text
stringlengths
8
5.77M
Our journey in the Autism Spectrum Posts tagged ‘exhaustion’ [ Ed. Note: I originally wrote and published this post for Cheairs at Redefining Typical in May of this year. With this summer’s vacation coming up, that hopefully will include a trip to the beach, it has me thinking about “the surf”. Since the original publishing I have found a couple of pictures from last year’s trip to the beach.] My son was diagnosed with PDD-NOS and ADHD at the age of 4. This was a year and a half ago. I had suspected something was different about my little dude since he was about 2 years old, but that didn’t make hearing the words from a medical professional any easier. A part of me felt a moment of relief to finally have an explanation for all of the struggles we had been going through up to that time. A “yes!” moment. Then suddenly I felt as if I couldn’t breathe. It was as if I had been yanked down under the water. It was real for me. Something physical. It was as if I was suspended in the water just below the surface. I could see but everything looked like I was peering through murky water. I could hear what the pediatrician was saying to me but he was muffled somehow. From that moment I associated the Autism Spectrum as fluid, always moving, always changing and all around me. A watery, living thing, this Spectrum. I remember having to concentrate to breathe and struggling to try to grasp what the doctor was saying to me. My husband, Grant, was off literally chasing our son through the medical building because Henry just could not take being cooped up in the exam room any longer. So I was left there to try to take it all in and remember so I could share with Grant later. Our doctor was giving me literature on Autism and ADHD, a brochure for a local autism service, a business card for an agency for O.T., speech, and sensory integration therapy. I remember talking briefly about ADHD medications and do we medicate or not medicate? He wanted us to make an appointment in a month without Henry so we could discuss how he’s doing and to talk more in-depth about medication options or the option of no medications. He wanted to talk to us without distractions. He had experienced parents like me before. He knew I was probably barely retaining a fourth of what he was really saying. I realized even then that this was the doctor for us! We adore him! Now a year and a half later, occupational therapy and sensory integration therapy, speech and language therapy, listening therapy, evaluations, more doctor appointments, IEP’s and ABA training; it’s all still around me. I am just off shore~drifting, suspended just beneath the surface. Some days the waters are clear and calm. The waves move me back and forth, up and down and sometimes I even get to the surface to catch my breath. But another giant wave will come that pushes me back further down or an undertow that pulls at me~ always still all around me. (Click here to read about The Undertow). Doubt and worry cloud the waters. How can I help my son to navigate these waters of the Spectrum when there are days I don’t even understand it. The meltdowns and anxiety for no apparent reason! The echolalia, scripting, jargoning! The need to control. absolutely. everything. around him. The deficits in his social and emotional areas! I WANT to understand. I TRY to understand. What is going on in my son’s head? It is a question that is with me every minute of every day. Perhaps only Neptune knows… My son has a diagnosis ON the Autism Spectrum. But our entire family is immersed IN that Spectrum. It is all around us. The realization that we are never getting out can be overwhelming. Heart-breaking. But I think because my heart aches continually, it is in my nature to try an embrace it~ all of it. The good. The bad. And sometimes even the terribly ugly. To own it. To make this Spectrum ours. What choice do we have? Because the waves will continue to come… “You can’t stop the waves but you can learn to surf.” ~ Jon Kabat-Zinn The continual crash of the waves can be too much some days. On these days I am physically tired from it all. But again, what choice do I have but to reach for my board and try to learn to surf those waves of the Spectrum? To own them. To make them ours. Surfs up, my little dude! Advertisements Share this: Like this: April is over. Autism Awareness month has passed for another year. This past month has been filled with blue lights and t-shirts, blog posts and discussions. I have been overwhelmed by the support of our family and friends. This means more to me that I can ever express! Knowing those of you who were willing to turn on a blue light or wear a puzzle piece t-shirt, or forward a blog or share my Chameleon Facebook page to spread awareness to those who may not know or understand about Autism Spectrum Disorders means the world. And the tireless efforts of the parent-bloggers out there are incredible! (I refer to the list of some of my favorites listed down the right-hand side of my blog page). But despite the added awareness, our daily lives have gone on pretty much same as usual. We have our ups and downs and our tribe is very well aware every day the impact that autism has on the entire family. And there are many days where part of me wishes we didn’t have to be so damn aware. It’s tiresome. Exhausting. Many times I just want to be done with it. I don’t want to talk about it, read about it, or blog about it. And then I check my e-mail, my Facebook. I see that friends and family have commented on my page or on this blog, showing support, letting me know they are there for us! Everyday I get new blog post notifications and status updates from some of the most wonderful, inspiring and just plain amazing people…most of them moms, who write with such beauty and HEART, about their children, their lives with Autism. Their stories may not always be pretty or fun or upbeat but they are always beautiful. And all of this helps me to keep going for my son. To keep writing. To keep advocating. To keep learning. Perhaps that is why we haven’t been able to bring ourselves to change out our blue porch light. We must keep going. I’ve been trying to search for just the right words to express just how huge my feelings of appreciation are for everyone. Two little words, “thank you”, just don’t seem enough. So, I ask each of you, and those of you with children on the Autism Spectrum will most certainly understand this, imagine someone you love so dearly that cannot express themselves or has trouble with even the most basic of tasks. The frustration of it all. And now, imagine that they completed a task or used their words for the first time…how something so plain and simple can feel so HUGE. Like this: Having a child that does not require much sleep and gets up frequently throughout the night can be very tiring, literally speaking! My son is five years old and for five years we have had countless nights with little to no sleep. We know well the path of walking through our days weary, bleary-eyed, and in a fog. We have spent many days beyond exhausted! We don’t usually know when it is going to be one of those sleepless nights as Henry goes to bed usually quite well now. Though getting him to bed fairly easily was a long time in coming and quite a spectacle! (And probably warrants a blog post all on its own!) No, Henry and Lucy went to bed as usual last night with what we would consider some typical 5 and 4-year-old antics but they did settle down and seemed to fall asleep soon after we tucked them in. When sleeplessness occurs, Grant generally gets the “first” shift and we always hope for that being the “only” shift. Let me add in here that Grant also does not require a lot of sleep and can fall back asleep in about 2 seconds. I, on the other hand, require much more sleep and it takes me much longer, sometimes hours, to be able to get back to sleep. So over these years Grant has taken on most of the burden of the night shift. But even he has his limits. Here is how these sleepless nights go with last night being no exception: Henry wakes up about 3 hours after he has fallen asleep calling for Daddy. Grant will go in and check to see if Henry needs to use the bathroom, tuck him back in bed and sometimes lay down with him. Sometimes for a few minutes, sometimes for more than an hour. Did I mention that Grant can fall asleep in about 2 seconds? Grant will finally crawl back into our bed at some point. Henry will lay in his bed alone for a short bit but if he doesn’t fall asleep he will be back up calling for one of us. On occasion I do get up to take the first shift but most often Grant tries to let me sleep as much as he can until he just can’t take anymore and then I get called in. Now, here is the fun part, repeat the above actions 3-4 times a night. Yes, you read correctly: three to four times a night! Sometimes Henry will doze off in between these times, but generally it seems that he is up for the duration, eyes wide open, staring at the ceiling, fiddling with a toy or book or his bear. For a long time we just could not keep him in bed on these nights or a screaming meltdown would ensue. No one wants that at any time of day but I for one, REALLY do not care for this at 2AM! And 3:30AM…and so forth. Most times Henry would just want to wander/pace the house or go down to the family room to watch TV. To avoid meltdowns, one of us, usually Grant, would go with him and try to doze on the couch. Now for added fun imagine doing this not only 3-4 times a night but SEVERAL times a week! Yep! From about the time he was a year old until almost 3 yrs, this was a regular routine most nights of the week. And as bonus when Henry was about 17 months old, we added his newborn sister to the night shift. Grant and I have lost about 3 years of our lives! Over the last 2 years these episodes have finally decreased to one or two nights every few months or so. Usually now Henry will go back to his bed. Sometimes he is able to get up, go to the bathroom and back to bed and asleep on his own! What is amazing about these sleepless nights is that most often the next morning Henry won’t really “sleep in”. He gets up about the same time he does usually and is good to go for the day with just maybe a few hours of sleep! I can count exactly 3 times in the last year when after pulling an all-nighter that Henry did actually fall asleep later the next day. But not today. Have I mentioned how tired I am today? Grant and I have tried many different things over the years to help get Henry to sleep and STAY asleep. Some helpful, some not so much. Last year I went to hear a nurse practitioner specializing in sleep disorders from a local sleep clinic give a talk about young children and sleep issues. I enjoyed her talk and felt really good that Grant and I had tried a lot of the tactics she recommended. Some worked. Some, again, not so much. At the end of her talk she opened the floor up for questions. I spoke up and asked if she had any good suggestions or books or resources for dealing with sleep issues for a child on the Autism Spectrum and with ADHD. After a brief pause she said, “None that I like.” Another pause and then she added, “If it is any consolation, I have found that many children on the Spectrum do seem to grow out of their sleep issues.” I thought, “Really, Lady? That’s it? No. No, I don’t find any consolation in the hope that he hopefully will out grow this! I am TIRED! Mentally, physically, emotionally. I can barely see the nite-lite on in the kids’ room at 2AM because I am so exhausted let alone some possible light at the end of what seems an endless tunnel!” We have continued to stumble forward since then and Henry really does seem to be growing out of this sleeplessness. Every few months he will be up again, and again, and again….and we are tired again. Tired still. Perhaps one day we will look back at these times, those many sleepless nights and “lost” days and laugh. But quite frankly, I think I would rather take a nap!
Q: beginner jQuery tabs - add easing effect I'm using jQuery ui tabs with the following code but am having trouble adding easing or changing the speed of the effect: $('#tabs-mcr > ul').tabs({ fx: { opacity: 'toggle' } }); standard opacity toggle but I'd like to either speed up the fade effect or add custom easing to it. A: $('#tabs-mcr > ul').tabs({ fx: { opacity: 'toggle', duration: "fast" } }); or if you want a certain amount of milliseconds: // half a second $('#tabs-mcr > ul').tabs({ fx: { opacity: 'toggle', duration: 500 } });
#!/bin/bash oc scale deployment recommendation-v2 --replicas=2 -n tutorial ./scripts/clean.sh kubectl create -f istiofiles/destination-rule-recommendation-v1-v2.yml -n tutorial kubectl create -f istiofiles/virtual-service-recommendation-v1_and_v2_50_50.yml -n tutorial kubectl replace -f istiofiles/destination-rule-recommendation_cb_policy_pool_ejection.yml -n tutorial
Fandoms Give Back By Channeling Passion Into Charities Share: Fandoms are typically known for their passionate reactions to anything related to their TV show, film and/or genre of obsession. But they can do more than bring people together to celebrate a common love. They also leverage enthusiastic audiences to impact the world in positive ways. In recent years, through the power of the internet and social media, fans from across the globe have been able to connect and find common ground. Fandom ties have strengthened and evolved into a support network of charities created by groups of fans in order to create a positive impact. Check out a few ways fans are giving back. The Cancer Gets Lost endeavor was created “to raise money for various cancer support charities through auctions and fundraisers featuring rare and autographed pop culture memorabilia”. Over the past several years, they have hosted online auctions with proceeds benefiting the National Brain Tumor Society and the American Cancer Society. In 2014, their auction raised almost $80,000. The next auction will be in August 2016, so keep your eyes open. Fandom, Give Back! was created by two fans “to lessen fandom tensions and defend every fan’s basic rights while raising money to fund charities of choice”. Currently collaborating on Howler Con for the Teen Wolf fandom, Fandom, Give Back! hosts auction to raise money for various organizations already associated with a particular genre. At Howler Con they will be holding an auction of artwork to benefit the Cystic Fibrosis Foundation. Although The 100 Charity Project has recently ended, the success of the project can’t be ignored. With widespread support from the talent of the show, The 100 Charity Project began with an ambitious plan to not only encourage ongoing blood donation, but also smaller weekly challenges and bigger movements in order to channel the energy of the passionate fan base. They created fan-related shirts to support monthly charities and art auctions to raise money. While many charities exist for specific fandoms or causes, plenty of conventions have a charity aspect. Dragon Con hosts a yearly blood drive during the convention so attendees can donate throughout the weekend and New York Comic Con is hosting an art auction with art donated from over 100 artists to benefit St. Jude Children’s Research Hospital. Check with any convention you attend to see if they have a charity component for the event.
It is well known in the art that shock loadings and forces applied to the underside of the foot of a person via the sole of footwear article have long term effects on the integrity of joints of a person, whilst also at times causing pain and discomfort, in particular when wearing footwear for extended periods of time. Furthermore, it is well known that the majority of loading on impact to the foot of a person is imparted to the underside of the heel portion of the foot of a person in use. Footwear articles of the prior art include various manners in which to increase comfort and conformity to the foot of user, including shock absorptive inserts, various types of foam rubber and air cushioning devices. Such footwear articles typically require increased manufacturing costs and tooling, thus increasing complexity of production. The present invention is provides a footwear article which overcomes or at least substantially ameliorates at least some of the deficiencies as exhibited by those of the prior art.
Long-term results of guided tissue regeneration therapy with non-resorbable and bioabsorbable barriers. IV. A case series of infrabony defects after 10 years. A 10-year follow-up study was conducted to clinically evaluate the long-term results after guided tissue regeneration (GTR) therapy of infrabony defects using non-resorbable and bioabsorbable barriers. Twelve pairs of contralateral infrabony defects were treated in 12 subjects with advanced periodontitis. Within each subject, one defect received a non-resorbable barrier and the other received a bioabsorbable barrier by random assignment. Clinical parameters were obtained at baseline and at 12 and 120+/-6 months after surgery. Eight of 12 subjects were available for the examination at 120+/-6 months. Twelve and 120+/-6 months after GTR therapy statistically significant (P<0.05) vertical clinical attachment level (CAL-V) gain was observed in both groups (3.4+/-1.0 mm and 1.5+/-1.2 mm for the control group at 12 and 120 months, respectively, and 3.3+/-1.6 mm and 3.5+/-2.5 mm for the test group at 12 and 120 months, respectively). However, 120+/-6 months after GTR therapy, three infrabony defects (two controls and one test) had lost >2 mm of the attachment that had been gained 12 months after GTR therapy, and a statistically significant mean CAL-V loss of 1.7+/-1.3 mm was observed from 12 to 120+/-6 months in the control group. One tooth in the control group was lost between 60 and 120+/-6 months. The case series failed to show statistically significant differences between test and control regarding CAL-V gain 120+/-6 months after surgery. CAL-V gain achieved 12 months after GTR therapy in infrabony defects using non-resorbable and bioabsorbable barriers was stable after 10 years in 12 of 16 defects.
Binding sites for 125I-labelled endothelin-1 in the kidneys: differential distribution in rat, pig and man demonstrated by using quantitative autoradiography. 1. Quantitative receptor autoradiography in vitro has been used to determine the distribution and density of specific binding sites for 125I-labelled endothelin-1 in human, porcine and rat kidneys. Immunocytochemistry was used to visualize von Willebrand factor-positive endothelial cells in adjacent sections to those used for autoradiography. 2. High levels of specific binding were detected in the vasa recta and papilla of all three species with lower levels in the medulla and cortex. 3. A major difference between the species was observed within the glomeruli, where high levels of binding were found in the rat but no detectable binding sites in pig or man.
Citation Nr: 1237387 Decision Date: 10/31/12 Archive Date: 11/09/12 DOCKET NO. 06-25 660 ) DATE ) ) On appeal from the Department of Veterans Affairs Regional Office in Boise, Idaho THE ISSUE Entitlement to an initial disability rating in excess of 10 percent for epicondylitis of the left elbow. REPRESENTATION Appellant represented by: Veterans of Foreign Wars of the United States ATTORNEY FOR THE BOARD Jennifer Hwa, Counsel INTRODUCTION The Veteran served on active duty from May 2000 to May 2004. Thereafter, he had periods of active duty for training in the Army Reserve from May 2004 to December 2006. This matter comes before the Board of Veterans' Appeals (Board) on appeal from a January 2005 rating decision by the Department of Veterans Affairs (VA) Regional Office (RO), which awarded service connection for epicondylitis of the left elbow and assigned an initial noncompensable rating effective June 1, 2004. In March 2007, the Veteran withdrew his request for a Travel Board hearing. See 38 C.F.R. § 20.704(e) (2012). In April 2009, the Board remanded the issue to the RO via the Appeals Management Center (AMC) in Washington, DC for further evidentiary development. Thereafter, in a January 2011 rating decision, the AMC increased the rating for the Veteran's service-connected epicondylitis of the left elbow to 10 percent, effective June 1, 2004. However, as that grant did not represent a total grant of benefits sought on appeal with regard to that issue, the claim for increase remains before the Board. AB v. Brown, 6 Vet. App. 35 (1993). In June 2011, the Board again remanded the claim for further development. In October 2011, the Veteran submitted to the Board additional evidence for consideration in connection with the claim on appeal. A waiver of RO jurisdiction for this evidence was received in a written statement dated in November 2011 that is included in the record. The Board accepts this evidence for inclusion in the record on appeal. See 38 C.F.R. § 20.1304 (2012). In January 2012, the Board again remanded the claim for further development. The Board notes that, in addition to the paper claims file, there is a paperless, electronic (Virtual VA) claims file associated with the Veteran's claim. A review of the documents in such file reveals that they are either duplicative of the evidence in the paper claims file or are irrelevant to the issue on appeal. FINDING OF FACT The Veteran's epicondylitis of the left elbow has been manifested by full range of motion. There is no evidence of degenerative or traumatic arthritis, ankylosis, flail joint, joint fracture, or impairment of supination or pronation. CONCLUSION OF LAW The criteria for an initial rating in excess of 10 percent disabling for epicondylitis of the left elbow have not been met. 38 U.S.C.A. §§ 1155, 5107 (West 2002 & Supp. 2011); 38 C.F.R. § 4.71a, Diagnostic Code 5024 (2012). REASONS AND BASES FOR FINDING AND CONCLUSION Veterans Claims Assistance Act of 2000 The Veterans Claims Assistance Act of 2000 (VCAA), Pub. L. No. 106-475, 114 Stat. 2096 (Nov. 9, 2000) (codified at 38 U.S.C.A. §§ 5100, 5102, 5103, 5103A, 5106, 5107, and 5126 (West 2002)) redefined VA's duty to assist a claimant in the development of a claim. VA regulations for the implementation of the VCAA were codified as amended at 38 C.F.R. §§ 3.102, 3.156(a), 3.159, and 3.326(a) (2012). The notice requirements of the VCAA require VA to notify a claimant of what information or evidence is necessary to substantiate the claim; what subset of the necessary information or evidence, if any, the claimant is to provide; and what subset of the necessary information or evidence, if any, the VA will attempt to obtain. 38 C.F.R. § 3.159(b) (2012). The requirements apply to all five elements of a service connection claim: veteran status, existence of a disability, a connection between a veteran's service and the disability, degree of disability, and effective date of the disability. Dingess/Hartman v. Nicholson, 19 Vet. App. 473 (2006). VCAA notice must be provided to a claimant before the initial unfavorable decision on a claim for VA benefits by the agency of original jurisdiction (in this case, the RO). Id; see also Pelegrini v. Principi, 18 Vet. App. 112 (2004). However, insufficiency in the timing or content of VCAA notice is harmless if the errors are not prejudicial to the claimant. Conway v. Principi, 353 F.3d 1369, 1374 (Fed. Cir. 2004) (VCAA notice errors are reviewed under a prejudicial error rule). In this case, in a June 2004 letter, issued prior to the decision on appeal, the Veteran was provided notice regarding what information and evidence is needed to substantiate his claim, as well as what information and evidence must be submitted by the Veteran and what information and evidence will be obtained by VA. However, the appeal arises from the initial award of service connection. In Dingess, the Court held that in cases in which service connection has been granted and an initial disability rating and effective date have been assigned, the typical service connection claim has been more than substantiated, it has been proven, thereby rendering section 5103(a) notice no longer required because the purpose that the notice is intended to serve has been fulfilled. Dingess, 19 Vet. App. at 490-91; see also Dunlap v. Nicholson, 21 Vet. App. 112 (2007) (section 5103(a) notice is no longer required after service-connection is awarded); Hartman v. Nicholson, 483 F.3d 1311 (Fed. Cir. 2007). Thus, VA's duty to notify in this case has been satisfied. The record also reflects that VA has made reasonable efforts to obtain relevant records adequately identified by the Veteran, including service treatment records, post service VA and private treatment records, and VA examination reports. The Board also notes that actions requested in the prior remands have been undertaken. Instructions pertinent to the claim being decided included obtaining updated VA treatment records and either obtaining the results of a cited VA examination or scheduling the Veteran for another VA examination to determine the current nature and severity of his left elbow epicondylitis. In response, the RO/AMC obtained all available current VA treatment records from the VA Medical Centers in Spokane, Washington, and Walla Walla, Washington. The RO/AMC also scheduled the Veteran for July 2011 and February 2012 VA examinations. Accordingly, the Board finds that there has been substantial compliance with the prior remand instructions and no further action is necessary. See D'Aries v. Peake, 22 Vet. App. 97 (2008) (holding that only substantial, and not strict, compliance with the terms of a Board remand is required pursuant to Stegall v. West, 11 Vet. App. 268 (1998)). As discussed above, the VCAA provisions have been considered and complied with. The Veteran was notified and aware of the evidence needed to substantiate the claim, the avenues through which he might obtain such evidence, and the allocation of responsibilities between the Veteran and VA in obtaining such evidence. The Veteran was an active participant in the claims process by submitting argument to support his claim. Therefore, he was provided with a meaningful opportunity to participate in the claims process and has done so. Any error in the sequence of events or content of the notice is not shown to have affected the essential fairness of the adjudication or to cause injury to the Veteran. See Pelegrini, 18 Vet. App. at 121. Therefore, any such error is harmless and does not prohibit consideration of this matter on the merits. See Conway, 353 F.3d at 1374; Dingess, 19 Vet. App. 473; see also ATD Corp. v. Lydall, Inc., 159 F.3d 534, 549 (Fed. Cir. 1998). Analysis The Board has reviewed all the evidence in the appellant's claims file. Although the Board has an obligation to provide adequate reasons and bases supporting this decision, there is no requirement that the evidence submitted by the appellant or obtained on his behalf be discussed in detail. Rather, the Board's analysis below will focus specifically on what evidence is needed to substantiate the claim and what the evidence in the claims file shows, or fails to show, with respect to the claim. See Gonzales v. West, 218 F.3d 1378, 1380-81 (Fed. Cir. 2000) and Timberlake v. Gober, 14 Vet. App. 122, 128-30 (2000). Disability evaluations are determined by the application of a schedule of ratings which is based on average impairment of earning capacity. 38 U.S.C.A. § 1155; 38 C.F.R. Part 4. Separate diagnostic codes identify the various disabilities. Disabilities must be reviewed in relation to their history. 38 C.F.R. § 4.1. Other applicable, general policy considerations are: interpreting reports of examination in light of the whole recorded history, reconciling the various reports into a consistent picture so that the current rating may accurately reflect the elements of disability, 38 C.F.R. § 4.2; resolving any reasonable doubt regarding the degree of disability in favor of the claimant, 38 C.F.R. § 4.3; where there is a question as to which of two evaluations apply, assigning a higher of the two where the disability picture more nearly approximates the criteria for the next higher rating, 38 C.F.R. § 4.7; and, evaluating functional impairment on the basis of lack of usefulness, and the effects of the disabilities upon the person's ordinary activity, 38 C.F.R. § 4.10. See Schafrath v. Derwinski, 1 Vet. App. 589 (1991). A claimant may experience multiple distinct degrees of disability that might result in different levels of compensation from the time the claim was filed until a final decision is made. See Fenderson v. West, 12 Vet. App. 119 (1999); see also Hart v. Mansfield, 21 Vet. App. 505 (2007). The analysis in the following decision is therefore undertaken with consideration of the possibility that different ratings may be warranted for different time periods. Disability of the musculoskeletal system is primarily the inability, due to damage or inflammation in parts of the system, to perform normal working movements of the body with normal excursion, strength, speed, coordination and endurance. The functional loss may be due to absence of part or all of the necessary bones, joints and muscles, or associated structures, or to deformity, adhesions, defective innervation, or other pathology, or may be due to pain, supported by adequate pathology and evidenced by visible behavior of the claimant undertaking the motion. Weakness is as important as limitation of motion, and a part which becomes painful on use must be regarded as disabled. See DeLuca v. Brown, 8 Vet. App. 202 (1995); 38 C.F.R. § 4.40 (2012); see also 38 C.F.R. §§ 4.45, 4.59 (2012). The Veteran has been diagnosed with epicondylitis of the left elbow. Epicondylitis is an unlisted disorder that the RO rated by analogy under Diagnostic Code 5024, which pertains to tenosynovitis. Because of the nature of the Veteran's disability, the Board finds that the rating criteria under Diagnostic Code 5024 that were applied by the RO are appropriate. Pernorio v. Derwinski, 2 Vet. App. 625 (1992); 38 C.F.R. §§ 4.20, 4.21 (2012). The Board finds that the Veteran's disability can also be rated appropriately under Diagnostic Codes 5206, 5207, 5208, and 5213 for limitation of motion of the forearm. Butts v. Brown, 5 Vet. App. 532 (1993). Accordingly, the Board will proceed with an analysis of the Veteran's disability under these diagnostic codes. Diagnostic Code 5024 is used for rating tenosynovitis, which is to be rated on limitation of motion of affected parts, as arthritis, degenerative. See 38 C.F.R. § 4.71a, Diagnostic Code 5024. Degenerative arthritis is addressed in Diagnostic Code 5003. See 38 C.F.R. § 4.71a, Diagnostic Code 5003. That diagnostic code instructs that degenerative arthritis established by X-ray findings will be rated on the basis of limitation of motion under the appropriate diagnostic codes for the specific joint or joints involved (Diagnostic Code 5200 etc.). When however, the limitation of motion of the specific joint or joints involved is noncompensable under the appropriate diagnostic codes, a rating of 10 percent is for application for each such major joint or group of minor joints affected by limitation of motion, to be combined, not added, under Diagnostic Code 5003. Limitation of motion must be objectively confirmed by findings such as swelling, muscle spasm, or satisfactory evidence of painful motion. Limitation of motion of the forearm is covered in Diagnostic Codes 5206, 5207, 5208, and 5213. See 38 C.F.R. § 4.71a. The evidence of record shows that the Veteran's dominant arm is the right arm. Therefore, as his disability affects his left elbow, the applicable rating criteria are those involving the minor arm. Under Diagnostic Code 5206, a 0 percent rating is warranted for flexion limited to 110 degrees. A 10 percent rating is warranted for flexion limited to 100 degrees. A 20 percent rating is warranted for flexion limited to 90 degrees or 70 degrees. A 30 percent rating is warranted for flexion limited to 55 degrees. A maximum 40 percent rating is warranted for flexion limited to 45 degrees. 38 C.F.R. § 4.71a, Diagnostic Code 5206. Under Diagnostic Code 5207, a 10 percent rating is warranted for extension limited to 45 or 60 degrees. A 20 percent rating is warranted for extension limited to 75 degrees or 90 degrees. A 30 percent rating is warranted for extension limited to 100 degrees. A maximum 40 percent rating is warranted for extension limited to 110 degrees. 38 C.F.R. § 4.71a, Diagnostic Code 5207. Under Diagnostic Code 5208, a 20 percent rating is warranted for flexion limited to 100 degrees and extension limited to 45 degrees. 38 C.F.R. § 4.71a, Diagnostic Code 5208. Under Diagnostic Code 5213, a 10 percent rating is warranted for supination limited to 30 degrees or less. A 20 percent rating is warranted for pronation with motion lost beyond the middle of the arc, pronation with motion lost beyond the last quarter of arc where the hand does not approach full pronation, or the hand fixed in full pronation or near the middle of the arc or moderate pronation due to bone fusion. A 30 percent rating is warranted for the hand fixed in supination or hyperpronation due to bone fusion. 38 C.F.R. § 4.71a, Diagnostic Code 5213. The normal range of motion of the elbow is from 0 degrees extension to 145 degrees flexion; normal forearm pronation is from 0 to 80 degrees, and normal forearm supination is from 0 to 85 degrees. 38 C.F.R. § 4.71, Plate I (2012). Post-service VA and private medical records dated from August 2004 to January 2012 show that the Veteran received intermittent treatment for left elbow pain. A November 2010 x-ray of the left elbow was unremarkable. On VA examination in November 2004, the Veteran complained of pain at rest in the left elbow that had not necessarily been aggravated by movement. He reported occasional shooting pain that went down the arm to the wrist as well as numbness in the little finger in the left hand. He also indicated weakness in the left elbow and some stiffness after inactivity, but no swelling, local heat, or redness. He stated that he did have instability in the left elbow because he had dropped things at times but denied any elbow locking. He also reported flare-ups occurring when he did certain things such as push-ups. He complained that he had some trouble with sleep because if he turned in a certain way and irritated the left elbow, it would wake him up and cause him more pain. He denied the use of any assistive aids. Examination revealed that the left elbow in general appeared to be normal. There was no deformity or tenderness. Range of motion testing showed 145 degrees flexion with pain on the end of range of motion. For movement against pressure, there was only 40 degrees flexion with worse pain on the end of range of motion. The Veteran had no pain shooting down the lower arm to the little finger or any other finger. Tinel's sign in the left wrist was negative. There was good action and strength in the muscles of the thenar eminence and good dexterity of the fingers. The Veteran was diagnosed with epicondylitis of the left elbow. The Veteran submitted lay statements from his wife dated in January 2006, July 2009, and September 2011 in support of his claim. The Veteran's wife revealed, in pertinent part, that she had known the Veteran since 1991 and married him in 2003. She reported that after the Veteran returned from his deployment to Iraq, he complained of pain in his elbows and a numbness or tingling sensation in his fingers. She observed that the Veteran's left arm caused him more discomfort than his right one. She indicated that the Veteran was constantly losing sleep at night because if he slept on one side too long, he had to switch to the other side in order to release the pressure that was being put on his elbows, causing him to toss and turn all night. She also stated that the Veteran experienced discomfort from holding her hand, could not wrap his arms around her at night anymore due to the pain, and could not hold their young daughter without experiencing left elbow pain. She reported that after a shift at his current job, the Veteran's arms would hurt when he came home. She observed that the Veteran's left elbow pain was becoming more intense, lasting longer in duration, and more difficult to manage. She stated that if the Veteran's elbow got touched or if he moved it in a certain way, it would cause him pain. She also reported that he did not have full movement capacity of the left arm. On VA examination in July 2011, the Veteran complained of gradually worsening left elbow pain. He described it as a constant, aching pain that was 4-5/10 in intensity. It was aggravated by lifting heavy objects, and nothing relieved the pain. He also reported tenderness of the elbow. Examination revealed left elbow tenderness, pain at rest, and guarding of movement. The Veteran expressed a moderate degree of tenderness when the examiner palpated the medial epicondyle of the left elbow. Range of motion testing of the left elbow showed 145 degrees flexion, 0 degrees extension, 80 degrees pronation, and 85 degrees supination. There was objective evidence of pain with active motion and following repetitive motion. However, there were no additional limitations after repetitive motion. The Veteran was diagnosed with medial epicondylitis of the left elbow. The examiner noted that the Veteran had been doing a lot of typing at work since 2009, and the elbow pain slowed him down. However, the elbow pain did not stop him from doing the typing or performing his work duties. At a February 2012 VA examination, the Veteran was diagnosed with left elbow lateral epicondylitis. He reported flare-ups of elbow pain that were very minimal and lasted 1 to 2 hours after doing a task involved with pushing and pulling. He stated that these flare-ups occurred less than every 2 weeks. Range of motion testing showed 145 degrees flexion and 0 degrees extension. There was no objective evidence of painful motion. Upon repetitive testing, the Veteran did not have additional limitation in range of motion or functional loss and/or impairment of the elbow and forearm. There was localized tenderness or pain on palpation of the joints or soft tissue of the left elbow or forearm. Specifically, the Veteran had mild tenderness of the lateral epicondyle just distal to the epicondyle with no swelling. The Veteran had normal elbow muscle strength. There was no evidence of ankylosis, flail joint, joint fracture, and/or impairment of supination or pronation. The Veteran did not have olecranon tenderness, inflammation of the bursa, or effusion. An x-ray of the left elbow showed no degenerative or traumatic arthritis. Regarding neurological findings, the examiner noted that a 2007 EMG did not support a sensory neuropathy or compression neuropathy. She also stated that the examination did not support any evidence of neuropathy. The Veteran was found to have very intermittent left ulnar nerve irritation at the lateral epicondyle which was most likely caused by how he used his elbow at work. The Veteran did not do any home physical therapy, had no epicondyle strap, and had not had any orthopedic evaluation for steroid injections. Phalen's and Tinel's were negative bilaterally. There were no paresthesias of the left hand or fingers. The Veteran had normal grips and no hypothenar atrophy. On the above examinations in November 2004, July 2011, and February 2012, the Veteran had a full range of left elbow extension and flexion and forearm pronation and supination, with no additional limitation caused by pain or repetitive use. Thus, a compensable rating is not warranted based on limitation of motion, let alone a rating in excess of 10 percent. Even considering the Veteran's subjective complaints of pain, the medical evidence of record does not show any additional limitation of motion or functional impairment that would support an evaluation in excess of the 10 percent rating presently assigned. Indeed, the 10 percent rating currently assigned contemplates his subjective complaints and functional impairment, as his range of motion does not support a compensable rating. See DeLuca, 8 Vet. App. 202; 38 C.F.R. § 4.40; see also 38 C.F.R. §§ 4.45, 4.59. Ratings in excess of 10 percent disabling could also be assigned for ankylosis of the elbow; elbow flail joint; or malunion or nonunion of the ulna or radius. See 38 C.F.R. § 4.71a, Diagnostic Codes 5205, 5209, 5210, 5211, 5212. However, none of these disabilities have been reported after examination and review of x-rays, and the Veteran has not reported having any of these disabilities. After examination and x-ray, it was noted that the Veteran did not have any of these disabilities. Regarding any neurological symptoms related to the Veteran's left elbow disability, the Board notes that there was no evidence of any neuropathy found at the most recent VA examination in February 2012. The examiner explained that any intermittent left ulnar nerve irritation at the lateral epicondyle was most likely caused by how the Veteran used his elbow at work. Additionally, the Board notes that the RO granted service connection for numbness of the fingers of the left hand in a June 2009 rating decision, and that any neurological symptoms stemming from the Veteran's left elbow disability have been contemplated in this disability rating. The Board concludes that the medical findings on examinations are of greater probative value than the Veteran's and Veteran's wife's allegations regarding the severity of his left elbow epicondylitis. The symptomatology noted in the medical and lay evidence has been adequately addressed by the 10 percent evaluation assigned and do not more nearly approximate the criteria for a higher evaluation at any time during the relevant period on appeal. See 38 C.F.R. § 4.71a, Diagnostic Code 5024 (2012); see also Fenderson, supra. The Board has also considered whether the Veteran's left elbow epicondylitis presents an exceptional or unusual disability picture as to render impractical the application of the regular schedular standards such that referral to the appropriate officials for consideration of an extraschedular rating is warranted. See 38 C.F.R. § 3.321(b)(1) (2012); Bagwell v. Brown, 9 Vet. App. 337, 338-39 (1996). The threshold factor for extraschedular consideration is a finding that the evidence before VA presents such an exceptional disability picture that the available schedular evaluations for that service-connected disability are inadequate. See Fisher v. Principi, 4 Vet. App. 57, 60 (1993) ("[R]ating schedule will apply unless there are 'exceptional or unusual' factors which render application of the schedule impractical."). Here, the rating criteria reasonably describe the Veteran's disability level and symptomatology, and provide for higher ratings for additional or more severe symptomatology than is shown by the evidence. His 10 percent rating contemplates his subjective complaints and functional impairment. Thus, his disability picture is contemplated by the rating schedule, and the assigned schedular evaluation is, therefore, adequate. See Thun v. Peake, 22 Vet. App. 111, 115 (2008). Consequently, referral for extraschedular consideration is not warranted. In reaching the above conclusion, the Board has considered the applicability of the benefit of the doubt doctrine. However, as the preponderance of the evidence is against the Veteran's claim, that doctrine is not applicable in the instant appeal. See 38 U.S.C.A. § 5107(b); Ortiz v. Principi, 274 F.3d 1361, 1364 (Fed. Cir. 2001); Gilbert v. Derwinski, 1 Vet. App. 49, 55-57 (1990). ORDER An initial evaluation in excess of 10 percent for epicondylitis of the left elbow is denied. ____________________________________________ K.A. BANFIELD Veterans Law Judge, Board of Veterans' Appeals Department of Veterans Affairs
