text
stringlengths 8
5.77M
|
---|
Chylous ascites after liver transplantation with mesentero-portal jump graft.
Chylous effusions and lymphatic leaks occur after trauma, malignant disease, primary lymphatic disorders, and parasitosis, and rarely after abdominal surgery. Chylous ascites after orthotopic liver transplantation is a rare complication. We report a case of chylous ascites occurring after hepatic transplantation with a mesentero-portal venous jump graft, successfully treated with conservative management. |
Effect of tyrosine ingestion on cognitive and physical performance utilising an intermittent soccer performance test (iSPT) in a warm environment.
The aim of this study was to investigate the effect of tyrosine (TYR) ingestion on cognitive and physical performance during soccer-specific exercise in a warm environment. Eight male soccer players completed an individualised 90 min soccer-simulation intermittent soccer performance test (iSPT), on a non-motorised treadmill, on two occasions, within an environmental chamber (25 °C, 40 % RH). Participants ingested tyrosine (TYR; 250 mL sugar free drink plus 150 mg kg body mass(-1) TYR) at both 5 h and 1 h pre-exercise or a placebo control (PLA; 250 mL sugar free drink only) in a double-blind, randomised, crossover design. Cognitive performance (vigilance and dual-task) and perceived readiness to invest physical effort (RTIPE) and mental effort (RTIME) were assessed: pre-exercise, half-time, end of half-time and immediately post-exercise. Physical performance was assessed using the total distance covered in both halves of iSPT. Positive vigilance responses (HIT) were significantly higher (12.6 ± 1.7 vs 11.5 ± 2.4, p = 0.015) with negative responses (MISS) significantly lower (2.4 ± 1.8 vs 3.5 ± 2.4, p = 0.013) in TYR compared to PLA. RTIME scores were significantly higher in the TYR trial when compared to PLA (6.7 ± 1.2 vs 5.9 ± 1.2, p = 0.039). TYR had no significant (p > 0.05) influence on any other cognitive or physical performance measure. The results show that TYR ingestion is associated with improved vigilance and RTIME when exposed to individualised soccer-specific exercise (iSPT) in a warm environment. This suggests that increasing the availability of TYR may improve cognitive function during exposure to exercise-heat stress. |
Directions
Bring eight quarts of water to a boil. Season with salt until it tastes like seawater.
In a large sauté pan, combine olive oil, guanciale and red onion. Cook over medium heat until the guanciale is completely rendered and crispy on both sides. Make sure to turn the onion as needed, allowing both sides to caramelize evenly.
Add the tomato paste, chile flakes, and half of the chopped parsley. Let the paste fry in the rendered fat until it darkens slightly, about 1 to 2 minutes. Add the tomato puree and stir to incorporate. Let simmer for 1 to 2 minutes to reduce. Taste for seasoning.
Cook the bucatini in the boiling water for 1 minute less than the package instructions. Drain the pasta, reserving a small amount of the cooking liquid. Add the pasta to the sauce and cook together for 30 seconds to a minute. Sparingly add some of the reserved pasta water to adjust the consistency of the sauce so that it evenly coats the noodle. Taste for done-ness.
Add the remaining parsley and remove the pan from the heat. Toss the pasta while gradually adding the cheese, allowing the cheese to emulsify into the sauce and serve immediately.
For homemade guanciale (optional)
Trim the pork jowl of any undesirable glands, skin or excess fat. With a sharp knife, score the guanciale halfway through the meat. You want the scores to run parallel with the natural striations of the meat.
Mix the remaining ingredients to make the guanciale cure. Liberally rub the meat with the cure, using your fingers to press the salt into the grooves and pockets of the jowl. Leftover cure can be saved indefinitely in the refrigerator.
Refrigerate the meat for a minimum of 1 month, but up to 6 weeks.
Prior to using, rinse the guanciale under cold running water to remove the cure, taking care to get all of the peppercorns.
Your guanciale is now ready to slice.
Extra guanciale can be saved in the refrigerator, tightly wrapped in plastic, for 4 to 6 weeks.
Bucatini all’Amatriciana at Lupa
Bucatini all’Amatriciana is one of the most quintessential dishes of Lazio. It’s exceedingly simple, but relies on a perfect al dente noodle and a high-quality guanciale to really sing. At Lupa Osteria Romana in New York City, chef Rob Zwirz has mastered it. |
@charset "utf-8";
@import url("reset.css");
/*主体部分*/
.main{
background:url("../../image/login/header_bg.png") top repeat-x;
min-width:1000px;
overflow:hidden;
width:100%;
height:auto
}
.header{
background:url("../../image/login/logo_ico.png") no-repeat top left;
margin:123px auto 0;
width:330px;
height:41px
}
/*中部内容部分*/
.content{
background:url("../../image/login/login_bg.png") no-repeat top center;
margin:69px auto 0;
width:423px;
height:366px;
border:1px solid #ededed
}
.title{
background:url("../../image/login/member_title.png") no-repeat top left;
margin:37px auto 20px;
width:229px;
height:36px
}
.input{
margin:0 auto 11px ;
width:237px
}
.input_all{
border:none;
color:#555;
font-size:14px;
line-height:30px;
padding:10px 0 10px 46px;
vertical-align:middle;
width:237px;
height:30px
}
.name{
background:url("../../image/login/input_name.png") no-repeat top left
}
.name_now{
background:url("../../image/login/input_name_hover.png") no-repeat top left
}
.password{
background:url("../../image/login/input_password.png") no-repeat top left
}
.password_now{
background:url("../../image/login/input_password_hover.png") no-repeat top left
}
.enter{
margin-top:15px
}
.button{
background:url("../../image/login/button.png") no-repeat center;
border:none;
cursor:pointer;
margin:0 auto;
width:150px;
height:55px
}
.checkbox{
font-size:12px;
margin:0 auto;
width:237px;
height:30px
}
.checkbox input{
display:block;
float:left;
margin-right:4px
}
.checkbox span{
display:block;
float:left;
xheight:20px;
line-height:20px;
*line-height:22px
} |
[Transforming growth factor (TGF-beta) and kidney transplantation].
Transformation growth factor (TGF-beta) is a cytokine, which takes part in many clinical conditions linked to different chronic disease states. Its production is regulated by genes and polymorphism of TGF-beta gene individually predetermines levels of its production. TGF-beta is produced by a number of normal, predominately haemopoietic and tissue cells. Moreover, it controls cell proliferation and differentiation, and namely it stimulates fibrogenesis. Profibrogenic efficacy plays a physiological role in wound healing and it is implicated in a spectrum of disease states, such as diabetic nephropathy, chronic glomerulonepthritis, lung fibrosis, or postirradiation fibrosis. In kidney transplant recipients. TGF-beta has been suggested to be involved in the chronic rejection pathogenesis by enhancing fibrogenesis. |
Q:
SQL Server 2005 FOR XML
I want to export data from a table to a specifically formatted XML file. I am fairly new to XML files, so what I am after may be quite obvious but I just cant find what I am looking for on the net.
The format of the XML results I need are:
<data>
<event
start="May 28 2006 09:00:00 GMT"
end="Jun 15 2006 09:00:00 GMT"
isDuration="true"
title="Writing Timeline documentation"
image="http://simile.mit.edu/images/csail-logo.gif">
A few days to write some documentation
</event>
</data>
My table structure is:
name VARCHAR(50),
description VARCHAR(255),
startDate DATETIME,
endDate DATETIME
(I am not too interested in the XML fields image or isDuration at this point in time).
I have tried:
SELECT [name]
,[description]
,[startDate]
,[endTime]
FROM [testing].[dbo].[time_timeline]
FOR XML RAW('event'), ROOT('data'), type
Which gives me:
<data>
<event name="Test1"
description="Test 1 Description...."
startDate="1900-01-01T00:00:00"
endTime="1900-01-01T00:00:00"
/>
<event name="Test2"
description="Test 2 Description...."
startDate="1900-01-01T00:00:00"
endTime="1900-01-01T00:00:00"
/>
</data>
What I am missing, is the description needs to be outside of the event attributes, and there needs to be a tag.
Is anyone able to point me in the correct direction, or point me to a tutorial or similar on how to accomplish this?
Thanks,
Matt
A:
This should do the job:
SELECT
name "event/@name"
, startDate "event/@start"
, description "event"
FROM
[testing].[dbo].[time_timeline]
FOR XML PATH(''), ROOT('data')
Things to note:
In order to get description as the text content of event, we have to 'step up' a level and use PATH(''), and specify the name event in the alias for all columns
All attribute-centric columns must come before all non-attribute-centric columns
For learning this stuff (or at least getting an idea of how to do what you want), see the docs for FOR XML and just play around with your own tables and desired XML structures.
|
1. Field of the Invention
The invention relates to a foam dispenser including a housing and a fluid reservoir placed in the housing. The housing includes an opening, a plug connected to the fluid reservoir in the opening, and a foam pump. The foam pump includes an air pump, a fluid pump, a closable supply to the air pump, a nozzle, and a movable operating part and is configured to dispense a quantity of foam through the nozzle upon actuation of the operating part in a direction of pumping. The foam pump and the fluid reservoir are combined into a removable storage holder.
The invention also relates to a housing for a foam dispenser configured to receive a removable fluid reservoir and a foam pump, and arranged for operation of the foam pump.
Furthermore, the invention relates to a storage holder, e.g., for liquid soap, configured for placement in a foam dispenser and comprising a fluid reservoir having an opening, a plug connected to the fluid reservoir in the opening, and a foam pump.
2. Background of Related Art
Soap dispensers with foam pumps can, in general, be divided into two categories. Certain variants are in use in hand soap dispensers, consisting of a flexible standing can. A foam pump is screwed into an opening at the top of the can with a nozzle pointing downwards and a dip tube that extends at least partly into the can. The pump is, therefore, located above the level of the fluid reservoir. The soap is pumped upwards. At the same time, air flows into the can via an air supply in the pump to prevent a vacuum from being established in the can. Such a soap dispenser must always be used standing up. If it is held upside down, soap flows through the air supply. There is also a chance of contamination from outside, which may block the air supply. For this reason, the pump and dispenser is not designed to last for a long period of time.
In a different type of soap dispenser having a foam pump, the fluid reservoir is located above the level of the pump. This variant is especially suited for fitting in a bathroom or toilet. The fluid reservoir is used to store the liquid soap and is replaceable so that the foam dispenser can be recharged. In this variant, the pump is fixedly attached to the housing. For this reason, the pump is of a much more robust type. Because the fluid reservoir is located above the level of the pump, parts of the pump continually contact the fluid, due to gravitational effects, and can thus be harmfully affected. The pump must also last much longer, namely, as long as is needed to pump away the contents of a number of the replaceable fluid reservoirs. Replacement of the pump entails having to replace the entire housing and is, therefore, costly.
PCT International Publication No. WO 95/26831 describes a fluid dispenser for dispensing foam. The device includes a collapsible fluid container and a foam pump attached to the container outlet. The foam pump includes two enclosures. The first enclosure is connected to the neck of the container and the second enclosure is telescopically received in the first. In an assembled state, the two enclosures define an air chamber and a fluid chamber, each having an outlet that join together at the foam outlet. The fluid dispenser includes a dispenser housing for detachably receiving the collapsible container and the foam pump. The foam pump may, therefore, be less robust, as the fluid reservoir and pump can both be replaced after use.
A disadvantage of the known apparatus is that the foam pump has been designed especially for this application. The foam pump is only suitable for application in one sort of housing. This makes production of the pump much less economical, as it is manufactured in a small series, especially for this application. When one wants to make different versions of the housing and storage holder, for example, to provide dispensers for different types of fluid, different types of the pump and housing must be made, which further reduces the production series of both the pump and the housing and thus makes manufacturing less economical.
Accordingly, there are needs for an alternative foam dispenser, housings for a foam dispenser, and storage holders which can be manufactured more easily and more efficiently. |
President Trump signed into law the “VA Accountability” bill on Friday.
“The Department of Veteran Affairs Accountability and Whistleblower Protection Act of 2017” will “[bring] accountability to VA” and “[hold] VA employees to a higher standard” and “protects employees’ due process rights” and “safeguards whistleblowers from retaliation” and simultaneously “benefits honest VA employees”.
Today, it was a tremendous honor for me to sign the #VAaccountability Act into law, delivering my campaign promise to our #AmericanHeroes! pic.twitter.com/uNpp8CLYVz — Donald J. Trump (@realDonaldTrump) June 23, 2017
Today @POTUS signed law that will restore accountability & reduce red tape at VA hospitals
✔️Another promise kept
✔️Big win for our veterans pic.twitter.com/e4v0Z94uy3 — Reince Priebus (@Reince45) June 23, 2017
We are committed to the wellbeing of our vets. @POTUS’ signature today will signal a new era of #VAaccountability 🇺🇸 https://t.co/hSEO7cMauX — Kevin McCarthy (@GOPLeader) June 23, 2017
The President just signed landmark legislation to bring accountability to VA. Read Chairman @DrPhilRoe’s statement: https://t.co/svzQK1D1XO pic.twitter.com/vkwAZjMnG3 — HouseVetAffairs (@HouseVetAffairs) June 23, 2017
REAL NEWS → Yesterday, the House voted 368 to 55 on a sweeping VA accountability bill. Next stop @POTUS’ desk. https://t.co/rWX2qwxraW — Kevin McCarthy (@GOPLeader) June 14, 2017 |
40 S.W.3d 898 (2001)
STATE of Missouri, Respondent,
v.
Walter Timothy STOREY, Appellant.
No. SC 82324.
Supreme Court of Missouri, En Banc.
March 6, 2001.
Rehearing Denied April 24, 2001.
*902 Deborah B. Wafer, Asst. Public Defender, for appellant.
Jeremiah W. (Jay) Nixon, Atty. General, Stacy L. Anderson, Assistant Attorney General, Jefferson City, for respondent.
PRICE, Chief Justice.
Walter Timothy Storey killed Jill Frey on February 2, 1990. Following trial in 1991, a jury convicted him of first degree murder, armed criminal action, second degree burglary, and tampering with evidence. Upon the recommendation of the jury, the trial court sentenced Storey to death. In 1995, this Court affirmed the convictions, but reversed and remanded the death sentence after finding that Storey was denied his constitutional right to effective assistance of counsel during the penalty phase. State v. Storey, 901 S.W.2d 886 (Mo. banc 1995). In 1997, a second jury recommended a sentence of death, which the trial court adopted. This Court again reversed and remanded the sentence of death because of the trial court's failure to properly instruct the jury concerning Storey's constitutional right not to testify. State v. Storey, 986 S.W.2d 462 (Mo. banc 1999).
*903 On December 17, 1999, the trial court adopted a third jury's recommendation that Storey be put to death. We have exclusive jurisdiction over the appeal. Mo. Const. art. V, section 3. We affirm the sentence of death.
I. Facts
The facts underlying Storey's conviction, as previously outlined by this Court, are as follows:
On February 2, 1990, Storey received a divorce petition from his wife. Later that night, by his own admission, Storey got a knife from his kitchen, climbed up the balcony of his across-the-hall neighbor Jill Frey, entered her apartment, took her pocketbook and car keys, "struggled" with her, and stole her car.
The next day, again by his own admission, Storey reentered Frey's apartment using the stolen keys, tried to wipe his fingerprints from anything he had touched, cleaned under Frey's fingernails with her own toothbrush, put evidence in a dumpster, and threw Frey's keys in the lake behind her apartment.
The day after that, Frey failed to appear at work, so her co-workers came to check on her. They found Frey's dead body in the bedroom. She had six broken ribs; she had been hit in the face and head 12 times; she had a non-fatal stab wound in her side. Most or all of these injuries were inflicted before she was killed by two six-inch cuts across her throat.
State v. Storey, 901 S.W.2d 886, 891 (Mo. banc 1995).
II. Standards of Review
The trial court is vested with broad discretion in determining the admissibility of evidence offered at the penalty stage of a capital case. State v. Clayton, 995 S.W.2d 468, 478 (Mo. banc 1999). "As a general rule, the trial court `has discretion during the punishment phase of trial to admit whatever evidence it deems helpful to the jury in assessing punishment.'" State v. Winfield, 5 S.W.3d 505, 515 (Mo. banc 1999) (quoting State v. Kinder, 942 S.W.2d 313, 331 (Mo. banc 1996)).
On direct appeal, we review the trial court "for prejudice, not mere error, and will reverse only if the error was so prejudicial that it deprived the defendant of a fair trial." State v. Morrow, 968 S.W.2d 100, 106 (Mo. banc 1998). Issues that were not preserved may be reviewed for plain error only, which requires the court to find that manifest injustice or miscarriage of justice has resulted from the trial court error. State v. Worthington, 8 S.W.3d 83, 87 (Mo. banc 1999).
III. Issues Raised on Appeal
On appeal, Storey alleges eleven points of error. For the sake of convenience, we address his claims in the following order: A) the trial court erred during jury selection by refusing to quash the jury panel, in failing to grant the defendant's request to strike two jurors for cause, and in granting the State's request to strike a potential juror for cause (Storey's points 1 and 7); B) the trial court erred in admitting certain victim impact evidence and in limiting the testimony of an expert witness (Storey's points 4, 5, and 8); C) the trial court erred during closing arguments when it allowed the State to characterize the mitigating circumstances as "excuses" and the defendant's plea for mercy as a plea for "weakness" (Storey's points 2 and 3); D) the trial court erred when it overruled defense objections to jury instructions eleven and twelve (Storey's points 9 and 10); and E) the trial court erred by submitting two statutory aggravating circumstances to the jury (Storey's point 6).
*904 Finally, we conduct an independent review of the sentence pursuant to section 565.035, RSMo 1994, and we address Storey's claim that the sentence of death in this case is disproportionate (Storey's point 11).
A. Jury Selection
In two points of error, Storey alleges that the trial court abused its discretion during the jury selection process by overruling a defense motion for a mistrial, by overruling the defense motion to strike a venireperson for cause, and by granting the State's motion to strike a venireperson for cause.
1.
During jury voir dire, defense counsel asked the venire panel whether they understood the meaning of life imprisonment. In response, a venireperson asked whether a person sentenced to life without the possibility of parole might later be released from prison due to an appeal. The trial court explained to the venireperson that "[t]here is always a possibility that there are appeals that you are aware and that there is always the possibility that the governor has the power to give clemency." Storey argues that the explanation of the trial court violated United States Supreme Court precedent by shifting the sense of responsibility from the sentencing jury to the appellate court. Caldwell v. Mississippi, 472 U.S. 320, 105 S.Ct. 2633, 86 L.Ed.2d 231 (1985). He suggests that the judge's remarks created a juror bias in favor of the death sentence.
We review Storey's allegation "for prejudice, not mere error, and will reverse only if the error was so prejudicial that it deprived the defendant of a fair trial." State v. Morrow, 968 S.W.2d 100, 106 (Mo. banc 1998). In this case, the trial court issued its explanation of the appellate process to the second of two venire panels. Storey's jury was selected entirely from the first venire panel, which precluded them from hearing the comments of the trial court. Storey could not, therefore, suffer prejudice because of the alleged error. The point is denied.
2.
Storey alleges that the trial court committed two errors when exercising its discretion to strike jurors for cause. This Court does not disturb the trial court's ruling on juror qualification matters unless it is clearly against the evidence and amounts to a clear abuse of discretion. State v. Barnett, 980 S.W.2d 297, 303 (Mo. banc 1998).
a.
First, Storey contends that the trial court abused its discretion when it overruled defense counsel's motion to strike two prospective jurors for cause. Storey contends that these jurors were not qualified because the first venireperson testified that a murderer's life had no value and the second venireperson testified that she could not consider graphic photographs of the crime scene and autopsy. In each case, however, the defense struck the venireperson peremptorily. Consequently, section 494.480.4, RSMo 1994, is controlling. The statute states, in relevant part:
The qualifications of a juror on the panel from which peremptory challenges by the defense are made shall not constitute a ground for the granting of a motion for new trial or the reversal of a conviction or sentence unless such juror served upon the jury at the defendant's trial and participated in the verdict rendered against the defendant.
Section 494.480.4, RSMo 1994. Because the defense struck the prospective jurors in question, the qualification of the prospective *905 jurors cannot constitute a ground for reversal of conviction or sentence.
Storey further states that section 494.480.4 violates the United States Constitution and the Missouri Constitution. These issues were not raised until his motion for new trial was filed and are not supported here beyond mere abstract and conclusionary statements. They are waived. See State v. Morovitz, 867 S.W.2d 506, 510 (Mo. banc 1993); Rule 30.06(c); Rule 84.04(d)(1) and (4). The point is denied.
b.
Storey next contends that the trial court abused its discretion by striking a venireperson because of his inability to consider the death penalty as a possible punishment. During the State's death-qualification voir dire, the following exchange occurred:
[Counsel]: [G]iven our discussions, given what you have heard so far, could you form the opinion that for killing Jill Frey, Mr. Storey should get the death penalty?
[Venireperson]: No.
[Counsel]: When you indicate no, is that because you have a moral or religious belief that stops you from considering it?
[Venireperson]: Yes.
* * *
[Counsel]: Given that decision and that belief, realistically speaking, do you think there is any evidence I could give you that would let you temporarily set aside that belief so that in fact in this case, you could vote for the death penalty?
[Venireperson]: It's possible, but not likely.... It would only be in a very severe case. You would really have to show me some evidence.
Over defense counsel's objection, the trial court struck the venireperson for cause.
"Venirepersons may not be excluded simply because of general objections to the death penalty or conscientious or religious scruples against it. Venirepersons may be excluded only where it appears that their views would prevent or substantially impair the performance of their duties as jurors in accordance with the instructions and their oath." State v. Roberts, 948 S.W.2d 577, 597 (Mo. banc 1997) (citing Gray v. Mississippi, 481 U.S. 648, 657, 107 S.Ct. 2045, 95 L.Ed.2d 622 (1987) and Wainwright v. Witt, 469 U.S. 412, 424, 105 S.Ct. 844, 83 L.Ed.2d 841 (1985)). In this case, the venireperson's equivocal and shifting responses to questions focusing on his ability to impose the death penalty provide a sufficient basis for the trial court to conclude that the venireperson could not consider the full range of punishment as required by the instructions and the juror's oath. See State v. Clemons, 946 S.W.2d 206, 225 (Mo. banc 1997). The point is denied.
B. Mitigating and Aggravating Circumstances
In three points of error, Storey challenges the trial court's rulings concerning the admission of evidence in aggravation and mitigation of the death penalty. Specifically, he argues that the trial court erred in admitting the testimony of Lavon Marshall, Karen Stepson, Trinje Reidelberger, Bobby Reidelberger, and Jody Harrison; in admitting certain victim impact exhibits; and in sustaining the State's objection to the testimony of defense expert James Aiken.
1.
Storey first contends that the trial court erred in admitting eleven exhibits into evidence and in endorsing witnesses *906 Trinje Reidelberger, Bobby Reidelberger, and Jody Harrison because the State disclosed the evidence after the commencement of the trial. He further argues that his rights to due process and a fair trial were violated and that at a minimum "the defense would have wanted to voir dire the jury about the extraordinarily emotional and sensitive nature of the evidence involved."
"The basic object of the discovery process is to permit the defendant a decent opportunity to prepare in advance of trial and avoid surprise." State v. Kilgore, 771 S.W.2d 57, 66 (Mo. banc 1989). We recently addressed the issue of late endorsement of witnesses in Moss v. State, 10 S.W.3d 508 (Mo. banc 2000). In Moss, the trial court granted the State leave to endorse two additional witnesses only five days before the trial. In finding no error in the trial court's decision, we considered the following factors:
(1) Whether the defendant waived the objection;
(2) Whether the state intended surprise or acted deceptively or in bad faith, with the intention to disadvantage the defendant;
(3) Whether in fact defendant was surprised and suffered any disadvantage; and
(4) Whether the type of testimony given might readily have been contemplated.
Moss v. State, 10 S.W.3d 508, 514 (Mo. banc 2000).
a.
Storey argues that the trial court's decision prejudiced him (a) in conducting voir dire and (b) in addressing the evidence at trial. When objecting to the evidence, however, defense counsel failed to relay any concerns about the jury selection process. The trial court heard the following objection concerning the evidence at issue:
THE COURT: Now you wanted to make a record on something this morning, ma'm?
[Defense Counsel]: Yes, your Honor. Yesterday morning before we began opening statements, we indicated to the Court that we had just moments before received from the prosecuting attorney, Nels Moss, an endorsement of four new witnesses and then a number of items, a photo album.... [T]he matters that have now been disclosed are brand new witnesses, documents, items that have not previously been disclosed until the third day of trial. We are at a significant disadvantage.
THE COURT: Tell me about the first three [referring to Trinje Reidelberger, Bobby Reidelberger, and Jody Harrison].... These are basically victim character witnesses?
[Prosecutor]: Basically victim character witnesses....
THE COURT: So they don't have any knowledge of the incident itself?
[Prosecutor]: No, none whatsoever....
THE COURT: With respect to the first three, they are character witnesses what a good person the deceased was. I'm going to allow the endorsement of those first three witnesses, two Reidelbergers and Jody Harrison.... Is there anything further?
[Defense Counsel]: Yes Judge. The physical exhibits, again, I will object to those items as having not been disclosed in a timely manner to the State....
THE COURT: I am going to deny the motion and allow it.
[Defense Counsel]: If I could, just for the record, indicate that ... we have no testimony, no statements, no notes.... If we had been given timely notification *907 of their endorsement, we would have exercised our discovery rights to depose them so we are fully prepared for the information they will provide. In light of the Court's ruling, we are going to be unable to provide effective assistance of counsel to question these witnesses on cross-examination should that be necessary. For that reason, I would request a mistrial or in the alternative, ask that these witnesses be excluded....
THE COURT: I'll make them available so that you can talk to them before they testify.
(Record at 1123-1130). Defense counsel also made no further objection or statement, either at that time or at any time thereafter, that would explain why the relief provided was inadequate.
Before voir dire, the State endorsed witnesses Lavon Marshall, Karen Stepson, Gladys Frey, and Timothy Frey, who all testified as "victim impact" witnesses. Because of these endorsements, the defense should have readily contemplated the admission of evidence related to Jill Frey's character and her work with disabled children. Nevertheless, the defense failed to ask any voir dire questions concerning the jurors' sensitivities to these issues or to the witnesses identified prior to that time. To each venireperson, the defense simply asked the following three questions in substantially the same form:
(1) Do you think that you could realistically and meaningfully consider anything less than the death penalty?
(2) Do you believe that it is important for you that you know as much information as you can have about Storey, his background, and his character?
(3) If you were the foreman of the jury, could you sign a verdict sentencing Storey to life imprisonment even though eleven of the twelve jurors, including yourself, believed that he should receive a sentence of death?
We do not find Storey's argument that he was prejudiced during voir dire by the untimely disclosure of these witnesses credible. There is no indication that the defense would have changed its voir dire strategy due to the endorsement of three additional victim impact witnesses when the defense did not address already identified victim impact witnesses. The mere fact that one of the witnesses was confined to a wheel chair does not alter this conclusion, as the defense was fully notified of the State's intention to introduce testimony related to the victim's work with disabled children.
b.
We also find no indication that the defense suffered a disadvantage during the presentation of evidence or during closing arguments. Due to the timely endorsement of several other victim impact witnesses, the defense should have been prepared for this particular type of evidence. Moreover, the trial court, in its discretion, ordered a remedy to the late disclosure in accordance with Supreme Court Rule 25.16. The defense made no indication that this remedy was insufficient to prepare for the testimony or for admission of the exhibits. Finally, defense counsel chose not to cross-examine any of the character witnesses in this case, and there is no indication that an earlier disclosure would have prompted a change in this defense strategy. "Where counsel is surprised by opposing evidence at trial, but deals with that evidence in precisely the same manner as if he had been fully prepared, there is no reason to exclude that evidence, however significant, based on a discovery violation." Kilgore, 771 S.W.2d at 66.
*908 c.
Under these facts, Storey did not suffer prejudice. The point is denied. We do not approve, however, the untimely endorsement of witnesses during the penalty phase hearing, without a showing of good cause. Trial courts should take care to protect the integrity of our process from such sloppy or disingenuous tactics. Nonetheless, a new trial is not warranted without some indication that Storey might have done things differently or that a different result might otherwise have occurred.
2.
Storey next claims that certain victim impact evidence exceeded the boundaries of permissible victim impact evidence as discussed in Payne v. Tennessee, 501 U.S. 808, 111 S.Ct. 2597, 115 L.Ed.2d 720 (1991). He assigns error to the admission of certain testimony and to the admission of certain exhibits. We address each in turn.
a.
The State introduced the testimony of two victim impact witnesses, who testified about the physical, emotional, employment, and marital problems that resulted from Frey's death. Lavon Marshall testified that her apartment shared a common bedroom wall with Frey's apartment. She recounted that on the day of the murder she heard Storey murder Frey, but failed to call the police. Marshall told the jury that the murder severely traumatized her, forcing her to undergo four years of counseling and to give up her job. Defense counsel objected to Marshall's testimony.
The State also introduced the testimony of Karen Stepson, a close friend of Frey. She testified that she discovered Frey's body after the murder and that the experience caused her great fear and anxiety. She also told the jury that Frey was a well-liked person who was valued as a teacher of handicapped children. Stepson testified that Frey's students continually looked for her after her death and were confused that she never returned to school. The defense did not object to Stepson's testimony.
"Victim impact evidence is simply another form or method of informing the sentencing authority about the specific harm caused by the crime in question, evidence of a general type long considered by sentencing authorities." Payne v. Tennessee, 501 U.S. 808, 825, 111 S.Ct. 2597, 115 L.Ed.2d 720 (1991). "As a general rule, the trial court `has discretion during the punishment phase of trial to admit whatever evidence it deems helpful to the jury in assessing punishment.'" State v. Winfield, 5 S.W.3d 505, 515 (Mo. banc 1999) (quoting State v. Kinder, 942 S.W.2d 313, 331 (Mo. banc 1996)). Both Marshall and Stepson testified as to the "specific harm caused by the defendant." Payne, 501 U.S. at 825, 111 S.Ct. 2597. The trial court did not abuse its discretion in finding this evidence helpful to the jury in assessing punishment. The point is denied.
b.
The State also introduced eleven exhibits related to the structures and events that were dedicated to Frey following her death. The challenged evidence includes a photograph of Frey with her first class of handicapped students, a photograph of a memorial garden that was built in Frey's memory, a photograph of a memorial plaque commemorating the garden, a photograph of a "balloon release" ceremony by the children at the United Services school, a sketch of Frey that hung in the school as a memorial, a special edition of the school newsletter commemorating *909 Frey's death, a picture of the inscription on Frey's tombstone, a poem written by Trinje Reidelberger that she read to the jury, and a eulogy written by Jody Harrison that she read to the jury.
Victim impact evidence is admissible under the United States and Missouri Constitutions. State v. Deck, 994 S.W.2d 527, 538 (Mo. banc 1999); see also section 565.030.4, RSMo 1994. "[J]ust as the defendant is entitled to present evidence in mitigation designed to show that the defendant is a `uniquely individual human being,' the State is also allowed to present evidence showing each victim's `uniqueness as an individual human being.'" Id. at 538 (quoting Payne v. Tennessee, 501 U.S. 808, 822-23, 111 S.Ct. 2597, 115 L.Ed.2d 720 (1991)). Victim impact evidence violates the Constitution only if it is so "unduly prejudicial that it renders the trial fundamentally unfair." State v. Parker, 886 S.W.2d 908, 927 (Mo. banc 1994) (quoting Payne v. Tennessee, 501 U.S. 808, 824-26, 111 S.Ct. 2597, 115 L.Ed.2d 720 (1991)).
Storey argues that the United States Supreme Court decision in Payne does not authorize the "plethora of exhibits created after Frey's death." Storey has failed, however, to show how the specific evidence admitted in this case prejudiced him in such a way as to render the trial fundamentally unfair.
A number of the exhibits were properly admitted. The photographs of Frey with her class, the balloon release, and the memorial garden serve to illustrate Frey's value to the community and the impact of her death upon her friends and co-workers. In other words, the exhibits help the jury to see the victim as something other than a "faceless stranger." State v. Gray, 887 S.W.2d 369, 389 (Mo. banc 1994). The trial court did not abuse its discretion in admitting these exhibits.
Likewise, the newsletter, poem, and eulogy each describe Frey's unique characteristics and the contributions that she made to society. Though reading a poem or eulogy may not be appropriate in every case, the writings in this case were read into evidence by their respective authors. Clearly, either author could have testified about the victim without the aid of a writing. The prosecutor's choice to use the recorded recollection simply does not result in unfair prejudice under these facts.
Only one exhibit reached beyond the scope of proper victim impact evidence. The photograph of Frey's tombstone was not relevant to show the impact of Frey's death, and it inappropriately drew the jury into the mourning process. Nevertheless, an analysis of improperly admitted victim impact evidence must focus on fundamental fairness. State v. Knese, 985 S.W.2d 759, 771-72 (Mo. banc 1999). Though a photograph of a victim's tombstone will rarely be admissible, there is no reason to treat it any differently than other types of evidence. Id. As with all errors in the admission of evidence, this Court reviews the admission of victim impact evidence "for prejudice, not mere error, and will reverse only if the error was so prejudicial that it deprived the defendant of a fair trial." State v. Morrow, 968 S.W.2d 100, 106 (Mo. banc 1998). The question, then, is whether the error in this case "so infects the sentencing proceeding as to render it fundamentally unfair." Knese, 985 S.W.2d at 772. In light of the other properly admitted evidence establishing the particularly senseless and brutal nature of the murder of Jill Frey, we simply can not conclude that the erroneous admission of an irrelevant photograph deprived Storey of a fair trial. The point is denied.
*910 3.
In his next point, Storey argues that the trial court erred in excluding certain testimony of defense expert James Aiken. Specifically, Aiken testified that the classification of "maximum security inmate" would remain with Storey for the rest of his life because "the sentence and the crime that he committed will never ever change." The trial court sustained the State's objection based on the speculative nature of Aiken's statement.
"It is within the trial court's sound discretion to admit or exclude an expert's testimony...." State v. Davis, 814 S.W.2d 593, 603 (Mo. banc 1991). Whether the Department of Corrections' classification system will ever change is a matter of speculation. Moreover, the Governor of Missouri retains the power to grant Storey clemency and reduce his sentence. Mo. Const. art. IV, section 7. The trial court did not abuse its discretion in excluding the speculative testimony. The point is denied.
C. State's Closing Argument
In two points of error, Storey argues that the trial court abused its discretion in overruling defense counsel's objection to the State's closing argument. Specifically, he suggests that the trial court erred in allowing the prosecutor to argue that Storey's mitigating circumstances were a "laundry list of excuses," that Storey was "praying for weakness," and that statistical analysis made it likely that "at least two or three of [the jurors] were abused."
"The trial court has broad discretion in controlling the scope of closing argument and the court's rulings will be cause for reversal only upon a showing of abuse of discretion resulting in prejudice to the defendant." State v. Deck, 994 S.W.2d 527, 543 (Mo. banc 1999). "[B]oth parties have wide latitude in arguing during the penalty phase of a first-degree murder case." State v. Carter, 955 S.W.2d 548, 558 (Mo. banc 1997). "[E]ven if the prosecution's argument was improper, reversal is appropriate only if it is established that the comment of which Appellant complains had a `decisive effect on the jury's determination.'" State v. Armentrout, 8 S.W.3d 99, 111 (Mo. banc 1999) (quoting State v. Hall, 982 S.W.2d 675, 683 (Mo. banc 1998)). "In order for a prosecutor's statements to have such a decisive effect, there must be a reasonable probability that the verdict would have been different had the error not been committed." Deck, 994 S.W.2d at 543.
1.
Storey first complains that the trial court abused its discretion when it allowed the State to characterize the circumstances offered in mitigation as "a laundry list of excuses." He suggests that the State's argument encouraged the jury to disregard the jury instructions and the law. This point mischaracterizes the State's role in closing arguments. "The prosecutor may comment on the evidence and the credibility of the defendant's case.... Counsel may even belittle and point to the improbability and untruthfulness of specific evidence." State v. Hall, 982 S.W.2d 675, 683 (Mo. banc 1998) (quoting State v. Kreutzer, 928 S.W.2d 854, 872 (Mo. banc 1996)).
In this case, the State did not argue that the jury should disregard the evidence. The prosecutor simply argued that the jury should give the mitigating evidence little or no weight. Clearly, the State is not required to agree with the defendant that the evidence offered during the penalty phase is sufficiently mitigating to preclude imposition of the death sentence. To the contrary, the State is free to argue *911 that the evidence is not mitigating at all, so long as the trial court properly instructs the jury to consider all of the evidence in making its decision. The point is denied.
2.
Storey next contends that the trial court abused its discretion by allowing the State to equate "mercy" with "weakness." During defense counsel's closing argument, the defense asked the jury for mercy. In response, the State argued to the jury that Storey did not deserve mercy.
What the defense I think enjoys here, and they depend upon is that you are good and decent people, and for you killing is a last resort.... They come here and they beg you for mercy. Well they ask for mercy and they're praying for weakness.... Ladies and gentlemen, mercy is a good thing. Weakness is something that we can ill afford.... Mercy is something that the strong give to the weak and to the innocent. You are strong because you have the power here, but that man doesn't qualify for mercy.
Storey suggests that the prosecutor's argument encouraged the jury to disregard the mitigating factors in violation of Missouri law and the United States Constitution.
We have cautioned against any suggestion that the jury is weak if it fails to return a certain verdict. State v. Rousan, 961 S.W.2d 831, 851 (Mo. banc 1998). Nevertheless, "[a] prosecutor is allowed to argue that the defendant does not deserve mercy under the facts of a particular case." Id. In Rousan, the defense asked for mercy during closing arguments. The prosecutor then discussed the difference between mercy and weakness. He argued that the defendant did not deserve mercy under the facts of the case. In conclusion, he stated, "The defense has asked you for mercy and what they are hoping for is weakness. I'm sorry. It's a hard choice. Weakness is something we can no longer afford. Do your duty. Thank you folks." Id.
As in Rousan, we find that the State's comment about weakness was isolated and part of a larger and otherwise appropriate argument. We can not say under the facts of this case that the trial court abused its discretion in overruling the defense objection or that there is a reasonable probability that the jury's verdict would have been different had the argument not been made. Deck, 994 S.W.2d at 543. The point is denied.
3.
Storey next argues that the trial court abused its discretion when it allowed the State to refer to matters not in evidence. During closing arguments, the prosecutor stated, "Folks, a lot of people come up rough, real rough. Chances are from the statistics that I read, there are at least two or three of you that were abused some way yourself, as I understand it, it is about somewhere around twenty percent.... The simple fact of the matter is, that's not good enough reason to kill, to commit murder."
"A prosecutor may not argue facts outside the record." State v. Storey, 901 S.W.2d 886, 900 (Mo. banc 1995). The record in this case did not contain evidence concerning the statistical probability that the jurors had been abused. Therefore, the prosecutor's reference to this statistical evidence was improper. Nevertheless, the improper reference was an isolated and non-prejudicial piece of closing argument. The prosecutor may ask the jurors to draw upon their common experience and recognize that not all abused people commit murder. Cf. State v. Clay, 975 S.W.2d 121, 139 (Mo. banc 1998) ("a prosecutor *912 may call upon the jurors' common experience in arguments concerning the prevalence of crime in the community and the personal safety of its inhabitants."). Moreover, the prosecutor may argue that the abuse Storey suffered did not outweigh the evidence in aggravation of punishment. See State v. Knese, 985 S.W.2d 759, 774-75 (Mo. banc 1999).
Though referring to statistical data not in evidence is improper during closing arguments, the reference in this case was isolated and not prejudicial. The point is denied.
D. Jury Instructions
In two points of error, Storey contends that Instruction No. 11 and 12 violated his rights under the United States and Missouri Constitutions. He suggests that the trial court should have substituted the defendant's proffered instructions. This claim is without merit.
The language of Instruction No. 11 and 12 are patterned exactly after MAI-CR 3d 313.46B and 313.48B. The instructions are presumptively valid. State v. Ervin, 979 S.W.2d 149, 158 (Mo. banc 1998). "Whenever there is an MAI-CR instruction applicable under the law ..., the MAI-CR instruction is to be given to the exclusion of any other instruction." Id.
The first modification suggested by the defense concerned MAI-CR 313.46B (Instruction No. 11), commonly referred to as the "life option" instruction. Storey contends that the trial court abused its discretion by refusing to insert the following highlighted phrase into the pattern instruction:
You are not compelled to fix death as the punishment even if you do not find the existence of one or more of the mitigating circumstances sufficient to outweigh the aggravating circumstances or circumstances which you find to exist. You must consider all of the circumstances in deciding whether to assess and declare the punishment at imprisonment for life by the Department of Corrections without eligibility for probation or parole or death. Whether that is to be your final decision rests with you.
Storey argues that the modification was necessary to ensure that the jury gave effect to all of the mitigating evidence. See McKoy v. North Carolina, 494 U.S. 433, 437-38, 110 S.Ct. 1227, 108 L.Ed.2d 369 (1990); Mills v. Maryland, 486 U.S. 367, 375, 108 S.Ct. 1860, 100 L.Ed.2d 384 (1988).
The requested modification, however, is superfluous. The language of MAI-CR 313.46B adequately informs the jury that it must consider all of the circumstances, including the mitigating circumstances, in determining the appropriate punishment. Jury instructions are not to be viewed in isolation, but are to be taken as a whole to determine whether error occurred. Mallett v. State, 769 S.W.2d 77, 82 (Mo. banc 1989). The only choice facing the jurors by the time they reached Instruction No. 11 was whether to sentence Storey to death or life imprisonment. By considering all of the evidence in determining whether to sentence Storey to death, the jury also necessarily considered all of the evidence in determining whether to sentence him to life imprisonment. The trial court did not commit error when it refused to submit the proffered instruction. The point is denied.
The additional modifications offered by the defense concerned pattern instruction MAI-CR3d 313.48B (Instruction No. 12), also known as the "Verdict Mechanics" instruction. In two proposed instructions, the defense inserted the following *913 highlighted sentence into paragraph three:
If you unanimously decide, after considering all of the evidence and instructions of law given to you, that the defendant must be put to death for the murder of Jill Lynn Frey, your foreperson must write into your verdict all of the statutory aggravating circumstances submitted in Instruction No. 8 which you found beyond a reasonable doubt and sign the verdict form so fixing punishment. In addition, your foreperson must write into your verdict all of the other specifically mentioned aggravating circumstances submitted in Instruction No. ___ which you found beyond a reasonable doubt.
When constructing MAI-CR3d 48B, the drafters of the Missouri Approved Instructions contemplated the exact language offered by the defense in this case. However, the Notes on Use specifically state that the proposed sentence "will be included only if MAI-CR3d 313.41B was given." In this case, MAI-CR3d 313.41B is inapplicable because the prosecution did not submit any non-statutory aggravating circumstances for the jury's consideration. Thus, the proposed modification is not only superfluous, but also contrary to the Notes on Use. A trial court does not commit error when it refuses to submit an incorrect instruction. State v. Parkhurst, 845 S.W.2d 31, 36-37 (Mo. banc 1992).
Despite the superfluous language in paragraph three of the proposed instructions, Storey argues that the trial court should have included the following highlighted language in paragraph five:
If you are unable to unanimously find the existence of at least one statutory aggravating circumstance beyond a reasonable doubt as submitted in Instruction No. 8, or if you are unable to unanimously find there are aggravating circumstances which warrant the imposition of a sentence of death, as submitted in Instruction No. 9, or if each juror determines that there are one or more mitigating circumstances sufficient to outweigh the aggravating circumstances found to exist, as submitted in Instruction No. ___, then your foreperson must sign the verdict form fixing the punishment at imprisonment for life by the Department of Corrections without eligibility for probation or parole.
Storey suggests that this additional phrase is necessary for the instruction to comply with Section 565.030.4, RSMo 1994.
Section 565.030.4 outlines a four-step process that the jury must consider when assessing punishment in a capital case. The jury must assess the punishment at life imprisonment without the eligibility of parole (1) if the jury does not find beyond a reasonable doubt at least one statutory aggravating circumstance, (2) if the jury does not find that the evidence in aggravation of punishment warrants imposition of the death sentence, (3) if the jury concludes that there is evidence in mitigation of punishment that outweighs the evidence in aggravation of punishment, or (4) if the jury decides under all the circumstances not to assess punishment at death. Section 565.030.4, RSMo 1994.
The trial court instructed the jury concerning this four-step process in Instructions No. 8-11. Thus, the jury only reached Instruction No. 12 after undertaking the process outlined by the statute. Specifically, Instruction No. 10 told the jury that "if each juror finds one or more mitigating circumstances sufficient to outweigh the aggravating circumstances found to exist, then you must return a verdict fixing defendant's punishment at life imprisonment...." In paragraph four of Instruction No. 12, the jury was further admonished, "If you unanimously decide, *914 after considering all of the evidence and instructions of law, that the defendant must be punished ... by imprisonment for life ..., your foreperson will sign the verdict form so fixing the punishment." This paragraph adequately informed the jury of the proper verdict form should they choose to assess punishment at life imprisonment after considering steps three or four of the capital sentencing process. Storey's proposed modification added inapplicable language to paragraph five, which instructed the jury concerning the proper verdict form should the defendant be ineligible for the death sentence under steps one or two of the capital sentencing process. These instructions in no way precluded the jury from giving effect to the mitigating evidence. See Buchanan v. Angelone, 522 U.S. 269, 118 S.Ct. 757, 761, 139 L.Ed.2d 702 (1998); Lockett v. Ohio, 438 U.S. 586, 604, 98 S.Ct. 2954, 57 L.Ed.2d 973 (1978). The trial court did not err in rejecting the proposed modifications.
The proposed modifications to Instruction No. 12 included one additional paragraph that the defense chose not to address on appeal. Any objection concerning this modification is waived. See State v. Morovitz, 867 S.W.2d 506, 510 (Mo. banc 1993); Rule 30.06(c); Rule 84.04(d)(1) and (4). The point is denied.
E. Statutory Aggravators
In his next point of error, Storey complains that the trial court erred in submitting two statutory aggravating circumstances to support the sentence of death. First, he contends that submission of the "pecuniary gain" aggravating circumstance violated the constitutional prohibition against double jeopardy. Second, he argues that the evidence presented during the penalty phase was insufficient to support a finding of either the "pecuniary gain" aggravating circumstance or the "depravity of mind" aggravating circumstance.
1.
The trial court submitted the following "pecuniary gain" aggravating circumstance to the jury:
In determining the punishment to be assessed against defendant for the murder of Jill Lynn Frey, you must first unanimously determine whether one or more of the following aggravating circumstances exist:
1. Whether the defendant murdered Jill Lynn Frey for the purpose of the defendant receiving money or any other thing of monetary value from Jill Lynn Frey.
At each of Storey's previous sentencings, the jury failed to find the "pecuniary gain" aggravating circumstance. Storey contends that the submission of this aggravating circumstance to a third jury violates the constitutional prohibition against double jeopardy.
In Poland v. Arizona, the United States Supreme Court squarely addressed and rejected Storey's argument.
We reject the fundamental premise of petitioner's argument, namely, that a capital sentencer's failure to find a particular aggravating circumstance alleged by the prosecution always constitutes an "acquittal" of that circumstance for double jeopardy purposes.... Aggravating circumstances are not separate penalties or offenses, but are "standards to guide the making of [the] choice" between the alternative verdicts of death and life imprisonment.
Poland v. Arizona, 476 U.S. 147, 155-56, 106 S.Ct. 1749, 90 L.Ed.2d 123 (1986) (quoting Bullington v. Missouri, 451 U.S. 430, 438, 101 S.Ct. 1852, 68 L.Ed.2d 270 (1981)). In accordance with Poland, this Court further stated, *915 The principle that emerges from Bullington and Poland is that the failure to find a particular aggravating circumstance forms the basis for judgment of acquittal on the imposition of the death sentence only when there is a complete failure to find that any aggravating circumstance exists to support the death sentence.
State v. Simmons, 955 S.W.2d 752, 759-60 (Mo. banc 1997).
Storey contends that the recently decided cases of Jones v. United States, 526 U.S. 227, 119 S.Ct. 1215, 143 L.Ed.2d 311 (1999), and Apprendi v. New Jersey, 530 U.S. 466, 120 S.Ct. 2348, 147 L.Ed.2d 435 (2000), suggest that the Court has begun to reexamine the application of the double jeopardy clause to sentencing. To the contrary, the Apprendi Court specifically rejected the contention that its ruling had any effect on the finding of aggravating factors in capital cases. Apprendi, 120 S.Ct. at 2366; see also Jones, 526 U.S. at 250-51, 119 S.Ct. 1215. The submission of the "pecuniary gain" aggravating circumstance did not violate the Double Jeopardy Clause. The point is denied.
2.
Storey also challenges the sufficiency of the evidence to sustain the aggravating circumstances found by the jury. Storey failed to preserve this claim for appeal. Issues that were not preserved may be reviewed for plain error only, which requires the court to find that manifest injustice or miscarriage of justice has resulted from the trial court error. State v. Worthington, 8 S.W.3d 83, 87 (Mo. banc 1999).
"As to the sufficiency of the evidence to support the aggravating circumstances, the test is whether a reasonable juror could reasonably find from the evidence that the proposition advanced is true beyond a reasonable doubt." State v. Simmons, 955 S.W.2d 752, 768 (Mo. banc 1997). In this case, Storey entered Jill Frey's apartment with a knife. He knew that she was home, and he admitted that his intent was to obtain something of value to purchase more alcohol. After murdering Frey, Storey rummaged through her belongings and took her wallet, keys, and vehicle. This evidence is certainly sufficient to support a finding that Storey murdered Frey for the purpose of receiving money or any other thing of monetary value. Furthermore, the evidence supports a finding that Storey brutally beat Jill Frey to death, inflicting no fewer than twenty blunt force impacts, six broken ribs, a stab wound to the abdomen, and two incise wounds to the neck. The evidence further supports the finding that all of these wounds were inflicted while Frey was alive and conscious. The "depravity of mind" aggravating circumstance is fully supported by the evidence. The point is denied.
F. Proportionality Review
In his final point, Storey contends that his sentence is disproportionate under section 565.035, RSMo 1994. Section 565.035 requires us to independently review the sentence of death to determine (1) whether it was imposed under the influence of passion or prejudice or any other arbitrary factor; (2) whether there was sufficient evidence to support the finding of statutory aggravating circumstances and any other circumstance found; and (3) whether the sentence was excessive or disproportionate to the penalty imposed in similar cases considering the crime, the strength of the evidence, and the defendant.
Storey argues that the prosecutor improperly appealed "to the jury's passions and prejudices through improper victim *916 impact evidence and through other improper arguments and procedure." The three trials of this case unfortunately exhibit a consistent attempt by the prosecutor to push the envelope of proper advocacy. We condone the prosecutor's strategy no more in this trial than in the previous two that were reversed. Nonetheless, the extent of the prosecutor's overzealous behavior here does not reach that of Storey I. We find in this case that the imposition of the death penalty by a third jury was in response to a senseless and brutal murder and not as a result of any improper influence of passion, prejudice, or any other arbitrary factor.
We next review the trial court's findings to determine if the evidence supports beyond a reasonable doubt the existence of an aggravating circumstance and any other circumstance found. Section 565.035, RSMo 1994; State v. Clayton, 995 S.W.2d 468, 484 (Mo. banc 1999). In this case, the jury unanimously found two statutory aggravating circumstances as a basis for considering the death sentence. The evidence supports, beyond a reasonable doubt, a finding that Storey murdered Jill Frey for the purpose of receiving money or any other thing of monetary value and that the murder of Jill Frey involved depravity of mind. Section 565.032.2(4) and (7), RSMo 1994.
Lastly, we must determine whether the sentence of death is excessive and disproportionate considering the crime, the strength of the evidence, and the defendant. Section 565.035.3(3), RSMo 1994. In making this determination, we consider similar cases where the death penalty was imposed. Clayton, 995 S.W.2d at 484. This Court has upheld sentences of death in similar cases where the defendant evidenced depravity of mind through excessive acts of brutality and abuse. See, e.g., State v. Knese, 985 S.W.2d 759 (Mo. banc 1999); State v. Ervin, 979 S.W.2d 149 (Mo. banc 1998); State v. Johnston, 957 S.W.2d 734 (Mo. banc 1997); State v. Taylor, 929 S.W.2d 209 (Mo. banc 1996). We have also found the death sentence appropriate where the defendant entered the victim's home and committed murder for pecuniary gain. See, e.g., State v. Wolfe, 13 S.W.3d 248 (Mo. banc 2000); State v. Worthington, 8 S.W.3d 83 (Mo. banc 1999); State v. Jones, 979 S.W.2d 171 (Mo. banc 1998); State v. Barnett, 980 S.W.2d 297 (Mo. banc 1998); State v. Simmons, 955 S.W.2d 752 (Mo. banc 1997); State v. Kreutzer, 928 S.W.2d 854 (Mo. banc 1996). The penalty in this case is neither excessive nor disproportionate.
IV. Conclusion
The judgment is affirmed.
LIMBAUGH, WHITE, HOLSTEIN, WOLFF and BENTON, JJ., concur.
LAURA DENVIR STITH, J., not participating.
|
daemon-controller-ruby (1.1.2-1) precise; urgency=low
* Initial packaging
-- Hongli Lai <[email protected]> Wed, 01 May 2013 16:04:07 +0200
|
ADAM IS WELL KNOWN FOR HIS TENACIOUS APPROACH TO CHALLENGING IMPAIRED DRIVING CHARGES AND HE HAS ENJOYED TREMENDOUS RESULTS FOR HIS CLIENTS.
Bradford Underage DUI Defence
Defending Teen Drinking and Driving Charges in Bradford
Due to the severe and harsh punishments handed out to Bradford DUI offenders charged with impaired driving, it is always advisable to contact an experienced and reliable impaired driving lawyer.
Underage Drinking and Driving Is A Criminal Offence in Bradford, Ontario
The law in Ontario is straightforward when it comes to teen drinking and driving offences. As per the law, there is a zero tolerance policy in Bradford to such crimes. Since teenagers are inexperienced drivers, they put their own lives as well as the lives of others in grave danger while driving under the influence of alcohol. This is the main reason why the law in the case of teen drinking and driving in Bradford is strict. If you have been charged with laws governing teen drinking and driving offences then you need a competent lawyer by your side. We are one of the leading DUI law firms in Bradford and we can help you even in the worst-case scenarios.
Just How Serious of A Crime Is An Underage DUI in Bradford?
A DUI charge is considered a serious offence throughout the entire country and is dealt with in the most strictest ways in Bradford and elsewhere in Ontario. In the case of an underage DUI, things can get even worse because there is a zero tolerance policy. In some cases, such as a false DUI arrest, we will have to prove that the evidence against you is invalid. In such a case you will require the services of an experienced DUI lawyer to be safeguarded against serious punishments.
Do Not Hesitate To Contact Us If You Have Received A DUI Offence in Bradford
Bradford Zero Tolerance Policy Against Underage DUI Offences
The zero tolerance policy was adopted in order to curb the rising underage DUI offences. Since its adoption, if an underage driver is found with even a minute percentage of Blood Alcohol Concentration (BAC), the underage driver will be arrested immediately.
Preventing A Criminal Record for a DUI Under 19 conviction in Bradford
In the case of an underage DUI conviction, it is obvious that punishments will be imposed heavily on the driver and in addition to the punishment, the driver will also get a criminal record.
The Negative Consequences of Teen Drunk Driving Charges in Bradford
The consequences of a teen drunk driving conviction are generally harsher than that of an adult first timer. In the case of a DUI under 19, minors face penalties for driving under the influence as well as underage drinking. This would mean you could lose your licence for up to two years, end up doing community service and may have to pay thousands of dollars in fines in addition to getting a criminal record. On the other hand, for subsequent charges, you may end up getting your licence cancelled permanently, and doing jail time in the worst case scenario.
Get Reliable Help If You’ve Received An Underage DUI in Bradford, ON
Although the punishments and consequences of an underage drinking and driving conviction are tough, minors still have rights just as the adults under the legal system. The prosecutor has to show and prove to the court all the elements of the charges which include that the minor was driving and that the stop was for a rightful reason. Because of the life-altering consequences and penalties that a DUI offence has on a minor, it is always a great idea to fight a DUI in court. Contact our Bradford DUI lawyer for the most professional representation in court.
Adam Little received his LL.B in 2006 from Osgoode Hall Law School and has lectured at numerous educational conferences for the Law Society of Upper Canada and for the Criminal Lawyers’ Association of Ontario. Mr. Little's exceptional knowledge of the law as it pertains to driving related offences has been observed at the highest levels of court in Canada. Mr. Little has conducted both trials and appeals, at all levels of court in Ontario. Watch the video below as Adam carries out an appeal at the Supreme Court of Canada.
How We Helpour experience is your advantage
The initial in-person consultation to discuss your legal matter is FREE. The consultation is a personal meeting with Adam Little, and not an Associate. This is perhaps the most stressful time of a person’s life and thus there is no time limit to the meeting. Our experience includes a wide range of criminal and quasi-criminal litigation with a strong focus on impaired driving offences. When you come in and visit us we will evaluate your case and we will take whatever time is necessary to carefully review and discuss your criminal matter in a professional environment.
We aim to lead in each practice and area of law we work in. Coming from in-depth understanding of drunk driving laws and the DUI industry, capitalizing on extensive experience, we provide hands-on advice that speaks the language of our client’s. We never give up whether we are fighting an impaired driving charge, over 80m.g charge, care and control or a multiple DUI offence. |
A Practical and Useful Item for Your Clients
When its raining outside or dark clouds signify that a downpour could occur at any moment, heading out on foot is never fun. Even those who live in areas that get very little rain likely to have this type of item just to be on the safe side. While flyers, brochures, and other types of advertising methods can be expensive and could likely be discarded, a custom umbrella is a useful item that your clients will be thankful to have.
An Affordable Form of Continuous Advertising
Raising awareness about your organization on a consistent basis can be expensive. Commercials and billboard ads can cost a significant amount of money and are often ignored or viewed with skepticism. Having your logo and information on a useful item like this can be a great way to constantly show off your organization to new people at no additional cost.
High-Quality Versatile Selections with Handy Accessories
From classic versions to golf variants, we have a number of models available. Ranging in size from 40 to 62 inches, these models are made from sturdy materials and utilize telescopic shafts and uni-chrome ribs to help the unit remain sturdy even in windy conditions. In addition to the solid construction, matching sheaths are also included to help the unit be stored away neatly while not in use.
The Appealing Logo Design You Want
In order to make sure your custom umbrellas are created in compliance with your exact specifications, we will send proofs to you before we begin creating your unique merchandise. With a variety of colors and design types to choose from, you can stand out and build positive relationships with your clients using these specialized items. |
More than 27 minutes of surveillance footage has been released from security cameras at Marjory Stoneman Douglas High School, for the purpose of showing former deputy Scot Peterson standing outside of the building, while students and teachers were murdered inside.
In response to the actions of the armed school resource officer, Broward County Sheriff Scott Israel said the footage “speaks for itself.”
“His actions were enough to warrant an internal affairs investigation, as requested by Sheriff Scott Israel on Feb. 21. After being suspended without pay, Peterson chose to resign and immediately retired rather than face possible termination,” a statement from the department noted.
According to the time stamp on the video, the footage begins at 2:22 p.m. on Feb. 14, less than one minute before police claim that suspect Nickolas Cruz opened fire inside the freshman building.
In the video, Peterson can be seen running towards a golf cart at about the same time the first 911 call was made to Coral Springs Police reporting a shooting. He then runs to another side of the building, and the surveillance footage changes to a different angle of the building.
It was during that time that Peterson reportedly said over his police radio, “Be advised we have possible, could be firecrackers, I think we have shots fired, possible shots fired—1200 building.”
According to a timeline of the shooting from the Sun Sentinel, Cruz was picked up by an Uber at 2:06 p.m. and dropped off at the school at 2:19 p.m. He then entered the freshman building at 2:21 p.m.
The shooting reportedly lasted 7 minutes, which included enough time for a freshman student named Chris McKenna to find Cruz loading his rifle, and then to flee to get help when Cruz told him, “things are gonna start getting messy.”
The school confirmed that Cruz exited the building at 2:28 p.m. and blended in with other students who were fleeing campus. A teacher at the school who witnessed the shooting said she initially thought the shooter was a police officer because he was dressed in full body armor, and was carrying a rifle she had never seen before.
Given that he may have set off more warning signs if he had been fully clothed in body armor when he was riding in an Uber or entering the school, the timeline gives Cruz just 7 minutes to load his rifle, put on his body armor, shoot 31 people, discard the gun and the body armor and then exit the building.
The surveillance footage released by the Broward County Sheriff’s office ends at 2:50 p.m., and while it does show some students walking by as they exit the building, it fails to show Cruz entering or exiting—details that would arguably help to put the public’s mind at ease.
As The Free Thought Project has reported, it has been one month since the shooting occurred, and even though 17 innocent people were killed, the surveillance footage that has just been released serves as a reminder that some of the most glaring questions and inconsistencies are the ones that both law enforcement and the mainstream media refuse to address.
What the release of this footage highlights is the insulting attempt to appease the public and media’s demands for actual video that shows the actual crime. Until this is released, authorities in Florida are doing an injustice the victims and their families alike.
Source: www.activistpost.com |
t is the t'th term of 318, -257, -1230, -2613, -4418, -6657, -9342, -12485?
-2*t**3 - 187*t**2 + 507
What is the n'th term of -10827, -9564, -8301?
1263*n - 12090
What is the x'th term of 91872, 183961, 276060, 368175, 460312?
x**3 - x**2 + 92085*x - 213
What is the h'th term of -4992, -4972, -4946, -4914, -4876, -4832, -4782?
3*h**2 + 11*h - 5006
What is the f'th term of -406095, -811932, -1217769, -1623606, -2029443?
-405837*f - 258
What is the j'th term of -26073908, -26073884, -26073846, -26073794, -26073728, -26073648?
7*j**2 + 3*j - 26073918
What is the n'th term of -36379, -288472, -972721, -2305204, -4501999, -7779184?
-36013*n**3 - 2*n - 364
What is the a'th term of 678185, 678173, 678161, 678149, 678137, 678125?
-12*a + 678197
What is the l'th term of -162407071, -324814144, -487221227, -649628326, -812035447?
-l**3 + l**2 - 162407069*l - 2
What is the t'th term of 16463, 16894, 17325, 17756, 18187, 18618?
431*t + 16032
What is the y'th term of -497863, -497813, -497763, -497713?
50*y - 497913
What is the l'th term of 1698259, 3396486, 5094691, 6792874, 8491035?
-11*l**2 + 1698260*l + 10
What is the x'th term of -233730, -233633, -233468, -233235, -232934?
34*x**2 - 5*x - 233759
What is the r'th term of -39949489, -79898970, -119848437, -159797884, -199747305, -239696694, -279646045?
r**3 + r**2 - 39949491*r
What is the w'th term of 113308, 113928, 114548, 115168, 115788?
620*w + 112688
What is the h'th term of 938818417, 938818416, 938818415, 938818414, 938818413, 938818412?
-h + 938818418
What is the q'th term of -32980, -31253, -29526, -27799, -26072, -24345?
1727*q - 34707
What is the t'th term of 332793, 332798, 332803, 332808, 332813?
5*t + 332788
What is the a'th term of -9495, -9521, -9567, -9633, -9719, -9825, -9951?
-10*a**2 + 4*a - 9489
What is the i'th term of -1486, -15320, -53856, -129448, -254450, -441216, -702100, -1049456?
-2059*i**3 + 3*i**2 + 570*i
What is the z'th term of 13151, 14748, 16345?
1597*z + 11554
What is the w'th term of -258, -1231, -2936, -5379, -8566, -12503, -17196, -22651?
-w**3 - 360*w**2 + 114*w - 11
What is the g'th term of -1492, -1580, -1688, -1816, -1964?
-10*g**2 - 58*g - 1424
What is the n'th term of 201205, 201181, 201157, 201133, 201109, 201085?
-24*n + 201229
What is the r'th term of -54239, -216646, -487215, -865946, -1352839, -1947894?
-54081*r**2 - 164*r + 6
What is the v'th term of -8337260, -16674524, -25011788, -33349052?
-8337264*v + 4
What is the x'th term of -525, -523, -529, -543, -565?
-4*x**2 + 14*x - 535
What is the t'th term of -15656, -62867, -141552, -251711, -393344, -566451?
-15737*t**2 + 81
What is the b'th term of 1801, 7220, 16289, 29038, 45497, 65696, 89665?
5*b**3 + 1795*b**2 - b + 2
What is the x'th term of 96, 1666, 4314, 8040, 12844?
539*x**2 - 47*x - 396
What is the m'th term of -14849834, -29699665, -44549496, -59399327?
-14849831*m - 3
What is the k'th term of 355580, 355574, 355570, 355568, 355568?
k**2 - 9*k + 355588
What is the l'th term of -18883, -19950, -21017, -22084, -23151, -24218?
-1067*l - 17816
What is the s'th term of 34083967, 68167924, 102251879, 136335832, 170419783, 204503732?
-s**2 + 34083960*s + 8
What is the b'th term of 416037, 1666668, 3751053, 6669192, 10421085, 15006732?
416877*b**2 - 840
What is the s'th term of 27435663, 54871325, 82306987, 109742649?
27435662*s + 1
What is the k'th term of 100692305, 100692316, 100692327, 100692338, 100692349?
11*k + 100692294
What is the x'th term of -708, -232, 562, 1674, 3104, 4852, 6918?
159*x**2 - x - 866
What is the i'th term of 521, 2733, 4961, 7205, 9465?
8*i**2 + 2188*i - 1675
What is the y'th term of -373838, -747849, -1122034, -1496393, -1870926, -2245633?
-87*y**2 - 373750*y - 1
What is the f'th term of -27170, -54279, -81330, -108329, -135282, -162195?
-f**3 + 35*f**2 - 27207*f + 3
What is the z'th term of -416265, -416236, -416209, -416184?
-z**2 + 32*z - 416296
What is the c'th term of -10305, -10354, -10411, -10476, -10549?
-4*c**2 - 37*c - 10264
What is the k'th term of -1896, -2703, -3496, -4275, -5040?
7*k**2 - 828*k - 1075
What is the n'th term of -3074416, -6148828, -9223238, -12297646, -15372052, -18446456?
n**2 - 3074415*n - 2
What is the j'th term of -671, 962, 4167, 9340, 16877, 27174, 40627?
66*j**3 + 390*j**2 + j - 1128
What is the u'th term of 651442, 2605769, 5862978, 10423069?
651441*u**2 + 4*u - 3
What is the r'th term of -24757679, -24757682, -24757685, -24757688, -24757691, -24757694?
-3*r - 24757676
What is the p'th term of 1214, 2900, 5062, 7700, 10814?
238*p**2 + 972*p + 4
What is the w'th term of 1038662, 1038679, 1038696, 1038713, 1038730, 1038747?
17*w + 1038645
What is the v'th term of 955, 585, 37, -689, -1593, -2675?
-89*v**2 - 103*v + 1147
What is the t'th term of -3831775, -7663366, -11494957?
-3831591*t - 184
What is the f'th term of -1856, -1577, -1330, -1109, -908?
f**3 - 22*f**2 + 338*f - 2173
What is the l'th term of 42445225, 42445228, 42445229, 42445228, 42445225, 42445220, 42445213?
-l**2 + 6*l + 42445220
What is the i'th term of 10361321, 10361318, 10361315?
-3*i + 10361324
What is the t'th term of -23331, -22235, -21139?
1096*t - 24427
What is the h'th term of 5931340, 23725357, 53382052, 94901425, 148283476, 213528205?
5931339*h**2 + 1
What is the x'th term of -1218, -1275, -1370, -1503, -1674, -1883, -2130?
-19*x**2 - 1199
What is the b'th term of 131836, 132591, 133850, 135613?
252*b**2 - b + 131585
What is the c'th term of 32650519, 65301040, 97951561?
32650521*c - 2
What is the m'th term of 231107, 231138, 231169, 231200, 231231?
31*m + 231076
What is the i'th term of 14748, 25327, 35906, 46485, 57064?
10579*i + 4169
What is the k'th term of 102366, 409533, 921504, 1638279, 2559858?
102402*k**2 - 39*k + 3
What is the y'th term of -3331, -14770, -26209, -37648, -49087, -60526?
-11439*y + 8108
What is the l'th term of 21819429, 21819433, 21819439, 21819447?
l**2 + l + 21819427
What is the s'th term of -86063692, -86063687, -86063682, -86063677, -86063672, -86063667?
5*s - 86063697
What is the k'th term of 10766160, 10766153, 10766144, 10766133, 10766120?
-k**2 - 4*k + 10766165
What is the g'th term of -111464100, -222928201, -334392302, -445856403, -557320504?
-111464101*g + 1
What is the x'th term of -831980, -1663969, -2495958, -3327947, -4159936, -4991925?
-831989*x + 9
What is the h'th term of -77830, -155666, -233504, -311344?
-h**2 - 77833*h + 4
What is the d'th term of 84415, 168592, 252785, 337000, 421243, 505520, 589837, 674200?
d**3 + 2*d**2 + 84164*d + 248
What is the l'th term of 81550155, 163100309, 244650463?
81550154*l + 1
What is the i'th term of -310, -1198, -3378, -7420, -13894?
-95*i**3 - 76*i**2 + 5*i - 144
What is the s'th term of 865157, 865124, 865091, 865058, 865025?
-33*s + 865190
What is the q'th term of 2994, 6244, 9748, 13506, 17518, 21784, 26304?
127*q**2 + 2869*q - 2
What is the c'th term of -14041, -31828, -49629, -67450, -85297, -103176, -121093?
-c**3 - c**2 - 17777*c + 3738
What is the z'th term of 6260175, 6260171, 6260167?
-4*z + 6260179
What is the q'th term of -3964, -7838, -11612, -15286, -18860, -22334?
50*q**2 - 4024*q + 10
What is the p'th term of 87599, 698293, 2355169, 5581319, 10899835, 18833809?
87182*p**3 - p**2 + 423*p - 5
What is the j'th term of -283269, -1133053, -2549363, -4532193, -7081537, -10197389?
j**3 - 283269*j**2 + 16*j - 17
What is the d'th term of -114948, -231761, -348574, -465387?
-116813*d + 1865
What is the s'th term of -17570, -32528, -47486?
-14958*s - 2612
What is the p'th term of -13619, -27354, -41093, -54836?
-2*p**2 - 13729*p + 112
What is the k'th term of 158900, 158839, 158798, 158783, 158800, 158855, 158954?
k**3 + 4*k**2 - 80*k + 158975
What is the n'th term of -22597, -34875, -47151, -59425, -71697, -83967?
n**2 - 12281*n - 10317
What is the l'th term of -869983, -869756, -869519, -869266, -868991, -868688, -868351, -867974?
l**3 - l**2 + 223*l - 870206
What is the v'th term of 851089, 1702170, 2553251, 3404332, 4255413?
851081*v + 8
What is the o'th term of 3334, 12613, 27836, 49003, 76114, 109169, 148168?
2972*o**2 + 363*o - 1
What is the a'th term of -3638784, -7277577, -10916370, -14555163, -18193956, -21832749?
-3638793*a + 9
What is the d'th term of -20458 |
Description
Well maintained ranch in a great location! With great neighbors. All appliances are included! Located close to parks. Original hard wood floors, Kitchen has been updated. Basement is ready to be finished. This home is move in ready. It's just waiting for you to make it your own!
School Ratings & Info
Description
Well maintained ranch in a great location! With great neighbors. All appliances are included! Located close to parks. Original hard wood floors, Kitchen has been updated. Basement is ready to be finished. This home is move in ready. It's just waiting for you to make it your own!
Listing History
Date
Days Ago
Event
New Price
Feb 15, 2019
6 days ago
Price Reduced
:
$-2,000 (-1.33%)
$147,900
Feb 9, 2019
12 days ago
New on market
$149,900
Monthly Payment Calculator
Related Properties
Copyright 2019 Realcomp II Ltd. Shareholders. Real estate listings held by brokerages other than NERG Real Estate Experts are marked with the Realcomp-approved IDX logo and are provided through IDX through Realcomp II Ltd. IDX information is provided exclusively for the consumers' personal, non-commercial use and may not be used for any purpose other than to identify prospective properties consumers may be interested in purchasing. Any use of search facilities of data on the site, other than by a consumer looking to purchase real estate, is prohibited. The accuracy of all information, regardless of source, is not guaranteed or warranted. All information should be independently verified. Data last updated: 2019-02-22T08:56:44.687.
www.mnarealtors.com/homes/91701758
23425
Grove Street
Saint Clair Shores,
MI
48080
Price: $147,900
Status: Active
Updated: 40 min ago
ID#: 219011607
3
Beds
1
Baths
0
½ Baths
0.11
Acres
1,008
SQFT
$147
$/SQFT
1969
Built
Neighborhood:
Harper-Defer
County:
Macomb
Area:
St. Clair Shores
School District:
SOUTH LAKE
Property Description
Well maintained ranch in a great location! With great neighbors. All appliances are included! Located close to parks. Original hard wood floors, Kitchen has been updated. Basement is ready to be finished. This home is move in ready. It's just waiting for you to make it your own!
Copyright 2019 Realcomp II Ltd. Shareholders. Real estate listings held by brokerages other than NERG Real Estate Experts are marked with the Realcomp-approved IDX logo and are provided through IDX through Realcomp II Ltd. IDX information is provided exclusively for the consumers' personal, non-commercial use and may not be used for any purpose other than to identify prospective properties consumers may be interested in purchasing. Any use of search facilities of data on the site, other than by a consumer looking to purchase real estate, is prohibited. The accuracy of all information, regardless of source, is not guaranteed or warranted. All information should be independently verified. Data last updated: 2019-02-22T08:56:44.687.
Get Social
About Us
Copyright 2019 Realcomp II Ltd. Shareholders. Real estate listings held by brokerages other than NERG Real Estate Experts are marked with the Realcomp-approved IDX logo and are provided through IDX through Realcomp II Ltd. IDX information is provided exclusively for the consumers' personal, non-commercial use and may not be used for any purpose other than to identify prospective properties consumers may be interested in purchasing. Any use of search facilities of data on the site, other than by a consumer looking to purchase real estate, is prohibited. The accuracy of all information, regardless of source, is not guaranteed or warranted. All information should be independently verified. Data last updated: 2019-02-22T08:56:44.687. |
605 F.2d 1202
Garrettv.Coulter
No. 78-6380
United States Court of Appeals, Fourth Circuit
8/24/79
1
W.D.Va.
AFFIRMED
|
Neurocognitive sequelae following coronary artery bypass graft. A research agenda for behavioral scientists.
