator.
Mussolini created briefly a Fascist empire, but for the ringleaders of the world’s sectarian kooks the power they seek is within their own guarded gate circlejerks rather in creating empires, revolutions or social change. To people with such a mentality their own irrelevance to the wider world even at the local level is no problem for their egos.
“This may surprise some people, but it really should not. Just because the two ideologies seem to be polar opposites in terms of doctrine and goals does not mean they do not attract essentially the same personality types.”
“Marxism and Libertarianism are essentially perverted mirror images of each other. Both are uncompromising, totalitarian, utopian and reject the status quo as morally intolerable according to their own esoteric philosophical constructs. These qualities are more likely to be attractive to a certain type of person than any particular point of dogma. Utopian idealogues are going to be attracted to revolutionary ideologies regardless of what turn out to be in reality rather minor differences in doctrine. It’s really just a matter of who gets to them first. Given the leftist nature of our culture, it will likely be the Marxists that make first contact.”
“I felt compelled to ragequit this leftist bizarro world when one Saturday afternoon I found myself in a run down YMCA in Brooklyn with a group of middle-aged Jewish public school teachers. They were discussing what the party line should be on radical Islam. On the one hand they found it to be a repugnant ideology, but on the other hand the Muslims were more effective at fighting US imperialism than any current socialist alternatives. And they were all taking it dead seriously as if it was anything other than a circle fap of epic proportions. I realized I had gone beyond full retard. An overwhelming sense of loathing washed over me like an awesome wave. The people I was around suddenly seemed twisted and horrible.”
“I started meeting the exact same kinds of people in the libertarian milieu that I encountered in the Marxist world. They tended to be younger and were therefore slightly less depressing, but many of them were well on their way to being the guy that holds meetings in the run down YMCA in Brooklyn and wears an out of style tweed jacket that smells vaguely of mothballs.”
“The same old narratives of oppression came back, just with the cast of characters shifted around a bit to suit a slightly different set of prejudices. The world really was the same dreary place after all. Oppression really was everywhere, it was just coming from a different direction. In this new world the workers are exploiting the capitalists rather than vice versa. Everyone really is equal, but in this narrative equality is never realized because of the state rather than corporations. Or maybe it really is corporations after all. Eh, whatever works. The evil rich unfairly rely on government protection and subsidy, unlike in the Marxist world where of course the evil rich unfairly rely on government protection and subsidy.“
|
Q:
How to combine array in groovy?
The following java code exists but I'm trying to convert it to groovy. Should I simply keep it as is w/ the System.arraycopy or does groovy have a nicer way to combine arrays like this?
byte[] combineArrays(foo, bar, start) {
def tmp = new byte[foo.length + bar.length]
System.arraycopy(foo, 0, tmp, 0, start)
System.arraycopy(bar, 0, tmp, start, bar.length)
System.arraycopy(foo, start, tmp, bar.length + start, foo.length - start)
tmp
}
Thank you
A:
def a = [1, 2, 3]
def b = [4, 5, 6]
assert a.plus(b) == [1, 2, 3, 4, 5, 6]
assert a + b == [1, 2, 3, 4, 5, 6]
A:
If you want to use an array:
def abc = [1,2,3,4] as Integer[] //Array
def abcList = abc as List
def xyz = [5,6,7,8] as Integer[] //Array
def xyzList = xyz as List
def combined = (abcList << xyzList).flatten()
Using Lists:
def abc = [1,2,3,4]
def xyz = [5,6,7,8]
def combined = (abc << xyz).flatten()
A:
def a = [1, 2, 3]
def b = [4, 5, 6]
a.addAll(b)
println a
>> [1, 2, 3, 4, 5, 6]
|
The race to Kamina Wireless Station
All Britain’s foreign dominions were notified of the outbreak of war at the same time. Lacking instructions from London, each territory responded as they thought fit.
In neighbouring Gold Coast (Ghana) the Regiment Commandant was on holiday in England, leaving an ambitious young officer called Captain FC Bryant in charge. On his own initiative he demanded that the acting commander of Togoland surrender the colony.
On the 6 August the British intercepted a message revealing German forces were withdrawing from the capital Lomé to protect the Kamina wireless station 100 miles inland.
A quick advance
The German force was small with only 300 German and 1,200 native troops. They didn’t have the support of the local population who informed the Allies of their movements.
The British took Lomé easily on 7 August. More British forces invaded Togoland from the west while the French arrived from the east. Together they took control of the south. They began to advance towards Kamina and on 12 August Alhaji Grunshi became the first soldier in British service to fire a shot in the war.
The fall of Kamina
German forces tried to slow the Allies' movement north, destroying railway bridges and launching ambushes. They inflicted major casualties and on 22 August Lieutenant George Thompson became the first British officer killed in action in World War One.
Outnumbered, the Germans retreated and a few days later burnt Kamina to the ground rather than let it fall into the hands of their enemy. On 26 August Captain Bryant accepted the German surrender and Togoland was carved up between Britain and France.
|
Q:
Expression.MethodCallExpression pass MemberExpression as Parameter
I'm trying to create a generic Expression with a method call on
Enumerable.Contains
So basically i want to achive this simple lambda
x => collection.Contains(x.SomeProperty)
My code so far is looking like this:
ParameterExpression parameterExpression = Expression.Parameter(typeof(T), "x");
MemberExpression memberExpression = Expression.Property(parameterExpression, propertyName);
MethodCallExpression methodCall = Expression.Call(
typeof(Enumerable),
"Contains",
new Type[] { typeof(Object) },
Expression.Constant(new Object[] { 1, 2, 3 }),
memberExpression
);
But then it dumps
InvalidOperationException: No generic method 'Contains' on type 'System.Linq.Enumerable' is compatible with the supplied type
arguments and arguments. No type arguments should be provided if the
method is non-generic
If i just pass the paramterExpression it works fine, but thats not what i want.
My question is now. Is there a way to pass the Memberexpression to the Contains mehtod call?
A:
It depends on the Type of memberExpression which in turn depends on the type that the property accessed has.
E.g. the following works:
void Main()
{
string propertyName = "ObjectProperty";
ParameterExpression parameterExpression = Expression.Parameter(typeof(T), "x");
MemberExpression memberExpression = Expression.Property(parameterExpression, propertyName);
MethodCallExpression methodCall = Expression.Call(
typeof(Enumerable),
"Contains",
new Type[] { typeof(object) },
Expression.Constant(new Object[] { 1, 2, 3 }),
memberExpression
);
Console.WriteLine(Expression.Lambda<Func<T, bool>>(methodCall, parameterExpression).Compile()(new T()));
}
public class T
{
public object ObjectProperty => 2;
public int IntProperty => 4;
}
The following does not:
void Main()
{
string propertyName = "IntProperty";
ParameterExpression parameterExpression = Expression.Parameter(typeof(T), "x");
MemberExpression memberExpression = Expression.Property(parameterExpression, propertyName);
MethodCallExpression methodCall = Expression.Call(
typeof(Enumerable),
"Contains",
new Type[] { typeof(object) },
Expression.Constant(new Object[] { 1, 2, 3 }),
memberExpression
);
Console.WriteLine(Expression.Lambda<Func<T, bool>>(methodCall, parameterExpression).Compile()(new T()));
}
public class T
{
public object ObjectProperty => 2;
public int IntProperty => 4;
}
You could use new Type[] { memberExpression.Type } instead of new Type[] { typeof(object) } to have the code adapt to the type of the property, though you'd also need to have the type of the argument expression (in this case the Constant(new Object[] {...})) match.
Note that you can do implicit casts here only if they are reference types that derive from the type in question (object) so a property that returned string or Uri would be fine (though obviously always false in the check for whether it was contained in an array of 1, 2, 3) but a property that returned int is not as it's a boxing conversion, not a reference up-cast.
|
package org.apache.archiva.repository;
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
import java.util.List;
public interface EditableRepositoryGroup extends EditableRepository,RepositoryGroup {
void clearRepositories();
void setRepositories(List<ManagedRepository> repositories);
void addRepository(ManagedRepository repository);
void addRepository(int index, ManagedRepository repository);
boolean removeRepository(ManagedRepository repository);
ManagedRepository removeRepository(String repoId);
void setMergedIndexTTL(int timeInSeconds);
}
|
Toyota, Hyundai halt production
With India’s economic slowdown taking its toll, auto sales has plunged compelling more automotive manufacturers to lay off employees and also halt production.
According to a Reuters report, Japan’s Toyota Motor and
South Korea’s Hyundai Motor are the fresh additions to the list. Due to
declining sales, these automobile makers have halted production at plants in
India.
Hyundai in a memo informed that it would halt production for
several days in August across various departments including the body shop and
paint shop as well as its engine and transmission plants, as per Reuters.
However, a Hyundai Motor India spokesman said the company
expected sales to pick up in the festive season starting next month and denied
laying off of any workers.
The downward trending sales has been responsible for thousands
of job cuts and shutting down of factories and more names are being added in
the list who are laying off temporary workers.
It has also come to light that not only automakers, event
components such as powertrain and air-conditioning systems for cars and auto
framework parts makers have also cut temporary workers in a recent move.
Earlier, Reuters had reported that automakers, component
manufacturers and dealers had already cut 350,000 jobs due to the economic
slowdown.
|
Q:
Set .desktop shortcut as default email application
How to set chromes gmail shortcut, or any other app.desktop, as default email client? It does not show up in the settings section for default applications. All i see there are geary and gnome-gmail.
A:
You can set your gmail to open all email links in two ways:
Easy Way
If you sign in to your gmail account from google chrome, you should see an 'eye' icon that says that the site wants to install a service handler. Click on it and then allow and click done. Now, whenever you click an email, it will open in your gmail.
Hard way
Open your favorite text editor and add the following lines to it:
#!/bin/sh
firefox https://mail.google.com/mail?view=cm&tf=0&to=`echo $1 | sed ‘s/mailto://’
save it as open_gmail.sh (or whatever you like)
Type in terminal the following command by giving the exact path of open_gmail.sh file:
chmod u+x /path/to/open_gmail.sh
Now I assuge thunderbird is your default client. I will edit thunderbird.desktop file in this example. First just back-up that file by:
cp /usr/share/applications/thunderbird.desktop path/to/where/you/want_to_save
Now open thunderbird.desktop by:
sudo nano /usr/share/applications/thunderbird.desktop
and find the line that says Exec=thunderbird %u
and make it look like:
Exec=/path/to/open_gmail.sh %u
Save and exit.
Run sudo update-desktop-database
Now whenever you click an email address, it will open in gmail in firefox. If you are not signed-in to gmail, it will first ask you to sign-in.
If you want to revert this, replace the edited /usr/share/applications/thunderbird.desktop with the backup of the original usr/share/applications/thunderbird.desktop file.
|
If Baloch Militants attack on security forces,these IDs claim that “Baloch freedom fighter” attacked on “occupied forces”. If security forces attack on Militants, they claim this as “Pakistan army is killing innocent Baloch”.
These fake IDs on twitter have lost their novelty and their artificial effectiveness has worn out within this last 1 year. Only a few OCD-suffering clowns like Salma Jaffar @Chiltan and Tarek Fatah take their nonsense to be fact and actively cheer them on.
At the same time, the likes of ex-Senator Sana Baloch realises the bullshit these fake IDs spit out but cannot stop supporting them out of compulsion and peer pressure.
BLA a military wing of Indian Army.. thats all about it.. Those who are attaching fake photos must go through and visit Army technical college in Sui, Mach, Dera Bugti and other welfare institutions settled by Pak Army, where thousands of Baluch Pakisatnis being studied…. Death to Bla a.k.a India porks… Long live Pakistan…
|
Renal xanthogranulomatosis: radiological, clinical, and pathological features in two cases.
Xanthogranulomatosis is a multicentric or systemic proliferative disorder of histiocytes. Two cases of xanthogranulomas are reported, each involving the kidneys. One patient also had concomitant orbital and CNS involvement. Primary renal involvement without associated retroperitoneal masses is an uncommon manifestation of this disorder. The CT appearance of renal involvement in both patients was distinctive and remarkably similar. Both patients had bilaterally enlarged kidneys in which the renal sinus fat was replaced by a fibrotic process that caused mild calicectasis. The clinical and roentgenographic features of xanthogranulomatosis bear a close resemblance to those seen in two fibrosclerosing syndromes: sinus histiocytosis with massive lymphadenopathy and retroperitoneal fibrosis.
|
Dream Big in 2013
Happy New year to all my friends, clients, Facebook fans, Google + Circle, and critics, I wish you all to live righteously and to dream big in 2013.
Dream Big means something different to everyone, and I hope and pray you know what that something is for you personally. If you haven’t considered what that may be for you, my desire is that you stop today and put your dream big in writing. File it away so you can review and visit on regular basis.
My Dream Big for 2012 was to reinvent myself, to rekindle the passion for the things I love to do. The year’s journey taught me to hold on to people I love tightly, for in only a twinkling of a moment they cease to exist. To care for myself, to enjoy the life I live. It was a year of learning, of growing, and accomplishing things I only would dream to do. But most importantly it was was year of doing, doing what I dared to do. You see, in 2012 I had a lot of firsts, I learned to podcast, how to coach others. I learned how to follow, because you can’t lead unless you know how to follow. I conducted my first Branding Class teaching the value of knowing who and how to plant the seeds of passion. It was a year of discovery, I found a world of people, just like me at BlogWorld, and BlogHer. I found a group of people who loved to write and encouraged me to rekindle the passion I have for communicating, writing, reading, teaching and learning.
Who knew, my voice could make a difference to anyone?
The Dream Big in 2013
In twenty thirteen, I promise to continue to use the gifts and talents of 2012 to the Nth degree. A gift not used is a broken promise. I promise to laugh, live, sing (on or off key!), dance, and care. I will write more often, teach, read, learn and grow, to partner, and let my voice be heard because somewhere someone is listening.
I invite to you take the journey of this marvelous new year of twenty thirteen, as I dream big, and take the steps to make those dreams a reality. Let’s dream big in 2013 together. Please share I would love to know what your plans are to Dream Big in 2013!
Call contact me for a free consultation, click here, to send me a message. I love to help small business owners become more successful. Know someone who needs to read this information, why not share the knowledge?
|
/*******************************************************************************
* Pentaho Big Data
* <p>
* Copyright (C) 2002-2020 by Hitachi Vantara : http://www.pentaho.com
* <p>
* ******************************************************************************
* <p>
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* <p>
* http://www.apache.org/licenses/LICENSE-2.0
* <p>
* Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on
* an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the
* specific language governing permissions and limitations under the License.
******************************************************************************/
package org.pentaho.big.data.impl.vfs.hdfs.nc;
import org.apache.commons.vfs2.FileSystemException;
import org.apache.commons.vfs2.provider.AbstractFileName;
import org.pentaho.big.data.impl.vfs.hdfs.HDFSFileObject;
import org.pentaho.di.core.vfs.AliasedFileObject;
public class NamedClusterFileObject extends HDFSFileObject implements AliasedFileObject {
private final String realFileSystemURI;
public NamedClusterFileObject( final AbstractFileName name, final NamedClusterFileSystem fileSystem ) throws FileSystemException {
super( name, fileSystem );
realFileSystemURI = fileSystem.getRealFileSystemURI().toString();
}
@Override
public String getOriginalURIString() {
return realFileSystemURI + getName().getPath();
}
@Override
public String getAELSafeURIString() {
return getOriginalURIString();
}
}
|
Before Ubisoft devotes real resources to the virtual reality craze, the publisher will need to see a significant number of people adopt the hardware, an executive said at GDC.
Loading
Loading
During a roundtable, the subject of VR was touched upon by Ubisoft's Vice President of Creative, Lionel Raynaud, GameSpot reports. Raynaud said, "VR would need to sell at least 1 million units to be viable for development."At this stage, the market for VR headsets is very much unclear due to its availability. Earlier this week, Sony announced its VR headset , Project Morpheus, which is primarily designed as a PlayStation 4 peripheral. The unit is still in the prototype phase, and, as such, is not expected out until next year at the earliest. The Oculus Rift, meanwhile, is still only available as a development kit, and while a new version is on the way , there is still no official release date for a consumer-oriented model.IGN got the chance to go hands-on with Project Morpheus at GDC; you can read our impressions here . You can also check out our impressions of the newest version of the Oculus Rift in the video below.
Chris Pereira is a freelance writer who spends his spare time agonizing over the final seasons of The X-Files. Check out what he's saying on Twitter and follow him on IGN
|
Puducherry: The Centre would soon introduce in Parliament the much-awaited Foreign Education Providers (Regulation) Bill which would help students get access to education provided by overseas universities.
"It is on the anvil. It has gone to the Law Ministry for vetting, after which it will be introduced", Minister of State for Human Resource Development Dr D Purandeswari told reporters on the second day of the Editors' Conference on Saturday.
Through this bill, institutions adhering to AICTE norms would be allowed to have tie-ups with foreign institutions to avoid "fly by night" operators, she said.
Urging state governments to increase their education spend, Purandeswari said the Government's target was to utilise upto six percent of the GDP in the education sector.
"Currently, 3.78 percent of country's GDP is utilised for expenses in the education sector. Education is a cooperative responsibility of both the Government of India and states. We need to work together," she said.
She said as many as 14 bills aimed at ushering in reforms in the education sector were pending as Opposition had stalled proceedings in Parliament (over Lok Pal bill).
Purandeswari said the Right to Education Act would be enforced from 2013.
She said the HRD Ministry planned to come out with a "National Accreditation Bill" making it mandatory for all institutions to have quality infrastructure.
She said the time was ripe for India to have a relook at the education policy and to further strengthen programmes in the sector in the wake of globalisation.
|
Introduction {#Sec1}
============
It is reasonable to hypothesize that older adults living at home with support from home care services (HCS) have a better quality of life (QoL) if their own expressed needs regarding care and service are met. A definition of QoL by the WHO is individuals' perception of their position in life in the context of the culture and value systems in which they live and in relation to their goals, expectations, standards and concerns \[[@CR1]\]. Studies from other areas, for example those living with type 2 diabetes \[[@CR2]\] and pain relief \[[@CR3]\], reinforce that having self-determination regarding decisions about one's care contributes to QoL. A Finnish qualitative study showed that two thirds (approx. 943 older adults) of a sample of 1405 older adults expressed a desire to pass on before reaching 100 years of age, with 24% stating due to being afraid of losing health, and 10% stating because of fears of losing self-determination \[[@CR4]\]. Based on this, it seems reasonable to hypothesise that increased self-determination among older adults who receive HCS makes up an important part of their QoL.
Self-determination in relation to QoL in HCS has not been widely studied in the nursing literature. Thus, it seems important to expand the knowledge base regarding factors concerning self-determination and self-determination in relation to QoL for older adults. Increased knowledge in this area can help care managers and researchers to develop new interventions that facilitate QoL. This paper extends the available knowledge with regard to self-determination among older people living at home with daily home care and explores whether groups with more as opposed to less self-determination differ in terms of QoL.
Background {#Sec2}
==========
Autonomy is often used as a synonym for self-determination but is more closely linked to the idea of individuals taking their own decisions without being influenced by others. This might make it problematic to use the concept of autonomy in connection with a person dependent on help and with decisions taken together with others \[[@CR5]\]. Autonomy defined in another way describes self-determination as a central aspect of autonomy, as the capacity to act and decide in accordance with one's own free wishes \[[@CR6]\]. Self-determination has also been defined as a process in which a person has control and ethical/ legal rights \[[@CR7]\], and as the capacity to make personal choices, irrespective of the person's ability to accomplish those choices \[[@CR8]\]. In this paper we assess self-determination, using the Impact of Participation and Autonomy of Older People (IPA-O) (see method section) where the concept of self-determination is used synonymously with decisional autonomy, \[[@CR9]\] meaning the ability to make decisions and to execute choices without external restraint \[[@CR8]\].
Practising self-determination has been shown to have an impact on older adults receiving HCS in several ways and a variety of experiences have been described. Feeling safe, having an opportunity to influence and be involved in decisions \[[@CR10]\], being free to choose and in control of everyday life and having ones' needs met \[[@CR11]\] are examples of impacts experienced. In contrast, people with little self-determination have described a sense of lack of control, being careful about taking risks, a need to retreat into an isolated world \[[@CR12]\], and insecurity \[[@CR13]\]. Thus, it is reasonable to believe that promoting self-determination will increase overall QoL.
To promote self-determination among older adults, both the policy and organisation of HCS need to confirm their wishes and needs \[[@CR5]\]. For example, suggestions to be incorporated into future care models include having a culture of care that focuses on respect for the older adult \[[@CR14]\], where leaders maintain continuity and work to improve nurses' attitudes \[[@CR15]\]. To further promote self-determination and a sense of being respected among older adults, staff need to be flexible in their provision of daily care whenever a problem arises \[[@CR11]\], and strive to establish meaningful relationships between the older person, colleagues and leaders within the organisation \[[@CR5], [@CR14], [@CR16]--[@CR18]\]. A trusting and positive relationship is described as meaningful in enabling involvement in daily care and it's planning \[[@CR11], [@CR16], [@CR19]\], and a positive relationship might motivate the older person to share information about personal issues and wishes \[[@CR11], [@CR20]\]. In contrast, one review \[[@CR5]\] found that organisations which allocated time and care from the perspective of the organisation rather than the older person's wishes and needs had a negative influence on the self-determination of older adults. In addition, the functional capacities of older adults can impede self-determination \[[@CR5]\]. A Swedish study reported that self-determination among people living at home with HCS support, who were dependent in both P-ADL and I-ADL, showed significantly less self-determination (p⩽ 0.05) than people who were independent \[[@CR21]\].
Both international \[[@CR11], [@CR15], [@CR22]\] and Swedish studies \[[@CR23], [@CR24]\] report limited possibilities for older adults to practice self-determination concerning the content of care in HCS. The international studies \[[@CR11], [@CR15], [@CR22]\] describe older adult's self-determination as being influenced by, for example, the healthcare staff's individual working methods and the multifaceted, hierarchical and unpredictable healthcare structure. The Swedish studies \[[@CR23], [@CR24]\] report that the possibilities for older adults to be involved in decisions and to have any real influence over the content of care are limited. This is surprising, because, in the literature, older adults whose expressed home care needs are met have reported significantly higher levels of life satisfaction, lower levels of loneliness and perceived life stress than elderly people whose needs are not met \[[@CR25]\].
There are studies which describe the importance of self-determined decisions for improving QoL regarding care in other areas, such as diabetes type 2 \[[@CR2], [@CR26]\] and, pain relief \[[@CR3]\]. However, to our knowledge, there is no study that explores self-determination in relation to QoL among older adults living at home with support from HCS.
QoL is a broad concept affected in a complex way by the person's physical health, psychological state, level of independence, social relationships and their relationship to salient features of their environment \[[@CR26]\]. Studies show that QoL among people aged 75 years and older with care needs is not affected by the type of helper \[[@CR27]\] but that social isolation \[[@CR28], [@CR29]\] and the extent of the help influenced it negatively. Among adults aged 75 years and older living at home without home care, it has been found that 85--94% rated their QoL as being good or very good compared to only 64--74% of those living at home and receiving home care \[[@CR29]\]. There is a need of more knowledge regarding self-determination in relation to health-related QoL among older adults receiving HCS \[[@CR11]\].
Rationale {#Sec3}
---------
It is acknowledged that preservation of self-determination is very important for older adults to experience good QoL, but to what degree and in what areas people receiving help from HCS experience self-determination is unknown. Searches in databases relevant to the topic of nursing, show that it is essential to practice self-determination and it is reasonable to believe that a greater degree of self-determination influences QoL positively. Few studies have actually explored self-determination as a factor which might influence QoL among older adults living at home with help from HCS. Since the main goal of HCS is to ensure that older adults live a worthwhile life with a sense of wellbeing \[[@CR30]\] and in order to improve QoL among older adults who receive HCS \[[@CR31]\] it is essential to explore any possible relationship between self-determination and QoL. Such knowledge will make an important contribution to understanding how quality aged care can be created. Thus, the aim of this study was to explore perceptions of self-determination among older adults living at home with the support of home care services, and to test whether those older adults who perceive a higher degree of self-determination also have a higher health-related QoL.
Methods {#Sec4}
=======
Design {#Sec5}
------
We conducted a cross-sectional study using three questionnaires, *Impact on Participation and Autonomy, the Nottingham Health Profile,* and the *EQ-5D-5 L.* The study is part of a larger intervention study aiming to evaluate: the effects and meaning of a person-centred and health-promoting HCS intervention on QoL; thriving and satisfaction with care in older adults; caregiver strain, informal caregiving engagement and satisfaction with care among relatives; and on job satisfaction and stress of conscience among home care staff \[[@CR32]\]. In this study, HCS is interpreted widely and concerns the kind of help given by health professionals in the homes of older adults, such as shopping, cleaning, cooking, feeding, hygiene, showering etc.
Context and participants {#Sec6}
------------------------
This study was conducted in HCS section in one municipality in northern Sweden, where HCS is provided by municipalities as a universal service \[[@CR33]\]. The municipality in this study, comprised 10 districts in total. Older adults (*n* = 356) from one geographical HCS district were invited to participate in a larger intervention study based on a power calculation where *N* = 207 will provide 5% power at the 0.05 significance level. In total, 163 participants agreed to be part of the intervention study. A sub-sample of 134 (82%) from the intervention study who had answered questions about self-determination were included in the present study. Inclusion criteria for this study were; aged 65 years or older, living at home and receiving HCS with at least two visits per month, able to speak Swedish, be strong enough to answer the questionnaires used in the study, and be judged by staff/ family member to have a good cognitive status. A good cognitive status means a person who is judged to answer questions with credibility.
Data collection {#Sec7}
---------------
Data were collected by means of a survey including questionnaires about background characteristics, self-determination, health-related QoL (Table [1](#Tab1){ref-type="table"}). All included questionnaires have a published track record of satisfactory validity and reliability \[[@CR9], [@CR34]--[@CR37]\]. Older adults who struggled to write or read were offered support from a retired Registered Nurse trained to support completion of the questionnaires. The Registered Nurse worked with the participants individually and ticked the boxes in the questionnaires, one at a time, in accordance with their answers. Background characteristics such as the participants' degree of dependence in activities of daily living (ADL) were collected. The ADL assessment comprised a total of 15 items divided in two domains, instrumental ADL \[[@CR34]\] and personal ADL \[[@CR35]\]. Instrumental ADL includes questions about shopping for food, heavy housekeeping, and ability to handle finances etc. with options that were scored on a 3-, 4- or 5-point Likert scale. Personal ADL includes questions about showering, dressing, and eating etc. with options scored on a 3-point Likert scale. High scores indicate independence. The options in both domains were dichotomized before analysis. For both domains, scoring levels indicating a need for help to any extent were scored as 0 and total independence as 1.Table 1Characteristics of the participantsCharacteristicParticipantsHigher self-determinationLower self-determination*pn* = 134*n* = 65*n* = 69Sex.930^a^ Female n (%)84 (63)40 (62)44 (64) Male n (%)50 (37)25 (38)25 (36)Age (Year).246^b^ Median (Q1; Q3)83 (77; 88)84 (79; 89)83 (74; 88) Range65--10066--9765--100Help from HCS n (%).788^a^ \< 1 year25 (20)13 (22)12 (19) 1--10 years85 (69)43 (71)42 (66) ≥ 10 years14 (11)4 (7)10 (15) Not answered *n* = 10Number of home visits n (%).622^a^ 1--2 visits/ week or 1 every fourteen days39 (31)21 (35)18 (27) 3--6 times each week12 (10)5 (8)7 (11) Each day23 (18)9 (15)14 (21) Twice each day23 (18)13 (22)10 (15) Three or more each day29 (23)12 (20)17 (26) Not answered *n* = 8Housing n (%)**.034** ^a^ House25 (19)17 (26)8 (12) Apartment108 (81)48 (74)60 (88) Not answered *n* = 1Educational background n (%) Elementary school63 (48)31 (48)32 (47).738^a^ Secondary school47 (36)21 (33)26 (38) University22 (16)12 (19)10 (15) Not answered *n* = 2Country of birth n (%).272^a^ Sweden115 (86)58 (89)57 (83) Other countries19 (14)7 (11)12 (17)Swedish is the mother tongue n (%).783^a^ Yes124 (93)61 (94)63 (93) No9 (7)4 (6)5 (7) Not answered *n* = 1Instrumental activities in daily living n (%)1.000^a^ Dependent119 (95)56 (95)63 (95) Independent6 (5)3 (5)3 (5) Not answered *n* = 9Personal activities in daily living n (%).818^a^ Dependent63 (83)24 (80)39 (85) Independent13 (17)6 (20)7 (15) Not answered *n* = 58p = Differences between higher and lower self-determination, ^a^= Chi-square test, ^b^ = Mann-Whitney U Test, Not answered = Internal missing values are not included in the analyses
The IPA-O questionnaire was used to assess self-determination. In IPA-O the concept of self-determination is used synonymously with decisional autonomy \[[@CR9]\] meaning the ability to make decisions and execute one's own choices without external restraint \[[@CR8]\]. The IPA-O comprises 22 items covering the dimensions of; "mobility", four items, "self-care", five items, "activities at home", four items, "social relationships", five items, "use of time", one item, "financial situation", one item, "providing help and support for others", one item, and finally "I live as I want", one item. Two examples of items in IPA-O are listed; Mobility, "My chances to decide where to get around in my house are good" and Self-care, "My chances to decide to get washed and dressed the way I want are good". All dimensions with more than one item showed good internal consistency with Cronbach's alphas between 0.74--0.86. Answers were scored on a five-point Likert scale: totally agree (1), partly agree (2), neither agree nor disagree (3), disagree (4), and totally disagree (5). The IPA-O was found to have good face and content validity \[[@CR9]\]. In addition, IPA-O showed moderate or high reliability in all questions except for one item in the dimension mobility that had low reliability. A more detailed description of each item is reported \[[@CR9]\]. Because of a mistake in its construction, one item (financial situation) was not included in the questionnaire used. To allow comparison, the answer alternatives were dichotomized \[[@CR21]\], before analysis of the older adults' experience of self-determination. The answer alternative "totally agree" was considered to convey self-determination and the options "agree partly" to "disagree" were considered to express not experiencing self-determination. The total IPA-O showed good internal consistency (Cronbach's alpha .85) in our study which allowed analysis of associations between self-determination and quality of life by using the total score of the scale. Reported self-determination was dichotomized to higher and lower self-determination, based on the cut-off at the median score of 33 (Q1;25, Q3;40) for the total group. The score ranges from 21, highest degree of perceived self-determination, to 105, lowest degree.