/* * Copyright (C) 2017 Caio Lima <[email protected]> * Copyright (C) 2017 Apple Inc. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "config.h" #include "BigIntConstructor.h" #include "BigIntPrototype.h" #include "JSBigInt.h" #include "JSCInlines.h" #include "JSGlobalObjectFunctions.h" #include "Lookup.h" #include "ParseInt.h" #include "StructureInlines.h" namespace JSC { static EncodedJSValue JSC_HOST_CALL bigIntConstructorFuncAsUintN(ExecState*); static EncodedJSValue JSC_HOST_CALL bigIntConstructorFuncAsIntN(ExecState*); } // namespace JSC #include "BigIntConstructor.lut.h" namespace JSC { STATIC_ASSERT_IS_TRIVIALLY_DESTRUCTIBLE(BigIntConstructor); const ClassInfo BigIntConstructor::s_info = { "Function", &Base::s_info, &bigIntConstructorTable, nullptr, CREATE_METHOD_TABLE(BigIntConstructor) }; /* Source for BigIntConstructor.lut.h @begin bigIntConstructorTable asUintN bigIntConstructorFuncAsUintN DontEnum|Function 2 asIntN bigIntConstructorFuncAsIntN DontEnum|Function 2 @end */ static EncodedJSValue JSC_HOST_CALL callBigIntConstructor(ExecState*); BigIntConstructor::BigIntConstructor(VM& vm, Structure* structure) : InternalFunction(vm, structure, callBigIntConstructor, nullptr) { } void BigIntConstructor::finishCreation(VM& vm, BigIntPrototype* bigIntPrototype) { Base::finishCreation(vm, BigIntPrototype::info()->className); ASSERT(inherits(vm, info())); putDirectWithoutTransition(vm, vm.propertyNames->prototype, bigIntPrototype, PropertyAttribute::DontEnum | PropertyAttribute::DontDelete | PropertyAttribute::ReadOnly); putDirectWithoutTransition(vm, vm.propertyNames->length, jsNumber(1), PropertyAttribute::ReadOnly | PropertyAttribute::DontEnum); putDirect(vm, vm.propertyNames->name, jsNontrivialString(&vm, String("BigInt"_s)), PropertyAttribute::ReadOnly | PropertyAttribute::DontEnum); } // ------------------------------ Functions --------------------------- static bool isSafeInteger(JSValue argument) { if (argument.isInt32()) return true; if (!argument.isDouble()) return false; double number = argument.asDouble(); return trunc(number) == number && std::abs(number) <= maxSafeInteger(); } static EncodedJSValue toBigInt(ExecState& state, JSValue argument) { ASSERT(argument.isPrimitive()); VM& vm = state.vm(); if (argument.isBigInt()) return JSValue::encode(argument); auto scope = DECLARE_THROW_SCOPE(vm); if (argument.isBoolean()) { scope.release(); return JSValue::encode(JSBigInt::createFrom(vm, argument.asBoolean())); } if (argument.isUndefinedOrNull() || argument.isNumber() || argument.isSymbol()) return throwVMTypeError(&state, scope, "Invalid argument type in ToBigInt operation"_s); ASSERT(argument.isString()); scope.release(); return toStringView(&state, argument, [&] (StringView view) { return JSValue::encode(JSBigInt::parseInt(&state, view)); }); } static EncodedJSValue JSC_HOST_CALL callBigIntConstructor(ExecState* state) { VM& vm = state->vm(); auto scope = DECLARE_THROW_SCOPE(vm); JSValue value = state->argument(0); JSValue primitive = value.toPrimitive(state); RETURN_IF_EXCEPTION(scope, encodedJSValue()); if (primitive.isNumber()) { if (!isSafeInteger(primitive)) return throwVMError(state, scope, createRangeError(state, "Not safe integer"_s)); scope.release(); if (primitive.isInt32()) return JSValue::encode(JSBigInt::createFrom(vm, primitive.asInt32())); if (primitive.isUInt32()) return JSValue::encode(JSBigInt::createFrom(vm, primitive.asUInt32())); return JSValue::encode(JSBigInt::createFrom(vm, static_cast<int64_t>(primitive.asDouble()))); } EncodedJSValue result = toBigInt(*state, primitive); RETURN_IF_EXCEPTION(scope, encodedJSValue()); return result; } EncodedJSValue JSC_HOST_CALL bigIntConstructorFuncAsUintN(ExecState*) { // FIXME: [ESNext][BigInt] Implement BigInt.asIntN and BigInt.asUintN // https://bugs.webkit.org/show_bug.cgi?id=181144 CRASH(); return JSValue::encode(JSValue()); } EncodedJSValue JSC_HOST_CALL bigIntConstructorFuncAsIntN(ExecState*) { // FIXME: [ESNext][BigInt] Implement BigInt.asIntN and BigInt.asUintN // https://bugs.webkit.org/show_bug.cgi?id=181144 CRASH(); return JSValue::encode(JSValue()); } } // namespace JSC
# frozen_string_literal: true require_relative '../test_helper' SingleCov.covered! describe VaultServersController do let!(:server) { create_vault_server } before { deploy_groups(:pod1).update_column(:vault_server_id, server.id) } as_a :viewer do describe "#index" do it "renders" do get :index assert_response :success end end describe "#show" do it "renders" do get :show, params: {id: server.id} assert_response :success response.body.wont_include server.token end end unauthorized :get, :new unauthorized :post, :create unauthorized :post, :sync, id: 1 unauthorized :patch, :update, id: 1 unauthorized :delete, :destroy, id: 1 end as_a :super_admin do describe "#new" do it "renders" do get :new assert_response :success end end describe "#create" do let(:valid_params) { {name: 'pod2', address: 'http://vault-land.com', token: 'TOKEN2'} } it "creates" do assert_difference 'Samson::Secrets::VaultServer.count', +1 do post :create, params: {vault_server: valid_params} end assert flash[:notice] assert_redirected_to action: :index end it "fails" do refute_difference 'Samson::Secrets::VaultServer.count' do valid_params[:name] = server.name post :create, params: {vault_server: valid_params} end assert_response :success # renders edit end end describe "#sync" do it "syncs" do other = Samson::Secrets::VaultServer.create!(name: 'pod2', address: 'http://vault-land.com', token: 'TOKEN2') Samson::Secrets::VaultServer.any_instance.expects(:sync!).with(other).returns([1, 2, 3]) post :sync, params: {id: server.id, other_id: other.id} assert_redirected_to vault_server_path(server) flash[:notice].must_equal "Synced 3 values!" end end describe "#update" do it "updates" do patch :update, params: {id: server, vault_server: {name: 'xyz'}} assert flash[:notice] assert_redirected_to action: :index end it "fails" do patch :update, params: {id: server, vault_server: {name: ''}} assert_response :success # renders edit end end describe "#destroy" do it "destroys" do assert_difference 'Samson::Secrets::VaultServer.count', -1 do delete :destroy, params: {id: server.id} end assert flash[:notice] assert_redirected_to action: :index end end end end
BACK in the 1980s and early 1990s, when Dante Barksdale was playing the game in Baltimore—dealing drugs, toting guns, making some money—there was a process to killing people. “You couldn’t shoot someone without asking permission from a certain somebody,” muses the former gangster, on a tour of the abandoned row-houses and broken roads of West Baltimore, the most dangerous streets in America. “It’s become like, “I’m going to kill whoever’s got a fucking problem with it.” Mr Barksdale, who spent almost a decade in prison for selling drugs, speaks with authority. His uncle, Nathan “Bodie” Barksdale, was a big shot in the more hierarchical Baltimore gangland he recalls. Avon Barksdale, a fictional villain in “The Wire”, a TV crime drama set in Baltimore, was partly inspired by him. The younger Mr Barksdale was himself fleetingly portrayed in it. (“‘The Wire’ was a bunch of bullshit,” he sniffs. “I got shot in the fourth episode and I didn’t get paid.”) Now employed by the Baltimore health department, in a team of gangsters-turned-social workers known as Safe Streets, he uses his street smarts to try to pre-empt murders by mediating among the local hoodlums. This also gives him a rare vantage onto the city’s latest upwelling of violence, which is concentrated in poor, overwhelmingly black West Baltimore—and is horrific. Hours after Mr Barksdale conducted his tour of some of Baltimore’s most troubled streets on June 12th, they witnessed another six murders. That raised the number of killings in the city to 159, the highest recorded so early in the year at least since 1990, even though the city’s population was much bigger then than it is now. If weighted to reflect the fact that the murder rate always climbs in the hot, fractious summer months, this suggests Baltimore may see more than 400 murders this year. That would smash the existing record of 344 killings, which was set in 2015, fuelled by violent rioting over the death in police custody of a drug peddler called Freddie Gray. This is catastrophic. A 50-minute drive from Washington, DC, black men aged 15 to 29 are as likely to die violently as American soldiers were in Iraq at the height of its Baathist insurgency. Yet there is no sign of Maryland or the federal government taking the sort of emergency action such a disaster would seem to justify. Instead of bolstering law enforcement in Baltimore and a few other violent cities, including chiefly Chicago, but also St Louis and Milwaukee, Jeff Sessions, the attorney-general, has tried unsuccessfully to row back a modest federal-government intervention devised by his Democratic predecessor. Meanwhile he has used the violence in those places to misrepresent the much more pacific state of America at large. “The murder rate is up over 10%—the largest increase since 1968,” Mr Sessions said last month in testimony to the Senate intelligence committee. He neglected to clarify that, notwithstanding that rise, the murder rate is at close to its lowest level in a quarter of a century. In most places, Americans have never been less likely to be murdered; the homicide rate in New York is below the national average. More than 55% of the increase last year was accounted for by Chicago, where 781 people were murdered—more than the total for New York and Los Angeles combined. America is not experiencing a crime wave, in short, but rather historic progress marred by a few exceptionally bleak places. That does not justify Mr Sessions’s campaign for harsher custodial sentences across the board, which would not cut violent crime much or at all in Baltimore or anywhere. The attorney-general would do better to fathom what is causing the bleak spots, starting with a few stark truths. As American as cherry pie Most murder victims in America are black people shot dead by other black people. Blacks represent 13% of America’s population, yet in 2015 they represented 52% of the slain. The toll on black families and communities is appalling; between 1980 and 2013, 262,000 black men were murdered in America, more than four times America’s total number of casualties in Vietnam. If black Americans were murdered at no more than the national rate, America would still be an unusually violent developed country; its murder rate would fall from the current level of 4.9 per 100,000 people, which is similar to that of some African countries, to 2.4 per 100,000. That would make America merely three times as dangerous as Germany. Criminologists have for decades argued about what makes young black men so much likelier to commit murder than young men of other ethnicities. The answer lies in some combination of poverty, family instability, epidemics of drug use in the wretched inner-city districts into which many blacks were corralled by racist housing policies, and bad, or non-existent, policing. The last of these, which may be the most important, extends far beyond occasional instances of police brutality. In America’s overtly racist past, the killers of black Americans were less likely to be caught than the killers of whites because black lives were valued less. These days, inadequate resources, recruitment and training of inner-city police officers are bigger problems. Yet the outcome is the same. In the 1930s, Mississippi solved 30% of black murders; in the early 1990s, Los Angeles County, then in the grip of a violent crack-cocaine epidemic, solved 36%; in 2015 the police in Baltimore solved 30.5% of murders, most of which involved blacks. Where murderers operate with a sense of impunity, they are likely to commit more murders. “I probably know ten dudes right now who have shot people and never been arrested,” says Mr Barksdale. Another grim indicator of impunity is that, while the number of fatal shootings has soared this year, the number of non-fatal ones has hardly increased. “Instead of taking a shot and running away, the gunmen are walking up and taking multiple shots to leave no witnesses alive,” says Cassandra Crifasi, a researcher into gun violence at Baltimore’s Johns Hopkins Bloomberg School of Health. In the absence of effective policing, friends and relatives of murder victims are also more likely to take the law into their own hands—and so the virus spreads. The same pattern has been noted in other poorly policed societies, especially those experiencing upheaval or trauma. The homicide rate among black Americans, notes Jill Leovy, a writer on murder in America, is similar to that among Arabs in some parts of Israel’s occupied territories and American frontiersmen in the 18th century. “Like the schoolyard bully,” she writes in “Ghettoside”, “our criminal-justice system harasses people on small pretexts but is exposed as a coward before murder. It hauls masses of black men through its machinery but fails to protect them from bodily injury and death.” Better policing contributed to the drop in violent crime seen in most American cities from the mid-1990s. The size of its contribution is unclear, however: the complexity of local circumstances and the patchiness of America’s crime data makes accounting for changes in crime rates hard. Even with decades of data to mull over, and a list of likely factors including better policing, strong income growth, demographic changes and reduced alcohol consumption, researchers at the Brennan Centre for Justice, at New York University, could account for only half of the national reduction in violent crime. Accounting for the recent surge in killing in Baltimore and Chicago is even harder. Yet it is striking that both places have recently suffered a dramatic collapse in public trust in the police, sparked by acts of brutality. Loathed but needed Just as the killing of Freddie Gray, who suffered a fatal spine injury in the back of a police van, lit up Baltimore, so the killing of Laquan McDonald, another young black man, who was shot dead in possession of a pocket-knife, led to protests in Chicago. In both cases the police, undermanned and unsure how to comport themselves in a world of mobile-phone cameras in every pocket, retreated. Between November 2015 and January 2016, the number of suspects briefly detained in Chicago dropped by 80%. In Baltimore, arrest numbers have fallen in the past three years, even as the murder rate soared. Baltimore’s police department was thrown into additional disarray last year by a damning report from the Department of Justice, which concluded that many of its officers were poorly trained, racist and incompetent, especially in their bungled efforts to police poor black neighbourhoods. This finding led the feds to demand the overwatch role that Mr Sessions has tried unsuccessfully to give up. Another scandal, in March, has made matters worse; seven members of an elite Baltimore police unit were charged with robbing drug dealers and law-abiding Baltimoreans, among other crimes. “I sell drugs,” one allegedly boasted. Baltimore’s police bridle at the suggestion that they are to blame for the city’s violence. They are at least trying harder. The case-closure rate for murders is currently around 50%. In response to the six murders on the day of your correspondent’s visit to West Baltimore, the city’s police commissioner, Kevin Davis, also announced what amounted to a weeklong state of emergency. He dispatched most of the city’s 2,850 police officers—including many previously dedicated to office-work—on 12-hour patrols. If such efforts could be sustained, they would probably be popular, even though the police are not. “No one trusts the police, no one wants to tell them anything,” said Yolanda Stewart, a resident of the troubled Sandtown-Winchester neighbourhood, whose 21-year-old nephew was recently shot and maimed outside her house. “But we need strong police around here to protect us.” A tour of Baltimore’s trouble spots also evinces some sympathy for the cops. Better policing alone cannot curb a major crime wave; though New York’s crime-fighting success is often attributed to an imaginative crackdown on petty crime in the 1990s, the city’s long economic boom probably played a bigger part. By contrast, the state of Baltimore’s poorest neighbourhoods, huddled on either side of the Patapsco river, is unrelentingly dire. Whole streets have been boarded up against the junkies who hunker miserably on the weedy verges. Where an occasional inhabited house interrupts the monotony of abandonment, a glimpse of curtains or a pot-plant appears both valiant and acutely pathetic. (“The people in these communities are doing the best they can,” says Ericka Alston, a former addict who runs a much-praised after-school club in West Baltimore.) The city has an estimated 16,000 abandoned houses, some of which have lain empty since its previous big riot, in 1968, following the death of Martin Luther King. Most of the damage is more recent, however. A former steel and manufacturing hub, the city has lost 75,000 factory jobs since 1990; as a result, around a quarter of Baltimoreans are stuck in poverty, with few obvious exits. A 25-year-long study of 790 children in Baltimore by the sociologist Karl Alexander and colleagues, from 1982 to 2007, found only 4% of poor children made it through college. In Sandtown-Winchester, shortly before the riots, 52% of adults were unemployed, 49% of teenagers were “chronically absent” from school and a third of houses were empty or abandoned. Whatever caused the drop in crime that Baltimore experienced with the rest of America, such indicators suggest it was fragile progress. That is especially true given the attendant horrors of Baltimore’s other big scourge, drug addiction, which also has a long history in the city. “If you think dope is for kicks and for thrills, you’re out of your mind,” said Billie Holiday, a jazz singer and heroin addict, who grew up in Sandtown-Winchester in the 1920s. Mr Barksdale and many of his ex-gangster colleagues cut their teeth during the crack-cocaine binge of the late 1980s and 1990s. Many, including Mr Barksdale, are the sons of addicts. Underpinning the latest crime surge is a third epidemic, of opioid prescription drugs, which is in some ways the deadliest yet. According to an estimate by the health department, around 50,000 Baltimoreans are addicted to opioids. Some consider that an exaggeration; a visit to the streets around Baltimore’s Lexington Market suggests it might not be. “See him on the bike! He’s so high he can’t ride straight,” says Mr Barksdale, from behind the wheel, picking out the stoners with an expert eye. There appear to be dozens of them; two dealers are plainly visible, dishing out the content of orange pillboxes. It is probably Percocet, an opioid pain-reliever, with a street value of $30 for a 30mg hit. One of the dealers is operating within a few feet of a police van—perhaps, Mr Barksdale speculates, because he too is stoned. “Everyone’s high!” he exclaims. “You used to be ostracised if you was on drugs. Now it’s so common it’s accepted.” In the view of Mr Barksdale and his co-workers, these and other changes in Baltimore’s illegal drugs market help drive the killing. The more hierarchical gangs, and regulated murders, depicted in “The Wire” were based on the relative scarcity of heroin and cocaine; a gangster with a good supply of the drugs occupied a commanding position. By contrast, the easier availability of prescription drugs—especially in the aftermath of the riots, during which many pharmacies were looted—has led to a profusion of petty dealers, many of whom are also addicts. The result is constant turf battles which, unchecked by sobriety, are especially liable to turn bloody. Barksdale, gangster-turned-helper In turn, the bloodshed has led to a general downgrading of the value of a life. “The normal has changed, violence and retaliation and pain are expected,” says Ms Alston, who estimates that 98% of the 50-100 children who attend her after-school club have heard or seen someone being shot. “This is about six-year-olds walking in and saying, ‘Did you hear so and so got shot?’” That suggests a third way in which violence, which public-health experts increasingly view as analogous to infectious disease, spreads. The community starts taking it for granted. Safe Streets is one of the more imaginative efforts to stop the contagion. It was launched in Baltimore a decade ago after a model pioneered in Chicago by an epidemiologist, Gary Slutkin. His idea was to erect barriers around the violence in the form of interventions by community leaders and streetwise locals. Of 31 such “violence-interrupters” employed by Safe Streets, all but two have done prison time. “We all did shit, got shot, got hit the fuck up, that’s why we’re credible messengers,” explains Mr Barksdale. “Ain’t none of us were snitches.” Patrolling their areas in orange T-shirts, the violence-interrupters soak up news of the latest disagreements with obvious relish. (“So there are these two marching bands got this beef going on,” recounts one with delight, through an open window of Mr Barksdale’s car, “and they got knives and pit-bulls…”) Uncertainty about where the violence-interrupters stand in relation to the law has made them controversial. Because they are devoted to forestalling violence, they tend to take no view on the drugs deals they observe. A few have also sought to augment their meagre salaries unwisely. Mr Barksdale concedes that one of the problems is keeping people engaged without dipping back into their old lifestyles. His gangster uncle, who briefly worked for Safe Streets, was one who succumbed to temptation. Nathan Barksdale died in prison in North Carolina in February, aged 54, having been jailed for four years for trafficking heroin. Such controversies have left Safe Streets short of friends in high places; it almost lost its annual funding, of $1.6m, last year. Yet the ex-crims appear to be effective. A study by researchers at Johns Hopkins University published in 2012 found a statistically significant reduction in non-fatal violence in the four neighbourhoods they patrol, and a significant reduction in killings in two of them. Given the high cost of violence, financially and otherwise, that suggests Safe Streets is good value. It is estimated that $80m has been spent on treating gunshot wounds in Baltimore over the past five years. It will take more than a few more ex-gangsters to pacify Baltimore, however. A straw-poll of Safe Streets workers suggests the city’s troubled parts need four things above all. They need better schools, to mitigate the damaging effects on teenagers of their chaotic families, and to equip them for the jobs being created in Baltimore’s plusher areas. They need fewer prescription drugs. And they need more and better policing. For the last of these, there is at least some hope in the form of the promised reforms and federal oversight. Of better schools and fewer drugs in Baltimore’s violent districts there is no sign and, in the absence of serious attention to this calamity, little prospect.
Application of 29Si and 27Al magic angle spinning nuclear magnetic resonance to studies of the building materials of historical monuments. We report the application of 29Si and 27Al magic angle spinning nuclear magnetic resonance (MAS NMR) studies on building stones from historical monuments to obtain direct information about the degree of degradation and to observe the changes in the consolidated material after treatment with tetraethoxysilane (TEOS). Using the data obtained from deteriorated materials, a diagnostic laboratory, a suitable treatment and recommendations for building conservation may infer. A case study is presented using stones from Guanajuato City Main Church (Central Mexico). X-ray diffraction patterns to characterize the species present in the stones agree with the solid state NMR results.
Q: flattening the nested object in javascript I ran into this problem, I was able to write solution which can handle array of object (not posted here) or one level deep nested object but i couldn't solve when the given object has nested structure like below. I am curious to know how we can solve this. const source = { a: 1, b: { c: true, d: { e: 'foo' } }, f: false, g: ['red', 'green', 'blue'], h: [{ i: 2, j: 3 }] }; solution should be const solution = { 'a': 1, 'b.c': true, 'b.d.e': 'foo', 'f': false, 'g.0': 'red', 'g.1': 'green', 'g.2': 'blue', 'h.0.i': 2, 'h.0.j': 3 }; attempt for one deep nested object let returnObj = {} let nestetdObject = (source, parentKey) => { let keys = keyFunction(source); keys.forEach((key) => { let values = source[key]; if( typeof values === 'object' && values !== null ) { parentKey = keys[0]+'.'+keyFunction(values)[0] nestetdObject(values, parentKey); }else{ let key = parentKey.length > 0 ? parentKey : keys[0]; returnObj[key] = values; } }) return returnObj }; // Key Extractor let keyFunction = (obj) =>{ return Object.keys(obj); } calling the function nestetdObject(source, '') But my attempt will fail if the object is like { foo: { boo : { doo : 1 } } }. A: You should be able to do it fairly simply with recursion. The way it works, is you just recursively call a parser on object children that prepend the correct key along the way down. For example (not tested very hard though): const source = { a: 1, b: { c: true, d: { e: 'foo' } }, f: false, g: ['red', 'green', 'blue'], h: [{ i: 2, j: 3 }] } const flatten = (obj, prefix = '', res = {}) => Object.entries(obj).reduce((r, [key, val]) => { const k = `${prefix}${key}` if(typeof val === 'object'){ flatten(val, `${k}.`, r) } else { res[k] = val } return r }, res) console.log(flatten(source))
208 Cal.App.2d 305 (1962) ERNEST FLYNN et al., Plaintiffs and Appellants, v. SUSIE P. MIKELIAN, Defendant and Respondent. Civ. No. 25915. California Court of Appeals. Second Dist., Div. Three. Oct. 9, 1962. Carroll, Pares, Blakey & Battin and David Howard Battin for Plaintiffs and Appellants. Y. B. Arsen for Defendant and Respondent. *307 FORD, J. The primary question involved on this appeal is the nature of the rights of the plaintiffs, assignors of a lease of real property, at the time of the acts of the defendant lessor of which complaint is made. The appeal is from a judgment for the defendant. On November 6, 1957, the defendant leased the premises involved to certain persons who thereafter assigned the lease to Zelman Soskin. On July 2, 1958, Soskin sold the business being operated on the property to the plaintiffs, Mr. and Mrs. Flynn, and assigned the lease to them. The lease contained a provision which was in part as follows: "Lessee shall not assign this lease ... without the written consent of lessor first had and obtained, and a consent to one assignment ... shall not be deemed to be a consent to any subsequent assignment. ..." Such written consent to the assignment to the plaintiffs was obtained. In the document in which such consent was evidenced was an agreement executed by the plaintiffs whereby they did "agree to be bound by the terms, conditions and covenants [of the lease] ..., the same as if originally executed by them as Lessees." On March 24, 1959, the plaintiffs sold the business to Clyde B. Wright and assigned the lease to him. In the document embodying the assignment was an agreement executed by Wright wherein he undertook "to assume and be bound by all of the terms and conditions of the said Lease which the Lessee therein agrees to be made and performed." The consent of the defendant lessor was expressed in the following language: "The undersigned Lessor hereby consents to the above Assignment of Lease to Clyde B. Wright waiving none of his and/or her rights thereunder as to the Lessee or the Assignee." The nature of the controversy is indicated by the following findings of fact of the trial court: 1. The rent due on September 1, 1959, was not paid. 2. On September 16, 1959, the defendant lessor discovered that the premises had been vacated by Wright and the defendant entered the premises after having a door opened by a locksmith. [fn. 1] 3. Since September 16, 1959, the defendant has refused to deliver possession of the premises to the plaintiffs. 4. After September 16, 1959, the defendant removed the fixtures and equipment from the premises *308 and stored them for "the account of Soskin and/or Plaintiffs who then and there were the holders of chattel mortgages against said personal property." The pertinent evidence before the trial court will be stated. Mr. Flynn, one of the plaintiffs, testified that he and his wife entered into possession of the premises about August 1958. The premises consisted of a "beer bar cafe" and living quarters. As part of their transaction of purchase, the Flynns executed a chattel mortgage in favor of Soskin on property used in the business. Thereafter Wright took possession (he having purchased the business from the Flynns and the lease having been assigned to him by them). On subsequent occasions the plaintiffs went to the premises to try to collect money which Wright owed to them on an obligation secured by a second chattel mortgage on the equipment of the business. [1a] On September 16, 1959, Mr. Flynn went there; the premises were closed and Wright was absent therefrom. The defendant was present and he talked to her. They watched the locksmith open the door and then they entered. Mr. Flynn did not notice the presence of any personal effects of Mr. Wright. When asked if he saw "any beer or any stock at all," Mr. Flynn's reply was that he saw a lot of empty bottles. He further testified that he asked the defendant how much money Wright owed her and she said that it was the amount of the rent for one month. After she stated that the only matter in which she was interested was the rent, he said that he would take care of it in a few days and he left. On cross-examination, Mr. Flynn testified that she did not say he could go back into the premises "in those words" and she did not say she would accept the rent from him. Thereafter the plaintiffs sent a check dated September 19, 1959, to the defendant for the sum of $220, the amount of the monthly rent. The defendant returned the check, enclosing it with a letter dated September 21 in which she stated that there had been some misunderstanding, that the rent had not been paid since August 1, 1959, and that "inasmuch as I have been required to repossess the property for nonpayment of rent, the lease has been forfeited." In a letter dated October 7, 1959, and addressed to Mr. Soskin and the plaintiffs by an attorney acting on behalf of the defendant, it was stated that the communication was to notify the addressees "that because of failure to pay rentals for the above referred to property and the abandonment thereof by *309 the Lessee, the owner of the property was required to reenter the property and terminate the lease thereon." It was further stated that a new lease had been made and that if the furniture, fixtures and equipment were not removed within five days, the defendant would cause that property to be removed and stored "at the Lessee's expense and account." In a prior letter of September 29, 1959, addressed to the same persons, the attorney had stated that the personal property was being held as security for the payment of rent due since July 1, 1959, and "also for the payment of damages to the said real property by the tenants." Later, after such property had been stored in a garage, Mr. Soskin, the plaintiffs' mortgagee, took possession of it. Mr. Flynn testified that his attorney obtained Wright's signature to a document dated September 19, 1959, part of which was as follows: "That the assignment of lease executed March 24, 1959, ... on the above mentioned premises from [plaintiffs] ... to Clyde B. Wright, is hereby cancelled and rescinded and is of no force and effect." Thereafter the plaintiffs demanded, in writing, that possession of the premises be given to them by the defendant. The defendant was called as a witness by the plaintiffs pursuant to the provisions of section 2055 of the Code of Civil Procedure. She testified that on September 16, 1959, Mr. Flynn walked up to her and said that he knew that Mr. Wright had abandoned the place; Mr. Soskin had so informed him. He asked her if he could come back and operate the business and she told him that he could not. She testified in part as follows: "A. This is what I was saying. Mr. Flynn wasn't saying anything. I said, 'This is the kind of people you recommend for me, to tell me they are good people; that they will do good business; they are going to be good tenant.' And I said, 'This is what they give me in short time.' I said, I said, 'This is really bad.' I said, 'This is unfair.' I just started crying. ... A. It was way after we went upstairs. We look[ed] all around the apartment where I really was deeply hurt more than ever. And he asked me if he___ 'Has he been paying the rent?' I said, 'No kind of money mean[s] anything on this kind of condition.' I said, 'Even if he'd pay rent,' I said, 'that don't mean nothing.' I said-- he says if I let him to come back to run the place, everything will be all right. Right then, I tell Mr. Flynn, I said, 'Well, Mr. Flynn,' I said, 'Well, Mr. Flynn,' I said, 'I don't want you or your kind of people to deal with. Look at all the experience, all *310 what I got here, 'I said." She further testified that after she removed and stored the fixtures and furnishings, Mr. Soskin and Mr. Flynn took the fixtures away. She said that the fixtures were not damaged in the course of being removed from her property. A lease of the nature of that in the present case has two aspects. While it is primarily a conveyance to the lessee of an interest in the real property, it also is contractual in nature. Two distinct sets of rights and obligations are created, one being those arising out of the relation of landlord and tenant and based on privity of estate and the other being those arising out of the express provisions of the lease and based on privity of contract. (Medico-Dental etc. Co. v. Horton & Converse, 21 Cal.2d 411, 418 [132 P.2d 457]; Goodman v. Jonas, 142 Cal.App.2d 775, 790 [299 P.2d 424]; Strecker v. Barnard, 109 Cal.App.2d 149, 152 [240 P.2d 345].) [2] By an assignment the lessee transfers all of his title and interest in the leasehold estate and retains no reversionary interest or right of reentry. (Hartman Ranch Co. v. Associated Oil Co., 10 Cal.2d 232, 242 [73 P.2d 1163]; Jeffers v. Easton, Eldridge & Co., 113 Cal. 345, 351-352 [45 P. 680]; Blumenberg v. Myres, 32 Cal. 93, 95 [91 Am.Dec. 560]; Williams v. Hinckley, 109 Cal.App. 574, 575 [293 P. 644]; Weintraub v. Weingart, 98 Cal.App. 690, 698-699 [277 P. 752]; see 30 Cal.Jur.2d, Landlord and Tenant, 219, p. 366.) [3] The assignor's privity of estate is thereby divested (see Barkhaus v. Producers Fruit Co., 192 Cal. 200, 205 [219 P. 435]; Mayer v. Dwiggins, 114 Neb. 184 [206 N.W. 744, 746, 42 A.L.R. 1102, 1105]), although ordinarily his contractual obligations to the lessor are not released even though the lessor consents to the assignment and the assignee expressly assumes the obligations of the lease. (De Hart v. Allen, 26 Cal.2d 829, 832 [161 P.2d 453]; Jordan v. Scott, 38 Cal.App. 739, 741 [177 P. 504].) [4] After the assignment there is privity of estate between the lessor and the assignee who enters the premises pursuant thereto. (Fanta v. Maddex, 80 Cal.App. 513, 516 [252 P. 630].) Acts of a lessee may give rise to a surrender or abandonment of the leased premises. [5] An abandonment occurs when the lessee vacates the premises with the intent to relinquish all rights therein. (See Martin v. Cassidy, 149 Cal.App.2d 106, 110-111 [307 P.2d 981]; Swigert v. Stafford, 85 Cal.App.2d 469, 472 [193 P.2d 106]; 1 Cal.Jur.2d, Abandonment, 2, 3, pp. 2-3; Joffe, Remedies of California Landlord upon Abandonment by Lessee, 35 So. Cal. L. Rev. 34, 35.) [6] As said *311 in Rognier v. Harnett, 45 Cal.App.2d 570 [14 P.2d 654], at page 574: "... if the landlord accepts a surrender or abandonment of leased premises that has already taken place with the intent to terminate the lease, the lease is terminated as effectually as if there had been a valid agreement of surrender in advance." (See also Bernard v. Renard, 175 Cal. 230, 233-234 [165 P. 694, 3 A.L.R. 1076]; Joffe, Remedies of California Landlord upon Abandonment by Lessee, supra, 35 So. Cal. L. Rev. 34, 37.) [7] Whether the evidence in the present case established the existence of the elements of an abandonment presented a question of fact. (See Martin v. Cassidy, supra, 149 Cal.App.2d 106, 111-112.) [8] Since the assignment passed all of the Flynns' title and interest in the leasehold estate to their assignee, Wright, there was no reason why subsequent conduct on his part could not result in a surrender or an abandonment of the premises. (See Mayer v. Dwiggins, supra, 114 Neb. 184 [206 N.W. 744, 748, 42 A.L.R. 1102, 1108].) [1b] The defendant lessor's testimony as to what occurred on the premises on September 16, 1959, as set forth hereinabove, was sufficient to sustain the inference that on that occasion she made known to Mr. Flynn her intention not to have any further dealings with him or with Mr. Wright. There was substantial evidence to support a determination not only that the assignee Wright had abandoned the premises [fn. 2] but that the defendant lessor had treated such abandonment as a surrender which she accepted with the intent thereby to terminate the lease. (See 30 Cal.Jur.2d, Landlord and Tenant, 270.) The fact that in her letter of September 21, 1959, the defendant referred to repossession of the property "for nonpayment of rent" did not bar such a determination since her reentry was justified because of such abandonment and since she retook possession with the intent to bring the lease to an end. The question remains as to whether there were any other facts in the present case which precluded a termination of the lease which would otherwise occur under such circumstances. [9] The plaintiffs, as assignors of the lease, retained no interest in the premises in the nature of a right of reentry which they could exercise in the event of an abandonment of the premises by Wright. (See Kandis v. Pusch, 86 Ind.App. 246 [155 N.E. 618, 619].) Consequently, there was no obligation *312 on the part of the defendant lessor to accept the check tendered by the plaintiffs instead of terminating the lease. [10] Such determination is not altered by reason of the document executed by the Flynns and Wright which bears the date of September 19, 1959, a copy of the body of which is set forth in the footnote. [fn. 3] That instrument appears to have been intended to evidence the terms of a settlement between the Flynns and Wright of their respective rights and obligations. It was a reasonable inference that prior to the acquisition by the Flynns of any claim of rights pursuant to that document, the defendant lessor, for the purpose of bringing the lease to an end, had treated the acts of Wright as a surrender of the premises. Consequently, Wright had no interest in the premises to transfer. The use of the language of rescission could not revive the Flynns' former interest; the real nature of the instrument appears to be that of an attempted reassignment. "The law always respects form less than substance." (Weintraub v. Weingart, supra, 98 Cal.App. 690, 698.) The defendant was not required to recognize or to consent to any such attempted reassignment. The judgment is affirmed. Shinn, P. J., concurred. Files, J., did not participate. "(1) That the assignment of lease executed March 24, 1959, assigning that certain lease dated November 6th, 1957, on the above mentioned premises from Ernest Flynn and Fabienne Flynn to Clyde B. Wright, is hereby cancelled and rescinded and is of no force and effect;" "(2) That escrow number BS 142-A opened on March 24, 1959, at the Security Escrow Company, 6554 Long Beach Boulevard, Long Beach, California, the bill of sale deposited by sellers therein, the $660.00 unsecured note and the chattel mortgage and note executed by Clyde B. Wright, buyer therein, in favor of sellers are hereby cancelled as of the date hereof, and in consideration of sellers retaining all monies heretofore paid by buyer, Clyde B. Wright, as stipulated damages, sellers will file for record a release of said chattel mortgage above mentioned." "(3) Each of the parties hereto in consideration hereof do hereby waive any claim against each other arising out of said escrow and sale above mentioned." NOTES [fn. 1] 1. In their opening brief the plaintiffs state: "At some period of time between August 31, 1959 and September 19, 1959 appellants [plaintiffs] learned that the fourth lessee, Wright, had abandoned the premises." (Emphasis added.) [fn. 2] 2. As noted in footnote 1 to this opinion, the plaintiffs have conceded that there was such an abandonment. [fn. 3] 3. "For Valuable Consideration and as part of the settlement between the parties hereto as to their respective rights in and to that certain business known as 'Green Oasis' at 6007 East Olympic Boulevard, Los Angeles 22, California, the parties hereto mutually agree as follows:
Methods for eavesdropping and tracking mobile phones and other mobile devices are known in the art. For example, eavesdropping devices, which force a mobile phone to transmit the International Mobile Subscriber Identifier (IMSI), are sometimes referred to as “IMSI catchers.” Examples of IMSI catching techniques are described, for example, by Strobel in “IMSI Catcher,” Jul. 13, 2007, by Asokan et al., in “Man-in-the-Middle Attacks in Tunneled Authentication protocols,” the 2003 Security Protocols Workshop, Cambridge, UK, Apr. 2-4, 2003, and by Meyer and Wetzel in “On the Impact of GSM Encryption and Man-in-the-Middle Attacks on the Security of Interoperating GSM/UMTS Networks,” proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Barcelona, Spain, Sep. 5-8, 2004, pages 2876-2883, which are all incorporated herein by reference. The communication between GSM mobile terminals and base transceiver stations (BTS) is encrypted using GSM encryption algorithms (A5/1, A5/2), which are described, for example, in “Instant Ciphertext-only Cryptanalysis of GSM Encrypted Communications,” Advances in Cryptology, Proceedings of Crypto 2003, Lecture Notes in Computer Science 2729, Springer-Verlag, 2003, pages 600-616, which is incorporated herein by reference. Recently, tools for creating IMSI catchers and deciphering these encryption algorithms were made public, for example within the open source projects of Open Source Mobile Communication Base Band (OsmocomBB), or Open Source GSM Baseband project. As a result, criminals and hackers can now overcome this encryption protection using commercially available hardware, in combination with rogue base stations, to create complete eavesdropping solutions and spoof innocent subscriber identities for their own purposes. The Open Source Mobile Communication Base Band (OsmocomBB), or Open Source GSM Baseband project, supports free software that can be uploaded to a mobile phone. The program configures a cellular phone to detect and report to the subscriber when the phone is being tracked by an IMSI catcher.
In a bit of a swing from the usual multi-platform exclusivity that Microsoft and the Xbox 360 usually hold on content, Assassin’s Creed: Revelations will have a multiplayer beta that will be made available on September 3rd exclusively on the PlayStation 3. The beta will be available to PlayStation Plus and UPlay members for the first week, and be available to all other users afterwards. In the beta players will be able to play four different game modes on three separate maps and as nine characters. The game modes that will be available are Wanted, Manhunt, Deathmatch, and Artifact Assault while the maps players will be climbing and running all over are Knight’s Hospital, Antioch, Constantinople. Alongside this announcement Ubisoft also released a bit of a refresher course for the Assassin’s Creed storyline in case you forgot anything about the past three games. Catch the video below.
Festivals & events 18th Rendez-vous with French Cinema in New York From February 28 through March 10, 2013, uniFrance Films and the Film Society of Lincoln Center will host the 18th annual Rendez-vous with French Cinema in New York. The event will open with a screening of Populaire by Régis Roinsard held in the presence of the director and cast members Romain Duris and Déborah François. The film has been acquired by the Weinstein Company and is slated for release in the summer. For the second year running, eight of these titles, along with Persecution by Patrice Chéreau, will be showcased as part of a homage to Romain Duris, in screenings organized in collaboration with Emerging Pictures in over 40 American cities at the same time as the New York screenings. Thanks to Skype, spectators in Los Angeles or Chicago will have the chance to converse with film crews in New York. A restored version of three films by Jean Renoir (Boudu, Le Fleuve, and La Règle du Jeu), and Thérèse Desqueyroux by Georges Franju, will also be screened as part of the festival, as well as a program of French short films.