Several studies have demonstrated that a sizeable proportion of patients undergoing coronary artery bypass graft (CABG) demonstrate persistent declines in cognitive functioning. However, several important questions remain regarding cognitive changes following CABG. First, can patients vulnerable to cognitive decline after CABG be identified, providing valuable information that can be factored into clinical decisions? Second, the specificity of CABG as a cause of cognitive decline, when compared to other coronary procedures such as percutaneous coronary interventions, has not been established. Third, what mechanisms account for the neurocognitive decline after CABG? Several mechanisms have been proposed to lead to post-CABG neurocognitive deficits, including pre-CABG neurocognitive deficits, physiological injury, psychosocial factors, and/or the patient's perceptual processes. Finally, no study has demonstrated that cognitive changes, as measured by neuropsychological tests, have ecological validity. Specifically, behavioral sciences research is needed to demonstrate that measured cognitive changes significantly impact health status independent of other risk factors. |
Nakagawa M, Kitabayashi I. Oncogenic roles of enhancer of zeste homolog 1/2 in hematological malignancies. Cancer Sci. 2018;109:2342--2348. 10.1111/cas.13655
1. INTRODUCTION {#cas13655-sec-0001}
===============
Epigenetic regulation by DNA methylation, histone modifications, and non‐coding RNAs modulates gene expression without affecting DNA base sequences. Because aberrant DNA methylation or histone modifications are present in many malignant tumors, epigenetic dysregulation is considered a cause of tumor progression. Polycomb group (PcG) proteins regulate the expression of target genes by modulating histone modifications and are representative epigenetic regulators that maintain the "stemness" of embryonic and hematopoietic stem cells (HSC). Dysregulation of PcG proteins associated with mutations or gene overexpression is positively correlated with tumor progression in many hematological malignancies. In this review, we summarize the current knowledge of PcG proteins, focusing on the function of the histone methyltransferases enhancer of zeste homolog 1 and 2 (EZH1/2), which are subunits of polycomb repressive complexes (PRC), in hematological malignancies. In addition, we introduce novel therapeutic drugs for targeting these enzymes.
2. FUNCTION OF PRC {#cas13655-sec-0002}
==================
The basic structural unit of chromatin consists of DNA wrapped around histone proteins. Histone proteins have an N‐terminal region termed the histone tail, which undergoes various chemical modifications including acetylation, methylation, phosphorylation, and ubiquitination. These chemical modifications contribute to the regulation of target gene expression by modifying the spatial structure of chromatin. PcG proteins play an important role in maintaining the transcriptional repression of target genes.
PcG genes were first identified for their role in regulating the expression of homeotic genes, which control the body plan of embryos along the longitudinal axis and segmentation in *Drosophila*.[1](#cas13655-bib-0001){ref-type="ref"} PcG proteins form PRC in the nucleus. PRC are classified into PRC1 and PRC2 according to their biological characteristics. The core subunits of the mammalian PRC2 complex include EZH1/2, SUZ12, RbAp46/48, and EED. EZH1/2, which are histone methyltransferases, trimethylate histone H3 at lysine 27 (H3K27).[2](#cas13655-bib-0002){ref-type="ref"}, [3](#cas13655-bib-0003){ref-type="ref"} SUZ12 and EED activate methyltransferases and recruit PRC2 to the nucleosome, respectively.[4](#cas13655-bib-0004){ref-type="ref"}, [5](#cas13655-bib-0005){ref-type="ref"} The histone modification H3K27me3 represses target genes and mediates the recruitment of PRC1 to the nucleosome by serving as a docking site for the PRC1 component CBX (Figure [1](#cas13655-fig-0001){ref-type="fig"}A). PRC1 functions in transcriptional repression by catalyzing the monoubiquitination of histone H2A at lysine 119 (H2AK119). H2A ubiquitination blocks RNA polymerase II‐mediated transcriptional elongation.[6](#cas13655-bib-0006){ref-type="ref"} In addition, PRC1 induces chromatin condensation, which also contributes to the transcriptional repression of target genes. PRC1 complexes have 4 subunits, including Ring1A/B, CBX, PCGF, and PHC. Ring1A/B has ubiquitin ligase activity and ubiquitinates H2AK119.[7](#cas13655-bib-0007){ref-type="ref"} CBX is a chromodomain protein that recognizes H3K27me3 and recruits PRC1 to the nucleosome.[8](#cas13655-bib-0008){ref-type="ref"} PCGF (MEL18, BMI1) is a cofactor of Ring1A/B, and promotes its ubiquitin ligase activity.[9](#cas13655-bib-0009){ref-type="ref"} A non‐canonical PRC1 complex composed of RYBP and KDM2B, but not CBX, was recently identified and shown to target genes and ubiquitinate H2AK119 independently of PRC2 (Figure [1](#cas13655-fig-0001){ref-type="fig"}B).[10](#cas13655-bib-0010){ref-type="ref"}, [11](#cas13655-bib-0011){ref-type="ref"}, [12](#cas13655-bib-0012){ref-type="ref"} H2AK119ub1 recruits PRC2 to target genes and induces H3K27 trimethylation.[13](#cas13655-bib-0013){ref-type="ref"}, [14](#cas13655-bib-0014){ref-type="ref"} Canonical and non‐canonical PRC1 complexes have similar activity in the ubiquitination of H2A in a PRC2‐dependent or ‐independent method, resulting in the maintenance of gene silencing.
{#cas13655-fig-0001}
3. ROLES OF EZH1/2 IN HSC {#cas13655-sec-0003}
=========================
Polycomb complexes maintain the stemness of embryonic stem (ES) cells and HSC by repressing transcription through histone modifications. In ES cells, bivalent domains are formed at promoter sites of target genes through active and repressive histone modifications catalyzed by PRC1/2 and trithorax group (TrxG) complexes, respectively.[15](#cas13655-bib-0015){ref-type="ref"} These domains control gene expression associated with differentiation and cell cycle signaling, resulting in the regulation of ES cell differentiation. HSC have similar systems for regulating differentiation.[16](#cas13655-bib-0016){ref-type="ref"}
Analysis of genetically modified mice clarified the role of PcG proteins in HSC. Overexpression of Ezh2 preserves the reconstitution capacity of HSC, whereas normal HSC are rapidly exhausted after serial transplantation.[17](#cas13655-bib-0017){ref-type="ref"} *Ezh2* deficiency impairs expansion of HSC and progenitor cells in the fetal liver, resulting in lethality at early stages of mouse development.[18](#cas13655-bib-0018){ref-type="ref"} These findings indicate that Ezh2‐mediated stabilization of chromatin structure is important for the self‐renewal of HSC. Furthermore, inactivation of Ezh2 in fetal liver endothelium results in embryonic lethality with severe anemia despite normal emergence of functional HSC and overexpression of MMP‐9 which cell‐extrinsically depleted the membrane‐bound form of Kit ligand.[19](#cas13655-bib-0019){ref-type="ref"} These results indicate that modulation of epigenetic regulators in niche components can exert a marked cell‐extrinsic impact on hematopoiesis. However, *Ezh2* knock‐in mice develop myeloproliferative disease, suggesting that stem cell‐specific Ezh2 plays an oncogenic role in myeloid disorders.[20](#cas13655-bib-0020){ref-type="ref"}
Regarding the homolog Ezh1, analysis of *Ezh1*‐deficient mice shows the importance of Ezh1 in bone marrow (BM) HSC.[21](#cas13655-bib-0021){ref-type="ref"} *Ezh1* deficiency in the BM strongly induces a senescence response, leading to impairment of HSC. Deletion of *Cdkn2a* on the *Ezh1* null background rescues HSC proliferation ability, suggesting that Ezh1 maintains adult BM HSC by repressing Cdkn2a. *Ezh2* conditional knock‐out mice show dysregulation of T‐ and B‐cell development in the adult BM, whereas the function of HSC is not affected.[22](#cas13655-bib-0022){ref-type="ref"}, [23](#cas13655-bib-0023){ref-type="ref"}, [24](#cas13655-bib-0024){ref-type="ref"} Although H3K27me3 levels are markedly reduced in fetal liver cells of *Ezh2*‐deficient mice, they are mostly preserved in the adult BM, indicating that loss of Ezh2 is complemented by the homolog Ezh1 in adult BM cells. These results suggest that Ezh1 compensates for the loss of Ezh2 and that the 2 enzymes function together to maintain hematopoiesis.
4. ROLE OF EZH2 IN MALIGNANT TUMORS {#cas13655-sec-0004}
===================================
Aberrant epigenetic status is associated with the malignant transformation of normal cells in addition to gene mutations and gene abnormalities. Mutations and abnormal expression of PcG group genes are reported in various types of cancer such as melanoma, lymphoma, prostate cancer, ovarian cancer, and synovial sarcoma, suggesting that dysregulation of the PRC1/2 complexes is involved in carcinogenesis.[25](#cas13655-bib-0025){ref-type="ref"}, [26](#cas13655-bib-0026){ref-type="ref"}
Association of EZH2, a methyltransferase of H3K27, with carcinogenesis has been studied in PcG genes.[27](#cas13655-bib-0027){ref-type="ref"} High expression of EZH2 is associated with tumor aggressiveness in several cancers (Table [1](#cas13655-tbl-0001){ref-type="table"}).[28](#cas13655-bib-0028){ref-type="ref"} In hematological malignancies, EZH2 is overexpressed in AML, multiple myeloma (MM), and B‐ and T‐cell lymphomas. High expression of EZH2 in MM is associated with poor patient outcomes and high‐risk disease features, and pharmacological inhibition of EZH2 has anticancer effects in MM cell lines.[33](#cas13655-bib-0033){ref-type="ref"}, [34](#cas13655-bib-0034){ref-type="ref"} In contrast, monoallelic gain‐of‐function mutations in tyrosine residue 641 of the SET domain in EZH2 are reported in diffuse large B‐cell lymphoma (DLBCL) and follicular lymphoma (FL).[35](#cas13655-bib-0035){ref-type="ref"} Mutations in alanine residue 677 are also observed in DLBCL.[36](#cas13655-bib-0036){ref-type="ref"} These gain‐of‐function mutations result in a higher efficiency of mono‐ to di‐ and di‐ to tri‐methylation than that of the wild‐type enzyme.[37](#cas13655-bib-0037){ref-type="ref"} Furthermore, EZH2 gain‐of‐function mutations contribute to the widespread redistribution of H3K27me3, inducing not only persistent transcriptional repression but also increased transcription at many loci.[53](#cas13655-bib-0053){ref-type="ref"} These results suggest that activation of EZH2 contributes to malignant transformation and that EZH2 plays an oncogenic role in many malignant tumors.
######
Aberrant expression of EZH2 in cancers
Types of cancer EZH2 status References
------------------ -------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------
AML Overexpression [29](#cas13655-bib-0029){ref-type="ref"}
B‐NHL, ATL Overexpression [30](#cas13655-bib-0030){ref-type="ref"}, [31](#cas13655-bib-0031){ref-type="ref"}, [32](#cas13655-bib-0032){ref-type="ref"}
MM Overexpression [33](#cas13655-bib-0033){ref-type="ref"}, [34](#cas13655-bib-0034){ref-type="ref"}
FL, DLBCL Gain‐of‐function mutation (Tyr641, Ala677) [35](#cas13655-bib-0035){ref-type="ref"}, [36](#cas13655-bib-0036){ref-type="ref"}, [37](#cas13655-bib-0037){ref-type="ref"}
T‐ALL, ETP‐ALL Loss‐of‐function mutation [38](#cas13655-bib-0038){ref-type="ref"}, [39](#cas13655-bib-0039){ref-type="ref"}
MDS, MDS/MPN, MF Loss‐of‐function mutation [40](#cas13655-bib-0040){ref-type="ref"}, [41](#cas13655-bib-0041){ref-type="ref"}
Melanoma Overexpression [42](#cas13655-bib-0042){ref-type="ref"}, [43](#cas13655-bib-0043){ref-type="ref"}
Prostate Overexpression [44](#cas13655-bib-0044){ref-type="ref"}, [45](#cas13655-bib-0045){ref-type="ref"}
Ovarian Overexpression [46](#cas13655-bib-0046){ref-type="ref"}, [47](#cas13655-bib-0047){ref-type="ref"}
Lung Overexpression [48](#cas13655-bib-0048){ref-type="ref"}, [49](#cas13655-bib-0049){ref-type="ref"}, [50](#cas13655-bib-0050){ref-type="ref"}
Synovial sarcoma Overexpression [51](#cas13655-bib-0051){ref-type="ref"}, [52](#cas13655-bib-0052){ref-type="ref"}
AML, acute myeloid leukemia; ATL, adult T‐cell leukemia/lymphoma; B‐NHL, B‐cell non‐Hodgkin lymphomas; DLBCL, diffuse large B‐cell lymphoma; ETP‐ALL, early T‐cell precursor acute lymphoblastic leukemia; EZH2, enhancer of zeste homolog 2; FL, follicular lymphoma; MDS, myelodysplastic syndrome; MDS/MPN, myelodysplastic syndrome/myeloproliferative neoplasm; MF, myelofibrosis; MM, multiple myeloma; T‐ALL, T‐cell acute lymphoblastic leukemia.
John Wiley & Sons, Ltd
EZH2 loss‐of‐function mutations or deletions are also detected in various hematological malignancies including T‐cell acute lymphoblastic leukemia, myelodysplastic syndrome (MDS), myelodysplastic syndrome/myeloproliferative neoplasm (MDS/MPN), and myelofibrosis.[38](#cas13655-bib-0038){ref-type="ref"}, [40](#cas13655-bib-0040){ref-type="ref"}, [41](#cas13655-bib-0041){ref-type="ref"}, [54](#cas13655-bib-0054){ref-type="ref"}, [55](#cas13655-bib-0055){ref-type="ref"} Loss‐of‐function mutations are associated with poor outcomes in these tumors,[40](#cas13655-bib-0040){ref-type="ref"}, [41](#cas13655-bib-0041){ref-type="ref"}, [54](#cas13655-bib-0054){ref-type="ref"}, [56](#cas13655-bib-0056){ref-type="ref"} suggesting that dysfunction of PRC2 promotes tumor progression. Taken together, these findings support the dual function of EZH2 as oncogene and tumor suppressor gene.
5. ROLE OF EZH1 IN HEMATOLOGICAL MALIGNANCIES AND TARGETING THERAPY AGAINST EZH1/2 {#cas13655-sec-0005}
==================================================================================
Enhancer of zeste homolog 2 plays an oncogenic role, especially in lymphoma and AML. A transgenic mouse model with a combination of *Myc* and *EZH2* ^*Y641F*^ showed accelerated lymphoma development.[57](#cas13655-bib-0057){ref-type="ref"} *EZH2* deletion inhibits tumor progression concomitant with the induction of differentiation programs in mixed lineage leukemia (MLL)‐AF9 fusion AML mice, suggesting that EZH2 is important for leukemogenesis.[58](#cas13655-bib-0058){ref-type="ref"}, [59](#cas13655-bib-0059){ref-type="ref"} These studies identify EZH2 as a potential therapeutic target, and several EZH2 inhibitors, which are highly selective for the methyltransferase activity of EZH2, have been developed to target the oncogenic function of EZH2 (Table [2](#cas13655-tbl-0002){ref-type="table"}).
######
Overview of preclinical and clinical studies with selective EZH1/2 or EZH2 inhibitors in hematological malignancies
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Agent Target Types of cancer Status Clinical study (NCT\#) Preclinical reference(s)
------------------ ------------------ -------------------------- ------------- ------------------------ ------------------------------------------------------------------------------------------------------------------------------------------------------------------------
El1 EZH2 DLBCL Preclinical [60](#cas13655-bib-0060){ref-type="ref"}
GSK2816126 EZH2 Non‐Hodgkin lymphoma, MM Phase 1 NCT02082977 [61](#cas13655-bib-0061){ref-type="ref"}, [62](#cas13655-bib-0062){ref-type="ref"}
EPZ‐6438 EZH2 B‐cell lymphomas\ Phase 1\ NCT01897571\ [63](#cas13655-bib-0063){ref-type="ref"}, [64](#cas13655-bib-0064){ref-type="ref"}
DLBCL, FL Phase 2 NCT01897571
CPI‐1205 EZH2 B‐cell lymphomas Phase 1 NCT02395601 [65](#cas13655-bib-0065){ref-type="ref"}, [66](#cas13655-bib-0066){ref-type="ref"}
UNC1999 EZH1/2 DLBCL, AML, MM Preclinical [33](#cas13655-bib-0033){ref-type="ref"}, [67](#cas13655-bib-0067){ref-type="ref"}, [68](#cas13655-bib-0068){ref-type="ref"}, [69](#cas13655-bib-0069){ref-type="ref"}
DS‐3201b EZH1/2 Non‐Hodgkin lymphoma\ Phase 1\ NCT02732275\ [70](#cas13655-bib-0070){ref-type="ref"}, [71](#cas13655-bib-0071){ref-type="ref"}
AML, ALL Phase 1 NCT03110354
SAH‐EZH2 peptide EZH2‐EED complex AML Preclinical [72](#cas13655-bib-0072){ref-type="ref"}
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ALL, acute lymphoblastic leukemia; DLBCL, diffuse large B‐cell lymphoma; EZH1/2, enhancer of zeste homolog 1 and 2; FL, follicular lymphoma; MM, multiple myeloma; NCT, National Clinical Trial.
John Wiley & Sons, Ltd
EZH2 inhibitors show a strong growth inhibitory effect in EZH2‐mutated lymphoma cell lines and xenograft models.[61](#cas13655-bib-0061){ref-type="ref"}, [63](#cas13655-bib-0063){ref-type="ref"}, [73](#cas13655-bib-0073){ref-type="ref"} Preclinical and clinical trials evaluating EZH2 inhibition are currently underway mainly in lymphoma. However, inactivation of EZH2 alone is not sufficient to impair MLL‐rearranged AML, and complete disruption of PRC2 is required.[58](#cas13655-bib-0058){ref-type="ref"} UNC1999, an EZH1/2 dual inhibitor, impairs the proliferation of MLL‐rearranged leukemia cells in vitro and in vivo.[67](#cas13655-bib-0067){ref-type="ref"} This indicates that leukemia stem cells (LSC), which are responsible for drug resistance and relapse of AML, are dependent not only on EZH2, as remaining EZH1 activity is sufficient for the self‐renewal activity of LSC, despite the fact that EZH1 only partially compensates for the loss of EZH2.[74](#cas13655-bib-0074){ref-type="ref"}, [75](#cas13655-bib-0075){ref-type="ref"}
Work from our group showed that quiescent LSC express the highest levels of Ezh1/2, and dual inactivation of Ezh1/2 eradicates quiescent LSC to cure AML in experiments comparing *Ezh1/2* dKO with *Ezh2* sKO mice.[70](#cas13655-bib-0070){ref-type="ref"} Furthermore, quiescent LSC are associated with PRC2‐mediated suppression of Cyclin D, and dual inactivation of Ezh1/2 induces cell cycle progression and differentiation in quiescent LSC (Figure [2](#cas13655-fig-0002){ref-type="fig"}). A novel EZH1/2 dual inhibitor, OR‐S1 is an orally bioavailable small molecule compound that inhibits the histone methyltransferase activity of both EZH1 and EZH2 strongly and selectively.[71](#cas13655-bib-0071){ref-type="ref"} OR‐S1 reduces the number of LSC, suppresses leukemia progression, and prolongs survival without serious side‐effects.[70](#cas13655-bib-0070){ref-type="ref"}, [71](#cas13655-bib-0071){ref-type="ref"} This drug, which induces differentiation and eradicates quiescent LSC, shows a synergistic effect on LSC with conventional chemotherapy agents, similar to the effect of all‐trans‐retinoic acid in acute promyelocytic leukemia. Thus, dual inhibition of EZH1/2 with an EZH1/2 dual inhibitor is effective for disrupting PRC2. Indeed, OR‐S1 suppresses H3K27me3 more potently in cells than UNC1999 and other EZH2 inhibitors.[71](#cas13655-bib-0071){ref-type="ref"} This drug is more effective than other selective EZH2 inhibitors in hematological cell lines including AML and acute lymphoblastic leukemia (ALL) cell lines harboring fusion genes, DLBCL cell lines with EZH2 gain‐of‐function mutations, and peripheral T‐cell lymphoma and MM cell lines.[71](#cas13655-bib-0071){ref-type="ref"} Clinical trials in patients with relapsed or refractory non‐Hodgkin lymphoma (NHL) and those with AML and ALL have started (NCT02732275, NCT03110354). Preliminary results of a phase 1 trial show that DS‐3201b (a derivative of OR‐S1) has early clinical activity and indicates the potential of this drug as a novel therapeutic option for patients with B‐cell and T‐cell lymphoma.[76](#cas13655-bib-0076){ref-type="ref"} Further investigation in AML, ALL, and NHL is currently being pursued.
{#cas13655-fig-0002}
6. DRUG RESISTANCE AND COMBINATION THERAPIES {#cas13655-sec-0006}
============================================
Cancer cells can escape the effect of drugs, and drug resistance has been reported for EZH2 inhibitors and other drugs.[26](#cas13655-bib-0026){ref-type="ref"} In an EZH2‐mutated lymphoma cell line model, the acquisition of resistance was related to secondary mutations (Y111L and Y661D) in both wild‐type and gain‐of‐function Y641N EZH2 alleles.[77](#cas13655-bib-0077){ref-type="ref"} These resistant cells maintained a high level of H3K27me3 in the presence of EZH2 inhibitors. In addition, loss of EZH2 and subsequent reduction of H3K27me3 may be a novel pathway of acquired resistance in AML against drugs such as tyrosine kinase inhibitors because of derepression of *HOX* genes.[78](#cas13655-bib-0078){ref-type="ref"} In contrast, PRC2 loss decreases the levels of H3K27me3 and contributes to H3K27 acetylation (ac), resulting in Ras signaling amplification in malignant peripheral nerve sheath tumors.[79](#cas13655-bib-0079){ref-type="ref"}, [80](#cas13655-bib-0080){ref-type="ref"} Combination treatment with a MEK inhibitor and BRD4 inhibitor impairs tumor progression by disrupting Ras signaling and BRD4‐H3K27ac interaction, respectively.[81](#cas13655-bib-0081){ref-type="ref"} These results may help the identification of combination therapies with EZH2 inhibitors. Potential approaches for combination studies have been proposed in various malignant tumors. In preclinical models of EZH2 mutant germinal center NHL cells, EPZ‐6438 in combination with a glucocorticoid receptor agonist showed a dramatic synergistic cell‐killing effect. This suggests that the combination of EPZ‐6438 and CHOP, which is the current standard of care for DLBCL, enhances the inhibition of proliferation in germinal center NHL.[82](#cas13655-bib-0082){ref-type="ref"} In addition, bortezomib combined with UNC1999 remarkably inhibits the growth of myeloma cells in vitro and in vivo because proteasome inhibitors also repress EZH2 transcription by suppressing the RB‐E2F pathway.[68](#cas13655-bib-0068){ref-type="ref"} AMP‐activated protein kinase (AMPK)‐mediated phosphorylation of EZH2 at T311 inhibits PRC2 oncogenic function by disrupting the interaction between EZH2 and SUZ12.[83](#cas13655-bib-0083){ref-type="ref"} This indicates that AMPK agonists could be a promising sensitizer for EZH2‐targeting drugs in anticancer treatment. Taken together, these studies provide evidence of resistance mechanisms and potential approaches for combination therapy, and further investigation is warranted.
7. CONCLUSIONS AND FUTURE PERSPECTIVES {#cas13655-sec-0007}
======================================
Polycomb group proteins play an important role in the maintenance of normal HSC. They have a dual function as oncogene and tumor suppressor gene in the process of tumorigenesis. Recent advances in epigenetic research have contributed to the design of new polycomb‐targeted drugs. However, despite the identification of molecular mechanisms underlying the anticancer effects of EZH1/2 and EZH2 inhibitors, many of the complex functions of PcG proteins remain to be clarified. It will be important to uncover the mechanism of resistance against polycomb‐targeted drugs, and to identify useful biomarkers for evaluating the effect of treatment and to stratify patients. Ongoing clinical trials will show whether targeting EZH1/2 is an effective treatment against various diseases, and these results will be of value for the development of epigenetic therapies.
CONFLICT OF INTEREST {#cas13655-sec-0009}
====================
IK received research funding from Daiichi Sankyo. MN has no conflicts of interest to declare.
This work was supported in part by Acceleration Transformative Research for Medical Innovation from the Japan Agency for Medical Research and Development and by the National Cancer Center Research and Development Fund (I.K.).
|
[Erythrocyte Li/Na countertransport and correlated variables in a randomized sample of population].
A genetically determined alteration of the cell membrane sodium metabolism may play a role in the pathogenesis of essential hypertension. The most consistent finding in patients with essential hypertension is an increased red blood cell Li/Na exchange (countertransport). It is genetically determined but it is also associated to potentially confounding variables (body weight, race, age and so on). The present study investigates the relationship between red cell Li/Na countertransport and various potentially confounding variables in a random sample of the population. It shows that this membrane cation transport system is increased in males compared to females and significantly correlated to body mass index in males and to blood pressure, alcohol consumption and, negatively, to urinary calcium excretion in females. Since body weight and alcohol consumption are correlated to blood pressure in several epidemiological studies, it can be hypothesized that they influence blood pressure control through an alteration of the cell membrane sodium transport. |
40 So.3d 881 (2010)
John L. WEST, Appellant,
v.
The STATE of Florida, Appellee.
No. 3D10-1219.
District Court of Appeal of Florida, Third District.
July 21, 2010.
Rehearing Denied August 11, 2010.
John L. West, in proper person.
Bill McCollum, Attorney General, for appellee.
Before COPE and SALTER, JJ., and SCHWARTZ, Senior Judge.
PER CURIAM.
This is an appeal of an order denying a motion to correct illegal sentence under Florida Rule of Criminal Procedure 3.800(a). As the trial court order indicates, defendant-appellant John L. West has unsuccessfully made the same claims *882 previously, but he contends that the court should apply the manifest injustice exception to the res judicata doctrine. See State v. McBride, 848 So.2d 287 (Fla.2003).
We reject the defendant's argument. The defendant claims that he does not qualify as a habitual violent felony offender, but the defendant is in error. See Johnson v. State, 763 So.2d 283, 284 (Fla. 2000) (persons are entitled to relief under State v. Thompson, 750 So.2d 643 (Fla. 1999), if they committed their offenses during the applicable window period and were sentenced as habitual violent felony offenders based on the qualifying offense of aggravated stalking). As the defendant was not habitualized on the basis of an aggravated stalking conviction, his argument under Thompson is without merit. The defendant's remaining claims are without merit. In light of the foregoing, no manifest injustice has been shown for McBride purposes.
Affirmed.
|
#include "cpu_profile.h"
#include "../../library/writer.h"
#include "../../logger.h"
#include "cpu_profile_node.h"
namespace xprofiler {
using Nan::HandleScope;
using Nan::Utf8String;
using std::ofstream;
void Profile::Serialize(const CpuProfile *node, std::string filename) {
HandleScope scope;
ofstream outfile;
outfile.open(filename, std::ios::out | std::ios::binary);
if (!outfile.is_open()) {
Error("cpu_profile", "open file %s failed.", filename.c_str());
outfile.close();
return;
}
// record cpu profile
JSONWriter writer(outfile);
writer.json_start();
writer.json_keyvalue("typeId", "xprofiler-cpu-profile");
// set title
Utf8String title(node->GetTitle());
writer.json_keyvalue("title", *title);
// set head
writer.json_objectstart("head");
ProfileNode::SerializeNode(node->GetTopDownRoot(), &writer);
writer.json_objectend();
// set start/end time
writer.json_keyvalue("startTime", node->GetStartTime() / 1000000);
writer.json_keyvalue("endTime", node->GetEndTime() / 1000000);
// set samples
uint32_t count = node->GetSamplesCount();
writer.json_arraystart("samples");
for (uint32_t index = 0; index < count; ++index) {
writer.json_element(node->GetSample(index)->GetNodeId());
}
writer.json_arrayend();
// set timestamps
writer.json_arraystart("timestamps");
for (uint32_t index = 0; index < count; ++index) {
writer.json_element(node->GetSampleTimestamp(index));
}
writer.json_arrayend();
// write to file
writer.json_end();
outfile.close();
}
} // namespace xprofiler
|
Toledo Police are looking for a battery thief.
According to Toledo Police, someone stole eight large Verizon batteries from eight separate locations Saturday.
The thefts happened across the city, many surrounding the West Toledo area.
In every case the the battery was taken out of a locked shelter, which requires a key.
Police say there were no signs of forced entry at any of the locations. |
from django.contrib import admin
from .models import ContactForm
class ContactFormAdmin(admin.ModelAdmin):
class Meta:
model = ContactForm
admin.site.register(ContactForm, ContactFormAdmin)
|
Meandering Musings on Technology, Business and Globalization
Menu
Offshore Backlash Redux
It’s back. With the Democrats in Congress and soon perhaps in the Whitehouse and an economy that most think will turn sour soon, it is almost the perfect storm. Trade in services, fondly called “offshoring” is back on the front pages and it bodes ill for global business.
This article on the Wall Street Journal’s front page last week draws largely from Allan Blinder’s work. Blinder, an economist at Princeton has been a diehard free-trader all his career. But now he has changed his position to one where he still believes in the long term benefits of free trade in goods and services, but thinks that in the short-term the pain due to offshoring of services will be great.
His research follows this logic. 85% of employment in the US is in the services sector and only 15% is in manufacturing. A very large proportion of these jobs in the services sector are vulnerable to offshoring – from computer programmers to accountants – by his estimation 40 million jobs. The disruption to people’s jobs and lives because of offshoring is being underestimated, according to Blinder. The US needs to do much more on retraining, education, wage loss insurance etc. to help cushion the average citizen.
He also appeared on the Diane Rehm show on NPR. (The WAMU website was down at the time of writing this, but the link should be there). On the show he reiterates his support of free trade and explicitly states that he is not advocating any barriers to trade in services even if it was feasible to do so (he doesn’t think it is). But he does want the country to recognize that a “new industrial revolution” is upon us and that we need to do something to prepare for it.
This subject is guaranteed to kick up a storm of debate. You can already see it forming on economics blogs like Brad DeLong’s (check out the comments). Next week this is going to hit the mainstream press.
In May Jagdish Bhagwati, an ardent free trader and Alan Blinder will debate these issues at Harvard University. So far Bhagwati has described Blinder’s thesis “dead wrong”. Right or wrong, my fear is that the media will flash the “40 million jobs” so many times that no one will notice that Blinder’s solutions do not include erecting barriers. In the runup to the 2008 Presidential elections there will be a lot of pressure on the candidates to support anti-trade measures. That will be a pity.
Post navigation
Great point Basab,
I will not claim to be an expert on globalization or economic theory or even free trade. However, jobs being generated in India (and rest of the ‘Third World’) is a good thing.
Now, the bigger question to economists like Mr. Blinder: Is the ‘global job pie’ remain static or will it grow due to free-trade and globalization? If the sum total is going to grow, it is a “win win” deal; right?
Extraordinary to think that none of your readers, a large number of whom might be affected by this, has anything to say about the matter. Does silence mean that they expect this backlash? Or does that mean they accept it will happen but know it may not change things much? Or does that mean they do not care about it?
Shefaly, two reasons – one that the volume on offshore backlash still isn’t high. second, that most IT Services companies will prefer to remain quiet on this and let umbrella organizations like NASSCOM and ITAA do the talking. More credible that way.
There’s a few things going on here — Blinder’s primary concern seems to be the costs of dislocation, based on a simplistic extrapolation and the BLS numbers of “potentially” offshorable jobs. He’s way off… For example: India’s total employment in IT/ BPO after 10 yrs of blistering growth is about 1.2 mm of which 70% is focused on the US ie, 840K (approx). In a total labor force of 140 mm, that’s nothing. Similarly, India’s exports to the US (IT + BPO) is approx $15 billion to $17 billion. Given that the US GDP is north of $12.5 trillion, India isn’t even a rounding error.
Blinder is using anecdotes rather than facts — what sort of economist does that?
While the offshoring brouhaha may resurface, it’ll be far less muted than last time… |
Ezetimibe normalizes metabolic defects in mice lacking ABCG5 and ABCG8.
The ATP binding cassette transporters ABCG5 (G5) and ABCG8 (G8) limit the accumulation of neutral sterols by restricting sterol uptake from the intestine and promoting sterol excretion into bile. Humans and mice lacking G5 and G8 (G5G8-/-) accumulate plant sterols in the blood and tissues. However, despite impaired biliary cholesterol secretion, plasma and liver cholesterol levels are lower in G5G8-/- mice than in wild-type littermates. To determine whether the observed changes in hepatic sterol metabolism were a direct result of decreased biliary sterol secretion or a metabolic consequence of the accumulation of dietary noncholesterol sterols, we treated G5G8-/- mice with ezetimibe, a drug that reduces the absorption of both plant- and animal-derived sterols. Ezetimibe feeding for 1 month sharply decreased sterol absorption and plasma levels of sitosterol and campesterol but increased cholesterol in both the plasma (from 60.4 to 75.2 mg/dl) and the liver (from 1.1 to 1.87 mg/g) of the ezetimibe-treated G5G8-/- mice. Paradoxically, the increase in hepatic cholesterol was associated with an increase in mRNA levels of HMG-CoA reductase and synthase. Together, these results indicate that pharmacological blockade of sterol absorption can ameliorate the deleterious metabolic effects of plant sterols even in the absence of G5 and G8. |
Mzilikazi "The Path of
blood or the Great Road" the first King of the Matebele
(Ndebele tribe) was the son
of Matshobana, son of Mangete, son of Ngululu, son of
Langa, son of Zimangele; all descendants of the Khumalo
Dynasty. Mzilikazi was born of
Nompethu "The maggot" the daughter of Chief
Zwide of the Ndwandwe people (tribe).
Matshobana was the chief of the Northern Khumalo.
The territory of the Northern Khumalo was located near the
Black Mfolozi River, squeezed between the lands of two
strong rival groups: the expanding Mthethwa chiefdom of
Dingiswayo and the land of the equally ambitious and much
more ferocious Zwide of the Ndwandwe. Mzilikazi's boyhood
was spent in the household of his grandfather Zwide.
Inevitably, as he grew to manhood he observed the less
powerful Khumalo being drawn into the conflict between
Dingiswayo and Zwide.
After the murder of Matshobana, Mzilikazi inherited the chieftainship, and had to live at King
Shaka's Bulawayo. Before Tshaka's reign there was Zwide's Ndwandwe tribe reigning. Trouble started
for Mzilikazi for when he suspected that Zwide, who had
had his father Matshobana assassinated,
wanted him killed. In preparation, he had an alliance with Tshaka,
which allowed him to be a leader of one of his regiments.
With nothing more than five hundred men and women, Mzilikazi departed from King Tshaka's
Zululand, by this time Mzilikazi was already had three sons, but none of these could be the
heir to the throne. In accordance with Ndebele customs,
successors to the throne could not come from children the Mzilikazi bore before he was King. Thus Nkulumane was the heir.
Meanwhile on learning of Mzilikazi exodus, King Tshaka sent two army
contingents to stop him.
King Tshaka's army contingents
failed to stop Mzilikazi, about 1821 Mzilikazi and his fledgling kingdom crossed the Drakensburg
mountains. Over a prolonged period of time, the wandering Matebele Kingdom moved in a meandering northward direction. Eventually
crossing the Limpopo river and settling his kingdom in the Matebeleland region of Zimbabwe. Mzilikazi established his
first royal town, called Mhlahlandlela just outside
present day Pretoria (South Africa), in the late 1820s.
After facing a series attacks, he moved with his kingdom,
further northward. Mzilikazi's
last royal town was in Matebeleland Zimbabwe, he also called it Mhlahlandlela.
Mzilikazi's Matebele were a predatory
people, and established themselves in their new
environment by subjugating the original inhabitants
until they were firmly entrenched as rulers of the
territory between the Limpopo and Zambezi rivers. Their
impis foraged far and wide across the land, looting
cattle and capturing women and children.
By the time Mzilikazi left King Tshaka's Zululand he
realized that he had a small contingent of followers,
insufficient to establish a powerful kingdom that would
last. The era in which Mzilikazi lived demanded a kingdom be large so that it can have
enough men to withstand attacks and thus offer defense
to its citizens. He had to increase the population of
kingdom, this had military defensive and economic
implications. Mzilikazi used
his skillful aptitude for warfare, learnt under Tshaka,
to carryout raids on neighboring and remote tribes
Mzilikazi raids basically initially had these major objectives,
cattle and captives for integration in the Matebele kingdom. Captives were vitally to the growth of the Matebele kingdom, female captives of childbearing age contributed
children, who if they were male would add to the army.
Male captives were recruited into the army. Children
captives were ideal, as they would grow up culturally
aligned to the Matebele way of
life.
On September 28 1868, King
Mzilikazi of the Ndebele state died. After prolonged ritual ceremonies befitting
a King's funeral, the burial process started on the 2nd
of November, and he was buried on the 4th of
November 1868 when his remains were put in a cave at
Entumbane, on the northern peripheries of the Matopo
Hills. He was the father and first King of the Matebele Kingdom. |
499 S.E.2d 98 (1998)
231 Ga. App. 229
DOMAN
v.
BANDERAS.
No. A97A2377.
Court of Appeals of Georgia.
March 16, 1998.
Certiorari Denied June 12, 1998.
Webb, Carlock, Copeland, Semler & Stair, Dennis J. Webb, Marvin D. Dikeman, Atlanta, for appellant.
Sullivan, Hall, Booth & Smith, John E. Hall, Jr., Atlanta, Frederick L. Hubbs, Jr., for appellee.
*99 BLACKBURN, Judge.
Alexander Doman, M.D., appeals the trial court's order granting to defendant, Julio C. Banderas, M.D., his motion for summary judgment.[1] Doman brought the underlying action against Banderas alleging that Banderas published four false, defamatory letters which damaged his medical practice and reputation as a physician. The trial court found that the defamation suit was precluded by the doctrine of res judicata because Doman could have raised the defamation claims in a prior action in which he obtained a judgment against Banderas for breach of agreements concerning Doman's purchase of Banderas' medical practice and for tortious interference with Doman's business and medical practice.[2] Doman contends the trial court erroneously applied res judicata to preclude the present action.
Prior to the present suit, Doman filed a suit against Banderas on May 7, 1993, alleging that Banderas breached agreements between the parties controlling Doman's purchase of Banderas' medical practice. The prior suit, which was assigned to the same judge as the present action, sought a temporary restraining order and an order compelling arbitration under the terms of the agreements. An order was entered effective May 13, 1993, which restrained the parties from filing other actions against each other during the pendency of that action "except for claims or counterclaims which may be asserted in this litigation or in any arbitration proceeding ordered by this Court." (Emphasis supplied.)
On July 29, 1993, the trial court ordered the parties to arbitrate their disputes in accordance with the agreements. Pursuant to the arbitration provisions of the agreements, the parties selected arbitrators, and on February 18, 1994, they submitted a statement of questions in dispute to be decided by the arbitrators. In addition to submitting questions as to whether or not Banderas violated provisions of the agreements, Doman also submitted the following question to the arbitrators: "Whether Banderas tortiously, wrongfully and/or maliciously interfered with the business and medical practice of Doman."
When Doman submitted the statement of disputed questions to the arbitrators in the prior action on February 18, 1994, three of the four letters had been written, although none had been written when he filed the action on May 7, 1993. Pursuant to discovery conducted after the disputed questions were submitted, Doman had learned of the existence of all four letters. After discovering the letters, Doman filed a motion on July 8, 1994, asking the trial court to lift any restraint of the parties from filing additional claims which accrued after May 13, 1993. On July 12, 1994, the trial court granted this motion, and Doman was without question free to amend his arbitration case to include the defamation action. The July 12, 1994 amendment did not excuse Doman from complying with the law. It simply removed any doubt that he could proceed with his defamation action in the then pending case. This holding was by the same trial judge who executed the original restraining order and the July 12, 1994 amendment thereto.
In his motion, Doman stated that he had become aware of a libel claim he had against Banderas based on two letters written by Banderas, the first of which was published on July 15, 1993. The motion further stated that the one-year statute of limitation (see OCGA § 9-3-33) was about to expire on the libel claim and that it was not clear whether the arbitrators would consent to the addition of a libel claim to the pending arbitration. Banderas responded to the motion stating that he had no objection to the proposed modification of the restraining order. He pointed out that the original restraining order did not prevent the libel claim from being asserted in the pending litigation or arbitration.
*100 The arbitrators entered an order finding that they had the authority "to hear and resolve tort claims between the parties that are raised in proper form." We held in Banderas, supra at 198-199, 480 S.E.2d 252, that the arbitrators acted within the scope of their authority in concluding that tort claims were covered under the arbitration provisions in the agreements.
After the restraining order was modified, Doman did not seek to amend his existing case but rather filed the present defamation action on July 13, 1994, and later amended same. Although the amended complaint also refers to alleged defamatory statements made by Banderas on March 1, 1994, "and at other times during the course of 1993 and 1994," Doman concedes in his appellate brief that the present defamation action is based on the four allegedly libelous letters of July 15, 1993, July 26, 1993, November 10, 1993, and February 23, 1994.
The hearing on the disputed questions before the arbitrators was conducted from October 3 through 6, 1994. At the hearing, Doman presented evidence of two of the letters written by Banderas which support the present defamation actionthe June 11 and July 26 letters. He contended the letters not only breached the purchase agreements but were part of a plan by Banderas to tortiously interfere with and damage his medical practice. Doman testified that both letters contained false allegations which damaged his medical practice and his reputation in the medical community.
Although Doman asserts that, prior to the hearing, he withdrew any claim in support of the tortious interference issue that Banderas tried to limit his hospital privileges and discredit him at Southern Regional Medical Center, the evidence Doman presented as to the June 11 and July 26 letters sent by Banderas to Southern Regional belies this assertion. Doman also presented expert testimony that these two letters, along with other actions taken by Banderas, resulted in damage of about $1,000,000 to his medical practice. The complaint as amended in the present action indicates that the two remaining letters of November 10, 1993, and February 23, 1994, were also written by Banderas in connection with the arbitrated dispute. However, there is no evidence as to these letters in the arbitration hearing record.
The arbitrators issued their decision on December 6, 1994. They found that Banderas had violated various provisions of the purchase agreements and that he had "tortiously, wrongfully and/or maliciously interfered with the business and medical practice of Doman." In addition to other damages awarded to Doman, the arbitrators awarded Doman $500,000 "for general damages for breach of contract and for tortious interference with business and professional practice." The arbitration decision was confirmed as the judgment of the trial court, and the judgment was later affirmed on appeal in Banderas, supra.
1. Georgia's common law doctrine of res judicata is codified in OCGA § 9-12-40, which provides that: "A judgment of a court of competent jurisdiction shall be conclusive between the same parties and their privies as to all matters put in issue or which under the rules of law might have been put in issue in the cause wherein the judgment was rendered until the judgment is reversed or set aside." Lawson v. Watkins, 261 Ga. 147, 148, 401 S.E.2d 719 (1991). Accordingly, "[f]or a prior action to bar a subsequent action under the doctrine of res judicata, several requirements must be met: The first action must have involved an adjudication by a court of competent jurisdiction; the two actions must have an identity of parties and subject matter; and the party against whom the doctrine of res judicata is raised must have had a full and fair opportunity to litigate the issues in the first action." (Citations omitted.) Fowler v. Vineyard, 261 Ga. 454, 455-456, 405 S.E.2d 678 (1991).
In the present case, it is undisputed that there was a prior action between Doman and Banderas which resulted in a judgment in favor of Doman by a court of competent jurisdiction. It is also clear that Doman's present defamation claims were not adjudicated in the prior action. Whether the doctrine of res judicata precludes Doman's present action depends on whether the remaining requirements of res judicata have been established: *101 (1) that Doman's prior and present actions asserted claims concerning the same subject matter, and (2) that Doman had a full and fair opportunity to litigate the present claims in the prior action.
Doman's present defamation action asserts claims for relief concerning the same subject matter as the prior action by Doman against Banderas. Although the prior action asserted breach of contract and tortious interference claims, and the present suit is a defamation action, all of the claims in both actions concerned the dispute between Doman and Banderas arising from Doman's purchase of Banderas' medical practice. See CenTrust Mtg. Corp. v. Smith & Jenkins, P.C., 220 Ga.App. 394, 396-397, 469 S.E.2d 466 (1996); Brinson v. First American Bank of Ga., 200 Ga.App. 552, 554-555, 409 S.E.2d 50 (1991); compare Lawson, supra. In the prior action against Banderas, Doman was required to "assert all claims for relief concerning the same subject matter in one lawsuit and any claims for relief concerning that same subject matter which [Doman did not assert in the prior action] will be res judicata pursuant to OCGA § 9-12-40." (Emphasis in original.) Id. at 149, 401 S.E.2d 719. Since Doman did not assert the present defamation claims in the prior action, this requirement for res judicata was satisfied.
Doman also had a full and fair opportunity to litigate his present claims in the prior action. Nothing in the trial court's restraining order or its amendment thereto precluded Doman from bringing the present claims in the prior action. In fact, Paragraph 10 of the trial court's initial order makes it clear that all the parties' claims against each other should be brought in the present action. It states: "The entry of this Order shall not operate to prejudice the rights, claims or defenses of any of the parties to this action, and shall not act as waiver or estoppel of any claims, counterclaims or defenses that have been asserted, or could be asserted, in connection with this action." (Emphasis supplied.) Additionally, the trial judge who wrote the original order in the first action was also the judge who determined that res judicata barred Doman's claims in the present action.
Doman submitted two of the letters of which he complains in support of his action for interference with the contract between the parties. He contends that these letters, written on June 11, 1993, and July 26, 1993, will now support a separate action for defamation. The first action was filed May 7, 1993, but was not heard by the arbitrators until October 3, 1994. Doman carefully states in his affidavit that he did not learn of the letters until after May 7, 1993, but fails to establish that he did not learn of them in time to raise the defamation issue before the arbitration hearings which began October 3, 1994. Inasmuch as Doman, in fact, submitted two of such letters into evidence at the arbitration hearing, he cannot now contend that he could not have also asserted a defamation claim based on such letters.
The trial judge correctly determined that Doman was not precluded from bringing the present claims in the prior action. Doman had a full and fair opportunity to litigate such claims in the prior action, which he chose not to pursue. Therefore, the trial court correctly granted summary judgment to Banderas based upon res judicata.
2. Doman contends that Banderas waived his right to assert the defense of res judicata because Banderas consented to the modification of the trial court's restraining order in the previous action. However, res judicata is an affirmative defense available to defendants who have the burden of properly raising and proving it. See OCGA § 9-11-8(c); Waggaman v. Franklin Life Ins. Co., 265 Ga. 565, 458 S.E.2d 826 (1995). In the present case, Banderas properly raised res judicata as an affirmative defense in his answer to Doman's complaint. Because Doman had the right, and duty, to file all related claims in the first action and the amendment to the trial court's restraining order did not alter such duty, Banderas' failure to object to the amendment of such order cannot constitute a waiver of Banderas' right to raise Doman's failure to abide by such order as a defense. Doman could have amended the first action to assert these defamation claims well in advance of the hearing and decision of the arbitrators under both the original restraining order and the amended version. *102 Therefore, Banderas did not waive his right to assert the affirmative defense of res judicata by consenting to the modification.
Judgment affirmed.
McMURRAY, P.J., BEASLEY and SMITH, JJ., concur.
ANDREWS, C.J., POPE, P.J., and JOHNSON, J., dissent.
ANDREWS, Chief Judge, dissenting.
In asserting the doctrine of res judicata as a bar to Doman's present defamation claims, Banderas had the burden of establishing that: (1) the prior action brought by Doman and Doman's present defamation action asserted claims concerning the same subject matter; and (2) that Doman had a full and fair opportunity to litigate the defamation claims in the prior action. Fowler v. Vineyard, 261 Ga. 454, 455-456, 405 S.E.2d 678 (1991); Waggaman v. Franklin Life Ins. Co., 265 Ga. 565, 458 S.E.2d 826 (1995). I agree that the first requirement for application of the doctrine of res judicata was established by Banderas. But when all the facts relevant to the second requirement for application of the doctrine are weighed, I conclude that Banderas did not carry the burden of establishing that Doman had a full and fair opportunity to litigate the defamation claims in the prior action.
When Doman filed the prior action on May 7, 1993, none of the four letters supporting his present defamation action had been written. He became aware of the defamation claims when he discovered the letters while the prior action was pending. Three of the four letters surfaced during discovery conducted after the case had been ordered to arbitration and after the parties had complied with the arbitrators' order requiring them to submit a description of all the disputed questions to be addressed in the arbitration. Doman brought the defamation claim to the attention of the trial court in the motion he filed on July 8, 1994. In the motion, Doman informed the trial court that he had discovered a libel claim he had against Banderas based on two letters he had discovered written by Banderas, the first of which was published on June 11, 1993. The motion informed the court that the one-year statute of limitation (see OCGA § 9-3-33) was about to expire and stated that it was not clear whether the arbitrators would consent to an amendment of the disputed questions for the addition of a libel claim to the pending arbitration. The motion urged the trial court to amend an existing restraining order prohibiting any separate actions by the parties so that Doman could bring a separate defamation action. Banderas responded that he did not oppose the motion. The record also shows that prior to the motion, Banderas had already objected to one attempt by Doman to amend the disputed questions to add a fraud claim after the discovery period had expired. The arbitrators subsequently upheld Banderas' objection and rejected this attempt by Doman to amend the disputed questions as untimely. The trial court granted Doman's motion and entered an order on July 12, 1994, modifying the restraining order to allow Doman to bring a separate defamation action. On July 13, 1994, Doman filed the present defamation action alleging that Banderas libeled him by publishing two letters to Southern Regional Medical Center on July 15, 1993, and July 26, 1993. Doman amended the present action on November 28, 1994, alleging that Banderas also libeled him by publishing additional letters damaging to his medical practice on November 10, 1993, and February 23, 1994.
The trial court's July 12 order did not prohibit Doman from seeking permission to litigate the defamation claim in the pending arbitration, nor did Doman seek an order pursuant to OCGA §§ 9-11-13(i) and 9-11-42(b) separating the defamation claim from the other claims in the prior action. See Fowler, supra at 459, 405 S.E.2d 678. Nevertheless, in bringing the present defamation action outside the pending arbitration, several factors militate against the conclusion that Doman had a full and fair opportunity to litigate the defamation claim in the prior action. First, none of the four letters supporting the defamation claim had been written when the prior action was filed. See id. at 458, 405 S.E.2d 678. Secondly, three of the four letters were not discovered until after the prior case had been ordered to arbitration and the time allotted by the arbitrators for submitting a statement of the *103 questions in dispute between the parties had expired. At that point, the parties had already submitted a detailed 52-page statement of disputed questions to the arbitrators. Moreover, the arbitrators subsequently upheld Banderas' pending objection to an attempt by Doman to amend the statement of disputed questions by adding a fraud claim. Id. Under these circumstances, I cannot agree with the majority's statement that Doman was, without question, free to amend the arbitration case to include the defamation action. Thirdly, Doman did not attempt in the prior action to surreptitiously reserve the defamation claim for use in a future encounter. See Piedmont Cotton Mills v. Woelper, 269 Ga. 109, 498 S.E.2d 255 (1998). Rather, he filed a motion in the prior action bringing the claim to the attention of both the trial court and Banderas pointing out that the claim had been recently discovered; that the statute of limitation was about to expire (one week remained before the expiration of the one-year limitation period on the letter published July 15, 1993); and that given the posture of the arbitration proceeding (the disputed questions had already been submitted by the parties and the discovery period had expired), it was questionable as to whether the arbitrators would consent to the late addition of the claim. In light of these facts, he requested that the trial court modify the existing restraining order so that he could bring the claim in a later action. Banderas stated he had no objection, and the trial court modified the restraining order pursuant to Doman's request.
Although none of these factors precluded Doman from attempting to bring the defamation claim in the prior action, on balance they demonstrate that Doman did not simply forgo litigation of his defamation claims in the prior action despite the full and fair opportunity to do so. Under these circumstances, Doman's present defamation action is not precluded by the doctrine of res judicata.
I am authorized to state that Presiding Judge POPE and Judge JOHNSON join in this dissent.
NOTES
[1] Although the trial court characterized its ruling as the grant of Banderas' motion to dismiss, the record shows that the ruling was, in effect, the grant of Banderas' alternative motion for summary judgment. See Stripling v. Farmers, etc., Bank, 182 Ga.App. 793, 357 S.E.2d 149 (1987).
[2] In Banderas v. Doman, 224 Ga.App. 198, 480 S.E.2d 252 (1997), we affirmed the prior judgment which confirmed an arbitration award in favor of Doman.
|
Introduction {#section1-2333794X19831299}
============
One major goal of the Patient Protection and Affordable Care Act (PPACA) was to improve access to health care for children through the expansion of Medicaid and the Children's Health Insurance Program (CHIP). As of March 2014, Medicaid and CHIP coverage included all children at or above 200% of the federal poverty level (FPL) in all but 2 states, and 1 out of 3 children was covered by these programs.^[@bibr1-2333794X19831299][@bibr2-2333794X19831299][@bibr3-2333794X19831299]-[@bibr4-2333794X19831299]^ The PPACA included eligibility expansions that benefitted both adults and children, enrollment simplifications, and outreach efforts. The PPACA changed how income and family size are calculated for Medicaid and CHIP. Prior to the PPACA, states participating in Medicaid were required to cover children through age 5 up to 133% of the FPL and school-age children up to 100% FPL. In addition, prior to the PPACA, CHIP provided insurance coverage to uninsured low-income children above the Medicaid income eligibility criteria.^[@bibr3-2333794X19831299]^ The PPACA transferred children from CHIP programs into Medicaid if their families had incomes between 100% and 138% of the FPL, allowing for those who qualified to no longer pay premiums to cover their children, which resulted in increased coverage. Furthermore, the PPACA gave families with incomes up to 400% of the FPL tax credits that could be used in the new marketplaces to purchase health coverage. All of these efforts increased enrollment of eligible children in Medicaid, CHIP, and PPACA marketplace plans. At the time of this study, 31 states had expanded Medicaid coverage to include everyone whose income was below 138% of the FPL. Unfortunately, in states that did not expand Medicaid, children of parents who were too poor to qualify for tax credits to be used in the marketplace for coverage, and who did not meet the Medicaid eligibility requirements in their states, were unable to fully benefit from the PPACA.^[@bibr5-2333794X19831299]^
States that expanded Medicaid coverage to more uninsured adults observed a welcome mat effect for children, and these states also observed larger decreases in uninsured children.^[@bibr6-2333794X19831299]^ This is thought to be due to the fact that adults with insurance are more likely to enroll their own children in health insurance programs and take them to a physician when necessary. Newly eligible adults (especially parents) allowed for over 700 000 children to gain insurance coverage, and this effect was largest in the states in which Medicaid was expanded. It is estimated that if the remaining 19 non-expansion states expanded Medicaid, 200 000 additional children would gain coverage.^[@bibr4-2333794X19831299]^
Given the challenges Medicaid patients have experienced accessing care,^[@bibr7-2333794X19831299][@bibr8-2333794X19831299]-[@bibr9-2333794X19831299]^ and with more pediatric patients than ever before insured with Medicaid, it is important to evaluate how accessibility has been effected since the PPACA. Within orthopedic surgery, studies have demonstrated that fewer medical offices accept Medicaid, and Medicaid patients who receive appointments face longer wait times than privately insured patients.^[@bibr10-2333794X19831299][@bibr11-2333794X19831299][@bibr12-2333794X19831299][@bibr13-2333794X19831299]-[@bibr14-2333794X19831299]^ Our study focuses on whether insurance type affects the ability of pediatric patients to obtain an orthopedic consultation. We specifically wanted to compare patient access to pediatric orthopedic specialists in states who chose to expand Medicaid to states without Medicaid expansion. We hypothesized that, even with the PPACA's enrollment mandates, pediatric Medicaid patients would have significantly more difficulty obtaining access compared with pediatric patients with private insurance, and that the Medicaid surgical fee would remain an important determinant of timely care.
Materials and Methods {#section2-2333794X19831299}
=====================
The study population included board-certified pediatric orthopedic surgeons who belonged to the Pediatric Orthopaedic Society of North America (POSNA) from 8 states: California, Massachusetts, Ohio, New York, Florida, Georgia, Texas, and North Carolina. These states were selected because they represent robust health care ecosystems that had an adequate number of listed pediatric orthopedic surgeons to support random selection of 30 orthopedic surgeons (a minimum of 30 pediatric surgeons were required per state based on our power analysis \[see below\]). This requirement excluded many states because pediatric orthopedics is a small subspecialty group. These states included a wide range of Medicaid spending per enrollee: US average (\$6502), California (\$6108), Massachusetts (\$11 091), Ohio (\$7075), New York (\$10 307), Florida (\$4893), Georgia (\$4245), Texas (\$5668), and North Carolina (\$5450).^[@bibr15-2333794X19831299]^ A power analysis was conducted that demonstrated that a sample size of 88 surgeons was needed to detect an effect size of at least 0.2 between an office accepting private insurance versus Medicaid. The effect size of 0.2 was referenced from previous studies that this research team had conducted.^[@bibr16-2333794X19831299]^ The creation of our dataset, randomization, and calling technique was similar to those used in our previous work.^[@bibr16-2333794X19831299]^ The methodology differed as follows: calls were made by author JN. Thirty pediatric orthopedic surgeons were called for each state or all practitioners listed on the POSNA website for that state were called. We recorded whether the orthopedic surgeon was in a group or solo practice, in an academic or private practice, and in a rural or urban setting.
The caller attempted to make an appointment for her pretend 11-year-old son. The caller followed a script to limit variation (see [Supplement 1](https://journals.sagepub.com/doi/suppl/10.1177/2333794X19831299), available online). The scenario was a request for the caller's son to be evaluated for an acute distal radius fracture, with the patient having Medicaid or BlueCross insurance. The scenario required 2 separate calls to each office (one for BlueCross and one for Medicaid), which were made at least 1 week apart. The office was told that the injury occurred out of state, and that an out-of-state emergency room took radiographs, placed the patient in a cast, and told the parents that the patient would require surgery. If the office gave an appointment, the date offered was recorded, but it was refused by the patient's mother.
BlueCross insurance was chosen as the commercial insurer because it is a commonly accepted carrier across all states included in the study. The Blue Cross Blue Shield companies insure 1 in 3 Americans and are contracted with more than 96% of hospitals and 95% of doctors and specialists. While each is a separate entity with unique rules and multiple plans per state, Blue Cross Blue Shield companies share common policy coverage determinations across states, and BlueCross was chosen to serve as a gold standard against Medicaid public payers.
Our methods to record data were similar to our previous work.^[@bibr16-2333794X19831299]^ Briefly, we recorded the date of the phone call, the date of the appointment if given, reasons for denying the appointment, and whether a referral was made to another office that accepted Medicaid. We considered the requirement for a referral from a pediatrician as a barrier to obtaining an appointment. The data were stratified into 2 groups: states with expanded Medicaid eligibility (California, Massachusetts, New York, Ohio) and states without expanded Medicaid eligibility (Florida, North Carolina, Georgia, Texas). During the study period, Florida and California had a portion of their Medicaid programs managed by insurance companies. Most office managers answering the phones understood that Medicaid insurance was synonymous with these managed care plans, but this was sometimes clarified by using the largest managed care plan in the state or geographic area.
The Medicaid reimbursement rates for Current Procedural Terminology code 25606 (percutaneous fixation of a distal radius fracture or epiphyseal separation) were obtained by reviewing each state's Medicaid reimbursement rates databases.
Our statistical analysis was similar to our previous work.^[@bibr16-2333794X19831299]^ Briefly, we used SPSS version 21 (SPSS, Inc, Chicago, IL). Chi-square test or Fisher's exact test was used to analyze differences in insurance acceptance rates. To compare the appointment waiting times, an independent samples *t* test was used after applying natural log transformation, as the data were not normally distributed. Multiple regression analysis was performed to detect whether Medicaid reimbursement was a significant predictor for successfully making an appointment for patients with Medicaid. Unless otherwise stated, all statistical testing was performed 2-tailed at an α level of .05.
Ethical Approval and Informed Consent {#section3-2333794X19831299}
-------------------------------------
The study was submitted to and approved by the Institutional Review Board office, HIC\# 13637. The institutional review board waived the need to obtain consent for the collection of data because informed consent would risk influencing office managers during the phone calls.
Results {#section4-2333794X19831299}
=======
Between the months of July and August 2015, a total of 180 offices were called across 8 states, 93 in 4 states with expanded Medicaid eligibility and 87 in 4 states without expanded Medicaid eligibility. The rate across all states for successfully obtaining an appointment was 69 (38.3%) for Medicaid patients and 149 (82.8%) for BlueCross patients (*P* \< .001; 95% confidence interval \[CI\] = 6.2-16.1; [Table 1](#table1-2333794X19831299){ref-type="table"}).
######
Appointment Success Rate (n (%) of Calls That Were Granted an Appointment).

Medicaid (n = 180) Private (n = 180) OR (95% CI)
------------------------------------------------------------- ---------------------------------------------------------------- ------------------- -----------------
All states
Yes, n (%) 69 (38.3) 149 (82.8) 9.7 (6.2-16.1)
No, n (%) 111 (61.7) 31 (17.2)
*P*^[a](#table-fn2-2333794X19831299){ref-type="table-fn"}^ \<.001
States with expanded Medicaid eligibility (n = 93)
Yes, n (%) 28 (30)^[b](#table-fn3-2333794X19831299){ref-type="table-fn"}^ 78 (84) 14.3 (7.2-28.4)
No, n (%) 65 (70) 15 (16)
*P*^[a](#table-fn2-2333794X19831299){ref-type="table-fn"}^ \<.001
States without expanded Medicaid eligibility (n = 87)
Yes, n (%) 41 (47)^[b](#table-fn3-2333794X19831299){ref-type="table-fn"}^ 71 (82) 7.0 (3.6-13.9)
No, n (%) 46 (53) 16 (18)
*P*^[a](#table-fn2-2333794X19831299){ref-type="table-fn"}^ \<.001
Abbreviations: OR, odds ratio; CI, confidence interval.
Comparison to Medicaid.
Comparison of Medicaid appointment success rates between patients in expanded versus non-expanded states (30% vs 47%; *P* \< .001; 95% CI = 0.3-0.9).
In states with expanded Medicaid eligibility, the success rate was 28 (30%) for Medicaid patients and 78 (84%) for BlueCross patients (*P* \< .001; 95% CI = 7.2-28.4). In states without expanded Medicaid eligibility, the success rate was 41 (47%) for Medicaid patients and 71 (82%) for BlueCross patients (*P* \< .001; 95% CI = 3.6-13.9). The success rate was significantly lower for Medicaid compared with BlueCross (*P* \< .001). Patients with Medicaid in states without Medicaid expansion were more successful in obtaining appointments than patients with Medicaid in states with Medicaid expansion (41 \[47%\] vs 28 \[30%\]; *P* \< .001; 95% CI = 0.3-0.9).
The main barrier to obtaining an appointment was when patients lacked a referral ([Table 2](#table2-2333794X19831299){ref-type="table"}). Offices did not request imaging as a prerequisite to obtaining an appointment. Overall, Medicaid patients were significantly more likely to be denied an initial appointment due to lack of a referral, compared with private (38 \[29.0%\] vs 10 \[5.6%\]; *P* \< .001; 95% CI = 0.1-0.3). This relationship remained consistent in states with and without expanded Medicaid eligibility. No difference was seen in referral requirements for patients with Medicaid in states with and without expanded eligibility. For Medicaid patients who were not able to schedule an initial appointment because their insurance was not accepted, 60% of offices were able to refer the patient to another specialist who would accept Medicaid. The difference between the waiting period for Medicaid and privately insured patients across all states was not statistically significant ([Table 3](#table3-2333794X19831299){ref-type="table"}). In addition, the difference in the waiting period for Medicaid patients in states with expanded Medicaid eligibility compared with states without expanded eligibility was not statistically significant ([Table 4](#table4-2333794X19831299){ref-type="table"}).
######
Rate at Which Offices Required Referrals in Order to Schedule Appointments if Insurance Was Accepted (n (%) of Offices That Required a Referral in Order to Schedule Appointments).

Medicaid (n = 131)^[c](#table-fn7-2333794X19831299){ref-type="table-fn"}^ Private (n = 180) OR (95% CI)
------------------------------------------------------------- --------------------------------------------------------------------------- ------------------- ------------------
All states
Yes, n (%) 38 (29.0) 10 (5.6) 0.1 (0.1-0.3)
No, n (%) 93 (71.0) 170 (94.4)
*P*^[a](#table-fn5-2333794X19831299){ref-type="table-fn"}^ \<.001
States with expanded Medicaid eligibility
Yes (%) 17/54 (32)^[b](#table-fn6-2333794X19831299){ref-type="table-fn"}^ 4/93 (4) 0.1 (0.03-0.3)
No (%) 37/54 (69) 89/93 (96)
*P*^[a](#table-fn5-2333794X19831299){ref-type="table-fn"}^ \<.001
States without expanded Medicaid eligibility
Yes (%) 21/77 (27)^[b](#table-fn6-2333794X19831299){ref-type="table-fn"}^ 6/87 (7) 0.2 (0.1 -- 0.5)
No (%) 56/77 (73) 81/87 (93)
*P*^[a](#table-fn5-2333794X19831299){ref-type="table-fn"}^ **\<**.001
Abbreviations: OR, odds ratio; CI, confidence interval.
Comparison to Medicaid.
Comparison of Medicaid referral rates between offices in expanded versus non-expanded states (32% vs 27%; *P* = .63).
Medicaid (n = 131) is because offices that did not accept Medicaid were excluded from the calculations of how many Medicaid-accepting offices required referrals to schedule appointments.
######
Medicaid Reimbursements for Pediatric Distal Radius Fixation (Current Procedural Terminology and Healthcare Common Procedure Coding System 25606) in 2014.

State Medicaid Reimbursement
---------------------------------------------------------------------- ------------------------
California^[a](#table-fn8-2333794X19831299){ref-type="table-fn"}^ \$519.98
Texas \$534.68
Florida \$369.87
Ohio^[a](#table-fn8-2333794X19831299){ref-type="table-fn"}^ \$371.88
New York^[a](#table-fn8-2333794X19831299){ref-type="table-fn"}^ \$386.23
North Carolina \$475.6
Massachusetts^[a](#table-fn8-2333794X19831299){ref-type="table-fn"}^ \$491.54
Georgia \$540.05
Average \$461.24
States with expanded Medicaid eligibility.
######
Waiting Period (Days).

Comparison by Insurance Type
------------------------------------------------------------- ---------- ---------
All states
Waiting period 3.5 2.8
*P*^[a](#table-fn9-2333794X19831299){ref-type="table-fn"}^ .172
States with expanded Medicaid eligibility
Waiting period 3.2 2.5
*P*^[a](#table-fn9-2333794X19831299){ref-type="table-fn"}^ .301
States without expanded Medicaid eligibility
Waiting period 3.6 3.2
*P*^[a](#table-fn9-2333794X19831299){ref-type="table-fn"}^ .497
Comparison by Affordable Care Act Expansion
Medicaid Private
States with expanded Medicaid eligibility 3.2 2.5
States without expanded Medicaid eligibility 3.6 3.2
*P* ^[a](#table-fn9-2333794X19831299){ref-type="table-fn"}^ .866 .623
Comparison to Medicaid.
Medicaid patients were more likely to obtain an appointment at offices in urban areas compared with rural areas (47% vs 13.3%; *P* = .04; 95% CI = 0.6-2.6) and in academic practices compared with private practices (46.9% vs 30.1%; *P* = .03; 95% CI = 0.5-1.1). While the majority of offices called were part of a group practice (92.8%), we did not identify a statistically significant difference in success rates for Medicaid patients between solo and group practices. Medicaid reimbursements for distal radius fixation varied across states ([Table 3](#table3-2333794X19831299){ref-type="table"}). The state of Georgia paid the highest reimbursement (\$540.05) and the state of Florida paid the lowest (\$369.87). Logistic and linear regression analysis did not demonstrate a significant relationship between reimbursement and appointment success rate or waiting periods.
Discussion {#section5-2333794X19831299}
==========
This study was designed to evaluate access to subspecialty pediatric orthopedic care for a pediatric patient with a potentially surgical, semi-urgent fracture pattern, since the passage of the PPACA. Evidence has been mounting over the past few years that pediatric patients have experienced increased difficulty in accessing orthopedic specialty care, regardless of the type of insurance coverage.^[@bibr17-2333794X19831299]^ To our knowledge, this is the first study of its kind to evaluate the pediatric patient's access to specialists across multiple states since the passage of the PPACA. Below, when we are describing acceptance rates for Medicaid versus privately insured patients, it is important to note that these were not actually a group of patients calling but a sample of calls for a fictitious patient.
Regarding our study's limitations, our investigation focused on pediatric orthopedic specialists in 8 states. While a more expansive survey could have examined the entire nation, we believe we captured an accurate sample of regional health care marketplaces. There are substantial underlying differences in states with and without Medicaid expansion that may influence access, including geography, political orientation, health care market landscapes, economic differences, and employers. This was partially addressed by choosing states with a large number of pediatric orthopedic specialists. However, given the limited number of pediatric orthopedic surgeons in each state, our sample size was limited, and this may have affected the statistical significance of the regression analyses and the differences in waiting periods. In addition, although we found that there was no significant relationship between appointment success rates for surgical pediatric distal radius repair and reimbursement rates for Medicaid, it was not possible to determine private payer negotiated rates, given their confidentiality. In addition, by including the patient's insurance status up front in the script, the office may have been forewarned that the caller represented an underinsured patient, and this may have influenced encounters.
There are many potential reasons why offices may choose to not accept Medicaid. These range from increased required documentation, higher resource utilization, lower reimbursement for services, and increased medicolegal liability. Medicaid expansion did not address many of these issues and therefore may not have influenced clinic policies. In addition, these reasons may have regional differences that may not be related to Medicaid expansion or the PPACA.
Our results suggest that orthopedic practices provide varied access to pediatric orthopedic urgent care for patients with Medicaid insurance versus private insurance. Our findings demonstrate that patients with Medicaid were considerably less successful at obtaining appointments than patients with private insurance (38.3% vs 82.8%, *P* \< .001). In addition, Medicaid patients were denied more appointments because they did not have a referral (29.0% vs 5.6%, *P* \< .001).
With regard to states without Medicaid expansion, our study showed that Medicaid patients were more likely to be given an appointment. This may at first be a counterintuitive finding. However, this is likely due to pediatric orthopedic surgeons in expanded states being overwhelmed with patients due to the increased insurance eligibility and subsequent enrollment. To understand the extent of the Medicaid enrollment increase for each state, the number of patients and percent increase in Medicaid enrollment pre-ACA compared with Medicaid enrollment in July 2015 is listed for states that expanded Medicaid eligibility (California \[9 157 000/12 648 637\] 38%, Massachusetts \[1 296 359/1 649 423\] 27%, Ohio \[2 341 481/2 988 934\] 28%, New York \[5 678 417/6 512 137\] 15%) and for states that did not expand Medicaid eligibility (Florida \[3 104 996/3 558 092\] 15%, Georgia \[1 535 090/1 781 537\] 16%, Texas \[4 441 605/4 678 394\] 5%, and North Carolina \[1 595 952/1 982 496\] 24%).^[@bibr18-2333794X19831299]^ In general, Medicaid enrollment increased for all states, and states that expanded Medicaid eligibility generally saw a larger percent change.
In terms of barriers to care, our assessment demonstrated that the requirement of a referral was more likely to be enforced on Medicaid patients (38 \[29.0%\] vs 10 \[5.6%\]; *P* \< .001; 95% CI = 0.1-0.3). For indigent patients, it can be challenging to obtain the necessary referral paperwork due to restrictions at their work, as well as reduced means for travel and communication. While 4 states included in our study, Massachusetts, North Carolina, Texas, and New York, mandated a primary care physician referral in order to see a surgical specialist, we found that this requirement was not regularly enforced. These individual state requirements for a primary care physician referral are a legal barrier to care that was not addressed by the PPACA and unfairly burdens Medicaid patients. It is important to note that surgeons risk not being reimbursed for services if they do not receive a referral in which the insurance company requires one. However, we did not observe this behavior as much in patients with private insurance who had the same requirement for a referral.
We found that access to orthopedic care in the pediatric patient population vary across practice setting (academic, private, group, solo, urban, rural). Medicaid patients were significantly more likely to obtain appointments at academic practices compared with private practices (46.9% vs 30.1%, *P* = .026; 95% CI = 0.5-1.1) and in urban areas compared with rural areas (47% vs 13.3%; *P* = .04; 95% CI = 0.6-2.6). These results correlate with a nationwide trend that Medicaid patients are relying more on federally funded community health centers and public and nonprofit safety net hospitals, which generally care for more uninsured and Medicaid patient populations.^[@bibr19-2333794X19831299]^
Our regression analysis did not find a statistically significant relationship between access and Medicaid surgical reimbursement rates. Although studies have stressed the importance of reimbursements on physician participation, this result is consistent with previous works on access to hand and foot and ankle specialists.^[@bibr20-2333794X19831299],[@bibr21-2333794X19831299]^
Conclusions {#section6-2333794X19831299}
===========
Despite the PPACA, Medicaid pediatric patients encountered significantly more barriers to care than private patients, especially in states that expanded Medicaid eligibility. Medicaid patients were significantly more likely than private patients to be denied appointments due to lack of referrals and significantly fewer offices scheduled appointments for Medicaid patients.
To improve health inequities, it is important to explore how to remove barriers to care. Medicaid reimbursement was not significantly correlated with appointment success rates, but this is likely because overall Medicaid reimbursement is significantly lower than private insurance. An increase in reimbursement rates likely would lead to increased acceptance of Medicaid insurance. As funding is limited, state Medicaid programs must find additional ways to incentivize specialists to see patients. This is especially important when it comes to the health of our nation's children. Further studies should investigate these relationships in order to maximize the ethical allocation of resources and augment health outcomes.
Supplemental Material {#section7-2333794X19831299}
=====================
###### Supplement_1 -- Supplemental material for Does Medicaid Insurance Provide Sufficient Access to Pediatric Orthopedic Care Under the Affordable Care Act?
######
Click here for additional data file.
Supplemental material, Supplement_1 for Does Medicaid Insurance Provide Sufficient Access to Pediatric Orthopedic Care Under the Affordable Care Act? by Jenny Nguyen, Nidharshan S. Anandasivam, Daniel Cooperman, Richard Pelker and Daniel H. Wiznia in Global Pediatric Health
**Author Contributions:** JN: contributed to conception and design, contributed to acquisition, analysis, and interpretation, drafted manuscript, critically revised manuscript, gave final approval.
NSA: contributed to conception and design, contributed to acquisition, analysis, and interpretation, drafted manuscript, critically revised manuscript, gave final approval.
DC: contributed to conception and design, contributed to analysis and interpretation, drafted manuscript, critically revised manuscript, gave final approval.
RP: contributed to conception and design, contributed to analysis and interpretation, drafted manuscript, critically revised manuscript, gave final approval.
DHW: contributed to conception and design, contributed to acquisition, analysis, and interpretation, drafted manuscript, critically revised manuscript, gave final approval.
