text
stringlengths
8
5.77M
Katie Prager died Thursday, five days after her husband Dalton. Both had cystic fibrosis and complications from lung transplants. Prager, 26, was in hospice care at her home in Kentucky. "We were given a great gift, we knew her time was short and she was able to do a few things that she wanted, and I am grateful for that," Katie Prager's mother Debbie Donovan wrote today on the couple's Facebook page. "The days to follow will not be easy but I find comfort in knowing that my girl lived, she really lived." Dalton Prager, 25, died Saturday at Barnes-Jewish Hospital where he had been treated to be closer to family. The couple longed to see each other again before they died, but neither were healthy enough to travel.
// Licensed to the Apache Software Foundation (ASF) under one // or more contributor license agreements. See the NOTICE file // distributed with this work for additional information // regarding copyright ownership. The ASF licenses this file // to you under the Apache License, Version 2.0 (the // "License"); you may not use this file except in compliance // with the License. You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. package org.apache.kudu.test; import java.util.Random; import com.google.common.base.Preconditions; import org.apache.yetus.audience.InterfaceAudience; import org.apache.yetus.audience.InterfaceStability; import org.slf4j.Logger; import org.slf4j.LoggerFactory; @InterfaceAudience.Private @InterfaceStability.Unstable public class RandomUtils { private static final Logger LOG = LoggerFactory.getLogger(RandomUtils.class); private static final String TEST_RANDOM_SEED_PROP = "testRandomSeed"; /** * Get an instance of Random for use in tests and logs the seed used. * * Uses a default seed of System.currentTimeMillis() with the option to * override via the testRandomSeed system property. */ public static Random getRandom() { // First check the system property. long seed = System.currentTimeMillis(); if (System.getProperty(TEST_RANDOM_SEED_PROP) != null) { seed = Long.parseLong(System.getProperty(TEST_RANDOM_SEED_PROP)); LOG.info("System property {} is defined. Overriding random seed: {}", TEST_RANDOM_SEED_PROP, seed); } LOG.info("Using random seed: {}", seed); return new Random(seed); } /* * Return the next pseudorandom integer generated by 'random' in the range [start, end). * 'start' must be strictly less than 'end'. */ public static int nextIntInRange(Random random, int start, int end) { Preconditions.checkArgument( start < end, String.format("start must be strictly less than end (%d < %d)", start, end)); return start + random.nextInt(end - start); } }
@import 'themes'; @include nb-install-component { .remove-icon { div { cursor: pointer; } padding-left: 7px; padding-right: 7px; padding-top: 2px; } .adjust-height { ::ng-deep .ng-select-container { height: auto; } } .item-invalid { ::ng-deep .ng-select-container { border: 1px solid; border-color: nb-theme(color-danger-default); } } .item-valid { ::ng-deep .ng-select-container { border: 1px solid; border-color: nb-theme(color-success-default); } } .label-with-select { display: flex; justify-content: space-between; align-items: center; } // Remove drop down arrow from email select #emailsSelect { ::ng-deep { .ng-clear-wrapper { width: 20px; } .ng-arrow-wrapper { display: none; } } } .employee-padding { margin-bottom: 50px; } .notes { text-indent: 1em; p { margin: 5px 0 0 2px; color: #eac72d; font-size: 0.75rem; font-weight: 300; line-height: initial; } } }
Q: Is there any native WPF Multiselect combobox available? Even a 3rd party one will do. Thanks A: I'm not sure how a ComboBox would display data in this fashion, as it is designed as a single-selection Control. Maybe you are looking for something like a ListBox or ListView with a SelectionMode of Multiple or Extended? <ListBox SelectionMode="Multiple" /> <ListBox SelectionMode="Extended" /> A: There is no native multiselect combobox in WPF. Please check my blog for a simple hack using expression blend to achieve a multi selection on combobox. http://jobijoy.blogspot.com/2009/02/simple-multiselect-combobox-using.html The idea is to utilize the Multi-Selection feature of ListBox in to ComboBox by editing the control template. But for accessing the selected items you might need to use the bellow line in the code. ((ListBox)cmbBox.Template.FindName("lstBox",cmbBox)).SelectedItems Where cmbBox is your combobox and lstBox is the ListBox inside the controltemaplate. A: I used an expander and filled the expander's header with the selection and the content with a list box. The list box is binded to a collection. Whenever user make a selection, I update the header to show what user has selected.
Q: compiling java package classes. Cannot access Class. class file contains wrong class while working with packages I was trying to compile a few files in a package in java. The package name is library. Please have a look at the following details. This is my Directory Structure: javalearning ---library ------ParentClass.java ------ChildClass.java I tried to compile in the following way: current directory: javalearning javac library/ParentClass.java //this compilation works fine javac library/ChildClass.java //error over here The following is the ParentClass.java: package library; class Parentclass{ ... } The following is the ChildClass.java: package library; class ChildClass extends ParentClass{ ... } The error is as follows: cannot access ParentClass bad class file: .\library\ParentClass.class Please remove or make sure it appears in the correct sub directory of the classpath A: You've got a casing issue: class Parentclass That's not the same as the filename ParentClass.class, nor is it the same as the class you're trying to use in ChildClass: class ChildClass extends ParentClass. Java classnames are case-sensitive, but Windows filenames aren't. If the class had been public, the compiler would have validated that the names matched - but for non-public classes, there's no requirement for that. The fact that you've ended up with ParentClass.class suggests that at some point it was declared as ParentClass, but then you changed the declared name and when recompiling, Windows just overwrote the content of the current file rather than effectively creating Parentclass.class. Make sure your declared class name exactly matches the filename. You may well want to delete all your class files before recompiling, just to get out of a confusing state.
In the Supreme Court of Georgia Decided: June 1, 2015 S14G1628. THE STATE v. EASTER. HUNSTEIN, Justice. We granted certiorari in this case to determine whether the Court of Appeals correctly held that the trial court charged the jury on aggravated assault in a manner not alleged in the indictment. Easter v. State, 327 Ga. App. 754 (1) (a) (761 SE 2d 149) (2014). For the reasons set forth below, we hold that the trial court did not charge the jury on aggravated assault in a manner not alleged in the indictment, and therefore, we reverse the judgment of the Court of Appeals. Viewed in the light most favorable to the jury's verdict, the record establishes that Appellee Andra Lamont Easter and DeShawn Ella Coatney had dated and lived together at Coatney’s home for over a year before ending their relationship. Easter and Coatney had difficulties during and after their relationship, including Coatney having to call the police several times on Easter after the couple broke up. In response to Easter repeatedly trying to gain access to Coatney’s home, she changed the locks several times. On February 17, 2006, Coatney discovered that the front window at her home had been broken while she was at work, and she suspected Easter as the culprit. The next day Coatney arranged curtains over the broken window in a particular way so that she would be able to tell if they had been disturbed when she returned home. In the early morning hours of February 19, 2006, Coatney returned home from work to find that the curtains had been disturbed. Afraid that Easter might be in her home, Coatney retrieved a gun she kept hidden on the top of her china cabinet and began to search each room of her home. Coatney discovered Easter hiding in a bedroom and saw that he was wearing rubber gloves and holding a crowbar. Coatney started to back out of the room as Easter came towards her holding the crowbar in an upright position. Coatney asked Easter what he was doing, but he did not answer, and instead, kept walking towards her. Coatney fired one shot, hitting Easter. Undeterred, Easter continued to walk towards her with the crowbar, and Coatney shot him again. Easter then fled the home, Coatney called the police, and Easter surrendered to police later that morning. Easter was indicted for burglary and aggravated assault, and a jury found him 2 guilty on both counts. 1. Easter appealed the trial court’s denial of his motion for new trial, in which he had alleged, inter alia, that the trial court erred in charging the jury on aggravated assault. With respect to the issue relevant to the granted petition for certiorari, the Court of Appeals held that the trial court erred by giving the jury a charge from which it could have found that Easter had committed aggravated assault by a method not charged in the indictment, i.e., by using a deadly weapon rather than merely an object likely to result in serious bodily injury. Easter, 327 Ga. App. at 759-760. Easter was indicted for aggravated assault pursuant to former OCGA § 16- 5-21 (a) (2),1 which at the time provided as follows: “A person commits the offense of aggravated assault when he or she assaults . . . [w]ith a deadly weapon or with any object, device, or instrument which, when used offensively against a person, is likely to or actually does result in serious bodily injury.” The indictment in this case alleged that Easter assaulted Coatney “with a crowbar, an object which when used offensively against another person is likely 1 This language is now codified at OCGA § 16-5-21 (b) (2). 3 to result in serious bodily injury.” With regard to aggravated assault, the court charged the jury as follows: A person commits the offense of aggravated assault when that person assaults another person with a deadly weapon or with any object, device or instrument which, when used offensively against a person, is likely to or actually does result in serious bodily injury. . . . The crowbar, if and when used when making an assault on another person, is not a deadly weapon per se, but may or may not be a deadly weapon depending upon the manner in which it is used in the circumstances of the case. Whether or not, under all the circumstances and facts of this case, the crowbar alleged in this Bill of Indictment to have been used in making an assault upon the victim did, in fact, constitute a deadly weapon or a weapon likely to cause serious bodily injury is a matter to be decided by you, the jury, from evidence in this case. In deciding whether the alleged instrument was a weapon capable of causing death or bodily injury, you may consider direct proof of the character of the weapon, any exhibition to the jury or other evidence of the capabilities of the instrument. The instrument in question is the crowbar. Defense counsel did not object to these charges. The court sent the indictment out with the jury for their deliberations. After deliberations began, the jury sent a note to the judge asking if it could have a copy of the law defining aggravated assault and battery. After the court read the note to counsel, defense counsel raised for the first time an objection that the jury charge on aggravated assault did not match the allegations in the indictment. Finding that it could not “undo” the charge 4 already given to the jury, the judge recharged the jury on aggravated assault and the crowbar, as it had done originally. Although counsel did not object after the court initially gave the instructions to the jury, “‘we are required to consider whether the court’s jury instruction constitutes plain error since [Easter] properly enumerated and argued the issues on appeal.’” Green v. State, 291 Ga. 287, 294 (8) (728 SE2d 668) (2012). Reversal is authorized if all four prongs of the standard adopted in State v. Kelly, 290 Ga. 29 (2) (718 SE2d 232) (2011), are met: the instruction was erroneous, the error was obvious, the instruction likely affected the outcome of the proceedings, and the error seriously affects the fairness, integrity or public reputation of judicial proceedings. Green, 291 Ga. at 294. This case is governed by Green, and we are unpersuaded by Easter’s arguments that we should reexamine Green at this time. In Green, we clarified that the “object, device, or instrument” phrase in former OCGA § 16-5-21 (a) (2) simply describes a specific mode – rather than constituting an alternative mode – of “deadly weapon” aggravated assault, and that, therefore, it is not error to refer to a “deadly weapon” in instructing the jury on an aggravated assault 5 count predicated on the use of an “object, device, or instrument.” 291 Ga. at 295. This holding applies squarely to the circumstances of this case. The relevant language of the indictment and jury instructions in Green are almost identical to those at issue here. 291 Ga. at 295. As we found in Green, here the court’s use of the phrase “deadly weapon” in the jury instructions was a general reference to the aggravating circumstance in former OCGA § 16-5-21 (a) (2), which also included “any object, device, or instrument which, when used offensively against a person, is likely to or actually does result in serious bodily injury.” 291 Ga. at 295. Additionally, as in Green, the court instructed the jury that the assaulting object – here a crowbar – was not a deadly weapon per se. 291 Ga. at 295. Therefore, because the jury instructions were correct, there is no plain error pursuant to the test adopted in Kelly. Green, 291 Ga. at 295. Accordingly, we reverse the judgment of the Court of Appeals.2 Judgment reversed. All the Justices concur. 2 In this Court, the State argues that the Court of Appeals should have followed Green. We agree. We note, however, that the State failed to cite Green in its brief to the Court of Appeals, and even after the Court of Appeals issued a decision that was inconsistent with Green, the State filed no motion for reconsideration and otherwise did nothing to bring Green to the attention of the Court of Appeals. We take this occasion to remind lawyers of their obligation to bring pertinent legal authority to the attention of the courts and to do so in a timely manner. 6
I am thinking about doing another gruit, and I really want to incorporate some sage. I've had 3 sage beers in the past 12 months, and they were all delicous... however, I know that any spice in beer can be overdone. Anyone have some thought on how much sage in a 5 gallon batch, and at what time to add to the boil? --LexusChris "A woman drove me to drink, and I hadn't even the courtesy to thank her." – W.C. Fields Side note: While looking up my most recent gruit (March 2015), I started to wonder what happened to 5 gallons of gruit? While I do enjoy my gruit, its not really a sessionable beer, and I don't recall having it on tap and going through it all. In fact, I couldn't remember having much more than a growler or two at a meeting back in '15. Yesterday, while going through my supplies looking for my gruit herbs, I found 24 unmarked bombers. Could it be? I don't remember bottling the gruit, but it would make sense... gruit is always better after long aging! Popped a cold bottle tonight, and it was indeed my 2015 gruit!! And it is really tasty!! Ok, maybe not everyone enjoys hopless beer, but the spices have blended and mellowed, and the wormwood is now a pleasant bitterness behind the lemony yarrow flowers. I'll bring some to the next meeting, but right now, I'm chasing a green fairy ... gotta run! --LexusChris "A woman drove me to drink, and I hadn't even the courtesy to thank her." – W.C. Fields Yes, I will bring some bottles to SCHF. Both the 2015 gruit, and the one using Sage & Mugwort that I made today. BTW, as I was at the market looking for cheap sage leaves, I realized Tony used fresh wet leaves ..right? Anyways, I found some affordable live sage in the produce section, and used 1oz as recommended. The smell was really great, and I hope the batch will be as enjoyable as the saison. Thanks all!--LexusChris "A woman drove me to drink, and I hadn't even the courtesy to thank her." – W.C. Fields Sampling more of the 2015 gruit ... very nice. It will make a great addition to the campfire at SCHF! My sage gruit is ending primary fermenation, and I'm keen to add some light toast oak chips. Anyone have thoughts on how long to let the chips float in there? Do I need to weight them down in a bag or something, or can I just float them. A little bit of oak character should go well with both the Old Ale version, and the gruit.... --LexusChris "A woman drove me to drink, and I hadn't even the courtesy to thank her." – W.C. Fields
Athalia Snow $34.77 - Out Of Stock Wool BUFF is a multifunctional, tubular accessory ideal for many activities. The Merino wool in Wool BUFF keeps you warm in the cold, wicks moisture to keep you cool when its hot and being anti-microbial, does not start to smell after wear. This natural fabric is super soft and odour resistant. The NEW Chic designs feature the strass BUFF® logo. USES Wool BUFF can be worn as a neckerchief, balaclava, scarf or saharaine. TECHNICAL FEATURES Made from 100% natural Merino wool, Weighs 47g/1.7oz and measures 66cm x 24.5cm or 25.9inches x 9.6inches. Available in one size to fit most adults, Seam free and has a flat hem at each end. Hand washable at 30 degrees and non iron, Is anti-microbial so it will not start to smell after extended wear, is colour fast and will not fade. Certified to meet Oeko-Tex Standard 100 Thermal Comfort – Warm
Q: In NODE.JS, the newline code (%0A) will decode back to what character? I have a pretty simple question, but a few simple googling and stachexchange queries were not able to answer it, so i guess i'm missing something here. Here are my simplified parameters: I'm using Javascript. I have a text that needs to get URLEncoded and the text have more than 1 line. My question is: What is the character for newline before the text get encoded? (I know that after the encoding the newline will be encoded into %0A) I guess asking "What char is decoded when decoding %0A" will be the same. A: Those codes consist of a percent sign, followed by a two character hexadecimal number representing a byte value. So in this case, the byte value is 0A, representing the ASCII newline character. This is commonly written as \n inside strings in JavaScript (and others, like PHP). But I think your question suggests you want to do some search and replace for this character. I would not do that, since there can be other characters too that need encoding. Instead, use the function encodeURIComponent, which can encode the entire string for you. There is encodeURI as well, but in your case, I think the first is more appropriate. This example shows how special characters (newline, space, and others) are encoded to an url-friendly format. Note that the diacritic é translates to the two bytes of its UTF-8 representation. document.write(encodeURIComponent("Normal text\nEéy, check the specials: /, + and \t!"));
Sunday, March 11, 2018 How to Buy a Garbage Disposal: Size Matters! For us, Compost Season stops when the bin freezes shut during the winter. That’s when we reluctantly switch to using the garbage disposal to dispose of vegetable scraps. I say reluctantly because the garbage disposal that came with our condo jams easily and often, sometimes smells bad, and often shakes so violently that it comes loose from the plumbing pipes and sprays gunk inside the kitchen cabinet. Good times! The “experts” say you shouldn’t put any of these items down a garbage disposal. Vegetable peels Eggshells Pasta, rice, potatoes/potato peels, beans, and other starchy foods Coffee grounds Which is pretty much everything we cook with and eat. Although it explains exactly why even though “experts” claim a 1/3 horsepower mini garbage disposal like mine is the “correct” size for a two person apartment or condo household and why I celebrated the day when it finally became unfixable so I could replace it. It really isn't the old garbage disposal's fault. At the very beginning it was a bad match. Keep reading to learn why and how to avoid the same situation when buying a garbage disposal. When the garbage disposal started leaking from the side and needed to be replaced I practically did a happy dance. Finally a chance to buy a garbage disposal that doesn’t stink! What Size Garage Disposal Should I Buy? Hi everyone Lacey here! I volunteered to take care of all of the food scraps so Lisa didn't have to waste her time researching, buying, and installing a new garbage disposal. She declined my offer. Appliance experts say your should buy a garbage disposal based on the number of people living in your home. I think that is the worst way to determine what size garbage disposal you need to buy. Instead of looking at the number of people in your household, I suggest you can buy the correct size garbage disposal for you by looking at: How much you plan on using it What type of ingredients you cook with What type of things you plan to put down it The available space under your sink How much money you want to spend There are four sizes of garbage disposal motors 1/3 horsepower (HP) garbage disposals are the weakest motor available and are best for very light duty use because they jam easily. From personal experience, light duty use is probably someone who cooks with more prepared ingredients than fresh (no judging, OK?) or is primarily putting small serving of leftovers, science experiment cooked vegetables from the back of the fridge, etc. All mine 1/3 HP garbage disposal could comfortably handle was coffee grounds and eggshells. Chuck a broccoli stalk down there and it would shake off the plumbing in revolt. The 1/3 HP garbage disposables are the physically smallest and least expensive type of garbage disposal (around 80 bucks) but may rust out need to be replaced earlier than the other types. 1/2 horsepower garbage disposals are slightly more powerful than the 1/3 horsepower models but not by much. 1/2 HP garbage disposals are best for light duty use. Again, if you cook with slightly more fresh vegetables or eat more fresh fruits snack on If you don’t use your garbage disposal all of the time, this might be one to consider. 3/4 horsepower garbage disposals are for medium plus use. A 3/4 HP motor can usually handle things egg shells and all vegetable peels – basically for families who cook with ingredient type food. The more powerful motor means they have less of a tendency to jam. Of course, as you go up in horsepower, you also go up in physical size and price. 1 horsepower garbage disposals are for heavy use kitchens (although in my meals from scratch kitchen we consider this Normal Use. No bragging. Just explaining why the others won’t work for our household of 2.) If you cook all of your meals from scratch and have things like banana peels, vegetable peels, starchy food like potatoes peels, etc. then 1 HP motor is one to consider because you can put everything on the expert no no garbage disposal list down it and it won’t jam (from experience.) The 1 HP is the most powerful garbage disposable motor you can buy and it will grind pretty much any difficult thing you put down it except bones. I wasn’t messing around and knew we needed a 1 HP garbage disposal. Next was to decide on the brand and model. Hello, lover. Disclosure: I am including affiliate links in this post for your convenience There are two major garbage disposal brands, InSinkerator and Waste King. Both companies also make garbage disposals for other home appliance brands. I compared the two main garbage disposable companies and they were pretty equal in their reviews for quality and performance the only difference seems to be the size of the unit and price. The companies are probably going to hate me for saying this but hey, I don’t work for them, and that’s my opinion I was still smarting from my experience with the InSinkErator Badger 1 which made me less inclined to shell out the 300 bucks for 1 HP the InSinkErator Evolution Excel plus buying the power cord separate. This is common because many garbage disposals are hardwired in your home. Mine isn’t. It all depends upon city and state building codes. The reviews for installation, performance, and longevity for the Waste King 1 HP Legend L-8000 are practically identical to the InSinkErator InSinkErator Evolution Excel. The only real difference is the physical size, Waste King has a lifetime warranty, and the power cord comes with it (Waste King also sells a hard wired version if you need it.) Installing a garbage disposal is extremely easy no matter what brand you choose. The InSinkerator and Waste King installs practically the same way by, installing the brace through the sink drain hole and screwing the disposal into place in a locking ring under the sink. If you can screw a jar lid closed you can install this garbage disposal. Although a second pair of hand s is helpful because it is heavy! Amazon Assoiciates Disclosure Lisa Nelsen-Woods is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com. If you chose to make a purchase through an affiliate link, I receive a small commission at no additional cost to you that I use to run this blog Thank you for your support!
package com.kidosc.pushlibrary.model; /** * @author yolo.huang * 推送平台 */ public enum PushTargetEnum { /** * 极光 */ JPUSH("JPUSH"), /** * XIAOMI */ XIAOMI("XIAOMI"), /** * HUAWEI */ HUAWEI("HUAWEI"), /** * OPPO */ OPPO("OPPO"), /** * VIVO */ VIVO("VIVO"); public String brand; PushTargetEnum(String brand) { this.brand = brand; } }
Key Teaching Points•New curved wires such as the ProTrack transseptal wire (Baylis Medical, Toronto, Canada) can be subject to fracture owing to their more complex construction.•Fractured wire components may be invisible to standard fluoroscopy, despite the presence of substantial amounts of stainless steel wire as a result of very-thin-diameter components that constitute the wire itself.•Intracardiac ultrasound remains an effective tool for visualizing all fragments of metal, as the thin-diameter metal components remain clearly visible on ultrasound imaging.•Consideration of ultrasound scanning should be made in situations where retained wire fragments are suspected but not seen on fluoroscopic imaging.•In the course of transseptal puncture, the use of high-quality intracardiac ultrasound imaging should be considered to ensure that the entirety of the interatrial septum is crossed by the transseptal sheath prior to removal of the transseptal needle. Introduction {#sec1} ============ Invasive electrophysiology (EP) and interventional cardiac procedures are now commonplace in the delivery of health care, and with the continued evolution of procedures and techniques there will continue to be complications as a result. New equipment to support evolving techniques such as no-fluoroscopy EP study and ablation make complex cases safer and easier to complete. We report on an unusual complication during a no-fluoroscopy pulmonary vein isolation (PVI) procedure where a ProTrack transseptal wire (Baylis Medical, Toronto, Canada) fractured during transseptal puncture, leading to the uncoiling of extensive amounts of radiolucent metal wire material into the vasculature. This complication was managed using an intracardiac ultrasound catheter to target the fragments for extraction. Case report {#sec2} =========== A 54-year-old man with a history of persistent, symptomatic atrial fibrillation was brought to the EP laboratory for anticipated PVI ablation. Access to bilateral femoral veins was achieved, and a no-fluoroscopy approach to the PVI was undertaken using a CARTO 3 electroanatomic mapping system (Biosense Webster, Irvine, CA). A small-curve Mobi 8.5F steerable sheath (Biosense Webster) was utilized, along with a Baylis RF transseptal needle and a ProTrack transseptal wire for transseptal passage. Anticipating a single puncture with 2 transseptal sheaths inserted, an 8.5F SL1 sheath (Abbott Medical, Chicago, IL) was also advanced to the heart with the mapping and ablation catheter, a SmartTouch 3.5 mm contact force--sensing irrigated catheter (Biosense Webster). After creation of the electroanatomic map, an 8F SoundStar intracardiac ultrasound (ICE) catheter (Biosense Webster) was advanced, and the left atrial structures and fossa ovalis were mapped using the CartoSound interface (Biosense Webster). The transseptal Mobi sheath and needle were dropped down from the superior vena cava (SVC) onto the fossa ovalis, which was mildly thickened, but otherwise unremarkable. Radiofrequency (RF) energy was delivered to the transseptal needle, which crossed into the left atrium, confirmed by saline contrast bubble injection. The dilator and sheath were fixed in position as the transseptal needle was removed from the sheath, and the ProTrack wire was advanced to support the transseptal passage of the catheter. The wire advanced to the tip of the dilator with ICE guidance and stopped abruptly at the end of the dilator, suggesting that the tip of the dilator was against the right atrial side of the fossa ovalis. The advancement of the wire was also seen on ICE; however, resolution of the imaging at 4.5 MHz frequency was suboptimal, and a small amount of wire may have exited the dilator tip unnoticed. It was readily apparent that the dilator was not properly positioned despite the successful passage of the needle into the left atrium, and hence multiple attempts at passing the wire or prodding the fossa were not performed. Given this failure to gain left atrial access, we then moved the sheath, dilator, and wire as a single unit to the IVC to reset for a second pass. However, we felt and saw transient tension on the fossa as the sheath was retracted. At this point, the wire would not retract easily, and excessive elasticity of the wire was noted suspicious for fracture. We activated fluoroscopy to interrogate the wire position; however, no clear abnormality was found as no wire was seen in the dilator and sheath and no fragments were seen in the heart ([Supplemental Video 1](#appsec1){ref-type="sec"}). The dilator component and wire were then removed with manual traction, and we proceeded to reset the Mobi sheath into the SVC using the ablation catheter, followed by the guidewire and the dilator component. However, it was noted that the dilator would not return to the forward position on the Mobi sheath. We then pulled the sheath down into the heart and examined it with the ICE catheter ([Supplemental Video 2](#appsec1){ref-type="sec"}). The ultrasound image revealed a snarl of foreign body wire material at the distal end of the Mobi catheter ([Figure 1](#fig1){ref-type="fig"}), possibly involving one of the side ports. Cine fluoroscopy with a 39 cm field of view was performed of the patient from head to groin, and no radiopaque material was visible outside the Mobi sheath, outside the SL1 sheath, or in the heart ([Supplemental Videos 1](#appsec1){ref-type="sec"} and [3](#appsec1){ref-type="sec"}). However, clearly there was a problem identified on the intracardiac ultrasound.Figure 1Intracardiac ultrasound image of wire fragment from fractured ProTrack wire (Baylis Medical, Toronto, Canada) in the right atrium. This segment was completely radiolucent. The visible sheath next to the fragment is an 8.5F SL1 sheath (Abbott Medical, Chicago, IL) with alligator forceps for securing the wire. Given this finding, we immediately took steps to secure the foreign body debris: a 3.3F, 115 cm flexible alligator forceps (Cook Medical, Bloomington, IN) was advanced through the SL1 sheath and the foreign body fragments were snared and removed in this fashion, showing thin filamentous metal wire fragments consisting of the coil component of the wire ([Figure 2](#fig2){ref-type="fig"}). However, a significant amount of wire remained at the tip of the Mobi sheath. Once the wire fragments were free of the heart, we pulled all components to the IVC bifurcation to minimize the risk of cardiac perforation while we worked. We then attempted a trap-balloon technique[@bib1] utilizing an 8 mm × 4 cm Powerflex over-the-wire angioplasty balloon (Cordis Medical, Fremont, CA) inserted to the end of the Mobi sheath, then did a low-pressure inflation to trap the wire components at the end of the sheath while retracting the entire sheath as a unit ([Supplemental Figure 1](#appsec1){ref-type="sec"}). This was ineffective, as a significant amount of metal was stripped off when the sheath exited the vasculature with a thin strand protruding out of the body from the access site. However, this retained hardware could now be extracted by pulling on components in the ipsilateral second venous access through the SL1 sheath (watching the protruded fragments reenter the body and then exit out the SL1 sheath). The remaining fragments were then removed under ICE guidance in the distal venous structures. The ICE catheter was then advanced to the heart and imaging of the main pulmonary trunk, right ventricle, right atrium, and inferior vena cava and down to the access site was performed to confirm the absence of residual foreign material. Approximately 30 cm of unraveled metal wire was removed from the body in this fashion. It appeared that much of the metal wire was from the coil component of the wire ([Figure 3](#fig3){ref-type="fig"}). Given the time taken to extract the foreign material, the decision was made to cardiovert the patient and reschedule his PVI for a later date. He recovered without complications and was discharged the following day, continuing his oral anticoagulation.Figure 2Same fragment of wire from [Figure 1](#fig1){ref-type="fig"} after removal. The very thin diameter of this stainless steel wire likely explains why it could not be seen with fluoroscopy.Figure 3Photographs of a normal ProTrack wire (Baylis Medical, Toronto, Canada) (*left*), and the fractured ProTrack wire (*right*). Note extensive unraveling of the distal coil component portion of the wire. Discussion {#sec3} ========== We believe this case provides some valuable insight to the potential complications that can arise from using complex wires in the course of invasive procedures, as well as novel techniques to address these complications successfully. The ProTrack wire is a unique wire designed to assist in safe transseptal passage and has been shown to decrease procedure times safely in MitraClip (Abbott Medical) procedures utilizing a 22F transseptal sheath.[@bib2] The ProTrack has a soft spiral tip to allow for placement against the back of the left atrium for support while minimizing perforation risk[@bib3] ([Supplemental Figure 2](#appsec1){ref-type="sec"}). The fracture of this wire has not been previously reported, to the best of our knowledge. Furthermore, much of the fragmented wire was not visible to standard fluoroscopy, and if we had not utilized ICE, we may have assumed that all wire fragments were removed from the body when there clearly was a significant amount remaining. One of the pressing concerns for the authors is why the wire components were not visible to fluoroscopy. The ProTrack wire is constructed of grade 304 stainless steel (personal communication of author J.L. with Baylis Medical), a composite of iron, nickel, chromium, manganese, and carbon. This allows for unique properties, including corrosion resistance, strength, and flexibility. It is also naturally radiopaque, though it lacks the radiodensity of higher-atomic-weight compounds such as barium. The radiopacity of an object on fluoroscopy depends upon 4 factors[@bib4]: depth of use in the body (shallow use in the dermal region able to attenuate radiation better vs the deeper coronary vasculature), the width of the artificial surface visualized, the energy of the imaging radiation source, and the atomic weight of the artificial surface. When one considers the 0.025 ProTrack wire, the diameter of the coil component is many times thinner than the normally radiopaque wire; hence the radiolucency of the coil wire fragments likely rests on its extremely small diameter alone. Fortunately, the visibility of the metal components on ultrasound was not affected and ICE remained an effective tool to properly address this complication. Another item of concern was the apparent involvement of the side port of the Mobi sheath in wire entanglement. We believe the ProTrack wire did not get entangled in the side port during antegrade passage into the body, as the ProTrack wire was always advanced through the lumen of the dilator component. However, after the wire fractured and the dilator was removed, the remaining wire fragments were then exposed to the side ports and presumably became entangled as the mapping and ablation catheter was advanced through the sheath to advance the Mobi sheath back to the SVC for a second pass, which ultimately was aborted when the dilator component over a standard J wire failed to advance to the fully forward and locked position (remaining about 5 mm short of its final position, indicating that our standard J wire had not exited out the side port, as this would have resulted in at least 2 cm of the dilator remaining outside the body). It is our belief that some ProTrack wire fragments became entangled in the side ports, which fortunately prevented further embolization of wire fragments, but this also complicated removal, as the piecemeal extraction of the wire fragments through the SL1 sheath could not completely remove the hardware that was entangled with the Mobi sheath side port. We also believe that the use of the angioplasty balloon, to attempt to entrap the metal fragments and allow for extraction of the wire fragments as a single unit with removal of the sheath, actually ruptured the side port; however, in doing so, it then allowed the fragments to be pulled back into the body and out the ipsilateral access SL1 sheath by manual traction, as the binding point had now been released ([Supplemental Figure 3](#appsec1){ref-type="sec"}). Caution regarding side port cannulation with curved wires is worth mention here, particularly in no-fluoroscopy cases, when wires are advanced into a sheath with side ports exposed in advance of the dilator component. The clue in these situations is generally the inability to advance the dilator component to the fully forward and locked position. Forcing the dilator forward typically will tear the side port to make it unusable for transseptal passage owing to the sheath deformation. This finding would also be readily apparent on ultrasound. This patient underwent a repeat EP study after failing another trial of therapy on dofetilide with recurrent symptomatic atrial fibrillation. During this repeat study using a higher-quality ultrasound system (GE Vivid IQ 8 MHz, General Electric, Boston, MA), it was apparent that this septum had a thin primum layer, and a thicker secundum layer, which was missed on the initial ICE imaging with an older ultrasound system (GE Vivid I 4.5 mHz, General Electric, [Supplemental Video 4](#appsec1){ref-type="sec"}). It is the authors' belief that the transseptal needle punctured both layers with RF; however, the dilator component was stuck behind the second, thicker secundum layer. Hence when the RF needle showed left atrial access by saline contrast injection and was removed, access to the left atrium was lost, and the subsequent advancement of the ProTrack wire likely embedded within the fossa ovalis itself, leading to the wire fracture. A key lesson for the authors in this case was the importance of high-quality ICE in identifying both layers of the fossa, ensuring that the dilator component crossed both layers before removing the transseptal needle and advancing the transseptal wire. Ensuring this was accomplished on the second attempt led to an uneventful and successful PVI procedure for this patient. Conclusion {#sec4} ========== Fractures of specialized wires can yield components that cannot be visualized under standard fluoroscopy, and intracardiac ultrasound should be utilized in these cases to prevent inadvertent abandonment of hardware at the time of intravascular procedures. Appendix. Supplementary data {#appsec1} ============================ Supplemental Video 1Fluoroscopy imaging in the AP projection immediately after suspected wire fracture, no intracardiac foreign body material is seen likely related to the very thin diameter of the Protrack wire fragments being unable to attenuate radiation in significant fashion.Supplemental Video 2Intracardiac ultrasound imaging demonstrating the metal fragment within the heart, narrated to discuss the use of an alligator clip snare to remove the fragments down to the IVC/iliac junction where further work was performed to complete hardware extraction using intracardiac ultrasound.Supplemental Video 3Fluoroscopy imaging in the AP projection of the distal ends of the sheath where wire fragments were located, again no evidence of wire fragments seen on fluoroscopic imaging despite the presence of extensive hardware in the vascular space.Supplemental Video 4Intracardiac ultrasound imaging from repeat study 2 months later demonstrates the 2 layers of the interatrial septum where the wire is believed to have lodged prior to fracture. This imaging was completed on a newer ultrasound machine (GE Vivid IQ at 8Mhz) allowing for recognition of this anatomy which previously was missed on an older machine (GE Vivid I at 4Mhz).Supplemental Figure 1ICE imaging of the inferior vena cava junction at the iliac bifurcation, left iliac (above), right iliac (below). The Mobi sheath with wire fragments attached is seen with multiple loops of wire underneath, the sheath is coming from the right iliac vein (below).Supplemental Figure 2Protrack wire construction, a stainless steel shaft with stainless steel coil material wrapping around the shaft. This hybrid construction allows for its soft curled tip to facilitate transseptal passage and prevent loss of left atrial access.Supplemental Figure 3Photo of Mobi sheath with ruptured side port after extraction of retained wire fragments. We believe the inflation of the angioplasty balloon within the Mobi sheath likely ruptured this side port but also allowed for the wire to then be removed. The catheter seen in the photo was inserted after removal to make the side port in black more visible. Supplementary data associated with this article can be found in the online version at [https://doi.org/10.1016/j.hrcr.2019.01.013](10.1016/j.hrcr.2019.01.013){#intref0010}.
Pic Talk : 50-yr-old Star Hero’s Shocking Look The much awaited first look of Akshay Kumar from his next Kesari has been unveiled. Sporting a large turbane, broad moustache and bushy beard, Akshay’s look is terrific and intriguing. This is ambitious project of Karan Johar who wants to beat or recreate the magic of Baahubali made by SS Rajamouli. Keshari has gone onto the floors on Jan 5, 2018 (today). 50-year-old Akshay has joined the shoot. Sharing his first look from the film, Akshay tweeted: “Feeling nothing but immense pride and gratitude while sharing this. Beginning my 2018 with #KESARI, my most ambitious film and a lot of passion. Need your best wishes as always.”
A 36-month randomized controlled split-mouth trial comparing immediately loaded titanium oxide-anodized and machined implants supporting fixed partial dentures in the posterior mandible. A single-blind randomized controlled split-mouth trial was performed to compare the 36-month outcomes of machined and titanium oxide-anodized (ADZ) dental implant surfaces immediately loaded with fixed partial dentures in the posterior mandible. Ten patients with bilateral partial edentulism in the posterior mandible received 42 implants; 20 were placed on the test side (ADZ) and 22 were placed on the control (machined) side. The implants were loaded within 24 hours after placement. Changes in the radiographic bone level (RBL) were measured on standardized periapical films at baseline, 12 months, and 36 months. The mean changes in RBL were compared using a paired t test, and the mean changes in RBL with regard to implant position and implant surface type were compared via two-way analysis of variance. After 36 months of functional loading, the overall cumulative success rate for all implants was 95%. The mean change in RBL at 36 months was 0.35 mm and 0.32 mm for ADZ and machined implants, respectively (not statistically significantly different between groups; P = .88). A reduction in RBL was observed for both machined and ADZ implants between 12 and 36 months, but only the machined implants demonstrated a statistically significant decrease in RBL during the observation period. No statistically significant differences in RBL change were found between machined and ADZ implant surfaces after 36 months in function, and both surfaces demonstrated minimal marginal bone remodeling. As such, immediate loading of ADZ and machined dental implants supporting fixed partial dentures may be a suitable long-term treatment option in the posterior mandible.
Characterizing the impact of surfactant structure on interfacial tension: a molecular dynamics study. The effect of sodium branched-alkylbenzene sulfonates on the NaCl solution/oil interface was studied via classical molecular dynamics simulation. The interfacial properties were found to depend on the surfactant concentration and to change dramatically when the concentration exceeded a critical value, the simulated limit area (A c). When A c is not close to the theoretical saturated adsorption area (A min), the surfactant cannot produce ultralow interfacial tension (IFT). When A c is equal or almost equal to A min, the effect of the structure of the surfactant must be considered to determine if ultralow IFT is possible: if the sizes of the hydrophobic and hydrophilic groups in the surfactant are similar, the surfactant can produce ultralow interfacial tension (and vice versa). Based on the results of these studies, the effect of surfactant structure on the interfacial properties of the system was investigated, and a method of gauging the IFTs produced by different surfactants was proposed that should prove very useful when designing the optimal surfactant structure to achieve ultralow IFT. Graphical Abstract The interfacial properties of water/surfactant/oil system, such as interfacial thickness and IFT, depending on the surfactant concentration and changing dramatically when the concentration exceed a critical value.
High-resolution scintimammography: a pilot study. This study evaluated a novel high-resolution breast-specific gamma camera (HRBGC) for the detection of suggestive breast lesions. Fifty patients (with 58 breast lesions) for whom a scintimammogram was clinically indicated were prospectively evaluated with a general-purpose gamma camera and a novel HRBGC prototype. The results of conventional and high-resolution nuclear studies were prospectively classified as negative (normal or benign) or positive (suggestive or malignant) by 2 radiologists who were unaware of the mammographic and histologic results. All of the included lesions were confirmed by pathology. There were 30 benign and 28 malignant lesions. The sensitivity for detection of breast cancer was 64.3% (18/28) with the conventional camera and 78.6% (22/28) with the HRBGC. The specificity with both systems was 93.3% (28/30). For the 18 nonpalpable lesions, sensitivity was 55.5% (10/18) and 72.2% (13/18) with the general-purpose camera and the HRBGC, respectively. For lesions < or = 1 cm, 7 of 15 were detected with the general-purpose camera and 10 of 15 with the HRBGC. Four lesions (median size, 8.5 mm) were detected only with the HRBGC and were missed by the conventional camera. Evaluation of indeterminate breast lesions with an HRBGC results in improved sensitivity for the detection of cancer, with greater improvement shown for nonpalpable and < or =1-cm lesions.
Fedor Mirkovich Fedor Yakovlevich Mirkovich (1789–1866) was a Russian general who participated in the Napoleonic Wars, including the Battle of Borodino and the capture of Paris. Biography Born to a family of Serbian descent, he was made lieutenant in 1812 and fought against the French invasion of Russia as part of the Life Guard Horse Regiment under the command of Colonel Mikhail Arseniev. He was the Russian Military Administrator of the Principality of Moldova and Wallachia from 1828 to 1834. In 1840, he was appointed governor general of Lithuania. Ten years later, he was named inspector of military schools and member of the Military Education Institutions. He died in 1866 at the age of 77. His son Mikhail Mirkovich was a regimental commander in the Imperial Russian Army. Fedor's younger brother Alexander Yakovlevich Mirkovich was also a general in the Imperial Russian service, and a veteran of the wars against Napoleonic France. Works In all spheres of activity Mirkovich left notes and papers. From them are printed: Dnevnik iz 1812, Russian Archives, 1888; "From the notes of FG Mirković by the rule of Pavel (Paul I of Russia) until 1850", Russian Archives, 1890; "Herald Europe" (Opisanie rukopisei Nauchnoi biblioteki im. N.I. Lobachevskogo, Vol. 3 and 4, 1872) Russian Antiquities, 1866, Vol. 8. He also collected his brother Alexander's reminiscences of the war collected, classified and prepared for publication. See also Aleksandr Mirkovich References Category:1789 births Category:1866 deaths Category:Russian generals Category:Russian military personnel of the Napoleonic Wars
Introduction ============ Vitamin D is known to be essential for bone metabolism. The number of peer-reviewed publications with the term \'vitamin D\' in their title or abstract has increased greatly since the early 2000s[@B1]. PubMed currently lists over 25,000 publications from 1950 to the present. In the 1960s, fewer than 100 papers on \'vitamin D\' were published per year; however, in 2010, this rate of publication reached approximately 2,500 papers per year. This expansion of research over recent decades has resulted in a dramatic increase in our understanding of additional biological actions of vitamin D on various systems including pancreas β-cell function, immune, cardiovascular, muscle, and brain systems, and control of the cell cycle. An interesting relationship exists between mortality in ischemic heart disease and geographic latitude in European countries[@B2], which shows an increase in the mortality of heart diseases with increase in latitude. Additionally, serum 25-hydroxyvitamin D (25(OH)D) levels have been shown to be higher in healthy subjects at lower latitudes[@B2]. Vitamin D, hyperparathyroidism, and vascular calcification ========================================================== Vitamin D plays a well-known role in the regulation of phosphate homeostasis. Phosphate is absorbed from the diet in the gut, stored in the skeleton, and excreted by the kidneys; 1,25-dihydroxyvitamin D (1,25(OH)~2~D) stimulates absorption of phosphate from the diet[@B3]. Fibroblast growth factor (FGF)-23 increases renal phosphate clearance, suppresses synthesis of 1,25(OH)~2~D, and may decrease parathyroid hormone (PTH). PTH increases renal phosphate clearance and stimulates synthesis of 1,25(OH)~2~D[@B4]. In chronic kidney disease (CKD) patients, ionizing calcium (iCa) is decreased secondary to phosphate retention and decrease in 1,25(OH)~2~D. Phosphate retention increases FGF-23, which, in conjunction with its cofactor, Klotho protein, decreases the activity of 1α-hydroxylase and increases 24α-hydroxylase, thus decreasing the levels of circulating 1,25(OH)~2~D. Additionally, phosphate retention results in an increase in posttranscriptional synthesis of PTH. Decreases in the vitamin D receptor (VDR), calcium sensor receptor, and Klotho-FGFR1 receptor complex in the parathyroid gland aggravate the development of the secondary hyperparathyroidism in CKD patients[@B4]. Apart from hyperparathyroidism, calcium and phosphate imbalance and vitamin D deficiency also contribute to vascular calcification. A cross-sectional study by Gracia-Canton et al. has reported an independent negative association between serum levels of 25(OH)D and vascular calcification in 210 patients with stage 4 and 5 CKD[@B5]. Plain X-ray images of pelvis, hands, and lateral lumbar spines from all subjects were studied for calculation of semi-quantitative vascular calcification scores, as described by Adragao[@B6] and Kauppila[@B7]. Adragao scores revealed only 47 patients (22.4%) without vascular calcification and 120 patients (57.1%) with scores higher than 3[@B5]. Kauppila scores revealed only 29 patients (13.8%) without aortic calcifications and 114 patients (54.3%) with scores higher than 7[@B5]. Higher vascular calcification scores were related to older age, diabetes, history of cardiovascular disease (CVD), and lower levels of 25(OH)D[@B5]. Only one-fifth of patients had adequate levels of 25(OH)D, whereas a half had vitamin D insufficiency, and a quarter had vitamin deficiency ([Fig. 1](#F1){ref-type="fig"})[@B5]. Vitamin D and vitamin D receptor ================================ Vitamin D is a multifunctional hormone that can affect many essential biological functions, ranging from immune regulation to mineral ion metabolism. Calcitriol or 1,25(OH)~2~D is the active form of vitamin D, formed by dual hydroxylation in the liver and kidney. [Figure 2](#F2){ref-type="fig"} shows a simplified diagram of the different stages of vitamin D synthesis[@B8]. Vitamin D~2~ (ergocalciferol), which is absorbed mainly from food, and vitamin D~3~ (cholecalciferol), produced in the skin by photolytic cleavage of 7-dehydrocholesterol, is transported to the liver and converted to 25(OH)D, the major circulating metabolite of vitamin D. The final activation step, 1-hydroxylation, occurs primarily, but not exclusively, in the kidney, forming 1,25(OH)~2~D[@B8]. Active vitamin D metabolites exert biological activities mainly through the VDR[@B1]. VDRs are operational in at least 38 tissues of the body. In these target tissues, VDR functions in the cell nucleus as a transcriptional factor influencing approximately 3% of the human genome, and in the plasma membrane caveolae as a modulator of signal transduction pathways ([Fig. 3](#F3){ref-type="fig"}). The activity of the VDR conformational ensemble (with 2 ligand pockets) can generate either genomic or rapid biological responses. In this model, one shape (6-s-trans) of the conformationally flexible 1α,25(OH)~2~D can interact with VDR localized in the cell nucleus to generate genomic responses via regulation of gene transcription, whereas a different shape (6-s-cis) of 1α-25(OH)~2~D binds to the second ligand pocket of the VDR associated with caveolae of the plasma membrane to generate rapid responses[@B1]. VDR activation through these pathways has been shown to have wide-ranging effects. Calciotropic functions of 1,25(OH)~2~D include physiological regulation of calcium transport and bone mineralization. Synthesis of circulating 1,25(OH)~2~D, which mediates these calciotropic actions, is tightly regulated. Non-calciotropic actions involve activation of VDRs by locally produced 1,25(OH)~2~D in a number of tissues in a paracrine and autocrine fashion[@B9]. In particular, vitamin D is closely linked to CVD[@B2]. Experimental studies have shown that vitamin D treatment reduces neurohormonal activation, inhibits inflammation, and suppresses ventricular hypertrophy[@B10]. Vitamin D deficiency in CKD =========================== The recent Workshop Consensus for Vitamin D Nutritional Guidelines estimated that approximately 50% and 60% of the older populations in North America and the rest of the world, respectively, do not have satisfactory vitamin D status[@B11]. The consensus further concluded that the situation is similar in younger subjects. Reasons for this remain unclear but are probably related to factors such as urbanization, demographic shifts, decreased outdoor activity, air pollution, global dimming, and decrease in cutaneous production of vitamin D with age. Epidemiological investigations in many countries have shown high prevalence of unsatisfactory vitamin D status ([Table 1](#T1){ref-type="table"})[@B12]-[@B15]. In particular, the 2008 Korea National Health and Nutrition Examination Survey (KNHANES) found vitamin D insufficiency in 47.3% of male and 64.5% of female subjects[@B15]. The outpatient cross-sectional cohort study conducted by Levin et al. has revealed that abnormalities of mineral metabolism occur early in CKD[@B16]. A decrease in 1,25(OH)~2~D levels was above the range of glomerular filtration rate (GFR) values even in the early stage of CKD[@B16]. Similarly, significant inverse correlations were observed among serum phosphate, FGF-23 and PTH levels, and GFR in patients with stage 1 to 3 CKD[@B17]. Hypovitaminosis D is prevalent even in patients with early-stage CKD[@B18]. It is consistent with the previous data that 25(OH)D deficiency worsens with the progression of CKD. Therefore, the Kidney Disease: Improving Global Outcomes (KDIGO) Clinical Practice Guidelines have recommended annual measurement of 25(OH)D and have also recommended that the level should be maintained at 30 ng/mL or higher in patients with any stage of CKD[@B19]. Decreased VDR activation and clinical outcomes ============================================== Melamed et al. tested the association of low 25(OH)D levels with all-cause, cancer, and CVD mortality in 13,331 nationally representative adults from the Third National Health and Nutrition Examination Survey (NHANES III) linked mortality files[@B20]. In this cross-sectional multivariate analysis, increasing age, female sex, non-white race/ethnicity, diabetes, current smoking, and higher body mass index were all independently associated with higher odds of 25(OH)D deficiency, whereas greater physical activity, vitamin D supplementation, and non-winter season showed an inverse association[@B20]. In multivariate models, compared with the highest quartile, being in the lowest quartile for 25\[OH\]D levels (\< 17.8 ng/mL) was associated with a 26% increased rate of all-cause mortality (mortality rate ratio, 1.26; 95% CI, 1.08-1.46) and a population attributable risk of 3.1%[@B20]. The prospective cohort study by Dobnig et al., which enrolled patients undergoing diagnostic coronary angiography with normal kidney function showed a similar result with regard to relationships between endogenous 25(OH)D and 1,25(OH)~2~D levels and all-cause and cardiovascular mortality[@B21]. Multivariate-adjusted hazard ratios (HRs) for patients with lower levels of 25(OH)D were two times higher for all-cause mortality and cardiovascular mortality[@B21]. A meta-analysis of randomized controlled trials by Autier and Gandini showed that intake of ordinary doses of vitamin D supplements appears to be associated with decreases in total mortality rates[@B22]. They have identified 18 independent randomized controlled trials, including 57,311 participants. The relative risk for mortality from any cause was 0.93 (95% CI, 0.87-0.99)[@B22]. Kandula et al. have reported on vitamin D supplementation in CKD by meta-analysis[@B23]. Among observational studies and randomized controlled trials, significant improvement was observed in serum 25(OH)D levels, along with an associated decline in PTH levels[@B23]. A low incidence of hypercalcemia and hyperphosphatemia has been reported with vitamin D supplementation. However, included studies were mostly of low to moderate quality and did not show beneficial effects on hard clinical endpoints[@B23]. Kovesdy et al. reported on the benefit of activated vitamin D treatment in patients with predialysis CKD[@B24]. Two hundred fifty-eight of 520 subjects received treatment with calcitriol. The incidence rate for mortality and combined death and dialysis initiation was significantly lower in treated than in untreated patients. Treatment with calcitriol was associated with a trend toward a lower incidence of dialysis. These results were consistent across different subgroups[@B24]. One prospective cohort study of incident dialysis patients in the Netherlands (the NECOSAD) revealed an association of vitamin D deficiency in dialysis patients with an adverse health outcome, in particular, with short-term cardiovascular mortality[@B25]. Teng et al. reported on a historical cohort study of activated injectable vitamin D and hemodialysis survival[@B26]. During a 2-year observational period, 37,173 patients on hemodialysis received activated injectable vitamin D, and 13,864 did not. At 2 years, the mortality rate was 13.8/100 person-years in the group that received injectable vitamin D, compared with 28.6/100 person-years in the non-vitamin D group (*P* \< 0.001). The incidence of cardiovascular-related mortality was 7.6/100 person-years in the injectable vitamin D group, compared with 14.6/100 person-years in the non-vitamin D group (*P* \< 0.001). The study by Wolf et al. also showed that, although low vitamin D levels were associated with increased mortality, significant interactions were noted among vitamin D levels, subsequent active vitamin D therapy, and survival[@B27]. Compared with patients with the highest 25(OH)D or 1,25(OH)~2~D levels who received therapy, untreated deficient patients showed a significantly increased risk for early mortality[@B27] ([Table 2](#T2){ref-type="table"}). Summary ======= In summary, vitamin D deficiency is common not only in CKD patient but also in the general population. Reduced VDR activation occurs early in CKD. Low 25(OH)D is a risk factor for and is predictive of cardiovascular events. Decreased VDR activation is a major pathophysiological factor in the development of secondary hyperparathyroidism and also contributes to CKD morbidity and mortality. Patients with CKD have reduced VDR activation. Restoration of the physiology of VDR activation should be essential therapy for CKD patients. ![Prevalence of Vitamin D Deficiency and Vascular Calcification in Stage 4 and 5 CKD. CKD, chronic kidney disease; 25(OH)D, 25-hydroxyvitamin D; white box, Adragao score[@B6]; gray box, Kauppila score[@B7].\ ^\*^Data from the study of Garcia-Canton C et al. [@B5].](ebp-9-1-g001){#F1} ![Synthesis of Vitamin D. D2, vitamin D2; D3, vitamin D3; VDR, vitamin D receptor.\ ^\*^Modified from the study of Razzaque MS. [@B8].](ebp-9-1-g002){#F2} ![Function of Vitamin D Receptor (VDR) Conformational Ensemble: Genomic or Rapid Responses.\ ^\*^Modified from the study of Norman AW et al. [@B1].](ebp-9-1-g003){#F3} ###### Definition and Prevalence of Vitamin D Deficiency in the General Population ![](ebp-9-1-i001) 25(OH)D, 25-hydroxyvitamin D. ###### Selected Clinical Studies on Vitamin D Deficiency and Treatment in Patients with Non-Chronic Kidney Disease (CKD), Non-Dialytic CKD, and Dialytic CKD ![](ebp-9-1-i002) NHANES III, Third National Health and Nutrition Examination Survey; NECOSAD, Netherlands Cooperative Study on the Adequacy of Dialysis; 25(OH)D, 25-hydroxyvitamin D; PTH, parathyroid hormone.