Digestive capacities, inbreeding and growth capacities in juvenile Arctic charr Salvelinus alpinus. Genetic variation in growth performance was estimated in 26 families from two commercial strains of Arctic charr Salvelinus alpinus. Physiological determinants of growth and metabolic capacities were also assessed through enzymatic assays. A relatedness coefficient was attributed to each family using parental genotypes at seven microsatellite loci. After 15 months of growth, faster growing families had significantly lower relatedness coefficients than slower growing families, suggesting their value as indicators of growth potential. Individual fish that exhibited higher trypsin activity also displayed higher growth rate, suggesting that superior protein digestion capacities can be highly advantageous at early stages. Capacities to use amino acids as expressed by glutamate dehydrogenase (GDH) activities were lower in the liver of fast-growing fish (13-20%), whereas white muscle of fast-growing fish showed higher activities than that of slow-growing fish for amino acid metabolism and aerobic capacity [22-32% increase for citrate synthase (CS), aspartate aminotransferase (AAT) and GDH]. The generally higher glycolytic capacities (PK and LDH) in white muscle of fast-growing fish indicated higher burst swimming capacities and hence better access to food.
Our Lady of Fatima - First Saturdays of Reparation This devotion was first revealed during the visions at Fatima to the 3 young Portuguese children to whom the Blessed Virgin Mary appeared in 1917 – Lucia Santos and her cousins, Jacinta and Francisco Marto. Our Lady asked that the First Saturday of every month become a day of prayer for the reparation of sin. In another vision in 1925, Our Lady specified the exact nature of the devotion. The devotion is practiced on the First Saturday of each month for 5 consecutive months, by doing the following and offering it to the Immaculate Heart of Mary for the conversion of sinners and the reparation of offenses:  Spend 15 minutes with Our Blessed Mother by meditating on the Mysteries of the Rosary Please join us at 8:00 AM morning Mass on the First Saturday of each month, starting 10/7/17, and pray the Rosary after Mass as a Parish family, in order that we may honor this devotion as requested by Our Lady. (*Members of the St. Joseph and St. Stanislaus Living Rosary and Holy Name Societies have offered to lead our Rosary as we begin this devotion; anyone else is welcome to do so but should not feel obligated to lead. ALL are strongly encouraged to attend, and be assured what a difference our prayers can and will make.)
#include "splittercore.h" #include <QStandardItemModel> #include <QDebug> #include <QFileInfo> #include "splitterwidget.h" #include "partprocessor.h" #include "easylogging++.h" SplitterCore::SplitterCore(QStandardItemModel* fileModel, QObject* parent, SplitterWidget* parentWidget) :QThread(parent), fileModel (fileModel), parent(parentWidget){ } void SplitterCore::run(void) { QString sourceFilename; QString destinationDir; int parts; qint32 sizeOfFilePart; qint32 sizeOfLastPart; qint32 fileSize = 0; qint32 size = 0; qint32 offset = 0; PartProcessor* core; QFileInfo fileInfo; cancelled = false; for (int i = 0; i < fileModel->rowCount(); i++) { qDeleteAll(this->splitJoinCores.begin(), this->splitJoinCores.end()); this->splitJoinCores.clear(); if (!cancelled) { sourceFilename = fileModel->data(fileModel->index(i,0)).toString(); fileInfo.setFile(sourceFilename); destinationDir = fileModel->data(fileModel->index(i,1)).toString() + "/" + fileInfo.fileName(); parts = fileModel->data(fileModel->index(i, 3)).toInt(); offset = 0; LOG(INFO) << "Splitting " << sourceFilename.toStdString() << " into " << parts << " parts to " << destinationDir.toStdString(); fileSize = fileModel->index(i, 4).data().toDouble(); sizeOfFilePart = fileSize / parts; sizeOfLastPart = sizeOfFilePart * parts == fileSize ? sizeOfFilePart : sizeOfFilePart + 1; emit fileStarted(i, sourceFilename, destinationDir, parts); for (int p = 1; p <= parts; p++) { offset += p == 1 ? 0 : sizeOfFilePart; size = p < parts ? sizeOfFilePart : sizeOfLastPart; QModelIndex index = fileModel->index(i, 2); core = new PartProcessor(sourceFilename, destinationDir, offset, size, fileSize, p, index, PartProcessor::kSplit, this); connect(core, SIGNAL(updated(PartProcessor*)), this, SIGNAL(updated(PartProcessor*))); connect(core, SIGNAL(started(PartProcessor*)), this, SIGNAL(started(PartProcessor*))); connect(core, SIGNAL(finished(PartProcessor*)), this, SIGNAL(finished(PartProcessor*))); this->splitJoinCores.push_back(core); } for (int pid = 0; pid < splitJoinCores.size(); pid++) { splitJoinCores.at(pid)->start(); } for (int pid = 0; pid < splitJoinCores.size(); pid++) { splitJoinCores.at(pid)->wait(); } emit fileCompleted(i); } else { qDeleteAll(this->splitJoinCores.begin(), this->splitJoinCores.end()); this->splitJoinCores.clear(); } } LOG(INFO) << "Finished splitting all files!"; } void SplitterCore::pause(void) { for (int i = 0; i < splitJoinCores.size(); i++) { splitJoinCores.at(i)->pause(); } } void SplitterCore::resume(void) { for (int i = 0; i < splitJoinCores.size(); i++) { splitJoinCores.at(i)->resume(); } } void SplitterCore::cancel(void) { this->cancelled = true; for (int i = 0; i < splitJoinCores.size(); i++) { splitJoinCores.at(i)->cancel(); } } bool SplitterCore::paused(void) const { for (int i = 0; i < splitJoinCores.size(); i++) { if (splitJoinCores.at(i)->paused()) return true; } return false; }
{ "class": "Workflow", "cwlVersion": "v1.0", "id": "count-lines1-wf.cwl", "inputs": [ { "id": "count-lines1-wf.cwl#step1_output", "type": "File" } ], "outputs": [ { "id": "count-lines1-wf.cwl#output4", "outputSource": "count-lines1-wf.cwl#step4/output", "type": "int" } ], "steps": [ { "id": "count-lines1-wf.cwl#step4", "in": [ { "id": "count-lines1-wf.cwl#step4/file1", "source": "count-lines1-wf.cwl#step1_output" } ], "label": "step that also depends on step1", "out": [ "count-lines1-wf.cwl#step4/output" ], "run": "parseInt-tool.cwl" } ] }
Prognostic implication of serum vascular endothelial growth factor in advanced hepatocellular carcinoma staging. Staging systems have considerable impact on hepatocellular carcinoma (HCC) treatment approaches and outcomes. There is an unmet need to improve their stratification ability. We have evaluated four commonly used staging systems and assessed whether angiogenic biomarker vascular endothelial growth factor (VEGF) could improve their prognostic stratification. Four staging systems; Okuda, Cancer of the Liver Italian Program (CLIP), Barcelona Clinic Liver Cancer (BCLC), and Child-Pugh were evaluated in 78 HCC patients; their stratification abilities were detected by Kaplan-Meier curves and log-rank test; their accuracies of predicting survival were compared with the concordance index. Serum VEGF levels were measured using ELISA method. Recursive partitioning was used to determine the optimal VEGF cutoff. The prognostic significance of VEGF cutoff and other parameters were analyzed using univariate and multivariate models. None of the staging systems demonstrated better discriminatory ability in predicting survival. The four staging systems did not reveal significant differences in probability of survival across their intermediate-advanced stages. Optimal cutoff identified for VEGF was 445 pg/mL. In advanced HCC, VEGF level (p = 0.004) and in early HCC, bilirubin level (p = 0.009) were identified as the independent prognostic factors. Survival comparison with high and low VEGF levels was significant for advanced HCC, while insignificant for early disease. Staging systems with conventional parameters did not provide good prognostic stratification for survival in advanced HCC population. Serum VEGF level was an independent predictor of survival in advanced HCC, and provided more survival homogeneity within the advanced stages of conventional staging systems.
--- author: - Pierre Barge - 'L. Ricci' - 'C. L. Carilli' - 'R. Previn-Ratnasingam' bibliography: - 'giant.bib' date: 'Version 0.1' title: Gap and rings carved by vortices in protoplanetary dust --- [Large-scale vortices in protoplanetary disks are thought to form and survive for long periods of time. Hence, they can significantly change the global disk evolution and particularly the distribution of the solid particles embedded in the gas, possibly explaining asymmetries and dust concentrations recently observed at sub-millimeter and millimeter wavelengths.]{} [We investigate the spatial distribution of dust grains using a simple model of protoplanetary disk hosted by a giant gaseous vortex. We explore the dependence of the results on grain size and deduce possible consequences and predictions for observations of the dust thermal emission at sub-millimeter and millimeter wavelengths.]{} [Global 2D simulations with a bi-fluid code are used to follow the evolution of a single population of solid particles aerodynamically coupled to the gas. Possible observational signatures of the dust thermal emission are obtained using simulators of ALMA and ngVLA observations. ]{} [We find that a giant vortex not only captures dust grains with Stokes number $St < 1$ but can also affect the distribution of larger grains (with $St \sim 1$) carving a gap associated to a ring composed of incompletely trapped particles. The results are presented for different particle size and associated to their possible signatures in disk observations.]{} [Gap clearing in the dust spatial distribution could be due to the interaction with a giant gaseous vortex and their associated spiral waves, without the gravitational assistance of a planet. Hence, strong dust concentrations at short sub-mm wavelengths associated with a gap and an irregular ring at longer mm and cm wavelengths could indicate the presence of an unseen gaseous vortex. ]{} Introduction ============ The trapping of solid particles in gaseous vortices and its consequences on planet formation is an issue investigated today by many authors. Vortices in protoplanetary disks can be produced by various mechanisms like inverse cascade in two-dimensional geometries or specific 2D/3D instabilities like the Rossby wave or the baroclinic instability.Three-dimensional studies have confirmed that such vortices can form and survive in spite of the elliptical instability that predominantly affects the core of the vortices [@Lesur2010; @Richard2013]. Ultimately, they can be depicted as quasi-2D structures with a nearly stationary evolution. In two-dimensional Keplerian flows, vortices are known to capture very effectively the solid particles embedded in the gas [@Barge95]. The trapping mechanism is so efficient that particle concentration can be strong enough for significant back-reaction of the solid particles onto the gas. Dust feedback makes possible the growth of instabilities like Rayleigh-Taylor [@chang2010], Kelvin-Helmoltz [@johansen2006], or streaming [@youdin2007]. In vortices, the confinement of the solid particles was recently addressed by @Fu2014 [@Raettig2015; @Crnkovic2015; @Baruteau2016; @Surville2016].\ Here, our paper focuses on the global distribution of the solid particles in a disk hosting a persistent gaseous vortex but does not study the detailed complex evolution inside the vortex core which will be addressed elsewhere. Our goal is to explore how a giant vortex can impact the dust surface density of a protoplanetary disk at a global scale.\ The most appropriate place for the formation and survival of these vortices are the optically thick regions of the disk where MRI is ineffective due to the weak ionization levels of the gas. For example, the boundary between the dead-zone and the turbulent inner regions has attracted a special interest since it can be the place of a density enhancement with the possible growth of the Rossby wave instability [@Lovelace99; @Li2001; @Varniere2006]. A study of these disk outer regions has an additional interest since it can be confronted to circumstellar disk observations, particularly with the new generation of high-resolution instruments. Interferometric observations at sub-millimeter to centimeter wavelengths probe material in the disk with enough angular resolution to highlight asymmetries due to the presence of vortices. Whereas images with high signal-to-noise in spectral line typically probe molecular gas in the disk upper layers because of the high optical depths, imaging of the dust thermal emission allows to investigate the spatial distribution of dust particles in the disk midplane, where vortices are expected to form. Strong azimuthal asymmetries in the dust thermal emission have been observed in a number of young disks at sub-millimeter and millimeter wavelengths, [e.g.]{}  Oph IRS 48 [@Marel2013; @Marel2015] , LkH$\alpha$ 330 [@Isella2013], HD 142527 [@Casassus2013], SAO 206462, SR 21 [@Perez2014]. Such asymmetries are often attributed to dust trapped in large-scale vortices which are able to collect large amounts of dust grains with sizes of the order of $\sim 1$ mm. Another indirect way to detect vortices in disks is the fortuitous eclipses of a young star by the trapped dust in a highly inclined disk [@bar2003; @grinin].\ In this paper, numerical simulations are performed to follow the evolution of dust particles embedded in a gas disk that contains a vortex. The solid particles are aerodynamically coupled to the gas and the presence of the vortex is found to significantly change their global distribution around the star. Depending on their size, the particles are either (i) captured and concentrated inside the vortex [@Barge95; @Fuente2001; @Chavanis2000] or (ii) repelled from the vortex orbital radius where a gap forms. The carving of a gap in the dust distribution is a forgotten consequence of the dust/vortex interaction that we qualitatively present and discuss in this work. The results of the numerical simulations are presented in the form of surface density maps to make easier confrontations with the observations. They are also illustrated and corroborated by computing the trajectories of passive solid particles in a steady velocity field. Global simulations and trajectory computations were performed for a wide range of particle sizes. The paper is presented as follows: Section 2 describes the disk/vortex model and the bi-fluid numerical simulations; Section 3 presents the main results of the numerical simulations and the density maps; Section 4 describes the dust vortex interactions explaining the different structures observed in the dust distribution; Section 5 presents simulated observations derived from the density and temperature maps using ALMA and ngVLA simulators. The results of the simulated observations are discussed in Section 6, and the main results of this investigation are summarized in Section 7.  Models and numerical simulations {#simu} ================================ To study the evolution of the dust spatial distribution we performed 2D numerical simulations with a bi-fluid (gas$+$dust) code and use a simple model of protoplanetary disk in the following framework:\ (i) the disk extends from 20 to 100 AU from the central star, a large enough region to get predictions that can be compared with the observations;\ (ii) the surface density and the temperature of the “background" structure of the disk, i.e. before a vortex is introduced, are given by simple power-laws: $\Sigma \propto r^{-p}$ and $T \propto r^{-q}$, respectively;\ (iii) the gas is assumed to be a mixture of hydrogen and helium with a mean molecular weight $\mu =2.34 m_H$ where $m_H$ is the mass of an hydrogen atom;\ (iv) the dust is described as spherical particles with varying sizes 0.04 mm $< s <$ 2cm and volume density of $\rho_\circ=$ 0.8 g cm$^{-3}$, similar to the dust model considered by @Tazzari2016;\ (v) the vortex is introduced at the beginning of the simulation in the form of an approximate solution of the incompressible Euler’s equations. Disk parameters --------------- The disk model we used discards the standard MMSN assumption and rests on recent observations of protoplanetary disks. We have chosen the primordial disk around the Oph IRS 48 young star as our reference case. This disk shows the strongest asymmetry in the azimuthal distribution of dust particles in a disk observed to date, which could be the signature of mm- and cm-sized dust trapped by a large-scale vortex [@Marel2013; @Marel2015; @Lyra2014; @Zhu2014]. The required parameters for the disk model are then deduced from the observations of this peculiar object. The analysis of the ALMA observations of the dust continuum emission and CO isotopologues allowed @Bruderer2014 to derive a model for the radial profile of the gas distribution in the regions out of the vortex. Although it is not our goal to find a model that reproduces in detail the observations for this disk, we use this case as a fiducial case to investigate the effects of a giant vortex on the global distribution of gas and dust in a real disk system. Following @Bruderer2014, the radial profile of the gas surface density can be described by a power-law function with index $p=1.1$. We consider a gas surface density of 0.32 g cm$^{-2}$ at 60 AU from the star, which is the radial distance of the vortex structure as seen in the Oph IRS 48 disk [@Marel2013]. This is a factor of 10 greater than the value for the gas density considered in @Bruderer2014 at the same location in the disk. We chose this larger value because subsequent radiative transfer modeling of disks has shown that masses derived from observations of CO isotopologues can increase by up to an order of magnitude when one properly treats the isotope-selective photodissociation of these molecules [@Miotello2014; @Miotello2016]. On the other hand, the radial profile of the gas temperature is a power-law with an index of $q = 0.56$, with a value of 100 K at 60 AU (top right panel of Figure 8 in @Bruderer2014). The vertical scale height of the disk is derived from hydrostatic equilibrium at this temperature and the gravitational potential is for a 2 solar-mass star. For the particles, different sizes are considered in the present work. We have chosen grain sizes that range from 0.04 mm to 6.4 mm to predict maps for the dust continuum emission at different wavelengths between $\lambda =$ 0.45 mm and 0.9 cm, which can be probed at high angular resolution and sensitivity with the ALMA and future ngVLA interferometers. Although the observed emission realistically comes from a combination of grains spanning several orders of magnitude in sizes, the most efficient emitting grains have sizes $s \approx \lambda / (2\pi |m|)$, where $m$ is the refractive index of the emitting dust [$m \approx 2 - 3$ for dust in protoplanetary disks, [e.g.]{}  @Rodmann2006]. The simulations performed in this paper allow us to explore the dependance of the dust/gas friction on the dust/vortex interaction and its consequence on the dust surface density and thermal emission. The initial distribution of the dust is assumed to trace the distribution of the gas with a dust-to-gas mass ratio equal to 0.001 across the whole disk (simulations performed with a mass ratio of $0.01$ are also presented in Appendix A).\ Vortex model {#vort-mod} ------------ In this work we disregard the problem of vortex formation in a disk which has been addressed elsewhere [[e.g.]{}  @Richard2013; @Barge2016]. Hence, the vortex is introduced at the beginning of the simulations and, in a few rotations, adjusts to a quasi-steady vortex structure that lasts long enough to significantly perturb the motion of the dust particles. 2D vortices are, indeed, quasi-steady gaseous structures that can survive over very long time periods, up to thousands of vortex rotations around the star [@Surville2015]. Their lifetime in numerical simulations is shorter when dust is included in the disk due to the gas drag, but the present simulations show that the vortices can survive long enough to significantly change the dust surface density and to imprint observable structures in the disks.\ For the initial conditions we used a simple model of Rossby vortex developed by @Surville2015. The control parameters of the vortices were selected to get vortices in the “giant vortex class” in order to mimic the large and strong dust asymmetries observed in a number of disks [[e.g.]{}  @Casassus2013; @Marel2013; @Marino2015]. In this model the gaseous vortex is centered on ($r_0$, $\theta_0$) in polar coordinates and is described with a pseudo enthalpy $\mathcal{H}(r,\theta )$ approximated by a two-dimensional gaussian function parametrized by an amplitude $\mathcal{H}_0$ and two widths $\delta r=r_0\chi_r$ and $\delta \theta=\chi_r \chi_\theta$, where $\chi_r$ is the normalized radial extent of the vortex and $\chi_\theta$ is its azimuthal aspect ratio. This function is maximum at the vortex center and smoothly connects to zero at the background level.\ With this Gaussian approximation we found simple expressions for the velocity field of a gaseous vortex when considered in a frame of reference rotating at the mean angular velocity of the flow $\Omega_o$ \[vort-field\] $$\begin{aligned} u & = \frac{1}{Ro} \frac{\theta -\theta_0}{\delta \theta^2} ~{{\mathcal{H} }\over {r\Omega_K}} & \\ v & = \left[ - r\left({ r - {r_0}}\over{\delta r^2}\right) + \frac{(1- \gamma) p + q} {2\gamma} \right]{{\mathcal{H} }\over {r\Omega_K}} \end{aligned}$$ where $Ro$ is the Rossby number at the vortex center and $\gamma=1.4$ is the adiabatic index of the gas (the second term in the bracket is zero for an isentropic vortex). At the beginning of the simulations the vortex is characterized by $Ro= 0.1$, $\chi_r =0.15 $ and $\chi_\theta =6.9 $. This structure is added on top the equilibrium state of the disk, centered at a distance of 60 AU from the star. The evolution of gas and dust is then provided by a numerical integration of standard fluid equations (see for example @Inaba2005). Numerical Simulations --------------------- The simulations are performed with a bi-fluid code in which the solid component is considered as a fluid without pressure. This approximation requires that Stokes number and dust-to-gas mass ratio be smaller than one [@Garaud2004]. In our problem the two conditions are satisfied except (i) if the particle size is larger than one centimeter or (ii) in the core of the vortex and close to its orbital radius where dust strongly accumulates. The code was previously developed to study the dynamical evolution of protoplanetary disks [@Inaba2005; @Surville2015]. It solves the inviscid continuity and Euler’s equations vertically integrated over the disk thickness. At equilibrium, the gas rotates at slightly less than the Keplerian velocity, due to the radial pressure gradient, with an angular velocity\ $$\Omega_o(r) = \Omega_K(r) \left( 1 - \eta \right)^{1\over 2}$$ where $\eta = {{p+q}\over \gamma} {M_A^{-2}(r)} $ and $M_A$ is the Mach number; the flow is also assumed compressible and adiabatic but non-homentropic. The solid particles are fully coupled to the gas by aerodynamical drag forces in the Epstein’s regime and characterized by a non dimensional parameter or Stokes number$$St = {\pi \over 4} {{s \rho_\circ}\over \Sigma(r) }~.$$ In a gas disk at equilibrium a solid particle drifts inward to the star due to the pressure gradient; its radial velocity is approximately given by $$u_{dust} = { {St}\over{1 +St^2}} {\eta r\Omega_K},$$ that displays a maximum at $St$=1 [[e.g.]{}  @Nakagawa1986; @Inaba2005].\ We start the simulations from a two-component disk model at equilibrium on top of which the vortex solution presented in the above model is added. The simulations are performed in a whole ring around the star, large enough to get significant changes in the radial distribution of the dust.\ The code was already used to study the formation of vortices by the Rossby-Wave or the baroclinic instability [@Richard2013; @Barge2016] but also to study the coupled evolution of gas and dust [@Inaba2006]. This code, which uses the finite volume method and was first presented in @Inaba2005 can keep high accuracy over large integration periods [@Surville2015; @Surville2016].\ Test simulations show a three step evolution: (i) the approximate vortex-solution adjusts in the flow to a vortex that numerically satisfies the fluid equations in $\sim$10 vortex rotations, (ii) the formed vortex survive in the disk for hundreds of vortex rotations, (iii) the vortex is progressively destroyed by the back-reaction of the solid particles on a longer time scale.\ The total duration of the integrations necessary for our simulations was determined from a compromise between the vortex lifetime and the time necessary for the vortex to capture and trap significant amount of solid particles. It was, then, empirically set up to 100 orbital periods of the vortex around the star.\ The numerical resolution is (2048$\times$4080) in the $(r,\theta)$ directions, sufficient to correctly describe particle captures by the vortex. In the radial direction, the resolution corresponds to 274 cells by scale height at 60 AU from the star. Simulations were performed for different values of the particle size.\ Main results of the numerical simulations ========================================= The simulations provide the spatial distribution of the dust particles after $100$ rotations of the vortex around the star. The results are discussed as a function of the particle size or the Stokes number estimated at the radial position of the vortex. ![image](0,0046cm-2.jpg){width="5.8cm"} ![image](0,0092cm-2.jpg){width="5.8cm"} ![image](0,014cm-2.jpg){width="5.8cm"}![image](0,032cm-2.jpg){width="5.8cm"} ![image](0,0740cm-2.jpg){width="5.8cm"} ![image](0,100cm-2.jpg){width="5.8cm"}![image](0,200cm-2.jpg){width="5.8cm"} ![image](0,640cm-2.jpg){width="5.8cm"} ![image](2,00cm-2.jpg){width="5.8cm"} ![image](Echelle.jpg){width="1.2cm" height="3cm"} Global distribution of the dust {#result} ------------------------------- Figure \[map\] shows the density map of the dust for different values of the particle size on which we note a number of striking features.\ (1) Sub-millimeter sized particles ($St \lesssim 0.063$) concentrate in a regularly-shaped region centered on the vortex core (as commonly expected for passive particles).\ (2) Millimeter sized particles ($0.063\lesssim St \sim 1$) concentrate in an irregular and inhomogeneous core-region (containing dust knots) while a gap is carved just inside the vortex orbital radius (gap depth increasing with particle size).\ (3) Centimeter size particles ($ 1\lesssim St$) are strongly depleted inside the vortex orbital-radius but concentrate in a narrow and knotted structure (arc or ring) where the dust-to-gas mass ratio can overcome unity (see Figs. [\[zoom2\]]{} and [\[zoom3\]]{}).\ In this last case we deliberately transgress some of our initial assumptions to explore weaker coupling with the gas avoiding complex developments or the use of a different code.\ Yet, we note a piling up of the solid particles at the inner boundary of the simulated ring due to the decrease of the drift velocity with the distance to the star; a similar effect occurs at the outer boundary for particle sizes of 0.14 mm and 0.32 mm but it could result from a numerical artefact. Evolution of the dust particles ------------------------------- Our simulations also provide a step by step description of the dynamical evolution of the dust particles. Three different cases have been distinguished following the values of the Stokes number.\ \ $\bullet$ “Light” particles ($St < 1$)\ These particles are directly captured by the vortex and confined for a long time in its core where the dust-to-gas ratio can overcome unity allowing a significant back-reaction of the particles onto the gas. Figure \[zoom1\] shows the concentration of millimeter-sized particles in the core of the vortex with the formation of a high-density knot that becomes turbulent under dust/gas instabilities. After about 40 rotations the dust surface density has a strong jump at the orbital radius of the vortex and the formed gap presents a layered structure. Ridges correspond to a spiral lane of non-captured particles that are slowly drifting inward toward the star.\ The density contours of the gas are plotted on the same figure and indicate (i) the position of the vortex (concentric elliptical paths) and (ii) the position of density waves associated to the vortex (oblique rays at the top and bottom of the figure). The contours are noisy but their large scale deformations, after $100$ rotations, reveal vortex stretching and turbulent motions due to the back-reaction of the particles onto the gas.\ ![Dust-to-gas ratio for light particles of size $s=$ 2 mm. The map is plotted in the $(r,\theta)$ plane and the evolution is shown after $20$, $40$ and $100$ rotations of the vortex, from left to right and from top to bottom, respectively. Units of x- and y-axes are AU and radians, respectively.[]{data-label="zoom1"}](Dust-gas-021-02cm.png "fig:"){width="4.5cm"} ![Dust-to-gas ratio for light particles of size $s=$ 2 mm. The map is plotted in the $(r,\theta)$ plane and the evolution is shown after $20$, $40$ and $100$ rotations of the vortex, from left to right and from top to bottom, respectively. Units of x- and y-axes are AU and radians, respectively.[]{data-label="zoom1"}](Dust-gas-041-02cm.png "fig:"){width="4.5cm"}\ ![Dust-to-gas ratio for light particles of size $s=$ 2 mm. The map is plotted in the $(r,\theta)$ plane and the evolution is shown after $20$, $40$ and $100$ rotations of the vortex, from left to right and from top to bottom, respectively. Units of x- and y-axes are AU and radians, respectively.[]{data-label="zoom1"}](Dust-gas-101-02cm.png "fig:"){width="9.cm"} \ $\bullet$ “Optimal” particles ($St \sim 1$)\ The capture efficiency is the most effective for particles with $St\simeq 1$. Such particles rapidly concentrate in a small region of the vortex core (Figure \[zoom2\]), which is turbulent due the back-reaction of the particles. In the inner part of the disk the gap is deeper than for lighter particles and also presents a layered structure.\ In this case, the back reaction of the particles onto the gas is strong enough to significantly change the vortex shape after $100$ rotations.\ ![Dust-to-gas ratio for nearly optimal particles after $20$, $40$ and $100$ rotations of the vortex. The particle size is $s=$ 6.4 mm. Layout is the same as in Fig. \[zoom1\]. []{data-label="zoom2"}](Dust-gas-021-064cm.png "fig:"){width="4.5cm"} ![Dust-to-gas ratio for nearly optimal particles after $20$, $40$ and $100$ rotations of the vortex. The particle size is $s=$ 6.4 mm. Layout is the same as in Fig. \[zoom1\]. []{data-label="zoom2"}](Dust-gas-041-064cm.png "fig:"){width="4.5cm"}\ ![Dust-to-gas ratio for nearly optimal particles after $20$, $40$ and $100$ rotations of the vortex. The particle size is $s=$ 6.4 mm. Layout is the same as in Fig. \[zoom1\]. []{data-label="zoom2"}](Dust-gas-101-064cm.png "fig:"){width="9.cm"} \ $\bullet$ [“Over-optimal" particles]{} ($St \gtrsim 1$)\ Particles in the centimeter range marginally violate our initial assumptions but permit to explore dust/gas evolution for weaker coupling. The vortex shape is less affected than for smaller particles (cf. Fig. \[zoom3\]). The particles focus in a very small region of the disk that looks like a knotted arc close to the orbital radius of the vortex. This structure evolves in an annular chain of high-density knots which individually covers a surface of the order of $1\times4 AU^2$ or 25$\times$40 numerical cells. Similar concentrations of particles were also observed in simulations performed by @Surville2016 when $St\sim 0.1$. Inside this radius the surface density decreases dramatically like in the previous case with also the formation of a gap and its layered structure.\ ![Dust-to-gas ratio for a particle size of $s=$ 2 cm after $20$, $40$ and $100$ rotations of the vortex; same layout as in Fig. \[zoom1\]. []{data-label="zoom3"}](Dust-gas-021-2cm.png "fig:"){width="4.5cm"} ![Dust-to-gas ratio for a particle size of $s=$ 2 cm after $20$, $40$ and $100$ rotations of the vortex; same layout as in Fig. \[zoom1\]. []{data-label="zoom3"}](Dust-gas-041-2cm.png "fig:"){width="4.5cm"}\ ![Dust-to-gas ratio for a particle size of $s=$ 2 cm after $20$, $40$ and $100$ rotations of the vortex; same layout as in Fig. \[zoom1\]. []{data-label="zoom3"}](Dust-gas-101-2cm.png "fig:"){width="9.cm"} Dust/vortex interaction ======================= Our simulations show that the evolution of the solid particles and their distribution around the star strongly depends on the value of the Stokes number $St$. Particles are found either to be trapped and concentrated in the vortex or to form a high-density ring lining a strong density jump at the orbital-radius of the vortex. The capture by a vortex is a well known mechanism due to the local action of the Coriolis force. On the other hand, the carving of a gap with a strong density jump is a new output of the dust/vortex interaction that have to be explained. Here, we propose a number of carving mechanisms. Capture and radial drift ------------------------ In its motion around the star the vortex captures dust particles and concentrates them in its core. In a shearing sheet context particles are selected when their impact parameter is smaller than a threshold. There are also non-captured particles among which two classes can be distinguished: (i) outward particles that were too far from the vortex orbital radius to be captured, (ii) inner particles that were too slow to catch the vortex.\ In fact, due to the systematic inward drift, particles of the outward class have clearly a chance to be captured after a second turn of the vortex around the star; this obviously increases the capture efficiency of the vortex during its lifetime.\ Our simulations show that particles of the inward class are not inevitably lost into the star but have a chance to be captured during additional turns of the vortex around the star. This mechanism concerns the particles that were not rapidly trapped by the vortex and are tracing a spiral wake in the disk.\ Figure [\[wake1\]]{} shows the various steps of this mechanism with a dust lane that distorts gradually when approaching the vortex and that finally rolls up around the vortex core. This secondary trapping is observed all along the vortex lifetime and systematically feeds the vortex with particles of the inner disk.\ ![A dust lane in the vortex’s wake that spirals around the star and is progressively captured by the vortex. The dust to gas ratio for particles with size $s=$ 2 mm is plotted after 5, 7, 8, and 9 rotations of the vortex, from left to right and from top to bottom, respectively.[]{data-label="wake1"}](wak-02cm-5-1.png "fig:"){width="4.02cm"} ![A dust lane in the vortex’s wake that spirals around the star and is progressively captured by the vortex. The dust to gas ratio for particles with size $s=$ 2 mm is plotted after 5, 7, 8, and 9 rotations of the vortex, from left to right and from top to bottom, respectively.[]{data-label="wake1"}](wak-02cm-7-1.png "fig:"){width="4.02cm"} ![A dust lane in the vortex’s wake that spirals around the star and is progressively captured by the vortex. The dust to gas ratio for particles with size $s=$ 2 mm is plotted after 5, 7, 8, and 9 rotations of the vortex, from left to right and from top to bottom, respectively.[]{data-label="wake1"}](wak-02cm-8-1.png "fig:"){width="4.02cm"} ![A dust lane in the vortex’s wake that spirals around the star and is progressively captured by the vortex. The dust to gas ratio for particles with size $s=$ 2 mm is plotted after 5, 7, 8, and 9 rotations of the vortex, from left to right and from top to bottom, respectively.[]{data-label="wake1"}](wak-02cm-9-1.png "fig:"){width="4.02cm"} ![A dust lane in the vortex’s wake that spirals around the star and is progressively captured by the vortex. The dust to gas ratio for particles with size $s=$ 2 mm is plotted after 5, 7, 8, and 9 rotations of the vortex, from left to right and from top to bottom, respectively.[]{data-label="wake1"}](colorbox.jpg){width="0.8cm" height="4.2cm"} As a result, the systematic drift of the solid particles toward the star has a major role in the carving of a gap in the dust distribution. On the one hand, it contributes to a strong depletion of the inner disk due, both, to the systematic drift toward the star and to the secondary trapping by the vortex. By contrast, in the outer disk, the depletion by the vortex can be balanced by the inward flux of solid particles that are crossing the outer boundary of the computational box. Indeed, in our simulations the outer boundary must be considered as a permeable frontier for external particles since they are also drifting inward toward the star. Collective drag ---------------- At a given stage, dust trapping becomes strong enough that collective effects and back-reaction on the gas are coming into play; so, the dust concentration is dragged away and other concentrations are forming. They are in turn pulled away from the vortex and tend to form a knotted ring (see Fig. \[zoom3\]).\ Trajectories of the dust particles {#traject} ---------------------------------- The dust surface density in the presence of a vortex can be also studied in term of the dynamical evolution of dust particles. A simple approach of the problem is to use a vortex model as described in section (\[vort-mod\]). In a frame of reference rotating at the angular velocity of the flow, the dynamical evolution of passive solid particles can be described by the motion equations: \[motion\] $$\begin{aligned} \ddot{r} - r \dot {\theta}^2 ~~~ & = -{ {\Omega_K}\over{St} }( \dot{r} -u) + 2\Omega_o r \dot{\theta} + \Omega_o^2 r - { {GM_*} \over{r^2} } \\ r \ddot{\theta} + 2 \dot{r} \dot{\theta} & = -{ {\Omega_K} \over{St} } (r \dot{\theta} -v) - 2 \Omega_o \dot{r}, \end{aligned}$$ in which $u$ and $v$ are the two components of the gas velocity changes due to the presence in the flow of a persistent structure (vortex and/or spiral waves). These two motion equations are then solved numerically using a second-order Runge-Kutta method. ### With the vortex model Particle trajectories were first computed in the vortex velocity-field described in Eqs. [\[vort-field\] ]{} (with no other contribution) and are plotted in Fig. [\[traj-1\]]{}. Two types of trajectories can be distinguished following the value of the impact parameter: (i) vortex trapping (black line) or (ii) inward drift toward the star (green line), with a steep change between the two. Testing various particle sizes we also noted that the transition between trapping and drift is sharper and sharper for increasing sizes; the threshold is located close the core orbital radius in accordance with the results of the numerical simulations. ![Trajectories of solid particles interacting with a gaseous vortex. The particle sizes are equal to 0.14 mm and 0.32 mm, from left to right, respectively.[]{data-label="traj-1"}](YvsX_p014-2.png "fig:"){width="4.4cm"} ![Trajectories of solid particles interacting with a gaseous vortex. The particle sizes are equal to 0.14 mm and 0.32 mm, from left to right, respectively.[]{data-label="traj-1"}](YvsX_p032-2.png "fig:"){width="4.4cm"} \ The capture trajectories are similar to those computed with approximate vortex models [[e.g.]{} @Fuente2001]. ### With a spiral wave model Vortices in Keplerian disks are always escorted by spiral compressional waves they themselves excite in the gas flow. These waves are rotating around the star at the vortex angular-velocity and are also associated to velocity changes of the gas at the crossing of the spiral arms. Due to their coupling with the gas, particles have their motions perturbed at spiral-arm crossing and can exchange angular momentum with the waves, accelerating or decelerating depending on whether their orbit is located outside or inside the core orbital radius, respectively. The importance of this effect depends on the stopping time of the particles but also on the width, amplitude and winding of the waves. ![Radial drift of solid particles interacting with spiral+vortex (time is in number of vortex rotation). Particle size is $0.32mm$ and $6.4mm$ , from top to bottom, respectively. The various curves are for different values of the impact parameter. []{data-label="dec"}](Rvstheta_p032.png "fig:"){width="8.5cm"}![Radial drift of solid particles interacting with spiral+vortex (time is in number of vortex rotation). Particle size is $0.32mm$ and $6.4mm$ , from top to bottom, respectively. The various curves are for different values of the impact parameter. []{data-label="dec"}](Rvstheta_p64.png "fig:"){width="8.5cm"} \ A detailed study of particle/wave interactions is out of the scope of the present work and our goal, here, is only to capture the main consequences of spiral waves on the dynamical evolution of dust particles coupled to the gas by a drag force. To this end we have taken benefit of the above computations replacing the vortex model by a crude model of a spiral pattern. In our toy model the effect of the spiral wave reduces to perturbations of the gas velocity that we have taken in the form $$\label{spir-field} \begin{aligned} u & = \epsilon_u ~ f(\theta) \\ v & = [\epsilon_v + r(\Omega_K - \Omega_o)] ~f(\theta), \end{aligned}$$ where $\epsilon_u$ and $\epsilon_v$ are the amplitude of the velocity perturbations in the radial and azimuthal directions, respectively, and $f(\theta)$ is an arbitrary cut-off function$$f(\theta) = exp[ -( { {\theta -\theta_s}\over {\delta \theta_s} } )^2]$$ with $\theta_s \propto (r/r_0 -1)^2 $ to mimic the spiral shape of the perturbation.\ Then, the motion equations (Eqs. [\[motion\]]{}) are solved using the same method as in the above section. The results are reported in Fig. [\[dec\]]{} for various values of the impact parameter.\ The inward drift of the solid particles presents a sharp transition at the orbital radius of the vortex: the drift is slowed down outward while it is accelerated inward. The difference between the two drift rates could help to explain the formation of a plateau lined by a strong gap.\ Simulation of the observations {#simu-obs} ============================== In this section we discuss the observability of the structures predicted by the numerical simulations presented in the previous sections. We use the results of the numerical simulations for the different grain sizes to investigate the change in the appearance of the dust thermal emission at different wavelengths, as continuum observations at longer wavelengths are typically more sensitive to emission from larger grains [[e.g.]{} @Perez2012]. For the smaller grains of our simulations ($s < 1$ mm) we simulate observations with ALMA, which provides high angular resolution and sensitivity needed to trace the structures discussed in this work. For tracing larger grains, which require observations at longer wavelengths, we simulate observations with the future ngVLA interferometer which will achieve high angular resolution and sensitivity at wavelengths longer than $\sim 3$ mm [@Carilli2015], and will be particularly suitable for observations of large grains in protoplanetary disks [@Isella2015] . The surface brightness map of the dust thermal emission for our models was derived from the dust surface densities and temperatures provided by the numerical simulations. We set the absolute scale of each surface brightness map by requiring the total flux to be consistent with the measured sub-mm/mm spectral Energy Distribution of the Oph IRS 48 disk [@Marel2015], which essentially fixes the values for the dust opacity, assumed constant throughout the disk, at each wavelength discussed here. The disk is seen with a face-on geometry.\ ![image](ALMAimage_00014cm_690GHz.png){width="6.cm"} ![image](ALMAimage_00032cm_345GHz.png){width="6.cm"} ![image](ALMAimage_000740cm_230GHz.png){width="6.cm"} ![image](ALMAimage_0100cm_100GHz.png){width="6.cm"} ALMA observations ----------------- We used the online ALMA Observation Support Tool[^1] (version 4.0) to simulate realistic ALMA observations for a subset of our simulations. For our models with grain sizes of 0.14, 0.32, 0.74 mm, and 1 mm, we simulated ALMA observations at wavelengths of 0.43 (ALMA Band 9), 0.87 (Band 7), 1.3 mm (Band 6), 2.7 mm (Band 3), respectively. We considered array configurations that provide an angular resolution of about 80 milliarcsec, or about 10 AU at the distance of Oph IRS 48, for all the ALMA simulations. We found that this angular resolution offers a good trade-off between angular resolution and surface brightness sensitivity for the structures of interest for this paper. An observing time of 5 hours was assumed for each observation. Precipitable water vapor (PWV) levels of 0.5, 1.3 and 1.8 mm were adopted for the simulated observations at wavelengths of 0.43, 0.87 and 1.3 mm, respectively. Figure \[alma1\] shows the maps returned by the ALMA Observation Support Tool after performing deconvolution with the CASA CLEAN algorithm (Briggs weighting with robust parameter of 0.5). ngVLA observations ------------------ For observations at longer wavelengths tracing larger grains, we considered the ngVLA interferometer, which is currently being designed as a future large radio facility operating at wavelengths between about 3 mm and 30 cm (Carilli et al. 2015). We simulated ngVLA observations at wavelengths of 3.7 mm (frequency of 80 GHz) and 1.0 cm (30 GHz) for our models with grain sizes of 6.4 mm and 2.0 cm, respectively.\ For the ngVLA simulations we used the SIMOBSERVE task in CASA adopting an array configuration made of 300 antennas with longest baselines of 300 km and an inner core to recover the emission from the largest scales of the disk. Thermal noise was added using the CASA tool SETNOISE and was scaled to provide a final rms noise of about 0.11 and 0.040 $\mu$Jy beam$^{-1}$ in the simulated images at 3.7 mm and 1.0 cm, respectively, and for the highest angular resolution at these frequency, i.e. 5 and 12 mas. These noise values would correspond to a total integration time of about 100 hours with the current ngVLA specifications. Deconvolution was performed using CLEAN with Briggs weighting with a robust parameter of 0.5. The obtained images are shown in Fig. \[ngvla1\] [^2].\ ![image](NGVLAimage_640cm_30GHz_taper01.png){width="5.5cm"} ![image](NGVLAimage_640cm_30GHz.png){width="5.5cm"} ![image](NGVLAimage_200cm_30GHz_taper01.png){width="5.5cm"} ![image](NGVLAimage_200cm_30GHz.png){width="5.5cm"} Discussion of the simulated observations ======================================== We studied the evolution of solid particles in a protoplanetary disk that hosts a persistent gaseous vortex and listed the various structures formed in the global dust distribution. One of our main goals was to identify the possible observational signatures of these structures to better assess the presence of a gaseous vortex in the disk. To this end we performed numerical simulations of a protoplanetary disk using $\rho$ Oph IRS 48 as a reference, as this disk is suspected to host a large scale gaseous vortex.\ We found that, depending on their size (or Stokes number), the solid particles (i) either are captured and confined in the vortex forming a high density region in the core where dust/gas instabilities can grow, (ii) or form high density dust blobs that align in a knotted structure (irregular arc or ring) close to the orbital radius of the vortex core.\ Inside this radius the dust surface density decreases dramatically forming a very sharp gap.\ Simulated images produced with the ALMA and the future ngVLA simulators show that a number of these large scale structures could be observed. ![image](Figure10-1.png){width="13.cm"} The most striking features in the simulated ALMA images are: (i) the high density region in the vortex core is clearly observable at all the wavelengths investigated here; (ii) the depletion of solid particles around the vortex and the piling up at the inner and outer boundaries of the disk are particularly visible at $\lambda$ = 0.43 and 0.87 mm, respectively; (iii) the sharp density jump at the orbital radius of the vortex is distinguishable mostly at $\lambda$ = 1.3 mm, whereas at $\lambda$ = 2.7 mm only the bright dust emission from particles trapped by the vortex and from the inner disk is detected, as due to the lower ALMA sensitivity to dust emission at longer wavelengths (Fig. \[alma1\]).\ At each of the investigated ALMA observing bands, the peak of the surface brightness map is always found at the location of the dust trapped by the vortex. This indicates that only observations at with enough sensitivity and angular resolution can highlight the presence of substructures due to the interaction between the vortex and the disk.\ Furthermore, the azimuthal variation of the location of trapped particles with different sizes is clearly seen from the maps at different wavelengths. Figure \[alma2\] shows the density maps and the simulated ALMA images obtained in the case of a vortex with an aspect ratio two times larger than in the standard case studied above. The azimuthal asymmetries produced in the simulated images have clearly a larger azimuthal extent that could better mimic true observations.\ At longer wavelengths, the high resolution and sensitivity observations achievable with the ngVLA have the potential to probe the high density regions in the vortex as well as the knotted ring structures expected for pebbles at $\lambda$ = 3.7 mm and $\lambda$ = 1 cm (Fig. \[ngvla1\]).\ Summary ======= We have shown the results of 2D simulations obtained with a gas/dust code to calculate the spatial distribution of solid particles with different sizes as expected in a disk hosting a giant gas vortex. Our simulations show that a giant vortex not only captures dust grains with Stokes number $St < 1$, but can also affect significantly the distribution of larger grains ($St \gtrsim1$) by carving a gap as well as producing a narrow ring-like distribution of pebbles due to dust concentrations escaping from the vortex core. We used the results of our code to calculate the expected surface brightness map at different sub-mm to cm wavelengths, tracing emission from solids with different sizes. We then use ALMA and ngVLA simulators to test the observability of the substructures predicted by our code using high angular resolution and sensitivity observations in dust continuum with these sub-mm and radio interferometers. Most of the substructures predicted in this work could be observed for a disk with properties similar to those derived for the $\rho$ Oph IRS 48 disk. However, this is not the case with the presently available observations of this object.\ Computations were performed using HPC resources from GENCI \[TGCC and CINES\] (Grant - x2016047407) and also at LAM on the mib MPI cluster maintained by CESAM. We want also to thank the anonymous referee for his useful comments. Stronger dust-to-gas ratio {#strong} ========================== Simulations starting with a dust-to-gas ratio equals to $0.01$ ((i.e) the cosmic abundance) were also performed in the same context as in section \[simu\]. To put all the heavy material of a disk in a single population of solid particles is, of course, an unrealistic assumption that was considered only as a limiting case. Moreover this is not a favorable assumption to maintain a vortex against friction drag and dust/gas instabilities. Fig. [\[zoom4\]]{} shows an example of such simulations when the particle size is equal to $6.4mm$. The evolution of the dust distribution is similar to the one observed in Fig. \[zoom3\] with shorter time scales and different numerical values. We estimated it does not make sense to simulate observations in this case. ![Dust to gas ratio for nearly optimal particles after $20$, $40$ and $100$ rotations of the vortex. The particle size is $s=6.4mm$. Layout is the same as in Fig. \[zoom1\]. []{data-label="zoom4"}](Dust-gas-021-001.png "fig:"){width="4.5cm"} ![Dust to gas ratio for nearly optimal particles after $20$, $40$ and $100$ rotations of the vortex. The particle size is $s=6.4mm$. Layout is the same as in Fig. \[zoom1\]. []{data-label="zoom4"}](Dust-gas-041-001.png "fig:"){width="4.5cm"}\ ![Dust to gas ratio for nearly optimal particles after $20$, $40$ and $100$ rotations of the vortex. The particle size is $s=6.4mm$. Layout is the same as in Fig. \[zoom1\]. []{data-label="zoom4"}](Dust-gas-101-001.png "fig:"){width="9.cm"} \ [^1]: http://almaost.jb.man.ac.uk. [^2]: More detailed information on these ngVLA simulations can be found here: `http:library.nrao.edu/ public/ memos/ ngvla/ NGVLA-11.pdf`.