**Declaration of Conflicting Interests:** The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
**Funding:** The author(s) received no financial support for the research, authorship, and/or publication of this article.
**ORCID iD:** Daniel H. Wiznia  <https://orcid.org/0000-0003-3987-0364>
**Supplemental Material:** Supplemental material for this article is available online.
|
All relevant data are within the paper and its Supporting Information files.
Introduction {#sec001}
============
A major part of the development of a specific immune response to a pathogen belongs to MHC class II molecules \[[@pone.0205557.ref001], [@pone.0205557.ref002]\]. MHC class II molecules are constitutively expressed by professional antigen-presenting cells (APCs), such as dendritic cells, B cells and cells of the monocyte/macrophage lineage. In addition, non-professional APCs (e.g., fibroblasts, astrocytes, epithelial cells) acquire MHC class II expression when exposed to a variety of stimuli, most potent IFN-γ, during infection, inflammation or trauma. In humans, T cells can also be induced to express class II molecules after activation \[[@pone.0205557.ref003], [@pone.0205557.ref004]\]. MHC class II molecules classically present extracellular antigens such as bacteria, parasites, and toxins that enter the host cell by endocytosis or phagocytosis, to antigen-specific CD4+ T cells. However, mechanisms of an endogenous presentation by antigen-presenting cells have been described while sufficient TCD4+ engagement is an important predictor of outcome with several viral infectious diseases (including hepatitis A and B and influenza) \[[@pone.0205557.ref005]\].
The MHC class II region in humans (otherwise HLA, Human Leukocyte Antigen) contains three distinct gene loci, HLA-DP, -DQ, and--DR \[[@pone.0205557.ref006]\]. MHC class II molecules consist of two chains, α and β. DPA, DQA and DRA genes code for chain α, while DPB, DQB and DRB genes code for chain β. Except for DRA, which is dimorphic with just one substitution at the intra-cytoplasmic position 227, the MHC class II locus is highly polymorphic. Up to date 45 DPA1 alleles, 78 DQA1 alleles, 828 DPB1 alleles, 1,079 DQB alleles and 2,058 DRB1 alleles have been identified \[[@pone.0205557.ref007], [@pone.0205557.ref008], [@pone.0205557.ref009]\]. The high polymorphism observed is mainly located in exon 2 of these molecules that codes for the peptide-binding region (PBR).
The PBR resides in a peptide antigen-binding groove, formed by both α and β chains. In the cleft, MHC molecules feature binding pockets into which anchoring peptides of the antigen can fit. The fitting is stabilized by hydrogen bonds and ion bridges between the side chains of α and β chains of the groove and along the backbone of the peptide ([Fig 1](#pone.0205557.g001){ref-type="fig"}). The groove of class II molecules is open, allowing the binding of a wide range of peptides; typically 12--26 amino acids long. The peptide segments that bind to groove are nonamers while their N and C termini may extend beyond the ends of the groove \[[@pone.0205557.ref010]\]. The flanking residues can increase the binding affinity to class II MHC molecules or can also be used directly by T cell receptor as contact residues \[[@pone.0205557.ref011]\].
![MHC class II molecules are heterodimers consisting of α (green) and β (orange) chains.\
The antigen binding groove is formed by two alpha-helices above a beta-sheet floor. Antigens (red) fit in the cleft and stabilized by electrostatic interactions and/or hydrogen bonds to anchor peptides of the groove (regions with light shades). The structure being illustrated is based on the structure with PDB ID: 2NNA \[[@pone.0205557.ref012]\].](pone.0205557.g001){#pone.0205557.g001}
The four major binding pockets are P1, P4, P6 and P9 while P7 \[[@pone.0205557.ref011], [@pone.0205557.ref013]\] and P10 can also influence the peptide binding selectivity \[[@pone.0205557.ref014]\]. These pockets vary between MHC molecules that are encoded by different alleles (a pocket variant is considered any combination of amino acid in the binding pocket), having a narrower or wider specificity for different residues and thus different affinity of binding for the given peptides \[[@pone.0205557.ref015]\]. So, it becomes evident that the array of PBR variation determines the range of recognizable pathogen-derived antigens.
In our previous study, we examined the polymorphism of three MHC class II genes, *HLA-DPA1*, *HLA-DQA1* and *HLA-DRB1*, in a cohort of WNV cases and a control group of the Greek population in order to investigate the contribution of MHC class II background in the infection and outcome of the WNV disease. Alleles that indicate protection against or susceptibility to WNV infection as well as alleles that may protect from neuroinvasion where identified in all three loci \[[@pone.0205557.ref016]\]. Here, we focused on the involvement of MHC class II in neuroinvasion, by targeting the PBR. The aim of this study is to use a) the differentiation of the frequency of the pocket variants that belong to the genes under study, between the mild and severe clinical symptoms of WNV disease and b) the structural analysis of the pocket variants that are either protective or susceptible against neuroinvasion, in order to better understand the role of each pocket in WNV recognition and suggest a model of how these amino acid changes could influence the outcome of the disease.
Materials and methods {#sec002}
=====================
Selection of the positions for the analysis {#sec003}
-------------------------------------------
In this study, we retrieved the results from our previous work \[[@pone.0205557.ref016]\] and focused on residues that form binding pockets P1, P4, P6, P7, P9 and P10. In the MHC class II heterodimer, chains α and β, both contribute to the formation of pockets P1, P6, P9 and P10 while chain β forms alone P4 and P7. In particular, positions α- 7, 9, 24, 31, 32 43, and 52 (P1), 11, 62, 65, 66 and 69 (P6), 68, 69, 72, 73 and 76 (P9) and β- 85, 86, 89 and 90 (P1), 13, 26, 28, 70, 74 and 78 (P4), 11, and 30 (P6), 28, 47, 61, 67 and 71 (P7), 9, 37 and 57 (P9), 56, 57 and 60 (P10) were analyzed \[[@pone.0205557.ref013], [@pone.0205557.ref014]\]. Position α76 belongs in P10 but was not included in the analysis due to monomorphism \[[@pone.0205557.ref017]\].
Populations under study {#sec004}
-----------------------
A total of 105 confirmed WNV cases were used in our study. Sixty-eight individuals were reported with West Nile Neuroinvasive Disease (WNND) while thirty-seven individuals developed only mild symptoms and are referred to as West Nile Fever (WNF) cases \[[@pone.0205557.ref016]\]. Considering other risk factors in the populations under study, no sufficient information for immunosuppression of cases was available. Additionally, cases in both groups had similar age (age in years, mean ± s.d.: WNND 67±16.18, WNF 63±16). WNND was associated with men \[[@pone.0205557.ref016]\] as described in the literature \[[@pone.0205557.ref018]\].
Statistical analysis {#sec005}
--------------------
The association of each pocket or combination of pockets with WNV disease outcome was examined with pairwise comparison using the z test (XLSTAT 2014.5.03). P\<0.05 was considered statistically significant in all tests. The analyses for association between WNV cases sub-groups and amino acid residues were performed using the χ^2^ test.
Modeling {#sec006}
--------
The following protocol has been followed in order to construct models of complexes DQA1\*01:02-DQB1\*03:01, DQA1\*03:01-DQB1\*03:01, DRA1\*01-DRB1\*11:04 and DRA1\*01-DRB1\*14:04 to evaluate the structural and functional consequences of allele sequence differences. The crystal structures of PDB entry code: 2NNA \[[@pone.0205557.ref012]\] and PDB entry code: 2WBJ \[[@pone.0205557.ref019]\] have been used as starting conformations for molecular dynamics (MD) simulations in explicit water. DQA1\*01:02 and DQA1\*03:01 were created after the following amino acid alterations in the 2NNA structure; DQA1\*01:02: 9 Tyr\>Cys, 15 Ser\>Phe, 23 Ser\>Thr, 31 Glu\>Gln, 42 Val\>Ala, 44 Gln\>Arg, 45 Leu\>Trp, 47 Leu\>Glu, 49 Arg\>Ser, 50 Arg\>Lys, 52 Gly\>Arg, 53 Gly\>Arg, 58 Phe\>Gly, 61 Thr\>Arg, 63 Ile\>Met, 66 Leu\>Ala, 73 Val\>Met and 77 Ser\>Tyr, DQA1\*03:01: 41 Thr\>Val and 42 Val\>Ala. Similarly, DRB1\*11:04 and DRB1\*14:04 were created after the following amino acid alterations in the 2WBJ structure; DRB1\*11:04: 9 Trp\>Glu, 10 Gln\>Tyr, 11 Pro\>Ser, 12 Lys\>Thr, 13 Arg\>Ser, 37 Ser\>Tyr, 58 Ala\>Glu, 67 Ile\>Phe, 70 Gln\>Asp and 71 Ala\>Arg, DRB1\*14:04: 9 Trp\>Glu, 10 Gln\>Tyr, 11 Pro\>Ser, 12 Lys\>Thr, 13 Arg\>G, 16 His\>Tyr, 32 Tyr\>His, 37 Ser\>F, 47 Phe\>Tyr, 57 Asp\>Ala, 60 Tyr\>His, 67 Ile\>Leu, 70 Gln\>Arg, 71 Ala\>Arg and 74 Ala\>Glu. Disulphide bonds have been added as indicated in the PDBs.
The protonation states were first determined with PROPKA \[[@pone.0205557.ref020], [@pone.0205557.ref021]\] and then adjusted accordingly. The solvated systems (protein complex DQA1\*01:02-DQB1\*03:01, 12777 waters, 52 Na+ and 88 Cl^-^ ions, DQA1\*03:01-DQB1\*03:01, 12353 51 Na+ and 86 Cl^-^ ions, DRA1\*01-DRB1\*11:04, 14043 water molecules, 61 Na+ and 101 Cl^-^ ions, DRA1\*01-DRB1\*14:04, 14043 water molecules, 63 Na+ 103 Cl^-^ ions) were first energy minimized and then subjected to 15000 steps of NPT MD simulation at 310K and 1 Atm with the Particle Mesh Ewald (PME) algorithm for handling electrostatics in order to adjust the simulation cell dimensions. The resulting systems have been then simulated in the NVT ensemble for 3 ns at 310K. The final systems (the last frame of the MD trajectories) were subjected to energy minimization. The obtained minimized protein conformations were used for further structural analysis and comparisons. We should note that during simulation of heterodimer DRA1\*01-DRB1\*14:04, an Asp existed in position 57. This residue was later mutated to an Ala. After the change to an Ala, a cycle of minimization for 10000 steps followed. The MD program NAMD \[[@pone.0205557.ref022]\] and the CHARMM force field parameter and topology for proteins and nucleic acids \[[@pone.0205557.ref023]\] were used for the simulations. RMSD average and RMSD per-residue were calculated ([S1 Fig](#pone.0205557.s001){ref-type="supplementary-material"}). Molecular model illustrations were rendered using PyMOL (The PyMOL Molecular Graphics System, Schrödinger, LLC). Hydrogen bonds detection was based on the default criteria of PyMOL. Evaluation of salt bridges was performed by ESBRI \[[@pone.0205557.ref024]\].
Results {#sec007}
=======
The amino acid sequence of the previously identified alleles in our cohort under study is shown in [Fig 2](#pone.0205557.g002){ref-type="fig"}. In HLA-DPA1, five residues of a total of 82 were polymorphic (6.1%) in the five alleles identified. In HLA-DQA1, 18 positions were variable (22%) in a total of six alleles while in 22 DRB1 alleles, 26 polymorphic positions were found in a total of 89 residues (29.2%) that are coded from exon 2. Although polymorphisms were found throughout exon 2, the PBR was a 'hot-spot' as it was expected. Focusing on the selected pockets (Materials & Methods), three residues were variable out of 16 in HLA-DPA1's PBR (\~19%). In HLA-DQA1 the variability of the PBR was two times higher than HLA-DPA1 (6 of 16 residues, 37.5%). Finally, HLA-DRB1 showed an extreme percentage of polymorphism (76.2%) where only 5 residues were conserved in the 22 alleles identified. However, amino acids with similar biochemical properties that were found in these variable sites could have little effect in the functional polymorphism of the molecule.
{#pone.0205557.g002}
*HLA-DPA1* had the least polymorphic pockets. P1 was dimorphic while P6 had three variants; SYFMFWF and SYFQFWF and ANILN, MNILN and MNISN were found in P1 and P6 respectively. P9 was monomorphic (NNTLR) ([Table 1](#pone.0205557.t001){ref-type="table"}, [Fig 2](#pone.0205557.g002){ref-type="fig"}). These variants were found to be combined in four amino acid sequences ([Fig 2](#pone.0205557.g002){ref-type="fig"}). SYFMFWF (P1) and ANILN (P6) were abundant in both groups ([Table 1](#pone.0205557.t001){ref-type="table"}). Variant MNISN (P6) was found only in WNND group, with low frequency ([Table 1](#pone.0205557.t001){ref-type="table"}).
10.1371/journal.pone.0205557.t001
###### The pocket variants and their frequency found in HLA-DPA1, -DQA1 and -DRB1 in both WNND and WNF case groups.
The pocket in which each variant belongs is shown on the left of the variant. The variants found exclusively in one of the groups are shown in italics (in the WNND/WNF columns).
{#pone.0205557.t001g}
**WNND** **WNF** p-value WNND WNF p-value WNND WNF p-value WNND WNF p-value
------------ ---------- --------- --------- ------------ ----------- ------- --------- ---------- ----------- ----------- ------------ ---------- ----------- ------- ------------
**DPA1** **DRB1** **DRB1** **DRB1**
SYFMFWF(1) 0,846 0,851 VVFT(1) 0,579 0,546 0,6708 SH(6) *0*,*044* *0* 0,0887 EYS(9) 0,036 0,016 0,4448
SYFQFWF(1) 0,154 0,149 VGFT(1) 0,377 0,454 0,3168 DFWFR(7) 0,351 0,329 0,7674 ELV(9) *0*,*044* *0* 0,0887
ANILN(6) 0,949 0,955 AVFT(1) *0*,*044* *0* 0,0887 DFWIR(7) *0* *0*,*016* 0,1794 PDY(10) 0,843 0,973 **0,0079**
MNILN(6) 0,044 0,045 SFDDRAY(4) 0,351 0,345 0,9360 DYWLR(7) 0,114 0,016 **0,0200** PAH(10) *0*,*052* *0* 0,0636
MNISN(6) *0*,*07* *0* SFDRREY(4) *0*,*052* *0* 0,0636 DFWIE(7) 0,062 0,125 0,1492 PSY(10) 0,036 0,016 0,4448
NNTLR(9) 1 1 SFDDEAY(4) 0,062 0,141 0,0792 DFWLK(7) 0,079 0,094 0,7307 PAY(10) 0,027 0,016 0,6396
**DQA1** SYDQKRY(4) 0,079 0,094 0,7307 DYWIR(7) *0* *0*,*016* 0,1794 PVY(10) *0*,*044* *0* 0,0887
ACHQFWG(1) 0,583 0,548 GFDDRLY(4) 0,044 0,032 0,6947 DFWIA(7) 0,15 0,126 0,6601
ACHEFWG(1) 0,287 0,194 RFDDRAY(4) 0,149 0,188 0,5006 EYWLR(7) 0,017 0,063 0,1039
AYHEFWR(1) 0,113 0,226 RFDQAAY(4) 0,15 0,126 0,6601 EFWIR(7) *0*,*044* *0* 0,0887
AYHQFWR(1) 0,017 0,032 GFDRREY(4) 0,027 0,016 0,6396 DFWFE(7) *0* *0*,*016* 0,1794
NNVAN(6) 0,87 0,742 FLERRAY(4) 0,017 0,063 0,1039 DYWFR(7) 0,158 0,204 0,4395
NNVLN(6) 0,13 0,258 GLEDRAY(4) *0*,*044* *0* 0,0887 DYWIK(7) *0*,*027* *0* 0,1848
HNIMR(9) 0,87 0,742 SFDDKAY(4) *0*,*027* *0* 0,1848 EYD(9) 0,386 0,471 0,2712
HNIVR(9) 0,087 0,161 SY(6) 0,642 0,628 0,8526 EFA(9) 0,079 0,016 **0,0376**
HNILR(9) 0,026 0,065 PY(6) 0,299 0,314 0,8352 END(9) 0,158 0,188 0,6094
HNSLR(9) 0,017 0,032 VR(6) 0,017 0,063 0,1039 WSD(9) 0,299 0,314 0,8352
\*Pairwise comparisons were performed using z test. Comparisons with p-value \<0.05 were considered statistically significant.
Higher PBR variation was observed in the 6 DQA1 alleles found in the population studied. In P1, 4 variants were identified; ACHQFWG, ACHEFWG, AYHEFWR and AYHQFWR. Analogously, 4 variants were found in P9; HNIMR, HNIVR, HNILR and HNSLR. P6 was dimorphic; NNVAN and NNVLN ([Table 1](#pone.0205557.t001){ref-type="table"}). ACHQFWG of P1 was the most frequent variant identified in both WNND and WNF. The frequency of AYHEFWR and AYHQFWR was two times higher in WNF compared to WNND. In P6 and P9, variants NNVAN and HNIMR were found with higher frequency ([Table 1](#pone.0205557.t001){ref-type="table"}). Five different combinations were observed. As shown in [Fig 2](#pone.0205557.g002){ref-type="fig"}, DQA1\*01:02 and DQA\*01:03 differ in two amino acids that are not included in the PBR.
Twenty-two variant combinations were observed in 22 alleles found in the case of DRB1s ([Fig 2](#pone.0205557.g002){ref-type="fig"}). Binding pockets P4 and P7 showed higher polymorphism (11 and 12 variants respectively) while P1 and P6 were more conserved (3 and 4 variants respectively) amongst the proteins. Six variants were found in P9 and five in P10. The most frequent variants in both cohorts in all pockets were VVFT (P1), SFDDRAY (P4), SY (P6), DFWFR (P7), EYD (P9) and PDY (P10). The combination of these variants was found in DRB1\*11:04. AVFT (P1), SFDRREY, GLEDRAY and SFDDKAY (P4), SH (P6), EFWIR and DYWIK (P7), ELV (P9) and PVY and PAH (P10) were found only in the WNND group. On the contrary, DFWIR, DYWIR and DFWFE of P7 were found only in WNF ([Table 1](#pone.0205557.t001){ref-type="table"}).
PBR pockets associated with neuroinvasion {#sec008}
-----------------------------------------
Concerning the PBR of *HLA-DQA*, all pockets seem to have a specific role for binding WNV peptides. Specifically, in P1, the frequency of AYHEFWR was two times higher in the WNF group compared with WNND patients (P = 0.046). P6 variants were found in inverse proportion in WNND and WNF cohorts; NNVLN could have a protective role against neuroinvasion (P = 0.032). In P9, HNIMR was carried by the majority of both cases and controls. However, it was found with significantly lower frequency in WNF cases compared to WNND (P = 0.032) ([Fig 3](#pone.0205557.g003){ref-type="fig"}).
{#pone.0205557.g003}
In *HLA-DRB1*, ten pocket variants (AVFT in P1, SFDRREY, GLEDRAY and SFDDKAY in P4, SH in P6, EFWIR and DYWIK in P7, ELV in P9, PAY and PVS in P10) were implicated in neuroinvasion as they were present only in WNND individuals. DYWIR and DFWFE in P7 were found in WNF but not in WNND. Nonetheless, their low frequency was deterrent in order to characterize them as protective against neuroinvasion. DYWLR was found in 11.4% of WNND but in only 1.6% of WNF (P = 0.02). Similarly, EFA was observed in 7.9% of WNND in comparison to 1.6% in WNF (P = 0.04). Conversely, PDY, was found in the overwhelming majority of WNF (97.3%) (WNND vs WNF, P = 0.008). VVFT/SFDDEAY/SY/DFWIE/EYD/PDY (DRB1\*11:02) could be involved in the protection against neuroinvasion as none of the cases bearing them developed WNND (P = 0.02) ([Fig 3](#pone.0205557.g003){ref-type="fig"}).
Groove structure and protein modeling {#sec009}
-------------------------------------
### The case of *HLA-DQA1* {#sec010}
**Pocket 1.** Susceptible ACHQFWG (data not shown, derived from the comparison of WNV cases *vs* our previous control group) and resistant AYHEFWR differ in positions *α*9, *α*31 and *α*52. *α*9-Tyr and *α*52-Arg of AYHEFWR are more spacious than *α*9-Cys and *α*52-Gly of ACHQFWG. Specifically, *α*52 Gly\>Arg increases the volume of this position 3 times. Position *α*31 has similar volumes in these variants. In ACHQFWG no amino acids are charged. On the contrary, *α*31-Glu is negatively charged and *α*52-Arg is positively charged ([Table 2](#pone.0205557.t002){ref-type="table"}). The existence of bulkier amino acids creates a shallow groove that may not favor a voluminous anchor peptide residue. AYHEFWR has oppositely charged residues that could affect the binding selectivity of the antigenic peptides. However, charge could also increase the immune response against WNV by increasing the binding affinity of specific epitopes.
10.1371/journal.pone.0205557.t002
###### List of WNV neuroinvasion-associated amino acid residues in HLA-DQA1 and their properties \[[@pone.0205557.ref025]\].
P values in bold indicate significance.
{#pone.0205557.t002g}
Amino acid Amino acid variants Pocket Properties Volume (Α^3^) Comparison WNND vs WNF
------------ --------------------- -------- ----------------------- --------------- ------------- -------------
9 Cysteine (C) P1 Hydrophobic 108.5 C vs Y **0.0486**
Tyrosine (Y) Partially hydrophobic 193.6
31 Glutamine (Q) P1 Polar 143.8 Q vs E **0.0207**
Glutamic acid (E) Charged (-) 138.4
52 Glycine (G) P1 Non-polar 60.1 G vs R **0.0001**
Arginine (R) Charged (+) 173.4
66 Alanine (A) P4 Non-polar 88.6 A vs L **0.0001**
Leucine (L) Hydrophobic 166.7
73 Methionine (M) P9 Hydrophobic 162.9 M vs others **0.0001**
Leucine (L) Hydrophobic 166.7 M vs V 0.0902
Valine (V) Hydrophobic 140 M vs L **0.0433**
V vs L 1.0000
\*Pairwise comparisons were performed using x^2^ test. Comparisons with p-value \<0.05 were considered statistically significant.
**Pocket 4.** No difference in charge is observed between NNVAN and NNVLN. However, *α*66 Ala\>Leu increases the volume by two times in this position of the pocket. The reverse behavior of these two pockets, NNVAN being susceptible and NNVLN being resistant to neuroinvasion, could be explained by the different volume preferences of anchor peptides they present ([Table 2](#pone.0205557.t002){ref-type="table"}). NNVLN was found in combination only with.
AYHEFWR that also was associated with protection against neuronic damage.
**Pocket 9.** HNIMR was associated with neuronic susceptibility. However, most of the P9 variants observed share analogous charge and volume properties. HNIMR was found in combination with ACHEFWG and ACHQFWG. On the contrary, resistant AYHEFWR (neuroinvasion) was found in combination with both HNILR and HNIVR. The abovementioned P9 variants differ at *α*73 (Met\>Leu\>Val). These substitutions are non-polar and have similar volume ([Table 2](#pone.0205557.t002){ref-type="table"}).
**Protein modeling: DQA1\*01:02/03:01 --DQB1\*03:01.** We constructed the structural models of DQA1\*01:02-DQB1\*03:01 (susceptible pocket variants) and DQA1\*03:01-DQB1\*03:01 (resistant pocket variants) based on the abovementioned association results. RMSD results ([S1 Fig](#pone.0205557.s001){ref-type="supplementary-material"}) were not used since no systematic discrimination of the alleles was observed. Selecting the residues that are located in a radius of 4 Å from the peptide in each molecule, we observe that several amino acids were shifted in relation to the peptide. All residues that were found in close proximity to the peptide were evaluated, even if present in only one of the model structures. Ile 73, His 69, Asn70, Asn 63, Val 66, Trp 44, Phe 55 and Asp 56 have different orientation in DQA1\*01:02 and DQA1\*03:01 alleles ([Fig 4C](#pone.0205557.g004){ref-type="fig"}). This differentiation could affect the size of the peptide's side chain that could anchor at these residues. In addition, it could change the stability of the peptide's binding to the groove. Indeed, Asn 63 (found in the neighbor of the peptide only in DQA1\*01:02) and His 69 form two hydrogen bonds with Phe 6 and Glu 11 of the peptide in DQA1\*01:02 but not in DQA1\*03:01, respectively ([Fig 4A](#pone.0205557.g004){ref-type="fig"}, [Table 3](#pone.0205557.t003){ref-type="table"}). Similarly, Asn 70 in DQA1\*01:02 forms two hydrogen bonds with Ser 9 and Glu 11 of the peptide, stabilizing its binding in the groove ([Fig 4A](#pone.0205557.g004){ref-type="fig"}, [Table 3](#pone.0205557.t003){ref-type="table"}). Ile 73, Val 66, Trp 44 and Phe 55 are located deeper in the cleft, thus their orientation did not affect the binding of this peptide (data not shown). Tyr 23 has a slight difference in orientation between the two molecules. However, in both molecules, Tyr 23 forms H-bonds. Specifically, in Tyr 23 OH is in suitable proximity to the peptide's Ser 5 OG to form a hydrogen bond in both cases ([Fig 4A and 4B](#pone.0205557.g004){ref-type="fig"}, [Table 3](#pone.0205557.t003){ref-type="table"}). Phe 52 showed no change in orientation between DQA1\*01:02 and DQA1\*03:01; however, its setting in the groove is very different ([Fig 4C](#pone.0205557.g004){ref-type="fig"}). A hydrogen bond is formed (Ser 1 of the peptide) only in DQA1\*03:01 ([Fig 4B](#pone.0205557.g004){ref-type="fig"}, [Table 3](#pone.0205557.t003){ref-type="table"}). Nevertheless, Phe 52 in DQA1\*03:01 could also possibly block the binding of a peptide with bulky flanking N terminus.
{#pone.0205557.g004}
10.1371/journal.pone.0205557.t003
###### All the hydrogen bonds and the salt bridges between DQA/DQB chains and the peptide in both structures.
Columns 'Molecule 1'/'Residue' 1 list the α or β chain of each DQ complex (column 'Molecule 1') and the residues that interact with the peptide (column Residue 1). Column 'Molecule 2' refers always to the peptide. In column 'Residue 2' the peptide's residues that form H-bonds and salt bridges with any DQ-complex amino acid are listed. The atoms involved are shown.
{#pone.0205557.t003g}
H-bonds
------------------------- ------------- ------------ ------------ ----------
DQA1\*01:02-DQB1\*03:01 DQA1\*01:02 peptide OH Tyr 23 OG Ser 5
DQA1\*01:02 peptide O Gly 54 N Glu 3
DQA1\*01:02 peptide ND2 Asn 63 O Phe 6
DQA1\*01:02 peptide NE2 His 69 O Glu 11
DQA1\*01:02 peptide OD1 Asn 70 N Glu 11
DQA1\*01:02 peptide ND2 Asn 70 O Ser 9
DQB1\*03:01 peptide OH Tyr 47 OG Ser 9
DQB1\*03:01 peptide O Val 67 OG Ser 9
DQB1\*03:01 peptide OG1 Thr 71 OG Ser 9
DQB1\*03:01 peptide NE2 His 81 O Gly 2
DQB1\*03:01 peptide OD1 Asn 82 N Gly 4
DQB1\*03:01 peptide ND2 Asn 82 O Gly 4
DQA1\*03:01-DQB1\*03:01 DQA1\*03:01 peptide OH Tyr 23 OG Ser 5
DQA1\*03:01 peptide O Phe 52 N Ser 1
DQA1\*03:01 peptide N Arg 54 O Ser 1
DQB1\*03:01 peptide OD1 Asn 82 N Gly 4
**Salt bridges**
DQA1\*03:01-DQB1\*03:01 DQA1\*03:01 peptide NH1 Arg 53 OE Glu 3
DQA1\*03:01 peptide NH2 Arg 53 OE Glu 3
The different conformation observed is a result of the polymorphic sites between these alleles. Four positions were found to be occupied by different amino acids in the ray of the peptide used. Position 9 is located on the floor of the cleft while position 59 on the a-helix. However, none of the residues in these positions contributed in binding this peptide. On the other hand, amino acids in position 54 form H-bonds between different anchor residues of the peptide. DQA1\*01:02 (Gly 54) forms a bond with Glu 3 ([Fig 4A](#pone.0205557.g004){ref-type="fig"}, [Table 3](#pone.0205557.t003){ref-type="table"}) while DQA1\*03:01 (Arg 54) with Ser 1 of the peptide ([Fig 4B](#pone.0205557.g004){ref-type="fig"}, [Table 3](#pone.0205557.t003){ref-type="table"}). Arg 53 in DQA1\*03:01 instead of Gly, creates two ion bonds with the peptide (Glu 3) ([Table 3](#pone.0205557.t003){ref-type="table"}). These are the only salt bridges found between the alleles studied and the peptide used.
Although, the sequence of DQB in our cases is unknown and both DQA alleles have been simulated in complex with DQB1\*03:01, it is noteworthy that β chain is involved in peptide fitting in disparate ways. In DQA1\*01:02-DQB1\*03:01 heterodimer, DQB1\*03:01 forms six H bonds throughout the peptide. Both chains contribute equally in the binding of this peptide, forming 12 bonds along its length, sustaining the peptide's anchor residues in the groove ([Fig 4A](#pone.0205557.g004){ref-type="fig"}, [Table 3](#pone.0205557.t003){ref-type="table"}). On the contrary, heterodimer DQA1\*03:01-DQB1\*03:01 forms four H-bonds (DQB\*03:01 forms a bond with Gly 4) and two salt bridges with the peptide ([Table 3](#pone.0205557.t003){ref-type="table"}). These interactions are concentrated near one of the openings of the groove without any anchoring support in the other opening ([Fig 4B](#pone.0205557.g004){ref-type="fig"}).
### Comparison between susceptible and resistant *HLA-DRB1* {#sec011}
**Pocket 7.** DYWLR's frequency in WNND was seven times higher than in the WNF group. Comparison of the frequency of the amino acids found at positions *β*- *28*, *47*, *61*, *67* and *71* between WNND and WNF did not reveal any preference or association with either of the groups. Most of the amino acid substitutions have similar volumes. Some charge changes have been observed but not associated with the outcome of the disease ([Table 4](#pone.0205557.t004){ref-type="table"}).
10.1371/journal.pone.0205557.t004
###### List of WNV neuroinvasion-associated amino acid residues in HLA-DRB1 and their properties \[[@pone.0205557.ref025]\].
{#pone.0205557.t004g}
Amino acid Amino acid variants Pocket Properties Volume (A3) Comparison WNND vs WNF
------------ --------------------- --------- ----------------------- ------------- ------------ -------------
28 Aspartic acid (D) P7 Charged (-) 111.1 D vs E 1.0000
Glutamic acid (E) Charged (-) 138.4
47 Phenylalanine (F) P7 Hydrophobic 189.9 F vs Y 0.8665
Tyrosine (Y) Partially hydrophobic 193.6
67 Phenylalanine (F) P7 Hydrophobic 189.9 L vs F 0.5406
Isoleucine (I) Hydrophobic 166.7 L vs I 0.8166
Leucine (L) Hydrophobic 166.7 L vs all 0.5599
71 Arginine (R) P7 Charged (+) 173.4 R vs E 0.1064
Glutamic acid (E) Charged (-) 138.4 R vs K 1.0000
Lysine (K) Charged (+) 168.6 R vs A 1.0000
Alanine (A) Non-polar 88.6 R vs all 0.6205
9 Glutamic acid (E) P9 Charged (-) 138.4 E vs W 0.8649
Tryptophan (W) Non-polar 227.8
37 Phenylalanine (F) P9 Hydrophobic 189.9 F vs Y 0.0862
Serine (S) Polar 89 F vs N 0.1238
Tyrosine (Y) Partially hydrophobic 193.6 F vs S 0.1442
Asparagine (N) Polar 114.1 F vs L 1.000
Leucine (L) Hydrophobic 166.7 F vs all 0.0959
57 Alanine (A) P9, P10 Non-polar 88.6 A vs D 0.0911
Aspartic acid (D) Charged (-) 111.1 A vs S 1.000
Serine (S) Polar 89 A vs V 1.000
Valine (V) Hydrophobic 140 A vs all 0.0959
60 Tyrosine (Y) P10 Partially hydrophobic 193.6 Y vs H 1.000
Histidine (H) Polar 153.2 Y vs S 0.1596
Serine (S) Polar 89 Y vs all 0.1583
\*Pairwise comparisons were performed using x^2^ test. Comparisons with p-value \<0.05 were considered statistically significant.
**Pocket 9.** P9 variant, EFA, was associated with increased danger of CNS involvement. Again, other variants in this pocket have the same properties as EFA ([Table 4](#pone.0205557.t004){ref-type="table"}). As in the case of DYWLR, no association was observed between variants with different characteristics.
**Pocket 10.** In P10, PDY was associated with protection against WNV neuroinvasion. This variant was found in 97.3% of the WNF patients. Variability was observed in positions *β*57 and *β*60 while *β*56 was monomorphic. *β*57 Asp and *β*60 Tyr create a more shallow pocket than the other variants. Furthermore, Asp is the only charged amino acid in both polymorphic positions of the pocket ([Table 4](#pone.0205557.t004){ref-type="table"}). This could influence the binding selectivity of P10 and thus limit WNV neuroinvasion. However, no association was observed when focusing on each position separately. It seems that the combination of *β*57-Asp and *β*60-Tyr imparts the protective character of the variant rather than a specific amino acid.
**Protein modeling: DRA1\*01-DRB1\*11:04/DRB1\*14:04.** Based on the pocket variants that showed different distribution between WNND and WNF groups with statistically significant association with either protection or susceptibility to neuronic damage, we constructed the structural models of DRA1\*01-DRB1\*11:04 (protective pocket variant) and DRA1\*01-DRB1\*14:04 (susceptible pocket variants). RMSD results ([S1 Fig](#pone.0205557.s001){ref-type="supplementary-material"}) were not used since no systematic discrimination of the alleles was observed. DRB1\*14:04 was chosen because it has both DYWLR and EFA variants that were associated with neuroinvasion. During simulation of heterodimer DRA1\*01-DRB1\*14:04, a mutation Asp\>Ala in position 57 was performed in order to see if any difference occurred that could explain the protective role of PDY. DRA1\*01-DRB1\*11:04 selection was based on the existence of PDY and also its frequency; it was the most frequent allele in both groups.
In DRA1\*01-DRB1\*11:04 fourteen residues in the neighbor of the peptide were found (4 Å). These residues are Asp 28, Tyr 30, Asp 57, Ty60, Trp 61, Gln 64, Phe 67, Asp 70, Arg 71, Ala 74, Thr 77, Tyr 78, His 81 and Asn 82. In DRA1\*01-- DRB1\*14:04 ten amino acids in the peptide's neighborhood were found. These residues are Phe 26, Asp28, Pro56, Ty60, Ile 67, Glu 71, Thr 77, Tyr 78, His 81 and Asn 82. Again, in order to evaluate the differences in the interacting residues between the two molecules, we took into account all the positions where at least one of the allele's amino acid was in the immediate vicinity of the peptide (for example position 56 was not found to participate in any interaction with the peptide in DRA1\*01-DRB1\*11:04 but it was in interacting distance in DRA1\*01-DRB1\*14:04). However, since we are interested only in pockets 7, 9 and 10 the respective residues were selected for further evaluation.
Four residues on P7 are in close proximity to the peptide. A little change in orientation of Trp 61, resulted in the removal of this residue from the neighborhood of the peptide in DRB1\*14:01. Phe 67 of DRB1\*11:04 is bulkier than Ile 67 of DRB1\*14:04 ([Fig 5C](#pone.0205557.g005){ref-type="fig"}). This could prevent the binding of a peptide with spacious side chains. In this case, the peptide's Leu 11 seems that cannot fit since Phe 67 ([Fig 5A](#pone.0205557.g005){ref-type="fig"}) narrows the opening of the cleft. Finally, Arg 71 of DRB1\*11:04 forms a hydrogen bond with the peptide ([Fig 5A](#pone.0205557.g005){ref-type="fig"}, [Table 5](#pone.0205557.t005){ref-type="table"}). On the other hand, Glu 71 of DRB1\*14:04 is very small and thus in a greater distance from the peptide ([Fig 5C](#pone.0205557.g005){ref-type="fig"}). Concerning P9, Asp 57 and Ala 57 did not show any difference in capacity of the space of the groove or the electrostatic interactions with the peptide. Residues that form pocket 10 are located in the opening of the groove. Since no flanking regions are available from the crystal structure we did not expect to find any interactions. However, we observed that Tyr 60 has a much differentiated orientation/position in the a-helix that could affect either the size of the accepted peptide residue or the interaction with the TCR after the binding. In DRB1\*11:04, Tyr 60 has turned into the groove while in DRB1\*14:04 is orientated towards the opening ([Fig 5C](#pone.0205557.g005){ref-type="fig"}).
{#pone.0205557.g005}
10.1371/journal.pone.0205557.t005
###### The hydrogen bonds and the salt bridges between DRA/DRB chains and the peptide in both structures.
Columns 'Molecule 1'/'Residue' 1 list the α or β chain of each DR complex (column 'Molecule 1') and the residues that interact with the peptide (column Residue 1). Column 'Molecule 2' refers always to the peptide. In column 'Residue 2' the peptide's residues that form H-bonds and salt bridges with any DR-complex amino acid are listed. The atoms involved are shown.
{#pone.0205557.t005g}
H-bonds
------------------ ------------- --------- ------------ ------------
DRA1\*01/ DRB1\*11:04 peptide NH1 Arg 71 O Ser 9
DRB1\*11:04 DRA1\*01 peptide OG Ser 55 O Asp 1
DRA1\*01 peptide OD1 Asn 71 N Gly 13
DRA1\*01/ DRB1\*14:04 peptide OD1 Asn 82 N His 6
DRB1\*14:04 DRA1\*01 peptide N Ser 55 O Ala 3
DRA1\*01 peptide OE2 Glu 57 NE Arg 4
DRA1\*01 peptide O Ile 65 OG Ser 9
DRA1\*01 peptide N Val 67 OG Ser 9
DRA1\*01 peptide O Val 67 NE2 His 12
DRA1\*01 peptide N Asp 68 O Ala 10
DRA1\*01 peptide NH1 Arg 78 OG Ser 14
**Salt bridges**
DRA1\*01/ DRA1\*01 peptide OD1 Asp 68 ND1 His 12
DRB1\*14:04 DRA1\*01 peptide OD2 Asp 68 ND1 His 12
DRA1\*01 peptide OD1 Asp 68 NE2 His 12
DRA1\*01 peptide OD2 Asp 68 NE2 His 12
Zooming out of these three pockets, we should note that other residues formed hydrogen bonds with the peptide. In DRB1\*14:04, Asn 82 interacts with His 6, creating a hydrogen bond ([Fig 5B](#pone.0205557.g005){ref-type="fig"}, [Table 5](#pone.0205557.t005){ref-type="table"}). Concerning DRB1\*11:04 allele, no other H-bonds were found. However, in heterodimer formation, both molecules appear to have closer interactions with the peptide. More specifically, in DRA1\*01-- DRB1\*11:04, the α-chain forms two hydrogen bonds with the peptide. Ser 55 forms two H-bonds with Asp 1 of the peptide while another H-bond is formed between Asn 71 and Gly 13, near the COOH termini of the peptide ([Fig 5A](#pone.0205557.g005){ref-type="fig"}, [Table 5](#pone.0205557.t005){ref-type="table"}). DRA1\*01 --DRB1\*14:04 molecule binds the peptide stronger with a total of 8 hydrogen bonds. One of them is the above-mentioned bond between βAsn 82 and Ser14. DRA1\*01 in this heterodimer, forms seven H-bonds in the entire length of the groove. In particular, the following bonds are formed (they are listed in the order they were found from the N-terminus to C-terminus of the peptide) between Ser 55 and Ala 3, Glu 57 and Arg 4, Ile 65 and Ser 9, Val 67 and Ser 9, Asp 68 and Ala 10, Val 67 and His 12 and between Arg 78 and Ser 14 ([Fig 5B](#pone.0205557.g005){ref-type="fig"}, [Table 4](#pone.0205557.t004){ref-type="table"}). In addition to these bonds, in DRA1\*01 --DRB1\*14:04 four salt bridges are also observed between α chain and the peptide. α Asp 68 forms all four ion bonds with peptide's His 12 ([Table 5](#pone.0205557.t005){ref-type="table"}). No ion bonding was found between heterodimer DRA1\*01 --DRB1\*11:04 and the peptide nor between DRB1\*14:04 and the peptide.
Discussion {#sec012}
==========
Our previous study revealed an association between MHC class II genes (*HLA-DPA1*, *-DQA1* and -*DRB1*) and WNV infection, using WNV cases and control cohorts. Focusing on the cases, several alleles in all three genes studied were associated with either mild or severe form of the disease supporting a substantial role of MHC class II locus in the progression of WNV disease. In order to understand the different behavior of the alleles (protective or susceptible against severe WNV disease), we brought their amino acid sequences into the spotlight. More specifically, these residues that are located in positions responsible for the antigen recognition and it's stabilization in the groove; important steps for the TCD4 activation.
The variability of the proteins studied was found according to the literature. HLA-DPA1 was the least polymorphic. In our cases, five alleles were found to produce five different proteins ([Fig 2](#pone.0205557.g002){ref-type="fig"}). However, when isolating the PBR four different combinations of P1, P6 and P9 were found. SYFMFWF (P1) and ANILN (P6) were the most frequent variants in both groups. Concerning the least common variants, they also had similar frequencies in both WNND and WNF ([Table 1](#pone.0205557.t001){ref-type="table"}). It seems that none of the alleles found in HLA-DPA1 locus contribute to WNV recognition in different way. Even P6 variant MNISN, that was observed only in WNND (allele DPA1\*03:01) was not associated with susceptibility. Residues 50 and 83 were also polymorphic but they don't belong to the pockets studied. α50 is in the neighbor of the peptide and could probably make contact in some DP-alleles or with certain peptides. However, the frequency of the two amino acids (Gln and Arg) in the two groups discourages any suggestions for possible participation in our case. No structural analysis was performed in the case of HLA-DPA1 due to lack of any trend of association with the severity of the disease.
In the six alleles of HLA-DQA1, five different PBRs were found. These PBRs were the result of the combination between four variants of P1 and P9 and two of P6. All pocket variant were found in both case groups. ACHQFWG (P1), NNVAN (P6) and HNIMR (P9) were the most common variants. ACHQFWG was found with similar frequency in WNND and in WNF cohorts. However, the rest of the variants did not have the same representation in the two groups. Variants AYHEFWR, AYHQFWR, NNVLN, HNIVR, HNILR and HNSLR appeared in the WNF group with almost two times higher (in the case of HNILR three times higher) frequency compared to WNND cases ([Table 1](#pone.0205557.t001){ref-type="table"}). AYHEFWR and NNVLN were the only variants that were found associated with a protective role against WNV neuroinvasion with statistical significance ([Fig 3](#pone.0205557.g003){ref-type="fig"}). On the other hand, the frequency of NNVAN (P6) and HNIMR (P9) in the WNND group reached almost 90% in the variants identified in these pockets ([Table 1](#pone.0205557.t001){ref-type="table"}). Thus, both variants were associated with increased risk of neuronal damage. On the contrary to the variable residues found in HLA-DPA1 proteins, in HLA-DQA1 several residues that do not belong in the PBR were polymorphic. Most of them belong in the heterodimerization region between α and β chains (α44--53 region) \[[@pone.0205557.ref026]\]; more specifically residues 44 (Arg\>Gly\>Lys\>Cys), 45 (Trp\>Leu), 47 (Glu\>Leu\>Val), 48 (Phe\>Leu), 49 (Ser\>Arg\>His), 50 (Lys\>Arg\>Gln), 51 (Phe\>Leu) and 53 (Gly\>Arg). This high variability plays a determinant role in α/β chain-pairing that reflects on the variety of peptides that can be recognized by these molecules. Polymorphic residues of the TCR-binding surface such as residues 58 (Gly\>Phe) and 61 (Arg\>Thr) could affect the TCR-peptide binding and thus the immune response mounted. However, these interactions belong beyond the spectrum of our interest, which is the role of the variable residues in the PBR of HLA class II molecules. Additionally, the lack of data about the β chain in our cases makes any suggestions about the whole structure of the DQ molecule and its interaction with the TCR arguable.
Focusing on the peptide-binding pockets of HLA-DQA1, the two alleles used for comparison show structural differences mostly in P1 and P6. More specifically, the protective variant AYHEFWR carries both more bulkier and charged amino acids compared to ACHQFWG. NNVLN is also more voluminous compared to NNVAN. The increased volume of residues in these pockets compared to DQA1\*01:02 may create a shallower groove that could not accommodate peptides with large side chains. In addition, the charges in pocket 1 of DQA1\*03:01 define a certain repertoire of peptides that are optimal for anchoring in this pocket creating a peptide-MHC class II stable bond. Increased stability of MHC class II-peptide complex has been associated with immunogenicity \[[@pone.0205557.ref027], [@pone.0205557.ref028]\] as well as with clonotypic diversity of antigen-specific CD4 T cell responses \[[@pone.0205557.ref029]\]. Moreover, the 18 substitutions that differentiate DQA1\*01:02 and DQA1\*03:01 could change the structure of the whole groove by influencing the placement and orientation of other residues as well.
For the simulations, we used the available peptide from the crystal structure with PDB ID: 2NNA and not a known virus peptide. For this reason, we did not expect the protective allele to make more interactions with the peptide compared to the susceptible allele. Specifically, we wanted to understand the structural differences between the two alleles and how these differences could influence the peptide binding and not to compare the binding of the peptide (chain D) *per se*. Indeed, we observed that DQA1\*01:02/DQB1\*03:01 formed more bonds throughout the peptide, stabilizing this specific peptide stronger than DQA1\*03:01, that has the protective pocket variants. Although at first glance this was not ideal for making our point, it shows exactly how different these alleles behave towards a given peptide. In [Fig 4C](#pone.0205557.g004){ref-type="fig"} we can see how many positions of the groove diverge between the two alleles and in [Table 3](#pone.0205557.t003){ref-type="table"} we can see how this fact reflects on the peptide binding. One could suggest that DQA1\*01:02 and DQA1\*03:01 have very different peptide repertoires that could explain the opposite behavior in WNV infection. This hypothesis is confirmed by the recent bibliography on *HLA-DQA1*. More specifically, DQA1\*01:02 has been associated with risk for Alzheimer disease \[[@pone.0205557.ref030]\], pemphigus foliaceus \[[@pone.0205557.ref031]\] and Parkinson disease \[[@pone.0205557.ref032]\] and with protection against celiac disease \[[@pone.0205557.ref033]\] and autoimmune polyglandular syndrome type III \[[@pone.0205557.ref034]\]. On the other hand, DQA1\*03:01 has been associated with susceptibility to pemphigus vulgaris \[[@pone.0205557.ref031], [@pone.0205557.ref035]\], to autoimmune polyglandular syndrome \[[@pone.0205557.ref034]\] and to type I diabetes \[[@pone.0205557.ref036]\] and with protection against Parkinson disease \[[@pone.0205557.ref032]\]. No accordance between the roles of these alleles was observed. On the contrary, in several cases, they presented with opposite effects \[[@pone.0205557.ref032], [@pone.0205557.ref034]\]. Furthermore, when zooming out from the pocket variants, we noticed that in many cases, DQA1\*01 presented with opposite association from DQA1\*03, \*04 and \*05. For example in a meta-analysis about the role of MHC class II in pulmonary tuberculosis, DQA1\*01:01 was associated with high susceptibility whereas DQA1\*04:01 and DQA1\*05:01 demonstrated protection against pulmonary tuberculosis \[[@pone.0205557.ref037]\]. The results of other studies also support this observation \[[@pone.0205557.ref038], [@pone.0205557.ref039], [@pone.0205557.ref040], [@pone.0205557.ref041]\]. There is no specific pocket variant that is common in DQA1\*03, \*04 and \*05 compared to DQA1\*01. However, these alleles can be grouped in two categories based on the amino acid in position 52. Based on our results, Arg-52 (DQA1\*03, \*04 and \*05) is strongly associated with WNF while Glu-52 (DQA1\*01) with WNND (*P = 0*.*0001*). Similarly, Leu-66 is associated with WNND and Ala-66 with WNF (*P = 0*.*0001*). We propose that α52 and α66 can be used as markers for risk assessment of neuronic implication during WNV infection.
In β chains more pockets participate in antigen peptide binding thus we focused on six pockets instead of three in α chains. The pocket variability differed between the pockets of HLA-DRB1; the order of polymorphic variants was P1\<P6\<P10\<P9\<P4\<P7 (min. number of variants 3, max. number of variants 12). These variants were combined, producing the 22 alleles and proteins found in our cases. The most common pocket variants in both cases cohorts were VVFT (P1), SFDDRAY (P4), SY (P6), DFWFR (P7), EYD (P9) and PDY (P10). More specifically, PDY was found in 72/74 of WNF alleles, implying a possible protective role against neuroinvasion. Contrary to the distribution of pocket variants found in HLA-DQA1, several variants were found only in WNND or in WNF group. As shown in [Fig 3](#pone.0205557.g003){ref-type="fig"}, ten variants of all pockets were found exclusively in WNND while three variants, belonging in P7, were found only in WNF. Interestingly, none of them was found associated (P\>0.005, data not shown) with either of two conditions. The two variants that were found to be associated with a higher risk of CNS involvement were DYWLR in P7 and EFA in P9 (*P = 0*.*02* and *P = 0*.*038* respectively). Apart from the variable residues of the PBR, several other positions were polymorphic. Most of them were close to the pockets we studied and could affect the structure or the charge of the environment around. These positions and the respective amino acids are: 10 (Tyr\>Gln\>Glu), 31 (Phe\>Val), 32 (Tyr\>His), 38 (Val\>Ala\>Leu) and 73 (Ala\>Gly). Position 77 that belongs in the TCR binding region was also dimorphic (Thr\>Asn). Again, these substitutions were not evaluated since they do not belong in the PBR.
Since only pockets 7, 9 and 10 had variants associated with either WNND or WNF cohort, no other residues were evaluated (if not formed bonds with the peptide, section *Protein modeling*: *DRA1\*01-DRB1\*11*:*04/DRB1\*14*:*04*). Concerning the properties of variants DYWLR and EFA that were associated with neuroinvasional symptoms, no amino acid showed any association with the severe form of WNV infection ([Table 3](#pone.0205557.t003){ref-type="table"}). Although in few cases, amino acids in other variants had significantly different characteristics or volumes (for example 71 Arg\>Glu\>Ala) no specific preference was observed in order to explain the susceptible character of these variants. The combination of DYWLR and EFA was found only in alleles DRB1\*14:01 and DRB1\*14:04. The frequency of alleles DRB1\*14:01 and DRB1\*14:04 was significantly higher in WNND group (P = 0.04, data not shown) suggesting a positive association with the severe WNV disease. On the contrary, Asp 57 of the variant PDY was the only charged amino acid found in P10. Since PDY was the abundant variant of this pocket, no association was found suggesting that Asp 57 could contribute to a more effective antigen recognition and immune response. However, the fact that PDY was almost the only variant found in the WNF group may sketch a secondary protective role that should be further explored.
The simulation of the two molecules DRA1\*01-DRB1\*11:04 and DRA1\*01-DRB1\*14:04 created two conformations that differed enough structural as well as to the stability of the peptide binding. Different numbers of residues were in immediate vicinity of the peptide in these structures. Zooming in pockets P7, P9 and P10, there were some amino acids whose conformation could affect the selectivity of the binding peptides as DRB1\*11:04 Tyr 60 and Phe 67. In addition, different number of residues could interact with the peptide. However, in the case of HLA-DRB1 molecules that resulted from the simulation, the main binding of the peptide is carried from the α chain. Although HLA-DRA1 protein is dimorphic with a monomorphic PBR, the configuration it takes in space when in a complex with another protein can change its role in peptide binding. Again, we used the available peptide from the crystal structure with PDB ID: 2WBJ and not a known virus peptide. However, it is obvious that although HLA-DRA1 is not usually included in the association studies due to lack of polymorphism, in protein level could have a key role. Because of the extreme level of polymorphism of DRB1 locus in combination with our confined number of subjects it was difficult, for a marker-position/pocket variant to raise, as in the case of HLA-DQA1. However, it seems that the presence of either DRB1\*14:01 or DRB1\*14:04 (alleles with the combination of DYWLR and EFA) increases the risk of a WNV infection to develop to a severe disease. This combination of pocket variants is also found in other 54 DRB1 alleles (all belonging to DRB1\*14 group, [S1 Table](#pone.0205557.s002){ref-type="supplementary-material"}) that should probably be taken into account when encountering with WNV infection.
Conclusion {#sec013}
==========
In conclusion, seven pocket variants in HLA-DQA1 and HLA-DRB1 molecules were found to have specific roles in WNV infection and further neuroinvasion of the virus. Although a small partition of the alleles of these genes was represented in our cohort, we tried to figure a marker that extends the limits of our study. Indeed, we concluded to a group of alleles of both loci that when found, measures for possible neuronal damage should be taken. Interestingly, none of the pocket variants that were associated with the severe form of the disease was found exclusively in one of the two groups (WNND, WNF). This finding was contrary to our previous results, where protective allele DRB1\*11:02 was found only in the WNF group. Further studies about the repertoire of virus peptides that each of these alleles and/or specific pocket variants recognize, should be done in order to understand the character of the optimal peptides for an effective immune response.
Supporting information {#sec014}
======================
###### RMSD average and RMSD per residue.
A. RMSD average of the four systems DQA1\*01:02-DQB1\*03:01, DQA1\*03:01-DQB1\*03, DRA1\*01-DRB1\*11:04 and DRA1\*01-DRB1\*14:04. A tendency for structural stabilization can be seen for all four complexes. B. RMSD per residue, chain A. Large deviations from the crystal structure were observed (focused on chain A of DQA1\*01:02-DQB1\*03:01 and DQA1\*03:01-DQB1\*03), mainly on flexible parts between secondary structure elements. The pockets under study are not located in these regions. C. RMSD per residue, chain B. Large deviations from the crystal structure were observed (focused on chain B of DRA1\*01-DRB1\*11:04 and DRA1\*01-DRB1\*14:04), mainly on flexible parts between secondary structure elements. Other flexible regions that include residues 99--101, 143, 156--157 and 179--180 form beta-sheets but do not form the PBR of the dimer. Some residues that belong to P7, P9 and P10 show both deviation from the crystal structure and different flexibility between the two DR complexes (e.g. regions 35--39 and 57--67 of DRA1\*01-DRB1\*14:04 and 64--66 of DRA1\*01-DRB1\*11:04).
(TIF)
######
Click here for additional data file.
###### The DRB1 alleles that carry the pocket variant combination DYWLR/EFA.
(DOCX)
######
Click here for additional data file.
MALWEST project is represented by Professor C. Hadjichristodoulou, <[email protected]>.
We acknowledge the collaborating partners of (Malaria-West Nile) MALWEST project: Nikolaos Vakalis (Department of Parasitology, Entomology and Tropical Diseases, National School of Public Health); Jenny Kremastinou (Hellenic Center for Disease Control and Prevention); Charalambos Billinis (Laboratory of Microbiology and Parasitology, Faculty of Veterinary Medicine, University of Thessaly); Nikos T. Papadopoulos (Laboratory of Entomology and Agricultural Zoology, School of Agricultural Sciences, University of Thessaly); Chrysostomos I. Dovas (Laboratory of Microbiology and Infectious Diseases, School of Veterinary Medicine, Faculty of Health Sciences, Aristotle University of Thessaloniki); George Koliopoulos (Laboratory of Biological Control of Pesticides, Benaki Phytopathological Institute); John Vontas (Biotechnology and Applied Biology, Laboratory Molecular Entomology, Department of Biology, University of Crete); Dimitris Tontis (Laboratory of Pathology, Faculty of Veterinary Medicine, University of Thessaly, Karditsa, Greece); Ioannis Tselentis and Anna Psaroulaki (Regional Laboratory of Public Health of Crete; Medical School, University of Crete) and Yorgos N. Photis (Laboratory of Spatial Analysis, GIS and Thematic Cartography, Department of Planning and Regional Development, School of Engineering, University of Thessaly). We would also like to thank National Reference Laboratory for Arboviruses, School of Medicine, Aristotle University of Thessaloniki and Department of Microbiology, School of Medicine, University of Athens for providing us with samples of WNV cases.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: ¶ Membership of the MALWEST project is provided in the Acknowledgments.
|
Q:
Define a function interactively with sum
I have to define a function which has 1e4 terms added up together.
f(x1, x2) = (sum i, j, k, l from 1 to 10)
(C(i) * C(j) * C(k) * C(l) * exp( (alpha(i)+alpha(j)) * x1 + (alpha(k)+alpha(l)) * x2 )
all C and alpha are known and f is a function of x1 and x2.
Is there any easy way(without for loop) to input the function in to mathematica and draw the contour of f depending on x1 and x2?
Thanks.
A:
f[x1_, x2_] := \!\(
\*UnderoverscriptBox[\(\[Sum]\), \(i = 1\), \(10\)]\(
\*UnderoverscriptBox[\(\[Sum]\), \(j = 1\), \(10\)]\(
\*UnderoverscriptBox[\(\[Sum]\), \(k = 1\), \(10\)]\(
\*UnderoverscriptBox[\(\[Sum]\), \(l = 1\), \(10\)]c[[i]] c[[j]] c[[k]] c[[l]]
\*SuperscriptBox[\(E\), \(\((\[Alpha][[
i]] + \[Alpha][[j]] x1)\) + \((\[Alpha][[
k]] + \[Alpha][[l]] x2)\)\)]\)\)\)\)
ContourPlot[f[x1, x2], {x1, -10, 10}, {x2, -10, 10}]
|
/*
* linux/include/linux/lockd/lockd.h
*
* General-purpose lockd include file.
*
* Copyright (C) 1996 Olaf Kirch <[email protected]>
*/
#ifndef LINUX_LOCKD_LOCKD_H
#define LINUX_LOCKD_LOCKD_H
#ifdef __KERNEL__
#include <linux/config.h>
#include <linux/in.h>
#include <linux/fs.h>
#include <linux/utsname.h>
#include <linux/nfsd/nfsfh.h>
#include <linux/lockd/bind.h>
#include <linux/lockd/xdr.h>
#ifdef CONFIG_LOCKD_V4
#include <linux/lockd/xdr4.h>
#endif
#include <linux/lockd/debug.h>
/*
* Version string
*/
#define LOCKD_VERSION "0.4"
/*
* Default timeout for RPC calls (seconds)
*/
#define LOCKD_DFLT_TIMEO 10
/*
* Lockd host handle (used both by the client and server personality).
*/
struct nlm_host {
struct nlm_host * h_next; /* linked list (hash table) */
struct sockaddr_in h_addr; /* peer address */
struct svc_client * h_exportent; /* NFS client */
struct rpc_clnt * h_rpcclnt; /* RPC client to talk to peer */
char h_name[20]; /* remote hostname */
u32 h_version; /* interface version */
unsigned short h_proto; /* transport proto */
unsigned short h_authflavor; /* RPC authentication type */
unsigned short h_reclaiming : 1,
h_inuse : 1,
h_killed : 1,
h_monitored : 1;
wait_queue_head_t h_gracewait; /* wait while reclaiming */
u32 h_state; /* pseudo-state counter */
u32 h_nsmstate; /* true remote NSM state */
unsigned int h_count; /* reference count */
struct semaphore h_sema; /* mutex for pmap binding */
unsigned long h_nextrebind; /* next portmap call */
unsigned long h_expires; /* eligible for GC */
};
/*
* Memory chunk for NLM client RPC request.
*/
#define NLMCLNT_OHSIZE (sizeof(system_utsname.nodename)+10)
struct nlm_rqst {
unsigned int a_flags; /* initial RPC task flags */
struct nlm_host * a_host; /* host handle */
struct nlm_args a_args; /* arguments */
struct nlm_res a_res; /* result */
char a_owner[NLMCLNT_OHSIZE];
};
/*
* This struct describes a file held open by lockd on behalf of
* an NFS client.
*/
struct nlm_file {
struct nlm_file * f_next; /* linked list */
struct nfs_fh f_handle; /* NFS file handle */
struct file f_file; /* VFS file pointer */
struct nlm_share * f_shares; /* DOS shares */
struct nlm_block * f_blocks; /* blocked locks */
unsigned int f_locks; /* guesstimate # of locks */
unsigned int f_count; /* reference count */
struct semaphore f_sema; /* avoid concurrent access */
int f_hash; /* hash of f_handle */
};
/*
* This is a server block (i.e. a lock requested by some client which
* couldn't be granted because of a conflicting lock).
*/
#define NLM_NEVER (~(unsigned long) 0)
struct nlm_block {
struct nlm_block * b_next; /* linked list (all blocks) */
struct nlm_block * b_fnext; /* linked list (per file) */
struct nlm_rqst b_call; /* RPC args & callback info */
struct svc_serv * b_daemon; /* NLM service */
struct nlm_host * b_host; /* host handle for RPC clnt */
unsigned long b_when; /* next re-xmit */
unsigned int b_id; /* block id */
unsigned char b_queued; /* re-queued */
unsigned char b_granted; /* VFS granted lock */
unsigned char b_incall; /* doing callback */
unsigned char b_done; /* callback complete */
struct nlm_file * b_file; /* file in question */
};
/*
* Valid actions for nlmsvc_traverse_files
*/
#define NLM_ACT_CHECK 0 /* check for locks */
#define NLM_ACT_MARK 1 /* mark & sweep */
#define NLM_ACT_UNLOCK 2 /* release all locks */
/*
* Global variables
*/
extern struct rpc_program nlm_program;
extern struct svc_procedure nlmsvc_procedures[];
#ifdef CONFIG_LOCKD_V4
extern struct svc_procedure nlmsvc_procedures4[];
#endif
extern int nlmsvc_grace_period;
extern unsigned long nlmsvc_timeout;
/*
* Lockd client functions
*/
struct nlm_rqst * nlmclnt_alloc_call(void);
int nlmclnt_call(struct nlm_rqst *, u32);
int nlmclnt_async_call(struct nlm_rqst *, u32, rpc_action);
int nlmclnt_block(struct nlm_host *, struct file_lock *, u32 *);
int nlmclnt_cancel(struct nlm_host *, struct file_lock *);
u32 nlmclnt_grant(struct nlm_lock *);
void nlmclnt_recovery(struct nlm_host *, u32);
int nlmclnt_reclaim(struct nlm_host *, struct file_lock *);
int nlmclnt_setgrantargs(struct nlm_rqst *, struct nlm_lock *);
void nlmclnt_freegrantargs(struct nlm_rqst *);
/*
* Host cache
*/
struct nlm_host * nlmclnt_lookup_host(struct sockaddr_in *, int, int);
struct nlm_host * nlmsvc_lookup_host(struct svc_rqst *);
struct nlm_host * nlm_lookup_host(struct svc_client *,
struct sockaddr_in *, int, int);
struct rpc_clnt * nlm_bind_host(struct nlm_host *);
void nlm_rebind_host(struct nlm_host *);
struct nlm_host * nlm_get_host(struct nlm_host *);
void nlm_release_host(struct nlm_host *);
void nlm_shutdown_hosts(void);
/*
* Server-side lock handling
*/
int nlmsvc_async_call(struct nlm_rqst *, u32, rpc_action);
u32 nlmsvc_lock(struct svc_rqst *, struct nlm_file *,
struct nlm_lock *, int, struct nlm_cookie *);
u32 nlmsvc_unlock(struct nlm_file *, struct nlm_lock *);
u32 nlmsvc_testlock(struct nlm_file *, struct nlm_lock *,
struct nlm_lock *);
u32 nlmsvc_cancel_blocked(struct nlm_file *, struct nlm_lock *);
unsigned long nlmsvc_retry_blocked(void);
int nlmsvc_traverse_blocks(struct nlm_host *, struct nlm_file *,
int action);
void nlmsvc_grant_reply(struct svc_rqst *, struct nlm_cookie *, u32);
/*
* File handling for the server personality
*/
u32 nlm_lookup_file(struct svc_rqst *, struct nlm_file **,
struct nfs_fh *);
void nlm_release_file(struct nlm_file *);
void nlmsvc_mark_resources(void);
void nlmsvc_free_host_resources(struct nlm_host *);
static __inline__ struct inode *
nlmsvc_file_inode(struct nlm_file *file)
{
return file->f_file.f_dentry->d_inode;
}
/*
* Compare two host addresses (needs modifying for ipv6)
*/
static __inline__ int
nlm_cmp_addr(struct sockaddr_in *sin1, struct sockaddr_in *sin2)
{
return sin1->sin_addr.s_addr == sin2->sin_addr.s_addr;
}
/*
* Compare two NLM locks.
* When the second lock is of type F_UNLCK, this acts like a wildcard.
*/
static __inline__ int
nlm_compare_locks(struct file_lock *fl1, struct file_lock *fl2)
{
return fl1->fl_pid == fl2->fl_pid
&& fl1->fl_start == fl2->fl_start
&& fl1->fl_end == fl2->fl_end
&&(fl1->fl_type == fl2->fl_type || fl2->fl_type == F_UNLCK);
}
#endif /* __KERNEL__ */
#endif /* LINUX_LOCKD_LOCKD_H */
|
<?xml version="1.0" encoding="utf-8"?>
<resources>
<!-- From: file:/home/longlong/mydata/ASproject/Game2048/library/res/values/strings.xml -->
<eat-comment/>
<string name="app_name">SwipeMenuListView</string>
<!-- From: file:/home/longlong/mydata/ASproject/Game2048/library/res/values/styles.xml -->
<eat-comment/>
<style name="AppBaseTheme" parent="android:Theme.Light">
<!--
Theme customizations available in newer API levels can go in
res/values-vXX/styles.xml, while customizations related to
backward-compatibility can go here.
-->
</style>
<style name="AppTheme" parent="AppBaseTheme">
<!-- All customizations that are NOT specific to a particular API-level can go here. -->
</style>
</resources> |
Every year millions of small weights are attached to tires by automotive technicians balancing them. Tire balance, also referred to as tire unbalance or imbalance, describes the distribution of mass within an automobile tire and/or the wheel to which it is attached. When the tire rotates, asymmetries of mass cause the wheel to wobble. This wobbling can give rise to ride disturbances, usually vertical and lateral vibrations. It can also result in a wobbling of the steering. The ride disturbance due to unbalance usually increases with speed. Vehicle suspensions can be excited by tire unbalance forces when the speed of the wheel reaches a point that its rotating frequency equals the suspension's resonant frequency. Tires are inspected in factories and repair shops by two methods: static balancers and dynamic balancers. Tires with high unbalance forces are downgraded or rejected. When tires are fitted to wheels at the point of sale, they are measured again, and wheel weights, also known as correction weights, are applied to counteract the combined effect of the tire and wheel unbalance.
Automotive technicians reduce the wobble to an acceptable level when balancing the wheel by adding small wheel weights to the inner and outer wheel rims. A wheel weight is installed by the use of a wheel weight and/or clip that secures the wheel weight to the edge of the wheel. A common garage tool, like a hammer, is typically used to hammer the wheel weight and/or clip down onto the wheel. To remove the wheel weight and/or clip another common garage tool, similar to a pair of pliers or a screw driver, are typically used to grasp and pinch or pry the wheel weight and/or clip to remove the wheel weight.
Traditionally, wheel weights have been made of lead. However, to reduce environmental concerns, steel and zinc weights are being used more frequently. These steel and zinc weights are coated or non-coated. The coated weights have a coating on them which have been discovered to chip or scratch during the installation or removal of the wheel weight by standard wheel weight tools. In addition to the problem with the wheel weight chipping or scratching during installation and removal, the actual wheels themselves (or coatings on the wheels) have been discovered to chip and or scratch around its edges during installation or removal of the wheel weight with standard wheel weight tools. As should be understood these chipped and/or scratched portions of the wheel and/or wheel weights are undesirable for vehicle owners.
It is thus highly desirable to create a wheel weight tool for installing and/or removing wheel weights that may be easier to use than common garage tools and may reduce or prevent chips and/or scratches on the wheel weight and/or wheel itself.
The instant invention is designed to address the above mentioned problems. |
3 Easy Ways to Fight Back Against the Summer Cold
When you think summer, usually hot days, balmy nights and
some much-needed vacation time comes to mind - not being in bed with a cold! But
for many of us, the summer cold is a reality. We all know you’d rather spend
your summer days in the sun and not in bed, so here are 3 ways to fight back
against the summer cold.
1. Reduce stress. Stress is pretty much unavoidable these
days, but how you cope with stress can make or break your health. When you are
stressed your body goes in to “fight mode” which directs blood flow to
important areas like your brain and muscles and away from others, like your
immune system. This is great if you need to fight off a lion with your stone
club, but in the modern era our body doesn’t differentiate between mortal
danger and a tough day at the office. If we fail to cope properly with our
stress, our body stays in “fight mode” perpetually, diverting resources from
your immune system and leaving you vulnerable to disease. How this manifests is,
the moment you actually take a break - say actually go on that summer vacation
– you get sick! What a terrible way to spend your vacation! So, while not every
stress-coping mechanism works for everyone, here are some things to try:
Move.
Whether this is getting up from your desk every few hours, taking a walk at
lunch time, or hitting up your favorite fitness class, exercise reduces stress.
Meditate.
Take some time to reflect and focus on yourself. Struggle with mediation? There
are lots of great aps to help! We recommend: Head Space.
Make a
plan (and write it down!). Sometimes tasks seem insurmountable because we
forget to take things one step at a time. Break big things into small parts and
make a point of accomplishing a little bit each day. Then cross it off your
list! It feels good
Antioxidants
– help your body heal. Antioxidants can be found in some water but cannot be
bottled effectively. Look for filters that can produce this on demand.
Alkaline
– disease cannot survive in an alkaline body! Plus, things like a stuffy nose
are caused by inflammation, which is acidity mediated. Fight back with alkaline
water that balances your body’s pH and helps it heal.
Mineralized
– calcium and magnesium are key to reduce cardiovascular disease, but other
trace minerals - like zinc - are also important
for your immune system. Look for water that adds these minerals back in.
To get all of the above (plus the water tastes
great) we recommend a Santevia
Power Pouch. It travels great on that summer vacation and each pouch lasts
for 10 bottles of GOOD water. Supporting your immune system never tasted so
great!
2. Sleep. Sleep is essential for your body
to recover and repair, so its no wonder that when you skip it you get sick! But
sometimes there are so many fun things to do in the summer that sleep takes a
back seat. Even if you are a homebody, it can just be so hard to sleep in the
summer! One second its too hot, the next, the sun is streaming in your window
at 5am. Grrrr.Here are some ways to
improve your sleep (and get that much needed recovery time) over the summer:
Invest in
a sleep mask. There are even some that you can cool in the fridge for that
nice fresh feeling on your face. We recommend: Starry
Eyed Mask
Avoid
screens (phone, computer, TV) late at night. We know, we know, asking
someone to put down their phone is like asking them to cut off their arm. So if
you fall into the smart-phone addicted category, at least set the phone to
night mode or invest in some blue light glasses to reduce the effect that the
light has on your circadian rhythm (AKA when your body wants to sleep or be
awake). We recommend these: Spektrum
Glasses.
3. Drink good water. We say GOOD, because
not all water is made equal. To properly support your immune system, your water
should have the following attributes:
How much water though? You should be drinking half of your body
weight (lbs) in ounces of water each day. More if you exercise or its hot (like
in the summer!) For example, if you weigh 150lbs, half that is 75, so you
should drink 75oz (or about 8 9oz glasses per day). |
Concentrations of methyl- tert-butyl ether (MTBE) in inputs and receiving waters of Southern California.
The occurrence and concentration of the fuel additive methyl-tert-butyl ether (MTBE) were measured in dry weather runoff, municipal wastewater and industrial effluents, and coastal receiving waters in southern California. Combined, refineries and sewage treatment plants release approximately 214 kg day(-1) of MTBE into the marine environment, with Santa Monica Bay receiving most (98%) of this discharge. Dry weather urban runoff was analysed for samples collected from 25 streams and rivers, and accounted for less than 0.5% of the mass of MTBE discharged to coastal waters. Receiving water samples were collected from 23 stations in Santa Monica Bay, Los Angeles Harbour and Mission Bay or San Diego Bay. MTBE was detected at low concentrations near effluent discharges, however there was no evidence of baywide MTBE contamination related to these outfalls. Marinas and areas used intensively for recreational boating had the highest average MTBE concentration (8.8 microg l(-1)). Surface water contamination was most widespread in San Diego Bay and Mission Bay, areas with no refinery or sewage treatment plant inputs. |
A Panucho is a Mexican food specialty from the Yucatán made with a refried tortilla that is stuffed with refried black beans and topped with chopped cabbage, pulled chicken or turkey, tomato, pickled red onion, avocado, and pickled jalapeno pepper. Panuchos are mostly sold in the evenings when parties of friends or family go out to eat. Panuchos ...Found on http://en.wikipedia.org/wiki/Panucho
About Us
Encyclo.co.uk, online since 2007, is a search engine for English meanings and definitions. The website aims to publish all wordlists, big and small, on the internet, making it much easier to find the word you need. |
The state of New York is illegally shackling incarcerated women during childbirth, according to a new report on reproductive justice from the Correctional Association of New York.
“Women continue to be shackled on the way to the hospital (even when they are in labor), during recovery (even within hours after giving birth and for long periods of time), and on the way back to the prison (even with waist chains just days after having a C-section),” the report said. New York passed an anti-shackling statute in 2009, but according to the Correctional Association, “23 of 27 women the CA surveyed who gave birth after the law went into effect said they were shackled at least once in violation of the statute.”
In many ways, the state of New York is abusing pregnant incarcerated women all over again, given that 90 percent of all incarcerated women experienced sexual and physical abuse before heading to prison, according to the report.
Every year nearly 2,000 women give birth in America’s prisons and jails. Being jailed is a traumatic experience for women in and of itself, given the lack of training and concern for incarcerated women. But “this trauma is compounded by the lack of supportive services to help women grapple with the issues that led them to prison and the challenges they face once inside, including being separated from their families,” the Correctional Association said. Dani McClain, writing at Truthout, reported that, “Women who are not pregnant use newspaper and magazines while on their periods because they are not provided an adequate number of pads.”
Now, couple pregnancy with incarceration and one can only imagine the horror that pregnant inmates face. In New York, pregnant women complained that prison officials did not provide them with enough food, adequate prenatal care, vitamins, heat, ventilation or privacy. The report highlighted how such an environment left many women “feeling depressed and ill-equipped to find stable homes for their babies.”
Clearly, the shackling of pregnant of women is an incredibly painful experience. “Shackling causes physical and psychological pain. It heightens the risk of blood clots and limits the mobility that someone needs for a safe pregnancy and safe delivery. It can cause fetal death,” the Correctional Association’s Tamar Kraft-Stolar said.