// CS0452: The type `int' must be a reference type in order to use it as type parameter `T' in the generic type or method `Foo.Test<T>(ref T)' // Line: 14 public class Foo { public static void Test<T> (ref T t) where T : class { } } public class C { public static void Main () { int i = 0; Foo.Test<int> (ref i); } }
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package thrift import ( "bufio" ) type TBufferedTransportFactory struct { size int } type TBufferedTransport struct { bufio.ReadWriter tp TTransport } func (p *TBufferedTransportFactory) GetTransport(trans TTransport) (TTransport, error) { return NewTBufferedTransport(trans, p.size), nil } func NewTBufferedTransportFactory(bufferSize int) *TBufferedTransportFactory { return &TBufferedTransportFactory{size: bufferSize} } func NewTBufferedTransport(trans TTransport, bufferSize int) *TBufferedTransport { return &TBufferedTransport{ ReadWriter: bufio.ReadWriter{ Reader: bufio.NewReaderSize(trans, bufferSize), Writer: bufio.NewWriterSize(trans, bufferSize), }, tp: trans, } } func (p *TBufferedTransport) IsOpen() bool { return p.tp.IsOpen() } func (p *TBufferedTransport) Open() (err error) { return p.tp.Open() } func (p *TBufferedTransport) Close() (err error) { return p.tp.Close() } func (p *TBufferedTransport) Read(b []byte) (int, error) { n, err := p.ReadWriter.Read(b) if err != nil { p.ReadWriter.Reader.Reset(p.tp) } return n, err } func (p *TBufferedTransport) Write(b []byte) (int, error) { n, err := p.ReadWriter.Write(b) if err != nil { p.ReadWriter.Writer.Reset(p.tp) } return n, err } func (p *TBufferedTransport) Flush() error { if err := p.ReadWriter.Flush(); err != nil { p.ReadWriter.Writer.Reset(p.tp) return err } return p.tp.Flush() } func (p *TBufferedTransport) RemainingBytes() (num_bytes uint64) { return p.tp.RemainingBytes() }
Our price is lower than the manufacturer's "minimum advertised price." As a result, we cannot show you the price in catalog or the product page. You have no obligation to purchase the product once you know the price. You can simply remove the item from your cart. Our price is lower than the manufacturer's "minimum advertised price." As a result, we cannot show you the price in catalog or the product page. You have no obligation to purchase the product once you know the price. You can simply remove the item from your cart. Dakar 2017 Update: KTM Factory Racing 06 January 2017 BITTERSWEET DAY FOR RED BULL KTM FACTORY RACING TEAM AT DAKAR 2017 On Thursday riders left Argentina on another brutal ride of 521 km. The fourth stage of The Dakar took the riders across the Bolivian border from Jujuy to Tupiza, with the timed section comprising 416km with the additional challenge of tackling dunes at an altitude of around 3,500 meters. Like many others, Sam Sunderland lost valuable time in the early part of the timed special before they made the crossing from Argentina into southern Bolivia. He went on to finish the stage in 12th place, 16.18 minutes off the lead. -Red Bull KTM Factory Racing Mechanics Tent- Toby Price Toby Price, who won the second stage but then lost time at the beginning of Wednesday’s Stage 3 after a navigational error, had been working hard to catch Barreda. He had just got in front of him when he crashed in a riverbed at the 371 km mark. The medical team reported he had fractured the thighbone in his left leg when he was only a few kilometers from Tupiza in southern Bolivia, where the stage finished. The factory team later confirmed Price was being transported to the capital La Paz for further treatment. -Toby Price- Matthias Walkner Matthias Walkner: “Actually at the beginning of the stage I didn’t feel so good and I got a bit lost, like everybody, I think, because it was tricky navigation. After I had a good speed but I didn’t think it would be enough to win.” Speaking of his teammate’s accident, Walkner commented: “I got to him about five minutes after the crash and Adrien Van Beveren and Paulo Goncalves had already stopped. I saw he was awake and they told me he was more or less okay, so I kept on going. Where he crashed it was in a riverbed, where the ground changed very quickly. First it was sandy and you could go flat out at 140 km/h, but then you came to some big stones and it’s very hard to find the right speed. If you hit a stone with the motorbike then its difficult.” Looking ahead to Friday’s fifth stage, the Austrian rider said in some ways it would be good to start first but it would also be a difficult job to open the piste. -Matthias Walkner- Sam Sunderland Sunderland was disappointed to have lost time at the beginning of the stage: “It is really frustrating because I’m trying to spend a lot of time on the notes, but it’s very unclear. I can only speak for myself but I heard other riders are also having problems. Even some of the car teams who have a guy just for the navigation are having difficulties. I guess the organizers want to make it like this. It’s frustrating because I felt good and strong the rest of the day but its pretty rough to lose 10-15 minutes at the start of the day and for sure its going to get worse.” Speaking of his injured teammate, Sunderland said: “I also want to shout out to my buddy Toby Price and hope he can get better soon. It is a big blow for KTM but we are a good team and a strong one and we’ll keep fighting until the last day.” -Sam Sunderland- Laia Sanz The day was also a frustrating one for KTM factory rider Laia Sanz who finished at 36th in the stage. “I was doing well at the beginning and I was navigating well. I was on the traces and in the right place for the waypoint, but I stopped to confirm with another rider, and he told me that I was wrong. So I went back to check, and I was right the first time, so I lost half an hour.” -Laia Sanz- Friday’s Stage 5 will continue north on the Bolivian Altiplano. Riders can expect a vast range of terrain and organizers say the stage will be one of the most demanding. There will be two challenging dune sectors in the final kilometers of the 447 km timed special and they will ride for a total of 692 km to get to the stop at Oruro. After this long day, they only have one more stage before the one rest day in La Paz.
Q: Awk strftime on Mac OS X The following command on my Mac (10.6) gives me an undefined function error: $ awk 'BEGIN{now=strftime("%D", systime()); print now}' awk: calling undefined function strftime source line number 1 On a Red Hat system, I get the expected result: $ awk 'BEGIN{now=strftime("%D", systime()); print now}' 12/01/09 What's the deal here? A: strftime is a GNU gawk extension. If you want to use strftime, download GNU gawk and install on your Mac. Otherwise, there are other tools like Perl/Python you can use. Check if you have them on your Mac A: Use Homebrew and then just run brew install gawk A: You're relying on an extension to awk that's present in whichever variant (gawk, mawk, nawk, etc.) your Red Hat system happens to be using. See the Standard Unix Specification's awk description for what you can expect as a baseline for awk.
Funko Exclusives! "Next Generation HALT and HASS" presents a major paradigm shift from reliability prediction-based methods to discovery of electronic systems reliability risks. This is achieved by integrating highly accelerated life test (HALT) and highly accelerated stress screen (HASS) into a physics-of-failure-based robust product and process development methodology. "Next Generation HALT and HASS" presents a major paradigm shift from reliability prediction-based methods to discovery of electronic systems reliability risks. This is achieved by integrating highly accelerated life test (HALT) and highly accelerated stress screen (HASS) into a physics-of-failure-based robust product and process development methodology. The new methodologies challenge misleading and sometimes costly mis-application of probabilistic failure prediction methods (FPM) and provide a new deterministic map for reliability development. The authors clearly explain the new approach with a logical progression of problem statement and solutions. The book helps engineers employ HALT and HASS by illustrating why the misleading assumptions used for FPM are invalid. Next, the application of HALT and HASS empirical discovery methods to quickly find unreliable elements in electronics systems gives readers practical insight to the techniques. The physics of HALT and HASS methodologies are highlighted, illustrating how they uncover and isolate software failures due to hardware-software interactions in digital systems. The use of empirical operational stress limits for the development of future tools and reliability discriminators is described. " "Key features: * Provides a clear basis for moving from statistical reliability prediction models to practical methods of insuring and improving reliability.
2 Answers 2 I'm not sure why installing from a usb stick is better. I think the safest way to install Ubuntu is with wubi. You don't have to mess around with the partition manager and it does not repartition your hard drive. It creates a "fake partition" which basically consists of a couple of files that reside in the ubuntu folder in windows. Its pretty amazing. You should be fine. If you are re-installing over an old ubuntu system then you should be able to just select the same partitions and ubuntu will install right over the old one (no partitioning needed).
Germany's biggest companies are taking a stand against racism. Volkswagen (VLKAF) on Friday joined Siemens in a forceful denunciation of hate and xenophobia following a series of violent protests in Germany. Top executives from Europe's largest carmaker addressed employees at a plant in the eastern city of Chemnitz, where right-wing protesters have clashed with police and chanted racist slogans such as "Germany for the Germans." "What happened outside the factory gates goes against all of Volkswagen's basic values," Gunnar Kilian, a board member for human resources, told workers. "Let us make sure there are no new walls. That must be our mission." Volkswagen employs 1,800 workers at the Chemnitz engine plant, including people from countries such as Afghanistan, Cuba, Mexico, Nigeria, Ukraine, Hungary and Vietnam. "There is no room for xenophobia, hate, exclusion and persecution on our company," said Bernd Osterloh, head of the company's works council, which represents employees. In a statement, Volkswagen described diversity, respect and partnership as "unshakeable principles." Germany has been rocked by a series of protests and counter-demonstrations after a German-Cuban man was allegedly killed late last month by an Iraqi and a Syrian in Chemnitz. Some protesters were photographed giving the outlawed Nazi salute. The scenes sparked an intervention by Siemens (SIEGY) earlier this week in a rare example of corporate activism by a major European company. Siemens wrote an open letter to its 4,300 employees in the German state of Saxony, encouraging them to combat xenophobia and defend the country's reputation for tolerance. Managers at the engineering firm said they rejected the aims of protesters, writing that fairness, tolerance, respect and dialogue are as important to its business as technical expertise. Joe Kaeser, the chief executive of Siemens, denounced a German lawmaker earlier this year, saying that their nationalism would harm German prosperity. "I'm there to represent the company and be accountable to the shareholders; on the other hand, if people turn their head away . . . Well, we had that time in Germany," Kaeser told the Financial Times in May. "Nobody spoke up. Then it was too late." Volkswagen was formed in 1938 to realize Adolf Hitler's dream of building a people's car. Thousands of people were used as slave labor at its main Wolfsburg factory, building weapons and vehicles during the Nazi era. The German Chamber of Commerce and Industry said earlier this week that the events in Chemnitz were "unacceptable from the point of view of the German economy." Eric Schweitzer, president of the business lobby, said that xenophobia and nationalism damage the reputation of Germany. "German companies are active around the world and therefore rely ... on being welcome in other countries of the world," he said in a statement.
--- bibliography: - 'SSPA19-article.bib' --- =1 **** Characterization of ultrasound transmit-receive measurement systems in air\ Renate Grindheim^1^, Per Lunde^1,2^, Magne Vestrheim^1^\ ^1^ University of Bergen, Department of Physics and Technology, P.O. Box 7803, N-5020 Bergen, Norway\ ^2^ NORCE, Norwegian Research Centre AS, P.O. Box 6031, N-5898 Bergen, Norway\ Contact email: [[[email protected]]{}](mailto:\email) [**Abstract**\ ]{} A system model is used, describing the voltage-to-voltage transfer function for an ultrasonic transmit-receive transducer pair based on simulations using a finite element model for piezoelectric transducers (FEMP). The piezoelectric ceramic elements used in this work are cylindrical Pz27 disks vibrating radially in air at room temperature and 1 atm, over a frequency range up to 300 kHz. Comparisons are made between measurements and simulations. Effects of uncertainties in alignment are examined, together with comparisons with prior work. Introduction ============ Accurate modelling of ultrasonic measurement systems for characterization of gas is of interest in industrial and scientific applications. Examples include fiscal flow measurement for custody transfer of natural gas [@ISO; @FroysaLunde2003], energy and quality measurement of gas [@FroysaLunde2003; @FroysaLunde2006; @Farz], and sound velocity and absorption measurements [@Norli; @Lunde2007]. In the present work a “system model” of a transmit-receive measurement system refers to “a mathematical / numerical model aiming to describe the chain of electro-acoustic signal propagation through the system, from the electrical signal generator to the electrical recording equipment (e.g., an oscilloscope), via the piezoelectric transmit and receive transducers, the propagation medium, and possible transmit and receive cables/electronics” [@rune].\ Various approaches have been used to describe transmit-receive ultrasonic measurement systems for fluids. This includes methods based on (i) the Mason model \[or equivalent one-dimensional (1D) approaches\] for thickness-mode transmitting and receiving transducers, combined e.g. with uniform piston [@FroysaLunde2003; @Stepanishen81; @Lygre87; @Collie89; @Vervik95; @Willatzen99; @Vervik2000; @Willatzen2001] or plane wave [@Papadakis77; @Low80; @Hayward84; @Hayward842; @Yamaguchi86; @Wilcox98] type of radiation models; (ii) 1D “electroacoustic measurement (EAM) model” types of description [@Dang02; @Dang022; @Schmerr07; @Schmerr11]; and (iii) purely electrical transmission line system modelling [@Deventer00]. More rigorous and accurate descriptions based on finite element modelling (FEM) have proven highly useful for ultrasonic system modelling, accounting for e.g. thickness-mode [@Lunde03; @Bezdek07; @Bezdek08; @Bezdek082; @Ge14] and radial mode [@Norli; @Hauge; @Mosland; @Storheim; @Sovik; @Andersen; @Hagen; @rune] transducers in such measurement setups.\ The work presented here builds on prior work described in Refs. [@Norli; @Mosland; @Sovik; @Hauge; @Andersen; @Hagen; @rune], using finite element modelling of an ultrasonic measurement system for air employing piezoelectric elements vibrating in their lower radial modes. Measurements and simulations of the frequency response of a voltage-to-voltage transmit-receive transfer function are compared, including comparison with some recent work in this area [@Andersen; @Hagen]. A second objective is to investigate and quantify measurement sensitivities to uncertainties in positioning and alignment of the transmitting and receiving piezoelectric elements in this setup. Theory ====== The experimental measurement setup used in the present work is described in Section 3.1. A system model based on this setup is used. This was first introduced by [@Hauge; @Mosland], cf. [@rune], and further developed by [@Sovik; @Andersen; @Hagen]. System model ------------ The system model illustrated in Figure \[block\] shows the different components included in the measurement setup as linear blocks where transfer functions relate the signal going from one block to another in the frequency domain. The system model consists of two cylindrical, 10 mm x 2 mm, Pz27 piezoelectric ceramic disks in radial mode vibration in air, where the transmitting disk, $T_x$, is coupled to the transmitting electronics (signal generator, oscilloscope and cables), and the receiving disk, $R_x$, is coupled to the receiving electronics (amplifier, filter, cables and oscilloscope). The two disks are mounted parallel (with respect to the $xy$-plane, cf. Figure \[fig:1a\]a) at a separation distance $d$ along the $z$-axis. The voltage signals $V_6(t)$ and $V_{0m}(t)$ measured at the oscilloscope are Fourier transformed as described in [@Hagen], giving the respective spectral components $V_6(f)$ and $V_{om}(f)$, where $t$ is the time and $f$ is the frequency. For these spectral components a monochromatic time dependency $e^{i\omega t}$ is assumed and suppressed. At angular frequency $\omega = 2\pi f$ $V_0(f)$ is the output voltage spectral component generated by the signal generator and $V_{0m}(f)$ is the output voltage spectral component measured in Channel 1 on the oscilloscope. $V_1(f)$ is the input voltage spectral component at the transmitting disk, $T_x$. $v_2$ is the spectral component of the particle velocity at the center of the front surface of $T_x$. $p_3$ is defined in [@Mosland] and not discussed in the current work. $p_4$ is the on-axis spectral component of the free-field pressure at the front of $R_x$. $V_5(f)$ is the output voltage spectral component at $R_x$, and $V_{5'}(f)$ is the output voltage spectral component at the amplifier. $V_6(f)$ is the input voltage spectral component measured and terminated in Channel 2 on the oscilloscope. Transfer functions ------------------ The voltage spectral components $V_6(f)$ and $V_{om}(f)$ are divided to obtain the voltage-to-voltage transfer function of the complete signal chain as defined in Equation (2.1) in [@Sovik] with the receiving electronics treated as in Equation (2.64) in [@Hagen], i.e. $$\label{H06} H_{0m6}^{VV}(f) \equiv \frac{V_6(f)}{V_{0m}(f)} = \frac{V_1(f)}{V_{0m}(f)}\cdot \frac{V_{5open}(f)}{V_{1}(f)}\cdot \frac{V_{5'}(f)}{V_{5open}(f)}\cdot \frac{V_{6}(f)}{V_{5'}(f)}.$$ The various transfer functions used in Eq. (1) are described in the following. The open-circuit voltage-to-voltage transfer function describing the sound propagation from $T_x$ to $R_x$ at lossless conditions in the air medium is defined as equation (2.20) in [@Hauge], $$\label{H15opendef} H_{15open}^{VV}(f) = |H_{15open}^{VV}(f)| e^{i\theta_{15open}} \equiv \frac{V_{5open}}{V_1},$$ where $V_{5open}$ is the open-circuit voltage at $R_x$. $|H_{15open}^{VV}(f)| $ is the magnitude and $\theta_{15open}$ the phase of this transfer function. The phase can be decomposed into a slowly varying phase and a plane wave component, cf. Equation (2.100) in [@Sovik] and Equation (2.14) in [@Andersen]. The slowly varying phase is then given by $$\label{thetaH15open} \theta_{15open}^{slow}=\theta_{15open} +kd,$$ where $k=\omega /c$ is the wave number and $c$ is the speed of sound in air. The transfer function relating the measured voltage at Channel 1 on the oscilloscope to the voltage at $T_x$, $H_{0m1}^{VV}$, is defined as equation (2.5) in [@Andersen] $$\label{H0m1} H_{0m1}^{VV}(f) = \frac{V_1(f)}{V_{0m}(f)}.$$ The transfer functions $H_{5open5}^{VV}$, describing the influence of the electrical load from cable 3 and the receiving electronics on the output voltage from $R_x$, and $H_{5'6}^{VV}$, describing the receiving electronics including cables 4 and 5, are defined as [@Hagen], $$\label{H5open5} H_{5open5'}^{VV}(f) =\frac{V_{5'}(f)}{V_{5open}(f)}$$ and $$\label{H56} H_{5'6}^{VV}(f) = \frac{V_6(f)}{V_{5'}(f)},$$ respectively. Simulated transfer function $H_{15open}^{VV}$ --------------------------------------------- The simulated lossless open-circuit transfer function $H_{15open}^{VV}$ is calculated by assuming spherical reciprocity and using the simulated far-field axial pressure $p_{ff}=p_4(z_{ff})$, where $z_{ff}=1000$ m is used, extrapolating it to the desired distance, $d$. This model assumes identical transducers and does not include losses in the medium or diffraction effects caused by the distance, $d$, being in the near-field of the transducers. The lossless open-circuit transfer function is then given as Equation (2.52) in [@Andersen], $$\label{H15opensim} H_{15open}^{VV}(f)= \frac{Z_Tp_4^2(z_{ff})2z_{ff}^2}{i\rho d f } e^{ik(2z_{ff}-d)},$$ where the input electrical impedance of $T_x$, $Z_T$, and the far-field pressure, $p_4(z_{ff})$, is simulated using finite element modelling (FEMP) [@Kochbach], and $\rho$ is the density of the medium. Measured transfer function $H_{15open}^{VV}$ -------------------------------------------- In order to obtain a lossless open-circuit transfer function, $H_{15open}^{VV}(f)$, from measurements, corrections are made for attenuation in the medium and near-field effects caused by diffraction due to the finite sizes of $T_x$ and $R_x$.The attenuation correction factor, $C_\alpha$, is found by accounting for attenuation due to the classical absorption of sound in air, $\alpha_{cl}$, rotational motion of the air molecules, $\alpha_{rot}$, vibrations of oxygen molecules, $\alpha_{vib,O}$ and vibration of nitrogen molecules, $\alpha_{vib,N}$. These are calculated according to [@SI1.26] with the theory for implementation in the system model described in [@Mosland]. The diffraction correction $C_{dif}$, is found by using a baffled piston diffraction correction factor as in [@Hauge; @Storheim; @Sovik; @Mosland; @Andersen; @Hagen], where the diffraction correction is calculated according to Khimunin’s model [@Khimunin72; @Khimunin75]. $H_{0m1}^{VV}$ and $H_{5open5'}^{VV}$ are estimated using transmission line models as proposed in [@Sovik]. $H_{5'6}^{VV}$ is found by measuring the transfer function of the receiving electronics including cables 4 and 5, by coupling the signal generator to an attenuator and then directly into the receiving electronics, bypassing the transmitting and receiving transducer completely, as in [@Hagen]. From Equation \[H06\]-\[H56\] and the corrections mentioned above, the lossless transfer function $H_{15open}^{VV}(f)$ is calculated as $$\label{H15openf} H_{15open}^{VV}(f) = \frac{H_{0m6}^{VV}(f)}{H_{0m1}^{VV}(f)H_{5open5'}^{VV}(f)H_{5'6}^{VV}(f)} C_\alpha C_{dif}.$$ Methods ======= The experimental setup has been largely kept as used by [@Sovik; @Andersen; @Hagen] with only minor changes such as the lengths of cables 4 and 5, and the different instruments having been moved due to a renovation at the lab in 2017. Experimental Setup ------------------ The two piezoelectric disks are mounted in air on positioning stages (Physik Instrumente GmbH$\&$Co, Germany). $T_x$ is connected to a PI linear positioning stage (PI M-531.DG [@MP531]), allowing movement in the z-direction, and to a PI rotational stage (PI M-037.PD [@M037]) for rotation about the $x$-axis, cf. Figure \[fig:1a\]. $R_x$ is connected to a PI linear position stage (PI M-535.22 [@MP33E]) moving in $y$-direction, and can be rotated about the $x$-axis by loosening a screw at the top of the rod it is connected to, allowing it to be turned. Two lasers, mounted on a rod, can be placed between the two disks in order to measure (i) the alignment and (ii) the distance, $d$ (cf. Figure \[fig:1a\]b). In this work the distance $d$ = 0.50 m, is used.\ An Agilent 33220A function generator is used to generate the input signal at desired voltage over the frequency range 30 - 300 kHz. The signal $V_{0m}(t)$ is then measured using a Tektronix DPO3012 digital oscilloscope. $R_x$ is connected to a Br[ü]{}el$\&$Kjær 2636 amplifier and a Krohn-Hite 3940A digital filter before the signal terminates in the Tektronix DPO3012 digital oscilloscope and $V_6(t)$ is measured. The cables used to connect the instruments (cables 2, 4 and 5) are coaxial cables of type RG-58, with lengths $l_2 = 0.280$ m, $l_4 = 0.475 $ m and $l_5 = 1.470 $ m. The cables used to connect the oscilloscope to $T_x$ and $R_x$ to the amplifier (cables 1 and 3, respectively) are coaxial cables of type RG-178 B/U, with length $l_1 = 2.970$ m and $l_3 = 2.975 $ m, respectively. For the present work the piezoelectric disk elements used are denoted elements 7 and 13, as transmitter and receiver, respectively. This is the same as used in [@Hagen], whereas [@Andersen] used elements 4 and 13, cf. the comparisons made in Section 4.2. Alignment of the transmitter, $T_x$, and receiver, $R_x$. --------------------------------------------------------- The disks are soldered onto partially twisted pairs cables, shielded with aluminium foil, mounted in a Faraday cage, cf. Figures \[lab\] and \[fig:1a\]b. The aim is to have the disks centred on the $z$-axis and place them parallel to the $xy$-plane as shown in Figure \[fig:1a\]. This is done using two high precision Keyence lasers [@Andersen], measuring differences in the + and - $z$-direction to measure the position of the disks, and the high precision translation stages from Physik Instrumente, cf. Section 3.1, to position the disks.\ Firstly the disks are roughly placed on the $z$-axis by adjusting $R_x$ in $x$- and $y$-direction so that the two laser beams point to the x marking the center on each of the disks. This mark has a finite size, so the laser is moved to the top, bottom (vertically) and side edges (horizontally) of the disks to see if these are aligned. Adjustments are made by moving $R_x$ in $x$- and $y$-direction if necessary.\ When the disks are both centred on the $z$-axis and aligned vertically and horizontally, the rotational alignment is investigated. For rotation about the $y$-axis this is done by moving the laser to the top and the bottom of $T_x$, noting the distance from the laser to the disk in both positions and subtracting them to find the difference. This is referred to as uncertainty in the alignment caused by rotation about the $y$-axis. If alignment is not satisfactory the disk is moved by a light touch at the bottom of the disk, continuously monitoring the position on the laser display until the desired deviation about the $y$-axis is acquired. This procedure is then repeated for $R_x$.\ For rotation about the $x$-axis the laser is placed on one of the furthest horizontal sides of the disk. The uncertainty in alignment is found by measuring at the two horizontal sides of the disk and subtracting the two distances to find the difference. For $T_x$ corrections are now made by using the rotation stage mentioned in Section 3.1. For $R_x$ a light touch or a screw at the top of the mounting rod allows for the rod and the disk to be rotated and is used to correct its positioning.\ The process is repeated several times, to check that corrections in one direction did not affect the deviation or uncertainty in alignment in another direction, until satisfactory alignment is achieved.\ Lastly the positioning stage in $z$-direction is used to position the front of the transmitting disk at the separation distance $z = d$ and the front face of the receiver is placed at $z = 0$. The combined standard uncertainty for the separation distance, $d$, as claimed in Section 7.1.1 in [@Andersen], is 40 $\mu$m at a coverage factor $k$ = 1. [0.31]{} ![Sketch of a) the mounting of the piezoelectric ceramic disks and b) aligning of the disks using laser.[]{data-label="fig:1a"}](Aligning "fig:"){width="0.23\paperwidth"} [0.31]{} ![Sketch of a) the mounting of the piezoelectric ceramic disks and b) aligning of the disks using laser.[]{data-label="fig:1a"}](Laserelementer "fig:"){width="0.3\paperwidth"} The small and bright red/white area on each piezoelectric disk in Figure \[fig:1a\]b shows the “footprint” of the laser beam on the disk, for a given position of the laser, at which a distance measurement is made. As described above, the laser beam is then traversing over the disk surface in a “diametrical cross formation” (in the $x$- and $y$-directions), to get a distribution of distance measurements over this cross formation. Results ======= The influence of accuracy in alignment --------------------------------------- In [@Andersen] the tolerated uncertainty in alignment of the disks in the $xy$-plane was given as 10 $\mu$m or less, whereas [@Hagen] allowed for uncertainties up to 100 $\mu$m. Therefore the effect of different alignment uncertainty is investigated by aligning the disks to different degrees of accuracy and observing how this affects the transfer function, $H_{0m6}^{VV}$. The accuracies chosen were 500 $\mu$m, 50 $\mu$m and 10 $\mu$m. The results are shown in Figure \[aligning\]. For the first two peaks, associated with the fundamental radial mode $R_1$, there is little to no change in the magnitude of the transfer function $H_{0m6}^{VV}$, for all three accuracies. At the second pair of peaks, associated with the second radial mode $R_2$, there is no noticeable change in the magnitude for alignment to the degree of 50 $\mu$m and 10 $\mu$m. However, the measurement with 500 $\mu$m uncertainty in the alignment shows a decrease in magnitude of almost 5 dB compared to the measurements with 50 $\mu$m and 10 $\mu$m misalignment. The effect of misalignment in the slowly varying phase will be investigated further in [@Grindheim]. Comparison with prior work -------------------------- Measurements of the open-circuit transfer function $H_{15open}^{VV}$ as compared to prior work [@Andersen; @Hagen] is shown in Figure \[sammen\]. Comparisons of the slowly varying phase is also of interest and will be further discussed in [@Grindheim]. It should be noted that the receiving disk used by Hagen [@Hagen] and in the present work are not the same as used by Andersen [@Andersen], and the calculation of the receiving electronics transfer function, $H_{5'6}^{VV}$, differ slightly as the filter is coupled in series after the amplifier in the present work and [@Hagen], whereas [@Andersen] coupled the filter between the input and output sections of the amplifier. The signal generator voltage settings used for measurements vary for the different frequencies, cf. [@rune]. At $R_1$ the voltage settings used are 0.1 V for the present work and 1 V for [@Andersen] and [@Hagen]. For $R_2$ the voltage settings used are 0.1 V in the present work and [@Hagen] and 1 V in [@Andersen]. For all other frequencies the voltage setting is 10 V in the current work, [@Andersen] and [@Hagen]. The frequency steps used in the present work, [@Andersen] and [@Hagen], are 300 Hz, 500 Hz and 1 kHz, respectively. In the frequency range 30 - 80 kHz the measurements in the present work reveal a clear undulation pattern, which is also present in the measurements presented in [@rune; @Hauge; @Mosland] (but not as clear in [@Andersen; @Hagen]). In [@Storheim] these are shown to be due to side radiation from $T_x$. For the magnitude of $H_{15open}^{VV}$ at the first peak associated with $R_1$, the deviations of the present work are about 4.5 and 1 dB relative to [@Andersen] and [@Hagen], respectively. For the second peak associated with $R_1$ the deviations of the present work are 1.5 and 1 dB, relative to [@Andersen] and [@Hagen]. Similarly, for $R_2$, the corresponding deviations of the present work at the first peak are 6 and 1 dB, relative to [@Andersen] and [@Hagen]. At the second peak associated with $R_2$, the deviations of the present work relative to [@Andersen] and [@Hagen] are 4 and 1 dB, respectively. The oscillations in the magnitude of the current work and [@Hagen] about 240 kHz is likely due to the switch from 10 V input voltage to 0.1 V input voltage for the $R_2$ frequency range. This will be investigated further in [@Grindheim]. With respect of the frequencies for the two peaks associated with $R_1$ and the first peak associated with $R_2$, the corresponding deviations of the present work relative to [@Andersen] and [@Hagen] are about 1 kHz, typically. At the second peak associated with $R_2$, the deviations of the present work relative to [@Andersen] and [@Hagen] are 3.5 and 2 kHz, respectively. Figure \[sammensim\] shows simulations of the magnitude and the slowly varying phase of the transfer function $H_{15open}^{VV}$, as compared to prior work [@Andersen; @Hagen], calculated using two different finite element software tools: FEMP [@Kochbach] and COMSOL [@comsol]. The same material parameters, piezoelectric disk dimensions, software (FEMP) and finite element mesh, are used for simulations in the current work and by Andersen [@Andersen]. Therefore these curves are identical, cf. Figure \[sammensim\]. The simulations done in COMSOL and FEMP by Hagen [@Hagen] differ from the current work and Andersen [@Andersen]. There is a lower magnitude found in the present work and [@Andersen] compared to [@Hagen] for the first and second peak associated with $R_1$, of about 0.3 dB and 0.7 dB, respectively. For the two peaks associated with $R_2$ the deviations are about 0.6 dB and 1 dB, respectively. There is a lower frequency for the two peaks associated with $R_1$ for the present work and [@Andersen] as compared to [@Hagen], and the differences are about 2 and 3 kHz, respectively. For the two peaks associated with $R_2$, the differences are about 3 and 5 kHz, respectively. Conclusions and further work ============================ The sensitivity of the transfer function $H_{15open}^{VV}(f)$ with respect to rotary alignment about the $y$- and $x$-axes is investigated. It is found that a rotary misalignment less than 50 $\mu$m does not significantly influence on $|H_{0m6}^{VV}(f)|$. However a rotary misalignment $\approx$ 500 $\mu$m reduces $|H_{0m6}^{VV}(f)|$ significantly, especially for $R_2$, at which there is a decrease of approximately 5 dB.\ Comparisons with prior experimental measurements show some deviations from [@Andersen] and [@Hagen]. The largest deviations are found in the first peak associated with $R_1$ and at the two peaks associated with $R_2$. For $R_2$ an input voltage of 1 V was applied by [@Andersen], whereas [@Hagen] used 0.1 V, as in the current work. The low voltage of 0.1 V at $R_2$ and $H_{5'6}^{VV}(f)$ as defined in [@Hagen] may explain some of the deviations and will be further investigated in [@Grindheim].\ Comparisons with prior simulations [@Andersen; @Hagen] show deviations from [@Hagen]. Both higher frequency for the four peaks of $R_1$ and $R_2$ (2, 3, 3 and 5 kHz, respectively) and larger magnitude at $R_2$ (0.6 and 1 dB, for the two peaks) are observed in the simulations of [@Hagen] as compared the current work and [@Andersen]. The simulations by [@Hagen] using FEMP and COMSOL show some deviation, especially above $R_2$. The material data, the dimensions of the simulated piezoelectric disk elements chosen and the finite element mesh chosen may contribute to the observed deviations. This will be investigated further in [@Grindheim]. Acknowledgements ================ The present work is part of an ongoing master work on the sound field and measurement system modelling using piezoelectric elements vibrating in air, due by June 2019 [@Grindheim]. The following persons are acknowledged for guidance and assistance: Espen Storheim, Andreas Hagen, Magnus Rentch Ersdal and Kenneth K. Andersen.
Misty Brooder Like many have done, I am using a plastic tote for my brooder box. For my litter, I have been using reptile terrarium sand. My heater is a combination of sitting in front of the fireplace, and a reptile heat lamp. My food/water dishes are the ones that come with the TSC chick starter kit - just regular yellow plastic things. The chicks seem to love the sand. They scratch and take dust baths. It's very easy to clean (I use another reptile terrarium product, a scoop that looks a little like a kitty litter scoop but more meshy). The chicks are happy and active, and starting to get big girl feathers and getting larger at a nice rate, so all in all I think I did a pretty good job with my first brooder. The chicks are now 2 weeks old. I just recently moved them to a larger tote, the problem did not exist before this - but nothing has changed in their box other than size. But here's my concern: It's getting misty. There is moisture on the walls of my chickerrarium. The "cause" is definitely a combination of the heat and the water dish and all that sciencey evaporation water cycle stuff. Is this going to harm them? It isn't raining down the sides, but there is enough moisture that when they rub against the side, their feathers will become damp. The damp feathers would definitely be a problem if they were cold. But the damp is caused by the heat. If I made the ventilation larger on the top it would probably reduce the misting, but that would also make heat escape... Is this a "problem" that needs to be "fixed"? Open the top up. Warm + damp = perfect conditions for bacteria and mold to flourish. Ick. As long as they have a warming place and draft protection, the rest of the brooder can be cool or even cold. Really.
Cho Won-woo Cho Won-woo (born April 8, 1971) is a South Korean professional baseball manager of the Lotte Giants of Korea Baseball Organization. References External links Career statistics and player information at Korea Baseball Organization official website Category:1971 births Category:Living people Category:Doosan Bears coaches Category:Hanwha Eagles coaches Category:Hanwha Eagles players Category:KBO League outfielders Category:Lotte Giants coaches Category:Lotte Giants managers Category:Nippon Professional Baseball coaches Category:SK Wyverns players Category:South Korean baseball coaches Category:South Korean baseball managers Category:South Korean baseball players Category:South Korean expatriate baseball people in Japan Category:Sportspeople from Busan Category:Ssangbangwool Raiders players
General relativity is untheoretical, can be comprehended with ease by young persons, and is easily depicted by young kids in a play, drawing, or other depiction. Steps Part 1 Making the props 1 Make the following items out of cardboard to a size appropriate for the audience. If done from a stage, it will need to be large enough for the end row of the audience to see clearly. For the classroom, you can make smaller items and may also be able to use digital projections. Another alternative is to make costumes for the actors but this may take longer and be a lot harder to look accurate. 2 Draw a blue Earth on cardboard. Cut it out and paint it with poster paints or watercolors. 3 Draw the Sun on cardboard. Cut it out and paint it yellowy-orange. 4 Draw a spaceship. The shuttle is a good choice. Have the spaceship contain a young person, obviously peeking out from the cargo bay area of the shuttle. Cut it out and paint it. 5 Draw a large black dot on cardboard. This will serve as the black hole. It should be placed on a bright background, so that it's easily noticeable early on. Use colored card behind it to help with this. Cut it out and paint the black hole black and if you haven't used colored card, paint some red or orange behind the black hole to illuminate it. 6 Organize lighting effects. Or, simply be ready to switch off the lights at one end of the stage or room. If this isn't possible, use a lamp near the Earth end, that gets switched off and perhaps a black sheet to carry over the Earth and Sun when needed. Part 2 Enacting the scenario of general relativity 1 Have child actors hold the various pieces. Arrange the Earth such that it is on the left. Next place the Sun. Put the shuttle in the forefront. Place the black hole to the right. In summary, the positions from left to right are: Earth, Sun, shuttle, black hole. 2 Have the shuttle leaving Earth, headed towards the black hole but not near it yet. This will start off by being at normal speed, but strange things will happen as it nears the black hole. Keep the actor moving toward the black hole. As the shuttle nears the black hole, have the shuttle holding actor come to a stop and freeze. This is a true, accurate observation from Earth. An actor portraying a viewer from Earth can make a statement along the lines of "I saw the shuttle moving from Earth but now it seems to have stopped completely as it gets near the black hole." 3 Change the focus using light, a signal or an adult (narrator) redirecting attention. This time, the viewpoint should be from the actor holding the space shuttle. Have the actor turn and pretend to eat a sandwich while looking back at Earth. For this perspective, the Earth should be spinning fast (cue the Earth actor to spin the Earth model, not the actor). In the background, have the Cosmos, Earth and Sun grow old, depicted by fading to black (cue the lighting or black sheet), all while the actor still eats the sandwich (make sure that the actor does not finish it). 4 Offer an explanation. The narrator of this play can explain that time is set aside and frozen near black holes. Reveal how special relativity is the same effect, from moving near light speed. Also explain that, from the astronaut's view near the black hole, though frozen in time, they too witness this speeding up of Earth, Sun, even watching the Universe fade to black, before finishing the sandwich. If time permits, figure out how to depict the Earth orbiting the Sun faster than once a year. It spins like a top, if you can make a prop do that. If time permits, (this can be presented inside of thirty seconds), explain how each person's cellphone uses GPS, and measures Earth bending space-time. On the roof of your house, there is less warped time (dilated) (bent) but at ground level, there is more bending. Time passes more quickly near something heavy. A black hole is very, very, heavy, compacting the Earth to a golf ball size could create a black hole. Also point out that leaving Earth at near the speed of light makes time do the same thing––the astronaut goes near light speed, eating a sandwich, and the entire Earth, Sun, Cosmos, fade away and lose energy, getting dark. If time permits, create a pre-play which shows how GPS works and is in everyone's pockets, how the Earth squashes time just as the black hole does, but less, so the nearer to Earth, the more time is squashed (or dilated). 5 Treat this as a learning opportunity that encompasses art, drama, creativity, science, comprehension and participation. It is simply Newtonian physics, not a huge challenge, and when broken down in this way, it's also a lot of fun for the kids. They can, in turn, help their parents to see that this is not difficult at all. Follow up afterward with questions and answers, and perhaps distribute some visually appealing fact sheets for memory prompts. Community Q&A If this question (or a similar one) is answered twice in this section, please click here to let us know. Tips Many are quick to try to teach the written math, to reveal relativity. This is not needed, and doing it from this perspective too early on can create a giant stumbling block and put the kids off science. Instead, use glue, cardboard and paint and a sense of adventure to turn it into fun and easy learning. Create some fact sheets or pictorial diagrams to help the children learn more and to have something to stick in their notebooks. Why is it important to present general relativity in this way? Apart from it being easier to comprehend, many kids are pre-programmed to misunderstand what time is––basically, a very inadequate means of measuring duration––and the scientists of tomorrow are the ones who need to be free of this pre-programming. In general, nobody explains as early as first grade how simple this is to grasp. Break the explanations down into the recognizable and the simple. While there are volumes of things to explain afterwards, such as how GPS works and why it matters, etc., at least the kids know what a cell phone is and can relate to it even if understanding what eternity is, or what black holes are, is too much for them at this point in their learning. Warnings Spin the Earth, not the kid, to show time passing. If the image were released and shown to quickly orbit (front and back) with strings, operated offstage, this would avoid distraction and dizziness. Some argue that there is no proof of black holes, but this shows an extreme unwillingness to be apprised of the facts. Professor Andrea Ghez, UCLA, has imaged, shown, recorded video, of suns (stars) orbiting our Milky Way black hole. The time is now to tell what is happening now, and to avoid wrongly educating kids about general (heavy dilates time) and special (speed dilates time) relativity.
Q: ~85.5% of native code when profiling with Jet Brain's dotTrace? Whenever I do a session (both samplig and timeline), it says like up to 70-80 percent of entire exuction is occupied by native code. It seems kind of suspicious, not quite sure whether I got a buggy environment (because due to objective restricitions I am working on a damn Windows 7) or it's actually fine? A: It is a normal situation in case of profiling a web application hosted on IIS as IIS is a native application itself. So if all of your app's methods are presented in a snaphot then you have nothing to worry about. See this page for details: https://www.jetbrains.com/help/profiler/Profile_ASP_Web_Site.html ("Note that it is normal that the snapshots contain large amount of native code")
Tomgram: Engelhardt, This Can't End Well [Note for TomDispatch readers: The 23,000 of you who get email notices whenever a new piece is posted, as well as the tens of thousands who bookmark TD or read its pieces reposted elsewhere, can support this site by encouraging new readers to sign on. TomDispatch spreads mainly thanks to word of mouth, a formidable force in the online world. For those of you already hooked, I urge you to lend the site a little more of that word-of-mouth power. I hope you'll consider putting together a modest list of friends, colleagues, relatives, or, for that matter, people you like to argue with who might benefit from getting TomDispatch regularly. You could urge them to go to the "subscribe" window to the right of the main screen, put in their e-mail addresses, hit “submit,” answer the confirmation letter that will quickly arrive in email boxes (or, fair warning, spam folders), and join the TD crew. Many thanks in advance for your efforts. Tom] Sleepwalking into the Imperial Dark What It Feels Like When a Superpower Runs Off the Tracks By Tom Engelhardt This can’t end well. But then, how often do empires end well, really? They live vampirically by feeding off others until, sooner or later, they begin to feed on themselves, to suck their own blood, to hollow themselves out. Sooner or later, they find themselves, as in our case, economically stressed and militarily extended in wars they can’t afford to win or lose. Historians have certainly written about the dangers of overextended empires and of endless war as a way of life, but there’s something distant and abstract about the patterns of history. It’s quite another thing to take it in when you’re part of it; when, as they used to say in the overheated 1960s, you’re in the belly of the beast. I don’t know what it felt like to be inside the Roman Empire in the long decades, even centuries, before it collapsed, or to experience the waning years of the Spanish empire, or the twilight of the Qing dynasty, or of Imperial Britain as the sun first began to set, or even of the Soviet Empire before the troops came slinking home from Afghanistan, but at some point it must have seemed at least a little like this -- truly strange, like watching a machine losing its parts. It must have seemed as odd and unnerving as it does now to see a formerly mighty power enter a state of semi-paralysis at home even as it staggers on blindly with its war-making abroad. The United States is, of course, an imperial power, however much we might prefer not to utter the word. We still have our globe-spanning array of semi-client states; our military continues to garrison much of the planet; and we are waging war abroad more continuously than at any time in memory. Yet who doesn’t sense that the sun is now setting on us? Not so many years ago, we were proud enough of our global strength to regularly refer to ourselves as the Earth’s “sole superpower.” In those years, our president and his top officials dreamed of establishing a worldwide Pax Americana, while making speeches and issuing official documents proclaiming that the United States would be militarily “beyond challenge” by any and all powers for eons to come. So little time has passed and yet who speaks like that today? Who could? A Country in Need of Prozac Have you noticed, by the way, how repetitiously our president, various presidential candidates, and others now insist that we are “the greatest nation on Earth” (as they speak of the U.S. military being “the finest fighting force in the history of the world”)? And yet, doesn’t that phrase leave ash in your mouth? Look at this country and its frustrations today and tell me: Does anyone honestly believe that anymore? It wasn’t a mistake that the fantasy avenger figure of Rambo became immensely popular in the wake of defeat in Vietnam or that, unlike American heroes of earlier decades, he had such a visibly, almost risibly overblown musculature. As eye-candy, it was pure overcompensation for the obvious. Similarly, when the United States was actually “the greatest” on this planet, no one needed to say it over and over again. Can there be any question that something big is happening here, even if we don’t quite know what it is because, unlike the peoples of past empires, we never took pride in or even were able to think of ourselves as imperial? And if you were indeed in denial that you lived in the belly of a great imperial power, if like most Americans you managed to ignore the fact that we were pouring our treasure into the military or setting up bases in countries that few could have found on a map, then you would naturally experience the empire going down as if through a glass darkly. Nonetheless, the feelings that should accompany the experience of an imperial power running off the rails aren’t likely to disappear just because analysis is lacking. Disillusionment, depression, and dismay flow ever more strongly through the American bloodstream. Just look at any polling data on whether this country, once the quintessential land of optimists, is heading in “the right direction” or on “the wrong track,” and you’ll find that the “wrong track” numbers are staggering, and growing by the month. On the rare occasions when Americans have been asked by pollsters whether they think the country is “in decline,” the figures have been similarly over the top. It’s not hard to see why. A loss of faith in the American political system is palpable. For many Americans, it’s no longer “our government” but “the bureaucracy.” Washington is visibly in gridlock and incapable of doing much of significance, while state governments, facing the “steepest decline in state tax receipts on record,” are, along with local governments, staggering under massive deficits and cutting back in areas -- education, policing, firefighting -- that matter to daily life. Years ago, in the George W. Bush era, I wanted to put a new word in our domestic political vocabulary: “Republican’ts.” It was my way of expressing the feeling that something basic to this country -- a “can do” spirit -- was seeping away. I failed, of course, and since then that “can’t do” spirit has visibly spread far beyond the Republican Party. Simply put, we’re a country in need of Prozac. Facing the challenges of a world at the edge -- from Japan to the Greater Middle East, from a shaky global economic system to weather that has become anything but entertainment -- the United States looks increasingly incapable of coping. It no longer invests in its young, or plans effectively for the future, or sets off on new paths. It literally can’t do. And this is not just a domestic crisis, but part of imperial decline. We just don’t treat it as such, tending instead to deal with the foreign and domestic as essentially separate spheres, when the connections between them are so obvious. If you doubt this, just pull into your nearest gas station and fill up the tank. Of course, who doesn’t know that this country, once such a generator of wealth, is now living with unemployment figures not seen since the Great Depression, as well as unheard of levels of debt, that it’s hooked on foreign energy (and like most addicts has next to no capacity for planning how to get off that drug), or that it’s living through the worst period of income inequality in modern history? And who doesn’t know that a crew of financial fabulists, corporate honchos, lobbyists, and politicians have been fattening themselves off the faltering body politic? And if you don’t think any of this has anything to do with imperial power in decline, ask yourself why the options for our country so often seem to have shrunk to what our military is capable of, or that the only significant part of the government whose budget is still on the rise is the Pentagon. Or why, when something is needed, this administration, like its predecessor, regularly turns to that same military. Once upon a time, helping other nations in terrible times, for example, would have been an obvious duty of the civil part of the U.S. government. Today, from Haiti to Japan, in such moments it’s the U.S. military that acts. In response to the Japanese triple disaster of earthquake, tsunami, and nuclear meltdown, for instance, the Pentagon has mounted a large-scale recovery effort, involving 18,000 people, 20 U.S. Navy ships, and even fuel barges bringing fresh water for reactor-cooling efforts at the Fukushima Daiichi nuclear complex. The effort has been given a military code name, Operation Tomodachi (Japanese for “friend”), and is, among other things, an obvious propaganda campaign meant to promote the usefulness of America’s archipelago of bases in that country. Similarly, when the administration needs something done in the Middle East, these days it’s as likely to send Secretary of Defense Robert Gates -- he recently paid official visits to Bahrain, Saudi Arabia, Iraq, and Egypt -- as Secretary of State Hilary Clinton. And of course, as is typical, when a grim situation in Libya worsened and something “humanitarian” was called for, the Obama administration (along with NATO) threw air power at it. Predictably, as in Afghanistan and the Pakistani borderlands, air power failed to bring about speedy success. What’s most striking is not that Libyan ruler Muammar Gaddafi didn’t instantly fall, or that the Libyan military didn’t collapse when significant parts of its tank and artillery forces were taken out, or that the swift strikes meant to turn the tide have already stretched into more than a month of no-fly zone NATO squabbling and military stalemate (as the no-fly zone version of war against Saddam Hussein’s Iraq stretched to 12 years without ultimate success). Imperially speaking, two things are memorable about the American military effort in Libya. First, Washington doesn’t seem to have the conviction of what’s left of its power, as its strange military dance in (and half-out of) the air over that country indicates. Second, even in the military realm, Washington is increasingly incapable of drawing lessons from its past actions. As a result, its arsenal of potential tactics is made up largely of those that have failed in the recent past. Innovation is no longer part of empire. The Uses of Fear From time to time, the U.S. government’s “Intelligence Community“ or IC musters its collective savvy and plants its flag in the future in periodic reports that go under the generic rubric of “Global Trends.” The last of these, Global Trends 2025, was prepared for a new administration taking office in January 2009, and it was typical. In a field once left to utopian or dystopian thinkers, pulp-fiction writers, oddballs, visionaries, and even outright cranks, these compromise bureaucratic documents break little ground and rock no boats, nor do they predict global tsunamis. Better to forecast what the people you brief already believe, and skip the oddballs with their strange hunches, the sorts who might actually have a knack for recognizing the shock of the future lurking in the present. As group efforts, then, these reports tend to project the trends of the present moment relatively seamlessly and reasonably reassuringly into the future. For example, the last time around they daringly predicted a gradual, 15-year soft landing for a modestly declining America. ("Although the United States is likely to remain the single most powerful actor, [the country's] relative strength -- even in the military realm -- will decline and U.S. leverage will become more constrained.") Even though it was assumedly being finished amid the global meltdown of 2008, nothing in it would have kept you up at night, sleepless and fretting. More than 15 years into the future, our IC could imagine no wheels falling off the American juggernaut, nothing that would make you wonder if this country could someday topple off the nearest cliff. Twists, unpleasant surprises, unhappy endings? Not for this empire, according to its corps of intelligence analysts. And the future being what it is, if you read that document now, you’d find none of the more stunning events that have disrupted and radically altered our world since late 2008: no Arab lands boiling with revolt, no Hosni Mubarak under arrest with his sons in jail, no mass demonstrations in Syria, no economies of peripheral European countries imploding down one by one, nor a cluster of nuclear plants in Japan melting down. You won’t find once subservient semi-client states thumbing their noses at Washington, not even in 2025. You won’t, for example, find the Saudis in, say 2011, openly exploring deeper relations with Russia and China as a screw-you response to Washington’s belated decision that Egyptian autocrat Hosni Mubarak should leave office, or Pakistani demands that the CIA and American special operations forces start scaling back activities on their turf, or American officials practically pleading with an Iraqi government it once helped put in power (and now moving ever closer to Iran) to please, please, please let U.S. troops stay past an agreed-upon withdrawal deadline of December 31, 2011, or Afghan President Hamid Karzai publicly blaming the Americans for the near collapse of his country’s major bank in a cesspool of corruption (in which his own administration was, of course, deeply implicated). Only two-plus years after Global Trends 2025 appeared, it doesn’t take the combined powers of the IC to know that American decline looks an awful lot more precipitous and bumpier than imagined. But let’s not just blame our intelligence functionaries for not divining the future we’re already in. After all, they, too, were in the goldfish bowl, and when you’re there, it’s always hard to describe the nearest cats. Nor should we be surprised that, like so many other Americans, they too were in denial. After all, our leaders spent years organizing their version of the world around a “Global War on Terror,” when (despite the 9/11 attacks) terror was hardly America’s most obvious challenge. It proved largely a “war” against phantoms and fantasies, or against modest-sized ragtag bands of enemies -- even though it resulted in perfectly real conflicts, absolutely genuine new bases abroad, significant numbers of civilian dead, and the expansion of a secret army of operatives inside the U.S. military into a force of 13,000 or more operating in 75 countries. The spasms of fear that coursed through our society in the near-decade after September 11, 2001, and the enemy, “Islamic terrorism,” to which those spasms were attached are likely to look far different to us in retrospect. Yes, many factors -- including the terrifyingly apocalyptic look of 9/11 in New York City -- contributed to what happened. There was fear’s usefulness in prosecuting wars in the Greater Middle East that President Bush and his top officials found appealing. There was the way it ensured soaring budgets for the Pentagon and the national security state. There was the way it helped the politicians, lobbyists, and corporations hooked into a developing homeland-security complex. There was the handy-dandy way it glued eyeballs to a one-event-fits-all-sizes version of the world that made the media happy, and there was the way it justified ever increasing powers for our national security managers and ever lessening liberties for Americans. But think of all that as only the icing on the cake. Looking back, those terror fears coursing through the body politic will undoubtedly seem like Rambo’s muscles: a deflection from the country’s deepest fears. They were, in that sense, consoling. They allowed us to go on with our lives, to visit Disney World, as George W. Bush urged in the wake of 9/11 in order to prove our all-American steadfastness. Above all, even as our imperial wars in the oil heartlands of the planet went desperately wrong, they allowed us not to think about empire or, until the economy melted down in 2008, decline. They allowed us to focus our fears on “them,” not us. They ensured that, like the other great imperial power of the Cold War era, when things began to spiral out of control we would indeed sleepwalk right into the imperial darkness. Now that we’re so obviously there, the confusion is greater than ever. Theoretically, none of this should necessarily be considered bad news, not if you don’t love empires and what they do. A post-imperial U.S. could, of course, be open to all sorts of possibilities for change that might be exciting indeed. Right now, though, it doesn’t feel that way, does it? It makes me wonder: Could this be how it’s always felt inside a great imperial power on the downhill slide? Could this be what it’s like to watch, paralyzed, as a country on autopilot begins to come apart at the seams while still proclaiming itself “the greatest nation on Earth”? I don’t know. But I do know one thing: this can’t end well. Tom Engelhardt, co-founder of the American Empire Project, runs the Nation Institute's TomDispatch.com. His latest book is The American Way of War: How Bush’s Wars Became Obama’s (Haymarket Books). Copyright 2011 Tom Engelhardt
Bimini Christmas 2014 SpearViews Back in March of 2010 I enrolled in and completed the FIILevel One freediving course. I was extremely happy with the course content and the outcome (check out the SpearView). Unfortunately for me, I'm not a professional freediver, so as with... Hot on the heels of my review of the GoPro Hero2, I felt I would be remiss if I didn't follow up with a review of the case that resolves the one (and only one in my opinion) flaw in the Hero2 design, it's underwater focus (or lack thereof) flaw. You see, as I wrote about in the... Throughout my relatively short history in spearfishing (as of this writing), I have only used a few different spearguns. Now obviously, my opinion in this matter is not one of extreme trial and error. Mostly it consists of recommendations made to me by those I spearfish with along with some of my own common sense. In the beginning (early 1990's), I... I finally jumped on the HD bandwagon and bought myself a Hero2 HD digital camera by GoPro. These little beauties have been around for quite a while now so hearing about them isn't exactly news. But since I finally got around to purchasing one for myself and it happens to be that the Hero2 is the biggest leap... SpearBlogs Seas: 2-4' Winds: 10-15 SSE Viz: 30-45' Temp: 84F After having endured 11 straight days of high wind and rough seas which rendered only 1 barely worthwhile dive for me, this past week was my brother in law's shot at an extended diving stay. Luckily for him, the weather was... So for the third year in a row, we begin to plan our annual guys spearfishing trip to the Bahamas in April via What's App. The group is put together and the messages start to fly with talk about the... Seas: 2-4' Winds: 10-20 ESE Viz: 20-45' Temp: 78F It was a little upsetting for me to realize as I sat down to compose this week's blog that I hadn't even gotten around to composing my usual "Foreward" blog at the beginning of this year. It was even... Seas: 1-2 feet Winds: 5-10 S/SE Viz: 40 feet Temp: 84 F After hearing from my brother in law all week how incredible the weather had been (SOB even sent me pictures), it was finally Friday and time for me to get back down there...