The deal comes as investors pour money into the $2 trillion hedge fund industry, buoyed by an upturn in markets and hedge fund performance this year, raising demand for the services offered by administrators and other service providers. Net inflows into hedge funds last year totaled more than $70 billion, according to Hedge Fund Research. "We really like this business. We believe it's a good fit for us and makes us a top-three administrator in the world," Bill Stone, CEO of Connecticut-based SS&C, told Reuters. Under TPG's deal, GlobeOp CEO Hans Hufschmid and his senior management team were set to continue running the firm. Stone said that under SS&C's deal, GlobeOp management wanting to stay on would be offered roles. "We admire them (the GlobeOp management team). (For) any of the senior people who'd like to stay, we'd be able to find something meaningful for them to do," he said. SS&C said in a statement it expects cost savings of at least $25 million within three years. GlobeOp, which administers $173 billion in client assets, kicked off a strategic review in January to try and boost its share price. Last week SS&C, which is more than one third owned by U.S. private equity firm Carlyle Group, proposed a 485-pence-a-share offer. Last month it said it had begun due diligence on GlobeOp on Jan. 14 and urged shareholders to wait for its next move. The move is good news for hedge fund Cheyne Capital, whose funds have been building a stake in GlobeOp and now own 4.1 percent. ($1 = 0.6355 British pounds)
WASHINGTON — The Mueller report's narrative of secret meetings between members of Donald Trump's orbit and Russian operatives — contacts that occurred both before and after the 2016 election — portrays a political campaign that left itself open to a covert Russian influence operation, former intelligence officials and other experts say. While finding no criminal conspiracy, the report shows that Trump associates met with Russians after the intelligence community said in October 2016 that Russia was interfering in the presidential election, and even after the Obama administration announced a set of post-election sanctions to punish Russia for that behavior. The 448-page report, written as a prosecutorial document, was not meant to assess, and does not say, whether U.S. national security was put at risk through those contacts. But former FBI and CIA officials and people who study Russian intelligence say the report describes a counterintelligence minefield — senior members of a presidential campaign and transition holding secret talks with a sophisticated foreign adversary, without the benefit of State Department and intelligence community counsel. "The Russians came up against a group of people who were not intelligence savvy and who were predisposed not to listen to the intelligence and counterintelligence community," said Luis Rueda, who spent 27 years as a CIA operations officer. "The Russians made a very bold and aggressive attempt to take advantage of that — to try to compromise people, to try to leverage their access." The FBI, as part of its counterintelligence mission, is continuing to investigate Russian attempts to influence the Trump administration and assess the national security damage from Russia's 2016 effort, current and former U.S. officials tell NBC News. Democratic lawmakers have demanded a briefing on the counterintelligence findings of the Russia investigation and the status of the FBI's counterintelligence investigation into Trump. John Sipher, who served in Moscow and once helped run CIA spying operations against Russia, said, "It's clear that the Russians had a pretty extensive full court press on this administration." The full extent of how successful it was may never be known, he said. "Being able to lock it down and prove in court? That only comes when you catch somebody red-handed, or when you have a source on the inside of your adversary who hands you documents." The Mueller report says the special counsel investigated whether Russia's wooing of Trump officials "constituted a third avenue of attempted Russian interference with or influence on the 2016 presidential election," in addition to Russian hacking of Democratic emails and social media manipulation through false personas. Without explicitly answering that question, the Mueller report explains how Russia sought to secretly influence the incoming Trump administration after helping it get elected, and how Kushner and other senior members of the Trump team embraced those entreaties. The report describes meetings with questionable individuals and a ready use of backchannel communications, despite warnings from U.S. intelligence officials. "The investigation established multiple links between Trump Campaign officials and individuals tied to the Russian government," the report says. "Those links included Russian offers of assistance to the Campaign. In some instances, the Campaign was receptive to the offer, while in other instances the Campaign officials shied away." After the election, the report says, "Russian government officials and prominent Russian businessmen began trying to make inroads into the new administration. The most senior levels of the Russian government encouraged these efforts." Republican presidential candidate Donald Trump speaks during a campaign rally at the University of Wisconsin Eau Claire, Tuesday, Nov. 1, 2016, in Eau Claire, Wis. Evan Vucci / AP Trump officials took those meetings knowing their campaign had benefited from information stolen by the Russian government, the Mueller report says. NBC News reported that the Trump campaign received a counterintelligence briefing in the summer of 2016 warning that it could be the subject of Russian spying and infiltration attempts. The fact that the Trump team did not coordinate their Russia meetings with the U.S. government gave the Russians leverage, Sipher and other experts say. U.S. government officials with security clearances who fail to report contacts with Russian nationals could lose their security clearances or their jobs. Mueller's report did not address how unusual and potentially dangerous it might be for representatives of an incoming American administration to meet secretly with a foreign adversary, without benefit of advice from career CIA and State Department officials. But in a separate court case this week, the Justice Department submitted an affidavit from a former head of counterintelligence for the FBI, who explained his view of the dangers of so-called backchannels. It came in the case of Maria Butina, the Russian former college student who has pleaded guilty to acting as an unregistered agent of Russia. Prosecutors are recommending an 18-month prison sentence. Butina, who is not mentioned in the redacted Mueller report, was seeking to expand Russian influence on Republicans and the National Rifle Association at the direction of a senior Russian central banker, court records show. She did so by cultivating influential Americans who did not know she was working on behalf of the Russian government, the documents say. Her goal, the documents say, was to open unofficial channels of communication between the Russian government and key Americans. "Butina's stated goal of establishing a backchannel of communication, if it had been achieved, would have benefited the Russian government by enabling Russia to bypass formal channels of diplomacy, win concessions, and exert influence within the United States," wrote Robert Anderson, a former head of counterintelligence for the FBI, in the affidavit. "Such benefits to the Russian government would have carried with them commensurate harm to the United States, including harm to the integrity of the United States' political processes and internal government dealings, as well as to U.S. foreign policy interests and national security." Political influence — in addition to recruiting spies and stealing defense secrets — is a main goal of intelligence operations against the U.S. by Russia, Anderson said. The U.S. "is Russia's primary target for malign and intrusive intelligence operations," Anderson said. "Russia works to obtain not only classified material or trade secrets, but also to collect any information that could, by itself or in conjunction with other efforts, assist the Russian government in increasing its geopolitical power or undermining and harming that of the United States." "In my expert opinion, Butina provided the Russian Federation with information that skilled intelligence officers can exploit for years and that may cause significant damage to the United States." Maria Butina, leader of a pro-gun organization in Russia, speaks to a crowd during a rally in support of legalizing the possession of handguns in Moscow, Russia. AP file Andrew Weiss, a Russia expert at the Carnegie Endowment for International Peace, cited Anderson's affidavit this week as evidence that the Mueller report's narrative of Trump-Russia contacts is damning. "Seen against this backdrop, it's clear that the conduct outlined in Volume I of the Mueller Report created enormous damage to US national security," Weiss tweeted. "Anderson is scathing about the impact of back channel amateur hour." In an interview, Weiss said that while the Trump administration has not given Russia the total reset in relations it was hoping for, Trump has consistently followed Putin's lead on a number of matters, such as a plan to create a joint U.S.-Russia cybersecurity agency, or Trump's agreement that he would help Putin repatriate Syrian refugees displaced by civil war. Both ideas were quickly walked back by senior U.S. officials. Trump has repeatedly praised Russian President Vladimir Putin, resisted acknowledging Russian election interference, and denigrated the NATO alliance. President Donald Trump and Russian President Vladimir Putin, right, pose for a photograph at the Presidential Palace in Helsinki, Finland, on July 16, 2018. Alexei Nikolsky / AP file In July, after a Trump-Putin summit in Helsinki, Trump seemed to accept Putin's denial that Russia had interfered in the 2016 election, dismissing the findings of American intelligence agencies. "My people came to me. Dan Coats came to me, and some others," Trump said, referring to the director of national intelligence. "They said they think it's Russia," Trump said. "I have President Putin. He just said it's not Russia. I will say this: I don't see any reason why it would be." Russian outreach after the election Many of the interactions between the Trump campaign and Russians outlined in the Mueller report had been previously detailed in news reports, including conversations between Michael Flynn, Jared Kushner and the Russian ambassador — and Kushner's request to use a secure communications channel in the Russian embassy. But the report offered new insights into Russian outreach after the election. According to the report, in December 2016 Putin told Petr Aven, head of Russia's largest commercial bank, Alfa-Bank, that he was concerned about the U.S. imposing sanctions. Putin complained that he wasn't sure who to speak to in the incoming Trump administration, Aven told Mueller's office. "Aven told Putin he would take steps to protect himself and the Alfa-Bank shareholders from potential sanctions, and one of those steps would be to try to reach out to the incoming Administration to establish a line of communication," the report says. Aven enlisted Richard Burt, the former U.S. ambassador to Germany and an Alfa-Bank consultant, to help contact members of the Trump transition team. The report says Burt approached Dimitri Simes, head of a Russian-aligned think tank in Washington, the Center for the National Interest. At the time, Simes was lobbying the Trump transition team, on Burt's behalf, to appoint Burt U.S. ambassador to Russia, the report says. Simes told Burt that a secret channel wasn't a good idea, given the media attention to Trump's dealings with Russia. But another senior Russian official, Kirill Dmitriev, the head of Russia's sovereign wealth fund and a close Putin associate, did succeed in establishing a secret channel to the Trump team, the report says. "We want to start rebuilding the relationship in whatever is a comfortable pace for them," Dmitriev wrote in a message to George Nader, an international consultant who helped broker the outreach. Dmitriev ended up meeting with Erik Prince, a Trump supporter and associate of Steve Bannon, at a resort in the Seychelles. Rick and Libi Gerson attend a film benefit in New York in 2012. D Dipasupil / FilmMagic The meeting was a disappointment to Dmitriev, the Mueller report says, because "he believed the Russians needed to be communicating with someone who had more authority within the incoming Administration than Prince had." And "he had hoped to have a discussion of greater substance, such as outlining a strategic roadmap for both countries to follow." Soon enough, Dmitriev found another route, He reached out to a friend of Kushner, Rick Gerson, a hedge fund manager. The two talked about potential joint ventures between the Russian wealth fund and Gerson's fund, the Mueller report says. And together they worked on a proposal for reconciliation between the United States and Russia, which Dmitriev implied he cleared through Putin, the report says. "On January 16, 2017, Dmitriev consolidated the ideas for U.S.-Russia reconciliation that he and Gerson had been discussing into a two-page document that listed five main points: (1) jointly fighting terrorism; (2) jointly engaging in anti-weapons of mass destruction efforts; (3) developing "win-win" economic and investment initiatives; (4) maintaining an honest, open, and continual dialogue regarding issues of disagreement; and (5) ensuring proper communication and trust by 'key people' from each country." Gerson sent the two-page proposal to Kushner before the inauguration, and Kushner later gave copies to Bannon and then-Secretary of State Rex Tillerson, the report says. Gerson and Dmitriev appeared to stop communicating with each other in March 2017, the report says, "when the investment deal they had been working on together showed no signs of progressing." "It's classic foreign intelligence activity on the part of the Russians," said David Gomez, a former FBI agent whose specialties included counterintelligence. "The Russians are trying to develop unwitting assets. If they can entice Eric Prince, if they can entice Jared Kushner, if they can entice Donald Trump into secretly dealing with them, they have essentially opened a back door into the administration and the U.S. government." Tough on Russia Pushing back on criticism about the administration's Russia stance, White House officials say they have been much harder on Russia than President Barack Obama was. "There's never been a president as tough on Russia as I have been," Trump told reporters last year, echoing comments he has made many times. The chief executive of the Russian Direct Investment Fund, Kirill Dmitriev, waits before a meeting of Russian President Vladimir Putin with representatives of the foreign business community on the sidelines of the Eastern Economic Forum in Vladivostok, Russia on Sept. 11, 2018 Valery Sharifulin / Tass / Pool via Reuters file The Trump administration has imposed additional sanctions on Russia and provided lethal assistance to a Ukrainian government that is battling a Russian incursion. Still, Trump's unwillingness to call out Russian election interference makes it easier for Russia to succeed in 2020, former senior intelligence officials tell NBC News. Just this week, son-in-law Kushner dismissed Russian interference as "a few Facebook ads" and said the Mueller probe was more damaging to the U.S. than anything Russia did. Russia's English-language propaganda network, RT, was quick to embrace Kushner's stance. "The Trump White House is like a juicy peach waiting for the Russians to come and pluck it," one former official said, "and Trump is not moving the branches away from them."
install_data( '.VolumeIcon.png', '.VolumeIcon.icns', install_dir: '/' )
Meet the Bloggers, Part Two By Carl Bialik and Elizabeth Weinstein The Wall Street Journal Online Updated Aug. 26, 2004 12:01 a.m. ET NEW YORK -- Republican Web loggers are getting ready for their shot at posting convention news and commentary, and they say they've learned from their left-leaning counterparts' experience five weeks earlier. At Madison Square Garden, the official blogger group will number about 15, a tiny fraction of the estimated 15,000 journalists expected, and less than half the size of the accredited Boston blogger set. "That's just the number we landed on," said convention spokeswoman Alyssa McClenning. She wouldn't discuss...
// // DCDetailShufflingHeadView.h // CDDMall // // Created by apple on 2017/6/21. // Copyright © 2017年 RocketsChen. All rights reserved. // #import <UIKit/UIKit.h> @interface DCDetailShufflingHeadView : UICollectionReusableView /** 轮播数组 */ @property (nonatomic, copy) NSArray *shufflingArray; @end
A traffic policeman tying wheels of illegally parked motorbikes using a metal chain in Khichapokhari, Kathmandu, on Friday, December 14, 2018. Photo: THT Kathmandu, December 14 Traffic police today said they had stepped up action against unscrupulous cabbies in Kathmandu valley. According to statistics released by Metropolitan Traffic Police Division, traffic cops booked as many as 552 taxi drivers over a period of one week. Traffic personnel, both in uniform and civvies, have been deployed in busy areas, including hospitals and bus parks, to monitor rule violations like operating taxis without the mandatory seal on fare-meter, refusal to provide short distance service to passengers, tampering with and using defunct meter, and bargaining over fare without turning on the meter. SSP Basanta Kumar Panta, MTPD in-charge, said an average of 80 cabbies were being booked for their involvement in unfair business practices. He encouraged passengers to call at traffic control room (103) or send SMS to 9851295100 or file a complaint through MTPD’s Facebook page to initiate action against dishonest taxi drivers. MTPD informed that the recent crackdown was aimed at deterring the cabbies from overcharging and cheating commuters. Unscrupulous cabbies mostly cheat people waiting for taxis in hospital, bus park and airport areas, and busy thoroughfares of the city. Traffic police have been keeping a close watch on taxis in the daytime and at night when they try to fleece passengers taking advantage of emergencies and non-availability of public vehicles. Cabbies who refuse to serve passengers by turning on fare-meter are referred to the Transport Management Office for necessary action and are fined Rs 2,000 each. Similarly, if a taxi driver is found operating with a tampered meter, the National Bureau of Standards and Metrology may impose on him/her a fine of up to Rs 5,000, along with a warning in the first instance to fix the meter. Those refusing to travel short distance and overcharging passengers are punished by traffic police with a fine of Rs 1,500 each. In the fiscals 2016-17 and 2017-18, 4,518 and 8,120 taxis were booked for their involvement in various offences respectively. Many of the cabs were repeat offenders. Around 10,000 taxis operate in the valley. If the data of unscrupulous taxi drivers are analysed, no cabbie is found to be doing his/her business honestly. Recently, MTPD had announced that driving licence of any cabbie found involved in any of the offences for six times would be suspended for six months under the Vehicle and Transport Management Act. A version of this article appears in print on December 15, 2018 of The Himalayan Times.
Q: VoiceOver controls are selectable when hidden I have a UIView which contains some controls (e.g. buttons, labels, etc). I overlay this view onto another view (using addSubview). If the user has VoiceOver on, he can swipe left and right to select the controls. However if I hide the view so the controls are no longer visible, the user is still able to swipe and select them (although they don't actually work). Since this is very confusing to a blind user, I would like to keep this from happening. I have even tried removing the view that contains the controls (using removeFromSuperview) but the user can STILL swipe to select them (although the little boxes which highlights them are no longer in the correct positions). It is like VoiceOver has memorized that those controls were once there and will remember that forever more. I also found the property 'accessibilityElementsHidden' and I have tried setting that to YES on the view which contains the controls when it is hidden, but that does not seem to work either. Is this a bug in VoiceOver, or am I missing something? Is there a workaround? Thanks. A: The "memorized" part makes me think you aren't doing something like UIAccessibilityPostNotification(UIAccessibilityLayoutChangedNotification, nil) after removing the subviews. A: The documentation for "accessibilityElementsHidden" states: A Boolean value indicating whether the accessibility elements contained within this accessibility element are hidden. ..... The default value for this property is NO. You might use this property to hide views that are covered by the arrival of a new view. In this case, the hidden views might remain visible onscreen, but they are not the focus of the user’s actions. You might also use this property to hide a transient view that VoiceOver users don’t need to notice. For example, VoiceOver doesn’t need to describe the translucent view that appears when users adjust the volume on their devices, because the aural feedback of this action is sufficient. So based on this, in order to have those subviews ignored by VoiceOver, you'd actually want to set this to "YES" on the parent view.
4. 10 Calculate the remainder when 471 is divided by 249. 222 Calculate the remainder when 1103 is divided by 189. 158 What is the remainder when 40348 is divided by 30? 28 What is the remainder when 31 is divided by 19? 12 What is the remainder when 7012 is divided by 21? 19 Calculate the remainder when 649 is divided by 14. 5 What is the remainder when 649 is divided by 50? 49 What is the remainder when 409 is divided by 196? 17 What is the remainder when 837 is divided by 8? 5 Calculate the remainder when 1652 is divided by 445. 317 What is the remainder when 111 is divided by 74? 37 What is the remainder when 136 is divided by 66? 4 What is the remainder when 447 is divided by 93? 75 Calculate the remainder when 1572 is divided by 295. 97 What is the remainder when 237 is divided by 36? 21 What is the remainder when 51 is divided by 14? 9 Calculate the remainder when 13105 is divided by 51. 49 Calculate the remainder when 16495 is divided by 9. 7 Calculate the remainder when 340 is divided by 8. 4 Calculate the remainder when 485 is divided by 84. 65 What is the remainder when 530 is divided by 139? 113 Calculate the remainder when 372 is divided by 69. 27 What is the remainder when 4908 is divided by 117? 111 What is the remainder when 109 is divided by 104? 5 What is the remainder when 167 is divided by 78? 11 Calculate the remainder when 4395 is divided by 18. 3 Calculate the remainder when 1016 is divided by 34. 30 What is the remainder when 1663 is divided by 45? 43 What is the remainder when 67 is divided by 17? 16 What is the remainder when 333 is divided by 87? 72 Calculate the remainder when 221 is divided by 5. 1 What is the remainder when 527 is divided by 23? 21 What is the remainder when 1210 is divided by 6? 4 What is the remainder when 458 is divided by 151? 5 Calculate the remainder when 37883 is divided by 14. 13 Calculate the remainder when 238 is divided by 40. 38 What is the remainder when 45676 is divided by 46? 44 What is the remainder when 89 is divided by 35? 19 Calculate the remainder when 45 is divided by 13. 6 Calculate the remainder when 14533 is divided by 169. 168 Calculate the remainder when 615 is divided by 8. 7 Calculate the remainder when 394 is divided by 40. 34 Calculate the remainder when 475 is divided by 70. 55 Calculate the remainder when 7101 is divided by 37. 34 What is the remainder when 297 is divided by 12? 9 What is the remainder when 871 is divided by 109? 108 What is the remainder when 14 is divided by 6? 2 Calculate the remainder when 1572 is divided by 176. 164 Calculate the remainder when 172 is divided by 20. 12 Calculate the remainder when 21 is divided by 7. 0 Calculate the remainder when 189 is divided by 10. 9 What is the remainder when 41 is divided by 34? 7 Calculate the remainder when 2487 is divided by 166. 163 Calculate the remainder when 3608 is divided by 38. 36 What is the remainder when 1239 is divided by 31? 30 Calculate the remainder when 172 is divided by 16. 12 Calculate the remainder when 873 is divided by 22. 15 What is the remainder when 679 is divided by 85? 84 What is the remainder when 430 is divided by 27? 25 What is the remainder when 207 is divided by 21? 18 What is the remainder when 516 is divided by 8? 4 Calculate the remainder when 1527 is divided by 191. 190 What is the remainder when 384 is divided by 114? 42 What is the remainder when 54 is divided by 29? 25 Calculate the remainder when 84 is divided by 19. 8 What is the remainder when 62 is divided by 21? 20 What is the remainder when 239 is divided by 20? 19 What is the remainder when 581 is divided by 11? 9 Calculate the remainder when 133 is divided by 32. 5 What is the remainder when 83 is divided by 44? 39 What is the remainder when 304 is divided by 102? 100 What is the remainder when 61 is divided by 35? 26 What is the remainder when 693 is divided by 346? 1 What is the remainder when 304 is divided by 292? 12 What is the remainder when 3467 is divided by 18? 11 Calculate the remainder when 179 is divided by 47. 38 What is the remainder when 1244 is divided by 52? 48 Calculate the remainder when 210 is divided by 3. 0 What is the remainder when 656 is divided by 13? 6 What is the remainder when 669 is divided by 334? 1 What is the remainder when 181 is divided by 46? 43 Calculate the remainder when 885 is divided by 645. 240 Calculate the remainder when 453 is divided by 152. 149 Calculate the remainder when 2964 is divided by 66. 60 Calculate the remainder when 407 is divided by 51. 50 What is the remainder when 735 is divided by 16? 15 What is the remainder when 293 is divided by 51? 38 Calculate the remainder when 1430 is divided by 118. 14 Calculate the remainder when 689 is divided by 12. 5 What is the remainder when 66 is divided by 57? 9 Calculate the remainder when 112 is divided by 13. 8 What is the remainder when 130 is divided by 19? 16 What is the remainder when 52811 is divided by 324? 323 Calculate the remainder when 51 is divided by 5. 1 Calculate the remainder when 631 is divided by 168. 127 What is the remainder when 3328 is divided by 37? 35 Calculate the remainder when 558 is divided by 11. 8 What is the remainder when 100 is divided by 23? 8 Calculate the remainder when 237 is divided by 30. 27 What is the remainder when 1271 is divided by 17? 13 Calculate the remainder when 571 is divided by 174. 49 What is the remainder when 5 is divided by 1? 0 What is the remainder when 544 is divided by 14? 12 Calculate the remainder when 498 is divided by 35. 8 What is the remainder when 1666 is divided by 184? 10 Calculate the remainder when 1443 is divided by 278. 53 What is the remainder when 3477 is divided by 24? 21 What is the remainder when 4101 is divided by 186? 9 Calculate the remainder when 89 is divided by 52. 37 What is the remainder when 109 is divided by 16? 13 What is the remainder when 236 is divided by 34? 32 What is the remainder when 41 is divided by 13? 2 What is the remainder when 348 is divided by 128? 92 What is the remainder when 3585 is divided by 124? 113 What is the remainder when 45 is divided by 17? 11 Calculate the remainder when 254 is divided by 17. 16 What is the remainder when 615 is divided by 22? 21 What is the remainder when 285 is divided by 97? 91 What is the remainder when 85 is divided by 9? 4 What is the remainder when 49 is divided by 5? 4 What is the remainder when 487 is divided by 316? 171 Calculate the remainder when 328 is divided by 33. 31 What is the remainder when 352 is divided by 15? 7 Calculate the remainder when 54 is divided by 31. 23 Calculate the remainder when 658 is divided by 55. 53 What is the remainder when 2255 is divided by 47? 46 Calculate the remainder when 538 is divided by 15. 13 Calculate the remainder when 195 is divided by 38. 5 What is the remainder when 4553 is divided by 207? 206 Calculate the remainder when 670 is divided by 21. 19 Calculate the remainder when 333 is divided by 33. 3 Calculate the remainder when 1088 is divided by 317. 137 Calculate the remainder when 731 is divided by 49. 45 What is the remainder when 216 is divided by 3? 0 Calculate the remainder when 21 is divided by 7. 0 What is the remainder when 37 is divided by 21? 16 Calculate the remainder when 46 is divided by 39. 7 Calculate the remainder when 1674 is divided by 37. 9 Calculate the remainder when 2452 is divided by 249. 211 Calculate the remainder when 75 is divided by 20. 15 What is the remainder when 1447 is divided by 29? 26 Calculate the remainder when 4043 is divided by 34. 31 Calculate the remainder when 128 is divided by 27. 20 Calculate the remainder when 883 is divided by 56. 43 What is the remainder when 123 is divided by 86? 37 What is the remainder when 75 is divided by 44? 31 Calculate the remainder when 179 is divided by 26. 23 Calculate the remainder when 927 is divided by 133. 129 What is the remainder when 392 is divided by 117? 41 Calculate the remainder when 93 is divided by 37. 19 What is the remainder when 76 is divided by 42? 34 Calculate the remainder when 1515 is divided by 78. 33 What is the remainder when 582 is divided by 73? 71 What is the remainder when 467 is divided by 78? 77 What is the remainder wh
// ---------------------------------------------------------------------------- // Tests installing an local file works when loading the url function test() { Harness.installEndedCallback = install_ended; Harness.installsCompletedCallback = finish_test; Harness.setup(); var cr = Components.classes["@mozilla.org/chrome/chrome-registry;1"] .getService(Components.interfaces.nsIChromeRegistry); var chromeroot = extractChromeRoot(gTestPath); try { var xpipath = cr.convertChromeURL(makeURI(chromeroot + "unsigned.xpi")).spec; } catch (ex) { var xpipath = chromeroot + "unsigned.xpi"; //scenario where we are running from a .jar and already extracted } gBrowser.selectedTab = gBrowser.addTab(); gBrowser.loadURI(xpipath); } function install_ended(install, addon) { install.cancel(); } function finish_test(count) { is(count, 1, "1 Add-on should have been successfully installed"); gBrowser.removeCurrentTab(); Harness.finish(); } // ----------------------------------------------------------------------------
Q: Getting error "can't multiply sequence by non-int of type 'float'"? Here in my program, I have given employee pay in string and I am multiplying that amount with int. Getting an error: TypeError: can't multiply sequence by non-int of type 'float' Please hep me out in debugging this. class Employee: raise_amt=1.2 # class variable def __init__(self,first,last,pay): self.first=first self.last = last # instance variables self.pay = pay self.email = first+"."+last+"@company.com" def fullname(self): return '{}{}'.format(self.first,self.last) def apply_raise(self): self.pay= int(self.pay * self.raise_amt) @classmethod # alter the raise amt def set_raise_amt(cls,amount): cls.raise_amt=amount @classmethod def from_string(cls,emp_str): first,last,pay= emp_str.split('-') return cls(first,last,pay) emp_str_1='Nanda-kishor-90000' #values are in string new_emp_1=Employee.from_string(emp_str_1) Employee.set_raise_amt(2.2) print(new_emp_1.raise_amt) print(new_emp_1.pay) new_emp_1.apply_raise() print('after raise:',new_emp_1.pay) Output: Traceback (most recent call last): File "C:/Users/nanda.v/PycharmProjects/Python basics/practice continue and break statements.py", line 39, in <module> new_emp_1.apply_raise() 2.2 File "C:/Users/nanda.v/PycharmProjects/Python basics/practice continue and break statements.py", line 19, in apply_raise self.pay= int(self.pay * self.raise_amt) 90000 TypeError: can't multiply sequence by non-int of type 'float' A: Python does not automatically convert strings to numbers. If you want it to be a float or an integer, you need to say so. Python doesn't always have a problem with multiplying strings, though. Multiplying a string just repeats it: >>> my_string = 'blah' >>> my_string * 2 'blahblah' The problem in your code is that self.raise_amt is a float. It doesn't make sense to repeat a string a decimal number of times, so you get an error. What you need is to convert pay to a float when you get it. That is simply: float(pay) in your __init__: self.pay = float(pay) This will error if the pay argument is not a valid string, but that should be expected.