Shackling can also cause pulled groin muscles and the separation of pubic bones. And because of the potential for injury, many states have restricted the practice. Yet some states, such as California, Texas, and New York, have struggled to fully ban such inhumane treatment, according to The New York Times. But the fact that many prison officials maintain the idea that it is okay to shackle pregnant women, speaks to a broader hatred and lack of compassion for women generally.
“We need to stop sending pregnant women to prison in the first place. It’s unacceptable that the law is being violated, but we need to stop locking up so many women, especially so many pregnant women,” said Kraft-Stolar.
Photo: Yanina Manolova/AP |
// -*- mode:java; encoding:utf-8 -*-
// vim:set fileencoding=utf-8:
// @homepage@
package example;
import java.awt.*;
import java.awt.event.ActionListener;
import java.util.stream.Stream;
import javax.swing.*;
import javax.swing.text.JTextComponent;
public final class MainPanel extends JPanel {
private final JTextField field0 = new JTextField("9999999999999999");
private final JTextField field1 = new JTextField("1111111111111111");
private final JTextField field2 = new JTextField("9876543210987654");
private MainPanel() {
super(new BorderLayout(5, 5));
EventQueue.invokeLater(field0::requestFocusInWindow);
ActionListener al = e -> {
Component c = KeyboardFocusManager.getCurrentKeyboardFocusManager().getFocusOwner();
System.out.println(c);
Stream.of(field0, field1, field2).forEach(tf -> tf.setText(""));
};
JButton button0 = new JButton("Default");
button0.addActionListener(al);
// button0.setVerifyInputWhenFocusTarget(true);
JButton button1 = new JButton("setFocusable(false)");
button1.addActionListener(al);
button1.setFocusable(false);
JButton button2 = new JButton("setVerifyInputWhenFocusTarget(false)");
button2.addActionListener(al);
button2.setVerifyInputWhenFocusTarget(false);
InputVerifier verifier = new IntegerInputVerifier();
Stream.of(field0, field1, field2).forEach(tf -> {
tf.setHorizontalAlignment(SwingConstants.RIGHT);
tf.setInputVerifier(verifier);
});
JButton b0 = new JButton("setText(0)");
b0.addActionListener(e -> {
Stream.of(field0, field1, field2).forEach(tf -> tf.setText("0"));
field0.requestFocusInWindow();
});
JButton b1 = new JButton("setText(Integer.MAX_VALUE+1)");
b1.addActionListener(e -> {
Stream.of(field0, field1, field2).forEach(tf -> tf.setText("2147483648"));
field0.requestFocusInWindow();
});
JPanel bp = new JPanel();
bp.add(b0);
bp.add(b1);
Box box = Box.createVerticalBox();
box.setBorder(BorderFactory.createEmptyBorder(5, 5, 5, 5));
box.add(bp);
box.add(Box.createVerticalStrut(5));
box.add(field0);
box.add(Box.createVerticalStrut(5));
box.add(field1);
box.add(Box.createVerticalStrut(5));
box.add(field2);
box.add(Box.createVerticalStrut(5));
box.add(Box.createVerticalGlue());
JPanel p1 = new JPanel();
p1.add(button0);
p1.add(button1);
JPanel p2 = new JPanel();
p2.add(button2);
JPanel p = new JPanel(new BorderLayout());
p.setBorder(BorderFactory.createTitledBorder("clear all"));
p.add(p1, BorderLayout.NORTH);
p.add(p2, BorderLayout.SOUTH);
add(box, BorderLayout.NORTH);
add(p, BorderLayout.SOUTH);
setPreferredSize(new Dimension(320, 240));
}
public static void main(String[] args) {
EventQueue.invokeLater(MainPanel::createAndShowGui);
}
private static void createAndShowGui() {
try {
UIManager.setLookAndFeel(UIManager.getSystemLookAndFeelClassName());
} catch (ClassNotFoundException | InstantiationException | IllegalAccessException | UnsupportedLookAndFeelException ex) {
ex.printStackTrace();
Toolkit.getDefaultToolkit().beep();
}
JFrame frame = new JFrame("@title@");
frame.setDefaultCloseOperation(WindowConstants.EXIT_ON_CLOSE);
frame.getContentPane().add(new MainPanel());
frame.pack();
frame.setLocationRelativeTo(null);
frame.setVisible(true);
}
}
// Validating Text and Filtering Documents and Accessibility and the Java Access Bridge Tech Tips
// http://java.sun.com/developer/JDCTechTips/2005/tt0518.html
// Validating with Input Verifiers
class IntegerInputVerifier extends InputVerifier {
@Override public boolean verify(JComponent c) {
boolean verified = false;
if (c instanceof JTextComponent) {
JTextComponent textField = (JTextComponent) c;
try {
Integer.parseInt(textField.getText());
verified = true;
} catch (NumberFormatException ex) {
System.out.println("InputVerifier#verify: false");
UIManager.getLookAndFeel().provideErrorFeedback(c);
}
}
return verified;
}
}
|
Maria Montessori referred to this time in a child’s life as the “Age of Imagination.” She observed that during this stage children are asking the big questions such as “Who am I?” “What role do I play in my world?”
Lower Elementary
(grades 1-3)
Dr. Montessori realized that children were able to use their imaginations to move from concrete to abstract thinking. They can use their imaginations to make connections with history, science, math, literature and the world. The interrelated curriculum at this level is based on Montessori’s Cosmic Curriculum. The Great Lessons, the main component of the Cosmic Curriculum, appeal to the student’s sense of wonder and love of storytelling.
The student’s ability to reason makes Lower Elementary the place where children master fundamental skills and core knowledge. It is here that they learn how to learn. Students are guided to become more independent in self-direction, more responsible and intrinsically motivated.
The class is multi-age, which not only provides motivation and leadership opportunities, it is perfect for the social beings they are becoming complete with a place to practice the social and moral justice in which they are so interested. This environment coupled with an individualized education plan for each student, individualized lesson that all contain a visual, auditory and kinesthetic components, low student to teacher ratios (less than 12:1), amazing Montessori materials and highly-trained staff make Harbor Montessori an excellent choice for your child.
LEARN
…how to resolve conflict, how to plan their own work schedule and how to become role models for the younger students at the school. |
Q:
plotting values from different rows in a file using matplotlib in python
I have a file with several rows in the format of:
value1 vlaue2 value3
value1 vlaue2 value3
value1 vlaue2 value3
value1 vlaue2 value3
I wish to plot this file in a single graph in such a way that for each row the x axis values from value1 to value2 will have y axis values as value3.
How do I do this in python using matplotlib?
I am new to python and can't think of how to begin this?
A:
I did not want to write code for you but I think a small trial could help us understand what you are looking for. Is it close to the results you want to obtain given the input values ?
import matplotlib.pyplot as plt
values = [
[0,3,2],
[3,8,5],
[8,12,4],
[12,18,3]
]
y = list()
x = list()
for inter in values :
y+=range(inter[0], inter[1])
for x_val in range(inter[0], inter[1]) :
x.append(inter[2])
print x
print y
plt.figure(1)
plt.plot(y,x)
plt.show()
|
IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE
AT JACKSON
September 9, 2008 Session
STATE OF TENNESSEE v. RICKY TERRELL COX
Direct Appeal from the Circuit Court for Lauderdale County
No. 8003-B Joseph H. Walker, III, Judge
_____________________________
No. W2007-01371-CCA-R3-CD - Filed February 19, 2009
______________________________
The Defendant-Appellant, Ricky Terrell Cox (hereinafter “Cox”), was convicted by a jury of three
counts of especially aggravated kidnapping, a Class A felony, especially aggravated burglary, a Class
B felony, attempted second degree murder, a Class B felony, aggravated assault, a Class C felony,
and unlawful possession of a weapon by a convicted felon, a Class E felony. He was sentenced to
twenty-two years at one hundred percent for the three especially aggravated kidnapping convictions
and four years at thirty percent for the aggravated assault convictions, to be served concurrently. He
was also sentenced to nine years at thirty percent for the especially aggravated burglary conviction,
nine years at thirty percent for the attempted second degree murder conviction, and eighteen months
at thirty percent for the unlawful possession of a weapon by a convicted felon, which were to be
served concurrently to one another but consecutively to the especially aggravated kidnapping and
aggravated assault convictions, for an effective sentence of thirty-one years. On appeal, Cox argues
that (1) the trial court erred by admitting his prior juvenile conviction for impeachment purposes,
(2) the evidence was insufficient to support his convictions, (3) the State failed to prevent or correct
the false testimony of two of the State’s witnesses, and (4) the trial court erred by imposing
consecutive sentencing. Upon review, we affirm the judgments of the trial court.
Tenn. R. App. P. 3 Appeal as of Right; Judgments of the Circuit Court Affirmed
CAMILLE R. MCMULLEN , J., delivered the opinion of the court, in which NORMA MCGEE OGLE and
ALAN E. GLENN , JJ., joined.
Scott A. Lovelace, Ripley, Tennessee (at trial), and Ryan B. Feeney, Selmer, Tennessee (on appeal),
for the appellant, Ricky Terrell Cox.
Robert E. Cooper, Jr., Attorney General and Reporter; David H. Findley, Assistant Attorney General;
D. Michael Dunavant, District Attorney General; and James Walter Freeland, Jr., Assistant District
Attorney General, for the appellee, State of Tennessee.
OPINION
Trial. Deputy Sheriff Steve Jackson of the Lauderdale County Sheriff’s Department testified
that he arrived at the Midway Market in Henning in response to Officer Herbert Jones’ call for
assistance at approximately 11:50 p.m. on April 30, 2006. He saw Chris Alston, also known as “Big
Memphis,” in a frightened state with blood on his face, head, and shirt. Alston was whimpering and
asked Deputy Jackson to check on his girlfriend and child at his house at 340 Johnson Street in
Henning. When Deputy Jackson arrived at Alston’s residence, he saw a large number of people
coming and going from the rear of the home. He also saw a wooden door with a large rectangular
windowpane that had been shattered. There was blood on the glass that was still intact, as well as
blood on the shattered glass. He noticed broken glass inside and outside the door. He entered the
residence through the back door and noticed blood all over the floor of the kitchen and saw two
rounds of .380 caliber ammunition and a crowbar on the island in the kitchen. He also observed that
some plastic from the front porch had been pushed inward, which could have allowed a person to
access the front entrance of the house. He also found footprints in the area where the plastic had
been broken. Deputy Jackson cleared the crime scene to ensure that the suspects were gone and to
prevent the people present from tampering with the evidence. He then checked on Alston’s
girlfriend and child, who were in the master bedroom. They were “shaken” with no signs of injury.
The child was three or four years old.
A short time later, Deputy Termaine Reed and Deputy Brian Robison arrived to secure the
scene on the outskirts of the residence. In addition, Henning Police Chief Vincent Tyus and Special
Agent Donna Turner with the Tennessee Bureau of Investigation arrived on the scene. Deputy
Jackson, Chief Tyus, and Special Agent Turner recovered several items of evidence including the
cord and motor from an electric air pump and an empty magazine or clip of a .380 semi-automatic
pistol. They found the cord from the pump in the driveway of “Papa Levi’s” residence at 133 Graves
Avenue, which is located approximately eighty to one hundred and twenty feet from Alston’s
residence. At Levi’s home, there was a bloodstain on the front door and drops of blood on the porch.
Deputy Jackson explained that the distance from Alston’s residence to the Midway Market
was approximately one-tenth of a mile, and that Alston could have run from his home to the Midway
Market in a few seconds. He did not see Cox the night of April 30, 2006, and Alston did not give
him a description of his assailants. There was no physical evidence that linked Cox or the other
defendants to this case.
Henning Police Chief Vincent Tyus testified that he first saw Alston at Baptist-Lauderdale
Hospital on April 30, 2006, at approximately midnight. Alston was “bruised up pretty bad”; he had
blood coming from his head and ear, a gash on his foot, and a bruise on his leg. Chief Tyus took
photographs of Alston’s head, foot, face, both knees, and both shoulders at the hospital to show his
condition.
When Chief Tyus arrived at Alston’s residence, he saw Deputy Jackson and Agent Turner
before going inside the home. He observed that the glass in the back door had been shattered, there
was blood on the floor, and there was a crowbar in the center of the kitchen. He also saw that the
plastic on the front porch had been cut in half. At Levi’s house, he saw blood on the door and found
the cord from an air compressor.
Chief Tyus explained that law enforcement initially was informed of this case when a
neighbor heard Alston beating on her door and called 9-1-1. He did not check for fingerprints on
2
the .380 caliber cartridges that were recovered. Also, he did not get a description of Alston’s
assailants at the hospital because Alston was in so much pain that he did not question him at length.
Chief Tyus said that Alston did tell him that some of his assailants got into his home by cutting the
plastic around his front porch.
Lionel Crawford testified that he lived in Henning in April of 2006 and that Stanley
Crawford, Ronnie Coleman, and Ricky Terrell Cox were his cousins. He explained that he knew
Michael Hayes but was not related to him and that Stanley Crawford had “the mind of a child.” He
first saw Stanley Crawford and Ronnie Coleman on April 30, 2006, when he went to his
grandmother’s house to wash his car. He saw Michael Hayes and Ricky Cox at his grandmother’s
house later that day. While he was washing his car, Lionel Crawford heard Ronnie Coleman talking
to Michael Hayes and Ricky Cox about robbing Chris Alston. Coleman was telling Hayes and Cox
that Alston had cocaine and money at his home in Henning. Lionel Crawford told Coleman, Hayes,
and Cox that Alston did not have drugs and money at his home and tried to convince them not to rob
Alston. Cox and Hayes kept asking Ronnie Coleman if it was true that Alston had drugs and money,
and Lionel Crawford told them, “No, y’all, Ronnie don’t know what he is talking about. Y’all don’t
listen to him. Don’t do it.” Lionel Crawford stated that this conversation between Coleman, Cox,
and Hayes took place sometime between 7:00 p.m. and 8:00 p.m. on April 30, 2006, and that
Michael Hayes was wearing a blue jersey and Ricky Cox was wearing a black shirt and blue jeans
that day. Lionel Crawford left the house between 8:30 p.m. and 9:00 p.m. to go to Ripley. As he
was leaving, he saw Cox, Coleman, and Hayes together, and he saw Stanley Crawford sitting with
his brother on the porch. He did not see Cox, Coleman, Hayes, or Stanley Crawford again that night.
Lionel Crawford said that he never heard Cox, Coleman, Hayes, or Stanley Crawford discuss
the use of guns or any type of weapons in connection with the offenses against Alston. Regarding
the likelihood that the robbery would actually happen, Lionel Crawford said, “I mean, I know them,
you know – I know the type of guys they is [sic]. I was assuming they was [sic] serious about it.”
Jennifer Paine, Chris Alston’s girlfriend and the mother of Alston’s son, testified that she and
her son were living with Alston on April 30, 2006, when the burglary occurred. She and her son were
in bed when they heard someone knocking on the door and ringing the doorbell sometime between
11:00 p.m. and 11:30 p.m. Alston went to the door while they stayed in bed. He then came back to
bed but got up, stating that he was going to take a shower. Before he took a shower, Paine saw Alston
look out the window. Then Alston went towards the kitchen, and she heard glass breaking and people
screaming, “Police.” The burglars broke the glass in the double doors in the kitchen at the back of
the house. When she heard the glass breaking and the people yelling, “Police,” Paine grabbed her
son. She heard someone knocking at the front door, who she assumed was the police, and she opened
the front door to find a black man with a gun. He had on a white shirt, black pants, and a “doo-rag”
on his head. Paine knew he was not a police officer and asked him, “What [was] going on?” The
man pointed the gun at her and her son and told them, “[B]e cool.” She went into the bedroom,
grabbed a blanket for her son, and started walking to the closet because that was her first instinct. She
passed by a clock on the dresser which showed the time to be midnight, but she explained that it was
really 11:45 p.m. because she sets her clock fifteen minutes fast. The man with the gun told her not
to go into the closet, and then asked her, “Where is it? Where’s the money at [sic]?” She told him
3
where her purse and her jewelry box were located. The man started pacing back and forth, and
Paine’s son kept asking for his father. At the time, she believed Alston was still in the kitchen
because she could hear fighting and “scuffling” and heard him say, “[M]y girl and my baby are in
there and it ain’t [sic] nothing here.” She could hear someone being hit and could hear people moving
around on the floor. As she was hearing the noises from the kitchen, the man with the gun in the
bedroom kept telling her, “You’ll be cool [sic]. Don’t move. I got something for you.” Paine said
that she never gave him any money or drugs. At the time, she believed that the man with the gun was
going to kill her and her son. However, he did not hurt either one of them. She rocked her son back
and forth and prayed that the men would not kill them. During this time, her son cried and asked for
his father. She asked the man with the gun not to kill them, but he never answered her. She and her
son were never free to leave the bedroom at any point. The man with the gun walked back and forth
from the bedroom to the kitchen a couple of times, and she could hear him talking to the other men
in the kitchen. She heard the man who had been in the bedroom with them saying, “Yeah, I got this
in here.” Then she saw him walk out of the bedroom. The house fell silent, and she said she was
“sitting in the room in the dark waiting to see if somebody was going to come and kill [them] or not.”
She and her son sat in the dark for about five to seven minutes before Alston’s cousin came into the
bedroom and told her that Alston had made it to the Midway Market. Shortly thereafter, an officer
with the Lauderdale County Sheriff’s Office came into the house through the kitchen.
Paine said that when she had a chance to look around, she noticed broken glass in the kitchen,
drops of blood everywhere, and open kitchen cabinets. She said that one of the back doors in the
kitchen was heavily damaged. The plastic around the front porch was broken, but Paine said that it
had been damaged before the burglary. The only thing taken from the house during the burglary was
Alston’s coat and wallet, which were not recovered. During her testimony, Paine identified Cox as
the man who had held her and her son at gunpoint in the bedroom. She did not see the other men
involved in the burglary.
Following the burglary, Paine did not know Alston’s location or condition. By the time she
got to the Midway Market, Alston was bleeding on a stretcher in the ambulance. She saw him later
at Baptist-Lauderdale Hospital.
Chris Alston testified that he lived with Jennifer Paine and their son at 340 Johnson Street in
Henning on April 30, 2006. Alston first saw Stanley Crawford when he rang his doorbell around
11:30 or 11:45 p.m. on April 30, 2006. Alston had been watching television when he heard someone
ringing the doorbell over and over. He finally opened the door, and asked, “What?” Stanley
Crawford told him he wanted “a blunt,” and Alston told him, “You know I don’t sell no [sic] damn
weed.” Stanley Crawford was acting nervous, and as he walked away, he tried to look behind
Alston’s house. Alston knew Stanley Crawford because he was from Henning. As Crawford was
walking away, Alston looked out the bathroom window in the same direction Crawford had been
looking. He then heard glass breaking and some men yelling, “Police.” Alston said that he was
wearing “some blue shorts” and that one of the men “grabbed [him] by his shirt. He had the gun--”
An instant later, Alston clarified his testimony and said, “I didn’t have on no [sic] shirt. He grabbed
me.” One of the men asked him for the drugs and money. Alston said, “What?” The man responded,
“You know what I’m talking about.” Then one of the men hit Alston’s knee with a crowbar. Alston
told the men, “I don’t have none [sic],” and the men said, “You [are] lying.” Alston said one man had
4
a crowbar and another man had a gun. Alston identified Cox as the man with the gun.
Alston fell down after he was hit with the crowbar, and the men tied him up. They kept asking
him, “Where it at [sic]?” Alston kept telling them, “I don’t have nothing [sic].” Alston said that the
men started kicking him, and Cox hit him in the top of the head with a pistol that looked like a “black
.45.” At that point, Alston noticed that blood was running down his face. The men kept asking him
for the drugs and the money, and he kept telling them that he did not have either of these things. Then
Alston told them to look in the kitchen cabinets to keep them from hitting him as he was trying to
“figure out” what to do next. Once the men realized that there was nothing in the cabinets, one of the
men said, “You’re going to tell me where it’s at [sic]” and started walking toward the bedroom where
Alston’s son and girlfriend were located. The man with the crowbar walked away from Alston and
began looking through the broken glass at the back door as if he had lost something. Alston said that
they tied him with his hands behind his back and one of his legs tied up to his hands with an extension
cord. The men hit him with the crowbar once, kicked him four or five times, and hit him with the gun
about four or five times. They never found any drugs or money in his kitchen. Alston stated that he
thought he was going to die two or three times in the house. He had no doubt that Cox was the person
who pointed the gun at him and “hog-tied” him in his kitchen. He also identified Michael Hayes as
the other assailant.
Alston said that when he was lying on his stomach, he could see what the men were doing.
One of the men left the kitchen, and the other man seemed to be looking for something in the broken
glass. Alston got the cord loose and ran out the back door to “Papa Levi’s” house. Hayes and Cox
followed him to Levi’s house where they fell, and Alston started wrestling with Cox for the gun.
Then Alston broke free and banged on Levi’s window screaming, “Pop!” Hayes put Alston’s arm
behind his back, and Cox grabbed the gun and put it in his face. Cox tried to shoot Alston, but the
gun jammed. Alston said a woman opened Levi’s door but slammed it when she saw the men
fighting. After the gun jammed, Hayes and Cox ran in one direction, while Alston ran toward the
Midway Market. Alston said that Hayes was the man who hit him with a crowbar and held his arm
behind him as Cox tried to shoot him. He said that Hayes had on a “Sammy Sosa” jersey with red
trim that night.
Alston said that once he arrived at the Midway Market, the Henning police were already there,
and he recognized one of the officers. Later, Deputy Steve Jackson with the Lauderdale Sheriff’s
Department arrived.
During his testimony, Alston read from his statement to police describing the man with the
gun: “A light skinned guy with built chest, stocky looking, low haircut. Clean cut. He had a gun in
his left hand.” Alston testified that he was six feet, two inches tall and that the man with the gun was
a little taller than he. Alston did not give this statement to police until three weeks after the incident
because he was hurt and was taking medication. He thought that Cox was wearing all black that
night, although he was not certain. He recognized Cox because they had recently been in jail together.
Donna Turner testified that she was a Special Agent with the Tennessee Bureau of
Investigation when this incident occurred. On April 30, 2006, she was called by Henning Police
5
Chief Tyus and the Lauderdale Sheriff’s Department to go to 340 Johnson Street in Henning. She
arrived at around 1:15 a.m. on May 1, 2006, only a short time after the incident occurred. When she
arrived, she observed yellow tape around the perimeter of the house. She encountered Deputy
Jackson, who started telling her about the case. Turner went into the house and did a preliminary
walk-through of the crime scene to determine if someone with special training in a particular area
needed to be called to the scene.
She observed glass and blood all over the kitchen. There was a new crowbar in the kitchen
that seemed very out of place. She saw two .380 caliber bullets that had not been fired. She was
particularly interested in the different areas of blood and their proximity to the back door and kitchen
counter. There was no glass in one of the back doors, and the mini-blinds covering the door were
damaged. The glass had shattered into very small pieces all over the ground. The door frame was
locked, but the glass in it was shattered, and the majority of the glass was on the inside of the home.
Turner photographed the areas of blood. She noticed a single blood stain that was near the sink and
another bullet casing in that area. All of the blood was on the lower part of the cabinets and the floor.
The different areas of blood indicated that the person bleeding had moved. Turner said that she found
the handgun magazine, the electrical cord, parts of the air compressor, and blood transfers on the cars
in Levi’s garage. Turner said that the recovered items, including the magazine, crowbar, cartridge,
candlestick holder, duct tape, hose, motor, electrical cord, and cover to the air compressor, were all
sent for fingerprint analysis but contained no identifiable prints.
The first suspect that Turner talked to was Stanley Crawford. From Crawford, she learned that
Ronnie Coleman, and two individuals named “Ricky” and “Mike” were also involved. Crawford was
unable to give the last names for these two men. Turner said that they viewed the video surveillance
from the Midway Market showing Stanley Crawford and another man, wearing a “Sosa” jersey,
entering the store at 7:48 p.m. and exiting the store at 7:53 p.m. Turner took a photograph of the
surveillance computer screen showing the man in the blue “Sammy Sosa” jersey at the Midway
Market. Turner identified the man in the jersey as Michael Hayes.
Turner stated that Stanley Crawford was advised of his rights on May 1, 2006. He was
detained from 9:31 a.m. to 2:23 p.m., and she interviewed him during part of that time. Stanley
Crawford was unable to write his own statement, so an officer wrote the statement for him based on
what he said about the incident, and then read it to him before Crawford signed it. Turner stated that
Crawford appeared competent to give a statement at the time.
Michael Hayes testified that he was with Ricky Cox on April 30, 2006. Hayes stated that he
heard Coleman talking to Cox about robbing Alston. Hayes said that he last saw Cox on April 30,
2006, when he left to go to the store at 7:30 p.m. When he returned to Cox’s aunt’s house, Cox was
no longer there. Hayes said that he pled guilty to the charge of attempted second degree murder of
Alston prior to testifying at Cox’s trial because it was in his best interest. Hayes said that he had no
involvement in the incident and left town at almost 10:00 p.m. that night. However, he admitted that
he was the man in the “Sosa” jersey from the photograph taken from the Midway Market surveillance
camera. He also said that the man with him in that photograph was Stanley Crawford. Hayes was
aware that Stanley Crawford had pled guilty to some charges and that Ronnie Coleman had pled
guilty to one charge related this incident.
6
Ricky Cox testified that he was in Henning on April 30, 2006, to visit his family. He saw
Ronnie Coleman, his cousin, and Michael Hayes, a friend, that day. He visited his family and went
back home to West Memphis, Arkansas between 7:00 p.m. and 7:30 p.m. that night. He dropped
Coleman off and went home. He started drinking beer and Henessey with his friends. Then he left
his house at around midnight and went to his girlfriend’s house, where he spent the night. Cox said
that he discovered he was facing charges in Lauderdale County while he was incarcerated for a ticket.
He said that Special Agent Turner asked him some questions about the April 30, 2006 incident, but
that he did not give a statement because he did not know anything about the incident. He denied
having any involvement in offenses against Chris Alston and his family. Cox acknowledged that he
had been in jail with Alston but claimed he did not recognize him. He said that Alston never acted
like he recognized him either. Cox said that he was right-handed and five feet, seven inches tall.
Cox admitted that he was convicted of armed robbery in Cook County, Illinois, on May 1,
2000, when he was sixteen years old. Cox said that he was near Ronnie Coleman and Michael Hayes
on April 30, 2006, but did not listen to what they were saying because he was talking with a family
member. He claimed that Lionel Crawford testified that Cox had asked questions about the robbery
because Lionel Crawford was afraid of Alston’s friends. Cox also said that although Stanley
Crawford’s statement to the Tennessee Bureau of Investigation stated that Cox, Michael Hayes,
Ronnie Coleman, and Stanley Crawford were involved in the attempted robbery, he claimed that
Stanley Crawford did not know what he was signing. He further claimed that Ronnie Coleman pled
guilty because of his criminal record, and Michael Hayes pled guilty to attempted second degree
murder of Alston because he entered a best interest plea. Cox acknowledged that Alston and Paine
identified him but noted that Paine said she let Cox in through the front door while Alston said Cox
came in through the back door.
I. Motion in Limine. Cox argues that the trial court abused its discretion in overruling his
motion in limine regarding his previous juvenile conviction. First, he contends that Rule 609(d) of
the Tennessee Rules of Evidence precludes the use of a juvenile adjudication to impeach the accused.
Second, he asserts that the use of juvenile convictions for the purpose of impeachment is specifically
proscribed by Tennessee Code Annotated section 37-1-133(b) (2006). Third, he contends that his
juvenile conviction for armed robbery was exceedingly prejudicial, and its admission cannot be
considered harmless error. The State responds by contending that Cox waived this issue when he
withdrew his motion in limine during trial on the basis that it was “the only [prior] conviction” after
he was presented with a “Certified Statement of Conviction” for armed robbery in Illinois. See Tenn.
R. App. P. 36(a), 24(b). Second, the State argues that admission of the prior conviction was proper
because Cox was convicted of the offense of armed robbery as an adult, even though he had not
attained the age of eighteen years at the time of the conviction. See State v. McGhee, 746 S.W.2d
460, 463-64 (Tenn. 1988). Third, the State contends that the trial court followed all the requirements
of Rule 609 of the Tennessee Rules of Evidence. Fourth, the State asserts that robbery and theft are
crimes of dishonesty and are probative of a defendant’s credibility. See State v. Blevins, 968 S.W.2d
888, 893 (Tenn. Crim. App. 1997); see also State v. Galmore, 994 S.W.2d 120, 122 (Tenn. 1999);
State v. Caruthers, 676 S.W.2d 935, 940-41 (Tenn. 1984); State v. Baker, 956 S.W.2d 8, 15 (Tenn.
Crim. App. 1997). Finally, the State argues that the jury would have been informed of the prior
conviction in any event because it is an element of the offense of possession of a weapon by a
7
convicted felon. See T.C.A. § 39-17-1307.
Cox filed a motion in limine to prevent the State from using a prior conviction for armed
robbery while a juvenile for impeachment purposes. However, the record shows that at trial the State
presented Cox with a “Certified Statement of Conviction” for armed robbery as a juvenile in Cook
County, Illinois, in May of 2000, for which he was sentenced as an adult. Consequently, defense
counsel stated, “We will withdraw the Motion in Limine because that’s the only conviction.” The
trial court responded:
The State filed a notice of intent to seek enhanced punishment [and] for [the
purpose] of impeachment of the prior record of the defendant. . . . [S]ince the one they
gave notice of is also an element of the offense of Count Nine [unlawful possession
of a weapon by a convicted felon] and admitted by Exhibit 21, the Court finds that
should the defendant take the stand, [the State] would be allowed to ask if he is the
same defendant that has the conviction, that the jury can consider [the conviction]
both as an element of the offense in Count Nine and also for impeachment purposes.
Normally, the Court would weigh that as to whether it was probative of credibility[,]
and it is probative of credibility. It is an armed robbery conviction. It is probative of
credibility and normally it might be – the probative value might be outweighed by the
potential prejudice to similar matters for which he is on trial, except it’s admissible
in any event as an element of the events of Count Nine.
Cox did not make any further objections to the admissibility of this conviction until his motion for
a new trial when he claimed the trial court erred in admitting this prior conviction because it was a
juvenile adjudication. We note that the trial court’s order denying the motion for a new trial does not
directly consider this issue. In addition, the transcript from the hearing on the motion for a new trial
is not included in the record. The State insists that this issue should be waived because of Cox’s
failure to object at trial and because of his failure to include the transcript from the motion for a new
trial in the record. We agree. See Tenn. R. App. P. 36(a). Because we do not have a transcript of
the motion for new trial, we are simply unable to determine whether the grounds urged to exclude the
prior conviction before the trial court are the same as presented to this court on appeal. It is the duty
of the appellant to provide a record which conveys a fair, accurate and complete account of what
transpired with regard to the issues which form the basis of the appeal. Tenn. R. App. P. 24(b); see
State v. Taylor, 992 S.W.2d 941, 944 (Tenn. 1999). When no transcript is included in the record, this
Court must presume that the ruling of the trial court is correct. See State v. Ballard, 855 S.W.2d 557,
561 (Tenn. 1993); State v. Oody, 823 S.W.2d 554, 559 (Tenn. Crim. App.1991). Accordingly, this
issue is waived.
II. Sufficiency of the Evidence. Cox contends that the evidence at trial was insufficient to
support his convictions because the evidence consisted of the “contradictory” and “inconsistent”
testimony of Chris Alston and Jennifer Paine regarding Cox’s involvement in the offenses and that
neither witness’s testimony is sufficient to convict him. In addition, he argues that the evidence was
also insufficient to support his conviction of felon in possession of a handgun, since the underlying
felony was a juvenile conviction. The State argues that the “rule of cancellation” employed by Cox,
8
which states that conflicting statements by a witness regarding the same fact cancel one another out,
is inapplicable because that rule refers to the testimony of a single witness, rather than two different
witnesses. See State v. Matthews, 888 S.W.2d 446, 449 (Tenn. Crim. App. 1993). Second, the State
asserts that although Alston’s statement to police regarding the height of the attacker conflicted with
his testimony at trial, the rule of cancellation is only applicable to sworn testimony. Third, the State
argues that “there was a possible explanation” reconciling Alston’s and Paine’s testimony and that
other evidence corroborated their testimony at trial. Fourth, the State contends that Cox’s convictions
did not require him to be personally responsible for the crimes against Paine and her child; under the
theory of criminal responsibility, Cox could be responsible for the especially aggravated kidnapping
and aggravated assault against Paine and her child even if he only took part in the burglary and
aggravated assault of Alston. See T.C.A. §§ 39-11-401(a) (2006), -402(2) (2006).
The State, on appeal, is entitled to the strongest legitimate view of the evidence and all
reasonable inferences which may be drawn from that evidence. State v. Bland, 958 S.W.2d 651, 659
(Tenn. 1997). When a defendant challenges the sufficiency of the evidence, the standard of review
applied by this court is “whether, after reviewing the evidence in the light most favorable to the
prosecution, any rational trier of fact could have found the essential elements of the crime beyond a
reasonable doubt.” Jackson v. Virginia, 443 U.S. 307, 319, 99 S. Ct. 2781, 2789 (1979). Similarly,
Rule 13(e) of the Tennessee Rules of Appellate Procedure states, “Findings of guilt in criminal
actions whether by the trial court or jury shall be set aside if the evidence is insufficient to support
a finding by the trier of fact of guilt beyond a reasonable doubt.” The requirement that guilt be found
beyond a reasonable doubt is applicable in a case where there is direct evidence, circumstantial
evidence, or a combination of the two. State v. Matthews, 805 S.W.2d 776, 779 (Tenn. Crim. App.
1990) (citing State v. Brown, 551 S.W.2d 329, 331 (Tenn. 1977), and Farmer v. State, 343 S.W.2d
895, 897 (Tenn. 1961)). The trier of fact must evaluate the credibility of the witnesses, determine the
weight given to witnesses’ testimony, and must reconcile all conflicts in the evidence. State v. Odom,
928 S.W.2d 18, 23 (Tenn. 1996). When reviewing issues regarding the sufficiency of the evidence,
this court shall not “reweigh or reevaluate the evidence.” State v. Philpott, 882 S.W.2d 394, 398
(Tenn. Crim. App. 1994) (citing State v. Cabbage, 571 S.W.2d 832, 836 (Tenn. 1978)), superseded
by statute on other grounds as stated in State v. Barone, 852 S.W.2d 216, 218 (Tenn. 1993). This
court has often stated that “[a] guilty verdict by the jury, approved by the trial judge, accredits the
testimony of the witnesses for the State and resolves all conflicts in favor of the theory of the State.”
State v. Bland, 958 S.W.2d 651, 659 (Tenn. 1997) (citation omitted). A guilty verdict also “removes
the presumption of innocence and replaces it with a presumption of guilt, and the defendant has the
burden of illustrating why the evidence is insufficient to support the jury’s verdict.” Id. (citation
omitted).
Cox argues that the “contradictory” and “inconsistent” testimony of Chris Alston and Jennifer
Paine was insufficient to support his convictions because it failed to prove that Cox was one of the
individuals that burglarized Alston’s home. Specifically, he focuses on the fact that Alston described
his assailant as taller than six feet, two inches and holding the gun in his left hand while Cox testified
that he was five feet, seven inches tall and right-handed. In addition, Cox asserts that the testimony
of Jennifer Paine was inconsistent with the testimony of Chris Alston. Paine stated that the individual
who held her and her son at gunpoint in the bedroom was Cox while Alston stated that Cox was one
9
of his assailants in the kitchen.
This court has previously concluded that a witness’s testimony may be discredited only in
extraordinary circumstances:
[A]lthough as a general rule a conviction may rest upon the testimony of a single
witness, though it be contradicted by others or appear uncertain or inconsistent, the
rule does not apply if the testimony of such single witness is not of a cogent and
conclusive nature, and “if it is so indefinite, contradictory or unreliable that it would
be unsafe to rest a conviction thereon.”
Letner v. State, 512 S.W.2d 643, 649 (Tenn. Crim. App. 1974) (quoting 23 C.J.S. Criminal Law §
903(19)). This court has additionally held that “contradictory statements by a witness in connection
with the same fact cancel each other.” State v. Matthews, 888 S.W.2d 446, 449 (Tenn. Crim. App.
1993). However, the rule of cancellation applies “only when the inconsistency in the witness’s
testimony is unexplained and when neither version of his testimony is corroborated by other
evidence.” Taylor v. Nashville Banner Pub. Co., 573 S.W.2d 476, 483 (Tenn. App. 1978). “The rule
of cancellation is typically limited to circumstances in which the witness has sworn to each
statement.” State v. Joseph Vermeal, No. M2005-00568-CCA-R3-CD, 2005 WL 3543417, at *4
(Tenn. Crim. App., at Nashville, Dec. 28, 2005) (citing State v. Cayle Wayne Harris, No.
M2000-02143-CCA-R3-CD, 2001 WL 1218582, at *2 (Tenn. Crim. App., at Nashville, Oct. 12,
2001)), aff’d denial of post-conviction relief, No. M2007-01676-CCA-R3-PC, 2008 WL 2648939
(Tenn. Crim. App., at Nashville, July 3, 2008)).
Cox argues that the testimony from Paine and Alston conflict and should cancel each other.
However, as the State correctly argues, the rule of cancellation applies to the testimony of one
witness, not two different witnesses. Further, “[q]uestions concerning the credibility of witnesses,
the weight and value to be given the evidence as well as all factual issues raised by the evidence are
resolved by the trier of fact, not this Court.” State v. Pappas, 754 S.W.2d 620, 623 (Tenn. Crim. App.
1987) (citations omitted). Accordingly, even if the testimony of Paine and Alston was somewhat
contradictory, it was the jury’s duty to consider the conflicting testimony and to evaluate Paine’s and
Alston’s credibility. Cox also argues that Alston’s testimony at trial was inconsistent with his
statement to police. Again, Cox invites this court to substitute our judgment for that of the jury’s.
Cox’s defense attorney cross-examined Alston on the inconsistencies between his testimony and his
statement to police, and the jury resolved any inconsistencies in the evidence. Further, the record
does not show that Alston’s statement to police was a sworn statement. Therefore, even if Alston’s
statement contradicted portions of his testimony at trial, the rule of cancellation would not apply.
In addition, we conclude that the rule of cancellation does not apply in this case because, as
argued by the State, the evidence at trial provided a “possible explanation for the [conflicting]
10
testimony” of Paine and Alston. Alston testified that while he was lying down on the kitchen floor
he saw one of the men leave the kitchen and go back to the bedroom where Paine and their son were
located. A jury could reasonably find that Cox entered the kitchen at the back door with Michael
Hayes and then searched for Paine and encountered her at the front door, before holding Paine and
her son at gunpoint in the bedroom. Accordingly, Cox is not entitled to relief.
The State further contends that Cox could be held responsible for the acts of his co-defendant
through the theory of criminal responsibility. An individual is criminally responsible for the conduct
of another person if, “[a]cting with intent to promote or assist the commission of the offense, or to
benefit in the proceeds or results of the offense, the person solicits, directs, aids, or attempts to aid
another person to commit the offense.” T.C.A. § 39-11-402(2) (2003). Criminal responsibility is not
a distinct crime but “a theory by which the state may prove the defendant’s guilt based on another
person’s conduct.” State v. Osborne, 251 S.W.3d 1, 16 (Tenn. Crim. App. 2007) (citing State v.
Mickens, 123 S.W.3d 355, 389-90 (Tenn. Crim. App. 2003)). In the theory of criminal responsibility,
“an individual’s presence and companionship with the perpetrator of a felony before and after the
commission of an offense are circumstances from which his or her participation in the crime can be
inferred.” State v. Watson, 227 S.W.3d 622, 639 (Tenn. Crim. App. 2006) (citing State v. Ball, 973
S.W.2d 288, 293 (Tenn. Crim. App. 1998)). In this situation, “no particular act need be shown, and
the defendant need not have taken a physical part in the crime to be held criminally responsible.” Id.
(citing Ball, 973 S.W.2d at 293)). In order to be held criminally responsible for the acts of another,
the defendant must “‘in some way associate himself with the venture, act with the knowledge that an
offense is to be committed, and share in the criminal intent of the principal in the first degree.’”
Hembree v. State, 546 S.W.2d 235, 239 (Tenn. Crim. App. 1976) (quoting Jenkins v. State, 509
S.W.2d 240, 244-45 (Tenn. Crim. App. 1974)). During Cox’s trial, the jury was instructed on the
theory of criminal responsibility. Even if Paine misidentified Cox as the individual who held her and
her son at gunpoint in the bedroom, Alston’s testimony would be sufficient to convict Cox for the
offenses relating to Paine and her child through the theory of criminal responsibility. Conversely,
even if Alston misidentified Cox as one of his assailants in the kitchen, Paine’s testimony would be
sufficient to convict Cox for the offenses relating to Alston through the theory of criminal
responsibility.
III. New Trial. Cox argues that his due process rights to a fair and impartial trial were
violated when the State used the false testimony of either Chris Alston or Jennifer Paine to convict
him. He contends that the district attorney has a duty to correct false testimony of State witnesses.
He also asserts that the State used the testimony of Alston and Paine to convict him, even though their
testimony was completely contradictory. Cox argues that “the State in this case, at best, failed to
correct the false testimony of Jennifer Paine, and at worst, placed her testimony before the jury with
knowledge of its falsity.” The State argues that although the testimony of Alston and Paine might be
somewhat conflicted, the fact that Alston stated that one of his attackers left the kitchen resolves any
inconsistencies in their testimony and that Cox has failed to show that Paine “knowingly lied during
her testimony and that the State was aware that she lied.” See Roger Morris Bell v. State, No. 03C01-
9210-CR-00364, 1995 WL 113420, at *8 (Tenn. Crim. App., at Knoxville, Mar. 15, 1995), perm. to
appeal denied (Tenn. Aug. 28, 1995).
11
This court has held that “[w]hen a state witness answers questions on either direct or cross
examination falsely, the district attorney general, or his assistant, has an affirmative duty to correct
the false testimony.” State v. Spurlock, 874 S.W.2d 602, 617 (Tenn. Crim. App. 1993) (citations
omitted). This affirmative duty applies regardless of whether the district attorney general solicited
the false testimony. Id. at 618 (citing United States v. Barham, 595 F.2d 231, 232 (5th Cir. 1979)).
If the State fails to correct the witness’s false testimony, then the defendant’s due process rights are
violated. Id. (citing Giglio v. United States, 405 U.S.150, 153-54, 92 S. Ct.763, 766 (1972); Napue
v. Illinois, 360 U.S. 264, 269, 79 S. Ct.1173, 1177 (1959)). This affirmative duty also applies “when
the false testimony is given in response to questions propounded by defense counsel for the purpose
of impeaching the witness.” Id. at 617 (citations omitted). The State correctly notes that in order to
prevail on a claim that the State failed to correct false testimony, the defendant must prove the
following by a preponderance of the evidence: “(a) that false or perjured testimony was admitted at
trial, (b) that the state either knowingly used such testimony or knowingly allowed it to go
uncorrected, and (c) that the testimony was material and deprived him of a fair trial.” Roger Morris
Bell, 1995 WL 113420, at *8. We conclude that Cox failed to prove any of the aforementioned
factors by a preponderance of the evidence. Cox provides no proof that Paine testified falsely at trial
and that the State knew of this false testimony. Instead, he generally argues that Paine’s testimony
was “inconsistent” with Alston’s testimony but fails to address any possible resolution of their
testimony. He also fails to address the State’s contention that the jury could have found Cox guilty
of the offenses against Paine and her son under the theory of criminal responsibility. Accordingly,
we conclude that Cox is not entitled to relief on this issue.
IV. Consecutive Sentences. Cox argues that the trial court erred in imposing consecutive
sentences because there was no proof he was on probation or parole for his juvenile felony conviction
at the time of the instant offenses. He also contends that this case should not be reviewed de novo
with a presumption of correctness because of the trial court’s conclusion that he was on release status
at the time he committed the instant offenses. Because the trial court did not indicate the weight
given to this factor, he asks that the trial court’s decision be reversed, or, alternatively, that his case
be remanded for a re-sentencing hearing. In response, the State argues that the record fully supports
consecutive sentencing based on Tennessee Code Annotated sections 40-35-115(b)(2), (4) (2006).
At Cox’s sentencing hearing, the trial court explained its reasoning for imposing consecutive
sentences:
The Court finds, under T.C.A. 40-35-115[(b)(2)], that the defendant is an
offender who has a record of criminal activity, [and under Tennessee Code Annotated
section 40-35-115(b)(4),] he’s a dangerous offender whose behavior indicates little
or no regard for human life, that consecutive sentencing is reasonably related to the
severity of the offenses committed and serve[s] to protect the public from further
criminal acts by someone such as this defendant who resorts to aggravated criminal
conduct, and be congruent with the principles of sentencing.
12
In addition, the defendant received a sentence of six years [for armed robbery
in Cook County, Illinois] in May of 2000. [The instant offenses] occurred in April of
2006. So the defendant was on release status in Docket Number 99CR10472 out of
Cook County Circuit Court; and that, under T.C.A. 40-35-115 [(b)(6), “[t]he
defendant is sentenced for an offense committed while on probation,”] could also be
applied.
And the Court finds that consecutive sentencing is reasonably related to the
criminal conduct, and sentences the defendant in Count 4, Count 8, and Count 9,
consecutive to Counts 1, 2, and 3. . . .
Tennessee’s amended sentencing act became effective June 7, 2005. Because the offenses in
this case occurred on April 30, 2006, the 2005 amended sentencing act governs this case. Regarding
the impact of the 2005 amended sentencing act, the Tennessee Supreme Court has stated:
The amended statute no longer imposes a presumptive sentence. Rather, the
trial court is free to select any sentence within the applicable range so long as the
length of the sentence is “consistent with the purposes and principles of [the
Sentencing Act].” Id. § 40-35-210(d). Those purposes and principles include “the
imposition of a sentence justly deserved in relation to the seriousness of the offense,”
id. § 40-35-102(1), a punishment sufficient “to prevent crime and promote respect for
the law,” id. § 40-35-102(3), and consideration of a defendant’s “potential or lack of
potential for . . . rehabilitation,” id. § 40-35-103(5).
State v. Carter, 254 S.W.3d 335, 343 (Tenn. 2008). Further, the court concluded, “An appellate court
is therefore bound by a trial court’s decision as to the length of the sentence imposed so long as it is
imposed in a manner consistent with the purposes and principles set out in sections -102 and -103 of
the Sentencing Act.” Id. at 346.
On appeal, we must review issues regarding the length and manner of service of a sentence
de novo with a presumption that the trial court’s determinations are correct. T.C.A. § 40-35-401(d)
(2006). Nevertheless, “the presumption of correctness which accompanies the trial court’s action is
conditioned upon the affirmative showing in the record that the trial court considered the sentencing
principles and all relevant facts and circumstances.” State v. Ashby, 823 S.W.2d 166, 169 (Tenn.
1991). The defendant, not the State, has the burden of showing the impropriety of the sentence.
T.C.A. § 40-35-401(d) (2006), Sentencing Commission Comments. The record indicates that our
review will be de novo with a presumption of correctness.
Where a defendant is convicted of one or more offenses, the trial court has discretion to
decide whether the sentences shall be served concurrently or consecutively. T.C.A. § 40-35-115(a)
(2006). A trial court may order multiple offenses to be served consecutively if it finds by a
13
preponderance of the evidence that a defendant fits into at least one of the seven categories in section
40-35-115(b). An order of consecutive sentencing must be “justly deserved in relation to the
seriousness of the offense.” T.C.A. § 40-35-102(1). In addition, the length of a consecutive sentence
must be “no greater than that deserved for the offense committed.” T.C.A. § 40-35-103(2).
Here, the trial court imposed consecutive sentencing based on Tennessee Code Annotated
sections 40-35-115(b)(2), (4), and (6) (2006). We conclude that the trial court properly ordered
consecutive sentencing based on section 40-35-115(b)(4), “[t]he defendant is a dangerous offender
whose behavior indicates little or no regard for human life, and no hesitation about committing a
crime in which the risk to human life is high.” Regarding this subsection, the Tennessee Supreme
Court has stated:
Proof that an offender’s behavior indicated little or no regard for human life and no
hesitation about committing a crime in which the risk to human life was high, is proof
that the offender is a dangerous offender, but it may not be sufficient to sustain
consecutive sentences. Every offender convicted of two or more dangerous crimes is
not a dangerous offender subject to consecutive sentences; consequently, the
provisions of [s]ection 40-35-115 cannot be read in isolation from the other provisions
of the Act. The proof must also establish that the terms imposed are reasonably related
to the severity of the offenses committed and are necessary in order to protect the
public from further criminal acts by the offender.
State v. Imfeld, 70 S.W.3d 698, 708 (Tenn. 2002) (quoting State v. Wilkerson, 905 S.W.2d 933, 938
(Tenn.1995)) (emphasis added). Unlike the other six subsections, the trial court must make additional
factual findings for the “dangerous offender” factor because it is “the most subjective and hardest to
apply.” Id. (quoting State v. Lane, 3 S.W.3d 456, 461 (Tenn. 1999)). In explaining its decision to
order consecutive sentencing, the trial court found that “consecutive sentencing is reasonably related
to the severity of the offenses committed and serve[s] to protect the public from further criminal acts
by someone such as this defendant who resorts to aggravated criminal conduct.” Regarding the
severity of the offense, the trial court stated, “I’ve considered the nature and circumstances of the
offense, including the Victim Impact Statement. Again, the court recalls the testimony of how a home
invasion was made here in Lauderdale County by individuals alleging to be police officers, the
terrorizing of a family, the brutal beating of the victim.” The record shows that the trial court made
the additional factual findings required of this factor regarding the severity of the offense and the need
to protect the public from future acts of the defendant. The trial court properly applied this factor.
Accordingly, we conclude that the trial court did not err in ordering partial consecutive sentencing
in this case.
Conclusion
We conclude that the trial court did not err by admitting Cox’s prior conviction for armed
robbery for impeachment purposes, that the evidence was sufficient to support his conviction, that
14
the State did not knowingly present false testimony, and that the trial court did not err by imposing
consecutive sentencing. Upon review, we affirm the judgments of the trial court
____________________________________
CAMILLE R. McMULLEN, JUDGE
15
|
Abstract
This document describes requirements for the layout and presentation of text in languages that use the Arabic script when they are used by Web standards and technologies, such as HTML, CSS, Mobile Web, Digital Publications, and Unicode.
Status of This Document
This section describes the status of this
document at the time of its publication. Other documents may supersede
this document. A list of current W3C publications and the latest revision
of this technical report can be found in the
W3C technical reports index at
https://www.w3.org/TR/.
This document describes the basic requirements for Arabic script layout and text support on the Web and in eBooks. These requirements provide information for Web technologies such as CSS, HTML and digital publications about how to support users of Arabic scripts. Currently the document focuses on Standard Arabic and Persian.
Publication as a Working Draft does not imply endorsement by the W3C
Membership. This is a draft document and may be updated, replaced or
obsoleted by other documents at any time. It is inappropriate to cite this
document as other than work in progress.
1. Introduction
The aim of this document is to describe the basic requirements for Arabic script layout and text support on the Web and in eBooks. These requirements provide information for Web technologies such as CSS, HTML and digital publications, and for application developers, about how to support users of Arabic scripts. The document focuses on Standard Arabic and Persian.
1.1 Gap analysis
This document is pointed to by a separate document, Arabic & Persian Gap Analysis, which describes gaps in support for Arabic and Persian on the Web, and prioritises and describes the impact of those gaps on the user.
Wherever an unsupported feature is identified through the gap analysis process, the requirements for that feature need to be documented. This document is where those requirements are described.
This document should contain no reference to a particular technology. For example, it should not say "CSS does/doesn't do such and such", and it should not describe how a technology, such as CSS, should implement the requirements. It is technology agnostic, so that it will be evergreen, and it simply describes how the script works. The gap analysis document is the appropriate place for all kinds of technology-specific information.
1.2 Other related resources
The document International text layout and typography index (known informally as the text layout index) points to this document and others, and provides a central location for developers and implementers to find information related to various scripts.
The W3C also maintains a tracking system that has links to github issues in W3C repositories. There are separate links for (a) requests from developers to the user community for information about how scripts/languages work, (b) issues raised against a spec, and (c) browser bugs. For example, you can find out what information developers are currently seeking, and the resulting list can also be filtered by script.
1.3 Language scope
This document is focused on two languages: Standard Arabic and Persian.
1.3.1 Standard Arabic language
Standard Arabic—a.k.a. Modern Standard Arabic or Literary Arabic—is the standardized and literary variety of Arabic used in writing and in most formal speech in countries of Northern Africa and West Asia. Regional and classical dialects of Arabic may differ in layout and text details and are not covered by this document.
However, there are some major differences in common practices between the Western Arab regions—that is North-West Africa—and Eastern Arab regions—which is North-East Africa and West Asia. For example, the numeral digits used in the two regions and their formatting are vastly different. Although, there's no clear line between the Eastern and Western Arab regions.
1.3.2 Persian language
Persian—a.k.a. Modern Persian—is the standardized and literary variety of the official languages used in Iran and Afghanistan. The dialect of Persian in Iran is also called Western Persian, and is locally known as Farsi. The dialect of Persian in Afghanistan is also known as Eastern Persian, and is locally known as Dari.
Tajik—a.k.a Tajiki or Tajiki Persian—is the Persian language as used in Tajikistan. It is written in the Cyrillic script, therefore, is not covered by this document.
2. Characteristics of the Arabic script
2.1 Fundamental principles
Arabic script has some characteristics that are challenging for typographers and font designers. The examples below show some characteristics that require careful consideration. How, even in the simpler naskh style, can typography, which came late to the Arabic world, follow the tradition of the many authors and artists who manually shaped the Arabic writing over decades?
2.1.1 Multi-level baselines
Letters may join through a finely inclined line.
Figure 1Inclining baseline.
Or they may appear on two, square-ended lines.
Figure 2Dual-level baseline.
Multilevel baselines don't occur in all fonts. The above examples use the Arabic Typesetting font. Compare those examples to more typical fonts:
Figure 3Flat baselines.
2.1.2 Multi-context joining
Rendering of letters depends not only on their place in the word (initial, medial, final) but also on their neighboring letters, i.e. the letter they join with. Each letter has a different appearance in each combination.
Figure 4Initial letter noon, showing many different forms.
Fonts don't always comply with or respect this kind of tuning. To do so, fonts need many glyphs in order to adapt to each
context. In more modern typefaces some of these connections are implemented by ligatures, but ligatures can't capture or cover all joining behavior.
In the two left most words, the initial noon differs in that one raises a kind of stroke. This property of raising a stroke is common for a number of letters (beh, teh, noon, theh) which are taller than their connected letters in order to be distinguished in some contexts, such as vs. , or to resolve ambiguity. See also § 2.1.5 The so-called teeth letters..
2.1.3 Words as groups of letters
A word shape is composed of not (only) a set of "horizontally" connected letters, but groups of letters (syntagmes).
Figure 5 shows syntagmes in two words in a naskh font with many glyph variants.
Figure 5Groups of letters are colored blue or red.
Compare that with the same words in more plain font:
Figure 6Can't really say letter groups. Rather a "horizontal sequence of letters of almost same width".
Group combinations cannot be covered by general or usual ligatures.
2.1.4 Vertical joining
Groups of letters may also join vertically (top down) instead of right to left. Not all fonts permit this.
Figure 7Almost vertical joining (left), vs. horizontal joins (right).
Once again, some fonts try standard ligatures, but this is not ligature. This is
rather (good) writing practice/style.
One should note that all these features have not only an aesthetic side, but also play a role in justification. Choosing a joining style to suit the desired line width is done at the discretion of authors for hand-written text. Applications should provide general rules to emulate these options, but achieving such justification requires sophisticated algorithms.
2.1.5 The so-called teeth letters.
Where successive letters have a uniform medial shape, they can be rendered in a way that ressembles teeth.
Figure 8"Teeth" letters.
Individual letter shapes may vary according to the context. It's not always the same letters (in red)
which raise the stroke in Figure 8.
2.2 The Islamic manuscript tradition
2.2.1 Origins
The Arabic script belongs to the class of Semitic writing systems. It evolved from the Nabatean script, and attained its distinctive form by the 4th century CE. It is closely related to the Syriac and the Hebrew script. The earliest attested document written in the Arabic alphabet in its classical form stems from the Islamic era, it is dated to 643 CE.
According to Islamic belief, the prophet Muhammad received his revelations in the Arabic language. As a consequence, Arabic attained religious connotations. Muhammad's revelations were first compiled and standardised in writing after his death in 632 CE under the caliphs Abu Bakr and 'Uthman. The resulting holy book, the Qur’ān, became a central vehicle of the faith. The Arabic script thus spread with Islamic civilization beyond its origins, and started to be used to write other languages. Because of the wide reach of Islam, numerous, widely differing languages were and are written with the Arabic script. As a result, different orthographies, including variant forms of Arabic letters were conceived. In parallel to these linguistic developments, a plethora of regional styles emerged, making the Islamic manuscript tradition one of the richest in the world.
2.2.2 Writing Styles
Islamic manuscript practice evolved with Islamic art and civilization. Extant evidence of decorative use of the Arabic script can be found as early as the 7th century CE, in a mosaic band in the Dome of the Rock. Beyond frequent monumental inscriptions in architecture, calligraphy became one of the foremost Islamic art forms. Manuscript practice evolved into a central element of Islamic civilization through the copying of books, and the refinement of calligraphy into a form of fine art. The commissioning and writing of the Qur’ān was seen as an expression of religious devotion and provided the context for scribes and calligraphers to excel in their craft. Further to its use as a textual medium, Arabic calligraphy and lettering crafts developed a rich palette of decorative forms and uses.
A range of styles evolved over time in different regions and for different purposes. These include monumental writing styles used in decorative and representational settings, styles used for the exclusive use of rulers, common hands in different areas, and styles dedicated for specialist purposes such as miniature writing. Many of these styles fell out of use, some evolved further, and some retained a high degree of consistency over time.
There is evidence that both monumental and current hands existed and evolved from the early Islamic era onwards. Various exponents of the monumental styles are often loosely referred to as Kūfī, making it a term that lacks precision and clarity. It describes a group of styles that are marked by an angularity and stark graphic characteristics that are absent from the round scripts that took preeminence from the late 10th, early 11th century CE.
The ‘Abbassīd calligrapher Ibn Muqlah (885/886–940 CE) is recognised for his contribution to the evolution of the round scripts. He articulated a system of proportional relations of Arabic letterforms, which became known as 'The Proportioned Script' (al-khatt al-mansūb), although its precise meaning remains open to interpretation. His work was continued by Ibn al-Bawwāb (d. 1022 CE), and later by Yāqūt al-Musta‘ṣimī (d. 1298 CE), who is credited with refining and canonising six writing styles into their definitive forms. The so-called 'Six Pens' (al-aqlām as-sitta) became the expression of an early high point of Islamic calligraphy. They are grouped in sister scripts of two, in which one is a large, the other a small hand, which share some characteristics. They are (large/small) Thuluth and Naskh, Muhaqqaq and Reyhān, and Tawqi‘ and Riqa‘, and they superceded all preceding styles.
Other cultural centres of Islamic civilization emerged after the fall of the ‘Abbassīds, and developed their distinct calligraphic styles. Of note is the Persian domain, where the styles Ta‘līq and Nasta‘līq emerged and attained their classical form in the 14th century CE. The Ottoman school began with Sheikh Hamdullah in the late 15th century CE, and built on the Arabic and Persian predecessors. It refined existing styles and invented new hands, to achieve a new high point in the arts of Islamic penmanship.
Today, only a handful of styles are still widely in use, and known. The most prominent style is Naskh, which has become the default form of Arabic in most contexts, notably as a model for typography. However, there is strong regional variance. In Iran and Pakistan Nasta‘līq remains the preferred style for Persian and Urdu respectively, and in the Mashriq Ruq‘ah (not to be confused with Riqa‘) retains a prominent role in casual writing, as well as in lettering. In calligraphic art, other styles are still practised, where notably Thuluth is preeminent.
Kūfī is best understood as an umbrella term containing numerous variants, including widely diverging styles such as ornamental Kūfī, square Kūfī, and the so-called Eastern Kūfī, making the term highly ambiguous. The earliest forms of Kūfī are attested from the 7th century CE, making it one of the oldest Arabic writing styles. The Kūfī style that gained prominence in the production of Qur’ān manuscripts from the 7th century CE, also known as ‘Abbassīd style, is characterized by angular forms, with pronounced emphasis of horizontal strokes, very small or closed counter shapes, and uniformity of spacing.
The Maghribi (western) style probably evolved from the ‘Abbassīd style when Islamic conquests advanced through North Africa and into the Iberian peninsula in the 8th century CE. It maintained some structural characteristics from the ‘Abbassīd style and evolved further into a distinct regional hand. Used for writing the Korʼan as well as other scientific, legal and religious
manuscripts. Rabat, a mabsut version of it, is widely used in some official printings in Morocco.
(The third.) Recognizable by the fact that the letters and words are highly
interleaved in its complex form. May be the most difficult style to write (requiring a
significant amount of skill), both in terms of its letters and in terms of its
structure and composition.
One of the clearest styles of all, with clearly distinguished letters which
facilitate reading and pronunciation. Can be written at small sizes (traditionally
using pens made of reeds and ink), which suits the production of longer texts used for
boards and books intended for the general population, especially the Korʼan.
Persian version of Taʻlīq, derived from Naskh and Taʻlīq
and developed in the 8th and 9th centuries. It is like a Taʻlīq but easier to
write and read. Shekasteh Nastaʻlīq (literally means "broken Nastaʻlīq") is
also another derivation of those two, developed in the 15th century.
A handwritten style still commonly used in Arabic countries, and recognisable by its bold-like letters written above the writing line. Designed to be used for education, for everyday writing and adopted in the offices (Diwan) of the Ottoman Empire. One of it's feature is that calligraphers have kept it and did not derived variations from it.
3. Characters and phrases
3.1 Characters & encoding
Arabic script is encoded in the Unicode standard semantically, meaning that every letter receives only a single Unicode character, no matter how many different contextual shapes it may exhibit.
Unicode also has a partial set of non-semantic encoded characters for the Arabic script, under blocks Arabic Presentation Forms-A and Arabic Presentation Forms-B, which are deprecated and should not be used in general interchange.
§ A. Characters lists characters used for the Arabic and Persian languages. Characters used for these languages include letters and diacritics, three sets of digits (usage depending on the region), punctuation (some common and some specific to the script), symbols, and Unicode formatting characters.
The majority of these characters are common among different languages, though there are three different sets of digits for use by different languages. Most of the alphabetical characters are used by all the languages using Arabic scripts, but there are exceptions, such as the Arabic letter yeh being represented with two different characters, U+064A ARABIC LETTER YEH (ي) and U+06CC ARABIC LETTER FARSI YEH (ی). These differences among the character sets of each language are marked in the appendix tables.
Control characters are used to produce the correct spelling of the words or to ensure correct combination with left-to-right content. Consequently, they should be preserved when storing and displaying texts.
3.2 Fonts
Arabic script counts 26 letters, though mostly 19 basic shapes. Since letters change according to their position in the word, Arabic glyph sets may range to more than one hundred shapes. If one counts possible ligatures, and different combinations of joining forms (see above), the number of glyphs can increase further. It is not a given that a typeface design can accommodate all needs, even though some current typefaces can run to hundred of shapes.
Early typefaces, some still in use today, incorporated design features based on a variety of simplifications. For example, one of the first approaches used a "typewriter" style, where the same glyph is used for different positions in a word. This is the case for initial and medial shapes for most letters. It is generally the browser default font for the Arabic script. A more unifying approach is the use of a single and detached glyphs for each letter without joining. Other approaches were used, producing visual results of more or less practicality.
Nowadays, there is a large choice of fonts, and one can choose the font that best suits one's typographical desire. However, one may also wish to take into account some non-typographical considerations like the following:
Font style for titles and banners and alike (small number of words), may differ from the style for content text (long text).
Shapes and proportions (the size issue) in mixed texts.
Some fonts might give other opportunities for line justification than just the use of word spacing (See § 3.2.1 Ligatures).
etc.
3.2.1 Ligatures
Almost all the writing styles of the Arabic script use a special shape when the letters
lam and alef are joined. Most Arabic fonts include mandatory ligatures for this combination. Ignoring this ligature, as shown in Figure 17, leads to incorrectly rendered text.
This shape is not limited to the combination لا [U+0644 ARABIC LETTER LAM + U+0627 ARABIC LETTER ALEF]. Variations of the letter alef such as آ [U+0622 ARABIC LETTER ALEF WITH MADDA ABOVE] and أ [U+0623 ARABIC LETTER ALEF WITH HAMZA ABOVE] when combined with the letter lam follow the same rules. Combination with diacritics does not affect these ligatures. Each of these ligatures also provides a special shape for joining on its right side (to the preceding letter).
3.2.2 Diacritics
More than one diacritic can occur after a single base character and all of them should be visually attached to the same character. Font files usually define special shapes or positioning for combination of diacritics. This extra information should be applied in rendering texts.
Figure 18 shows an example, where, according to this
font’s specification, combining U+0651 ARABIC SHADDA and U+0650 ARABIC KASRA changes their positions. Various font files may require different transformations.
Figure 18Diacritics could be combined in Arabic script.
3.2.3 Positioning diacritics relative to base characters
In Arabic script text it is unusual to use diacritics for vowel information and for
consonant lengthening. If they are used, however, there are different approaches to their placement relative to the base characters they modify. Some fonts display short vowel diacritics at the same height, while others vary the height according to the base
character.
Another potential difference arises when a short i vowel diacritic is used with a shadda. In some cases the vowel diacritic remains below the base letter, whereas in other cases the vowel diacritic appears above the base letter, but under the shadda (so that it can be distinguished from the short a vowel diacritic, which appears above the shadda).
3.3 Direction
Arabic script is written from right to left. Numbers, even Arabic numbers, are written from left to right, as is text in a script that is normally left-to-right.
When the main script is Arabic, the layout and structure of pages and documents are also set from right to left.
3.3.1 Bidirectional text
The Unicode Bidirectional Algorithm (or
bidi algorithm, for short) [BIDI] details an algorithm for rendering right-to-left text and covers a myriad of situations, mixing different kinds of characters. A simpler explanation of the basics of the algorithm exists in the W3C article Unicode Bidirectional Algorithm basics. [UBA-BASICS] You can refer to these documents for more information about Unicode’s bidirectional algorithm.
A brief overview of the bidirectional algorithm follows, because the direction is an essential part of how Arabic script is used.
The characters of a text are digitally stored and transferred in the same order that they are typed by a user. This is the order in which the text is read and pronounced by people and held in memory by software applications, as shown in Figure 19 for a sample text.
Figure 19The order of characters in memory.
But the order used when displaying text is different. The purpose of the bidi algorithm is to find display positions for the characters of a text. These positions are solely used for displaying texts. Figure 20 shows the same sample text when prepared for display with the bidi algorithm.
Figure 20The order of characters when displayed.
An initial step of the process involves determining each paragraph’s base direction: whether the paragraph is left-to-right or right-to-left. The base direction is either explicitly set by the author, inherited from the page, or (typically for user-generated content) detected based on the content of the paragraph. The base direction has two important uses later in the process.
The next step is to split the text into directional runs. Each directional run is a sequence of characters with the same direction.
Figure 21Splitting a text into 3 directional runs.
Inside each run, all the characters follow the same order. The runs themselves are ordered for visual representation from left to right or from right to left, depending on the base direction of the paragraph. Figure 22 demonstrates an example of this. This is the first effect of the base direction.
Figure 22The effect of base direction on the order of runs.
Unicode has a bidi class (or bidi
type) property defined for each character that is used to determine the direction of each character. All the Arabic letters are marked as right-to-left characters, while Latin characters have the left-to-right category.
Some characters, mostly punctuations, are neutral. The
direction of these characters is derived from their surrounding characters. If a neutral character is surrounded by characters of the same direction (e.g. a space surrounded by Arabic letters), it gets the direction of its neighbors. Otherwise (e.g. a space between an Arabic and a Latin, or a neutral character appearing at the start or the end of a paragraph), the neutral character gets its direction from the paragraph’s base direction. This is another effect of the base direction in the bidi algorithm.
3.3.2 Vertical text
In situations where short runs of text run vertically, for example on book spines or in table headers, Arabic text is rotated to run along the line. It may be rotated so that the tops of the letters face to the left (read the text from top to bottom) or to the right (read the text from bottom to top).
Figure 23Vertical Arabic, top-down and bottom-up flow.
The flow of text, top-down vs. bottom-up, may depend on regions or authors. The left
case in Figure 23 is a typically francophone style for book
spines, whereas the right case is an anglophone style.
3.3.2.1 Arabic embedded in vertically orientated text
When Arabic is embedded in body text that is set vertically, such as CJK or Mongolian text, it is also normally rotated so as to run along the line. Typically, the Arabic text will be read from bottom to top of the line.
When the Arabic text spans more than one line, the text is wrapped in the same way as it would be in horizontal text, ie. the first part of the Arabic text is kept on the
first line, and subsequent parts of the Arabic text appear on subsequent lines.
Therefore, in the case of Mongolian, where lines are read left-to-right, the Arabic text lines are also read left-to-right, whereas in Chinese or Japanese, where vertical lines are normally read right-to-left, the Arabic text lines are also read right-to-left.
Figure 24Arabic text embedded in vertical Chinese.
3.3.2.2 Upright vertical Arabic text
There are attested cases of Arabic text arranged vertically with the letters upright, for example in signboards for cinemas or theatres. It is not clear, at this point whether this a standard approach for Arabic text, or just an unusual layout that mimics Western typographic approaches.
Isolated form of letters seems more appropriate here than the joined form.
Diacritic marks, if any, must be applied to letters and not appear on separate
lines.
3.4 Joining
Arabic script is a cursive writing system; i.e, letters can join to their neighboring letters. Besides the core behavior of the script, there are some details on how content is encoded in Unicode, and some rules around joining behavior when rendering special cases.
3.4.1 Joining Forms
Every Arabic letter has one, two, or four different joining forms, which allow the
letter to join to its neighbors, if applicable. These four forms are:
Isolated form, used when the letter does not join to
any of the surrounding letters;
Initial form, used when the letter is joining only to
its next (left-hand side) letter;
Medial form, used when the letter is joining on both
sides, and
Final form, used when the letter is joined only to its
previous (right-hand side) letter.
Figure 26Four different letter forms for joining to surrounding letters.
We define the following two groups of joining forms:
Join-to-left forms: either Initial form or Medial
form of a letter, which joins to the left-hand side (next) letter. Other forms are called non-join-to-left.
Join-to-right forms: either Medial form or Final
form of a letter, which joins to the right-hand side (previous) letter. Other forms are
called non-join-to-right.
3.4.2 Joining Categories
There are different categories of letters based on their joining behavior:
Dual-joining letters: can join from both sides, like the letter in Figure 26, and has all the four shapes mentioned above.
Right-joining letters: can only join to their
previous (right-hand side) letter, and therefore, only have isolated and
final shapes. Figure 27 shows samples of both
forms for U+0631 ARABIC LETTER REH (ر).
Non-joining letters: cannot join to any surrounding
letter, and therefore can only take the isolated form. Figure 28 shows a sample of U+0621 ARABIC LETTER HAMZAH (ء) in
its only possible form.
3.4.3 Joining Rules
There are core rules on how letters join to each other in the Arabic script, which stay valid regardless of the medium (hand-writing, typewriter, movable-type, digital, etc):
Letters of each word join together whenever possible,
implicitly.
In some languages, like Persian and Urdu, there are words—mostly, but not limited to, compound words—that require explicit breaks in the joining of letters, although joining would otherwise be possible.
In certain cases, a letter can be in a join-to-left form
without actually connecting to anything on the left, whether there’s any letter or not.
This is often seen in list counters, abbreviations, and other cases where letters do not have a word context, or are taken out of their original word context.
In rare cases of words splitting where letters are joined, first letter of the second half will be in a join-to-right form without any previous letter. This behavior is limited to special cases like blanking specific letters of a word, line breaks in a paragraph, and word breaks across poetry verses. No standalone word can have any letters in join-to-right form without joining on the right-hand side.
3.4.4 Joining Control
Arabic letters are represented in their intended joining forms in hand-writing,
typewriters, and old (deprecated) digital encodings of the script. In Unicode, letters are encoded semantically—meaning without any information about their joining form—and therefore there’s need for a mechanism for controlling of the joining behavior of the letters.
In Unicode, by default, neighbor Arabic letters join together if and only if both
letters are able to join towards the other.
3.4.4.1 Disjoining Enforcement
As noted in Joining Rule 2, sometimes two Arabic letters sit next to each other (in
one word) which would normally join together, but should not. In Unicode, for such a
case, a special character should be used to enforce disjoining of these letters. This
character is called U+200C ZERO WIDTH NON-JOINER, or
ZWNJ for short.
3.4.4.2 Joining Enforcement
Similarly, as noted in Joining Rule 4, sometimes an Arabic letter needs to take a
joining form when it would not happen normally. For example, some abbreviation methods use Initial Form of letters, when possible, for every letter in the abbreviation. Again, in Unicode, a special character should be used to enforce joining on this letter. This character is called U+200D ZERO WIDTH JOINER, or ZWJ for short.
Besides ZWJ, there’s another special Unicode character, U+0640 ARABIC TATWEEL, which enforces joining behavior (join causing) on
letters next to it. But, in contrast to ZWJ, TATWEEL has a glyph shape, looking like a hyphen and usually as wide as the SPACE glyph, which connects to the letters on the main joining line (a.k.a. base-line). So, using TATWEEL would give a similar Joining Enforcement behavior, but has a side effect of wider length for the letter, which is not always desired. That’s why it’s highly recommended to only use
ZWJ for joining control.
3.4.4.3 Joining-Disjoining Enforcement
Two enforcement methods mentioned above can be combined together to form a
Joining-Disjoining Enforcement method, that enables Joining Rule 3 for cases when there’s a dual-joining/right-joining letter after a join-to-left letter, which
should not be joined to its previous letter.
3.4.4.4 Context-Based Joining
Joining Control is not only managed by the content, but sometimes happens by the word context. For example, a word may be broken between two joined letters because of line break, meaning the content is not changed and only the joining form of letters should be maintained across the break.
3.4.5 Joining Segments
A sequence of letters that join together are called a Joining Segment.
Regardless of language, joining segments have no direct relationship to
syllables.
3.4.7 Special requirements when dealing with cursive glyphs
The cursive nature of the Arabic script requires more attention when applying some visual styles to the texts. It mostly occurs when the implementation assumes letters as separated shapes and does not account for cursive scripts.
3.4.7.1 Joining and Intra-Word Spaces
The only spaces inside Arabic words are created near characters that are not
dual-joining. When adjusting intra-word spaces (i.e. the space inside the words) only these spaces can be adjusted. Moving two joined characters closer to or further from each other creates undesirable results.