Wednesday, August 31, 2016 A tranche of some 2500 Internal documents, mostly Microsoft Word, Excel, and Power Point files, as well as pdf files, from George Soros’s Open Society Foundation (OSF) network of non-governmental organizations, which were obtained from the group "DC Leaks," shows that Soros and his advisers lorded over US policy toward Ukraine after the 2014 coup supported by Soros and the Obama administration ousted the democratically-elected Ukrainian president Viktor Yanukovych and his government. The leaked Soros documents describe how the OSF and Soros’s International Renaissance Foundation (IRF), based at 46 Artema Street in Kiev, worked with the US State Department after the 2014 so-called "Euromaidan" themed revolution to ensure that a federalized Ukraine was not in the picture. In addition to George Soros (identified as "GS" in the leaked OSF documents, others involved in the Ukrainian coup planning included US ambassador to Kiev Geoffrey Pyatt; David Meale (Economic Counselor to Pyatt); Lenny Benardo (OSF); Yevhen Bystrytsky (Executive Director, IRF); Oleksandr Sushko (Board Chair, IRF); Ivan Krastev (Chairman, Centre for Liberal Studies, a Soros and US government-influenced operation in Sofia, Bulgaria); Sabine Freizer (OSF); and Deff Barton (Director, US Agency for International Development (USAID), Ukraine). USAID is a conduit for the Central Intelligence Agency. Soros was present at a post-coup meeting on March 21, 2014 that involved US support for the "New Ukraine." One document describes the "New Ukraine" as a key measure to "reshapes the European map by offering the opportunity to go back to the original essence of European integration." Soros pushed for sanctions against Russia for refusing to recognize the coup-installed government headed by Arseniy Yatsenyuk, which included neo-Nazis, and rejected a federalized Ukraine that would grant self-government to the Russian-speaking eastern Donbass region. Obama with poodle "Yats" In effect, Soros vetoed a proposal by Pyatt to negotiate a proposal made by Russian Foreign Minister that would grant autonomy to eastern Ukraine within a federalized Ukraine. Soros rejected the proposal because he believed it would grant Russia too much influence in Ukraine. Although Assistant Secretary of State for European and Eurasian Affairs Victoria Nuland did not attend the March 21 meeting, she remained close to Pyatt and Yatsenyuk, who she affectionately called "Yats." In the end, the Obama administration rejected a federalized Ukraine and gave its full support to the unilateralism of Ukrainian president Petro Poroshenko and his puppet master Soros. The vile Victoria "Fuck the EU" Nuland, Pyatt and Kerry with Poroshenko It should be of no surprise that earlier this year, Pyatt was moved from Kiev as ambassador to Athens. One Soros document calls for the need to combat "Russlandversteher," German for "Russia understanding," throughout Europe, particularly in Greece with its history of close cultural and religious relations with Russia. The Soros OSF document calls for a concerted effort in Greece to influence public opinion against Russia and for the Ukrainian coup government. Proposed is an anti-Russian and pro-Ukrainian propaganda operation directed against newspapers, ten "audiovisual outlets" (TV and radio), six Internet sites in Greece, and "about 50 opinion leaders" present on Greek social networks. Greek newspapers targeted for participation in the Soros anti-Russia campaign included "Kathimerini, Avgi, Ta Nea, Vima, Efymerida Syntakton, Eleutherotypia, Proto Thema, and Rizospastis." The Greek-Russian Chamber of Commerce in Athens was also targeted for inclusion in the Soros propaganda operation. Similar anti-Russian and pro-Ukrainian coup government media influence operations were proposed for Italy, Spain, and France. The reasoning was to counter any movement to support the status quo ante in Ukraine by the SYRIZA, Podemos, and Five Star Movement parties in Greece, Spain, and Italy, respectively. This Soros strategy was referred to as "debate mapping." While looking to influence Greek policy on Ukraine, Soros and his NGO gang pushed for European Union enlargement to include Ukraine and Turkey, neither country’s accession to the EU being in the interests of any of the EU’s member states. High priority was also given to integrating Moldova into EU structures. The overall theme of many of the Soros documents is that lying at the heart of "Russlandversteher" is "anti-American" feelings in Europe. European trade unions are singled out by the Soros gang as being at the heart of "anti-American" opinions in Europe. Certain political parties are also singled out, including the National Front of France, Jobbik of Hungary, the Netherlands Party of Freedom (PVV), and the UK Independence Party (UKIP), and are referred to by Soros as the "PRR," or "populist radical right." Pro-Russian German politicians are named in the Soros documents and they include former Chancellors Gerhard Schröder, Helmut Kohl, and Helmut Schmidt; Brandenburg Minister-President Matthias Platzeck; Die Linke leaders Gregor Gysi, Sahra Wagenknecht, and Katja Kipping, and former Hamburg mayor Klaus von Dohnanyi. Soros, who cut his teeth as a teen in Hungary cooperating with the Nazi Gestapo and Hungarian fascist Arrow Cross, prefers to maintain "hit lists" containing the names of his opponents. It is the degree to which Soros provided finances, logistics, and other support to the Ukrainian coup plotters in 2012, two years before the Euromaidan uprising, that is noteworthy. OSF and its affiliates provided entire buildings, office space, computers, software, broadband Internet, videoconferencing equipment, vehicles, travel to the United States, and other material for the Euromaidan uprising. This was all done with the cooperation of the US and Swedish embassies in Kiev, USAID, the Carnegie Endowment, the Swedish International Development Agency (SIDA), and the Central Intelligence Agency-linked National Endowment for Democracy (NED). Investigative journalists were also sought by the Soros gang to travel to Ukraine and submit articles that had to be approved by Soros operatives before publication. One major collaborator of Soros and the United States in pushing Ukrainian propaganda was identified as the Hromadske Television, which was singled out for its work to counter "Russian propaganda." One Soros document contains the following recommendation: "Select journalists from the 5 target countries (Germany, France, Spain, Italy, Greece) and offer them long stay reporting trips in Ukraine. Rather than specify what they should write about they should make suggestions for articles; we retain a veto on stories we think are counterproductive. Suggestion that we liaise directly with journalists to determine interest." The Soros document even concedes that such as approach is not "proper independent journalism and we may damage our credibility with journalists." Soros’s people proposed a "firewall" between Soros and journalists reporting on Ukraine. Soros’s organization proposed that "a third party would receive the grant and act as the intermediary, editor, quality control etc. IRF [International Renaissance Foundation] should play a more lead role in this initiative to emphasize its Ukraine origins." The Soros organization decided to pursue "PIJ," or "public interest journalism" outlets for a cooperative propaganda dissemination relationship regarding Ukraine. There are a number of journalists around the world who have sold their journalistic professional credentials and credibility to the devil and have willingly accepted paychecks from Soros in order to disseminate his and the CIA’s propaganda. One such outlet that is cited as carrying Soros’s water is Huffington Post-Germany, which is identified as a collaborator of Burda, a center-right publishing house in Germany. Other German publications that Soros favorably viewed as pushing the anti-Russian line on Ukraine included Frankfurter Allgemeine Zeitung, Frankfurter Rundschau, Die Welt, Süddeutche Zeitung, Tageszeitung, Spiegel, and Junge Welt. Coming in for criticism by Soros was Neues Deutschland and Freitag, cited as being too friendly to Russia and anti-Ukraine. The Soros documents identify a columnist for the Swiss paper Neue Zürcher Zeitung as receiving Soros money to hire a "research assistant" to promulgate pro-Ukraine propaganda. Others on Soros’s anti-Russia payroll and who authored Ukraine propaganda articles included researchers with the Barcelona Institute of International Studies, Chatham House in London, and the Istituto Affari Internazionali in Italy. Propaganda memes cited by Soros’s gang included expelling Russia from the G8, NATO military support and NATO membership for Ukraine, and sanctions against Russia. A Confidential March 12, 2015, Soros document reveals that the anti-Russian former NATO military commander and close friend of Bill and Hillary Clinton, Wesley Clark, in addition to Polish General Waldemar Skrzypczak, advised Poroshenko on military matters regarding Russia. The document cites Soros as the "self-appointed advocate of the New Ukraine." Soros is one of the closest advisers and financiers of Hillary Clinton. The leaked Soros documents describe how the Clinton Global Initiative and Soros Foundation cooperates on undermining the sovereignty of nations around the world, including those in Europe. And that relationship should weigh heavily on every American voter on November 8. Wayne Madsen Wayne Madsen Investigative journalist, author and syndicated columnist, Madsen has over twenty years experience in security issues. As a U.S. Naval Officer, he managed one of the first computer security programs for the U.S. Navy. Madsen has been a frequent political and national security commentator on Fox News and has also appeared on ABC, NBC, CBS, PBS, CNN, BBC and MS-NBC. He has been invited to testify as a witness before the US House of Representatives, the UN Criminal Tribunal for Rwanda, and an terrorism investigation panel of the French government. A member of the Society of Professional Journalists (SPJ) and the National Press Club, Madsen is based and reports from Washington, D.C. We have already discussed in the first part of this analysis how the American geography dooms whoever controls the territory to being a global power, but there are a number of other outcomes that shape what that power will be like. The first and most critical is the impact of that geography on the American mindset. This e-mail outlines and confirms the acts of espionage against Indonesia and Indonesians by Akiko Makino and the others involved both in Kobe University and in AI Lab at University of Airlangga, Surabaya; Bahasa Indonesia original follows English translation... The 5th Estate has just purchased a library on H5N1 "Novel" virus pandemics, there are dozens of PDF and Exel documents we feel will assist you in saving lives following intentional releases of the H5N1 and now MERS viruses; we will begin by printing those that appear to be extremely relevant here: H5N1 Kobe-Kawaoka-Ernala series continues soon with more "Smoking Gun" e-mails from Teridah Ernala to The 5th Estate . . .
"In curing, we are trying to get somewhere, we are looking for answers. In curing, our efforts are specifically designed to make something happen. In healing, we live questions instead of answers. We hang out in the unknown. We trust the emergence of whatever will be. We trust the insight will come. The challenge in medicine is not the choice between one and the other. We need both." -Dr. Paul Epstein, ND Weekly Health Tip Cold and Flu Season Preventative By our Clinical Herbalist and Aromatherapist Marija Helt, PhD My favorite herbal formula for cold and flu preventative. I use this blend at the first sign of illness, when exposed to someone with a cold and when flying. In this latter case, I take the herbs the day before travel, the day of and for a day or 2 afterwards. The formula varies a bit, depending on what I have on hand. It can be easily put together using commercial tinctures. I'll take a squirt every half hour if I feel an infection coming on, or 4 or so times a day if exposed to someone sick or if traveling. The blend can also be done as a tea, in which case I brew a quart and sip it all day. Cold & Flu Blend 1 part Elderberry or flower 1 part Echinacea or Mallow 1 part Thyme or Oregano
87 F.Supp.2d 140 (2000) Anne RAPKIN, Plaintiff, v. Arthur J. ROCQUE, Jr., in his individual and official capacity; Sidney J. Holbrook, in his individual and official capacity; and Jane K. Stahl, in her individual and official capacity, Defendants. No. 3:99 CV 1928(GLG). United States District Court, D. Connecticut. March 6, 2000. Ruth L. Pulda, Livingston, Adler, Pulda & Meiklejohn, Hartford, CT, for Plaintiff. Carla R. Walworth, Mary C. Dollarhide, Sarah Elizabeth Graves, Joshua D. Goodman, Peter M. Schultz, Neil B. Stekloff, Paul, Hastings, Janofsky & Walker, Stamford, CT, Ralph G. Elliot, Tyler Cooper & Alcorn, Hartford, CT, for Defendants. MEMORANDUM DECISION GOETTEL, District Judge. Plaintiff, who is Chief Legal Counsel for the State of Connecticut Department of Environmental Protection, has sued her superiors in that Department, claiming *141 that, acting under color of state law, they deprived her of her First Amendment rights to free speech and to seek judicial redress without retaliation, in violation of 42 U.S.C. § 1983, in connection with various disputes she had with them concerning her advice to the Department of Environmental Protection. It is apparent that underlying this suit are disagreements between the parties concerning environmental matters where the Department has rejected Plaintiff's advice. As Chief Legal Counsel of the Department, Plaintiff is required to give legal advice and to assist the staff on matters relating to enforcement orders and civil penalties and to make recommendations regarding agency program proposals. She also gives advice specifically on matters for adjudication by the Department, including contested matters, settlement of claims, and the assessment of civil penalties. When Plaintiff filed her complaint, she filed a redacted complaint openly and a sealed complaint that contained three subparagraphs, which, according to Plaintiff, "delineate[] certain instances of the Plaintiff giving legal advice or a legal opinion or interpretation" and which "referenced the surrounding circumstances of the communication." (Pl.'s Mot. to File Unredacted Compl. Under Temp. Seal at 2.) Plaintiff moved at that time to file the unredacted complaint under temporary seal, which motion was granted. Shortly after Plaintiff filed her complaint, The Hartford Courant Company, publisher of the State's oldest and most politically influential newspaper, moved to intervene in this action for purposes of having all matters in this action permanently unsealed. According to The Courant's motion, the sealing "violates The Courant's and the public's rights of access to the files of this Court guaranteed by the First Amendment to the United States Constitution and common law, and effectively prevents The Courant from informing its readers about significant matters of public importance involving the conduct of some of the highest officers of the State government in the discharge of their public duties." (Intervenor's Mot. to Unseal File at 1.) In opposing this motion, Defendants have argued that, while there is a common-law presumption of access to Court files, it is not absolute and requires the District Court to balance the right to access against the countervailing interests weighing against public access. The interest which Defendants seek to protect is the attorney-client privilege which, they argue, is a countervailing interest of sufficiently high value to overcome both the common-law and the First Amendment presumptions of access. Thus, they assert that narrowly tailored redaction is necessary to preserve the attorney-client privilege. In support of their respective positions, the parties, including The Courant, have filed numerous briefs and offered extensive arguments. Their concern with what would otherwise be a simple evidentiary issue reflects that what is at stake is a broader and more significant substantive issue: namely, the right of the Chief Counsel of a governmental agency to take her disputes with her superiors to Court (or to administrative agencies) despite the likelihood that such proceedings will require disclosure of matters that would otherwise be protected by the attorney-client privilege. That broader issue is not before this Court at this time. We have carefully reviewed the redacted portions of the sealed complaint, subparagraphs 13(c), 14(a), and 16(b). It is our observation that the allegations in question are not a necessary part of the complaint. Subparagraph 13(c) begins by referencing a date when Plaintiff provided legal advice to Defendants, which allegedly led to criticism from Defendants concerning that advice, and then describes the advice that was given by Plaintiff. Paragraph 14 describes Plaintiff's reassignment in terms of her reporting authorities, and describes the criticism she received from her new superior, the attempt to remove her from *142 her job and to decrease her duties in retaliation for the exercise of her First and Fifth Amendment rights. Plaintiff then gratuitously sets forth in redacted subparagraph 14(a) an example of such an occurrence. Similarly, subparagraph 16(b), which has been redacted, concerns advice that Plaintiff gave to Defendants on a certain matter and their criticism of that advice, as well as the reassignment of the matter to another staff member. Although Plaintiff concedes that these three subparagraphs are arguably privileged, she argues that these subparagraphs do not divulge the specific cases before the Department or any the names of the parties involved with the matter. They do not do so specifically, but there is sufficient reference to the context of the disputes that very little research would be necessary to uncover the specific parties and issues involved. There was no need for Plaintiff to insert these evidentiary matters into the complaint. Federal Rule of Civil Procedure 8(a) simply requires that the complaint contain a short and plain statement of the facts upon which the plaintiff claims relief. The redacted matter is not an essential part of the complaint but by virtue of Plaintiff's including it, she and The Courant have accelerated consideration of the underlying significant legal issue referred to above. It is clear that Plaintiff and The Courant are allied in their pursuit of this issue. In The Hartford Courant published last year, The Courant supported Plaintiff's claims, noting that she has been subjected to a "five-year campaign of harassment, culminating in her demotion, because her views don't suit [the DEP's] political agenda." The article quoted both Plaintiff and her attorney. In a later article, The Courant argued that Defendants "should let the facts come out, let the public know what it is entitled to know about environmental laws," and quoted its own counsel for the proposition that the newspaper has been "prevent[ed] from informing its readers about significant matters of public importance involving some of the highest offices of the state government." (Defs.' Mem. Exs. E & F.) The issue raised by the motion papers, were it not premature, would require a difficult decision. The Courant, after noting that the attorney-client privilege is strictly construed, argues that under Connecticut law where the client is a public agency, communications to the attorney are protected only if the following four conditions are met: (1) the attorney must be acting in a professional capacity for the agency; (2) the communications must be made to the attorney by current employees or officials of the agency; (3) the communications must relate to the legal advice sought by the agency from the attorney; and (4) the communications must be made in confidence, See Shew v. Freedom of Information Comm'n, 245 Conn. 149, 159, 714 A.2d 664 (1998). Defendants respond that the recently passed Connecticut Public Act No. 99-179 explicitly prevents the Chief Legal Counsel from disclosing communications between her and Department officials that relate to her giving legal advice.[1] Plaintiff and The Courant reply that the Act does not apply because it did not become effective until shortly after this action was commenced. *143 To that, Defendants respond that the Act demonstrates that it did not effect any change in the attorney-client privilege but rather clarified the common-law attorney-client privilege applied to communications between government attorneys and state agencies. We need not resolve that dispute, however. Although state law concerning privileges is given some weight, when the cause of action in federal court is based upon a federal statute, the Court will apply federal law. This case is before the Court based upon its federal question jurisdiction by virtue of Plaintiff's section 1983 claim. The Second Circuit has held that, in such cases, the elements of the attorney-client privilege are governed by federal law. See von Bulow v. von Bulow, 811 F.2d 136, 141 (2d Cir.1987), cert. denied, 481 U.S. 1015, 107 S.Ct. 1891, 95 L.Ed.2d 498 (1987). In United States v. Construction Products Research, Inc., 73 F.3d 464, 473 (2d Cir.), cert. denied, 519 U.S. 927, 117 S.Ct. 294, 136 L.Ed.2d 213 (1996), the Court gave the customary interpretation to the attorney-client privilege.[2] The Second Circuit had earlier held that the privilege belongs to the client and forbids the attorney from disclosing confidential communications that pass from the lawyer to the client (not merely from the client to the lawyer as Plaintiff argues). See United States v. Schwimmer, 892 F.2d 237, 243 (2d Cir. 1989); see also Upjohn Co. v. United States, 449 U.S. 383, 390, 101 S.Ct. 677, 66 L.Ed.2d 584 (1981); In re Six Grand Jury Witnesses, 979 F.2d 939, 943-44 (2d Cir. 1992); United States v. United Technologies Corp., 979 F.Supp. 108, 110-11 (D.Conn.1997). A major dispute between the parties concerns which party has the burden of establishing whether the material in question is subject to the attorney-client privilege and how that decision should be reached. Plaintiff and The Courant ask for a "redaction-related dispute process to resolve the issue." Plaintiff notes that in United States v. Amodeo, 44 F.3d 141, 146-147 (2d Cir.1995) (a criminal case not involving attorney-client privilege), the Second Circuit held that the District Court should make its own redactions supported by specific findings after a review of all claims for and against access to the judicial documents. Defendants on the other hand argue that they have made a prima facie showing that the attorney-client privilege applies at this stage of the litigation, although they suggest that Plaintiff may have already revealed some of these matters to The Courant based upon the articles which it has been running. We agree with Defendants that the public interest in preserving the attorney-client privilege ordinarily outweighs the presumption of access to judicial documents. If it did not, all that would be necessary in any dispute over whether a matter was protected by the attorney-client privilege would be to find a media outlet that stated it wanted the matter revealed in order to make it available to its audience. Although the Second Circuit has not been as accommodating to attorney-client privilege claims as some other Circuits, we note that the First Circuit has held, in a similar situation, that the defendant's unrebutted prima facie showing that the material contained in the complaint was protected by the attorney-client privilege outweighed the presumption of public access. Siedle v. Putnam Invs., Inc., 147 F.3d 7, 12 (1st Cir.1998). While we believe that Defendants have made an adequate prima facie showing of attorney-client privilege to rebut the presumption of access to court materials at this time, particularly in light of the superfluous nature of the redacted portion of the complaint, Plaintiff urges us to resolve this issue at this time, since it is inevitable *144 that this dispute will arise again. Plaintiff argues that, as the litigation proceeds through discovery, motions for summary judgment, and trial, future disputes about judicial materials will necessarily arise, since communications between Plaintiff and Defendants in the course of her work as Chief Legal Counsel may be central to the outcome of the litigation, and The Courant has shown a strong interest in making those communications available to the public. Consequently, Plaintiff and The Courant urge the Court to adopt a rather elaborate four-stage proceeding with relatively short deadlines to deal with all such disputes. While we find the process suggested by Plaintiff's counsel too cumbersome for practical application, that does not mean that we will not need to invoke some other type of process. If this case progresses to discovery, some form of process will undoubtedly have to be contrived since the attorney-client privilege can be avoided on different grounds, none of which is presently before us. The Courant argues that it should be entitled to have its attorneys review the redacted materials in confidence since everyone else involved in this dispute has seen them and they have not. Such an approach is often used in the common challenge to the claim of attorney-client privilege. But this is not the typical situation. It is the attorney herself, who was central to the discussions, who seeks to avoid the privilege claim. She and her counsel drafted the redacted materials and are consequently well aware of what they say. She and The Courant are totally allied on this issue and both have thoroughly briefed this issue. In light of this, there is no need for The Courant's counsel to review the specific allegations in question, particularly in light of the fact that Plaintiff's counsel are outstanding practitioners in the employment and civil rights field.[3] Another reason for not attempting to resolve the attorney-client privilege dispute at this time is that Defendants have pending a motion to dismiss, which Plaintiff concedes raises difficult and extensive issues. If it is granted, the action will not go forward, and there will be no need to reveal the materials in question. In addition, Defendants have commenced an action against the administrative agency where Plaintiff had filed a complaint concerning matters previously within her jurisdiction. Conceivably, rulings on the substantive issues in that case may impact upon the liability in this action and the need for the assertion of attorney-client privilege, although, at present, that case seems to focus on Eleventh Amendment considerations. In conclusion, at this time, we DENY the motion to unseal the complaint (Doc. No. 14), obviously without prejudice to a subsequent application when these claims may better be evaluated and are ripe for resolution. NOTES [1] Public Act No. 99-179, § 1(a)(2), provides in relevant part: "Confidential communications" means all oral and written communications transmitted in confidence between a public official or employee of a public agency acting in the performance of his or her duties or within the scope of his or her employment and a government attorney relating to legal advice sought by the public agency or a public official or employee of such public agency from that attorney, and all records prepared by the government attorney in furtherance of the rendition of such legal advice; [2] In Construction Products Research, the Second Circuit held that, in order to "invoke the attorney-client privilege, a party must demonstrate that there was: (1) a communication between client and counsel, which (2) was intended to be and was in fact kept confidential, and (3) made for the purpose of obtaining or providing legal advice." 73 F.3d at 473 (citing Fisher v. United States, 425 U.S. 391, 403, 96 S.Ct. 1569, 48 L.Ed.2d 39 (1976)). [3] Defendants have their own approach to this matter, namely, to state that a ruling on the motion should be deferred until after they have deposed Plaintiff to determine whether she has in fact already provided The Courant with the information currently under seal. In light of our disinclination to decide this matter in its current posture, that is not a valid reason for delaying decision of this matter.
The will of the heart gives wings to your feet – Diana Oprea Diana Oprea The will of the heart gives wings to your feet Diana has just completed her first year studying Global Business at Dublin City University. Born and raised in Romania, she welcomed Ireland as her home 6 years ago. This summer as part of the WIP Class of 2017, she is hosted by Ellen Weiss in Silver Spring and is completing a work placement at the American Chemistry Council. As part of our New York week in 2017, Diana addressed senior leaders at Bank of America-Merrill Lynch – charting her journey to date and ambitions for the future. My name is Diana Oprea and I was born in Romania, in April of 1998. Fast forward to January 2011, my family made a great sacrifice for myself, a sacrifice to which I will dedicate all my achievements in this life: we moved to the emerald isle in pursuit of a better education and a brighter future for both me and my sister. I was 12 years old at the time, moving to a new country where everything was alien to me, including the language. Indeed, I’ve been only speaking English for the past four years. And moreover, I am the baby of this WIP class! Over the past six years spent in Ireland, I have chosen to embrace every single opportunity that came my way and have tried my very best to make my parents proud and ensure their sacrifice was worthwhile. Some of these experiences included joining Future Voices Ireland, an organisation which empowers young people coming from disadvantaged areas … also becoming a youth ambassador for UNICEF Ireland and Plan International which allowed me to give back to the Irish community in which I grew and developed as a young person. 10 months ago, I was accepted to Dublin City University to pursue Global Business (Canada), a very competitive degree which selects 6 students every year and offers them the opportunity to spend four years studying between Dublin and Ontario, Canada. All these milestones in my “Irish adventure”, as I like to call it, have offered me the platform and the necessary elements to grow into the ambitious young lady that you see in front of you today. When I discovered WIP, I knew immediately that I wanted to be a part of it and demonstrate the values to which it upholds: Professionalism, accountability, empathy and gratitude. Now, I am honoured to be part of the Class of 2017 and to learn from my 29 inspiring, role model classmates about leadership, service and the ability to deal with difference. As a business student, I recognise the value of strong leadership and that the North and South of Ireland require leadership which stems from a range of sectors. Our island’s future will be defined by the balanced and cumulative eco-system of leadership which is not only found on the halls of Stormont or Dail Eireann, but in rooms such as this one, where great business minds work together. This class standing in front of me today is an ecosystem of leadership, an interlinked web of talent. 30 diverse, non like minded young leaders, who realised that despite our differences, there is so much more that unites us rather than divides us. This week we have been very fortunate to roam the streets of New York, navigating the subway (well, at least trying to…), learning from the most some of the most inspirational individuals who kindly gave their time to share their knowledge with us and invest into us. One of those people is Caroline Sullivan and also the Bank of America team who have kindly agreed to host us this morning and put together a very informative session. As my friend and classmate Rachel said “we are all still a work in progress” and New York itself and many great institutions such as Bank of America give us the inspiration and the momentum we need to make the most of our last month in the US and to return to our beautiful island, brighter, stronger and braver than we have left.
Role of the Sln1-phosphorelay pathway in the response to hyperosmotic stress in the yeast Kluyveromyces lactis. The Kluyveromyces lactis SLN1 phosphorelay system includes the osmosensor histidine kinase Sln1, the phosphotransfer protein Ypd1 and the response regulator Ssk1. Here we show that K. lactis has a functional phosphorelay system. In vitro assays, using a heterologous histidine kinase, show that the phosphate group is accepted by KlYpd1 and transferred to KlSsk1. Upon hyperosmotic stress the phosphorelay is inactivated, KlYpd1 is dephosphorylated in a KlSln1 dependent manner, and only the version of KlSsk1 that lacks the phosphate group interacts with the MAPKKK KlSsk2. Interestingly, inactivation of the KlPtp2 phosphatase in a ΔKlsln1 mutant did not lead to KlHog1 constitutive phosphorylation. KlHog1 can replace ScHog1p and activate the hyperosmotic response in Saccharomyces cerevisiae, and when ScSln1 is inactivated, KlHog1 becomes phosphorylated and induces cell lethality. All these observations indicate that the phosphorelay negatively regulates KlHog1. Nevertheless, in the absence of KlSln1 or KlYpd1, no constitutive phosphorylation is detected and cells are viable, suggesting that a strong negative feedback that is independent of KlPtp2 operates in K. lactis. Compared with S. cerevisiae, K. lactis has only a moderate accumulation of glycerol and fails to produce trehalose under hyperosmotic stress, indicating that regulation of osmolyte production is different in K. lactis.
Well, hello everyone, and we’re going to start our fifth topic, that is, Anarchism - our fifth topic in this NPTEL ideologies course 2019-20. Our topic is Anarchism. Now there’s a popular perception that an anarchist is someone who goes around furtively hiding and throwing bombs at institutions or people or into crowds of people - well in fact that form of anarchism is very, very rare. And anarchism itself is a substantial body of political philosophy in its own right, a substantial ideology in its own right. Well, much of anarchism starts from a similar place to Marx. Marx shows that capitalist or commodity producing systems are very powerful and very constricting - they actually shape human nature or restrict human nature to their own ends. Commodity production - capitalism -both shapes and restricts and constricts human nature until its only expression or only permitted expressions serves it ends, serves the ends of capitalist or commodity production. But Marx leaves open the possibility that we can create better systems. If markets are human creations, we can do something about them. And Marx’s intended work on the state, which he never got around to writing - he died before he could - Marx's intended work on the state may well have addressed some of the relevant issues. He died before he could complete that work, but he clearly intended it. And other theorists - liberal theorists for their part - never hesitated to expound there are accounts of the state. Even if they often disagree, as we have seen there are different forms of liberalism, liberals may disagree with one on one another over the state. But anarchists take a very different position; in sharp contrast to both Marx and liberals, anarchists express far greater suspicion about all forms of the state and about other forms of authority both political and religious. And they do that even if many of them criticize capitalism in terms very similar to Marx's own terms. Indeed anarchists were significant participants in 19th century socialist movements; the International Workingmen’s Association, also called the First International, was created when Pierre-Joseph Proudhon’s followers joined forces with Marx's followers in 1864, even though - well their disagreements between Marx’s & Prudhon caused the organization to collapse in 1871. But since then anarchists have at times gained quite substantial political support- for example, among landless peasants in Russia shortly before the 1917 in Bolshevik Revolution - and they have had a strong influence. They have left, anarchists have left a strong influence on the thinking and organization of trade unions in France, in Italy and in Spain as well as in Argentina, Uruguay, and , and that influence has persisted despite decades of fascism in Spain and brutal military régimes in Latin America and Central America. More recently, anarchist ideas have found fresh expression in the Occupy movements in the United States and less obviously in the United Kingdom in the wake of the 2017 financial crash. Such movements, among other things, have focused on something we have already noted: the failure of social democratic parties like the Democrats in the US or Labour in the UK to oppose the policies which caused the crash Now, we need a short update there. The Labour Party is currently - this is 2019 - showing the beginnings of a potentially very strong willingness to restore the social-democratic state, at the very least to revive it to re-strengthen it, and possibly to renationalize, to re-socialize substantial areas of the British economy. But anarchist movements the modern anarchist, the up to date or contemporary anarchist movements, have also pointed out the way, for example, state bailouts for the failed banks, the banks which crashed in 2007 and so on - how these failed bailouts helps the banks to consolidate their hold on land and property - because they simply took over houses and other property on which people could no longer pay their mortgages. We might even see it as a land grab, see that process as a land grab. The failed banks themselves had huge influence on policy and legislation. For example, the crash put millions out of work and those with mortgages often had their homes repossessed by the banks which had lent them money in the first place. Secondly, when the Obama administration, the first Obama administration in the United States, passed what was apparently new legislation on the financial sector, the financiers in Wall Street went out into the street and opened bottles of champagne to celebrate because they had nothing to be afraid of from the new legislation. Anarchists, anarchism’s central concern over episodes like this is like Marxist concern, anarchism’s concern is that such episodes are not episodic but they’re systematic. According to anarchist’ thinkers, established power invariably expands far beyond the limits apparently placed upon it and far beyond what the public would tolerate if they knew about it. Anarchist critics often site a very impressive body of evidence for this. In earlier times the French Revolution soon collapsed in a reign of terror. The Russian Revolution in 1917 had similar results - it resulted in a state which by the time it collapsed in 1991 had almost no public assent whatever. More recently global scandals have emerged over the extent of E-electronic surveillance by the US government including illegal surveillance of its own citizens - and hacking the phones used by heads of government even in friendly states. That process relied upon willing cooperation by major IT corporations. In India, highly repressive colonial legislation has never been repealed or has been repealed, reintroduced, and vigorously used despite severe criticism and damage to the possibility of peaceful dispute resolution. The Armed Forces Special Powers Act 1958, which has even been used with retrospective effect, is an obvious example. Noam Chomsky is perhaps the most famous anarchist thinker today, and he has spent many decades detailing abuses of power by the United States government and its allies. What this indicates is that anarchism retains a profound suspicion of established power of all kinds. This suspicion extends to religious authority here again, the evidence is very substantial. The Roman Catholic Church has publicly admitted covering up several scandals of child abuse including substantial amounts of child sex abuse by priests. And in addition sharp criticisms have been made of concubinage in Hindu caste society as a religiously sanctioned abuse of economic power and social status. I draw that from Hira Singh’s book published in 2014; it’s called Recasting Caste. Now it’s perhaps not surprising that anarchism has had considerable influence in certain countries and regions which have historically had strong religious traditions; these include France and Spain, and almost all of Latin America. The anarchist critique of religion, however, applies to all religions because of their claim to spiritual authority, which in many cases is unquestionable. A great strength of the anarchist analysis of religion is that religion works hand-in-hand with political and financial power Now, the anarchist critique of the religious claim to authority is further strengthened by the fact that religions impose standards of good and evil or acceptable and unacceptable conduct. Those standards are enforced and policed by priests, imams, rabbis and any number of other religious authorities in any number of faiths. According to anarchists, those standards amount to an enormous number of controls on humanity, even to the extent that thinking certain kinds of thoughts becomes a moral crime, a sin. Well we shouldn’t be surprised that anarchism has had global appeal but this has been strengthened by the extent of oppression, suffering, and abusive of power material and spiritual, all over the world. We should not be surprised that anarchist tendencies are found all over the world. Anarchist thinkers have influenced political movements in India, China, Japan, Korea and parts of Africa, not least during the struggles for liberation from colonial domination. In the period immediately after the Russian revolution, anarchist were so popular that the Bolshevik party almost regard them as rivals. And where the state has collapse, which it has done many times in terrible civil wars - many of those result from global drives for natural resources - well, in such conditions are returned to self-generated local community-based organization dispute resolution may well offer fresh hope. Anarchist thinking is also found in records from earlier times, ideas which we would today call anarchist occurred in ancient slave rebellions and they figured in the thinking of diggers, a group called Diggers in the English Revolutions in the 1640s. Anarchist thinking also appeared in the French Revolutions of 1789 and 1848, and the Paris commune of 1871 had an anarchist element; one of the most successful anarchist movements was the one led by Emiliano Zapata in Mexico in 1911. Although Zapata himself was ambushed and killed in 1919 and his mentor Ricardo Flores Magón was imprisoned in the US and murdered in prison, the Zapatista legacy survives in the form of EZLN - The Zapatista Army of National Liberation. In Brazil, a contemporary Anarchist movement is the MST the movement for rural workers. Both aim to regain control of land from large cattle-ranching oligarchies which have dispossessed peasants of communal lands. I should add that today the current Brazilian government under Jair, President Jair Bolsonaro has done a great deal to make the task of regaining control of land from ownership oligarchies very much more difficult. You’ll be aware of the international coverage of this matter. Well, anarchism has had a kind of global appeal despite frequent allegations that it is optimistic and even utopian about human nature. And what is its optimistic view? It is that societies must be founded on and informed by mutual respect, compassion and cooperation. This has even being called a mystical streak in anarchism, a belief in I - quote - ‘almost unlimited possibilities of self-development’. And that has the further implication that all human beings can create a harmonious society and lead harmonious lives. I take that from Anthony Heywood’s [Andrew Heywood’s] commentary on anarchism 2000 or 2007, but leading an anarchist life can take enormous moral and physical courage. Gandhi may well be the outstanding modern example of that. He was partly influenced by the writings of Leo Tolstoy, which have an anarchist element. And he inspired millions of Indians to withstand enormous physical and political violence by the imperial British State without retaliating violently or hating the colonizers themselves. Gandhi in turn inspired leaders elsewhere such as Martin Luther King in the United States. Ccontemporary anarchists have also been influenced by philosophic insights in Taoism and Zen Buddhism particularly on the nature of self-reflection, respect and natural harmony. Now such ideas may be very attractive but anarchist movements have almost never, really never held significant political office, and anarchist arguments for the reform of the state and the economy seemed to figure only rarely in general political life. But anarchist thinking has had and continues to have much greater influence than it is often recognized as having. The reasons for this neglect, which amounts to censorship by silence, are very serious. They also tell us something about the nature of established political and economic power irrespective of the ideological positions taken by those who have such power. Well historically, anarchist greatest successes came during the Spanish civil war. That was a bitter conflict which ended in 1939 with victory for the fascist general Francisco Franco and led to 39 years of fascist dictatorship. During the Civil War the largely anarchist republican movement held substantial areas, most notably the province of Catalonia. And they held them for long enough to establish a functioning system based on and embodying anarchist thought. In the 1930s, Spain already had a mass anarcho-syndicalist Trade union the “Confederacion Nacional del Trabajo”, CNT, and it had another group, the “Federacion Anarquista Iberica”, FAI, which spent most of its time in the political underground. In July 1936 the CNT, the confederation of trade unions in particular, decided to fight the Morocco based Spanish generals who revolted against the government of the day the popular front, popular front government in Madrid. On the 18th of July the government was formed and reformed thrice in one day and the ministers involved then concluded that resistance to the generals would be futile. But the CNT moved swiftly; they seized the weapons held by military garrison and by the civil, by the civil guards, the Guardia Civil. Crucially, the CNT also took control of factories, transport systems and land at that time two percent of land owners owned 67 percent of the land and many of the small holdings were too small even to feed a family. Especially in Catalonia, the locally based and anarchist-inspired economy was highly successful and the provinces whole political life took on anarchistic character which still endures. The workers of the CNT-FAI took over the transport system in the provincial capital Barcelona, and they improved it substantially. The republican side faced enormous political and military odds and was eventually betrayed on several fronts. The Western democracies blockaded Spain under a purported non-intervention agreement which France and Britain favoured; but the United States and the United Kingdom covertly, secretly, helped Franco's forces; that is in work by Noam Chomsky. Secondly, the Soviet Union under Joseph Stalin decided to help Republicans, that is, the anarchist movements, but it did so on terms which effectively destroyed the Republican movement. The Soviet Union Soviet Union insisted on extortion at payments for weapons and thereby bled Spain's gold reserves, and it further required that the anarchists subordinate themselves to the existing popular front. That was the government which had already decided not to resist Franco. Stalin’s motives were utterly instrumental; he could not face the prospect that an anarchist or anarcho-socialist movement in Spain could undermine the Spanish Communist party, and he also feared that the anarchists would take control of British investments in Spain. Britain was a presumed Soviet ally in, I quote, “a democratic alliance” against Nazi, Germany. I have taken those materials from Ward’s book on anarchism 2004 and from Guérin’s book, a detailed book on anarchism, published in 1970 and reissued in 2010. Well, the Spanish government itself may well have been alarmed by the success of the CNT’s rapid moves, moves to reorganize not only agriculture but all work - with the free participation of peasants and other workers. This was an enormous threat even in conception to the Spanish government. The CNT had over a million members at the time in the mid-1930s, and one of its Regional Congresses in Catalonia decided to collectivise land, but the peasants were given a choice in this. The slightly better off ones opted for individual property, while the poor farmers chose collectivization among the workers. Industrial workers - 90 percent chose to join collectives, and that created a rare joint movement of both agricultural and industrial workers. Now under the broad umbrella of the trade unions, the collectives were run as groups of small units, and in accordance with anarchist principles membership was not compulsory. Even those who had opted out could still trade through shops run by the collective or by communal bodies, and they could receive some of the benefits of membership. In Catalonia where there was a tradition of small and medium-sized farms only a few pilot collectives were created. But in the neighboring province of Aragon more than three quarters of the land was socialized. Well, anarchist thinking seems to have been followed as closely as possible. For example, regional planning in Catalonia at that time and in other parts of Spain was federal in nature. Agricultural yields improved immediately; the collectives turned out to be more successful than the communes, and when graduates of agricultural colleges contributed their knowledge, yields rose by between 30 and 50 percent. In the Levant - a particular part of Spain the citrus farmers outperformed big private farmers, even in business dealings and they accounted for 70 percent of the trade. The local bodies further more organized the lectures films and plays, which the largely illiterate peasants relished. They also showed a great degree of solidarity which greatly impressed the visiting British independent Labour Party member Fenner Brockway. The number of people involved in such agricultural self-management soon reached half a million in a total of some 900 collectives. The Catalonian achievements in industrial self-management were even more impressive; Catalonia was the most industrialized area in Spain and for four months in 1936, almost all the factories and public services in the provincial capital, Barcelona, were under workers’ self-management. In fact, many of the private owners who were terrified of the workers had fled. In October 1936, 600,000 attended a trade union congress in Barcelona. And it was highly significant that qualified engineers from the professional classes also participated, unlike their counterparts in other parts of Spain and in Italy. On the 24th of October 1936, the Catalan, the Catalonian, government issued a decree confirming or ratifying the new state of affairs. All establishments with over 100 workers were to be socialized, and in fact farms of all sizes were socialized because many of the farmers were heavily in debt. The new system was highly successful, especially in running urban services and foreign services, foreign observers I beg your pardon, foreign observers were full of praise for the workers’ enthusiasm and commitment. But the successes were undermined even by the pre-Franco Government. Some of its ministers were pro-Soviet, and they feared the prospect of genuine workers’ control. They also decided against the takeover private factories and lands. The agricultural Minister was strongly Stalinist. He was called Vicente Uribe, and he even told private landowners that the Communist party's weapons were at their disposal - and he ensured that they got imported fertilizers which were denied to the socialist, to the socialized farms. Now, Uribe and his fellow Stalinist Juan Comorera, who was put in charge of the Catalan economy, even mobilized small and medium-sized farmers against the, against the Socialist farmers. They disguised large landowners or small holders and then they privatized the organization of Food supplies in Barcelona. As if that were not enough the 11th mobile division under Commander Enrique Lister invaded Aragon with tanks, but even then the peasants resisted - and as soon as the Lister division had gone, they rebuilt their collectives. The communist Party seemed to realize how much it had, how much damage it had done. But whether it is realized, its leaders realized, how much they had reinforced the position of the landowning classes is less clear; perhaps the question arises of whether the Republican government was even on Franco's side, or if it wanted solely to make sure the anarchist movements got nowhere. The Spanish civil war ended in April 1939, and Franco’s regime, which endured for nearly 40 years, was so brutal that after his death the Guardia Civil, the civil guard themselves, had to be protected against violent revenge by the public. The historical record is that anarchist movements have been hated, feared and crushed by all forms of established power, whether by broadly capitalist states or by communist or state capitalist ones, or by established religious authorities. Anarchist ideas, including ideas on political economy, are therefore essential to an understanding of the challenge anarchism poses to all forms of authority. Well, we’re coming to the main anarchist ideas and I’ll give you the headings now. We’ll put up a Powerpoint slide for you once I’ve prepared that. But I’ll briefly introduce the two main types of anarchist ideas first, and then we will look at the main themes in anarchism. Anarchist thought falls into two broad types, collectivist anarchism and individualist anarchism. The greatest difference between the two is in their respective approaches to economics or political economy, but they have a strong common element in what amounts to an implacable opposition to the moderated or managed capitalism favored by social democrats or Keynesians and also to the now-defunct state socialist or state-capitalist systems. The most obvious examples of those were the Soviet Union and until relatively recently China, even though China remains a one-party state, as does North Korea, or more precisely the democratic People’s Republic in Korea. But collectivist anarchists reject social democracy for doing nothing more than soften capitalist exploitation without ending it or even replacing it with a better system. They reject state socialism, on the other hand, for creating exploitation by the state as well as having a monopoly over political power. So, individualist anarchists reject social democracy for in fact, in effect, enabling the emergence of both by private and public monopolies and for limiting property rights and freedoms. 1
Q: How to use BinaryConnection in my module to send and receive data I have a custom module MyModule with a custom plugin MyPlugin in this plugin I want to send and receive data via a BinaryConnection. Here is a simplified version of my code [ServerModule(ModuleName)] public class ModuleController : ServerModuleBase<ModuleConfig> { protected override void OnInitialize() { Container.LoadComponents<IMyPlugin>(); } protected override void OnStart() { Container.Resolve<IBinaryConnectionFactory>(); Container.Resolve<IMyPlugin>().Start(); } } [Plugin(LifeCycle.Singleton, typeof(IMyPlugin), Name = PluginName)] public class MyPlugin: IMyPlugin { private IBinaryConnection _connection; public IBinaryConnectionFactory ConnectionFactory { get; set; } public IBinaryConnectionConfig Config { get; set; } public void Start() { _connection = ConnectionFactory.Create(Config, new MyMessageValidator()); _connection.Received += OnReceivedDoSomething; _connection.Start(); } } When I start the Runtime I get a NullReferenceException because the ConnectionFactory is not injected. Where is my mistake here? A: To use the binary connection in your module you can either instantiate TcpClientConnection and TcpListenerConnection manually or use your modules DI-Container, as you already tried and I would recommend. To use it in your module, you need to register/load the classes into your container. Take a look at how the Resource Management registers them. In your OnInitialize you need: Container.Register<IBinaryConnectionFactory>(); // Register as factory Container.LoadComponents<IBinaryConnection>(); // Register implementations Then you can add either a BinaryConnectionConfig entry to your config and decorate with [PluginConfigs(typeof(IBinaryConnection), false)] to select Socket as well as Client/Server from the MaintenanceWeb or use the derived type TcpClientConfig/TcpListenerConfig directly. public class ModuleConfig : ConfigBase { [DataMember, PluginConfigs(typeof(IBinaryConnection), false)] public BinaryConnectionConfig ConnectionConfig { get; set; } } In you plugin you can then inject IBinaryConnectionFactory and ModuleConfig to create the connection. public class MyPlugin: IMyPlugin { private IBinaryConnection _connection; public IBinaryConnectionFactory ConnectionFactory { get; set; } public ModuleConfig Config { get; set; } public void Start() { _connection = ConnectionFactory.Create(Config.ConnectionConfig, new MyMessageValidator()); _connection.Received += OnReceivedDoSomething; _connection.Start(); } } PS: Resolving the factory in OnStart returns an instance, which you don't use and is unnecessary. Don't confuse Resolve(Find registered implementation and create instance) with Register.
Steve Cochran (radio host) Steve Cochran (born March 14, 1961) is an American radio broadcaster. He hosted the morning show at WGN in Chicago from 2013 to December 2019. He previously worked at WGN from 2000 to 2010. Childhood Cochran was adopted. On June 4, 2003, he had his birth mother, Ann Sommers, as a guest on his show. Career At the age of 18, Cochran attended Ithaca College for a year before dropping out to start his radio career. He sold radio advertising for a summer before starting his career at WTKO in his home town as a DJ. Between 1981 and 2007, Cochran worked at 14 radio stations in 10 cities (including New York, Baltimore, Miami, Minneapolis (KDWB 101.3 FM), St. Louis, Detroit, and Chicago) and 8 states. In 1993, he had a cameo as a TV weather man in the film Grumpy Old Men. Cochran returned to Chicago airways on October 3, 2011, via AM 560 WIND. His show ended on June 29, 2013. He also hosted the midday show at KTRS in St. Louis from 2010–2013. On September 3, 2013, Cochran began hosting the morning show at WGN 720. WGN Cochran was originally hired by WGN in early 2000 as a substitute host in various rotating shifts. He became a regular host unexpectedly after morning drive time host, Bob Collins, was killed in a collision while piloting his private airplane. To replace Collins, Spike O'Dell moved from afternoon drive to morning drive, John Williams moved from mid-afternoon to afternoon drive and Cochran filled the mid-afternoon time slot. The Williams and Cochran shows swapped time slots in 2007. He broadcast The Steve Cochran Show on weekday afternoons. He described his show as being "a combination of funny and serious elements with special attention paid to charitable causes and kid issues." WGN management decided not to renew Cochran's contract in mid-2010. His final day on the air was June 25, 2010. He returned to the station in July 2013. Steve was let go from WGN radio on December 20, 2019. Life outside radio Outside of radio, Cochran also does stand up comedy and has done comedy shows on New Year's Eve. He is married to Maureen and has a son, Ross and a daughter, Amy. Cochran lives in Naperville, Illinois. Notes External links Steve Cochran Radio Show Steve Cochran biography at KTRS Category:1961 births Category:Living people Category:American talk radio hosts Category:Radio personalities from Chicago
Latest Laughing Apartment Near Girinagar Full Movie Online leaked Laughing Apartment Near Girinagar full Movie was indeed a good movie. Some are saying that it is same like Chak de India. It is not! It is about fighting back your rights that Britishers snatched away from us. Actor’s role was a bit different. He is a bit comical but true patriotic from heart! It was refreshing and the film pointed at a very serious issue according to me. That how we bring politics and ego in between sports, where we do not think of our country’s benefit but our own ego. Everything part was good! Worth a watch! Laughing Apartment Near Girinagar Full Movie Online This Laughing Apartment Near Girinagar movie is all about our nation. One people has dream to get the Laughing Apartment Near Girinagar medal for our Country and for that he puts his full effort. Encourage the people to achieve the Laughing Apartment Near Girinagar medal for Nation.Must watch with a message “United we stand”. Good direction, acting, screenplay with emotional film and national pride. The pain of partition and its destruction was heart touching. Movies like Chak de lndia, Soorma and now Laughing Apartment Near Girinagar defines the glory of our national game Hockey from pew independence period.