/*---------------------- Copyright (C): OpenGATE Collaboration This software is distributed under the terms of the GNU Lesser General Public Licence (LGPL) See LICENSE.md for further details ----------------------*/ #include "GateGenericRepeaterMessenger.hh" #include "GateGenericRepeater.hh" #include "G4UIdirectory.hh" #include "G4UIcmdWithAString.hh" #include "G4UIcmdWithAnInteger.hh" #include "G4UIcmdWithADoubleAndUnit.hh" #include "G4UIcmdWith3VectorAndUnit.hh" #include "G4UIcmdWithoutParameter.hh" #include "G4UIcmdWithABool.hh" //-------------------------------------------------------------------------------------------- GateGenericRepeaterMessenger::GateGenericRepeaterMessenger(GateGenericRepeater* itsRepeater) :GateObjectRepeaterMessenger(itsRepeater) { G4String cmdName; cmdName = GetDirectoryName()+"setPlacementsFilename"; mFileCmd = new G4UIcmdWithAString(cmdName,this); mFileCmd->SetGuidance("Set a filename with a list of 3D translations and rotations."); cmdName = GetDirectoryName()+"useRelativeTranslation"; mRelativeTransCmd = new G4UIcmdWithABool(cmdName,this); mRelativeTransCmd->SetGuidance("If true, translation are relative to the initial translation."); } //-------------------------------------------------------------------------------------------- //-------------------------------------------------------------------------------------------- GateGenericRepeaterMessenger::~GateGenericRepeaterMessenger() { delete mFileCmd; delete mRelativeTransCmd; } //-------------------------------------------------------------------------------------------- //-------------------------------------------------------------------------------------------- void GateGenericRepeaterMessenger::SetNewValue(G4UIcommand* command,G4String newValue) { if (command == mFileCmd) GetGenericRepeater()->SetPlacementsFilename(newValue); else if (command == mRelativeTransCmd) GetGenericRepeater()->EnableRelativeTranslation(mRelativeTransCmd->GetNewBoolValue(newValue)); else GateObjectRepeaterMessenger::SetNewValue(command,newValue); } //--------------------------------------------------------------------------------------------
Prioritising underserved areas is only now viable Posted by tsangk Rate this post: During NBN Co's early years, prioritising underserved areas would have been a poor decision to make. With a transit network barely built and relatively few Points of Interconnect established, it would have cost a lot more to target construction in "underserved areas" which are scattered around Australia. The problem was caused and exacerbated by the ACCC choice of the 121 points of interconnect — diversifying NBN Co's construction plan to begin construction around these 121 locations… rather than prioritising locations that were most profitable, or most underserved. Construction of Brownfield areas were prioritised based on completion of transit networks and consequently, closeness to a Point of Interconnect. But now with 80% of the transit network complete, and most Points of Interconnection established and commissioned — the Coalition's "prioritise the underserved areas" plan could actually be feasible thanks to the major construction of a transit network that NBN Co has been undertaking for the past 3 years. Through utilising Telstra's dark fibre and rolling out their own transit fibre networks, DWDM links between POIs (Points of Interconnect) and between FAN (Fibre Access Node) sites are now 80% complete. Just like the Greenfields rollout Historically, NBN Co built TFANs (Temporary Fibre Access Nodes) to connect Greenfield developments where the local Point of Interconnect was yet to be established (or where no service providers have cross-connected). This expensive exercise utilised a managed backhaul service (e.g. from Telstra) to connect these isolated fibre distribution areas to NBN Co's interim aggregation points in major cities. A deployment for underserved areas could work similarly to the current Greenfields deployment. But now, it may actually be feasible to connect a patchwork of isolated fibre distribution areas or copper distribution areas (for FTTN) en masse back to the local Point of Interconnect. The catch — providers. Only one problem remains — provider availability. At this point in time, there are still 60 Points of Interconnect (of the 121) that have one or less service provider cross-connected and CVC ready. NBN Co would need to persuade their access seekers to connect to these Points of Interconnect to serve some 200 premises that were considered underserved. Most Greenfield developments were connected to an interim point of interconnect to ensure there was no provider shortage. Telstra is the only access seeker who has fibre tails to all "established" POIs (this excludes Depots built by NBN Co) since the Points of Interconnect are actually housed in existing Telstra exchanges. Does that mean the same managed backhaul service will get again need to be implemented to ensure these isolated patchwork services can get the provider competition they want? Or are these underserved areas going to be left for Telstra yet again? Yes, it's viable. but… Yes, it's now viable to build a patchwork of isolated fibre distribution areas or copper distribution areas (for FTTN) en masse to underserved areas. But with over 30% of areas classed as D or E in the MyBroadband analysis in rural or remote Australia, most of these areas may well be served by the Long Term Satellite or Fixed Wireless anyway… how far can NBN Co "accelerate" underserved areas if these areas are so isolated and separated from each other? At the end of the day, there will continue to be the fringe 10-20% of each Telstra distribution area who won't be able to receive decent ADSL services today. You can't really please everyone — regardless of rollout strategy. Sorry, no match for the embedded content.
is anyone on here responsible for why I couldn't get the liars den for the weekend!? if so....please let me stay with you! we just stayed there last weekend and all I can say is...WOW! sorry for spot burning this lodge, but Brian and Jen deserve all the business they can get! SOB, I can't make this fully. I am still going to try to arrange something, but I have my 30th Class reunion Saturday night. I have only attended one, #10, and nearly got thrown out of Station Square Sheraton(?). Anyhoo, I could make it Sunday, but I am going to be hurtin' I just may be bowing out. My loss, I was looking forward to it, but I really want to go to the reunion. Shiznit! Posted on: 2011/10/18 11:06 _________________The doctrine of free will is the invention of the ruling class. Jack, I'm taking Friday off, fishing Fri-Sat, camping at Folley's Fri night, and catching dinner with the fisherpersons before heading home Sat night. I don't think we can share a ride, but I'd be glad to share a campsite with you Fri night. Posted on: 2011/10/18 16:30 _________________Only one constant in the universe, all men are equal in the eyes of the fish. -GulfGreyhound paraphrasing Herbert Hoover Thanks. I think I'm going to have to bow out until Sunday, if I can make it up at all. Like I said, it's my loss as I was looking forward to seeing some folks again. Farmer Dave will show up in my place. The only difference is he'll catch fish. Posted on: 2011/10/18 16:34 _________________The doctrine of free will is the invention of the ruling class. I fished yesterday with Squaretail and Atlantisboy on Elk Creek. They had fished Walnut and 20 mile on Monday. The fish are in throughout the streams, we caught fish north of 90 on Elk. Fish numbers seem to be up from the last two dismal years in my opinion (your mileage may vary), but not epic numbers by historic standards. The size of the fish this year has impressed Squaretail and I. All three of us caught steelhead over 30 inches on Tuesday, fish that were personal bests for all of us. While this was Atlantisboy's first trip to the Erie tribs, Squaretail and I have been coming for a number of years. We had low and clear conditions, but we still got the fish to cooperate. Here's a nice shot of Squaretail posing with his new person best steelhead! There were good numbers of fish as evidenced by this photo from upper Elk Creek. Just kidding, that's Trout Run of course... Great new parking lot at the mouth of Trout Run! We did see some browns mixed in with the steel at trout run, less than 1 percent though. The photo is poor, but this brown was as big as the neighboring steelhead. Looking forward to seeing you all at the Jam in under two weeks! I think I've talked Bruno into coming up for the day on Friday. Posted on: 2011/10/26 11:08 _________________Only one constant in the universe, all men are equal in the eyes of the fish. -GulfGreyhound paraphrasing Herbert Hoover the fishing as been good had a few guys up sunday and we got into some fish. The crowds have been unreal I live here and I dont even want to fish that much. Elk creek was a zoo sunday every parking area was packed. So far the numbers are pretty good a lot better than the last few years but not as many as there should be with all the rain we have had. The size of the fish is larger than normal not a lot of long fish but very thick fish. A few I have caught this year looked like footballs. If the weather stays like it has been it should be a great weekend. Not sure if I will fish all three days but should be there for dinner friday and to fish some of the day saturday. Unless I kill a buck before then. If anyone needs any info on gear or directions shoot me a pm. Looking forward to seeing everyone agin and to meeting some of the new people. Posted on: 2011/10/26 17:11 _________________ I would rather be lost in the woods than found in the city
(Title Image: CommunityNurse6 via Twitter) Health & Social Care Committee Community & District Nurses (pdf) Published: 21st August 2019 “If we are to support individuals and their families to manage their health at home, avoid unnecessary hospital admissions, enable early discharges and help maintain people’s independence then we need a clear picture of what the community nursing situation is in Wales at the moment and investment in the service. “For the service to improve and thrive we need to make sure that staffing levels are right, that nurses are provided with the mobile technology they need to do their jobs effectively and that community nursing is seen as an attractive career.” – Committee Chair, Dr Dai Lloyd AM (Plaid, South Wales West) 1. District nursing is an “invisible service” that urgently requires better management Despite district and community nurses providing a link between acute health services, primary care, palliative/end of life care and the promotion of independent living, there’s no clear vision for the sector. There’s no information regarding the skills mix, number of district nursing teams, number of specialist children’s community nurses or even the number of patients being seen by them. Without this kind of information, it’s nearly impossible to plan the workforce and it results in the service becoming “invisible”. This makes the proper integration of health and social care (something the Welsh Government and Plaid Cymru have long supported) far more difficult. “Morale is quite low, I think, particularly at the senior levels, in community nursing because of the tremendous pressure they’ve been under and feel that they’ve been under for a long time, and also this feeling, as I say, of being invisible to the wider service.” – Lisa Turnbull, Royal College of Nursing Wales The Committee called for an urgent audit of district nursing (particularly children’s nurses) and for district nursing to be properly recognised in recruitment campaigns and workforce planning. However, the Chief Executive of NHS Wales, Dr Andrew Goodall, said that the direction of travel was towards broader approaches focusing on all specialities at the same time instead of individual strategies. The Nurse Staffing Levels Act currently doesn’t apply to district nurses but there are early discussions on extending it. 2. The number of district nurses has increased…..or has it? There were 989 district nurses in Wales during 2018, an increase from 827 in 2017. The Royal College of Nursing (RCN) Wales, however, believed the statistics were inaccurate due to coding errors, with all nurses working in a community setting in some health boards being counted as district nurses, when it should only count those with a specific district nursing qualification. The Committee also heard of a lack of data regarding the number of palliative care patients being seen by district nurses. Several organisations – notably Macmillan and Hospice UK – said district nursing services were over-stretched and under-staffed. Enrolments on district nursing courses across the UK have been steadily falling and the workforce is ageing. However, three Welsh health boards said they had few problems recruiting replacements – though the number of replacements required soon will become an issue. Some community nurses called for smaller teams lead by one or two experienced nurses. The Welsh Government accepted problems with data collection and the issue has been raised with health boards. Dr Andrew Goodall believed the overall figures on the number of district nurses were broadly accurate. 3. District nurses need to be able to access technology to do their jobs effectively Access to technology was described as the single biggest issue raised during the inquiry. Half of district nurses who responded to the inquiry said they didn’t even have a mobile device to access basic administrative software. It’s been a problem for patients as well, some of whom try to contact nurses to change or cancel appointments but have been unable to do so. Cwm Taf health board has piloted Malinko scheduling software and in the short time it’s been in use it’s already being seen as beneficial for staff and patients. The system has also been developed with nurses’ needs in mind. The Committee recommended the Welsh Government work with health boards to ensure district nurses are provided with hand-held devices – with instant access to patient information, appointments and e-mails – as standard.
What have you enjoyed learning about most in class? Romans 1:19-20 For what can be known about God is plain to them, because God has shown it to them.For his invisible attributes, namely, his eternal power and divine nature, have been clearly perceived, ever since the creation of the world,in the things that have been made. So they are without excuse. Romans 1:19-20 (ESV)
Kai Corporation, one of the representative Japanese razor companies, has started a collaboration campaign for its top-selling disposable razor brand "Xfit" with Eiichiro Oda's internationally famous manga series One Piece since February 22. The brand has shipped over 2 million units in Japan. During the campaign period, the razor is decorated with special package illustrations of Monkey D. Luffy and Trafalgar Law, and also comes with a chi-character holder stand of Luffy (two types), Law, Zoro, Sanji and Chopper. And three-holder set with a 15.5cm-tall figure holder stand of Luffy and Nami are also offered. Campaign CM Main visual Special packages of Luffy and Law (756 yen) chi-character holder stands Three-holder set with a figure holder stand of Luffy and Nami (2,700 yen) Source: press release (c) kai corporation. and kai industries co., ltd. All Rights Reserved. © Eiichiro Oda/Shueisha, Fuji TV, Toei Animation
require_relative '../../spec_helper' require_relative 'shared/equal_value' describe "Regexp#==" do it_behaves_like :regexp_eql, :== end
[chain] chainNextFile = true [providers] com.opengamma.strata.collect.named.SampleInvalid2 = lookup
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA _ 8 Robert Lee Johnson, ) c'°"k¢ U.S. D|strlct and . ) Bankruptcy Courts Plaintiff, ) ) v. ) Civil Action No. ) / 61 ~ ¢?»73 United States Dep’t of Labor, ) ) Defendant. ) MEMORANDUM OPINION This matter is before the Court on review of plaintiffs pro se complaint and application to proceed in forma pauperis. The application will be granted and the case will be dismissed pursuant to 28 U.S.C. § l9l S(e)(Z)(B)(ii) (requiring dismissal of a case upon a determination that the complaint fails to state a claim upon which relief may be granted). This action arises out of the same events underlying plaintiff s two dismissed actions. See Johnson v. Interstate Mgmt. C0., LLC, No. 13-0763 (UNA) (D.D.C. May 24, 2013), a]j"d, No. 13-7097 (D.C. Cir. Oct. l1, 2013); Johnson v. Interstate Mgmt. C0., LLC, 871 F. Supp. 2d l, (D.D.C. 2012). The only difference is that plaintiff sues the Department of Labor and the Directorate of Whistleblower Protection Programs instead of his former employer. In all other respects, the complaint is substantially the same as the dismissed complaint. Plaintiff alleges that he was fired because of his whistleblower activity, which is a violation of 29 U.S.C. § 660(0). See Compl. at 4. The Occupational Safety and Health Act of 1970 ("OSHA") "prohibits employers from discharging employees because they file complaints or otherwise exercise rights afforded by the [OSHA], including but not limited to informing the Occupational Safety and Health Administration . . . of unsafe conditions and requesting a federal inspection." Johnson, 871 F. Supp. 2d at 4 (quoting Kennard v. Louis Zimmer Comm'cns, Inc., 632 F. Supp. 635, 636 (E.D. Pa. 1986) (citing 29 U.S.C. § 660(0)(1)). An "employee who believes" that a violation has occurred may "f`ile a complaint with the Secretary [of the Department of Labor]," who, in turn, "shall cause such investigation to be made as he deems appropriate." 29 U.S.C. § 660(c)(2). "lf upon such investigation, the Secretary determines that the [statute] has been violated, he shall bring an action in any appropriate United States district court against such person." Id. Plaintiff has again attached to the instant complaint the Secretary’s decision dated February 4, 2013, finding after investigation that "[t]he preponderance of the evidence failed to support that you were terminated because of your engagement in protected activity." Since, as previously determined, the OSHA does not authorize a private cause of action, see Johnson, 871 F. Supp. 2d at 5 (citing cases), this case will be dismissed with prejudice for failure to state a claim.l A separate Order accompanies this Memorandum Opinion. W”:Y/’r"f/ {%V Uniie States Dis‘uu, Judge DATE; May , 2014 ‘ To the extent that plaintiff is bringing a separate retaliation claim, see Compl. at 3, this Court previously determined that because OSHA’s "remedies are exclusive," plaintiff "cannot bring a claim of retaliation for having filed an OSHA complaint." johnson v. Interstate Mgmt. C0., LLC, 871 F. Supp. 2d l, 5 (D.D.C. 20l2) (citing cases). 2
The Hart High School freshman football team is 5-1 so far this season. They're coming off a big win, thanks in part to No. 68 Ty Heid. "I came in here knowing I'm probably not going to be the star player, and now here I am the star player of the week," Heid said. Heid has autism, but that doesn't block his ability to make plays as a lineman or get the ball over the goal line. It was last Thursday night when Hart High School was beating Canyon High School 50-6. Coach Jack McKeown put Heid in to run the ball, so he could score his first touchdown. "On the fourth down, I make it over the line. I was on the ground, holding the ball and I thought to myself, 'I don't think I made it,'" Heid said. "Someone, I forget who, kind of comes up over my face mask and he's all excited, 'You made a touchdown,' I'm like, 'I did?' C.J. McMullen helped get Heid into the end zone. "And so he got it and I just pushed as hard as I could to get him in and it was great. I've never been so excited playing a game of football," McMullen said. Heid says at the beginning of the season, he didn't think he'd get the chance to score. But part of the coaching philosophy of this team is to make memories for the players. "It's about developing the players that we have and having them play to the best of their abilities, and it's also about building a team, OK, so when Ty scored it was kind of a culmination of those efforts," McKeown said. Heid says he wants all of his teammates to know the feeling of putting points on the board. It has boosted his confidence, but he won't take all the credit for the final touchdown of Hart's victory over Canyon. "The team keeps saying, 'Hey, you did this! Good job! You did this!' and I keep telling them, 'No, I didn't do this, we did this,'" Heid said.
Local web app connects the college search to social media Brian Summerhill chose to launch his business idea through Start Co. before he was accepted into the accelerator program. His idea was based on the realization that school guidance counselors, with an average caseload of 500 students, are struggling to help their students find the right college fit. He developed MyCollegeSTREAM as a web application that helps guidance counselors get students engaged in the college search process by using college social media. “Seventy-five percent of high school students research college on social media, and there are plenty of accounts floating around across Facebook, Twitter, Instagram, and YouTube. MyCollegeSTREAM has found a way to harness these accounts onto one platform, making them easily accessible to students so that when they visit their guidance counselor, they will have a better idea of the college they are considering, as well as potential majors and future careers,” explained Summerhill.
Jojo Tangkay Jercules "Jojo" Tangkay (born November 26, 1976 in Aloguinsan, Cebu) is a professional basketball player who is currently playing for the Basilan Steel of the Maharlika Pilipinas Basketball League (MPBL). He was drafted 16th overall by the Sta. Lucia Realtors in 2001. Career Tangkay made the roster of Southwestern University Cobras on his freshman year after he offered to try out with them. He became the Cebu Amateurs Athletic Association's MVP in 2000. He was drafted 16th overall by Sta. Lucia Realtors in 2001. However, his height hindered his development and affected his playing time with the team. In 2002, he was signed by the Talk 'N Text Phone Pals, but only played 14 games before he was released. Disappointed by his failure to make a breakthrough in the PBA, Tangkay signed a contract with Welcoat Paint Masters in the Philippine Basketball League to resurrect his career. He became one of the league's superstars and earned two MVP awards. When Welcoat acquired the PBA's Shell franchise in 2006, he was re-signed for a new contract to play in the PBA after a great season with them in the semi-professional league. In 2008, he was waived by the team. He is currently playing with M. Lhuillier Cebu Ninos of Liga Pilipinas. External links Player Profile PBA-Online! Profile References Category:1976 births Category:Filipino men's basketball players Category:Living people Category:Basketball players from Cebu Category:Rain or Shine Elasto Painters players Category:Cebuano people Category:Shooting guards Category:Sta. Lucia Realtors players Category:TNT KaTropa players Category:Maharlika Pilipinas Basketball League players
Q: Unix Sort with exponential values I tried -g but still not sorting true my exp numbers : sort -g output.out > sorted.out and it gave me that output : 0.100159E+00 0.998410E+01 121.0000 0.100753E+00 0.992529E+01 126.8500 0.101409E+01 0.986102E+00 130.8000 0.102260E-01 0.977901E+02 123.4000 0.102844E+00 0.972347E+01 120.9500 0.107397E-02 0.931122E+03 124.0500 it seems like not sorting truely... A: The LC_NUMERIC locale determines the decimal-point character. LC_ALL=C sort -g output.out > sorted.out Example $ echo "$LC_ALL" de_DE $ sort -g foo 0.100159E+00 0.998410E+01 121.0000 0.100753E+00 0.992529E+01 126.8500 0.101409E+01 0.986102E+00 130.8000 0.102260E-01 0.977901E+02 123.4000 0.102844E+00 0.972347E+01 120.9500 0.107397E-02 0.931122E+03 124.0500 $ LC_ALL=C sort -g foo 0.107397E-02 0.931122E+03 124.0500 0.102260E-01 0.977901E+02 123.4000 0.100159E+00 0.998410E+01 121.0000 0.100753E+00 0.992529E+01 126.8500 0.102844E+00 0.972347E+01 120.9500 0.101409E+01 0.986102E+00 130.8000
Association of interleukin-8 polymorphism and immunoglobulin G anti-toxin A in patients with Clostridium difficile-associated diarrhea. Previous studies have shown that failure to produce serum antibodies to C. difficile (CD) toxin A is associated with more severe and recurrent C. difficile-associated diarrhea (CDAD); and that presence of AA genotype in the interleukin (IL)-8 gene promoter -251 position is associated with increased susceptibility to CDAD. This study examined the relationship between serum immunoglobulin G antibodies to CD toxin A and the presence of IL-8 AA genotype in hospitalized patients with CDAD. At enrollment, blood for host IL-8 genotype, serum for CD anti-toxin A antibody, and stool for IL-8 by enzyme-linked immunosorbent assay were obtained in CDAD patients and in CD-toxin-negative asymptomatic controls. Nine of 24 (37.5%) CDAD and 3 of 20 (15%) controls were CD anti-toxin A positive (P = .095). Eleven of 24 (45.8%) CDAD subjects were positive for AA genotype compared with 5 of 20 (25.0%) controls (P = .0019). One of 11 (9.1%) CDAD with AA genotype were positive for anti-toxin A antibodies compared with 8 of 13 (61.5%) non-AA genotype CDAD (P < .0001). Fecal IL-8 concentration for the single antibody-positive CDAD subject with AA genotype was lower than the median level of 822 microg/mL seen in 10 anti-toxin A antibody-negative subjects with CDAD. This study provided evidence that host susceptibility to C. difficile diarrhea is related both to a defective humoral immune response to CD toxin A and host IL-8 AA genotype.
Confidence climbs: Building permits steady in Lee, Cape July 3, 2014 Building permits for single-family homes rose slightly in June in unincorporated Lee County, a further sign that home construction is back on the rise. In Cape Coral, things are in flux as contractors are getting plans together and finishing up long overdue projects, with the knowledge that homebuyers are looking for more modest luxury. Over the past year, building permits in unincorporated Lee County have held steady. June numbers bested the 88 permits pulled in May and the 94 pulled in June 2013. In Cape Coral, 48 permits were pulled for residential, down from 56 in May. Two hundred and eighty-four have been pulled since the beginning of the year, which is on pace to better the 506 permits pulled for all of 2013, according to the city's building permits and contractor reports. Joan LaGuardia, Lee County Community Development spokesperson, said people should see this as a sign Lee County continues to grow at a gradual pace. "The good news is we're out of the uncertainty. We're not seeing the peaks and valleys," LaGuardia said. "We're seeing a lot of the big contractors are finishing the phases of developments they couldn't complete once the recession got started." Matt Sinclair, owner of Sinclair Homes in Cape Coral, said there is a lot in the planning stages currently, with more focus on "dry" lots, as opposed to gulf-access sites that garnered strong interest last year. "The gulf-access lots went up so fast in the last year that they went to the dry lots because you don't want the taxes and everyone is following suit," Sinclair said. "Now, you're seeing dry lot prices almost double from last year." Sinclair said he expects in the next year for fresh water lots to become the hot commodity, following the same trend as before. Sinclair has been building affordable luxury and the custom homes with the cost value driven by location. "The lots are governing what the values are and, on top of that, we have an increase in materials and labor because it's hard to find labor here," Sinclair said. "Everything feels like it's in demand." Irina Prell, owner of Elysium Homes, said she has seen a switch from extravagance to more budget-minded homes, especially for those hit hard after the economic downturn and in areas where lots are value priced. "We are still building in the higher-end niche, but we have seen more customers who are looking in the $300,000 range," Prell said. "Before it was 10 percent of our customers in that price range. Now, it's more like 60 to 70 percent, so we are responding to the demand and creating more value-priced products." Prell said she also is seeing a run toward dry lots, as prices of waterfront lots rose too quickly to support normal growth. "Demand is high and supply is limited. That's why not many people are shopping for them," Prell said. "People are starting to invest in them because that's the attraction of being here. Also, many foreign buyers are coming, buying waterfront lots, building and renting them out." Also during June, 83 multi-family units were permitted, compared to 173 in May and 29 this time last year. These include a 65-unit apartment building, part of the Palazzo Del Sol development on Pamplona Run, southwest of McGregor Boulevard and Pine Ridge Road. General commercial activity was valued at more than $5.3 million for 26 permits, compared to nearly $15 million in May and $8.5 million last year. June's commercial permits included an out-parceled Chili's restaurant at the Gulf Coast Town Center. The question remains: Is there anything new in the pipeline? "That will be the next phase of our economic development, I think," LaGuardia said. "We're in transition right now. If the economy keeps going the way it is and interest rates stay down, I think things will be in an upswing," Sinclair said. "We're in a good place. We're positioned for growth and comfortable where we're at," Prell said. Moe Beneke, executive director of the Cape Coral Construction Industry Association, said she likes what she sees, and that's a slow, steady growth. "As an industry, we're happy. It's a nice, steady increase. You couldn't ask for more," Beneke said. "We're not at either end of the spectrum or where the bubble bursts next week. We're busy but not overwhelmed." Lee County Community Development oversees planning, zoning, development and building services, environmental review, building inspection, and code enforcement for the unincorporated areas of Lee County.
--- Columbus Blue Jackets right wing Cam Atkinson has been named the National Hockey League’s Second Star of the Week for the period ending January 31, the League and club announced today. All-Star Game Most Valuable Player John Scott was named First Star, while Buffalo Sabres center Jack Eichel was the Third Star selection.Atkinson tallied four goals and one assist for five points with nine shots on goal and a +4 plus/minus rating to lead the Blue Jackets to a pair of wins last week. He collected his third career hat trick, fired off seven shots and was +2 in a 5-2 home win over the Montreal Canadiens on January 25. The following night, he collected 1-1-2, two shots and was +2 in a 5-2 win at Montreal as Columbus swept the home-and-home set with the Canadiens.Atkinson has tallied 17-15-32 and 12 penalty minutes in 50 games this season and is tied for second on the club in goals, ranks third in points and has scored both of the Jackets’ two shorthanded goals this season. The Riverside, Connecticut native has registered 76-68-144 and 70 penalty minutes in 269 career games with the Blue Jackets. He was the club’s eighth pick, 157th overall, in the 2008 NHL Draft.The Blue Jackets return to action on Tuesday when they visit the Edmonton Oilers. Game time from Rexall Place is 9 p.m. ET. Live coverage on FOX Sports Ohio begins with the Blue Jackets Live pre-game show at 8:30 p.m. The game will also be broadcast live on the Scioto Downs Blue Jackets Radio Network, including flagship station Sports Radio 97.1 The Fan, and online at BlueJackets.com
Follow Fairly Legal Michael Trucco Speaks on Fairly Legal Role, Love of Castle He played a role on one of the most iconic shows in recent TV history, guest-starred on an ABC favorite and now helps anchor a new hit on USA. How does Michael Trucco feel about his career these days? We spoke to the former Battlestar Galactica actor on a conference call this week, as he addressed his role on Fairly Legal and his experience on Castle. What drew you to Fairly Legal?I liked the idea of Fairly Legal being 180° turnaround. That’s the complete departure from the tone of a show like Battlestar Galactica and that was attractive to me. I think it’s important for an actor to look for diversity in their roles and I like the idea of playing a human being, for one. I like the tone of the show, the light-hearted, the dramady so to speak and the character interests me. I’m a son of a police officer, and so the aspect of law and prosecution interests me greatly. How long did it take you to develop chemistry with Sarah Shahi?when you’re thrown into a scene with somebody and you’re half naked, there’s not a lot of room for discussion. You just jump right in and sometimes the dynamic works between two actors and sometimes it doesn’t. And Sarah and I were fortunate to discover that there was a good rapport. There was a lot of trust between the two of us. Can you talk about your time on Castle?[It was] a very comfortable atmosphere, extremely professional cast and crew and it was a real treat. It was a real pleasure to get to play on that show before we started shooting you know Fairly Legal. I’ve retained friendships with all of them, in fact, since then and even just in my short time there, the four episodes, what a blast. I would do it again in a heartbeat if I was given the opportunity.
Nicole Mitchell Short Curly Hairstyle - Dark Brunette Loading Virtual Hairstyler... Please wait. To view this page ensure that Adobe Flash Player version 10.0.0 or greater is installed. Description This short fancy 'do is cut short and close to the head leaving the top long enough to allow the natural movement of the curls to give the over-all style height and lift making it a great to balance out a round face. Product is needed to pinch through the ends and regular trims will help maintain shape. Type Hair Category: Formal Hair Length: Short Hair Elasticity: Curly Suitability Gender: Women Face Shape: Round, Oval, Heart, and Triangular Hair Density: Thin/Medium Hair Texture: Fine/Medium Age: Under 21, 21 - 30, 31 - 40, 41 - 50, 51 - 60, and Over 60 Height: Any Weight: Thin/Average/Large Glasses: Suits with and without Styling Styling Time: 10 minutes Styling Tip: Use your fingers to pinch the styling product through your hair to create a textured finish. Styling Steps 1 . Style Hair Down at the Back Using Gel-wax Apply some gel-wax to your fingertips then pull through the ends of your hair in a downward motion to achieve a semi-wet, textured result. 2 . Style Sides Behind Ear Using Gel-wax Apply a small amount of gel-wax to your fingertips, then place it at the roots above your ear and drag it through as you pull your hair behind your ear. This will create a fresh, semi-wet result. 3 . Gel-wax and Pinch Hair for Texture Apply gel-wax to your fingertips and then pinch small clumps of hair in an up and forward motion. For a wetter look, use more gel-wax.
Atherosclerosis in chronic kidney disease: lessons learned from glycation in diabetes. In diabetes, glycation is a nonenzymatic posttranslational modification resulting from the bonding of a sugar molecule with a protein or lipid followed by oxidation, resulting in the development of advanced glycation end products (AGE). Like glycation, carbamylation is a posttranslational protein modification that is associated with AGE formation. Glycation of extracellular matrix proteins and low-density lipoprotein with subsequent deposition in the vessel wall could contribute to inflammatory response and atheroma formation. It is logical to extrapolate that carbamylation may result in modification of vessel wall proteins similar to glycation, and predispose to atherosclerosis.
The internet is flooding with articles proclaiming that Swedish International and Manchester United Superstar, Zlatan Ibrahimovic is coming to the LA Galaxy. According to a report by Fox Deportes (CLICK HERE), Ibrahimovic will leave Manchester United, forgo a possible Champion’s League run, and head over to the west coast to close out his career with the Galaxy. It should be noted that at this time the only outlet reporting this particular move is Fox Deportes. And while no one seems to be able to prove them wrong, there have been, so far, no corroborating stories. All news articles from different outlets link their way back to Deportes. Kevin Baxter of the LA Times reported, earlier this year, that the Galaxy had made a record MLS offer to a player. Theories on who that player could be were thrown around with most landing on either Javier “Chicharito” Hernadez or Ibrahimovic. Sports Illustrated’s Grant Wahl then confirmed that the player was Ibrahimovic. Other European and worldwide outlets put the offer at somewhere around $18-million dollars, although actual numbers are more speculation than fact. So in fact, Fox Deportes could be on an inside track to a deal that could eventually get done and still has the ability to get done. So it isn’t dead. Speaking to multiple sources across the league and close to the team, CoG wasn’t able to confirm any of the Fox Deportes reports. Most sources are questioning the timing of the report saying it seems “early” or very “premature.” People CoG talked to were caught completely by surprise, having heard no rumblings of anything close to imminent. It seems the likelihood of the Zlatan coming to LA hasn’t really changed. ESPNFC’s Jeffrey Carlisle tweeted this morning to say that a “league source tells me that Zlatan to LA Galaxy is ‘not close.'” In his story for that tweet, Carlisle says that according to his source the deal is still “50/50.” Which generally lines up with everything CoG has learned. League source tells me that Zlatan to #lagalaxy is "not close." https://t.co/deBJrC1Dpg — Jeff Carlisle (@JeffreyCarlisle) April 4, 2017 Jelle Van Damme, LA Galaxy Captain, entered the fray this morning as well. Retweeting this story from VoetbalNiews.be, but again, referencing the Fox Deportes report. And let’s not forget that Van Damme likes to have fun and joke around, so it can’t simply be assumed that he knows something on this deal. It’s more likely he’s adding fuel to the fire, rather than confirming anything. The LA Galaxy responded to my question about Zlatan and the Fox Deportes report saying that there is “nothing from us.” And while this is not a confirmation or a denial, I’m not putting too much stock in it. If things were really getting heated I’d expect a we-can’t-talk-about-other-teams’-players type of thing. Or a simple “no comment.” Ibrahimovic is in the final year of his contract with Manchester United. However, talks have been taking place between Ibrahimovic and the club, according to multiple reports. As theorized on CoG over the last couple of months, Ibrahimovic is likely to stay if Manchester United reaches the Champions League. Looking like favorites to win the Europa League and gain an automatic berth to the Champions’ League, it would be difficult to see Ibrahimovic leave Manchester for Los Angeles. And because that decision still has some time to play out, an announcement to come to LA wouldn’t seem smart at the current time. In a video posted on the Manchester United Facebook page and twitter pages today, Ibrahimovic is seen talking about when United fans would know his future. “Listen, if I had something to say I would already have said it,” said Ibrahimovic. “There is nothing to say. We are talking. If we are far from each other, or close to each other, there is no news. There are still talks. So let’s see what will happen. I’m open. There is nothing done yet.” The bottom line seems to be that the Galaxy are no closer to landing Ibrahimovic then before the Fox Deportes report. However, it doesn’t mean Fox Deportes is wrong. They just might be very, very early. For now, Galaxy fans should take deep breaths. If another source for the report pops up, then all hell could break loose. Aren’t rumors fun? ARTICLE UPDATES 4.4.2017 2:40PM – Added links to a Manchester United Video and quotes from Zlatan Ibrahimovic from that video. Comments comments
Wednesday, June 23, 2010 You may have picked up on that I have a slight love affair with cheese and chocolate. I mean if I'm going to indulge and satisfy a craving...well its going to either be something with melted cheese or something with rich chocolate. However probably not the same item. I just haven't figured out any ideas on melted Mozzarella with a piece of chocolate cake- the two seem to be in opposition of each other. However there is a restaurant - a glorious hot bed of indulgence- that mixes these two cravings together into a perfect harmony. I am, of course, referring to fondue at The Melting Pot. The Melting Pot, started in 1979 has locations across the US, specifically in 37 states, and offers an incredibly fun experience for group dining. For those of you not familiar with the idea of fondue, its origins are Swiss and revolve around the idea of a communal bowl of a hot liquid (think wine or broth based, oil based, cheese or chocolate based) in which you dip assorted food items and either cook or flavor them. The Melting Pot offers several different options for each type of Fondue, ranging from the classic Swiss inspired concoctions to American twists utilizing Southwestern flavors, or state specific cheeses. John actually surprised me with a trip to the Melting Pot last fall and we had a ball cooking meats and vegetables in our wine based broth, and even more fun with the appetizer and dessert courses of cheese and chocolate fondues. So when I received an invitation to attend a Boston Blogger meet up at The Melting Pot in Boston's Back Bay I immediately responded yes! The meet up was set up in one of their larger private rooms that was set up with four stations of fondue excitement. The first was a long table filled with four different cheese fondues- Traditional Swiss, Fiesta, Wisconsin Trio, and Cheddar. Each one had its own unique flavor enhanced by different ingredients. The Fiesta (my favorite) had a wonderful spicy flavor that I could picture over tacos, while the Classic Swiss had a lovely background of white wine. The Wisconsin Trio obviously had a little Blue Cheese in it with it's tangy flavor, and the Cheddar was just comforting and cheesy where when you pulled your tester out (bread, apples, or crudites) a string of cheese would follow....mm mm. The next table contained two pots of their Spinach and Artichoke Fondue that was basically that great dip on steroids (not that I endorse the use of performance enhancers for any reason) but this stuff was mighty tasty. Through these tables I enjoyed kidding myself that using a carrot stick or a celery stick to scoop up the lovely melted cheese was somehow making it better for me. I'm going to stick with that idea. The next two tables contained the dessert fondues. Oh my goodness! The first with what they refer to as "The Original" which is a delicious mix of milk chocolate and peanut butter (dangerously addictive), and their Pure Chocolate which was just as heavenly. The second dessert table included their Cookies and Cream (Chocolate base with Oreo's crushed in), Banana's Foster, and the Flaming Turtle contained a base of chocolate, with caramel and pecans mixed in and then flambeed...yum. All of these lovely fondues were served with fresh strawberries, pieces of brownie, and rice krispie treats, all in sizes perfect for dipping. Of course I loved all of them, but my favorite combinations were absolutely the rice krispie treat with the Original Fondue, and the brownie piece with the Bananas Foster. Both were out of this world! The Melting Pot is such a fun place to go with a group, relax, enjoy a nice glass of wine from a good collection, and play with your food! 5 comments: I love how you tied in the history of it all and provided an indepth look at their fondue. It helped me relive it all over again. Yummmm. I already want to go back (seriously. Whose with me? I'll bring my Thanksgiving pants) I had such a good time hanging out with everyone, and what's not to love about cheese and chocolate? By the way, try some brie with a bit of chocolate - it's heavenly! It's good when they're both at room temperature, but I read a brie en croute recipe somewhere that put the chocolate inside the dough with the cheese... my mouth is watering...
package com.github.markusbernhardt.proxy.selector.fixed; import java.io.IOException; import java.net.InetSocketAddress; import java.net.Proxy; import java.net.ProxySelector; import java.net.SocketAddress; import java.net.URI; import java.util.ArrayList; import java.util.Collections; import java.util.List; /***************************************************************************** * This proxy selector is configured with a fixed proxy. This proxy will be * returned for all URIs passed to the select method. * * @author Markus Bernhardt, Copyright 2016 * @author Bernd Rosstauscher, Copyright 2009 ****************************************************************************/ public class FixedProxySelector extends ProxySelector { private final List<Proxy> proxyList; /************************************************************************* * Constructor * * @param proxy * the proxy to use. ************************************************************************/ public FixedProxySelector(Proxy proxy) { super(); List<Proxy> list = new ArrayList<Proxy>(1); list.add(proxy); this.proxyList = Collections.unmodifiableList(list); } /************************************************************************* * Constructor * * @param proxyHost * the host name or IP address of the proxy to use. * @param proxyPort * the port of the proxy. ************************************************************************/ public FixedProxySelector(String proxyHost, int proxyPort) { this(new Proxy(Proxy.Type.HTTP, InetSocketAddress.createUnresolved(proxyHost, proxyPort))); } /************************************************************************* * connectFailed * * @see java.net.ProxySelector#connectFailed(java.net.URI, * java.net.SocketAddress, java.io.IOException) ************************************************************************/ @Override public void connectFailed(URI uri, SocketAddress sa, IOException ioe) { // Not used } /************************************************************************* * select * * @see java.net.ProxySelector#select(java.net.URI) ************************************************************************/ @Override public List<Proxy> select(URI uri) { return this.proxyList; } }
Angola is the largest maximum-security prison in the country. At least 90 percent of its inmates will die there. And Evangelical Warden Burl Cain has made sure their lives look as much like “slavery times” as possible.