3.4.7.2 Transparency
Arabic fonts achieve joining by overlapping letters. A left-joining letter extends out of its bounding box from the left side and a right-joining letter extends out of its bounding box from the right side. Making each letter transparent can expose these
overlapping joinings, which should be avoided. Joining the paths of the joined letter into a single shape can remove the overlappings and create the good results.
Figure 35Applying transparency to Arabic letters should not expose their joining overlaps.
3.4.7.3 Text border
When adding text border, simply adding a border to each letter shape fails to produce the proper result for the Arabic script. A joined letter should not be separated from its joined neighbors by adding border. Like transparency, a way to avoid this is to unify glyph paths into a single big path for all the letters that are joined and add border around that path.
Figure 36Text border should not expose joinings.
3.4.7.4 Styling individual letters
For educational, technical, or even aesthetic reasons, users might want to apply a
specific style to a single letter (or a few letters) in a word. For example, Figure 37 is the logo of the largest telecommunications provider in Oman.
Figure 37Colour changes across joining characters in the logo for Omantel.
This should not break the letter’s joining with its neighbors, as shown in Figure 38.
Figure 38Applying style to a single letter should not interfere with its joining properties.
3.5 Text Segmentation
Similar to alphabetic orthographical conventions of Latin script, word-boundaries in
Arabic script can be distinguished by white space and a specific subset of punctuation
marks.
In case of hand-written Latin script text, the word-space boundaries were introduced
to improve readability of manuscripts. This practice first surfaced in seventh and
eight century CE and was common by thirteenth and fourteenth. [BURNLEY], [SAENGER]
The earliest known example of an Arabic text typeset with movable types which
dates back to 1514, lacks word-space boundaries and shows all characteristics of following the calligraphic tradition. Arabic books typeset by the end of the century show a progression towards using word-space boundaries and by the end of 18th century, the practice is widespread and common.
Regardless of writing systems, since these conventions have emerged over the course of time and as some believe in response to non-orthographic principles of wordhood
[OX-WORD], there are always exceptions existing for them. Some of such special cases and exceptions are detailed below:
"و" conjunction in Arabic orthography;
"ل" before a non-Arabic script noun ("ل W3C");
"ب" before a number in Arabic orthography ("ب 42");
the misuse of space in place of ZWNJ in some Arabic script languages.
Unicode Text Segmentation [UAX29] describes guidelines for determining most significant text boundaries independent of language and orthographic conventions. These guidelines shape a logical set of rules for default boundary determination based on Unicode Standard uniform character model.
Beyond this default boundary determination model, the locale-specific boundary specifications, including cases which require boundary suppression, are available in
[CLDR].
For line segmentation (or more precisely, where line breaks are allowed) see section 4.1 and for details paragraph boundaries see Section 4.3.
3.6 Numbers
3.6.1 Preferred Terminology
Before entering this section in we need to introduce few preferred terminological
conventions for disambiguation and simplicity.
European Numerals are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9. They are also referred to as Western Arabic Numerals or simply as Arabic Numerals. Although these are terminologically correct terms, to avoid
confusions we will refrain from using these phrases to refer to these numerals. European Numerals or ASCII numerals are used instead.
In all Arabic numeral systems, numbers are written with the lowest significant digits to the right and the highest digits to the left (a.k.a. left to right), though Arabic script is written from right to left.
An important fact to note here is the bidirectional category of these numbers.
Particular attention is needed here. Firstly, numbers have a weak directionality with regards to the Bidi algorithm. For example, alongside a number, certain otherwise neutral characters, such as negative/positive sign, currency or degree symbols, are likely to be treated as part of the number rather than a neutral.
Secondly, the placement of the accompanying signs and symbols may depend on the region: generally Middle East (or anglophone) vs. Western (or francophone) regions. This is not to mention punctuation signs.
The percent sign is placed on the left after the number (ie. ٪١٢ not *١٢٪), and without a space (*٪ ١٢). With European numbers, % [U+0025 PERCENT SIGN] is sometimes used, and can be placed either on the right or the left of the digits (eg. 12% or %12).
Arabic decimal and thousand separators obey the same rule as for European numbers (١٬٢٣٤٫٥٦). European signs are used with European numbers (1.234,56 or 1,234.56).
Money or currency signs when they come alongside a number, are placed at the left and treated as part of the number rather than a neutral (€12.3 or €١٢٫٣).
On the other hand, degree signs are placed at the right of the number (37.5° C, ٩٩٫٥° F) or (37.5° م, ۹۹٫۵° ف).
When indicating quantity, there should a separating space (12 كغ, ٤٥ مم).
The same rule applies when using range of values. (12-15 كغ, but 12٪-15٪ كغ).
/ [U+002F SOLIDUS] is used for fractions or ratio notation. Fractions are noted for one-half, say, 2/1 or ٢/١, mostly in RTL mode. There is no standard approach, however, and some region/author may write 1/2 for European digits.
Notation with Solidus sign " / " are used in:
Notation such as speed "50 km/h"
كم/س 50
Notation such as "Page / Volume", for example a reference to a page in a volume
١٢٣/١ for volume ١, page ١٢٣
or reference to Quran "Verse / Surah",
١٣/٩٠ for Surah 90, Verse 13
Mark or rank in a classification
20/15 for rank 15 over 20
Dates (2017/06/24, ٢٠١٧/٠٦/٢٤)
3.7 Considerations for mixed-script text
Arabic ascenders and descenders extend much further than those of the Latin script, and care must be taken to correctly align text in the different scripts when they appear together.
4. Lines and Paragraphs
4.1 Line breaking
When Arabic text doesn't fit within the available line width, the text is wrapped to the next line between words.
In bidirectional text, if a line break occurs between a sequence of words that are progressing in a left-to-right direction the first line will be filled with LTR words that come at the start of the phrase in the order spoken (ie. not the visual order when laid out in a single line). This is because it is never correct to read lines from bottom to top. A similar rearrangement is required when a sequence of right-to-left words is split at the end of a line in an overall LTR context.
4.2 Text alignment & justification
Lines of Arabic script text are normally right aligned within the page.
There are a number of different ways to produce justified text in Arabic. In some cases several of these methods may be combined. In other cases, certain methods are disallowed.
Typical methods include:
Expansion or contraction of inter-word spaces.
Expansion or contraction of intra-word spaces, ie. the space following a character in
the middle of a word that doesn't join with the character that follows it.
Use of wider glyph forms for certain characters.
Stretching of the joins between characters, known as 'kashida'.
Use of ligated forms, to reduce space taken by characters on a line.
Of the four basic justification methods (flush left, flush right, justified, and centered), justified is the most challenging, as it requires changing the widths of the lines to a predefined measure. Measure refers to the width of a column of text. In a justified paragraph the width of all the lines should be the same as the paragraph’s measure, except the last line.
In Arabic there are six mechanisms for changing the width of a line of text. Each one has its limitations and considerations on when and how it can be applied. Furthermore, different typographers and calligraphers have divergent preferences for these mechanisms.
An important factor in the application of these mechanisms is their success in creating an even color. The color of the text refers to the amount of ink (or blackness) used to print or show a block of text. Color describes the density of the text against its background. Poorly justifying paragraphs can create uneven distribution of color.
These mechanisms are not exclusive. Quite the contrary, they are commonly used simultaneously to produce better justified paragraphs. Combination of these mechanisms is discussed in Combination of the Mechanisms.
4.2.1 Adjusting Inter-Word Spaces
This is the same mechanism widely used when justifying Latin scripts, where the width of the spaces between the words can be increased or decreased to change the width of the line.
Figure 39Aligning lines by increasing and decreasing spaces between the words.
A minimum width is defined for how much the space can be shrunk, because putting the words too close to each other creates aesthetic and legibility problems.
Stretching the space too wide is also undesirable, but is utilized as a last resort when it is not possible to use other solutions to make fully justified paragraphs. In some applications a maximum width for the inter-word space is defined as a soft limit (compared to minimum width which is a hard limit). Reaching the maximum width makes the software to try to use other solutions for justification. If no other solution could yield the required
result, the software would fall back to inter-word spacing and stretch the space past the maximum width.
Depending solely on this mechanism for aligning lines in a justified paragraph can lead to unpleasant results, such as rivers (multiple stretched spaces appearing vertically close to each other and forming a white gap inside the paragraph) and uneven distribution of color in the paragraph. Hence, typographers generally use other mechanisms as well to minimize the effect of adjusting inter-word spaces.
4.2.2 Adjusting Intra-Word Spaces
This solution alters the space between letters of each word to change the width of the text. Like adjusting inter-word spaces, this is used for Latin scripts as well, but using it for Arabic script involves considerations specific to Arabic. As noted in Joining and Intra-Word Spaces, the principal consideration is that gaps between characters only exist for those letters that join only to the right, such as dal and reh . Adjustment of intra-word space is not relevant where one letter is joined to its neighbors.
Figure 40Altering intra-word spaces between unjoined letters.
Depending on the writing style and the typeface in use, different amounts of alteration to the intra-word space is acceptable for Arabic. Some writing styles allow more liberal adjustments to the closeness of the letter groups, while others can only accept small adjustments in this regard. In any case, much smaller adjustments can be used for intra-word spacing in comparison for inter-word spacing, which naturally is wider and tolerate bigger adjustments.
4.2.3 Alternative Shapes
In addition to the four joining forms (isolated, initial, medial, and final), each Arabic letter can come with different shapes while preserving its joining form. For instance, a typeface or writing style can offer two or more shapes for the final form of a single letter.
These variant shapes usually have variant widths and hence can be used to adjust the width of the line.
Figure 41Alternative shapes for changing the width of the text.
An advantage of using alternative letter shapes when justifying paragraphs is that it does not involve modifying default properties of the typeface (width of space or other characters). Instead, it is using shapes that are part of the typeface and are in harmony with other shapes in the lines.
But excessive use of alternative shapes, such as using multiple very wide alternatives close to each other, can create unnatural results.
It is not possible to justify paragraphs using only alternative letter shapes, because these shapes have predefined widths. For example, if a line should get 25 points wider, it is impossible to achieve that by using alternative letter shapes that are, say, 10 or 20 or 30 points wider than the default shapes. But these shapes can make the lines closer to measure, thus reducing the usage of other mechanisms.
4.2.4 Ligatures
Some Arabic fonts, following the writing styles that use special shapes when joining certain letters, provide a rich number of ligatures. These ligatures can be used in paragraph justification, since they usually reduce the widths of the words.
Figure 42Various ligatures reducing the widths of the words.
But existence of the ligatures in a font does not mean that they can be used freely. A font may provide some of its ligatures for creating an artistic style, which would be unsuitable for texts requiring optimum legibility.
For that reason, the user should be able to select which sets of ligatures can be used for justification. Fonts can offer predefined sets of ligatures to simplify this process.
4.2.5 Kashida
Kashida refers to extending the horizontal connection between joined letters.
Figure 43Two words extended with kashida.
This is a feature deeply related with the cursive nature of Arabic script. Kashida is an interesting tool for paragraph justification. It is more flexible than alternative letter shapes and ligatures, because it is not restricted to a limited number of predefined widths. At the same time, it has relatively less effect on the text color than spacing.
But a proper implementation of kashida involves a number of limitations and considerations.
Excessive use of kashida or applying very long kashidas results in uneven color. Also, horizontal or vertical proximity of numerous kashida creates an unnatural color.
Figure 44Unpleasant result of excessive use of kashida.
Kashida is not always straight. Some fonts may require curvilinear kashidas, which require more advanced implementations.
Figure 45Curvilinear kashida.
Typographers can have preferred places for applying kashidas. In other words, instead of applying kashida between every joined pair of letters, they want it at certain joins.
Figure 46There are multiple joins in this word, but only one is selected for kashida.
Another preference is avoiding multiple kashidas in a single word.
4.2.6 Tatweel
Tatweel is a dual-joining character that can be inserted between two joined letters to widen their connection. In The Unicode Standard, tatweel is represented as ـ [U+0640 ARABIC TATWEEL].
Figure 47Tatweel.
Tatweel extends letter connections in a fashion similar to kashida, but in a much more limited way. It is a character that has to be in the text or inserted like other characters. It has a predefined width, like any other character.
Yet it is much simpler to implement, since it acts like normal Arabic characters and does not require special treatment. For this reason, it can be considered useful specially in constrained implementations like fixed-width environments.
4.2.7 Combination of the Mechanisms
Each of the above six mechanisms have their own limitations and side effects. Utilizing only one of them for justifying paragraphs can create undesirable results. Multiple mechanisms can be used at the same time to work around their limitations and minimize their side effects.
Since Arabic provides various mechanisms that can be used for justification, an advanced implementation that supports all or most of the above features can produce exemplary justifications. More limited applications can combine what is available.
Preferences for each mechanisms can depend on the document and text and the preference of the typographers and users. Implementations can enable users to prioritize and control the mechanisms mentioned above.
4.3 Letter-spacing
There are situations where Arabic text is stretched for reasons other than justification. Common instances include:
In a heading, or a word on a street sign to make it more visible.
Alongside a transcriptions, to make Arabic text the same width.
To mimic voiced emphasis or drawn out sounds
These instances do not correspond to letter-spacing in non-cursive scripts, however. Apart
from the fact that the stretching is indicated by stretching the baseline between characters,
the stretching is not usually equidistant between all characters in the stretched text.
4.4 Counters, lists, etc
Arabic script text may use special counter styles for lists, numbering headings, pages, etc., based on Arabic script characters.
A. Characters
The following tables list Unicode characters used for Arabic script. Each table has two
columns named Ar and Fa which denote
which characters are used for Arabic or Persian languages, respectively. The content of these
columns is one of these symbols:
✓ means that the character is used for that
language.
✲ means that the character is auxiliary for that
language.
✕ means that the character is not used for that
language.
A.1 Alphabetical characters
Character
UCS
Name
Ar
Fa
ء
U+0621
ARABIC LETTER HAMZA
✓
✓
آ
U+0622
ARABIC LETTER ALEF WITH MADDA ABOVE
✓
✓
أ
U+0623
ARABIC LETTER ALEF WITH HAMZA ABOVE
✓
✓
ؤ
U+0624
ARABIC LETTER WAW WITH HAMZA ABOVE
✓
✓
إ
U+0625
ARABIC LETTER ALEF WITH HAMZA BELOW
✓
✲
ئ
U+0626
ARABIC LETTER YEH WITH HAMZA ABOVE
✓
✓
ا
U+0627
ARABIC LETTER ALEF
✓
✓
ب
U+0628
ARABIC LETTER BEH
✓
✓
ة
U+0629
ARABIC LETTER TEH MARBUTA
✓
✓
ت
U+062A
ARABIC LETTER TEH
✓
✓
ث
U+062B
ARABIC LETTER THEH
✓
✓
ج
U+062C
ARABIC LETTER JEEM
✓
✓
ح
U+062D
ARABIC LETTER HAH
✓
✓
خ
U+062E
ARABIC LETTER KHAH
✓
✓
د
U+062F
ARABIC LETTER DAL
✓
✓
ذ
U+0630
ARABIC LETTER THAL
✓
✓
ر
U+0631
ARABIC LETTER REH
✓
✓
ز
U+0632
ARABIC LETTER ZAIN
✓
✓
س
U+0633
ARABIC LETTER SEEN
✓
✓
ش
U+0634
ARABIC LETTER SHEEN
✓
✓
ص
U+0635
ARABIC LETTER SAD
✓
✓
ض
U+0636
ARABIC LETTER DAD
✓
✓
ط
U+0637
ARABIC LETTER TAH
✓
✓
ظ
U+0638
ARABIC LETTER ZAH
✓
✓
ع
U+0639
ARABIC LETTER AIN
✓
✓
غ
U+063A
ARABIC LETTER GHAIN
✓
✓
ف
U+0641
ARABIC LETTER FEH
✓
✓
ق
U+0642
ARABIC LETTER QAF
✓
✓
ك
U+0643
ARABIC LETTER KAF
✓
✲
ل
U+0644
ARABIC LETTER LAM
✓
✓
م
U+0645
ARABIC LETTER MEEM
✓
✓
ن
U+0646
ARABIC LETTER NOON
✓
✓
ه
U+0647
ARABIC LETTER HEH
✓
✓
و
U+0648
ARABIC LETTER WAW
✓
✓
ى
U+0649
ARABIC LETTER ALEF MAKSURA
✓
✲
ي
U+064A
ARABIC LETTER YEH
✓
✲
ٯ
U+066F
ARABIC LETTER DOTLESS QAF
✲
✕
ٱ
U+0671
ARABIC LETTER ALEF WASLA
✕
✲
پ
U+067E
ARABIC LETTER PEH
✲
✓
چ
U+0686
ARABIC LETTER TCHEH
✲
✓
ژ
U+0698
ARABIC LETTER JEH
✲
✓
ڜ
U+069C
ARABIC LETTER SEEN WITH THREE DOTS BELOW AND THREE DOTS ABOVE
✲
✕
ڢ
U+06A2
ARABIC LETTER FEH WITH DOT MOVED BELOW
✲
✕
ڤ
U+06A4
ARABIC LETTER VEH
✲
✕
ڥ
U+06A5
ARABIC LETTER FEH WITH THREE DOTS BELOW
✲
✕
ڧ
U+06A7
ARABIC LETTER QAF WITH DOT ABOVE
✲
✕
ڨ
U+06A8
ARABIC LETTER QAF WITH THREE DOTS ABOVE
✲
✕
ک
U+06A9
ARABIC LETTER KEHEH
✲
✓
گ
U+06AF
ARABIC LETTER GAF
✲
✓
ی
U+06CC
ARABIC LETTER FARSI YEH
✲
✓
A.2 Diacritics
Character
UCS
Name
Ar
Fa
U+064B
ARABIC FATHATAN
✓
✓
U+064C
ARABIC DAMMATAN
✓
✓
U+064D
ARABIC KASRATAN
✓
✓
U+064E
ARABIC FATHA
✓
✲
U+064F
ARABIC DAMMA
✓
✲
U+0650
ARABIC KASRA
✓
✲
U+0651
ARABIC SHADDA
✓
✓
U+0652
ARABIC SUKUN
✓
✲
U+0653
ARABIC MADDAH ABOVE
✕
✲
U+0654
ARABIC HAMZA ABOVE
✕
✓
U+0655
ARABIC HAMZA BELOW
✕
✲
U+0670
ARABIC LETTER SUPERSCRIPT ALEF
✕
✓
A.3 Numeral characters
Character
UCS
Name
Ar
Fa
٠
U+0660
ARABIC-INDIC DIGIT ZERO
✓
✕
١
U+0661
ARABIC-INDIC DIGIT ONE
✓
✕
٢
U+0662
ARABIC-INDIC DIGIT TWO
✓
✕
٣
U+0663
ARABIC-INDIC DIGIT THREE
✓
✕
٤
U+0664
ARABIC-INDIC DIGIT FOUR
✓
✕
٥
U+0665
ARABIC-INDIC DIGIT FIVE
✓
✕
٦
U+0666
ARABIC-INDIC DIGIT SIX
✓
✕
٧
U+0667
ARABIC-INDIC DIGIT SEVEN
✓
✕
٨
U+0668
ARABIC-INDIC DIGIT EIGHT
✓
✕
٩
U+0669
ARABIC-INDIC DIGIT NINE
✓
✕
۰
U+06F0
EXTENDED ARABIC-INDIC DIGIT ZERO
✕
✓
۱
U+06F1
EXTENDED ARABIC-INDIC DIGIT ONE
✕
✓
۲
U+06F2
EXTENDED ARABIC-INDIC DIGIT TWO
✕
✓
۳
U+06F3
EXTENDED ARABIC-INDIC DIGIT THREE
✕
✓
۴
U+06F4
EXTENDED ARABIC-INDIC DIGIT FOUR
✕
✓
۵
U+06F5
EXTENDED ARABIC-INDIC DIGIT FIVE
✕
✓
۶
U+06F6
EXTENDED ARABIC-INDIC DIGIT SIX
✕
✓
۷
U+06F7
EXTENDED ARABIC-INDIC DIGIT SEVEN
✕
✓
۸
U+06F8
EXTENDED ARABIC-INDIC DIGIT EIGHT
✕
✓
۹
U+06F9
EXTENDED ARABIC-INDIC DIGIT NINE
✕
✓
A.4 Punctuations and symbols
Character
UCS
Name
Ar
Fa
U+0020
SPACE
✕
✓
!
U+0021
EXCLAMATION MARK
✓
✓
"
U+0022
QUOTATION MARK
✓
✕
'
U+0027
APOSTROPHE
✓
✕
(
U+0028
LEFT PARENTHESIS
✓
✓
)
U+0029
RIGHT PARENTHESIS
✓
✓
*
U+002A
ASTERISK
✕
✓
+
U+002B
PLUS SIGN
✓
✓
,
U+002C
COMMA
✓
✓
-
U+002D
HYPHEN-MINUS
✓
✓
.
U+002E
FULL STOP
✓
✓
/
U+002F
SOLIDUS
✕
✓
:
U+003A
COLON
✓
✓
;
U+003B
SEMICOLON
✓
✓
<
U+003C
LESS-THAN SIGN
✕
✓
=
U+003D
EQUALS SIGN
✕
✓
>
U+003E
GREATER-THAN SIGN
✕
✓
?
U+003F
QUESTION MARK
✓
✓
[
U+005B
LEFT SQUARE BRACKET
✓
✓
A.5 Control characters
Character
UCS
Name
Ar
Fa
U+000A
<control>
✕
✓
U+000D
<control>
✕
✓
U+200C
ZERO WIDTH NON-JOINER
✕
✓
U+200D
ZERO WIDTH JOINER
✕
✓
U+200E
LEFT-TO-RIGHT MARK
✲
✲
U+200F
RIGHT-TO-LEFT MARK
✲
✲
U+2028
LINE SEPARATOR
✕
✲
U+2029
PARAGRAPH SEPARATOR
✕
✲
U+202A
LEFT-TO-RIGHT EMBEDDING
✕
✲
U+202B
RIGHT-TO-LEFT EMBEDDING
✕
✲
U+202C
POP DIRECTIONAL FORMATTING
✕
✲
U+202D
LEFT-TO-RIGHT OVERRIDE
✕
✲
U+202E
RIGHT-TO-LEFT OVERRIDE
✕
✲
U+2060
WORD JOINER
✕
✓
U+2066
LEFT-TO-RIGHT ISOLATE
✕
✲
U+2067
RIGHT-TO-LEFT ISOLATE
✕
✲
U+2068
FIRST STRONG ISOLATE
✕
✲
U+2069
POP DIRECTIONAL ISOLATE
✕
✲
U+FEFF
ZERO WIDTH NO-BREAK SPACE
✕
✓
Unicode 6.3 introduced directional isolate characters to replace the more complicated
directional embedding characters. These new characters are in the process of being supported
in applications and their usage is encouraged over the old embedding characters. U+202A LEFT-TO-RIGHT EMBEDDING, U+202B RIGHT-TO-LEFT
EMBEDDING, U+202C POP DIRECTIONAL FORMATTING, U+202D LEFT-TO-RIGHT OVERRIDE, U+202E RIGHT-TO-LEFT
OVERRIDE are the old embedding characters and U+2066 LEFT‑TO‑RIGHT
ISOLATE, U+2067 RIGHT‑TO‑LEFT ISOLATE, U+2068 FIRST STRONG ISOLATE, and U+2069 POP DIRECTIONAL
ISOLATE are the new isolate characters.
Also, character U+FEFF ZERO WIDTH NO-BREAK SPACE is deprecated
and should be replaced with U+2060 WORD JOINER.
B. Glossary
Term
Arabic
Transliterated Arabic
Persian
Transliterated Persian
Definition
abbreviation
اِخْتِزَالْ
ikhtizāl
alignment
مُحَاذَاةْ، تَرصِيف
muḥādhāt, tarṣīf
همترازی
hmtrāzi
alphanumeric
أَبجَدِي عَدَدِي
abjadī ʻadadī
الفبایی عددی
ālfbāiy addi
appendix
مُلحَق
mulḥaq
ضمیمه
zmimh
arabic numerals
أَرْقَامْ عَرَبِيَّة، أَرْقَامْ أُورُوبِيَّة
arqām ʻarabīyah, arqām ūrūbīyah
ارقام عربی
ārqām arbi
Refer to "European numerals". Use "European numerals" or "ASCII numerals" to avoid
confusion.
ascender
جُزْءُ الحَرْفِ العُلْوِي، الصَّاعِدْ
juz’u al-ḥarfi al-ʻulwī, al-ṣṣāʻid
خط صعود، کرسی بالا
xt s’ud, krsi bālā
asterisk
نَجْمَة
najmah
ستاره
stārh
auto spacing
تَبَاعُدْ ذَاتِي، فَرَاغْ آلِي
tabāʻud dhātī, farāgh ālī
فاصلهگذاری خودکار
fāslhɡzāri xudkār
back margin
الهَامِشْ الخَلْفِي
al-hāmish al-khalfī
حاشیهٔ داخلی
hāšihٔ dāxli
back matter
بَيَانَاتْ نِهَايَةْ الكِتَابْ
bayānāt nihāyat al-kitāb
واحدهای پس از متن
uāhdhāy ps aoez mtn
Appendices, supplements, glossary of terms, index and/or bibliography, and so on,
appended at the end of a book.
bad break
قَطْعْ سَيِّئْ
qaṭʻ sayyi’
شکستن بد، سطرشکنی بد
škstn bd, strškni bd
baseline
خَطْ قَاعِدِي، خَطْ الاِرْتِكَازْ، سَطْرُ الأَسَاسْ
khaṭ qāʻidī, khaṭ al-irtikāz, satru al-’asās
خط کرسی
xt krsi
A virtual line on which almost all glyphs in Western fonts are designed to be
aligned.
bibliography
المَرَاجِعْ
al-marājiʻ
کتابنامه
ktābnāmh
A list of works and papers related to the subjects in the text.
blank page
صَفْحَة فَارِغَة
ṣafḥah fārighah
صفحهٔ خالی
sfhhٔ xāli
An empty page.
bleed
خَارِجْ إِطَارْ الصَّفْحَة
khārij iṭār al-ṣafḥah
تصویرْ تا بُرِش
tsuyrْ tā boreš
To print a picture or a tint to run off the edge of a trimmed page.
block direction
اِتِّجَاهْ المَقْطَعْ، اِتِّجَاهْ الكُتْلَة
ittijāh al-maqṭaʻ, ittijāh al-kutlah
جهت نوشتار
jht nuštār
The progression direction of lines, one after the other.
block quotation
كُتْلَة اِقْتِبَاسْ، مُرَبَّعْ اِقْتِبَاسْ
kutlat iqtibās, murabbaʻ iqtibās
نقلقول پاراگرافی
nqlqul pārāɡrāfi
body type
الخَطْ الرَّئِيسِي
al-khaṭ al-rra’īsī
حروف بدنه
hruf bdnh
bold
غَلِيظْ
ghalīẓ
حرف سیاه
hrf siāh
A kind of font style. Similar to bold in Western typography.
boldface
خَطْ غَلِيظْ
khaṭ ghalīẓ
حرف سیاه
hrf siāh
bound on the left-hand side
مُلْزِمَة عَلَى الجَانِبْ الأَيْسَرْ
mulzimah ʻalá al-jānib al-’aysar
صحافی چپبهراست
shāfi čpbhrāst
Binding of a book to be opened from the left.
bound on the right-hand side
مُلْزِمَة عَلَى الجَانِبْ الأَيْمَنْ
mulzimah ʻalá al-jānib al-’ayman
صحافی راستبهچپ
shāfi rāstbhčp
Binding of a book to be opened from the right.
bounding box
المُرَبَّعْ المُحِيطْ
al-murabbaʻ al-muḥīṭ
کادر محیطی
kādr mhiti
box
مُرَبَّعْ
murabbaʻ
کادر، جعبه
kādr, j’bh
braces
قَوْسَيْنْ
qawsayn
آکولاد
ākulād
{ and }
brackets
قوسين قَوْسَيْنْ مُرَبَّعَيْنْ
qawsayn murabbaʻayn
کروشه
krušh
[ and ]
break (a line)
فَصْلْ السَّطْرْ، قَطْعْ (سَطْرْ)
faṣl al-saṭr, qaṭʻ (saṭr)
شکستن (خط)، سطرشکنی
škstn (xt), strškni
To place the first of two adjacent characters at the end of a line and the second at
the head of a new line.
broadside
وَرَقَة عَلَى صَفْحَة عَرِيضَة
waraqah ʻalá ṣafḥah ʻarīḍah
یکرو
ikru
In book typography, a sheet of paper printed as one page.
bullet
رَمْزْ نَقْطِي
ramz naqṭī
centered dot
calligraphy
فَنُّ الخَطِّ، الخَطُّ (فَنْ الخَطْ، الخَطْ)
fannu al-khaṭṭi, al-khaṭṭu (fan al-khaṭ,
al-khaṭ)
خوشنویسی
xušnuysi
caption
تَسْمِيَة، عُنْوَانْ
tasmīah, ʻunwān
عنوان، شرح
’nuān, šrh
A title or a short description accompanying a picture, an illustration, or a
table.
cell
خَلِيَة
khalīah
سلول
slul
Each element area of tables, cell.
cell contents
مُحْتَوَى الخَلِيَة
muḥtawá al-khalīah
محتوای سلول
mhtuāy slul
The content of each cell in tables.
cell padding
حَشْوْ الخَلِيَة
ḥashw al-khalīah
Spaces between line and cell in tables.
centered alignment
تَوْسِيطْ
tawsīṭ
ترازبندی وسطچین
trāzbndi vstčin
centered dot
نُقْطَة مُوَسَّطَة
nuqṭah mūassaṭah
centering
تَوْسِيطْ
tawsīṭ
وسطچین کردن
ustčin krdn
To align the center of a run of text that is shorter than a given line length to the
center of a line.
chapter
فَصْلْ، بَابْ
faṣl, bāb
فصل
fsl
character
حَرْفْ
ḥarf
حرف
hrf
character count
عَدَدْ الحُرُوفْ
ʻadad al-ḥurūf
تعداد حروف
t’dād hruf
character frame
إِطَارْ الحَرْفْ
iṭār al-ḥarf
Rectangular area occupied by a character when it is set solid.
character set
مَجْمُوعَةْ حُرُوفْ
majmūʻat ḥurūf
مجموعهٔ حروف
mjmu’hٔ hruf
character shape
شَكْلُ الحَرْفْ
shaklu al-ḥarf
شکل حرف
škl hrf
Incarnation of a character by handwriting, printing or rendering to a computer
screen.
character size
حَجْمُ الحَرْفْ
ḥajmu al-ḥarf
اندازهٔ حرف
āndāzhٔ hrf
Dimensions of a character. Unless otherwise noted, it refers to the size of a
character frame in the block direction.
closing bracket
قَوْسْ إِغْلَاقْ
qaws ighlāq
کروشه بسته
kruše bsth
code point
نُقْطة تَرْمِيزْ
nuqṭat tarmīz
color
لَوْنْ
lawn
Characteristics like darkness, contrast, texture that give the an overall
impression of how dense or heavy the text appears on the page.
colon
نُقْطَتَيْنْ
nuqṭatayn
دونقطه
dunqth
column
عَمُودْ
ʻamūd
ستون
stun
A partition on a page in multi-column format.
column gap
تَبَاعُدْ الأَعْمِدَة
tabāʻud al-’aʻmidah
فاصلهٔ ستون
fāslhٔ stun
Amount of space between columns on a page.
column spanning
عَبْرُ الأَعْمدَة
ʻabr al-’aʻmidah
A setting style of illustrations, tables, etc., over hanging to multiple
columns.
column spanning heading
رَأْسْ عَبْرْ الأَعْمدَة
ra’s ʻabr al-’aʻmidah
Headings using multiple columns.
comma
فَاصِلَة
fāṣilah
ویرگول
uyrɡul
composition
تَرْكِيبْ
tarkīb
حروفچینی و صفحهبندی
hrufčini v sfhhbndi
Process of arrangement of text, figures and/or pictures, etc on a page in a desired
layout (design) in preparation for printing.
compound word
كَلِمَة مُرَكَّبَة
kalimah murakkabah
کلمهٔ مرکب
klmhٔ mrkb
connection
وَصْلْ
waṣl
continuous pagination
تَرْقِيمْ الصَّفَحَاتْ المُسْتَمِرْ
tarqīm al-ṣṣafaḥāt al-mustamir
صفحهشماری پیوسته
sfhhšmāri pivsth
a) To number the pages of a book continuously across all those in the front matter,
the text and the back matter. b) To number the pages continuously across those of all
books, such as a series published in separate volumes. Also to number the pages
continuously across those of all issues of a periodical published in a year, aside from
pagination per issue.
control characters
حُرُوفْ تَحَكُّمْ
ḥurūf taḥakkum
حروف کنترلی
hruf kntrli
copy
نُسْخَة
nuskhah
نسخه
nsxh
cover
غِلَافْ
ghilāf
جلد
jld
cut-in heading
A style of headings. Headings do not occupy the full lines, but share lines area with
following main text lines.
dash
وَاصِلَة
wāṣilah
dedication
إِهْدَاءْ
ihdā’
اهدائیه
āhdā’ih
descender line
مَا تَحْتَ السَّطْرْ
mā taḥta al-ssaṭr
A descender is the part of a letter extending below the base line, as in 'g', 'j',
'p', 'q', or 'y'. A descender line is a virtual line drawn at the bottom of descender
parallel to base line.
diacritical marks
علامات التشكيل
ʻalāmāt al-ttashkīl
اِعراب، نشانههای حروف
āe’rāb, nšānhhāy hruf
diagonal fraction
جُزْءْ قُطْرِي
juz’ quṭrī
diagram
رَسْمْ بَيَانِي، رَسْمْ تَخْطِيطِي
rasm bayānī, rasm takhṭīṭī
نمودار
nmudār
disconnection
فَصْلْ
faṣl
discretionary hyphen
وَاصِلَة لَيِّنَة
wāṣilah layyinah
See soft hyphen.
display
عَرْضْ
ʻarḍ
نمایش
nmāyš
display type
نَوْعْ العَرْضْ
nawʻ al-ʻarḍ
document
وَثِيقَة، مُسْتَنَدْ
wathīqah, mustanad
سند
snd
dpi
نُقْطَة فِي البُوصَة
nuqṭah fī al-būṣah
نقطه در اینچ
nqte dr ieynč
Dots per inch (DPI, or dpi) is a measure of spatial printing.
eastern arabic numerals
الأَرقَامْ العَرَبِيَّة المَشْرِقِيَّة
al-’arqām al-ʻarabīyah al-mashriqīyah
٠ ١ ٢ ٣ ٤ ٥ ٦ ٧ ٨ ٩
ellipsis
عَلَامَة القَطْع، القَطْعْ
ʻalāmat al-qaṭʻ, al-qaṭʻ
سهنقطه
shnqth
Elongation
التَّطْوِيلْ
al-ttaṭwīl
EM
(وَحَدَةْ قِيَاسْ) إِمْ، وَحَدَةْ قِيَاسْ النُقْطَة
(waḥadah qīās) im, waḥadat qīās al-nuqṭah
اِم، ضربه
āem, zrbh
Unit in the field of typography, equal to the currently specified point size. A
reference to the width of the capital "M"
em dash
خَطْ فاصِلْ مِنْ حَجْمْ اِمْ، وَصْلَة طَوِيلَة
khaṭ fṣil min ḥajm im, waṣlah ṭawīlah
خط
xt
A wide dash, usually of size EM
em space
فَرَاغْ مِنْ حَجْمْ اِمْ، فَرَاغْ طَوِيلْ
farāgh min ḥajm im, farāgh ṭawīl
فاصلهٔ اِم
fāslhٔ em
A wide space, usually of size EM
EN
نصف وحدة قياس النقطة
niṣf waḥadat qīās al-nuqṭah
اِن
āen
???
en dash
وَصْلَة مُتَوَسِّطَة
waṣlah mutawassiṭah
خط اِن
xt en
A not-so-wide dash, usually of size EN
en space
مَسَافَة مُتَوَسِّطَة
masāfah mutawassiṭah
فاصلهٔ اِن
fāslhٔ en
A not-so-wide space, usually of size EN
encoding
تَرْمِيزْ
tarmīz
کدنگاری
kdnɡāri
endnote
التَّعْلِيقْ الخِتَامِي، حَاشِيَة
al-ttaʻlīq al-khitāmī, ḥāshīah
A set of notes placed at the end of a part, chapter, section, paragraph and so on, or
at the end of a book.
epigraph
اِقْتِبَاسْ، مَقُولَة قَصِيرَة
iqtibās, maqūlah qaṣīrah
سرلوحه
srluhh
European numerals
أَرْقَامْ أُورُوبِيَّة
arqām ūrūbīyah
ارقام اروپایی
ārqām aoerupāiy
Any of the symbols in [0-9] used to represent numbers. Sometimes called Arabic
numerals or ASCII numerals.
exception dictionary
قَامُوسْ الإِسْتِثْنَاءَاتْ
qāmūs al-’istithnā’āt
exclamation marks
عَلَامَاتْ التَّعَجُّبْ
ʻalāmāt al-ttaʻajjub
علامت تعجب
’lāmt t’jb
figure
شَكْلْ
shakl
تصویر
tsuyr
first-line indent
مَسَافَة السَّطْرْ الأَوَّلْ
masāfat al-ssaṭr al-’awwal
تورفتگی خط اول
turftɡi xt uowl
fixed-width
ثَابِتْ العَرْضْ
thābit al-ʻarḍ
A characteristic of a font where the same character advance is assigned for all
glyphs.
flush left alignment
مُحَاذَاة إِلَى اليَمِينْ
muḥādhāt ilá al-yamīn
flush right alignment
مُحَاذَاة إِلَى اليَسَارْ
muḥādhāt ilá al-yasār
folio
وَرَقَة، صَفْحَة
waraqah, ṣafḥah
شمارهٔ صفحه
šmārhٔ sfhh
font
الخَطْ
al-khaṭ
فونت، قلم
funt, qlm
A set of character glyphs of a given typeface.
font family/typeface family
أُسْرَة مِحْرَفْ، أُسْرَة خُطُوطْ
usrat miḥraf, usrat khuṭūṭ
خانوادهٔ فونت
xānuādhٔ funt
font metrics
مَقَايِيسْ الخَطْ
maqāyīs al-khaṭ
foot
تَذْيِيلْ
tadhyīl
پایه
pāyh
a) The bottom part of a book or a page. b) The bottom margin between the edge of a
trimmed page and the hanmen (text area)
foot/bottom margin
الهاَمِشْ الأَسْفَلْ
al-hamish al-’asfal
حاشیهٔ پایینی
hāšihٔ pāiyni
footer
تَذْيِيلْ الصَّفْحَة
tadhyīl al-ṣṣafḥah
پاصفحه
pāsfhh
footnote
حَاشِيَة سَفْلِيَة
ḥāshīah saflīyah
پانویس
pānuys
A note in a smaller face than that of main text, placed at the bottom of a page.
fore-edge
الحَافة العَمودِيَّة الخَارِجِيَّة
al-ḥāfh al-ʻamwdīyah al-khārijīyah
حاشیهٔ بیرونی
hāšihٔ biruni
a) The three front trimmed edges of pages in a book. b) The opposite sides of the
gutter in a book.
format
تنْسِيقْ، هَيْئَة
tansīq, hay’ah
شکلبندی، شکل
šklbndi, škl
fraction
كَسْرْ
Kasr
front matter
المَادَّة الأَمَامِيَّة
al-māddah al-’amāmīyah
واحدهای پیش از متن
uāhdhāy piš aoez mtn
The first part of a book followed by the text, usually consisting of a forward,
preface, table of contents, list of illustrations, acknowledgement and so on.
full-width
تَامْ العَرْضْ
tām al-ʻarḍ
a) Relative index for the length which is equal to a given character size. b)
Character frame which character advance is equal to the amount referred to as a). A
full-width character frame is square in shape by definition.
glyph
صُورَةْ الرَّمْزْ
ṣūrah al-rramz
golden rectangle
مستطیل طلایی
msttil tlāiy
golden section
بخش طلایی
bxš tlāiy
Greek letters
حُرُوفْ يُونَانِيَّة
ḥurūf yūnānīyah
حروف یونانی
hruf yvnāni
grid alignment
همترازی شطرنجی
hmtrāzi štrnji
gutter
حَاشِیَة
ḥāshīah
حاشیه
hāših
a) The binding side of a spread of a book. b) the margin between the binding edge of
a book and the hanmen (text area). c) The part of a book where all pages are bound
together to the book spine.
half em
نِصْفْ اِمْ
niṣf im
نیم اِم
nim em
Half of the full-width size.
half em space
فَرَاغْ نِصْفْ اِمْ
farāgh niṣf im
فاصلهٔ نیم اِم
fāslhٔ nim em
Amount of space that is half size of em space.
hang line
سَطْرْ مُعَلَّقْ
saṭr muʻallaq
hanging indentation
تعليق المسافة البادئة
hanging punctuation
تعليق علامات الترقيم
harakat
حَرَكَاتْ
ḥarakāt
Tashkil marks representing short vowel sounds.
head
رَأْسْ
ra’s
سَر
sar
a) The top part of a book or a page. b) The top margin between the top edge of a
trimmed page and the hanmen (text area)
head/top margin
هَامِشْ عُلْوِي
hāmish ʻulwī
حاشیهٔ بالا
hāšihٔ bālā
header
رَأْسْ
ra’s
سرصفحه
srsfhh
heading
عُنْوَانْ
ʻunwān
عنوان
’nuān
a) A title of a paper or an article. b) A title for each section of a book, paper or
article.
headline
عُنْوَانْ رَئِيسِي
ʻunwān ra’īsī
headnote
تَقْدِمَة
taqdimah
A kind of notes in vertical writing style, head area in kihon-hanmen is kept
beforehand, and notes are set with smaller size font than main text.
hierarchy
تسلسل هرمي، ترتيب هرمي
سلسلهمراتب
slslhmrātb
horizontal writing mode
صِيغَة الكِتَابَة الأُفُقِيَّة
ṣīghat al-kitābah al-’ufuqīyah
حالت نوشتار افقی
hālt nuštār aoefqi
The process or the result of arranging characters on a line from left to right, of
lines on a page from top to bottom, and/or of columns on a page from left to right.
hyphen
وَاصِلَة
wāṣilah
نیمخط
nimxt
hyphenation
اِسْتِخْدَامْ الوَاصِلَة
istikhdām al-wāṣilah
A method of breaking a line by dividing a Western word at the end of a line and
adding a hyphen at the end of the first half of the syllable.
hyphenation and justification
الوَاصِلَة وَالمُحَاذَاةْ
al-wāṣilah wālmuḥādhāt
Also abbreviated as H&J
hyphenation routine
إِجْرَاءْ الوَاصِلَة
ijrā’ al-wāṣilah
ihmal
إِهْمَالْ
ihmāl
See tashkil
ijam
إِعْجَامْ
iʻjām
Diacritical marks applied to a basic letter shape (or skeleton) to derive a new
letter. For example a dot under a "curve" to get the letter Beh. In Unicode each letter
plus ijam combination is encoded as a separate, atomic character.
illustrations
رَسْمْ تَوْضِيحِي، صُورَة إِيضَاحِيَّة
rasm tawḍīḥī, ṣūrahīḍāḥīyah
تصویر
tsuyr
A general term referring to a diagram, chart, cut, figure, picture and the like, to
be used for printed materials.
indentation
إِزَاحَة، مَسَافَة بَادِئَة
izāḥah, masāfah bādi’ah
فاصلهٔ سرِ سطر، تورفتگی سرِ سطر
fāslhٔ sre str, turftɡi sre str
independent pagination
تَرْقِيمْ الصَّفَحَاتْ مُسْتَقِلْ
tarqīm al-ṣṣafaḥāt mustaqil
صفحهبندی مستقل
sfhhbndi mstql
To number the pages of the front matter, the text and the back matter
independently.
index
فِهْرِسْ
fihris
فهرست راهنما
fhrst rāhnmā
A list of terms or subjects with page numbers for where they are referred to in a
single or multiple volumes of a book.
initial
أَوَّلِي
awwalī
آغازین
āqāzin
inline direction
الاِتِّجَاهْ السَّطْرِي
al-ittijāh al-ssaṭrī
Text direction in a line.
input
إِدْخَالْ
idkhāl
ورودی
urudi
inseparable characters rule
قَاعِدَة مَحَارِفْ لَا تَنْفَصِلْ
qāʻidat maḥārif lā tanfaṣil
A line adjustment rule that prohibits inserting any space between specific
combinations of characters.
interpunct
italics
مَائِلْ
mā’il
ایتالیک
āytālik
itemization
وَضْعْ بُنُودْ، تَبْوِيبْ، عَنَاصِرْ
waḍʻ bunūd, tabwīb, ʻanāṣir
To list ordered or unordered items one under the other.
justified alignment
مُحَاذَاةْ مَضْبُوطَة
muḥādhāt maḍbūṭah
همترازی میزان
hmtrāzi mizān
kashida
الْكَشِيدَة، التَّطْوِيلْ
al-kashīdah, al-ttaṭwīl
کشیده
kšidh
label name
اِسْمْ بِطَاقَةْ العَنْوَنَة
ism biṭāqat al-ʻanwanah
Text following or followed by numbers for illustrations, tables, headings and running
headings.
Latin letters
حُرُوف لَاتِينِيَّة
ḥurūf lātīnīyah
حروف لاتین
hruf lātin
layout
نَسْقْ، تَصْمِيمْ
nasq, taṣmīm
قالببندی
qālbbndi
leading
قِيَادِي
qīādī
letter face
صُورَةْ الحَرْفْ
ṣūrat al-ḥarf
Area in which glyph is drawn.
lettering
تَرْقِينْ، كِتَابَة
tarqīn, kitābah
طراحی حروف
trāhi hruf
letterpress printing
طِبَاعَةْ الحُرُوفْ
ṭibāʻat al-ḥurūf
چاپ برجسته
čāp brjsth
The traditional printing method using movable type.
letterspacing
تَبَاعُدْ الحُرُوفْ
tabāʻud al-ḥurūf
فاصلهٔ حروف
fāslhٔ hruf
ligature
رَبْطْ بَيْنَ الحُرُوفْ، تَرْكِيبْ، حَرْفْ مُرَكَّبْ
rabṭ bayna al-ḥurūf, tarkīb, ḥarf murakkab
line
سَطْرْ
saṭr
خط
xt
line adjustment
مُحَاذَاةْ السَّطْرْ
muḥādhāt al-ssaṭr
تنظیم خط
tnzim xt
A method of aligning both edges of all lines to be the same given length by removing
or adding adjustable spaces.
line adjustment by hanging punctuation
مُحَاذَاة السَّطْرْ بِتَعْلِيقْ عَلَامَاتْ التَّرْقِيمْ
muḥādhāt al-ssaṭr bitaʻlīq ʻalāmāt al-ttarqīm
A line breaking rule to avoid commas or full stops at a line head (which is
prohibited in Japanese typography) by taking them back to the end of the previous line
beyond the specified line length.
line adjustment by inter-character space expansion
مُحَاذَاة السَّطْرْ بِتَوسِيع الفَرَاغْ بَيْنَ المَحَارِفْ
muḥādhāt al-ssaṭr bitawsīʻ al-farāgh bayna
al-maḥārif
A line breaking rule that aligns both edges of a line by expanding inter-character
spaces. .
line breaking rules
قَوَاعِد كَسْرْ السَّطْرْ
qawāʻid kasr al-ssaṭr
A set of rules to avoid prohibited layout in Japanese typography, such as "line-start
prohibition rule", "line-end prohibition rule", inseparable or unbreakable character
sequences and so on.
line end
نِهَايَة السَّطْرْ
nihāyat al-ssaṭr
انتهای خط
ānthāy xt
The position at which a line ends.
line end alignment
مُحَاذَاة نِهَايَة السَّطْرْ
muḥādhāt nihāyat al-ssaṭr
همترازی انتهای خط
hmtrāzi aoenthāy xt
To align a run of text to the line end.
line end indent
مَسَافَة بَدْئْ نِهَايَة السَّطْرْ
masāfat bad’ nihāyat al-ssaṭr
تورفتگی انتهای خط
turftɡi aoenthāy xt
To reserve a certain amount of space before the default position of a line end.
line feed
تَغْذِيَة السَّطْرْ
taghdhīat al-ssaṭr
The distance between two adjacent lines measured by their reference points.
line gap
فَجْوَة السَّطْرْ
fajwat al-ssaṭr
فاصلهٔ بین خطوط
fāslhٔ bin xtut
The smallest amount of space between adjacent lines.
line head
رَأْسْ السَّطْرْ
ra’s al-ssaṭr
سرِ سطر
sre str
The position at which a line starts.
line head alignment
مُحَاذَاة رَأْسْ السَّطْرْ
muḥādhāt ra’s al-ssaṭr
همترازیِ سر سطر
hmtrāzie sr str
To align a run of text to the line head.
line head indent
مَسَافَة بَدْئْ رَأْسْ السَّطْرْ
masāfat bad’ ra’s al-ssaṭr
فاصلهٔ سر سطر، تو رفتگی سر سطر
fāslhٔ sr str, tu rftɡi sr str
To reserve a certain amount of space after the default position of a line head.
line height
اِرْتِفَاعْ الخَطْ
irtifāʻ al-khaṭ
ارتفاع خط
ārtfā’ xt
line length
طُولُ السَطْرْ
ṭūlu al-saṭr
طول خط
tul xt
Length of a line with a pre-defined number of characters. When the line is indented
at the line head or the line end, it is length of the line from the specified amount of
line head indent to the specified amount of line end indent.
line spacing
تَبَاعُدْ الأَسْطُرْ
tabāʻud al-’asṭur
line-end prohibition rule
قَاعِدَة حَظْرْ نِهَايَة السَّطْرْ
qāʻidat ḥaẓr nihāyat al-ssaṭr
A line breaking rule that prohibits specific characters at a line end.
line-start prohibition rule
قَاعِدَة حَظْرْ بِدَايَة السَّطْرْ
qāʻidat ḥaẓr bidāyat al-ssaṭr
A line breaking rule that prohibits specific characters at a line head.
list
قَائِمَة، لَائِحَة
qā’imah, lā’iḥah
فهرست
fhrst
long dash
شَرْطَة طَوِيلَة
sharṭah ṭawīlah
mabsut
مَبْسُوطْ
mabsūṭ
Kind of writing style that tends to rigidity and firmness with pronounced
angularity.
main text
نَصْ رَئِيسِي
naṣ ra’īsī
متن اصلی
mtn aoesli
a) The principal part of a book, usually preceded by the front matter, followed by
the back matter. b) The principal part of an article excluding figures, tables, heading,
notes, leads and so on. c) The content of a page excluding running heads and page
numbers. d) The net contents of a book excluding covers, end papers, insets and so
on.
margin
هَامِشْ
hāmish
حاشیه
hāših
measure
قِيَاسْ
qīās
مقیاس، اندازه
mqiās, aoendāzh
measurement
قِيَاسْ
qīās
اندازهگیری
āndāzhɡiri
mixed text composition
تَرْكِيبَة النَّصْ المُخْتَلِطْ
tarkībah al-nnaṣ al-mukhtaliṭ
a) To interleave Japanese text with Western text in a line (Japanese and Western
mixed text composition). b) To compose text with different sizes of characters (mixed
size composition). c) To compose text with different typefaces (mixed typeface
composition).
mixing typefaces
خَلْطْ أنْمَاطْ الخُطُوطْ
khalṭ anmāṭ al-khuṭūṭ
ترکیب قلمها
trkib qlmhā
modular grid
شَبَكَة وَحَدَاتْ، شَبَكَة مُرَكَّبَة مِنْ وَحَدَاتْ
shabakah waḥadāt, shabakah murakkabat min
waḥadāt
شطرنجی مُدولی
štrnji moduli
multi-column format
تَنْسِيقْ مُتَعَدِّدْ الأَعْمِدَة
tansīq mutaʻaddid al-’aʻmidah
شکلبندی چندستونی
šklbndi čndstuni
A format of text on a page where text is divided into two or more sections (columns)
in the inline direction and each column is separated by a certain amount of space (column
space).
multi-column grid
شَبَكَة مُتَعَدِّدَة الأَعْمِدَة
shabakah mutaʻaddidat al-’aʻmidah
شطرنجی چندستونی
štrnji čndstuni
multivolume work
عَمَلْ مُتَعَدِّدْ الأَجْزاءْ
ʻamal mutaʻaddid al-’ajz’
اثر چند جلدی
āsr čnd jldi
A set of work published in two or more volumes, as in the complete work or the
first/last half volumes.
mukawwar
مُكَوَّرْ
mukawwar
Kind of writing style, generally opposed to mabsut, that is more flexible and
rounded.
new column
عَمُودْ جَدِيدْ
ʻamūd jadīd
ستون جدید
stun jdid
In multi-column setting, to change to new column before the end of current
column.
new recto
صَفْحَة يُمْنَى جَدِيدَة
ṣafḥah yumná jadīdah
آغاز در صفحهٔ فرد
āqāz dr sfhhٔ frd
To start a new heading or something on a odd page.
no-break text
عَدَمْ تَفَكُّكْ النَّصْ، نَصْ دُونَ اِنْفِكَاكْ
ʻadam tafakkuk al-nnaṣ, naṣ dūna infikāk
nonbreaking hyphen
وَاصِلَة غَيْرْ قَاسِمَة
wāṣilah ghayr qāsimah
nonbreaking word space
فَضَاءْ كَلِمَة غَيْرْ قَاسِمْ
faḍā’ kalimah ghayr qāsim
note
مُلَاحَظَة
mulāḥaẓah
یادداشت
iāddāšt
Explanatory information added to terms, figures or tables.
number of characters per line
عَدَدْ الأَحْرُف فِي كُلِّ سَطْرْ
ʻadad al-’aḥruf fī kulli saṭr
تعداد حروف در خط
t’dād hruf dr xt
Number of characters in a line to specify the length of lines.
number of columns
عَدَدْ الأَعْمِدَة
ʻadad al-’aʻmidah
تعداد ستونها
t’dād stunhā
Number of columns on a page.
numerals
الأَعْدَادْ، الأَرْقَامْ
al-’aʻdād, al-’arqām
اعداد
ā’dād
one em space
مَسَافَة اِمْ وَاحِدَة
masāfat im wāḥidah
فاصلهٔ اِم
fāslhٔ em
Amount of space that is full-width size.
one third em
ثُلُثْ اِمْ
thuluth im
یکسوم اِم
iksum em
One third of the full-width size.
one third em space
مَسَافَة ثُلُثْ اِمْ
masāfat thuluth im
فاصلهٔ یکسوم اِم
fāslhٔ yksum em
Amount of space that is one third size of em space.
opening brackets
فَتْحْ قَوْسَيْنْ
fatḥ qawsayn
کروشه باز
kruše bāz
optical size
حَجْمْ بَصَرِي
ḥajm baṣarī
optical spacing
تَبَاعُدْ بَصَرِي
tabāʻud baṣarī
orientation
تَوَجُّهْ
tawajjuh
جهت
jht
ornament
زَخْرَفَة
zakhrafah
تزئینی
tz’ini
outdent
إِلْغَاءْ التَّأخِيرْ، إِلْغَاءْ الإِزَاحَة
ilghā’ al-tta’khīr, ilghā’ al-’izāḥah
overhang
عبء
ʻib’
overrun
تَجَاوُزْ، اِجْتِيَاحْ
tajāwuz, ijtīāḥ
page
صَفْحَة
ṣafḥah
صفحه
sfhh
A side of a sheet of paper in a written work such as a book.
page break
فَاصِلْ صَفْحَة
fāṣil ṣafḥah
To end a page even if it is not full and to start a new page with the next paragraph,
a new heading and so on.
page format
شَكْلْ الصَّفْحَة
shakl al-ṣṣafḥah
شکلبندی صفحه
šklbndi sfhh
The layout and presentation of a page with text, graphics and other elements for a
publication such as a book.
page number
رَقْمْ الصَّفْحَة
raqm al-ṣṣafḥah
شمارهٔ صفحه
šmārhٔ sfhh
A sequential number to indicate the order of pages in a publication.
pagination
تَرْقِيمْ الصَّفَحَاتْ
tarqīm al-ṣṣafaḥāt
صفحهشماری
sfhhšmāri
paragraph
فَقْرَة
faqrah
پاراگراف
pārāɡrāf
A group of sentences to be processed for line composition. A paragraph consists of
one or more lines.
paragraph break
اِنْقِطَاعْ الفَقْرَة، كَسْرْ الفَقْرَة
inqiṭāʻ al-faqrah, kasr al-faqrah
شکستن پاراگراف
škstn pārāɡrāf
To start a new line to indicate a new paragraph.
paragraph format
تَنْسِيقْ الفَقْرَة
tansīq al-faqrah
شکلبندی پاراگراف
šklbndi pārāɡrāf
A format of a paragraph, as in line head indent or line end indent.
paragraph indent
هَامِشْ الفَقْرَة، المَسَافَة البَادِئَة لِلْفَقْرَة
hāmish al-faqrah, al-masāfah al-bādi’ah
lilfaqrah
تورفتگی پاراگراف
turftɡi pārāɡrāf
parenthesis
أَقْوَاسْ
aqwās
پرانتز
prāntz
period
نُقْطَة
nuqṭah
نقطه
nqth
pixel
بكسل، بيكسل
biksl, bīksil
پیکسل
piksl
point
نُقْطَة
nuqṭah
نقطه
nqth
A measurement unit of character size. 1 point is equal to 0.3514mm (see JIS Z 8305).
There is another unit to measure character sizes called Q, where 1Q is equivalent to
0.25mm.
polyglot
مُتَعَدِّدْ اللُغَاتْ
mutaʻaddid al-lughāt
printing types
أَنْوَاعْ الطِّبَاعَة
anwāʻ al-ṭṭibāʻah
Movable type used for letterpress printing.
proportional
مُتَنَاسِبٌ
mutanāsibun
A characteristic of a font where character advance is different per glyph.
proportional fonts
الخُطُوطْ المُتَنَاسِبَة
al-khuṭūṭ al-mutanāsibah
punctuation marks
عَلَامَاتْ التَّرْقِيمْ
ʻalāmāt al-ttarqīm
A general term referring to the symbols used in text composition to help make the
meaning of text clearer, as in commas, full stops, question marks, brackets, diereses and
so on.
quad
رُبَاعِيَّة
rubāʻīyah
quarter em
رُبْعْ اِمْ
rubʻ im
رُبع اِم
rob’ em
Quarter size of full-width.
quarter em space
مَسَافَة رُبْعْ اِمْ
masāfat rubʻ im
فاصلهٔ رُبع اِم
fāslhٔ rob’ em
Amount of space that is a quarter of an em space in size.
quarter em width
عُرْضْ رُبْعْ اِمْ
ʻurḍ rubʻ im
پهنای رُبع اِم
phnāy rob’ em
Character frame which has a character advance of a quarter em.
question mark
عَلَامَة اِسْتِفْهَامْ
ʻalāmat istifhām
علامت سوال
’lāmt suāl
quotation
اِقْتِبَاسْ
iqtibās
Excerps from other published works.
rag
خَرَقَة؟
kharaqah
reference marks
العَلَامَاتْ المَرْجِعِيَّة
al-ʻalāmāt al-marjiʻīyah
A symbol or short run of text attached to a specific part of text, to which notes are
provided followed by the corresponding marks.
reference number
الرَّقْمْ المَرْجِعِي
al-rraqm al-marjiʻī
reverse pagination
تَرْقِيمْ الصَّفَحَاتْ عَكْسِي
tarqīm al-ṣṣafaḥāt ʻaksī
Numbering pages of a book backwards.
reversed type
نَوْعٌ عَكْسْ
nawʻun ʻaks
river
نَهْرْ
nahr
Optical path of white space that sometimes occurs when word spaces in successive
lines of type occur immediately below each other and continue for several lines.
river of white
Roman numerals
الأَرْقَامْ الرُّومَانِيَّة
al-’arqām al-rrūmānīyah
اعداد رومی
ā’dād rumi
Numerals represented by upper case or lower case of Latin letters.
romanization
الكِتَابَة بِالحُرُوفِ اللَاتِينِيَّة
al-kitābah bilḥurūfi al-lātīnīyah
لاتیننویسی
lātinnuysi
rule
قَاعِدَة
qāʻidah
run back
تشغيل مرة أخرى
title mark
عَلَامَةْ عُنْوَانْ
ʻalāmat ʻunwān
run down
الخُطوُطْ العَرِيضَة لِلْمُحْتَوَيَاتْ
al-khuṭwuṭ al-ʻarīḍah lilmuḥtawayāt
In video production, an outline of the contents of a program,
run in
فِي نَفْسِ الخَطْ
fī nafsi al-khaṭ
In typography, any copy—specifically a head—designed to be set in the same line as
the text.
run-in heading
عُنْوَانْ بِدُونِ اِنْقِطَاعْ
ʻunwān bidūni inqiṭāʻ
A kind of heading style to continue main text just after the heading without line
break.
runaround
فَرَاغْ نَائِبْ عَنْ صُورَة إِيضَاحِيَّة
farāgh nā’ib ʻan ṣūrah īḍāḥīyah
In typography, copy typeset so that it will create a "hole" on the page to fit an
illustration
running feet
عُنْوَانْ فِي الجُزْءِ السَّفْلِي مِنْ صَفَحَاتْ
مُتَتَالِيَّة
ʻunwān fī al-juz’i al-ssaflī min ṣafaḥāt
mutatālīyah
A "heading"—such as a book title, chapter title, or author—that is located at the
bottom of consecutive page
running heads
عُنْوَانْ فِي الجُزْءِ العُلْوِي مِنْ صَفَحَاتْ
مُتَتَالِيَّة
ʻunwān fī al-juz’i al-ʻulwī min ṣafaḥāt
mutatālīyah
A heading—such as a book title, chapter title, or author—that is located at the top
of consecutive pages,
runover
تَشْغِيلْ أَكْثَرْ
tashghīlakthar
scale
مِقْيَاسْ، نِطَاقْ
miqyās, niṭāq
script
النَّصْ، الكِتَابَة
al-nnaṣ, al-kitābah
second indenetation
المَسَافَة البَادِئَة الثَّانِيَّة
al-masāfah al-bādi’ah al-ththānīyah
second level heading
عُنْوَانْ المُسْتَوَى الثَّانِي
ʻunwān al-mustawá al-ththānī
Second level and middle size heading between first level heading and third level
heading.
semicolon
فَاصِلَة مَنْقُوطَة
fāṣilah manqūṭah
نقطهویرگول
nqthuyrɡul
sentence
جُمْلَة
jumlah
جمله
jmlh
shadda
شَدَّة
shaddah
A tashkil mark indicating gemination of the base consonant.
sideheads
رُؤُوسْ الجَانِبْ
ru’ūs al-jānib
single line alignment method
طَرِيقَة المُحَاذَاة لِسَطْرٍ وَاحِدْ
ṭarīqat al-muḥādhāt lisaṭrin wāḥid
To align a run of text that is shorter than a given line length to designated
positions.
single running head method
طَرِيقَة الرَأْسْ بِتَشْغِيلْ وَاحِدْ
ṭarīqat al-ra’s bitashghīl wāḥid
A method that puts running heads only on odd pages.
sinkage
فَرَاغْ عَمُودِي إضَافِي
farāgh ʻamūdī iḍāfī
soft hyphen
وَاصِلَة لَيِّنَة
wāṣilah layyinah
solidus
العَلَامَة المَائِلَة
al-ʻalāmah al-mā’ilah
sorting
التَّرْتِيبْ
al-ttartīb
ترتیب
trtib
space
فَرَاغْ
farāgh
فاصله
fāslh
Amount of space between adjacent characters or lines. It also refers to the blank
area between the edges of a hanmen or an illustration and text or other hanmen
elements.
spacing
التَّبَاعُدْ
al-ttabāʻud
فاصلهگذاری
fāslhɡzāri
spine
العَمُودْ
al-ʻamūd
spread
اِنْتِشَارْ
Any two facing pages when opening a book and the like.
stem
جذع
style
أسلوب، النمط
intishār
شیوه
šivh
style guide
دَلِيلْ النَّمَطْ
dalīl al-nnamaṭ
شیوهنامه
šivhnāmh
subheads
العَنَاوِينْ الفَرْعِيَّة
al-ʻanāwīn al-farʻīyah
subscript (inferior)
نَصْ مُنْخَفِضْ (أَسْفَلْ)
naṣṣ munkhafiḍ (’asfal)
Smaller face of characters, attached to the lower right or the lower left of a normal
size character.
subtitle
عُنْوَانْ فَرْعِي
ʻunwān farʻī
زیرنویس
zirnuys
Secondary title for headings, subtile.
sukun
سُكُونْ
sukūn
A tashkil mark indicating the lack of a vowel after the consonant to which it is
attached.
superior numeral
الرَّقْمْ العُلْوِي
al-rraqm al-ʻulwī
superscript (superior)
نَصْ مُرْتَفِعْ (أَعْلَى)
naṣṣ murtafiʻ (’aʻlá)
Smaller face of characters, attached to the upper right or the upper left of a normal
size character.
symbol
رَمْزْ
ramz
tab
عَلَامَة التَّبْوِيبْ
ʻalāmat al-ttabwīb
tab setting
وَضْعْ عَلَامَة التَّبْوِيبْ
waḍʻ ʻalāmat al-ttabwīb
A method of line composition to align one or more runs of text to designated
positions on a line.
table
جَدْوَلْ
jadwal
جدول
jdul
Formatted data consisting of characters or numbers, arranged in cells and sometimes
divided by lines, in order to present the data in a way that is easier to
understand.
table of contents
جَدْوَلْ المُحْتَوَيَاتْ، الفِهْرِسْ
jadwal al-muḥtawayāt, al-fihris
فهرست مطالب
fhrst mtālb
A list of headings of contents of a book in page order or arranged by subjects, with
page numbers on which each section begins.
tail margin
الهاَمِشْ الأَسْفَلْ
al-hamish al-’asfal
tanwin
تَنْوِينْ
tanwīn
(Derived from Noon). Tashkil marks indicating postnasalized or long vowels at the end
of a word, and indicated by doubling the sign of one of the harakat diacritics.
tashkil
تَشْكِيلْ
tashkīl
Marks that are added to letters to indicate vocalisation of text or to correct
pronunciation. In Unicode these are all combining characters applied to a base
character.
text
نَصْ
naṣṣ
متن
text direction
اِتِّجَاهْ النَّصْ
ittijāh al-nnaṣ
جهت متن
jht mtn
Horizontal setting or vertical setting.
thin space
فَرَاغْ رَقِيقْ
farāgh raqīq
third level heading
عُنْوَانْ المُسْتَوَى الثَّالِثْ
ʻunwān al-mustawá al-ththālith
Headings for smallest or minimum unit of main text in books.
top level heading
عُنْوَانْ المُسْتَوَى الأَعْلَى
ʻunwān al-mustawá al-’aʻlá
Headings for largest or muximum unit of main text in books.
tracking
ضَبْطْ تَبَاعُدْ الحُرُوفْ
ḍabṭ tabāʻud al-ḥurūf
transliteration
التَّرْجَمَة الصَّوْتِيَّة
al-ttarjamah al-ṣṣawtīyah
حرفنویسی
hrfnuysi
trim size
حَجْمْ التَّقْلِيمْ، حَجْمْ القَصْ
ḥajm al-ttaqlīm, ḥajm al-qaṣṣi
Dimensions of a full page in a publication, including margins.
type page
جُزْءُ الصَّفْحَة الخَاصْ بِالكِتَابَة
juz’u al-ṣṣafḥah al-khāṣ bilkitābah
The portion of a page within the prescribed margins where type, graphics, and other
page elements can be added
type size
حَجْمْ الحَرْفْ بِالنُّقْطَة
ḥajm al-ḥarf bilnnuqṭahu
type styles
أنماط الكتابة
The measure of the height of the characters of a font, measured in points.
type-picking
نوع قطف
انتخاب فونت
āntxāb funt
To select metal type for characters needed to print a manuscript. (Metal type is
stored in a type case, but because the number of Japanese characters is very large, an
extra operation was invented that involves collecting type in a so-called 'bunsen box'
before typesetting a manuscript using a composing stick.)
typeface
مِحْرَفْ
miḥraf
فونت، قلم
funt, qlm
A set of letters or symbols, which are designed to have coherent patterns to be used
for printing or rendering to a computer screen.
typesetting
تَنْضِيدْ، تَنْضِيدْ الحُرُوفْ الْمَطْبَعِيَّة
tanḍīd, tanḍīd al-ḥurūf al-maṭbaʻīyah
حروفچینی
hrufčini
typography
طِبَاعَة الحُرُوفْ، أُسْلُوبْ الطِّبَاعَة
ṭibāʻat al-ḥurūf,uslūb al-ṭṭibāʻah
تایپوگرافی
tāypuɡrāfi
unbreakable characters rule
قَاعِدَة أَحْرُفْ غَيْرْ قَابِلَة لِلْكسْرْ
qāʻidat aḥruf ghayr qābilah lilksr
A line breaking rule that prohibits breaking a line between consecutive dashes or
leaders, or between other specific combinations of characters.
underline
تَسْطِيرْ مِنْ تَحْتْ
tasṭīr min taḥt
A line drawn under a character or a run of text in horizontal writing mode.
unicameral
أُحَادِى المَجْلِسْ
uḥādī al-majlis
Unicode
يُونِيكُودْ
yūnīkūd
یونیکُد
ivnikod
vertical writing mode
وَضْعْ الكِتَابَة العَمُودِي
waḍʻ al-kitābah al-ʻamūdī
حالت نوشتار عمودی
hālt nuštār amudi
The process or the result of arranging characters on a line from top to bottom, of
lines on a page from right to left, and/or of columns on a page from top to bottom.
volume
حَجْمْ
ḥajm
جلد
jld
weight
ثِقَلْ
thiqal
A measurement of the thickness of fonts.
Western alphabet
الأَبَجَدِيَّة الغَرْبِيَّة
al-’abajadīyah al-gharbīyah
Western languages
اللُغَاتْ الغَرْبِيَّة
al-lughāt al-gharbīyah
widow
أَرْمَلَة
armalah
The term in Western text layout to describe that the last line of a paragraph with
only a few words appears at the top of a new page or a column.
widow adjustment
تَعْدِيلْ أَرْمَلَة
taʻdīl armalah
A method of line composition to adjust lines in a paragraph so that the last line
consists of more than a given number of characters.
word division
قِسْمْ كَلِمَة
qism kalimah
word space
فَرَاغْ بَيْنَ الكَلِمَاتْ
farāgh bayna al-kalimāt
x-height
اِرْتِفَاعْ الحَرْفْ إِكْسْ
irtifāʻ al-ḥarf iks
C. Acknowledgements
Special thanks to the following people who contributed to this document (contributors' names
listed in in alphabetic order). |
'A Bad Moms Christmas' Review: Is The Movie Worth Going to See?
Just in time for the holidays, A Bad Moms Christmas hit theaters yesterday. While the many have been anticipating the sequel to the 2016 summer hit Bad Moms, reviews are stating that you may want to save your money for this one.
A Bad Moms Christmas, stars Mila Kunis, Kristen Bell, and Kathryn Hahn, who once again are dreading the duties of being a 'traditional' mom during the upcoming holiday season. So, what do the three musketeers decide to do? Cancel Christmas! Figuratively of course, because no one has that type of power. However, things take an unexpected turn when the good but bad moms have to deal with the arrival of their own mothers. Christine Baranski (Trolls) portrays the judgemental mother of Amy (Kunis), Cheryl Hines (Curb Your Enthusiasm) is the clingy-single mother of Kiki (Bell), and Susan Sarandon (Thelma & Louise) is the hippie-loving mother of Carla (Hahn).
With a top grade cast and a feasible storyline, this sequel should be a breeze to enjoy. Unfortunately, that doesn't seem to be the case, for this holiday-themed comedy.
"A Bad Moms Christmas is a poorly gift-wrapped Pinterest fail of a movie", the post continued.
"A Bad Moms Christmas is louder, busier and more pandering than the original - an exhausting spectacle of skilled performers gamely mugging their way through a cash grab", The Hollywood Reporterwrote in a similar testament.
"It's like a buffet of appropriately themed holiday snacks whose inherent festiveness you can admire, even if you're not exactly sated after sampling," saysThe Wrap, in a less harsh review of the film.
The movie also stars, Justin Hartley (This is Us), Peter Gallagher (New Girl) and Jay Hernandez (Hostel), who reprises his role from the first film. The sequel was originally scheduled to be released on Nov. 3, but was pushed back to avoid competition with Thor: Ragnarok.
But with questionable reviews, it doesn't seem that there will be much to compete over?
Kunis recently spoke about being a mom herself while promoting the film at the Jimmy Kimmel show. The actress stated that her daughter, Wyatt, doesn't even know what her mom does for a living.
"It's weird, because there are billboards everywhere in L.A. right now, and in the billboard I'm wearing a Santa hat. And my daughter has no clue what I do for a living. She kind of thinks that mommy gets hair and makeup done for a living-that's what I do. Because she comes to the hair and makeup trailer, and then she leaves." |
ive g.
3
Rearrange (3 - 7 + 3)*(3*u - 2*u + 0*u) + (1 - 4 + 5)*(-u + 3*u - u) to n + o*u and give o.
1
Express -2*w**4 + 2*w**4 + w**4 + (-3*w**2 - w**2 + 7*w**2)*(7*w - 3*w - 3*w)*(w - 5*w + w) in the form z*w + c + h*w**2 + r*w**4 + g*w**3 and give r.
-8
Rearrange 10*u**2 + 16*u**2 - 35*u**2 + 1 + 11*u**2 - u**3 to s*u + w*u**3 + q*u**2 + t and give t.
1
Express -18 + 18 - 5*t**4 + (-3*t**2 + 0*t**2 + 0*t**2)*(t**2 - 3*t + 3*t) in the form x*t**3 + j + k*t + c*t**2 + r*t**4 and give r.
-8
Rearrange -24*d**3 - 30*d**3 + 0*d**3 + (-2 - 1 + 2)*(2*d**3 - d**2 + d**2) to the form w + y*d + s*d**3 + x*d**2 and give s.
-56
Rearrange (9 + 3 - 1)*(12*u - u - 3*u) to the form t*u + y and give y.
0
Express -10 - 26*c + 10 as w*c + f and give w.
-26
Express 8*v + 4*v + 3*v in the form n*v + x and give n.
15
Rearrange -9*i - i**3 + 3*i**3 + 6*i - 12*i to s + b*i**2 + m*i + v*i**3 and give v.
2
Rearrange -2*y**2 + y**2 - y**2 + (-3*y + 0*y + 5*y)*(-4*y - 34 + 34) to the form l + f*y**2 + w*y and give f.
-10
Express -5*g**3 - 11*g + 13*g - 1 + 7*g**3 in the form p + j*g**2 + l*g + m*g**3 and give p.
-1
Rearrange -15*o - 12*o + 8*o - 29*o to s*o + x and give s.
-48
Express (0*r**2 - 4*r**2 + 3*r**2)*(0 - 1 + 2) - 2*r - 2*r**2 + 2*r + r**2 - 3*r - 2 + 4 - r in the form a + p*r**2 + z*r and give p.