No. 20090326 Sandstrom, Justice. [¶1] Mary Kropp appeals from a disorderly conduct restraining order prohibiting her from having contact with any member of the Hoggarth family. We affirm in part, reverse in part, and remand to the district court to establish appropriate distance boundaries and schedules in the order. I [¶2] Tonia and Monte Hoggarth petitioned for a disorderly conduct restraining order against Mary Kropp on behalf of themselves and their two minor children in May 2009. Tonia Hoggarth alleged that Kropp had harassed her and her minor son outside Hoggarth's workplace and that Kropp had sent disruptive e-mail messages to the family's e-mail account. The district court entered a temporary disorderly conduct restraining order against Kropp the following day. [¶3] A hearing was held in July 2009 on whether to make the restraining order permanent. Tonia Hoggarth, Monte Hoggarth, and Kropp all testified. The district court found Monte Hoggarth and Kropp had engaged in an extramarital affair that temporarily ceased, but was later resumed. The district court then made its findings regarding two key events. [¶4] First, the court found Kropp confronted Tonia Hoggarth and her minor son in a menacing and threatening manner outside Hoggarth's workplace in April 2009. This confrontation occurred immediately after a heated telephone conversation between Monte Hoggarth and Kropp. As Tonia Hoggarth and her son were walking to her vehicle from the clinic where she works, Kropp unexpectedly emerged from an unfamiliar car and accosted them. In direct proximity to the Hoggarths, Kropp unleashed a tirade. She was screaming vulgarities about Monte Hoggarth and the affair while Tonia Hoggarth attempted to get her son away from the scene. Tonia Hoggarth pleaded with Kropp to leave them alone, since her son was being subjected to the unwelcome outburst. Kropp returned to her vehicle, where she remained parked behind the Hoggarths, not allowing them to move, before eventually leaving the parking lot. [¶5] The second key event involved a series of e-mail messages sent by Kropp to the Hoggarth family e-mail account approximately one month after the parking lot encounter. The district court found at least one of these messages was knowingly sent by Kropp on the birthday of one of the Hoggarth children. Some of the e-mail messages contained pictures of Monte Hoggarth and Kropp together after the affair was supposed to have ended. He appeared voluntarily in at least one of the pictures, while Kropp took other pictures of him without his knowledge. Kropp testified she took these pictures because she thought she "might need [them] someday." The district court found Kropp knew the entire family used the e-mail account and knew it was not password-protected. The court found the purpose of the e-mail messages was to cause the same destruction to the Hoggarth family as Kropp perceived had happened to her family. [¶6] On the basis of these two incidents, the court entered a permanent order restraining Kropp from contact with the Hoggarth family for 24 months. The order bars Kropp from all contact with the Hoggarth family and requires her to leave a public place immediately upon recognition that any of the Hoggarths are present. [¶7] Kropp appealed, but then moved to stay briefing and remand the matter to the district court to reconsider both the imposition of the restraining order and its scope. We granted Kropp's motion for remand. Following a hearing, the district court rejected Kropp's motions to reconsider and modify the restraining order. The court concluded no new evidence had been introduced that would justify terminating or modifying the order. [¶8] Kropp appeals, arguing her statements during the parking lot confrontation and in the e-mail messages sent to the Hoggarths are constitutionally protected free speech and, alternatively, the scope of the restraining order is too broad. [¶10] Kropp first argues her statements and e-mail messages are constitutionally protected forms of free speech, thus invalidating the grounds for the restraining order. Section 12.1-31.2-01(1), N.D.C.C., provides that disorderly conduct does not include constitutionally protected activity. A court imposing a disorderly conduct restraining order must address a respondent's constitutional claims, because constitutionally protected conduct cannot be a basis for the order. See, e.g., Hutchinson v. Boyle, 2008 ND 150, ¶ 9, 753 N.W.2d 881 (restraining order reversed because the district court did not adequately address the free speech claim made by the appellant); Gullickson v. Kline, 2004 ND 76, ¶ 20, 678 N.W.2d 138 (restraining order reversed in part because it was unclear whether the court considered appellant's constitutional claim). [¶11] The district court reflected its consideration of the constitutional issues in its written conclusions when it stated, "Based upon the court's findings in regard to the issue of intent, there is no constitutional protection defense that is viable." Whether an activity is constitutionally protected is a question of law, subject to full review on appeal. State v. Holbach, 2009 ND 37, ¶ 11, 763 N.W.2d 761. "When Free Speech arguments are made, the reviewing court must independently scrutinize the record to see if the charged conduct is protected." City of Fargo v. Brennan, 543 N.W.2d 240, 243 (N.D. 1996). "[A] reviewing court has a constitutional duty to independently examine the record as a whole to assure that the 'judgment does not constitute a forbidden intrusion on the field of free expression.'" Id. [¶12] There was conflicting testimony about the parking lot confrontation and the circumstances surrounding the e-mail messages sent by Kropp to the Hoggarth family. Noting Kropp was "considerably lacking in credibility" and her version of events was "not reasonable," the district court adopted the version of events presented by the Hoggarths. The district court assesses the credibility of witnesses and resolves conflicts in the evidence, and reviewing courts do not reweigh the evidence, make independent findings of fact, or substitute their judgment for that of the district court. "[T]he trial court is in a better position to judge the demeanor and credibility of witnesses and weigh the evidence than we who have only the cold record to review." Ludwig v. Burchill, 481 N.W.2d 464, 469 (N.D. 1992). [¶13] In finding the Hoggarths to be more credible, the district court found Tonia Hoggarth's testimony was "frank" as well as "reasonable and consistent with the testimony of Monte Hoggarth." Using the court's findings of fact, we note the importance of distinguishing between content of speech and disturbing or threatening conduct proscribed by the disorderly conduct statute. State v. Bornhoeft, 2009 ND 138, ¶ 11, 770 N.W.2d 270. Kropp's argument focuses on the bare words she spoke in the parking lot and in the e-mail messages she sent to the Hoggarths. This is an incomplete analysis of the constitutionality of her speech. "[D]isorderly conduct . . . does not necessarily depend on the particular content of the speech involved, but on the behavior." Id. [¶14] Kropp's behavior is similar to that of the defendant in Brennan. While Brennan dealt with a criminal conviction, the analysis in that case applies here. Disorderly conduct is analyzed in the same manner for both civil and criminal cases because the reasonable grounds for a restraining order are synonymous with probable cause for an arrest. Wetzel v. Schlenvogt, 2005 ND 190, ¶ 17, 705 N.W.2d 836. Brennan contended his actions and statements were constitutionally protected, even if they were, admittedly, "hostile and unpleasant" and "disagreeable" to the other party. Brennan, 543 N.W.2d at 243. We disagreed, holding Brennan's accompanying actions stripped his speech of constitutional protection. Id. at 245. We specifically noted that Brennan's "'screaming' delivery, his angrily waving arms and hands, and his alarming behavior in close physical proximity to [the other party], invading her 'personal zone' within two to five feet, were reasonably found to be threatening and physically offensive." Id. The district court found Kropp exhibited all of these actions. She screamed while flailing her arms. Her behavior was erratic. She was within close proximity to Tonia Hoggarth. She unleashed her tirade directly in front of a minor child. This behavior was compounded by Kropp's e-mail, which the district court found was sent to the entire family and timed to cause disruption. [¶15] Section 12.1-31-01(1)(h), N.D.C.C., provides that a person engages in disorderly conduct when she "[e]ngages in harassing conduct by means of intrusive or unwanted acts, words, or gestures that are intended to adversely affect the safety, security, or privacy of another person." Kropp's actions fit this definition. In both the parking lot confrontation and her e-mail communications, she acted in a harassing manner and violated the privacy of the Hoggarth family. These actions form the reasonable basis for a disorderly conduct restraining order. [¶16] The totality of Kropp's actions removes the constitutional protection her messages may otherwise have had. We affirm the permanent imposition of the disorderly conduct restraining order. III [¶17] Kropp next argues the scope of the restraining order is too broad and must be modified. "Generally, the grant of a restraining order is discretionary, and a district court's decision must be reviewed under an abuse-of-discretion standard." Wetzel, 2005 ND 190, ¶ 15, 705 N.W.2d 836. "A district court abuses its discretion when it acts in an arbitrary, unreasonable, or unconscionable manner, or when its decision is not the product of a rational mental process leading to a reasoned determination." Estate of Loomer, 2010 ND 93, ¶ 20, 782 N.W.2d 648. We will affirm the district court's order unless it violates any part of this standard. [¶18] While we give deference to the district court under the abuse-of-discretion standard, we nonetheless scrutinize a disorderly conduct restraining order to make sure it is narrowly tailored as to time and distance. As stated in Baker v. Mayer, 2004 ND 105, 680 N.W.2d 261: We have recognized the ramifications of a disorderly conduct restraining order to the person alleged to have committed disorderly conduct. A disorderly conduct restraining order significantly restrains a person's liberty. It totally restricts the right to be in certain places and partially restricts the right to be in other places because generally the person must not go within a certain number of feet of the victim. Further, stigma in the community may result due to the nature of the charge. Id. at ¶ 14 (citations omitted). Logical limits on time and distance must be present in a restraining order to minimize unnecessary harm to the person bound by it. Meier v. Said, 2007 ND 18, ¶ 27, 726 N.W.2d 852. [¶19] The restraining order provided: 1. The Respondent shall not engage in any disorderly conduct toward any of the Petitioners. 2. The Respondent shall not have any contact with the Petitioners, in any manner. 3. The Respondent shall be absolutely restrained from having telephone contact with the Petitioners, whether directly or indirectly. 4. The Respondent shall be absolutely restrained from having electronic contact with the Petitioners, whether directly or indirectly through any website or email address. 5. The Respondent shall be absolutely restrained from having any contact with the Petitioners at their home and their places of employment and any and all public places. 6. Recognizing that the Respondent may have occasion to be in a public place at the same time as one or more of the [Petitioners] are present, she shall specifically be required to leave any such public place immediately upon her recognizing that one or any of the Petitioners are present. 7. Recognizing that there may be a time within the two year period during which this Order is in effect when the parties' children are on the same hockey team, the parties, through counsel, may address the issue of the Respondent's attendance in a separate Stipulation which shall then be submitted to the court. Should no Stipulation be reached, the court makes no specific finding and this Order shall apply. [¶20] While the circumstances of this case necessitate the imposition of the restraining order, its terms appear excessively restrictive. The record reflects certain instances when Kropp would have legitimate reasons for being at the same events as the Hoggarths. For example, both Kropp's son and the Hoggarths' son are hockey players at Jamestown High School. Rather than establishing a distance requirement allowing both Kropp and the Hoggarths to attend hockey games and other limited events, the restraining order currently requires Kropp to leave the premises immediately upon recognizing that any of the Hoggarths are present. This immediate exit requirement may prove to be necessary if Kropp later abuses a conditional privilege to be in certain common places. At this point, however, the restraining order should be structured in a less restrictive way that will balance the protection needs of the Hoggarths and the freedom interests of Kropp. Establishing distance requirements will balance these interests, with more restrictive terms available should Kropp violate the restraining order. [¶21] The terms Kropp proposed to modify the restraining order are also unreasonable, because they would fail to adequately protect the Hoggarths. For example, one of Kropp's proposed terms would bar her from entering Tonia Hoggarth's workplace. Even if Kropp were subject to this restriction, she would be free to repeat the tirade in front of Tonia Hoggarth and her son that served as a basis for the restraining order in the first place. This confrontation took place in the parking lot, not inside the clinic. Under Kropp's proposed terms, nothing would preclude her from waiting outside Tonia Hoggarth's workplace door and then repeating her same harassing behavior. [¶22] Kropp also proposed a separate term that would allow her to attend the same church services as the Hoggarths. While Kropp certainly has a fundamental right to practice her religion, she cannot use that right as an opportunity to menace the Hoggarth family. The parties in this case will be adequately protected and served only if defined schedules are set for church attendance, so that all can practice their faith without interference. [¶23] While some of Kropp's proposed terms are unreasonable, we are convinced the existing restraining order must be modified to permit her more freedom than she is currently allowed. Kropp must be afforded narrow opportunities to attend common school and public functions that the Hoggarths may also attend. Any such mutual attendance must be subject to defined boundaries to prevent any interaction between the parties. IV [¶24] We affirm the imposition of the disorderly conduct restraining order under N.D.C.C. ch. 12.1-31.2, but remand to the district court to establish specific distance boundaries and schedules to strike a balance between protection for the Hoggarths and freedom for Kropp.
/********************************************************************** stringio.c - $Author: nobu $ $RoughId: stringio.c,v 1.13 2002/03/14 03:24:18 nobu Exp $ created at: Tue Feb 19 04:10:38 JST 2002 All the files in this distribution are covered under the Ruby's license (see the file COPYING). **********************************************************************/ #include "ruby.h" #include "ruby/io.h" #include "ruby/encoding.h" #if defined(HAVE_FCNTL_H) || defined(_WIN32) #include <fcntl.h> #elif defined(HAVE_SYS_FCNTL_H) #include <sys/fcntl.h> #endif struct StringIO { VALUE string; long pos; long lineno; int flags; int count; }; static void strio_init(int, VALUE *, struct StringIO *); #define IS_STRIO(obj) (rb_typeddata_is_kind_of(obj, &strio_data_type)) #define error_inval(msg) (errno = EINVAL, rb_sys_fail(msg)) static struct StringIO * strio_alloc(void) { struct StringIO *ptr = ALLOC(struct StringIO); ptr->string = Qnil; ptr->pos = 0; ptr->lineno = 0; ptr->flags = 0; ptr->count = 1; return ptr; } static void strio_mark(void *p) { struct StringIO *ptr = p; if (ptr) { rb_gc_mark(ptr->string); } } static void strio_free(void *p) { struct StringIO *ptr = p; if (--ptr->count <= 0) { xfree(ptr); } } static size_t strio_memsize(const void *p) { const struct StringIO *ptr = p; if (!ptr) return 0; return sizeof(struct StringIO); } static const rb_data_type_t strio_data_type = { "strio", strio_mark, strio_free, strio_memsize, }; #define check_strio(self) ((struct StringIO*)rb_check_typeddata(self, &strio_data_type)) static struct StringIO* get_strio(VALUE self) { struct StringIO *ptr = check_strio(self); if (!ptr) { rb_raise(rb_eIOError, "uninitialized stream"); } return ptr; } static VALUE strio_substr(struct StringIO *ptr, long pos, long len) { VALUE str = ptr->string; rb_encoding *enc = rb_enc_get(str); long rlen = RSTRING_LEN(str) - pos; if (len > rlen) len = rlen; if (len < 0) len = 0; return rb_enc_str_new(RSTRING_PTR(str)+pos, len, enc); } #define StringIO(obj) get_strio(obj) #define CLOSED(ptr) (!((ptr)->flags & FMODE_READWRITE)) #define READABLE(ptr) ((ptr)->flags & FMODE_READABLE) #define WRITABLE(ptr) ((ptr)->flags & FMODE_WRITABLE) static struct StringIO* readable(struct StringIO *ptr) { if (!READABLE(ptr)) { rb_raise(rb_eIOError, "not opened for reading"); } return ptr; } static struct StringIO* writable(struct StringIO *ptr) { if (!WRITABLE(ptr)) { rb_raise(rb_eIOError, "not opened for writing"); } if (!OBJ_TAINTED(ptr->string)) { rb_secure(4); } return ptr; } static void check_modifiable(struct StringIO *ptr) { if (OBJ_FROZEN(ptr->string)) { rb_raise(rb_eIOError, "not modifiable string"); } } static VALUE strio_s_allocate(VALUE klass) { return TypedData_Wrap_Struct(klass, &strio_data_type, 0); } /* * call-seq: StringIO.new(string=""[, mode]) * * Creates new StringIO instance from with _string_ and _mode_. */ static VALUE strio_initialize(int argc, VALUE *argv, VALUE self) { struct StringIO *ptr = check_strio(self); if (!ptr) { DATA_PTR(self) = ptr = strio_alloc(); } rb_call_super(0, 0); strio_init(argc, argv, ptr); return self; } static void strio_init(int argc, VALUE *argv, struct StringIO *ptr) { VALUE string, mode; int trunc = 0; switch (rb_scan_args(argc, argv, "02", &string, &mode)) { case 2: if (FIXNUM_P(mode)) { int flags = FIX2INT(mode); ptr->flags = rb_io_modenum_flags(flags); trunc = flags & O_TRUNC; } else { const char *m = StringValueCStr(mode); ptr->flags = rb_io_mode_flags(m); trunc = *m == 'w'; } StringValue(string); if ((ptr->flags & FMODE_WRITABLE) && OBJ_FROZEN(string)) { errno = EACCES; rb_sys_fail(0); } if (trunc) { rb_str_resize(string, 0); } break; case 1: StringValue(string); ptr->flags = OBJ_FROZEN(string) ? FMODE_READABLE : FMODE_READWRITE; break; case 0: string = rb_enc_str_new("", 0, rb_default_external_encoding()); ptr->flags = FMODE_READWRITE; break; } ptr->string = string; ptr->pos = 0; ptr->lineno = 0; } static VALUE strio_finalize(VALUE self) { struct StringIO *ptr = StringIO(self); ptr->string = Qnil; ptr->flags &= ~FMODE_READWRITE; return self; } /* * call-seq: StringIO.open(string=""[, mode]) {|strio| ...} * * Equivalent to StringIO.new except that when it is called with a block, it * yields with the new instance and closes it, and returns the result which * returned from the block. */ static VALUE strio_s_open(int argc, VALUE *argv, VALUE klass) { VALUE obj = rb_class_new_instance(argc, argv, klass); if (!rb_block_given_p()) return obj; return rb_ensure(rb_yield, obj, strio_finalize, obj); } /* * Returns +false+. Just for compatibility to IO. */ static VALUE strio_false(VALUE self) { StringIO(self); return Qfalse; } /* * Returns +nil+. Just for compatibility to IO. */ static VALUE strio_nil(VALUE self) { StringIO(self); return Qnil; } /* * Returns *strio* itself. Just for compatibility to IO. */ static VALUE strio_self(VALUE self) { StringIO(self); return self; } /* * Returns 0. Just for compatibility to IO. */ static VALUE strio_0(VALUE self) { StringIO(self); return INT2FIX(0); } /* * Returns the argument unchanged. Just for compatibility to IO. */ static VALUE strio_first(VALUE self, VALUE arg) { StringIO(self); return arg; } /* * Raises NotImplementedError. */ static VALUE strio_unimpl(int argc, VALUE *argv, VALUE self) { StringIO(self); rb_notimplement(); return Qnil; /* not reached */ } /* * call-seq: strio.string -> string * * Returns underlying String object, the subject of IO. */ static VALUE strio_get_string(VALUE self) { return StringIO(self)->string; } /* * call-seq: * strio.string = string -> string * * Changes underlying String object, the subject of IO. */ static VALUE strio_set_string(VALUE self, VALUE string) { struct StringIO *ptr = StringIO(self); if (!OBJ_TAINTED(self)) rb_secure(4); ptr->flags &= ~FMODE_READWRITE; StringValue(string); ptr->flags = OBJ_FROZEN(string) ? FMODE_READABLE : FMODE_READWRITE; ptr->pos = 0; ptr->lineno = 0; return ptr->string = string; } /* * call-seq: * strio.close -> nil * * Closes strio. The *strio* is unavailable for any further data * operations; an +IOError+ is raised if such an attempt is made. */ static VALUE strio_close(VALUE self) { struct StringIO *ptr = StringIO(self); if (CLOSED(ptr)) { rb_raise(rb_eIOError, "closed stream"); } ptr->flags &= ~FMODE_READWRITE; return Qnil; } /* * call-seq: * strio.close_read -> nil * * Closes the read end of a StringIO. Will raise an +IOError+ if the * *strio* is not readable. */ static VALUE strio_close_read(VALUE self) { struct StringIO *ptr = StringIO(self); if (!READABLE(ptr)) { rb_raise(rb_eIOError, "closing non-duplex IO for reading"); } ptr->flags &= ~FMODE_READABLE; return Qnil; } /* * call-seq: * strio.close_write -> nil * * Closes the write end of a StringIO. Will raise an +IOError+ if the * *strio* is not writeable. */ static VALUE strio_close_write(VALUE self) { struct StringIO *ptr = StringIO(self); if (!WRITABLE(ptr)) { rb_raise(rb_eIOError, "closing non-duplex IO for writing"); } ptr->flags &= ~FMODE_WRITABLE; return Qnil; } /* * call-seq: * strio.closed? -> true or false * * Returns +true+ if *strio* is completely closed, +false+ otherwise. */ static VALUE strio_closed(VALUE self) { struct StringIO *ptr = StringIO(self); if (!CLOSED(ptr)) return Qfalse; return Qtrue; } /* * call-seq: * strio.closed_read? -> true or false * * Returns +true+ if *strio* is not readable, +false+ otherwise. */ static VALUE strio_closed_read(VALUE self) { struct StringIO *ptr = StringIO(self); if (READABLE(ptr)) return Qfalse; return Qtrue; } /* * call-seq: * strio.closed_write? -> true or false * * Returns +true+ if *strio* is not writable, +false+ otherwise. */ static VALUE strio_closed_write(VALUE self) { struct StringIO *ptr = StringIO(self); if (WRITABLE(ptr)) return Qfalse; return Qtrue; } /* * call-seq: * strio.eof -> true or false * strio.eof? -> true or false * * Returns true if *strio* is at end of file. The stringio must be * opened for reading or an +IOError+ will be raised. */ static VALUE strio_eof(VALUE self) { struct StringIO *ptr = readable(StringIO(self)); if (ptr->pos < RSTRING_LEN(ptr->string)) return Qfalse; return Qtrue; } /* :nodoc: */ static VALUE strio_copy(VALUE copy, VALUE orig) { struct StringIO *ptr; orig = rb_convert_type(orig, T_DATA, "StringIO", "to_strio"); if (copy == orig) return copy; ptr = StringIO(orig); if (check_strio(copy)) { strio_free(DATA_PTR(copy)); } DATA_PTR(copy) = ptr; OBJ_INFECT(copy, orig); ++ptr->count; return copy; } /* * call-seq: * strio.lineno -> integer * * Returns the current line number in *strio*. The stringio must be * opened for reading. +lineno+ counts the number of times +gets+ is * called, rather than the number of newlines encountered. The two * values will differ if +gets+ is called with a separator other than * newline. See also the <code>$.</code> variable. */ static VALUE strio_get_lineno(VALUE self) { return LONG2NUM(StringIO(self)->lineno); } /* * call-seq: * strio.lineno = integer -> integer * * Manually sets the current line number to the given value. * <code>$.</code> is updated only on the next read. */ static VALUE strio_set_lineno(VALUE self, VALUE lineno) { StringIO(self)->lineno = NUM2LONG(lineno); return lineno; } /* call-seq: strio.binmode -> true */ #define strio_binmode strio_self /* call-seq: strio.fcntl */ #define strio_fcntl strio_unimpl /* call-seq: strio.flush -> strio */ #define strio_flush strio_self /* call-seq: strio.fsync -> 0 */ #define strio_fsync strio_0 /* * call-seq: * strio.reopen(other_StrIO) -> strio * strio.reopen(string, mode) -> strio * * Reinitializes *strio* with the given <i>other_StrIO</i> or _string_ * and _mode_ (see StringIO#new). */ static VALUE strio_reopen(int argc, VALUE *argv, VALUE self) { if (!OBJ_TAINTED(self)) rb_secure(4); if (argc == 1 && TYPE(*argv) != T_STRING) { return strio_copy(self, *argv); } strio_init(argc, argv, StringIO(self)); return self; } /* * call-seq: * strio.pos -> integer * strio.tell -> integer * * Returns the current offset (in bytes) of *strio*. */ static VALUE strio_get_pos(VALUE self) { return LONG2NUM(StringIO(self)->pos); } /* * call-seq: * strio.pos = integer -> integer * * Seeks to the given position (in bytes) in *strio*. */ static VALUE strio_set_pos(VALUE self, VALUE pos) { struct StringIO *ptr = StringIO(self); long p = NUM2LONG(pos); if (p < 0) { error_inval(0); } ptr->pos = p; return pos; } /* * call-seq: * strio.rewind -> 0 * * Positions *strio* to the beginning of input, resetting * +lineno+ to zero. */ static VALUE strio_rewind(VALUE self) { struct StringIO *ptr = StringIO(self); ptr->pos = 0; ptr->lineno = 0; return INT2FIX(0); } /* * call-seq: * strio.seek(amount, whence=SEEK_SET) -> 0 * * Seeks to a given offset _amount_ in the stream according to * the value of _whence_ (see IO#seek). */ static VALUE strio_seek(int argc, VALUE *argv, VALUE self) { VALUE whence; struct StringIO *ptr = StringIO(self); long offset; rb_scan_args(argc, argv, "11", NULL, &whence); offset = NUM2LONG(argv[0]); if (CLOSED(ptr)) { rb_raise(rb_eIOError, "closed stream"); } switch (NIL_P(whence) ? 0 : NUM2LONG(whence)) { case 0: break; case 1: offset += ptr->pos; break; case 2: offset += RSTRING_LEN(ptr->string); break; default: error_inval("invalid whence"); } if (offset < 0) { error_inval(0); } ptr->pos = offset; return INT2FIX(0); } /* * call-seq: * strio.sync -> true * * Returns +true+ always. */ static VALUE strio_get_sync(VALUE self) { StringIO(self); return Qtrue; } /* call-seq: strio.sync = boolean -> boolean */ #define strio_set_sync strio_first #define strio_tell strio_get_pos /* * call-seq: * strio.each_byte {|byte| block } -> strio * * See IO#each_byte. */ static VALUE strio_each_byte(VALUE self) { struct StringIO *ptr = readable(StringIO(self)); RETURN_ENUMERATOR(self, 0, 0); while (ptr->pos < RSTRING_LEN(ptr->string)) { char c = RSTRING_PTR(ptr->string)[ptr->pos++]; rb_yield(CHR2FIX(c)); } return self; } /* * call-seq: * strio.getc -> string or nil * * See IO#getc. */ static VALUE strio_getc(VALUE self) { struct StringIO *ptr = readable(StringIO(self)); rb_encoding *enc = rb_enc_get(ptr->string); int len; char *p; if (ptr->pos >= RSTRING_LEN(ptr->string)) { return Qnil; } p = RSTRING_PTR(ptr->string)+ptr->pos; len = rb_enc_mbclen(p, RSTRING_END(ptr->string), enc); ptr->pos += len; return rb_enc_str_new(p, len, rb_enc_get(ptr->string)); } /* * call-seq: * strio.getbyte -> fixnum or nil * * See IO#getbyte. */ static VALUE strio_getbyte(VALUE self) { struct StringIO *ptr = readable(StringIO(self)); int c; if (ptr->pos >= RSTRING_LEN(ptr->string)) { return Qnil; } c = RSTRING_PTR(ptr->string)[ptr->pos++]; return CHR2FIX(c); } static void strio_extend(struct StringIO *ptr, long pos, long len) { long olen; check_modifiable(ptr); olen = RSTRING_LEN(ptr->string); if (pos + len > olen) { rb_str_resize(ptr->string, pos + len); if (pos > olen) MEMZERO(RSTRING_PTR(ptr->string) + olen, char, pos - olen); } else { rb_str_modify(ptr->string); } } /* * call-seq: * strio.ungetc(string) -> nil * * Pushes back one character (passed as a parameter) onto *strio* * such that a subsequent buffered read will return it. Pushing back * behind the beginning of the buffer string is not possible. Nothing * will be done if such an attempt is made. * In other case, there is no limitation for multiple pushbacks. */ static VALUE strio_ungetc(VALUE self, VALUE c) { struct StringIO *ptr = readable(StringIO(self)); long lpos, clen; char *p, *pend; rb_encoding *enc, *enc2; if (NIL_P(c)) return Qnil; if (FIXNUM_P(c)) { int cc = FIX2INT(c); char buf[16]; enc = rb_enc_get(ptr->string); rb_enc_mbcput(cc, buf, enc); c = rb_enc_str_new(buf, rb_enc_codelen(cc, enc), enc); } else { SafeStringValue(c); enc = rb_enc_get(ptr->string); enc2 = rb_enc_get(c); if (enc != enc2 && enc != rb_ascii8bit_encoding()) { c = rb_str_conv_enc(c, enc2, enc); } } /* get logical position */ lpos = 0; p = RSTRING_PTR(ptr->string); pend = p + ptr->pos; for (;;) { clen = rb_enc_mbclen(p, pend, enc); if (p+clen >= pend) break; p += clen; lpos++; } clen = p - RSTRING_PTR(ptr->string); rb_str_update(ptr->string, lpos, ptr->pos ? 1 : 0, c); ptr->pos = clen; return Qnil; } /* * call-seq: * strio.ungetbyte(fixnum) -> nil * * See IO#ungetbyte */ static VALUE strio_ungetbyte(VALUE self, VALUE c) { struct StringIO *ptr = readable(StringIO(self)); char buf[1], *cp = buf; long pos = ptr->pos, cl = 1; VALUE str = ptr->string; if (NIL_P(c)) return Qnil; if (FIXNUM_P(c)) { buf[0] = (char)FIX2INT(c); } else { SafeStringValue(c); cp = RSTRING_PTR(c); cl = RSTRING_LEN(c); if (cl == 0) return Qnil; } rb_str_modify(str); if (cl > pos) { char *s; long rest = RSTRING_LEN(str) - pos; rb_str_resize(str, rest + cl); s = RSTRING_PTR(str); memmove(s + cl, s + pos, rest); pos = 0; } else { pos -= cl; } memcpy(RSTRING_PTR(str) + pos, cp, cl); ptr->pos = pos; RB_GC_GUARD(c); return Qnil; } /* * call-seq: * strio.readchar -> string * * See IO#readchar. */ static VALUE strio_readchar(VALUE self) { VALUE c = strio_getc(self); if (NIL_P(c)) rb_eof_error(); return c; } /* * call-seq: * strio.readbyte -> fixnum * * See IO#readbyte. */ static VALUE strio_readbyte(VALUE self) { VALUE c = strio_getbyte(self); if (NIL_P(c)) rb_eof_error(); return c; } /* * call-seq: * strio.each_char {|char| block } -> strio * * See IO#each_char. */ static VALUE strio_each_char(VALUE self) { VALUE c; RETURN_ENUMERATOR(self, 0, 0); while (!NIL_P(c = strio_getc(self))) { rb_yield(c); } return self; } /* * call-seq: * strio.each_codepoint {|c| block } -> strio * * See IO#each_codepoint. */ static VALUE strio_each_codepoint(VALUE self) { struct StringIO *ptr; rb_encoding *enc; unsigned int c; int n; RETURN_ENUMERATOR(self, 0, 0); ptr = readable(StringIO(self)); enc = rb_enc_get(ptr->string); for (;;) { if (ptr->pos >= RSTRING_LEN(ptr->string)) { return self; } c = rb_enc_codepoint_len(RSTRING_PTR(ptr->string)+ptr->pos, RSTRING_END(ptr->string), &n, enc); rb_yield(UINT2NUM(c)); ptr->pos += n; } return self; } /* Boyer-Moore search: copied from regex.c */ static void bm_init_skip(long *skip, const char *pat, long m) { int c; for (c = 0; c < (1 << CHAR_BIT); c++) { skip[c] = m; } while (--m) { skip[(unsigned char)*pat++] = m; } } static long bm_search(const char *little, long llen, const char *big, long blen, const long *skip) { long i, j, k; i = llen - 1; while (i < blen) { k = i; j = llen - 1; while (j >= 0 && big[k] == little[j]) { k--; j--; } if (j < 0) return k + 1; i += skip[(unsigned char)big[i]]; } return -1; } static VALUE strio_getline(int argc, VALUE *argv, struct StringIO *ptr) { const char *s, *e, *p; long n, limit = 0; VALUE str; if (argc == 0) { str = rb_rs; } else { VALUE lim, tmp; rb_scan_args(argc, argv, "11", &str, &lim); if (!NIL_P(lim)) limit = NUM2LONG(lim); else if (!NIL_P(str) && TYPE(str) != T_STRING) { tmp = rb_check_string_type(str); if (NIL_P(tmp)) { limit = NUM2LONG(str); if (limit == 0) return rb_str_new(0,0); str = rb_rs; } else { str = tmp; } } else if (!NIL_P(str)) { StringValue(str); } } if (ptr->pos >= (n = RSTRING_LEN(ptr->string))) { return Qnil; } s = RSTRING_PTR(ptr->string); e = s + RSTRING_LEN(ptr->string); s += ptr->pos; if (limit > 0 && s + limit < e) { e = s + limit; } if (NIL_P(str)) { str = strio_substr(ptr, ptr->pos, e - s); } else if ((n = RSTRING_LEN(str)) == 0) { p = s; while (*p == '\n') { if (++p == e) { return Qnil; } } s = p; while ((p = memchr(p, '\n', e - p)) && (p != e)) { if (*++p == '\n') { e = p + 1; break; } } str = strio_substr(ptr, s - RSTRING_PTR(ptr->string), e - s); } else if (n == 1) { if ((p = memchr(s, RSTRING_PTR(str)[0], e - s)) != 0) { e = p + 1; } str = strio_substr(ptr, ptr->pos, e - s); } else { if (n < e - s) { if (e - s < 1024) { for (p = s; p + n <= e; ++p) { if (MEMCMP(p, RSTRING_PTR(str), char, n) == 0) { e = p + n; break; } } } else { long skip[1 << CHAR_BIT], pos; p = RSTRING_PTR(str); bm_init_skip(skip, p, n); if ((pos = bm_search(p, n, s, e - s, skip)) >= 0) { e = s + pos + n; } } } str = strio_substr(ptr, ptr->pos, e - s); } ptr->pos = e - RSTRING_PTR(ptr->string); ptr->lineno++; return str; } /* * call-seq: * strio.gets(sep=$/) -> string or nil * strio.gets(limit) -> string or nil * strio.gets(sep, limit) -> string or nil * * See IO#gets. */ static VALUE strio_gets(int argc, VALUE *argv, VALUE self) { VALUE str = strio_getline(argc, argv, readable(StringIO(self))); rb_lastline_set(str); return str; } /* * call-seq: * strio.readline(sep=$/) -> string * strio.readline(limit) -> string or nil * strio.readline(sep, limit) -> string or nil * * See IO#readline. */ static VALUE strio_readline(int argc, VALUE *argv, VALUE self) { VALUE line = strio_gets(argc, argv, self); if (NIL_P(line)) rb_eof_error(); return line; } /* * call-seq: * strio.each(sep=$/) {|line| block } -> strio * strio.each(limit) {|line| block } -> strio * strio.each(sep, limit) {|line| block } -> strio * strio.each_line(sep=$/) {|line| block } -> strio * strio.each_line(limit) {|line| block } -> strio * strio.each_line(sep,limit) {|line| block } -> strio * * See IO#each. */ static VALUE strio_each(int argc, VALUE *argv, VALUE self) { struct StringIO *ptr = StringIO(self); VALUE line; RETURN_ENUMERATOR(self, argc, argv); while (!NIL_P(line = strio_getline(argc, argv, readable(ptr)))) { rb_yield(line); } return self; } /* * call-seq: * strio.readlines(sep=$/) -> array * strio.readlines(limit) -> array * strio.readlines(sep,limit) -> array * * See IO#readlines. */ static VALUE strio_readlines(int argc, VALUE *argv, VALUE self) { struct StringIO *ptr = StringIO(self); VALUE ary = rb_ary_new(), line; while (!NIL_P(line = strio_getline(argc, argv, readable(ptr)))) { rb_ary_push(ary, line); } return ary; } /* * call-seq: * strio.write(string) -> integer * strio.syswrite(string) -> integer * * Appends the given string to the underlying buffer string of *strio*. * The stream must be opened for writing. If the argument is not a * string, it will be converted to a string using <code>to_s</code>. * Returns the number of bytes written. See IO#write. */ static VALUE strio_write(VALUE self, VALUE str) { struct StringIO *ptr = writable(StringIO(self)); long len, olen; rb_encoding *enc, *enc2; if (TYPE(str) != T_STRING) str = rb_obj_as_string(str); enc = rb_enc_get(ptr->string); enc2 = rb_enc_get(str); if (enc != enc2 && enc != rb_ascii8bit_encoding()) { str = rb_str_conv_enc(str, enc2, enc); } len = RSTRING_LEN(str); if (len == 0) return INT2FIX(0); check_modifiable(ptr); olen = RSTRING_LEN(ptr->string); if (ptr->flags & FMODE_APPEND) { ptr->pos = olen; } if (ptr->pos == olen) { rb_str_cat(ptr->string, RSTRING_PTR(str), len); } else { strio_extend(ptr, ptr->pos, len); memmove(RSTRING_PTR(ptr->string)+ptr->pos, RSTRING_PTR(str), len); OBJ_INFECT(ptr->string, str); } OBJ_INFECT(ptr->string, self); ptr->pos += len; return LONG2NUM(len); } /* * call-seq: * strio << obj -> strio * * See IO#<<. */ #define strio_addstr rb_io_addstr /* * call-seq: * strio.print() -> nil * strio.print(obj, ...) -> nil * * See IO#print. */ #define strio_print rb_io_print /* * call-seq: * strio.printf(format_string [, obj, ...] ) -> nil * * See IO#printf. */ #define strio_printf rb_io_printf /* * call-seq: * strio.putc(obj) -> obj * * See IO#putc. */ static VALUE strio_putc(VALUE self, VALUE ch) { struct StringIO *ptr = writable(StringIO(self)); int c = NUM2CHR(ch); long olen; check_modifiable(ptr); olen = RSTRING_LEN(ptr->string); if (ptr->flags & FMODE_APPEND) { ptr->pos = olen; } strio_extend(ptr, ptr->pos, 1); RSTRING_PTR(ptr->string)[ptr->pos++] = c; OBJ_INFECT(ptr->string, self); return ch; } /* * call-seq: * strio.puts(obj, ...) -> nil * * See IO#puts. */ #define strio_puts rb_io_puts /* * call-seq: * strio.read([length [, buffer]]) -> string, buffer, or nil * * See IO#read. */ static VALUE strio_read(int argc, VALUE *argv, VALUE self) { struct StringIO *ptr = readable(StringIO(self)); VALUE str = Qnil; long len; switch (argc) { case 2: str = argv[1]; StringValue(str); rb_str_modify(str); case 1: if (!NIL_P(argv[0])) { len = NUM2LONG(argv[0]); if (len < 0) { rb_raise(rb_eArgError, "negative length %ld given", len); } if (len > 0 && ptr->pos >= RSTRING_LEN(ptr->string)) { if (!NIL_P(str)) rb_str_resize(str, 0); return Qnil; } break; } /* fall through */ case 0: len = RSTRING_LEN(ptr->string); if (len <= ptr->pos) { if (NIL_P(str)) { str = rb_str_new(0, 0); } else { rb_str_resize(str, 0); } return str; } else { len -= ptr->pos; } break; default: rb_raise(rb_eArgError, "wrong number of arguments (%d for 0)", argc); } if (NIL_P(str)) { str = strio_substr(ptr, ptr->pos, len); if (argc > 0) rb_enc_associate(str, rb_ascii8bit_encoding()); } else { long rest = RSTRING_LEN(ptr->string) - ptr->pos; if (len > rest) len = rest; rb_str_resize(str, len); MEMCPY(RSTRING_PTR(str), RSTRING_PTR(ptr->string) + ptr->pos, char, len); } if (NIL_P(str)) { str = rb_str_new(0, 0); len = 0; } else { ptr->pos += len = RSTRING_LEN(str); } return str; } /* * call-seq: * strio.sysread(integer[, outbuf]) -> string * * Similar to #read, but raises +EOFError+ at end of string instead of * returning +nil+, as well as IO#sysread does. */ static VALUE strio_sysread(int argc, VALUE *argv, VALUE self) { VALUE val = strio_read(argc, argv, self); if (NIL_P(val)) { rb_eof_error(); } return val; } #define strio_syswrite strio_write /* * call-seq: * strio.isatty -> nil * strio.tty? -> nil * */ #define strio_isatty strio_false /* call-seq: strio.pid -> nil */ #define strio_pid strio_nil /* call-seq: strio.fileno -> nil */ #define strio_fileno strio_nil /* * call-seq: * strio.size -> integer * * Returns the size of the buffer string. */ static VALUE strio_size(VALUE self) { VALUE string = StringIO(self)->string; if (NIL_P(string)) { rb_raise(rb_eIOError, "not opened"); } return ULONG2NUM(RSTRING_LEN(string)); } /* * call-seq: * strio.truncate(integer) -> 0 * * Truncates the buffer string to at most _integer_ bytes. The *strio* * must be opened for writing. */ static VALUE strio_truncate(VALUE self, VALUE len) { VALUE string = writable(StringIO(self))->string; long l = NUM2LONG(len); long plen = RSTRING_LEN(string); if (l < 0) { error_inval("negative legnth"); } rb_str_resize(string, l); if (plen < l) { MEMZERO(RSTRING_PTR(string) + plen, char, l - plen); } return len; } /* * call-seq: * strio.external_encoding => encoding * * Returns the Encoding object that represents the encoding of the file. * If strio is write mode and no encoding is specified, returns <code>nil</code>. */ static VALUE strio_external_encoding(VALUE self) { return rb_enc_from_encoding(rb_enc_get(StringIO(self)->string)); } /* * call-seq: * strio.internal_encoding => encoding * * Returns the Encoding of the internal string if conversion is * specified. Otherwise returns nil. */ static VALUE strio_internal_encoding(VALUE self) { return Qnil; } /* * call-seq: * strio.set_encoding(ext_enc) => strio * * Tagged with the encoding specified. */ static VALUE strio_set_encoding(VALUE self, VALUE ext_enc) { rb_encoding* enc; VALUE str = StringIO(self)->string; enc = rb_to_encoding(ext_enc); rb_enc_associate(str, enc); return self; } /* * Pseudo I/O on String object. */ void Init_stringio() { VALUE StringIO = rb_define_class("StringIO", rb_cData); rb_include_module(StringIO, rb_mEnumerable); rb_define_alloc_func(StringIO, strio_s_allocate); rb_define_singleton_method(StringIO, "open", strio_s_open, -1); rb_define_method(StringIO, "initialize", strio_initialize, -1); rb_define_method(StringIO, "initialize_copy", strio_copy, 1); rb_define_method(StringIO, "reopen", strio_reopen, -1); rb_define_method(StringIO, "string", strio_get_string, 0); rb_define_method(StringIO, "string=", strio_set_string, 1); rb_define_method(StringIO, "lineno", strio_get_lineno, 0); rb_define_method(StringIO, "lineno=", strio_set_lineno, 1); rb_define_method(StringIO, "binmode", strio_binmode, 0); rb_define_method(StringIO, "close", strio_close, 0); rb_define_method(StringIO, "close_read", strio_close_read, 0); rb_define_method(StringIO, "close_write", strio_close_write, 0); rb_define_method(StringIO, "closed?", strio_closed, 0); rb_define_method(StringIO, "closed_read?", strio_closed_read, 0); rb_define_method(StringIO, "closed_write?", strio_closed_write, 0); rb_define_method(StringIO, "eof", strio_eof, 0); rb_define_method(StringIO, "eof?", strio_eof, 0); rb_define_method(StringIO, "fcntl", strio_fcntl, -1); rb_define_method(StringIO, "flush", strio_flush, 0); rb_define_method(StringIO, "fsync", strio_fsync, 0); rb_define_method(StringIO, "pos", strio_get_pos, 0); rb_define_method(StringIO, "pos=", strio_set_pos, 1); rb_define_method(StringIO, "rewind", strio_rewind, 0); rb_define_method(StringIO, "seek", strio_seek, -1); rb_define_method(StringIO, "sync", strio_get_sync, 0); rb_define_method(StringIO, "sync=", strio_set_sync, 1); rb_define_method(StringIO, "tell", strio_tell, 0); rb_define_method(StringIO, "each", strio_each, -1); rb_define_method(StringIO, "each_line", strio_each, -1); rb_define_method(StringIO, "lines", strio_each, -1); rb_define_method(StringIO, "each_byte", strio_each_byte, 0); rb_define_method(StringIO, "bytes", strio_each_byte, 0); rb_define_method(StringIO, "each_char", strio_each_char, 0); rb_define_method(StringIO, "chars", strio_each_char, 0); rb_define_method(StringIO, "each_codepoint", strio_each_codepoint, 0); rb_define_method(StringIO, "codepoints", strio_each_codepoint, 0); rb_define_method(StringIO, "getc", strio_getc, 0); rb_define_method(StringIO, "ungetc", strio_ungetc, 1); rb_define_method(StringIO, "ungetbyte", strio_ungetbyte, 1); rb_define_method(StringIO, "readchar", strio_readchar, 0); rb_define_method(StringIO, "getbyte", strio_getbyte, 0); rb_define_method(StringIO, "readbyte", strio_readbyte, 0); rb_define_method(StringIO, "gets", strio_gets, -1); rb_define_method(StringIO, "readline", strio_readline, -1); rb_define_method(StringIO, "readlines", strio_readlines, -1); rb_define_method(StringIO, "read", strio_read, -1); rb_define_method(StringIO, "sysread", strio_sysread, -1); rb_define_method(StringIO, "readpartial", strio_sysread, -1); rb_define_method(StringIO, "read_nonblock", strio_sysread, -1); rb_define_method(StringIO, "write", strio_write, 1); rb_define_method(StringIO, "<<", strio_addstr, 1); rb_define_method(StringIO, "print", strio_print, -1); rb_define_method(StringIO, "printf", strio_printf, -1); rb_define_method(StringIO, "putc", strio_putc, 1); rb_define_method(StringIO, "puts", strio_puts, -1); rb_define_method(StringIO, "syswrite", strio_syswrite, 1); rb_define_method(StringIO, "write_nonblock", strio_syswrite, 1); rb_define_method(StringIO, "isatty", strio_isatty, 0); rb_define_method(StringIO, "tty?", strio_isatty, 0); rb_define_method(StringIO, "pid", strio_pid, 0); rb_define_method(StringIO, "fileno", strio_fileno, 0); rb_define_method(StringIO, "size", strio_size, 0); rb_define_method(StringIO, "length", strio_size, 0); rb_define_method(StringIO, "truncate", strio_truncate, 1); rb_define_method(StringIO, "external_encoding", strio_external_encoding, 0); rb_define_method(StringIO, "internal_encoding", strio_internal_encoding, 0); rb_define_method(StringIO, "set_encoding", strio_set_encoding, 1); }
Blood group, serum protein and red cell enzyme polymorphism in Filipinos. 144 Filipinos living in the Federal Republic of Germany have been typed for 18 polymorphic blood group, serum protein and red cell enzyme polymorphisms. The results are compared with those reported for other population samples from the Philippine. It could be shown that within the Filipino populations a considerable genetic heterogeneity is present. Finally, genetic distance measurements have been performed in order to evaluate the degree of genetic similarity with Southeast Asia.
Increased liver stiffness in idiopathic pulmonary fibrosis: a pilot study. There is evidence that pulmonary, hepatic and renal fibrosis may share common pathogenetic pathways. Aim of our study was to measure liver stiffness in patients affected by clinically stable idiopathic pulmonary fibrosis (IPF). Twenty-nine cases (24 M; mean age±SD: 67±8.3 yrs; 19 ex-smokers) along with fifteen age- and sex-matched healthy volunteers were enrolled. Liver conventional ultrasound examination and transient ultrasound elastography (TUE) were realized by two independent operators. Mild/moderate steatosis was identified in 1 control and 8 IPF cases (6.6% and 27.5%); severe steatosis in 2 IPF patients (7%). Mean TUE measurements were increased in 11 IPF cases (38%) as compared to controls (6.4±2.2 kPa vs 5.2±0.4 kPa; p=0.02). To our knowledge, this is the first report suggesting that liver stiffness is increased in more than one-third of IPF patients. Application of novel methodologies should be encouraged for investigating further IPF.
Auditory sensory processing in autism: a magnetoencephalographic study. Patients with autism show clinical features suggestive of abnormal processing of auditory and other sensory information. We hypothesized that low-functioning autistic subjects present abnormalities in discriminating simple auditory stimuli at sensory system preconscious stages of cortical processing. To verify our hypothesis, we used magnetoencephalographic measurements of mismatch field (MMF), which reflects the detection of a change in the physical characteristics of a repetitive sound. Fourteen patients (aged 8-32 years) who met DSM-IV diagnostic criteria for autistic disorder participated in an auditory oddball experiment. Ten healthy participants matched for age and gender acted as control subjects. Significant differences in cerebral responses between patients and control subjects were recorded. Whereas control subjects showed a clearly identifiable MMF, with distinct generators in the M100 brain wave with regard to latency, position, and strength, no identifiable MMF was present in the autistic group. Our findings suggest that low-functioning autistic subjects present a dysfunction at preconscious stages of cortical auditory discrimination, playing a role in the abnormal processing of auditory sensory afferences. The attention independence of the MMF allows for exclusion of an effect related to impaired attention or task-related responses.