Two questionnaires were used to assess health-related QoL; the *Nottingham Health Profile* (NHP) for psychosocial aspects \[[@CR36]\] and the *EQ-5D* for functional aspects by \[[@CR37]\]. The NHP comprises 38 items divided into 6 dimensions: energy level, pain, emotional reaction, sleep, social isolation, and physical abilities. Two examples of items in NHP are listed; energy level, "Everything is an effort" and pain, "I'm in constant pain". Each item is presented as a statement with a Yes/No response and an index of the total score in the dimensions ranges from best (0) to worst (100) possible health. The NHP has been found to be valid \[[@CR36]\] and reliable \[[@CR38]\]. The *EQ-5D 5 L* comprises two parts, a state-of-health description, which includes 5 items, and a visual analogue scale. The state-of-health description comprises five dimensions: mobility, self-care, usual activities, pain/discomfort, and anxiety/depression. Each dimension is scored on a five-point Likert scale, ranging from no problem (0) to extreme problem (4). The answers to the items are combined in a 5-digit value representing the state of health, which is then given a tariff value that is preference based and derived from a British general population. The tariff value ranges from worse than dead (\< 0) to 1 (full health), anchoring dead at 0. The visual analogue scale rates participants' overall health between endpoints, from worst imaginable health (0) to best imaginable health (100). The EQ-5D has been found to be valid and sensitive to change \[[@CR37]\].
Analyses {#Sec8}
--------
### Statistical analyses {#Sec9}
Descriptive statistics regarding background characteristics for groups with high and low self-determination respectively were presented with number and percentages for categorical variables and median and quartiles for quantitative variables. The differences between the groups with high and low self-determination were further analyzed using the Chi-square test for categorical variables and the Mann-Whitney U test for quantitative variables. Exploration of the dimensions of experienced self-determination was presented in percentages. Descriptive statistics regarding self-rated quality of life were presented with median and quartiles and analyzed using the Mann-Whitney U test. Differences in medians and effect size measures \[[@CR39]\] were used to quantify the differences in quality of life between the groups with higher versus lower self-determination. Reference measures for effect size give 0.2 for a small effect, 0.5 for intermediate effect, and 0.8 for a large effect \[[@CR39]\]. The SPSS 22.0 for windows (SPSS Inc., Chicago, IL) was used for all statistical analyses. A *p*-value of *\<* 0.05 was regarded as statistically significant.
Ethical consideration {#Sec10}
---------------------
The study (Dnr 2016/04-31Ö) was approved by the Regional Ethics Review Board in Umeå, Sweden. Participants received information about the study and were assured of confidentiality in line with the Declaration of Helsinki. Participation was voluntary and written informed consent was collected from all participants. Participants could withdraw from the study or end their participation at any time without giving any reason.
Results {#Sec11}
=======
Reported background characteristics (Table [1](#Tab1){ref-type="table"}) show that 63% of the older adults receiving support from HCS were female. Participants had a mean age of 83 years (range 65--100, SD 7.9); 69% had received help from HCS for 1--10 years; 59% had one or more visits each day; 81% lived in an apartment; 48% had completed elementary school; 86% were born in Sweden; 93% spoke Swedish as their mother tongue; finally 95% were dependent in I-ADL to any extent and 83% were dependent in P-ADL to any extent. Background characteristics were similar in the two groups with higher and lower self-determination, except for type of housing. More adults who lived in a house with a garden reported higher self-determination (*p* = .034) than those who lived in an apartment (Table [1](#Tab1){ref-type="table"}).
Overall, older adult's self-reported self-determination varied between the dimensions (Table [2](#Tab2){ref-type="table"}). A large proportion (72%) of the participants experienced self-determination in relation to the dimension use of time, followed by the dimensions self-care, mobility, social relationships, possibility to live as one wants, and activities. Finally, few people (15%) experienced self-determination in relation to the dimension help and support of others.Table 2Percentage of older adults (*n* = 136) who fully experienced self-determinationDimensionsSelf-determination, %In relation to: Use of time (1 item)72 Self-care (5 items)70 Mobility (4 items)51 Social relationships (5 items)34 I live as I want (1 item)34 Activities in and around the house (4 items)33 Providing help and support for others (1 item)15In each dimension, older adults were considered to experience self-determination when they scored totally agree in all items within each dimension
Results show significant differences in QoL between the two groups of higher and lower experienced self-determination (Table [3](#Tab3){ref-type="table"}). Older adults who reported a greater degree of self-determination reported a significantly higher experienced QoL on the EQ-5D-5 L total, the EQ-VAS and the NHP total score in comparison with those who reported a lower degree of self-determination. However, effect size measures show that the size of the differences can be considered low to intermediate. In sub-scales, older adults who reported a higher degree of self-determination also reported a higher degree on five out of six NHP sub-scales (*p* = 0.001--0.033) compared to adults who reported a lower degree of self-determination. In the sub-scale sleep, we could not find any differences (*p* = 0.395) between the groups.Table 3Differences between older adults who reported higher degree vs lower degree of self-determination on QoLHealth-related QoLHigher self-determination Md (Q1; Q3)Lower self-determination Md (Q1; Q3)Differences in MedianEffect size*p*EQ-5D-5 L total^a^0.8 (0.6; 0.9)0.6 (0.3; 0.7)0.20.39\< 0.001EQ-VAS^a^65 (50; 80)50 (40; 65)150.30\< 0.001NHP total^b^24 (8; 40)40 (26; 53)160.30\< 0.001*n* difference between 117 and 128 depending on internal missing values*p =* Differences between higher and lower self-determination analysed using Mann-Whitney U TestEQ-5D-5 L total range between \< 0 to 1. 1 = full healthEQ-VAS range 0--100. 100 = best imaginable healthNHP range from 0 to 100. 0 = best imaginable health^a^ = Higher value = better QoL, ^b^ = Lower value = better QoL
Discussion {#Sec12}
==========
This study explores the experienced self-determination among older adults and whether there are differences between groups with higher vs lower self-determination, and QoL. Our main finding shows that the majority of older adults with support from HCSs experienced self-determination in the dimensions use of time, and self-care. However, we found a large variation in self-reported self-determination between all dimensions. The results showed that the group with higher self-determination also reported a higher QoL as measured through the EQ-5D-5 L, EQ-VAS and NHP compared to those lower self-determination.
Findings where the majority of older adults experienced self-determination in the dimensions how to use their time as they wanted, and self-care, are comparable with another Swedish study which used the same questionnaire to measure self-determination \[[@CR21]\]. Findings in the Swedish study found that over 90% of older adults experienced self-determination in the dimensions financial situation, use of time, and self-care. However, a larger proportion of their participants reported self-determination concerning all dimensions compared to our results. The same study also show that self-determination decreases when care needs increase. Their study included older adult with and without HCS and fewer people who were dependent in P-ADL and I-ADL \[[@CR21]\], which might explain the differences between the two sets of results.
Our interpretation of many older adults reported self-determination in use of time and self-care is that those dimensions include things that are usually carried out within the home (deciding when to get washed, dressed, go to bed or the toilet etc.) where it might be easier to exercise control over them. In contrast, the findings where few people reported self-determination - mobility, social relationships, to live as I want, activities in and around the house, and having the possibility to help and support other people includes several domains where one is more dependent on other people and external factors. Dimensions that are carried out around the home and factors that must be planned for in collaborations with others might make older adults more dependent. Our interpretation is in line with \[[@CR11], [@CR40]\]. Their results show that perceived control over one's life can be influenced by external factors (factors influenced by the outside world, others and systems).
The low frequency of older adults who experienced self-determination in the dimension social relationships is particularly worrying. One review \[[@CR14]\] concludes that good relationships among the older person, staff, and healthcare providers are crucial for older adults to be in control and independent \[[@CR14]\]. Further, social relationships are important for retaining mental and physical functions and QoL among older adults \[[@CR20]\]. It has been found that professionals and older adults had different focuses at care planning meetings which might influence the social relationship between the older adult and healthcare providers \[[@CR23]\]. Topics such as social situations and activities in daily life were mostly initiated by the professionals while questions about psychological and existential issues, such as death, meaningfulness and loneliness, were mostly initiated by the older adult or their family members.
Social relationships is closely related to relatedness which is one of three (autonomy, relatedness and competence) basic psychological needs highlighted in the self-determination theory \[[@CR41]\]. Nursing homes accept that it is important to support these three basic psychological needs, in order to increase subjective wellbeing among frail residents. The three needs play a central role in nursing home interventions \[[@CR42]\]. It is reasonable to interpret that the same applies to older adults receiving support from HCS.
Methodological discussion and limitations {#Sec13}
-----------------------------------------
This cross-sectional study is a part of a larger project conducted in one municipality in northern Sweden, and contains the well-known limitations of cross-sectional studies regarding inability to detect important issues such as causality, trends and changes over time. However, in terms of generating hypotheses and detecting relationships for further study, cross-sectional studies can make a contribution \[[@CR43]\], hopefully in this study as well. The local selection of data and the moderate response rate (50%) might increase the risk that the results are non-representative for others. As the survey included several questionnaires, older adults might have found it a burden to complete the survey which in turn might have influenced the response rate negatively. The IPA-O questionnaire included one question with low reliability "My chances to decide to go on the sort of trips and holidays I want to are good", but was kept in the questionnaire because of the target group's opinions in the face validity test and because the question is a part of the dimension mobility \[[@CR9]\]. A majority of the participants in this study showed a dependency in I-ADL and with a relatively high number of missing data for the P-ADL. Considering these factors, it remains being difficult to draw much conclusions about associations between self-determination and dependency based on our data. It seems likely that these are complex associations that would be worthy of further evaluation in other contexts and samples.
Conclusions {#Sec14}
===========
Results in the present study show a difference between the two groups of older adults; older adults who reported a higher degree of self-determination also reported significantly higher experienced QoL than the adults who reported lower degree of self-determination. Our results are not surprising as previous research in other areas has also found a positive relation between self-determination and QoL \[[@CR2], [@CR3]\]. However, as far as we know, this is the first study that focuses on this topic within HCS. Further studies into the relationship between self-determination, dependence and health-related QoL would be valuable, for example developing and testing models of care to strengthen the self-determination of older people in all aspects of HCS and to evaluate the impact of this on health-related QoL. Today, people are expected to live 15 to 20 years longer than previously in developed countries. Living longer might increase the length of time spent living with functional dependence, thus increasing the need for care models that also maintain self-determination and independence in respect to functional aspects are needed \[[@CR44]\].
HCS
: Home Care Service
IPA-O
: Impact of participation and autonomy
NhP
: Nottingham Health Profile
QoL
: Quality of life
The authors would like to thank the Swedish Research Council for Health 2014-02715, Working Life and Welfare (FORTE) 2014-04016 for funding. We would also like to thank the management staff for supporting the data collection for our study, and the older adult who answered the questionnaires.
Funding {#FPar1}
=======
This study was financed by the Swedish Research Council for Health, Working Life and Welfare, and is part of a collaborative program between the Department of Nursing, Umeå University (Sweden) and the College of Science, Health and Engineering, La Trobe University (Australia). The Swedish Research Council for Health, Working Life and Welfare supports and initiate basic and needs-based research within this field of health working life and welfare. The funder had no role in design, collecting data, analysis or interpretation of data or writing the manuscript.
Availability of data and materials {#FPar2}
==================================
The questionnaires used are published and available for others, see the method section.
DE is the grant holder for this study. KB and KL initiated the study and developed the original idea together with DE and PO. KB and KL collected the data and carried out the statistical analyses together with the statistician ML. All authors participated actively and continuously in discussions and interpretation of the results. KB drafted the article which all authors then read critically before approving the final draft.
The study (Dnr 2016/04-31Ö) was approved by the Regional Ethics Review Board in Umeå, Sweden. The heads of the HCS organization were asked for permission to study and implement PCC in HCSs. All participants were informed about the study and assured of confidentiality in reporting the results. They were informed that they could withdraw from the study or end their participation at any time without giving any reason.
Not applicable
The authors declare that they have no competing interests.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
|
"It felt like the right approach was to impose a limitation where you only see what Bella could see," Condon said from Los Angeles. "We tried to make the movie as immersive as possible. When it's not from Jacob's point of view, you're inside Bella's head. So since we built the whole movie that way, by the time you get to the birth, it's OK that you're on the slab with her. Bella has just gotten a shot…
|
Q:
.NET equivalent of Java's TreeSet.floor & TreeSet.ceiling
As an example, there's a Binary Search Tree which holds a range of values. Before adding a new value, I need to check if it already contains it's 'almost duplicate'. I have Java solution which simply performs floor and ceiling and further condition to do the job.
JAVA: Given a TreeSet, floor() returns the greatest element in this set less than or equal to the given element; ceiling() returns the least element in this set greater than or equal to the given element
TreeSet<Long> set = new TreeSet<>();
long l = (long)1; // anything
Long floor = set.floor(l);
Long ceil = set.ceiling(l);
C#: Closest data structure seems to be SortedSet<>. Could anyone advise the best way to get floor and ceil results for an input value?
SortedSet<long> set = new SortedSet<long>();
A:
You can use something like this. In Linq there is LastOrDefault method:
var floor = sortedSet.LastOrDefault(i => i < num);
// num is the number whose floor is to be calculated
if (! (floor < sortedSet.ElementAt(0)))
{
// we have a floor
}
else
// nothing is smaller in the set
{
}
|
When you're trying to get around on a bicycle in the winter studded tires are a great investment, but if you only occasionally have snow or ride a bike in snowy weather you can make a set of tire "chains" using a few dozen cable ties.
Bike shop website Dutch Bike Co. shares this tip for quick and cheap traction in snow. The zip ties themselves dig into the snow nicely but are not thick enough to make the bike bounce. The author alternates cutting off the zip tie heads on either side of the tire to help with cornering.
There are two caveats with using this method—make sure that if your bike has fenders that the zip tie heads are low enough to not cause clearance issues and also make sure that you don't try this if your bike has rim brakes; the zip ties will get in the way of the brake pads.
Seattle Snowpocalypse | via Wired
|
[
{
"mnemonic": "cpuid",
"mnemonicPrecise": "cpuid",
"opcode": 4002,
"opcodeHex": "FA2",
"operands": [],
"operandEncoding": "rm",
"modes": [
"REAL",
"PROT",
"COMP",
"LEG",
"X32",
"X64"
]
}
]
|
b).
3*b**4
Expand 0*s + 0*s + 2*s**3 + (-28 + 5*s + 28)*(-2*s**2 - 2*s**2 + 5*s**2).
7*s**3
Expand (-2 + k + 2)*(-7 - 6 + 9).
-4*k
Expand -3*y - y**4 + 3*y + (-4 - 2*y**3 + 4)*(2*y + 0*y - 3*y) - 11*y**3 - 6*y**4 + 11*y**3 + y**4 - 3*y**3 + 3*y**3.
-4*y**4
Expand (0*z - 3*z - 3*z - 1)*(0 - 3 + 5).
-12*z - 2
Expand (3*v**2 + 3*v**2 - 5*v**2)*(-v**3 + 2*v**3 + v**3) + (-2*v**2 - 2*v**2 + v**2)*(-2*v**3 - 3*v**2 + 3*v**2).
8*v**5
Expand (0*u**5 + 2*u**5 - u**5 + (-3*u**3 + 4*u**3 + u**3)*(-2*u**2 + 2*u - 2*u) - 3*u**5 - 2*u**5 + 3*u**5)*(18 - 22 + 53).
-245*u**5
Expand (1 + 4 + 0)*(5*u + 5 - 6 - 2*u).
15*u - 5
Expand (0*d**2 + d**2 - 2*d**2)*(-3*d - 2*d + 9*d) - 2*d**3 + 2*d**3 + d**3 - 7*d + (0*d + 0*d + d)*(-d**2 + 3*d**2 - d**2).
-2*d**3 - 7*d
Expand -4*t**4 - t**4 + 6*t**4 + (-t**2 - 3*t**2 + t**2)*(2*t**2 - 4 + 4) + 0*t**4 + 4*t**4 - t**4.
-2*t**4
Expand (-6 + 2 + 2)*(-4*f - 21*f + 7*f).
36*f
Expand (-1 + 5 - 1)*(2 - 3*k - 2) + (-4*k + 2*k + 0*k)*(-2 + 2 - 2) - 6*k + 3*k + 5*k + 4*k + 0*k - 2*k.
-k
Expand 89*f + 225*f - 160*f - 3*f + 4*f + 0*f + (1 - 2 + 0)*(f + 0*f - 2*f).
156*f
Expand (8*n - n - 3*n)*(-4 + 2 - 4) + (3 - 1 - 3)*(-4*n + 4*n - 2*n) - 3*n - n + 5*n + 3*n - 5*n + 3*n + 0*n - 3*n + 4*n.
-19*n
Expand (-2 + 4 - 1)*(9*u**4 + 9*u**4 - 3*u**4 + (0*u - 2*u**3 + 0*u)*(5*u - 5*u - 2*u))*(1 - 2 - 1) + u**4 + u**4 - u**4.
-37*u**4
Expand 0*i**3 + 0*i**3 - i**3 + i**3 - 3*i**3 - 4*i**3 + (-2*i**3 + 7*i**3 - 3*i**3)*(-6 + 0 + 4) - 2*i**3 - i + i.
-13*i**3
Expand (-3*t - t + 3*t)*(-2 + 0 + 3)*(0 - 1 - 1)*(-29 + 132 + 1).
208*t
Expand (2 - 2 + p)*(3 - 5 + 7)*(p**3 + 5*p**3 - 3*p**3).
15*p**4
Expand (-4 + 3*n**2 + 4)*(11 - 2 + 0).
27*n**2
Expand (-2 - 1 + 2 - 1 - 1 + 4 + (0 + 1 + 1)*(-2 + 0 + 0) - 3 + 3 + 2 + 2 - 1 - 2)*(35*j + 10*j - 9*j).
-72*j
Expand (-2*h**2 + h**5 + 2*h**2)*(-6 + 6 + 10 + (-1 - 2 + 2)*(-1 + 1 - 1)).
11*h**5
Expand (0 + 0 - 2*b)*(31*b - 31*b + 5*b**2).
-10*b**3
Expand -2*d**4 + 0*d**4 + 0*d**4 - 3*d**4 - 3*d + 3*d - d**4 - d**3 + d**3 + (d**2 + 0*d**2 - 3*d**2)*(-2*d + 2*d + d**2) + 3*d**4 - 4*d**4 - d**4.
-10*d**4
Expand (13*x + 7*x + 4*x)*(3*x + 0*x - 2*x).
24*x**2
Expand (3*u - 3*u + 2*u**2)*(0 + 3 - 8 + 0 + 1 - 3 + (-1 - 2 + 1)*(-1 - 2 + 1) + 0 + 6 - 4)*(2*u**2 - 4*u**2 + 0*u**2).
4*u**4
Expand (-5*o**2 + o**2 + 5*o**2)*(1244 - 1244 - 21*o) - o + o + 2*o**3.
-19*o**3
Expand (-2*x + 6*x - 2*x + 2 - 2 - x + 2*x - 3 + 3 + 0 + x + 0 + (0*x - x + 3*x)*(-1 - 2 + 1) - 1 - x + 1 - 43 + 43 - 7*x)*(0 - 2 + 0).
16*x
Expand (-v + 4 - 4)*(3*v**2 - 3*v**2 + 4*v**2)*(v + 5*v - 5*v)*(11 - 11 - 3*v).
12*v**5
Expand (4 - 3 + 3 + (1 - 5 + 2)*(-2 - 2 + 2))*(-2*d - d + d).
-16*d
Expand ((-2 - 1 + 2)*(2 - 1 + 1) - 2 + 2 - 4)*(0*b - 4*b + 3*b).
6*b
Expand (0*u + 2*u**4 + 0*u)*(2*u - 4*u + 0*u + (2 - 5 + 5)*(0*u - u + 0*u) - u - u + 0*u - 2*u + 0 + 0 + 2 - 2 + u - 3 - 12*u + 3).
-38*u**5
Expand (0*m**3 + 7*m**3 + 6 - 4)*(-4*m + 0*m + 2*m + (2*m - 2 + 2)*(1 - 1 - 1) - m + 0 + 0).
-35*m**4 - 10*m
Expand (p - p + 3*p)*(p - 3*p - p)*(p + p - 3*p).
9*p**3
Expand (-2 + 0 + 1 + (0 - 3 + 0)*(-2 + 0 + 4))*(-2*v**4 + 2*v**4 - v**5).
7*v**5
Expand (21*c**4 - 9*c**4 + 16*c**4 + 1)*(-3*c + c + c + 2*c + 0*c - c - c + 4 - 4 + (-1 + 5 - 5)*(-3*c + 0*c + 5*c) + 2*c - c - 3*c).
-140*c**5 - 5*c
Expand (0*m + m**2 + 0*m)*(4 - 1 + 0) - 4*m**2 - 3*m**2 + 3*m**2.
-m**2
Expand (3*a + 0*a + 2*a)*(0*a - 4*a - 4*a) - 4*a**2 - 4 + 4 - 3*a**2 + 2*a**2 + 0*a**2 - 2*a**2 - 4*a + 4*a + (-1 - 4 + 6)*(-a + a**2 + a).
-46*a**2
Expand 3*q**5 - 3*q**5 + 2*q**5 + (0*q - 2*q + 3*q)*(2*q**4 + 0*q**4 - q**4) - 86*q - 5*q**5 + 86*q.
-2*q**5
Expand (-2*a - 2*a + a)*(1 - 4 + 1)*(5 - 7 - 4).
-36*a
Expand (-3 + 0 + 1 + (0 + 3 - 2)*(-2 - 2 + 3))*(2*w - 2*w - w**3) + (w**2 + w**2 - w**2)*(-1 + w + 1) + 2*w**3 + 2*w - 2*w.
6*w**3
Expand (-23*b + 11*b + 16*b + 0 + 0 + 2*b + (0 + 2*b + 0)*(0 + 1 - 3) + b + 0*b - 2*b - 2*b - b + 2*b + b + 5 - 5 + (5*b - 2*b - 2*b)*(2 + 3 - 3))*(-3 + 2 - 1).
-6*b
Expand (0*t - 3*t + 4*t)*(2*t**3 - 4*t**2 + 4*t**2) + (2*t**2 - 2*t**2 - 2*t**4)*(-5 + 0 + 3).
6*t**4
Expand (-1 - 3 + 3)*(-a**3 + a**3 - 4*a**4)*(-3 + 3 + 3).
12*a**4
Expand (2*l - 74*l**3 + 70*l**3 + 0*l)*(0*l**2 + 0*l**2 - l**2).
4*l**5 - 2*l**3
Expand ((-v**2 - v**2 + 10*v**2)*(0 - 3 + 1) + v - 4*v**2 + 5*v**2 + v)*(0 + 2 - 4).
30*v**2 - 4*v
Expand (104 + 15*o - 104)*(3*o**4 + 0*o**4 - 2*o**4).
15*o**5
Expand (2 + 6*j - 9*j - 5)*(0 - 3 + 1 + 3 + 3 - 4 + (1 + 2 - 4)*(1 - 2 + 0)).
-3*j - 3
Expand t**2 + t**2 + 0*t**2 + (2*t + 2*t - 5*t)*(-2 + 2 - 2*t) - 4*t**2 + 3*t**2 + 3*t**2 + 8*t**2 + 5 + 5 - 7*t**2.
7*t**2 + 10
Expand (7*a - 2*a - 4*a**3 + 5*a**3)*(a**2 - 2 + 2).
a**5 + 5*a**3
Expand (-2 - 3 + 3)*(-5*x**2 - 23 + 22 + 2*x**2 + 10*x).
6*x**2 - 20*x + 2
Expand (0 + 4*l**3 + 0)*(2*l**2 + 2*l - 2*l) + (-2*l**3 + 0*l**3 + 3*l**3)*(-6*l**2 + 3*l**2 + l**2).
6*l**5
Expand (14*h**2 - 14*h**2 + 6*h**3)*(0*h + 3*h - 2*h).
6*h**4
Expand -3*b**3 + 3*b**3 + 2*b**3 + (2*b**2 + 2*b**2 - 2*b**2)*(5*b + 0*b - 3*b) - 2*b**3 - 2*b**2 + 2*b**2.
4*b**3
Expand (-2*q + 4 - 4 + (1 + 1 - 3)*(-2*q + 4*q - q) - 5*q + 2*q + q)*(3 - 3 - q**2)*(3 - 1 + 2).
20*q**3
Expand (-5*b + 3*b + 0*b)*(2*b**2 + b**2 + 11*b**2).
-28*b**3
Expand l**2 + 2*l**2 - 2*l**2 + l**2 - 4*l**2 - 4*l**2 + (2 + 4 - 4)*(l**2 + l - l) - l**2 + 1 - 1.
-5*l**2
Expand (-x + x - 1 + 2*x**2)*(1 - 1 - 7*x).
-14*x**3 + 7*x
Expand (8*b - 8*b - 4*b**2)*(3*b**2 - 3*b**2 - 2*b**2).
8*b**4
Expand (4 + 0 - 2)*(3 + 9 - 4)*(4*v - 2*v - v).
16*v
Expand (4 - 4 - g)*(g**3 + 3*g - 3*g) + (-4*g + 6*g + g)*(-3 + 3 - 3*g**3).
-10*g**4
Expand 4*y - 2*y + y + 0 + 0 + y - 3*y + 0*y + y + 4*y - y - 5*y + (3 - 2 - 3)*(2*y + 2 - 2) + 1 - 1 + 2*y.
-2*y
Expand (3 - 5*q**2 - 6 + 2)*(-3*q**2 - 2*q**2 + 7*q**2).
-10*q**4 - 2*q**2
Expand (-3 + 3 - s)*(-4*s**3 + 3*s**3 + 2*s**3) + 83*s**4 - 2789*s + 2789*s.
82*s**4
Expand n**4 + 2*n**3 - 2*n**3 - 4*n**4 + 4*n**4 - 2*n**4 + (1 - 1 - 2*n)*(n - n + 2*n**3) + 6*n**4 + 4*n**4 - 13*n**4.
-8*n**4
Expand (-9*x - 6*x - x)*(5*x**2 + 0*x**2 - 2*x**2).
-48*x**3
Expand (2 - 2 + 1)*(-42*b**4 + 26*b**4 + 72*b**4).
56*b**4
Expand (2*r**3 - 6*r**3 + 2*r**3)*((0 + 2 - 1)*(-2 - 1 + 1) + 5 - 2 - 2 + 2 + 3 - 2).
-4*r**3
Expand (-4*z**3 + 0*z + 0*z)*(2424 - 2424 - 13*z).
52*z**4
Expand (6*q + q - 4*q)*(-3 + 7 + 1)*(-1 - 3 + 5).
15*q
Expand -j**3 - 3*j**3 + 6*j**3 + (-4*j**2 + 15*j**2 + 5*j**2)*(0 + 0 - j).