Cardiff City FC's 30,000-seater stadium will not be finished until May 2009, says chairman Peter Ridsdale. He had previously said the team would be playing at the new ground near the existing Ninian Park by Christmas 2008. The news comes as the club faces High Court action by its financial backers Langston, which claims it is owed £31m. But Mr Ridsdale told city councillors neither the club nor stadium was at risk from the legal action, and the club will file a defence on Tuesday. The club has claimed it has until 2016 to pay £15m to Langston. Mr Ridsdale told Cardiff Council's economic scrutiny committee that club officials had spent several hours with lawyers this week preparing the defence to Langston's allegations. Responding to a question from city councillor Michael Michael, a life-long Bluebirds fan, Mr Ridsdale said he did not believe the club was at risk from the legal challenge. Mr Michael said: "He was fairly constrained about what he could say, but he more or less said people would be silly not to get round the table and resolve it. "What he said was that Cardiff City would be robustly defending when they go to court next week." 'Bad weather' When it was announced in October 2006 that construction firm Laing O'Rourke had won the project contract, Mr Ridsdale said the club planned to start the 2008/09 season in Ninian Park, before moving into the new venue before Christmas 2008. Mr Ridsdale told the meeting that the stadium was guaranteed to be built, but would not be ready until May 2009, with the pitch available from June. He told committee members the funding for the project was in an account that was controlled by the council. In addition to the 30,000-seater football stadium, the 60-acre Leckwith site is set to include an athletics venue, a multi-purpose sports facility and a retail development. Mr Ridsdale told the meeting the club had fixed a "not-more-than" price of £42.3m with builders Laing O'Rourke, and expected to learn the final price next Friday. He said the summer's bad weather had delayed the completion of the athletics track but contractors were hoping to make up time on the road and retail park. The club has been asked to comment on Mr Ridsdale's appearance before the committee.
MANILA, Philippines – Buses plying around Megaworld townships would starting using in May the same payment system as Metro Manila’s railways. Beep cards would be used in buses in Eastwood City in Quezon City; Uptown Bonifacio and McKinley Hill in Fort Bonifacio, Taguig; and Newport City in Pasay. Citylink Coach Services Inc. that operates buses under Megaworld’s Estate Management has entered into a partnership with AF Payments Inc. (AFPI) to use the same automated fare collection system on Light Rail Transit Lines 1 and 2 and Metro Rail Transit Line 3. AFPI, a consortium of Metro Pacific Investments Corp. and Ayala Corp., bagged the P1.72 billion Automatic Fare Collection System project under the public private partnership program. Through the partnership with AFPI, commuters can use the same Beep cards used on the country’s train systems when they ride Citylink buses. “The primary objective of this cashless payment is to provide Filipino commuters a seamless and convenient traveling experience around Metro Manila. With one beep card, you can now embark on all Citylink buses and light rail transit routes. This is the country’s first and only unified automated fare collection system and we are encouraging other operators to join and do the same,” said Arnie Batac, head of estate management at Megaworld in a statement. Before the end of May, 18 Citylink buses would be able to accept beep cards. While the beep cards would be used on Citylink buses, Batac said the cash payment option would still be available to passengers until they could fully adapt to the new system. To help facilitate the use of the automated fare collection system on Citylink buses, the concierge of Megaworld’s Lifestyle Malls would soon be able to serve beep card users for the reloading of cards. In 2008, Megaworld’s Estate Management earmarked around P100 million to establish CityLink, a public transportation system for commuters in the various urban townships. At present, there are 19 Citylink buses operating round-the-clock to serve around 200,000 business process outsourcing workers, residents and visitors of Megaworld townships. Batac said an additional 19 buses would be made available this quarter to help improve transport and minimize the waiting time of commuters. Megaworld is primarily engaged in the development of large-scale mixed-use planned communities, or community townships, that integrate residential, commercial, educational/training, leisure and entertainment components.
Latest Posts New Day co-anchor Chris Cuomo on Thursday continued the media freak out over Donald Trump picking a climate change doubter to run the Environmental Protection Agency. He even outrageously compared those with similar beliefs to past opposition of interracial marriage. On Wednesday’s The View, the notoriously biased panel touted their trustworthy reputations, in a completely unironic segment. While discussing ‘fake news,’ the panel contrasted right-leaning media website Breitbart with the “news” they give on The View. The most radically left hosts, Joy Behar, Sunny Hostin and Whoopi Goldberg, gushed over their own credibility, touting that any facts they give are “fact-checked” by ABC News. At this year’s Sundance Film Festival, some attendees are planning to express their worldviews through methods beyond cinematic art. If you can’t guess what’s in store, maybe this will help: the festival begins the day before President Trump’s inauguration. And lots of progressives attend. (Read: protests.) On Thursday's CNN Newsroom, Carol Costello boosted liberal criticism of President-Elect Donald Trump picking several retired generals to his Cabinet. She first asked former Obama Cabinet member Janet Napolitano, "Democrats — they're worried that Mr. Trump has picked so many generals....Does that concern you?" The anchor later hyped that "some...say a militarized view of America got us into...the Iraq War. It created problems at Abu Ghraib. It created the mess that is now Guantanamo Bay. So, do they have a point?" On Thursday morning, NBC’s Today and CBS This Morning were in full panic mode over Donald Trump nominating Oklahoma Attorney General Scott Pruitt to be administrator of the Environmental Protection Agency, labeling him an “environmental disaster” and the equivalent of “putting an arsonist in charge of fighting fires.” New York Times former Editorial Page editor Andrew Rosenthal, who never met a Republican he couldn’t call a racist, made one of his sporadic appearances at nytimes.com on Wednesday with “Donald Trump’s Big Idea: Don’t Blame Me” when he casually linked Trump to two of the most notorious mass murders in recent history with the smarmy observation that Trump had been named Person of the Year by Time Magazine, “a distinction also given to...Adolf Hitler and Joseph Stalin – twice.” Classy! Rosenthal also insisted that Trump voters must take responsibility for Trump's racism, xenophobia, and lying. On Thursday, CNN's New Day began the show by immediately hitting the incoming Donald Trump transition from the left, seeing "more hardliners" and a "climate change denier" being appointed to the administration, and fretting over its "militarization" because of the selection of "another general." The news network also forwarded fearmongering from an unnamed former Barack Obama aide who charged that Trump's selection for EPA administrator, Scott Pruitt, would be "an existential threat to the planet." Two similar arsons happened recently, but CBS covered only one of them. The difference? One fire occurred at abortion giant Planned Parenthood, the other targeted a pro-life pregnancy center. The day before Thanksgiving, an unidentified perpetrator committed arson at Project Defending Life, a Catholic pregnancy center located in New Mexico. So much for the tolerant left. Fox News pundit Megyn Kelly was booed by her Hollywood audience and heckled by one comedian for making a cordial remark about Donald Trump at a media event Wednesday. Kelly was speaking at The Hollywood Reporter’s annual Women in Entertainment Breakfast, a ‘Who’s Who’ gathering of prominent women in Hollywood, business, and the news industry. The audience may have been diverse but the politics surely wasn’t. Hillary Clinton’s failure to win the presidency means that her haters have reaped what they started to sow a quarter-century ago, argued former Times executive editor Jill Abramson in a Tuesday column for the liberal British newspaper The Guardian. “The activists, groups, think tanks and nonprofit ‘charities’ that made hay over the petty controversies that dogged [Clinton] had already succeeded in driving up her negative trust and honesty numbers well before the 2016 campaign,” wrote Abramson. “The garden was already planted; all Donald Trump needed to do is water it with his chants of ‘Crooked Hillary.’” In their two-hour-long documentary, The Legacy of Barack Obama, Wednesday, CNN allowed former Obama adviser Fareed Zakaria to set his sights on Congressional Republicans as he claimed their opposition was fueled by a deep-seated racism. “That fierce, unrelenting opposition, would haunt the next eight years and what began as whispers is now discussed openly,” he pontificated as ominous music played, “Did race play a role in the brick wall of Republican resistance to Barack Obama?” Readers who have spent any time reading economic dispatches from the establishment press since the presidential election have likely noticed that its business journalists have taken to praising the alleged wonders of the economy President Barack Obama is passing on to President-Elect Donald Trump. Current reality renders the praise completely undeserved, but of course that's not stopping them from engaging in it. News broke Wednesday that President-Elect Donald Trump had selected Oklahoma Attorney General, and active opponent to the Environmental Protection Agency, Scott Pruitt to lead that very same organization. Word of Trump’s latest pick sent liberal environmental groups into a panic along with networks CBS and NBC. “The president-elect filled more administration posts today, putting a global warming sceptic in charge of protecting the environment,” announced anchor Scott Pelley on CBS Evening News. In yet another example of the concept that liberals cannot accept defeat in a presidential election, author Mark Weston stated in a column posted on the TIME magazine website on Tuesday that the “approximately 65 million Democrats who voted for Hillary Clinton should pledge that in the future, if a Republican wins the presidency with fewer votes than a Democrat,” “we won't pay taxes to the federal government.” Noting that Trump's win marks the second time in the past 16 years that “a Republican candidate who finished second in the popular vote has won the presidency,” Weston declared that Democrats should adopt the motto: “No taxation without representation!” Federal employees and military personnel can donate to the Media Research Center through the Combined Federal Campaign or CFC. To donate to the MRC, use CFC #12489. Visit the CFC website for more information about giving opportunities in your workplace.
The study was terminated prematurely after randomising 70 patients between September 2011 and August 2014 because of slow recruitment. CTA was performed in 56 patients who completed >1 month of study drug. Graft occlusion occurred in 7/25 (28.0%) patients on ticagrelor and 17/31 (48.3%) on placebo, p=0.044. Of 207 analysable grafts, graft occlusion occurred in 9/87 (10.3%) with ticagrelor and 22/120 (18.3%) with placebo, p=0.112. Graft occlusion or stenosis ≥50% occurred in 10/87 (11.5%) ticagrelor vs 32/120 (26.7%) placebo, p=0.007. There was no major bleeding, but minor bleeding was higher with ticagrelor (31.4% vs 2.9%, p=0.003). In univariate analysis, ticagrelor use reduced graft occlusion (OR 0.32, 95% CI 0.10 to 0.97, p=0.047), which remained significant on multivariable analysis (OR 0.25, 95% CI 0.073 to 0.873, p=0.03). Conclusions Ticagrelor added to aspirin after CABG reduced the proportion of patients with graft occlusion, and was a significant univariate and multivariable predictor of graft occlusion. These results are hypothesis-generating and should be confirmed in larger studies.
Q: Where should I put `favicon.ico` so bokeh serve can find and render it? I have a directory format app, named myapp like: myapp/ | + -- main.py + -- favicon.ico + -- static | + -- some.img If I run bokeh serve myapp, I keeps getting 404 GET /favicon.ico (::1). Where should I put favicon.ico? A: You can add an HTML template to a Bokeh application, under the templates directory. With that, you can specify an favicon location in the normal way in the <head> of your template. For an example of an app that uses a template, see the crossfilter demo in the GitHub repo. The template just needs to have {{ plot_div }} {{ plot_script }} in the <body>. The app is rendered wherever the plot_div is located. A: Create folder "templates" and add "index.html" with {% extends base %} {% block preamble %} <link rel="icon" type="image/x-icon" href="myapp/static/favicon.ico"> {% endblock %} And move your "favicon.ico" in the folder "static". So you have: myapp/ | + -- main.py + -- templates | + -- index.html + -- static | + -- favicon.ico Here are some more information about extending the bokeh template. https://docs.bokeh.org/en/latest/docs/user_guide/embed.html#standard-template Also kudos to the answer from bigreddot and the helpful comment by gepcel.
Patients with melanoma or breast carcinoma undergoing axillary dissection are randomized to receive early or delayed shoulder mobilization following surgery. The study is designed to answer questions: Does Physical Therapy immediately post-op. interfere with wound healing? Does Physical Therapy immediately post-op offer more effective treatment for shoulder function in this population? Eighteen patients have been entered into the study, but data is not yet definitive.
/* * Copyright 2013-2020 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.springframework.data.mongodb.repository.config.lazy; import org.springframework.data.mongodb.repository.MongoRepository; import org.springframework.data.mongodb.repository.User; /** * @author Thomas Darimont */ public class ClassWithNestedRepository { interface NestedUserRepository extends MongoRepository<User, Integer> {} }
Q: Hyphen in method name, is it possible in any .NET language? I need to support a method named 'send-request' as an extension function to be used in an XSLT transformation. This is provided by an extension object on XslCompiledTransform. The cool thing about extension objects vs. <msxsl:script> is, well, that I don't have to use <msxsl:script>, you just declare the namespace and call the function. The bad thing is that the function name must match exactly the CIL method name. So, I'm wondering, is there a .NET language that supports hyphens in method names ? CLS compliance is not required, the method is invoked using reflection. Or, can I use some technique that modifies the IL of an assembly to change the method name ? Or, is there a way to intercept the reflection GetMethod call and trick the caller that a method 'send-request' exists, but return a 'SendRequest' method instead ? A: You can do this using reflection. I compiled the following into an assembly using ILAsm (I cut out all the fluff necessary to make this actually compile; these are just the salient bits (pun intended)): .method private hidebysig static int32 'Te-st'() cil managed { // Code size 8 (0x8) .maxstack 1 .locals init ([0] int32 CS$1$0000) IL_0000: nop IL_0001: ldc.i4.s 0x11 IL_0002: stloc.0 IL_0003: br.s IL_0005 IL_0005: ldloc.0 IL_0006: ret } I defined this method in a class named Program in a namespace named Test. Note that the method name is surrounded by single quotes. This is per the spec (ECMA #335): Identifiers are used to name entities. Simple identifiers are equivalent to an ID. However, the ILAsm syntax allows the use of any identifier that can be formed using the Unicode character set (see Partition I). To achieve this, an identifier shall be placed within single quotation marks. Then: var assembly = Assembly.LoadFrom(path); var method = assembly.GetType("Test.Program") .GetMethod( "Te-st", BindingFlags.Static | BindingFlags.NonPublic ); Console.WriteLine(method.Invoke(null, null)); This produced output: 17 I doubt that is the possible in the usual .NET languages. I don't know of any languages that allow/require you to "escape" identifiers. Without that, could you imagine trying to disambiguate the following: int a; int b; int a-b; int diff = a-b; // is that a minus b or the variable a-b? Maybe there's a COBOL.NET where you could do this, I don't know.
[Recognition of emotional states by epileptics from voices]. Seventy-four patients with focal epilepsy were examined by means of a specially devised complex of experimental techniques. It was shown that epileptic involvement of the temporal lobes (in particular the anterior and mediobasal regions) of both hemispheres was associated with disorders of recognition of the emotional coloring of speech and non-speech sound complexes. Maximum disorders in the comparison of unorganized sound rows were observed when the right temporal lobe was involved, in the comparison of emotions when the left lobe was affected. Difficulties in recognizing melodies and emotions were observed in patients with temporal foci in the left and the right hemisphere but it was especially marked after surgery on the structures of the left temporal lobe. The degree of the disorders was primarily due to the severity of the organic damage of the brain rather than to the localization of the epileptic focus.
A glow discharge starter is usually connected across or in parallel with an arc discharge lamp and contains a pair of electrodes. At least one of the electrodes comprises a bimetallic element which, when heated as a result of the glow discharge, bends towards the other electrode. When contact is made, the glow discharge ceases causing the bimetallic element to cool and withdraw from the contacted electrode. When contact is broken, a voltage pulse induced by the induction of the ballast, appears across the opposed electrodes of the lamp thereby initiating an arc discharge within the lamp. If the lamp ignition does not occur after the first voltage pulse, the glow discharge starter sequence is repeated until lamp ignition occurs. A glow discharge starter of the aforementioned type is described, for example, in the book "Light Sources" by Elenbaas, Philips Technical Library, pages 102-103. Other examples of glow discharge starters are shown in U.S. Pat. Nos. 2,324,907; 2,332,809; 2,376,669; 2,740,861; 2,930,872 and 2,930,873 and German Pat. No. DE3320933A1. Examples of commercially available glow discharge starters are the GB-5A manufactured by GTE Sylvania S.A., Costa Rica, San Jose and the PL13 manufactured by Osram, a division of Siemans A.G., Munich, W. Germany. The normal glass used for the glow discharge starter envelope has a wall thickness in the range of about 0.025 inch (0.635 millimeter) to about 0.035 inch (0.887 millimeter). Prior glow discharge starters generally displace a volume greater than 0.75 cubic centimeter. By using the teachings of the present invention, it is possible to reduce the size of the glow discharge starter to about one-third the size of prior starters. It has been found that an excessive amount of heat is required to seal glass with the above mentioned wall thickness range. The excessive heat creates several problems in the manufacture of the glow discharge starter. First, as a result of this heat, the electrical conductors and bimetallic element associated with the heat sensitive bimetallic element tend to undesirably oxidize. Also, a relatively large sealing capacity is required and an excessive amount of flushing gas must be employed in an effort to reduce the oxide formation on the electrical leads and bimetallic element, when glass having a relatively thick wall thickness is utilized. Second, the increased heat requires the use or more expensive segmented electrical conductors. Generally, a short section of stiff nickel coated steel is butt welded to a small diameter soft wire having a nickel-iron alloy core sheathed in a copper shell. The steel internal portion of the electrical conductors which form the electrodes, are needed to maintain proper spacing between the free end of the bimetallic element and the other electrode. The heat generated during manufacture when the electrical conductors are sealed into the envelope causes the bimetallic element to put a spreading force on the electrical conductors. Third, a standard press seal alone cannot be used in these prior glow discharge starters to hold the electrodes in their spaced relationship because the sealing heat would overstress the bimetallic element, causing misalignment of the electrodes. As a result, the prior glow discharge starters use various approaches. One approach involves sealing a glass bead or base on the electrical conductors to act as a heat sink during the subsequent press sealing operation. An alternate approach comprises first sealing the electrical conductors in a flare tube with an exhaust stem to form a mount. The mount is then sealed into the envelope.
Beginning the day five shots off the HSBC Women's World Championship lead, Michelle Wie drained a 36-foot putt on the 18th hole for a final-round 7-under 65 and clinched her first victory since the 2014 U.S. Women's Open.
Miltonduff 1980 (Malts of Scotland) A few months have gone by since we’ve tried new releases by Malts of Scotland, but they’re alive and kicking. Expect a whole bunch of reviews over the next couple of weeks. There’s an Inchgower 1982, Glencadam 1985, Highland Park 1986, Ardmore 1992, Longmorn 1976 etc. Let’s start with this 30 years old Miltonduff 1980, bottled a few weeks ago but not yet distributed as far as I know. Note that Malts of Scotland releases now come in a box by the way. Nose: pineapple sweets, freshly cut apples, hints of green banana… a nice, creamy fruitiness mixed with sawdust and some floral / grassy notes. A little mint and soft herbs. Honeysuckle. Lovely Speyside style – gets warmer by the minute. Better neat as too much water brings out a slight soapiness. Mouth: again some fresh fruits on a background of grassy notes that make sure it’s not too cloying. Now more pronounced oak. Vanilla. Golden apples. Hints of calvados? Honey. Cinnamon. A few nutty flavours as well. Again better without water. Finish: still fruity but quickly drying on spices and oak. A Miltonduff with a surprisingly young profile that’s warm and fresh at the same time. It’s a rather unknown distillery that often surprises me with great value for money. Around € 130.
A Wisconsin teen accused of sexually assaulting college students landed in jail for the third time in less than two weeks. Larry Seidl, 18, was busted Thursday night at the University of Wisconsin-Madison for allegedly going into a women’s bathroom in a dorm and sticking his phone under an occupied stall, authorities said. Seidl left the dorm when staff confronted him, but police tracked him down on campus, news station WKOW reported. He was taken into custody for bail jumping. The alleged assault came within nine days of him posting bond for similar crimes in the campus-area. Campus police spokesperson Marc Lovicott told The Post that Seidl, who is from Madison, is not enrolled at the university. Police said that he was arrested Aug. 30 for a related incident where he went into a different dorm and allegedly video-taped a student in the women’s bathroom, WKOW reported. Security footage showed him going into other restrooms. He was booked on disorderly conduct and criminal trespassing charges, but later released on $150 bail. The next day, Seidl was accused of grabbing a woman’s butt at the University Book Store in Madison. He was arrested for fourth-degree sexual assault. He appeared in court Thursday for the first two incidents — just hours before he allegedly committed the third crime. The teen remained in custody Friday at Dane County Jail. He is set to appear in court Monday for his bail hearing.
Q: Handling circular imports in Node JS //x.js const {function1}=require('./y'); const function2=()=>{ console.log('from function 2 '); function1() } function2(); module.exports={function2} //y.js const {function2}=require('./x'); const function1=()=>{ console.log('hello from function1'); function2(); } module.exports={function1}; The function2 in y.js doesn't execute when I run the x.js file and a type error is thrown which says that function2 is not function. node testing/x.js from function 2 hello from function1 /media/xyz/9A2A71AB2A718553/abc/ghf/testing/y.js:6 function2(); ^ TypeError: function2 is not a function at function1 (/media/xyz/9A2A71AB2A718553/abc/ghf/testing/y.js:6:3) at function2 (/media/xyz/9A2A71AB2A718553/abc/ghf/testing/x.js:5:3) at Object.<anonymous> (/media/xyz/9A2A71AB2A718553/abc/ghf/testing/x.js:7:1) at Module._compile (module.js:649:30) at Object.Module._extensions..js (module.js:660:10) at Module.load (module.js:561:32) at tryModuleLoad (module.js:501:12) at Function.Module._load (module.js:493:3) at Function.Module.runMain (module.js:690:10) at startup (bootstrap_node.js:194:16) A: I'm not sure how much you know about modules in general, but you might find this answer of mine on SoftwareEngineering.SE helpful. When you do require('./x') inside y.js, you get the in progress, partially-built exports object from the x module. At the time x requires y, x hasn't yet added function2 to its exports object, and it won't do so until its call to require('./y') finished and it can execute the final line in x.js. In other words, repeated calls for require('foo') don't re-run the code in module foo. Instead, they produce the one-and-only module.exports that has already been created for foo. Even if foo has not yet run to completion, the module has an incomplete module.exports object that was created when it was first required. The trick here is not to overwrite the module.exports object, but simply add methods to it. x.js const {function1}=require('./y'); const function2=()=>{ console.log('from function 2 '); function1() } module.exports.function2 = function2; function2(); y.js const xModule = require('./x'); const function1=()=>{ console.log('hello from function1'); xModule.function2(); } module.exports={function1}; By doing xModule = require('./x') and xModule.function2() in y.js, we allow function1 to wait until the x module has defined function2 and added it to its module.exports object. We also have to move the call to function2() inside x.js to below the creation of module.exports.function2, since a call to function2 will cause a call to function1, which expects the x module to have its function2 method on module.exports already.
, -5, m. -5, l, m, 3 Suppose -v - 530 = 5*x - 0*x, 2*x = 5*v - 185. Let b = x - -629/6. Let n = 0.2 + -0.2. Sort 3, b, n in descending order. 3, n, b Let i(f) = -28*f + 171. Let y be i(6). Put -358, y, 1, -1 in decreasing order. y, 1, -1, -358 Let i be 0 - ((-4)/13)/(-2). Sort i, 0.03, -5/8 in ascending order. -5/8, i, 0.03 Suppose 2*q + 5*w - 70 = 0, q - 6*q - 3*w + 137 = 0. Suppose q*v - 32*v = 28. Put -0.5, 4, v, -3/5 in ascending order. v, -3/5, -0.5, 4 Let s = -51 - -64. Let l = -15 + s. Let u be 4/((-104)/30) - -1. Put l, u, -5 in descending order. u, l, -5 Let f be (-5)/(-35)*(-1 + (-36)/(-6)). Sort -1/11, f, 3 in descending order. 3, f, -1/11 Suppose 4*t = -16, t = -0*k - k. Let z be (-72)/(-33) + (-2)/11. Put -2, z, k in descending order. k, z, -2 Let a be (-13)/(-26)*(-2)/(-131). Let f = 259/393 + a. Put 2, -1, -3/2, f in decreasing order. 2, f, -1, -3/2 Let a(h) = h**3 - 3*h**2 - 4. Let p be a(2). Let m be (-10)/p*(-10)/25. Put -2, 21, m, 3 in ascending order. -2, m, 3, 21 Let g = -673 - -672. Sort -3, 4, g, 25. -3, g, 4, 25 Suppose 4*z + 12 + 0 = 2*q, 4*q = -3*z - 9. Let n = q + 5. Let l(m) = m**3 + 5*m**2 + 63*m + 417. Let c be l(-6). Sort n, c, -4 in ascending order. -4, c, n Let n be -1 + -2 - (-91 - -22). Let x = 67 - n. Let p be 6/(-27) - (-8)/117. Sort x, 0.5, p. p, 0.5, x Suppose 9*u - 7 = 2*u. Put -131, u, 4, -4 in descending order. 4, u, -4, -131 Let x = -30 - -31. Suppose d = 6*d - 35. Let s = -10 + d. Sort s, x, 1/4 in descending order. x, 1/4, s Let f = 0.077 + 3.923. Put -1/2, -3, f in decreasing order. f, -1/2, -3 Let k = -2183 + 2231. Put -1/5, k, 0.2 in ascending order. -1/5, 0.2, k Let x = 281/760 - -1/190. Let r(v) = -2*v**3 + 53*v**2 + 148*v - 89. Let c be r(29). Let y = -1 - 0. Sort y, c, x in decreasing order. x, y, c Let a = -42 + 52. Suppose 0 = -8*y + a + 22. Put 3, 5, -1, y in ascending order. -1, 3, y, 5 Let y = -156 - -154. Put -4, -21, 3, y in increasing order. -21, -4, y, 3 Let x be (2/56)/(10 - 408/42). Sort x, 37, 3 in ascending order. x, 3, 37 Let q = -3.32 + 3.7. Let y = q + -0.69. Let j = y - -0.71. Put -4, 2, j in increasing order. -4, j, 2 Suppose -5*j + 37*x - 9 = 34*x, -3*x + 9 = 3*j. Suppose 0 = -2*c + 3 - 5, c + 3 = -2*z. Let r = 0 + 3. Put j, r, z in decreasing order. r, j, z Suppose 0 = 10*n - 54 + 94. Sort -2/7, -97, n. -97, n, -2/7 Suppose -2*l + 4*m + 14 = -5*l, -21 = -3*l + 3*m. Put 7, 5, l, -4 in ascending order. -4, l, 5, 7 Suppose -360 = 43*c - 58*c. Suppose 5 = 2*t - v, 16 = t + 5*v - 10*v. Put c, t, -4 in decreasing order. c, t, -4 Let t(p) be the first derivative of -4 - 3/2*p**2 + 4*p. Let l be t(3). Put l, 0, -1 in decreasing order. 0, -1, l Let u = -350 - -350. Put -0.5, -2/3, 1, u in decreasing order. 1, u, -0.5, -2/3 Let y be 10/10 + 2/(-4) + 0. Put 13, y, 1.1, 0.3 in increasing order. 0.3, y, 1.1, 13 Let j(y) = -y - 9. Let z be j(-5). Let b be (4 + -1)*(6/(-12) + 7/(-14)). Sort -29, z, b. -29, z, b Let p = -88.005 + 0.005. Let w = 86 + p. Put -0.4, w, -0.7 in descending order. -0.4, -0.7, w Let m = -38.933 + -0.067. Let d = m + 39.2. Sort 3, d, -3 in decreasing order. 3, d, -3 Let g be (-19 + 18)*(-2 + 4). Sort -231, 0, g in increasing order. -231, g, 0 Let y(f) = -f**2 + 6*f - 14. Let i be y(4). Let r(m) = 5*m**3 - m**2 - m + 1. Let x be r(1). Let j = i + x. Sort 4, -5, j. -5, j, 4 Let y = -331/7 + 47. Let q be ((-4)/(-6))/((-8)/12). Suppose -3 - 1 = -3*x + 4*k, -5*x - 4 = -4*k. Sort y, x, q in decreasing order. y, q, x Suppose 26*h + 3 = 27*h. Sort h, -5/3, -5, -4 in ascending order. -5, -4, -5/3, h Suppose -f + 2*d - 2 = -2*f, f - 5*d - 9 = 0. Suppose -5*q = 4*p - 26, -f*q = -q + 4*p - 22. Let k be 2/4*(q - 2). Sort k, 2, -0.2 in descending order. 2, k, -0.2 Let u = -6 + 11. Let n be ((-1)/3)/(3/(-18)). Let t be 1 - (4/n - 3). Put u, t, -1 in ascending order. -1, t, u Let n = -26 + 29. Suppose 3*x - n = -6. Sort -3, x, 17. -3, x, 17 Let o = 14 - 13. Put 0.1, o, -0.01 in decreasing order. o, 0.1, -0.01 Let b be (0 - 1)/(7/(-35)). Suppose b*t - 2 = -5*g - 7, 3*t + 2*g = 0. Let h = 35.7 - 36. Put t, 6/7, h in increasing order. h, 6/7, t Let k = 81 + -79. Suppose 5*j - k*x = -18, 3*j + 5*x = -2*j + 10. Sort -4, 2, j, -5 in increasing order. -5, -4, j, 2 Suppose 2*d - 3*d = 0. Let l = -2 - d. Put -4, l, 1 in increasing order. -4, l, 1 Let t = -2 - -6. Let p be t + -3 + 4/(-1). Let n = 1 + -6. Sort 2, p, n. n, p, 2 Let b be -5 - ((-34)/(-85) + 44/(-10)). Sort -0.3, b, -0.2, -5 in descending order. -0.2, -0.3, b, -5 Let p be 2/6*15/5. Let l be (-1 - (-7)/p)*-1. Let v be 3/l*(2 + 0). Put 0.5, 3, v in descending order. 3, 0.5, v Let u = 0.726 + -2.066. Sort 5, -2/5, u in ascending order. u, -2/5, 5 Let s = -67 - -67.5. Sort -0.1, -3/4, s. -3/4, -0.1, s Let p be ((-9)/(-2))/((1 - 3)/4). Let o be -1 - (-9)/(p/(-2)). Let x = 4 + -1. Sort x, o, -3 in descending order. x, o, -3 Suppose g - 19 = 3*w, 26 - 5 = 4*g - w. Let k be 16/14 + g/(20/(-5)). Suppose 3*r - 21 = -2*r - 2*q, 0 = r + 5*q + 5. Sort 3, k, r in descending order. r, 3, k Suppose 0 = 4*v - 2*c + 50, 4*v - 4*c + 13 = -27. Let r be (v/(-10))/(1 + -3). Sort 2/9, r, -0.6 in descending order. 2/9, -0.6, r Let h = -5/7 - -17/14. Let n = -78.4 + 81. Sort n, -0.2, h. -0.2, h, n Let h = 20 - 17. Let l = 0.05 + -0.07. Sort l, -2/9, h. -2/9, l, h Suppose -58*w = -51*w + 140. Let i be w/14*(-2)/10. Sort 1/7, 1.2, i in descending order. 1.2, i, 1/7 Suppose 2 = -u - 4*t, 2*u + 4 = -t - t. Let w(q) = 8*q + 11. Let l be w(u). Sort 23, l, 0. l, 0, 23 Let n = -68 + 72. Let c be ((-14)/(-4) - 2)*2. Let s(u) = u**2 + 7*u + 2. Let p be s(-6). Put n, c, p in increasing order. p, c, n Let g = 4474 + -232633/52. Let a = 1/26 - g. Let b = 91 + -457/5. Put b, a, 3 in increasing order. b, a, 3 Let h be 2*(-2)/(-10) + (-3952)/380. Sort -5, h, 1, 2 in ascending order. h, -5, 1, 2 Let i(c) = c**3 - 9*c**2 + 9*c - 7. Let s be i(8). Let t be -19 - (-4 + 1 + s). Let h = -35 - t. Sort 4, 3, h. h, 3, 4 Let a(p) = p**3 - 39*p**2 + 225*p - 36. Let w be a(32). Put -26, w, 0, 2 in ascending order. -26, w, 0, 2 Let f = 418/21 - 20. Sort -2/9, f, -0.4, 1/57 in decreasing order. 1/57, f, -2/9, -0.4 Let i = 9 + -11. Let g = -157 + 162. Sort i, -4, g in increasing order. -4, i, g Let r(s) = -5 - 15*s - 8*s - 6*s**2 - 15*s - s**3 + 32*s. Let d be r(-5). Suppose 5*p = -0*p + 15. Put 2, p, d in descending order. p, 2, d Let u = 2287 + -2286.6. Let a = 4.9 + -0.9. Let b = a - 3.7. Sort b, u, 0.1. 0.1, b, u Let i be 4/16 - (765/(-108) - -7). Put -0.4, -10, i in increasing order. -10, -0.4, i Suppose -3*i - t = -24, 2*i + 3*t - 17 = -8. Suppose 5*c = 8*c + i. Suppose 0 = -3*v - 3, -5*o + 6*o + v = 0. Sort 3, o, c in ascending order. c, o, 3 Let m = -305 + 311. Sort 1, m, -7, 0.1. -7, 0.1, 1, m Let q = -0.12 + 0.22. Let p = -542 + 5960/11. Sort q, -4, p, -2 in ascending order. -4, -2, p, q Let j = -9 + -4. Let z = 16.3 - 3.3. Let u = j + z. Put -2/21, u, -1/8 in descending order. u, -2/21, -1/8 Let x = 1485 + -47515/32. Sort 0.2, -2/7, x in descending order. 0.2, x, -2/7 Let k = 38 + 53. Let r = 92 - k. Sort -1, r, 2 in ascending order. -1, r, 2 Suppose -28 = -2*h - 2*b, -90 = -5*h - 5*b + 4*b. Suppose l = -3, w + 3*w - l - h = 0. Sort w, 5, -1 in ascending order. -1, w, 5 Let b = 4 - -1. Suppose -3*l + 14 = l - v, 0 = v + 2. Put 4, -1, l, b in decreasing order. b, 4, l, -1 Suppose 5*a - 29 = v, a - 4*v + 5*v = 7. Let f be (-1)/((-6)/9*(-6)/(-8)). Sort a, f, 3 in decreasing order. a, 3, f Let h = -67 + 67. Let y = 602/5 + -120. Sort h, y, 1/7 in decreasing order. y, 1/7, h Suppose 41*a + 269 - 105 = 0. Put -15, 1, a, 4 in descending order. 4, 1, a, -15 Let c = 659 - 660. Sort 5, c, 4, -3 in descending order. 5, 4, c, -3 Let u = -4.22 + 4.12. Sort u, -16, 3 in decreasing order. 3, u, -16 Let h(a) = a**3 - 13*a**2 - 15*a + 19. Let q be h(14). Suppose -q*i + i + 5*i = 0. Put i, -1, 3 in decreasing order. 3, i, -1 Let q(g) = 6*g**2 - 35*g + 17. Let p be q(5). Put -2/41, -2/5, p in descending order. -2/41, -2/5, p Suppose 262*s + 2 = y + 261*s, 0 = 3*y - 4*s - 10. Let v = 3 + -2.9. Sort y, 1/3, v. y, v, 1/3 Let u be ((-16)/4 - 1)*(-11)/(-11). Suppose 5*h = 3*m - 16, 3*m + 1 - 2 = 2*h. Sort m, u, 21 in decreasing order. 21, m, u Suppose 45*f - 22 = 56*f. Put f, -6, 3 in asc
If Mad Men’s pilot asked viewers to wonder who Don Draper was, the second episode all but insists upon it. Hell, the man’s wife closes one of the earliest scenes by looking over her sleeping husband and essentially murmuring to herself, “Who are you?” The episode makes much of his unwillingness to talk about his past, drawing a sharp line between Roger, who talks easily of his nanny as a child, and the main character. He’s saving up those experiences for the novel he’s planning to write someday, after all. It wouldn’t be good to go around giving them away for free. Don is still the Teflon man, his dazzling exterior allowing nothing to get stuck, and he takes both Betty’s unhappiness and Midge throwing a television out a window in stride. The episode might as well come equipped with a brass band marching down the street, carrying a banner reading, “THIS MAN KEEPS SECRETS FROM EVERYONE HE MEETS.” “Ladies Room” is a little too neat and orderly, and a little too fond of explicitly underlining its thematic points, all in that very Mad Men way the show can sometimes get when it seems to be so eager of making sure we understand every point it’s trying to make. But that’s fine. It doesn’t need to be an all-time great episode of television—or even as good as the pilot. It just needs to be a pretty good second episode, an episode that assures us there’s a television show here, and we’re in good hands all around. On that level, “Ladies Room” more than succeeds, and the technique it uses to do so is one that would serve the show well going forward: mirroring. My favorite shot of the episode involves young secretary Peggy, walking into the bathroom to freshen up, another young woman crying off in the corner. The mirrors in the bathroom are situated so that we can see the woman in the mirror on the wall perpendicular to Peggy, but we can’t actually see her, nor can we see Peggy reflected in the same mirror. Instead, we see Peggy looking directly into the mirror over the sink. Though she casts a glance toward the other woman when she enters the room, for all intents and purposes, the two might as well be in entirely different worlds, an effect director Alan Taylor accomplishes through that careful segmentation using the mirrors. But he’s also setting an agenda for the series’ most important female character going forward: The place to look when we’re looking for Peggy’s motivations isn’t in the sorts of places we might expect, in romance plots and in stories where she comforts sad girlfriends. The other woman’s problem goes unresolved. Indeed, we never find out what it is. Peggy is in her own little box, reflecting back at herself. When we want to know what’s driving Peggy, it’s best not to look at the story around her but at the woman herself, who’s almost as opaque at times as the main character. And it’s here that “Ladies Room” subtly tips its hand toward what the whole series is up to, because the character we’re meant to mirror Peggy with isn’t Joan or even the other young woman in the bathroom. It’s Don himself, her boss but also her weird shadow twin for the episode. We saw in the pilot and again here how people are able to project what they want to see on Don, even though he resists that sort of thing, and now we see how the same thing happens with Peggy. Ostensibly, it’s because she’s the “new girl,” and all of the guys in the office—even Sal, who does his very best checking a girl out impersonation—want to look over the fresh meat. But there’s also an element of her keeping herself at arm’s length. She blushes at sex jokes, and she doesn’t let all that much slip about who she actually is to Paul when he regales her with stories of the office. She’s staying mysterious, and that more or less sounds like the man she works for. The other important mirror for Don is Betty, who’s suffering through a bout of unhappiness that seems much more like depression, given how unmotivated it seems to be. (Don’s idea of psychotherapy is to tell her about all of the great stuff she has, then smile winningly. It’s a credit to Jon Hamm that this seems like a vaguely possible remedy for what ails her.) Betty explicitly asks herself—and by extension us—who her husband is, and when she tries to ask him questions about his childhood, he rebuffs her not a little coldly. He says that talking about childhood is like talking about politics and religion, which sounds just as bizarre as you’d think it does. Yet when Betty goes in to see a psychiatrist and start trying to talk out just what’s on her mind in the wake of the minor car accident she’s in, she doesn’t know that Don is calling said psychiatrist to find out what his wife told the doctor. Don is the man Betty can never know; at the same time, he’s learning all of her most intimate secrets. Again, it’s all a little neat, in a way that Mad Men will get from time to time. But it’s also kind of mesmerizing. Even those who’ve never seen Mad Men will be aware that fans get frustrated with Betty from time to time, because her storylines often seem to intersect with the main storyline only haphazardly. And to be sure, in this episode, it’s frustrating to watch the beginning of this story and feel as if every beat of it is mapped out right in front of you. This is going to be a rough story of Second Wave Feminism, it would seem, and it’s going to feature Betty’s life intersecting with another Betty, the author of The Feminine Mystique, Betty Friedan. This is one of those places where it will be complicated for someone like me who’s seen the whole show to discuss something like this, because so much of what’s disappointing about this storyline in this episode hinges on the imagined storyline to come, the one we think we already know and the one that seems the most blatantly like something stolen from that terrible NBC miniseries The ‘60s. Of course, Mad Men is still teaching us how to watch it at this point in its run, and it’s much more interested in making sure we’re following what it’s doing with Don and Peggy at this point than Betty. To that end, playing off well-worn tropes and types in this particular storyline isn’t such a bad idea, because it keeps us more or less in tune with a story that amounts to “A woman realizes she isn’t as happy as she thinks she should be.” Because let me tell you, that kind of storyline is murder to dramatize in a visual medium. That “Ladies Room” does as good of a job at this as it does is to be commended, even if it over-relies on visual tricks like Betty’s shaking hands. (Though to that end, I really like the moment when Betty is driving and sees Helen Bishop the divorcee moving into her new home, and that triggers her hands shaking.) Whenever fans of the show complain about Betty in the later seasons—something I’ve done many a time—I want to remind them to go back and watch these episodes, to remember the way that the show introduced her and all of the things that Don was doing to damage her, sometimes intentionally and sometimes just because he wouldn’t have had a second thought that what he was doing could hurt her. Yes, Betty’s storyline doesn’t always intersect with the action at Sterling Cooper, but that’s by design. This is a series about how the main character has segmented his life, and in Betty, we’re already seeing the most potent consequences of keeping someone who should be the love of your life out on an island, then turning to other people—like Midge—for the things you actually want. Don Draper is a man obsessed with images, and this might be his Norman Rockwell. But what I also like—even trying to view this as someone who’s never seen the show before—is how formless Betty’s depression seems, even to her. Watch that scene with her in the psychiatrist’s office, and the primary emotion one reads coming off of Betty is disappointment. Nobody wants to be depressed, but Betty seems at once upset by having this settling over her and upset by how prosaic and ordinary it is. If she’s going to come apart at the seams, everybody expects her to have both better symptoms and better reasons for doing so, and the number of people expecting that includes Betty. January Jones was the great unknown about this show heading into the second episode, since she mostly had to look pretty in the first one, but she more than manages the feat of making Betty at once sympathetic and oddly unknowable. Mad Men’s favorite trick is to reveal a character’s surface, then immediately see what happens once it starts to unravel, and Jones keys into that straight off. Another thing we’re getting a glimpse at here is the way that the show uses Don to ask big questions that are supposed to prompt big answers—here, it’s “What do women want?”—and then uses those questions both to interrogate the time period and ultimately deflect them with the sorts of easy bullshit an adman might come up with on the fly. The characters at Sterling Cooper don’t particularly care about what a woman might want. It’s more a chance to toss out some easy jokes, but when Don talks about it with the rest of his creative team, he seems the most open and honest he is all episode. He’s obviously talking about how he can’t understand how to make Betty feel happier, and it’s the one place where he doesn’t try to solve this problem through placating her. But when he finally comes up with what women want at Midge’s apartment, it’s more easy ad slogans. What they want is to pull closer to their man, not anything more emotional or elaborate than that. It’s manipulative bullshit, plain and simple, and it’s not clear to what extent he knows that. Really, that’s the story of this episode: The ladies room is the one place that the show’s female cast members can be recognizably themselves, but even when they step inside its comforting confines, they’re not going to find someone to stop their hands from shaking, nor is someone going to undertake the very basic and human action of asking them why they’re crying or if they’re all right. But when they leave the confines of that space to talk to the men in their lives, those men can’t help but see them as “the dessert,” as Peggy puts it. Don goes out to dinner with Betty, and he simply tells her stupid jokes, like a 12-year-old boy, and she giggles dutifully, before he goes home and horribly betrays her trust. But when he’s over at Midge’s, the woman he sleeps with because he seems to want something more authentic and “real” than whatever he’s built with Betty, he also treats her like his property, obviously growing upset and jealous when he wonders how she possibly got herself a TV (on which she primarily watches People Are Funny, one of my favorite period details in the episode). I said last week that the hidden story of Mad Men is one of privilege, of the main characters realizing that the unassailable world of plenty they live in isn’t going to last forever because other people might start to demand their own opportunities, their own pursuits of happiness. The show is already using this knowledge against us, because we live in the 21st century and understand what “the ‘60s” are going to bring (mostly opportunities for terrible NBC miniseries). That’s part of why the Betty storyline in this episode can feel a little weak; we know what’s coming for this character and don’t know how closely the show is going to follow that particular story beat for beat. But watch Peggy or Don in this episode, or watch Paul make his awkward pass at Peggy, and you see another story bubbling under the surface, a story about how before women could demand equal pay or equal rights, they had to demand to be seen as people, too. Stray observations: This episode shows us the first appearance of Bertram Cooper, played by Robert Morse, in a great bit of stunt casting (he was the kid in How To Succeed In Business Without Really Trying, which is an obvious influence on this show). Right now, though, he mostly seems irritated by the way that Roger Sterling has instilled a bit of a Navy attitude amongst the men, when he walks in on them forcibly spraying Right Guard in Ken Cosgrove’s armpits. Another first appearance: the Sally Draper we know and love, played by Kiernan Shipka. The bit where she’s running around in the plastic dry-cleaning bag is one of the show’s biggest “hey, people sure were different in 1960!” moments, but I don’t mind it as much as some of the others, because the visual is so great. Still, the moment when Jones holds the pause between calling Sally over to her and making sure she didn’t mess up the dry cleaning (instead of making her take off the bag) leans a little too heavily on making the audience feel superior to the characters in the past. (They just didn’t know! Chuckle chuckle.) Pete Campbell and Rachel Menken sit this episode out. Pete, for his part, is off on his honeymoon to Niagara Falls, the wettest place on Earth. (The guys get a real charge out of that one.) Roger, however, bemoans Pete’s unimaginativeness in even where to go on his honeymoon. Paul’s tour of the Sterling Cooper offices seems at once like Matthew Weiner (who wrote the episode) just wanting to show off his cool new set but also sets up some of the locations we’ll be seeing too little of in the seasons to come. This is the first time we get a taste of Paul being a sci-fi geek, a little character detail that will inform who he is throughout the rest of the series. And don’t worry, Paul. You’re going to get several more seasons of The Twilight Zone, but Rod Serling is going to get increasingly tired of the grind and make for some hit-and-miss seasons. That’s Anne Dudek, probably best known as Amber on House, playing Francine, the friend that Betty has her gossip session with. That’s John Slattery’s real-life wife, Talia Balsam, playing Roger Sterling’s wife in the episode’s first scene. Spoiling Cooper (do not read past this point if you haven’t watched beyond this episode): Okay, so I kind of talked around it up there, but even though I think this isn’t the most promising introduction for Betty’s storyline (which doesn’t really kick into gear for me until “Shoot”), I definitely love the way the show goes against every expected beat of the “bored housewife who realizes she’s unhappy and becomes liberated” storyline in the seasons to come. Betty just gets unhappier and unhappier, until the most recent season. Did you know that some women are copywriters, Peggy Olson, who will eventually become the creative head of Sterling Cooper & Partners? I’ll bet you didn’t! Things are only looking up for Margaret Sterling. She’ll get to have her wedding shortly after John F. Kennedy is assassinated! Next week: Don and Betty throw a birthday party, and it turns out to be much more interesting than you’d expect from that description of “The Marriage Of Figaro.”