-2
Express (2 + 0 - 3)*(5 - 2 - 4)*(0*l - 4*l + 3*l) in the form t + y*l and give y.
-1
Rearrange -231*z**4 + 24*z**2 - 5*z**2 + 230*z**4 + (-z**3 - z**3 + 4*z**3)*(-5*z + 4*z + 3*z) to the form j*z**4 + o*z**3 + m*z**2 + f*z + b and give j.
3
Express (14*q + 13*q**2 + 9*q**2 - 20*q**2)*(-2*q - 4 + 4)*(5*q + 4*q - 5*q) as d*q**3 + s + y*q**2 + b*q**4 + n*q and give b.
-16
Express v**3 + v**4 + 2*v + v**4 - 2*v**3 + 3*v in the form k*v**3 + f*v + i*v**2 + z + a*v**4 and give k.
-1
Express (2 + 4 - 3)*(-19*m**2 + 0*m - 2*m + 10*m**2) in the form i + w*m + c*m**2 and give w.
-6
Express -31*q**2 + 4*q**2 - 7*q**2 - 11*q**2 as s*q**2 + z + a*q and give s.
-45
Express (2*b**2 + 5*b**2 + 2*b - 5*b**2)*(-1 + 4 - 1)*(5*b - b - 3*b) in the form u + l*b + x*b**3 + h*b**2 and give h.
4
Rearrange 5*m + 4 - 20*m**2 + 18*m**2 - 2*m to the form o*m**2 + h + s*m and give s.
3
Express (-9*d + 23*d - 8*d)*(40 + 17*d - 40) as y*d + u*d**2 + w and give u.
102
Express 9*x - 6*x - 16*x - 9*x in the form q*x + g and give q.
-22
Express -9*n - 16*n - 42*n in the form b*n + c and give b.
-67
Rearrange (1 - 3 + 4)*(5 + 7 - 4)*(-2*j + 2*j + j) to the form d*j + y and give d.
16
Express -79 - 76*k**2 + 79 + 2*k in the form m*k + c + o*k**2 and give o.
-76
Rearrange -4*s**3 + 14*s**4 + 4*s + 4*s**3 - 16*s**4 + 2*s**2 to the form r*s + l*s**3 + o + q*s**4 + p*s**2 and give p.
2
Rearrange (0 + 0 - 1)*(15*w + w + 8*w)*(-4 + 0 + 2) to g*w + f and give g.
48
Rearrange 5*y**3 - 6*y**3 + y**4 + 0*y**4 + 3*y**3 + 8*y + 2*y**2 to the form x*y + p*y**3 + v*y**2 + h + w*y**4 and give p.
2
Express -7*i - 2*i**2 - 34 + 2*i**4 + i**4 + 36 as s*i**2 + w*i + b + f*i**4 + a*i**3 and give s.
-2
Rearrange (-6 + 2 + 19)*(3 - 3 - 2)*(-2*g + 2*g + g) to w*g + l and give w.
-30
Rearrange 2*u**3 - 2*u + 0*u + 0*u to n*u + y + g*u**3 + k*u**2 and give n.
-2
Rearrange (-3*l + l - 2*l)*(l**2 + l**2 + 4*l**2) to the form q*l + u*l**3 + n*l**2 + o and give u.
-24
Rearrange -4*z**2 + 9*z**2 + 266 - 266 to u*z**2 + x*z + v and give u.
5
Express u**2 - 4*u**3 - 3*u**3 - 5*u + 5*u**3 + (u**2 + 1 - 1)*(3*u + 2*u - 7*u) in the form n*u**3 + l + i*u + q*u**2 and give q.
1
Rearrange (5 - 2 - 2)*(2*r + 3*r - 4*r) + (-4*r + 3*r + 0 + 3)*(4 + 0 + 1) to u*r + o and give u.
-4
Rearrange -12*a - 11*a + 0*a + 2*a to g*a + i and give g.
-21
Rearrange t**3 + 1 - 1 + (2*t - 1 + 1)*(1 - 2*t - 1)*(5*t - 9*t - 12*t) to the form c + l*t**2 + z*t + v*t**3 and give v.
65
Rearrange -68*x**2 + x + 44*x**2 - x to u + c*x**2 + k*x and give c.
-24
Rearrange 4*y**3 + 7*y - 5*y**3 + 19*y**2 - 18*y**2 to the form k*y + c + t*y**3 + g*y**2 and give g.
1
Express -2 + 2*a**4 - 4*a**4 - 10*a**3 - 30*a**3 + 12*a**3 in the form y*a**2 + r*a**4 + m*a + g*a**3 + b and give b.
-2
Express -8*r**2 + 7*r**2 - r**3 + 2*r - 3*r**4 + 7*r**2 + 4*r**4 as h*r**3 + s + f*r + t*r**2 + v*r**4 and give f.
2
Rearrange -1 - 111*g**3 - 1 + 11*g**2 + 114*g**3 to the form z*g**3 + k*g + j + l*g**2 and give j.
-2
Rearrange s**4 + 7*s - 13*s**2 + 12*s**2 + 2*s to x*s**2 + a + k*s + c*s**4 + b*s**3 and give x.
-1
Express 16 - 2*w**2 + 3*w - 34 + 5*w**2 + 21 in the form o + l*w + x*w**2 and give x.
3
Rearrange -49*w - 103 + 103 to the form l*w + x and give x.
0
Express 6*i**4 + 0*i**2 - i**2 - 7*i**4 + 2*i as p + n*i**4 + z*i + v*i**3 + x*i**2 and give n.
-1
Express 67*f - 78*f - 33*f + (-3 + 5 - 1)*(6*f - 3*f - 2*f) as b*f + a and give b.
-43
Rearrange 4*p**4 - p - 23*p**3 + p**2 - 8 + 0*p**4 + 24*p**3 to c*p + j + r*p**2 + m*p**3 + n*p**4 and give n.
4
Express r - 10*r + 9 - 5 + (2 - 1 - 3)*(r - r + 2*r) - 2*r - 2*r + 3*r in the form h*r + o and give h.
-14
Rearrange 2*t - 2*t + t + 49 to the form f + l*t and give l.
1
Express 59*v**2 + 1 - v**3 - 30*v**2 - 29*v**2 - v in the form q*v**3 + p*v + w*v**2 + i and give q.
-1
Express -7*v - 9*v + 2 - 2 as g*v + i and give g.
-16
Rearrange (-10*m - 2*m - 3*m)*(-3*m + 2*m + 0*m) to w + p*m + d*m**2 and give d.
15
Rearrange -2*o**2 - o**4 - 9*o + 562 - 562 to d*o + l*o**3 + y*o**2 + k + g*o**4 and give d.
-9
Rearrange (2*h - 4*h + 5*h)*(-2*h + 0*h + h) - 13*h**2 + 12*h**2 + 11*h**2 to z*h + d + u*h**2 and give d.
0
Rearrange 13*i**3 - 13*i**3 - 2*i**4 - 5*i - 1 to the form r + z*i**4 + t*i**2 + q*i**3 + l*i and give l.
-5
Rearrange (346*q + 285*q + 481*q - 330*q)*(-3*q + 3*q + q) to p + t*q**2 + m*q and give t.
782
Rearrange (-t + 0 + 0)*(-4 - 2 + 30) to x + f*t and give f.
-24
Express -1 + 3*a**2 + 2 - 3 + 11*a**2 as w*a**2 + r*a + d and give w.
14
Express -3*b - b + 8*b + (2 - 5 - 8)*(-2*b - 2*b + 5*b) in the form q*b + y and give q.
-7
Express 2*i**2 - 7*i**3 - 8*i**2 + i + 18*i**3 - 9*i**3 as w + a*i**3 + h*i**2 + q*i and give h.
-6
Express (0*t**3 - 2*t**3 - t + 0*t)*(2 + 4*t + 4*t - 2*t) in the form m*t**3 + r*t + q*t**2 + j + d*t**4 and give m.
-4
Rearrange (-2*n + 2*n - n**3)*(-22 + 11 - 11 + 0 - 4 + 3 + (-4 + 4 + 2)*(0 + 4 - 6) - 3 + 1 + 3) to the form m*n**3 + l*n + v + g*n**2 and give m.
26
Express (41 - h**2 - 41)*(-2*h + 6*h + 0*h)*(-1 - 1 + 4) as t*h**2 + y + x*h**3 + s*h and give x.
-8
Rearrange -3 - 2*f + 3 + (-4 + 5 - 2)*(-3*f + f + 3*f) - 1 + 2*f + 1 - 15*f + 32 + 0*f - 33 to o*f + r and give o.
-16
Express (-u - u + u)*(3*u**2 + 3*u**2 + 5*u + u**2) in the form g*u**3 + f*u**2 + x + j*u and give g.
-7
Express -26 - 43 - 2*q + 3 as j + f*q and give f.
-2
Rearrange m**2 + m**2 + 2*m**4 + 49 - 42 to the form a*m**4 + r*m + u*m**3 + j*m**2 + l and give u.
0
Express -8*w**4 - 7*w**4 + 3*w**4 + (w**2 - w**2 - 2*w**3)*(-2 - 4*w + 3 + 5*w) in the form k*w**4 + s*w**3 + m*w + j + v*w**2 and give s.
-2
Rearrange (11*p**2 + 15 - 15)*(1 - 2 + 2)*(-3*p**2 + 6*p**2 - 4*p**2) to h*p + c*p**3 + z*p**4 + n*p**2 + x and give z.
-11
Rearrange (2 - 11*v**2 + v + 6*v**2 + 3*v)*(3*v - v - 4*v) to the form q*v**3 + l*v**2 + d + u*v and give q.
10
Express 27 + 5*z - 12*z + 3 + 11*z as a + i*z and give a.
30
Express (3 - 3 - 2*q)*(q**3 - 4*q**3 + 0*q**3 + (5*q - 4*q + 0*q)*(-3*q**2 + 5*q**2 + 5*q**2)) as o + u*q**3 + x*q**4 + t*q + a*q**2 and give x.
-8
Express (2*s - 2*s - 4*s)*(-2*s + 4*s + 4*s) as i*s**2 + z*s + u and give i.
-24
Rearrange x**2 + 2*x**2 - x**2 + 4*x**3 - x to j*x**2 + t*x + i*x**3 + w and give i.
4
Rearrange 4*u + 2*u**3 - 16*u**3 - 14*u**3 - 5*u - 2*u**2 to the form b*u + s + m*u**2 + a*u**3 and give a.
-28
Rearrange (-3 - 2*l**3 + 3)*(0*l + l - 4*l)*(1 - 3 + 1) to the form b + g*l**2 + z*l + h*l**4 + a*l**3 and give h.
-6
Rearrange (2*u + 0*u + 0*u + (0 + 3 - 2)*(u + u - 4*u) - 3 + 3 - u - 2*u + 2*u - 4*u + 3*u + 0*u - 2*u)*(4 - 4 + 2*u) to the form d*u**2 + m + y*u and give d.
-8
Express (-4*q - 22 + 3*q + 27)*(-4 + 8 + 3) in the form v*q + r and give v.
-7
Express 11*y**3 + 4*y**3 + 2*y - 2*y**3 in the form x*y**2 + j*y + v*y**3 + d and give j.
2
Express -37 + 5*v**2 + 36 + 17*v**2 - v in the form p*v**2 + n + z*v and give z.
-1
Express (2*s - 2*s + 2*s)*(5*s + 4 - 4)*(s - 17*s + 3*s) in the form j*s**3 + k*s + y + c* |
---
abstract: 'Out of several dozen z $>$ 7 candidate galaxies observed spectroscopically, only five have been confirmed via Lyman$\boldsymbol{\alpha}$ emission, at z=7.008, 7.045, 7.109, 7.213 and 7.215.[@vanzella11; @schenker12; @ono12; @shibuya13] The small fraction of confirmed galaxies may indicate that the neutral fraction in the intergalactic medium (IGM) rises quickly at $z >$ 6.5, as Lyman$\boldsymbol{\alpha}$ is resonantly scattered by neutral gas.[@kashikawa06; @iye06; @ouchi10; @pentericci11; @ono12] However, the small samples and limited depth of previous observations makes these conclusions tentative. Here we report the results of a deep near-infrared spectroscopic survey of 43 $z >$ 6.5 galaxies. We detect only a single galaxy, confirming that some process is making Lyman$\boldsymbol{\alpha}$ difficult to detect. The detected emission line at 1.0343$\boldsymbol{\mu}$m is likely to be Lyman$\boldsymbol{\alpha}$ emission, placing this galaxy at a redshift z = 7.51, an epoch 700 million years after the Big Bang. This galaxy’s colors are consistent with significant metal content, implying that galaxies become enriched rapidly. We measure a surprisingly high star formation rate of 330 M[$_{\odot}$]{} yr$^{-1}$, more than a factor of 100 greater than seen in the Milky Way. Such a galaxy is unexpected in a survey of our size[@smit12], suggesting that the early universe may harbor more intense sites of star-formation than expected.'
author:
- 'S. L. Finkelstein$^{1}$, C. Papovich$^2$, M. Dickinson$^3$, M. Song$^1$, V. Tilvi$^2$, A. M. Koekemoer$^4$, K. D. Finkelstein$^1$, B. Mobasher$^5$, H. C. Ferguson$^4$, M. Giavalisco$^6$, N. Reddy$^5$, M. L. N. Ashby$^7$, A. Dekel$^{8}$, G. G. Fazio$^7$, A. Fontana$^{9}$, N. A. Grogin$^4$, J.-S. Huang$^{7}$, D. Kocevski$^{10}$, M. Rafelski$^{11}$, B. J. Weiner$^{12}$ & S. P. Willner$^{7}$'
title: 'A Rapidly Star-forming Galaxy 700 Million Years After the Big Bang at z=7.51'
---
[^1]
We obtained near-infrared (near-IR) spectroscopy of galaxies originally discovered in the Cosmic Assembly Near-infrared Deep Extragalactic Legacy Survey (CANDELS)[@grogin11; @koekemoer11] with the newly-commissioned near-infrared spectrograph MOSFIRE[@mclean12] on the Keck 10 meter telescope. From a parent sample of over 100 galaxy candidates at $z >$ 7 selected via their [*HST*]{} colors through the photometric redshift technique[@finkelstein10a; @mclure10; @finkelstein12a; @mclure13], we observed 43 candidate high-redshift galaxies over two MOSFIRE pointings with exposure times of 5.6 and 4.5 hr, respectively. Our observations covered Ly$\alpha$ emission at redshifts of 7.0 – 8.2. We visually inspected the reduced data at the expected slit positions for our 43 observed sources and found plausible emission lines in eight objects, with only one line detected at $>$5$\sigma$ significance. The detected emission line is at a wavelength of 1.0343$\mu$m with an integrated signal-to-noise (S/N) of 7.8 (Figure 1) and comes from the object designated z8\_GND\_5296 in our sample (RA$=$12:36:37.90; Dec$=$62:18:08.5 J2000). Based on the arguments outlined below (and discussed extensively in the supplementary material), we identify this line as the Ly$\alpha$ transition of hydrogen at a line-peak redshift of $z =$ 7.5078 $\pm$ 0.0004; consistent with our photometric redshift 68% confidence range of 7.5 $< z <$ 7.9 for z8\_GND\_5296.
{width="70.00000%"}
{width="75.00000%"}
{width="50.00000%"} {width="50.00000%"}
As expected for a galaxy at $z=$ 7.51, z8\_GND\_5296 is completely undetected in the [*HST*]{} optical bands, including an extremely deep 0.8 $\mu$m image (Figure 2). The galaxy is bright in the [*HST*]{} near-IR bands, becoming brighter with increasing wavelength, implying that the Lyman break lies near 1 $\mu$m and that the galaxy has a moderately red rest-frame UV color. The galaxy is well-detected in both [*Spitzer*]{}/IRAC bands and is much brighter at 4.5 $\mu$m than at 3.6 $\mu$m. The strong break at observed 1 $\mu$m restricts the observed emission line to be either Ly$\alpha$ at $z =$ 7.51 (near the Lyman break) or \[O[ii]{}\] $\lambda\lambda$3726,3729 (a doublet) at $z =$ 1.78 (near the rest-frame Balmer/4000 Å break). We investigated these two possibilities by comparing our observed photometry to a suite of stellar population models at both redshifts (Figure 3). A much better fit to the data is obtained when using models at $z =$ 7.51 than at $z =$ 1.78, supporting our identification of the emission line as Ly$\alpha$. Specifically, the model at $z =$ 1.78 would result in $>$4$\sigma$ significant flux in the 0.8 $\mu$m image as well as a near-zero IRAC color, neither of which is seen. Additionally, the $z =$ 1.78 model requires an aging stellar population with no active star formation, which would have insignificant \[O[ii]{}\] emission. In the Supplementary Information, we discuss a number of tests performed to discern between the Ly$\alpha$ and \[Oii\] hypotheses. In summary, although we cannot robustly measure the line asymmetry due to the nearby sky residual, the SED fitting results and the lack of a detected second line in the \[O[ii]{}\] doublet lead us to conclude that the detected emission line is Ly$\alpha$ at $z =$ 7.51.
This galaxy is very bright in the rest-frame UV and optical, with an apparent magnitude of m$_{F160W} =$ 25.6 and a derived stellar mass of 1.0$^{+0.2}_{-0.1}$ $\times$ 10$^{9}$ M[$_{\odot}$]{}. The blue $H-[3.6]$ color suggests that the moderately red UV color ($J-H =$ 0.1 mag) is due to dust attenuation rather than the intrinsic red color of an old stellar population. The presence of dust extinction leads to a higher inferred UV luminosity. To derive the intrinsic star-formation rate (SFR) for this galaxy, we measured a time-averaged SFR from the best-fitting stellar population models to find SFR $=$ 330$^{+710}_{-10}$ M[$_{\odot}$]{} yr$^{-1}$. The very red $[3.6]-[4.5]$ color at $z =$ 7.51 can only be due to strong \[O[iii]{}\] $\lambda$5007 line emission in the 4.5 $\mu$m band; indeed, the SED fitting implies an \[O[iii]{}\] $\lambda$5007 rest-frame equivalent width (EW) of 560 – 640 Å (68% confidence), with a line flux of 5.3 $\times$ 10$^{-17}$ erg s$^{-1}$ cm$^{-2}$. This very high \[O[iii]{}\] EW constrains the abundance of metals in this galaxy, as highly enriched stars do not produce hard enough ionizing spectra, while very low metallicity systems do not have enough oxygen to produce strong emission lines. Of the metallicities available in our models (0.02, 0.2, 0.4 and 1.0 $\times$ solar), only models with a metal abundance of about 20–40% of Solar have \[O[ iii]{}\] EWs $>$300 Å. Thus, even at such early times, it was possible to form a moderately chemically enriched galaxy. However, due to discreteness of the model metallicities, further analysis is needed to make more quantitative conclusions on the metallicity, particularly on the lower limit. We note that at $z =$ 7.51 \[O[ii]{}\] is in the 3.6$\mu$m band, but it is predicted to be about 5$\times$ fainter than \[O[iii]{}\] and thus does not significantly affect the 3.6$\mu$m band.
This galaxy is forming stars at a very high rate, with a “mass-doubling” time of at most 4 Myr. The most recent estimates [@stark13] at $z \approx$ 7 find that galaxies with stellar masses of 5 $\times$10$^{9}$ M[$_{\odot}$]{} typically have specific SFRs (sSFR $=$ SFR divided by stellar mass) $\sim$10$^{-8}$ yr$^{-1}$. This galaxy is a factor of five less massive, yet its sSFR is a factor of 30 greater at 3 $\times$ 10$^{-7}$ yr$^{-1}$, implying that z8\_GND\_5296 is undergoing a significant starburst. Additionally, estimates of the SFR functions[@smit12] show that a typical galaxy at $z \sim$ 7 has a SFR $=$ 10 M[$_{\odot}$]{}yr$^{-1}$; the measured SFR of z8\_GND\_5296 is a factor of $>$30$\times$ greater. If this SFR function is accurate, the expected space density per co-moving Mpc$^{3}$ for this galaxy would be $\ll$ 10$^{-5}$. The implied rarity of this galaxy could imply that it is the progenitor of some of the most massive systems in the high-redshift universe. However, the $z = 7.213$ galaxy GN-108036[@ono12], also in GOODS-North, also has an implied SFR $>$ 100 M[$_{\odot}$]{} yr$^{-1}$. While the current statistics are poor, the presence of these two galaxies in a relatively small survey area suggests that the abundance of galaxies with such large star formation rates may have previously been underestimated. If the high SFR of z8\_GND\_5296 continues down to $z =$ 6.3, it would have a stellar mass of $\sim$5 $\times$ 10$^{10}$ M[$_{\odot}$]{}, comparable to the extreme star forming $z =$ 6.34 galaxy HFLS3 (Table 1).[@riechers12] Should z8\_GND\_5296 in fact be a progenitor of such SMGs, it is likely in the process of enshrouding itself in dust.
Both z8\_GND\_5296 and GN-108036 also have young inferred ages and IRAC colors indicative of strong \[O[iii]{}\] emission. Given the difficulty of detecting Ly$\alpha$ emission at $z \geq$ 6.5, it is interesting that these highest redshift Ly$\alpha$-detected galaxies appear to have extreme SFRs and high \[O[iii]{}\] emission. It may be that a high SFR and/or a high excitation are necessary conditions for Ly$\alpha$ escape in the distant universe, perhaps through blowing holes in the ISM, allowing both Ly$\alpha$ and ionizing photons to escape. An outflow in the ISM of 200-300 km s$^{-1}$ could clear a hole in this galaxy in about 3–5 Myr, or perhaps even sooner if the galaxy is undergoing a merger, which could preferentially clear some lines of sight for Ly$\alpha$ to escape.
Finally, we examine the lack of detected Ly$\alpha$ lines in our full dataset. If the Ly$\alpha$ EW distribution continues its observed increase[@stark11] from 3 $< z <$ 6 out to $z \sim$ 7–8, we should have detected Ly$\alpha$ emission from 6 galaxies. Our single detection rules out this EW distribution at 2.5$\sigma$ significance. This confirms previous results at $z \sim$ 6.5,[@kashikawa06; @iye06; @pentericci11; @ono12] but here we probe $z
>$ 7. The lack of detectable Ly$\alpha$ emission is unlikely to be due to sample contamination, as contamination by lower redshift interlopers is likely not dominant at $z =$ 7 given the low contamination rate at $z =$ 6.[@pentericci11] To explain the low detection rate of Ly$\alpha$, an IGM neutral fraction at $z =$ 6.5 as high as 60–90% has been proposed,[@pentericci11; @ono12] implying a rapid increase from $z =$ 6.[@fan06] However, most other observations are consistent with an IGM neutral fraction $\leq$ 10% at $z =$ 7,[@bolton11; @finkelstein12b] thus alternative explanations for the dearth of Ly$\alpha$ emission need to be explored.
One alternative explanation for at least part of the Ly$\alpha$ deficit may be gas within galaxies. A high gas-to-stellar mass ratio may be consistent with the very high SFR of z8\_GND\_5296, as galaxies should not have SFRs (for long periods) exceeding their average gas accretion rate from the IGM (which is set by the total baryonic mass). For the inferred stellar mass and redshift, z8\_GND\_5296 must have a gas reservoir of about 50 times the stellar mass to give an accretion rate comparable to the SFR.[@dekel13] If true, this galaxy would have a gas surface density similar to the most gas-rich galaxies in the local universe, and its SFR would be consistent with local relations between the gas and SFR surface densities.[@kennicutt12] The large gas-to-stellar mass ratio could be due to low metallicities at earlier times which may initially inhibit star-formation allowing the formation of such a large gas reservoir.[@krumholz12] If such high gas-to-stellar mass ratios are common amongst $z >$ 7 galaxies, it could explain the relative paucity of Ly$\alpha$ emission in our observations. Direct observations of the gas properties of distant galaxies are required to make progress understanding both the fueling of star formation, and the escape of Ly$\alpha$ photons.
[**Table 1: Ly$\alpha$ Spectroscopically Confirmed Galaxies at $z >$ 7**]{}
ID z$_{Ly\alpha}$ M$_{UV}$$^{\dagger}$ Rest EW$_{Ly\alpha}$ (Å) SFR (M[$_{\odot}$]{}/yr$^{-1}$) $^{\ddagger}$ log Stellar Mass (M[$_{\odot}$]{})
--------------------------- ---------------- ---------------------- -------------------------- ----------------------------------------------- ------------------------------------
z8\_GND\_5296 7.508 $-$21.2 8 330 9.0
SXDF-NB1006-2[@shibuya13] 7.215 $-$22.4$^{a}$ 15 56$^{a}$ —
GN-108036[@ono12] 7.213 $-$21.8 33 100 8.8
BDF-3299[@vanzella11] 7.109 $-$20.6 50 9 —
A1703\_zD6[@schenker12] 7.045 $-$19.4 65 4 —
BDF-521[@vanzella11] 7.008 $-$20.6 64 9 —
IOK-1[@iye06; @ono12] 6.965 $-$21.6 43 10 —
HFLS3[@riechers13] 6.337 — — 2900 10.6
[10]{} url \#1[`#1`]{}urlprefix\[2\][\#2]{} \[2\]\[\][[\#2](#2)]{}
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . In **, vol. of ** ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ****, ().
, & . ** ****, ().
*et al.* . ** ****, ().
*et al.* ** ****, ().
*et al.* . ** ****, ().
*et al.* . ** ().
& . ** ****, ().
& . ** ****, ().
*et al.* . ** ****, ().
. ** ****, ().
We thank Mark Dijkstra, James Rhoads and Sangeeta Malhotra for useful conversations, as well as Nick Konidaris and Chuck Steidel for assistance with the MOSFIRE data reduction pipeline. We also thank our Keck Support Astronomer Greg Wirth for assistance during our observing run. S.L.F. acknowledges support from the University of Texas at Austin, the McDonald Observatory, and NASA through a NASA Keck PI Data Award, administered by the NASA Exoplanet Science Institute. Data presented herein were obtained at the W. M. Keck Observatory from telescope time allocated to the National Aeronautics and Space Administration through the agency’s scientific partnership with the California Institute of Technology and the University of California. The Observatory was made possible by the generous financial support of the W. M. Keck Foundation. The authors wish to recognize and acknowledge the very significant cultural role and reverence that the summit of Mauna Kea has always had within the indigenous Hawaiian community. We are most fortunate to have the opportunity to conduct observations from this mountain. This work is also based in part on observations made with the NASA/ESA Hubble Space Telescope, obtained at the Space Telescope Science Institute, which is operated by the Association of Universities for Research in Astronomy, Inc., under NASA contract NAS 5-26555, as well as the Spitzer Space Telescope, which is operated by the Jet Propulsion Laboratory, California Institute of Technology under a contract with NASA.
S.L.F. wrote the text, obtained and reduced the data, and led the initial observing proposal. C.P. and M.D. assisted with the analysis of the data. M.S. and V.T. assisted with the observation planning and implementation. K.D.F. performed the [*Spitzer*]{}/IRAC photometry. A.M.K. was responsible for the reduction of the optical and near-IR imaging data used to select the sample. G.G.F., M.L.N.A. and S.P.W. obtained and reduced the mid-infrared data. B.J.W. provided grism spectroscopic information. B.M., H.C.F., M.G, N.R., A.D., A.F., N.A.G., J.-S. H., D.K., and M.R. have contributed in their roles as members of the CANDELS and S-CANDELS teams, and assisted with the planning and interpretation of the observations.
Reprints and permissions information is available at www.nature.com/reprints. The authors declare no competing financial interests. Readers are welcome to comment on the online version of the paper. Correspondence and requests for materials should be addressed to S.L.F. ([email protected]).
[^1]: The University of Texas at Austin, 2515 Speedway, Stop C1400, Austin, TX 78712, USA
George P. and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A&M University, 4242 TAMU, College Station, TX 78743, USA
National Optical Astronomy Observatory, Tucson, AZ 85719, USA
Space Telescope Science Institute, 3700 San Martin Dr., Baltimore, MD, 21218, USA
University of California, Riverside, CA 92521, USA
University of Massachusetts, Amherst, MA 01003, USA
Harvard-Smithsonian Center for Astrophysics, 60 Garden St., Cambridge, MA 02138, USA
Racah Institute of Physics, The Hebrew University, Jerusalem 91904, Israel
INAF-Osservatorio di Roma,II-00040, Monteporzio, Italy
University of Kentucky, Lexington, KY, 40506, USA
Infrared Processing and Analysis Center, MS 100-22, Caltech, Pasadena, CA 91125
Steward Observatory, University of Arizona, 933 N. Cherry Ave, Tucson, AZ 85721
|
(Note: These rankings are based on players' projected performances in 2016-17.)
Here’s the Yahoo Sports ranking of the top 25 goalies in the NHL for the 2016-17 season. Tell us where we went right -- or gently point out where we went wrong -- in the comments section.
1. Carey Price, Montreal Canadiens: The Habs had the NHL’s best record when Price was in net for them last season – and the NHL’s worst record after he went down with injury. So yeah, he’s pretty good.
2. Braden Holtby, Washington Capitals: Flirted with 50 wins last year before settling in with an NHL-record-tying total of 48 en route to his first Vezina Trophy.
3. Cory Schneider, New Jersey Devils: The league’s best goalie who gets the least hype.
4. Ben Bishop, Tampa Bay Lightning: He’s bigger than the net, which helps.
View photos Rangers goalie Henrik Lundqvist, still looking good after all these years. (Getty) More
5. Henrik Lundqvist, New York Rangers: Almost as good at goaltending as he is at looking good.
6. Tuukka Rask, Boston Bruins: He took a step back last season, a reflection of the team in front of him.
7. Jonathan Quick, Los Angeles Kings: When he’s on, he’s unbeatable. And he’s usually on.
8. Martin Jones, San Jose Sharks: Backstopped the Sharks to the Stanley Cup final in his first season as an NHL starter.
9. Roberto Luongo, Florida Panthers: Twitter sensation @strombone1 still going strong at age 37.
10. Pekka Rinne, Nashville Predators: The ravages of age and injury are starting to emerge, but he’s not done yet.
11. Corey Crawford, Chicago Blackhawks: Two Stanley Cups to his credit and he still can’t crack the top 10?! What kind of crazy list is this?!
12. Jake Allen, St. Louis Blues: Platoon days are over, the Blues’ crease belongs to Allen.
13. Brian Elliott, Calgary Flames: Platoon days are over, the Flames’ crease belongs to Elliott.
14. Steve Mason, Philadelphia Flyers: Remember when he considered retirement a few years ago due to poor play and low confidence? Somehow, he went to the goalie graveyard in Philadelphia and rebounded in a big way.
15. Petr Mrazek, Detroit Red Wings: He was giving Holtby a bit of a run for the Vezina Trophy until hitting the wall in the homestretch of the regular season.
View photos Matt Murray is still considered an NHL rookie despite leading the Penguins to the Stanley Cup last spring. (Getty) More
16. Matt Murray, Pittsburgh Penguins: Just like Ken Dryden 45 years ago, Murray has a chance to win the Calder Trophy as the NHL’s top rookie after leading his team to the Stanley Cup the previous postseason. |
l, -5, 4, -1 in ascending order.
-5, -1, l, 4
Let x = 1 + 0. Let h be 2/(-9) + (-4)/((-360)/(-430)). Sort -9, h, x in descending order.
x, h, -9
Suppose 0 = -3*i - 237 + 231. Let l(r) = -r**2 - r + 2. Let t be l(2). Put -3, t, i, -1 in increasing order.
t, -3, i, -1
Suppose -23*z - 508 = -19*z. Let d = z + 130. Put 1, d, 5, 2 in descending order.
5, d, 2, 1
Let w(u) = -u**2 + 13*u - 3. Let r be w(10). Let o be 603/(-24) - (-2)/16. Let i = o + r. Put 3, -19, i in ascending order.
-19, i, 3
Let c be (-4 - 1955/(-490))*-24. Let p = c - 10/441. Sort 2/5, p, -0.1, 1 in decreasing order.
1, 2/5, p, -0.1
Let j = 750 - 750.4. Put 0.4, j, -98 in increasing order.
-98, j, 0.4
Let l be (-508)/(-54)*15/500. Let p = -3/50 + l. Let k = -13/18 + p. Sort k, 0.4, 0.3.
k, 0.3, 0.4
Let b be 1/(1*1/4). Let o be (-2)/8 + (-11)/4. Let h be ((-7)/3)/((15 + 4)/(-57)). Sort o, h, b in decreasing order.
h, b, o
Let c = 490/1143 - -2/127. Let k(r) = -r**3 + 33*r**2 - 94*r + 126. Let n be k(30). Sort -2, -4, n, c.
-4, -2, c, n
Let q = 650.8 + -651. Put q, -23, 1/4 in increasing order.
-23, q, 1/4
Suppose -12*z + 1041 = 189. Suppose -g + z = 81. Put g, 3, 4 in decreasing order.
4, 3, g
Suppose 5*r = 3*r + 16. Suppose u - 3*u = -r. Let s = -62 - -65. Put -2, u, s in decreasing order.
u, s, -2
Let h = 13 + -11.1. Let p = -1.4 + h. Let r = -7.7 + 8. Sort 4, p, r.
r, p, 4
Let i be (24/84*-2)/(6/(-15)). Sort i, 2/15, 5 in decreasing order.
5, i, 2/15
Suppose 5*w + 10*q = 5*q + 5, -2*w = 4*q. Let s = 28 + -27. Suppose 3*m - 12 = -r + 4*r, 0 = r - 4*m + 4. Sort s, r, w.
r, s, w
Suppose 0 = 4*f - 26 - 2. Suppose 0 = -f*p + 5 + 23. Put -1, p, 3 in decreasing order.
p, 3, -1
Let y = -0.1957 - -0.1857. Sort y, -5/2, -1/4, 8.
-5/2, -1/4, y, 8
Let t = -89/2 - -45. Let a(v) = -v**2 - 16*v - 4. Let c be a(-8). Let h be c/(-8)*(-2)/(-3). Sort -3, h, t.
h, -3, t
Let q = -34.9 + 35.4. Let h = 3.05 + -0.05. Put 2/39, q, h in descending order.
h, q, 2/39
Let p = -0.364 + -1.506. Let w = p - 0.13. Sort 2/5, w, 0.01 in increasing order.
w, 0.01, 2/5
Suppose 0 = -p - 47 + 45. Put p, 29, 4 in descending order.
29, 4, p
Suppose 25 = 5*b, -z = -0*z + 4*b - 35. Suppose -2*g - 2*o = 10, 3*o = -4*g + 4*o - z. Let c be 7/(-3) + 4/12. Put c, g, 6 in decreasing order.
6, c, g
Suppose -4 = g + g. Suppose -2*t - 5*t = 56. Let r be (0 + 0)/(t + 6). Put g, r, 7 in descending order.
7, r, g
Let l be (15/(-6))/(95/76). Sort -5, l, 1 in increasing order.
-5, l, 1
Let m(r) = r**2 - 15*r - 56. Let d be m(18). Sort 0, -6, d in descending order.
0, d, -6
Let a = -486 + 1459/3. Sort a, 1/4, 3.5 in ascending order.
1/4, a, 3.5
Let m be 3/45*12/(-170). Let p be (-3803)/4675 + (1 - 0). Let h = m + p. Put h, -4, 0 in increasing order.
-4, 0, h
Let a = 1045 + -1044.7. Sort 1/7, -1.8, a.
-1.8, 1/7, a
Suppose -2*y + 117 = 5*o, 5*y = 5*o + 238 + 142. Let a = y - 73. Sort 1, 0, -4, a in descending order.
1, 0, a, -4
Let p = -699 + 697. Put -3, 6, 9, p in increasing order.
-3, p, 6, 9
Let w(d) = -d**3 - 4*d**2 + 2*d + 11. Let l be w(-4). Put l, -2, 9 in increasing order.
-2, l, 9
Let c be 10/(-6) + 665/(-7980). Let y = -5.1 + 0.1. Let z = -1/51 - -53/102. Put z, y, c in descending order.
z, c, y
Let t(i) = -i - 2. Let q be t(-4). Suppose 5*w = -p - 12, 0*w = 3*p + q*w - 3. Put 1, -5, p in descending order.
p, 1, -5
Let p = 1854 + -1845. Put 1, p, 3 in decreasing order.
p, 3, 1
Suppose 0 = -64*z + 58*z + 18. Let t(o) = o**2 - 5*o + 2. Let l be t(5). Put l, -2, z in decreasing order.
z, l, -2
Let c = -127/1062 - -1/118. Let h = -0.63 - 1.27. Let l = 3.9 + h. Put l, c, 1/4 in increasing order.
c, 1/4, l
Let i be 396/(-165) + (-10)/(-25). Put -2/19, 244, i in decreasing order.
244, -2/19, i
Let f = -0.22 - -0.4. Let k = 1.52 + f. Let j = -6.7 + k. Sort j, -2, -1/3 in descending order.
-1/3, -2, j
Let i(k) = 2*k - 23. Let t be i(18). Sort t, 0.2, -0.5 in descending order.
t, 0.2, -0.5
Suppose -s - 5*h + 32 = 2*s, -2*h = -4*s + 34. Let o be (-2)/s - 4/(-18). Suppose 9*j - 1 = 8*j. Sort o, 3, j in increasing order.
o, j, 3
Let h be 6/(-12) + (-261)/6. Let x = 45 + h. Put x, -4, 2/3 in decreasing order.
x, 2/3, -4
Let x(i) = 3*i + 18. Let a be x(-7). Put a, -7, 5, 0 in descending order.
5, 0, a, -7
Let p = -106.23 + 106.03. Let n = -0.1 - -0.1. Let i = 4.6 - 5. Sort p, n, i.
i, p, n
Let l = 266 + -260. Put l, -1, -2/7 in descending order.
l, -2/7, -1
Let n = 5.9 + -4.9. Sort 0.2, 36/11, n.
0.2, n, 36/11
Let r be -4 + 0/(1 + 1). Let l = -0.09 + 0.19. Let m = 0.6 - l. Put r, m, 0 in decreasing order.
m, 0, r
Let x = -5 - -3. Let g = -2823/13 - -217. Let h = 311 + -310. Put g, h, x in ascending order.
x, g, h
Let n be (-1 + (-48)/(-3))/(33/11). Sort n, 3, -6 in ascending order.
-6, 3, n
Let g = 33 + -29.2. Let m = g + -0.06. Let s = m + 0.26. Sort 3, -1/3, s.
-1/3, 3, s
Let f = -122 - -217. Let z = f + -98. Put z, -1/4, 4, 1/2 in ascending order.
z, -1/4, 1/2, 4
Let c be ((-2)/(-8)*-1)/((-5)/(-10)). Let t be (4/(-10))/((-2)/1). Put -1/13, c, t in decreasing order.
t, -1/13, c
Let b = -1070 - -1067. Let m(j) = -j**2 + 7*j - 1. Let y be m(6). Put b, 1, y in decreasing order.
y, 1, b
Suppose 0 = 5*b - h + 4*h + 153, 0 = b + 5*h + 13. Sort b, -4, -2 in ascending order.
b, -4, -2
Let a(q) = -q**2 - 5*q + 4. Let l be a(-6). Let i be (-29 - -31)/(8/60*-3). Sort 4, i, 5, l in decreasing order.
5, 4, l, i
Suppose -5*z = -6*z + 4*u + 6, 0 = 3*z + 4*u - 2. Put z, -9.5, -3 in ascending order.
-9.5, -3, z
Let m(d) = 2*d**2 - 4*d - 49. Let h be m(-4). Sort -4, 3/4, h in descending order.
3/4, h, -4
Let z(q) = q**2 + 10*q + 13. Let n = 32 + -41. Let r be z(n). Sort -4, r, -0.3.
-4, -0.3, r
Suppose 0 = 5*r - 3*u, -4*r + 0*r = u. Suppose -2*a + 15*a = 52. Sort a, -1, r in decreasing order.
a, r, -1
Let p = -817 + 824. Sort -2, 5, p in decreasing order.
p, 5, -2
Let j = -186 - -1304/7. Sort j, 0.3, 4, -3 in decreasing order.
4, 0.3, j, -3
Let r(h) = -h**3 - 2 + 4 + 6*h**2 - 4*h**2. Let l be r(2). Let y = -939 + 934. Sort l, y, 3 in decreasing order.
3, l, y
Suppose 0 = -f - 3*w + 7, -12*w = 2*f - 10*w + 2. Let i be (-12)/(-60) + (54/10)/3. Put i, -4, -8, f in decreasing order.
i, -4, f, -8
Suppose 6 = 4*d + 2. Let t = -1405.3 + 1405. Sort t, 0, d.
t, 0, d
Let t = 119 + -123. Let n = 0.48 + 3.72. Let w = t + n. Sort w, 3/7, 5 in increasing order.
w, 3/7, 5
Let y = 19 + -24. Let w(x) = -2*x**3 + x**2 - 2*x - 2. Let d be w(-1). Suppose 0 = k + 2*v + 4 - 5, -15 = 3*k - 3*v. Put k, d, y in descending order.
d, k, y
Suppose k + 33 = -2*k. Let j = k - -16. Suppose -10*w - 5 = -5*w. Sort w, -3, j in descending order.
j, w, -3
Let n = -73 + 118. Suppose 5*d - 3*g = -1 - 12, 5*g + n = -5*d. Sort 2, -12, d in decreasing order.
2, d, -12
Let g(y) be the first derivative of y**2/2 + 5*y - 19. Let r be g(-3). Put r, -1, 0, 3 in ascending order.
-1, 0, r, 3
Suppose 2*v + 60 = -v. Let z = 18 + v. Put 3/7, 5, z in increasing order.
z, 3/7, 5
Let l be (5 - 1)*3/16. Let x = 0.16 - -0.04. Sort l, 0, x in ascending order.
0, x, l
Suppose 2*x = -3*x - 5. Let f be 1/(4/(9 + x)). Put -0.2, f, -0.5 in increasing order.
-0.5, -0.2, f
Let u = 0.187 + 0.013. Put -1, -3, 1/147, u in descending order.
u, 1/147, -1, -3
Let g be (-6)/(-63)*(-18)/4. Sort 0.52, g, -3.
-3, g, 0.52
Let t = -2 + 3.5. Let z = -1.6 + t. Let a = 1 - -4. Put a, 0.2, z in descending order.
a, 0.2, z
Let q = -11.5 - -11. Let w = -6.7 - -6. Let k = w + 0.3. Sort q, 0, k in decreasing order.
0, k, q
Let o(f) = f**2 - 23*f - 79. Let p be o(26). Put -2, p, 1.1, -1/2 in increasing order.
-2, p, -1/2, 1.1
Let r(o) = o**2 + 10*o. Let t be r(-10). Suppose 3*n = 4*j + 45, 30 = 2*n - t*n - 5*j. Put 5, n, 2 in decreasing order.
n, 5, 2
Suppose d + 25 = 6*d, 3*y + 5*d + 89 = 0. Sort y, -2, -1, 2 in descending order.
2, -1, -2, y
Suppose -23 + 123 = 50*a. Sort 0, 3, -2, a in decreasing order.
3, a, 0, -2
Suppose -50*q = 29*q + 79. Let t be (-4)/10 - 2/(-5). Put q, -3, t in descending order.
t, q, -3
Let v(t) = -2*t**2 + 4*t - 6. Let z be v(3). Put -1/8, z, -2 in ascending order.
z, -2, -1/8
Let b = -194 - -206. Put -3, b, -4 in increasing order.
-4, -3, b
Suppose -4*z = 10 - 18. Suppose -5*x - 145 = z*i - 0*x, -2*i + x = 151. Sort i, 4, -4 in descending order.
4, -4, i
Let a = 1 - 2. Let i = 3349/3 - 1116. Put -1/3, i, |
Introduction {#Sec1}
============
Anesthesia management allows patients to undergo otherwise unbearable operations involving severe pain and marked vital reactions. In addition, in children and uncooperative adults, anesthetic management can expedite procedures, such as dental treatment, that are not particularly uncomfortable, but require the patient not to move. In particular, in dental treatment for patients with intellectual disabilities (ID), anesthesia management is used for behavioral control. Propofol is the most commonly used intravenous anesthetic for achieving such behavioral control because the depth of anesthesia induced by propofol can be controlled to a greater degree than that induced by other anesthetics, and so propofol is widely used for sedation and inducing general anesthesia during dental treatment for patients with ID.
Many people with ID are complicated with epilepsy and receive antiepileptic therapy. A recent systematic review estimated the prevalence of epilepsy to be 22.2% among people with ID^[@CR1]^. Valproate (VPA) is an antiepileptic drug (AED) with a broad therapeutic spectrum and so has become the most widely used AED worldwide^[@CR2]^. It is also the most commonly used AED among our dental patients with ID. In our research, we have so far focused on the drug interactions between propofol and VPA, and we have previously reported that oral VPA reduced the propofol dose required for sedation^[@CR3]^. Similar findings were reported in another study^[@CR4]^, which suggested that drug interactions occur between propofol and VPA. We generated the following hypotheses regarding the mechanism responsible for such drug interactions. Our first hypothesis is that VPA increases the proportion of protein-unbound free propofol in the blood during anesthesia. There is a possibility that VPA displaces protein-bound propofol because high proportions of both propofol and VPA bind to blood proteins (propofol: 97 to 99%^[@CR5],[@CR6]^, VPA: 93%^[@CR7]^). This would lead to a significant increase in the level of active propofol, which can act on the γ -aminobutyric acid (GABA)~A~ receptor, in the central nervous system (CNS). Regarding this hypothesis, we have already shown that VPA increased the proportion of protein-unbound free propofol in an *in vitro* study^[@CR8]^. Our second hypothesis is that VPA inhibits propofol-metabolizing enzymes. In previous *in vitro* studies, it was demonstrated that VPA inhibited propofol-metabolizing enzymes, such as cytochrome P-450 (CYP) 2C9^[@CR9]^ and UDP-glucuronosyltransferase (UGT) 1A9^[@CR10]^. This suggests that VPA might inhibit propofol metabolism and increase the level of propofol in the blood. Our third hypothesis is that propofol and VPA have synergistic effects at propofol's action site in the CNS. Regarding the mechanism responsible for the effects of VPA, it is considered that VPA increase the levels of GABA in the CNS by inhibiting GABA transaminase^[@CR11]^. This process might enhance the activity of propofol, which is mostly mediated via the upregulation of GABA-induced chloride currents. However, the abovementioned hypotheses are based on the findings of *in vitro* studies and have not been verified in clinical patients. The aim of this study was to verify our hypotheses in clinical patients. To do this, we examined the differences in the propofol blood level, the protein-unbound free propofol level, and the bispectral index (BIS) seen after the administration of propofol between patients that were and were not treated with VPA.
Materials and Methods {#Sec2}
=====================
The present study was approved by the ethics committee of Okayama University Graduate School of Medicine, Dentistry, and Pharmaceutical Sciences (approval number: 1966, approved on February 28, 2012), and it was registered in the University Hospital Medical Information Network (UMIN) Clinical Trials Registry (UMIN000008711). We have read the Helsinki Declaration and have followed its guidelines in this study.
Patient eligibility {#Sec3}
-------------------
Candidates were selected from patients who underwent dental treatment or oral surgery under general anesthesia at Okayama University Hospital between June 2012 and June 2017. Patients who agreed to take part in this study, met the inclusion criteria, and did not meet the exclusion criteria were selected. Written informed consent was obtained from each subject, or the legal guardians of the subject if the patient had an ID that would make it difficult for them to provide informed consent. The inclusion criteria were as follows: (1) being ≥16 years old; (2) having an American Society of Anesthesiologists (ASA) physical status of 1 or 2; and (3) not taking medication or VPA-containing medication. The exclusion criteria were as follows: (1) requiring pretreatment, such as oral midazolam and/or sevoflurane inhalation, prior to venous catheter insertion; (2) being medicated with other AED without VPA; and (3) being contraindicated for the use of propofol, remifentanil, sevoflurane, or rocuronium. The patients were divided into the control group, who were not given any medication; the mono-VPA group, who were medicated with VPA alone; and the poly-VPA group, who medicated with VPA and other AED and/or psychoactive drugs.
General anesthesia technique {#Sec4}
----------------------------
General anesthesia was induced using the same procedure in all patients. The monitoring performed during the procedure involved non-invasive blood pressure measurement; electrocardiography; and the measurement of oxygen saturation (SpO~2~; with a pulse oximeter), end-tidal CO~2~ (EtCO~2~), and the BIS. After inserting a venous catheter, the intravenous administration of remifentanil was infused at 0.25 μg/kg/min (Terumo TE-351, Terumo, Tokyo, Japan) during 2 min, then 2 mg/kg propofol was intravenously administered at 1200 mL/h using an infusion pump (Graseby 3500, Graseby Medical Ltd., Watford, United Kingdom). After the patient became unconscious, a venous catheter for blood sampling was placed in the opposite arm. Then, 0.6 mg/kg of rocuronium was intravenously administered for tracheal intubation. After the administration of propofol, no additional anesthetics were used while the patient's BIS was \<60. Then, the administration of 1.5--3% sevoflurane was started when the patient's BIS increased to ≥60. Anesthesia was freely maintained using sevoflurane and remifentanil at the anesthesiologist's discretion after sevoflurane started.
Outcome measures {#Sec5}
----------------
The blood samples used to measure propofol levels were collected at 5, 10, 15, and 20 min after the administration of propofol, and the protein-unbound free propofol concentration was measured at 5 min after the administration of propofol. To evaluate the effect of propofol-induced anesthesia, the BIS before the administration of propofol, the minimum BIS before the initial administration of sevoflurane, and the time until the BIS reached ≥60 were determined. In addition, the VPA blood concentrations of the patients in the mono-VPA and poly-VPA groups were measured by the LSI Medience Corporation (Tokyo, Japan). Laboratory data, such as the patient's serum levels of alanine aminotransferase (ALT), aspartate aminotransferase (AST), albumin (Alb), etc., were collected via preoperative blood examinations. In this study, patients with abnormal laboratory ALT, AST, and/or gamma-glutamyltransferase (γ-GT) values were suspected to have liver dysfunction. Similarly, patients with abnormal laboratory for blood urea nitrogen (BUN) or creatinine (Cr) values or abnormal estimated glomerular filtration rates (eGFR) were suspected to have renal dysfunction. Abnormal values were defined based on the Common Reference Intervals of the Japan Society of Clinical Chemistry^[@CR12]^ and the Evidence-based Clinical Practice Guidelines for CKD of the Japanese Society of Nephrology.
Measurement of propofol levels {#Sec6}
------------------------------
The blood levels of propofol and the protein-unbound free propofol level were measured as described in our previous study^[@CR8]^. Serum was collected from the blood samples by centrifuging the blood samples at 1,400 G for 10 min. To measure the protein-unbound propofol level, protein-free serum was extracted using centrifugal filter units (Centrifree®; Merck Millipore, Bedford, USA) by centrifuging the samples at 2,000 G for 30 min. For preparation, thymol (Nacalai Tesque, Inc., Kyoto, Japan), as an internal standard (IS); 0.1 M potassium dihydrogen phosphate solution (Merck KGaA, Darmstadt, Germany); and heptane solution (Sigma-Aldrich, Co., MO, USA) were added to each sample. After the resultant mixture was centrifuged at 13,000 G for 3 min, the propofol concentration of the supernatant was measured with a high-performance liquid chromatography (HPLC) system (Shimadzu Co., Tokyo, Japan).
The peak area ratio of propofol to the IS was obtained from the HPLC chromatogram at each control concentration, and calibration curves for the blood propofol level (0.156, 0.312, 0.625, 1.25, and 2.5 μg/mL) and the protein-unbound free propofol level (0.005, 0.01, 0.02, and 0.04 μg/mL) were constructed.
Statistical analysis {#Sec7}
--------------------
The results are presented as mean ± standard deviation values. Continuous variables were analyzed via one-way analysis of variance (ANOVA) with Tukey's multiple comparisons test, and categorical variables were analyzed using the chi-square test or Fisher's exact test. Mixed-effect analysis was employed for comparisons of propofol blood levels. In the analysis of BIS values, we employed an analysis of covariance (ANCOVA) model, in which the presence of ID was employed as a covariate, because our previous study indicated that the presence/absence of ID influenced BIS values during propofol anesthesia^[@CR13]^. Multiple linear regression analyses were performed to control for potential confounding variables and to identify factors that are independently associated with BIS values. The group and eight factors (age, sex, BMI, ID, liver dysfunction, the Alb concentration, and the blood levels of propofol and protein-unbound free propofol), which were considered to potentially affect BIS values when propofol was administered^[@CR8],[@CR13]--[@CR16]^, were included as potential predictors of BIS values. ANOVA, the chi-square test, Fisher's exact test and Mixed-effect analysis were performed using the GraphPad Prism statistical software (GraphPad Prism, ver. 8; GraphPad Software, Inc., La Jolla, CA, USA). ANCOVA was performed with SAS ver.9.4 (SAS Institute, Inc., Cary, NC), and the multivariate analysis was carried out with JMP ver.14.3.0 (SAS Institute, Inc., Cary, NC). P-values of \<0.05 were regarded as statistically significant.
Results {#Sec8}
=======
In total, 12, 10, and 11 subjects were included in the control group, mono-VPA group, and poly-VPA group, respectively. The demographic and clinical characteristics of the subjects in each group are summarized in Table [1](#Tab1){ref-type="table"}. There were no significant differences in terms of sex, age, height, body weight, or body mass index among the groups. The levels of protein, and Alb also did not differ among the groups. There were two, two, and three patients with suspected liver dysfunction in the control group, mono-VPA group, and poly-VPA group, respectively. There were no patients with suspected renal dysfunction in this study. However, the mono-VPA and poly-VPA groups included more patients with ID than the control group. Table [2](#Tab2){ref-type="table"} shows the details of the medications administered in the mono-VPA and poly-VPA groups. Carbamazepine and phenytoin were the drugs that were most frequently added to VPA therapy, and the combination of 2 or 3 agents, including VPA, was common in the poly-VPA group. There was no difference in the VPA concentration between the mono-VPA and poly-VPA groups.Table 1Subjects' demographic characteristics.ControlMonoPolyP-valueSex (male/female)8/44/69/20.133Age (years)29.5 ± 6.530.2 ± 10.128.5 ± 9.10.90Height (cm)163.0 ± 8.8157.4 ± 7.9164.7 ± 14.10.28Weight (kg)56.7 ± 14.057.2 ± 19.661.3 ± 16.10.78BMI (kg/m^2^)21.1 ± 3.922.9 ± 6.822.2 ± 3.30.69Intellectual disability(Yes/no) (n)4/88/2^\*^11/0^\*\*^TP (g/dL)7.47 ± 0.517.21 ± 0.487.16 ± 0.560.33Alb (g/dL)4.63 ± 0.234.37 ± 0.254.35 ± 0.450.075Suspected liver dysfunction(Yes/no) (n)2/102/83/8Suspected renal dysfunction(Yes/no) (n)0/120/100/11Data are presented as mean ± SD values.\*P \< 0.05 (vs. control group, Fisher's exact test).\*\*P \< 0.01 (vs. control group, Fisher's exact test).Control: control group, Mono: mono-VPA group, Poly: poly-VPA group.BMI: body mass index, TP: total protein, Alb: albumin.See text for definitions of suspected liver and renal dysfunction.Table 2Breakdown of the medicines used in the mono-VPA and poly-VPA groups.GroupMonoPoly**Number of medications**110 \[100\]2---5 \[45\]3---4 \[36\]4---1 \[9\]7---1 \[9\]**Antiepileptic drugs**Valproate10 \[100\]11 \[100\]Valproate blood level(µg/mL)\*53.9 ± 15.865.7 ± 21.4Carbamazepine---4 \[36\]Phenytoin3 \[27\]Phenobarbital---1 \[9\]Clobazam---1 \[9\]Clonazepam---1 \[9\]Levetiracetam---1 \[9\]Zonisamide---1 \[9\]**Antipsychotic drugs**Risperidone2 \[18\]Quetiapine---1 \[9\]Biperiden---1 \[9\]Pimozide---1 \[9\]Paliperidone---1 \[9\]Haloperidol---1 \[9\]Aripiprazole1 \[9\]**Antidepressant drugs**Etizolam---1 \[9\]Fluvoxamine---1 \[9\]Data are presented as absolute \[percentage\] or mean ± SD\* values.Mono: mono-VPA group, Poly: poly-VPA group.
The blood levels of propofol at each point after the administration of the drug and the concentration of protein-unbound free propofol at 5 min after the administration of the drug are shown in Fig. [1](#Fig1){ref-type="fig"}. There were no significant intergroup differences in the total blood propofol level at any point. The concentration of protein-unbound free propofol tended to be higher in the poly-VPA group, but the difference was not significant. This indicates that VPA therapy did not directly influence the pharmacokinetics of propofol after the administration of a single dose of the drug.Figure 1The effects of mono-VPA and poly-VPA therapy on the pharmacokinetics of propofol. The graphs show the blood levels of propofol at 5, 10, 15, and 20 min after the administration of propofol (**a**) and the concentration of protein-unbound free propofol at 5 min after the administration of propofol. (**b**) There were no significant differences among the 3 groups. However, the protein-unbound free propofol level tended to be higher in the poly-VPA group. Mixed-effect analysis was employed for the analysis of propofol blood levels, and one-way ANOVA with Tukey's multiple comparisons test were used to analyze the concentration of protein-unbound free propofol. Data are presented as mean ± standard deviation (SD) values. Control: control group, Mono: mono-VPA group, Poly: poly-VPA group.
Regarding the BIS, the BIS before the administration of propofol (control group: 97.8 ± 0.5, mono-VPA group: 96.8 ± 2.6, poly- VPA group: 94.5 ± 5.8) was not difference among the groups. The minimum BIS before the initial administration of sevoflurane (control group: 38.9 ± 12.8, mono-VPA group: 38.4 ± 14.1, poly-VPA group: 25.8 ± 7.5) was significantly lower in the poly-VPA group than in the control group according to ANOVA (p = 0.032) (Fig. [2](#Fig2){ref-type="fig"}), but this difference was not found to be significant when ANCOVA was performed using the presence of ID as a covariate (p = 0.057). However, a significant difference was detected between the mono-VPA and poly-VPA groups according to ANCOVA (p = 0.049). The time until the BIS exceeded 60 (control group: 4.4 ± 1.4 min, mono-VPA group: 5.4 ± 2.5 min, poly-VPA group: 10.9 ± 6.6 min) was also significantly longer in the poly-VPA group than in the control and mono-VPA groups by ANOVA (vs. the control group: p = 0.0021, vs. mono-VPA group: p = 0.013) (Fig. [2](#Fig2){ref-type="fig"}), and the significance of these differences was not affected by performing ANCOVA using the presence of ID as a covariate (vs. the control group: p = 0.006, vs. mono-VPA group: p = 0.012).Figure 2The effects of mono-VPA and poly-VPA therapy on the BIS values seen after the administration of propofol. In the poly-VPA group, the minimum BIS (**a**) was significantly lower, and BIS of \<60 were maintained for significantly longer (**b**) than in the other groups. The statistical analyses were performed via one-way ANOVA with Tukey's multiple comparisons test. The data are presented as mean ± SD values. Control: control group, Mono: mono-VPA group, Poly: poly-VPA group.
Finally, multivariate linear regression models were constructed using the minimum BIS value or the time until the BIS exceeded 60 as dependent variables. The estimated coefficient, standard error, and P-values for these variables are presented in Tables [3](#Tab3){ref-type="table"} and [4](#Tab4){ref-type="table"}. In the multivariate regression analysis, belonging to the poly-VPA group was shown to be independently associated with the minimum BIS value or the time until the BIS exceeded 60, and was also found to significantly affect the BIS value. These findings indicate that polytherapy involving VPA enhanced the effects of propofol in clinical patients.Table 3Multiple regression analysis of predictors of the minimum BIS value.VariableEstimated coefficientStandard errorP-valueIntercept71.81539.9400.088Group (poly-VPA)9.9333.2490.007Age−0.2290.3030.460Sex (female)−4.8282.8800.110BMI−0.6920.6150.274Non-ID−2.0582.9720.497Non-liver dysfunction−4.3143.0230.170Alb−2.7077.6660.728Propofol level−7.0388.8300.435Free propofol level205.673285.1080.480R^2^ = 0.455.BMI: body mass index, ID: intellectual disability, Alb: albumin.See text for the definition of suspected liver dysfunction.Table 4Multiple regression analysis of predictors of the time until the BIS exceeded 60.VariableEstimated coefficientStandard errorP-valueIntercept9.0187.3400.234Group (poly-VPA)−1.9510.5970.004Age0.0740.0560.198Sex (female)−0.0440.5290.934BMI0.1770.1130.134Non-ID0.3110.5460.575Non-liver dysfunction−0.3010.5560.594Alb−1.5531.4090.284Propofol level−1.2971.6230.434Free propofol level34.33752.3940.520R^2^ = 0.620.BMI: body mass index, ID: intellectual disability, Alb: albumin.See text for the definition of suspected liver dysfunction.
Discussion {#Sec9}
==========
In this study, to evaluate the effects of VPA therapy on the pharmacokinetics of propofol, we compared the total and protein-unbound free propofol levels seen after the administration of a single bolus of propofol among patients treated without VPA, patients treated with mono-VPA therapy, and patients treated with poly-VPA therapy. As a result, we found that the BIS was significantly lower and a BIS of \<60 was maintained for significantly longer in the poly-VPA group. However, there were no significant differences in the total or protein-unbound free propofol level between the 3 groups, and the pharmacokinetics of propofol were not altered by VPA therapy.
Drug-drug interactions involving AED are common in clinical practice. An estimated 6% of cases of AED intoxication are related to drug-drug interactions^[@CR17]^. In general, antiepileptic monotherapy has been found to be effective in 60% to 70% of newly diagnosed epileptic patients, while up to 50% of patients in whom antiepileptic treatment initially fails can be managed by switching them to alternative antiepileptics^[@CR17]^. Furthermore, epileptic patients who do not respond to monotherapy are typically administered a combination of antiepileptics to improve their seizure control^[@CR17]^. However, polytherapy is expected to increase the risk of drug-drug interactions.
It is widely known that AED induce or inhibit CYP activity and influence drug metabolism. Most AED induce CYP activity^[@CR18]^, but it has also been shown that VPA inhibits CYP2C9, CYP2C19, and CYP3A4 activity and has the potential to inhibit drug metabolism, resulting in a number of interactions involving elevated plasma concentrations of concomitantly administered drugs^[@CR2]^.
Ninety percent of administered propofol is metabolized in the liver, and the resultant metabolites are excreted in urine. Both phase I (hydroxylation) and phase II (glucuronidation) processes contribute to propofol metabolism. Seventy percent of the drug is converted to propofol glucuronide by uridine diphosphate UGT1A9, while CYP2B6 and, to a lesser extent, CYP2C9 are responsible for the hydroxylation of propofol to 1- and 4-quinol metabolites^[@CR19]^. *In vitro* studies demonstrated that VPA inhibited CYP2C9^[@CR9]^ and UDP-glucuronosyltransferase (UGT) 1A9^[@CR10]^, and these findings led to the hypothesis that VPA inhibits propofol metabolism and increases the blood level of propofol. However, it has been suggested that VPA only weakly inhibits CYP2C9^[@CR17]^, and the inhibition of UGT1A9 by VPA was detected at a high VPA concentration. Therefore, VPA might not influence the blood level of propofol in the clinical setting, as indicated by our results. In addition, our study suggested that other AED and psychoactive drugs had no influence on the propofol level because the total propofol level did not differ between the mono-VPA and poly-VPA groups.
Another drug-drug interaction between VPA and propofol that needs considering is that VPA can displace serum protein-bound propofol, which increases the proportion of protein-unbound free propofol. A high proportion of propofol (97 to 99%) binds to serum proteins, and it is considered that the protein-unbound free propofol concentration is important for the pharmacodynamics of propofol because free propofol has knock-on effects on propofol's target proteins, such as the GABA~A~ receptor. Regarding this matter, in a previous *in vitro* study we suggested that VPA might affect the binding of propofol to serum proteins and increase the proportion of protein-unbound free propofol in serum^[@CR8]^. However, these results were obtained at a low Alb concentration (2.5 g/dL) and a VPA concentration of ≥100 μg/mL. In the current study, the VPA concentration was 64.0 ± 21.4 μg/mL in the mono-VPA group and 58.0 ± 15.3 μg/mL in the poly-VPA group, and the VPA concentrations of both groups were \<100 μg/mL. Moreover, the Alb level was \>4.0 g/dL in all groups. Therefore, the VPA and Alb levels of our subjects differed from those found in our previous *in vitro* study, and VPA did not influence the protein-unbound free propofol concentration. However, the protein-unbound free propofol level tended to be higher in the poly-VPA group than in the other groups although the differences were not significant. The protein-bound proportions of carbamazepine (75%), phenytoin (\~90%)^[@CR20]^, and risperidone (90%)^[@CR21]^, which are the other main drugs that are combined with VPA, are also high, and it is possible that the combined use of these drugs might have influenced the protein binding of propofol in the present study.
Another conceivable mechanism that might underlie the drug-drug interactions between propofol and VPA is synergistic effects at propofol's site of action in the CNS. The hypnotic action of propofol is mostly mediated via the enhancement of GABA-induced chloride currents through the binding of the drug to the β-subunit of the GABA~A~ receptor^[@CR22]^. VPA inhibits succinate semialdehyde dehydrogenase and GABA transaminase, and consequently, the brain levels of GABA tend to increase^[@CR11]^. This might lead to synergistic effects between propofol and VPA. In our study, there was no difference in the minimum BIS or the time for which the BIS remained \<60 between the control group and the mono-VPA group. This indicates that VPA monotherapy had no synergistic effects when combined with propofol. However, in the poly-VPA group, the BIS was significantly lower and BIS of \<60 were maintained for significantly longer. In the poly-VPA group, other AED (such as carbamazepine and phenytoin), antipsychotics, and antidepressants were used as additional drugs (Table [2](#Tab2){ref-type="table"}). The molecular targets of AED are Na^+^ channels, Ca^2+^ channels, the GABA~A~ receptor, etc^[@CR23]^, and these drugs inhibit abnormal neuronal excitation through these targets. Thus, it can be inferred that these effects might also enhance the anesthetic effects of propofol. Moreover, the main mechanism of action of antipsychotics involves antagonism of the dopamine D2 receptor. A recent study showed that droperidol, a dopamine D2 receptor antagonist, enhanced sevoflurane-induced anesthesia^[@CR24]^, so some antipsychotics, which have antagonistic effects on the D2 receptor, also enhance anesthetic effects. Our results demonstrated that there were no differences in the blood concentration or protein-unbound free concentration of propofol among the 3 groups; therefore, it is presumed that synergistic effects at propofol's site of action in the CNS affected the BIS of propofol, and so the BIS of propofol was significantly lower and BIS of \<60 were maintained for significantly longer in the poly-VPA group.
However, in our previous study^[@CR3]^, the required doses of propofol were significantly lower in the mono-VPA group than in the control group, and mono-VPA therapy altered the effects of propofol, unlike in the present study. So, why were there discrepancies between the results of our two studies? The reason for this is unclear. However, midazolam was used in combination with propofol for sedation in the previous study, and midazolam might have similar effects to poly-AED therapy. Midazolam was also suggested to have such effects in our previous study. This retrospective cohort study suggested that the amount of intravenous midazolam administered is an independent determinant of the time to recovery from general anesthesia^[@CR25]^. In this way, there is a possibility that the use of multiple CNS depressants affects the BIS during general anesthesia or sedation. However, we were not able to directly examine this hypothesis in the current study.
This study had a few limitations that need to be mentioned. First, there is the influence of epilepsy on the BIS. The BIS is derived from electroencephalography (EEG) and has been reported to be useful for measuring the hypnotic component of anesthesia. No detailed method for calculating the BIS has yet been published. Epilepsy attacks obviously induce EEG changes; however, there have been few reports about the abnormal BIS values observed in patients with epilepsy. In addition, there have reports about both increases^[@CR26],[@CR27]^ and decreases in the BIS during seizures^[@CR28]--[@CR30]^, so the changes in the BIS seen during seizures remain unclear. In our study, most patients had well-controlled epilepsy, but some patients suffered regular small seizures. Despite this, there were no differences in the BIS seen before the induction of general anesthesia among the 3 groups, and no sudden changes in the BIS value, which were reported during epileptic seizures in previous studies^[@CR28],[@CR29]^, were noted in the present study. Therefore, we consider that epilepsy did not directly affect the BIS in our study. The second limitation is the influence of ID on the BIS. We have reported that patients with ID exhibited significantly lower BIS during general anesthesia than patients without ID, and patients with ID took longer to emerge from anesthesia than patients without ID^[@CR13]^. In the current study, the control group included 4 patients with ID (33%), the mono-VPA group included 8 patients with ID (80%), and the poly-VPA group included 11 patients with ID (100%); i.e., more patients with ID were included in the mono-VPA and poly-VPA groups than in the control group. It is possible that such population biases influenced our results. Therefore, we added an ANCOVA model, in which the presence of ID was employed as a covariate, to adjust for imbalances in this variable. Moreover, we analyzed our results using multiple linear regression to control for potential confounding variables. As a consequence, both analyses indicated that the use of multiple CNS depressants, including VPA, significantly affected the BIS value. The third limitation is that this study could not clarify which factors in the poly-VPA group, such as the number of AED, a certain kind of AED, or the amount of AED, etc., influenced our results. As the combinations of AED used in the poly-VPA group were not determined, it was very hard to evaluate these matters. The fourth limitation is that our sample size was small. This study was carried out at a single center, and it was hard to find patients who met the inclusion criteria, did not meet the exclusion criteria, and agreed to participate in our study. However, in the analysis of the time taken to reach a BIS of ≥60 a power (1-β) value of 0.83 was achieved, which was sufficient. We will plan future studies in consideration of the limitations of this study.
In conclusion, based on our previous studies, we hypothesized that VPA therapy would alter the pharmacokinetics of propofol and enhance its effects, and we evaluated our hypothesis in this study. As a result, we found that VPA therapy did not influence the pharmacokinetics of propofol. However, in poly-VPA therapy; i.e., combination therapy involving VPA and other AED or antipsychotics, significantly lower BIS were seen, and BIS of \<60 were maintained for significantly longer. The findings of the present study suggest that using multiple CNS depressants, such as AED or antipsychotics, might decrease the BIS and maintain low BIS values for longer due to synergistic effects at the site of action of propofol in the CNS. We must pay close attention to patients who undergo multi-drug therapy for epilepsy during the management of anesthesia because the BIS might be affected by these drugs.
**Publisher's note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The present study was supported by institutional funding of Okayama University Graduate School of Medicine, Dentistry and Pharmaceutical Sciences and a Grant-in-Aid for Young Scientists (B) (24792214 and 19K19253) from Japan Society for Promotion of Science.
M.K. contributed to data acquisition, analysis and interpretation and drafted the manuscript; H.H. contributed to conception, design, data acquisition, analysis, and interpretation, drafted and critically revised the manuscript; M.I.-M. and M.N., contributed to data acquisition, conducted HPLC and drafted the manuscript; Y.H.-W. and S.M., contributed to data acquisition, critically revised the manuscript; T.M., contributed to conception, design, data analysis, and interpretation, critically revised the manuscript. All authors gave final approval and agree to be accountable for all aspects of the work.
The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.
The authors declare no competing interests.
|
Q:
Returning value from a jQuery function
I was wondering why this jQuery function is not returning any value from the function. It does increase the value in Firebase and everything else works fine except returning value. Badly stuck with this for hours :(
$(function(){
$('.post').each(function(){
var $this = $(this);
var postTitle = $this.find('.title').text();
//create separate firebase reference
var postRef = new Firebase('https://bloganalyzer-view-stat.firebaseio.com/trying/'+postTitle);
var pData = getFirebaseData(postRef,'post');
$this.find('.count').empty().html(pData);
});
});
function getFirebaseData(r,bp){
var data;
r.once('value', function(snap) {
data = snap.val();
if (data == null) {data=1;}
else if(bp=='blog') {data+=10;}
else if(bp=='post') {data+=1;}
r.set(data);
});
return data;
}
and the HTML part is something like that..
<div class="post">
<span class="title">Title 1</span>
<span class="viewCount"></span>
</div>
<div class="post">
<span class="title">Title 2</span>
<span class="viewCount"></span>
</div>
Any kind of help would be appreciated.
A:
The firebase api is an asynchronous api, so you can't return value frrm that instead you can use a callback to do the processing
$(function () {
$('.post').each(function () {
var $this = $(this);
var postTitle = $this.find('.title').text();
//create separate firebase reference
var postRef = new Firebase('https://bloganalyzer-view-stat.firebaseio.com/trying/' + postTitle);
//pass a callback to getFirebaseData which will be called once the request is completed
getFirebaseData(postRef, 'post', function (pData) {
//this will get called once the request is completed
$this.find('.count').html(pData);
});
});
});
//accept the callback as the last param which is a function
function getFirebaseData(r, bp, callback) {
r.once('value', function (snap) {
var data = snap.val();
if (data == null) {
data = 1;
} else if (bp == 'blog') {
data += 10;
} else if (bp == 'post') {
data += 1;
}
r.set(data);
//once the value of data is calculated call the callback and pass the value to it instead of trying to return it
callback(data)
});
}
How do I return the response from an asynchronous call?
|
package design.design_patterns.factory.pizzaaf;
public class Mushroom implements Veggies {
public String toString() {
return "Mushrooms";
}
}
|
98 Md. App. 721 (1994)
635 A.2d 43
JOSEPH J. WIELEPSKI
v.
HARFORD COUNTY, MARYLAND.
No. 617, September Term, 1993.
Court of Special Appeals of Maryland.
January 5, 1994.
William R. Phelan, Jr. (Alfred Neil Kramer, on the brief), Aberdeen, for appellant.
Nancy L. Giorno, Asst. County Atty. (Diane T. Swint, Assistant County Atty., on the brief), Bel Air, for appellee.
Argued before BISHOP, WENNER and CATHELL, JJ.
BISHOP, Judge.
Pursuant to Rule 2.4 of the Harford County Administrative Rules of Procedure for Regulations and Hearings, appellants, Joseph J. Wielepski and Mr. and Mrs. Stanley Wielepski (collectively, "the Wielepskis"), filed an appeal to the Circuit Court for Harford County from a final decision of the Harford County Director of Administration (the "Director") requiring the Wielepskis to pay a road improvement fee as a condition to the development of real estate. Appellee, Harford County (the "County"), filed a motion to dismiss the appeal, which the circuit court denied. After the court heard oral argument, it affirmed the decision of the Director. The Wielepskis filed a timely notice of appeal to this Court.
Issue
The Wielepskis raise one question for our consideration: Does § 4.051 of the Harford County Subdivision Regulations impose an illegal tax? We shall answer that question in the affirmative and, accordingly, reverse the judgment of the circuit court.