Licensing; an area of serious special concern. In Tollcross, Edinburgh we live in a city centre location with all the positives and negatives that brings. In recent years Lothian Road has been sometimes practically a no-go zone on a Friday or Saturday night; all flowing from the late night issues associated with pubs, clubs, strip joints, fast food outlets and even larger issues surrounding a sauna too. The result of all this night time economy for those living in and around the area is massive; from low level crime, street fighting, noise, pubs at closing time causing noise and large groups leaving together amount to locals being under siege. A new ‘gentrification’ in the past 3 or 4 years has seen new business move in to Lothian Road especially, the local ‘sauna’ has closed and some of the strip clubs turned into up-market pubs and restaurants. But even with the likes of Innes and Gunns, Mexican food, posh burgers and a soon to be opened Brew Dog we still face an uphill struggle with the night time economy, licensing and the over provision of alcohol in the area. Tollcross is marked out by the Licensing Board of Edinburgh City Council as: “Identified by the Board as being areas of serious Special Concern”[1] And yet in the last few years this same Board has granted more and more alcohol licenses in the area, including one for the old Caly Picture House at the bottom of Lothian Road, for 915 people – making it the largest pub in Edinburgh in one stroke. This hardly seems like a Board that is taking its own advice on the area being of ‘serious special concern’. Tollcross area of ‘Serious special concern’ re number of establishments selling alcohol. To further confound the effects of the night time economy in the last Council the Board passed an amendment to Licensing called ‘Music is Audible’ – a change from the previous policy of music The new policy to allow for music to be audible lets pubs apply to vary their licence and allow music noise to be heard aloud outside of the licensed premises for example in your home sat above the venue. Many Community Councils took up the fight on behalf of local communities over the proposed changes including my own Community Council in Tollcross putting in written submissions to the process. New Town and Broughton Community Council (NTBCC) submitted a letter to the Board on this subject and to quote part of it here:[3] Noise and Residential Amenity Edinburgh is a thriving centre of the arts but is also unusual in the UK by having a very large residential population in the city centre. This keeps it alive and safe, and boosts the local economy by supporting shops and businesses. However, residents often feel they live under siege from ever increasing numbers and ever extending hours of operation of leisure facilities, pubs and restaurants, and extra “festivals” run (often promoted and supported by those who live outside the central area) with little regard or concern for residents’ amenity. Noise pollution – especially from neighbouring premises including late-night pubs and discos – is a huge concern. It is the biggest topic of complaint to the council. In trying to protect our environment, one of our few lines of defence is the Licensing Board’s condition requiring amplified music to be inaudible in neighbouring residential property. It has been suggested that Edinburgh’s inaudibility condition is outdated and over-restrictive. However, as more cities regenerate their central areas and residential uses are returning, it could well be that our example will be seen as a sensible and workable model for other cities to adopt. We note also Article 1 of the Human Rights Protocol, which entitles every person to the peaceful enjoyment of their property. At a time when the EU is looking at tighter noise standards, it is bizarre that the Council, who have a duty to protect their citizens, are even thinking of making it worse. The main proposer of Music is Audible within the Board was Cllr. Charles Booth – Green Councillor for Leith Ward who commented at the time[4]: “After a mammoth session of the Edinburgh Licensing Board, finishing just after 5pm, it was agreed (by 6 votes to 2) to change our statement of policy. I voted in favour of the change. The new statement will read as follows: 6.2 Where relevant representations are made, the Board will make an objective judgement as to whether other conditions may need to be attached to a licence to secure achievement of the licensing objectives. Any such conditions will be consistent with section 27 of the Act. Any conditions arising as a result of representations will primarily focus on the impact of the activities taking place at the licensed premises, on those attending the premises and members of the public living, working or engaged in normal activity in the vicinity of the premises, and will cover matters that are within the control of the licence holder. In particular where the operating plan indicates that music is to be played in premises, the Board will always consider the imposition of a condition requiring that amplified music from those premises shall not be an audible nuisance in neighbouring residential property.” So again, the residents of Edinburgh are made to suffer to allow commercial gain. Having to put up with noise from pubs, clubs living as many do in stairs directly above these licensed premises. And that was how it was left as the old Council fell silent, and an election was called for May 2017. With those new elections, the old Chair of the Licensing Board is no longer a Councillor –– and the new board has 18 months to come forward with new policies proposals for Licensing in the area. So a little insight into policy along side the Licensing Board sit a Licensing Forum required by the ‘Licensing (SCOTLAND) ACT 2005’, under section 6 of the Act. Its remit includes:[5] In accordance with the requirements of section 6 of the Act, and prior to the publication of this policy, the board will consult with and take account of the views of: • the local licensing forum for the board area • such other person or persons who appear to the board to be representative of: • holders of premises and personal licences • persons having functions relating to health, education or social work • young people • persons resident within the licensing board’s area and • such other persons as the board thinks appropriate. The problem is that the Forum is not democratically elected. Its list of members and remit is shrouded in mystery and it would seem one Council Officer – the ‘Executive Director’ of Place Paul Lawrence has the power to appoint people to this Forum in consultation with the Board Chair. When the Licensing Boards policies are up for discussion, improvement and change, that forum needs to be open and honest about its appointments, views, make up and recommendations it makes to the Board. After all policies like ‘Music is Audible’ have a direct effect on the quality of people’s lives living in the Board area. You might hope that the Council would propose changes to the Forum to bring about an open and transparent set up, engaging as the act says youth, health, social care and others to attend but alas no dice. At the full Council meeting on the 23rd November 2017 – the Council passed this – ‘Licensing (Scotland) Act 2005 – Reappointment of the City of Edinburgh Licensing Forum and Revised Constitution’[6] In the report, it recommended – the revised membership of the City of Edinburgh Licensing Forum as set out at Appendix 1; 1.1.2 agrees to the reappointment of any existing member of the Forum, where appropriate, should they wish to volunteer; and notes that the Executive Director of Place has delegated authority to appoint any remaining members; and 1.1.3 approves the amended City of Edinburgh Licensing Forum Constitution as set out in Appendix 2. 3.2 For community representatives, local community planning structures will be asked to nominate or re-nominate resident members of the forum. Existing community representatives will be asked to continue temporarily until Council has agreed any revision to community engagement structures. For the remaining membership, due to the experience gained by existing Forum members, it is proposed that they be offered reappointment for the forthcoming period should they wish to continue. Any remaining places would be advertised and these would require to be considered in line with the proposed membership composition. So here we go – existing people will continue on the forum as is. It was voted on and surprise surprise accepted as Council policy. So with the bonuses who currently sits on the forum; an almost impossible list to get, and the Council signing off the status quo you can see why we need change when the Board is considering new policies. From my research it does not seem the appointed few cover a wide or balanced set of city views to help guide the board through new policy or change. In limited research I found: Two representatives from Fairmilehead Community Council. Two! A Community representative from the Tollcross area – and until recently as Chair of Tollcross Community Council one I didn’t know existed in this capacity. I’m pretty sure our Community has not been asked for its views anytime recently. A member from the Community Council of Merchiston. A representative from Old Town Community Council. And these are the few I can find out about. Let’s be fair here, the forum is not representative of the people of Edinburgh. But hold on a minute here. Earlier in the year reform was on their minds – depending who you ask Council Officers where tasked to do a public consultation regarding the Forum. Athough I can find no mention of this in public papers. The closest I could find was from the Forum of 9/03/2017[7] – Forum Membership & Reappointment – AM updated the Forum as to the process of re-appointment and membership of the Forum. AM confirmed that no radical changes would be proposed. AM invited comments on proposed structure and constitution and would send out any available information. AM confirmed current constitution was available online. AM confirmed a report regarding this would be drafted for full Council before summer recess, if possible. Forum agreed that Convener would remain the same at present. AM agreed to consider the appointment of Educational Rep to the Forum. My Community Council was never consulted. In fact, the whole area of the South-East Locality was left out of the ‘consultation’ and perhaps others too. In fact, in reply to Councillors the officers had to admit that many areas where in fact not consulted. So did a consultation that did consult everyone really representative? if you managed to follow all the twists and turns so far then here’s another twist. To the rescue Council committee Risk and Best Value (GRBV) – 28 November 2017[8] the Council’s ‘standards watchdog’ which asked Officers to look into the remit of the Forum and the consultation it may or may not have undertaken. The review by GRBV is remitted to make sure the consultation was transparent. To scrutinise the work undertaken as a Council Committee. This is a bit like shutting the gate after the horse has bolted – after all the paper on ‘Licensing (Scotland) Act 2005 – Reappointment of the City of Edinburgh Licensing Forum and Revised Constitution’ was signed off at full Council only the week before. A paper we now know had many knew had issues – but Councillors passed anyway. So we’ll need to keep an eye on GRBV to see what they have to say about it. i do hope they will come back with quite a lot to say… how about starting again with a proper consultation for a start? The least we can hope from GRBV is to ensure a future forum is a representative group of people from around Edinburgh. People with local knowledge, specialist knowledge such as the Police and NHS and those who run pubs and clubs too. But also and perhaps most of important of all is to hear the voices of those who have to live in among it all; to ask local residents what’s the best for the future of licensing in Edinburgh. We await the outcome of GRBV and hope we can get a democratically elected forum that together with the Board make informed choices that benefit both the communities of Edinburgh and the licensed trade we support too. But as they say watch this space to see how the Council performs on our behalf; after all it’s our city. We only lend them the power to run it in our behalf.
Titanic 2 is one of those jokes that everyone has made at sometime over the past decade. It’s the one sequel no one expects will ever be made. There was even a great mock trailer produced four or five years ago. The Asylum, the direct-to-dvd production company responsible for producing cheap knock-offs of the latest big budget Hollywood movies (termed “Knockbusters) has just finished production on Titanic 2. On the 100th anniversary of the original voyage, a modern luxury liner christened “Titanic 2,” follows the path of its namesake. But when a tsunami hurls an ice berg into the new ship’s path, the passengers and crew must fight to avoid a similar fate. Titanic 2 is one of those jokes that everyone has made at sometime over the past decade. It’s the one sequel no one expects will ever be made. There was even a great mock trailer produced four or five years ago. Guess what.. someone has just completed principal photography on Titanic 2, and it isn’t James Cameron.
Cheap Dinosaurs Limited Edition Plantable Album Hand-made seed paper with screen-printed album art and download code on reverse side. Download Cheap Dinosaurs, plant this art under a thin layer of soil in full sun to partial shade and add water. With proper care, blue lobelias will begin sprouting in the first two weeks and finally begin blooming about 4 weeks later. Includes unlimited streaming of Cheap Dinosaurs via the free Bandcamp app, plus high-quality download in MP3, FLAC and more.
Contact info: NIAAA Press Office 301-443-3860 [email protected] News Release For Immediate Release Wednesday, June 22, 2005 Adult Antisocial Syndrome Common Among Substance Abusers Data from a recent epidemiologic survey of more than 43,000 U.S. adults show that antisocial syndromes-marked by little concern for the rights of others and violations of age-appropriate societal rules-are more common among people with substance abuse disorders than those without these disorders. The study by researchers from the National Institute on Drug Abuse (NIDA) and National Institute on Alcohol Abuse and Alcoholism (NIAAA), National Institutes of Health, is published in the June 2005 issue of The Journal of Clinical Psychiatry. "The strong and significant association between substance abuse or addiction and conditions such as antisocial personality disorder, conduct disorder, and adult antisocial behavior, suggests that prevention and treatment strategies need to apply an integrated approach," says NIDA Director Dr. Nora D. Volkow. "By also treating antisocial syndromes, particularly those that develop in adolescence or persist over time, we may be able to substantially reduce substance abuse and addiction." "This is the first time in which we see that virtually every single drug abuse disorder is associated with an antisocial personality disorder," says Dr. Wilson Compton, Director of NIDA's Division of Epidemiology, Services, and Prevention Research. "We also observed stronger links between the antisocial syndromes and specific substance abuse or addiction in women compared to men, and drug addiction was more likely than abuse to be linked with these psychiatric conditions." The scientists from NIDA and NIAAA examined data from the 2001-2002 National Epidemiologic Survey on Alcohol and Related Conditions (NESARC), a representative survey of the U.S. civilian noninstitutionalized population aged 18 years and older. "The NESARC is the largest study ever conducted of the co-occurrence of psychiatric disorders among U.S. adults," says Dr. Bridget Grant, Chief, Laboratory of Epidemiology and Biometry, NIAAA, and NESARC principal investigator. The analysis showed lifetime prevalence of 3.6 percent of adults diagnosed with antisocial personality disorder, 1.1 percent with conduct disorder only and more than 12 percent with adult antisocial behavior only while the lifetime prevalence for any drug abuse disorder was 10.3 percent. Lifetime prevalence of alcohol use disorders was 30.3 percent. The most common drug abuse disorders involved marijuana, followed by cocaine, amphetamines, hallucinogens, opioids, sedatives, tranquilizers, and inhalants. In addition, the scientists calculated the odds ratios-an estimation of the relative risk-of having a particular antisocial syndrome and a specific substance abuse disorder. They found that for antisocial personality disorder and adult antisocial behavior the odds of having a substance abuse disorder were very high overall, and were higher for women than for men. Results of other investigations have pointed to impairments in executive decision-making as a fundamental characteristic in substance abuse disorders that may be associated with impaired development of certain brain structures and function. Therefore, the authors speculate that substance abuse disorders and antisocial personality syndromes share common underlying physiologic features that may be related to the same neural systems involved in decision-making. Previous research using the same NESARC data showed that almost 48 percent of people who abused drugs also had at least one personality disorder. "Future studies will be necessary to uncover the genetic and environmental mechanisms involved in the progression of these co-occurring conditions and how possible interactions may relate to drug abuse and addiction vulnerability," says Dr. Volkow. About the National Institute on Alcohol Abuse and Alcoholism (NIAAA): The National Institute on Alcohol Abuse and Alcoholism, a component of the National Institutes of Health, U.S. Department of Health and Human Services, conducts and supports approximately 90 percent of the U.S. research on the causes, consequences, prevention, and treatment of alcohol abuse, alcoholism, and alcohol problems and disseminates research findings to general, professional, and academic audiences. Additional alcohol research information and publications are available at http://www.niaaa.nih.gov/. About the National Institutes of Health (NIH): The National Institute on Drug Abuse is a component of the National Institutes of Health, U.S. Department of Health and Human Services. NIDA supports most of the world's research on the health aspects of drug abuse and addiction. The Institute carries out a large variety of programs to ensure the rapid dissemination of research information and its implementation in policy and practice. Fact sheets on the health effects of drugs of abuse and information on NIDA research and other activities can be found on the NIDA home page at http://www.drugabuse.gov/.
1. Technical Field The present disclosure relates to a semiconductor memory device, and particularly to a semiconductor memory device having an open bit line structure and a method of testing thereof. 2. Discussion of Related Art A semiconductor memory device is used for storing data. A random access memory device (RAM) is a volatile memory device and is mainly used as a main memory device of a computer. A dynamic random access memory device (DRAM), which is a kind of volatile RAM, is comprised of memory cells. In general, a memory cell comprising a transistor and a capacitor may store information as a charge in the form of “1” or “0.” Capacitors included in memory cells are periodically refreshed, because charges stored in the capacitors may be lost as time goes by. The memory cells of a DRAM are coupled to word lines and bit lines. When transistors included in the memory cells are turned on, data stored in the capacitors will be outputted or data of a bit line will be transferred to the capacitors. A semiconductor memory device is classified into a semiconductor memory device having a folded bit line structure and a semiconductor memory device having an open bit line structure, according to the structure of the memory cell array. The memory cell array of a semiconductor memory device having an open bit line structure includes edge sub-arrays having dummy bit lines. The dummy bit lines are not coupled to sense amplifiers and data may not be stored in the memory cells coupled to the dummy bit lines. FIG. 1 is a schematic diagram illustrating a memory core of a conventional semiconductor memory device having an open bit line structure. Referring to FIG. 1, the memory core 100 of a semiconductor memory device includes edge sub-arrays 120 and 130, non-edge sub-arrays 110, and sense amplifiers 140-1 to 140-n and 150-1 to 150-n. The non-edge sub-arrays 110 include bit lines corresponding to horizontal lines and word lines corresponding to vertical lines, and a memory cell is located at each of the intersecting points 111 of a word line and a bit line. The edge sub-arrays 120 and 130 include word lines WL, bit lines BL and dummy bit lines DBL. A memory cell is located at each of the intersecting points 121 and 123 of a word line WL and a bit line BL, and at each of the intersecting points 121 and 123 of a word line WL and a dummy bit line DBL. As shown in FIG. 1, the dummy bit lines DBL are not coupled to sense amplifiers. Therefore, data may not be sensed or read through the dummy bit lines DBL included in the edge sub-arrays 120 and 130. Accordingly, it is not easy to input data to the dummy bit lines DBL and sense the data from the dummy bit lines DBL in a test mode. FIG. 2 is a schematic diagram illustrating a conventional semiconductor memory device having sense amplifier circuits and memory cell arrays. Referring to FIG. 2, the semiconductor memory device 170 includes a bit line BL, bit line bar BLB, an equalizer 173 coupled between the bit line BL and the bit line bar BLB, a p-type sense amplifier 174, an n-type sense amplifier 175 and a column selecting circuit 176. Further, the semiconductor memory device 170 includes a memory cell 171 coupled between a word line WLi and a bit line BL, and a memory cell 172 coupled between a word line WLj and a bit line bar BLB. The memory cell 171 includes a cell switch MN1 and a cell capacitor C1. The bit line BL has capacitance CBL and the bit line bar BLB has capacitance CBLB. When data stored in the cell capacitor C1 is outputted to the bit line BL, charge sharing is generated between the cell capacitor C1 and the bit line BL, which has the capacitance CBL. FIG. 3 is a schematic diagram illustrating a memory core of another conventional semiconductor memory device having an open bit line structure, and is disclosed in U.S. Pat. No. 6,535,439. The semiconductor memory device in FIG. 3 includes sense amplifiers 260-1 to 260-n and 270-1 to 270-n to more accurately test the edge sub-arrays included in the semiconductor memory device. The semiconductor memory device in FIG. 3, however, may occupy a large area in the semiconductor integrated circuit, because each of the dummy bit lines is coupled to each of the sense amplifiers.
Q: Accessing a variable defined inside a function Python I am working on a project and I am running Python 2.7 and Panda3D v1.8.1. I have been unable to find out how to access a variable that was defined in a function. For the setup I have two files. One file manages events and the second file loads models. Here is an example of what I have: class secondFile(object): def create_something(self): variable = loader.loadModel('myModel.bam') variable.setPos(123,1231,5) In my first file I want to be able to access the variable so I can call a function when my character collides with it. I was reading other similar questions but none of the answers seemed to work for what I was trying to do. DO = DirectObject() def collideEventIn(): print "Collision" collisionHandler.addInPattern('%fn-into-%in') DO.accept('character-into-variable', collideEventIn) I have tried this: class secondFile(object): def create_something(self): create_something.variable = loader.loadModel('myModel.bam') create_something.variable.setPos(123,1231,5) Main file: DO = DirectObject() variable = secondFile().create_something.variable def collideEventIn(): print "Collision" collisionHandler.addInPattern('%fn-into-%in') DO.accept('character-into-variable', collideEventIn) However it didnt seem to work. A: Not sure if i'm interpreting your question correctly, but why don't you just return the variabe? def create_something(self): variable = loader.loadModel('myModel.bam') variable.setPos(123,1231,5) return variable And to access it in variable: variable = secondFile().create_something() If you want it to be more like OOP, you should bound variable to self: def create_something(self): self.variable = loader.loadModel('myModel.bam') self.variable.setPos(123,1231,5) And then, to access it: SF = secondFile() SF.create_something() variable = SF.variable
Synopsis PLOS Medicine published a Synopsis with every Research Article until May 2006. An Editors' Summary aimed at all medical professionals, whatever their specialty, and the general public, is now published at the end of each Research Article.
London’s May Fair Kitchen Debuts its Mediterranean Makeover The new layout features sleek, modern furnishings, and standout copper “chandeliers.” The May Fair Kitchen unveiled its new look and new menu this month, offering modern Italian and Spanish small plates in the affluent heart of London’s Mayfair neighborhood. As the flagship eatery for The May Fair Hotel, a 5-star hotel less than a minute walk from Green Park, it’s destined to be a well-visited spot for both local diners and travelers. Nobu alum Amir Jati and creative director Rob Steul spearhead the restaurant’s re-design, opting for an open plan with a contemporary, understated look. Varying table tops made of wood, marble, or copper, plush leather chairs and banquettes, cool gray tones, and two stunning designer “chandeliers” in copper tubing all give the space modern flair. The Mediterranean-inspired menu features for-sharingantipasti, salads,pizzas, and meat and seafood dishes, ranges from £6 ($8.70) for small bites to £22 ($29) for larger meat and seafood plates. The menu includes homely, authentic treats such as the moreish gambas a pil pil (a Spanish shrimp dish) to more creative dishes such as the smokedlamb carpaccio with creme fraiche.
Drinks giant Coca-Cola has teamed up with the World Wildlife Fund (WWF) to start a three-year campaign to protect polar bears in the Arctic. The Arctic Home campaign, launched today with an exhibition at the Science Museum in central London, aims to raise awareness and funds to conserve the icy habitat of the bears. According to the WWF, summer sea ice in the Arctic is disappearing at a rapid pace due to climate change, at a rate of around 11% per decade, a much faster rate than scientists had predicted. Coca-Cola, which has featured the animals in their adverts for almost a century, has already pledged three million euros (£2.5m) over three years to the WWF as part of the effort. Funds raised will protect the home of the polar bear by working with local communities as well as supporting scientific research and helping to reduce conflict between people and bears. Gordon Buchanan, wildlife filmmaker and presenter of the BBC series the Polar Bear Family And Me, spent last year filming the animals in the Arctic. He said: "There's a connection that people make with bear species, whether it's grizzly bears or black bears or polar bears, there is something, because they're quite similar to us in many ways." Mr Buchanan, who is an ambassador for the campaign, added: "Having spent time with polar bears in their natural habitat I've pretty much transformed the way that I live my life as far as just starting at home, switching off the lights if you don't need them on, closing the door of the fridge as quick as possible, saving energy, not wasting food, not spending money needlessly on disposable items. "We're talking about a population today of about 20,000 polar bears living in the wild - with a loss of the Arctic habitat you can just about half or get down to 10% of that. "Then if you throw into the mix the effect pollutants in their ecosystem will have on them and potential disease of an already endangered animal, it could have catastrophic effects. "Do I think polar bears are going to go extinct in the wild within the next 10 years? No, but if we look forward to another 100 years carrying on as we are, yes the future for polar bears is really bleak." Rod Downie, Polar programme manager at WWF UK, said the Government needed to do more to help "The Government's position is confused and really conflicting. On one hand they're claiming they need to tackle climate change whilst on the other hand they're supporting UK companies that want to drill in the Arctic. Now clearly the two are incompatible. "If we look back to 2006, WWF took David Cameron up to the Arctic to witness first-hand the effects of climate change. Cameron was photographed hugging the huskies. Clearly he's forgotten that commitment now. "We need to be moving toward a much more sustainable and renewable future. We need to get off the oil hook." On Coca-cola's contribution, Geoff York, Polar Bear biologist for WWF's global Arctic programme, said: "Working with large corporates for us is the way to make change happen."
Once-daily treatment with beclomethasone dipropionate nasal aerosol does not affect hypothalamic-pituitary-adrenal axis function. Intranasal corticosteroids are effective in controlling allergic rhinitis (AR) symptoms; however, chronic administration of corticosteroids may suppress hypothalamic-pituitary-adrenal (HPA)-axis function. To evaluate the effects of 6 weeks of treatment with beclomethasone dipropionate (BDP) hydrofluoroalkane nasal aerosol on HPA-axis function in subjects with perennial AR (PAR). In this randomized, double-blind, placebo- and active-controlled study, subjects aged 12 to 45 years were randomized to receive BDP nasal aerosol 320 μg/day (n = 50), placebo (n = 46), or placebo/prednisone (prednisone 10 mg/day for the last 7 days of the treatment period [n = 11]). The primary end point was change from baseline in 24-hour serum cortisol (SC) weighted mean (expressed as geometric mean ratio [GMR]) in the BDP and placebo group after 6 weeks of treatment. Geometric SC-weighted mean values were similar in the BDP and placebo groups at baseline (9.04 and 8.45 μg/dL, respectively) and after 6 weeks (8.18 and 8.01 μg/dL, respectively). After 6 weeks of treatment, BDP was noninferior to placebo with respect to the ratio from baseline in SC-weighted mean (GMR: 0.96 [95% CI: 0.87, 1.06]). In contrast, 7 days of prednisone treatment substantially reduced geometric SC-weighted mean values from baseline (approximate 3-fold reduction [from 7.33 to 2.31 μg/dL]) compared with placebo. BDP nasal aerosol was well tolerated, and the safety profile was similar to that of placebo. Treatment with BDP nasal aerosol, 320 μg once daily, was not associated with HPA-axis suppression in adolescent and adult subjects with PAR. Clinicaltrials.gov Identifier: NCT01133626.
0.4. -234.2301937479 Add together -0.074 and 0.03658963. -0.03741037 What is the distance between 0.3 and -8017816786? 8017816786.3 Sum -76 and -10527880257147. -10527880257223 What is 36 - 8161763.0607? -8161727.0607 327089412+4364 327093776 What is -12.42 less than 29850899527? 29850899539.42 Work out -170 + 1833783924. 1833783754 Subtract 312130175 from -32.3. -312130207.3 What is the difference between -28618632.15 and -398? 28618234.15 140553627624 + 11 140553627635 -0.3402403726 - -16848 16847.6597596274 What is the distance between -61.489889 and 6265136? 6265197.489889 Work out 1.15 - 125917019.8. -125917018.65 Sum 286.5585399913 and -1. 285.5585399913 Subtract 5 from -100471.150326. -100476.150326 Calculate -22692 + 209621833. 209599141 What is -0.3 minus -0.02084747857? -0.27915252143 Work out 17.57695 + 11739617. 11739634.57695 Calculate 0.0345 - 14.76750021321. -14.73300021321 Add together 907883.5 and 209072. 1116955.5 What is 1283 minus -0.68028842? 1283.68028842 Add -1.66607325865065 and -0.5. -2.16607325865065 What is the difference between -36 and 10868829932490? 10868829932526 0.13 + -23900136.103 -23900135.973 What is -405374514 - 243088? -405617602 Put together 520699614.6 and -344. 520699270.6 Calculate -5 + 29611937246564. 29611937246559 What is -52098 - -17066.46445? -35031.53555 What is 92150312883 plus 0.23? 92150312883.23 Subtract 8.0025544 from 14833.3. 14825.2974456 Add together -22571.518 and -380316. -402887.518 What is 3999420 - -62756? 4062176 Add together 739916 and -20706023. -19966107 What is 1463 take away 297422761? -297421298 Add -77013188 and 315418. -76697770 Add together 2.1845 and -1168534160. -1168534157.8155 What is -101 + 2950455940? 2950455839 What is the difference between 1510.63997 and -0.051643? 1510.691613 What is -343 plus -0.22594568244? -343.22594568244 Put together -1424 and 1085.1540721. -338.8459279 2033056.96 + 2866 2035922.96 Work out -268519 - -143051401. 142782882 Work out -55 - -129165743080. 129165743025 Total of -1016464556218 and 0.4. -1016464556217.6 4.1 - 28127.44732482 -28123.34732482 Work out 79144645 + 27718. 79172363 -35.637006153 - 4.34 -39.977006153 What is 5215156767 less than -0.4037? -5215156767.4037 Work out -10 + -36940966194458. -36940966194468 What is 0.3 less than 3326.6392709? 3326.3392709 What is -19597 plus -6919193.35? -6938790.35 What is the distance between -4738518781263 and -0.2? 4738518781262.8 What is -0.05 take away 125562058195.7? -125562058195.75 What is 392058604 + -17.8? 392058586.2 Calculate 2719907 + 4332711. 7052618 What is -351374 less than -132.442? 351241.558 -0.5+1625269.272758 1625268.772758 Work out 1 - -41358349130. 41358349131 What is 18011 + 1.6326886? 18012.6326886 What is 974788831786 take away -0.4? 974788831786.4 What is 111 less than -1334788.3766? -1334899.3766 Work out 33.45849 + -0.4492. 33.00929 Sum -8.6 and -240631304. -240631312.6 What is 0.09379634379 take away 2.68? -2.58620365621 391 + -1206726926 -1206726535 Work out -12659431001649 + 0.1. -12659431001648.9 What is 157931116 plus 4278? 157935394 15891+41526966258 41526982149 What is -469605650 + 32.8? -469605617.2 What is 131743.33719042 minus -5? 131748.33719042 -1+10149.05409 10148.05409 Sum -0.3160908965 and -61863. -61863.3160908965 5260.96352 + -22.1 5238.86352 -11308560 + 102088 -11206472 Calculate 3853 - -12396194388. 12396198241 What is the distance between 4 and -18723456214607? 18723456214611 What is -1677046.5144361 take away 4? -1677050.5144361 Work out -32539 - -10447242. 10414703 Add together -0.261 and 329.22805. 328.96705 -122240137 + -663730 -122903867 Subtract 320457253 from -52178. -320509431 What is the distance between -0.1316959 and 4502951? 4502951.1316959 Calculate -140.02 - 44981858.31. -44981998.33 Add 0 and -15240707711. -15240707711 What is the difference between 4107491238 and 0.0202? 4107491237.9798 Calculate 1.461330724 - 680. -678.538669276 Work out -5683 + 1545815452. 1545809769 Calculate 92.9 - -21055990.5. 21056083.4 Sum 40817954122390 and 0.4. 40817954122390.4 What is -293567.1 - 6.61? -293573.71 What is 15458678638266 plus 0.1? 15458678638266.1 Work out 2.0200273 + 52863. 52865.0200273 Subtract 0.1 from -850273.764774372. -850273.864774372 -0.12147709+20363 20362.87852291 Add together 0.08 and -0.090414482981. -0.010414482981 What is 47.099 + -84652847? -84652799.901 Calculate -6334993025 + 217. -6334992808 What is 3.9968411646297 minus 0.04? 3.9568411646297 What is -42052285209.73 - 4? -42052285213.73 What is -0.0322063189668 minus 0.1? -0.1322063189668 What is 77.65 minus 0.42785147? 77.22214853 What is the distance between 590 and -362511.2? 363101.2 Work out -5.7 + -23408473.42. -23408479.12 0.026+-110988.0856668 -110988.0596668 What is 452947172202 less than 6? -452947172196 What is 33.3644 + -7199.87? -7166.5056 What is 4053261.89 - 1079? 4052182.89 Put together -134540317991 and 4. -134540317987 Calculate -0.051 - 0.45696693176. -0.50796693176 What is -393724.1 take away -1707? -392017.1 Total of -461 and -243687027. -243687488 What is the difference between 910379213216 and 0.49? 910379213215.51 Work out -0.03585663629 - -77. 76.96414336371 What is -4411558442 + 7? -4411558435 What is -104314 take away 24037.745? -128351.745 -762432950+-2.869 -762432952.869 Work out -3 + -102.888133437. -105.888133437 Calculate 16972.3552 - 1.38. 16970.9752 What is -1019620 - -259568? -760052 Total of -0.05861870367 and -1036. -1036.05861870367 What is 457319.97 take away 84850? 372469.97 What is 4.51176 take away -139686908? 139686912.51176 0.003 + -8963033373 -8963033372.997 25.98+18832.430853 18858.410853 What is the distance between -1503283 and 31.97174? 1503314.97174 What is -473001344 - -8633? -472992711 Add together 752499974 and -0.5771. 752499973.4229 0 + -1271250659927 -1271250659927 What is -1124061199664 plus -2.64? -1124061199666.64 What is the distance between -176 and 373390379? 373390555 What is 2.3290796628 plus 28819? 28821.3290796628 -12+81024816315 81024816303 What is 169346646 less than -326589? -169673235 Put together 4 and -148001777963. -148001777959 Subtract -0.4236 from 2272996038. 2272996038.4236 Add 42.470426368 and -46.4. -3.929573632 What is 33 - 4.60700565808? 28.39299434192 What is -210444917 take away 71633? -210516550 Add together -4844784670725 and 0.5. -4844784670724.5 Put together 42471090092956 and 0.4. 42471090092956.4 What is 81.01 minus 24797860334? -24797860252.99 What is the distance between -1178968822 and -0.5? 1178968821.5 Sum 28612.1 and -0.477729338. 28611.622270662 -12255171984648 - 0.55 -12255171984648.55 Calculate -1140.972869 - -1288.3. 147.327131 -3910600.6 + 22515 -3888085.6 What is -66091060 - -0.1270768? -66091059.8729232 What is 539.5 take away 15272970? -15272430.5 Work out 73 + -581365301757. -581365301684 What is -23045.826254 + -0.11? -23045.936254 Calculate -5.6913974 + -448459. -448464.6913974 What is -13.41 minus 330667.965? -330681.375 Put together -27 and 0.2148212978647. -26.7851787021353 Sum -5662.89528257 and 3. -5659.89528257 What is 19594640.7 take away -40.21? 19594680.91 Calculate -0.08968 - 786045.867. -786045.95668 Calculate 0.02388794 + -14. -13.97611206 What is 1113.9 minus 60956309? -60955195.1 What is 0.38 less than -358800743923? -358800743923.38 What is -260848408.67037 minus 0? -260848408.67037 What is 13952930 + -18008157? -4055227 What is -2037618 less than -960896? 1076722 325333396814 + -0.092 325333396813.908 Work out 0.5 - 604334941445. -604334941444.5 What is the distance between -14507208815218 and -34? 14507208815184 Subtract -0.339357034 from 7721.36. 7721.699357034 What is the distance between 0.01114 and -59961095283? 59961095283.01114 Sum 5888298175907 and -2. 5888298175905 What is -2968249 take away 24.5564? -2968273.5564 What is -149034535 take away -27297? -149007238 What is -0.3 plus -241224635314? -241224635314.3 Calculate 10488171721754 + -0.5. 10488171721753.5 -1.103 - 625925521 -625925522.103 What is the difference between 25420 and -80140833? 80166253 Sum 437 and 1.63892599126. 438.63892599126 Work out 294.60601685 - -48. 342.60601685 Put together 0.0052 and -1259742020. -1259742019.9948 Add -25 and -3317857967163. -3317857967188 What is
The Grey Fox Pub Grey Fox Cabaret is one of those tricky neighborhood bars that takes you by surprise. The unassuming exterior suggests a neighborhood bar with cheap drinks and maybe a couple flatscreens showing sports. But oh no: Inside is a full-on drag-queen cabaret. The place is divided in two; you enter on the bar side, but beyond the bar, there's a real live theater. The Grey Fox gets insane with bachelorette and birthday parties any night it hosts drag shows (Friday, Saturday and Sunday, with drag kings performing every other Thursday). While its out-of-the-way south-side location should be a deterrent for county folk, you'll still find them here in droves, celebrating with the kind of entertainment that you just can't find outside the city limits.
Q: Python, pygame - Loading image filename from string variable in a list? I'm a beginning pygamer trying to upgrade a text game I wrote to a gui game. animals = {dog: "Dog" 4 "Bone", cat: "Cat" 4 "Yarn", parrot: "Parrot" 2 "Bell"} pet = animals[dog].split() pet.append(pygame.image.load('//home/me/Desktop/Python/'+pet[0]+'.png') If I were to input the above code and try to run it I get: pygame.error: Couldn't open //home/me/Desktop/Python/"Dog".png How do I use a string variable from a list to load a file without getting quotes added to the file name? A: Just replace " in pet[0] with an empty string. pet.append(pygame.image.load('//home/me/Desktop/Python/'+pet[0].replace('"', "")+'.png') Example: >>> animals = {'dog': '"Dog" 4 "Bone"', 'cat': '"Cat" 4 "Yarn"', 'parrot': '"Parrot" 2 "Bell"'} >>> pet = animals['dog'].split() >>> '//home/me/Desktop/Python/'+pet[0].replace('"', "")+'.png' '//home/me/Desktop/Python/Dog.png'
1. Field of the Invention The invention relates to a power circuit for a power amplifier, and more particularly to a power circuit for a power amplifier applied in a communication system. 2. Description of the Related Art In current communication systems, before a transmission signal is broadcasted through an antenna, the power of the transmission signal has to be amplified by a power amplifier. Among elements of a communication system, a power amplifier consumes a great amount of current from a system power supply when the power amplifier is active. Thus, in such cases, remaining current may not be sufficient for other elements to operate. In efforts to provide sufficient power for all elements to operate when a power amplifier is activated, a communication system requires a system power supply that provides a large amount of total current. However, for some applications, the total amount of current provided by a system power supply is limited. For example a USB dongle device is limited to a specific power specification of 500 mA (2.5 W). Thus, it is desired to provide a low current power circuit to drive a power amplifier in a low powered device.
howl s moving castle ost theme song howl s moving castle ost theme song Length 00:05:10 - Size 4.69 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. sekai no yakusoku howl s moving castle ost sekai no yakusoku howl s moving castle ost Length 00:04:20 - Size 3.94 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. howl s moving castle main theme howl s moving castle main theme Length 00:05:10 - Size 4.69 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. joe hisaishi howl s moving castle joe hisaishi howl s moving castle Length 00:05:13 - Size 4.74 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. 7 howl s moving castle 7 howl s moving castle Length 00:12:56 - Size 11.75 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. howl s moving castle cave of mind howl s moving castle cave of mind Length 00:06:12 - Size 5.63 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. howl s moving castle promise of the world piano cover howl s moving castle promise of the world piano cover Length 00:04:47 - Size 4.34 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. merry go round of life howl s moving castle joe hisaishi merry go round of life howl s moving castle joe hisaishi Length 00:05:13 - Size 4.74 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. howl s moving castle soundtrack xxl howl s moving castle soundtrack xxl Length 00:05:10 - Size 4.69 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. howls moving castle soundtrack peaceful thoughts howls moving castle soundtrack peaceful thoughts Length 00:00:29 - Size 0.44 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. stroll through the sky stroll through the sky Length 00:03:24 - Size 3.09 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. howl s moving castle ost merry go round howl s moving castle ost merry go round Length 00:03:20 - Size 3.03 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. joe hisaishi live performance howl moving castle main them joe hisaishi live performance howl moving castle main them Length 00:03:35 - Size 3.25 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. 하울의 움직이는 성 ost 히사이시 조 howl s moving castle 하울의 움직이는 성 ost 히사이시 조 howl s moving castle Length 00:12:44 - Size 11.56 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. howl s moving castle theme for solo piano tutorial howl s moving castle theme for solo piano tutorial Length 00:05:43 - Size 5.19 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. howl s moving castle soundtrack heart beat howl s moving castle soundtrack heart beat Length 00:00:21 - Size 0.32 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. howl s moving castle theme for solo piano hd howl s moving castle theme for solo piano hd Length 00:05:47 - Size 5.25 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. hisaishi joe howl s moving castle theme sungha jung hisaishi joe howl s moving castle theme sungha jung Length 00:05:17 - Size 4.8 MB Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video. Convert Youtube video to mp3Download Mp3Download has been launched, thanks for supporting us.Download has been launched, thank you.DownloadedVideo is under conversion, please wait...Video is under conversion...Converting...Sorry, this video is protected, thank you for your understanding.Sorry, this video is protected.Protected video.
The spirit of cricket was on full display during Paarl Rocks’ Mzansi Super League clash against Nelson Mandela Bay Giants, with Paarl Rocks all-rounder Isuru Udana choosing not to run out an injured opponent at a pivotal moment. The incident occurred in the 19th over of the Nelson Mandela Bay Giants chase. With 24 runs needed from the last eight balls, a Paarl Rocks victory looked likely, but a comeback wasn’t out of the question, especially with former South Africa batsman Heino Kuhn unbeaten on 56. As if to demonstrate his good touch, Kuhn drove Sri Lanka international Udana firmly back down the ground, and straight into his batting partner, Marco Marais, who was backing up at the non-striker’s end. This is class from Isuru Udana ?pic.twitter.com/RZX5yutA23 — Wisden (@WisdenCricket) December 8, 2019 The ball rebounded to Udana, and with the stricken Marais still out of his ground, he had the opportunity to run him out and bring his side closer to victory. Instead, he opted not to add insult to injury, keeping the ball in-hand rather than shying at the stumps, allowing the batsman, to regain his ground, holding his hurt arm as he did so. When Marais hit a six from the third ball of the final over, Udana might have questioned if he had done the right thing, with two more lusty blows needed to bring the scores level. But Paarl Rocks held their nerve
Candidates typically run for president either because they can win or because they want to draw attention to a given set of issues. Then there's Tom Steyer. The liberal activist and megadonor announced his candidacy on Tuesday, and it isn't clear what he's hoping to accomplish as a candidate that he cannot already achieve as a billionaire. In a field of two dozen candidates, Steyer's path to victory is limited. He may think that because President Trump won the presidency as a businessman without prior political experience, that he can, too. But Trump was a unique beast who had been a national celebrity, star of a hit TV show, and somebody who had decades of experience manipulating the mass media to promote himself. In contrast, Steyer is unknown to most people outside of politics. The anti-corporate message in his announcement video is well represented within the current field of two dozen Democrats, and his delivery was flat. So, he's unlikely to actually have a chance at the nomination. That brings us to the second reason people sometimes run for president, which is to draw attention to an issue or given set of issues. But as a billionaire, Steyer can do that now. Whenever he wants, he can rent time on television or use the internet to get out his message, as he has already done on impeachment and climate change. He could also contribute to Democratic House and Senate candidates in an effort to build a governing majority for his liberal ideas. Instead, he's expected to spend at least $100 million of his own money on a presidential run. Incidentally, one of the qualifications for participation in the Democratic debates this month is to have at least 65,000 donors; and for September, to have 130,000 unique donors in at least 20 states. But a billionaire signaling out of the gate his intention to spend nine figures of his own money doesn't help efforts to convince small donors to support his campaign, thus it's far from certain he'll ever end up on the stage. It seems that the biggest winners from this announcement are the RNC and Trump, who can now count on Steyer to waste a ton of money in a Democratic primary that otherwise could have been deployed against Republicans.
# Python Title=Python CaseSensitive=Yes Delimiter=~`!@#$%^&*()-+=|\{}[]:;"',.<>/? LineComment=# BlockComment= EscapeChar=\ StringChar="' DirectiveLeading= KeywordPrefix= SpecialWordPrefix= IndentChar=: UnindentChar= BracePair=( ) { } [ ] AutoCompletePair=() [] {} "" '' # System Predefined Color & Style TextColor=Black TextBgColor=White TextStyle= DelimiterColor=SaddleBrown DelimiterBgColor= DelimiterStyle= SpaceColor=Aqua SpaceBgColor= SpaceStyle= NumberColor=Blue NumberBgColor= NumberStyle= StringColor=Red StringBgColor= StringStyle= CommentColor=Teal CommentBgColor= CommentStyle= DirectiveColor=Green DirectiveBgColor= DirectiveStyle= SpecialWordColor=Navy SpecialWordBgColor= SpecialWordStyle= LineNumberColor=White LineNumberBgColor=A0A0A0 LineNumberStyle= ActiveLineColor=Fuchsia BookmarkColor=DeepSkyBlue BookmarkBgColor=MediumBlue # User Defined Keywords [1.Keywords] Color=DarkOrange BgColor= Style=Bold InRange=0 Keyword=and as assert break class continue def del elif else except exec finally for from global if import in is lambda not or object pass print raise range return try while yield [2.Functions] Color=DarkBlue Style=Bold InRange=0 Keyword=__import__ abs apply basestring bool buffer callable chr classmethod cmp coerce compile complex delattr dict dir divmod enumerate eval execfile Ellipsis file filter float frozenset False getattr globals group hasattr hash help hex id input int intern isinstance issubclass iter joinfields len list local long map match max min None NotImplemented oct open ord pow property raw_input reduce reload repr round search set setattr slice sorted str splitfields tuple type True unichr unicode vars xrange zip [3.Methods] Color=ForestGreen Style=Bold InRange=0 Keyword=__abs__ __add__ __and__ __call__ __cmp__ __coerce__ __contains__ __del__ __delattr__ __delitem__ __delslice__ __div__ __divmod__ __eq__ __float__ __floordiv__ __ge__ __getattribute__ __getitem__ __getnewargs__ __getslice__ __gt__ __hash__ __hex__ __iadd__ __iand__ __idiv__ __ilshift__ __imod__ __imul__ __init__ __int__ __invert__ __ior__ __ipow__ __irshift__ __isub__ __iter__ __ixor__ __le__ __len__ __long__ __lshift__ __lt__ __mod__ __mul__ __ne__ __neg__ __nonzero__ __oct__ __or__ __pos__ __pow__ __radd__ __rand__ __rdiv__ __rdivmod__ __reduce__ __reduce_ex__ __repr__ __reserved__ __rfloordiv__ __rlshift__ __rmod__ __rmul__ __ror__ __rpow__ __rlshift__ __rrshift__ __rshift__ __rsub__ __rtruediv__ __rxor__ __setattr__ __setitem__ __setslice__ __str__ __sub__ __xor__ add append capitalize center clear close conjugate copy count decode difference discard Decimal encode endswith expandtabs extend find flush fileno fromkeys get getcontext has_key index insert intersection intersection_update isalnum isalpha isatty isdigit islower isspace issubset issuperset istitle isupper items iteritems iterkeys itervalues join keys ljust lower lstrip next pop popitem read readline readlines remove replace reverse rfind rindex rjust rsplit rstrip seek setdefault sort split splitlines startswith strip swapcase symmetric_difference symmetric_difference_update tell title translate truncate union update upper values write writelines zfill [4.Attributes] Color=DarkOrchid BgColor= Style=Bold InRange=0 Keyword=__author__ __bases__ __class__ __dict__ __doc__ __email__ __methods__ __members__ __name__ __slots__ __version__ [5.Exceptions] Color=CornflowerBlue BgColor= Style=Bold InRange=0 Keyword=ArithmeticError AssertionError AttributeError DeprecationWarning EnvironmentError EOFError Exception FloatingPointError FutureWarning ImportError IndentationError IndexError IOError KeyboardInterrupt KeyError LookupError MemoryError NameError NotImplementedError OSError OverflowWarning OverflowError PendingDeprecationWarning ReferenceError RuntimeError RuntimeWarning StandardError StopIteration SyntaxError SyntaxWarning SystemError SystemExit TabError TypeError UnboundLocalError UnicodeError UnicodeDecodeError UnicodeEncodeError UnicodeTranslateError UserWarning ValueError Warning WindowsError ZeroDivisionError [6.Common Libs] Color=Red BgColor= Style=Bold InRange=0 Keyword=__builtin__ __future__ __main__ aepack aetools aetypes aifc al anydbm applesingle atexit array asyncore asynchat audioop autoGIL AL AST base64 binascii binhex bisect bsddb buildtools bz2 BaseHTTPServer Bastion calendar cd cfmfile cgi cgitb chunk cmath cmd code codecs codeop collections colorsys commands compileall cookielib copy_reg cPickle cStringIO csv curses Carbon CGIHTTPServer ColorPicker Complex ConfigParser Cookie datetime dbhash decimal difflib dircache dircmp dis distutils dl doctest dospath dumbdbm dummy_thread dummy_threading DEVICE DocXMLRPCServer emacs email encodings errno exceptions EasyDialogs fcntl filecmp fileinput findertools fl flp fm fmt fnmatch formatter fpectl fpformat ftplib FL FrameWork gc gdbm gensuitemodule getopt getpass gettext gl glob gopherlib grep gzip GL heapq hmac hotshot htmlentitydefs htmllib httplib HTMLParser ic icopen ihooks imaplib imageop imghdr imp imputil inspect itertools jpeg keyword linecache locale lockfile logging mac macerrors macfs macostools macpath macresource macurl2path mailbox mailcap marshal md5 mhlib mimetools mimetypes mimify mmap multifile mutex math MacOS MimeWriter MiniAEFrame netrc new newdir ni nis nntplib nsremote ntpath nturl2path operator optparse os ossaudiodev parser pdb pgdb pickle pickletools pipes pkgutil platform poly popen2 poplib posixfile posixpath pprint profile pstats py_compile pyclbr pydoc pyexpat pythonprefs Para PixMapWrapper quietconsole quopri Queue rand random re regex regsub resource rexec rfc822 rgbimg rlcompleter robotparser rotor sched select sets sgmllib sha shelve shlex shutil signal site smtpd smtplib sndhdr snmp socket stat statcache statvfs string stringprep struct subprocess sunau symbol sys syslog ScrolledText SimpleHTTPServer SimpleXMLRPCServer StringIO SocketServer tabnanny tarfile tb telnetlib tempfile termios test textwrap thread threading time timeit toaiff token tokenize traceback tty turtle types tzparse TERMIOS Tix Tkinter unicodedata unittest urllib urllib2 urlparse user util uu UserDict UserList UserString videoreader warnings waste wave weakref webbrowser whatsound whichdb whrandom winsound xdrlib xml xmllib xmlpackage xmlrpclib zipfile zlib zmod [7.Others] Color=Red BgColor= Style= InRange=0 Keyword=array cls fnmatch struct self
[Underestimation of mortality caused by traffic in Mexico: an analysis at the subnational level]. To estimate the potential underestimation of mortality from traffic injuries at the subnational level in Mexico for a period of 15 years and to identify social and economic variables at the state level that could potentially be associated with the quality of statistical classification of deaths. Secondary analysis of validated mortality databases for the period 1999-2013 was conducted. Using multiple imputation models, registries that could potentially be attributed to road traffic deaths were estimated and the potential underestimation of mortality due to this external cause was quantified. A simple correlation analysis was carried out. The potential underestimation of deaths from traffic injuries during the period was 18.85% at the national level, with significant variations by state. From the data analyzed, there was no statistical evidence of any association of the percentage of road traffic deaths underestimation with the variables analyzed. Performance in terms of mortality classification is different at the state level in Mexico. This information is useful for targeting interventions to improve the recording of deaths in the country.
The Lakeview and West Town chambers of commerce want to bill their neighborhoods as bike-friendly places to spend money, and are working to unveil a joint program to offer discounts to cyclists in June. Lakeview chamber officials have recruited about 25 businesses to participate the "Bike Friendly Business District" program, executive director Heather Kitzes said. West Town has recruited a similar number of businesses, its program director said. Both chambers said the concept is to create a zone where businesses and community groups promote bicycle use as part of their neighborhood 'brand' with special promotions and cycling infrastructure such as bike racks or fix-it stations. After consulting with the city and Active Transportation Alliance, the neighborhoods sought to market their bike-friendly programs together. "We have a huge biking population that lives and works in West Town, and quite a few bike shops as well," said Katharine Wakem, program manager for the West Town chamber. "After seeing the overall trend of the amount of bikers that come to the area, as well as what people are into, the ideas started flowing. "… It's exciting because I feel like this is going to be a really popular program that we're doing together," she said. The exact details are still a work in progress. But eventually cyclists who show up to a participating neighborhood businesses with their helmet might be eligible for a free cup of coffee, pastry or discounts on other services. Organizers are also looking into events that would bring cyclists from one neighborhood to the other. "Biking is good for business," Kitzes said. "Some businesses, we're hoping, will get really creative with what they're offering to bikers." For Lakeview, the idea is rooted in the neighborhood's master plan, a segment of which calls for expanded bike infrastructure in the area. "Lakeview is congested," Kitzes said. "Which is great because it means more people are coming to the area, but promoting biking is a great way to alleviate car congestion. It's healthy, it has multiple benefits." The chamber director said studies also show cycling customers tend to spend and shop more. "And they're more likely to stay local, they're more likely to shop in their neighborhood," Kitzes said. "When people are moving slower, they're just more aware of what's going on." For now, Kitzes and Wakem said the chambers are working to develop the program. More details should be released by the time it's set to launch in June.