A diagnostic service for eliciting carotid sinus hypersensitivity and vasovagal symptoms in a district general hospital. to describe the technical, diagnostic and logistical problems encountered in a syncope and falls clinic in a district general hospital. we have reviewed 157 consecutive patients and the problems encountered in their assessment at the clinic. 143 patients (91%) completed assessment, which included head-up tilt and carotid sinus massage. We reached a diagnosis in 75 of these (52%). Difficulties with continuous blood pressure monitoring caused testing to be abandoned in four cases and caused considerable delay (up to 30 min) in 45% of the rest. Eight patients (5%) refused consent for carotid sinus massage and two others had neurological sequelae. Some patients fulfilled diagnostic criteria on testing but remained asymptomatic, making an attributable diagnosis difficult. This was most noticeable with vasodepressor carotid sinus hypersensitivity. The limited facilities in a district general hospital and the time-consuming nature of the testing resulted in a considerable delay between referral and assessment (58 days +/- 25.9), which may adversely affect diagnostic yield. syncope clinics have a role in the assessment of elderly people with recurrent syncope and unexplained falls. Enthusiasm for this approach has to be tempered with an awareness of the limitations of the tests involved and an appreciation of the logistical problems likely to be encountered in a district hospital.
Shopping cart Latest Videos Related Articles They worked together to revive Louisiana Tech University’s men’s basketball program. Now they’re again both headed the same direction — eastward overseas — to begin their professional hoops careers. Former Tech Dunkin’ Dogs Kenneth “Speedy” Smith and Raheem Appleby both officially joined the professional ranks earlier this week, with Smith signing with EF Riga in Latvia while Appleby will play for Hungary’s PVSK Panthers. “OK,” said Matt Loetscher, “We’re on top of the brush pile. Drop your shiner straight down and you ought to get a bite.” Loetscher’s comment was directed at me and I did exactly what he suggested. The shiner had no sooner descended to the brush pile when I felt the bite. Setting the hook, I hauled the chunky crappie to Loetscher’s waiting landing net. This was one of more than 40 crappie our party of four outdoor communicators hauled aboard in little more than two hours of fishing Toledo Bend recently. MINDEN — Ruston High’s baseball made it four victories in a row with an 18-3 pounding of Minden High Tuesday afternoon. The victory boosted the Bearcats’ record to 14-5 entering a Thursday home game against Bastrop starting at 6 p.m. On Friday, RHS will play host to Ravyille in both varsity and junior varsity action that is set to begin at 4:30 p.m. On Saturday, a District 2-5A doubleheader will be held at Bastrop starting at noon.
[A case of lung adenocarcinoma with coexisting G719X and T790M EGFR mutations in which erlotinib was effective for the treatment of leptomeningeal carcinomatosis]. A 68-year-old man was referred to our hospital because of an abnormal chest shadow. Adenocarcinoma was detected using percutaneous needle aspiration cytology from the left supraclavicular lymph node. The patient was diagnosed as having primary adenocarcinoma of the lung(cT1bN3M1b: BRA OSS). Exon 18G 719X and exon 20 T790M mutations of the EGFR gene were detected in the same specimen. For first-line chemotherapy, four courses of cisplatin plus docetaxel were used. The primary lesion and a brain metastasis were reduced after the first-line chemotherapy. About four months later, he developed a recurrent brain metastasis and leptomeningeal carcinomatosis. He was treated with erlotinib(150mg/day)after wholebrain irradiation. The leptomeningeal carcinomatosis findings on a head CT image and the patient's consciousness disorder improved after treatment. EGFR-TKI therapy was effective in a case with leptomeningeal carcinomatosis, and coexisting EGFRsensitive and EGFR-resistant mutations.
Q: Python Requests extra sign in field I am new to Python and Python Requests. I am trying to login to a site using Python Requests in order to download some files but its failing. When I look at the form data there seems to be an extra field/variable called 'signInSecurity' which passes a value that changes with each log in (token). I don't know how to add this to my code. Does anyone know what I need to add to my code in order to login successfully? import requests with requests.session() as c: url = 'https://www.somewebsite.net/User/Sign-in/' USERNAME = '[email protected]' PASSWORD = '*********' r = c.get(url) login_data = dict(username=USERNAME, password=PASSWORD) cookie = {'PHPSESSID': requests.utils.dict_from_cookiejar(c.cookies) ['PHPSESSID']} r = c.post(url, data=login_data, cookies=cookie, headers={"referer": "https://www.somewebsite.net/User/Sign-in/"}) page = c.get('https://www.somewebsite.net') print(page.content) A: In your first request to the web page, there is a signInSecurity value which exists in the HTML. This is the value you mention needs to be included. Go to the url above and view the HTML (right click > Inspect). Look for this element in the HTML (value will be different of course:): <input type="hidden" name="signInSecurity" value="3c9c0f517618937924df9711cef6d148-0555a66568a7d12ffcfe656f8718ab22"> You need to include this value in the login_data before you make the POST request. Try something like this: from requests_html import HTMLSession with HTMLSession() as c: url = 'https://www.stock-analysis-on.net/User/Sign-in/%252F' USERNAME = '[email protected]' PASSWORD = '*********' r = c.get(url) input_element = r.html.find('input[name=signInSecurity]', first=True) sign_in_security_value = input_element.attrs.get('value') login_data = dict(username=USERNAME, password=PASSWORD, signInSecurity=sign_in_security_value) r = c.post(url, data=login_data) page = c.get('https://www.stock-analysis-on.net') print(page.content) Note: I left out the cookie; requests should handle cookies within the session. I left out the referer data in header, I don't think you'll need any header info in this case. I used requests-html instead of requests...both libraries are written by the same author, it has built in parsing abilities that make it simple to parse out HTML. Good luck!
Q: Split train//validation/test sets by time, is it correct? Here's the scenario, slightly altered to a common one. Credit card fraud, payments for the last 12 months (a rolling window). Train with the data from the first 10 months, validate with data from the 11th and test with the data from the 12th month. My rationale for this is that when used for real, we'll always use the history (be it of the same card or everything in the past, like fraud patterns). Are there any methodological problems with this approach? A: Your approach is statistically valid. With that being said, you may also want to split the first 10 months into a training and validation set. Build a logistic regression model using only the training set or perform cross-validation to obtain the lowest misclassification error rate in the validation set. This way you are less likely to overfit the first 10 months of data, which will likely lead to better predictions in the 11th month (your validation set), the 12 month (your test set), and most importantly, future months. As with any predictive model, it will be important to see how the model holds up over time! Please let me know if you need any further help! Happy modeling!
Touch and Go (1955 film) Touch and Go (U.S. The Light Touch) is a 1955 British comedy film directed by Michael Truman, and starring Jack Hawkins, Margaret Johnston, and June Thorburn. The film was made by Ealing Studios. The film was indifferently received on release, and is not generally included in the canon of classic Ealing Comedies. It did, however, pick up two nominations at the 1956 British Academy Film Awards: Margaret Johnston for "Best British Actress", and William Rose for "Best British Screenplay" – Rose did win that year's screenplay award, but for another Ealing film, The Ladykillers. Plot Following an argument with a work superior, furniture designer Jim Fletcher quits his job in a fit of pique. He decides that England has nothing to offer him, and that the future for his family is in Australia. He eagerly sets about making emigration plans, and despite the fact that his wife and family are less than enthusiastic about moving to the other side of the world, he disregards their reservations, and presses ahead. Practical and bureaucratic hitches continually threaten to derail the project. Jim must also deal with the opposition of his in-laws, finds himself missing his job, and starts to have doubts himself about the wisdom of the move. However, the snags and pitfalls are finally sorted out, and a firm departure date is set. Then two days before they are due to leave, the Fletchers' daughter meets, and instantly falls in love with, her ideal man after he rescues the family cat, Heathcliff. A good deal of heart-searching ensues before the Fletchers decide whether or not to go ahead with emigration during a delay caused by a missing Heathcliff. Cast Critical reception The Radio Times called the film "A depressing wallow in the sort of whimsy that Ealing foisted upon the world as British Realism"; whereas Leonard Maltin was more positive, calling the film a "wry study". References External links Category:1955 films Category:1950s comedy films Category:British comedy films Category:British films Category:Ealing Studios films Category:English-language films Category:Films set in London Category:Films directed by Michael Truman Category:Films produced by Michael Balcon
A key part of most electronic commerce solutions involves the ability to quickly locate products and services and tailor content to each individual user or customer. This requires both product indexing and user profiling. There are many search engines and knowledge management tools, but none of these are built using the Enterprise Java Beans architecture. The present invention provides a mechanism by which a searchable product inventory can be matched with a customer's preference. It does so in a way that is simple for the programmer, scalable in design, and built upon an open systems architecture. Normally search engines require a large amount of memory space to execute efficiently. This algorithm is designed to take advantage of the object caching built into the underlying platform such that it has a smaller footprint. Normally search engines count the number of instances of words in html documents and then cross reference, by word count so that documents with the most number of word matches can be quickly found. The Advisor indexes the items in the various catalogs and makes them searchable by quality strings. The present insertion has combined these two mechanisms into a single integrated solution called the Advisor or the Shopping Advisor component, which can be part of a suite of Enterprise Java Beans components that enable the rapid deployment of eCommerce Web Sites. For example, other components in the suite can provide support for the management of user sessions and creation of customer orders.
[Robotic surgery--surgical and anesthesiologic implications]. Because of the restricted freedom of movement inherent in endoscopic standard instruments wholly endoscopic heart surgery has not been possible up to now. The development of such techniques was especially hindered by the rib cage. Now the precision which is imperative for bypass surgery or valve reconstruction is made possible by telemanipulator systems. Preconditions for this method are cardiopulmonary bypass-techniques which allow a cardioplegic cardiac arrest with closed chest and extensive hemodynamic monitoring which enables the anesthesiologist to make exact diagnoses without having a direct view on the heart. After an extensive experimental phase a telemanipulation system is successfully in use since May 1998 in the Cardiac Center in Leipzig.
Extracellular acidification activates cAMP responsive element binding protein via Na+/H+ exchanger isoform 1-mediated Ca²⁺ oscillation in central nervous system pericytes. We have previously shown that Na(+)/H(+) exchanger isoform 1 (NHE1) plays an important role in Ca(2+) signaling and cell proliferation in human central nervous system (CNS) pericytes. The aims of the present study were to elucidate how NHE1-induced Ca(2+) signaling during acidosis is transformed into cellular responses in CNS pericytes. Human CNS pericytes were cultured, and the activation of cAMP responsive element-binding protein (CREB) was evaluated by Western blotting analysis, immunofluorescence, and luciferase assays. In human CNS pericytes, low extracellular Na(+) or low pH generated Ca(2+) oscillation and subsequently phosphorylated Ca(2+)/calmodulin-dependent kinase II (CaMKII) and CREB in a time-dependent manner. Focal cerebral ischemia was applied using photothrombotic distal middle cerebral artery occlusion in mice, and the phosphorylation of CREB and the production of interleukin-6 were observed in pericytes migrating into the peri-infarct penumbra during the early phase after ischemic insult. Our results indicate that extracellular acidosis induces Ca(2+) oscillation via NHE1, leading to Ca(2+)/CaMKII-dependent CREB activation in human CNS pericytes. Acidosis may upregulate a variety of proteins, such as interleukin-6, through the NHE1-Ca2+/CaMKII-CREB pathway in brain pericytes and may thus modulate brain ischemic insult.
Many fields of science require the monitoring of analyte concentrations in fluids. In an example of insulin-treated diabetes, afflicted persons must frequently monitor their blood glucose levels in order to appropriately ascertain the dose of insulin. Without an accurate measurement, insulin dosing would be dangerous. Multiple devices have been devised for the measurement of analytes in fluid. Devices such as electrochemical sensors utilize electrodes coated with polymer membranes. The functions of such sensors can be manipulated depending on which materials are used and in what quantities so that necessary reactions are controlled. Depending on the reaction near the electrodes, changes in current can be measured and thus correlated to the analyte of interest. The measurement of glucose in human blood makes use of electrochemical sensors. Sensors of this design measure blood glucose from samples drawn from a patient. In the case of diabetic patients, these samplings often occur several times per day. The sampling process, which equates to a finger prick, can be uncomfortable as well as difficult. Since blood sampling requires specially designed equipment, diabetic patients must have them readily available and thus carry their supplies with them at all times. Due to this cumbersome process, some patients fail to sample their blood as often as they should. Fortunately, an implantable glucose sensor would solve the problem of infrequent blood samplings. Current implantable sensor designs have many problems that must be addressed before such a device can come to market. Constant subcutaneous or vascular access must be attained for a sensor to constantly measure glucose levels. Due to discomfort and the possibility of infection, wires protruding from the skin are undesirable. A completely implantable sensor that communicates with an external receiver through wireless transmission would solve this problem. Unfortunately, an implantable sensor could result in internal trauma if the sensor is especially large or inappropriately shaped. Also, a patient's body could interpret an implanted sensor as a foreign object and attempt to either destroy or isolate it. If either of these actions were successful, the analytes of interest could not be monitored. Sadly, all attempts thus far have failed in the long-term due to these issues.
BASE Jumper Injured after Hard Landing in Snake River Canyon TWIN FALLS, Idaho (KLIX) A BASE jumper was flown to the hospital after a hard landing Monday evening in the Snake River Canyon. The female BASE jumper landed about 200 yards from the landing area below the Perrine Bridge at around 7:39 p.m., according to the Twin Falls County Sheriff's Office. Rescue crews responded by boat and an air ambulance landed in the canyon and flew the woman out with serious injuries to a Boise hospital. The sheriff's office says equipment was not a factor in the accident.
Designing and building a solar energy plant is a capital-intensive project that requires coordination of labor, components, schedules and regulatory compliance which produces costs in the millions of dollars. According to a study by the U.S. Energy Information Administration, the overnight capital construction cost of a solar generation plant in 2013 was more than $5,000 per kilowatt. When the construction is completed, the system needs to be tested and commissioned as quickly as possible in order to begin power generation and produce positive revenue flow. One method to test the system is with a connection to the grid. Grid-testing must be scheduled and coordinated through the local power system. Testing can be delayed for weeks which means revenue is lost and costs mount. The problem with this is that the grid cannot provide a stable controlled load or a comprehensive test of all the power-demand conditions that can happen. With that in mind, any delay in construction through commissioning can mean hundreds of thousands of dollars lost. A superior solution is to test the solar generation capabilities with a load bank. Using a load bank from ComRent, complete testing of a solar power generation plant can be completed in 2 -3 days. Load banks simulate every load scenario and situation that the grid may impose on the PV solar facility. ComRent can test the substation, collection/combiner networks and inverters to assure meeting specifications. These can include conformance verification, inverter function, cable & connection validation and tracking systems. A key test is verifying the anti-islanding functions of the inverters. These tests are required to ensure maintenance personnel aren’t subjected to electric shock hazards in the event of grid power loss. In short, a one-week rental of a load bank to test a solar generation system is invaluable in terms of costs saved and revenue produced. As you are planning the project parameters of your solar power generation system, take advantage of the cost-cutting and revenue-creating dynamics of testing the system with a load bank. Load bank testing can deliver a comprehensive documented test of every component in the system safely and reliably which allows you to finish on or ahead of schedule. Contact a load bank expert at ComRent today and have your testing completed in 2-3 days. Call 888.881.7118 or contact us online.
The End of Chavismo? Why Venezuela’s Ruling Party Lost Big, and What Comes Next Even Chavistas are fed up with the economic crisis and want change. But unlike the right, grassroots leaders are calling for more popular control and collective decision-making. Venezuela’s ruling United Socialist Party of Venezuela (PSUV) suffered a devastating loss in Sunday’s parliamentary election. The opposition Democratic Unity Front (MUD) received 56 percent of the popular vote to the PSUV’s 41 percent. Due to a majoritarian electoral system, the MUD won 112 seats (67 percent), with the PSUV taking 55 (33 percent). The opposition will control the National Assembly for the first time in 16 years. With a super-majority of two-thirds, the opposition will have significant powers, including the ability to block government spending and ministerial appointments, unseat sitting Supreme Court justices, remove the vice president, call for a constitutional assembly and initiate a recall referendum against the president. (It is unclear if the National Assembly can call a recall referendum on its own or only after gathering signatures from 20 percent of the electorate.) President Nicolás Maduro immediately accepted the defeat, demonstrating that widespread fears voiced by the opposition, international media, and the US and other foreign governments that the government would not accept a loss were unfounded. It is worth noting that the government’s recognition of the MUD victory stands in marked contrast to the opposition’s repeated refusals to accept electoral losses in the past (including 2004, 2006, 2013), despite the fact that numerous observers, including Jimmy Carter, have praised Venezuela’s electoral system as technically sound and “the best in the world.” Why the Government Lost “Things are worse now than they were during the Caracazo,” said Omar Machado, referring to the 1989 popular uprising in Caracas that was sparked by the sudden imposition of neoliberal austerity and left hundreds (according to some estimates thousands) dead at the hands of state security forces. Machado, a community organizer from the Caracas barrio of 23 de Enero, then rattled off a list of everyday products—shampoo, soap, deodorant, tampons, and birth-control pills—that he and his family have been unable to obtain for months. If Machado wants to buy basic food items, such as chicken, corn flour, and black beans, at regulated prices, he must face the long lines found throughout Venezuela. The lines exist “because of the bachaqueros who buy some product for 19 bolivares and then sell it for 200 or 300.” (A bachaquero is someone who buys price-regulated products and resells them on the black market at much higher rates.)
Q: Machine Epsilon I'm trying to evaluate the machine epsilon of my computer (see below). I wrote this: eps = 1.0; p = 0; While[(1.0 + eps) > 1.0, eps = eps/2.0; p += 1]; eps p eps*2 and got: 1.42109*10^-14 46 2.84217*10^-14 which is not what I expected (IEEE754). So I did this EngineeringForm[1.0 + 2 * eps, 20] EngineeringForm[1.0 + eps, 20] EngineeringForm[1.0 + (eps/2.0), 20] EngineeringForm[1.0 + (eps/4.0), 20] EngineeringForm[1.0 + (eps/16.0), 20] EngineeringForm[1.0 + (eps/32.0), 20] and got that: 1.000000000000028 1.000000000000014 1.000000000000007 1.000000000000004 1.000000000000001 1. which seems to contradict the termination condition of the 'while' loop. So I would like to understand what's going on under Mathematica's hood. I tried to look for some information on Mathematica's internal float representation without success. Any help to explain these results is welcome. I'm sorry if my question is a bit vague. Eric Context: SystemInformationData[{"Kernel" -> {"Version" -> "9.0 for Mac OS X x86 (64-bit) (January 24, 2013)", "ReleaseID" -> "9.0.1.0 (4055646, 4055073)", ...}] EDIT It was suggested the following program that works directly for some reason: eps = 1.0; n = 0; While[(1.0 + eps) - 1.0 > 0.0, eps = eps/2; n++; ]; eps*2 n Log[2, eps*2] A: There is a tolerance Internal`$EqualTolerance that is applied when testing Real numbers. If the numbers agree up to the last Internal`$EqualTolerance digits, then they are treated as equal. Try this: eps = 1.0; p = 0; Block[{Internal`$EqualTolerance = 0.}, While[(1.0 + eps) > 1.0, eps = eps/2.0; p += 1]; ] eps p eps*2 (* 1.11022*10^-16 53 2.22045*10^-16 *) See How to make the computer consider two numbers equal up to a certain precision and also this answer by Alexey Popkov.
Q: Change the value of a local variable where variable name will be expressed as a string I am trying to find a good and secure way to call a variable using string substitution in order to set its value. This is a more best-practices and I am looking for the best possible way to do this. First of all, using dictionary or similar structure is not what I want. I wish to set the value of a variable! Example; def test_my_var(name_param, val): # Set initial values for each variable my_var_1 = -1 my_var_2 = -1 my_var_3 = -1 ... my_var_n = -1 # Now I will update the value of mth variable my_var_%{name_param}s = val # Of course this will not work!! # Now print the new value of this variable print my_var_%{name_param}s I am looking for a practical way to accomplish this. Things that are tested and do not work are: I do not want to keep my vars in dict or similar structure. They are local variables inside a function and they should stay as they are. Using exec is not something I prefer since it will execute any command that is sent! So below is not a good way to go and is not a valid way. def test_case(index, val): var_1 = -1 var_2 = -1 exec("var_%s" = %s % (index, val)) print eval("var_%s" % index) Tested ways of using locals() and in setting the value, but fail to do so def test_case(index, val): val_1 = -1 val_2 = -1 print locals()["val_%s" % index] locals()["val_%s" % index] = val print val_1, val_2 # That will not update the calue of the variable `val_1` or any other variable So I am looking for a smart way to change the value of a variable where variable name will be expressed as a string substitution. A: You cannot do what you want, not within the constraints you set. That's because locals() is not a live object. CPython uses a C array for the local variables, with the bytecode using indices to access them. The locals() dictionary is a convenience, a debugging tool, which pairs up the stored list of names for the locals with the values the array references. Trying to mutate that dictionary does not update the actual local variable array. As you figured out, exec does work, because Python 2 disables the optimisation for locals in that case and uses slower techniques the moment you add exec into the mix. In Python 3, exec() is no longer a statement but a function instead, and this loophole was closed. See globals() vs locals() mutability and Behavior of exec function in Python 2 and Python 3. So if you are really looking for a best practice, stick with a dictionary or a list. These are locals too, but ones you can actually address the values in by string key or integer index.
40 (base 14) in base 3? -2002 Convert 103 (base 5) to base 4. 130 a (base 11) to base 13 a What is 13 (base 9) in base 3? 110 -2 (base 6) to base 3 -2 What is 5 (base 7) in base 3? 12 3003 (base 4) to base 15 d0 What is -20120 (base 3) in base 13? -108 Convert -1001 (base 3) to base 13. -22 10 (base 2) to base 14 2 Convert -12 (base 8) to base 5. -20 2 (base 10) to base 5 2 What is -10a (base 12) in base 8? -232 73 (base 10) to base 11 67 Convert 2110 (base 4) to base 3. 12111 1 (base 2) to base 13 1 What is 4 (base 5) in base 3? 11 -13 (base 6) to base 3 -100 What is 1 (base 16) in base 11? 1 Convert 2 (base 4) to base 9. 2 Convert -3 (base 13) to base 12. -3 -1100110 (base 2) to base 14 -74 4 (base 8) to base 12 4 What is 3130 (base 4) in base 10? 220 Convert -15 (base 12) to base 16. -11 What is 2 (base 16) in base 13? 2 What is -453 (base 7) in base 13? -150 -9 (base 12) to base 13 -9 What is -1023 (base 5) in base 7? -255 6 (base 13) to base 14 6 -aa (base 14) to base 9 -176 Convert -122 (base 3) to base 14. -13 What is 1 (base 2) in base 13? 1 Convert 2 (base 16) to base 13. 2 -1 (base 12) to base 16 -1 Convert 0 (base 14) to base 8. 0 Convert -d4 (base 16) to base 2. -11010100 -21 (base 6) to base 16 -d What is -17 (base 12) in base 3? -201 What is -1 (base 4) in base 9? -1 Convert 31 (base 9) to base 4. 130 What is 64 (base 14) in base 9? 107 What is -26 (base 7) in base 12? -18 Convert -101 (base 2) to base 13. -5 111211 (base 3) to base 13 229 What is 5 (base 9) in base 2? 101 -62 (base 8) to base 15 -35 0 (base 2) to base 8 0 -30 (base 4) to base 7 -15 What is 40 (base 14) in base 16? 38 What is b (base 16) in base 7? 14 -3 (base 8) to base 9 -3 Convert 2 (base 8) to base 16. 2 Convert 7 (base 16) to base 4. 13 Convert aa (base 16) to base 6. 442 What is 5 (base 8) in base 14? 5 0 (base 2) to base 15 0 What is 153 (base 6) in base 14? 4d What is -2130 (base 4) in base 7? -312 Convert 15 (base 12) to base 11. 16 What is -25 (base 11) in base 10? -27 What is 52 (base 7) in base 15? 27 Convert 1034 (base 6) to base 7. 460 -22 (base 15) to base 12 -28 0 (base 9) to base 7 0 Convert -2 (base 8) to base 16. -2 -10 (base 2) to base 8 -2 Convert -11 (base 6) to base 9. -7 22 (base 16) to base 13 28 Convert 22 (base 3) to base 6. 12 Convert -22002 (base 3) to base 12. -162 -3 (base 7) to base 12 -3 What is -21 (base 9) in base 13? -16 Convert 3 (base 7) to base 8. 3 Convert 3 (base 14) to base 12. 3 Convert cb (base 16) to base 4. 3023 What is -30 (base 7) in base 12? -19 What is 101022 (base 3) in base 16? 116 2 (base 4) to base 16 2 -10 (base 5) to base 9 -5 Convert -3 (base 5) to base 13. -3 Convert -9 (base 12) to base 9. -10 Convert -4 (base 7) to base 8. -4 What is -11122 (base 3) in base 5? -1000 -463 (base 9) to base 8 -575 Convert 166 (base 14) to base 5. 2121 4 (base 5) to base 4 10 What is -1 (base 14) in base 12? -1 -6 (base 7) to base 8 -6 What is -100 (base 5) in base 3? -221 What is 122 (base 3) in base 8? 21 Convert 10000 (base 2) to base 14. 12 7 (base 11) to base 16 7 2 (base 8) to base 3 2 What is -120 (base 11) in base 2? -10001111 What is 5 (base 12) in base 6? 5 What is -122 (base 3) in base 6? -25 What is 140 (base 5) in base 16? 2d 1 (base 6) to base 2 1 What is -186 (base 13) in base 3? -101100 Convert 5 (base 13) to base 9. 5 What is 5 (base 7) in base 5? 10 Convert -4 (base 16) to base 5. -4 What is -121 (base 3) in base 15? -11 Convert 20 (base 12) to base 15. 19 What is 111 (base 2) in base 4? 13 Convert -1 (base 16) to base 15. -1 -100 (base 4) to base 9 -17 Convert 1012 (base 5) to base 9. 156 11 (base 9) to base 16 a Convert 224 (base 8) to base 15. 9d What is -3 (base 14) in base 5? -3 3 (base 12) to base 4 3 Convert -33 (base 12) to base 16. -27 What is -11 (base 2) in base 7? -3 Convert -2 (base 5) to base 9. -2 What is 1 (base 9) in base 2? 1 -3 (base 15) to base 12 -3 12 (base 3) to base 11 5 What is -141 (base 9) in base 3? -11101 Convert -2 (base 16) to base 4. -2 Convert 2 (base 15) to base 8. 2 Convert 71 (base 16) to base 15. 78 1 (base 16) to base 6 1 Convert 28 (base 10) to base 5. 103 What is -27 (base 8) in base 16? -17 What is -5 (base 10) in base 16? -5 What is 10 (base 3) in base 12? 3 -40 (base 8) to base 15 -22 Convert 35 (base 9) to base 2. 100000 What is -3200 (base 4) in base 10? -224 0 (base 4) to base 3 0 What is 100 (base 3) in base 4? 21 Convert 11 (base 3) to base 6. 4 What is -4 (base 14) in base 8? -4 -5 (base 9) to base 12 -5 -80 (base 11) to base 9 -107 What is -9 (base 15) in base 9? -10 Convert -226 (base 7) to base 14. -86 What is -8c (base 13) in base 16? -74 -14 (base 6) to base 9 -11 -30 (base 15) to base 16 -2d What is -323 (base 6) in base 3? -11120 What is -46 (base 8) in base 11? -35 -2 (base 12) to base 3 -2 Convert 0 (base 4) to base 3. 0 What is 1 (base 8) in base 16? 1 300 (base 4) to base 10 48 212 (base 4) to base 16 26 What is 110 (base 2) in base 13? 6 -1 (base 2) to base 14 -1 What is -7 (base 10) in base 5? -12 3 (base 5) to base 2 11 What is -6 (base 15) in base 13? -6 Convert -23 (base 4) to base 11. -10 Convert -4 (base 5) to base 7. -4 1 (base 9) to base 7 1 What is -7 (base 9) in base 3? -21 Convert 17 (base 9) to base 5. 31 -9d (base 15) to base 2 -10010100 Convert -2d (base 16) to base 8. -55 What is 56 (base 10) in base 4? 320 1 (base 7) to base 14 1 What is 0 (base 10) in base 5? 0 -30 (base 6) to base 5 -33 0 (base 5) to base 14 0 -1 (base 3) to base 4 -1 Convert -10 (base 2) to base 5. -2 What is -40 (base 7) in base 16? -1c 3 (base 13) to base 15 3 -1 (base 14) to base 16 -1 -6 (base 7) to base 15 -6 -4 (base 15) to base 4 -10 Convert -5 (base 9) to base 7. -5 Convert 1 (base 14) to base 13. 1 244 (base 6) to base 13 79 -4 (base 15) to base 11 -4 What is 0 (base 13) in base 15? 0 What is 5b (base 14) in base 15? 56 1a (base 11) to base 3 210 11 (base 3) to base 9 4 5 (base 8) to base 5 10 What is 39 (base 14) in base 3? 1220 What is 103 (base 4) in base 6? 31 Convert -101 (base 4) to base 13. -14 Convert 8 (base 9) to base 5. 13 Convert 18 (base 9) to base 14. 13 4 (base 13) to base 10 4 Convert c (base 14) to base 5. 22 Convert -3 (base 11) to base 8. -3 Convert -16 (base 9) to base 12. -13 Convert 19 (base 11) to base 2. 10100 Convert -10 (base 6) to base 12. -6 What is 3 (base 9) in base 10? 3 Convert 343 (base 5) to base 11. 8a What is -21 (base 5) in base 7? -14 What is -4 (base 14) in base 3? -11 -11c (base 13) to base 5 -1234 Convert 100101 (base 2) to base 3. 1101 Convert -3 (base 10) to base 8. -3 Convert -7d (base 16) to base 11. -104 Convert -4 (base 12) to base 8. -4 Convert 11 (base 4) to base 10. 5 -102202 (base 3) to base 10 -317 Convert 100 (base 13) to base 6. 441 -f (base 16) to base 7 -21 10 (base 7) to base 12 7 Convert -108 (base 11) to base 12. -a9 What is -1 (base 3) in base 7? -1 Convert 31 (base 15) to base 6. 114 What is 30 (base 7) in base 13? 18 What is -133 (base 10) in base 11? -111 Convert -11 (base 4) to base 9. -5 -1 (base 2) to base 11 -1 What is 1 (base 4) in base 9? 1 Convert 13 (base 12) to base 16. f 55 (base 6) to base 4 203 -34 (base 14) to base 8 -56 What is -8 (base 9) in base 14? -8 Convert -10 (base 4) to base 15. -4 What is -a (base 12) in base 13? -a What is -22 (base 3) in base 4? -20 What is 61 (base 11) in base 12? 57 What is 3 (base 12) in base 7? 3 -1220 (base 3) to base 2 -110011 313 (base 4) to base 3 2001 -2 (base 10) to base 7 -2 What is -130 (base 6) in base 5? -204 43 (base 11) to base 15 32 -17 (base 10) to base 2 -10001 10010 (base 2) to base 8 22 10 (base 11) to base 14 b Convert -21 (base 8) to base 13. -14 Convert -1121 (base 3) to base 2. -101011 What is -158 (base 12) in base 16? -d4 -111 (base 6) to base 16 -2b Convert 14 (base 11) to base 5. 30 Convert -4 (base 12) to base 2. -100 -100000 (base 2) to base 10 -32 -13 (base 14) to base 8 -21 208 (base 9) to base 14 c2 What is -29 (base 16) in base 5? -131 35 (base 8) to base 10 29 -12 (base 13) to base 7 -21 What is -6b (base 15) in base 10? -101 -41 (base 16) to base 2 -1000001 Convert -1 (base 12) to base 8. -1 -122 (base 4) to base 10 -26 2b (base 16) to base 6 111 -1b (base 12) to base 3 -212 10 (base 6) to base 10 6 Convert -
Novel high power impulse magnetron sputtering enhanced by an auxiliary electrical field. The high power impulse magnetron sputtering (HIPIMS) technique is a novel highly ionized physical vapor deposition method with a high application potential. However, the electron utilization efficiency during sputtering is rather low and the metal particle ionization rate needs to be considerably improved to allow for a large-scale industrial application. Therefore, we enhanced the HIPIMS technique by simultaneously applying an electric field (EF-HIPIMS). The effect of the electric field on the discharge process was studied using a current sensor and an optical emission spectrometer. Furthermore, the spatial distribution of the electric potential and electric field during the EF-HIPIMS process was simulated using the ANSYS software. The results indicate that a higher electron utilization efficiency and a higher particle ionization rate could be achieved. The auxiliary anode obviously changed the distribution of the electric potential and the electric field in the discharge region, which increased the plasma density and enhanced the degree of ionization of the vanadium and argon gas. Vanadium films were deposited to further compare both techniques, and the morphology of the prepared films was investigated by scanning electron microscopy. The films showed a smaller crystal grain size and a denser growth structure when the electric field was applied during the discharge process.