Facts
The facts of this case are undisputed. The Wielepskis, owners of real property in Harford County, sought to develop that property by subdividing it into nine individual home lots. In the course of dealings with the County to gain all necessary approvals, the Wielepskis learned that they would be required to pay the County approximately $97,000 for future road improvements to two public roads bordering their property. That estimate was based on the anticipated cost of improving the roads to meet County standards. This charge would add $10,000 to $12,000 to the price of each lot, thereby driving the cost of the lots above market value.
Over a year after learning of the estimated charge, the Wielepskis signed a Preliminary Plan Approval letter that included, next to their signatures, the following statement: "I hereby accept the conditions of this preliminary plan approval." Paragraph three of that letter contained the following language: "Road frontage improvements will be required along Robinson Mill Road and Day Road."
The County imposed the road improvement charge pursuant to § 4.051 of its Subdivision Regulations, which provides in pertinent part:
c. Frontage improvements.
1. Proposed developments, including residential, business, industrial or institutional developments or subdivisions to be constructed along existing County roadways not meeting County road standards for existing or contemplated traffic demands will be required to improve one half (1/2) of the County roadway along their property to required County road standards. Should construction of the roadway be considered infeasible at the time of development, the developer may deposit the estimated construction cost in an account with Harford County for the future improvements of that roadway to the designated County road standards.
2. Frontage improvements are required when a parcel of land is subdivided or developed for purposes of creating:
* * * * * *
(b) any residential use for more than five (5) dwelling units....
Because construction of the roadway was deemed to be "infeasible" at the time of development, the Wielepskis were required to deposit the fee into an escrow account pursuant to § 4.051(e)(3), which provides:
Upon the written request of the subdivider/developer, in lieu of completing the improvements required, and upon mutual recommendation by the Department of Public Works and Department of Planning and Zoning and approval by the Department of Law, the subdivider/developer shall deposit the cost, as estimated by Harford County of constructing/installing any and all improvements required in an interest-bearing escrow account with Harford County, thereby insuring the actual construction/installation of such improvements. Such an account may be permitted to be established when:
(a) The construction of the road improvement is considered by the Department of Public Works to be infeasible at the time because of existing physical or topographical conditions, or the developer/County is unable to acquire the necessary rights-of-way; or
(b) The County has a proposed capital project set forth in the Capital Improvements Program.
At the hearing before the Director, there was a discussion regarding to what use the funds would be applied. The Wielepskis maintained that the funds would not be used to improve the roadways, but would be used to maintain them. Arden Holdredge, Chief of Current Planning, said that "the money is put in escrow, but it would have to be used on these two roads. For example to improve an intersection impacted by this development, drainage, etc." The Director said that "the money would be used to perform any maintenance required or make any improvements needed as a result [of] this subdivision it would not be used for snow removal, etc." The County, through counsel, explained that the funds "would be used for anything that effects [sic] this road because of this subdivision." The County also acknowledged that, were the County actually to make the road improvements, there is no question that people other than the subdivision's residents would benefit from those improvements. In his decision letter, the Director concluded that, "[w]here traffic volume does not immediately warrant major widening or reconstruction, funds collected for road improvements may be used to do maintenance and repair work in the years to come."
The circuit court affirmed the Director's decision in a letter opinion, which reads:
The Court will make the analysis of this case relatively simple as we believe that the County's Memorandum correctly analyzes the matter, including that the monies to be paid in this case are not an unlawful tax. Accordingly, the decision of the Director of Administration must be AFFIRMED.
We can see a practical problem that may present in this and like situations. You may have a case where a significant amount of money is deposited for future road improvement where the road may never be improved. This will leave a considerable amount of money in limbo on a potentially indefinite basis. In that connection, the County may wish to amend the law and/or regulations to allow for some refund after a fixed period of time if the road is not improved.
Discussion
I
"As subdivisions of the State, counties may only act when specific grants of power are conferred upon them. They do not have the power to tax on their own authority, but may do so only if the power has been granted by the State." Eastern Diversified Properties, Inc. v. Montgomery County, 319 Md. 45, 49, 570 A.2d 850 (1990) (citations omitted); see also Md. Const. art. XI-A, § 2.
As a charter county exercising home rule powers, Harford County is governed by the Express Powers Act, Md. Ann. Code art. 25A, §§ 1-6 (1990 & Supp. 1993). Section 5(O) of that act expressly grants Harford County the power to levy a property tax, but it does not grant a general taxing power. See Eastern Diversified, 319 Md. at 50, 570 A.2d 850; Montgomery County Bd. of Realtors, Inc. v. Montgomery County, 287 Md. 101, 106-07, 411 A.2d 97 (1980). Under § 5(S), however, Harford County may
pass all ordinances ... not inconsistent with the provisions of [Article 25A] or the laws of [Maryland], as may be proper in executing and enforcing any of the powers enumerated in [§ 5] or elsewhere in [Article 25A], as well as such ordinances as may be deemed expedient in maintaining the peace, good government, health and welfare of the county.
The Court of Appeals has
characterized § 5(S) "as a broad grant of power to legislate on matters not specifically enumerated in Art. 25A," in pursuance of which necessary and beneficial ordinances may be enacted consonant with the general powers of the charter county; moreover, [the Court of Appeals has] recognized that § 5(S) must be liberally construed to afford wide discretion to charter counties in the good faith exercise of their police powers in the public interest.
Eastern Diversified, 319 Md. at 50-51, 570 A.2d 850 (quoting Montgomery Citizens League v. Greenhalgh, 253 Md. 151, 161, 252 A.2d 242 (1969)). Thus, we must determine whether the road improvement fee in the case sub judice is an illegal tax, or a reasonable fee incidental to a valid regulation enacted pursuant to Harford County's police power.
In Maryland Theatrical Corp. v. Brennan, 180 Md. 377, 381-82, 24 A.2d 911 (1942), the Court of Appeals distinguished the characteristics of revenue measures from those of regulatory measures.
A regulatory measure may produce revenue, but in such a case the amount must be reasonable and have some definite relation to the purpose of the Act. A revenue measure, on the other hand, may also provide for regulation, but if the raising of revenue is the primary purpose, the amount of the tax is not reviewable by the courts. There is no set rule by which it can be determined in which category a particular Act primarily belongs. In general, it may be said that when it appears from the Act itself that revenue is its main objective, and the amount of the tax supports that theory, the enactment is a revenue measure. "In general, * * * where the fee is imposed for the purpose of regulation, and the statute requires compliance with certain conditions in addition to the payment of the prescribed sum, such sum is a license proper, imposed by virtue of the police power; but where it is exacted solely for revenue purposes and its payment give[s] the right to carry on the business without any further conditions, it is a tax."
(Quoting 33 Am.Jur. Licenses ¶ 19, at 340). The Wielepskis argue that, rather than imposing a regulatory fee, § 4.051 imposes a tax similar to the "development impact fee" the Court of Appeals recently struck down in Eastern Diversified, supra aimed primarily at raising revenue in order to fund road improvements. We agree.
In Eastern Diversified, a property owner (Diversified) applied for a building permit to construct an automobile sales and service facility. Montgomery County approved the permit upon the condition that Diversified pay a development impact fee of $118,006. Development impact fees are "charges levied by local governments against new development to generate revenue for capital funding necessitated by that development." Price Dev. Co. v. Redevelopment Agency, 852 F.2d 1123, 1127 (9th Cir.1988) (citing Juergensmeyer & Blake, Impact Fees: An Answer to Local Governments' Capital Funding Dilemma, 9 Fla.St.U.L.Rev. 415, 417 (1981)).
Montgomery County assessed development impact fees on building permit applicants in two designated "policy planning areas," Germantown and eastern Montgomery County.
In enacting the development impact fee, the County stated that it was "exercising its home rule powers, including its police power to ensure and coordinate the provisions of adequate transportation facilities with new development so that the public health, safety, and welfare are enhanced, traffic congestion is lessened, accessibility is improved, and economic development is promoted."
Eastern Diversified, 319 Md. at 49, 570 A.2d 850 (quoting Montgomery County Code ch. 49A, § 3(b) (1984)). The fees were "calculated based upon the type of structure to be built and, in certain instances, upon the total square footage of the structure." Id. at 48, 570 A.2d 850. The revenue generated from the fees was to be used to finance road construction in the growth areas.
The Court of Appeals held that the fee was an illegal tax because it was "exacted solely for revenue purposes, is an involuntary payment of money, and the funds raised by the fee are used to finance road construction which benefit the general public." Id. at 55, 570 A.2d 850. The Court relied on several factors in reaching this conclusion:
Indeed, the revenue raising objective of the development impact fee scheme is evident in § 49A-2(f) which states:
"Imposing a development impact fee that requires new development in certain impact fee areas to pay their pro rata share of the costs of impact highway improvements necessitated by such new development in conjunction with other public funds is a reasonable method of raising the funds to build such improvements in a timely manner."
Section 49A-2(g) states that funds collected from the imposition of development impact fees "will fund, in part, the improvements necessary to increase the transportation system capacity in the impact fee areas thereby allowing development to proceed." Nothing in ch. 49A suggests that impact fees are charged solely on the basis of service provided to the property owner, or to defray expenses of the development regulatory process. As we see it, the primary and predominant purpose of the enactment of the development impact fee is to raise revenue, regardless of what incidental regulatory effect the imposition of the fees may have on development within the county. The amount of the individual development impact fee in this case ($118.006) [sic], the projected total revenue of $108,723,000 from impact fees and the anticipated expenditure of $227,483,000 on highway construction indicate to us that the main purpose of ch. 49A is to raise revenue.
Additionally, there are no further conditions that must be met by the developer when the impact fee is assessed. All that is required under ch. 49A-4 for the developer to qualify for a building permit is the payment of the impact fee. The County's principal purpose under ch. 49A is not the regulation of development, therefore, but rather to generate revenue to build roads. The relationship between the fee and the benefit to the property owner necessary for the measure to be regulatory in effect is not just that the property owner receive some benefit from the improvement, as the County asserts, but as we said in Theatrical Corp. ..., "[t]he amount must be reasonable and have some definite relation to the purpose of the Act."
Id. at 54-55, 570 A.2d 850.
The County argues that § 4.051(c) has two features that distinguish it from the development impact fee in Eastern Diversified. First, the County's fee pertains only to road improvements directly fronting the property to be developed. Thus, the improvements directly benefit the specific property involved in the development project, unlike the case in Eastern Diversified, where the fees supported road construction in a larger, non-specific, policy planning area. Second, there is a specific nexus between the amount of the fee and the actual cost to improve the one-half of the roadway fronting the property to County road standards. The fee is based on the County's estimation of the actual cost of road improvements. In Eastern Diversified, on the other hand, the fee was based on the type or size of structure to be built and bore no relation to the actual cost of road improvements.
In light of Maryland Theatrical Corp. and Eastern Diversified, we hold that the Harford County Council was without authority to enact § 4.051(c) of the County's Subdivision Regulations because it exacts an illegal tax. The County's attempt to distinguish the nature of the fee from Montgomery County's development impact fee is unavailing. The sole purpose of the fee in the case sub judice is to generate revenue to finance, in whole, road improvements necessary as a consequence of land development. Nothing in § 4.051 suggests that the fee is charged solely on the basis of service provided to the property owner. Indeed, the County acknowledged that the road improvements would benefit those other than the property owners; we shall take judicial notice of the fact that improvements to public roads benefit the public in general, not only the bordering property owners. Further, there is absolutely no indication that the fee is used to defray expenses of the development regulatory process. In fact, there is every reason to believe that the fee is not used to finance the regulatory process because the revenue generated from the fee is to be applied, theoretically, toward the actual cost of the road improvements.
In Montgomery County v. Waters Landing Ltd. Partnership, 99 Md. App. 1, 635 A.2d 48 (1994), we revisited the Montgomery County "impact fee" and determined that, by virtue of 1963 Md. Laws ch. 808, Montgomery County did and does have the authority to impose that fee, which is in actuality an excise tax. Id. at 12-13, 635 A.2d at 54. We recognized that, following Eastern Diversified, the Maryland General Assembly enacted 1990 Md. Laws ch. 707 "`[for] the purpose of clarifying and confirming the authority of Montgomery County to impose and provide for the collection of development impact taxes....'" Id. at 11, 635 A.2d at 53. Further, we pointed out that statutes similar to ch. 808 also exist with reference to Baltimore County and Baltimore City. Id. at 32 n. 6, 635 A.2d at 64.
Based on Waters Landing, we conclude that, had the Maryland General Assembly intended to vest Harford County with the authority to impose an impact tax, it would have enacted legislation similar to ch. 808. In the absence of such special legislation, we must conclude that the County does not have the power to levy the fee. Because we conclude that § 4.051(c) is facially invalid, it is not necessary to address the Wielepskis' contention that § 4.051(c), as applied under the particular facts of this case, is illegal.
II
The County advances, as an independent basis for affirming the judgment of the circuit court, the argument that the Wielepskis are somehow precluded from challenging the validity of the fee because they are contractually obligated to pay the fee by virtue of the preliminary plan approval letter bearing their signatures and agreement to abide by the terms thereof, including improvement of the road frontage along Robinson Mill and Day Roads. We disagree.
The County does not cite any authority to support the proposition that a property owner can obligate itself, by contract, to pay an illegal tax, nor do we perceive this to be the law of Maryland. Assuming, without deciding, that the preliminary plan approval letter was sufficiently definite to constitute a contract between the County and the Wielepskis for the payment of fees necessary to complete the road improvements, based on our discussion in Section I, supra, we hold that the provision for completion of the road improvements was illegal, against public policy, and therefore, unenforceable. See State Farm Mut. Auto. Ins. Co. v. Nationwide Mut. Ins. Co., 307 Md. 631, 643, 516 A.2d 586 (1986) ("A contractual provision that violates public policy is invalid, but only to the extent of the conflict between the stated public policy and the contractual provision."); Van Meter v. Wilkinson, 187 Md. 492, 499, 50 A.2d 557 (1947) (where the consideration for a promise is illegal, contract will not be enforced).
JUDGMENT REVERSED; APPELLEE TO PAY THE COSTS.
|
Integrative
HEALTH COACHING
Integrative Nurse, Health and Thriving Coach
Alli, owner of Menu To Thrive, is a pioneer of the inaugural class of Integrative Health Coaching (IHC) at the Arizona Center for Integrative Medicine at the University of Arizona. IHC is a client-centered, relational approach to working with individuals collaboratively to address the health and wellbeing of the whole person. It acknowledges the interdependent roles of the mind, body, and spirit and the innate healing capacity within each person. Alli has completed over 100 hours of training in IHC and Motivational Interviewing. She uses the core aspects of both approaches to offer a supportive and creative relationship for her clients to elicit change. She works with individuals and groups to stimulate internal motivation and a sense of purpose. Allison guides the individual to connect their life purpose and personal values with their health goals.
At Menu To Thrive you can expect:
An attitude of kindness and healing
A guiding and supporting relationship
An acknowledgment of the innate wisdom and healing potential within yourself
To be met where you are on your journey, without judgement
A present and non-judgmental listener
All core areas that influence your health and wellbeing to be addressed
The tools you need to take charge of your health
Obtainable goals and setting action steps to achieve them
Emphasis on self-care and self-empowerment
Strict confidentiality
Alli combines her educational background in traditional medical practices with a keen interest in holistic health to provide a tailored coaching program that really helps the client make real, measured progress towards goals. She provides keen insight into the barriers and challenges that sometimes prevent us from being able to reach our goals. While I had merely hoped to gain some coping skills for significant stress and health challenges, I walked out of our coaching relationship with so much more. I now have a deep understanding of my goals and strengths as well as those things that often derailed me. Alli goes the extra mile in every way to provide a welcoming, enriching experience. Her coaching enabled me to make real, tangible changes in all aspects of my health.”
Jayme, Iowa
“What a pleasure to work hand in hand with Allison! I was on a roller coaster of health and nutrition and I really needed to change. Allison focused on what was most important to me, by revealing insightful questions that helped me form a plan that worked for me. I never felt anything but support and meaningful guidance during our sessions. In between sessions I was able to use her suggestions as motivators and tools, which were highly effective. Her compassionate and caring nature helped me to realize my true potential, and begin seeing food and nutrition in a new way. Her commitment and warmth enabled me to deeply connect to my true self. Her work is transformational.”
Cassie, Florida
“I can not say enough about how positive my experience was with Allison! I gained more than I would have ever thought! I’ve always been compliant with good nutrition and exercise habits; but as she had me evaluate all of the areas that are the Core Values of Health. Allison always had a great voice and wonderful techniques to bring me into focus (even if I had my kids running around and other things going on!). I still use some of the techniques she taught me to bring me into focus when my day seems to be going in every wrong direction. I have learned how to step back and close my eyes and think of what is most important to my core values system, allowing me to avoid being brought down by external negativity that can surround us at times. I highly encourage anyone to try Menu To Thrive! I am so happy for what I gained through this experience!”
Melanie, Iowa
“I have had the pleasure of knowing Alli as a friend …and as my health coach. I am an enormous fan of her wisdom, ambition, wit, enthusiasm, strength & warmth. Through the time I have known Alli, I have witnessed her to speak, act and live all the words of her purpose. She is a deeply gifted guide and is able to help others understand and practice Integrative and holistic Nutrition. As a coach, Alli gives full expression to the wealth of hard won nutritional, physical and emotional knowledge that she has amassed, imparting to her clients the means to reach a balanced lifestyle. By taking many small leaps, and with the right support, I made giant, permanent changes in my life by combatting stress and health issues. She helped me learn better to co-create my tomorrow by making choices that were aligned for me today.”
Stacy, Colorado
Contact Alli
Contact me today to schedule a free informational session.
First Name
Last Name
Email address
Leave this field empty if you’re human:
Menu To Thrive Newsletter
Join the Menu To Thrive’s Newsletter and receive valuable tips and info directly to your inbox. |
is there anything similar to these?(sorry the barn looks like nobody has touched it for years lol dirt in barn gathers up rather easily)https://imgur.com/a/kN8Fx(also, cross tie rings? im sure i saw on on the database but i cant find it ) |
Q:
Context menu only showing for a few TableView rows javafx fxml
I have a TableView, in which i need each row to have a context menu. In this context menu there should be an Edit option and a Remove option. I wrote this class:
public class ContextMenuRowFactory<T> implements Callback<TableView<T>, TableRow<T>> {
private List<MenuItem> menuItems;
public List<MenuItem> getMenuItems() {
return menuItems;
}
public void setMenuItems(List<MenuItem> menuItems) {
this.menuItems = menuItems;
}
@Override
public TableRow<T> call(TableView<T> view) {
final TableRow<T> row = new TableRow<>();
final ContextMenu menu = new ContextMenu();
menu.getItems().addAll(menuItems);
row.setContextMenu(menu);
row.contextMenuProperty().bind(
Bindings.when(Bindings.isNotNull(row.itemProperty())).then(menu).otherwise((ContextMenu) null));
return row;
}
}
And I use it like this, in fxml:
<TableView fx:id="table" layoutX="14.0" layoutY="35.0" prefHeight="660.0" prefWidth="514.0" editable="true">
<columnResizePolicy>
<TableView fx:constant="CONSTRAINED_RESIZE_POLICY" />
</columnResizePolicy>
<items>
<FXCollections fx:id="tableData" fx:factory="observableArrayList" />
</items>
<columns>
<TableColumn prefWidth="50" text="Column 1" />
<TableColumn prefWidth="50" text="Column 2" />
</columns>
<rowFactory>
<ContextMenuRowFactory>
<menuItems>
<FXCollections fx:factory="observableArrayList" >
<MenuItem text="Edit" />
<MenuItem text="Remove" />
</FXCollections>
</menuItems>
</ContextMenuRowFactory>
</rowFactory>
</TableView>
However, it only seems to be working for a small number of the rows. In the table i have 1000 entries and i could find 6/1000 where a context menu would show.
A:
A MenuItem may only belong to one menu; you are trying to use the same MenuItem instances in all the ContextMenus you create.
The simplest fix is just to create a single ContextMenu:
import java.util.List;
import javafx.beans.binding.Bindings;
import javafx.scene.control.ContextMenu;
import javafx.scene.control.MenuItem;
import javafx.scene.control.TableRow;
import javafx.scene.control.TableView;
import javafx.util.Callback;
public class ContextMenuRowFactory<T> implements Callback<TableView<T>, TableRow<T>> {
private final ContextMenu menu = new ContextMenu();
public List<MenuItem> getMenuItems() {
return menu.getItems();
}
public void setMenuItems(List<MenuItem> menuItems) {
menu.getItems().setAll(menuItems);
}
@Override
public TableRow<T> call(TableView<T> view) {
final TableRow<T> row = new TableRow<>();
row.contextMenuProperty().bind(
Bindings.when(Bindings.isNotNull(row.itemProperty())).then(menu).otherwise((ContextMenu) null)
);
return row;
}
}
|
1. Field of the Invention
The present invention relates electrical connectors and more particularly to a coaxial cable connector assembly consisting of a bracket, a grounding wire connector and a coaxial cable connector, which effectively eliminates electromagnetic interference, avoiding system damage and assuring signal transmission stability.
2. Description of the Related Art
CATA (Community Antenna Television) is a cable TV system of providing television to consumers via radio frequency signals transmitted to televisions through coaxial cables or digital light pulses though fixed optical fibers located on the subscriber's property. FM radio programming, high-speed Internet, telephony and other non-television services may also be provided.
Coaxial cables of a cable TV system are exposed to the outside of the community building and can easily be damaged by a high voltage produced upon a thunder strike. When a TV system or any other electronic equipment is attacked by a thunder strike or strong magnetic waves, the system or equipment circuit may be fatally damaged.
To decrease in induction voltage on a coaxial cable, a grounding arrangement is necessary for discharge of magnetic waves and noises, assuring impedance matching and avoiding transmission energy loss.
FIG. 8 illustrates a ground isolation coaxial cable connector according to the prior art. According to this design, the ground isolation coaxial cable connector comprises an electric connector member A, a stepped bracket B and a lock screw B13. The stepped bracket B comprises two mounting lugs B1 disposed at two opposite lateral sides thereof, a horizontal through hole B11 disposed adjacent to one mounting lug B1 for the insertion of a grounding wire D, and a screw hole B12 vertically disposed in communication with the horizontal through hole B11. The electric connector member A is fastened to the stepped bracket B for the connection of a coaxial cable C. After insertion of the grounding wire D through the horizontal through hole B11, the lock screw B13 is threaded into the screw hole B12 to lock the grounding wire D. According to this design, the stepped bracket B is made by means of metal injection molding. The tooling cost for the fabrication of the stepped bracket B is quite expensive. Further, because the lock screw B13 is directly stopped against the periphery of the grounding wire D, the periphery of the grounding wire D may be damaged by the lock screw B13 easily, causing increase of impedance.
Therefore, it is desirable to provide a coaxial cable connector, which eliminates the drawbacks of the aforesaid prior art design. |
Semi-Pelagianism was officially condemned as a heresy by the Synod of Orange in 529. Afterwards, due to human corruption, certain aspects of Semi-Pelagianism were still incorporated into the theological doctrines of the medieval Roman Catholic Church, such as a rejection of the bondage of the will and the concept that humans could (with God's help) redeem themselves and maintain their just standing before God through repentance and penance. Pope Gregory the Great even said, "The good that we do is both of God and of ourselves; of God by prevenient grace, our own by good will following." Rome, to this day, by continuing to affirm the semi-pelagian view that redeemed humanity must (through good works) maintain its own just standing before God, in essence declares that Jesus' work on the cross is insufficient to save completely ...that men are justified partly by the grace of God in Christ and partly by their own works. So in RCC dogma, Jesus ends up, not as a Savior, but one who helps us save ourselves.
With regard to God's initial grace to sinners, St. Augustine rightly affirms that grace is what makes the will good, "For", he says, "if a good will comes first, there is obviously no longer a heart of stone." In other words, that even the very desire of fallen humanity to believe and obey Christ is wrought in us by the Spirit, and that it is Jesus alone (not the human will) that makes those who believe differ from those who do not. The RCC view, on the contrary, declares that the unregenerate human will has still some power left to choose good ... to either cooperate with or reject God's grace. By contrast again, The Council of Orange (529 AD) affirms the augustinian/Reformation view that it is the Holy Spirit within us that we [even] have the faith, the will, the strength or the desire to do all these things as we ought (Canon 6).
Reformed Protestants affirm with Augustine, Human Nature's Four-Fold State, which declares that fallen humanity will not obey Christ since his will and affections are in bondage to sin (not able not to sin) until regenerated:
1) Pre-Fall Humanity - able to sin; able not to sin
(posse peccare, posse non peccare)
2) Post-Fallen Humanity: not able not to sin (non posse non peccare) i.e. man not free but in bondage to sin
3) Regenerated Humanity: able not to sin (posse non peccare)
4) Glorified Humanity: unable to sin (non posse peccare) |
In recent years, as disclosed in, for example, Japanese Patent Application Publication No. 2011-081539 (JP-2011-081539 A), the use of a calculation device that has a plurality of CPU cores mounted on a single semiconductor chip, namely, a multicore processor has been proposed in various fields. As disclosed in, for example, Japanese Patent Application Publication No. 2008-269487 (JP-2008-269487 A), the use of the multicore processor has been discussed in the field of the control of vehicular engines as well. The art disclosed in Japanese Patent Application Publication No. 2008-269487 (JP-2008-269487 A) is an art intended to reduce the consumption of electric power in the case where the multicore processor is employed in an engine control apparatus. According to this art, when a specific control processing is performed during the stop of engine control, the operation mode of a microcomputer is set to a low electric power consumption mode that is different from the operation mode during engine operation. In the low electric power consumption mode, the number of cores used by the microcomputer is made smaller than during engine operation. During the stop of engine control, no electric power is generated from an alternator or the like as during the operation of the engine, and an in-vehicle battery is not charged either. Therefore, the amount of consumption of electric power with which the battery is charged rapidly increases as the number of cores that operate during the performance of a specific control processing increases.
One advantage of the use of the multicore processor is its high processing ability. Higher processing ability can be obtained from the multicore processor than from a single core processor having one CPU core. High processing ability is an inducement to employ the multicore processor in an engine control apparatus. This is because the number of actuators mounted on the engine and the number of types thereof have been on the constant increase in recent years. In order to appropriately control the operation of the engine, the control target values of actuators thereof need to be set to appropriate values corresponding to the operating condition of the engine. Therefore, an optimization calculation is performed in a conventional engine control apparatus, but the calculation load in performing the optimization calculation increases as the number of actuators and the number of types of actuators increase. Thus, it has been apprehended that the processing ability of the single core processor that is employed in the conventional engine control apparatus may eventually become insufficient for the ever-increasing calculation load. The use of the multicore processor has a great merit in the field of engine control in which the calculation load is estimated to constantly increase from here on.
However, the processing ability of the multicore processor is not determined simply by the number of cores. In order to enhance the processing ability, a plurality of cores need to be efficiently operated. For this purpose, ingenuity has been demanded of the software that operates the cores. For example, tasks can be distributed to the plurality of the cores and processed in parallel in the multicore processor. However, the processing ability as a whole greatly differs on the method of parallelization. |
Pharmacological effects on oscillatory afterpotentials in partially depolarized ventricular myocardium.
Oscillatory afterpotentials induced by toxic concentrations of ouabain were studied in isolated papillary muscles from the right ventricular myocardium of guinea pigs. In partially depolarized muscles (22 mM extracellular K+) oscillatory afterpotentials (OAP) that follow action potentials can be described as nearly harmonic, periodical damped oscillation using a five parameter model. We measured the time course of the appearance and disappearance of ouabain-induced OAP under control conditions and modified by different pharmacological tools. Changes were quantified by the parameters of the model used. Adriamycin (50 microM) significantly delayed the time to the first OAP after administration of ouabain but also shortened the time necessary for recovery after a 30 min application of ouabain. Adriamycin also reduced the damping ratio of OAP but unlike caffeine (2 mM) it did not completely suppress OAP. The reduction of the extracellular Na+ concentration from 126 to 63 mM strikingly depressed OAP both in damping ratio and amplitude. Dexamethasone (2 microM) transiently depressed already developed OAP. The effects of adriamycin as well as Na+ reduction point to a contribution of a Na/Ca exchange in the generation of OAP. The effect of dexamethasone may refer to an involvement of eicosanoides in the generation of arrhythmogenic OAP. |
Q:
Windows 8 WinRT application using static C++ lib has multiply defined symbols for vccorlibd
I have a WinRT application for Windows 8 that contains several C++ static libraries and one WinRT native static C++ library. It's not linking because it's complaining of multiply defined symbols related to the threading model libraries:
vccorlibd.lib(tmmta.obj) : error LNK2005: "int __abi___threading_model" (?__abi___threading_model@@3HA) already defined in vccorlibd.lib(tmdefault.obj)
fatal error LNK1169: one or more multiply defined symbols found
Note that it's trying to link with the MTA threading model lib (tmmta) with the default treading model lib (tmdefault).
I can't find any setting in the project properties to change this. Closest I've found is the CLR Thread Attribute but changing this setting has no effect. I don't know which sub-project in my solution is using which threading model.
How and where can I see and change the threading model setting?
Thanks!
A:
Here is the answer about your question. I had the same problem :)
http://social.msdn.microsoft.com/Forums/en-US/winappswithnativecode/thread/f57406a6-3892-4981-86da-135862cf4b41?prof=required
Edited:
Probably this is caused because you have main() function or/and you define [Platform::MTAThread] ( witch create MTA symbol ) in your WinRT static library. Now the executable code don't know how should be initialized because executable dont know anything about your declaration.
You can move that main() function to your executable project or ( witch in my case works ) be sure that you #include header to object where you declare your main function, then linker could see it and would not duplicate symbol.
|
Induction of monocyte chemoattractant protein-1 in the small veins of the ischemic and reperfused canine myocardium.
Healing after myocardial infarction is characterized by the presence of macrophages in the infarcted area. Since augmented monocyte influx has been implicated as a potential mechanism for improved healing after reperfusion, we wished to study the induction of monocyte chemoattractant protein-1 (MCP-1) during reperfusion. The cDNA for MCP-1 was cloned from a canine jugular vein endothelial cell (CJVEC) library and exhibited 78% identity with the deduced amino acid sequence of human MCP-1. Samples of myocardium were taken from control and ischemic segments after 1 hour of ischemia and various times of reperfusion; total RNA was isolated from myocardial samples and probed with a cDNA probe for canine MCP-1. Induction of MCP-1 mRNA occurred only in previously ischemic segments within the first hour of reperfusion, peaked at 3 hours, and persisted throughout the first 2 days of reperfusion. In the absence of reperfusion, no significant MCP-1 induction was seen. Both ischemic (but not preischemic) cardiac lymph and human recombinant TNF-alpha induced MCP-1 in CJVECs. MCP-1 was identified by immunostaining on infiltrating cells and venular (but not arterial) endothelium by 3 hours. In contrast, in situ hybridization showed MCP-1 mRNA to be confined to the endothelium of small veins (venules) 10 to 70 microns in diameter. MCP-1 mRNA is induced in the endothelium of a specific class of small veins immediately after reperfusion. MCP-1 induction is confined to the previously ischemic area that has been reperfused. We suggest a significant role for MCP-1 in monocyte trafficking in the reperfused myocardium. |
<?xml version="1.0" encoding="utf-8"?>
<resources xmlns:android="http://schemas.android.com/apk/res/android">
<style name="AppRootTheme" parent="android:Theme.Holo.Light"/>
<style name="AppBaseTheme" parent="AppRootTheme">
<item name="android:imageButtonStyle">@style/ImageButton</item>
<item name="android:buttonStyle">@style/Button</item>
<item name="android:textViewStyle">@style/TextView</item>
</style>
<style name="AppConfigTheme" parent="AppBaseTheme"/>
<style name="CustomTitleBar" parent="AppConfigTheme">
<!--**********************************************
* common color *
**********************************************-->
<item name="config_color_divider">@color/divider</item>
<item name="config_color_divider_darken">@color/config_color_divider_darken</item>
<item name="config_color_background">@color/config_color_background</item>
<item name="config_color_background_pressed">@color/config_color_background_pressed</item>
<item name="config_color_pressed">@color/config_color_pressed</item>
<item name="config_color_blue">@color/config_color_blue</item>
<item name="config_color_red">@color/config_color_red</item>
<item name="alpha_pressed">0.5</item>
<item name="alpha_disabled">0.5</item>
<!--**********************************************
* TitleBar *
**********************************************-->
<item name="titlebar_height">56dp</item>
</style>
<style name="ImageButtonBase" parent="android:Widget.Holo.Light.ImageButton"/>
<style name="TextAppearanceBase" parent="android:TextAppearance.Holo"/>
<style name="ButtonBase" parent="android:Widget.Holo.Light.Button"/>
<style name="ImageButton" parent="ImageButtonBase">
<item name="android:background">@color/config_color_transparent</item>
</style>
<style name="Button" parent="ButtonBase"/>
<style name="TextView" parent="android:Widget.TextView">
<item name="android:textAppearance">@style/UITextAppearance</item>
<!-- textColorHighlight 放在appearance中无效,好像TextView总是默认存在一个textColorHighlight
会覆盖掉它,并不知道原因 -->
<item name="android:textColorHighlight">?attr/config_color_background_pressed</item>
</style>
<style name="UITextAppearance" parent="TextAppearanceBase">
<item name="android:textColor">?attr/config_color_black</item>
<item name="android:textSize">14sp</item>
<item name="android:textColorHighlight">?attr/config_color_background_pressed</item>
</style>
<style name="CustomTitleBar.NoActionBar">
<item name="android:windowActionBar">false</item>
<item name="android:windowNoTitle">true</item>
</style>
</resources> |
Q:
How to execute a find command using a set of strings from a line in a text file
This is the content of my text file named fnames.txt:
"SAMPLE_NIKE_856_20170703*"
"SAMPLE_ADIDAS_856_20170702*"
"SAMPLE_ANTA_856_20170630*"
"SAMPLE_JORDAN_856_20170627*"
"SAMPLE_CONVERSE_856_20170229*"
This is my script named fn.sh:
#!/bin/sh
#
#
while read LINE
do
find -name "$LINE"
done < fnames.txt
It returns nothing.
What I want to happen is that in each line the script will execute the find command and the output will be stored in another text file called files.txt e.g:
LINE 1:
find -name "SAMPLE_NIKE_856_20170703*"
then returns the filename that is looking for
./SAMPLE_NIKE_856_20170703_80_20_304_234_897.dat
LINE 2:
find -name "SAMPLE_ADIDAS_856_20170702*
then returns the filename that is looking for
./SAMPLE_ADIDAS_856_20170702_56_98_123_245_609.dat
The script will continue until all lines has been executed by find command.
A:
The reason is the order the shell processes the various expansions and quotings. If you directly type
find . -name "foo*"
The shell will remove the quotes and pass foo* as parameter to find.
Without the quotes, the shell would perform the globbing for the * first, potentially resulting in multiple matches that would confuse find. So it's wise to use the quotes.
But if you read the string from a file, the variable will contain the quotes. Now, when you do
> echo $LINE
"foo*"
> echo "foo*"
foo*
> find . -name $LINE
you see that the quotes of $LINE will not get removed opposed to the ones for echo "foo*". This is because the shell first handles the quotes of echo $LINE (there aren't any) and then performs the variable substitution, so the line will read echo "foo*", but now the quotes remain.
So your find will look for files containing the quotes. The solution is to leave away the quotes in the file. No quoting is needed there, the complete line will go to the variable.
A:
I finally found the answer. I just need to call the full file path of fnames.txt to /path/to/my/fnames.txt because I'm executing the script in another directory.
#!/bin/sh
#
#
while read -r LINE
do
find -name "$LINE"
done < /path/to/my/fnames.txt
Output:
./SAMPLE_NIKE_856_20170703_80_20_304_234_897.dat
./SAMPLE_ADIDAS_856_20170702_56_98_123_245_609.dat
|
Q:
How many Hamiltonians Paths there are in almost regular graph ?
Let be $G=(V,E)$, where $V=\{1,\ldots,n\}$ and $E=\{\{i,j\}\subset V;|i-j|\leq k\}$ and $k<n$.
For which values of $k\geq 2$, can we count explicitly the number of Hamiltonian paths in $G$ ?
A:
S. Kitaev defines Path schemes $P(n,M)$ as graphs with vertex set $\{1,2,\dots,n\}$ and edges $(i,j)$ iff $|i-j|\in M$. Hamiltonian graphs on path schemes were mentioned in "On uniquely k-determined permutations" by S. Avgustinovich and S. Kitaev. The formula is not simple even in the case where $M=\{1,2\}$ (here), but I guess it depends on what kind of formula you are looking for.
A:
Explicit values for $k\leq 9$ and small $n$ are given in the OEIS:
k=2: http://oeis.org/A003274 (contains some references and a generating function)
k=3: http://oeis.org/A174700
k=4: http://oeis.org/A174701
k=5: http://oeis.org/A174702
k=6: http://oeis.org/A177278
k=7: http://oeis.org/A177279
k=8: http://oeis.org/A177280
k=9: http://oeis.org/A177281
|
coffee
Post navigation
So, after making the chai syrup I got hooked on making stuff you usually just buy in the store. Today I tried to make regular caramel sauce that is super delicious in both coffee and on cakes. Heck, I bet someone would find it delicious on bread. And the best of all, it’s super easy, and you don’t need any special ingredients; sugar, heavy whipping cream, butter, and optionally vanilla and a pinch of salt.
I skipped the two last ingredients, but I think I will make a small patch with them the next time.
First off you start with mixing all the ingredients over medium-low to medium heat. Keep stirring until all the butter has melted, before you turn up the heat to medium and have the sauce come to a boil (simmer). Let it simmer for 5-8 minutes, depending on how thick you want the sauce to be.
Let it cool down for a little bit, before you either serve it hot or pour it into a container. Keep it refrigerated when you store it, so it will last longer. This because it has cream in it, and will expire faster in the heat.
Now you have a delicious patch of caramel sauce that only has 3 (or 5) ingredients!
Fall has fully kicked in here in Norway; the trees has started to change color, and the scarves has been in frequent use. A couple of days ago there was even snowing! And for me fall time is time for cozy teas with some spices. Pumpkin spice latte, and chai latte all belong to fall time for me, but it’s hard to make them as good at home as the local coffee shop can make. One of the reasons is simply that the tea is too weak, and you end up with a tea with milk more than a latte. Being a barista, I know that in flavored lattes we use syrups to flavor the coffee or tea. So I figured I’d make some chai tea syrup. Then I know it will be natural not artificial as I have a suspicion that some of the syrups are made. And I was surprised on how easy it was!
You can either make it by mixing the original ingredients that make chai tea in the first place, or buy chai tea at a local grocery store or tea house. I did the latter, just because I found it easier (and cheaper).
So this is what you do: you mix water, chai tea and sugar, and let it boil on medium for 30 minutes ish. (Depends on the amount you make). For 1 liter of water you use 200 grams of sugar (to make it sweeter you can add a bit more). For the amount of tea, I would take around 30grams. Maybe a bit more if you like it strong.
After 30 minutes with continual-ish stirring, you pour it through a strainer into a container that can hold hot liquids.
Now it’s good for 2 months, and you only need around 2-3 table spoons per cup of latte.
Easy easy, and it’s a perfect birthday gift for someone if you have it in a cute container. And so cheap!
Update: Shake your bottle or container before use. I noticed that some of the chai sank to the bottom, so to not miss some of that heavenly chai, just lightly shake it before you start making your chai. 🙂
2nd update: If you feel like the latte you make with the syrup is “too much”, just mix in some water with the syrup. You will still taste the chai, but it won’t be so strong tasting. So this is the last time I’m writing about this syrup. Hehe. Peace out! 😎✌️ |
A Chinese national is believed to have been kidnapped from a fish farm in Lahad Datu’s Silam, hardly 24-hours after pirates robbed fishermen in waters off Tanjung Labian.Unofficial reports claimed that gunmen had grabbed the Chinese national identified as Yang Zailin, who is a manager of Wonderful Terrace Sdn Bhd, a company operating a fish farm in the area at about 2.45am on Tuesday.
No further details were available as senior police and Esscom officials were at the scene and conducting follow up operations.It is believed that the gunmen had fled towards the southern Philippines.At about 11pm on Sunday, four men in military fatigues robbed a teacher and three of his friends fishing in the waters off Sungai Bilis in Tanjung Labian of their two outboard engines and a pump boat engine.No one was hurt in the incident and the four were rescued by General Operations Force policemen at about 2am on Monday.This is the second kidnapping in nearly a month.On April 2, Chinese tourist Gao Hua Yuan, 29, and resort worker Marcy Darawan, 40, were snatched from the Singamata Reef Resort in Semporna.The two are being held by their gunmen demanding ransoms in southern Philippines. (The Star)
Disclaimer: All picture news and article are owned by the respective site and authors where the piece is instigated from. The owner of the news and article are acknowledged at each post and the piece is link back to their respective site. Pieces by Rentaka journalist and writer is copyrighted by Rentaka Advisory Enterprise and All Rights Reserve |
<?php
return array(
'title' => 'Nazwa składnika',
);
|
Laser diodes present low impedance, of the order of a few ohms, whereas the external electrical feed lines used for conveying an electrical signal to a laser diode are generally of higher impedance, typically 50 ohms.
In order to limit reflection losses on transmission of the signal from the external electrical feed line to the laser diode due to said different impedance values, it is necessary to match the impedance of the laser diode and of the external electrical feed line. Conventionally, such impedance matching has been performed by means of a connection device comprising a resistor deposited as a thin film on a substrate that also has the laser diode deposited thereon, said resistor being electrically connected in series between one of the conductors of the external electrical feed line and one of the electrodes of the laser diode. A bias T is also usually provided comprising a decoupling capacitor and an inductor for feeding the laser diode with bias current. The substrate, the resistor, the laser diode, and the bias T are usually mounted in a metal box that provides screening, that is provided with an external connector for connection to the external electrical feed line, and that is provided with a passage for receiving an optical fiber that is optically coupled to the laser diode. The box provided with the above-specified elements is called a "laser head".
Nevertheless, a laser diode of that type does not provide full satisfaction since the resistor deposited as a thin film presents parasitic capacitance and inductance that distort the signal conveyed by the external electrical feed line, particularly when said signal is a binary signal at a very high data rate, typically greater than 10 Gbits/s. In addition, since the resistor is deposited on the substrate, it prevents distributed feedback (DFB) or distributed Bragg reflector (DBR) type laser diodes being mounted on the substrate since they are particularly sensitive to temperature, so local heating of the substrate due to electricity being dissipated in the thin film resistor would cause the operation of the laser to be unstable.
Proposals have been made to mitigate those drawbacks by progressively changing the shape of the external electrical feed line so as to achieve continuous variation of impedance therealong until it matches the impedance of the laser diode. However, although such a solution eliminates problems of substrate heating, it gives rise to considerable radiation losses and it presents a narrow passband that is ill-suited to the frequency ranges covered by binary signals at high data rates. |
Q:
Rails create relationship record dynamically
I have two models: Image and Lightbox. To relate the two models (has_many) I have a third model LightboxImages.
One Lightbox can have several Images and a Image can be in various Lightboxes.
A Lightbox is created dynamically (with remote js) and the user can add Images to this Lightbox dynamically too.
My first idea was to simply create a url to the create method of the LightboxImages Controller passing the Lightbox Id and Image Id as parameter.
However, this approach seemed fragile and insecure, since a user could easily simulate such behavior.
What is the best design for this situation, create relationship records dynamically?
A:
You actually have a fourth model -- User. I'm assuming you do anyway.
User has_many :lightboxes
Lightbox has_many :lightbox_items
Image has_many :lightbox_items
LightboxItem belongs_to :lightbox
LightboxItem belongs_to :image
Lightbox has_many :images, :through => :lightbox_item
Image has_many :lightboxes, :through => :lightbox_item
LightboxItem is where you might want to store additional data like the position of the image in that specific Lightbox.
The key thing is that every Lightbox belongs to a User. With this you can then scope all of the AR calls in your controller to the current user -- thus preventing them from modifying other light boxes.
So, user carlos has lightbox id 1. User phallstrom has lightbox id 2.
In your controller, you somehow set current_user to the current user in a before filter. Then, for example in the action to get the specified light box you would do something like this:
@lightbox = current_user.lightboxes.find_by_id(params[:id].to_i)
In doing it this way if current_user is carlos, and params[:id] is 2, nothing will be returned.
Similarly, for all the other CRUD actions you'd scope it to current_user as well.
|
Jose Mourinho has confirmed that he has already identified his Manchester United targets for this summer’s transfer window.
United have signed no players in this winter’s window, instead opting to sell players in order to raise funds to spend at the end of the season.
The club signed four players last summer, outspending every Premier League side except neighbours Manchester City, and Mourinho is expecting a similarly busy period.
“I know what I want,” he said. “I always think every week the more I know my players, the more I know my team, the more I know the competition – it’s a competition I know really well, but it’s in permanent evolution – I know what I want.
“The market closes today so there is no point in me speaking about the next transfer window when we have so many matches to play, so much to fight for, so many good players to work with.
“In our case, we are more focused on the summer period. I like my players, so nothing for me.
“But if you ask me if I know what I want for the next transfer window, yes I know. Is it possible to get? I’ll try, always, to be realistic.
“I remember years ago when I was asking for a second goalkeeper, my technical director gave me a list of possible second goalkeepers and the first name was Gianluigi Buffon.
“I’m always realistic, always try to give options that are gettable. But we’ll have time to speak about that in the summer.” |
Q:
Как достать данные из mongodb?
Как взять данные из mongodb?
Вот есть такая структура базы:
var userSchema = mongoose.Schema({
local : {
email : String,
password : String,
name : String,
urlz : {
longurl : String,
shorturl : String,
clicks : 0
}
}
});
Как мне поиском достать оттуда все longurl?
Пытаюсь через db.find({и сюда уже миллион всего перепробовал и не находит}).
Помогите кто знает пожалуйста.
A:
Вот такая команда вернет список записей, содержащих только параметр longurl
db.имя_коллекции.find({}, {_id:0, urlz.longurl:1 })
|
Light emitting devices, such as light emitting diodes or laser diodes, which use group III-V or II-VI compound semiconductors, are capable of emitting visible and ultraviolet light of various colors such as red, green, and blue owing to development of device materials and thin film growth techniques. These light emitting devices are also capable of emitting white light with high luminous efficacy through use of a fluorescent substance or color combination and have several advantages of low power consumption, semi-permanent lifespan, fast response speed, safety, and environmental friendliness as compared to conventional light sources such as, for example, fluorescent lamps and incandescent lamps.
Accordingly, fields of application sectors of the light emitting devices are expanded up to transmission modules of optical communication means, light emitting diode backlights to replace cold cathode fluorescence Lamps (CCFLs) which serve as backlights of liquid crystal display (LCD) apparatuses, white light emitting diode lighting apparatus to replace fluorescent lamps or incandescent lamps, vehicular headlamps, and traffic lights. Recently, a high-voltage light emitting device to which a plurality of light emitting cells is applied is implemented owing to expansion of the fields of application.
FIG. 1 is a view illustrating a structure of a conventional horizontal high-voltage light emitting device.
According to the conventional light emitting device in FIG. 1, a plurality of light emitting cells 20 may be disposed on a substrate 10. Each light emitting cell 20 includes a first conductive type semiconductor layer 21, an active layer 22, and a second conductive type semiconductor layer 23. A first electrode layer 30 electrically connected to the first conductive type semiconductor layer 21, a second electrode layer 40 disposed on the second conductive type semiconductor layer 23, and a passivation layer 50 protecting the light emitting cells 20 while electrically separating the first electrode layer 30 from the second electrode layer 40 are provided. However, in the case of the conventional horizontal light emitting device for the high voltage as illustrated in FIG. 1, a sapphire (Al2O3) substrate having a thickness of about 100 μm is used such that it is not easy to radiate heat generated when emitting light. Thereby, characteristics of the device are deteriorated.
A flip-chip type light emitting device is used as one of the methods for solving the problem of heat radiation. In the case of the flip-chip type light emitting device, a reflective layer is disposed on the second electrode layer in the structure of the light emitting cell to change a photon path, thereby improving luminance efficiency. However, the emitted light totally reflected by the substrate is absorbed into the light emitting cell, or light extraction is not performed at a space between the light cells such that the amount of light emission extracted upwards is smaller than the amount of light emission generated at the active layer, thereby lowering luminance efficiency. FIG. 2 is a view showing phenomenon of radiation of the flip-chip type light emitting device. |
Maxillary sinus and posterior teeth: accessing close relationship by cone-beam computed tomographic scanning in a Brazilian population.
This study aimed to evaluate the close proximity established between the maxillary sinus floor and posterior teeth roots apices by using cone-beam computed tomographic scanning. The relationship of maxillary sinuses and posterior teeth roots, which were divided into 2 groups, was analyzed using i-CAT Vision software (Imaging Sciences, Hatfield, PA). Group 1 included all root apices found in close contact with the maxillary sinus floor without sinus floor elevation, whereas group 2 included all root apices that were protruded within the sinus producing an elevation of the bony cortical. A total of 100 maxillary sinuses and 601 roots apices were evaluated. Group 1 presented 130 of 601 (21.6%) roots and group 2 presented 86 of 601 (14.3%) roots. The second molar mesiobuccal root apex is frequently found in close proximity with the sinus floor, and the relation between these anatomic structures should be considered in order to prevent an iatrogenic procedure and minimize the risks from an infectious disease within the sinus. |
Photos of DrummondHousePlans model W2689 may include homeowner's customization.
Two-storey home with side loading 2-car garage and xlarge bonus room (above garage)
Derived from the very popular model 2590, which can be viewed on our site at www.drummonddesigns.com, this model is even more practical with the addition of a double garage above which a remarquable bonus space will surely fill your needs in terms of space, whether it is for the addition of a vast family room, space for a billiard table or even for a home theatre; with this space, there’s no problem!
This bonus space is not the only asset this model possesses when we consider the corner fireplace in the living room, a dining room at the rear which can easily be switched around with the home office already in place on the main level, for a totally different look. On this same level let’s not forget a kitchen with central island lunch counter and the presence of laundry facilities.
The second level reveals a comfortable bathroom with abundant natural lighting from three roof windows as well as a master bedroom with two separate closets which the owners will surely be able to appreciate. |
The Adult Swim animated entry has been a ratings breakout on Mondays at 10:30 p.m.
Adult Swim has renewed Dan Harmon's Rick and Morty for a second season.
The animated series from the Community creator and Justin Roiland has been a breakout hit for Adult Swim on Mondays at 10:30 p.m., where it routinely tops competition on Comedy Central, MTV, Nick at Nite and FX by 22 percent to 83 percent among adults 18-49.
In its first six episodes, the series has increased its viewership by double and triple digits in the key demo of adults 18-34.
COVER STORY: 'Community's' Dan Harmon Reveals the Wild Story Behind His Firing and Rehiring
"I am excited to make as much Rick and Morty as Adult Swim allows, and I'm relieved to be in a time slot of no strategic value to CBS," Harmon said of the renewal for one of the network's first primetime original series.
Added Roiland of the comedy about a loser kid and his alcoholic scientist grandfather: "I am humbled and super excited by the positive response to the show, and we have no shortage of ideas for future episodes."
The series recently outdrew Harmon's NBC cult comedy Community among men 18-34. Meanwhile, Community is still very much on the bubble, so Harmon is at least guaranteed one series on the air next season.
The renewal comes as Adult Swim is poised to expand its programming block to start at 8 p.m. beginning March 31.
Email: [email protected]
Twitter: @Snoodit |
Q:
html label:after content needs to have different colors in the text
I have the display name of my model properties set, but I need them to display with a colon if they're not required and a colon and a red asterisk if they are.
I didn't want to add the colon to the display name since I don't want the colon to appear in error messages and I may want to display them somewhere without it.
I used the following style in my HTML file for adding the colon:
.my-label > label:after {
content: ": ";
}
However I can't figure out how to get a red asterisk to display after that if the field is required.
I could create another style class to include the asterisk, however if I change the color it's either all red or all black. I'm not sure I want to set the actual model property to be required because I'm not sure I want a universal rule stating that it is required.
Any suggestions of a better way to handle this would be welcome.
A:
The problem
It is not possible to use different colours in a single pseudo element. In this case you are able to output :* using the :after pseudo element but are not able to make the characters different colours.
Solution 1
One possible way to achieve what you are after is to use the :before pseudo element. The overriding issue, of course is that this will put the asterisk at the beginning of the label. You can fix this by making the label use the flexbox model. This will allow the order of the pseudo elements to be changed allowing you to place the :before element at the end of the label:
.my-label > label {
display: inline-flex;
}
.my-label.required > label:before {
color: red;
content: "*";
order: 1;
}
.my-label > label:after {
content: ":";
}
<div class="my-label">
<label>Not required</label>
<input type="text" />
</div>
<div class="my-label required">
<label>Required</label>
<input type="text" />
</div>
The drawbacks
The drawbacks to this solution is that if the user is using a browser that does not support flexbox or IE (where a bug stops the flexbox rules being applied to pseudo elements) the asterisk will be displayed before the label.
Solution 2
A second way to achieve this would be to use absolute positioning. By setting label to position: relative; you can position the :before element at its end by making it position: absolute; and right: 0;. By adding some right padding you can "reserve" space for the element so the text doesn't overlap.
.my-label > label {
/*10px is for old browsers which don't support the ch unit*/
padding-right: 10px;
padding-right: 1ch;
position: relative;
}
.my-label.required > label:before {
color: red;
content: "*";
position: absolute;
right: 0;
}
.my-label > label:after {
content: ":";
}
<div class="my-label">
<label>Not required</label>
<input type="text" />
</div>
<div class="my-label required">
<label>Required</label>
<input type="text" />
</div>
The drawbacks
Not many drawbacks to this method as it should work in the majority of browsers (even older ones).
|
About
The farmingfriends website was set up at the end of 2006 and started as a diary of daily life on the farm but has grown into an online magazine and forum community packed with information, resources and products relating to farming, keeping livestock, food and nature. If you are a farmer, smallholder, animal enthusiast, parent, child or anyone interested in animals and the farming lifestyle, then the Farming Friends website and forum is for you.
Menu
UK Fertiliser Prices
Ammonium Nitrate fertiliser prices have stayed firm at £390/tonne through December of 2008. It is not surprising to hear that fertiliser traders and manufacturers are advising farmers to continue buying to secure supplies – well of course it’s not surprising, they are trying to sell as much product as possible before the price crashes!
Ian Moseley (fertiliser manager for Wynnstay) was quoted in the Farmer’s Weekly as saying “Although the price of urea has collapsed, ammonium nitrate has stayed firm at £390/tonne for December.” And saying of urea prices “It’s dependent on the Asian markey, which usually starts buying in January”. He warned that if farmers delayed purchases, there was a danger that farmers could be left waiting for deliveries in spring, and talking of delivery said “If this suddenly gets pushed into February, then there won’t be enough stock or sufficient transport facilities to meet demand”.
Well it is the view of Farmingfriends that any fertiliser manufacturer or trader should take a beginners course in economics – simple supply and demand economics suggest that fertiliser manufacturers will have been producing product to maximum capacity to try and capitalise on the grain price 5 months ago. Now that the global grain price has fallen to less than half what it was at its peak, then demand for fertiliser will also fall. The fall in demand will be compounded by the fall in oil price, meaning that oilseeds will be in lower demand for biodiesel production (reducing fertiliser demand).
Farmers will look to reduce fertiliser application rates in the spring, possibly by as much as 25%. We all know that ammonium nitrate doesn’t store well from one seaon to the next, so if manufacturers do not move product in spring 2009, they will be left with deteriorating stock.
So the prediction is that prices will fall for AN as they have done with urea due to falling demand, falling oil prices (reducing production costs and demand) and stockpiles of product at plants, docks and distribution warehouses.
The supply industry has been feeding the media, scaring farmers into making purchases at inflated prices since early summer, which can only be described as underhand – as they must have seen the price falls coming. On this farm we predicted what was happening and have not bought any fertiliser yet for 2009. It is clear that any farmers who haven’t yet purchased will be holding out for an avalanche of price falls. We expect ammonium nitrate prices to fall below £200/t and comparing historic nitrogen and grain prices we could even see nitrogen sub £130. |
Christopher Whiteside MBE is the Conservative County Councillor for the Egremont North & St Bees Division of Cumbria County Council. The division includes St Bees, Bigrigg, Wood End, most of Moor Row, the Western part of the Mirehouse area of Whitehaven, and surrounding countryside.
Chris lives and works in Copeland with his wife and family.
Chris is a former member of Copeland Borough council, and an Honorary Alderman of the City and District of St Albans.
Tuesday, January 12, 2016
Storm in a teacake ...
Scottish Nationalists are angry.
They are angry that Tunnock’s, a Scottish company who have been making excellent teacakes for 61 years and often (but not always) uses the Scottish Lion rampart, has dropped the Scottish symbol of a lion rampant from its logo for a new teacake advert on London Underground.
Worse, Tunnock's have made the SNP even more annoyed by using the word "British" in the advert: they referred to their product as "The Great British Teacake" in what was obviously meant as a humorous reference to the Great British bake-off programme, but annoyed the SNP's self appointed "Ministry of Truth" squad because "British" is an unapproved word.
That's because a very mild form of EVEL (English Votes for English Laws) came into effect for the first time in the House of Commons today. See report here.
Contrary to what you might think from the ire and fury of SNP rabble-rousers who have been complaining bitterly about this, it does NOT mean they don't get a chance to vote on measures only affecting England and Wales because the equivalent legislation in Scotland has been devolved to the Scottish Parliament.
What it does do is add an additional hurdle which laws for England or England and Wales, on issues which have been devolved in Scotland, has to pass, that such laws need majority support among MPs representing the area they effect.
So today there was a debate and was due to be a vote on the Housing and Planning bill for England and Wales which only involved MPs for England and Wales,
Effectively this very minor form of devolution for England and equalisation for Wales - which I fully support - is NO THREAT WHATSOEVER to the people of Scotland. It does not mean that a measure without majority support in the UK parliament could get through on English votes by banning MPs for Scotland from voting, because there will also be "readings" for all laws which still need to get through the whole House of Commons. The Housing and Planning Bill for England and Wales will not become law without having passed a number of stages, and in all the Commons stages other than today's, MPs representing Scotland can vote.
So basically this is giving England, or England and Wales, a veto, not complete devolution, or remotely as strong as the degree of independence devolved to the Scottish parliament, on issues only affecting those areas. It's a right not to have things imposed on England which is similar to, but does not go as far as, what the SNP have demanded for Scotland for decades.
I have Scottish ancestry and am proud of it. I am not in any way anti-Scottish and neither is this legislation. There is no good reason for the SNP to protest in this way. The SNP members who are screaming about this very mild form of EVEL are acting like silly and hypocritical children. They are no more grown up than their friends who are picketing cake shops. |
Sky Sports News understands that Chelsea remain interested in signing Tottenham playmaker Luka Modric.
Blues understood to be keen on midfielder despite Mata deal
understands that Chelsea remain interested in signing Tottenham playmaker Luka Modric. The Blues have failed with a couple of bids for the Croatian playmaker already this summer as Spurs insisted they were not prepared to sell one of their star players. Modric has made no secret of his desire to switch to Stamford Bridge after three years in North London with Tottenham, but he has earned praise from manager Harry Redknapp for maintaining a professional attitude through a period of uncertainty. With time running out until the transfer window closes it appeared Chelsea may miss out on the 25-year-old, especially after manager Andre Villas-Boas admitted earlier this week that he was unsure whether a third offer would be lodged. Valencia have also announced that a deal has been agreed with Chelsea for the sale of Juan Mata, with the Spain winger expected to undergo a medical in the English capital on Monday. However, it is understood that the Blues still want Modric as they look to bolster their attacking options before the season gets into full swing.also understands that Modric will play no part in Tottenham's opening Premier League game of the campaign at Manchester United on Monday night. |
//
// Generated by class-dump 3.5 (64 bit).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2013 by Steve Nygard.
//
#import "NSObject.h"
#import "NSTextAttachmentCell.h"
@class NNMKStaticIconTextAttachment, NSString;
@interface NNMKStaticIconTextAttachmentCell : NSObject <NSTextAttachmentCell>
{
NNMKStaticIconTextAttachment *_attachment;
}
- (id)_imageForNanoAttachmentType:(unsigned int)arg1;
- (struct CGRect)cellFrameForTextContainer:(id)arg1 proposedLineFragment:(struct CGRect)arg2 glyphPosition:(struct CGPoint)arg3 characterIndex:(unsigned int)arg4;
@property(nonatomic) __weak NNMKStaticIconTextAttachment *attachment; // @synthesize attachment=_attachment;
- (struct CGPoint)cellBaselineOffset;
- (struct CGSize)cellSize;
- (void)drawWithFrame:(struct CGRect)arg1 inView:(id)arg2 characterIndex:(unsigned int)arg3 layoutManager:(id)arg4;
- (void).cxx_destruct;
// Remaining properties
@property(readonly, copy) NSString *debugDescription;
@property(readonly, copy) NSString *description;
@property(readonly) unsigned int hash;
@property(readonly) Class superclass;
@end
|
Company Name : Zloadr
Monday, February 5, 2018 10:27AM IST (4:57AM GMT)
(BW)(ZLOADR)
Crypto Platform Zloadr Launches New Currency Calculator
London, United Kingdom
One of the world’s leading crypto publishing platforms, Zloadr, has announced that it is launching a new online cryptocurrency converter calculator, adding to its existing range of digital tools. The calculator acts as an automated world currency and cryptocurrency converter, enabling users of the platform to convert a wide range of global, Government-issued fiat currencies to the value of different cryptocurrencies, and vice versa – quickly and easily. The calculator is expected to rival existing online conversion tools.
Early statistics indicate that bitcoin (BTC) is among one of the most commonly converted cryptocurrencies right now, in line with the coin’s position at the top of the market capitalisation leaderboard. Bitcoin appears to be most frequently considered alongside the United States Dollar (USD) and British Pound (GBP). Ethereum (ETH), second by market cap, is also shown to be popular with users.
Zloadr’s new currency calculator is understood to be one of the most comprehensive online converters available to web users today, not only covering fiat currencies from the Afghanistan Afghani (AFN) to the Zimbabwean Dollar (ZWL), but also including cryptocurrencies such as bitcoin, litecoin (LTC), ethereum, ethereum classic (ETC), ripple (XRP), and dash (DASH). Zloadr, which was founded in 2015, conducted an initial coin offering (ICO) of its own token last year, prior to the full launch of the publishing platform.
The launch of Zloadr’s digital conversion tool follows the platform’s recent expansion into international markets, and forms the latest in a long line of exciting announcements. Following on from a partnership with The Guardian newspaper in Nigeria, and with the beginnings of a new associated smart contract project, DocTailor, Zloadr has also recently announced that it will shortly re-launch select features and functions of its website, making these sections available in multiple languages, including Spanish, German, Portuguese, Chinese, Japanese, Indonesian, and Russian.
At a time when interest in both cryptocurrency and blockchain technology is expanding out of major markets such as the United Kingdom and United States, Zloadr is demonstrating a strong ability to maintain not only its relevance, but also its dedication to its international user base, through a range of multi language online tools as well as the new currency and cryptocurrency converter. Zloadr’s Currency Calculator is expected to be among the features that will offer different language options for users, alongside the platform’s ICO Calendar and its real time cryptocurrency market capitalisations listing.
About Zloadr
Zloadr is the first viral digital news publishing platform on the blockchain powered by influencers. Zloadr distributes content and grows income for content creators around the world.
10/01/2018 11:31PM
In a move that will connect up to one million Nigerians with the latest crypto news and investment opportunities, Zloadr has officially signed a deal with a top Lagos newspaper. The Guardian newspaper in Nigeria is a ...
Similar News
14/08/2018 9:25PM
BCW (Burson Cohn & Wolfe), a leading global communications agency and a WPP company, today announced it has acquired HZ, one of the largest independent, digitally driven, integrated creative agencies in the U.S. ... |
Buffalo (Bubalus bubalis) interleukin-2: sequence analysis reveals high nucleotide and amino acid identity with interleukin-2 of cattle and other ruminants.
A 4400-bp genomic sequence and a 332-bp truncated cDNA sequence of the interleukin-2 (IL-2) gene of Indian water buffalo (Bubalus bubalis) were amplified by polymerase chain reaction and cloned. The coding sequence of the buffalo IL-2 gene was assembled from the 5' end of the genomic clone and the truncated cDNA clone. This sequence had 98.5% nucleotide identity and 98% amino acid identity with cattle IL-2. Three amino acid substitutions were observed at positions 63, 124 and 135. Comparison of the predicted protein structure of buffalo IL-2 with that of human and cattle IL-2 did not reveal significant differences. The putative amino acids responsible for IL-2 receptor binding were conserved in buffalo, cattle and human IL-2. The amino acid sequence of buffalo IL-2 also showed very high identity with that of other ruminants, indicating functional cross-reactivity. |
/* Copyright (C) 2012 by H-Store Project
* Brown University
* Massachusetts Institute of Technology
* Yale University
*
* Permission is hereby granted, free of charge, to any person obtaining
* a copy of this software and associated documentation files (the
* "Software"), to deal in the Software without restriction, including
* without limitation the rights to use, copy, modify, merge, publish,
* distribute, sublicense, and/or sell copies of the Software, and to
* permit persons to whom the Software is furnished to do so, subject to
* the following conditions:
*
* The above copyright notice and this permission notice shall be
* included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT
* IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR
* OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
* ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
* OTHER DEALINGS IN THE SOFTWARE.
*/
#ifndef HSTOREEVICTEDTABLE_H
#define HSTOREEVICTEDTABLE_H
#include "storage/persistenttable.h"
#include "common/executorcontext.hpp"
namespace voltdb {
class EvictedTable : public PersistentTable {
friend class TableFactory;
public:
EvictedTable();
const void* insertEvictedTuple(TableTuple &source);
void deleteEvictedTuple(TableTuple source);
protected:
EvictedTable(ExecutorContext *ctx);
};
}
#endif
|
Microspectroscopic FT-IR mapping system as a tool to assess blend homogeneity of drug-excipient mixtures.
In order to prepare a controlled-release tablet by direct compression, a Fourier transform infrared (FT-IR) microspectroscopic mapping system was utilized to assess the blend homogeneity of a pharmaceutical powder blend. The model powder blend was a two-component mixture consisting of captopril as a model drug and micronized ethylcellulose (EC) as a direct-compressible model excipient, which was mixed in a laboratory mill. The two-component mixture was mixed in two different weight proportions (captopril:EC, 1:1 or 10:1). By varying the mixing time, different blend mixtures sampled were determined by a reflectance FT-IR microspectroscopic mapping system to collect successively the IR spectra from the actual analysis area. The results revealed that the blend homogeneity increased gradually with increased mixing times, but the powder began to demix or segregate as mixing continued beyond the time when homogeneity was reached. In addition, the statistical results indicated that the sample mixture proportion had an effect on the uniformity of the powder blend. This study demonstrates that microspectroscopic FT-IR mapping technique can be easily used to determine the blend homogeneity in a powder blend mixture. |
PHILADELPHIA — Ryne Sandberg celebrated his new, three-year commitment to manage the Phillies Sunday morning. About three hours later, he'd had a fresh reminder of why the job was open in the first place.
As if to package an entire season in take-home form as a Fan Appreciation Day give-away, the Phillies wasted strong Cliff Lee pitching, hit poorly in late-game situations, made a critical defensive mistake and ran a losing streak to four with a 4-3 loss to the New York Mets.
Fittingly, the final play of the home portion of their season was a strikeout by Jimmy Rollins that left the tying run locked at second.
In a too-typical example of his season, Lee fanned eight in seven innings, allowing eight hits and three earned runs. But Domonic Brown mishandled Wilfredo Tovar's bouncing single to left in the seventh, with two runs scoring to give the Mets a 3-2 lead.
“I feel like I did OK,” Lee said. “I made it basically all year without getting injured. I had a minor deal where I missed two starts, but other than that I was able to take the ball and give the team a chance to win more often than not. And as a starting pitcher, that's my job. So I've got to feel pretty good about that.”
Lee's record would dip to 14-6 as the Phillies wasted late-game chances. After the Mets took a 4-2 lead on a Lucas Duda RBI double in the eighth, Darin Ruf plated a hustling Carlos Ruiz with an RBI foul-out deep along the first base line. But with Brown on third, Cody Asche struck out for the third time in the game, ending the threat.
The Phils stirred in the ninth when Kevin Frandsen led off with a single, was sacrificed by Freddy Galvis to second and replaced by pinch-runner Roger Bernadina. But Cesar Hernandez and Rollins struck out, sending the remaining 44,398 customers into their offseason as the Phillies prepared to head to Miami and Atlanta for their final seven games.
“Offensively, it was kind of the same story for the whole weekend — missed opportunities with men on base,” Sandberg said. “And any of these three games could have gone the other way with hitting a guy in from third or coming up with a clutch hit.
“We really didn't capitalize throughout the weekend on some opportunities in close games. And that came back to haunt us.”
The Phils had a 1-0 lead when Frandsen doubled to deliver Brown in the second, but the Mets answered in the fourth when Eric Young singled and eventually scored. Young was 2-for-5 with a double and a run scored. With the sweep, the Mets have caught the Phillies for third place in the National League East at 71-84.
Chase Utley went 2-for-4 to raise his average to .281, but the Phillies struck out 11 times, six against starter Carlos Torres, who improved to 4-5. The next time they are seen in Citizens Bank Park, they likely will be different. But how?
“I think health is big,” Utley said. “Getting some guys back in our lineup is always important. And I think our bullpen from the beginning of the season until the end of the season has really come around. So it's good that they got that experience. Hopefully, that can continue next year. Also, there are some young guys in here who can definitely contribute here next year.”
As for this year, they are on their second manager … but, it showed Sunday, still in a familiar struggle. |
//
// Copyright (c) 2015 The ANGLE Project Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
// Platform.h: The public interface ANGLE exposes to the API layer, for
// doing platform-specific tasks like gathering data, or for tracing.
#ifndef ANGLE_PLATFORM_H
#define ANGLE_PLATFORM_H
#include <stdint.h>
#include "../export.h"
namespace angle
{
class Platform
{
public:
// System --------------------------------------------------------------
// Wall clock time in seconds since the epoch.
// TODO(jmadill): investigate using an ANGLE internal time library
virtual double currentTime() { return 0; }
// Monotonically increasing time in seconds from an arbitrary fixed point in the past.
// This function is expected to return at least millisecond-precision values. For this reason,
// it is recommended that the fixed point be no further in the past than the epoch.
virtual double monotonicallyIncreasingTime() { return 0; }
// Tracing --------
// Get a pointer to the enabled state of the given trace category. The
// embedder can dynamically change the enabled state as trace event
// recording is started and stopped by the application. Only long-lived
// literal strings should be given as the category name. The implementation
// expects the returned pointer to be held permanently in a local static. If
// the unsigned char is non-zero, tracing is enabled. If tracing is enabled,
// addTraceEvent is expected to be called by the trace event macros.
virtual const unsigned char *getTraceCategoryEnabledFlag(const char *categoryName) { return 0; }
typedef uint64_t TraceEventHandle;
// Add a trace event to the platform tracing system. Depending on the actual
// enabled state, this event may be recorded or dropped.
// - phase specifies the type of event:
// - BEGIN ('B'): Marks the beginning of a scoped event.
// - END ('E'): Marks the end of a scoped event.
// - COMPLETE ('X'): Marks the beginning of a scoped event, but doesn't
// need a matching END event. Instead, at the end of the scope,
// updateTraceEventDuration() must be called with the TraceEventHandle
// returned from addTraceEvent().
// - INSTANT ('I'): Standalone, instantaneous event.
// - START ('S'): Marks the beginning of an asynchronous event (the end
// event can occur in a different scope or thread). The id parameter is
// used to match START/FINISH pairs.
// - FINISH ('F'): Marks the end of an asynchronous event.
// - COUNTER ('C'): Used to trace integer quantities that change over
// time. The argument values are expected to be of type int.
// - METADATA ('M'): Reserved for internal use.
// - categoryEnabled is the pointer returned by getTraceCategoryEnabledFlag.
// - name is the name of the event. Also used to match BEGIN/END and
// START/FINISH pairs.
// - id optionally allows events of the same name to be distinguished from
// each other. For example, to trace the consutruction and destruction of
// objects, specify the pointer as the id parameter.
// - timestamp should be a time value returned from monotonicallyIncreasingTime.
// - numArgs specifies the number of elements in argNames, argTypes, and
// argValues.
// - argNames is the array of argument names. Use long-lived literal strings
// or specify the COPY flag.
// - argTypes is the array of argument types:
// - BOOL (1): bool
// - UINT (2): unsigned long long
// - INT (3): long long
// - DOUBLE (4): double
// - POINTER (5): void*
// - STRING (6): char* (long-lived null-terminated char* string)
// - COPY_STRING (7): char* (temporary null-terminated char* string)
// - CONVERTABLE (8): WebConvertableToTraceFormat
// - argValues is the array of argument values. Each value is the unsigned
// long long member of a union of all supported types.
// - flags can be 0 or one or more of the following, ORed together:
// - COPY (0x1): treat all strings (name, argNames and argValues of type
// string) as temporary so that they will be copied by addTraceEvent.
// - HAS_ID (0x2): use the id argument to uniquely identify the event for
// matching with other events of the same name.
// - MANGLE_ID (0x4): specify this flag if the id parameter is the value
// of a pointer.
virtual TraceEventHandle addTraceEvent(char phase,
const unsigned char *categoryEnabledFlag,
const char *name,
unsigned long long id,
double timestamp,
int numArgs,
const char **argNames,
const unsigned char *argTypes,
const unsigned long long *argValues,
unsigned char flags)
{
return 0;
}
// Set the duration field of a COMPLETE trace event.
virtual void updateTraceEventDuration(const unsigned char *categoryEnabledFlag, const char *name, TraceEventHandle eventHandle) { }
// Callbacks for reporting histogram data.
// CustomCounts histogram has exponential bucket sizes, so that min=1, max=1000000, bucketCount=50 would do.
virtual void histogramCustomCounts(const char *name, int sample, int min, int max, int bucketCount) { }
// Enumeration histogram buckets are linear, boundaryValue should be larger than any possible sample value.
virtual void histogramEnumeration(const char *name, int sample, int boundaryValue) { }
// Unlike enumeration histograms, sparse histograms only allocate memory for non-empty buckets.
virtual void histogramSparse(const char *name, int sample) { }
// Boolean histograms track two-state variables.
virtual void histogramBoolean(const char *name, bool sample) { }
protected:
virtual ~Platform() { }
};
}
typedef void(*ANGLEPlatformInitializeFunc)(angle::Platform*);
ANGLE_EXPORT void ANGLEPlatformInitialize(angle::Platform*);
typedef void (*ANGLEPlatformShutdownFunc)();
ANGLE_EXPORT void ANGLEPlatformShutdown();
typedef angle::Platform *(*ANGLEPlatformCurrentFunc)();
ANGLE_EXPORT angle::Platform *ANGLEPlatformCurrent();
#endif // ANGLE_PLATFORM_H
|
Motor hemiplegia and the cerebral organization of movement in man. II. The myth of the human extrapyramidal system.