? True Suppose 2*c = f - 276, f = 2*c + c + 274. Suppose -a = 4*m + 4, -2*a + 2 = 2*m + m. Let l be ((-32)/f)/(a/(-10)). Which is smaller: -1/3 or l? -1/3 Let p be 257/(-128) - (-5 + 3). Which is bigger: -1 or p? p Let i = -26 + 25. Which is greater: 2/17 or i? 2/17 Suppose 0 = r + 3 - 2. Is -2/91 equal to r? False Let m = 2 - 0. Suppose 3*n = 2*g - 12, m*n + 5*g - 7 = -2*n. Suppose -4*k - 1 + 7 = -2*t, 3*t + 13 = 2*k. Which is smaller: n or k? n Let n = 180 - 903/5. Let l = -1 - -1.1. Are n and l non-equal? True Let d be (-1678)/558 + (-13)/(13/(-3)). Is d bigger than 0? False Suppose -6 = 28*s - 26*s. Which is smaller: s or -2? s Suppose -2 = -u + 2. Suppose 5*d - 6 = p, 4*p + 0*d = -3*d + 22. Is p > u? False Let o = -0.2 - 0.3. Let c = -0.5 + o. Let l = c + 2. Is 2 equal to l? False Let k = 75 - 676/9. Which is greater: k or 0? 0 Suppose -5 = 2*r - 7*r. Suppose 48 = -3*z + 4*z. Let x = -622/13 + z. Is x at least as big as r? False Let a(m) = m**3 - 6*m**2 - 9*m + 8. Let o be a(7). Let u = -6 - -3. Which is bigger: u or o? u Let h(q) = -q**3 + 6*q**2 + 4. Let f be h(6). Suppose -5*a + 4 = -f*a. Suppose 0*l = 2*l + 2*r, -a*r + 27 = -5*l. Is -7/3 equal to l? False Let u be (0 + -4 + 5)*-1. Is -1/61 greater than u? True Let n = 167 - 1171/7. Which is bigger: n or -0.14? -0.14 Let d = 1223/11 - 111. Is d less than -0.04? False Let v(m) = -4*m**3 - m**2 + m - 1. Let h(a) = 2*a**2 + a. Let p be h(-1). Let l be v(p). Which is smaller: l or -4? l Let t = -2 - -3. Let j be -2 - (-1)/t*1. Is 0 less than j? False Let h be 2 + (-7 - -2 - -1). Is h bigger than 3? False Let o(k) = -k**2 - 10*k - 17. Let t be o(-7). Is 0 equal to t? False Let p be 6/(-4)*(-8)/3. Suppose 0*y = p*y - 16. Which is bigger: 3 or y? y Let s = -206371336/329 + 627268. Let u = 10/47 + s. Which is greater: u or 0? 0 Suppose 4 = -i - 4. Let v = i + 8. Let p be (2/3)/((-12)/(-4)). Is v bigger than p? False Let w = -56 - -75.9. Let u = -21 + w. Is -2/7 less than u? False Let g = 17 + -67/4. Suppose 0 = -4*a + 2*a + 2. Do g and a have the same value? False Let k be -3*((-2)/(-3) - 0). Let z(l) = -l**2 + 18*l - 35. Let v be z(16). Which is bigger: k or v? k Let m be (3 - (4 - -1))/(1/10). Is m greater than -19? False Suppose 4*p + 2*p - 6 = 0. Is -2/25 equal to p? False Let w be (0 + 6)*2/(-2). Which is smaller: -8 or w? -8 Let b = -25 - -26. Is 2/133 less than b? True Let d = -0.3 - -0.4. Suppose v - 5*z - 132 = 0, -v + 5*z = 2*z - 124. Let l be 76/v - (-1)/(-4). Are l and d equal? False Let v = 1 + -11. Let i be v/4*1/(-10). Let h = 23 - 23. Do h and i have the same value? False Let p be (((-30)/(-8))/(-5))/3. Let a(d) be the second derivative of -d**3/6 + 7*d**2/2 + d. Let u be a(8). Which is smaller: u or p? u Let z = -5955.281 - -5958. Let h = z - 0.019. Let d = h - 3. Which is bigger: d or 1/5? 1/5 Let y be ((-2)/8)/1 + 7/44. Which is bigger: -1 or y? y Let r = 997/74 - -1/37. Let d = 13 - r. Suppose -14 = 4*q - 6. Are d and q unequal? True Let o(h) = 2*h**2 - 2 - 3*h**2 - 1 + 0*h**2. Let j be o(0). Which is smaller: -2 or j? j Suppose -5*b + 267 = -4*n, -5*n + 3*b = -63 + 413. Which is bigger: -74 or n? n Let k(s) = 6*s - 2. Let d = -2 - -4. Let f be k(d). Let i be (-2 + 24/f)*-5. Is i < -1? True Let q(z) = -z - 6. Let g be q(-6). Suppose g = -2*h - 0 - 2. Let k be ((-4)/(-6))/(1*-1). Which is smaller: k or h? h Suppose -20*o - 2 = -18*o. Which is greater: o or 1/18? 1/18 Suppose 0*h + 5 = h. Suppose 3 = n - 5*x - 0, -4*n = h*x - 12. Suppose -v + 3*c = 0, 4*c - 1 = v - 0*v. Is n at most as big as v? True Let l = -2 + 5/2. Let y(t) be the third derivative of -t**4/24 + t**3/3 - 2*t**2. Let c be y(2). Which is smaller: l or c? c Suppose -5*v - 6 = -4*v. Is v < -3? True Let x(v) = v**2 - 4*v - 1. Let y = 3 - -4. Let g be (y + 3 - 2)/2. Let w be x(g). Which is bigger: w or 1? 1 Let v be -1 - (-4 + 6/3). Suppose 0 = o - 5*x + 2, -4*x + 3*x = -v. Let l(c) = c. Let d be l(0). Do o and d have the same value? False Let g = 3.3 + -0.3. Let p = 0.188 + -0.088. Which is smaller: g or p? p Let t = -32 - -28. Do t and -3 have different values? True Suppose 15 = 2*o - 5*d, d + 3 = -0*o - o. Let c = 1 - o. Let v be (-9)/12*c/(-3). Which is greater: v or 1? 1 Let v = 21 + 30. Let l be v + 0/3 + 3. Let q be ((-12)/l)/((-4)/(-6)). Which is smaller: q or 0? q Suppose 0 = 4*u - 4, -f + 4*u - 2*u - 2 = 0. Let x(j) = -2*j**3 - j**2 + 2*j + 2. Let a be x(-2). Suppose -4 + a = -w. Are f and w nonequal? True Let o = -4.7 - -5. Let l = o - 0.2. Let i = -2.96 - 0.04. Is i <= l? True Let t = -60 - -18. Let x = t - -251/6. Are x and -1 equal? False Let x be ((-5)/3 + 3)/(4/240). Is x >= 80? True Let k = 67 - 67.27. Let d = k - -0.23. Is d <= -2? False Suppose i - 110 = 6*i. Is i less than or equal to -22? True Let q = 38 - 37. Is 10/21 less than or equal to q? True Suppose 10 + 2 = -4*x. Which is smaller: -12/5 or x? x Let i = 4 - 1. Let f = 2 - i. Which is bigger: f or 3? 3 Suppose 4*w + 8 = -52. Let c be (-2)/(-3) - (-40)/w. Let k be -1*(2/(-1) + 5). Do c and k have the same value? False Let a(i) = -i + 2. Let l be a(-3). Suppose b = g, 4*b = -l*g + 6*g + 12. Suppose -g*v = 3*j + 7, 2*v + 8 = -5*j - v. Which is smaller: j or 2/5? j Suppose -6*p + 2*p - 4*a - 16 = 0, -3*a - 7 = -2*p. Let q(u) = -153*u - 2. Let t be q(2). Let x be (-4)/(-14) + 32/t. Which is smaller: x or p? p Let b = -0.2 - -3.2. Which is bigger: b or 2? b Let n be 7/(-15) - 1/(-3). Is -2/3 != n? True Suppose 6 - 4 = 2*c. Is -5 < c? True Suppose -11 = 4*t + 5. Let b be ((-2)/t)/((-3)/(-24)). Suppose -9 = -3*w - 3*z, -z + 28 = -b*w + 3*z. Which is smaller: w or -1/3? w Let w = 0.02 + -0.22. Is w equal to -1/2? False Let f(h) = h**2 - 7*h - 4. Let s be f(5). Let g = s - -13. Which is smaller: g or -8/11? g Suppose -2 - 2 = -j. Let n be 37/(-18) - (-2)/j. Is -1 < n? False Let h = 113 + -122.2. Let r = h + 9. Is -0.3 greater than r? False Let p(s) = -s**3 - 3*s**2 - 2*s - 1. Let j be p(-3). Suppose 0 = 5*d - 3*i - 17, -7*d + 2*d + 25 = 5*i. Which is greater: d or j? j Let a(l) = l - 5. Let i be a(4). Suppose c + 4*f = 8, 0 = -0*c + c + 3*f - 5. Let h be (-1)/2*c/(-6). Is i not equal to h? True Suppose 0*i + 8 = 2*i. Suppose v - 10 = -i*v. Suppose -o = v*o + 3. Do o and -3/4 have the same value? False Let d = 222 + -2440/11. Which is bigger: -7 or d? d Suppose 3*r - 4*r = -1. Is r greater than -2/7? True Let o be 4/(-18) - (-8)/36. Suppose -4*c = 3*w - 2*w + 7, o = -c - w - 4. Which is greater: -2/11 or c? -2/11 Let h(b) = b + 2. Let u be h(-3). Are u and 30 non-equal? True Let o be 28/(-16) + 2/(-8). Suppose -3*h + 2 = 2*x, 6*h + 2 = -2*x + h. Suppose -2*u = 2, a - 3*u - u = x. Which is smaller: o or a? o Let n = 4/63 - -2/9. Let g be (-23)/(-4) - (-2)/8. Let d = g - 5. Is d at least as big as n? True Suppose -2*i + 0 + 4 = 0. Let q(l) = -4 - 3*l + 2*l - 3. Let s be q(-10). Which is bigger: i or s? s Let i = 0.3 - -0.7. Let r = 103 - 720/7. Does r = i? False Suppose 0 = 5*v - 3*v - 74. Are v and 37 unequal? False Suppose 5*s + 2*v + 23 = -2*v, -2*v = -4*s - 8. Let g = -46 + 44. Which is greater: g or s? g Suppose -4*j - 3*d - d + 16 = 0, 5*j = -4*d + 23. Let x = 7 - j. Suppose -4*r = r. Is x equal to r? True Suppose 11 = -15*r + 11. Which is smaller: r or 1/45? r Suppose 0*n - 5 = -n. Suppose 4*u + 1 - n = c, 5*u - 18 = -2*c. Which is smaller: u or -3/7? -3/7 Let q = 28 - 35. Which is bigger: q or -32/5? -32/5 Let c be 2/7 - (-76)/(-364). Suppose -5*l + 2*l = 0. Is l less than or equal to c? True Let r be 3*2/4*-2. Let h = r + 5. Suppose 0 = -d - 1 + 3. Is h less than d? False Let m = -4 + 2. Let b be (-463)/(-792) + (-6)/(-27). Let u = b - 5/8. Which is smaller: u or m? m Let g be (-8)/(-6)*(-265)/(-20). Let m = g - 49/3. Are 0 and m non-equal? True Let a(m) = -4*m + 1. Let l be a(1). Let v = -31 + 26. Let j = v - l. Which is smaller: j or -5/2? -5/2 Let h = -0.2 - -10.2. Let m = h + -10.1. Let u = -5 - -9. Is m less than or equal to u? True Let l = -0.06 - 6.94. Let k = 6.8 + l. Which is smaller: 2/5 or k? k Let g = -14 - -16. Let m = 0 + 2. Is m at most as big as g? True Let r = -381/13 - -29. Suppose o - 3 = -2*s + 3*s, 3*s + 5*o = 23. Which is smaller: r or s? r Let n be 55/(-4) - 1/4. Let v be n + (0/2)/1. Let h be v/49 - (-9)/7. Whic
// generated by gocc; DO NOT EDIT. package parser import "github.com/mperham/inspeqtor/jobs/ast" type ( //TODO: change type and variable names to be consistent with other tables ProdTab [numProductions]ProdTabEntry ProdTabEntry struct { String string Id string NTType int Index int NumSymbols int ReduceFunc func([]Attrib) (Attrib, error) } Attrib interface { } ) var productionsTable = ProdTab{ ProdTabEntry{ String: `S' : Check << >>`, Id: "S'", NTType: 0, Index: 0, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[0], nil }, }, ProdTabEntry{ String: `Check : Preamble Checktype ParameterList JobList << ast.NewJobCheck(X[3], X[2]), nil >>`, Id: "Check", NTType: 1, Index: 1, NumSymbols: 4, ReduceFunc: func(X []Attrib) (Attrib, error) { return ast.NewJobCheck(X[3], X[2]), nil }, }, ProdTabEntry{ String: `Check : Preamble Checktype JobList << ast.NewJobCheck(X[2], map[string]string{}), nil >>`, Id: "Check", NTType: 1, Index: 2, NumSymbols: 3, ReduceFunc: func(X []Attrib) (Attrib, error) { return ast.NewJobCheck(X[2], map[string]string{}), nil }, }, ProdTabEntry{ String: `Preamble : "check" << X[0], nil >>`, Id: "Preamble", NTType: 2, Index: 3, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[0], nil }, }, ProdTabEntry{ String: `Checktype : "jobs" << X[0], nil >>`, Id: "Checktype", NTType: 3, Index: 4, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[0], nil }, }, ProdTabEntry{ String: `ParameterList : "with" Parameters << X[1], nil >>`, Id: "ParameterList", NTType: 4, Index: 5, NumSymbols: 2, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[1], nil }, }, ProdTabEntry{ String: `Parameters : name name "," Parameters << ast.AddParam(X[0], X[1], X[3]) >>`, Id: "Parameters", NTType: 5, Index: 6, NumSymbols: 4, ReduceFunc: func(X []Attrib) (Attrib, error) { return ast.AddParam(X[0], X[1], X[3]) }, }, ProdTabEntry{ String: `Parameters : name name << ast.AddParam(X[0], X[1], nil) >>`, Id: "Parameters", NTType: 5, Index: 7, NumSymbols: 2, ReduceFunc: func(X []Attrib) (Attrib, error) { return ast.AddParam(X[0], X[1], nil) }, }, ProdTabEntry{ String: `IntAmount : name << ast.ToInt64(X[0]) >>`, Id: "IntAmount", NTType: 6, Index: 8, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return ast.ToInt64(X[0]) }, }, ProdTabEntry{ String: `Period : "hour" << X[0], nil >>`, Id: "Period", NTType: 7, Index: 9, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[0], nil }, }, ProdTabEntry{ String: `Period : "hours" << X[0], nil >>`, Id: "Period", NTType: 7, Index: 10, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[0], nil }, }, ProdTabEntry{ String: `Period : "minute" << X[0], nil >>`, Id: "Period", NTType: 7, Index: 11, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[0], nil }, }, ProdTabEntry{ String: `Period : "minutes" << X[0], nil >>`, Id: "Period", NTType: 7, Index: 12, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[0], nil }, }, ProdTabEntry{ String: `Period : "day" << X[0], nil >>`, Id: "Period", NTType: 7, Index: 13, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[0], nil }, }, ProdTabEntry{ String: `Period : "days" << X[0], nil >>`, Id: "Period", NTType: 7, Index: 14, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return X[0], nil }, }, ProdTabEntry{ String: `Job : name "happens" "every" IntAmount Period << ast.NewJob(X[0], X[3], X[4]), nil >>`, Id: "Job", NTType: 8, Index: 15, NumSymbols: 5, ReduceFunc: func(X []Attrib) (Attrib, error) { return ast.NewJob(X[0], X[3], X[4]), nil }, }, ProdTabEntry{ String: `Job : name "happens" "every" Period << ast.NewJob(X[0], int64(1), X[3]), nil >>`, Id: "Job", NTType: 8, Index: 16, NumSymbols: 4, ReduceFunc: func(X []Attrib) (Attrib, error) { return ast.NewJob(X[0], int64(1), X[3]), nil }, }, ProdTabEntry{ String: `JobList : Job << ast.NewJobList(X[0]), nil >>`, Id: "JobList", NTType: 9, Index: 17, NumSymbols: 1, ReduceFunc: func(X []Attrib) (Attrib, error) { return ast.NewJobList(X[0]), nil }, }, ProdTabEntry{ String: `JobList : JobList Job << ast.AppendJob(X[0], X[1]), nil >>`, Id: "JobList", NTType: 9, Index: 18, NumSymbols: 2, ReduceFunc: func(X []Attrib) (Attrib, error) { return ast.AppendJob(X[0], X[1]), nil }, }, }
Predicting cattle age from eye lens weight and nitrogen content, dentition, and United States Department of Agriculture maturity score. This research explores the relationship between generally accepted and alternative cattle age-prediction methods and chronological age. Cattle (n = 386) of documented ages ranging from 370 to 1,115 d of age were used. Dentition (DEN), USDA maturity score (MS), lens weight (LW), and lens total N (LN) content were used as possible predictors of age. Correlations with age were determined: LW (r = 0.77); DEN (r = 0.74); LN (r = 0.71); and MS (r = 0.64). Stepwise backward regression was used to generate an age prediction equation: Age (mo) = -21.79 + 17.23(LW, g) + 0.038(DEN). By this equation, 38% of cattle </= 20 mo of age were verified as </= 20 mo of age. Independent measures verified the following percentages of cattle as </= 20 mo of age: LW (20.2%), MS (11.0%), DEN (9.6%), and LN (8.7%). The DEN verified that 87.6% were verified as <30 mo old, and LW verified 81.6% of cattle as <30 mo old. A separate group of cattle (n = 18) ranging in age from 1 to 12 yr were evaluated for lens properties, for which LW (R(2) = 0.91) and LN (R(2) = 0.92) were highly correlated with age. The LW and DEN were the best predictors of age for cattle 13- to 37-mo-old and yielded the most accurate age prediction when used in combination (R(2) = 0.67).
/* LAYOUT: Three-Column DESCRIPTION: Three-column 950px fixed layout with two sidebars on either side of content */ body { min-width:960px; } #header { position:relative; } #branding { width:940px; margin:0 auto; } #access { position:relative; overflow:hidden; } .menu { width:940px; margin:0 auto; } #main { width:960px; margin:0 auto; overflow:hidden; position:relative; } #container { width:940px; float:left; margin:0 0 0 10px; } #content { margin: 0 240px; overflow:hidden; } #primary { width:220px; float:left; margin: 0 0 0 -940px; } * html #primary { left: 20px; position: relative; } #secondary { width:220px; float:left; margin: 0 0 0 -220px; } #footer { clear:both; } #subsidiary { width:960px; margin:0 auto; overflow:hidden; } #subsidiary .aside { width:300px; float:left; margin:0 10px 0 10px; } #subsidiary #third { margin:0 0 0 10px; } #siteinfo { clear:both; width:940px; margin:0 auto; }
'Khloe & Lamar' recap: Season 2 premiere, part 2 E! You guess which one plays basketball. You guess which one plays basketball. (E!) Maria Parson Part two of the season opener kicks off with a discussion about Malika’s boyfriend, Adrian Wilson, a player for the Arizona Cardinals. We try to figure out whether Rob (or the rest of the Free World) actually cares about this situation. The jury is still out on that for now. Also, we also see Lamar dealing with insomnia, brought on by the NBA lockout … still getting no specifics about the move to Dallas. Later on, Khloe and Malika go on a walk and discuss the potential “baby mama drama” situation. Malika accuses Khloe of judging her for being in a relationship with a married man who has children. What nerve?! In retort, Khloe only points out that Malika always said that he would never put herself into such a situation. Even still, Malika storms away and recaps the situation with her twin sister. Malika later flies to Arizona to visit Adrian, who explains that they should just focus on their relationship with each other. Even though he seals it with a kiss, Malika isn’t convinced. She explains her guilt and tells us that she is very concerned about “how his children may feel” — perhaps for the cameras in case the relationship doesn’t work out? Just throwing that out there. Back in Los Angeles, Khloe tries to slip some melatonin into Lamar’s drink, to help him fall asleep. His late-night antics of eating snacks and playing video games in the wee hours of the morning have to stop. Kim Kardashian even chimes in to provide some much-needed relationship advice. Let’s all listen up! After Khloe is unable to stop yawning at an all-day photo shoot, Kim tells Khloe that Lamar’s insomnia is getting “out of hand.” In an attempt to control the situation, Khloe tries to give Lamar a cup of hot tea that could potentially lull him to sleep. However, Lamar wants no parts of these sleeping aids or potential “roofies” as he calls them, fearing an impromptu trip to Thailand resulting in a tattoo on his face. I hear ya, Lamar – I’d take the same precautions! At the end of the episode, Malika confides in Khloe and tells her she broke up with Adrian. Told ya so! Khloe is proud of her friend, and the two are still besties. Lamar’s insomnia continues for the moment, but he lets Khloe sleep and calls his friend, Jamie, over for some video game action. In the end, we still hear no word of Lamar’s move to Dallas, aside from a few teasers based on future episodes. It looks as though we’ll just have to keep tuning in to get the full scoop!
Community Fire Cadets is a two year programme aimed at 14 to 17-year-olds who live in Greater Manchester. The programme offers young people an opportunity to learn basic firefighting skills while working towards both accredited and non-accredited qualifications. In addition to the qualifications, it is also a fantastic opportunity to meet new people, improve social skills, experience working as a team and improve all-round confidence. We have cadet units located in a number of fire stations with uniformed and non-uniformed instructors who deliver the syllabus which is set out in modules and divided into topics making it more accessible to all styles of learning. Young people will then have the opportunity to stay on with a cadet unit and become a Junior Instructor, with the further opportunity to become a Volunteer Instructor after the age of 18 years old.
Identification of the mutations in the tissue-nonspecific alkaline phosphatase gene in two Chinese families with hypophosphatasia. Hypophosphatasia is a genetic disorder characterized by defective bone and tooth mineralization and a deficiency of serum and bone alkaline phosphatase activity. To date, few studies have identified gene mutations in Chinese patients with hypophosphatasia. We sought to characterize the clinical manifestations and identify the mutations associated with the disease in Chinese hypophosphatasia patients. All 12 exons and the exon-intron boundaries of the ALPL gene were amplified and directly sequenced in two probands from unrelated Chinese families. The mutation sites were identified in other unaffected members of these two families and 100 healthy controls. In family 1, the proband displayed one novel splice site mutation, c.298-1G>A, which consisted of a homozygous G>A transition at nucleotide 298-1 in intron 4. The proband's mother displayed the heterozygous G/A ALPL gene mutation, but her father was identified as G/G homozygous. A paternity test ruled out false paternity and therefore confirmed that this splicing mutation occurred de novo either in the paternal germline or in the early development of the patient. In family 2, the proband revealed a novel missense mutation (c.1271T>C) in exon 11, which resulted in p.Val424Ala in the mature ALPL polypeptide. Furthermore, c.298-1G>A and c.1271T>C mutations were not found in unaffected family members of these two Chinese families and 100 unrelated controls. Our study shows that the novel de novo splicing mutation c.298-1G>A in intron 4 and the missense mutation c.1271T>C in exon 11 of the ALPL gene are responsible for hypophosphatasia in some Chinese patients.
Never Miss A Story. Daily Edition Last calls for Fox's 'Bells,' CW's 'Heaven' Empty It's a wrap for "7th Heaven" and David E. Kelley's midseason dramedy "The Wedding Bells." "Heaven," which debuted in 1996 on WB Network and now airs on the CW, will have its series finale May 13 in its regular 8 p.m. slot. Meanwhile, production will be shut down on "Bells" after completion of the seventh episode. After receiving decent sampling in its premiere behind "Idol," "Bells" quickly faded when it moved into its regular Friday time slot, most recently drawing 4.5 million viewers and a 1.5 rating/5 share among adults 18-49. "While we've been pleased with the show creatively, and David's writing was first-rate, ('Bells') just didn't secure the ratings we'd hoped for," Fox said. Four episodes of "Bells" have aired. For now, the network said it intends to air the remaining three segments. The hourlong final episode of "Heaven," titled "And Away We Go," will mark the second time the show was scheduled to have a series finale. "Heaven's" 10th-season finale aired on WB in May amid much fanfare about it being the series closer, delivering its highest marks in more than two years with an episode that appeared to wrap up many loose ends in the show about a minister (Stephen Collins) and his sprawling family. But the CW, which launched in September after the merger of WB and UPN, gave "Heaven" a last-minute renewal in May, announcing that the show would return in fall 2006 in its signature 8 p.m. Monday slot as part of the CW's inaugural lineup. In October, the network switched its Sunday and Monday lineups, moving "Heaven" to 8 p.m. Sunday. Season-to-date, the series is averaging 3.4 million total viewers and a 1.3 rating in the network's target demo of adults 18-34. "Heaven," whose debut on Aug. 26, 1996, marked the first-ever Monday broadcast of the then-fledging WB, will bow out as the longest-running family drama on television. "Heaven" was created by Brenda Hampton, who also serves as executive producer along with Chris Olsen and Jeff Olsen. The series is produced by CBS Paramount Network Television in association with Spelling Television.
Red panda missing from Washington zoo is found Meta Pettus | WUSA-TV, Washington, D.C. Show Caption Hide Caption Raw Video: Red panda recovered after escaping from zoo Rusty the red panda was found Monday after spending most of the day on the loose, the Smithsonian's National Zoo tweeted. Rusty the red panda will be 1 year old in July He was released into the red panda exhibit about 3 weeks ago The zoo is hoping that Rusty and an older female red panda eventually will mate WASHINGTON — Rusty the red panda has been found after spending most of the day on the loose, the Smithsonian's National Zoo tweeted Monday. Zoo workers had been searching for him since 8 this morning, when he was reported missing from his enclosure. He had been seen previously at 6 p.m. Sunday. The tweet did not say where Rusty was found; however, a woman Monday afternoon tweeted a photo from the Adams Morgan neighborhood adjacent to the zoo of what appeared to be a red panda. "Red panda in our neighborhood!" @AshleyFoughty tweeted. "Please come save him! @nationalzoo1 pic.twitter.com/llQF7P9QH5" Earlier, the zoo had tweeted, "Red pandas typically spend the warm daytime hours resting, so it's likely Rusty is somewhere in or near the zoo hiding in a tree." As of about 4 p.m. Monday, Rusty was back at National Zoo getting some water and a checkup from the veterinarians there, zoo officials tweeted. Rusty, who will be 1 year old in July, is a new addition to the Smithsonian's National Zoo, according to the zoo's website. He arrived at the zoo from the Lincoln Children's Zoo in Nebraska. After a 30-day quarantine and introduction to the National Zoo's resident red panda, Shama, Rusty was released into the red panda exhibit on the zoo's Asia Trail in early June. Officials are hoping that Shama and Rusty will mate one day. "The introduction between Rusty and Shama went smoothly, just as keepers expected. Rusty approached Shama curiously and Shama postured so Rusty would know she was in charge," zoo officials said earlier this month. "On the second day keepers saw the pair sharing space and even spied Shama grooming Rusty." Red pandas, which are an endangered species, are distantly related to the black and white giant pandas. Red pandas typically grow to the size of a house cat — between 7 and 14 pounds — and have a tail reminiscent of a raccoon, according to National Geographic and the zoo's fact sheet. Like giant pandas, they like to eat bamboo, berries, blossoms and bird eggs. Red pandas live in the mountains of Nepal; northern Myanmar, also known as Burma; and central China, spending most of their lives including sleeping in trees. They are most active at night. Fewer than 10,000 adult red pandas remain in the world, according to the National Zoo.
Some think it all comes down to fate and circumstance Life falls somewhere between accident and chance Some seek solutions to the problems they face By hoping maybe someday, somehow it will fall in place Still something is missing CHORUS Without the love of Jesus The stars wouldn't shine Rivers wouldn't run And hearts beat out of time Without the love of Jesus Tell me where would we be? Lost on a lonely sea Without the love of Jesus There's so much more to life than meets the naked eye It's no coincidence, no matter how we try When we try to deny what we don't understand Maybe that's when we fail to see God's providential hand We keep persisting Still something is missing REPEAT CHORUS It shouldn't take us a miracle Before we finally see That Jesus' love is the only thing That we will ever need
Q: Invalid Api key using RestServer I am using the codeigniter rest server api library. When I enter http://localhost/projects/myapi/key/index_put.php and hit enter gives me the following error: <xml> <status>0</status> <error>Invalid API Key</error> </xml> When I give a dummy string in the url, like: http://localhost/projects/myapi/key/index_put.php?X-API-KEY=asldfj9alsdjflja97979797997 I get the same problem. Any idea? index_put.php: public function index_put() { // Build a new key $key = self::_generate_key(); // If no key level provided, give them a rubbish one $level = $this->put('level') ? $this->put('level') : 1; $ignore_limits = $this->put('ignore_limits') ? $this->put('ignore_limits') : 1; // Insert the new key if (self::_insert_key($key, array('level' => $level, 'ignore_limits' => $ignore_limits))) { $this->response(array('status' => 1, 'key' => $key), 201); // 201 = Created } else { $this->response(array('status' => 0, 'error' => 'Could not save the key.'), 500); // 500 = Internal Server Error } } A: i faced the same issue .don't mention put/get/post in URL ,RestServer itself recognizes the request nature base on parameter you pass two step required to solve your problem . 1st Step : http://localhost/projects/myapi/key/index_put.php must change to : http://localhost/projects/myapi/key/index.php 2nd step: create an api kay using sha1(max 40 character) in the keys table (table structure show in config/rest.php file), enter 1 in is_private_key field and ::1 in ip_address field. create the record ,and check it again .
Paramount Fitness Shoulder Press The Paramount Shoulder Press Model 1000 provides a great way to work your shoulders, and triceps while eliminating the need for a spotter. The bench press has long been recognized as a top shelf exercise for adding upper body mass and strength.
--- abstract: 'We investigate the relationship between black hole mass, , and host galaxy velocity dispersion, , for QSOs in Data Release 3 of the Sloan Digital Sky Survey. We derive  from the broad  line width and continuum luminosity, and the bulge stellar velocity dispersion from the  narrow line width (). At higher redshifts, we use  and  in place of  and . For redshifts $z < 0.5$, our results agree with the  relationship for nearby galaxies. For $0.5 < z < 1.2$, the  relationship appears to show evolution with redshift in the sense that the bulges are too small for their black holes. However, we find that part of this apparent trend can be attributed to observational biases, including a Malmquist bias involving the QSO luminosity. Accounting for these biases, we find $\sim0.2$ dex evolution in the  relationship between now and redshift $z \approx 1.$' author: - 'S. Salviander, G. A. Shields, and K. Gebhardt' - 'E.W. Bonning' title: 'The Black Hole Mass - Galaxy Bulge Relationship for QSOs in the SDSS DR3' --- Introduction ============ In the nucleus of nearly every local galactic bulge lies a supermassive black hole, the relic of previous active galactic nucleus (AGN) activity (see review by Kormendy & Gebhardt 2001). The mass  correlates with bulge luminosity (Magorrian et al. 1998) and stellar velocity dispersion,  (Gebhardt et al. 2000a; Ferrarese & Merritt 2000). This relationship, established for nearby galaxies with $10^6-10^9$  black holes, is given by Tremaine et al. (2002) as $$\label{e:tremaine} \mbh = (10^{8.13}~\msun)(\sigstar/200~\kmps)^{4.02}.$$ The cause of this tight relationship is not well understood. A popular class of models envisions that black hole growth and star formation proceed simultaneously, obscured by surrounding gas until the black hole becomes massive enough to support a luminosity capable of blowing away the fueling gas and halting star formation (Silk & Rees 1998, Fabian 1999; King 2003). Di Matteo et al. (2005) perform numerical simulations in which energy deposition from the luminosity of the quasi-stellar object (QSO) leads to ejection of residual gas, simultaneously shutting down black hole growth and star formation. With a simple assumption about the heating efficiency, they achieve a tight  relationship. This relationship can also be reproduced by momentum-driven outflow (Murray et al. 2005). Begelman & Nath (2005) argue that details of the accretion flow near the hole may be important for the  relationship. Study of the  relationship for quasars with large look-back times should give information about the comparative evolution of black holes and their host galaxies. This involves measuring the mass of the black hole and the mass (or velocity dispersion) of the host galaxy as a function of cosmic time. Shields et al. (2003, hereafter “S03”) use  $\equiv$ FWHM()$/2.35$, together with  derived from the width of the broad  emission line, to investigate the relationship in QSOs to a redshift of $z = 3.3$. They define the “ mass” to be the black hole mass calculated using Equation \[e:tremaine\] with  in place of . They find good agreement in the mean with the measured , which suggests little change in the  relationship since redshifts $z$ = 2 to 3. However, S03 had few objects at high $z$ and none in the redshift range $0.33 < z < 1.1$. In this paper, we extend the work of S03 using the Sloan Digital Sky Survey Data Release 3 (SDSS DR3; Abazajian et al. 2005). The  lines remain in the SDSS spectral window up to $z \sim 0.8$. For higher redshifts, out to redshift of $z \sim1.2$, we use  $\lambda 3727$ for  and  $\lambda 2798$ in place of . We examine the use of  and  as surrogates for , including the effects of emission-line asymmetry, [Fe [ii]{}]{} emission, and radio luminosity on the  and  widths. All values of luminosity used in this study are calculated using the cosmological parameters $\hnot = 70~\kmpspmpc, \Omega_{\rm M} = 0.3$, and $\Omega_{\Lambda} = 0.7$. Methodology =========== Deriving Black Hole Masses {#s:mbh} -------------------------- The method for calculating black hole masses is summarized in S03. If the BLR gas orbits the black hole, then $\mbh = v^2R/G$. The appropriate velocity is parametrized as $v = f \times$ FWHM, where FWHM is the full width at half maximum of the broad line used, and $f$ depends on the geometry and kinematics assumed for the BLR (McLure & Dunlop 2001). Some authors assume $f = \sqrt3/2$ for random orbits (Netzer 1990). The BLR radius, derived from echo mapping studies, increases as a function of the continuum luminosity, $R \propto L^{\gamma}$ with $\gamma = 0.5 - 0.7$ (Wandel et al. 1999; Kaspi et al. 2000; Kaspi et al. 2005). Kaspi et al. (2005) find that $\gamma = 0.67$ for the optical continuum, while McLure & Jarvis (2002) find $\gamma = 0.61$. Simple assumptions involving photoionization physics suggest $\gamma = 0.5$ (S03). Bentz et al. (2006) find $\gamma = 0.52\pm0.04$ after correcting the sample of Kaspi et al. (2005) for host galaxy contamination. The name “photoionization mass” for this method is used regardless of the $\gamma$ assumed. The difference between these slopes is not critical for our study, as discussed below. We adopt S03’s formula $$\label{e:mbh} \mbh = (10^{7.69}~\msun)v_{3000}^2 L_{44}^{0.5},$$ where $v_{3000} \equiv$ FWHM()/3000  and the BLR continuum luminosity at 5100 Å is $L_{44} \equiv \nuLnu /(10^{44}~\ergps)$. For higher redshift objects where the 5100 Å continuum is redshifted out of the spectral window, we measure the continuum luminosity at 4000 Å and scale it to 5100 Å by assuming a power law function fitted by Vanden Berk et al. (2001) for SDSS quasar composite spectra, $\fnu \propto \nu^{\alpha_\nu}$ with $\alpha_\nu = -0.44\pm0.1$. The uncertainty has only a $\sim 1\%$ affect on the derived  when  is inferred from the flux at $\lambda4000$. The adopted mass formula (S03) is based on the $\gamma = 0.5$ fit in Figure 6 of Kaspi et al. (2000) and $f = \sqrt3/2$. Onken et al. (2004) obtain a calibration of the black hole mass formula by forcing agreement with the  relationship for Seyfert galaxies. This calibration corresponds to $f^2 = 1.4$, giving masses a factor 1.8 larger than $f^2 = 0.75$. On the other hand, Figure 2 of Kaspi et al. (2005) gives radii a factor 1.8 smaller at $L_{44} = 1$ than in Kaspi et al. (2000) (adjusted for cosmology), which reduces the mass by this factor. Thus, our adopted formula corresponds closely to using the Kaspi et al. (2005) radii and the Onken et al. value of $f$. The recommended fit of Bentz et al. (2006), together with $f = \sqrt3/2$, gives  larger by 0.10 dex than Equation \[e:mbh\]. This constant offset has no effect on the redshift dependence examined here. Surrogates for Bulge Velocity Dispersion {#s:sigma} ---------------------------------------- The velocity dispersion  for host galaxy bulges of AGNs is often difficult to measure because of the luminosity of the active nucleus, and there is interest in possible surrogates for . Nelson & Whittle (1996) show that  in Seyfert galaxies is closely correlated with the width of  $\lambda5007$. Nelson (2000) uses  = FWHM()$/2.35$ as a surrogate for  in the relationship and finds a ($1\sigma$) dispersion of 0.2 dex. If this dispersion represents a real scatter in the relationship, it indicates secondary influences on the width of . The width of  may be affected by outflow (Wilson & Heckman 1985; Whittle 1992; Nelson & Whittle), as evidenced by the frequent presence of blue wings on the emission line. Greene & Ho (2005) find, for a sample of SDSS narrow line AGN with measured , that  is affected by a blue wing more that  and . However, Bonning et al. (2005) examined  widths in PG QSOs with measured host galaxy luminosity and find that  widths agree well in the mean with the  expected on the basis of the Faber-Jackson relation, with a dispersion of 0.13 dex in .  emission is often blueshifted with respect to lower-ionization lines, such as , which show no average blueshift (or redshift) (Boroson 2005) and as such may be more suitable surrogates for .\ Sample and Measurements ======================= The QSOs in this study were drawn from the SDSS DR3; spectra for all DR3 objects spectroscopically identified by the survey as QSOs within the relevant redshift range were downloaded from the DR3 Catalog Archive Server[^1]. The Sloan Digital Sky Survey is designed to map one-quarter of the sky (Stoughton et al. 2002). All data are collected with the 2.5-m telescope at the Apache Point Observatory. The SDSS DR3 covers a spectroscopic area of 1360 sq. deg. and contains spectroscopic data for 45,260 QSOs at $z < 2.3$ and an additional 5,767 “hi-$z$” QSOs at $z > 2.3$. Photometric data are collected in five different colors, $u, g, r, i,$ and $z$, where $g$ is roughly equivalent to $V$ in the Johnson magnitude system. The target magnitude limit for QSOs is PSF $i < 20.2$. The spectral resolution, $R = 1850$ for the blue channel ($\lambda\lambda$3800 – 6000) and 2200 for the red channel ($\lambda\lambda$6000 – 9200), which corresponds to a resolution of 162  and 136  for blue and red, respectively. The spectra are sky subtracted and corrected for telluric absorption features, though some strong night emission lines can persist at $\lambda$5577, $\lambda$6300, and $\lambda$6363 and in the infrared. We corrected the spectra for galactic extinction following Schlegel et al. (1998) and O’Donnell (1994). Spectrum Measurements {#s:model} --------------------- Spectrum measurements involved (1) subtracting the optical and ultraviolet Fe II emission blends using empirical templates, (2) fitting the emission lines of interest and measuring the continuum at suitable wavelengths with an automated procedure, and (3) subtracting the instrumental width in quadrature from FWHMs for the lines. An algorithm originally developed by one of the authors (K.G.) to measure stellar absorption features was modified to process the SDSS spectra. The spectra are rebinned in wavelength scale from logarithmic to linear with 1.41 Å pixel$^{-1}$. The continuum flux is measured at $\lambda$4000 and $\lambda$5100, by taking the mean flux over a range of 30 pixels centered on the desired wavelength. Our choice of wavelengths was made in part to avoid strong emission lines. FWHMs were measured for , , the  $\lambda\lambda3726,3729$ doublet, and the  $\lambda\lambda2796,2803$ doublet using least squares fits of Gauss-Hermite functions. These are more suitable than pure Gaussians to model the often peaky cores and asymmetrical wings of AGN emission lines. The expression for a Gauss-Hermite function is $$\begin{aligned} F(x) & = & Ae^{-x^2/2\sigma^2}[1+h_3f_3(x)+h_4f_4(x)]\\ f_3(x) & = & \frac{1}{\sqrt6}(2\sqrt2x^3-3\sqrt2x)\\ f_4(x) & = & \frac{1}{\sqrt{24}}(4x^4-12x^2+3).\end{aligned}$$ Here $h_3$ is a measure of the asymmetrical deviation from a Gaussian profile ($h_3 < 0$ indicates a blue wing), and $h_4$ represents the symmetrical deviation from a Gaussian, or the “boxiness” of the profile (e.g. $h_4 > 0$ indicates a more peaky rather than boxy profile). The velocity dispersion $\sigma_{GH}$ in the Gauss-Hermite formalism is roughly equivalent to the second moment for the line profile. For a pure Gaussian profile, $\sigma_{GH}$ is exactly equal to the second moment. When the profile deviates from that of a Gaussian due to a blue wing, the $\sigma_{GH}$ of the fit will be smaller than the second moment by about 5% for a typical values (see below) of $h_3 = -0.1$ and 10% for a typical $h_4 = 0.1$ (Pinkney et al. 2003). See Van der Marel & Franx (1993) for further discussion. For this study, we take $\sigma \equiv$ FWHM/2.35, where FWHM is measured from the fits. For typical values of $h_3$, $\sigma_{GH}$ is larger than FWHM/2.35 by 0.05 dex. We examined the use of $\sigma_{GH}$ in the  relationship for QSOs in this study and found no improvement in the scatter. The reliability of the fitting program was verified by fitting artificial spectra with typical line parameters and noise levels. Objects were selected for use based on error criteria described in §\[s:select\], and all spectra of the selected objects were visually inspected for quality of fit and freedom from artifacts. The  doublet is rarely resolved in the SDSS spectra, and we took two approaches to measuring the deblended width. (1) The fitting program was used to fit the doublet with the above fitting parameters. We used a fixed intensity ratio $I(\lambda 3729)/I(\lambda3726) = 1.20$ in order to reduce the number of free parameters and the incidence of failed fits. This is based on our measurements of the average intensity ratio of the more widely spaced  6717/6731 doublet in 147 low redshift SDSS QSOs. The doublet ratios of  and  are similar (see Figure 5.3 of Osterbrock 1989). The uncertainty introduced by this approximation is unimportant for our purposes, based on fits of  in real and mock spectra using a realistic range of doublet ratios. The rms scatter of the  ratio is 0.1. (2) Because of the substantial number of failed fits, even for a fixed doublet ratio, we alternatively measured the width of the  doublet as a single line, which was more often successful. We then derived the intrinsic line width from a calibration curve based on modeling the doublet using two Gaussians over a wide range of widths, using a one-to-one intensity ratio. (Results differed insignificantly for other reasonable intensity ratios such as 1.2.) This procedure was found reliable in tests with simulated spectra; and results agreed for QSOs where both approaches gave successful fits. For our discussion of the  relationship below, we use the results of approach (2) in order to maximize the number of objects. For discussions of line shape parameters, we necessarily use the results of approach (1). Our profile fits often underestimated the peakiness of the  lines, resulting in fits that cropped off the peaky tops of the lines and produced stubbier profiles. Concern over the degree to which this might influence our results led us to measure the widths for 100 of these cropped lines directly using the ‘splot’ package in IRAF [^2]. Objects with profile fits that were within $\leq 10\%$ of the actual height of the  line showed an insignificant discrepancy between our original measurement and the ‘splot’ measurement. For cropping $> 10\%$ of the actual height of the  line, the discrepancy in FWHM was more significant, and we excluded these objects from our data sample. This resulted in the removal of $\sim 10$ % of the objects with otherwise successful measurements of . Approximately 40% of the excluded objects had asymmetrical  profiles. (See § \[s:uncert\] for further discussion.) ![image](f1a.eps){width=".45\textwidth"} ![image](f1b.eps){width=".45\textwidth"} ![image](f2.eps){width=".45\textwidth"} The profile of  was corrected for the narrow component by subtracting from it an assumed narrow  line ()with the profile and redshift of the $\lambda5007$ line but 10% of its flux. (The  $\lambda5007$/ intensity ratio typically is $\sim 10$ for QSOs; Baldwin, Phillips, and Terlevich 1981.) Gauss-Hermite functions model  adequately once this correction has been made, and in most cases a 10% subtraction was appropriate. We also implemented a 20% subtraction, or no subtraction at all, for visual comparison. Objects for which the 10% correction resulted in too little or too much narrow-component subtraction were removed from the sample if the fit to the broad component was affected. This was done for expedience in order to avoid adjusting the fit manually. Very few objects were rejected for over-subtraction of the narrow component, and approximately 14% of all the removed objects were rejected for having $/\hbeta_n\ \ll 10$ if this resulted in bad fit to the broad component. It is possible that removing objects on this basis introduces a bias to the sample, in that these objects tend to have low Eddington ratios. See §\[s:uncert\] for further discussion. Representative spectrum fits are shown in Figure \[f:specfits-ab\] and Figure \[f:specfits-c\]. [Fe [ii]{}]{} Subtraction {#s:feii} ------------------------- Significant difficulties in measuring properties of AGN spectra can arise from blended [Fe [ii]{}]{} emission lines in both the UV and optical (Boroson & Green 1992; Vestergaard & Wilkes 2001). We modeled [Fe [ii]{}]{} emission in the optical using a template from Marziani et al. (2003), generated from the spectrum of I Zw 1, an object with strong iron emission and relatively narrow “broad” emission lines. The template shows two broad blended features in the regions of $\lambda\lambda4450-4700$ and $\lambda\lambda5150-5350$ as well as three strong features in the region of  $\lambda\lambda4959,5007$ lines. Vestergaard & Wilkes present an empirical template for the region of $\lambda\lambda$1250 – 3090 using the ultraviolet spectrum of I Zw 1. We have reconstructed this template from their Figure 3 in the region of $\lambda\lambda$2180 – 3060. In the region $\lambda\lambda$2780 – 2830 centered on , the Vestergaard & Wilkes template is set to zero. For this region, we incorporate a theoretical [Fe [ii]{}]{} model of Sigut & Pradhan (2003) scaled to match the Vestergaard & Wilkes template at neighboring wavelengths. In a very few cases the [Fe [ii]{}]{} in the wings of  was too strong for reliable subtraction, and these objects were excluded from our data sample. Modeling of [Fe [ii]{}]{} emission for each of our spectra is carried out by first convolving the optical template with the FWHM of  and the UV template with the FWHM of , based on preliminary spectrum fits without [Fe [ii]{}]{} subtraction. Subtraction of the optical [Fe [ii]{}]{} was done by scaling and subtracting the template so as to give minimum deviation from a straight line between two 70 Å continuum bands straddling the $\lambda\lambda5150-5350$ [Fe [ii]{}]{} band. (If necessitated by the redshift, we instead used the $\lambda\lambda4450-4700$ [Fe [ii]{}]{} band.) Many of our QSOs had redshifts such that the short wavelength end of the ultraviolet [Fe [ii]{}]{} blend, which extends down to $\lambda2400$, was inaccessible. This made it difficult to fit the entire template to the spectrum or to determine the continuum slope precisely in this spectral region. Therefore, the [Fe [ii]{}]{} template was scaled and subtracted so as to bring the flux in the region $\lambda\lambda$2980 – 3020 into agreement with the observed flux in the region $\lambda\lambda$3020 – 3100, which is relatively devoid of [Fe [ii]{}]{} emission. We assumed an underlying power-law continuum $F_{\lambda} \propto \lambda^{-1.21}$ (Vanden Berk et al. 2001) to scale the flux to 3000 Å from 3060 Å. The model was subtracted from the spectra, and the continuum flux and emission line parameters were measured again. All fits were visually inspected following [Fe [ii]{}]{} subtraction and objects with failed subtractions were eliminated. We examined the sensitivity of the UV [Fe [ii]{}]{} subtraction to various details of our procedure. (1) Increasing the width of the Gaussian used to broaden the template by a factor 2 resulted in a typical change in FWHM() of $\pm1$ or 2%, and a mean decrease of 1%. This indicates that uncertainties in the [Fe [ii]{}]{} broad line width introduce insignificant errors. (2) Assuming a slope of $\flam \sim \lambda^{-1.56}$ (i.e., $\fnu \sim \nu^{-0.44}$) instead of $\lambda^{-1.21}$ to predict the flux at 2970 from flux at 3060 increases the flux at 2970 by 1.1%. This gave a mean decrease in the fitted  FWHM by 0.4% and an rms change of 0.8%. Thus, uncertainties in the continuum slope in the near ultraviolet, including typical object-to-object variations, have little effect on the post-subtraction width of . (3) We repeated our fits with the [Fe [ii]{}]{} template set to zero in the region $\lambda\lambda$2780 – 2830, rather than interpolating theoretical values as described above. This resulted in a mean increase in  FWHM of 1.3%, and an rms change of 2.2%. Although our procedure was insensitive to the details just described, the [Fe [ii]{}]{} subtraction in about 20% of the objects appeared to be imperfect, most often under-subtracted. This could result from noise or artifacts or a mismatch of the template to the [Fe [ii]{}]{} spectrum of the object. In order to assess the degree to which iron subtraction could affect the width of , we performed the following tests: (1) For a subsample of objects with various amounts of [Fe [ii]{}]{}, we scaled up or down the amount of [Fe [ii]{}]{} measured as much as the data seemed to tolerate in a visual inspection. This was done in particular for a number of QSOs with sufficient redshift to make the entire [Fe [ii]{}]{} blend down to $\lambda2000$ visible in the spectrum. For most objects, an increase or decrease by 50% in the iron subtraction was clearly wrong. However, at the level of 20% increase or decrease of the amount of [Fe [ii]{}]{} found in the automated procedure, it became difficult to discern an under/over-subtraction from an “ideal” subtraction. This factor of 20%, which we adopt as the $1 \sigma$ error for our iron subtraction, resulted in an average uncertainty of $< 2\%$ in  width. (2) We also compared [Fe [ii]{}]{}-subtracted and -unsubtracted  FWHMs to determine the effect of neglecting removal of [Fe [ii]{}]{} altogether, and found that the effect of [Fe [ii]{}]{}-subtraction depends on  width. For objects with  FWHM $< 4000$ , [Fe [ii]{}]{}-subtraction has the effect of increasing  FWHM by an average of 7%, and by as much as 20%. For objects with  FWHM $> 4000$  [Fe [ii]{}]{}-subtraction has the effect of decreasing  FWHM by similar factors. This result can be understood as a function of how the  line profile changes with [Fe [ii]{}]{} subtraction. Subsample Selection {#s:select} ------------------- A lower-redshift subsample was created for study of the relationship using  and  (hereinafter the “HO3” sample). These objects were selected from among the survey QSOs on the basis of redshift alone in order to include the widest possible range of luminosities. This corresponded to a redshift range of $z < 0.81$, which ensures that the  emission lines are at least 100 Å inside the SDSS wavelength limits. There are 12,263 DR3 QSOs with $z < 0.81$. A series of quality cuts were made, based on our measurements. Elimination of objects for which  or  lines were not fit by our program, due to low S/N or absence of the line, left 11,057 objects. We eliminated objects with (1)  FWHM $< 1500$ , (2)  FWHM $< \sqrt2$ $\times$ instrumental width ($\sim10$% of all objects with  measurements), and EW errors greater than 5% for (3)  and (4) . These four numerical cuts reduced the sample to (1) 9869, (2) 9474, (3) 5294, and (4) 5036 objects, respectively. Further cuts were made to eliminate objects with FWHM errors $> 10\%$, absolute value of $h_4 \geq 0.2$, and reduced $\chi^2 > 4$. The $h_4$ cut was implemented to obtain the best fit for the largest number of objects—for the  emission line in particular, our fitting algorithm would sometimes attempt to fit troughs on either side of the emission line, which exist in the original spectra and are presumably the result of low S/N. This produced an unreasonably large negative value for the $h_4$ parameter and a poor fit to the actual profile. The FWHM error, $h_4$, and $\chi^2$ cuts left 3999, 3749 and 3665 objects, respectively. A visual inspection of the remaining spectra was conducted to remove objects with failed fits, poor S/N, artifacts (e.g. cosmic ray spikes), and grossly irregular line profiles. Less than 10% of the discarded objects were rejected for irregular line profiles. These consisted mostly of objects with double-peaked  profiles, which may be indicative of SMBHs in low-luminosity, low-accretion states (Strateva et al. 2003; Eracleous & Halpern 2003). Visual inspections yielded a final sample of 1736 objects. We have not attempted to subtract the host galaxy contribution to the observed spectrum or to remove objects with strong galaxy contributions (see § \[s:uncert\]). A second data subsample was created to study the  relationship at higher redshifts using  and  (the “MO2” sample). There are 19,011 DR3 QSOs in the redshift range, $0.4 \leq z \leq 1.4$, in which both  and  are accessible. Our program produced fits for 5419 objects. The analogous quality cuts as for the HO3 sample were then applied here with the exception of the EW error cut. The 5% EW error cut was applied to , but for  it yielded very few objects. Therefore we relaxed the EW error cut to 10% for . These cuts left (1) 5419, (2) 5084, (3) 5084, and (4) 1034 objects (same numbering as for HO3). Further cuts were made on the basis of FWHM errors $> 10\%$, $h_4 \geq 0.2$, and reduced $\chi^2 > 4$, as with the HO3 sample. The FWHM error cut resulted in 384 objects; the $h_4$ cut resulted in 349 objects; the $\chi^2$ cut had no effect; and visual inspections yielded a final sample of 158 objects, with a maximum redshift of $z = 1.19$. Most visual rejections were for noisy spectra that were accidentally well fit by the routine. Only a handful of objects were discarded for irregularities in the line profile shape (not due to low S/N). These consisted of double-peaked  lines. Less than 5% of the objects were discarded for having excessive [Fe [ii]{}]{} emission. The small number of useful objects largely reflects the weakness of  in most QSOs. With so few objects, we should ask whether there is something special about QSOs with measurable  that could bias our result. One concern is contamination of  by emission from star-forming regions. High / line ratios are believed to be indicative of this (Ho 2005; Kim et al. 2006), but for our objects with  and  in common, we find that this ratio is not abnormally high. The average / line ratio is 0.12, consistent with pure-AGN emission in Type 1 objects (Kim et al.), with approximately 5% of our objects showing modestly elevated ratios. Another concern is possible introduction of bias through correlations between occurence of measurable  and spectral properties. In § \[s:mbhsigstar\] we discuss correlations involving [Fe [ii]{}]{} emission and Eddington ratio. Radio Loudness {#s:radio} -------------- The radio-to-optical flux ratio, or radio loudness, was calculated for each object in the two samples in terms of the parameter log $R = $ log $(F_r/F_o)$, where $F_r$ and $F_o$ are the monochromatic flux  in the radio at 5.0 GHz and in the optical at $\lambda4400$ ($B$-band), respectively. Kellerman et al. (1989) define radio-quiet as log $R < 0$, and radio-loud as log $R > 1$; but here we take radio quiet as log $R < 1$. Radio fluxes were obtained from the SDSS Quasar Catalog III (Schneider et al. 2005), which quotes the 20-cm peak flux density (AB magnitude) from the FIRST catalog (White et al. 1997) for most DR3 quasars detected by FIRST as radio sources. For objects not listed in the quasar catalog, radio fluxes were obtained from the FIRST catalog directly. Radio fluxes for objects residing outside of the FIRST coverage area were taken from the NVSS catalog (Condon et al. 1998). All radio fluxes were scaled from 1.4 GHz to 5.0 GHz using a spectral slope of $\alpha = -0.5$, where $F_{\nu} \propto \nu^{\alpha}$. The quasar catalog includes a search radius of 30.0 arcseconds from the central optical source, but we only consider sources within 2.0 arcseconds of the optical source. The flux at $\lambda4400$ was scaled from our measurements of the spectrum at rest wavelength $\lambda5100$ (HO3) or $\lambda3000$ (MO2). Because of the great range in log $R$ among QSOs, the exact