-14*j**3
Expand 2*t**4 - 2*t + 2*t + (-2*t**4 + 3 - 3)*(6 - 2 - 2) - 2*t**4 + 5*t**4 - 2*t**4 + (-t**3 + 4 - 4)*(t + 0*t - 3*t).
t**4
Expand (-1 - 2 + 1)*(-2*b + 2*b + 2*b**2)*(0 + 0 + 2*b**2).
-8*b**4
Expand (-1 - 1 + 3)*(2*t - 4*t + 3*t) + (4*t - 3*t + 0*t)*(33 - 11 + 19).
42*t
Expand (-3*i**2 + 12*i**2 + 4*i**2)*(2 + 0 + 0)*(2 + 1 - 1)*(1 + 1 + 0).
104*i**2
Expand (-3 + 3 - 2)*(-1 + 1 - 2*u**2) + 491 - 94*u**2 - 491.
-90*u**2
Expand (-5*s**3 + 5*s**3 + 5*s**4)*(s + 0*s - 3*s)*(-4 + 5 - 3).
20*s**5
Expand (13*d**3 - 117*d + 117*d)*(d**2 + 3*d**2 - 3*d**2).
13*d**5
Expand (u**3 + 2*u - 2*u + (u + 2 - 2)*(u**2 - u**2 + u**2))*(-2*u + u + 3*u)*(-5 + 2 - 3).
-24*u**4
Expand 3*y**4 - 2*y**4 + 0*y**4 + (4 + 2 - 2)*(7*y - 6 + 6)*(2*y**3 - 2*y**3 - y**3).
-27*y**4
Expand (-2*r + 0*r + r)*(5*r - r - 2*r) + 0 + 0 - 2*r**2 + (-1 - 3 + 3)*(-3 - 2*r**2 + 3) + 2*r**2 - r**2 - 2*r**2.
-3*r**2
Expand 3*c + 4*c - 3*c + (2 - 2 - 2*c)*(1 - 1 - 2 + (4 - 5 - 4)*(3 - 1 - 1)).
18*c
Expand (c**2 + 4 - 4)*(-3 - 2*c**3 + 3) + (2*c**4 - 3*c**4 + 4*c**4)*(-3*c + 0 + 0).
-11*c**5
Expand (-g + 2*g + 0*g)*(15*g**2 - 6*g**2 + 4*g**2).
13*g**3
Expand (9*i + 11*i - 13*i)*(-5*i**2 + 2*i**2 + 4*i**2).
7*i**3
Expand ((0 + 0 - 3)*(0*n + 3*n - n) - 3 - 2*n + 3)*(-n**2 + 2*n**4 + n**2).
-16*n**5
Expand -v - 1 + 5*v - v + v - 2*v + 3*v + (-2 + 1 + 2)*(1 - 1 + 2*v) + 3*v - 3*v - v.
6*v - 1
Expand x - x - x + (2 - 4 + 3)*(2*x - 4*x + 0*x) - x + x - x - 2 + 2*x + 2 + (-x + 1 - 1)*(-1 + 13 + 4) + 2 - 2 + x.
-17*x
Expand (0*l**4 + 0*l**4 + l**4 + (-l**3 - 4*l**3 + 3*l**3)*(-3*l - 3*l - 2*l))*(0 - 7 + 1).
-102*l**4
Expand (0 + 2*c + 0 + 1)*(-8*c - 11*c - 3*c).
-44*c**2 - 22*c
Expand (22 + x - 23 + x)*(3*x - 4*x - 2*x).
-6*x**2 + 3*x
Expand (-1 - 2 + 0 + (-5 + 4 - 1)*(-4 + 1 + 1) - 3 + 2 + 3)*(76*v - 17*v**4 - 76*v).
-51*v**4
Expand ((3*t - 2*t**3 - 3*t)*(-2 - 3 + 4) - 2*t**3 + 2*t**3 + 2*t**3)*(
|
Attention!!! Pro Sports Daily will be down on Wednesday morning from 5:00am - 7:00am eastern time for database maintenance. All Sports Direct Inc. properties will be down during this scheduled outage.
Sorry for any inconvenience that this outage may cause.
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
What's with these Bargnani for Josh Smith trades? Am I not doing enough coke?
The Brilliant Plan of How to Get Andrew Wiggins in a Toronto Uniform
Originally Posted by deaner
All I'm saying is the league wants to see Toronto succeeded. An outside chance Silver could say to philly... You know... That's a great trade offer from Toronto for the first pick. It's up to you but we'd love to see wiggins in Toronto.
WE NEED TO GET RID OF BARGS CONTRACT AND FIELDS CONTRACT SO WE CAN SIGN PAUL MILLSAP IN THE OFF SEASON, I HAVE A GOOD FEELING THAT THERE IS A CHANCE HE MIGHT SIGN HERE. HE'S GOING TO SEE THE TALENT ON THE TEAM AND HE IS GONNA TAKE ADVANTAGE AND JOIN US. WE ALSO NEED TO GET RIDE OF PIETRUS AND KLEIZA, THEYRE NO LONGER WITH THIS TEAM MOVING FORWARD. HOW ABOUT IF WE SIGN COREY MAGGETE IN THE OFF SEASON ALSO? 2 YEARS/8 MILLION CONTRACT
WE NEED TO GET RID OF BARGS CONTRACT AND FIELDS CONTRACT SO WE CAN SIGN PAUL MILLSAP IN THE OFF SEASON, I HAVE A GOOD FEELING THAT THERE IS A CHANCE HE MIGHT SIGN HERE. HE'S GOING TO SEE THE TALENT ON THE TEAM AND HE IS GONNA TAKE ADVANTAGE AND JOIN US. WE ALSO NEED TO GET RIDE OF PIETRUS AND KLEIZA, THEYRE NO LONGER WITH THIS TEAM MOVING FORWARD. HOW ABOUT IF WE SIGN COREY MAGGETE IN THE OFF SEASON ALSO? 2 YEARS/8 MILLION CONTRACT
Kyle/Lucas
Demar/ross
Rudy/andersen
Millsap/amir/
Jval/gray
we have the option to amnesty Barg's but were stuck with fields my man
we get our pf and a third point guard, the pacers get some scoring off the bench (andrea) and clear the way for it to become paul george's team (if that hasn't happened already), and the jazz get to unleash derrick favors and get a legit starting 3.
idk about granger's availability but if he and bargs come back unaffected by their injuries i think this trade helps all teams involved. maybe it is just the homer in me that reallllly wants paul millsap but i think it is a fair trade haha.
we get our pf and a third point guard, the pacers get some scoring off the bench (andrea) and clear the way for it to become paul george's team (if that hasn't happened already), and the jazz get to unleash derrick favors and get a legit starting 3.
idk about granger's availability but if he and bargs come back unaffected by their injuries i think this trade helps all teams involved. maybe it is just the homer in me that reallllly wants paul millsap but i think it is a fair trade haha.
Indiana does not want a PF when they have David West and another physical rebounder in Hansborough
I think our next sell-high candidate is Aaron Gray. I wonder if we could get a young PG for him.
but should we?
he did the exact same thing last year. started off slow and started playing really well in the 2nd half. he's always been a good passer especially in the paint which is why people called him a Brad Miller-lite type of player
i'm just worried if we do get a backup PG, we could have another controversy leading to more drama and I think Lucas is just barely the right amount of skill to play backup but this makes him incapable of being a starter. if he had the skills to be a starter in this league, then we come to the PG controversy problem again
I think our next sell-high candidate is Aaron Gray. I wonder if we could get a young PG for him.
Your insane if you think Aaron Gray will get you anything except garbage in return let alone, a young pg. He's a career bench player. 3 games doesn't change many people's opinions. He is not Omer Asik.
The Brilliant Plan of How to Get Andrew Wiggins in a Toronto Uniform
Originally Posted by deaner
All I'm saying is the league wants to see Toronto succeeded. An outside chance Silver could say to philly... You know... That's a great trade offer from Toronto for the first pick. It's up to you but we'd love to see wiggins in Toronto.
|
.class public Landroid/content/AsyncQueryHandler$WorkerHandler;
.super Landroid/os/Handler;
.source "AsyncQueryHandler.java"
# annotations
.annotation system Ldalvik/annotation/EnclosingClass;
value = Landroid/content/AsyncQueryHandler;
.end annotation
.annotation system Ldalvik/annotation/InnerClass;
accessFlags = 0x4
name = "WorkerHandler"
.end annotation
# instance fields
.field final synthetic this$0:Landroid/content/AsyncQueryHandler;
# direct methods
.method public constructor <init>(Landroid/content/AsyncQueryHandler;Landroid/os/Looper;)V
.locals 0
.parameter
.parameter "looper"
.prologue
iput-object p1, p0, Landroid/content/AsyncQueryHandler$WorkerHandler;->this$0:Landroid/content/AsyncQueryHandler;
invoke-direct {p0, p2}, Landroid/os/Handler;-><init>(Landroid/os/Looper;)V
return-void
.end method
# virtual methods
.method public handleMessage(Landroid/os/Message;)V
.locals 12
.parameter "msg"
.prologue
const/4 v5, -0x1
iget-object v1, p0, Landroid/content/AsyncQueryHandler$WorkerHandler;->this$0:Landroid/content/AsyncQueryHandler;
iget-object v1, v1, Landroid/content/AsyncQueryHandler;->mResolver:Ljava/lang/ref/WeakReference;
invoke-virtual {v1}, Ljava/lang/ref/WeakReference;->get()Ljava/lang/Object;
move-result-object v0
check-cast v0, Landroid/content/ContentResolver;
.local v0, resolver:Landroid/content/ContentResolver;
if-nez v0, :cond_0
:goto_0
return-void
:cond_0
iget-object v6, p1, Landroid/os/Message;->obj:Ljava/lang/Object;
check-cast v6, Landroid/content/AsyncQueryHandler$WorkerArgs;
.local v6, args:Landroid/content/AsyncQueryHandler$WorkerArgs;
iget v11, p1, Landroid/os/Message;->what:I
.local v11, token:I
iget v9, p1, Landroid/os/Message;->arg1:I
.local v9, event:I
packed-switch v9, :pswitch_data_0
:goto_1
iget-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->handler:Landroid/os/Handler;
invoke-virtual {v1, v11}, Landroid/os/Handler;->obtainMessage(I)Landroid/os/Message;
move-result-object v10
.local v10, reply:Landroid/os/Message;
iput-object v6, v10, Landroid/os/Message;->obj:Ljava/lang/Object;
iget v1, p1, Landroid/os/Message;->arg1:I
iput v1, v10, Landroid/os/Message;->arg1:I
invoke-virtual {v10}, Landroid/os/Message;->sendToTarget()V
goto :goto_0
.end local v10 #reply:Landroid/os/Message;
:pswitch_0
:try_start_0
iget-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->uri:Landroid/net/Uri;
iget-object v2, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->projection:[Ljava/lang/String;
iget-object v3, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->selection:Ljava/lang/String;
iget-object v4, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->selectionArgs:[Ljava/lang/String;
iget-object v5, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->orderBy:Ljava/lang/String;
invoke-virtual/range {v0 .. v5}, Landroid/content/ContentResolver;->query(Landroid/net/Uri;[Ljava/lang/String;Ljava/lang/String;[Ljava/lang/String;Ljava/lang/String;)Landroid/database/Cursor;
move-result-object v7
.local v7, cursor:Landroid/database/Cursor;
if-eqz v7, :cond_1
invoke-interface {v7}, Landroid/database/Cursor;->getCount()I
:try_end_0
.catch Ljava/lang/Exception; {:try_start_0 .. :try_end_0} :catch_0
:cond_1
:goto_2
iput-object v7, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->result:Ljava/lang/Object;
goto :goto_1
.end local v7 #cursor:Landroid/database/Cursor;
:catch_0
move-exception v1
move-object v8, v1
.local v8, e:Ljava/lang/Exception;
const-string v1, "AsyncQuery"
invoke-virtual {v8}, Ljava/lang/Exception;->toString()Ljava/lang/String;
move-result-object v2
invoke-static {v1, v2}, Landroid/util/Log;->w(Ljava/lang/String;Ljava/lang/String;)I
const/4 v7, 0x0
.restart local v7 #cursor:Landroid/database/Cursor;
goto :goto_2
.end local v7 #cursor:Landroid/database/Cursor;
.end local v8 #e:Ljava/lang/Exception;
:pswitch_1
:try_start_1
iget-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->uri:Landroid/net/Uri;
iget-object v2, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->values:Landroid/content/ContentValues;
invoke-virtual {v0, v1, v2}, Landroid/content/ContentResolver;->insert(Landroid/net/Uri;Landroid/content/ContentValues;)Landroid/net/Uri;
move-result-object v1
iput-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->result:Ljava/lang/Object;
:try_end_1
.catch Landroid/database/SQLException; {:try_start_1 .. :try_end_1} :catch_1
goto :goto_1
:catch_1
move-exception v1
move-object v8, v1
.local v8, e:Landroid/database/SQLException;
invoke-virtual {v8}, Landroid/database/SQLException;->printStackTrace()V
const/4 v1, 0x0
iput-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->result:Ljava/lang/Object;
goto :goto_1
.end local v8 #e:Landroid/database/SQLException;
:pswitch_2
:try_start_2
iget-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->uri:Landroid/net/Uri;
iget-object v2, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->values:Landroid/content/ContentValues;
iget-object v3, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->selection:Ljava/lang/String;
iget-object v4, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->selectionArgs:[Ljava/lang/String;
invoke-virtual {v0, v1, v2, v3, v4}, Landroid/content/ContentResolver;->update(Landroid/net/Uri;Landroid/content/ContentValues;Ljava/lang/String;[Ljava/lang/String;)I
move-result v1
invoke-static {v1}, Ljava/lang/Integer;->valueOf(I)Ljava/lang/Integer;
move-result-object v1
iput-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->result:Ljava/lang/Object;
:try_end_2
.catch Landroid/database/SQLException; {:try_start_2 .. :try_end_2} :catch_2
goto :goto_1
:catch_2
move-exception v1
move-object v8, v1
.restart local v8 #e:Landroid/database/SQLException;
invoke-virtual {v8}, Landroid/database/SQLException;->printStackTrace()V
invoke-static {v5}, Ljava/lang/Integer;->valueOf(I)Ljava/lang/Integer;
move-result-object v1
iput-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->result:Ljava/lang/Object;
goto :goto_1
.end local v8 #e:Landroid/database/SQLException;
:pswitch_3
:try_start_3
iget-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->uri:Landroid/net/Uri;
iget-object v2, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->selection:Ljava/lang/String;
iget-object v3, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->selectionArgs:[Ljava/lang/String;
invoke-virtual {v0, v1, v2, v3}, Landroid/content/ContentResolver;->delete(Landroid/net/Uri;Ljava/lang/String;[Ljava/lang/String;)I
move-result v1
invoke-static {v1}, Ljava/lang/Integer;->valueOf(I)Ljava/lang/Integer;
move-result-object v1
iput-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->result:Ljava/lang/Object;
:try_end_3
.catch Landroid/database/SQLException; {:try_start_3 .. :try_end_3} :catch_3
goto :goto_1
:catch_3
move-exception v1
move-object v8, v1
.restart local v8 #e:Landroid/database/SQLException;
invoke-virtual {v8}, Landroid/database/SQLException;->printStackTrace()V
invoke-static {v5}, Ljava/lang/Integer;->valueOf(I)Ljava/lang/Integer;
move-result-object v1
iput-object v1, v6, Landroid/content/AsyncQueryHandler$WorkerArgs;->result:Ljava/lang/Object;
goto/16 :goto_1
nop
:pswitch_data_0
.packed-switch 0x1
:pswitch_0
:pswitch_1
:pswitch_2
:pswitch_3
.end packed-switch
.end method
|
William K. Lanman
Colonel William Kelsey Lanman Jr., (October 9, 1904 - March 27, 2001) was a notable benefactor of Yale University. He served as an aviator in the United States Marine Corps from 1935 to 1955, and later took up real estate and investment management.
His father, William K. Lanman Sr., was chairman of the Columbus Bolt Company in Ohio. William K. Lanman Jr. graduated from Yale University in 1928 (B.S. from Sheffield Scientific School), as had his ancestor United States Senator James Lanman, who graduated from Yale College in 1788. Colonel Lanman's two brothers graduated from Yale College: Henry Reese Lanman in 1932, and Jonathan Trumbull Lanman in 1940 and from the Yale School of Medicine in 1943. Colonel Lanman was a member of St. Anthony Hall.
Naval career
Lanman was also a United States Naval Aviator, graduating from the Naval Aviation School in 1931. He served in the Pacific theater during World War II, with South Pacific Combat Air Transport Command (SCAT) where he was executive officer of the legendary World War II "Flying Boxcar" SCAT squadron. He won the Distinguished Flying Cross, four Air Medals, a Bronze Star and a U.S. Navy Commendation for action in the Solomon Islands campaigns. In 1949 he was commissioned Colonel.
Yale Benefactor
Lanman made a series of major gifts to Yale, reported to total $40 million. He funded major renovation projects and endowed several chairs, in Economics, Sociology, Computer Science, International Studies, and Anthropology and International Affairs. In addition, Lanman was the major donor supporting the university's Tercentennial celebration in 2001.
In 1974, he made a gift of John Trumbull's painting "Lady of the Lake, from Scott's The Lady of the Lake" c. 1811, to the Yale University Art Gallery.
Lanman was awarded the Yale Medal in 1996.
Colonel Lanman died on March 26, 2001, the 300th anniversary year of the founding of Yale.
He was survived by his sister, Harriet Lanman Fulton, and his friend, Isabel Pollen. Colonel Lanman was buried in Arlington National Cemetery.
Of interest, Lanman's childhood home at West Fifth and Roxbury Road in Columbus, Ohio was just around the corner from that of his friend, Prescott Sheldon Bush, who also attended Yale as did his son U. S. President George H. W. Bush and grandson, U. S. President George W. Bush.
Commemoration at Yale
Lanman-Wright Hall in Old Campus
William K. Lanman Jr. Center at Payne Whitney Gymnasium
William K. Lanman Jr. Professor of Computer Science and Mathematics
William K. Lanman Jr. Professor of Economics
See also
References
Category:1904 births
Category:2001 deaths
Category:American philanthropists
Category:Yale School of Engineering & Applied Science alumni
Category:Benefactors of Yale University
Category:United States Marine Corps officers
Category:Recipients of the Distinguished Flying Cross (United States)
Category:Burials at Arlington National Cemetery
Category:Recipients of the Air Medal
Category:Yale College alumni
Category:20th-century philanthropists
|
1. Field of the Invention
The present invention relates generally to a data processing system. More particularly, the present invention is directed to a computer implemented method, apparatus, and computer-usable program code for preserving file locks while moving a software partition from one NFS client data processing system to a another NFS client data processing system.
2. Description of the Related Art
A workload partition (WPAR) is a software partition that provides isolation of software services, applications, and administration by utilizing flexible software-defined boundaries within a single instance of an operating system. This means each WPAR will run its own copy of user space programs but share the kernel (operating system) with the rest of the WPARs and the global operating system. User space is not part of a kernel. A software partition has the look and feel of a stand-alone system. The software partition can be booted, accessed, and shutdown like a stand-alone data processing system. Normally, for such partitions, the file system data is stored on the local hard disks.
For the sake of mobility of software partitions that can be checkpointed on one data processing system and restarted on another, the entire file system has to reside on a remote data processing system, such as, for example, on a network file system (NFS) server. A network file system is a type of file system. An NFS server is the data processing system, which holds the NFS files. The NFS files are accessed by NFS client, which is a data processing system that accesses the data stored on the NFS server. The NFS protocol is the protocol used by the NFS client and The NFS server to communicate. Checkpointing is a method for saving the state of a running process so that it may be restarted at a later time. To preserve data integrity, as a software partition is moved from one data processing system to another, the state of the file locks on the remote file system has to be moved as well. Currently, checkpointing the file lock information from a source data processing system and restoring the file lock information on a target data processing system is extremely complicated or even impossible.
|
Q:
Probability of Stock breaching barrier
If a stock has a process: $dS(t) = sigma*dB(t)$, where $B(t)$ is a standard Brownian motion, and current stock price is $S(0)$. There is a barrier $H>S(0)$. What is the probability that the stock price will breach $H$ before time $T (T>0)$?
A:
You can use the reflection principle to solve this problem.
First you calculate the probability that the Stock will be above the barrier at time T. i.e. $P(S_T > H) = blabla$ (which is easy to calculate since it is just normally distributed). Then via the reflection principle you know that the probability of crossing the barrier between time 0 and T is 2x as big, i.e. $2 blabla$.
https://en.wikipedia.org/wiki/Reflection_principle_(Wiener_process)
|
IN THE COURT OF APPEALS OF THE STATE OF MISSISSIPPI
NO. 2018-CC-00206-COA
CHRISTIAN SHRIVER AND MICHELLE APPELLANTS
SHRIVER
v.
BOYD BILOXI LLC D/B/A IP CASINO RESORT APPELLEE
SPA
DATE OF JUDGMENT: 01/18/2018
TRIAL JUDGE: HON. LISA P. DODSON
COURT FROM WHICH APPEALED: HARRISON COUNTY CIRCUIT COURT,
SECOND JUDICIAL DISTRICT
ATTORNEY FOR APPELLANTS: MARVIN M. VINING
ATTORNEY FOR APPELLEE: KATHRYN H. HESTER
NATURE OF THE CASE: CIVIL - STATE BOARDS AND AGENCIES
DISPOSITION: AFFIRMED - 01/08/2019
MOTION FOR REHEARING FILED:
MANDATE ISSUED:
EN BANC.
GREENLEE, J., FOR THE COURT:
¶1. Christian and Michelle Shriver appeal the decision of the Harrison County Circuit
Court, which affirmed the decision of the Mississippi Gaming Commission (the
Commission). The Commission adopted its Hearing Examiner’s determination that the
Commission’s Executive Director properly found that the Shrivers were not entitled to the
redemption of their vouchers by Imperial Palace Casino Resort Spa (IP Casino). On appeal,
the Shrivers assert that: (1) the Executive Director exceeded his statutory authority in
allowing IP Casino’s internal rules to determine whether the Shrivers’ vouchers were
expired; (2) the Commission does not have jurisdiction over their dispute; (3) the Shrivers
are not bound by the patron-dispute process; (4) the Commission’s Executive Director does
not have jurisdiction over common-law tort claims; and (5) there are strong policy reasons
as to why the Commission’s Executive Director should not be allowed to exceed its statutory
authority. We affirm the circuit court’s judgment.
FACTS AND PROCEDURAL HISTORY
¶2. Christian and Michelle Shriver are a married couple. The husband was an unemployed
engineer who made his living by gambling in 2012 and 2013. He placed nearly $3 million
into IP Casino slot machines during that time and had net gains of over $110,000. At the
same time, the wife placed approximately $3.5 million into IP Casino slot machines and had
net gains of over $170,000.
¶3. The couple received more than $41,000 of those gains in twenty-one individual slot
vouchers but failed to redeem those vouchers within the sixty-day expiration date for
“personal reasons.” Each voucher had printed on its face, “Ticket void after 60 days,” or a
variation of that phrase.
¶4. When they attempted to redeem the vouchers in April 2015, IP Casino initially refused
to honor them because the casino was unable to verify their legitimacy due to a change in
casino machinery in 2013. After an internal investigation, IP Casino deemed that the
vouchers were legitimate but still refused to honor them; this time because they had expired
long before the attempted redemption.
¶5. The Shrivers then filed a patron dispute with the Commission as provided by
Mississippi Code Annotated section 75-76-157 (Rev. 2000). After the Commission’s
2
investigation, its Executive Director found that the Shrivers were not entitled to the
redemption:
After carefully reviewing the Shriver’s complaint and the accompanying
investigative file prepared by the Mississippi Gaming Commission, I have
concluded that the cashout vouchers and procedures in question comply with
both the requirements set forth in 13 Mississippi Administrative Code Part 7,
Rule 9.7, as well as the casino’s own internal policy. Therefore, they are not
entitled to collect the disputed $41,317.43.
¶6. Next, the Shrivers filed a petition requesting a hearing to reconsider the Executive
Director’s findings. The Hearing Examiner also found that IP Casino had complied with
applicable Mississippi law in denying the Shrivers’ attempted redemption:
The Mississippi Gaming Commission retains exclusive jurisdiction over this
matter pursuant to Miss. Code Ann. § 75-76-157(2), as Petitioners’ claim
springs directly from IP Casino’s failure to pay gaming debts not evidenced by
a credit instrument. The Hearing Examiner is certainly sympathetic to the
predicament Petitioners now find themselves in related to the expired
vouchers. Notwithstanding, IP Casino complied with 13 Miss. Admin. Code
Pt. VII, R. 9.7, as properly promulgated by the Commission, and the expiration
date was clearly printed on each voucher. Petitioners knew the vouchers had
expiration dates and multiple options were available to Petitioners for timely
redeeming the vouchers. Unfortunately, Petitioners elected not to utilize any
of these available options for more than two years. Accordingly, Petitioners
have failed to meet their burden of showing that the Executive Director’s
decision was incorrect in this matter.
Based upon the foregoing, the Hearing Examiner finds that the Executive
Director’s decision in favor of IP Casino should be, and hereby is, affirmed.
¶7. After the Shrivers chose not to seek review of the Hearing Examiner’s decision within
the ten-day window under Mississippi Code Annotated section 75-76-119 (Rev. 2000), the
Commission declined to review the decision and adopted the findings.
¶8. The Shrivers appealed, and the Harrison County Circuit Court reviewed the
3
Commission’s decision under Mississippi Code Annotated section 75-76-171(3) (Rev. 2000).
The circuit court affirmed the Commission’s decision to decline to review the Hearing
Examiner’s decision:
[The Shrivers] challenge only the jurisdiction and the statutory authority of the
Executive Director. The Hearing Examiner found that the dispute in this case
was over a gaming debt. That is supported by the evidence as well as the
provisions of the statutes. . . . The IP Internal Control at issue in this case was
so approved [under Rule 9.1]. That Internal Control provides that the vouchers
are of no value once the sixty (60) days elapses. The only discretion that IP has
is to pay an expired voucher for appeasement purposes. It is not required to
pay any expired voucher. The Shrivers have failed to establish that the decision
and order of the Commission has prejudiced the substantial rights of the
Shrivers by either a lack of jurisdiction or by any exceeding of statutory
authority.
¶9. The Shrivers appeal the circuit court’s decision, asserting that: (1) the Executive
Director exceeded his statutory authority by allowing IP Casino’s internal rules to determine
whether the Shrivers’ vouchers were expired; (2) the Commission does not have jurisdiction
over their dispute; (3) the Shrivers are not bound by the patron-dispute process; (4) the
Commission’s Executive Director does not have jurisdiction over common-law tort claims;
and (5) there are strong policy reasons as to why the Commission’s Executive Director
should not be allowed to exceed its statutory authority.
STANDARD OF REVIEW
¶10. Our supreme court has recently abandoned the old standard of review that gave high
deference to agency interpretations of statutes. King v. Mississippi Military Dep’t, 245 So.
3d 404, 408 (¶12) (Miss. 2018). “Because only statutes are at issue in the case sub judice, we
today address the standard of review only as it applies to agency interpretations of statutes.”
4
Id. at 407 (¶9). Therefore, this court will proceed with the proper de novo standard of review
instead.
DISCUSSION
¶11. The Mississippi Gaming Control Act of 1990 (the Act) is codified from section 75-76-
1 to section 75-76-325 of the Mississippi Code Annotated. The Act authorized the creation
of the Mississippi Gaming Commission (the Commission), as well as enumerated the powers
of the Commission’s Executive Director. Miss. Code Ann. § 75-76-7(2) (Rev. 2016); Miss.
Code Ann. § 75-76-21 (Rev. 2016). The statutes authorize the Executive Director to retain
significant authority in overseeing internal casino procedures and disputes with casino
customers.
I. Did the Executive Director exceed his authority by allowing IP
Casino’s internal rules to determine whether the Shrivers’
vouchers were expired?
¶12. The Shrivers assert that the Executive Director of the Commission exceeded his
statutory authority by allowing IP Casino’s internal rules to determine whether the Shrivers’
vouchers were expired. IP Casino argues that the Commission was authorized to promulgate
Rule 9.7 and the Executive Director was authorized to find that IP Casino’s actions complied
with that regulation.
¶13. When the Mississippi Legislature authorized the creation of the Commission under
section 75-76-7(2) of the Mississippi Code Annotated, it also detailed the powers of the
Commission’s Executive Director. Miss. Code Ann. § 75-76-21. The Executive Director is
authorized to “direct and supervise all administrative and technical activities of the
5
commission . . . .” Miss. Code Ann. § 75-76-23 (Rev. 2016). One of the activities with which
the Commission is charged is the regulation of games and wagering systems. Miss. Code
Ann. § 75-76-51 (Rev. 2016) (“The commission shall adopt regulations which prescribe the
manner in which winnings, compensation from games and gaming devices, and gross
revenue must be computed and reported by the licensee.”).