Following a brief review of the concept of extrapyramidal system, clinical and anatomic evidence is presented against its relative prominence in man. It is proposed that the greatest part of those structures traditionally labeled as extrapyramidal effects its respective functional activities by way of the pyramidal tracts themselves. Such structures, centered around the basal nuclei, the cerebellum and possibly, the limbic areas of the prosencephalon are, according to the present suggestion, indeed, pre pyramidal. This model is based upon the clinical analysis of patients and agrees with more than one century of anatomic verifications in human brains, favoring the notion of the singularity of the human brain. |
Q:
Cartesian Line to Projective Coordinates
I have an equation of a line written in slope intercept form $y = mx + b$ How would I translate it from the 2d space into the projective space?
I have been reading Wikipedia and I believe this is the Homogeneous coordinates and the equation that I come up with $ax + by + cy = 0$
Any examples would be preferred!
A:
Your case is the simple one
You can choose $$L=\begin{pmatrix} -m \\ 1 \\ -b \end{pmatrix}$$ $$(-m) x+(1) y+(-b)=0$$
For a line through $(x_c,y_c)$ with angle $\varphi$ from the horizontal then $$ L =\begin{pmatrix} -\sin\varphi \\ \cos\varphi \\
x_c \sin\varphi - y_c \cos\varphi \end{pmatrix}$$ $$ (-\sin\varphi) x + (\cos\varphi ) y + (x_c \sin\varphi - y_c \cos\varphi) = 0$$ $$ -(x-x_c) \sin\varphi + (y-y_c) \cos\varphi = 0 $$
For a line through two points $(x_1,y_1)$ and $(x_2,y_2)$ $$L=\begin{pmatrix} -(y_2-x_1) \\ (x_2-x_1) \\ y_2 x_1 - x_2 y_1 \end{pmatrix} $$ $$ (y_1-y_2) x + (x_2-x_1) y + (x_1 y_2 - x_2 y_1) = 0 $$
NOTE:The line through two points in homogeneous coordinates is defined as $$L = \begin{pmatrix} x_1 \\ y_1 \\ w_1 \end{pmatrix} \times \begin{pmatrix} x_2 \\ y_2 \\ w_2 \end{pmatrix} = \begin{pmatrix} w_2 y_1 - w_1 y_2 \\ w_1 x_2 - w_2 x_1 \\ y_2 x_1 - x_2 y_1 \end{pmatrix} $$ where $\times$ is the vector cross product.
Conversely the point intersected by two lines in homogeneous coordinates is defined as $$P=\begin{pmatrix} a_1 \\ b_1 \\ c_1 \end{pmatrix} \times \begin{pmatrix} a_2 \\ b_2 \\ c_2 \end{pmatrix} = \begin{pmatrix} c_2 b_1 - c_1 b_2 \\ c_1 a_2 - c_2 a_1 \\ b_2 a_1 - a_2 b_1 \end{pmatrix} $$
|
Q:
How to add a fake EF4 Rerefence with AutoFixture ( or without if possible )
I have the following code:
public class FakeOrderRepository:IOrderRepository
{
private static Fixture fixture = new Fixture();
private List<acc_ORDERS> dbmock = new List<acc_ORDERS>()
{
fixture.Build<acc_ORDERS>().With(x => x.OrderNumber,Tests.FAKE_ORDERNUMBER)
.Without(x => x.EntityKey)
.Without(x => x.usr_CUSTOMERSReference)
.Without(x => x.usr_CUSTOMERS)
.Without(x => x.sys_COUNTRY1Reference)
.Without(x => x.sys_COUNTRYReference)
.Without(x => x.sys_STATE1Reference)
.Without(x => x.sys_STATEReference)
.Without(x => x.acc_CUSTOMJEWEL_ORDER_ITEMS)
.Without(x => x.acc_DIAMOND_ORDER_ITEMS)
.Without(x => x.acc_JEWELRY_ORDER_ITEMS)
.Without(x => x.acc_CASHFLOW)
.Without(x => x.sys_STATE)
.Without(x => x.sys_STATE1)
.Without(x => x.sys_COUNTRY)
.Without(x => x.sys_COUNTRY1)
.CreateAnonymous()
};
public int Save(Order orderdto)
{
throw new NotImplementedException();
}
public Order GetOrderByOrderNumber(int orderNumber)
{
try
{
var orderdto = dbmock.Where(x => x.OrderNumber == orderNumber).SingleOrDefault();
orderdto.sys_COUNTRYReference= new EntityReference<sys_COUNTRY>()
{
Value = new sys_COUNTRY()
};
var order = Mapper.Map<acc_ORDERS, Order>(orderdto);
return order;
}
catch (Exception ex)
{
throw new Exception("when asked to get the order with the ordernumber:" + orderNumber + " an error occured\r\n" + ex.Message);
}
}
}
Seems like this line:
orderdto.sys_COUNTRYReference= new EntityReference<sys_COUNTRY>()
{
Value = new sys_COUNTRY()
};
When executed causes an exception, I am trying to mock the reference objects, if I call the code without this like It all works, but my test code needs the sys_COUNTRYReference object.
The Exception:
Requested operation is not allowed when the owner of this RelatedEnd
is null. RelatedEnd objects that were created with the default
constructor should only be used as a container during serialization.
Please advice on how to fix this problem or attack it from a different angle.
Thank you.
A:
AutoFixture doesn't work well with EF EntityObject entities, in my experience. The reason is that it wants to assign every property of the object. Yes, you can tell it to skip certain properties with .Without(), but this becomes quite tedious when you only want to "fake" around half of the properties you have. Your example code only scratches the surface and is already obscuring the purpose of the test.
I was unable to find a way to stop AutoFixture from ever assigning to certain types, especially open generic types.
So I don't think you'll be able to use AutoFixture for this (yet! -- it's open source, and someone could contribute a fix...).
On the other hand, I'm going to disagree with @Ladislav -- testing with EntityObject entities works fine. AutoFixture seems pretty indifferent to this, but that doesn't mean you can't test! You just have to assign the test values with something other than AutoFixture directly.
You can certainly do something along the lines of:
myEntity = new SomeEntity
{
Foo = fixture.CreateAnonymous<string>(),
Bar = fixture.CreateAnonymous<int>()
};
..etc.
|
Du er kanskje, i likhet med meg, en av mange som har tatt en Myers-Briggs personlighetstest. Det florerer av varianter av denne på nettet og den er blitt meget populær fordi folk umiddelbart kjenner seg igjen i testen. Den ser ut til å fange inn helt grunnleggende trekk ved folks personligheter.
Fire uavhengige dimensjoner
Testen forsøker å plassere deg i 4 forskjellige kategorier ut fra fire forskjellige spørsmål. Hvert av spørsmålene har ett av to mulige svar.
Spørsmål 1: Hvordan fokuserer du? (Introvert/Extrovert)
Folk har en tendens til å enten være fokusert utover i den ytre verden (Extrovert) eller innover i sin egen indre verden (Introvert), og disse to gruppene har forskjellige egenskaper.
Ekstroverte egenskaper (E) Introverte egenskaper (I) – Handle først, tenke senere – Tenke først, så handle – Trenger jevnlig kontakt med mennesker for å få energi – Trenger jevnlig alenetid for å få energi – Blir typisk motivert av ytre ting og mennesker – Blir typisk motivert av egne tanker og ens indre univers – Liker mangfoldige og gjerne flyktige sosiale relasjoner – Foretrekker kommunikasjon og relasjoner på enmannshånd
Spørsmål 2: Hvordan forstår du? (Sensing/iNtuition)
Liker du å fokusere på det konkrete og direkte sansbare slik som farger, lyder, smak og lukter, eller foretrekker du å få et mentalt overblikk, å se ting i perspektiv? Da er du enten en sansende eller intuitiv person.
Sansende egenskaper (S) iNtuitive egenskaper (N) – Lever mentalt i nuet, fokuserer på muligheter i nåtiden – Lever mentalt i fremtiden, fokuserer på fremtidige muligheter – Faller naturlig å bruke “sunn fornuft” og praktiske løsninger – Faller naturlig å bruke fantasien og finne opp nye muligheter – Husker godt fakta og detaljer ved tidligere hendelser – Husker godt mønstre, sammenhenger og forbindelser – Improviserer best fra erfaringer – Improviserer best fra teoretisk forståelse – Liker klar og konkret informasjon, misliker gjetninger når informasjon ikke er entydig – Komfortabel med flertydige, kaotiske data og med å gjette deres betydning
Spørsmål 3: Hvordan vurderer du? (Thinking/Feeling)
Analyserer du informasjon fra avstand, logisk og beregnende? Eller engasjerer du deg følelsesmessig og lar disse styre din vurdering? Da er du enten henholdsvis tenkende eller følende.
Tenkende egenskaper (T) Følende egenskaper (F) – Faller naturlig å bruke fakta og logiske argumenter når man skal ta en beslutning – Faller naturlig å bruke følelser og konsekvens for folk når man skal ta en beslutning – Legger naturlig merke til oppgaver og arbeid som må gjøres – Legger naturlig merke til folks behov og reaksjoner – Klarer enkelt og naturlig å gi en objektiv og kritisk analyse – Søker naturlig konsensus og populære meninger – Aksepterer konflikt som en naturlig og normal del av forhold mellom mennesker – Liker ikke konflikt. Er nærmest allergisk mot disharmoni mellom folk
Spørsmål 4: Hvordan handler du? (Judging/Perceiving)
Alle mennesker bedømmer (tenker og føler) og oppfatter (sanser og intuiterer) når de bearbeider informasjon og handler, men hos de fleste mennesker dominerer en av disse i deres forhold til den ytre verden, altså hvordan man forholder seg til handlinger. Bedømmende og oppfattende mennesker utviser to vidt forskjellige handlingsmønstre.
Bedømmende egenskaper (J) Oppfattende egenskaper (P) – Planlegger i detalj før man handler – Komfortabel med å ta ting på sparket – Fokuserer på oppgaver, fullfører meningsfylle arbeidsstykker før man går videre – Liker å gjøre mange ting i parallell (multitasking), ha variasjon, blande lek og arbeid – Arbeider best og unngår stress når man ligger foran skjema – Tåler tidspress og jobber best med en stram tidsfrist hengende over seg – Faller naturlig å bruke målsetninger, datoer og rutiner til å organisere livet sitt – Liker ikke å inngå forpliktelser som reduserer fleksibilitet, frihet og variasjon
Ved å besvare disse spørsmålene plasseres man i en av 16 mulige kategorier som representerer personlighetstype. En person kan for eksempel være Introvert, iNtuitive, Thinking og Judging, og Myers-Briggs-testen kategoriserer da denne som INTJ, som er den sjeldneste Myers-Briggs-kategorien. Kun ca 3-4% av befolkningen er INTJ, men blant norske liberalister er INTJ-typen dramatisk overrepresenterte.
Jeg støtte for første gang bort i Myers-Briggs-testen på internett for nesten 20 år siden (ja, internett eksisterte faktisk da). Jeg husker at jeg ble meget fascinert av denne testen og jeg syntes at kategorien jeg kom frem til, ENTP, passet som en god beskrivelse på meg. Jeg slo meg til ro med dette lenge og tenkte ikke mer over det, inntil jeg tok testen på nytt for 5 år siden. Da oppdaget jeg at jeg ikke lenger var samme kategori. Faktisk hadde jeg store problemer med å plassere meg i noen bestemt kategori. Jeg så i mye større grad enn før ut til å falle midt mellom alle kategoriene, et slags nullpunkt.
Hva kunne dette skyldes? Var ikke dette en personlighetstest? Og personligheter går vel ikke rundt og endrer seg sånn rett uten videre? Dette fikk meg til å tenke nøyere gjennom hva Myers-Briggs-testen måler og hva det kunne bety at jeg tilsynelatende havnet i begge kategorier, dvs. at jeg var blitt omtrent like introvert som ekstrovert osv.
Heldigvis var jeg på dette tidspunktet utstyrt med et solid filosofisk grunnlag. Da jeg tok testen på nytt hadde jeg lest meg grundig opp på Ayn Rand og brukt tusenvis av timer på å tenke gjennom blant annet sinnets oppbygning, og jeg innså etter hvert at mine endringer på testen i betydelig grad skyldtes det jeg hadde lært fra hennes filosofi.
De falske dikotomiene
Dette fikk meg til å begynne å se Myers-Briggs-testen i et stadig mer kritisk lys, og da slo det meg at store deler av testen bygger på noe som Ayn Rand identifiserte som falske dikotomier (to-delinger). Alle har hørt fraser som “i prinsippet er det bra, men i praksis fungerer det ikke.” Dette er en vanlig dikotomi i filosofien mellom det praktiske (sansbare) og det prinsipielle (det konseptuelle). Du kan enten være praktisk eller prinsipiell, men ikke begge deler i henhold til det tradisjonelle synet. Ayn Rand derimot sa “det som ikke fungerer i praksis fungerer heller ikke i prinsippet.” Med dette mente hun at gode prinsipper må være utledet fra virkeligheten, fra det sansbare.
En annen falsk dikotomi som hun angriper er logikk/følelser-dikotomien. Alle har sett Mr Spock i Star Trek som oppfører seg som en robot og sier “følelser er ulogiske.” Ideen bak dette er at dersom man skal være logisk kan man ikke ha følelser. Enten logikk eller følelser, men ikke begge deler. Ayn Rand sa derimot at følelser ikke er noe annet enn en refleksjon av summen av ens verdier som er blitt ervervet over tid, altså resultat av ens tidligere valg. Dersom disse tidligere valgene var logiske og rasjonelle vil man få sterke følelser knyttet til logiske og rasjonelle verdier.
En tredje falsk dikotomi er materialisme/idealisme. Enten er man styrt av ytre, materielle faktorer (miljø, velstand, samfunn osv.) eller så er det sinnets makt over materien. Man har altså i henhold til denne dikotomien valget mellom å være en tanketom materialist eller en virkelighetsfjern idealist. Ayn Rand forkastet denne dikotomien og siterte opplysningsfilosofen Francis Bacon “for å styre naturen må den adlydes.” Med andre ord, den materielle verden er viktig for våre liv og vi bør hele tiden forholde oss til den, nyte den og gjøre det beste ut av den. Men samtidig er vi utstyrt med en evne til å konseptualisere, en indre skaperkraft som har en ekstrem evne til å transformere den ytre verden.
Jeg begynte å tenke over at kanskje grunnen til at jeg ikke lenger passet veldig bra inn i Myers-Briggs-testen men havnet nærmere et slags nullpunkt mellom alle kategoriene var fordi jeg hadde arbeidet bevisst med å forsøke eliminere de falske dikotomiene i mitt eget liv. Materialisme/idealisme-dikotomien passer for eksempel meget godt inn i ekstrovert/introvert-kategorien. En materialist er ekstrovert, opptatt av den ytre verden og lar seg styre av denne, mens en idealist bryr seg mer om de indre verdiene og sitt eget tankeunivers. På tilsvarende vis faller tenkende/følende inn i logikk/følelser-dikotomien. prinsipiell/praktisk sammenfaller med intuitiv/sansende-kategorien.
Det integrerte sinn
Min mening per i dag er at Myers-Briggs-testen først og fremst måler tillærte feil og svakheter (og en del styrker) i ens psyke, ikke en medfødt uforanderlig personlighet. Jeg skal ikke påstå at jeg har det mest balanserte og integrerte sinn i hele verden, men jeg tror at jo mer rasjonelt liv man lever you mer trekkes man mot denne null-sonen mellom alle Myers-Briggs-kategoriene. Jeg avviser ikke at testen måler visse medfødte tilbøyeligheter og at det derfor vil være naturlig for folk å helle litt i den ene eller den andre retningen, men dersom man scorer veldig ekstremt i en bestemt retning kan det være en indikasjon på at man har gjort dårlige valg og skaffet seg dårlige verdier i livet sitt.
Er man for eksempel ekstremt utadvendt (E) betyr det at man ikke har noen selvstendig eksistens som individ. Man er direkte avhengig av andre i en sånn grad at man ikke tåler å være alene med seg selv. Er man ekstremt innadvendt (I) betyr det at man har et dårlig selvbilde og ikke trives med sin fysiske tilstedeværelse sammen med andre mennesker eller i den ytre verden. Begge disse svakhetene går det an å jobbe med. Det går an å bygge opp sin selvtillit over tid og handle på en slik måte at man ikke blir fullt så innadvendt. På tilsvarende vis kan man bygge opp sin personlighet slik at man blir mer selvstendig og blir så avhengig av andre mennesker.
Er man ekstremt sansende (S) tyder det på at man ikke har utviklet sitt konseptuelle fakultet ordentlig. Er man ekstremt intuitiv (N) tyder det på at man ikke har utviklet sitt sanseapparat. Er man for tenkende (T) betyr det at man kronisk undervurderer følelsenes betydning, både i tenkning og i relasjoner mellom mennesker. Er man for følende (F) betyr det at man rygger inn i fremtiden og samler opp selvmotsigelser i sinnet sitt som et fluepapir samler fluer. Er man for bedømmende (J) går man glipp av kreativiteten som oppstår via spontane handlinger og er man for oppfattende (P) blir ens liv for ustrukturert og rotete.
I stedet for å se på Myers-Briggs-testen som et mål på hvordan man er født bør man gjerne mer se på den som noe som måler forbedringspotensial. Legg merke til at det at man blir mer sensitiv til følelser er ikke det samme som at man skal slutte å tenke logisk. Det ene er ikke i konflikt med det andre. Med andre ord, å bli mer psykologisk balansert betyr ikke å bli dårligere på de tingene man er gode på, men å bli bedre på de tingene man er dårlige på.
Det samme gjelder det å være opptatt av den ytre verden og det konkrete. Dette ekskluderer på ingen måte at man samtidig også kan være opptatt av å konseptualisere, planlegge og sette i system. Man kan gjøre begge deler. Faktisk er dette en nødvendighet. Begreper er til syvende sist redskaper for å manipulere den ytre virkelighet til ens egeninteresse. Den indre verden dreier seg altså om den ytre.
Alle begreper må derfor være utledet av og forankret i den konkrete virkeligheten. Det betyr at mennesker må bruke mye tid på å bry seg om den konkrete sansbare virkeligheten for å kunne få gode begreper. Hvorfor er gode begreper viktige? Fordi de gjør oss i stand til å veve sammen våre erfaringer til et konsistent, logisk, integrert nettverk som gjør oss i stand til å leve harmonisk både i forhold til den ytre virkelighet og vår indre.
Jeg avviser dog på ingen måte at mennesker har medfødte psykologiske evner og tilbøyeligheter og Myers-Briggs-testen fanger inn noe av dette, men dessverre fanger den også inn ting som sterkt påvirkes av personlige valg. Ta derfor Myers-Briggs-testen mer som en personlig utfordring enn en fasit. |
Paroles "Baby, (You've Got What It Takes)" - The Supremes
Well, now, it takes more than a robin to make the winter go
And it takes two lips of fire to melt away the snow
Well, it takes two hearts a-cookin' to make a fire grow
And baby you've got what it takes
You know it takes a lot of kissin' (Tell me about it)
To make a romance sweet
Ooh, it takes a lot of lovin' to make my life complete
Mmm, and it takes a lot of woman to knock me off my feet
And baby, you've got what it takes.
Because it takes more than an effort to stay away from you
It'd take more than a lifetime to prove that I'll be true
But it takes somebody special to make me say, "I do."
"Oh, yeah"
And baby, you've got what it takes.
Because it takes oh yeah
" You're back in my spot again, honey"
"I like your spot"
To stay away from you
"I can't stay away from you"
It takes more than a lifetime, daddy, to prove that I'll be true
"NOW it's you"
But, it takes somebody special "Like me, baby"
To make me say, "I do."
And baby you've got what it takes
"C'mon, let's play it again, huh?"
"C'mon, let's do it one more time, all right?"
And baby you've got what it takes
"One more time, Brook"
"Ah-ha, OK, Ah-ha"
And baby you've got what it takes |
Active immunotherapy to treat human cancer is one of the most rapidly developing fields in oncology. The Immune Monitoring Core Laboratory was established as a resource for investigators needing to monitor immunotherapy trials. The IMCL occupies 700 sq ft lab space with two adjacent 100 sq ft cell culture rooms in the new Center for Immunology Research (CCIR) facility. Created as a state-of-the-art facility, the goal of the lab is to work closely with each investigator at all stages of the clinical trial process by planning both the types of immune monitoring assays and number of data points suitable for each particular clinical trial, processing specimens, performing assays, and providing help with data interpretation. The IMCL also allows researchers to use dedicated equipment not usually available in individual labs. As part of this commitment to offer the most recent technology in immune monitoring to all researchers, the IMCL teams with industry and academic collaborators to develop new assays, to validate immune assays and to set rigorous quality control standards. The techniques used by the IMCL for immune monitoring include 1) cytokine ELISPOT assays;2) 6-color FACS phenotyping assays using HLA class I and class II peptide tetramers/multimers;3) intracellular cytokine staining methods;4) advanced ELISA-based technology that measures multiple cytokines in a single sample or reaction (multiplex cytokine analysis);5) newer T-cell proliferation assays using CFSE labeling coupled to FACS;6) more sensitive non-radioactive methods to determine antigenspecific CTL activity using FACS. The IMCL plays a key role in clinical trial development. During the previous funding period, IMCL services were used by 10 investigators from 8 of the 19 CCSG programs. 90 % of users had peer-reviewed funding and accounted for 80.7 % of utilization. Future plans are focused on Increasing the IMCL participation in CCSG-related clinical studies, as well as developing new assays to improve the amount and quality of information that can be obtained from a clinical trial. |
811 S.W.2d 582 (1991)
Jerry REED, Appellant,
v.
The STATE of Texas, Appellee.
No. 222-90.
Court of Criminal Appeals of Texas, En Banc.
May 15, 1991.
John H. Hagler (on appeal only), Dallas, for appellant.
John Vance, Dist. Atty., Kathleen A. Walsh and Colleen Doolin, Asst. Dist. Attys., Dallas, Robert Huttash, State's Atty., Austin, for the State.
*583 Before the court en banc.
OPINION ON STATE'S MOTION FOR REHEARING
MALONEY, Judge.
We granted the State's Motion for Rehearing to re-examine our opinion on original submission.[1] Our prior opinion is withdrawn.
Appellant was charged by indictment with possession of a controlled substance, heroin, TEX.HEALTH & SAFETY CODE ANN. § 481.115(aMb) (Vernon 1990), enhanced by a prior conviction for burglary,[2] V.T.C.A. Penal Code, § 12.42(c). The appellant pled guilty and the trial court assessed punishment at twenty (20) years confinement in the Texas Department of Criminal Justice, Institutional Division (TDCJID).[3] The Fifth Court of Appeals reversed appellant's conviction as to punishment in a published opinion, Reed v. State, 785 S.W.2d 412 (Tex.App.Dallas 1990).
Appellant claimed on direct appeal that the trial court erred in overruling his objection to admission of a penitentiary packet from the TDCJID which contained a copy of the judgment and sentence of appellant's previous conviction for burglary. Appellant argued that the copies of the judgment and sentence were inadmissible because, although they were certified by the custodian of records at the TDCJID, they did not reflect a separate certification by the district clerk of the original convicting court in Dallas County. Based on this Court's opinion in Dingier v. State, 768 S.W.2d 305 (Tex.Cr.App.1989), the court of appeals held that the pen packet should not have been admitted because the copy of the judgment and sentence contained therein did not reflect certification from the district clerk of the convicting court.
Dingier held that the copy of the judgment and sentence in the pen packet, in order to be admissible as self-authenticated documents), must reflect that the original copy received by TDCJID was certified by the district clerk of the convicting court. See Dingier, supra, at 306. Dingier was predicated upon TEX.REV.CIV.STAT. ANN. art. 3731a[4], now repealed, and not *584 on the current Texas Rules of Criminal Evidence 901 and 902. The rule of Dingier has been carried forward, however, in cases construing Rules 901 and 902.[5]
We have reconsidered the Dingier opinion and find that it is no longer valid in light of Rules 901 and 902, is inconsistent with prior Texas case law,[6] and is also inconsistent with the federal cases decided under the federal rules of evidence,[7] which are the source of Rules 901 and 902 of the Texas Rules of Criminal Evidence. Dingier goes the way of former Art. 3731a, § 4, V.A.C.S., now repealed, and is overruled.
In the usual case where this issue arises, there are two separate sets of records of the judgment and sentencethe district clerk of the convicting court retains the originals of the judgment and sentence on file in that court and sends a certified copy to TDCJID which, in turn, retains the certified copies as part of the inmate's permanent file in the penitentiary. See V.A.C.C.P. art. 42.09 § 8 (Copies of the judgment and sentence are delivered to the Director at the time a convicted defendant is transferred to the TDCJID).[8] The district clerk is the legal custodian of the originals on file in the convicting court and *585 the records clerk at TDCJID is the legal custodian of the certified copies on file at the penitentiary. Typically, the State introduces the certified copies contained in the penitentiary file or "pen packet" to prove the prior conviction for enhancement purposes.[9]
Previously, under Dingier and its construction of Article 3731a, TEX.REV.CIV. STAT.ANN., this Court required that the copies in the pen packet reflect the certification by the clerk of the convicting court in order to be admissible as properly authenticated documents. Dingier, 768 S.W.2d at 306. The problem arises when, as in this case, the copies of the judgment and sentence do not reflect certification by the convicting court clerk, but only by the record clerk at TDCJID.[10] The question then is whether Rule 901 or 902 of the Texas Rules of Criminal Evidence requires that the custodian who certifies the records must be custodian of the original records, or if certification by the custodian of a set of copies is likewise sufficient.[11]
Neither Rule 901 nor 902 expressly provides that the certifying custodian of a document may only be the custodian of the original record. Certification by the records custodian as a means of authentication is specifically addressed in Rule 902, which provides that certain types of documents are self-authenticating. Rule 902 states in pertinent part: Extrinsic evidence of authenticity as a condition precedent to admissibility is not required with respect to the following:
(4) Certified copies of public records. A copy of an official record ... certified as correct by the custodian or other person authorized to make the certification, by certificate complying with paragraphs (1), (2), or (3) of this rule....
Paragraph (2) of the rule provides that a document certified in accordance with paragraph (4), supra, but not under seal, will be self-authenticating if a public officer having a seal certifies that "the signer has the official capacity and that the signature is genuine." Tex.R.Crim.Evid. 902(2).
The copies of the judgment and sentence in the pen packet in the instant case were certified by the record clerk of the TDCJID in accordance with 902(4). The clerk attested as follows:
That I am the Record Clerk of the Texas Department of Corrections, a penal institution of the State of Texas, situated in the County and State aforesaid. That in my legal Custody as such officer are the original files and records of persons heretofore committed to said institution: that the (x) photograph (x) fingerprints *586 and (x) commitments, including judgement and sentence, of Jerry Keith Reed TDC #243306 CAUSE # C74-5767-PH, C73-1115-NH, C74-3908-PH a person heretofore committed to said penal institution and who served a term of imprisonment therein; that I have compared the attached copies with their respective originals now on file in my office and each thereof contains, and is a full, true, and correct transcript and copy from its said original.[12]
This statement was dated and signed by the record clerk. The record clerk's certification is then attested by the presiding judge of the county court of Walker County in which the TDCJID is located. In accordance with Rule 902(2), Tex.R.Crim. Evid., the judge certified under seal that the record clerk of TDCJID is the legal custodian of the records and that the signature is genuine. The judge's certificate is further attested by the county clerk, who certified that the judge was authorized by law to execute the certificate.
In construing the Texas Rules of Criminal Evidence, which were patterned after the Federal Rules of Evidence, we are guided by federal cases interpreting the federal rules, although not bound thereby. See C. Miller, Texas Rules of Evidence: Article V. Privileges, 16 VOICE FOR THE DEFENSE 40 (October 1986); S.H. Clinton, Texas Rules of Evidence: Genesis and General Provisions, 16 VOICE FOR THE DFENSE 26 (October 1986). Federal courts have held that a proper certification by the custodian of records at a state correctional institution is sufficient authentication under Rule 902(4) of a copy of a prior conviction contained in that institution's files.
In United States v. Darveaux, 830 F.2d 124 (8th Cir.1987), the court held that the record clerk of the TDCJID was legal custodian of the pen packet containing copies of the defendant's prior conviction, and that the conviction record, certified by the TDCJID record clerk, was therefore selfauthenticating in a subsequent prosecution. Likewise, in United States v. Dancy, 861 F.2d 77 (5th Cir.1988), the court held that the documents in the defendant's pen packet prepared by the California Department of Corrections and certified by the CDC record clerk, including copies of the defendant's prior criminal judgment and fingerprint card, were self-authenticating in a subsequent prosecution.[13] We are persuaded that the rationale of the federal courts on this point is correct and we therefore hold that the TDCJID record clerk's certification of the pen packet copies of the judgment and sentence constitutes proper authentication in accordance with Rule 902(4) of the Texas Rules of Criminal Evidence.
While a document may be properly authenticated under either of Rules 901 or 902, and need not be authenticated under both, we nevertheless address authentication under Rule 901. Rule 901(a) simply sets out the general rule that the requirement of authentication is satisfied by extrinsic evidence that the matter in question is what its proponent claims, without limiting the type of extrinsic evidence which may be used. Rule 901(b) then provides several illustrations of the type of extrinsic evidence which would satisfy the requirement of authentication. One of the illustrations, example (7), specifically addresses "Public records and reports," and provides that authentication is established by "[evidence that a writing authorized by law to be recorded or filed in a public office, or a purported public record, report, statement, or data compilation, in any form, is from the public office where items of this nature are kept." Tex.R.Crim.Evid. 901(b)(7).
*587 Thus, one means of authenticating a public record under 901 is showing that the document is from a public office authorized to keep such a record. 5 J. Weinstein & M. Berger, Weinstein's Evidence § 901(b)(7), at 901-98 (1990). In the instant case, it seems clear that TDCJID is authorized to keep the records, given the fact that TDCJID relies on these records as its basis for admitting a prisoner and holding him in custody. The only remaining fact which must be established under 901(b)(7) is that TDCJID is a "public office."[14] If so, then the records are properly authenticated under 901(b)(7) by virtue of the TDCJID record clerk's certification that the copies of the judgment and sentence contained in the pen packet are "full, true and correct... cop[ies]."
However, we need not decide whether TDCJID is a public office, as example (7) is not the only means by which authentication can be accomplished under Rule 901. See, e.g., United States v. Jimenez Lopez, 873 F.2d 769 (5th Cir.) (conclusive proof of authenticity before allowing admission of disputed evidence not required; Rule 901 does not limit type of evidence allowed to authenticate a document, merely requires some evidence sufficient to support a finding that evidence in question is what the proponent claims). The fact that the records are correct copies of those upon which TDCJID relies in admitting and detaining prisoners at the state correctional facility constitutes extrinsic evidence that the records are what the proponent claims them to be. See Tex.R.Crim.Evid. 901(a). Were the copies upon which TDCJID relies fraudulent in some respect, custody of the prisoner would be questionable, if not unlawful. The probabilities are relatively low that the TDCJID records would be false or fraudulent, even though they do originate from another source, the convicting court. See generally 5 Weinstein & Berger, Weinstein's EvidenceUnited States Rules § 901(b)(7)[01] at 901-97 to 901-98 (1983) (presumption of regularity attaches to administration of governmental affairs because falsification of public documents constitutes a breach of duty and, usually, a violation of the law).
The authenticity of the documents is further corroborated by the testimony of the State's expert witness who stated that the fingerprints from the fingerprint card in the pen packet and the fingerprints taken from the appellant on the morning of the punishment hearing were made by the same individual, the appellant. The opponent of the evidence is always free to challenge authenticity, of course, even under Rule 902. See Fed.R.Evid. 902 advisory committee note ("In no event is the opposite party foreclosed from disputing authenticity.") We hold that the TDCJID record clerk's certification of the pen packet copies of the judgment and sentence constitutes sufficient extrinsic evidence that the copies are authentic.
We find that the pen packet in the instant case was sufficiently authenticated in accordance with Rules 901 and 902(4) of the Texas Rules of Criminal Evidence and properly admitted into evidence at the punishment phase of appellant's trial.[15] The State's motion for rehearing is granted, the *588 State's ground for review is sustained, the judgment of the court of appeals is reversed and the judgment of the trial court is affirmed.
CLINTON, Judge, dissenting.
The issue is whether the State proved beyond a reasonable doubt its allegations in an enhancement paragraph by admissible evidence in the form of a pen packet containing a purported copy of judgment and sentence which does not bear a certification by the clerk of the convicting court that they are correct copies of the judgment and sentence entered in the minutes of the trial court. See Attestation and Certificate and Judgment and Sentence in Appendix attached hereto. Convinced that the majority opinion grievously misconstrues and incorrectly applies pertinent rules of evidence I would affirm the judgment of the court of appeals. Reed v. State, 785 S.W.2d 412 (Tex.App.Dallas 1990).
Those rules are, e.g., Tex.R.Cr.Evid. Rules 901(a) and (b)(7), 902(4) and 1005. "The authentication doctrines embodied in these provisions are not new; they existed at common law and under previous statutes in Texas." Goode, Wellborn & Sharlot, Guide to Texas Rules of Evidence, § 901.9, 33 Texas Practice 627; accord: Ray, Law of Evidence § 1591, 2 Texas Practice (1990 Pocket Part 87-88); Note of Advisory Committee to Federal Rule 901(b) (treatment of authentication and identification draws largely from experience embodied in common law and related statutes).
The majority finds the instant "pen packet" was "sufficiently authenicated in accordance with Rules 901 and 902(4) ... and properly admitted into evidence at the punishment phase[.]" Slip Opinion, at 9. With deference, I respectfully dissent.
Rule 901 deals with "a special aspect of relevancy"when relevancy of proffered evidence "depends upon its identity, source or connection with a particular person ... or event." Goode, Wellborn & Sharlot, supra § 901.1, at 620; Note of Advisory Committee to Federal Rule 901(a). Compliance with the rule does not assure admission of the matter, for other rules may bar receiving it. Ibid. Tartt & Wolff, Article IX: Authentication and Identification, 20 Hous.L.Rev. 551, 555 (1983 Tex.R.Evid.Handbook).
Rule 901(a) merely provides a means for satisfying "a condition precedent to admissibility," and with Rule 901(b)(7) contemplates authentication or identification by extrinsic evidence, as opposed to self-authentication of a writing that is a matter of public record. See Rule 902 (extrinsic evidence not required for certified copy of public record under Rule 902(4)).
The first illustration of such extrinsic evidence is testimony from a witness with knowledge that the matter is what it is claimed to be. Rule 901(b)(1); 36 Tex. Jur.3d 123, § 366; 189, § 400; 190, § 401. Under Rule 901(b)(7) such evidence would be live testimony that the writing is authorized by law to be recorded or filed and in fact recorded or filed in a public office, or is a purported public record, and is from the public office where items of this nature are keptin the sense that they are enrolled by and maintained in that public office. Morris v. Wiley, 378 S.W.2d 149, at 152 (Tex.Civ.AppAustin 1964) writ refused n.r.e.; Tartt & Wolff, supra, 551, 566-567; Goode, Wellborn & Sharlot, supra § 901.9, at 627 (testimony of custodian); 36 Tex.Jur.3d 190, § 401; 228, § 417; 7 Wigmore, Evidence § 2158, 771 (Chadburn rev. 1978) (testimony by official custodian or private person, bringing record to court and identifying it), cited approvingly in Notes of Advisory Committee to Federal Rule 901(b)(7) (proof of custody); Black's Law Dictionary (Rev. Fourth Ed.1968) 1438.
In a criminal prosecution there is but one "judgment."[1]
*589 The sole official custodian of district court judgments entered of record is the clerk of court. V.T.C.A. Government Code, § 51.303(a) and (b).
To prove the content of any public record, including a judgment, the original is required except as otherwise provided in the rules of evidence or by law. Tex.R.Cr. Evid, Rules 1002 and 1005, the latter providing for a certified or "compared" copy.
Thus, extrinsic evidence under Rule 901(b)(7) showing a judgment rendered in district court is made from the minutebook in which it was entered through testimony of the clerk of court, the custodian in the public office where it is kept. "The production of the judgment by the clerk is sufficient prima facie proof of its authenticity." Short v. Blair & Hughes Co., 230 S.W. 427, at 431 (Tex.Civ.App Dallas 1921), no writ history; Ray, Law of Evidence, § 1278, 1A Texas Practice 470 (minute book admissible to establish judgment of court); 7 Wigmore, Evidence, supra.[2]
In the instant cause the record conclusively demonstrates that the State did not call the district clerk as a witness to authenticate or identify from the minute book a prior judgment of conviction in the cause alleged in the enhancement paragraph, namely Cause No. C74-5767-PH. Indeed, the State presented no extrinsic evidence whatsoever of the alleged former conviction for burglary; it relied solely on the paper included in the pen packet, State's exhibit 3, appended hereto, as being a certified copy.
Thus, the authentication or identification required as a condition precedent to admissibility of a proper judgment of conviction to support allegations in the enhancement paragraph was not satisfied in accordance with Rule 901(b)(7). The majority admits as much by retreating to generality of Rule 901(a), and then turns into "extrinsic evidence," for which there is no record support, "the fact that the records are true and correct copies of those upon which TDCJID relies in admitting and detaining prisoners[.]" Opinion, at 587. That alleged "fact," however, cannot be "extrinsic evidence" that such records are in fact true and correct copies of originals on file back in the office of the clerk of the convicting court.[3] There is no "extrinsic evidence" they are.
Rule 902(4), like Rule 901(a), merely provides an alternative means for satisfying "a condition precedent to admissibility," and coupled with Rule 1005 contemplates that a copy of an original official record or of an original document authorized by law to be recorded or filed and actually record *590 ed or filed in a public office must be certified as correct by the custodian or other person authorized by law to make the certification.
The public office in which the original record of a judgment is kept is the office of the clerk of court, the custodian of such records. See ante at 588, n. 1.
Turning to State's exhibit 3, appended hereto, it is at once manifest from the face of the Attestation and Certification that the purported judgment and sentence therein are not certified copies of an original official record of a judgment or of an original judgment actually recorded or filed in the public office of the clerk of court. Compare Rule 1005 in tandem with Rule 902(4).
The attesting record clerk certifies that he has custody of "original files and records of persons heretofore committed to [TDC] ... including judgment and sentence of [appellant];" that he has "compared the attached copies with their respective originals now on file in my office and each thereof contains, and is a full, true and correct transcript and copy from its said original."[4]
Whatever else so-called "original" files and records of persons committed to TDC may contain, neither the purported judgment nor sentence in State's exhibit 3 is an "original" in the sense contemplated by Rule 1005.[5] If there be one, the original official record of judgment and sentence remains in the public office of the district clerk of Dallas County. Indeed, the majority recognizes and acknowledges as much by saying that Article 42.09, § 8(a)(1), V.A.C.C.P., requires a county to deliver to TDC "a copy of the judgment entered," while at the same time suggesting that the copy may have been actually certified by the clerk of the convicting court, but the certification was inadvertently omitted in making up the pen packet. Opinion, at 584, n. 8; at 585, n. 10.[6]
Yet, the fact of the matter is the "original" copy is not certified by the clerk of the convicting court.[7] At best it may be what *591 Rule 1001(4) describes as a "duplicate." However, Rule 1005 supplants Rules 1001-1004 with respect to public records. Goode, Wellborn & Sharlot, supra, § 1005.1, at 667.
"[Rule 1005 prefers] not a duplicate, but a special type of secondary evidence, a certified or a compared copy. Note that a certified copy may or may not be a duplicate as defined in Rule 1001(4); that is immaterial. If it is a certified or compared copy, it is admissible under Rule 1005, whether or not it is a duplicate; if it is not certified or compared, it is not admissible even if it is a duplicate."
Therefore, even if the record clerk received what he believed to be a duplicate "copy" of judgment and sentence, since it was not certified by the clerk of the convicting court and the record clerk does not claim he compared the duplicate in his possession with the full, true and correct original record in the public office of the clerk of the convicting court, his attestation of a copy from "its said original" on file in his office is immaterial. It proves nothing about the original judgment and sentence entered in the minutes of the convicting court.
The decision of this Court in Dingier v. State, 768 S.W.2d 305 (Tex.Cr.App. 1989) is correct. The opinion of the court of appeals in this cause, Reed v. State, supra, is correct. For reasons stated herein the opinion of the majority in this cause is incorrect.
Accordingly, I would affirm the judgment of the court of appeals, and because the majority does not and the potential for unreliable records it thus fosters is far too risky, I dissent.[8]
*592
*593
NOTES
[1] TEX.R.APP.P. 200(c)(1) and (4).
[2] The indictment charging appellant with possession of heroin contained two enhancement paragraphs. The trial court found the allegations in the first enhancement paragraph to be not true. The trial court found the second enhancement paragraph, which alleged that appellant had been convicted of burglary in 1974, to be true.
[3] The Texas Department of Criminal Justice, Institutional Division (TDCJID) was formerly known as the Texas Department of Corrections (TDC).
[4] Article 3731a, now repealed, provided in pertinent part:
Section 1. Any written instrument ... made by an officer of this State or of any governmental subdivision thereof, or by his deputy,... in the performance of the functions of his office and employment shall be, so far as relevant, admitted in the courts of this State as evidence of the matter stated therein, ...
Section 4. Authentication of Copy Such writings ... may be evidenced ... by a copy or electronic duplication attested by the officer having legal custody of the record, or by his deputy. Except in the case of a copy of an official writing or official electronic recording from a public office of this State or a subdivision thereof, the attestation shall be accompanied with a certificate that the attesting officer has the legal custody of such writing. If the office in which the record is kept is within the United States .... the certificate may be made by a judge of a court of record of the ... political subdivision in which the record is kept, authenticated by the seal of his office ...
Sec. 6. Other Proof
This rule does not prevent the proof of official records or of entry or lack of entry therein by any method authorized by an applicable statute or by the rules of evidence at common law. (Emphasis added).
TEX.REV.CIV.STAT.ANN. art. 3731a, repealed, effective September 1, 1986 by order of the Court of Criminal Appeals adopting the Texas Rules of Criminal Evidence regarding criminal cases. TEX.REV.CIV.STAT.ANN. art. 181 If § 9(a)(3).
Dingier relied on language in Todd v. State, 598 S.W.2d 286 (Tex.Cr.App.1980), as support for the proposition that separate certification by the district clerk of the judgment and sentence is required for authentication, but Todd did not specifically hold this. In Todd, the judgment and sentence had in fact been certified by the district clerk and this Court detailed this point in passing upon the sufficiency of the evidence to sustain the enhancement allegation. See Todd, 598 S.W.2d at 291-293. The Court was not faced with the issue of whether omission of the district clerk's certificate would preclude authentication by the TDCJID record clerk.
[5] See, e.g., Rodasti v. State, 786 S.W.2d 294 (Tex.Cr.App.1989) (Rodasti 11), remanding Rodasti v. State, 749 S.W.2d 161 (Tex.App.Houston [1st Dist.] 1988) (Rodasti I), resulting in Rodasti v. State, 790 S.W.2d 379 (Tex.App. Houston [1st Dist.] 1990, pet. filed) (Rodasti III).
[6] See Johnson v. State, 720 S.W.2d 877 (Tex. App.Texarkana 1986, no pet.) (admission of pen packet certified by record clerk of TDCJID properly authenticated under former article 3731a, Tex.Rev.Civ.Stat., and admissible over objection that conviction required additional certification from original convicting court); Garza v. State, 705 S.W.2d 818, 820 (Tex.App. San Antonio 1986, no pet.) (same). See also, Aaron v. State, 546 S.W.2d 277, 278 (Tex.Cr.App. 1976) (Louisiana pen packet properly authenticated where certified by the record clerk of Louisiana State Penitentiary and attested by Secretary of State of Louisiana).
For a broader overview of the cases decided under former article 3731a, and the confusion and criticisms engendered after Dingier, supra, see the dissenting opinion filed by Judge Onion in Handspur v. State, 792 S.W.2d 239, 241 (Tex. App.Dallas 1990, pet. filed). One discrepancy in prior caselaw is that some courts have held the entire pen packet inadmissible under the Dingier rationale while others have held only the uncertified copies of the judgment and sentence inadmissible. See and cf. Henderson v. State, 788 S.W.2d 621 (Tex.App.Houston [14th Dist.] 1990, pet. pending) and King v. State, 790 S.W.2d 678 (Tex.App.Tyler 1989, pet. pending on other grounds). Our holding in the instant case is that certification by the record custodian of the pen packet to the effect that a document or documents therein are true and correct copies of the original or original copies on file with the custodian, will provide sufficient authentication for admission of the document or documents.
[7] See United States v. Darveaux, 830 F.2d 124, 125 (8th Cir. 1987) (copy of prior conviction in TDCJID pen packet was properly authenticated by the TDCJID record clerk, in accordance with Federal Rule of Evidence 902(4)); United States v. Dancy, 861 F.2d 77, 79-80 (5th Cir.1982) (copy of prior conviction in pen packet from California Department of Corrections properly authenticated under Rule 902(4) where certified by record clerk of CDC). Both cases are discussed in the text, infra.
[8] Article 42.09 § 8 sets out in pertinent part: Section 8.
(a) A county that transfers a defendant under this Article shall deliver to the director of the department:
(1) a copy of the judgment entered ...
(8) a copy of the indictment or information for each offense ...
(b) The Department of Corrections shall not take a defendant into custody under this Article until the director receives the documents required by Subsections (a) and (c) of this section ... (emphasis added).
As the dissent points out, section 8 of Article 42.09 was not enacted at the time of Reed's commitment in 1974. In the 1974 version, a defendant was to be delivered to jail or to the Department of Corrections on the basis of a "commitment." The term "commitment" has long been treated by the courts as synonymous with judgments and sentences. See, e.g., Todd v. State, 598 S.W.2d 286, 292 (Tex.Cr.App.1980) (the term "commitment" includes judgments and sentences) and citations therein; Ex parte Collier, 156 Tex.Cr.R. 377, 243 S.W.2d 177 (1951) ("the sentence is a final judgment ... [that] should further convey to the penitentiary authorities clear and unequivocal orders of the trial court so that they may know definitely how long to detain the convict"); Shrader v. State, 30 Tex. 386 (1867) (the order of the court is itself a mittimus).
[9] This is but one method employed by the State as a means of proving up a prior conviction. For a delineation of other methods analyzed in the caselaw, see the dissenting opinion filed by Judge Onion in Handspur v. State, 792 S.W.2d 239, 241 (Tex.App.Dallas 1990, pet. filed).
[10] Apparently, the problem with respect to omission of the convicting court clerk's certificate is that, sometimes when the TDCJID custodian of records copies the sentence and judgment for pen packet purposes, only the face of the documents are photocopied, even though the certification by the clerk typically appears on the back of the documents. The result is a lack of a showing of the convicting court clerk's certification. See Henderson v. State, 788 S.W.2d 621, 623 (Tex.App.Houston [14th Dist.] 1990, pet. filed). All that remains is the certification by the TDCJID records clerk, and accompanying attestations thereto.
[11] Although authentication is but one possible evidentiary hurdle for admission of a document into evidence, the only objection lodged by the appellant at trial was that of improper authentication. The question of the "best evidence" or requirement of the original, covered in Article X of the Texas Rules of Criminal Evidence, was not raised in the instant case. "Presentation of any document as evidence potentially presents at least three issues: authentication, best evidence, and hearsay ... Rule 901(b)(7) treats only [authentication] ... [t]he best evidence problem is treated in Rule 1005, and the hearsay problem is treated in Rules 803(8M10), (14), and (22)-(23)." (footnotes omitted). See 33 S. Goode, O. Wellborn, & M. Sharlot, Texas Practice Guide to the Texas Rules of Evidence: Civil and Criminal § 901.9 (1988).
However, Rule 1005 provides that a copy of a public record will be admissible in place of the original where the copy is certified in accordance with Rule 902. See Tex.R.Crim.Evid. 1005. Since our holding today is that the copies of the judgment and sentence certified by the TDCJID record clerk comply with Rule 902(4), ipso facto, the copies are receivable into evidence in lieu of the original under Rule 1005.
[12] Only Cause # C74-5767-PH was used for enhancement purposes. One of the prior convictions alleged by the State was found to be not true after the defense objected based on the fact that there was no written waiver in the court's jacket although the judgment on its face recited a waiver.
[13] The court in Dancy rejected the defendant's argument that the pen packet from the California Department of Corrections was not recorded or filed in a "public office" because Rule 902(4) does not require that "official records" must be recorded or filed in a public office to be selfauthenticating. Dancy, 861 F.2d at 79. Thus, the court did not address the issue of whether CDC is a "public office."
[14] The dissent is concerned about the "public office" status of the TDCJID. Although we have found no case which specifically holds that TDCJID is a public office, the records of correctional institutions have been held to be "official records" or "public records." See United States v. Locke, 425 F.2d 313 (5th Cir.1970); see also 5 J. Weinstein & M. Berger, Weinstein's Evidence § 901(b)(7)(01), at 901-100 (1990) (correctional institution records are public records). An official record does not have to be available to the public. The Advisory Committee on the Federal Rules of Evidence had the opportunity to strike "official record" and substitute "a record kept in a public office and available to public inspection" but did not choose to do so. 5 Weinstein & Berger, Weinstein's Evidence-United States Rules at 1005-10 (1983). See Banco de Espana v. Federal Reserve Bank of New York, 114 F.2d 438, 446 (2d Cir.1940) (faith in certified copies of official records based on assumption that oath and certificate of custodian reasonably reliable). But see Amoco Production Co. v. United States, 619 F.2d 1383 (10th Cir.1980) (mere fact that document is kept by governmental agency does not automatically qualify it as public record for purpose of authentication).
[15] This opinion goes only to the admissibility of the evidence as properly authenticated, not to the weight to be given it.
[1] On October 11, 1974, it was "the declaration of the court entered of record," former article 42.-01, § 1, V.A.C.C.P.; on June 3, 1988, it was "the written declaration of the court signed by the trial judge and entered of record," Article 42.01, § 1, id. In both instances it is "entered of record" when the judgment actually rendered is "entered in the minutes of the court." Jones v. State, 797 S.W.2d 33 (Clinton, J., dissenting to denial of motion for rehearing at 35); Westbrook v. State, 753 S.W.2d 158 (Tex.Cr.App.1988) (Clinton, J., concurring at 160). Entering the judgment in the minutes affords "an enduring evidence of the judicial act ... thus furnishing external and incontestable evidence of the [decision rendered], and designed to stand as a perpetual memorial of [the court's] action." Westbrook v. State, supra, quoting prior opinions of the Court.
Similarly, a "sentence" is also a judicial act, an order of the trial court entered of record; once a separate instrument, it is now a part of the judgment. Article 42.02, V.A.C.C.P.
[2] A statute permitting certified copies is merely cumulative, not restrictive. Manning v. State, 46 Tex.Cr.R. 326, 81 S.W. 957, at 960 (1904); Tex.Jur.3d § 400, 169. See Goode, Wellborn & Sharlot, supra § 901.9 (requisite showing by testimony of custodian inconvenient, so made by certified copy as prescribed in Rules 902(4) and 1005); Hardware Mut. Casualty Co., 141 S.W.2d 972, at 975 (Tex.Civ.App.Austin 1940), writ refused (under former article 3720, V.A.C.S, [since repealed by Tex.Cr.R.Evid.] judgment of court can be proved only by recorded instrument or duly certified copy thereof). Former article 3731a, V.A.C.S., likewise provided for admission of a recorded judgment, id., § 1, or a certified copy attested to by the officer having legal custody thereof, i.e., the clerk of court, § 4.
[3] The majority says Rule 901 does not "expressly" provide that "the certifying custodian of a document may only be the custodian of the original record." Opinion, at 585. But Rule 901 makes no provision whatsoever about a "certifying custodian," so of course, illustrations in 901(b)(9) do not remotely suggest that a written "certification" conforms with requirements of Rule 901(a). Indeed, the illustrative examples contemplate "testimony" or "evidence," and as already demonstrated with respect to a judgment of conviction under Rule 901(7) that means the official record produced by and live testimony from the clerk of the convicting court. Proper "certification" is a device under Rule 902; it substitutes for "extrinsic evidence" prescribed by Rule 901.
[4] Given the declared policy of this state to manage TDC "in a manner consistent with the operation of a modern prison system," that the office of the records clerk of TDC is a "public office" within the meaning of pertinent rules of evidence is a doubtful proposition. See, e.g., V.T.C.A. Government Code, § 500.010 (restricting access by visitors including the Governor).
Also, as a matter of law, "[a]ll information obtained in connection with inmates of the institutional division ... shall be confidential and privileged information and shall not be subject to public inspection[.]" Article 42.18, § 18, V.A.C.S. See Texas Department of Corrections v. Dalehite, 622 S.W.2d 421 (Tex.Cr.App.1981). Moreover, such internal information is exempt from disclosure under the Open Records Act. Article 6252-17a, § 3(a)(1) and perhaps § 3(a)(8).
[5] Rule 1005 reads:
"The contents of an official record, or of a document authorized to be recorded or filed and actually recorded or filed .... if otherwise admissible, may be proved by copy, certified as correct in accordance with Rule 902 or testified to be correct by a witness who has compared it with the original. If a copy which complies with the foregoing cannot be obtained by the exercise of reasonable diligence, then other evidence of the contents may be given."
[6] Its reliance on that statutory provision is misplaced in this cause, however, for it was not in effect on October 24, 1974, when according to a truly certified copy of an original fingerprint card appellant was admitted to TDC. See Acts 1985, 69th Leg., Ch. 344, p. 1411, §§ 3 & 4, effective January 1, 1986.
To surmise that a certification by the clerk of convicting court "typically appears on the back of a [judgment]" and then justify its absence on a pen packet "copy" is utterly to disregard the sworn attestation by the record clerk that he "compared the attached copies with their respective originals now of file ... and each thereof ... is a full, true and correct transcript and copy from its said original." We should not so lightly presume that which is contrary to an attestation to uphold a finding of "true" by a trier of fact that deprives a citizen of his liberty.
Ironically, the proof positive in this cause from Dallas County was and still is readily available not too far away in the public office of the district clerk of Dallas County. The public record will reveal whether there is such a conviction as alleged in the enhancement paragraph.
[7] Further, there is nothing on its face to indicate that the original was ever entered in the minutes or recorded in the public record in or came from the public office of the court clerk. The paper does not bear a signature of the trial judge; it does not show a file mark by the clerk; it has no notation of recordation in the minute book. The purported copy is simply a printed form with blanks apparently filled in by a someone using a typewriter.
[8] To hold that State's exhibit 3 is "evidence sufficient to support a finding that the matter in question is what its proponent claims," i.e., a judgment of conviction in cause number C74-5767-PH in the Criminal District Court of Dallas County, is to provide opportunities for hands of persons inclined to mischief and to create precedent for future followings that are virtually limitless. It is common knowledge that purported copies of judgments in criminal cases find their way into files and records of other state agencies, e.g.. Department of Criminal Justice, pardons and paroles division; probation offices; sheriffs' offices, and sundry law enforcement agencies. Indeed, the Department of Criminal Justice is charged with establishing a Criminal History Record System. See Chapter 60, V.A.C.C.P.
Under today's decision a "records clerk" in any and every such office may certify an otherwise unauthenticated "copy" of an "original" judgment of conviction "on file in my office," and it will be admissible evidence to support allegations in an enhancement paragraph. Thus the presumption of regularity relied on by the majority, opinion, at 587, becomes a weak, slender reed of hope.
|
Monday, June 20, 2011
Sleeve Wedding Dresses
Today's society has the thinking of less is better or some say simple is the best policy. A sleeve type of wedding dress has been forgotten by most of the people who are getting married. It has not been in the list of option for them, they eventually eliminate the chances of considering the sleeve type of wedding gown simply because they think a sleeveless type is much more fashionable.This which I think is a big mistake they are making because they are eliminating their chances to try out something different. They will never know how the sleeve type of wedding gown will look onto them unless they had tried it on them. I truly agree that it is hard to find a beautiful decent looking sleeve wedding dress, but if you can find one, I am sure that the dress will be a pretty wedding dress eventually.A classic sleeve type of wedding gown brings out the formality and elegant elements of a bride. This type of dress can show the elegant, courteous and sincerity characteristic of the bride towards the wedding she is having. In fact, nowadays there are a lot of sleeve wedding dresses that look vintage because of the magic hand of the designer. It just unbelievable how a designer can do so much to a dull looking sleeve wedding dress into a fairy tale looking wedding gown that just stunt everyone else.
In conclusion, a sleeve type of wedding dress is definitely not an outdated-fashion of wedding dresses. In fact, it has evolved into its own class of categories which is classic and represent purity and sincerity.
About Me
Followers
Privacy Policy for http://promeveningdresses.blogspot.com/
At http://promeveningdresses.blogspot.com/, the privacy of our visitors is of extreme importance to us. This privacy policy document outlines the types of personal information is received and collected by http://promeveningdresses.blogspot.com/ and how it is used.
Log FilesLike many other Web sites, http://promeveningdresses.blogspot.com/ makes use of log files. The information inside the log files includes internet protocol ( IP ) addresses, type of browser, Internet Service Provider ( ISP ), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user’s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.
Cookies and Web Beaconshttp://promeveningdresses.blogspot.com/ does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.
DoubleClick DART Cookie.:: Google, as a third party vendor, uses cookies to serve ads on http://promeveningdresses.blogspot.com/. .:: Google's use of the DART cookie enables it to serve ads to users based on their visit to http://promeveningdresses.blogspot.com/ and other sites on the Internet..:: Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html
Some of our advertising partners may use cookies and web beacons on our site. Our advertising partners include ....Google Adsense Chitika
These third-party ad servers or ad networks use technology to the advertisements and links that appear on http://promeveningdresses.blogspot.com/ send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.
http://promeveningdresses.blogspot.com/ has no access to or control over these cookies that are used by third-party advertisers. |
import {
REPORT_INIT,
REPORT_SUBMIT_REQUEST,
REPORT_SUBMIT_SUCCESS,
REPORT_SUBMIT_FAIL,
REPORT_CANCEL,
REPORT_STATUS_TOGGLE,
REPORT_COMMENT_CHANGE,
REPORT_FORWARD_CHANGE,
} from '../actions/reports';
import { Map as ImmutableMap, Set as ImmutableSet } from 'immutable';
const initialState = ImmutableMap({
new: ImmutableMap({
isSubmitting: false,
account_id: null,
status_ids: ImmutableSet(),
comment: '',
forward: false,
}),
});
export default function reports(state = initialState, action) {
switch(action.type) {
case REPORT_INIT:
return state.withMutations(map => {
map.setIn(['new', 'isSubmitting'], false);
map.setIn(['new', 'account_id'], action.account.get('id'));
if (state.getIn(['new', 'account_id']) !== action.account.get('id')) {
map.setIn(['new', 'status_ids'], action.status ? ImmutableSet([action.status.getIn(['reblog', 'id'], action.status.get('id'))]) : ImmutableSet());
map.setIn(['new', 'comment'], '');
} else if (action.status) {
map.updateIn(['new', 'status_ids'], ImmutableSet(), set => set.add(action.status.getIn(['reblog', 'id'], action.status.get('id'))));
}
});
case REPORT_STATUS_TOGGLE:
return state.updateIn(['new', 'status_ids'], ImmutableSet(), set => {
if (action.checked) {
return set.add(action.statusId);
}
return set.remove(action.statusId);
});
case REPORT_COMMENT_CHANGE:
return state.setIn(['new', 'comment'], action.comment);
case REPORT_FORWARD_CHANGE:
return state.setIn(['new', 'forward'], action.forward);
case REPORT_SUBMIT_REQUEST:
return state.setIn(['new', 'isSubmitting'], true);
case REPORT_SUBMIT_FAIL:
return state.setIn(['new', 'isSubmitting'], false);
case REPORT_CANCEL:
case REPORT_SUBMIT_SUCCESS:
return state.withMutations(map => {
map.setIn(['new', 'account_id'], null);
map.setIn(['new', 'status_ids'], ImmutableSet());
map.setIn(['new', 'comment'], '');
map.setIn(['new', 'isSubmitting'], false);
});
default:
return state;
}
};
|
/*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
import Vue from 'vue'
import Cookies from 'js-cookie'
import 'normalize.css/normalize.css' // A modern alternative to CSS resets
import Element from 'element-ui'
import 'element-ui/lib/theme-chalk/index.css'
import '@/styles/index.scss' // global css
import App from './App'
import router from './router'
import store from './store'
import i18n from './lang' // Internationalization
import './icons' // icon
import './errorLog' // error log
import './permission' // permission control
import * as filters from './filters' // global filters
Vue.use(Element, {
size: Cookies.get('size') || 'medium', // set element-ui default size
i18n: (key, value) => i18n.t(key, value)
})
// register global utility filters.
Object.keys(filters).forEach(key => {
Vue.filter(key, filters[key])
})
Vue.config.productionTip = false
new Vue({
el: '#app',
router,
store,
i18n,
render: h => h(App)
})
|
Q:
Stacked Bar Chart having upper limit line using jfreechart
I'm trying to generate a Stacked Bar Chart having an upper limit for each and every category. The upper limit varies for each and every category and is indicated by a horizontal line.
I was able to generate the stacked bar chart but got struck with horizontal line for indicating upper limit.
Here is the sample chart.
Here is my code for generating stacked bar chart
import java.awt.BasicStroke;
import java.awt.Color;
import java.awt.GradientPaint;
import java.awt.Paint;
import java.awt.Stroke;
import java.io.IOException;
import java.io.OutputStream;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import org.jfree.chart.ChartFactory;
import org.jfree.chart.ChartUtilities;
import org.jfree.chart.JFreeChart;
import org.jfree.chart.LegendItem;
import org.jfree.chart.LegendItemCollection;
import org.jfree.chart.axis.SubCategoryAxis;
import org.jfree.chart.plot.CategoryMarker;
import org.jfree.chart.plot.CategoryPlot;
import org.jfree.chart.plot.PlotOrientation;
import org.jfree.chart.plot.ValueMarker;
import org.jfree.chart.plot.XYPlot;
import org.jfree.chart.renderer.category.GroupedStackedBarRenderer;
import org.jfree.data.KeyToGroupMap;
import org.jfree.data.category.CategoryDataset;
import org.jfree.data.category.DefaultCategoryDataset;
import org.jfree.ui.GradientPaintTransformType;
import org.jfree.ui.Layer;
import org.jfree.ui.StandardGradientPaintTransformer;
public class StackedBarServlet extends HttpServlet{
private static final long serialVersionUID = 1L;
protected void doGet(HttpServletRequest request, HttpServletResponse response) throws IOException {
response.setContentType("image/png");
OutputStream outputStream = response.getOutputStream();
final CategoryDataset dataset = createDataset();
final JFreeChart chart = createChart(dataset);
int width = 800;
int height = 350;
ChartUtilities.writeChartAsPNG(outputStream, chart, width, height);
}
private CategoryDataset createDataset() {
DefaultCategoryDataset result = new DefaultCategoryDataset();
result.addValue(20.3, "Product 1 (US)", "Jan 04");
result.addValue(27.2, "Product 1 (US)", "Feb 04");
result.addValue(19.7, "Product 1 (US)", "Mar 04");
result.addValue(20.3, "Product 1 (US)", "Apr 04");
result.addValue(27.2, "Product 1 (US)", "May 04");
result.addValue(19.7, "Product 1 (US)", "Jun 04");
result.addValue(20.3, "Product 1 (US)", "Jul 04");
result.addValue(27.2, "Product 1 (US)", "Aug 04");
result.addValue(19.7, "Product 1 (US)", "Sep 04");
result.addValue(20.3, "Product 1 (US)", "Oct 04");
result.addValue(27.2, "Product 1 (US)", "Nov 04");
result.addValue(19.7, "Product 1 (US)", "Dec 04");
result.addValue(20.3, "Product 1 (US)", "Bab 04");
result.addValue(27.2, "Product 1 (US)", "Lal 04");
result.addValue(19.7, "Product 1 (US)", "Sha 04");
result.addValue(20.3, "Product 1 (UK)", "Jan 04");
result.addValue(27.2, "Product 1 (UK)", "Feb 04");
result.addValue(19.7, "Product 1 (UK)", "Mar 04");
result.addValue(20.3, "Product 1 (UK)", "Apr 04");
result.addValue(27.2, "Product 1 (UK)", "May 04");
result.addValue(19.7, "Product 1 (UK)", "Jun 04");
result.addValue(20.3, "Product 1 (UK)", "Jul 04");
result.addValue(27.2, "Product 1 (UK)", "Aug 04");
result.addValue(19.7, "Product 1 (UK)", "Sep 04");
result.addValue(20.3, "Product 1 (UK)", "Oct 04");
result.addValue(27.2, "Product 1 (UK)", "Nov 04");
result.addValue(19.7, "Product 1 (UK)", "Dec 04");
result.addValue(20.3, "Product 1 (UK)", "Bab 04");
result.addValue(27.2, "Product 1 (UK)", "Lal 04");
result.addValue(19.7, "Product 1 (UK)", "Sha 04");
result.addValue(20.3, "Product 1 (IND)", "Jan 04");
result.addValue(27.2, "Product 1 (IND)", "Feb 04");
result.addValue(19.7, "Product 1 (IND)", "Mar 04");
result.addValue(20.3, "Product 1 (IND)", "Apr 04");
result.addValue(27.2, "Product 1 (IND)", "May 04");
result.addValue(19.7, "Product 1 (IND)", "Jun 04");
result.addValue(20.3, "Product 1 (IND)", "Jul 04");
result.addValue(27.2, "Product 1 (IND)", "Aug 04");
result.addValue(19.7, "Product 1 (IND)", "Sep 04");
result.addValue(20.3, "Product 1 (IND)", "Oct 04");
result.addValue(27.2, "Product 1 (IND)", "Nov 04");
result.addValue(19.7, "Product 1 (IND)", "Dec 04");
result.addValue(20.3, "Product 1 (IND)", "Bab 04");
result.addValue(27.2, "Product 1 (IND)", "Lal 04");
result.addValue(19.7, "Product 1 (IND)", "Sha 04");
result.addValue(20.3, "Product 1 (EUROPE)", "Jan 04");
result.addValue(27.2, "Product 1 (EUROPE)", "Feb 04");
result.addValue(19.7, "Product 1 (EUROPE)", "Mar 04");
result.addValue(20.3, "Product 1 (EUROPE)", "Apr 04");
result.addValue(27.2, "Product 1 (EUROPE)", "May 04");
result.addValue(19.7, "Product 1 (EUROPE)", "Jun 04");
result.addValue(20.3, "Product 1 (EUROPE)", "Jul 04");
result.addValue(27.2, "Product 1 (EUROPE)", "Aug 04");
result.addValue(19.7, "Product 1 (EUROPE)", "Sep 04");
result.addValue(20.3, "Product 1 (EUROPE)", "Oct 04");
result.addValue(27.2, "Product 1 (EUROPE)", "Nov 04");
result.addValue(19.7, "Product 1 (EUROPE)", "Dec 04");
result.addValue(20.3, "Product 1 (EUROPE)", "Bab 04");
result.addValue(27.2, "Product 1 (EUROPE)", "Lal 04");
result.addValue(19.7, "Product 1 (EUROPE)", "Sha 04");
return result;
}
private JFreeChart createChart(final CategoryDataset dataset) {
final JFreeChart chart = ChartFactory.createStackedBarChart(
"Stacked Bar", // chart title
"Category", // domain axis label
"Value", // range axis label
dataset, // data
PlotOrientation.VERTICAL, // the plot orientation
true, // legend
true, // tooltips
false // urls
);
GroupedStackedBarRenderer renderer = new GroupedStackedBarRenderer();
KeyToGroupMap map = new KeyToGroupMap("G1");
map.mapKeyToGroup("Product 1 (US)", "G1");
map.mapKeyToGroup("Product 1 (Europe)", "G1");
map.mapKeyToGroup("Product 1 (Asia)", "G1");
map.mapKeyToGroup("Product 1 (Middle East)", "G1");
renderer.setSeriesToGroupMap(map);
renderer.setItemMargin(0.0);
Paint p1 = new GradientPaint(
0.0f, 0.0f, new Color(0x22, 0x22, 0xFF), 0.0f, 0.0f, new Color(0x88, 0x88, 0xFF)
);
renderer.setSeriesPaint(0, p1);
renderer.setSeriesPaint(4, p1);
renderer.setSeriesPaint(8, p1);
Paint p2 = new GradientPaint(
0.0f, 0.0f, new Color(0x22, 0xFF, 0x22), 0.0f, 0.0f, new Color(0x88, 0xFF, 0x88)
);
renderer.setSeriesPaint(1, p2);
renderer.setSeriesPaint(5, p2);
renderer.setSeriesPaint(9, p2);
Paint p3 = new GradientPaint(
0.0f, 0.0f, new Color(0xFF, 0x22, 0x22), 0.0f, 0.0f, new Color(0xFF, 0x88, 0x88)
);
renderer.setSeriesPaint(2, p3);
renderer.setSeriesPaint(6, p3);
renderer.setSeriesPaint(10, p3);
Paint p4 = new GradientPaint(
0.0f, 0.0f, new Color(0xFF, 0xFF, 0x22), 0.0f, 0.0f, new Color(0xFF, 0xFF, 0x88)
);
renderer.setSeriesPaint(3, p4);
renderer.setSeriesPaint(7, p4);
renderer.setSeriesPaint(11, p4);
renderer.setGradientPaintTransformer(
new StandardGradientPaintTransformer(GradientPaintTransformType.HORIZONTAL)
);
SubCategoryAxis domainAxis = new SubCategoryAxis("Product");
domainAxis.setCategoryMargin(0.15);
CategoryPlot plot = (CategoryPlot) chart.getPlot();
plot.setDomainAxis(domainAxis);
plot.setRenderer(renderer);
plot.setFixedLegendItems(createLegendItems());
/*
* This is used to draw a vertical line
*/
/* Stroke stroke = new BasicStroke(2.0f);
ValueMarker marker = new ValueMarker(100); // position is the value on the axis
marker.setPaint(Color.black);
marker.setStroke(stroke);
CategoryPlot plot1 = chart.getCategoryPlot();
plot1.addRangeMarker(marker,Layer.FOREGROUND); */
return chart;
}
private LegendItemCollection createLegendItems() {
LegendItemCollection result = new LegendItemCollection();
LegendItem item1 = new LegendItem("US", new Color(0x22, 0x22, 0xFF));
LegendItem item2 = new LegendItem("Europe", new Color(0x22, 0xFF, 0x22));
LegendItem item3 = new LegendItem("Asia", new Color(0xFF, 0x22, 0x22));
LegendItem item4 = new LegendItem("Middle East", new Color(0xFF, 0xFF, 0x22));
result.add(item1);
result.add(item2);
result.add(item3);
result.add(item4);
return result;
}
}
When I used addRangeMarker, it gives me a continuous horizontal line. But in my case, I need multiple horizonatal lines for each and every category seperately.
Here is the sample image with addRangeMarker.
Thanks in advance.
A:
You need to create a second dataset containing the values that you want to display with the horizontal black lines. Add that dataset to your plot along with a LevelRenderer.
|
Q:
Unknown and Damaged Archive in django
This is code to download files but when file downloads and i open them :the archive is unknown and damaged. Can you please help me to solve this problem here code is:
def download(request):
file_name =request.GET.get('file_name', '')
the_file = "C:\\Users\\CV_Uploads\\uploadfiles\\uploadfiles\\uploaded_files\\1395901478_89_uploadfiles.rar"
filename = os.path.basename(the_file)
response = HttpResponse(FileWrapper(open(the_file)),
content_type=mimetypes.guess_type(the_file)[0])
response['Content-Length'] = os.path.getsize(the_file)
response['Content-Disposition'] = "attachment; filename=%s" % filename
return response
A:
When you are dealing with paths you should use raw string .
use
the_file = r"C:\Users\CV_Uploads\uploadfiles\uploadfiles\uploaded_files\1395901478_89_uploadfiles.rar"
|
The Future of Rectal Cancer Surgery: A Narrative Review of an International Symposium.
Surgery remains the mainstay of curative treatment for primary rectal cancer. For mid and low rectal tumors, optimal oncologic surgery requires total mesorectal excision (TME) to ensure the tumor and locoregional lymph nodes are removed. Adequacy of surgery is directly linked to survival outcomes and, in particular, local recurrence. From a technical perspective, the more distal the tumor, the more challenging the surgery and consequently, the risk for oncologically incomplete surgery is higher. TME can be performed by an open, laparoscopic, robotic or transanal approach. There is a lack of consensus on the "gold standard" approach with each of these options offering specific advantages. The International Symposium on the Future of Rectal Cancer Surgery was convened to discuss the current challenges and future pathways of the 4 approaches for TME. This article reviews the findings and discussion from an expert, international panel. |
Q:
Python script (webpy) emitting http 500 error upon trying to open an existing file
So I'm not really sure of the issue here... Basically, as long as I use the live API I'm working with to get the data, everything works fine. But if I try to open an existing file with the SAME exact data in it (from a previous api call), I get an internal server error. Here is the codeblock that is causing issues:
thisFile = os.path.join(__location__, '2014/' + npi + '_individual.json')
# if the local cached copy exists, then load that, otherwise, connect to the API
if os.path.isfile(thisFile):
target2 = open(thisFile)
content = json.loads(target2.read())
else:
req = urllib2.Request(url + '?database=nppes&npi=' + npi + '&apikey=' + apiKey)
r = urllib2.urlopen(req)
content = json.loads(r.read())
I believe I'm using webpy or web2py (I'm not sure if these are two separate things). Executing the script via WSGI on Apache2.4.
A:
It was an unrelated matter. Basically, this was failing because... so on the first call, it was refining the data I got back from the API, and then storing that REFINED data in the json file.
So on the next load, the json file exists, and when it loads it, some things have been renamed in the refining process, and so the rest of the script doesn't know how to execute. Silly issue.
|
Q:
resetting fields with jQuery
I am trying to reset fields (selects and textboxes) in a partial. Here is what I have so far:
var $inputs = $('#StudentTable :select');
$inputs.each(function () {
if ($(this).name = "TeachingAsstSelect") {
$('select[name="TeachingAsstSelect"]').each(function () {
$(this).text("");
})
}
else {
$(this).val("Select");
}
});
Here "TeachingAsstSelect" is being cleared, but other selects are not reset. Am I missing something? More importantly, Am I doing it the right way?
A:
If you are trying to test equality of a string, you should use == or ===. See here form more on that: Which equals operator (== vs ===) should be used in JavaScript comparisons?
Also, as @Raminson suggests, try use the attr() method instead.
if ($(this).attr('name') == "TeachingAsstSelect") {
Or better yet, nesting .each() twice like that may not perform as well as other solutions.
I also notice that you are testing name in your if condition then using a jquery selector to match again on [name="TeachingAsstSelect"]. What about simplifying like this:
var $teachingAsstInputs = $('#StudentTable :select[name="TeachingAsstSelect"]');
$($teachingAsstInputs).text("");
var $otherInputs = $('#StudentTable :select').not('[name="TeachingAsstSelect"]');
$($otherInputs).val("Select");
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.