value of continuum slope used for scaling has little affect on the number of objects that qualify as RLQ or on our conclusions. We found 90 radio-loud QSOs (RLQ) in the HO3 sample and 35 RLQ in the MO2 sample, comprising $\sim~5\%$ and $\sim~22\%$ of the respective samples. Our RLQ ranged up to log $R = 4$ and 5 for the HO3 and MO2 samples, respectively. About one-quarter and one-fifth of the HO3 and MO2 RLQ, respectively, are identified by the catalog as having extended FIRST emission. The percentage of RLQ increases with redshift in the HO3 sample. Compared to the RQQ, the RLQ have larger  and more luminous  emission lines with less prominent blue wings. There is no consistent tendency for RLQ in the MO2 sample to be associated with greater  or higher  luminosity. For the redshift range in common, the percentage of RLQ in MO2 is twice than in HO3. Results ======= The Broad Lines {#s:bl} --------------- Figure \[f:hbmg\] shows a strong correlation between  and  widths, consistent with McLure & Jarvis (2002). However, the  widths tend to be larger than the  widths for FWHM $> 4000$ . Using simulated spectra as described above, we conducted a test in which the MO2 objects were given, object by object,  profiles identical to  in $\sigma$, $h3$, and $h4$, but with the measured  EW and ultraviolet [Fe [ii]{}]{} strength. Our fitting procedure recovered the input parameters, showing that the deviation of  width from  width is not an artifact of the fitting. In some cases, the difference in widths involves an extensive red wing on the  line. We have used FWHM of  and  interchangeably in this work, but we discuss below the effect of using a recalibration of  width based on Figure \[f:hbmg\]. ![image](f3.eps){width=".45\textwidth"} The Narrow Lines {#s:nl} ---------------- ![image](f4.eps){width=".45\textwidth"} Figure \[f:o2o3\] compares FWHM of  (determined from single-line modeling described above) and  for all objects in the QSO catalog showing both  and . In the mean there is good agreement, with log  - log  = -0.013 and a dispersion of 0.12 dex. (For  modeled as a doublet, log  - log  = 0.00 in the mean for the set of objects with successful fits.) The presence of a blue wing, marked by a negative $h_3$, is common for . The  lines also show negative $h_3$, but neither as often nor as strongly as . We find a weak correlation between the Eddington ratio, $\lbol/\led$, and $h_3$ for  (but not ), in the sense that greater $\lbol/\led$ corresponds to a larger blue wing on . We take $\led = (1.26 \times 10^{38}~\ergps)(\mbh/\msun$), and $\lbol = 9\nuLnu$ following Kaspi et al. (2005). Greene & Ho (2005) examine narrow-line AGN in the SDSS DR2 with measured . They find that the width of  is a better tracer of  than , which on average tends to be wider than  by $\sim0.05$ dex (without the  blue wing removed), rather more than the  vs.  offset found here. Our sample consists of Type 1 (broad-line) objects, for which Nelson & Whittle (1996) find better agreement between  width and  than for Type 2 (narrow-line) objects. Some discrepancy may also arise due to differences in modeling of the  profiles. For typical values of $h_3$ and $h_4$, $\sigma$ determined by Gauss-Hermite modeling of  profiles can be smaller than $\sigma$ measured from the second moment by up to 10%. Greene & Ho show that removal of the blue wing of  results in a better tracer of . We find that the width of  (but not ) does correlate with $h_3$, but this does not appear to significantly widen the  line compared to . We examined the red and blue half widths at half maximum intensity (HWHM) of  for our sample. In the mean, the width of the blue side of  is larger than the red by 0.026 dex, confirming that a blue wing tends to widen  by a modest amount. If the red HWHM is essentially unaffected by the blue component, this suggests that the FWHM on average is increased by 0.013 dex by the blue component. When we compare $2~\times$ HWHM(red) of  to the FWHM of  we find that the average difference is  -  = -0.028 dex. Consistent with Nelson et al. (2004), we find that the degree of blue asymmetry on  is moderately correlated with greater optical [Fe [ii]{}]{} emission strength, and that the width of  is weakly correlated with greater [Fe [ii]{}]{} strength. Boroson (2005) finds that a significant blueshift of the  line, with respect low-ionization lines such as  and , correlates with broader  line width, though not with blue asymmetry in . Our results show a moderate correlation between the width of  and the  blueshift (relative to ), especially for objects with blueshift $> 40$ . Blueshifted  correlates weakly with blue asymmetry in . The average and maximum  blueshifts for our sample, relative to , are 15  and 420 , respectively, compared with 40  and 300  in Boroson (2005). The kurtosis of a line profile corresponds to the parameter $h_4$, with positive $h_4$ signifying a profile more sharply peaked than a Gaussian. Ninety-five percent of  lines show positive $h_4$ , while 80% of  lines show positive $h_4$. We find a weak anti-correlation between  width and $h_4$, which means that the boxier lines tend to be broader. Conversely, we find a moderate correlation between  width and $h_4$ such that peakier lines tend to be broader. We find no significant correlation between $h_4$ for  or  and [Fe [ii]{}]{} strength. There is a weak correlation between $h_4$ and $\lbol/\led$ for , in the sense that greater $\lbol/\led$ corresponds to peakier  profiles. There is no correlation between $h_4$ for  and $\lbol/\led$. The peakiness of the  profiles may be related to dust within the emitting gas clouds (Wilson & Heckman 1985; Busko & Steiner 1989); the combination of peakiness and blue asymmetry suggests a dusty NLR with outflow (Netzer & Laor 1993). ![image](f5.eps){width=".45\textwidth"} The Narrow Line Width-Luminosity Relationship {#s:vl} --------------------------------------------- S03 showed that the width of  is correlated with , and Corbett et al. (2003) find a strong relationship between  width and QSO luminosity using composite spectra from the 2dF QSO Redshift Survey. However, this relationship is not found by Corbett et al. for other NLR lines, including . We find a weak relationship between continuum luminosity and  width for RQQ (Spearman’s rank order coefficient $r_S = 0.280$, with probability $P_S < 0.1\%$ that a real correlation is not present), and none between continuum luminosity and  width. Figure \[f:Lo3\] shows the width-luminosity relationship for . Corbett et al. argue that the correlation between  width and luminosity suggests that the kinematics of the NLR are affected to some degree by the gravitational potential of the central black hole. However, the correlation could also involve the tendency of bigger black holes (and bigger host galaxies) to be associated with more luminous QSOs. It is curious, then, that a correlation is not found for , given the overall agreement between  and . It is possible that the lack of correlation is due to the limited dynamic range of  width and luminosity in our sample. When we limited the  sample to a comparably-sized width and luminosity range, we found that the correlation between  and luminosity disappeared. The Relationship {#s:mbhsigstar} ---------------- Figure \[f:mbh-both\] shows results for the  relationship using both the  and  emission-line widths (the HO3 and MO2 samples, respectively) as surrogates for , excluding RLQ. The solid line is not a fit to the data, but rather represents the fit given by Equation \[e:tremaine\] (the “ correlation”). Our results for $z < 0.5$ (see §5) are consistent with previous findings (Nelson 2000; S03; Boroson 2003; Grupe & Mathur 2004), with the data points tending to scatter evenly about the  correlation. Because of the large scatter, mostly attributable to the scatter in  as a surrogate for , there would be little meaning in fitting a line to the data (see discussion in Boroson 2003). More meaningful is the dispersion with respect to the local  relationship shown in Figure \[f:mbh-both\]. This is 0.61 for the HO3 sample (comparable with the findings of S03) and 0.67 for the MO2 sample. Bonning et al. (2005) find a dispersion of 0.13 dex using  as a surrogate for  inferred from host luminosity. Given the $\sigstar^4$ dependence in Equation \[e:tremaine\], the scatter in the  –  relationship, together with the smaller scatter of 0.3 dex in the  relationship for galaxies (Tremaine et al. 2002), accounts for the scatter in  of 0.61 dex that we find here. ![image](f6.eps){width=".45\textwidth"} We follow S03 in comparing  (from Equation \[e:mbh\]) to , defined as the “ mass” or “ mass” calculated with Equation \[e:tremaine\] using  or  in place of . The mean $\deltalogmbh\ \equiv \mathrm{log}\,\mbh - \mathrm{ log}\,\msigma$ in the HO3 sample is +0.30 and +0.13 for RLQ and RQQ, respectively. The results of Bonning et al. (2005) indicate that this RL – RQ offset could result from narrower  widths for RLQ that underestimate  (see also S03). We find the opposite difference between  for RLQ and RQQ in the MO2 sample, such that the mean  +0.16 for RLQ and +0.45 for RQQ. This may be an indication that  is not affected by radio loudness in the same way as . In fact, the difference in widths of  and  is greater for RLQ than for RQQ, with  tending to be broader than  by 0.04 dex for RLQ. Redshift Dependence {#s:zdep} =================== Does the  relationship evolve with lookback time? We test this by seeing how closely our black hole masses agree with the local  correlation as a function of redshift (see SO3). Figure \[f:del-both\] shows the results for  as a function of redshift for both samples (RQQ only). Also shown in Figure \[f:del-both\] is  averaged over redshift bins of $\Delta z = 0.1$ for each sample. Table \[t:bins\] shows various quantities averaged over these redshift bins. The mean  is $+0.13$ for the HO3 sample, which indicates that the black hole mass implied by  and Equation \[e:tremaine\] on average is less than the measured  by 0.13 dex. Note that this heavily weights the abundant low-redshfit QSOs. We do not assign great significance to this overall offset, which may be within the uncertainties in the calibration of the formula for  and of the use of  for . The mean  for the MO2 sample is $+0.41$ dex. ![image](f7.eps){width=".45\textwidth"} Figure \[f:del-both\] shows an upward trend in , amounting to an increase of roughly 0.45 dex from low redshift to $z \approx 1$. Figure \[f:mbh-both\] shows the  relationship with log  and log $\sigma$ averaged over the same redshift bins as in Figure \[f:del-both\]. Figure \[f:mbh-both\] shows that the rise in  with redshift results from an increase in  not accompanied by a commensurate increase in  or . Uncertainties {#s:uncert} ------------- Does the trend Figure \[f:del-both\] represent a real dependence of the  relationship on cosmic time? A number of uncertainties and selection effects bear discussion. ### Slope of the Local  Relationship {#s:slope} Wyithe (2006) proposes a log-quadratic fit to the local  relationship. For our range of , Wyithe’s expression has a slope $d\, \mathrm{log}\,\mbh/d \mathrm{log}\,\sigstar = 4.5$, somewhat steeper than the slope of 4.0 in Equation \[e:tremaine\]. The average  in our redshift bins (Table \[t:bins\]) increases by about 0.7 dex from the lowest three bins as a group to the highest three bins. Over the corresponding range in expected ,  rises by $\sim0.07$ dex more in Wyithe’s fit than in Equation \[e:tremaine\]. If Wyithe’s fit corresponds to the true  relationship, our use of Equation \[e:tremaine\] exaggerates the increase in  with redshift by this amount. ### Effect of the Radius–Luminosity Relationship {#s:rl} The mean luminosity of our QSOs increases from log  = 44.0 for the lowest three redshift bins ($z \approx 0.25$) in Table \[t:bins\] to 45.3 for the highest three ($z \approx 0.95$). A larger value of $\gamma$ in Equation \[e:mbh\] would increase the  derived for more luminous quasars, and amplify the trend of increasing  with redshift shown in Figure \[f:del-both\]. The recent work of Bentz et al. (2006) argues against a $\gamma$ as large as 0.67 (Kaspi et al. 2005). If we used $\gamma = 0.60$, this would increase the trend in  over the above redshift range by 0.12, that is, from +0.4 to +0.5 (prior to correcting for other biases). ### Accuracy Cuts {#s:rl} Our restriction of our data set to the best quality measurements results in a severe winnowing of the final number of QSOs compared with the full number of QSOs in DR3. This includes a factor 2 (HO3) or 3 (MO2) reduction by visual inspections of the quality of the data and the fit. For the HO3 sample, there is already a trend of $\sim0.3$ in  with redshift in the starting sample following the equivalent width error cut. The other numerical cuts have little effect on the trend, but the visual selection significantly raises the trend to the magnitude seen in Figure \[f:del-both\]. For the MO2 sample, after the EW cuts, there is about 0.5 dex overall offset with little redshift trend. The FWHM cut brings this down to about 0.4 dex, and the other cuts have little effect. Finally, the visual selection lowers the offset at lower $z$, strengthening the trend in the figure. Thus, the overall sense of trend with redshift is present at all stages in the selection process, but it is substantially affected by the cuts made, including the visual inspections. Note however that the results prior to the inspections include a large percentage of objects with badly failed fits or other problems, which clearly should be excluded. ### Broad Lines {#s:broad} We noted above that for larger  line widths, on average our measured  widths are narrower than those of  (Figure \[f:hbmg\]). If we use a linear fit to Figure \[f:hbmg\] to calibrate the widths of  to bring them into agreement with those of , this increases  widths for FWHM $> 4000$  by $\sim0.1$ and  by 0.2 dex. Using a linear least squares fit we find in units of : FWHM() $ = $ 0.645 FWHM() $ + $ 890. Figure \[f:del-both-cal\] shows how the recalibration strengthens the rise of  with redshift in Figure \[f:del-both\], and gives a more consistent trend between HO3 and MO2. The recalibrated results give  $ = 0.64$ and 0.66 for the bins at $z = 0.85$ and 0.93, respectively. The recalibration somewhat strengthens the trend of  with $z$. ![image](f8.eps){width=".45\textwidth"} The HO3 and MO2 samples overlap for three redshift bins (Table \[t:bins\]). While there is general agreement between the two samples, the typical FWHM$_{\mathrm{BL}}$ (and thus ) of the MO2 sample is systematically higher than that of the HO3 sample. This must result from object selection, because for individual objects Figure \[f:hbmg\] shows, if anything, slightly smaller FWHM for  than . If usefully strong  correlates with wider , does this represent a potential bias? Boroson & Green (1992) find significant correlations between optical properties of QSO, known collectively as “eigenvector 1", including an anti-correlation between the strengths of  and optical [Fe [ii]{}]{} emission. Hughes & Boroson (2003) find a similar relationship for  strength. Likewise, in our sample objects with  strong enough to be detected have weaker [Fe [ii]{}]{} emission—optical as well as UV—than other objects. In eigenvector 1,  FWHM correlates with  strength and anti-correlates with [Fe [ii]{}]{} strength. QSOs with detectable  will tend to have wider broad-line emission and, for a given luminosity, larger . This in turn is related to the Eddington ratio (Boroson 2003). The possibility of a resulting bias in  should be kept in mind. Such a bias would require a systematic connection between a QSO’s $L/\led$ and the ratio of  to host galaxy mass, presumably involving the details of AGN fueling. (See §5.2 for discussion of biases involving the QSO luminosity.) ### Narrow Lines {#s:narrow} We discussed above the removal of objects with $/$ $ \ll $ 10. If these objects systematically deviated from the  relationship in a redshift-dependent way, their exclusion could bias the derived evolution. Note that this is not the same issue as the tendency for  to weaken relative to [*broad*]{}  with increasing $L/\led$ (Boroson 2000). We examined 200 randomly selected objects that were rejected from our HO3 sample and found that 27 ($\sim 14$%) of these were rejected for having $/$ $ \ll $ 10. We used the ‘splot’ package in IRAF to directly measure the FWHMs of the broad-line component of  for these removed objects, and calculated their  and . While the redshifts of these objects vary from $z \sim 0.1 - 0.5$ they mostly resemble their lowest redshift counterparts in terms of mean luminosity, , , and Eddington ratio). The mean Eddington ratio of the 27 objects is $\lbol/\led = -0.98$ and the mean  $ = 0.04 \pm 0.11$. Reintegration of all such objects into the HO3 sample would have a negligible effect on our results. We also noted above that for  lines with peaky profiles our fits tended to crop the tops of the profiles. For roughly one in 10 QSOs, the  lines were cropped by $> 10\%$ of the  height, and were discarded from the sample. Curiously, this does not affect the magnitude or offset of the scatter in the relationship. The results for the heavily cropped objects showed that, if anything, they tended to cluster more closely around the local  correlation than the non-cropped objects when using our automated (cropped) fits. Whatever causes the sharply peaked  lines, our fits happen to crop in such a way as to recover an underlying profile similar in width to that of the non-cropped objects. The tendency for spectra to become noisier with redshift means that, for a given equivalent width, wider  and  lines are more difficult to measure. This increases the chance that higher-redshift QSOs with large  or  will be rejected from the sample. To test the degree of bias introduced by this effect, we generated mock QSO spectra with noise to mimic our HO3 sample. For each object in the HO3 sample, we used the fitted line parameters (equivalent width and $\sigma_{\hbeta}$) to generate the  line with a pure Gaussian profile, and the measured 5100 Å continuum flux to generate a power-law continuum of the form $\fnu \propto \nu^{-0.5}$ with a continuum noise level equal to the observed noise at 5100 Å. The  doublet was added using a pure Gaussian profile with the fitted  equivalent width from the observed spectrum and a  drawn randomly from a Gaussian distribution with dispersion $\delta\sigthree = 0.13$ dex (Bonning et al. 2005) centered on a value inferred from the  value for the object and Equation \[e:tremaine\]. We then measured the mock spectra as though they were real data. This simulation was run several times, and we found a pattern of positive bias in  that increases with redshift. For the HO3 redshift bins given in Table \[t:bins\],  rises, on average, from 0.03 dex in the lowest redshift bin to 0.17 dex in the highest. The result of these simulations suggests that due to increasingly noisy spectra with redshift, our sample favors narrower  (and presumably ) for a given . This bias can account for $\sim 0.1 - 0.2$ dex of the trend in  in Figure \[f:del-both\]. ### Host Galaxy {#s:hostgal} We have not removed the host galaxy contribution to the QSO spectra. We have estimated the galaxy contribution from the prominence of the Ca II K line in the spectra (Greene & Ho 2006). We formed composite spectra, normalized to the continuum at 4000 Å, of the objects in the various redshift bins of Table \[t:bins\]. The Ca K line is conspicuous in the lowest redshift bin ($z = 0.15$), and becomes weaker with increasing redshift, as the QSOs become more luminous. We fit the $z = 0.15$ composite with a power-law continuum $F_\lambda \propto \lambda^{-1.56}$ combined with a typical elliptical galaxy spectrum. We used SDSS J141442.91$-$003236.8 at $z = 0.185$, which has $\sigstar \approx 220~\kmps$ based on our fits to the spectrum with a stellar template using a least squares fitting program. (We removed the narrow \[Ne III\] $\lambda3968$ and broad H$\epsilon$ lines from the composite on the basis of the $\lambda3869$ and H$\delta$ lines and standard intensity ratios. The subtraction of \[Ne III\] and H$\epsilon$ has some effect on the red wing of the Ca K line but does not seriously affect the derived equivalent width.) A ratio of galaxy to power law of $\sim0.2$ reproduces the equivalent width of the Ca K line in the composite spectrum. By Equation \[e:mbh\] this implies that we are overestimating the  in this redshift bin by $\sim10\%$. This is insignificant for our conclusions. The EW of Ca K suggests that the galaxy contribution becomes even less important with increasing redshift. This is consistent with the fact that $L/\led$ increases with redshift (Table \[t:bins\]), implying an increase in $L/\lgal$ if $\lgal \propto \mbh$ (see Greene & Ho 2006). Treu et al. (2004) found a $\sim50\%$ galaxy contribution in their SDSS AGN at $z = 0.37$. If the galaxy fraction in our lowest redshift bins were this large, we would be overestimating  by $\sim0.15$ dex. The correction would be less at higher redhifts. Such a correction would increase by $\sim0.1$ dex the trend in  with redshift found below. The effect of an underlying  absorption line in the galaxy component should be unimportant. Even for the E+A galaxies of Zabludoff et al. (1996), the Balmer line equivalent width is only a few Å. The equivalent width of the broad  line is typically 100 Å or more, and the galaxy contributes only a fraction of the total continuum. Luminosity Bias {#s:lumbias} --------------- Another issue involves the effect of the limiting magnitude of the SDSS survey along with our quality cuts, which favor brighter objects. (Such a potential bias is mentioned by Treu et al. 2004.) This leads to a correlation between $L$, , and $z$ (see Table \[t:bins\] and Figure \[f:lum-z\]). For nearby galaxies, Tremaine et al. (2002) find an rms dispersion of $\dmsigma = 0.3$ in log  at fixed . If, for a given galaxy mass, galaxies with larger  tend to have larger $L$, such galaxies will be over-represented in a flux-limited sample. This will lead to a positive Malmquist bias in the average  for the sample. The bias will be stronger for a more steeply sloping galaxy mass function, which is starved for large galaxies. Because the mass function steepens for larger mass, the bias could increase with redshift. We give here a simple estimate of this bias as it affects our results. For the sake of concreteness, we illustrate the effect using dimensional quantities for , etc. However, our analysis could be expressed in an equivalent dimensionless form. We will argue that the magnitude of the bias depends on the typical luminosity of the sample QSOs at a given redshift, relative to the break in the slope of the QSO luminosity function at that redshift. ![image](f9.eps){width=".45\textwidth"} The galaxy mass function is often expressed in terms of a Schechter (1976) function $$\label{e:schec} \Phi(\mgal) = \Phi^* (\mgal/M_g^*)^{-a}\, e^{-\mgal/\mgalstar}.$$ For redshifts $z \approx 1$, Drory et al. (2005) find $\mgalstar \approx 10^{11}~\msun$. For a typical ratio $\mbh/\mbulge = 0.0013$ (Kormendy & Gebhardt 2001), this corresponds to $\mbh = 10^{8.1}~\msun$ if $\mbulge \approx \mgal$. Table \[t:bins\] shows that the average  in our redshift bins progresses from below to above $10^{8.1}~\msun$ with increasing redshift. Therefore, the possibility that the trend in Figure \[f:del-both\] involves such a bias is a concern. For a rough estimate of this bias, we carried out simple Monte Carlo trials. Values of $\mgal$ were distributed as in Equation \[e:schec\] with $\mgalstar = 10^{11}~\msun$, covering a wide mass range around . For each galaxy,  was drawn randomly from a Gaussian distribution in log  centered on $\mbh = 0.0013~\mgal$ with an rms dispersion in log  of . For this , the luminosity was drawn from a uniform random distribution in $L$ (not log$L$) between $L/\led = 0.001$ and 0.3. This crudely simulates our typical values of $L/\led$; see below for alternative assumptions. The resulting QSO luminosity function mirrors the galaxy mass function, with a break at $\lbreak \approx 0.5 L_0$, where $L_0 = 0.3\led(\mbhstar)$ and $\mbhstar = 0.0013 \mgalstar$. Roughly speaking, we expect that at a given redshift, QSOs brighter than some minimum luminosity will have sufficient S/N to be retained in our samples. For higher redshifts, this minimum luminosity will increase. We simulate this situation by selecting from our Monte Carlo runs those QSOs with $L > \lcut$, where  is an adjustable parameter. The effect of increasing  should indicate how the bias varies with increasing redshift, because the higher redshift objects are typically more luminous. In a given simulation, for each of several values of , we computed average values of log , log , log $L$, and  for the kept objects, i.e., those having $L > \lcut$. For the models, we have $\deltalogmbh = $ log  - log 0.0013 . Table \[t:bias\] shows the results of these simulations for $\dmsigma = 0.3$ and 0.5. As expected there is a bias in the sense of positive  that increases with $\lcut/L_0$, reaching values as high as $\deltalogmbh \approx 0.5$ for $\dmsigma = 0.3$ and 0.8 for $\dmsigma = 0.5$. This bias has its origin in the dispersion of the black hole mass – bulge relationship and is roughly proportional to . Motivated by the observed QSO luminosity function (Boyle et al. 2003) discussed below, we also computed models with an alternative form of the galaxy mass function, $$\label{e:marshall} \Phi(L) = \Phi^* [(\mgal/\mgalstar)^{-a} + (\mgal/\mgalstar)^{-b}]^{-1}$$ with $a = -3.41$, $b = -1.58$. The bias is similar for the two different functional forms of the mass function, when expressed as a function of $\lcut/\lbreak$ (see Table \[t:bias\]). How can we relate these simulations to our observed QSOs? Consider a model in which the probability of fueling the black hole, $p(\mbh)$, decreases with increasing ; but when fueling does occur, it follows our assumed probability distribution for $L/L_{\mathrm{Ed}}$. This will have the same effect on the observed number of QSOs at various values of $L$ and  as if we had assumed a modified galaxy mass function $\Phi^\prime(\mgal) = p(\mbh)\,\Phi(\mgal)$, where $\mbh = 0.0013\mgal$. This suggests that what matters for the bias is the slope of the QSO luminosity function. As the slope becomes steeper with increasing $L$, the bias will increase. A practical approach is therefore to compare our typical luminosity with the break in the QSO luminosity function, redshift by redshift. Boyle et. al (2003) give the $B$-magnitude luminosity function as $$\begin{aligned} \label{e:boyle} \Phi(M_B) = \Phi^*_M \{ \mathrm{dex}[0.4\Delta M_B(\alpha+1)]\\ \nonumber + \mathrm{dex}[0.4\Delta M_B(\beta+1)] \}^{-1}\end{aligned}$$ with $\alpha = -3.41$, $\beta = -1.58$, $\Delta M_B \equiv M_B - M^*_B(z)$, and $M^*_B(z) = -21.92 - 2.5(k_1 z + k_2 z^2)$ adjusted for our . Equation \[e:boyle\] is the magnitude version of Equation \[e:marshall\] for luminosity rather than mass, and it is the motivation for our use of Equation \[e:marshall\]. Our $z = 0.9$ to 1.0 bin has a mean log of 45.25. For this redshift, the break magnitude in the Boyle et al. luminosity function is $M^*_B = -24.50$, corresponding to $\mathrm{log}~\nuLnu = 45.28$ for a typical QSO continuum slope of $L_\nu \propto \nu^{-0.44}$ (Vanden Berk et al. 2001). Thus, our average luminosity of the QSOs in this redshift bin is 0.03 dex fainter than $L^*$ for the observed luminosity function at this redshift. We therefore consider simulations using Equation \[e:marshall\] with a value of  adjusted so that the mean luminosity of the kept QSOs ($L > \lcut$) is 0.03 dex fainter than $L_*$ for the model luminosity function. This sample of kept objects has an average $\deltalogmbh \approx 0.21$ for $\dmsigma = 0.3$. For the lowest redshift bin in Table 1 ($z = 0.1$ to 0.2) we similarly find a bias of $\sim 0.11$. Therefore, this bias can account for a [*rise*]{} in  of $\sim0.1$ from $z = 0.1$ to $z = 1$. This increases to a differential bias of $\sim0.2$ if we double the value of . We also ran simulations in which all model QSOs had $L/\led = 0.3$ rather than ranging down to 0.001 as above. (In this case $\lbreak \approx L_0 = 0.3 \led(\mbhstar)$). The bias in  was only $\sim 0.02$ larger in this case, when expressed in terms of $\lcut/L_0$. These and other trials show that the details of the $L/\led$ distribution does not seriously affect the bias, as long as the selected model sample bears a given relationship to the break in the model luminosity function. It is in this sense that the simulation is essentially scale free, as noted above. The bias considered here is, however, sensitive to the role of galaxy mass in AGN fueling. The discussion above assumes a distribution in $L/\led$ that is the same at each value of . Thus, fueling is proportional to , with some probability function for $\dot{M}/\mbh$. This means that a galaxy with a large black hole for its mass is more likely to be seen as a QSO in our sample. Suppose, however, that QSO fueling is instead governed by galaxy mass, such that $L$ is given by some probability function for $\dot{M}/\mgal$, independent of . Now the QSO luminosity does not favor objects with large  relative to , even though there is still a distribution in  for a given . Consequently, we expect no bias. We conducted simulations in which $L/\mgal$ followed a linear probability distribution from a maximum value $L/\led(0.0013\mgal) = 0.3$ or 1.0 down to small values. These trials gave zero bias, within the Monte Carlo noise. An intermediate case would involve fueling tied to  but a luminosity bounded by the Eddington limit. Table \[t:bias\] gives results for two such simulations. For $ L = 0.3\led(0.0013\mgal)$, few black holes are so small that the Eddington limit comes into play, and the bias is essentially zero. For $L = 1.0\led(0.0013\mgal)$, the Eddington limit affects many of the QSOs (those with smaller than average ), and the bias is significant but not so large as in models with fueling proportional to  and the same average $L/\lbreak $. The simulations show some bias even in the lowest redshift bin, which may bear consideration in studies attempting to calibrate the prescription for  in Equation \[e:mbh\] by using the  relationship (Onken et al. 2004). Our lowest redshift bins for the observed QSOs in fact have $\deltalogmbh \approx 0.1$, consistent with our bias estimate. We conclude that, due to the scatter in the  relationship, observational selection favors the brighter QSOs, and hence the bigger black holes, for a given galaxy mass. This bias can account for $\sim0.1$ of the trend in  in Figure \[f:del-both\]. The scatter in the  relationship  is measured fairly well in the mass range of our observed QSOs, and seems unlikely to be as much as twice the adopted value of 0.3. The bias appears not to be sensitive to the exact form the the QSO luminosity function, judging from the two cases considered above, nor is it sensitive to the detailed $L/\led$ distribution. However, the bias is sensitive to whether QSO fueling is governed by  or . In the latter case, the bias is reduced, and we derive a larger evolution in the  relationship. Conclusion ---------- We have identified two significant biases involving the spectrum noise and luminosity selection effects. Since these biases arise from two unrelated phenomena—the scatter in the – relationship and the scatter in the  relationship —we may add them linearly to estimate their cumulative effect on the mean . We find that much of the overall trend in Figure \[f:del-both\] can be attributed to these selection effects. Specifically, there is a rise of $\sim0.4$ in  from our lowest three redshift bins to the highest three. Our nominal results for the spectrum noise bias of $\sim0.15$ and the luminosity-driven bias of 0.1 combine to give a total bias of 0.25, leaving a derived evolution of $\sim0.2$ in . The noise bias presumably is well determined. An increase in  with redshift could contribute to the measured evolution, but this would still be a form of evolution of the  relationship. If QSO fueling is driven by galaxy mass, the luminosity bias is reduced, and the derived evolution becomes $\sim0.3$. Alternatively, if we recalibrate the  width as discussed above, the derived evolution again becomes $\sim0.3$. Discussion ========== After accounting for selection effects, we find some evolution in the  relationship in the redshift range $z = 0.1 - 1.2$, such that black holes are too large for a given bulge velocity dispersion. In contrast, S03 found no systematic evolution in  out to redshift $z \approx 2 - 3.$ The reason for this difference is unclear. S03’s high redshift objects had log  $\sim 9.5$ while our $z \approx 1$ objects typically have log $\mbh \approx 8.5$. SO3’s high redshift QSOs have very wide  lines, with $\sigthree \approx 500~\kmps$. However, the sample was small and the spectral resolution marginal. Treu et al. (2004) report measurements of  in a small sample of SDSS AGN at redshift $z \sim 0.37$. They find $\Delta$ log $\sigma = -0.16$, corresponding to $\deltalogmbh = +0.64$. (Excluding one outlier with large measurement errors in , their result becomes $\Delta$ log $\sigma = -0.12$.) There is no such offset in the low redshift AGN sample that they use for comparison (Merritt & Ferrarese 2001). While noting the need for a larger sample, Treu et al. raise the possibility of evolution in the  relationship. Our results show no offset of this magnitude in the redshift range of Treu et al.’s study. Using the SDSS spectra, we have measured the  line widths of the six SDSS objects for which Treu et al. quote a value of . On average,  is larger than their quoted  by 0.09 dex, and in particular the outlier in  has a  in agreement with the local  relationship. Perhaps this is an indication that Treu et al.’s measurements of  are affected by contributions to the starlight from relatively face-on galactic disks, a possibility that Treu et al. note. We also find that a direct measurement of the FWHM of the broad  line in Treu et al.’s SDSS objects is typically narrower by about 0.1 dex than the FWHM implied by Treu et al.’s measurements of the second moment of the  profile (i.e., the “rms” multiplied by 2.35). As a result, the offset in  resulting from our measurements of the Treu et al. objects is considerably less than their result. It will be important to obtain high S/N measurements of  for a larger sample of AGN. Using infrared spectra by Sulentic  (2004), Shields et al. (2006b) analyze  and  for nine QSOs at an average redshift of $z = 1.3$ and find a mean $\deltalogmbh = 0.3$. This resembles our result, but involves somewhat larger black holes with a mean log $\mbh = 9.3$. Peng et al. (2006) summarize measurements of QSO host galaxy magnitudes for lensed QSOs at redshifts up to $z \approx 4.5$. After allowance for evolution of the host galaxy stellar population, Peng et al. find an upper limit of a factor of 2 evolution in the / mass ratio for $1 < z < 1.7$, consistent with our result. At $z > 1.7$, the black holes are too large for the host galaxies by a factor of 4. This assumes an evolution of the - relationship similar to that of the  relationship. Both results suggest that BHs were larger relative to the bulge in the past. The host galaxies must have acquired much of their present-day mass after growth of the black hole was largely completed. Croton (2006) presents simulations of galaxy and black hole growth in which he finds a decrease in $\mbh/\mbulge$ with time. His “dynamic” model shows a decrease in $\mbh/\mbulge$ by a factor of two from $z = 1$ to the present, similar to our observational result. This involves growth of the bulge by late-time mergers that do not significantly fuel black hole growth. This scenario differs from the evolutionary sequence modeled by Di Matteo et al. (2005; see also Robertson  2006), who compute mergers of disk galaxies in which most of the stars are already formed. The modest initial black holes grow by accretion of gas until the AGN luminosity expels the residual gas. The expulsion terminates black hole growth and gives a remarkably tight  relationship, but in this case the black hole catches up to the stellar mass of the galaxy. The need for the QSO luminosity to deposit sufficient energy in the gas to liberate it from the host galaxy gravitational potential gives a plausible connection between  and  that does not play the same role if the host galaxy must catch up to that of the black hole. Shields et al. (2006a) have investigated the  relationship in high redshift QSOs using the width of the radio CO lines as a probe of the galactic potential. Taking $\sigma_\mathrm{CO} \equiv \mathrm{FWHM(CO)}/2.35$ and  derived from the width of the broad Mg II and C IV lines, they find $\deltalogmbh = 1 - 2$ for $z = 4 - 6$. These are large black holes with $\mbh \approx 10^{9.5} $ to $10^{10}$ solar masses and comparatively modest host galaxies. (An uncertainty is the possibility of relatively face-on CO disks in these QSOs, as noted by Shields et al. 2006a and Carilli & Wang 2006.) This is in the same qualitative sense as offset from the local  relationship found by Peng et al. (2006) for their $z > 1.7$ QSOs. However, Shields et al. (2006a) argue that, in general, the host galaxies of their high redshift quasars will never catch up to the expected mass for their , because the present day galaxy luminosity function does not contain sufficient numbers of galaxies of the necessary size (Shields  2006b). While the hosts of the $z > 4$ QSOs of Shields et al. (2006a) may experience some later growth, these extreme black holes evidently represent a breakdown in the  relationship observed locally for smaller masses. Summary ======= We have used the SDSS DR3 to assess how well QSOs up to redshift $z \approx 1$ follow the relationship for nearby galaxies. We created two data samples: one consisting of objects with the optical emission lines  and  in the approximate redshift range $0.1 < z < 0.8$ to compare with results of previous studies (the HO3 sample); the other sample consisting of objects with rest-frame ultraviolet lines,  and , with redshifts $z < 1.2$ (the MO2 sample). A summary of our findings is as follows: 1. The widths of  and  show overall agreement, with a mean log  - log  of -0.013 and a dispersion of 0.12. 2. There is generally good agreement between the widths of  and , though for wider  lines,  tends to be narrower than . The mean log FWHM() - log FWHM () is 0.05. 3.  and  can be used to study the  relationship up to redshifts $z \approx 1.2$. There is little evolution in the  relationship between now and redshift $z \sim 0.5$. For redshifts $z > 0.5$ there is a trend in  with redshift in the sense that bulges are too small for their black holes. Part of this trend results from selection effects. Accounting for bias, we find 0.2 dex evolution in the  relationship between now and redshift $z = 1$, corresponding to a time when the universe was approximately six billion years old. Evolution of this nature is predicted by some models of galaxy and black hole growth. We thank Sandy Faber, Gary Hill, Eliot Quataert, and Bev Wills for helpful discussions, and Ashley Davis, Pamela Jean, and Michael Shields for assistance. G.A.S. gratefully acknowledges the hospitality of Lick Observatory and the support of the Jane and Roland Blumberg Centennial Professorship in Astronomy. This material is based in part on work supported by the Texas Advanced Research Program under grant 003658-0177-2001; by the National Science Foundation under grant AST-0098594; and by NASA under grant GO-09498.04-A from the Space Telescope Science Institute, which is operated by the Association of Universities for Research in Astronomy, Inc., under NASA contract NAS5-26555. E.W.B. is supported by Marie Curie Incoming European Fellowship contract MIF1-CT-2005-008762 within the 6th European Community Framework Programme. We thank the SDSS team for the enormous effort involved in conducting the survey and making the results conveniently accessible to the public. Funding for the Sloan Digital Sky Survey (SDSS) has been provided by the Alfred P. Sloan Foundation, the Participating Institutions, the National Aeronautics and Space Administration, the National Science Foundation, the U.S. Department of Energy, the Japanese Monbukagakusho, and the Max Planck Society. The SDSS Web site is http://www.sdss.org/. The SDSS is managed by the Astrophysical Research Consortium (ARC) for the Participating Institutions. The Participating Institutions are The University of Chicago, Fermilab, the Institute for Advanced Study, the Japan Participation Group, The Johns Hopkins University, the Korean Scientist Group, Los Alamos National Laboratory, the Max-Planck-Institute for Astronomy (MPIA), the Max-Planck-Institute for Astrophysics (MPA), New Mexico State University, University of Pittsburgh, University of Portsmouth, Princeton University, the United States Naval Observatory, and the University of Washington. Abazajian, K., et al. 2005, , 129, 1755 Baldwin, J. A., Phillips, M. M., & Terlevich, R. 1981, , 93, 5 Begelman, M. C., & Nath, B. B. 2005, , 361, 1387 Bentz, M. C., Peterson, B. M., Pogge, R. W., Vestergaard, M., & Onken, C. A. 2006, , 644, 133 Bonning, E. W., Shields, G. A., Salviander, S., & McLure, R. J. 2005, , 626, 89 Boroson, T. A. 2003, private communication Boroson, T. A. 2003, , 585, 647 Boroson, T. A. 2004, American Astronomical Society Meeting Abstracts, 204, 60.10 Boroson, T. A. & Green, R. F. 1992, , 80, 109 Boyle, B. J., Shanks, T., Croom, S. M., Smith, R. J., Miller, L., Loaring, N., & Heymans, C. 2000, , 317, 1014 Busko, I. C. & Steiner, J. E. 1989, , 238, 1479 Carilli, C. L. & Wang, R. 2006, , 131, 2763 Condon, J. J., Cotton, W. D., Greisen, E. W., Yin, Q. F., Perley, R. A., Taylor, G. B., & Broderick, J. J. 1998, , 115, 1693 Corbett, E. A., et al.  2003, , 343, 705 Croton, D. J. 2006, , 369, 1808 de Vries, W. H., Becker, R. H., & White, R. L. 2006, , 131, 666 Di Matteo, T., Springel, V., & Hernquist, L. 2005, , 433, 604 Eracleous, M., & Halpern, J. P. 2003, , 599, 886 Fabian, A. C. 1999, , 308, L39 Ferrarese, L. & Merritt, D. 2000, , 539, L9 Gebhardt, K., et al.  2000, , 539, L13 Gebhardt, K., et al.  2000, , 543, L5 Greene, J. E., & Ho, L. C. 2005, , 627, 721 Greene, J. E., & Ho, L. C. 2006, , 641, 117 Grupe, D. & Mathur, S. 2004, , 606, L41 Ho, L. C. 2005, , 629, 680 Hughes, A. M., & Boroson, T. A. 2003, American Astronomical Society Meeting Abstracts, 203, \#78.24 Kaspi, S., Smith, P. S., Netzer, H., Maoz, D., Jannuzi, B. T., & Giveon, U. 2000, , 533, 631 Kaspi, S., Maoz, D., Netzer, H., Peterson, B. M., Vestergaard, M., & Jannuzi, B. T. 2005, , 629, 61 Kellermann, K. I., Sramek, R., Schmidt, M., Shaffer, D. B., & Green, R. 1989, , 98, 1195 Kim, M., Ho, L. C., & Im, M. 2006, , 642, 702 King, A. 2003, , 596, L27 Kormendy, J. & Gebhardt, K. 2001, AIP Conf. Proc. 586: 20th Texas Symposium on relativistic astrophysics, 586, 363 McLure, R. J., & Dunlop, J. S. 2001, , 327, 199 McLure, R. J., & Dunlop, J. S. 2004, , 352, 1390 McLure, R. J., & Jarvis, M. J. 2002, , 337, 109 Magorrian, J., et al. 1998, , 115, 2285 Marziani, P., Sulentic, J. W., Zamanov, R., Calvani, M., Dultzin-Hacyan, D., Bachev, R., & Zwitter, T. 2003, , 145, 199 Murray, N., Quataert, E., & Thompson, T. A. 2005, , 618, 569 Nelson, C. H. 2000, , 544, L91 Nelson, C. H., Plasek, A., Thompson, A., Gelderman, R., & Monroe, T. 2004, AGN Physics with the Sloan Digital Sky Survey, G. Richards and P. Hall, ASP Conference Series, 311, 83 Nelson, C. H., & Whittle, M. 1996, , 465, 96 Netzer, H. 1990, in Active Galactic Nuclei, Saas-Fee Advanced Course 20, ed. T. J.-L. Courvoisier & M. Mayor (Berlin: Springer-Verlag), 57 Netzer, H., & Laor, A. 1993, , 404, L51 O’Donnell, J. E. 1994, , 422, 158 Onken, C. A., Ferrarese, L., Merritt, D., Peterson, B. M., Pogge, R. W., Vestergaard, M., & Wandel, A. 2004, , 615, 645 Osterbrock, D. E. 1989, ‘Astrophysics of Gaseous Nebulae and Active Galactic Nuclei,’ University Science Books Peng, C. Y.,  2006, , 649, 616 Pinkney, J., et al.  2003, , 596, 903 Robertson, B.,  2006, , 641, 90 Schechter, P. 1976, , 203, 297 Schlegel, D. J., Finkbeiner, D. P., & Davis, M. 1998, , 500, 525 Schneider, D. P., et al. 2005, , 130, 367 Shields, G. A., Gebhardt, K., Salviander, S., Wills, B. J., Xie, B., Brotherton, M. S., Yuan, J., & Dietrich, M. 2003, , 583, 124 (SO3) Shields, G. A., Menezes, K. L., Massart, C. A., & Vanden Bout, P. 2006a, , 641, 683 Shields, G. A., Salviander, S., & Bonning, E. W. 2006b, New Astronomy Review, 50, 809 Sigut, T. A. A., & Pradhan, A. K. 2003, , 145, 15 Silk, J., & Rees, M. J.  1998, , 331, L1 Stoughton, C., et al. 2002, , 123, 485 Strateva, I. V., et al. 2003, , 126, 1720 Sulentic, J. W.,  2004, , 423, 121 Tremaine, S., et al.  2002, , 574, 740 Treu, T., Malkan, M. A., Blandford, R. D.2004 , 615, L97 van der Marel, R. P., & Franx, M. 1993, , 407, 525 Vanden Berk, D. E., et al. 2001, , 122, 549 Vestergaard, M., & Wilkes, B. J. 2001, , 134, 1 Wandel, A., Peterson, B. M., & Malkan, M. A. 1999, , 526, 579 Whittle, M. 1992, , 387, 109 White, R. L., Becker, R. H., Helfand, D. J., & Gregg, M. D. 1997, , 475, 479 Wills, B. J., Netzer, H., Brotherton, M. S., Han, M., Wills, D., Baldwin, J. A., Ferland, G. J., & Browne, I. W. A. 1993, , 410, 534 Wilson, A. S., & Heckman, T. M. 1985, Astrophysics of Active Galaxies and Quasi-Stellar Objects, 39 Wu, J.-H., Treu, T., Malkan, M. A., & Blandford, R. D. 2006, , 645, 900 Wyithe, J. S. B. 2006, , 365, 1082 Zabludoff, A. I.,  1996, , 466, 104 [lcccccc]{} & & & & & &\ 0.15 (213) & 43.77 & 2.14 & 7.59 & 0.11 & -0.96 & 3.52\ 0.25 (344) & 44.01 & 2.21 & 7.73 & -0.04 & -0.87 & 3.53\ 0.35 (403) & 44.23 & 2.22 & 7.90 & 0.10 & -0.82 & 3.56\ 0.45 (332) & 44.40 & 2.24 & 7.98 & 0.10 & -0.73 & 3.55\ 0.54 (200) & 44.60 & 2.23 & 8.10 & 0.24 & -0.65 & 3.56\ 0.64 (105) & 44.75 & 2.21 & 8.25 & 0.49 & -0.65 & 3.59\ 0.73 (47) & 45.02 & 2.22 & 8.37 & 0.56 & -0.50 & 3.59\ \ [*MO2 sample*]{} & & & & & &\ 0.56 (14) & 44.68 & 2.29 & 8.45 & 0.36 & -0.91 & 3.71\ 0.65 (18) & 44.78 & 2.25 & 8.30 & 0.37 & -0.67 & 3.61\ 0.75 (43) & 44.97 & 2.27 & 8.45 & 0.43 & -0.62 & 3.64\ 0.85 (25) & 45.01 & 2.26 & 8.48 & 0.50 & -0.61 & 3.66\ 0.93 (14) & 45.25 & 2.27 & 8.55 & 0.53 & -0.45 & 3.62\ [lccccc]{} & & & & &\ -1.37 & 10.35 & 7.57 & -2.07 & 0.10 & -0.51\ -0.67 & 10.71 & 8.02 & -1.57 & 0.19 & -0.01\ 0.00 & 11.05 & 8.50 & -1.03 & 0.34 & 0.53\ 0.48 & 11.33 & 8.93 & -0.61 & 0.49 & 0.95\ \ [*Schechter, $\dmsigma = 0.5$*]{} & & & & &\ -1.37 & 10.32 & 7.68 & -1.98 & 0.25 & -0.42\ -0.67 & 10.58 & 8.13 & -1.47 & 0.44 & 0.09\ 0.00 & 10.84 & 8.62 & -0.95 & 0.67 & 0.61\ 0.48 & 11.05 & 8.99 & -0.57 & 0.83 & 0.99\ \ [*Boyle, $\dmsigma = 0.3$*]{} & & & & &\ -1.37 & 10.27 & 7.50 & -2.13 & 0.12 & -0.57\ -0.67 & 10.65 & 7.98 & -1.60 & 0.21 & -0.04\ 0.00 & 11.01 & 8.50 & -1.04 & 0.37 & 0.52\ 0.48 & 11.33 & 8.92 & -0.59 & 0.48 & 0.97\ \ [*Boyle, $\dmsigma = 0.3$*]{}, $L = 0.3\led(0.0013\mgal)$ & & & & &\ -0.40 & 10.85 & 7.96 & -1.41 & 0.00 & -0.15\ 0.48 & 11.63 & 8.76 & -0.63 & 0.00 & 0.63\ \ [*Boyle, $\dmsigma = 0.3$*]{}, $L = 1.0\led(0.0013\mgal)$ & & & & &\ -0.40 & 11.00 & 8.21 & -0.92 & 0.09 & -0.18\ [^1]: <http://cas.sdss.org/astro/en/> [^2]: IRAF is distributed by the National Optical Astronomy Observatories, which are operated by the Association of Universities for Research in Astronomy, Inc., under cooperative agreement with the National Science Foundation.
624 F.2d 1095 Russellv.Enser 80-6377 UNITED STATES COURT OF APPEALS Fourth Circuit 6/10/80 1 D.S.C. AFFIRMED
Lessons from the 2018 Primary Elections What can we learn from the 2018 primary elections? This article explains what the winning candidates had in common. I wrote similar articles in 2014 and 2016. They don’t call it the establishment for nothing Establishment candidates won virtually all state senate races and most state house races. They have the inside track on fundraising, endorsements, and organization. The moderate wing of the party was hammered, with David Maturen losing renomination, and Kathy Crawford narrowly surviving. Daniela Garcia, Dave Pagel, Brett Roberts, Mike Callton, and Joe Haveman lost state senate primaries. Only Chris Afendoulis and Mike McCready won primaries, advancing to competitive generals. Some solid conservatives won primaries (Jim Runestad, Lana Theis, Tom Barrett), while others lost (Bob Genetski, Gary Glenn, and Ray Franz). The most common winners were mainstream conservatives like Pete Lucido, Ruth Johnson, John Bizon, Kim LaSata, Aric Nesbitt, Roger Victory, Rick Outman, Jon Bumstead, and Curt VanderWall. A similar pattern held in for state house nominations. Experience counts Elected experience is valuable for winning candidates. All of the Republican state senate nominees were previously state representatives. State house winners Doug Tietz, Sarah Lightner, and Christine Barnes have all been elected to county commissions. Incumbency Matters All but one incumbent Republican won renomination. Beating an incumbent in a primary is very hard. The one exception this year is Matt Hall, who spent more than 200K of his own money to defeat David Maturen. The only other conservative challengers who beat a Republican incumbent in recent years are Tim Walberg in 2006 and Lee Chatfield in 2014. Certainly many incumbents deserve primary challenges, but conservatives have limited resources. Winning an open seat is much easier than beating an incumbent. Politicians can still be held to account when they run for other offices, as with the moderates listed above. There are still some benefits to primary challenges, though, as they may encourage the incumbent to vote better for awhile and may help the challenger to win an open seat later. If at first you don’t succeed David Wolkinson and Gary Eisen both finished second in 2012 state house primaries. This time, they won their primaries. Matt Maddock lost a close primary for state senate in 2014, but won a big victory for state house this time. Candidates who lost this time should look for opportunities to run again in the future. Build a brand David Wolkinson, Doug Tietz, Matt Maddock, Matt Hall, and Annette Glenn are known across Michigan for advocating conservative causes. This can provide a larger fundraising base to tap when you run for office. Don’t split the vote Conservatives did much better this year than in past years. Senate district 12 is one example where a conservative candidate likely lost due to vote splitting. Conservatives may have benefited from splits in the establishment in senate districts 30 and house districts 40 and 81. Money is essential Money does not guarantee victory, but it is essential to get your message out. This is particularly true in local elections, which are often decided by name recognition. Look at how much winning conservative candidates raised. Wolkinson 69K Tietz 67K Maddock 98K Hall 209K Meerman 30K Glenn 52K The candidate who raised the most money won in 13 of 21 contested primaries in open Republican seats (fewer than in past cycles). I have written before that the minimum amount needed to be a credible candidate is $30,000. Only five winners raised less than 30K this cycle, two in races where no candidate did. All but one winner raised at least 15K. Exceptions are exceptional The only Republican with bad fundraising to win nomination is Gary Eisen, a firearms instructor who raised only 3K. He had finished second in 2012, and apparently had built some support from that run. He joins Steven Johnson (2016) and Aaron Miller (2014) as candidates who beat the odds despite poor fundraising. So it is possible for a candidate who works hard to catch on with voters without the usual advantages. But it definitely isn’t the way to bet, and it shouldn’t be an excuse to ignore the usual path to victory. James' polling improved a few points after Trump's endorsement. https://www.realclearpolitics.com/epolls/2018/senate/mi/michigan_senate_republican_primary-6215.html It doesn't seem to have made a difference in governor's race (the candidates were better known there). https://www.realclearpolitics.com/epolls/2018/governor/mi/michigan_governor_republican_primary-6216.html I'm sure people's views of Trump will have a big effect in the general, but what the effect is remains to be seen.
Q: Get post attachment images dimension and use in embed code I am trying to make things work like where any post attachment image will generate embed code automatically. Example: If I upload and add two images 1. 250x150 2. 600 x 160 and insert into post. Now that image information I want to auto put into embed code like below. <div> <a href="link url" title="title text" target="_blank"><img src="$image_url" width="$image_width" height="$image_height" alt="$image_name" /></a> </div> where $variable is the data of the attached image/s. So above code our team member can use the embed code to display image. A: WordPress has a predefined function, wp_get_attachment_image_src that returns the following information as an array: [0] => url [1] => width [2] => height But, the function requires that you know the attachment's ID, not the post's ID. In order to get that, you'll need to use get_post_thumbnail_id. Here's the two functions together in action: $image_id = get_post_thumbnail_id($post->ID); $image = wp_get_attachment_image_src($image_id); After that, you can easily do what you're talking about in your question. <img src="$image[0]" width="$image[1]" height="$image[2]" /> If you want more information about the wp_get_attachment_image_src, you can read more about it here: http://codex.wordpress.org/Function_Reference/wp_get_attachment_image_src.
Resonance from Microwaves to Confined Acoustic Vibrations in Viruses - chupa-chups https://www.nature.com/articles/srep18030 ====== ggm Oh the irony: microwaves demonstrated by science to deactivate viruses.. on a month where 5g towers are ransacked by conspiracy theorists who believe they feed the virus.
Database Administrators Stack Exchange is a question and answer site for database professionals who wish to improve their database skills and learn from others in the community. It's 100% free, no registration required. For every major entity has been defined the mandatory and unique attribute named 'identification', allowing queries based upon textual codes instead of numerical ids (eg. 'How many children?' question, of id '351', is also identified by 'HOW_MANY_CHILDREN'). And, for the items of a given questions, there may be defined an external source of data (eg. 'city' question has its options retrieved live from corporate 'city' table). The actual model provide versioning, but, for clarity's sake, I present a stripped down version of it.