¶14. Some of the Commission’s adopted rules include requiring that casinos use only chips
and tokens approved by the Executive Director and setting standards for slot machines. 13
Miss. Admin. Code Pt. 7, Ch. 7, R. 7.1 (2011) (“All games shall be conducted only with the
use of chips or approved tokens or other instrumentalities which have been approved by the
Executive Director, or with lawful currency or coinage of the United States of America.”);
13 Miss. Admin. Code Pt. 7, Ch. 7, R. 9.1 (2011) (detailing “minimum procedures or
standards, prescribed by the Executive Director for adoption by each licensee . . .”). The most
pertinent rules here, however, are Rules 9.7(a) and 9.7(b), which say:
(a) Slot Machine Wagering Vouchers are bar coded vouchers created through
a cashless wagering system which allows collective hardware, software,
communications technology, and other associated equipment to facilitate
wagering. The bar coded voucher can be redeemed at the casino cage, voucher
redemption kiosk, or inserted into a compatible slot machine. Vouchers
redeemed must be validated through the cashless wagering system prior to
payment.
(b) Each voucher must contain the following printed information: 1. licensee
name, city and state; 2. slot machine number or printer station number, as
applicable; 3. date and time of issuance; 4. alpha and numeric dollar amount;
5. sequence number; 6. validation number; 7. second printing of validation
number on the leading edge of the voucher; 8. unique identifier (e.g. bar code);
9. transaction type or other acceptable method of differentiating voucher type;
and 10. expiration period or date when the voucher will expire.
6
13 Miss. Admin. Code Pt. 7, Ch. 7, R. 9.7(a)-(b) (2011). Clearly, the Commission requires
casino vouchers to contain “expiration period[s] or date[s] when the voucher[s] will expire.”
¶15. The vouchers that the Shrivers submitted meet these requirements. Plainly and on the
face of the vouchers are expiration dates:
IP Casino’s vouchers adhere to the requirements promulgated by the Executive Director.
Furthermore, the promulgation of these requirements is completely within the Executive
Director’s statutory authority. As the circuit court noted in its order, “[t]he Shrivers’
challenge to the Internal Control concerning vouchers is not really that there was no authority
for its approval; they merely complain about its terms.”
¶16. Therefore, we affirm the circuit court’s decision and find that the Executive Director
did not exceed his statutory authority.
II. Does the Commission have jurisdiction over the Shrivers’ dispute?
¶17. The Shrivers argue that our supreme court in Ameristar Casino Vicksburg Inc. v.
Duckworth, 990 So. 2d 758 (Miss. 2008), limited the jurisdiction of the Commission over
patron disputes to “gaming debts,” which was only later statutorily expanded to include
7
patron disputes over “promotional activity.” Therefore, they assert the Duckworth court
distinguished and effectively overruled Grand Casino Tunica v. Shindler, 772 So. 2d 1036
(Miss. 2000). Furthermore, they assert their case does not fall within the Commission’s
jurisdiction because it is not “a dispute between a licensee and a patron associated with
promotional activity.” IP Casino responds that both Duckworth and Shindler recognize that
the Commission is “the exclusive venue for seeking payment of a gambling debt.” They
agree that the vouchers were not a promotional activity, the expiration dates are mandated
by statute, and it is within IP Casino’s discretion to pay or not pay expired vouchers.1
Therefore, they assert that the dispute is under the Commission’s jurisdiction.
¶18. The Act bestows upon the Commission’s Executive Director certain powers. Miss.
Code Ann. § 75-76-21. Specifically, it authorizes him to resolve disputes between patrons
and casinos:
A claim by a patron of a licensee for payment of a gaming debt not evidenced
by a credit instrument, and a dispute between a licensee and a patron
associated with a promotional activity as defined in Section 75-76-5(nn), shall
be resolved by the executive director in accordance with Sections 75-76-159
through 75-76-165, inclusive. The resolution of such a claim or dispute by the
executive director shall include any claims for alleged winnings or losses . . . .
Miss. Code Ann. § 75-76-157(2).
¶19. We agree that the dispute over the vouchers is not over “promotional giveaways.”
Duckworth, 990 So. 2d at 760 (¶10) (Miss. 2008) (holding that “random drawing clearly is
not ‘played with cards, with dice, or with any . . . device or machine for money . . . ,’ and
therefore, does not fall under the definition of a ‘game’ or ‘gambling’ as per [the Act]”).
1
For clarity, we have combined issues two and three of the Shrivers’ brief.
8
Rather, the vouchers exist by virtue of the Shrivers’ gambling activities. They were created
by a machine for money, and per the Mississippi Supreme Court’s holding in Duckworth,
cannot be “promotional giveaways.” The vouchers qualify as “gaming debts,” and the
Mississippi Code Annotated hands the Executive Director jurisdiction over disputes on
“gaming debts.” Therefore, we affirm the circuit court’s holding that jurisdiction was proper.
III. Are the Shrivers bound by the patron-dispute process?
¶20. On appeal, the Shrivers argue that they should be free to file a civil suit against IP
Casino and not be bound by the patron-dispute process governed by the Commission. IP
Casino contends that Shindler holds that a party cannot initiate the patron-dispute process and
then seek relief in circuit court. IP Casino argues, therefore, that the Shrivers are estopped
from filing a separate civil suit in Harrison County Circuit Court.
¶21. In its order, the circuit court wrote the following:
[I]t is first noted that it was the Shrivers themselves who invoked the
jurisdiction of the Commission. They initiated this matter by filing the patron
dispute information pursuant to gaming statutes. They participated in the
investigation of this matter by an Agent of the Commission. . . . The Shrivers
have consistently sought to avail themselves of the remedies provided by the
statutes and regulations adopted pursuant to the gaming statutes on the one
hand, but contest that very same jurisdiction on the other. They cannot have it
both ways.
¶22. We agree. The Shrivers want two bites at the apple, just in different venues. “The
Mississippi Gaming Control Act codified the idea by making all gaming matters the
exclusive jurisdiction of the Mississippi Gaming Commission.” Shindler, 772 So. 2d at 1038
(¶10). In that codification, “[t]he Legislature gave the public a right that they had not
possessed before, but with this right came the requirement that gaming matters be handled
9
by the Mississippi Gaming Commission.” Id. And because “[i]t is a fundamental principle
that parties may not continually relitigate the same claims until they get the desired result,”
Id. at 1039 (¶14), the Shrivers are bound by the patron-dispute process. We affirm the circuit
court’s judgment.
IV. Does the Commission’s Executive Director have jurisdiction over
common-law tort claims?
¶23. The Shrivers argue that their constitutional right to trial by jury in this case is
fundamental. Because it is well established in Mississippi that tort and fraud causes of action
require a jury trial, e.g., Isaac v. McMorris, 461 So. 2d 714, 715 (Miss. 1984), they argue that
this Court should allow the Shrivers to seek a jury trial in this case. IP Casino responds that
the Mississippi Supreme Court rejected the constitutional claim of the right to a jury trial in
Shindler, holding that the Gaming Control Act gives patrons a right they would not otherwise
have had because a claim based on gambling in Mississippi is illegal and void at common
law.
¶24. The Shrivers are correct in their assertion that “a civil plaintiff has a constitutional
right to a jury trial.” Shindler, 772 So. 2d at 1040. But this dispute is related to gambling
activities. And our legislature created a legal forum that allows them to seek redress where
before they had none. The jurisdiction of the Commission is proper and the circuit court’s
judgment is affirmed.
V. Are there strong policy reasons as to why the Commission’s
Executive Director should not be allowed to exceed its statutory
authority?
¶25. The Shrivers argue that because the Commission is funded by casino fees and not by
10
taxpayers—as required by the Act—there is no oversight and patrons’ rights are violated. IP
Casino argues that the current structure is statutorily authorized.
¶26. After examination of the Shrivers’ brief, we conclude that they failed to provide any
statutory provision or caselaw in support of their public-policy argument. In this case, the
Executive Director did not exceed its authority. The Shrivers’ policy argument is better suited
for the Legislature to address than this Court.
CONCLUSION
¶27. We affirm the circuit court’s judgment and find that: (1) the Executive Director did
not exceed its statutory authority in allowing IP Casino’s internal rules to determine whether
the Shrivers’ vouchers were expired; (2) the Commission has jurisdiction over their dispute
because IP Casino’s vouchers were a gaming debt; (3) the Shrivers are bound by the patron-
dispute process; (4) the Shrivers’ dispute is not a common-law tort claim; and (5) the
Shrivers’ policy argument is not supported by statutory provision or caselaw.
¶28. AFFIRMED.
GRIFFIS, C.J., BARNES AND CARLTON, P.JJ., WILSON, WESTBROOKS
AND TINDELL, JJ., CONCUR. McDONALD, LAWRENCE AND McCARTY, JJ.,
NOT PARTICIPATING.
11
|
There’s been past talk of a pairing between Sprint and Deutsche Telekom’s T-Mobile but nothing has happened. Many observers say such as transaction would be as disastrous as the Sprint-Nextel merger because Sprint runs a CDMA network while T-Mobile uses GSM.
However, after Citigroup raised Sprint’s ratings to Buy from Hold, there are many speculations about if Sprint should merge with T-Mobile USA to compete with AT&T and Verizon Wireless.
Michael Rollins, a Citigroup analyst, sees a 55% chance of a deal that combines Sprint and T-Mobile in 2010; he thinks the key would be to simply move Sprint’s customers to T-Mobile’s networks, and eliminate the multiple networks that Sprint operates.
Why Rollins upgrade Sprint’s Ratting ? First, he said, it looks as though Sprint will stem some of its subscriber losses over the next six months; the nation’s third-largest wireless operator has bled thousands of users for the past several quarters, the potential for the company to generate OIBDA (operating income before depreciation and amortization) above Street expectations and the possibility that it will consolidate operations with T-Mobile USA. Rollins thinks Sprint and T-Mobile USA will merge within the next year. The probability, he wrote in a client memo, “has risen to around 55 percent.”
Additionally : “While the integration would be highly complex, we believe a combination could substantially increase the company’s scale for spectrum, provide a combined path to 4G and LTE services through Clearwire [Sprint, of course, is the largest holder in Clearwire], increase subscriber scale for [T-Mobile's] 3G network and provide substantial cost savings,”
“At this stage the Sprint Buy call is about operational improvement primarily, and to the extent that it relates to possible future consolidation, we are dealing in probabilities only,” Sinclair writes. He maintains a Buy rating on DT.
|
Site Mobile Navigation
Spitzer Asks State Senator From Harlem to Join Ticket
Attorney General Eliot Spitzer, a Democratic candidate for governor this year, has asked State Senator David A. Paterson of Manhattan to be his running mate, and Mr. Paterson has agreed, according to Democrats close to Mr. Spitzer.
The unusually early selection of a lieutenant governor candidate carries several political benefits for Mr. Spitzer, and some potential risks. It could also portend a political power shift in the Senate, where Mr. Paterson has been the Democratic minority leader since 2002. If he were elected in November, another Democrat would take the Senate post at the start of a new era of power after 12 years of Republican rule under Gov. George E. Pataki.
Respected and popular in the party, the 51-year-old Mr. Paterson is widely regarded as a smart political tactician who helped Democrats pick up seats in the Senate in the 2002 elections.
As the highest ranking African-American in state government, he would also help solidify Mr. Spitzer's support among minority voters, a crucial demographic group in any fight for the Democratic Party nomination. Mr. Spitzer may face such a fight if, as many expect, Nassau County Executive Thomas R. Suozzi decides to vie for the nomination in the September primary.
Mr. Paterson's history may intrigue some voters: He is legally blind, born with no sight in his left eye and severely limited vision in his right. On the campaign trail he has recalled being "the first legally disabled person to attend public schools" in his district. Today he plays basketball and has run in the New York City marathon. He has also become a master of legislative politics despite being unable to read the body language of his rivals, an art form in Albany.
Yet the choice increases the possibility that the Democratic ticket in 2006 will be dominated by New York City politicians, forgoing the geographic diversity that both political parties tend to value. Mr. Spitzer lives on the Upper East Side; Mr. Paterson represents Harlem and the Upper West Side; State Comptroller Alan Hevesi is from Queens; and several candidates for attorney general are from the city or suburbs, such as Andrew M. Cuomo, Mark Green, Charlie King, and Assemblyman Richard L. Brodsky.
"I think it's a real problem not to have some geographic balance on the ticket, and I don't think that it helps their gubernatorial chances not to have a geographic balance," said George Arzt, a veteran communications and political consultant in the city. "The last time that balance was absent was 1970, and that ticket ended in defeat."
That year, the four Democrats on the ticket were all downstate candidates; three of them were Jewish, and the fourth was Basil A. Paterson - Mr. Paterson's father.
In a statewide campaign that has several candidates running as Albany outsiders, Mr. Paterson's insider credentials might also re-enforce the same image for Mr. Spitzer, who has been attorney general for seven years. Mr. Paterson has been a strong voice for change in the State Senate, as well as a critic and a friend to the Republican majority leader, Joseph L. Bruno.
By tapping Mr. Paterson, Mr. Spitzer also gives his political opponents another target to attack. Mr. Suozzi has made clear that if he runs, a part of his platform will be overhauling the state government that Mr. Paterson has helped lead.
Candidates for governor typically choose running mates around the time of the parties' spring conventions, which are in late May this year. Several other Democrats are running for lieutenant governor already, but the Spitzer camp was eager to move on the Paterson choice and elevate him as their de facto nominee.
- Would one result be to swing attention in the attorney general's race to an upstate Democratic candidate, Denise O'Donnell of Buffalo, a former prosecutor who Mr. Spitzer is said to admire?
Ms. O'Donnell, in an interview today, hailed Mr. Paterson as "a tremendous asset to the ticket" and said she would welcome the chance to add balance, as a woman from Buffalo, to a Spitzer-Paterson-Hevesi ticket.
"I do think it's important that a ticket reflect the entire Democratic Party, and being from upstate, being a woman, is helpful in the race," said Ms. O'Donnell, a former United States attorney for the Western District of New York in the Clinton administration. "But the truth of the matter is that I'm running because I believe I have the best qualifications for attorney general."
Advisers to Mr. Spitzer said today that the decision was based solely on his appreciation for Mr. Paterson's skills and background, his reform agenda in the Senate, and their personal friendship.
"David has solid reform credentials and is someone who will be a real partner with Eliot," said one Democrat close to Mr. Spitzer. "Eliot loves David and considers him a breath of fresh air. He thinks he's bright and capable, with a personal story that's compelling. Eliot's also really comfortable with him. It makes sense on a lot of levels."
Mr. Paterson was not immediately available for comment this afternoon.
Mr. Paterson is a member of a prominent Harlem political family. His father Basil, a former state senator and secretary of state, helped build the Harlem Clubhouse, which has been a force in New York Democratic politics.
In an interesting twist, Mr. Paterson's father has already endorsed another candidate for lieutenant governor: Leecia Eve, a former aide to Senator Hillary Rodham Clinton and a daughter of Arthur O. Eve, a former deputy speaker of the State Assembly. Basil A. Paterson made the endorsement in October along with other members of the Harlem Clubhouse. The senior Mr. Paterson did not immediately return a phone call seeking comment.
Other Democrats planning to run for lieutenant governor are John Cohen, a surgeon who advised John Kerry's presidential campaign, and Assemblyman Thomas P. DiNapoli, of Thomaston.
|
Aponte, Selmquist & Castrogivanni Win on Day Two of NEC's
W. LONG BRANCH, NJ (May 5, 2013) - The Sacred Heart women's track and field team took home four first place finishes at the 2013 Northeast Conference Outdoor Track & Field Championships over the weekend as the Pioneers finished third in the 12 team field.
SHU senior Alyssa Selmquist (Northford, CT) followed up her NEC record-breaking win in the 10,000 meters on Saturday by winning the gold in the 5,000 meters on Sunday. Selmquist came home with the top spot after running a season-best mark of 16:56.33, easily meeting the ECAC championship standard.
Fellow junior Brianna Castrogivanni (Commack, NY) opened Sunday's events the same way Selmquist did on Saturday, setting a new Northeast Conference record. Castrogivanni took the gold in the 3,000 meter steeplechase on Sunday, earning her a third NEC Title after winning the 3,000 and 5,000 at the indoor championship. Castrogivanni clocked in at 10:35.47, breaking the record of 10:58.29 set by Quinnipiac's Morgan Roche.
Junior Lindsay Aponte (West Islip, NY) successfully defended her NEC indoor shot put title by winning on day twoJoining Aponte in the points in the shot put was freshman Adaora Nwodili (Coram, NY) who finished sixth overall with a throw of 42'2.75", her best throw of the spring season.
Senior Michelle Navarro (Piscataway, NJ) took home third place in the steeplechase, easily posting her best time of the spring at 10:48.36. Her time met the ECAC Championship qualifying standard.
Junior Seanne Denny (Randolph, NJ) finished fifth in the 100 meter dash with a clocking of 12.48 seconds. In the 400 meters, junior Katelyn Racanelli (Riverside, CT) took home a fourth place finish with a time of 56.02 seconds.
On Saturday, Selmquist broke a record that stood since 2007's title meet in winning an event she led on the NEC performance list entering the weekend. The senior clocked in with a time of 36:05.40 to break the previous record of 36:19.44, set by Taryn Gibson of Saint Francis U in 2007. Selmquist finished second at in this event at last spring's league meet.
In the field events, Sara Isaacson (Aberdeen, NJ) took fourth in the pole vault with her best vault of the outdoor season, clearing a height of 10'6.75". Sophomore Dylan Baker (Petersham, MA) earned points for SHU in the long jump, finishing eighth with a leap of 17'2.00".
The Monmouth Hawks won their fifth-straight Northeast Conference title on Sunday, piling up 218 total points over the 21 scored events to best the field. Saint Francis U took second with 86 points, edging out the Pioneers in third with 83 total points.
Next up for the Pioneer track and field teams is the New England and ECAC Championships being held next weekend.
|
Q:
Best pattern to handle null pointer exception
I am looking for best pattern to handle NPE(Null Pointer Exception).
I am using retrofit for web api calls, but some times there may chance that some fields might be null, or that might be chance of null array too.
What i am looking for, is there any way to handle all in just once?.
E.g.
Model Class
public class ModelClass{
String name;
String email;
List<Items> items;
}
JSON File
{
name:null,
email:"[email protected]",
Items:[]
}
So after deserializing json file, when i try to setText to textview object.getName() it will through NPE
I have very large collection of model class, and practically it is wrong to put each field in try{}catch() while using it.
Is there a better way to handle this kind of scenario?.
A:
I would wrap it around an Optional. This will force you to decide at compile time what to do if the value is null.
Optional<String> optionalName = Optional.ofNullable(person.getName());
You can then decide to, for example:
Specify a default value: String name = optionalName.orElse("Bob");
Throw an exception of your choosing: String name = optionalName.orElseThrow(() -> new IllegalArgumentException("Invalid name"));
|
3.
-59
What is 27 - 28 - ((17 - 7) + 0) - -60?
49
Calculate 2 + ((-6 - -60) + -24 - (1 - 14)).
45
What is the value of 134 - 158 - (-14 + 25 + 17)?
-52
What is the value of -23 - (9 - ((22 - 31) + 1))?
-40
What is -9 + 66 + -163 - 13?
-119
Calculate 68 - (-45 + 48 - -1).
64
Evaluate 76 - (130 + -129 - (-32 - 2)).
41
What is the value of -1 - -11 - (53 - (117 - 75))?
-1
18 - (-40 - -59) - (-51 + 6)
44
Calculate (-160 - -251) + -151 - (-3 + 12 + 4 + -3).
-70
Calculate 6 + -53 + (19 - (-1 - -7)).
-34
What is the value of (56 - 39 - (49 + 2)) + 8?
-26
Evaluate 3491 + -3473 - (-1 + 34).
-15
What is 33 - (6 - (43 - 81))?
-11
-24 + 17 - (8 + -7) - (103 + 16)
-127
What is the value of 12 - (-14 + (-6 - (-22 - 8)))?
2
(-196 - (-229 - -103)) + (1 - (-3 - -1)) + 3
-64
Calculate 25 - -5 - ((-90 - -27) + 14).
79
What is 0 + 10 + (-53 + -23 + -2 + 18 - 10)?
-60
(0 - (65 + 8)) + (-10 - -33)
-50
What is 100 - 57 - (-9 - (-35 - -12))?
29
What is the value of -83 + -18 + 106 + (-31 - 0)?
-26
What is the value of 27 - (38 - 16) - -40 - 35?
10
Calculate 58 + (-3 - 71) - (-1 + -18) - 8.
-5
What is the value of -93 - ((-16 - -120) + -167)?
-30
Evaluate -308 + 326 - (0 - 20 - -1).
37
Evaluate 66 + -106 + 36 - (-13 - 0) - 52.
-43
-4 + -52 + 84 - -51
79
-81 + (30 + (-40 - -23) - -20)
-48
What is the value of 8 - ((1 - 85 - (-19 + (-36 - -49))) + -3)?
89
What is the value of (61 - 66) + 62 + 14?
71
Calculate 23 + 0 + -1 - -3 - -3.
28
Calculate -30 - ((-4 - 36 - -31) + (-1 - 1)).
-19
Calculate 7 + (14 - (10 - (16 - 12)) - (-57 - -2)).
70
Calculate -2 + -3 + (12 + -1 - (-52 - -49)) + 24.
33
89 + -198 + 135 + -50
-24
What is the value of 53 + (10 + -10 + -2 + 12 - 0 - 18)?
45
Evaluate -2 + -66 - -3 - (-3 - 20 - (-16 + 4)).
-54
-31415 + 31405 - (2 - 0 - 19)
7
What is the value of (-4 + -36 - -7) + 13 + -16 + 54?
18
6 + -20 + -56 + 57
-13
What is -133 + -5 + -48 + (56 - 8) + (-1 - -10)?
-129
What is (-5 - -10) + 19 + -112 + 88 - (69 - -1)?
-70
Evaluate 15 + ((2 - -12) + -14 - 39).
-24
What is (-32 - 22 - -20) + 32 - 107?
-109
Calculate 0 - -73 - (-6175 + 6129).
119
Evaluate 6 + -1 + 300 + -319.
-14
-85 - ((-3 - -10) + -21) - -12
-59
What is -38 + 25 - (-25 - -6) - (5 + 0)?
1
What is the value of -25 - (-1 - 6 - (-66 - (-103 - -36)))?
-17
What is 9 - (-6 + 9) - (600 - 670)?
76
-115 - 15 - (-199 - 78)
147
What is -64 + (-8 + 2 - (-12 - -2)) + -64 + 61?
-63
Evaluate -82 + 15 + (-9 - 3) + -18 - -12.
-85
What is the value of -24 - (25 + (-6 + -29 - -14))?
-28
What is -50 + (-13 - (-54 + 30))?
-39
Evaluate -42 - (-12 + (11 - (-9 - -3 - -4))).
-43
What is 12 + (-33 - (-2 - 31) - 9)?
3
What is -7 - ((26 - 2) + -66)?
35
Calculate 230 + -224 + (17 - (-4 - (-3 + 3)) - 4).
23
What is the value of -3 + 38 + 1 + -1 + (226 - (181 + 54))?
26
What is (5 + (-1 - (3 - -2)) - (42 + 3)) + 9?
-37
What is (304 + 19 - 296) + 1 + -61?
-33
Evaluate -3 + (7 + 48 - -13) - -21.
86
-30 - -4 - (-24 - (6 - 28)) - 1
-25
-78 + -7 + -22 + (-20 - -64)
-63
Calculate 21 + 2 + 2 - (-13514 + 13512).
27
Calculate (-24 - 19) + -54 + 61 + -55.
-91
What is the value of (-13 - (4 - -19)) + 35?
-1
-10 - (-88 + 31 - -31) - 3
13
What is (27 - 49) + 2 + 1 + 3 + -3 + -2?
-21
What is the value of (-13 - -28) + -69 + (1 + 9 - (74 + -61))?
-57
What is 2 + -11 + 3 + -2 + -40 + (-19 - -64)?
-3
Evaluate 112 + -78 + (-58 - -37).
13
What is (-135 - (51 - 98)) + 50?
-38
450 - 421 - (20 - -4 - -5)
0
(-11 - 12 - -28 - 31) + -42
-68
What is -9 + 8 + -10 - 0 - (-7 + 4)?
-8
Calculate 765 + -675 - (-3 - -6).
87
What is (26 + 24 - (29 - 18 - (7 - 0))) + -4?
42
-9 + (-40 - 0) - (-874 - -912)
-87
Calculate -45 + -43 + 41 + 20 - ((1 - -1) + 1).
-30
29 + (-53 - -41) + (3 - 5 - -52)
67
Evaluate -120 - ((75 - 149) + 85 + (2 - 17 - 1)).
-115
67 + (-42 - -79 - 81)
23
-2 + 4 + (0 - -2) - (-2711 - -2699)
16
What is the value of 13 + (-42 - -107 - 55)?
23
What is 47 - -111 - 36 - 66?
56
Evaluate 25 + (-75 - -31) - (0 - (-4 + -12)).
-35
37 + -10 + (5 - (-2 + -19 - (-13 - -6)))
46
Calculate -64 - (-15 - -4 - (-8 - (25 + -18) - -9)).
-59
What is (-54 - -2) + -39 + 42 + (14 - (-1 + 7))?
-41
What is 50 + (53 - 155) - -22?
-30
Evaluate 5 + (5 - (3 - 1) - (59 + -1 + -56)).
6
What is the value of 14 + (11 + -17 - 30)?
-22
What is the value of 36 + -29 + -53 + 0 + 14?
-32
What is -3 + 18 + (70 - 77 - (1 + -16))?
23
(5 - -5) + (-70 - (-35 - 20))
-5
Evaluate (-6 - -2 - (-62 - -48)) + (-48 - 0).
-38
What is 1 + -20 - (-67 - -54)?
-6
Calculate 28 + (21 - (-13 + 24 + 15)).
23
Calculate -1 + (1 - (2 - 1 - (-22 - -11 - -56))).
44
34 + (4 - 3) - (112 - 112)
35
What is the value of -442 + 431 - (-18 + 1)?
6
What is -6 + (-17 - 2 - ((-16 - (2 + 4)) + 14))?
-17
What is the value of 391 - 404 - (-2 - -2 - -15)?
-28
What is (-2 - 2) + (53 - (6 + -5 - 9))?
57
Calculate -5 - 81 - (-695 - -566).
43
Calculate 208 - 117 - (7 + 4 + -8).
88
Calculate -69 + (15 - (-32 - (-15 - 37))).
-74
Evaluate 115 + -42 + (24 - (-4 + 13)).
88
Evaluate 1839 - 1814 - (0 + 22).
3
What is the value of -42 - -51 - (0 + 7) - 1?
1
Calculate (19 - (-1 - (-4 - 14))) + -1.
1
What is -77 - (-189 - -88) - (5 - (0 - -2) - 10)?
31
Calculate 1 - -27 - (-81 - 10 - -149).
-30
What is the value of (7 + -9 + -11 + 27 - 5) + -17 + -48?
-56
Calculate 9 + (45 - -57 - 149).
-38
Evaluate -24 + -53 + 160 + (3 - -2).
88
What is 16 - (16 - -5 - 24) - 51?
-32
Calculate 20 - (-2 + 2 + 6 + (-25 - -8)).
31
What is the value of -2 + 40 + -9 + (-10 + 12 - 5)?
26
Calculate (-36 + 7 + -3 - -5) + (-3 - -2) + 10.
-18
What is (144 - (8 + -5)) + (616 + -620 - (0 - 12))?
149
-14 - (-66 - -112) - 60
-120
Calculate 0 + (-38 - (12 - 5)) + 4 + -4 + 5.
-40
What is -1 + (6 - (9 - -3 - 12 - 4)) + -44?
-35
What is (-10 + 6 - -1 - 11) + 5 + -12?
-21
-9 + -45 - (-14 + -21)
-19
(-13 - (-4 + 4 + 1)) + (-138 - -115)
-37
What is the value of -25 + (52 - (53 - -3))?
-29
Calculate 88 + (10 - 58) - ((-2 - 2) + -8).
52
Evaluate -256 + 265 - ((3 - 1) + -6 + 12 + -34).
35
What is the value of -13003 + 13068 + -26 + 0?
39
Evaluate 31 + 0 + -2 + 0 + (7 - (-38 + 50)).
24
What is (-7 - (1 - 11)) + 4 + (2 + -30 - 1)?
-22
What is 67 + -103 + 66 - 101?
-71
(90 + -169 - -30) + (0 - -15)
-34
What is the value of -10 + -7 + 42 + -12 + 18?
31
Calculate -24 + 68 - (-10 + -13 + 15 - -9).
43
What is the value of -11 - ((30 - 39 - 20) + 25)?
-7
What is the value of -2 + 0 + 0 + 25 + (33 - 54)?
2
What is -5 - (23 + -5 + 6 + 9) - (-8 - -17)?
-47
What is the value of -9 + (4 - 0) + 18 - (39 + -21)?
-5
What is -20 - (-1 + (-6 - -5) + (-20 - (-32 - -15)))?
-15
What is the value of 3 + -1 + 20 + 54 + -15 + -40?
21
Calculate -16 - (42 + (-41 - 24)).
7
What is the value of 14 + 6 + (-38 - -18) + -49?
-49
(-36 - -63 - 41) + -18
-32
What is the value of (6 + -3 - -47) + 12 + -4 + 7 + -4?
61
What is the value of 0 + -1 - (2 + 7) - (189 + -451 - -263)?
-11
Evaluate -13 + -36 + -1 + -13 + 63 + -50.
-50
What is -31 - (-92 - (-8 - 17))?
36
-12 - -14 - 31 - (21 + -19)
-31
Evaluate -3 - 0 - (-13 + 29 - 29) - (8 + 7).
-5
What is (-59 - -103) + -4 + 5?
45
Evaluate -150 - (257 + -107 + -218).
-82
Calculate -48 + -56 + -4 + 92.
-16
What is -26 - -29 - (139 - 195)?
59
What is -13 + 6 + (-5 - (-7 + -5 + -3) - 12)?
-9
What is the value of -171 - -188 - (71 - 19)?
-35
What is 4 - ((-2 + -9 - -63) + (10 - 26))?
-32
Calculate 26 + -13 + 1 - -46 - (-2 + -8).
70
(39 - (131 - -33)) + 226
101
Calculate -7 + -1 + 154 + (24 - 54) + -9.
107
What is (2 - (-21 - -7)) + -30 - (-57 + (-3 - 4))?
50
What is the value of -10 - (-30 + -5 + 10 - -32)?
-17
(3 - (7 - 12)) + -160 - (-21 + 10 + -1)
-140
What is 0 + 13 - (67 + -10) - 18?
-62
What is the value of -39 + -11 + 1 + (-127 - -138) + 0?
-38
What is the value of -1 + 32 - (2207 + -2227)?
51
Evaluate -44 - ((-95 - -59) + -9).
1
What is -23 - (-15 - (25 - 40))?
-23
What is -89 - (-4 - -10) - -96?
1
What is 4 + 1 - 1 - (189 + -128 - 60)?
3
What is 2 + -13 - (29 + -59 + 23 + 5)?
-9
-10 + -2 - (35 - 21 - (-1 + 63)) - -10
46
Calculate 190 - (47 - -11) - 99.
33
Calculate -324 + 349 + 3 + 10 + -4.
34
-41 + (32 + -9 - 5) - 10
-33
What is the value of (-59 - 1) + (-20826 - -20955)?
69
Evaluate -61 - ((2 - (-2 - -9)) + -117 + 112).
-51
What is -33 + 33 + -6 - -22 - (-2 - -61)?
-43
Calculate (-14 - (12 + -2) - -12) + 4 - -40.
32
-1655 + 1612 - (-65 - 3)
25
Calc
|
[Orbital development after enucleation without orbital implant in early childhood].
To evaluate the development of orbital volume in five adults who underwent enucleation without orbital implant during early childhood, using reconstructed computed tomography(CT) images. The orbital volume of 5 adults who underwent enucleation without orbital implants during early childhood was measured using CT images, and the results were compared between the anophthalmic orbit and the unaffected orbit in each case. The shape of maldevelopmental orbit and the relationship between orbital development and replacement of the prosthesis were also investigated. Orbital development in patients who underwent enucleation without orbital implant during early childhood was delayed in comparison with the unaffected orbit, and the delayed development was especially remarkable at the part of orbit corresponding to the equator of the eyeball. Maldevelopment of the orbit was severer in cases without replacement of the prosthesis than with it. For the development of orbital volume in anophthalmos after enucleation, orbital volume in place of the eyeball is required. Therefore, orbital implantation at the time of enucleation and replacement of the prosthesis with larger ones as the body grows are important.
|
# Next.js
This is an example project showing how to use the universal `@bugsnag/js` notifier to track both server and browser errors on a Next.js project.
We recommend creating two projects in your dashboard, one for the server errors and one for the browser errors.
## Usage
Clone the repo and `cd` into the directory of this example:
```
git clone [email protected]:bugsnag/bugsnag-js.git
cd bugsnag-js/examples/js/nextjs
```
Take a look at…
- [`lib/bugsnag.js`](lib/bugsnag.js) for how to setup Bugsnag once for your application so it can be imported and used anywhere on the server or client
- [`next.config.js`](next.config.js) to see how the environment variables are passed through to both the client and server build
- [`pages/_app.js`](pages/_app.js) to see how the React `ErrorBoundary` is used to wrap all pages in the application
- [`pages/_error.js`](pages/_error.js) to see how to override the built-in error page to intercept SSR errors
- [`pages/index.js`](pages/index.js) to see how the errors are triggered
- [`components/CrashyButton.js`](components/CrashyButton.js) to see how the render error is triggered
### With docker
The project includes a `Dockerfile`. If you're familiar with docker, this is the easiest way to start the example. Otherwise, skip ahead to the [without docker](#without-docker) section.
```
docker build -t bugsnag-js-example-next . && \
docker run \
-e BUGSNAG_SERVER_API_KEY=YOUR_SERVER_API_KEY \
-e BUGSNAG_BROWSER_API_KEY=YOUR_BROWSER_API_KEY \
-p 3000:3000 -it bugsnag-js-example-next
```
__Note__: remember to replace the API key environment variables with your own!
### Without docker
Ensure you have a version of Node.js >=4 on your machine.
```
npm install
npm run build
BUGSNAG_SERVER_API_KEY=YOUR_SERVER_API_KEY \
BUGSNAG_BROWSER_API_KEY=YOUR_BROWSER_API_KEY \
npm start
```
__Note__: remember to replace the API key environment variables with your own!
|
Customer Service
Lycopene is the red pigment found mainly in tomatoes and its derived products. It belongs to the family of the Carotenoids and carries a high antioxidant power, representing one of the most important nutrients for human health and wellbeing.
Antioxidants are essential to human health because they stop the action of the free radicals, by-products naturally created in the body cells as result of metabolic oxidative processes. The constant action of free radical can be seen mainly in the premature ageing of cells and in the rise of several more-or-less dangerous diseases, such as dermatitis, cataract, cardiovascular diseases, diabetes, rheumatoid arthritis, pulmonary emphysema, Parkinson’s and Alzheimer’s diseases, cancer. Scientific studies have demonstrated that Lycopene possesses an energetic antioxidant power, twice as much as ß-Carotene and 10 times as much as Vitamin E. Lycopene however is not produced in the human body and can only be taken on through diet and/or supplementation.
The quality features of Lycopene depend greatly upon the nature of the production process that extracts it.
There are two different extraction technologies:
TRADITIONAL PROCESS
involving chemical solvents, which release toxic and noxious waste and through which both Natural and Synthetic Lycopene are obtained
INNOVATIVE AND PATENTED PROCESS
which doesn’t use chemical solvents, but Critical CO2 instead, through which Organic Lycopene is obtained
Result of a long and continuous research activity by Licofarma S.r.l. together with CNR-ISPA and the University of Salento, and thanks to the essential contribution of the Italian Ministry of Research, Organic Lycopene represents a unique product of excellence, different from natural and synthetic lycopene because of the quality of the finished product and of the innovative and patented production technology that does not use toxic and noxious chemical solvents (Patent n. 0001354930).
Organic Lycopene is obtained by extraction from whole tomatoes (instead of their skin and other waste products), through carbon dioxide (CO2) in supercritical conditions. Toxic and noxious chemical solvents are not used at any stage of production. The result is a total extract, constituted by a mix of natural compounds which, alongside with lycopene, includes more antioxidants (such as ß-carotene, lutein, zeaxanthin), Vitamins (A, E, D, K), essential amino acids (Alanine, Leucine, Tryptophan) and other very important nutrients such as Omega-3 and Omega-6.
ABSENCE OF TOXICITY
Organic Lycopene is produced exclusively from Organic Certified raw sources. The tomato berries we use are devoid of pesticides, dioxins, heavy metals, and they only come from natural varieties of tomatoes not genetically modified (NO GMO). The extraction process is cold and based on a purely physical principle; there are no chemical reactions involved. The absence of chemical solvents at production stage physically excludes the possibility of presence of any kind of toxic/noxious waste and other impurities in the finished product.
HIGHER ANTIOXIDANT AND ANTITUMORAL ACTIVITY
Thanks to the innovative CO2 extraction process, the final extract keeps all the nutrients co-extracted with Lycopene intact and untouched. As recent studies have confirmed, thanks to the synergy between all the nutrients contained in the total extract, Organic Lycopene carries a higher antioxidant and antitumoral activity, up to 100 times more than the same concentration of pure lycopene solution produced with traditional methods which, following the purification process necessary to lower the toxicity of the final product, loses most of the co-extracted nutrients causing a remarkable drop in its antioxidant power.
Food Supplementation
Organic Lycopene finds immediate important application in the preparation of health supplements to lower the risk of Cardiovascular diseases, Osteoporosis and some forms of tumors. Organic Lycopene is the only type of Lycopene in the world which is naturally bioavailable, meaning it can be used as health supplement directly and without further addition of preservatives and/or additives to adjust or modify its composition. The lipids necessary to improve its absorption, in fact,in f are not added from external sources (like in the case of natural and synthetic Lycopene), but come directly from the extraction nutrients.
Cosmetics
Thanks to its high antioxidant power, Organic Lycopene is a natural anti-ageing able to effectively contrast the cutaneous ageing processes, preventing and reducing the formation of wrinkles and improving the skin thickness. Clinical studies have certified that in presence of a higher lycopene content in the skin there is a lower amount of wrinkles found. Thanks to its anti-radical action, furthermore, it performs an essential protective action on the skin from damages caused by an excessive exposure to UVA-UVB radiations (photo-ageing). Working in synergy with other active ingredients and functional substances, it can proactively work to contrast even the most common skin imperfections such as cellulite and stretch marks.
Lycopene Store is the online store of the only Organic Lycopene in the world, which offers Food Supplements and excellent Natural Cosmetics, the result of a perfect balance between research, innovation and nature. Products Made in Italy , Paraben Free , Nickel Tested , Cruelty Free and manufactured in an environmentally responsible manner.
|
The sequel to ‘Galaxy Destroyer’ which finds our hero Harry Trent wandering Earth’s post-apocalyptic landscape full of mutants, monsters, and fragmented human tribes. Harry’s attempt to help a young girl…
|
Introduction {#section1-1534735416673907}
============
Breast cancer is the leading cause of cancer death for women in Taiwan.^[@bibr1-1534735416673907]^ The incidence rate of breast cancer among Chinese women has increased enormously with changes in lifestyle. Although incidence of breast cancer is increasing worldwide, the mortality rate has declined in developed countries as a result of a range of measures, including implementation of screening and introduction of adjuvant systemic treatments.^[@bibr2-1534735416673907],[@bibr3-1534735416673907]^ Studies reveal that about two thirds of breast cancer patients have estrogen-receptor (ER)--dependent tumors and most patients are treated with tamoxifen (an ER antagonist) and aromatase inhibitors, which abates estrogen activity.^[@bibr4-1534735416673907]^ However, concerns about the safety and effectiveness of hormone therapy still exist due to side effects that substantially affect the patient's quality of life. Therefore, it is necessary to explore more efficient potential therapeutic strategies to reduce the risk of breast cancer.^[@bibr5-1534735416673907]^
Ultraviolet (UV) radiation is a part of the sunlight spectrum, which can be categorized into 3 bands---UVA (320-400 nm), UVB (280-320 nm), and UVC (100-280 nm)---according to wavelength.^[@bibr6-1534735416673907]^ Among these, DNA is the best-known target of UVB.^[@bibr7-1534735416673907]^ Low doses of UVB cause DNA mutations, which eventually lead to tumor initiation, whereas high doses result in irreparable DNA damage, causing apoptosis and cell death.^[@bibr8-1534735416673907]^ The presence of singlet oxygen in apoptosis has also been reported in UVB-irradiated retinal pigment epithelial cells.^[@bibr9-1534735416673907]^ A combined use of UVB irradiation and arsenic treatment exhibits the antiproliferative and pro-apoptotic effects via activation of caspase-8 and -9 in keratinocytes. In addition, it has also been reported that UVB radiation efficiently increased the apoptosis in an ER-positive breast cancer cell line.^[@bibr10-1534735416673907]^
*Antrodia camphorata*, an indigenous medicinal mushroom, has been used in traditional Chinese medicine for protection of diverse health conditions such as muscle damage, fever, food poisoning, drug intoxication, diarrhea, hypertension, skin irritation, and cancer.^[@bibr11-1534735416673907]^ Accumulating evidence suggests that *Antrodia camphorata* possesses a broad range of biological activities, including antioxidant, anticancer, antihyperlipidemic, immunomodulatory, antimetastasis, hepatoprotective, antihypertensive, and anti-inflammatory properties.^[@bibr11-1534735416673907],[@bibr12-1534735416673907]^ The mycelium and the fruiting bodies of *Antrodia camphorata* exerted strong anticancer activity against several cancers such as breast, liver, prostate, colon, bladder, oral, pancreatic, lung, and leukemic cells. The inhibitory effect against cancer cells by *Antrodia camphorata* could be mediated by different cellular mechanisms of actions, such as inhibition of metastasis and angiogenesis regulatory proteins; regulation of oncogene and tumor suppressor gene expression; downregulation of signal transduction cascades involving Nrf2, NF-κB, AP-1, and MAPK; induction of cell-cycle arrest; and apoptosis involving the Wnt/β-catenin, p53, death ligands, Bcl-2, and caspase families.^[@bibr11-1534735416673907],[@bibr13-1534735416673907],[@bibr14-1534735416673907]^ According to our previous results of high-performance liquid chromatography analysis, the amount of CoQ~0~ in the fermented culture broth of *Antrodia camphorata* was 17.3% (254 nm).^[@bibr15-1534735416673907]^
Coenzyme Q~0~ (CoQ~0~ or Ubiquinone 0) is a redox-active ubiquinone compound that accumulates predominantly in mitochondria. Recently, we have reported the anti-angiogenic and anti-inflammatory properties of CoQ~0~ in vitro or in vivo.^[@bibr16-1534735416673907],[@bibr17-1534735416673907]^ Several studies suggest that CoQ~0~ exhibits strong toxicity toward various cancer cell lines.^[@bibr18-1534735416673907],[@bibr19-1534735416673907]^ CoQ~0~ treatment also was shown to decrease the cell proliferation in HepG2, A549, and SW480 cancer cell lines;^[@bibr18-1534735416673907]^ stimulate insulin secretion in pancreatic islets;^[@bibr20-1534735416673907]^ possess anti-angiogenic properties;^[@bibr16-1534735416673907]^ and inhibit oxidative damage in mouse blood and tissues. Despite its cytotoxicity, some in vivo studies exhibited no deleterious effects of a CoQ~0~ analog in combination with other nutrients. Notably, administration of CoQ~0~ mixture inhibited oxidative damage in blood, heart, liver, kidney, and spleen of rodents.^[@bibr21-1534735416673907],[@bibr22-1534735416673907]^ Nevertheless, pharmacological activities of a single CoQ~0~ molecule against cancer and redox imbalance have not been fully studied, and precise signaling pathways involved are largely unknown.
Accumulating evidence suggests that many natural compounds from food and plants have chemotherapeutic and chemopreventive effect in several human cancers.^[@bibr23-1534735416673907],[@bibr24-1534735416673907]^ A number of natural products extracted from Chinese herbs has been found to enhance chemotherapy by inducing apoptosis and exhibiting anticancer potential both in vitro and in vivo.^[@bibr25-1534735416673907][@bibr26-1534735416673907]-[@bibr27-1534735416673907]^ These studies indicate effects of CoQ~0~ on anticancer activity against human triple-negative breast (MDA-MB-231) cancer cells through induction of apoptosis and cell-cycle arrest.^[@bibr19-1534735416673907]^ In our previous study, we demonstrated that CoQ~0~, a major active constituent of AC, significantly inhibited melanoma cell growth through the induction of cell-cycle arrest and apoptosis via Wnt/β-catenin signaling pathways.^[@bibr28-1534735416673907]^ Studies have suggested a possible association between UVB radiation and reduction in the risk of breast cancer.^[@bibr29-1534735416673907]^ However, the regulatory mechanisms of CoQ~0~ that produces its pro-apoptosis effects in MCF-7 breast cancer are unknown. In the current study, the effect of CoQ~0~ treatment alone and in combination with UVB has been examined on the cellular growth of MCF-7 breast cancer cells.
Materials and Methods {#section2-1534735416673907}
=====================
Reagents and Antibodies {#section3-1534735416673907}
-----------------------
CoQ~0~ (2,3 dimethoxy-5-methyl-1,4 benzoquinone) was purchased from Sigma-Aldrich (St Louis, MO). Dulbecco's modified Eagle's medium (DMEM), fetal bovine serum (FBS), [l]{.smallcaps}-glutamine and penicillin/streptomycin/neomycin were obtained from GIBCO BRL/Invitrogen (Carlsbad, CA). p53, Bcl-2, and β-actin antibodies were purchased from Santa Cruz Biotechnology, Inc (Heidelberg, Germany). PARP antibody was obtained from Cell Signaling Technology, Inc (Danvers, MA). 3-(4,5-Dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) was purchased from Sigma-Aldrich Chemical Co (St Louis, MO). CoQ~0~ was dissolved in dimethyl sulfoxide (DMSO) and diluted with DMEM to make the final concentration below 0.01%. All other chemicals were of the highest grade commercially available and were supplied either by Merck or Sigma.
Cell Culture {#section4-1534735416673907}
------------
The estrogen receptor--positive MCF-7 (human breast adenocarcinoma) cell line was obtained from the Bioresource Collection and Research Center (BCRC, Taiwan). MCF-7 cells were grown in DMEM supplemented with 10% heat-inactivated FBS, 2 mM glutamine, and 1% penicillin-streptomycin-neomycin in a humidified incubator (5% CO~2~ in air at 37°C). Cultures were harvested and monitored for cell number by counting cell suspensions with a hemocytometer. Cell morphology was examined using phase-contrast microscopy (200× magnification).
UVB Irradiation and Sample Treatment {#section5-1534735416673907}
------------------------------------
Prior to UVB irradiation, MCF-7 cells were washed with phosphate-buffered saline (PBS) and resuspended in fresh phenol red--free DMEM containing 1% FBS. Then, cells were exposed to UVB radiation at dose 0.05 J/cm^2^ (λ~max~, 312 nm; no detectable emission below 280 nm) using UVllink CL-508M (UVItec, Cambridge, UK) for 30 seconds. After UVB irradiation, the cells were treated with CoQ~0~ (0-35 µM) for 72 hours in DMEM containing 10% FBS.
Assessment of Cell Viability by MTT Assay {#section6-1534735416673907}
-----------------------------------------
Cell viability was determined by the MTT colorimetric assay. MCF-7 cells (5 × 10^4^ cells/well in 24-well plates) were treated with various concentrations of CoQ~0~ (0-35 µM) for 24 to 72 hours, before 400 µL 0.5 mg/mL MTT in PBS was added to each well. After incubation at 37°C for 2 hours, an equal volume of DMSO (400 µL) was added to dissolve the MTT formazan crystals, and the absorbance was measured at 570 nm (A~570~) using an ELISA microplate reader (µ-Quant, Winooski, VT). The percentage of cell viability was calculated as follows: (A~570~ of treated cells/A~570~ of untreated cells) × 100.
Flow Cytometric Analysis {#section7-1534735416673907}
------------------------
Cellular DNA content was determined by flow cytometry using the propidium iodide (PI)--labeling method as described previously.^[@bibr14-1534735416673907]^ Briefly, MCF-7 cells were seeded at a density of 1 × 10^6^ cells/dish in 10-cm dishes. After UVB (0.05 J/cm^2^) irradiation, cells were treated with increasing concentrations of CoQ~0~ (0-35 µM) for 72 hours. Cells were harvested, fixed in ice-cold 70% ethanol, stored at 4°C, washed with PBS (pH 7.2), treated with 25 µg/mL RNase A at 37°C for 15 minutes, and stained with 50 µg/mL PI for 20 minutes. Flow cytometric profiles were analyzed with ModFit software (Verity Software House, Topsham, ME). Apoptotic nuclei were identified as a subploid DNA peak and were distinguished from cell debris on the basis of forward light scatter and PI fluorescence.
Measurement of Reactive Oxygen Species Generation {#section8-1534735416673907}
-------------------------------------------------
Intracellular reactive oxygen species (ROS) accumulation was detected by fluorescence microscopy using the cell-permeable fluorogenic probe DCFH~2~-DA method. Cells (1 × 10^5^ cells/12-well) were cultured in DMEM medium that had been supplemented with 10% FBS, and the culture medium was replaced when the cells had reached 80% confluence. After UVB (0.05 J/cm^2^) irradiation, cells were treated with CoQ~0~ (35 µM) for 20 minutes. Then culture supernatants were removed, and incubated with nonfluorescent DCFH~2~-DA (10 µM) in fresh medium at 37°C for 30 minutes. ROS production was measured by changes in fluorescence due to the intracellular accumulation of dichlorofluorescein (DCF), which is caused by the oxidation of DCFH~2~. The DCF fluorescence stained cells were captured using fluorescence microscope (200× magnification; Olympus, Center Valley, PA). The fluorescence intensity was quantified using analysis LS 5.0 soft image solution (Olympus Imaging America Inc). The fold-increase of ROS generation was compared with the vehicle-treated cells, which were arbitrarily considered as 1-fold.
Comet Assay {#section9-1534735416673907}
-----------
The comet assay (single-cell gel electrophoresis assay) is an uncomplicated and sensitive technique for the detection of DNA damage at the level of individual eukaryotic cells.^[@bibr30-1534735416673907]^ The protocol used for the comet assay followed previously published guidelines.^[@bibr31-1534735416673907]^ After UVB (0.05 J/cm^2^) irradiation, MCF-7 cells (1 × 10^6^ cells/10-cm dish) were treated with CoQ~0~ (35 µM) for 72 h. Cells were then suspended in 1% low-melting-point agarose in PBS (pH 7.4) and pipetted onto superfrosted glass microscope slides that had been precoated with a layer of 1% normal-melting-point agarose (which was warmed to 37°C prior to use). The agarose was allowed to set at 4°C for 10 minutes; then, the slides were immersed in lysis solution (containing 2.5 M NaCl, 100 mM EDTA, 10 mM Tris, and 1% Triton X-100) at 4°C for 1 hour. The slides were then placed in single rows inside a 30-cm wide horizontal electrophoresis tank containing 0.3 M NaOH and 1 mM EDTA (pH 13.4) at 4°C for 40 minutes to allow the separation of the 2 DNA strands (alkaline unwinding). Electrophoresis was performed in the unwinding solution at 30 V (1 V/cm), 300 mA, for 30 minutes. The slides were then washed 3 times for 5 minutes each with 0.4 M Tris (pH 7.5) at 4°C before they were stained with DAPI (1 µg/mL). Observations were made at a final magnification of 200× using a UV microscope with a 435 nm excitation filter. Visual scoring of the cellular DNA on each slide was based on the characterization of 100 randomly selected nucleoids. Comet-like DNA formations were categorized into 5 classes (0, 1, 2, 3, or 4) representing increasing DNA damage in the form of a "tail." Each comet was assigned a value according to its class. The overall score for 100 comets ranged from 0 (100% of comets in class 0) to 400 (100% of comets in class 4), and the overall DNA damage in the cell population was expressed in arbitrary units.^[@bibr32-1534735416673907]^ The observation and analysis of the results were always performed by the same experienced observer. The observer was blinded and had no knowledge of the slide identity. DNA damage in cells, which was specified as DNA strand breaks including double and single-strand variants at alkali-labile sites, was analyzed under alkaline conditions (pH 13.4). DNA migration from the nucleus of each cell was measured with a computer program using the comet moment parameters as follows: comet moment = ∑0→n \[(amount of DNA at distance X) × (distance X)\]/total DNA. The tail moments were quantified using the Cometscore software (Sumerduck, VA).
Protein Isolation and Western Blot Analysis {#section10-1534735416673907}
-------------------------------------------
After UVB (0.05 J/cm^2^) irradiation, MCF-7 cells (1 × 10^6^ cells/10-cm dish) were incubated with CoQ~0~ (35 µM) for 72 hours. After incubation, the cells were harvested, pooled, washed once with PBS, and suspended in 100 µL of lysis buffer (10 mM Tris-HCl, pH 8, 320 mM sucrose, 1% Triton X-100, 5 mM EDTA, 2 mM DTT, and 1 mM PMSF). The cell lysates were maintained on ice for 20 minutes and then centrifuged at 15 000 × *g* for 30 minutes at 4°C. Total protein content was determined using Bio-Rad protein assay reagent (Bio-Rad, Hercules, CA), BSA as a standard. The protein extracts were mixed with sample buffer (62 mM Tris-HCl, 2% SDS, 10% glycerol, and 5% β-mercaptoethanol), and the mixture was boiled at 97°C for 5 minutes. Equal amounts (50 µg) of denatured protein samples were separated by SDS-PAGE (sodium dodecyl sulfate polyacrylamide gel electrophoresis) and then transferred onto polyvinylidene difluoride membranes overnight. The membranes were blocked with 5% nonfat dried milk in PBS containing 1% Tween-20 for 1 hour at room temperature, followed by incubation with primary antibodies overnight. The membranes were then incubated with either a horseradish peroxidase--conjugated anti-rabbit or anti-mouse antibodies for 2 hours prior to development using a chemiluminescent substrate (Millipore, Billerica, MA). Densitometric analyses were performed using commercially available quantitative software (AlphaEase, Genetic Technology Inc, Miami, FL), with the control representing 1.0-fold.
Statistical Analyses {#section11-1534735416673907}
--------------------
The obtained data were analyzed using analysis of variance (ANOVA), followed by Dunnett's test for pairwise comparison. Mean values are presented with their standard deviation (mean ± SD). Statistical significance between the treatments was defined as *P* \< .05 for all tests.
Results {#section12-1534735416673907}
=======
CoQ~0~ Enhances UVB-Induced Cell Death in MCF-7 Cells {#section13-1534735416673907}
-----------------------------------------------------
Prior to investigating the apoptotic effects of CoQ~0~, the cytotoxic effects of CoQ~0~ on human breast cancer MCF-7 cells were examined using an MTT colorimetric assay. The cells were exposed to 0 to 35 µM of CoQ~0~ for 24 to72 hours. As shown in [Figure 1](#fig1-1534735416673907){ref-type="fig"}, treating MCF-7 cells with 35 µM CoQ~0~ for 24 and 48 hours resulted in no significant effect on cell viability. However, cell viability dramatically decreased when the MCF-7 cells were treated with CoQ~0~ (35 µM) for 72 hours ([Figure 1A](#fig1-1534735416673907){ref-type="fig"}[](#fig1-1534735416673907){ref-type="fig"}-[C](#fig1-1534735416673907){ref-type="fig"}).
{#fig1-1534735416673907}
In addition, CoQ~0~-enhanced cell death was assessed by pretreating the MCF-7 cells with UVB (0.05 J/cm^2^) for 72 hours. We observed that exposure to UVB (0.05 J/cm^2^) dramatically induced MCF-7 cell death, which was significantly increased by CoQ~0~ (35 µM, [Figure 1D](#fig1-1534735416673907){ref-type="fig"}). These data further confirm that UVB-induced cell damage was remarkably enhanced by CoQ~0~ (35 µM). The sublethal concentration of CoQ~0~ (35 µM) were used for subsequent experiments.
CoQ~0~ Increases Apoptosis in UVB-Irradiated MCF-7 Cells {#section14-1534735416673907}
--------------------------------------------------------
Flow cytometric analyses were conducted to assess the apoptotic levels in CoQ~0~ (0-35 µM) and UVB (0.05 J/cm^2^)-irradiated MCF-7 cells by measuring the fluorescence of the PI-DNA complex. The results showed that treatment of MCF-7 cells with CoQ~0~ dose-dependently increased the sub-G1 peak as compared to control ([Figure 2A](#fig2-1534735416673907){ref-type="fig"} and [C](#fig2-1534735416673907){ref-type="fig"}). Furthermore, UVB pretreatment possessed a greater ability to induce sub-G1 peak in MCF-7 cells than CoQ~0~ and UVB alone ([Figure 2B](#fig2-1534735416673907){ref-type="fig"} and [D](#fig2-1534735416673907){ref-type="fig"}). These data further suggest that CoQ~0~ treatment may enhance UVB-induced apoptosis in MCF-7 cells.