Apr. 01, 2015 Many news outlets will be trying to pull the wool over your eyes this April Fool’s Day, and we here at Science Friday are no exception. This Friday on the show, we’re talking to Zach Weinersmith, webcomic artist and founder of BAHFest, the annual festival of Bad Ad Hoc Hypotheses (or “BAHs”). Held every October, this satirical festival brings together bona fide scientists and science groupies to present well-argued, thoroughly researched, but completely incorrect evolutionary hypotheses. How incorrect? Consider this hypothesis, presented by BAHFest 2014 winner Michael Anderson, which attempts to scientifically explain the existence of middle-aged men’s “spare-tires”: Don’t quite buy Anderson’s argument? That’s a sign of a BS-detector in working order. But just how good are you at detecting Bad Ad Hoc Hypotheses? We cooked up an April Fool’s Day quiz to put your BS-detecting abilities to the test. The Quiz: Each question below presents three possible evolutionary hypotheses. One of these is a REAL hypothesis that scientists are considering, and that we’ve covered here on Science Friday. The remaining two hypotheses are complete fictions made up by our SciFri staff. Your Task: Spot the real hypothesis amid the BAHs. Which of these is a REAL hypothesis scientists are considering? (1) That long flap of skin that hangs off of a male turkey’s beak is called a “snood.” (Now you know!)
New Yorkers, said to always embrace the next new thing, will have a chance this summer to sample rides and amusements enjoyed by fun seekers a century ago. Beginning this weekend and running through September 29, the inaugural Fete Paradiso fair will recreate the festival from a long bygone era. These include such attractions as a vintage French bicycle carousel and a meticulously restored pipe organ. ADVERTISEMENT The first fair takes place on New York’s Governor’s Island this Saturday — one day before France’s Bastille Day national holiday — and features a dozen rides and attractions popular from around 1850 to 1950. The antique attractions belong to two avid collectors of French fairground arts. French native Francis Staub made his fortune manufacturing cast iron casserole pots that bear his name. The other collector, Regis Masclet, was a successful advertising executive in Rennes who now spends his time restoring antique rides. “These are all collectors’ items,” Masclet told AFP. ADVERTISEMENT “For example, we have a rare ride — a velocipede — which runs by pedaling. It was built in the late 19th century to promote cycling, at the time horses disappeared from cities,” he explained. Masclet and Staub launched the idea for their antique fun fair 18 months ago, presenting it to various cities around the world, among them Berlin and London, but New York agreed to it first. Organizers said other cities around the United States are likely to follow suit. ADVERTISEMENT “We would like to continue the tour on the west coast and back to New York if it works,” said Tristan Duval, who heads Community, a French organization dedicated to promoting tourism and the arts, which is staging the event. Fete Paradiso also will feature carnival-style foods provided by the bistro Le Gamin, organizers said. ADVERTISEMENT Duval said he is not expecting to make a profit on the New York fair, but hopes that word of mouth will help make it a popular at future venues where it is mounted. The festival is part of a sweeping effort rehabilitate Governor’s Island, a former military base of 70 acres located off the southern tip of Manhattan, accessible to the public only on weekends, and then, only by ferry. The New York mayor’s office — known for its activism in supporting the arts — took over management of the Governor’s Island in 2010, and has a plan to to invest 250 million dollars in the massive renovation project. ADVERTISEMENT Several festivals and artistic events have been organized in the refurbished park.
• Categorized under Disease | Difference between anti-social and asocial Anti-social vs Asocial Psychiatric problems are rising in number in today’s world due to increasing stress levels and decreasing threshold for tolerance. Two similar sounding terms have emerged as people behave differently when faced with social challenges. Anti-social means against morally appropriate behaviour while asocial means avoidance of social life. Antisocial behaviour is caused by repression of emotions, bad experiences and negative thinking. Asocial behaviour simply develops as one’s attitude towards life. It could be due to introverted nature (keeping one’s feelings to one’s self), autism, and schizophrenia (delusional psychiatric disorder). Antisocial behaviour is such that it could hurt the people in the society or have a bad impact on the society. It is harmful and negative behaviour. People who commit murder, rape, steal, hurt animals, exhibit violent behavior, all fall under this category. Basically, they do not feel guilty despite their actions that offending people. They do not have sympathy nor do they respect others. They lack the sense of right or wrong. Their behaviour is committed most often with intent of causing harm to others and in very rare cases it is due to neglect. Since childhood they lack morals that a good human being should possess. Asocial behaviour is seen in people lacking confidence while meeting new people or being anxious of rejection. They avoid social meetings to such a great extent because they do not want to give people a chance to accept or reject them. They will generally prefer doing things all alone rather than making new friends or relations. It becomes a burden for them to handle any sort of relationships. They will have very few friends or no close friends at all. Due to such behaviour they are criticized and looked upon as subnormal individuals. Also, they tend to do constructive things than be anxious in social gatherings. In autism, this type of behaviour is noticed because they cannot express their feelings and also lack necessary skills for communication. They like routinistic things and do not make eye contact which makes them asocial. In schizophrenia, many people become asocial and keep imagining themselves as strong and confident people as a way to reduce peer pressure. They have delusions and hallucinations which take them away from other individuals. Asocial people have fear of being humiliated and hence they develop anxiety and restlessness in social engagements. Asocialism can be observed in individuals who are depressed. They lack interest in day to day activities or hobbies which once gave them immense happiness. Treatment for antisocial people will be psychotherapy, counseling and drugs if required. Antisocial people have a low threshold for stress and so get frustrated very easily and are impulsive in nature. These people are explained about society norms and how they are expected to behave. They are taught better ways to keep themselves occupied as a way to reduce thefts. They are positively taught ways of being independent and handling stress better. Drugs do not help directly but treat co-morbid conditions like depression etc. Asocial people are taught communication skills which boost their confidence levels during social gatherings. Also, once they efficiently start expressing their emotions, people reciprocate appropriately setting forth a chain of positive future social interactions. This will reduce anxiety levels and encourage them to meet more people. Summary: Anti-social behavior and asocial behavior are both caused due to decreased stress management levels. Both are treatable and the person can be normal after treatment. Antisocial behavior will need more of counseling whereas asocial behavior will need more of communicative and socializing skills.
This ancillary study was designed to develop a repository to collect blood to make DNA for studies of genetics in persons who have varying degrees of age-related macular degeneration (AMD). AMD is the leading cause of blindness in the US, accounting for more than 50% of blindness in the population. The Age-Related Eye Disease Study 2 (AREDS2) is study of the role of oral supplements with the vitamins lutein/zeaxathine and/or fish oil (Omega-3 fatty acids)in the treatment of AMD. Approximately 4,000 participants have been enrolled into this study. By studying their genes in these AREDS2 participants, we can have a better understanding of potential mechanisms of disease and how these genes might affect the progression of the eye condition. The genetic factors may play a very important role. This study was currently collecting blood to make the DNA for furture studies while the serum from the blood will be stored also for further analyses. We completed the process of the collection of blood in the third quarter of 2012. Further genetic analyses will be conducted. These valuable data may help us identify targets that may also be important in the therapy of this blinding conditions.
Auch diesmal geht es wieder um ein existierendes Business, welches mit seiner HSM Hardware nun auch im Crypto-Bereich durchstarten möchte: Securosys. Das zu lösende Problem ist dabei offensichtlich: Während im herkömmlichen Banken-Bereich zum Schutz von PKI-Systemen (Public-Key-Infrastrukturen, also verschlüsselte Kommunikationssysteme) standardmäßig spezielle Hardware zum Schutz der einzelnen kryptographischen Keys zum Einsatz kommt, werden in der Crypto-Szene häufig eben solche Absicherungen nicht getroffen (und so werden teilweise Private-Keys immer noch auf normalen Servern gespeichert). Dies führt in der Folge immer wieder zu Hacks, in denen die Angreifer Zugriff auf diese Private Keys erhalten und anschließend sämtliche Wallets leer-räumen können. Die Lösung besteht in sogenannten HSM (Hardware Security Modules), bei denen Private-Keys innerhalb der Hardware erstellt werden und es unmöglich ist, dass jemand Zugriff auf diese durch elektronischen oder durch physischen Eingriff bekommt (sämtliche Transaktionen werden lokal signiert). Nichts anderes ist im wesentlichen ein Ledger Nano S. Die Schweizer Firma Securosys SA wurde Anfang 2014 gegründet und beschäftigt sich seitdem mit der Entwicklung, Produktion und dem Verkauf von HSM, Virtual Private Network Systemen (VPN) sowie Netzwerk Verschlüsselungen. Die Entwicklung sowie die Fertigung der HSM-Hardware geschieht dabei ausschließlich in der Schweiz. Das Unternehmen mit 20 Mitarbeitern (und fünf offenen Stellen) fokussiert sich im Vertrieb auf den B2B Bereich und bietet zudem Wartung und Services für die eigenen Produkte an. Unter anderem kommt die Securosys Hardware bereits bei der SIX Interbank Clearing (SIX) zum Einsatz, welche im Auftrag der Schweizer Nationalbank das Interbank-Zahlungssystem SIC betreibt, über welches täglich ein Volumen von mehr als 100 Milliarden Franken abgewickelt wird. Neben der Bedienung dieses „Legacy-Marktes“ möchte Securosys nach dem ITO (Initial-Token-Offering) auch im Krypto-Markt durchstarten. Hierzu wurden einige Modifikationen an den HSM vorgenommen, die z.B. Multisignaturen ermöglichen. Der erste Kunde von Securosys in diesem Bereich ist die Crypto Storage AG (eine Tochter der Crypto Finance AG), die auf Basis der Securosys Hardware eine Krypto-Storage Lösung aufgebaut hat. Weiterhin ist auch die Börse Lykke nach Angaben von Securosys dabei, eine Integration von Securosys HSM zu prüfen. Seit einer Woche ist Securosys auch in Deutschland mit der Securosys GmbH vertreten, mit der in Zukunft der europäische Markt bedient werden soll. Vier Jahre nach Gründung ist die Securosys SA bereits nach jeweils einer Verdopplung des Umsatzes in den zurückliegenden Jahren profitabel, wobei 80% des Umsatzes aus der Schweiz stammen. Mehr Informationen finden sich auf der ITO-Webseite und im Whitepaper. Videointerview mit CEO Robert Rogenmoser Das ITO Das ITO wird voraussichtlich Ende September starten – ein genaues Datum wurde hier noch nicht kommuniziert. Statt die einzelnen Stufen hintereinander ablaufen zu lassen (zuerst Private- und anschließend Public-Sale) werden beide Stufen gleichzeitig an den Start gehen und der verfügbare Bonus vom Volumen des Investments abhängig sein. Der Hard-Cap liegt bei 16,25 Millionen CHF und es werden insgesamt 4.691.300 Token erstellt, von denen allerdings nur 65% (3.049.345) verkauft werden (weitere 30% verbleiben in der Reserve für „future expenses“ und „employee compensation“, 5% werden zur Zahlung der Kosten des ITO verwendet – nicht verkaufte Token wandern in die Reserve. Zu beachten ist die Lockup-Periode von zwei Jahren). Der 5,33 CHF teure Token mit dem Tickersymbol „SET“ ist dabei in einem Verhältnis von 1:100 in echte Securosys Aktien umtauschbar* (SET ist also als Aktie zu verstehen und zu bewerten). Die Gesamtanzahl an Token (4.691.300) entspricht hier einem Unternehmensanteil von 25%. Um, sofern in Zukunft eine Dividende ausgeschüttet wird, diese zu erhalten, müssen Token-Halter mindestens 1000 Token halten. Die Dividende wird entweder in SET, Fiat oder Ether ausgeschüttet werden. Es ist hinzuzufügen, dass man bei einer Wandlung von unter 50.000 SET Token Aktien ohne Stimmrechte erhält. Zusammenfassend verkauft also Securosys 16,25% seiner Aktien (65% von 25%) für 16,25 Millionen CHF. Ohne Berücksichtigung der Boni sowie der Lockup-Periode kommt man so auf eine Unternehmensbewertung von ungefähr 100 Millionen CHF (Rechnung: (1/(0,25*0,65))*3.049.345*5,33 CHF). Diese reduziert sich auf 70 Mio. CHF unter der Berücksichtigung der verschiedenen Boni. Grundsätzlich ist dies meiner Meinung nach eine durchaus sportliche und etwas abschreckende Bewertung, man muss sich aber auch vor Augen führen, dass die Token der Reserve nach zwei Jahren wohl kaum auf den Markt geworfen werden sowie eine deutliche Umsatzsteigerung durch die Erschließung neuer Märkte neben der Schweiz als durchaus wahrscheinlich anzusehen ist. Um den Start des Token-Sale nicht zu verpassen, sollte man sich als Interessent unbedingt für den Newsletter auf der ITO-Webseite anmelden! *Dieser Umtauschservice wird von Securosys angeboten und ist ein One-Way-Prozess. Das Halten der Token ist allerdings vorteilhafter, da eine höhere Liquidität besteht und auch an Token-Halter potenzielle Dividenden gezahlt werden. -Lukas Fiedler Disclaimer – Hinweis auf Interessenkonflikt: Der Autor oder Teile des Autorenteams sind in die oben genannten Kryptowährungen selbst investiert oder werden in diese investieren (Dies wird ab jetzt standardmäßig unter jedem Artikel erscheinen, da es sein kann, dass zu einem Zeitpunkt nach Veröffentlichung des Artikels investiert wurde).
The government is yet to respond to an inquest that found the death of a 24-year-old refugee in Australia's offshore detention was preventable, one year after the coroner published his recommendations to stop other deaths from occurring. This is despite the Department of Home Affairs repeatedly suggesting that it was close to responding to the coroner's findings, including telling Senate Estimates in December 2018 that it expected to formally respond by the end of 2018. In 2014, Hamid Khazaei died after contracting a leg infection while detained on Manus Island in Papua New Guinea. He was taken to Port Moresby three days after contracting the infection, where he had a series of cardiac arrests. He was flown to Brisbane, Australia, the following day, where he later died. After an inquest into Khazaei's death, Queensland state coroner Terry Ryan found that Khazaei could have lived if the medical care in PNG had measured up to Australian standards. In findings published on July 30, 2018 Ryan also said that Khazaei would have survived if he had been evacuated to Australia for medical treatment earlier. Ryan made eight recommendations to prevent other detainees from dying in offshore detention. But since those recommendations were published, the government has not publicly responded to them, and does not appear to have implemented them. When BuzzFeed News asked why the government has not responded, when it expected to do so, and whether it has implemented any of the recommendations, a home affairs spokesperson said in a short statement: "The Government’s response to the recommendations made by the Queensland Coroner is being finalised." Shadow minister for home affairs senator Kristina Keneally told BuzzFeed News in a statement that home affairs minister Peter Dutton's failure to respond to the recommendations was "unacceptable". "Given the Queensland Coroner found Hamid’s death was, in fact, preventable and was the result of ‘compounding errors’, Mr Dutton must respond to the report and explain how he will implement its recommendations to ensure the health and safety of vulnerable people he has left to languish in indefinite detention," Keneally said. On Dec. 7, 2018, in response to a Senate Estimates question from Labor senator Kim Carr, the Department of Home Affairs said that it "expect[ed] to be in a position to formally respond to the Coroner’s findings by the end of 2018". In January 2019, in response to an inquiry from BuzzFeed News, a department spokesperson said that the response was being finalised, and a whole of government response would then be provided to relevant ministers for their consideration. The department made similar comments in response to Senate Estimates questions on notice in March and May. In those answers, the department blamed the delay on the medevac legislation and subsequent changes to its policies and procedures guiding medical transfers. The medevac law was passed against the government's wishes in February, and gives doctors greater say in when sick patients are transferred from Nauru and PNG to Australia. The house of representatives voted to repeal the law on Thursday, but it is not clear if the government has the numbers to win a vote in the Senate. Only two of Ryan's eight recommendations relate to medical transfers. Recommendation 1 is that the department's medical transfer policy should make refugees' health an "overriding consideration", and that the approval process for transfers should be led by doctors on the ground in Nauru and PNG who are trained in emergency medicine. BuzzFeed News has previously revealed that the committee of bureaucrats charged with green lighting medical transfers to Australia was set up to consider not just doctors' advice, but also the cost and legal implications of transfers. Recommendation 2 is that when doctors request medical transfers, a checklist recording an accurate picture of the patient's condition and the doctor's advice should be given to the department. Other recommendations include that doctors treating refugees in PNG and Nauru should be accredited to the same level as doctors providing health services in Australia's onshore detention centres, and that the department should monitor the quality of care they are providing. The coroner emphasised that the Australian government had a responsibility "to implement sustainable systems for the delivery of health care that meet the requisite standard" — which the coroner accepted was " the care [a refugee] would have received in a remote clinic in Cape York". Khazaei arrived on Christmas Island in August 2013 by boat, after fleeing Iran because he feared he would be tortured and imprisoned because of a conflict with a cleric. The Australian government transferred him to Manus Island the next month, where he was indefinitely detained. Ryan found that "it would be possible to prevent similar deaths by relocating asylum seekers to other places, like Australia or New Zealand, where better health care would be provided". However, he acknowledged that approach was "highly unlikely" without a fundamental revision of Australia's border protection policy framework.
--- title: Can the Prometheus adapter be used in non-Kubernetes environments? weight: 60 --- You can use docker-compose to install Prometheus. Also, without the Kubernetes API server, components such as Mixer will need local configuration for rules/handlers/instances.
McParland: I built winning side with buttons, now it's Jackie who can be Thistle top brass And the man who wrote his name in Jags folklore as both a player and a manager hopes Jackie McNamara can follow in his footsteps and return the club he served with distinction to Scotland's top tier. Four decades may have elapsed since McParland's side claimed the Second Division title and famously shocked Celtic to win the League Cup, but the exploits of that era remain fondly remembered by those with an affinity to the club. In the years since Thistle dropped out of the Scottish Premier League, there have been only a handful of serious challenges to clinch a return to the top echelons of Scottish football. Despite working under stringent financial restrictions, McNamara has built a youthful, vibrant and talented squad in only his second term in the dugout. His signings have proven astute and his nous for the job natural and McParland, who was given the manager's job shortly after bringing the curtain down on his 416-game Jags playing career, knows success doesn't always have to be bought. "I have been very impressed with the job Jackie has done so far," he told SportTimes. "He is a talented young man who will hopefully have a great career as a manager. He has got a good eye for a player and you need that. "When I finished my career as a player I went into management right away, but I had checked out a couple of players I thought could be valuable to us – Hugh Strachan and Alex Rae. They were the only two players I brought in. "When I got the job at Thistle, I went to see the board and said to them 'the first thing I want to do is bring in one or two players' and there was a gasp of amazement. "I said that I needed some money. I was asked to leave and they had a meeting and when they called me back in I was told that they had decided to give me £2000 to spend. "It wasn't a lot of money but I got Strachan and Rae in. The team that won the League Cup and won the league, that is what it cost, £2000. It wasn't bad going." McNamara may not be able to match McParland's achievements and take Thistle to Hampden glory this season, but it could still be a memorable campaign for the Jags boss if they can complete an Irn-Bru First Division and Ramsdens Cup double. With their final berth against Queen of the South already secured and his side well positioned in the league, the coming months could be some of the best in the club's recent history. "It is good to see Thistle in a position where they can try and win promotion once more," McParland said. "I have seen them a couple of times this season and they have played well. "Jackie has built a good team, it is the start of his managerial career but I think he has done very well. "If you are about the club, you can notice a different feel around the place. That is brought by success and optimism. "I was in a title challenge after getting the job as we had been relegated and I had to get them up that season. "There is a pressure there and you have to accept that. I am sure Jackie will do that. "For a young man, Jackie has done a good job." It is not just McParland who has been impressed by the way McNamara has adapted to life in the dugout, with the Thistle board last month handing their manager a new and improved contract. Leading the Jags to the double would undoubtedly see McNamara's stock rise even further but it is the here and now that will be of greatest concern. McParland said: "There are always clubs looking for new managers. "The difficulty for Jackie, I hope, is that when he feels the time is right to move on that he will have a choice. "Then he can sit down and make a decision but that will be the last thing on his mind just now. "He will want to do well for Thistle. He is a good lad. He gets on with his players and that is important." Having spent nearly a decade outside the SPL, the opening months of the season have been welcomed by the long-suffering Jags faithful. Crowds have picked up as fans have returned to see McNamara's free-flowing side in action and McParland hopes supporters continue to flock to Firhill. "The attendances are better than I have seen for a while and that is encouraging," he said. "When I took over, we had been relegated and we had disappointing attendances at that time. "The fans were used to seeing us playing Rangers, Celtic, Hibs and Hearts. "The fans will come out for a winning team and hopefully they continue to increase as the season goes on for Jackie and his men." Commenting & Moderation We moderate all comments on Evening Times on either a pre-moderated or post-moderated basis. If you're a relatively new user then your comments will be reviewed before publication and if we know you well and trust you then your comments will be subject to moderation only if other users or the moderators believe you've broken the rules The 24 year old The Only Way is Essex star, who says he has never voted before, is interviewing all the main party leaders in Westminster to help decide who he will vote at the General Election in May for his series Educating Joey Essex. THERE will be people all over Glasgow and further afield who will look at this picture and smile ... because it will bring back fond memories of their dancing days at the city's famous Locarno Ballroom.
Extremely life-like images have always been of great interest in the prior art. Wax museums startle viewers with the sense of being present in history in the very room with a famous person. Wax museum figures have the disadvantage that they are subject to melting at high temperatures. A method of making mannequins for store windows was proposed in U.S. Pat. No. 2,309,447, issued Jan. 26, 1943 to L. L. Greneker, and titled: DISPLAY DEVICE AND METHOD OF MAKING THE SAME. The Greneker method involved completely shaping a head by sculpturing methods prior to the addition thereto of a flexible material such as paper or fabric coated with photographic impressions. Such coated fabric is then applied in one or more sections and the fabric is cut so as to fit around prominent parts of a face such as the nose and mouth. The cutting of the fabric provided a recess or gore separating the photographically coated fabric into two parts, one half on one side of a recess and the other half on the other side of a recess. The fabric at the two sides of the recess were then fitted and adhesively secured to the surface of the model so that parts of the coated fabric could become in substantial registry with the corresponding contours of the model to the extent possible by such a method of cutting and fitting. The two edges of a recess in the fabric piece were brought into abutment along a vertical line extending from the tip of the nose to the neck in order to form nose, mouth and chin. Other parts of the face were fitted in a similar manner by such cuttings of recesses in the fabric with the objective of bringing all edges into abutment. A disadvantage of the Greneker method can be seen in the great skill required to make the cuts at the right places. Gaps at the joints were to be subdued by filling with pigment. Another disadvantage is that the pigment is not itself a part of the photographically imprinted fabric. However the objective was to make a mannequin which is quite a different objective than to make an image so life-like in its exact representation of an actual human being as to be startling in the substantially complete similarity, as seen in front view. Such substantially complete similarity, which is the objective of this invention, is similar to the immediate recognizability of a excellent photograph, but of course, even more recognizability is achieved because of the 3-dimensional effect, as seen in front view. Wax museum images can be made by a sculptor while looking at a photograph to guide forming the 3-dimensional sculpture. Greneker's method can be used by making the 3-dimensional sculpture while the sculptor is looking at a photograph while the photograph is not attached to the 3-dimensional sculpture. But in the system hereof the photograph is not separated from the sculpture during the formation of the sculpture. In the present invention the new system involves forming the 3-dimensional sculpture of the face-portion of the finished product while the photographically coated flexible face module is not separate from the sculpture but is instead in contact with the sculpture, purposely placed on the sculpture while the sculpture is soft and moldable. The new discovery hereof is that it is possible to press on the photographically coated face module and actually form the 3-dimensional face sculpture by use of such pressing-through the photographically printed face module as the only or main method of sculpting the face. In other words, before the stage of pressing-through the flexible face module no previous face-sculpturing at all is necessary with the method hereof. A particular object is to provide a way to form a human face sculpture with front view accuracy as the sculptor is guided by the picture on the face module. As compared with sculpturing while merely looking at an unattached photograph, the method hereof provides a new art form, making possible great front view accuracy with much greater sculpting speed. Another objective is to provide a new article of manufacture, a finished product which is a face-sculpture having mounted thereon a photographically picture-coated piece of material, the coated material not being cut in its interior parts for fitting over protruding facial features of the sculpture therebeneath, but being substantially of one-piece of substantially uncut material. A very great seeming realism is achieved herein by providing the face image with a recording assembly mounted therein and delivering a reproduction of the voice of the very same being the face image portrays. In the prior art, voice recordings of living beings have not been used with images of those beings to my knowledge.
From Jamison on his protege, rookie power forward Tristan Thompson: "I can tell you now, in four or five years, I wouldn't want to have to deal with him night in and night out. It's one of those situations where I can sit back and say, 'I remember him as a rookie' when he's playing in All-Star Games and things of that nature. I'm a big fan of his. I can't wait for him to be a household name in the league." It will be interesting to see over the next few years whether the Cavs would have been better off taking Williams with the first pick and Brandon Knight at #4. Or Irving/Vala. At this point I'd say TT is better than expected and has a lot of upside, at least according to the guy who jousts against him in practice every day. From Jamison on his protege, rookie power forward Tristan Thompson: "I can tell you now, in four or five years, I wouldn't want to have to deal with him night in and night out. It's one of those situations where I can sit back and say, 'I remember him as a rookie' when he's playing in All-Star Games and things of that nature. I'm a big fan of his. I can't wait for him to be a household name in the league." It will be interesting to see over the next few years whether the Cavs would have been better off taking Williams with the first pick and Brandon Knight at #4. Or Irving/Vala. At this point I'd say TT is better than expected and has a lot of upside, at least according to the guy who jousts against him in practice every day. David Thorpe is an intolerable shill that spends his time blowing any and all players that went to his camps. He's a biased piece of shit that also said today that Knight will be the best PG from this class. Thorpe's chat today was informative. With, "Yes", as an answer to several substantive questions. He also mentioned TT's 18 PER. AFTER 4 GAMES???? FEH FOLLOWED BY HARUMPH! What is so hard about calling TT what he is? A kid we reached on when "a consensus" better option was available? That the kid is a great athlete with a gym rat work ethic. There is potential there. Enough with the "See, see, see," after 4 games. Fuck. "When a man with money meets a man with experience, the man with experience leaves with money and the man with money leaves with experience."
Rex Jaeschke's Personal Blog For many years, I've had a rule that goes, "Always have a Plan B, even for Plan B!" Occasionally, I get to C or D—and sometimes even to F or G—before I find success. What we're talking about here is dealing with the unexpected, and this often comes with situations where you don't control all the variables. Basically, this pretty much means any time you leave the house. You are immediately subject to the weather, traffic, and people, all of which can be unpredictable, and in the case of people, even irrational. To be sure, you can and should plan for success (see my essay from May 2011), but variables outside your control can quickly throw a wrench in the works. I've seen many people ruin their own day and that of those around them when something doesn't go according to their plan. As yelling, screaming, and generally having a tantrum are unlikely to resolve the problem, far better that you sit down, have a piece of chocolate, breathe deeply, and count to 10. And if that doesn't work, count to 100 (then 1,000). Then come up with a Plan B. In this essay, I'll describe some of my last-minute plan changes, many of which involve travel. I'll also mention several instances in which no alternate plan was possible; it was just a matter of accepting the situation and not worrying about things over which one has no control. The Ticket that Was then Wasn't In late 1978, my wife and I left Australia for an indefinite period to work and travel. After some months of planning, we booked airline tickets from Adelaide, Australia, to Washington DC, with stops (going east) in New Zealand, Fiji, Hawaii, Los Angeles, and Las Vegas. The trip would take two weeks. On May 25th, American Airlines Flight 191 crashed in Chicago. What made that significant was the plane was a DC-10, the type of aircraft we were going to fly across the Pacific with Air New Zealand. Immediately, all DC-10s, worldwide, were grounded; however, we didn't realize the impact on us for a good while, by which time, the alternate routing options were gone, and we were left with tickets that could not be used. When next we went back to our travel agent, we had no Plan B. However, sitting on a desk in the office was a globe, and as I was spinning it around, I noticed that one could get from Australia to Washington DC by going west. Yes, it was a longer trip, but at least it didn't compete with all the passengers trying to rebook flights across the Pacific. And we didn't have any need to go east anyway. By the end of that meeting, we'd pinned down a viable alternative with tickets from Adelaide to London with unlimited stopovers and up to one year to complete the trip. The rules were based on distance travelled. [We'd buy a ticket to Washington DC once we were in London.] At that time, Adelaide airport did not have international flights, so we'd planned to leave the country via Sydney. As luck would have it, if you look on a globe, the following cites are pretty much in a straight line: Sydney, Singapore, Kuala Lumpur, Bangkok, Mumbai (called Bombay at that time), Athens, Rome, Geneva, Paris, and London. We included all those on our tickets and added a side trip to Hong Kong as well, for an extra 15% cost. [En-route, we skipped Athens, and we took five weeks to get to DC.] The result was that after months of planning and my globe spinning, we had a chance to do it all over again, factoring in all the things we'd learned thus far. And we visited many more places and took longer. So, Plan B can be just as good as Plan A–and maybe even better—if you don't obsess with Plan A. Lost Luggage I traveled to Edmonton, Alberta, Canada, for a conference, and took my wife and son with me. As it was cold, we'd packed winter clothes. From there, we flew to San Francisco, but our luggage didn't make it, and the weather was very warm. As we'd planned a driving trip down the coast, and had no planned itinerary, there was no way our luggage could catch up with us, so we arranged to pick it up when we came back some days later. We bought a few toiletries and some socks and underwear and headed off, enjoying the weather. On another occasion, I flew home, but my luggage didn't come out on the belt. As it happened, it was standing outside the plane in the rain and got somewhat wet, and was delivered to my house 24 hours later, after I'd already left on another trip. The challenge was to come up with a whole other case as well as toiletries and clothing in the meantime. When I taught seminars, I carried boxes of heavy overhead transparencies and other gear, all of which fit in a large lockable attaché case. I was headed home from San Francisco and boarded the car rental bus for my terminal. I put my case upfront on a large pile of luggage. However, when I got off, my case was gone, with no clue as to where it was. (Apparently, it had fallen out the door when another passenger pulled their case out of the pile, and the driver hadn't noticed!) Minutes later, an agent from an airline other than mine arrived in her bus to find this unaccompanied, locked case lying at the curb. She saw my business card luggage label, and contacted me to tell me she had it. She then put it on a flight—at no charge to me—and sent it home to me. I got her name and address and sent her a reward. The good news is that after two million air miles over 40-odd years, I have never lost any luggage permanently. And of those few times when my luggage has gone astray, it has almost always been on the flight home, which is nowhere near as bad as on the flight out. Certainly, one should not put critical or valuable items in checked luggage. And in my case, I never lock my checked bags. Security personnel have a right to inspect them, so no point in having them damage the locks by gaining entry. By the way, on each trip, I put a printed copy of my flight itinerary inside my checked luggage. Money Troubles in Uruguay and France At the Montevideo international airport in Uruguay, I met a Dutch woman. She had no traveler's checks or cash, just a cash-machine card. Unfortunately, she couldn't get the cash machine to work, and its being entirely in Spanish didn't help, as she spoke no Spanish. As I arrived, she was in tears with no Plan B and feeling very sorry for herself after a long flight from Europe. I too failed to get money from the machine, but I did have US$100 in $20 bills, so I went to the airport bank. Unfortunately, the bills had been printed/cut off-center, and the bank said they looked like forgeries, and refused to change them. I pleaded for a bit and, finally, they relented and changed $20. With the proceeds, I bought two bus tickets to the city center, and took my newly acquired Dutch friend with me. There, I found a cheap hotel and paid for two rooms. In the main street, I found a moneychanger who happily changed the remainder of my "funny looking" bills and my friend found a cash machine that she could understand. With that, she was able to pay me back. With the increasing proliferation of cash machines around the world, it was our first time traveling without travelers' checks. We were in Strasbourg, Alsace, France. Now US telephone dials have long had letters as well as digits, and this transferred to keypads, and was in common use on cash machines all over the US. Not so in Europe, however, but there was I standing at a cash machine in France, with my card, but not knowing how to translate my alphabetic PIN to the corresponding digits on the keypad! It took me some effort to locate a business that had letters on a keypad, so I could see the letter-to-digit correspondence. [As a result, I have a letter-to-digit table stored in my pocket computer and laptop, but, of course, I've never needed it since, as international keypads now have letters as well.] The Cancellation of a Play A German friend met me in London, and after much discussion about the plays on offer, we bought half-price tickets for a performance of Noel Coward's "Blithe Spirit". As that started at 7:30 pm, we went off to have a leisurely supper. At 7:30, an employee of the theater announced that "Due to technical difficulties, tonight's performance is cancelled, and you can get a refund at the box office." I grabbed my friend and raced out to get at the front of the refund line. The good news was that most plays started at 8 pm, so we had a chance to go elsewhere. The bad news was we didn't have a second choice! However, as we exited the theater, across the street was another one, with a show about which we had no real knowledge. From the brief description given to us by the usher, we bought tickets. After all, we had planned for theater that night, and theater there would be, damn it! Well, don't you know, we very much enjoyed the performance of "Stomp", which involved a percussion group using their bodies and ordinary objects to create a physical theatre performance using rhythms, acrobatics, and pantomime. [More than 10 years later, it is still playing in London.] A Poke in the Eye with a Blunt Stick I'd arranged a 2-week trip with business in Copenhagen, Denmark, and visits with friends in that city and the island of Fyn. Two weeks prior, on a Friday evening, dark spots started floating across one of my eyes. I'd recently moved to a new county and had no eye doctor, so I had to find one. Then, they were not open on weekends, the following Monday was a holiday, and the doctor didn't practice on Tuesdays, so it was Wednesday before I got to see him. He very quickly diagnosed a torn and partially detached retina, and insisted a specialist make room for me that day. Within hours of that visit, the problem was fixed with laser surgery, but I was grounded for at least two weeks. No flying for me any time soon! Of course, I had to cancel my trip and handover my meeting secretarial duties to another committee member. Although I'd very much looked forward to seeing good friends again, that was not an option, so there was no point dwelling on what might have been. You need to "Just get over it!" [BTW, the section title is from a sarcastic Aussie saying that goes, "That was better than a poke in the eye with a blunt stick!" which translates to "It wasn't very good at all."] A Turn-Around in Flight In September 2015, I departed Beijing, China, for Newark, New Jersey and Washington DC. I was minding my own business in Business Class, watching an interesting movie, "Interstellar", waiting for my supper to be served. Well, don't you know, my time in Paradise was interrupted by an announcement from the cockpit that "Due to a mechanical problem, we are returning to PEK". In all my years of airplane travel, that had never happened to me before. We were an hour out of PEK, so it took another hour to get back. The airline company planned to dump fuel, but apparently could not get Chinese permission to do so, and we landed with near-full tanks. However, we were assured that it was not an emergency, so there was no cause for alarm. We landed back at PEK, but not even the crew knew what would happen next, so we all stayed in our seats parked out in the midfield some distance from a terminal. Unfortunately, the crew cut the power to the audio and video system, so I didn't get to finish my movie. An hour later, ground crew arrived, and we walked down stairs to waiting buses that took us to a terminal. Assistance was sporadic and insufficient. Eventually, we found ourselves at the backside of passport control, where staff let us back in to the country and put a "Cancel" stamp over our "Departed" stamps in our passports. By the time I caught the train to the baggage area my bag was on the carousel, and soon I was out on the street at bus stop 11 where we'd been told to wait for pickup. Right in front of me was a bus with a sign UA88, the flight I'd been on and that was cancelled. I boarded it to find one other passenger there. After 20 minutes, we were the only ones, which we thought was most strange, when a bi-lingual passenger joined us and found out from the driver that it was a bus for the crew. Our (unmarked) passenger bus was nearby. We boarded that along with five others and soon headed out to the airport Crowne Plaza hotel. We arrived at the hotel at 8:45 pm to find 25 fellow passengers in line ahead of us being "processed". Our passports were photocopied, and we were given a room key and details of the rescheduled flight going out at the same time the next day. I went to my room to find a very elegant setting, in which I would not ordinarily stay otherwise. I had trouble connecting to the internet and difficulty understanding the front-desk assistant who explained I needed to pay about $20 for 1-day of connection. Bugger! Down in the dining room, we were given a meal coupon for the evening meal, which I can assure you was not the beef I'd been anticipating in BusinessFirst on UA88! In fact, the offerings were pitiful and none of us were inspired to eat much at all. Of course, numerous dishes contained shellfish, and none was identified! As a number of fellow passengers came together at one table, I dubbed it the Gilligan's Island table. Back in my room I found email from United Airlines telling me I'd been booked on the same flight the following day, but if I'd like to see my alternatives, I could do so. Knowing there was a direct flight to IAD, where I really wanted to be, I looked for that, and lo and behold, it had space available. Although I'd be home a day late, I'd arrive an hour earlier than planned and would not have a stopover. The ironic thing is that I'd wanted to go on that direct flight both ways when I booked the ticket, but it was $2,500 cheaper if I had a stopover in each direction, yet now I was going home on that very flight without paying extra. A Train Strike in NW Italy It was May and humid, and I was in Italy. I rode a train north from Rome to La Spezia, my plan being to spend time visiting the five towns of Cinque Terre and hiking the paths between them, before going south to Lucca, Pisa, and Siena. On arrival in La Spezia, I discovered that due to a workers' strike the regional train service was intermittent or non-existent, depending on one's destination. Fortunately, I had no confirmed accommodation reservations that needed to be cancelled or changed. Now I'd already changed my original plan, so was on Plan B, but as I spoke to a very helpful assistant at the tourist office, Plan C materialized. I walked about 1 km through the town to a bus stop for a number of routes. Within five minutes, my bus arrived, and I boarded. It was crowded with standing room only; however, someone got off at the first stop and I was able to get a seat. I filled the one luggage rack with my backpack and daypack. The 11-km journey along the coast involved many tight turns and I felt some motion sickness, but managed to hold on to my lunch. We pulled into the small town of Porto Venere where the bus route terminated. It was the end of a number of major hiking trails that came south from Cinque Terre, and given the beautiful weather, it was no surprise that the hikers were out in force. I walked 100 meters into the town where I found a friendly young policewoman who spoke passable English. She gave me some directions for the tourist office (which didn't open until 16:00) and some accommodation tips. I dropped by a nice hotel right on the waterfront, and although it wasn't too expensive, I went off in search of alternative places. I soon found my Shangri La, the hotel Genio. It was built up a steep hillside with lots of steps and terraces that overlooked the main plaza. The friendly Russian front desk assistant, Igor, was happy to give me a very good rate for two nights if I paid cash. Breakfast on the terrace between 08:00 and 10:00 was included as was high-speed internet access at his desk. And all for €65 a night. Igor took me to see Room 6, way up the back with its own little garden under fruit trees. It was a very nicely appointed double room with en-suite bathroom, all quite modern and spacious. I accepted his offer and went down to check in. By the time I unpacked and settled in it was 15:30. A church clock chimed at 15-minute intervals. I have to say that this unplanned diversion was one of the highlights of the trip. It also reinforces my usual style of travel, to have as much flexibility as possible. As such, I don't lock in a lot of accommodation, and I don't do plan-well-in-advance guided tours. The odds are very high that on such a tour I'd want to stay longer at some places and not at all at others, but that is not possible. [This is a major difference between being a traveler versus a tourist!] When the INS says "Jump"! In 2007, my wife and I applied for US citizenship, and after we were fingerprinted, we sat back and waited for our interview to be scheduled. That happened 13 months later when we received a letter from the then INS (Immigration and Naturalization Service) telling us where and when to report. Unfortunately, the date was right in the middle of a 2-week trip to Croatia and Slovenia we'd planned months before. Well, one does not negotiate such things with the INS. When they say "jump", one replies, "how high?" So, we cancelled our trip. I am happy to report that I passed the written and oral English-language test, I was made a US citizen, and I finally got to Croatia in 2012 and again in 2016, and to Slovenia in 2016. (See my essay from April 2010, "The Road-to-US-Citizenship".) A Non-Visit to a Castle I've been to Prague, Czech Republic, numerous times, and love that city. On one visit, I decided to visit the famous Karlštejn Castle, which is just a short train ride out of the city, and to take a friend with me. We walked from the station into the little village to find that this was the one day of the week the castle was closed. Don't you just hate that when that happens! The good news was that later in the week, a business colleague took us in his car for a drive around the countryside, and not only did we visit the castle, but we got into its off-limits inner sanctums, through a "friend of a friend". It was an impressive place to visit. Sadly, this was not the first time I've shown up at a place to find it's "the closed day", and it probably won't be the last. The Striking View from the Top It was December, and after business in Paris, I visited Normandy. From there, I went to Avraches from where I visited Mont Saint-Michel. I dropped by the tourist office to get a small map and brochure. There was no fee to enter the walled town and no English guided tours were available, so I was left to make my own plan. The many tourist shops were opening, and the patisseries were setting out their freshly baked goods. It seemed to me a good idea to find a nice warm place and a hot drink. Auberge Saint Pierre looked as good a restaurant as any, so I went in and in my best French ordered a large hot chocolate "si vous plait". The narrow main path meandered up a steady incline through the little town between the shops and restaurants. However, when I got to the entrance of the famous abbey near the top a sign informed me that it was closed just for the day. And all because of a monument/museum workers strike. Don't you just hate that? Well, they say that something good comes out of everything and, in this case, I saved the €8 admission charge. I chatted with some disgruntled tourists, which included a busload of Japanese. [I'd never seen Japanese get angry, but in this case, they were; this was to be a highlight of their trip and they wouldn't be able to "come back tomorrow" as was suggested by one of the picketing workers.] As for me, Plan B involved walking around the town's ramparts taking photos of the church on the rock above and the mudflats exposed by the low tide. At sea level, I walked several hundred meters along the causeway to get a good photo of the whole island, which was about 1 km around. Then I walked out on the mudflats near the base of the fortifications. A sign warned of quicksand, so I made sure I followed the footsteps of the people ahead of me, that is, right up until the footsteps disappeared! Let's Stop for some Fuel There I was minding my own business on a Lufthansa flight from Frankfurt to Washington DC, when I noticed on the large flight map on the front wall of my cabin that we were flying a figure-eight over the New England states of the US. The power grid over New York City had gone down and air traffic was stopped from flying over that corridor. However, we circled around for so long, the pilot decided to stop off at Boston to refuel. Unfortunately, no-one there was ready for us, and we were on the ground for some hours before we could continue. Some passengers were actually flying back to Boston from DC, and after they made such a fuss, they were let off the plane, but their checked luggage would have to catch up with them later. Fortunately, my ride home was arranged when I landed, so apart from being a few hours late, I was not otherwise inconvenienced. Landing at the Wrong Airport Washington National Airport (DCA) has a nighttime curfew. I was flying there on a delayed flight, but the pilot was told that he could not land there. Now at the time, I lived near Washington Dulles Airport, to the west, but did they divert there to make it convenient for me? No, they sent us to Baltimore Washington International, and then bused us to National and Dulles. Don't you just hate that when that happens! Chaos in Orlando Pan Am airlines had pretty much gone out of business, and a cruise line had taken over its operations. My wife and son and I were on a flight home from Puerto Rico, which stopped in Orlando, Florida. Things were so disorganized with flights being cancelled or delayed that the passengers were about to mutiny, I kid you not. A young mother was so abusive, she was arrested, and her small children were taken into protective custody. Airport police appeared riding mountain bikes, and tried to maintain order. I knew that it was not a safe place to be and that the chance of our flight leaving soon or at all was minimal, so I quietly took my family back out to the main check-in desk. The good news was there was only one customer in front of me, but she was so obnoxious and gave the agent a hard time that once that passenger was processed, the agent needed a mental-health break, and left the counter for 15 minutes. When she returned she was composed, I treated her nicely, she got us on a flight the next day, and we unexpectedly stayed overnight near the airport. Moving to Utah Early in 2017, a friend announced that she was moving to Utah. In a fit of madness, I offered to drive her and her possessions there in a rental truck. After we'd each slept on the idea for a week, we decided that it might even be fun. The most direct route would be to go north a bit through Maryland and Pennsylvania, and then west on Interstate Highway 70 (I70) through West Virginia, Ohio, Indiana, Illinois, Missouri, Kansas, Colorado, and on into Utah, and then north on state highways to Park City, the location of her new home. Despite all our planning, Mother Nature had other ideas. First, a major winter storm was forecast for the Northern Virginia area, our starting point, and another was already in progress in the Midwest, through which I70 ran. As a result, I quickly pulled together a new plan to avoid any ice and snow. Our final route was south through Virginia, and across the country on I40 through Tennessee, Arkansas, Oklahoma, Texas, New Mexico, and Arizona. And we drove an extra 700 miles. But hey, when you are sitting in a moving van driving at 70 miles/hour, you don't have much time to check out the view. Besides, it allowed us to have a great visit to the Arches National Park. No Trains Today! After a very pleasant week in Alsace, France, my wife and I fronted up to the Strasburg train station to buy tickets to Mainz, Germany, for that morning. But, au contraire mon ami, that turned out to be impossible because the train workers were having a little sit-down with coffee and croissants! There would be no trains today, monsieur! We needed a Plan B right then and there! Nearby was a car-rental counter and "Yes, perhaps we have a car available; just let me look as soon as I have finished my coffee and croissant." [The agent was marginally friendlier than the grouchy train agent had been.] Anyway, we got our car, loaded up our bags, and headed north. As we were no longer required to follow a route, we took advantage of the flexibility and stopped off to visit the Marginot Line along the way. [This never-completed fortified wall was built after WWI to stop the Germans from invading again. Unfortunately, they made an end-run through Belgium where there was no wall, tricky Devils!] Eventually, we got to our host family in Mainz where we stayed one night instead of the two we'd planned, before. As we were eating breakfast the next morning, the news broke that the Gulf War invasion had started. As a result, there would be extra security around all flights by US carriers. Conclusion When confronted with unexpected situations, try to take advantage of them. Be open-minded. Ask yourself, "What's the worst thing that can happen if I don't get to follow my current plan?" Remember, it's the journey, not the destination. In any event, pack a novel, a deck of playing cards, and maybe some ear plugs, just in case you have to sleep overnight at an airport, bus station, or ferry terminal. Add comment News and Information After my 5-week sojourn to Australia, it took two full weeks to get over the jetlag. Along the way, spring arrived, then departed, and then came back, but just for a few days! As Mark Twain famously said, "Everybody talks about the weather, but nobody does anything about it!"
Involvement of NMDA receptor in low-frequency magnetic field-induced anxiety in mice. It had been reported that exposure to extremely low-frequency magnetic field (ELFMF) induces anxiety in human and rodents. Anxiety mediates via the activation of N-methyl-d-aspartate (NMDA) receptor, whereas activation of γ-aminobutyric acid (GABA) receptor attenuates the same. Hence, the present study was carried out to understand the contribution of NMDA and/or GABA receptors modulation in ELFMF-induced anxiety for which Swiss albino mice were exposed to ELFMF (50 Hz, 10 G) by subjecting them to Helmholtz coils. The exposure was for 8 h/day for 7, 30, 60, 90 and 120 days. Anxiety level was assessed in elevated plus maze, open field test and social interaction test, on 7th, 30th, 60th, 90th and 120th exposure day, respectively. Moreover, the role of GABA and glutamate in ELFMF-induced anxiety was assessed by treating mice with muscimol [0.25 mg/kg intraperitoneally (i.p.)], bicuculline (1.0 mg/kg i.p.), NMDA (15 mg/kg i.p.) and MK-801 (0.03 mg/kg i.p.), as a GABAA and NMDA receptor agonist and antagonist, respectively. Glutamate receptor agonist exacerbated while inhibitor attenuated the ELFMF-induced anxiety. In addition, levels of GABA and glutamate were determined in regions of the brain viz, cortex, striatum, hippocampus and hypothalamus. Experiments demonstrated significant elevation of GABA and glutamate levels in the hippocampus and hypothalamus. However, GABA receptor modulators did not produce significant effect on ELFMF-induced anxiety and elevated levels of GABA at tested dose. Together, these findings suggest that ELFMF significantly induced anxiety behavior, and indicated the involvement of NMDA receptor in its effect.
Genetic analysis of the replication region of the Lactobacillus plasmid vector pPSC22. The sequence and genetic organization of the 1,600-bp replication region of the Lactobacillus vector pPSC22, a plasmid derived from a 7-kb cryptic plasmid of L. plantarum used for the cloning of heterologous genes in several lactobacilli, were determined. Sequence analysis revealed the presence of a plus origin of replication containing the two functional elements nic and bind, required for initiation of the leading strands typical of the rolling circle (RC)-replicating plasmids belonging to the pLS1 family. Two open reading frames (copA and repA) were located within the Lactobacillus portion of pPSC22. The repA gene product, a 234-amino acid protein, showed homologies with the Rep protein of the streptococcal plasmid pLS1 and contained the three conserved domains detected in most Rep proteins of RC-replicating plasmids and ss-coliphages. The genetic organization of the replication region of pPSC22 shared relevant homologies with the lactococcal plasmids pWVO1 and pFX2.
Sandnes Ulf har signert den franske midtbanespilleren Malaury Martin. 25-åringen har skrevet under på en toårskontrakt etter å ha imponert på en ukes treningsopphold hos sandnesklubben. – Jeg er her for å gi mitt beste for klubben og nå skal jeg jobbe hardt for å bli klar til sesongstarten om én måned, sier Martin til SandnesUlf.no etter at kontrakten er signert. Malaury Martin Jeg er her for å gi mitt beste for klubben og nå skal jeg jobbe hardt for å bli klar til sesongstarten om én måned. Stjerne på landslagsmidtbanen sammen med nåværende Tottenham-spiller Han har tidligere spilt for klubber som Monaco og Nimes i hjemlandet, samt Blackpool og Middlesbrough i England. I Monaco var han kaptein på reservelaget i 2007, og ble samme år på UEFAs egne hjemmesider lansert som et navn for fremtiden etter å ha imponert for det franske U19-landslaget under U19-EM i Østerrike. Da spilte han sammen med blant andre Tottenhams Étienne Capoue, Blackburns Rudy Gestede og Wolverhamptons Bakary Sako. Les også: Tippeliga-keeper setter filmkarrieren på vent – Vil sammenligne det med engelsk fotball Martins siste klubb var sveitsiske Lausanne, og etter å ha startet to kamper på La Manga med sin nye klubb er ikke midtbanespilleren sen om å dra paralleller. – Utifra de to kampene jeg spilte synes jeg kvaliteten på den norske ligaen minnet veldig om den sveitsiske ligaen. Jeg vil også sammenligne den litt med engelsk fotball, sier han. Daglig leder Tom Rune Espedal er veldig fornøyd med signeringen av det tidligere stjerneskuddet. – Han har en god bakgrunn, og har spilt bra på bra nivå tidligere. Det er en spiller som jobber hardt, og som vil passe godt inn i Sandnes Ulf-ånden. Vi ser frem til å se Malaury på banen for Sandnes Ulf i 2014, sier han.
--- abstract: 'This paper presents an approximate method for performing Bayesian inference in models with conditional independence over a decentralized network of learning agents. The method first employs variational inference on each individual learning agent to generate a local approximate posterior, the agents transmit their local posteriors to other agents in the network, and finally each agent combines its set of received local posteriors. The key insight in this work is that, for many Bayesian models, approximate inference schemes destroy symmetry and dependencies in the model that are crucial to the correct application of Bayes’ rule when combining the local posteriors. The proposed method addresses this issue by including an additional optimization step in the combination procedure that accounts for these broken dependencies. Experiments on synthetic and real data demonstrate that the decentralized method provides advantages in computational performance and predictive test likelihood over previous batch and distributed methods.' author: - | Trevor Campbell\ LIDS, MIT\ Cambridge, MA 02139\ `[email protected]`\ Jonathan P. How\ LIDS, MIT\ Cambridge, MA 02139\ `[email protected]`\ title: Approximate Decentralized Bayesian Inference --- ### Acknowledgements {#acknowledgements .unnumbered} This work was supported by the Office of Naval Research under ONR MURI grant N000141110688.
Anti-Legalization Group in Michigan Warn Voters of Super Potent Cannabis An anti-legalization group in Michigan is telling voters that today’s cannabis is too potent. Campaign workers with Healthy and Productive Michigan were recently calling voters in Detroit in an effort to get them to oppose Proposal 1, the recreational pot legalization initiative on the ballot next month. Reading from a script provided by the anti-pot political action committee, Wynona Moss of Warren, Michigan contacted voters via her cell phone. “Did you know that today’s drug is much more potent than in the ‘80s? The THC level in highly potent marijuana edibles is not regulated,” she recited to a voter she reached. The efforts against Proposal 1 by Healthy and Productive Michigan are being funded by Smart Approaches to Marijuana (SAM), a cannabis opposition group led by anti-pot crusader Kevin Sabet. Luke Niforatos, the SAM chief of staff, said that the effects of cannabis products high in THC are unknown. “This is limitless potency marijuana,” said Luke Niforatos. “What does it hurt to wait until we get the solid research on high potency THC?” Despite Niforatos’ claim of unlimited potency, Michigan medical marijuana regulations currently in effect limit cannabis products to 50 milligrams of THC. Similar limits for recreational products would also likely be