{#fig2-1534735416673907}
CoQ~0~ Induces Intracellular ROS Generation in UVB-Irradiated MCF-7 Cells {#section15-1534735416673907}
-------------------------------------------------------------------------
ROS generation has been implicated as an early event during apoptosis. To determine whether CoQ~0~-induced apoptosis is ROS-dependent, we examined the involvement of CoQ~0~ in ROS generation in UVB-irradiated MCF-7 cells. Fluorescence spectroscopy using DCFH~2~-DA as a fluorescent probe was performed to estimate intracellular ROS generation. The results indicated that MCF-7 cells exposed to CoQ~0~ (35 µM) for 20 minutes showed significant increase of fluorescence, which is proportionate to the amount of ROS generation. In addition, UVB irradiation markedly increased the intracellular ROS level as compared to control. Interestingly, CoQ~0~ treatment significantly enhanced the ROS generation in the UVB-irradiated cells ([Figure 3](#fig3-1534735416673907){ref-type="fig"}). These data suggest that induction of excessive ROS formation by CoQ~0~ treatment may contribute to mitochondrial dysfunction and DNA damage in UVB-irradiated MCF-7 cells.
{#fig3-1534735416673907}
CoQ~0~ Enhances UVB-Induced DNA Damage in MCF-7 Cells {#section16-1534735416673907}
-----------------------------------------------------
DNA damage, represented by DNA single-strand breaks, was indicated by an increase in tail lengths. DNA damage was evaluated with the comet assay, in which the tail length is an important quantitative parameter. Therefore, the effect of CoQ~0~ treatment (35 µM for 72 hours) on cellular DNA damage was evaluated in a single-cell gel electrophoresis comet assay. A total toxicity scale was generated while considering the comet lengths. Our results showed that a significant increase in comet length was observed after MCF-7 cells were treated with CoQ~0~ for 72 hours ([Figure 4A](#fig4-1534735416673907){ref-type="fig"} and [B](#fig4-1534735416673907){ref-type="fig"}). Furthermore, comet length and tail moment were dramatically increased when the cells were pretreated with UVB irradiation ([Figure 4C](#fig4-1534735416673907){ref-type="fig"} and [D](#fig4-1534735416673907){ref-type="fig"}), clearly indicating that CoQ~0~ treatment enhanced UVB-induced DNA damage.
{#fig4-1534735416673907}
CoQ~0~ Upregulates p53 and PARP Cleavage in MCF-7 Cells {#section17-1534735416673907}
-------------------------------------------------------
The p53 tumor-suppressor protein plays an important role in the induction of apoptosis.^[@bibr33-1534735416673907]^ Therefore, we examined p53 expression to determine the possible role of p53 in the induction of apoptosis by CoQ~0~ and UVB in MCF-7 cells. Western blot analyses revealed that pretreatment of MCF-7 cells with UVB significantly increased the p53 expression compared to CoQ~0~ and UVB alone ([Figure 5A](#fig5-1534735416673907){ref-type="fig"}).
{#fig5-1534735416673907}
In addition, the cleavage of PARP, a nuclear enzyme that is associated with DNA repair, is dependent on the proteolytic cleavage of caspase-3 and is considered to be an important biological characteristic of apoptosis. As shown in [Figure 5B](#fig5-1534735416673907){ref-type="fig"}, the PARP (115 kDa) protein was cleaved into an 85 kDa fragment in MCF-7 cells in response to CoQ~0~ treatment. Furthermore, UVB pretreatment significantly increased the PARP cleavage as compared to control. Taken together, these data suggest that CoQ~0~-induced apoptosis in UVB-irradiated MCF-7 cells was accompanied by p53 activation and PARP degradation.
CoQ~0~ Dysregulates Bcl-2/Bax Expression in UVB-Irradiated MCF-7 Cells {#section18-1534735416673907}
----------------------------------------------------------------------
Bcl-2 family proteins play a pivotal role in (mitochondria-mediated) apoptosis, either as activators (Bok, Bad, and Bax) or as inhibitors (Bcl-2, Bcl-xL, and Bcl-w).^[@bibr34-1534735416673907]^ The effect of CoQ~0~ and UVB on Bcl-2 and Bax protein levels were examined in MCF-7 cells. As shown in [Figure 5C](#fig5-1534735416673907){ref-type="fig"}, CoQ~0~ and UVB caused a dramatic reduction in Bcl-2, and significant increase of Bax protein levels was observed. Interestingly, the combination of UVB and CoQ~0~ significantly increased the Bcl-2 and Bax protein ratio as compared to control. These results indicate that CoQ~0~ may alter the Bcl-2 and Bax protein ratio and induce apoptosis in UVB-irradiated MCF-7 cells.
Discussion {#section19-1534735416673907}
==========
Breast cancer is the most common cancer among women and is the second leading cause of cancer-related death worldwide.^[@bibr35-1534735416673907]^ The inhibition of proliferation and the induction of apoptosis are currently being employed as criteria by which the efficacy of new therapeutic agents is evaluated in preclinical studies.^[@bibr36-1534735416673907]^ The results of the present study indicate that CoQ~0~ could be an anti--breast cancer agent in vitro. Our findings demonstrated that UVB pretreatment significantly induced apoptosis in MCF-7 cells, which was associated with the excessive production of ROS, DNA fragmentation, followed by a sequence of events, including PARP degradation, Bcl-2/Bax dysregulation, and p53 expression. Taken together, our findings are much more enlightening and revealed that CoQ~0~ is effective in the induction of apoptosis through accumulation of ROS in UVB-irradiated MCF-7cells.
Ubiquinone analogs have been shown to exhibit strong pro- or anti-oxidant properties.^[@bibr37-1534735416673907]^ They generate functional and structural damage through hypergeneration of ROS production.^[@bibr38-1534735416673907]^ On the contrary, they are also shown to reduce oxidative stress-induced cell death^[@bibr39-1534735416673907]^ by a mechanism that may involve their antioxidant properties. Ubiquinone analogs display noticeable tissue specificity when compared to other classes of PTP regulators. Studies have confirmed that the production of ROS and the regulation of PTP opening by ubiquinone analogs changes depending on the cell lines (which prevent any extrapolation from results obtained with liver mitochondria). Ubiquinone analogs represent a newly identified family of PTP regulators.^[@bibr37-1534735416673907],[@bibr40-1534735416673907],[@bibr41-1534735416673907]^ Regardless of their partition coefficient or redox status, ubiquinone analogs are classified in 3 functional groups. According to whether they favor or inhibit PTP opening or are neutral but compete with active quinones, they are called PTP-inhibitory, PTP-activatory, or PTP-inactive quinones, respectively.
A large number of clinical and preclinical studies exhibit that coenzyme Q (CoQ) or ubiquinone analogs have therapeutic potential effects for inflammation, cancer, and several metabolic disorders.^[@bibr19-1534735416673907],[@bibr42-1534735416673907],[@bibr43-1534735416673907]^ CoQ is a lipophilic molecule found in the inner side of the mitochondrial membrane of most aerobic organisms from bacteria to mammals. CoQ is composed of a redox active benzoquinone ring conjugated to an isoprenoid chain. The subscript in CoQ molecule refers to the number of isoprene repeat units, which include from CoQ~0~ to CoQ~10~.^[@bibr42-1534735416673907]^ Various analogs of CoQ have been shown to indicate either pro-oxidant or antioxidant properties. Antioxidant property has been represented by preventing oxidative stress-induced cells death.^[@bibr21-1534735416673907],[@bibr44-1534735416673907]^ CoQ~0~, a redox-active compound without isoprenoid side chain that predominantly accumulates in mitochondria, has been shown to inhibit the activity of complex 1 of the mitochondrial respiratory chain and to prevent opening of the mitochondrial permeability transition pore.^[@bibr45-1534735416673907]^ We hypothesize that CoQ~0~, in the presence of UVB, dramatically changes mitochondrial function, which abundantly increases oxidative stress leading to subsequent mitochondrial permeability transition pore opening and induction of apoptosis in human breast cancer cells.
UVB is also a well-known genotoxic agent that can stimulate oxidative stress through the formation of ROS, such as superoxide anion radical, hydroxyl radical, and hydrogen peroxide, which leads to cell damage and DNA lesions.^[@bibr46-1534735416673907]^ UVB-induced apoptosis involves a highly complex mechanism. UVB activates death receptors, such as Fas, which eventually leads to the induction of apoptosis. However, nuclear DNA damage is considered as an important factor in UVB-induced apoptosis.^[@bibr47-1534735416673907]^ Furthermore, exposure to UVB alters the protein function by directly interacting with aromatic amino acids in proteins. However, it has been reported that in the presence of indole-3-carbinol, UVB induced apoptosis in G361 cells through DNA fragmentation, caspase-3 activation, and PARP cleavage.^[@bibr48-1534735416673907]^ UVB indirectly damages biomolecules through production of ROS and reactive nitrogen species by oxidizing lipids, proteins, and DNA. In addition, UVB generates ROS, which also play major roles in the execution of apoptotic cell death in an independent way.^[@bibr49-1534735416673907]^ In the present study, our results demonstrated that the combination of UVB and CoQ~0~ caused significant cell death compared to UVB and CoQ~0~ alone. We speculate that CoQ~0~ may be transformed to potent cytotoxic radicals under UVB irradiation, which subsequently leads to cell death.
Apoptosis-inducing agents are being examined as tools for the management of cancer treatment. Apoptosis is characterized by a number of well-defined features, including cellular morphological changes, internucleosomal DNA cleavage, chromatin condensation, and the activation of the caspase family.^[@bibr50-1534735416673907]^ Apoptosis activation occurs mainly through 2 well-characterized pathways in mammalian cells, death-receptor-dependent (extrinsic) and mitochondrial-dependent (intrinsic) apoptosis signaling cascades.^[@bibr51-1534735416673907]^ Recently, we also determined that the induction of apoptosis by AC treatment is mediated by the activation of both mitochondrial and death-receptor pathways.^[@bibr52-1534735416673907]^ In the present study, comet assays demonstrated that pretreatment of MCF-7 cells with UVB markedly induced apoptotic cell death associated with internucleosomal DNA fragmentation. Furthermore, UVB pretreatment significantly increased the sub-G1 accumulation in MCF-7 cells compared to control group. Cells undergoing apoptosis were found to be associated with elevated levels of cytochrome *c* in the cytosol with a corresponding decrease in the mitochondria. Cytosolic cytochrome *c* activates downstream effector caspases (including caspase-3), triggering apoptosis.^[@bibr53-1534735416673907]^ PARP, a nuclear protein, was shown to be required for apoptosis to proceed in various cell lines. Activated caspase-3 cleaves PARP (116 kDa), generating 89 kDa inactive fragment and cause apoptosis.^[@bibr54-1534735416673907]^ Our results demonstrated that the combination of CoQ~0~ and UVB treatment significantly reduced the pro-form of PARP, which demonstrated that CoQ~0~ could act as a chemopreventive agent with respect to inhibition of the growth of MCF-7 cells through the induction of apoptosis.
The excessive generation of ROS can induce oxidative cellular stress, cell cycle arrest, loss of cell function, damage DNA, and apoptosis in cancer cells.^[@bibr55-1534735416673907]^ Moreover, ROS play a pivotal role in apoptosis by regulating the activity of certain enzymes involved in the cell death pathway.^[@bibr56-1534735416673907],[@bibr57-1534735416673907]^ ROS triggered the opening of the mitochondrial permeability transition pore, depolarization of the mitochondrial membrane, and then the release of mitochondrial pro-apoptotic factors in the process of mitochondria-mediated apoptosis.^[@bibr54-1534735416673907]^ In the present study, CoQ~0~ and UVB pretreatment remarkably increased the production of intracellular ROS in MCF-7 cells, suggesting that CoQ~0~ and UVB might cause a synergistic effect that leads to increase in the intracellular ROS generation. Furthermore, increase in ROS level may act as upstream signaling molecules to induce mitochondria-mediated cell apoptosis in MCF cells.
The p53 tumor suppressor gene plays a critical role in controlling the cell cycle, genome integrity, and apoptosis in response to ionizing radiation, UV light, or certain genotoxic chemicals.^[@bibr58-1534735416673907]^ p53 activates the expression of target genes when it binds to regulatory DNA sequences, which is important for the inhibition of tumor formation as well as for mediating the cellular responses to many standard DNA damage-inducing cancer therapies by cycle inhibition and induction of apoptosis.^[@bibr59-1534735416673907]^ Previous studies suggest that p53-regulated apoptosis proceeds primarily through the intrinsic apoptotic program.^[@bibr60-1534735416673907]^ Accumulating evidence suggest that several natural chemopreventive and chemotherapeutic agents induce apoptosis by activating p53 and its target genes.^[@bibr61-1534735416673907]^ Research supports that p53 could be activated in response to ROS-dependent nuclear damage and could stimulate the induction of apoptosis.^[@bibr62-1534735416673907]^ Hence, in order to examine whether the ability of CoQ~0~ to induce apoptosis is due to the effect of p53, changes in the protein expression of p53 were examined by western blot. We found that CoQ~0~ treatment significantly increased the p53 expression in MCF-7 cells. In addition, UVB pretreatment dramatically increased the p53 level, which clearly indicates that in response to UVB radiation, however, CoQ~0~ enhances UVB-induced apoptosis in MCF-7 cells through a p53-dependent signaling pathway.
In mammalian cells, Bcl-2 gene family contains a number of anti-apoptotic proteins, such as Bcl-xL and Bcl-2, which are thought to be involved in resistance to conventional cancer treatment, while the pro-apoptotic proteins from the same gene family, including Bax, Bak, and Bad, may induce apoptotic cell death.^[@bibr63-1534735416673907]^ A hallmark of DNA damage-triggered apoptosis is reduced Bcl-2 expression and increased Bax expression. Hence, apoptosis largely depends on the balance between pro-apoptotic and anti-apoptotic protein levels. Activation of the p53 signaling pathway has been shown to play a pivotal role in apoptosis by altering the Bcl-2/Bax ratio.^[@bibr64-1534735416673907]^ Similarly, the present study indicates a significant inhibition of the anti-apoptotic protein Bcl-2 and a concomitant increase in the expression of the Bax, and p53 proteins by CoQ~0~ in UVB-irradiated MCF-7 cells. Taken together, our findings showed that UVB pretreatment enhanced its apoptotic effect possibly by upregulating p53, Bax expression, and downregulating Bcl-2 expression.
Conclusion {#section20-1534735416673907}
==========
In conclusion, CoQ~0~ exhibits an antiproliferative effect by induction of apoptosis that is associated with p53 activation, PARP degradation, and alteration of Bcl-2 and Bax in MCF-7 cells. Furthermore, CoQ~0~ treatment significantly enhanced UVB-induced apoptosis in MCF-7 cells. As apoptosis has become a new therapeutic target in cancer research, these results confirm that CoQ~0~ can be used as a chemotherapeutic or chemopreventive agent that enhances UVB-induced apoptosis in human breast cancer cells. In addition, further investigation of its activity, in vivo, is necessary to elaborate and exploit this nascent promise.
**Authors' Note:** Authors Hui-Min Wang and Hsin-Ling Yang contributed equally to this study.
**Declaration of Conflicting Interests:** The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
**Funding:** The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the grants MOST-104-2320-B-039-040-MY3, MOST-103-2320-B-039-038-MY3, NSC-103-2622-B-039-001-CC2, CMU103-ASIA-12, and CMU 103-ASIA-09 from the Ministry of Science and Technology, Asia University, and China Medical University, Taiwan.
|
Thirty novel genetic variations in the SLC29A1 gene encoding human equilibrative nucleoside transporter 1 (hENT1).
Thirty-nine genetic variations, including thirty novel ones, were found in the human SLC29A1 gene, which encodes equilibrative nucleoside transporter 1, from 256 Japanese cancer patients administered gemcitabine. The found novel variations included -8,166G>A, -81,10A>G, -7,947G>A, -7,789T>C, -5,595G>A, -3,803_-3,783delTCGGGGAGGTGGCAGTGGGCG, -3,548G>C, -3,414G>A, -1355T>C, -34C>G, IVS1+141G>A, IVS1+260C>T, IVS1-82C>T, 177C>G, IVS3-6C>T, 564C>T, IVS8+44T>C, IVS8+90T>C, IVS8+97T>C, IVS8+131C>T, IVS8+169G>A, 933T>C, 954C>T, IVS11-52G>C, IVS11-46G>A, 1,288G>A, 1,641C>G, 1,703_1,704delGT, 1812C>T, and 1861C>T. The frequencies were 0.051 for IVS8+169G>A, 0.012 for -7,947G>A, 0.006 for IVS1+141G>A and 1,703_1,704delGT, 0.004 for -8,166G>A, -8,110A>G, -3,548G>C, -1,355T>C, -34C>G, IVS8+44T>C, and 1,812C>T, and 0.002 for the other 19 variations. Among them, 177C>G and 1,288G>A resulted in amino acid substitutions Asp59Glu and Ala430Thr, respectively. Using the detected polymorphisms, linkage disequilibrium analysis was performed, and 28 haplotypes were identified or inferred. Our findings would provide fundamental and useful information for genotyping SLC29A1 in the Japanese and probably other Asian populations.
|
Recently I caught wind of an independent study being conducted by the University of Maryland Baltimore County about the effects of DADT on the mental health of those who have been directly affected by the policy. After contacting the man responsible for the project directly, I was able to learn a thing or two about this ground-breaking research which barely scratches the surface of what needs to be done.
Initially, the study is being conducted in the form of a survey, and those working on it hope to achieve an impact comparable to early Post-Traumatic Stress Disorder (PTSD) research.
The bulk of the anonymous survey’s 200 participants came from the pool of LGBT servicemembers known as OutServe, and seeks to find a correlation between demographics: actively serving vs veteran, different services, and even hetero- vs homosexual.
In my interview with Jeremy Johnson, the headman behind the research, he pointed out how he feels organizations like the VA are not adequately equipped for the post-DADT generation of troops. He detailed how no guidance exists for them to care for transgender veterans, which leads to an interesting discussion as to whether or not, or to what extent the government should pay for their extensive treatments.
Johnson’s survey also seeks to focus on the services provided to those currently serving, and is concerned they are not being used. The survey asks questions to learn to what degree LGBT servicemebers are afraid to use the chaplain corps, get tested for STDs, or even confide in their chain of command.
From my personal experiences under the Don’t Ask, Don’t Tell policy the questions asked in the survey seemed reasonable. The main downside to the survey is its small scale. Due to the fact it is a university survey it is limited to course requirements and limited resources. In order to accomplish its ambitious goals the study needs to extend beyond the constraints and limitations of SurveyMonkey.com.
So what is the next step? Johnson is hoping to conduct one-on-one interviews. If you have been personally affected by DADT, you can contact him at [email protected]
– Officer X is a young, gay military officer who is currently serving on active duty despite the “Don’t Ask, Don’t Tell” ban on open service. He is a pilot and regularly flies throughout the world both in and out of combat. His views are his alone and do not reflect the opinions of the U.S. military, its branches, or any organization. Follow him on Twitter @TIMEOfficerX or email him [email protected]
|
( EA) (NASDAQ: ERTS)[2] is an international developer, marketer, publisher and distributor of video games. EA later grew via acquisition of several successful developers. By the early 2000s, EA had become one of the world's largest third-party publishers. — “Electronic Arts - Wikipedia, the free encyclopedia”,
Ea definition, the Akkadian god of wisdom, the son of Apsu and father of Marduk: the counterpart of Enki. See more. — “Ea | Define Ea at ”,
EA Tiburon Gives Back to Local Teachers through A Gift For Teaching. Join the EA Community. Come and introduce yourself! Tell us about your background and join the EA Community. You will receive information about EA news and events and you may be contacted about opportunities at EA. — “Electronic Arts Employment”,
Your entrance to the world of EA Battlefield. — “EA - ::Battlefield Franchise::”,
Official site for The Sims 2, the simulation game that lets you create simulated people, and either help them have a long, successful existence or leave their lives in shambles. With screenshots, videos, and news about The Sims 2 expansion packs. — “The Sims 2”, thesims2
Videosrelated videos for ea
EA SPORTS MMA Quick Clip #10: Mayhem Miller vs. Jacare Full Gameplay Video with Commentary EA SPORTS MMA Creative Director Jason Barnes (Jacare) and Lead Gameplay Tester Mark Taylor (Mahem Miller) face off in an epic EA SPORTS MMA battle. After the match, we brought both guys in to VO the fight and share with the community what they were thinking along the way. Download the EA SPORTS MMA Demo on September 28th! Don't forget to like us on Facebook: /EASPORTSMMA Available October 19th! Pre-Order today!
Classic Game Room HD - EA SPORTS ACTIVE for Wii review Classic Game Room HD reviews EA SPORTS ACTIVE PERSONAL TRAINER for Nintendo Wii. This exercise, physical trainer video game for Nintendo Wii is an excellent, well produced way to exercise, get fit, burn calories and use your Wii for something other than Mario Kart. This review of EA Sports Active for Wii has gameplay footage from Wii EA Sports Active which also uses the Wii Fit balance board (Although this review doesn't have it). Create your own workout from numerous cardio, upper body, lower body and sports themed exercises. Calculate in advance how many calories you'll burn, lose weight while jogging in place and pull some punches in Wii exercise boxing in EA Sports Active. This workout video game seems to be tailored to women but CGR is a man, MAN! And men need to stay in shape too, for a long healthy life of video game playing and beer drinkin'. This game features strength training on Wii, boxing, tennis, basketball volleyball, running, walking, knee ups, bent over rows, tricep kickbacks, arm bicep curls and more.
Need for Speed Hot Pursuit - E3 Reveal Trailer This November, cops are back in Need for Speed in a big way. Get ready for edge-of-your-seat, open-world pursuits in our most connected game ever.
Thank you from everyone at EA SPORTS FIFA The EA SPORTS FIFA Facebook page now has over 2 million fans and we want to thank each and every one of you! For more information on FIFA 11 visit: Facebook Twitter:
Bulletstorm: Skillisode #1 There are over 140 skillshots in Bulletstorm, our skillisode series will explore some of the funniest, grotesque, and exciting ways to mutilate an enemy. Bulletstorm in stores February 22nd , pre-order your copy today!
Crysis 2 - Multiplayer Progression (part 1) The Nanosuit is the ultimate evolution of warfare in Crysis 2. In this first installment, explore the vast array of customization and enhancements available to the Nanosuit in multiplayer, allowing gamers to play the game their way. Whether you prefer strength, speed, or stealth, Crysis 2 gives you the ability to Be The Weapon.
EA - Upcoming Games Thanks for all your love this year. We hope you've enjoyed clocking up the game time on all our 2010 releases. There are loads to look forward in the upcoming years too. Take a look into our crystal ball and see for yourself.
Bulletstorm - Last Call Check out the latest video for the upcoming shooter, Bulletstorm. Bulletstorm worked with New Deal Studios and Director Matthew Gratzner to create the epic video Last Call. In stores 2.22.11, pre-order your copy today here: bit.ly
Battlefield Bad Company 2 PSA Grenade spam affects more than 2000000 people worldwide every day. This very special public service message from star pitcher CC Sabathia, with the help of the caring scientists of DICE and Battlefield Bad Company 2, reveals the miracle cure. More at www.battlefieldbadcompany2.com
EA SPORTS MMA: Really? Available October 19th! Pre-Order Now! Don't forget to like us on Facebook: /EASPORTSMMA
BulletStorm - TV Commercial Bulletstorm brings new furor to first-person shooter action with its signature 'kill with skill' gameplay, which is packed with blockbuster moments. Coming February 22nd 2011.
RMR: Rick at Electronic Arts Rick goes to work at one of Canadas top video game developers in Burnaby, BC.
EA SPORTS FIFA Goal Of The Year 2010 Join us for a celebration of the very best goals from FIFA 10, FIFA 11 and 2010 FIFA World Cup. You can see more videos like this at . If you think you can do better then why not enter the Goal of the Week Competition!
EA SPORTS - it's in the game Tutorial on how to deliver the line EA Sports It's in the game!
EA Sports MMA: The Impossible Achievement Guide Geoff and Jack show you an extremely easy way to get the following Achievements in EA Sports MMA: The Impossible, Hands of Stone, and Rock Out With Your Knockout.
EA Sports its in the game
Prince Ea "I Make Smart Cool" Official Brand/Promo Video DOWNLOAD THIS FREESTYLE: Support the Movement...Lets take this Game OVER!! SMART=Sophisticating Millions And Revolutionizing Thought Cop the same sweater im wearing at the movement site: http Intro/Outro Instrumentals...
Need for Speed Hot Pursuit at the EA Press Conference In case you missed the BIG intro to Need for Speed Hot Pursuit, we're bringing it to you again. NFSHP opened EA's Press Conference the Monday before E3, and this is how it played out. Enjoy!
Tiger Woods 09 - Walk on Water As a response to a fan video from Tiger Woods PGA TOUR 08, Tiger Woods and EA SPORTS demonstrate that the "glitch" Levinator25 thought he found in the game, is not a glitch at all.
It Gets Better: EA Employees EA employees share their stories. Learn more at . If you need help, call The Trevor Lifeline at 866-4-U-TREVOR (866.488.7386) or visit .
Blogs & Forumblogs and forums about ea
“If you're having trouble logging in, you may have an older EA Account. Now, EA Accounts are created using an email address – if you have previously created an”— EA - Action, Fantasy, Sports, and Strategy Video Games,
“Follow all the latest news from the game's producers on the Madden NFL 11 Blog from EA SPORTS. Welcome to what will now be a Thursday tradition for the EA SPORTS Game Changers Fantasy Focus blog”— Madden Ultimate Team Week 10 Update,
“The EA forum is a social network event sponsored by the Open Group in The EA forum started in 2005 and occurs every second month or so in the major centres”— EA Forum | The Open Group SA, opengroup.co.za
“http:///eaforum/posts/list/2674611.page Missed last week due to Canuck Thanksgiving and what not here's some http:///eaforum/posts/list/3039941.page. Longplays Well, there was this http:///15599313 but”— EA Skate Producer Blog : EA Games,
“The EA forum is a social network event sponsored by the Open Group in The EA forum started in 2005 and occurs every second month or so in the major centres”— EA Forum | Real IRM International,
|
<html xmlns:MSHelp="http://msdn.microsoft.com/mshelp" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:xanx="http://schemas.microsoft.com/developer/xanx/2005"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta name="save" content="history" /><title>2D Collision Tutorial 1: Rectangle</title>
<style><!--
/***********************************************************
* SCRIPT-SUPPORTING STYLES
***********************************************************/
/* Defines the userData cache persistence mechanism. */
.userDataStyle
{
behavior: url(#default#userData);
}
/* Used to save the scroll bar position when navigating away from a page. */
div.saveHistory
{
behavior: url(#default#saveHistory);
}
/* Formats the expand/collapse images for all collapsible regions. */
img.toggle
{
border: 0;
margin-right: 5;
}
/* Formats the Language filter drop-down image. */
img#languageFilterImage
{
border: 0;
margin-left: 0;
vertical-align: middle;
}
/* Formats the Members Options filter drop-down image. */
img#membersOptionsFilterImage
{
border: 0;
margin-left: 0;
vertical-align: middle;
}
/* Formats the Collapse All/Expand All images. */
img#toggleAllImage
{
margin-left: 0;
vertical-align: middle;
}
/* Supports XLinks */
MSHelp\:link
{
text-decoration: underline;
color: #0000ff;
hoverColor: #3366ff;
filterString: ;
}
body
{
background: #FFFFFF;
color: #000000;
font-family: Verdana;
font-size: medium;
font-style: normal;
font-weight: normal;
margin-top: 0;
margin-bottom: 0;
margin-left: 0;
margin-right: 0;
width: 100%;
/*font-size: 110%;*/
}
div.section
{
margin-left: 15px;
}
div.hxnx5
{
margin-left: 1.5em;
}
/* Font for all headings */
h1, h2, h3, h4, h5, h6
{
font-family: Verdana, Arial, Helvetica, sans-serif;
margin-top: 18;
margin-bottom: 8;
font-weight: bold;
}
h1
{
font-size: 130%;
color: #003399;
}
div#scrollyes h1 /* Changes font size for full-scrolling topic */
{
font-size: 150%;
}
h2
{
font-size: 122%;
}
h3
{
font-size: 115%;
margin-top: 9;
margin-bottom: 4;
}
h4
{
font-size: 115%;
margin-top: 9;
margin-bottom: 4;
}
h5
{
font-size: 100%;
margin-top: 9;
margin-bottom: 4;
}
h6
{
font-size: 100%;
margin-top: 9;
margin-bottom: 4;
}
ul p, ol p, dl p
{
margin-left: 0em;
}
p
{
margin-top: .6em;
margin-bottom: .6em;
}
td p
{
margin-top: 0.0em;
margin-bottom: 0.6em;
}
dd p
{
margin-top: 0.0em;
margin-bottom: 0.6em;
}
.image
{
text-align: center;
}
dl
{
margin-top: 0em;
margin-bottom: 1.3em;
}
dd
{
margin-bottom: 0em;
margin-left: 1.5em;
}
dl.glossary dd
{
margin-bottom: 0em;
margin-left: 1.5em;
}
dt
{
margin-top: .6em;
margin-bottom: 1;
}
ul, ol
{
margin-top: 0.6em;
margin-bottom: 0.6em;
}
ol
{
margin-left: 2.5em;
}
ul
{
list-style-type: disc;
margin-left: 1.9em;
}
li
{
margin-bottom: 0.4em;
}
ul ol, ol ol
{
list-style-type: lower-alpha;
}
pre
{
margin-top: .6em;
margin-bottom: .6em;
font: 105% Lucida, mono;
color: #000066;
}
code
{
font-family: Monospace, Courier New, Courier;
font-size: 105%;
color: #000066;
}
table.userdata td
{
background: #ffffff;
background-color: #F5F5F5;
border-color: #ffffff;
border: none;
}
table.clsWarning
{
background: #ffffff;
padding: 0px;
margin: 0px;
border: none;
}
table.clsWarning td
{
padding: 0px;
margin: 0px;
background: #ffffff;
vertical-align: middle;
font-size: 70%;
}
div#mainSection table
{
width: 95%;
background: #ffffff;
margin-top: 5px;
margin-bottom: 5px;
}
div#mainSection table th
{
padding: 5px 6px;
background: #EFEFF7;
text-align: left;
font-size: 70%;
vertical-align: bottom;
border-bottom: 1px solid #C8CDDE;
}
div#mainSection table td
{
padding: 5px 5px;
background: #F7F7FF;
vertical-align: top;
font-size: 70%;
border-bottom: 1px solid #D5D5D3;
}
div#syntaxCodeBlocks table th
{
padding: 1px 6px;
color: #000066;
}
div#syntaxCodeBlocks table td
{
padding: 1px 5px;
}
/* Applies to the running header text in the first row of the upper table in the
non-scrolling header region. */
span#runningHeaderText
{
color: #003399;
font-size: 90%;
padding-left: 13;
}
/* Applies to the topic title in the second row of the upper table in the
non-scrolling header region. */
span#nsrTitle
{
color: #003399;
font-size: 120%;
font-weight: 600;
padding-left: 13;
}
/* Applies to everything below the non-scrolling header region. */
div#mainSection
{
font-size: 70%;
width: 100%;
}
/* Applies to everything below the non-scrolling header region, minus the footer. */
div#mainBody
{
font-size: 90%;
margin-left: 15;
margin-top: 10;
padding-bottom: 20;
}
/* Adds right padding for all blocks in mainBody */
div#mainBody p, div#mainBody ol, div#mainBody ul, div#mainBody dl
{
padding-right: 5;
}
div#mainBody div.alert, div#mainBody div.code, div#mainBody div.tableSection
{
width:98.9%;
}
div.alert p, div.code p
{
margin-top:5;
margin-bottom:8;
}
/*- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Begin Note Styles - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -*/
div#mainSection div.alert table
{
border: 0;
}
div#mainSection div.alert table th
{
padding-top: 0;
padding-bottom: 0;
padding-left: 5;
padding-right: 5;
}
div#mainSection div.alert table td
{
padding-left: 5;
padding-right: 5;
}
img.note
{
border: 0;
margin-left: 0;
margin-right: 3;
}
/*- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - End Note Styles - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -*/
/*- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Begin Non-scrolling Header Region Styles - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -*/
/* Applies to the entire non-scrolling header region. */
div#header
{
background-color: #D4DFFF;
padding-top: 0;
padding-bottom: 0;
padding-left: 0;
padding-right: 0;
width: 100%;
}
/* Applies to both tables in the non-scrolling header region. */
div#header table
{
margin-top: 0;
margin-bottom: 0;
border-bottom-color: #C8CDDE;
border-bottom-style: solid;
border-bottom-width: 1;
background: #D4DFFF;
width: 100%;
}
/* Applies to cells in both tables in the non-scrolling header region. */
div#header table td
{
color: #0000FF;
font-size: 70%;
padding-right: 20;
padding-top: 1;
padding-bottom: 1;
border: none;
background: #D4DFFF;
}
/* Applies to the last row in the upper table of the non-scrolling header region. Text
in this row includes See Also, Constructors, Methods, and Properties. */
div#header table tr#headerTableRow3 td
{
padding-bottom: 2;
padding-top: 5;
padding-left: 15;
}
/* Applies to the lower table in the non-scrolling header region. Text in this table
includes Collapse All/Expand All, Language Filter, and Members Options. */
div#header table#bottomTable
{
border-top-color: #FFFFFF;
border-top-style: solid;
border-top-width: 1;
text-align: left;
padding-left: 15;
}
blockquote
{
margin-left: 3.8em;
margin-right: 3.8em;
margin-top: .6em;
margin-bottom: .6em;
}
sup
{
text-decoration: none;
font-size: smaller;
}
a:link
{
color: #0000FF;
/* font-weight: bold */
}
a:visited
{
color: #0000AA;
/* font-weight: bold */
}
a:hover
{
color: #3366FF;
/* font-weight: bold */
}
.label
{
font-weight: bold;
margin-top: 1em;
margin-left: -26px;
}
.tl
{
margin-bottom: .75em;
}
.atl
{
padding-left: 1.5em;
padding-bottom: .75em;
}
.cfe
{
font-weight: bold;
}
.mini
{
font-size: smaller;
}
.dt
{
margin-bottom: -.6em;
}
.indent
{
margin-left: 1.9em;
margin-right: 1.9em;
}
.product
{
text-align: right;
color: #333333;
font-size: smaller;
font-style: italic;
}
.buttonbarshade
{
position: relative;
margin: 0;
left: 0px;
top: 2;
width: 50%;
height: 40px;
}
.buttonbartable
{
position: absolute;
margin: 0;
padding:0;
border:0;
left:0px;
top: 2;
width: 100%;
height: 40px;
}
/* background color, font for header */
table.buttonbartable td, table.buttonbarshade td
{
background: #ffffff; /*#5177B8; #80C615;*/
border-left: 0px solid #80C615;
margin: 0;
padding: 0px 0px 0px 0px;
font-family: Impact, sans-serif;
font-size: 14pt;
}
table.buttonbartable td.button1
{
background: #5177B8; /*#80C615;*/;
padding: 0;
font-weight: bold;
text-align: center;
cursor: hand;
}
table.buttonbartable td.button2
{
background: #5177B8; /*#80C615;*/;
font-weight: bold;
text-align: center;
}
table.buttonbartable td.button3
{
background: #5177B8; /*#80C615;*/;
font-weight: bold;
text-align: center;
}
table.buttonbartable td.runninghead
{
padding-left: 0px;
font-style: italic;
text-align: left;
}
.version
{
text-align: left;
color: #000000;
margin-top: 3em;
margin-left: -26px;
font-size: smaller;
font-style: italic;
}
.lang, .ilang
{
color: #0000ff;
font: normal 7pt Arial, Helvetica, sans-serif;
}
div.langMenu
{
position: absolute;
z-index: 1;
width: 96pt;
padding: 8pt;
visibility: hidden;
border: 1px solid #000000;
background: #ffffd0;
}
div.langMenu ul
{
padding-left: 2em;
margin-left: 0;
}
div.filtered
{
margin: 4pt 0 8pt -26px;
padding: 4px 4px 8px 26px;
width: 100%;
border: 2px solid #aaaacc;
background: #ffffff;
}
div.filtered2
{
margin: 4pt 0 8pt -26px;
padding: 4px 4px 8px 26px;
width: 100%;
border: none;
background: #ffffff;
}
div.filtered h1, div.filtered h2, div.filtered h3, div.filtered h4
{
margin-left: -22px;
}
div.filtered span.lang
{
position: relative;
left: -22px;
}
div.reftip
{
position: absolute;
z-index: 1;
padding: 8pt;
visibility: hidden;
border: 1px solid #000000;
background: #ffffd0;
}
a.synParam
{
color: #0000FF;
/*color: #3F7800;*/
/*color: #8DC54F;*/
text-decoration: none;
font-weight: normal;
}
a.synParam:hover
{
text-decoration: underline;
font-weight: normal;
}
div.sapop
{
position: absolute;
z-index: 1;
left: 26px;
width: 100%;
padding: 10px 10px 10px 36px;
visibility: hidden;
border: 1px solid #000000;
background: #ffffd0;
}
div.footer
{
width: 100%;
border: none;
background: #ffffff;
margin-top: 18pt;
padding-bottom: 12pt;
color: #0000FF;
/*color: #228B22; */
text-align: center;
font-size: 76%;
}
div.preliminary
{
margin-top: 8pt;
padding-bottom: 12pt;
color: #A0A0A0;
}
/* A procedure section. eg. 'To create a file', 'To add a value' */
div.proc
{
margin-left: 0.5em;
}
/* The title of a 'procedure' section. */
div.proc h3
{
font-family: Verdana, Arial, Helvetica, sans-serif;
font-weight: bold;
font-size: 115%;
margin-top: 1em;
margin-bottom: 0.4em;
margin-left: -0.5em;
color: #003399;
}
div.proc ul
{
margin-left: 1.5em;
}
div.proc ol
{
margin-left: 2.0em;
}
.note
{
margin-left: 14pt;
margin-right: 12pt;
}
.indent1
{
margin-left: 12pt;
}
.indent2
{
margin-left: 24pt;
}
.indent3
{
margin-left: 36pt;
}
p.proch
{
padding-left: 16px;
}
p.proch img
{
position: relative;
vertical-align: top;
left: -18px;
margin-right: -14px;
margin-bottom: -18px;
}
div.clsPlatSpec
{
background-color:#FFF8DC;
border-style:solid;
border-width:1pt 0pt 0pt 1pt;
border-color:#ffE4C4;
margin-top:0.6em;
width:100%;
}
/* Applies to the language labels in the Language Filter drop-down list. */
.languageFilter
{
color: #0000FF;
cursor:hand;
text-decoration:underline;
padding-bottom:4;
}
/* Dropdown areas */
#languageSpan {
position: absolute;
visibility: hidden;
border-style: solid;
border-width: 1px;
border-color: #C8CDDE;
background: #d4dfff;
padding: 4px;
font-size: 70%;
}
#membersOptionsSpan {
position: absolute;
visibility: hidden;
border-style: solid;
border-width: 1px;
border-color: #C8CDDE;
background: #d4dfff;
padding: 4px;
font-size: 70%;
}
--></style>
<xml>
<MSHelp:TOCTitle Title="2D Collision Tutorial 1: Rectangle" />
<MSHelp:RLTitle Title="2D Collision Tutorial 1: Rectangle" />
<MSHelp:Keyword Index="A" Term="O:Microsoft.Xna.RectangleCollision" />
<MSHelp:Keyword Index="A" Term="bbeb996e-2cb9-0e00-fc65-de4085e95cc0" />
<MSHelp:Keyword Index="K" Term="2D Collision Tutorial 1: Rectangle" />
<MSHelp:Attr Name="AssetID" Value="bbeb996e-2cb9-0e00-fc65-de4085e95cc0" />
<MSHelp:Attr Name="Locale" Value="en-us" />
<MSHelp:Attr Name="CommunityContent" Value="1" />
<MSHelp:Attr Name="TopicType" Value="kbOrient" />
</xml>
</head><body><div id="mainSection"><div id="mainBody">
<h1>2D Collision Tutorial 1: Rectangle</h1>
This article explains several simple techniques for constraining motion and collision detection in 2D.
<a id="ID2EJ" name="ID2EJ"> </a><h1 class="heading">Introduction</h1><div id="ID2EJ" class="hxnx1">
<p>Games do not need to be complex to be fun and interesting. Obstacle-avoidance games consist of a character and some objects that are on a crash course toward each other. The player must avoid the oncoming objects.</p>
<p>
Here is the player character successfully dodging falling blocks:</p>
<img src="FallingBlocks.png" />
<p>
And here the player is not-so-successfully dodging falling blocks:</p>
<img src="Blocked.png" />
<p>When you complete this tutorial, you will have everything you need to create a complete obstacle avoidance game.</p>
</div>
<a id="ID2E3" name="ID2E3"> </a><h1 class="heading">Step 1: Create a New Project and Include Artwork</h1><div id="ID2E3" class="hxnx1">
<p>Before you start coding you need textures for the player character and falling blocks. These textures can be of any size and should use magenta (100 percent red, 0 percent green, and 100 percent blue) for anything that should be transparent. Save your textures as .bmp or .png files and not as .gif or .jpg in order to avoid artifacts caused by poor image compression.</p>
<p>Here are the textures used in the sample:</p>
<img src="texture1.png" /> <img src="texture2.png" />
<div class="alert"><table cellspacing="0" cellpadding="0"><tr><th>Note </th></tr><tr><td>Magenta is used because the default texture processor will perform color keying logic, which converts magenta to be completely transparent.</td></tr></table></div>
<p>Next, you need to create a new Windows Game project and add the textures.</p>
<div class="proc"><h3 class="subHeading">To create a new project</h3><div class="subSection">
<ol>
<li>Open <b>XNA Game Studio 4.0</b>.</li>
<li>On the <b>File</b> menu, click <b>New Project</b> to create a new project.</li>
<li>From the list of templates that appears, select either <b>Windows Game (4.0)</b> or <b>Xbox 360 Game (4.0)</b>.</li>
<li>Type a <i>name</i> for your game into the <b>Name</b> field, and indicate a <i>path</i> where files are to be stored in the <b>Location</b> field. </li>
<li>Click <b>OK</b>.</li>
</ol>
</div></div>
<p>The code for your new game will be displayed. The project already contains many of the methods that are needed to start and run a game. Right now, however, you need to make sure your art assets are being loaded. Follow these steps to get some art into your project.</p>
<div class="proc"><h3 class="subHeading">To add art to your project</h3><div class="subSection">
<ol>
<li>Ensure you can see the Solution Explorer for your project. If you cannot see it, on the <b>View</b> menu, click <b>Solution Explorer</b>. When it appears, you will see files associated with your project in a tree structure.</li>
<li>
In <b>Solution Explorer</b>, right-click the <b>Content project</b> icon, click <b>Add</b>, and then click <b>Existing Item</b>.</li>
<li>
In the <b>Existing Item</b> dialog box, select the path where your artwork is stored, and then select your two textures. If you do not find the textures, ensure you changed the <b>Files of type</b> selection box to <b>Content Pipeline Files</b>.
</li>
<li>Click <b>OK</b>.</li>
</ol></div></div>
<p>Your project structure should look similar to this:</p>
<img src="rectanglecollisions.png" />
<p>At this point, you're ready to code!</p>
</div>
<a id="ID2EJE" name="ID2EJE"> </a><h1 class="heading">Step 2: Initialization and Drawing</h1><div id="ID2EJE" class="hxnx1">
<p>Take a look at the code for Game1.cs; it should still be on your screen from opening up your project. The first thing you want to do is set up your drawing code. For this, you need to load and store the textures, as well as establish data structures for your player character and falling blocks. You will also declare a <b>SpriteBatch</b>, which you will use to draw these objects.</p>
<ol>
<li>In <b>Solution Explorer</b>, double-click <b>Game1.cs</b> to view the code for your game.</li>
<li><p>Add the following declarations inside the game class.</p>
<div class="code"><span codeLanguage=""><table><tr><th> </th></tr><tr><td><pre><pre>// The images to draw
Texture2D personTexture;
Texture2D blockTexture;
// The images will be drawn with this SpriteBatch
SpriteBatch spriteBatch;
// Person
Vector2 personPosition;
// Blocks
List<Vector2> blockPositions = new List<Vector2>(); </pre></pre></td></tr></table></span></div>
</li>
<li>
<p>You must properly initialize these variables. The textures should be loaded in the <b>LoadContent</b> method and the rest of the initialization logic should be performed in the <b>Initialize</b> method. Make the following additions to those methods:</p>
<div class="code"><span codeLanguage=""><table><tr><th> </th></tr><tr><td><pre><pre>protected override void Initialize()
{
base.Initialize();
// Start the player in the center along the bottom of the screen
personPosition.X = (Window.ClientBounds.Width - personTexture.Width) / 2;
personPosition.Y = Window.ClientBounds.Height - personTexture.Height;
}
protected override void LoadContent()
{
// Load textures
blockTexture = Content.Load<Texture2D>("Block");
personTexture = Content.Load<Texture2D>("Person");
// Create a sprite batch to draw those textures
spriteBatch = new SpriteBatch(graphics.GraphicsDevice);
} </pre></pre></td></tr></table></span></div>
<div class="alert"><table cellspacing="0" cellpadding="0"><tr><th>Note </th></tr><tr><td>In this sample, all positions represent the upper-left corner of where the objects will appear on screen. Due to this, the width of the texture must be accounted for when positioning objects.</td></tr></table></div>
</li>
<li>
<p>Now that you have your textures and other sprite data, you need to draw them. Modify the <b>Draw</b> method to look like this:</p>
<div class="code"><span codeLanguage=""><table><tr><th> </th></tr><tr><td><pre><pre>protected override void Draw(GameTime gameTime)
{
graphics.GraphicsDevice.Clear(Color.CornflowerBlue);
spriteBatch.Begin();
// Draw person
spriteBatch.Draw(personTexture, personPosition, Color.White);
// Draw blocks
foreach (Vector2 blockPosition in blockPositions)
spriteBatch.Draw(blockTexture, blockPosition, Color.White);
spriteBatch.End();
base.Draw(gameTime);
}</pre></pre></td></tr></table></span></div>
</li>
<li>
<p>At this point, you should be able to compile and run your project by pressing F5 or clicking the <b>Debug</b> menu, and then clicking <b>Start Debugging</b>. Your player character will be there, but where are the blocks?
</p>
</li>
</ol>
<div class="alert"><table cellspacing="0" cellpadding="0"><tr><th>Note </th></tr><tr><td>If you have created an Xbox 360 Game and you can't see the player character, it is possible the player character is being drawn outside your TV's safe region. For simplicity, you can manually decrease the value of <i>personPosition.Y</i> until the character is visible. See the usage of the <b>safeBounds</b> field in the accompanying source code for a more robust solution.</td></tr></table></div>
</div>
<a id="ID2E5G" name="ID2E5G"> </a><h1 class="heading">Step 3: Making it all Move</h1><div id="ID2E5G" class="hxnx1">
<p>There are no blocks being drawn because the blocks list is empty. You'll need to add logic to create and animate the falling blocks. While you're at it, why not add the ability to move the player character?</p>
<ol>
<li>
<p>For simplicity, the blocks and player character will move at fixed rates. The number and position of falling blocks will be determined randomly. To represent these behaviors, you need to append the declarations at the top of the <b>Game</b> class:</p>
<div class="code"><span codeLanguage=""><table><tr><th> </th></tr><tr><td><pre><pre>// Person
Vector2 personPosition;
const int PersonMoveSpeed = 5;
// Blocks
List<Vector2> blockPositions = new List<Vector2>();
float BlockSpawnProbability = 0.01f;
const int BlockFallSpeed = 2;
Random random = new Random(); </pre></pre></td></tr></table></span></div>
<p>These values are arbitrary; feel free to adjust them as you like.</p>
</li>
<li>
<p>Now, modify the <b>Update</b> method to match the following code:</p>
<div class="code"><span codeLanguage=""><table><tr><th> </th></tr><tr><td><pre><pre>protected override void Update(GameTime gameTime)
{
// Get input
KeyboardState keyboard = Keyboard.GetState();
GamePadState gamePad = GamePad.GetState(PlayerIndex.One);
// Allows the game to exit
if (gamePad.Buttons.Back == ButtonState.Pressed)
this.Exit();
// Move the player left and right with arrow keys or d-pad
if (keyboard.IsKeyDown(Keys.Left) ||
gamePad.DPad.Left == ButtonState.Pressed)
{
personPosition.X -= PersonMoveSpeed;
}
if (keyboard.IsKeyDown(Keys.Right) ||
gamePad.DPad.Right == ButtonState.Pressed)
{
personPosition.X += PersonMoveSpeed;
}
// Spawn new falling blocks
if (random.NextDouble() < BlockSpawnProbability)
{
float x = (float)random.NextDouble() *
(Window.ClientBounds.Width - blockTexture.Width);
blockPositions.Add(new Vector2(x, -blockTexture.Height));
}
// Update each block
for (int i = 0; i < blockPositions.Count; i++)
{
// Animate this block falling
blockPositions[i] =
new Vector2(blockPositions[i].X,
blockPositions[i].Y + BlockFallSpeed);
}
base.Update(gameTime);
} </pre></pre></td></tr></table></span></div>
</li>
<li>
<p>Before continuing, carefully read the preceding code, which performs the following actions:</p>
<ol>
<li>Collects user input.</li>
<li>Adjusts the position of the player character accordingly.</li>
<li>Creates new blocks some percentage of the time.</li>
<li>Creates new blocks at random positions along the top of the screen.</li>
<li>Animates each block falling down.</li>
</ol>
<p>Compile and run your project by pressing F5 or clicking the <b>Debug</b> menu, and then clicking <b>Start Debugging</b>. You should see your falling blocks and be able to move the player character!</p>
</li>
</ol>
</div>
<a id="ID2EGBAC" name="ID2EGBAC"> </a><h1 class="heading">Step 4: Boundary Collision</h1><div id="ID2EGBAC" class="hxnx1">
<p>You may have noticed that you can move your character off screen and simply hide from all the following blocks (not that you would need to because the blocks can't hurt you yet). What might not be immediately visible is the fact that your falling blocks are not being deleted from the game. If you leave your game running for a long time, it will consume all of the memory available on your system!</p>
<p>To remedy these two problems, you need to constrain the player character to the window's boundaries and delete blocks that fall off the bottom.</p>
<ol>
<li>
<p>Modify the <b>Update</b> method by adding the lines in bold from the following code:</p>
<div class="code"><span codeLanguage=""><table><tr><th> </th></tr><tr><td><pre><pre>protected override void Update(GameTime gameTime)
{
// Get input
KeyboardState keyboard = Keyboard.GetState();
GamePadState gamePad = GamePad.GetState(PlayerIndex.One);
// Allows the game to exit
if (gamePad.Buttons.Back == ButtonState.Pressed)
this.Exit();
// Move the player left and right with arrow keys or d-pad
if (keyboard.IsKeyDown(Keys.Left) ||
gamePad.DPad.Left == ButtonState.Pressed)
{
personPosition.X -= PersonMoveSpeed;
}
if (keyboard.IsKeyDown(Keys.Right) ||
gamePad.DPad.Right == ButtonState.Pressed)
{
personPosition.X += PersonMoveSpeed;
}
<b>// Prevent the person from moving off of the screen
personPosition.X = MathHelper.Clamp(personPosition.X,
0, Window.ClientBounds.Width - personTexture.Width);</b>
// Spawn new falling blocks
if (random.NextDouble() < BlockSpawnProbability)
{
float x = (float)random.NextDouble() *
(Window.ClientBounds.Width - blockTexture.Width);
blockPositions.Add(new Vector2(x, -blockTexture.Height));
}
// Update each block
for (int i = 0; i < blockPositions.Count; i++)
{
// Animate this block falling
blockPositions[i] =
new Vector2(blockPositions[i].X,
blockPositions[i].Y + BlockFallSpeed);
<b>// Remove this block if it have fallen off the screen
if (blockPositions[i].Y > Window.ClientBounds.Height)
{
blockPositions.RemoveAt(i);
// When removing a block, the next block will have the same index
// as the current block. Decrement i to prevent skipping a block.
i--;
}</b>
}
base.Update(gameTime);
} </pre></pre></td></tr></table></span></div>
<p>The first set of code in bold simply prevents <i>personPosition.X</i> from ever becoming a value that places the player character outside the window's boundaries. The second set of code in bold identifies falling blocks that have left the bottom of the screen. When a block has left the bottom of the screen, it is removed from the blocks collection. </p>
<p>Both sets of code in bold are extremely simple collision detection and response mechanisms. They rely on knowledge of the specific rules of the obstacle avoidance game.</p>
</li>
<li>
<p>Compile and run your project by pressing F5 or clicking the <b>Debug</b> menu, and then clicking <b>Start Debugging</b>. You should be unable to move your player character outside the screen, and the game won't slowly fill up your computer's memory.</p>
</li>
</ol>
</div>
<a id="ID2EZCAC" name="ID2EZCAC"> </a><h1 class="heading">Step 5: Rectangle Collision</h1><div id="ID2EZCAC" class="hxnx1">
<p>If you have made it this far, you are just one piece of the puzzle away from something that resembles a game: your character needs to be able to get hit.</p>
<p>For the scope of this tutorial, the game will simply change the background color to red when the player character is hit with a falling block.</p>
<ol>
<li>
<p>Add the following declaration to the top of the <b>Game</b> class.</p>
<div class="code"><span codeLanguage=""><table><tr><th> </th></tr><tr><td><pre><pre>// For when a collision is detected
bool personHit = false; </pre></pre></td></tr></table></span></div></li>
<li>
<p>Modify the <b>Draw</b> method to begin like this:</p>
<div class="code"><span codeLanguage=""><table><tr><th> </th></tr><tr><td><pre><pre>protected override void Draw(GameTime gameTime)
{
GraphicsDevice device = graphics.GraphicsDevice;
// Change the background to red when the person was hit by a block
if (personHit)
device.Clear(Color.Red);
else
device.Clear(Color.CornflowerBlue); </pre></pre></td></tr></table></span></div>
</li>
<li>
<p>Now, you need to determine whether any of the falling blocks collide with the player. One simple way to do this is to determine whether the bounding rectangles of their sprites intersect. The XNA Framework provides a simple <b>Rectangle.Intersects</b> method for just this purpose.</p>
<p>Modify the block update loop in the <b>Update</b> method to look like this (new lines are in bold):</p>
<div class="code"><span codeLanguage=""><table><tr><th> </th></tr><tr><td><pre><pre><b>// Get the bounding rectangle of the person
Rectangle personRectangle =
new Rectangle((int)personPosition.X, (int)personPosition.Y,
personTexture.Width, personTexture.Height);</b>
// Update each block
<b>personHit = false;</b>
for (int i = 0; i < blockPositions.Count; i++)
{
// Animate this block falling
blockPositions[i] =
new Vector2(blockPositions[i].X,
blockPositions[i].Y + BlockFallSpeed);
<b>// Get the bounding rectangle of this block
Rectangle blockRectangle =
new Rectangle((int)blockPositions[i].X, (int)blockPositions[i].Y,
blockTexture.Width, blockTexture.Height);
// Check collision with person
if (personRectangle.Intersects(blockRectangle))
personHit = true;</b>
// Remove this block if it have fallen off the screen
if (blockPositions[i].Y > Window.ClientBounds.Height)
blockPositions.RemoveAt(i);
} </pre></pre></td></tr></table></span></div>
<p>This code determines the bounding rectangles for the player character and for each sprite. Each block's bounding rectangle is tested for intersection with the player character's bounding rectangle.</p></li>
<li>
<p>And that's it. Compile and run your project by pressing F5 or clicking the <b>Debug</b> menu, and then clicking <b>Start Debugging</b>.</p></li>
</ol>
</div>
<a id="ID2E2EAC" name="ID2E2EAC"> </a><h1 class="heading">Congratulations!</h1><div id="ID2E2EAC" class="hxnx1">
<p>You did it. There's a lot to making games, but you've accomplished a lot for just one short tutorial. An interactive experience with an objective thanks to simple collision detection. From here, there's no limit to where you can go!</p>
<p>Go to 2D Collision Tutorial 2: Per Pixel to continue. </p>
<a id="ID2ECFAC" name="ID2ECFAC"> </a><h2 class="subHeading">Ideas to Expand</h2><div id="ID2ECFAC" class="hxnx2">
<p>Got the urge to tinker with the project a bit? Try these ideas.</p>
<ul>
<li>Add a counter for number of blocks successfully dodged.</li>
<li>As the game progresses, make more blocks fall, and at a faster rate.</li>
<li>Add a five-second invincibility power up. The character should have to collide with the power up to activate.</li>
</ul>
</div>
</div>
</div><div class="footer" id="footer"><p>© 2010 Microsoft Corporation. All rights reserved.<br />Send feedback to <a href="mailto:[email protected]?subject=Documentation Feedback: 2D Collision Tutorial 1: Rectangle">[email protected]</a>.</p></div></div></body></html>
|
Now Commenting On:
Eaton says contact with Moustakas unintended
SURPRISE, Ariz. -- The D-backs' Adam Eaton said that the baseline contact that left the Royals' Mike Moustakas with a cut lip requiring two stitches in Wednesday's game was unintentional.
"I'm a guy trying to find my limitations on the bases and I saw something I thought I could take advantage of and it didn't work out. That's basically where it ends," Eaton said on Thursday. "It seemed like he was distracted, it was right after a strikeout, I thought [James] Shields was distracted, I mean that's how you find out what you can and can't do basically."
Eaton was trying to catch the Royals off guard and steal third base in the first inning, but Moustakas, the third baseman, alerted Shields and the pitcher threw out Eaton. He collided with Moustakas, whose upper lip was cut by Eaton's forearm as he made the tag. He was treated and stayed in the game. Afterward, other than saying Eaton had "no feel for the game," an obviously angry Moustakas wouldn't comment.
"We just kind of got a little tangled up and I guess he took offense to it. You take it your own way and I guess that's just how it crumbled," Eaton said. "There's not too many baseball games that you go through where there's not going to be some chirping, it's going to happen. ... For sure, any guy that steals bases and tries to get an advantage and max out their effort is going to sometimes rub people the wrong way. I just take it with a grain of salt and learn from it."
Moustakas had nothing more to say about it.
Dick Kaegel is a reporter for MLB.com. This story was not subject to the approval of Major League Baseball or its clubs.
|
1. Field of the Invention
The present invention relates to a binding device for forming a fold line on a booklet and an image forming apparatus having this.
2. Description of the Related Art
Conventionally, a binding device for folding a sheet outputted from a main body of an image forming apparatus such as a copying machine and a printer in half and sewing the inside of a book has been known.
The constitution of such a binding device is disclosed in Japanese Patent Application Laid-Open No. 61-2671. In addition, FIG. 16 shows a schematic block diagram of a main body of a conventional image forming apparatus 10 and a binding device 11 on their cross sections, which are disclosed in JP-A No. 61-2671.
As shown in FIG. 16, the binding device 11 is provided with a stack tray 12 as a sheet stacking portion, a folding knife 15 as a folding portion, and a folding roller pair 16 as a fold line forming portion.
On the stack tray 12, an opening portion 14 is disposed on its center portion, and a stopper 13 for stopping the sheet on a fixed position is disposed on an end portion of the stack tray 12. In addition, on the upper part of the opening portion 14 of the stack tray 12, the folding knife 15 is disposed so as to be capable of rising and falling.
When the sheets are conveyed from the main body of the image forming apparatus 10 to the binding device 11, the conveyed sheets material are stacked on the stack tray 12 in series.
Then, the folding knife 15 that is disposed upward of the stack tray 12 falls on the sheets stacked on the stack tray 12, and the folding knife 15 strikes the center portion of the sheet so as to fold the sheet and push the sheet into the opening portion 14 of the stack tray 12. In the following explanations, a plurality of sheets stacked on the stack tray 12 being folded down calls a booklet.
Sheets pushed into the opening portion 14 of the stack tray 12 is folded down to be made into a booklet. After that, the booklet is provided to the folding roller pairs 16 being folded down. The folding roller pairs 16 forms a fold line on the center portion of the booklet by conveying the booklet provided while sandwiching it from the opposite sides. The booklet having the fold line formed thereon is conveyed on a tray 17 due to rotation of the folding roller pairs 16 to be stacked on the tray 17.
However, when a pressure applied by the folding roller pair 16 is released, the booklet is opened by its own elasticity and a fold line of the booklet formed by the conventional bookbinding apparatus 11 is occasionally returned to the original state. As a result, the booklet has a poor-looking appearance such that the fold line is opened.
The problem relating to the opening of the fold line is most obvious in the case where sheets whose opening amount is large are used as sheets composing a booklet. The sheets whose opening amount is large mean sheets which are once folded but are easily opened including sheets such as cardboard whose rigidity is high and sheets such as thin paper whose rigidity is low but whose periphery has a small water amount in a low-humidity environment.
When a fold line is formed by bending sheets whose opening amount is originally small to a direction orthogonal to a fiber orientation of the sheets, the sheets are easily opened greatly. Such sheets are, therefore, regarded as sheets whose opening amount is large.
The problem relating to the opening of the sheet is not eliminated to not less than a certain degree even by increasing a pressure to be applied by the folding roller pair 16. For this reason, solving means other than the method for increasing the pressure by the folding roller pair 16 is required. As one example of the solving means, Japanese Patent Application Laid-Open No. 11-157247 discloses a method for humidifying sheets using a humidifying unit so as to ease the forming of fold lines of the sheets.
FIG. 17 is a schematic block diagram on a cross section of the binding device 11 having humidifying unit disclosed in JP-A No. 11-157247.
The bookbinding device 11 shown in FIG. 17 is provided with a humidifying chamber 18 as a humidifying unit, humidifying nozzles 19 and 20, and a heating roller pair 30 as a heating portion.
In FIG. 17, the humidifying chamber 18 humidifies sheets which are being conveyed on an upper stream side of the stack tray 12. The humidifying nozzle 19 humidifies a part of a booklet to be folded on an upper stream side of the folding roller pair 16. The humidifying nozzle 20 humidifies a part of a booklet to be folded on a lower stream side of the folding roller pair 16.
When these humidifying units 18, 19, and 20 humidify a part of a booklet to be folded, even if sheets whose opening amount is large are used, before a fold line is formed by the folding roller pair 16, the opening amount of the sheets can be reduced. Therefore, a fold line can be easily formed by the folding roller pair 16, so that a good-looking booklet without opening can be provided.
In the bookbinding apparatus 11 having the humidifying units disclosed in Japanese Patent Application Laid-Open No. 11-157247, however, a humidifying condition is not changed according to sheets in which a fold line is formed. For this reason, in the case of a booklet made of particularly sheets which water hardly penetrates such as sheets whose surface is specially treated, the sheets are curled to a direction where the booklet opens, and thus the booklet might have a poor-looking appearance.
In the conventional humidifying units, since the humidifying chamber 18 is constituted so as to humidify also a portion of a sheet which is not folded, this unnecessary humidifying causes inefficiency of the device.
As shown in FIG. 17, since the humidifying nozzles 19 and 20 humidify only a sheet on an outmost position of a booklet in the sheets composing the booklet, it is difficult to humidify sheets on an inner position of the booklet.
As a result, the opening amount of the sheets on the inner position with respect to the sheet on the outer position of the booklet cannot be sufficiently reduced, and thus the booklet might have a poor-looking appearance where the opening occurs.
In addition, the portion of the sheet that is humidified by the humidifying nozzle 19 is exposed from an opening portion 14 of the stack tray 12 to the outside. Therefore, water given by the humidifying nozzle 19 evaporates around the area till the booklet is folded down on the inside by the folding roller pairs 16.
As a result, since the opening amount of the sheet cannot be sufficiently reduced, the booklet might have a poor-looking appearance where opening occurs.
A phenomenon from the humidifying of the sheets to the occurrence of a curl is described with reference to FIGS. 18A, 18B, and 18C.
FIGS. 18A, 18B, and 18C are pattern diagrams showing a cross section of humidified sheets. In the drawings, a portion humidified by the humidifying units (hatched portion in the drawings) once stretches just after humidifying, but when the sheets are again dried, forces to a direction where the sheets further shrink with respect to the shape before humidifying are generated as shown by arrows in the drawings.
On the other hand, a portion which is not humidified is hardly influenced by humidifying and drying, and thus it does not stretch nor shrink. Therefore, a shrinkage amount is different between the portion to be humidified and the portion which is not humidified. As a result, when the sheets are humidified, the sheets are easily curled to a direction where the humidified surfaces of the sheets shrink.
That is, as shown in FIG. 18C, in the case where the inner side of the booklet shrinks due to the humidifying of the inner side, the sheets are curled to a direction where the booklet is closed. As a result, the sheets do not open, and the booklet does not have a poor-looking appearance.
As shown in FIG. 18A, however, since the humidifying nozzles 19 and 20 humidify the outer side of the booklet, the outer side of the booklet shrinks. Therefore, the sheets are curled to the direction where the booklet is opened, the opening occurs, and the booklet might have a poor-looking appearance.
|
Lockable push button actuator mechanisms suitable for use with mechanical locking systems such as are used on large tool containers and the like are well known. Patents that disclose such lockable push button actuator mechanisms that are well suited for use with mechanical locking systems include U.S. Pat. No. 7,126,066 issued Oct. 24, 2006, U.S. Pat. No. 7,205,492 issued Apr. 17, 2007, and U.S. Pat. No. 8,084,701 issued Dec. 27, 2011. These patents are referred to later herein as the Lockable Push Button Actuator Patents, and their disclosures are incorporated herein by reference.
Lockable push button actuator mechanisms such as are disclosed in above-identified patents each have a generally tubular housing that can be mounted in an opening formed through a metal panel of a large tool container or the like. The housing typically has a relatively large diameter front bezel that defines a front face of the housing, and smaller diameter portions that extend rearwardly from the front bezel.
A push button subassembly is mounted for forward and rearward movement within a passage that extends centrally through the housing. The subassembly has a push button that is biased to project forwardly from the front face of the housing. A keyway opens forwardly through the front of the push button, and is designed to receive a key that can be turned between locked and unlocked orientations when a suitably configured key is inserted into the keyway. The locked and unlocked orientations to which the keyway can be turned are prominently marked by symbols provided on the front face of the housing. The push button can be manually depressed to a protected position where the push button can be latchingly retained substantially flush with the front face of the housing when the keyway is turned to the locked orientation.
Among other components of the lockable push button actuator mechanism are a tubular rear component that projects rearwardly from the housing, and a plunger that is carried inside the tubular rear component. If the keyway is turned to the unlocked orientation, both the tubular rear component and the plunger are drivingly connected to the push button, and therefore move forwardly and rearwardly in unison with the push button. If the keyway is turned to the locked orientation, only the plunger is drivingly connected to the push button, hence only the plunger moves rearwardly when the push button is depressed. When the rearwardly moving push button reaches a protected depressed position with the keyway turned to the locked orientation, it is latchingly retained substantially flush with the front face of the housing.
Connected to the rear end region of the tubular rear component is a tapered, nosecone shaped member which defines at its rearmost end an engagement surface that is commonly used to operate components of a mechanical locking system. When the keyway at the front of the push button is turned to the unlocked orientation, the tubular rear component and the nosecone shaped member connected thereto are both drivingly connected to the push button and therefore move forwardly and rearwardly in unison with the push button—hence the engagement surface moves forwardly and rearwardly with the push button. However, when the keyway is turned to the locked orientation, the tubular rear component and the engagement surface connected thereto do not move rearwardly when the push button is depressed, but the plunger situated inside the tubular rear component does move rearwardly with the depression of the push button, which is a feature of relative movement (of the tubular rear component and the plunger situated inside the tubular rear component) that has not been used until now to operate anything.
As will be explained, the present invention makes use of a relative movement that can take place between the tubular rear component and the plunger situated inside the tubular rear component to operate an electrical switch when the push button is depressed under certain conditions, namely when the keyway of the push button is turned to the vertical locked orientation. To retrofit existing lockable push button actuator assemblies or mechanisms to make use of this relative movement, the present invention calls for a nosecone shaped member that is carried by the tubular rear component to be removed and replaced by an adapter that carries an electrical switch having an operator that can be engaged by the plunger to operate the electrical switch when certain relative movement takes place between the tubular rear component and the plunger—thereby enabling a lockable push button actuator (which has been retrofitted by removing its nosecone shaped member and replacing it with an electrical switch) to be used as a component of an electrically operated locking system.
|
[Osteoarthritis epidemiology and risk factors].
Osteoarthritis is the world's most widespread rheumatic disease. It mainly affects people aged over 65. The elderly, women, obese people and those with previous injuries are most at risk from osteoarthritis.
|
package io.jenkins.docker.connector;
import static com.nirima.jenkins.plugins.docker.utils.JenkinsUtils.bldToString;
import static com.nirima.jenkins.plugins.docker.utils.JenkinsUtils.endToString;
import static com.nirima.jenkins.plugins.docker.utils.JenkinsUtils.fixEmpty;
import static com.nirima.jenkins.plugins.docker.utils.JenkinsUtils.splitAndFilterEmpty;
import static com.nirima.jenkins.plugins.docker.utils.JenkinsUtils.startToString;
import com.github.dockerjava.api.command.CreateContainerCmd;
import com.github.dockerjava.api.command.InspectContainerResponse;
import com.google.common.base.Joiner;
import com.nirima.jenkins.plugins.docker.DockerTemplate;
import hudson.EnvVars;
import hudson.Extension;
import hudson.Util;
import hudson.model.Descriptor;
import hudson.model.TaskListener;
import hudson.slaves.ComputerLauncher;
import hudson.slaves.JNLPLauncher;
import io.jenkins.docker.client.DockerAPI;
import io.jenkins.docker.client.DockerEnvUtils;
import jenkins.model.Jenkins;
import jenkins.slaves.JnlpSlaveAgentProtocol;
import org.apache.commons.lang.StringUtils;
import org.jenkinsci.Symbol;
import org.kohsuke.accmod.Restricted;
import org.kohsuke.accmod.restrictions.NoExternalUse;
import org.kohsuke.stapler.DataBoundConstructor;
import org.kohsuke.stapler.DataBoundSetter;
import java.io.IOException;
import java.util.Arrays;
import java.util.Collection;
import java.util.Objects;
import javax.annotation.CheckForNull;
import javax.annotation.Nonnull;
/**
* @author <a href="mailto:[email protected]">Nicolas De Loof</a>
*/
public class DockerComputerJNLPConnector extends DockerComputerConnector {
@CheckForNull
private String user;
private final JNLPLauncher jnlpLauncher;
@CheckForNull
private String jenkinsUrl;
@CheckForNull
private String[] entryPointArguments;
@Restricted(NoExternalUse.class)
public DockerComputerJNLPConnector() {
this(new JNLPLauncher());
}
@DataBoundConstructor
public DockerComputerJNLPConnector(JNLPLauncher jnlpLauncher) {
this.jnlpLauncher = jnlpLauncher;
}
@CheckForNull
public String getUser() {
return Util.fixEmptyAndTrim(user);
}
@DataBoundSetter
public void setUser(String user) {
this.user = Util.fixEmptyAndTrim(user);
}
@CheckForNull
public String getJenkinsUrl() {
return Util.fixEmptyAndTrim(jenkinsUrl);
}
@DataBoundSetter
public void setJenkinsUrl(String jenkinsUrl) {
this.jenkinsUrl = Util.fixEmptyAndTrim(jenkinsUrl);
}
@Nonnull
public String getEntryPointArgumentsString() {
if (entryPointArguments == null) return "";
return Joiner.on("\n").join(entryPointArguments);
}
@DataBoundSetter
public void setEntryPointArgumentsString(String entryPointArgumentsString) {
setEntryPointArguments(splitAndFilterEmpty(entryPointArgumentsString, "\n"));
}
private void setEntryPointArguments(String[] entryPointArguments) {
this.entryPointArguments = fixEmpty(entryPointArguments);
}
public DockerComputerJNLPConnector withUser(String user) {
setUser(user);
return this;
}
public DockerComputerJNLPConnector withJenkinsUrl(String jenkinsUrl) {
setJenkinsUrl(jenkinsUrl);
return this;
}
public DockerComputerJNLPConnector withEntryPointArguments(String... args) {
setEntryPointArguments(args);
return this;
}
public JNLPLauncher getJnlpLauncher() {
return jnlpLauncher;
}
@Override
public int hashCode() {
final int prime = 31;
int result = super.hashCode();
result = prime * result + Arrays.hashCode(entryPointArguments);
result = prime * result + Objects.hash(jenkinsUrl, jnlpLauncher, user);
return result;
}
@Override
public boolean equals(Object obj) {
if (this == obj)
return true;
if (!super.equals(obj))
return false;
DockerComputerJNLPConnector other = (DockerComputerJNLPConnector) obj;
return Arrays.equals(entryPointArguments, other.entryPointArguments)
&& Objects.equals(jenkinsUrl, other.jenkinsUrl) && Objects.equals(jnlpLauncher, other.jnlpLauncher)
&& Objects.equals(user, other.user);
}
@Override
public String toString() {
final StringBuilder sb = startToString(this);
bldToString(sb, "user", user);
bldToString(sb, "jnlpLauncher", jnlpLauncher);
bldToString(sb, "jenkinsUrl", jenkinsUrl);
bldToString(sb, "entryPointArguments", entryPointArguments);
endToString(sb);
return sb.toString();
}
@Override
protected ComputerLauncher createLauncher(final DockerAPI api, final String workdir, final InspectContainerResponse inspect, TaskListener listener) throws IOException, InterruptedException {
return new JNLPLauncher();
}
@Restricted(NoExternalUse.class)
enum ArgumentVariables {
NodeName("NODE_NAME", "The name assigned to this node"), //
Secret("JNLP_SECRET",
"The secret that must be passed to agent.jar's -secret argument to pass JNLP authentication."), //
JenkinsUrl("JENKINS_URL", "The Jenkins root URL."), //
TunnelArgument("TUNNEL_ARG",
"If a JNLP tunnel has been specified then this evaluates to '-tunnel', otherwise it evaluates to the empty string"), //
TunnelValue("TUNNEL", "The JNLP tunnel value");
private final String name;
private final String description;
ArgumentVariables(String name, String description) {
this.name = name;
this.description = description;
}
public String getName() {
return name;
}
public String getDescription() {
return description;
}
}
private static final String DEFAULT_ENTRY_POINT_ARGUMENTS = "${" + ArgumentVariables.TunnelArgument.getName()
+ "}\n${" + ArgumentVariables.TunnelValue.getName() + "}\n-url\n${" + ArgumentVariables.JenkinsUrl.getName()
+ "}\n${" + ArgumentVariables.Secret.getName() + "}\n${" + ArgumentVariables.NodeName.getName() + "}";
@Override
public void beforeContainerCreated(DockerAPI api, String workdir, CreateContainerCmd cmd) throws IOException, InterruptedException {
final String effectiveJenkinsUrl = StringUtils.isEmpty(jenkinsUrl) ? Jenkins.getInstance().getRootUrl() : jenkinsUrl;
final String nodeName = DockerTemplate.getNodeNameFromContainerConfig(cmd);
final String secret = JnlpSlaveAgentProtocol.SLAVE_SECRET.mac(nodeName);
final EnvVars knownVariables = calculateVariablesForVariableSubstitution(nodeName, secret, jnlpLauncher.tunnel, effectiveJenkinsUrl);
final String configuredArgString = getEntryPointArgumentsString();
final String effectiveConfiguredArgString = StringUtils.isNotBlank(configuredArgString) ? configuredArgString : DEFAULT_ENTRY_POINT_ARGUMENTS;
final String resolvedArgString = Util.replaceMacro(effectiveConfiguredArgString, knownVariables);
final String[] resolvedArgs = splitAndFilterEmpty(resolvedArgString, "\n");
cmd.withCmd(resolvedArgs);
String vmargs = jnlpLauncher.vmargs;
if (StringUtils.isNotBlank(vmargs)) {
DockerEnvUtils.addEnvToCmd("JAVA_OPT", vmargs.trim(), cmd);
}
if (StringUtils.isNotBlank(user)) {
cmd.withUser(user);
}
}
private static EnvVars calculateVariablesForVariableSubstitution(final String nodeName, final String secret,
final String jnlpTunnel, final String jenkinsUrl) throws IOException, InterruptedException {
final EnvVars knownVariables = new EnvVars();
final Jenkins j = Jenkins.getInstance();
addEnvVars(knownVariables, j.getGlobalNodeProperties());
for (final ArgumentVariables v : ArgumentVariables.values()) {
// This switch statement MUST handle all possible
// values of v.
final String argValue;
switch (v) {
case JenkinsUrl :
argValue = jenkinsUrl;
break;
case TunnelArgument :
argValue = StringUtils.isNotBlank(jnlpTunnel) ? "-tunnel" : "";
break;
case TunnelValue :
argValue = jnlpTunnel;
break;
case Secret :
argValue = secret;
break;
case NodeName :
argValue = nodeName;
break;
default :
final String msg = "Internal code error: Switch statement is missing \"case " + v.name()
+ " : argValue = ... ; break;\" code.";
// If this line throws an exception then it's because
// someone has added a new variable to the enum without
// adding code above to handle it.
// The two have to be kept in step in order to
// ensure that the help text stays in step.
throw new RuntimeException(msg);
}
addEnvVar(knownVariables, v.getName(), argValue);
}
return knownVariables;
}
@Extension @Symbol("jnlp")
public static final class DescriptorImpl extends Descriptor<DockerComputerConnector> {
public Collection<ArgumentVariables> getEntryPointArgumentVariables() {
return Arrays.asList(ArgumentVariables.values());
}
public Collection<String> getDefaultEntryPointArguments() {
final String[] args = splitAndFilterEmpty(DEFAULT_ENTRY_POINT_ARGUMENTS, "\n");
return Arrays.asList(args);
}
@Override
public String getDisplayName() {
return "Connect with JNLP";
}
}
}
|
Changes of the DNA content of cell nuclei in mucosa and carcinoma of the rectum after replication of different methods of the preoperative irradiation.
Microspectrophotometric investigation of the DNA content of cell nuclei in normal mucosa and carcinoma of the rectum was performed in 47 patients before and after an irradiation with doses of 20 Gy, 40 Gy, and 36 Gy plus 7 g 5-fluorouracil. Pretreatment biopsy and surgical specimens were used for the investigation. It was observed that the normal mucosa contains a homogeneous cell population with diploid DNA values. Rectal adenocarcinoma is characterized by polyploidy, augmentation of the "DNA accumulation index" that continues to rise if the degree of differentiation decreases. After radiation therapy and combined chemo- plus radiationtherapy the rectal mucosa shows signs of polyploidy and increase of the "index of DNA accumulation". Irradiation causes a considerable poly- and heteroploidy of cell nuclei in rectal adenocarcinomas.
|
//==---------------- backend.hpp - SYCL PI backends ------------------------==//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//
#pragma once
#include <CL/sycl/accessor.hpp>
#include <CL/sycl/backend_types.hpp>
__SYCL_INLINE_NAMESPACE(cl) {
namespace sycl {
template <backend BackendName, class SyclObjectT>
auto get_native(const SyclObjectT &Obj) ->
typename interop<BackendName, SyclObjectT>::type {
return Obj.template get_native<BackendName>();
}
// Native handle of an accessor should be accessed through interop_handler
template <backend BackendName, typename DataT, int Dimensions,
access::mode AccessMode, access::target AccessTarget,
access::placeholder IsPlaceholder>
auto get_native(const accessor<DataT, Dimensions, AccessMode, AccessTarget,
IsPlaceholder> &Obj) ->
typename interop<BackendName, accessor<DataT, Dimensions, AccessMode,
AccessTarget, IsPlaceholder>>::type =
delete;
} // namespace sycl
} // __SYCL_INLINE_NAMESPACE(cl)
|
Q:
using JdcbTemplate standalone
We are looking into using the JdbcTemplate for accessing the DB - but we have many different DB-connections, that each class could use, so injecting the jdbcTemplate is not an option atm. So if we do a
jdbcTemplate = new JdbcTemplate(dataSource);
what will the transaction policy be? Auto-commit is off in the DB.
A:
You can configure each javax.sql.DataSource object to enable auto-commit if that does the job, or disable auto-commit and write the transaction logic programatically.
Both the java.sql.Connection and the javax.sql.DataSource class have methods for enable/disable auto-commit.
Regarding dependency injection and Spring, you can still inject a datasource object into your repository. If you also let each repository extend the org.springframework.jdbc.core.support.JdbcDaoSupport class, then you have a JdbcTemplate object available for you with the derived getJdbcTemplate() method.
You can also let Spring handle the transaction handling for you. Without a XA transaction manager, you need one transaction manager for each datasource. With many transaction managers, declarative transaction support with the @Transactional annotation is impossible. You can however, inject the transaction manager into your service class. This is described in the reference documentation here.
|
Q:
android, debug not connected to PC, no wifi?
I need to set breakpoints in my program. However I can't be connected to PC for debugging, only for launching the app. I have no wifi capability yet. Can I put something on the tablet that will work? i have catlog but that is not what I nee on it's own. I tried to run the program in debug mode with hit count = 10 but it did not work. The program kept executing.
A:
Answer is: can't do it, need wifi or to be connected to pc
|
"We would never have a political figure who took pictures of himself online," a sarcastic Washington said, though former New York congressman Anthony Weiner was clearly the "political figure" whom the writers of the episode had in mind.
Kimmel then quipped, "I wonder if Anthony Weiner will watch that show. I bet you he wants to watch it, but it would be uncomfortable for his wife to walk in."
The actress, who plays a Washington, D.C. crisis manager on the ABC smash, was also announced Friday morning as Neutrogena's new creative consultant. While Washington's accustomed to stepping into various professions on-screen, the Emmy-nominated star did share with Kimmel that her dream as a child was to be "the woman in the Shamu Show," calling it "magical."
"You get to tell the dolphins what to do. This is my dream," she reminisced. Washington mentioned to Us Weekly in April that as a kid, Splash was her favorite film. So what turned her aspirations from marine biology to acting? Washington says AP Biology in high school was it. "The joke in my family is that I was like, 'Forget the whale, I'll be on stage by myself!' And that's when Kerry Washington was born.'"
|
Destroying Democratic Party Statues August 19, 2017
by William P. Meyers
The Confederacy was the Democratic Party
[Disclosure: after four decades of being left-of-Democrat, I recently joined the Democratic Party. I will write about my transition in other posts.]
In the coverage of the fighting between white nationalists and antifa, the tragedy at Charlottesville, and the removal of "Confederate" monuments and statues, there has been a big gap in the coverage. A blind spot. A Lacuna.
These statues of men like Jefferson Davis, Robert E. Lee, and other soldiers who fought for the Confederate States of America (CSA), are the legacy of one political party. And it is not the Republican Party. The Republican Party was the party of the Union side of our Civil War.
Take Robert E. Lee. He never sought political office, but he was a Democrat. Take the founder of the Democrat Party. Andrew Jackson was not just a slave owner; he actively bought and sold slaves. The states where slavery was legal were all solidly voting for the Democratic Party before the Civil War. Except for a brief period when black, former slaves could vote, the states of the former CSA would become solidly Democratic.
After the losing the Civil War, the Democratic Party rebuilt itself through the institution of Segregation and Jim Crow laws. Even during the New Deal, when the Democratic Party greatly expanded its voter base in the north and west because of the Depression, it refused to end Segregation because it needed the support of racists in the southern states.
Now the Democratic Party, following the passage of the Civil Rights acts of 1964 and 1965, has become highly dependent on black voters. People unconfortable with that long ago left the party to become Republican. So now most of the white people in the former CSA vote Republican, the party of Lincoln, and most black people vote for the party of Jefferson Davis and Robert E. Lee.
That is okay, it is the nature of a Constitution that effectively means only two parties can exist in the U.S., and yet that allows for those two parties to evolve. Anyone who thinks the Republican Party today is a racist as the Democratic Party was in 1960 either were not there or refuse to look at the facts. [And of course, no part of our society is entirely free of racial and cultural prejudices.] Republican leaders speaking out against racism is not rare, and of course there are black Americans who have done well economically and do vote Republican.
One thing I always disliked about Democrats I talked to (when I was an Anarchist or Green or Independent) was their denial of their party's past. Denial of a lot of present things too. The problem with denial is that it leads to bad policy. It is a universal human problem, and fortunately many people try to face the facts of life every day.
Democratic Party leaders should be saying things like: "Jefferson Davis was a leading Democrat, and yet I renounce him and all other Democratic Party racists, past and present. The Democratic Party should do everything it can to right the wrongs of slavery, segregation, and any remaining harms from ongoing racism." How about denouncing President Franklin D. Roosevelt for his racist policies, while we are at it?
In joining the Democratic Party I have taken on the obligations and dishonor of its past. That includes, but is not limited to, the issues discussed above and its long history of War Crimes, including the use of atomic bombs on civilians, and the Vietnam War.
The way forward is clear. We (you and I, whether within the Democratic Party or not) need to save the Earth. Which means adopting one-child guidelines, as well as other pollution-control and environmental measures. We need to do much more about social justice. And we need to have economic policies that ensure reasonable prosperity for all, not just the top 20%. Prosperity, but keeping in mind the high environmenta costs of greed at every level.
Meanwhile, we cannot let the perfect become the enemy of the good. Electing Tea Party and Trumped Up people to political ofice because the people of the center-to-left spectrum cannot unite, is just plain stupid. It is often the people shouting "the people united shall never be defeated" who are disuniting the left. Slogans and position papers, rallies and shouting are not enough. We need to actually elect people. That means going out and getting people to vote for our candidates. There is a great deal of leeway in primaries, but once the people have chosen our candidates, we should make sure our candidates win the general election.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.