Q: multiply two fields There is a one section of orders page where users can add new fields to add new products. They choose a product from a drop down menu and its price is written in another column. I need to add a functionality that will allow users to enter quantity amount, and total price will be updated as soon as quantity amount changes. I tried it with the following codes but I keep receiving 0 for the total price. My codes. $('#AddProduct').click(function() { var i = 0; var adding = $(+(i++)+'<div class="row'+(i)+'"><div class="column width50"><input type="text" id="PRODUCTNAME" name="PRODUCTNAME'+(i)+'" value="" class="width98" /><input type="hidden" class="PRODUCTID" name="PRODUCTID" /><input type="hidden" class="UNITPRICE" name="UNITPRICE'+(i)+'" /><small>Search Products</small></div><div class="column width20"><input type="text" class="UNITQUANTITY" name="UNITQUANTITY'+(i)+'" value="" class="width98" /><small>Quantity</small></div><div class="column width30"><span class="prices">Unit Price:<span class="UNITPRICE"></span><br />Total Price:<span class="TOTALPRICE"></span><br /><a href="#" id="RemoveProduct(".row'+(i)+'");">Remove</a></span></div>'); $('#OrderProducts').append(adding); adding.find("#PRODUCTNAME").autocomplete("orders.cs.asp?Process=ListProducts", { selectFirst: false }).result(function(event, data, formatted) { if (data) { adding.find(".UNITPRICE").html(data[1]); adding.find(".PRODUCTID").val(data[2]); adding.find(".TOTALPRICE").html(data[1] * $('.UNITQUANTITY').val()); } }); return false; }); <div id="OrderProducts"> <a href="#" id="AddProduct"><img src="icons/add.png" alt="Add" /></a> </div> A: You function seems to act on the result of the auto complete so since the .UNITQUANTITY may not have been set it will not get anything other then 0 unless you put a value in for the UNITQUANTITY before you select from the auto complete. But you would need to leave that function as it but possibly add a default of 1 to the UNITQUANTITY then add another function handling the event that the UNITQUANTITY value has changed then do the last line of that inline function and you should have the results you want. I would suggest adding the following right before your return false; adding.find(".UNITQUANTITY").change(function() { adding.find(".TOTALPRICE").html(adding.find(".UNITPRICE").val() * adding.find(".UNITQUANTITY").val()); }); Also edit your inline function to do the following... adding.find(".UNITPRICE").html(data[1]); adding.find(".UNITPRICE").val(data[1]); adding.find(".PRODUCTID").val(data[2]); adding.find(".TOTALPRICE").html(data[1] * $('.UNITQUANTITY').val()); Your first line was setting the html of the unit price but not the val so when we tried to retrieve with the .val() it returned 0 Also as a note you should consider adding some round to 2 decimal places to make sure you don't end up with too many decimals for a total price. Unit Price:50.99 Total Price:2804.4500000000003
About the Book In this book, Adolphs and Carter explore key approaches to work in spoken corpus linguistics. The book discusses some of the pioneering challenges faced in designing, building and utilising insights from the analysis of spoken corpora, arguing that, even though writing is heavily privileged in corpus research, the spoken language can reveal patterns of language use that are both different and distinctive and that this has important implications for the way in which language is described, for the study of human communication and for the field of applied linguistics as a whole. Spoken Corpus Linguistics is divided into two main parts. The first part sets the scene by discussing traditional and new approaches to monomodal spoken corpus analysis, with a focus on discourse organisation and conversational interaction and with particular attention to forms of language such as discourse markers and multi-word units, areas of language not conventionally described but which are argued to be of importance to spoken language description and to spoken language learning and teaching research within the field of applied linguistics. The second part of the book moves into the multimodal domain and focuses on alignments between language and gesture in a spoken corpus, with particular reference to gestural movements of the head and the hand and to the different ways in which prosody might be used to enhance communication. A brief final chapter discusses new developments in the area of spoken corpus research, including the relationship between language and context, emerging research methods as well as discussing possible shifts in scope and emphasis in spoken corpus research in the future. Reviews 'The main achievement of the book is to put the development and exploitation of multimodal spoken corpora that integrate and align various data streams more explicitly on the agenda of corpus linguistics, at the same time discussing some of the complex technological challenges that corpus linguists will face in the future.' - Marcus Callies, Universität Bremen, Journal of Pragmatics About the Series Corpus based linguistics is a dynamic area of linguistic research. The series aims to reflect the diversity of approaches to the subject, and thus to provides a forum for debate and detailed discussion of the various ways of building, exploiting and theorizing about the use of corpora in language studies.
[Big Data on Suicide Unveiled for the First Time] People at Risk of Suicide Lived in Poor Housing Conditions (kyung-hyang) #Suicide #SDH #housing #Korea #Public_View “…the latest research confirmed that housing environment had a significant impact on suicides. Regardless of the geographical location, there were many people at risk of suicide people who had contemplated suicide among those paying a monthly rent for houses smaller than 66m2.” South Korea’s suicide rate is among the highest in the world. Since 2003, more than 10,000 people took their own lives every year, granting South Korea with the disgraceful title of the number one country in suicides among the member states of the Organization for Economic Cooperation and Development (OECD). Last year, 28.7 people per every 100,000 of the population committed suicide, widening the gap with second place Japan (18.7). It now seems possible to identify areas where people at risk of suicide mostly reside using numbers, such as the population, geographical information and past suicide statistics. If we concentrate on areas at high risk based on this data, we may be able to prevent a considerable number of suicides. On September 10, World Suicide Prevention Day, Public View, a nonprofit research network, released a 2017-2018 map to prevent and respond to people at risk of suicide. This map categorized seventeen metropolitan cities and provinces, 252 si, gun and gus, and 3,491 eup, myeon, and dongs into five levels (A-E), according to the percentage of people at risk of suicide. The area with the highest risk was labeled A and among the metropolitan cities and provinces, the Seoul metropolitan area including Seoul, Gyeonggi-do, and Incheon fit in this category. The proportion of people at risk of suicide decreased outside large cities, but there was a big difference among eup, myeon and dong within the provinces and larger cities. After surveying 4,500 people nationwide and analyzing the distribution of actual suicide victims by region over the past decade, the latest research confirmed that housing environment had a significant impact on suicides. Regardless of the geographical location, there were many people at risk of suicide people who had contemplated suicide among those paying a monthly rent for houses smaller than 66m2. This means that socio-economic factors, as well as psychological problems like depression, stress, and anger are the main cause of suicide. In the northern part of Seoul, there were many people in their twenties and thirties who were at high risk, while below the Hangang River, people aged 35-44 were the main people at risk. In Gangwon-do, Daegu, Gyeongsangbuk-do and Gyeonggi-do, people in their forties and fifties were at high risk while in Jeju-do, people in their forties and sixties were at high risk of suicide. Experts point out that to reduce the number of suicides, the government needs to analyze the characteristics and distribution of people at risk and link this to welfare and housing policies. In Japan, stronger responses in connection with the local community have been effective in reducing the suicide rate by 30% over ten years. Choi Jeong-muk, the deputy director of the Local Government Data Research Institute, a member of Public View, which organized the latest research, said, “We were able to identify the status of areas where more people at high risk of suicide lived in with the geographical data. We should be able to effectively increase the infrastructure necessary to respond to and prevent suicide.”
Go hometown with me Hi, friends , where are you going in the next holiday? Please follow me to my hometown. My hometown is beautiful , and mystical ,and abundant in the Northeast in China. Shenyang is biggest city in the Northeast in China. Do you Know what are we doing in the Spring festival, and what are eating, and what game are playing? Come , go hometown with me. You will know that how are my hometown in the country, and understand my hometown.
200 cases of typhoid in Bengaluru in one week, BBMP advises boiled water for drinking BBMP has, however, denied that there is an outbreak of typhoid. news Health The rains across Karnataka over the last few weeks may have helped ease the water situation in the drought-hit state, but it has also brought with it an increase in typhoid cases in Bengaluru. Deccan Herald reports that the BBMP has registered 200 cases of typhoid in the last week alone while a total of 1368 cases were registered from January-August. Bengaluru’s civic body, however, denied that there is an outbreak of the waterborne illness. “We are not witnessing any outbreak of typhoid. But we are getting a few cases, which is more than usual,” said Dr Lokesh MN, Chief Health Officer, BBMP said. A senior physician at a private hospital, however, differed from the BBMP’s Chief Health Officer assessment, stating that the situation as alarming. “This year, we are witnessing an alarming rise in typhoid cases, especially among the working-class population. Every day, I get around 10 cases. Typhoid is an acute fever caused by the Salmonella Typhi bacteria. The bacteria deposits in water or food and spreads through human carriers,” Dr Pankaj Singhai, senior consultant, Internal Medicines, Manipal Hospitals told Bangalore Mirror. BBMP officials admitted that sewage water mixed with drinking water was primarily the reason for this, reported BM. “We are sending our health inspectors on rounds and have also released an advisory to the people that they must drink only boiled water, especially if they reside in apartment complexes that depend on water from tanks for drinking. This is because the source of water is unknown in these cases. We are also keeping a tab on localities from where an outbreak is being reported,” a health officer told the newspaper. The rains have also led to the outbreak of other viral diseases like dengue and swine flu along with the common cold.
Michelle Obama Michelle LeVaughn Robinson ObamaBiden courts veterans amid fallout from Trump military controversies The Hill's Campaign Report: Trump's rally risk | Biden ramps up legal team | Biden hits Trump over climate policy Jill Biden's boots latest fashion choice to encourage 'vote' MORE on Wednesday said she and former President Obama will keep fighting for issues important to them, including girls education. "Excited by the potential of the Obama Pres. Center," the former first lady tweeted Wednesday. "Barack & I will continue to champion the issues close to our hearts, including girls ed." Excited by the potential of the Obama Pres. Center. Barack & I will continue to champion the issues close to our hearts, including girls ed. pic.twitter.com/3VVtNyKHLK — Michelle Obama (@MichelleObama) May 3, 2017 ADVERTISEMENT The White House earlier this week denied a CNN report that it is ending "Let Girls Learn," the former first lady's girls education program. "There have been no changes to the program," a White House spokeswoman told CNN on Monday evening. An internal memo reported on earlier in the day said the White House would not continue with Obama's "Let Girls Learn" program. "Moving forward, we will not continue to use the Let Girls Learn brand or maintain a stand-alone program,” an email from Peace Corps acting director Sheila Crowley to employees read. According to CNN, the Trump administration gave orders to cease the program's operation immediately. The Obamas started the program in 2015. It aimed to increase educational opportunities for young adults in developing countries.
Article focus ============= - Evaluation of the neck strength of school-aged rugby players - The determination of a proxy measure that could be used practically by coaches and medical staff in order to determine individual neck strength Key messages ============ - It is assumed that adequate neck strength is protective against neck injury in rugby players. We found the neck strength of school aged rugby players to generally increase with age, but to vary widely, which may be important for future injury prevention strategies and in developing training interventions - Specific neck strength can be predicted via the model presented with measures of age, weight and grip strength Strengths and limitations ========================= - This is the first study to directly assess the neck strength of school-aged rugby players, with the relatively large size of the sample and the range of assessment parameters being particular strengths of the study - A limitation is the assumed but unsubstantiated causal association between neck strength and severity of injury to the neck in the sport of rugby. This is -recommended as a focus for future research Introduction ============ Professional rugby union carries a higher incidence of injury compared with other sports,^[@r1]^ most of which results from the contact phases of the game.^[@r1]-[@r6]^ Increases in strength and speed, and therefore also power and momentum, are considered to contribute to the rise in the injury rate of professional players.^[@r2],[@r3]^ A similar trend is suspected in rugby played in schools. Due to the lack of appropriate data collection systems this has not been substantiated,^[@r7]^ although two recent studies do support the assertion of an increasing injury problem within youth rugby.^[@r2],[@r8]^ Catastrophic injury is rare in rugby, with an injury risk reported as 0.8/1000 playing hours in the professional game.^[@r2]^ Serious neck and spinal injuries are also thought to be rare in the youth game.^[@r9]^ However, every neck injury is of significance due to the profound morbidity that may result. A recent survey of admissions to spinal injury units in the United Kingdom demonstrated that serious neck injuries continue to occur in school rugby players, albeit with a low frequency.^[@r10]^ Data from the spinal injuries unit in Glasgow suggests an alarming spike in the rates of -catastrophic spinal injury in the Scottish schoolchild rugby playing population.^[@r11]^ Less severe neck injuries are more common in the game and may account for up to 30% of all reported injuries.^[@r8]^ The cervical spine is repeatedly exposed to potentially injurious forces, which are usually attenuated by controlled spinal motion through the cervical musculature, ligaments and inter-vertebral discs.^[@r12]^ Pinsault, Anxionnaz and Vuillerme^[@r13]^ speculated that repeated violent impacts on the cervical spine impair muscle function and proprioception, which is important for the initiation of spinal reflexes that act to stabilise and protect the cervical spine. Strengthening of the neck is considered to be a preventative measure against neck injury in physically demanding contact sports such as rugby, where increased neck strength may be useful.^[@r14],[@r15]^ Development of the cervical musculature is advocated as beneficial in school grade players to protect against injury. However, the neck strength of youth rugby players has not been documented, nor the extent to which neck strength changes with physical maturity. The primary aim of this study was to evaluate the neck strength of school-aged rugby players. Secondary aims were to investigate and define the relationship of neck strength with proxy physical measures with a view to predicting neck strength. Materials and Methods ===================== Study population and design --------------------------- An observational cohort study was performed to investigate the specific neck strength of rugby playing schoolchildren. All rugby\--playing schoolboys between the ages of 12 and 18 at three Scottish schools were invited to take part. Participation was entirely voluntary. Signed consent was obtained from the pupil after documented consultation with their parent or guardian. Regional Ethics Committee approval was received for this study. A total of 382 boys were assessed. Neck strength assessment ------------------------ Maximal voluntary isometric cervical muscle strength was assessed with a bespoke device based on a 300 kg load cell (Tedea-Huntleigh, -Cardiff, United Kingdom) and TR150 Portable Strain Display Load Cell/Force Transducer (Honeywell, Marlton, New Jersey) employing a testing protocol previously reported.^[@r14]^ Any maximal muscle assessment contains the potential for a degree of muscle soreness following the test. This was minimised by limiting rotational movements and testing the muscle contraction along anatomical lines. Additionally the test was ended at the moment muscle force was measured to peak and thus sustained muscle contractions were limited. An average of three maximal peak force measurements was recorded in each test. The test was performed subjecting the neck to manual controlled linear incremental loading in the absence of pain or neurological symptom (that stopped the test) the head was held in the neutral anatomic position at all times throughout the test. The peak isometric force was recorded at the point of head movement. Isometric cervical muscle testing is well validated in adult populations.^[@r16]-[@r18]^ We incorporated additional -validation within this cohort; the intra-observer variability and repeatability formed excellent correlation co-efficients (r = 0.9, p \< 0.001) that has been reported separately.^[@r19]^ Additional measures ------------------- Height (Leicester Height Measure; SECA, Birmingham, United Kingdom), weight (medical grade mechanical flat scales; SECA) and grip strength (JAMAR hydraulic hand dynamometer; Sammoms Preston, Bolingbrook, Illinois) were assessed in the entire population. Cervical range of movement (ROM) (Cervical Range of Motion Instrument; Performance Attainment Associates, Minneapolis, Minnesota) and neck circumference (standard tape measure) was assessed in a subgroup of 166 boys aged 15 to 18 years. For efficiency of testing in large numbers at single sittings we decided not to assess these additional factors in the youngest boys (aged 12 to 14 years). Statistical analysis -------------------- Data were analysed using SPSS v14 (SPSS Inc., Chicago, Illinois) and GraphPad v5 (GraphPad Software, La Jolla, California). Data were checked for normality, and following this parametric tests used. One way analysis of variance (ANOVA) was used to assess variance in continuous measurements across groups (neck strength, ROM, height, weight, body mass index across age groups). A Bonferroni correction was applied to reduce the chance of a type I error associated with multiple testing. The data was reported as means with standard deviations ([sd]{.smallcaps}) as a measure of dispersion. Pearson correlation coefficients were reported for the bivariate correlation of continuous variables (neck strengths with age, height and weight). Multivariable modelling was achieved using multiple linear regression. Potential predictive variables were selected if their bivariate significance was p \< 0.10 to account for the possibility of variables achieving statistical significance once the confounding influence of another variable was controlled. Once this model was performed, a second definitive model was constructed with the variables that had reached significance on the first model. This was to achieve the most predictive model, with the fewest predictive variables. The overall significance level was selected as p \< 0.05 and two-tailed p-values are reported throughout. The performance of the model was assessed using a Bland and Altman plot.^[@r20]^ Results ======= Data were collected for 382 schoolchildren. Mean height, weight and grip strength are reported in Table I. Isometric neck extension strength increased with age (p \< 0.001, ANOVA), although wide variations within age groups were apparent (Fig. 1). ![Box plot showing neck extension strength by age group. The boxes represent the median value and interquartile range, and the whiskers represent the range of data.](2000079-galleyfig1){#f1} ###### Mean height, weight and grip strength by age grade **Age group (yrs)** **Number** ****Mean ([sd]{.smallcaps}) height (cm)**** ****Mean ([sd]{.smallcaps}) weight (kg)**** ****Mean ([sd]{.smallcaps}) grip strength (kg)**** ****Mean ([sd]{.smallcaps}) neck extension strength (kg)**** --------------------- ------------ --------------------------------------------- --------------------------------------------- ---------------------------------------------------- -------------------------------------------------------------- 12 54 155 (7.6) 48 (9.2) 23 (3.9) 18 (3.1) 13 68 163 (7.8) 54 (10.8) 27 (5.0) 21 (3.9) 14 64 170 (7.5) 61 (9.8) 33 (8.1) 25 (5.7) 15 66 175 (7.0) 68 (11.4) 38 (6.9) 28 (6.0) 16 54 179 (7.5) 72 (10.2) 42 (8.1) 30 (6.0) 17 59 180 (6.2) 76 (12.8) 43 (8.1) 32 (6.3) 18 17 182 (8.1) 84 (14.9) 46 (6.9) 34 (8.1) Total 382 The mean neck extension strength increased with age, from 18 kg ([sd]{.smallcaps} 3.1) for the 12-year-old group to 34 kg ([sd]{.smallcaps} 8.1) for the 18-year-old group. However at each age group there was a large range of between 15 kg and 30 kg. As illustrated in Figure 1, there were some 18-year-old participants who were weaker than the mean value for the 12-year-old group. This demonstrates that neck strength does not increase uniformly with growth. F-urther parameters were assessed in the subgroup of 166 boys aged between 15 and 18 years (Table II). Circumference of the neck was similar in the different age groups. Cervical ROM for flexion-extension and side flexion increased with age (p = 0.007 and p = 0.025, respectively), but no statistically significant change was seen in rotational ROM (p = 0.902). ###### Mean cervical range of movement (ROM) and neck circumference of participants aged between 15 and 18 years ****Mean ([sd]{.smallcaps}) ROM (°)**** --------- ---- ------------ ----------------------------------------- ------------ ------------- 15 36 35.2 (3.3) 70.3 (6.6) 41.0 (6.5) 73.8 (12.4) 16 54 33.1 (3.0) 70.4 (9.0) 43.0 (6.6) 78.2 (9.7) 17 59 33.9 (3.2) 71.3 (6.9) 43.3 (5.9) 76.1 (11.4) 18 17 32.4 (3.0) 70.9 (7.3) 47.6 (7.6) 93.2 (9.4) p-value 0.006 0.902 0.007 0.025 Isometric neck extension strength correlated with age, weight and grip strength and modestly with height. -Further measures of cervical range of motion and neck circumference did not correlate with cervical extension (Table III, Fig. 2). ###### Plots showing bivariate correlations of neck extension strength *versus* a) grip strength and b) neck circumference. ![](2000079-galleyfig2a) ![](2000079-galleyfig2b) ###### Bivariate correlation of neck extension strength with anthropometric measures and range of movement (ROM) characteristics **Characteristic** **Pearson correlation (r)** **p-value** --------------------------- ----------------------------- ------------- Age 0.668 \< 0.001 Height 0.452 \< 0.001 Weight 0.717 \< 0.001 Grip strength 0.731 \< 0.001 ROM^\*^ flexion/extension 0.140 0.074 ROM side flexion 0.012 0.115 ROM rotation -0.003 0.971 Neck circumference -0.048 0.544 Of the neck strength proxy measures, grip strength explained around half the variation in neck extension strength (R2 = 0.53) whereas neck circumference demonstrated no relationship (Fig. 2). A multivariable analysis demonstrated the independent effects of age, height, weight and grip strength on neck extension strength. Height was not a significant predictor of neck strength (p = 0.672) and was therefore removed (Table IV). ###### Multivariable linear regression of predictors of neck strength (R^2^ = 0.621) (CI, confidence interval) Variable B (95% CI) Beta p-value --------------- --------------------- ------ ---------- Constant -6.42 Age 0.89 (0.46 to 1.31) 0.21 \< 0.001 Weight 0.16 (0.11 to 0.22) 0.32 \< 0.001 Grip strength 0.28 (0.19 to 0.37) 0.35 \< 0.001 The resultant model explained 62.1% of the overall variance in neck strength (Fig. 3). The model performed well for the majority of players however; there were outliers in the predictive model at extremes of neck extension strength (Fig. 4). It tended to over predict extension strength at the lowest of the range and under predict at the highest extremes. ![Bivariate correlation of predicted *versus* actual neck extension strength based on multiple linear regression model R2 = 0.621.](2000079-galleyfig3){#f3} ![Bland-Altman plot showing agreement between predictive model and actual neck extension strength (error bars represent the 95% confidence intervals (1.96×[sd]{.smallcaps})).](2000079-galleyfig4){#f4} Discussion ========== The results of this study demonstrate the progressive changes in isometric neck extension strength with age, and the relationship with bodyweight and grip strength in school-aged rugby players. A large variation of neck strength was evident at each age group, and the neck strength of a number of older participants was equivalent to that of the mean value for the 12-year-old group. This may suggest that current training regimes concentrate more on building limb strength than neck strength. Neck strength is thought to be of key importance in the prevention of neck injuries through the modulation of excessive translational and shear forces (tackle) or excessive impact and shear force when the athlete's head is forced into the playing surface.^[@r21]^ It is thought that when these forces are not dissipated effectively injury may occur.^[@r14]^ Despite this assumption, little is known as to the specific strength of the cervical musculature in schoolboy rugby players. Two recent papers explore the specific assessment of injury in schoolboy rugby players. Haseler, Carmont and England^[@r2]^ described an injury surveillance programme over a single season at a community rugby club representing some 210 male players with an age range from under-9 to under-17 teams. Relatively few injuries were reported (24 per 1000 playing hours), although a significantly higher number of moderate and severe injuries occurred in the under-16 and -17 teams compared with the more junior sides. Head injuries along with shoulder and knee injuries were the most frequently reported site of injury, but the authors acknowledged that the study was underpowered and the numbers too small to investigate the differences in these rates. McIntosh et al^[@r8]^ reported the incidence and risk factors of head and neck injury in Australian youth rugby players, suggesting that age and player position (forwards, especially the front row) were related to head and neck injury risk. The testing of an individual's neck strength requires specialist equipment and is relatively labour intensive. As such, proxy measures of global strength are advocated as pragmatic guides to estimate this. Suggested measures include grip strength and muscle cross-sectional area. Interestingly, in this study, grip strength accounted for only around 50% of the variation of specific neck strength across the cohort (Fig. 2a), while circumference of the neck, as an estimate of cross sectional area, was not associated with maximal isometric strength (r = 0.05, p = 0.55) (Table III, Fig. 2b). The range of neck flexion/extension and side flexion increased with age, but rotation remained constant. Maclean and Hutchison,^[@r10]^ in a review of adolescent rugby-related admissions to United Kingdom spinal injuries units recently reported that the contact phases (specifically the tackle and scrum) of the game accounted for the majority of serious neck injuries, highlighting the importance perhaps of adequate musculature to protect this potentially vulnerable region.^[@r14]^ The regression model provides a useful approximation of a player's neck strength without the need for specialist assessment, derived from measures of age, grip strength and body weight (Table IV). Measures of height, neck circumference, ROM and neck side flexion strength were not significant predictors of neck extension strength. This model demonstrated reasonable accuracy, explaining around two thirds of the variation in neck strength by associated morphological parameters. The tendency to over- or underpredict at the extreme ranges suggests that specific assessment of the neck should perhaps be employed in situations where precise measurement is particularly important, such as in players in positions more susceptible to injury (e.g. front row forwards). This study is the first to provide data for global neck strength in adolescent rugby players. A large variation was found within each age group and a substantial number were found to have neck extensor strength comparable to that of the 12-year-old mean, suggesting that current training regimes concentrate on limb musculature and place insufficient emphasis on the neck musculature. Age, weight and grip strength predicted 62% of the variation in neck strength by logistic regression modelling that supports the use of these parameters for matching player groups, however specific testing of individual neck strength is advocated if precise information is required. The authors would like to thank the pupils and staff at the three schools tested and to Dr J. Robson and Mr N. Rennie of the Scottish Rugby Union for their ongoing support and encouragement with this project. **Author contributions:**D. F. Hamilton: Study design, Data collection, Data analysis and interpretation, Writing the paper, Approval of final text A. H. R. W. Simpson: Study design, Data collection and interpretation, Review of the draft for intellectual content, Approval of final text D. Gatherer: Data collection and interpretation, Review of the draft for intellectual content, Approval of final text P. J. Jenkins: Data analysis and interpretation, Review of the draft for intellectual content, Approval of final text R. W. Nutton: Study design, Data collection and interpretation, Review of the draft for intellectual content, Approval of final text J. G. B. Maclean: Study design, Data collection and interpretation, Review of the draft for intellectual content, Approval of final text J. D. Hutchison: Study design, Data collection and interpretation, Review of the draft for intellectual content, Approval of final text **ICMJE Conflict of Interest:**None declared
bernese mountain dogs what s good about em bad with the best temperament 19 181 best petit chien images on pinterest cute puppies cutest dogs with the temperament 18 12 best large dog breeds for families with children dogs the temperament 17 10 dogs with the best temperament for families care com 16 are maltese good family dogs howstuffworks with the best temperament 15 could you live with the bernese mountain dog temperament dogs best 14 10 best dogs for beginners and first time dog owners with the temperament 13 the 11 best dog breeds of all time business insider dogs with temperament 12 mongrels moontechk9 dog training dogs with the best temperament 11 dog temperament choosing a friendly puppy dogs with the best 10 dog breed types breeds different of dogs and their names 19 chinook dog breed information pictures characteristics facts different types of dogs and their names 18 types of dogskindofpets kindofpets different dogs and their names 17 dog breeds alphabet list different types of dogs and their names 16 different breeds of dogs types and their names 15 different types of dog breeds with pictures and names dogs their 14 perfect dog names by breed dogtime different types of dogs and their 13 different types of dogs with names and pictures their 12 dog breed types name top 10 popular breeds in india different of dogs and their names 11 the origins of dog breed names oxfordwords blog different types dogs and their 10 shelters often mislabel dog breeds but should we be labeling them all of 19 9 of the world s largest dog breeds mnn mother nature network all them 18 15 types of large dog breeds with pictures all them 17 the origins of dog breed names oxfordwords blog breeds all them 16 light cream cute dogs name dog breeds fabric by elizabeth s studio all of them 15 dog breeds a to z all purebreds and cross breed dogs of them 14 the 7 dog breed groups explained american kennel club breeds all of them 13 vector dog silhouettes collection on white dogs breeds stock all of them 12 dog breed information ultimate resource listing of all breeds them 11 the 7 dog breed groups explained american kennel club breeds all of them 10 all dog breeds complete list of profiles and their 19 breed specific dog food and health nutrition royal canin their breeds 18 the 7 dog breed groups explained american kennel club and their breeds 17 the most expensive dog breeds to own pethealthcare co zamost and their 16 breed specific dog food and health nutrition royal canin their breeds 15 dog breeds types of dogs american kennel club and their 14 rundown on the different dog breeds grey ghosts and their 13 how did dog breeds get their names junior s book and 12 13 dog breeds with fun name origins and their 11 animal kingdom carnivorous mammals dog breeds 2 image dog and their breeds 10 dog breeds of the world dog breeds of the world 19 dog breeds of the world poster horses pinterest dogs 18 9 of the world s largest dog breeds mnn mother nature network 17 top 10 dog breeds in the world cozy pet blog of 16 15 cutest dog breeds around the world video pets of dog breeds of the world complete reference to pedigree dogs 14 dogs of the world cute posters show origins 200 dog breeds 13 how many dog breeds in the world breed of with inside 12 5 of the most popular dog breeds in world dogtime 11 all dog breeds in the world a to z youtube of 10 all dog breeds complete list of profiles dogs and their 19 9 most popular dog breeds in india pets world dogs and their 18 40 best medium sized dog breeds list of popular cute dogs and their 17 african dog breeds which originated in africa dogs and their 16 are there really different breeds of dogs or all basically the and their 15 breeds of dogs part 1 learn different types dog and their 14 the 7 dog breed groups explained american kennel club dogs and their breeds 13 rundown on the different dog breeds grey ghosts dogs and their 12 breeds of dogs dogsforlife and their 11 how did dog breeds get their names junior s book dogs and 10
Israel was born on June 13, 1945. He received both his B.Sc. (1968) and Ph.D. (1974), under Professor Uri Shmueli from the School of Chemistry at Tel Aviv University. His postdoctoral research at UCLA focused on polycyclic ethers, was the pioneering work which led to supramolecular chemistry. In 1975 he joined Tel Aviv University and established his own research group, becoming Full Professor in 1991. In 2009 he became the incumbent of the Advanced Materials Chair. Israel spent two additional periods at UCLA and collaborated with Donald J. Cram who shared the 1987 Nobel Prize in Chemistry together with Lehn and Pedersen. In 1993-1997 Israel served as Head of the School of Chemistry at Tel Aviv University. From 2013 until his death on February 18, 2018, he was Professor Emeritus at the School of Chemistry. His research program focused on two main topics: Supramolecular chemistry in the solid state, including the development of organometallic lattices, coordinative polymers, and porous materials that can be used for adsorbing gases and for catalysts. Crystallography of small molecules. His interest in this field led him to numerous collaborative research programs with many other research groups. Israel's research group has always been small but very effective and creative, and Israel was one of the most prolific and highly cited scientists in the history of the School of Chemistry. He was a creative scientist, diligent and critical. In his departmental activity, Israel stood tall as a very honest, impartial, practical and tough faculty member who was not afraid of expressing his opinions. These qualities also characterized his attitude to his illness. Although he was diagnosed with cancer several years ago, he never told his colleagues about it until the past few weeks, when his medical situation started deteriorating rapidly. Israel, his character and scientific career will continue to serve as role models for the entire community of chemists.
Electrostatic discharge ("ESD") is known to cause damage to electrical components and equipment. The prior art has developed certain ways to protect electrical equipment from human touch through specially designed user keypad panels. FIGS. 1 and 1A illustrate one such user keypad panel 10. Specifically, FIG. 1 shows a top view of keypad panel 10; and FIG. 1A shows a cross-sectional view of keypad panel 10. The upper-most layer of panel 10 is an embossed polycarbonate or polyester layer 11, which, for purpose of illustration, is shown transparent so as to view ESD screen layer 12. ESD screen layer 12 includes a silver-painted cross-hatch conductive pattern 12a that is connected to a conductive ESD tail 14. ESD tail 14 forms a mounting hole 16 used to electrically connect pattern 12a to equipment chassis. FIG. 1A shows further detail of keypad panel 10, including button switch 18, button spacer layer 20, signal trace layer 22, and adhesive layer 23. Layer 11 includes an embossed button pattern 11a-illustratively shown as a dotted line in FIG. 1 and as an upward protrusion in FIG. 1A. Button pattern 11a is adjacent button switch 18 so that human pressure on embossed button pattern 11a activates button switch 18 through deformation of ESD screen layer 12. Button switch 18 is known in the art and operates with signal trace layer 22 to generate signals--via switch circuitry 22a--indicative of switch activation. These signals are detected in signal layer 22 by known techniques such as through signal cable 24. Spacer layer 20 is used to form a space between ESD layer 12 and signal trace layer 22. Adhesive layer 23 bonds panel 10 to a flat surface associated with electrical equipment. Although keypad panel 10 is shown with only one button 11a, other buttons can be included. By way of example, button 11a can be a power on and power off button to the electrical equipment. In operation, a user operates the electrical equipment through keypad panel 10. Screen layer 12a arguably attracts ESD pulses which are in turn shunted, through ESD tail 14, to chassis ground associated with the electrical equipment. ESD tail 14 is mounted to chassis ground with a screw and nut through mounting hole 16. One problem with prior art panel 10 is that differential voltages can exist between lines of the cross-hatch pattern 12a, leaving residual voltage potential energy resident in ESD layer 12 even though other energy is drained off through ESD tail 14. Another problem is that panel 10 requires additional manufacturing cost and time due to ESD tail 14, and due to the nut and screw required to attach ESD tail 14 to chassis ground. Yet another problem is that ESD pulses are routed through a single location associated with panel 10, i.e., at ESD tail 14. One object of the invention is to provide a new and improved ESD keypad panel that reduces or eliminates the above-described problems. Another object of the invention is to provide an ESD protection panel with multiple ESD shunt contacts to improve grounding to equipment chassis. Yet another object of the invention is to provide an ESD protection panel that has improved ESD protection capability, as compared to the prior art, and which requires less cost and manufacturing time. Still another object of the invention is to provide an ESD-protected keyboard panel which has increased protection against ESD pulses coupling to associated electrical equipment. These and other objects will become apparent in the description that follows.
Can I Bake And Freeze A Cake 2 Weeks In Advance??? I have to make a sneaker cake for the 21st, and that is a CRAZY week for me. If I bake, layer and carve it this week can I freeze it , or will it have a "not so fresh" taste by next week? Also if I can do that than what's the best way to defrost it with out it turning to mush?? TIA Andrea I freeze all of my cakes. Some people argue that they taste even better when frozen and then thawed. Here's what I do; once cooled (can still be a little warm) double wrap in plastic wrap, then double wrap in foil. To thaw, just take them out and let them sit at RT, wrapped, for a few hours or until you're ready to decorate. Yep it will be fine, just wrap it well in several layers and then thaw it slowly wrapped (I unwrapped each layer and let it sit for a bit before going onto the next layer) and don't touch it if it has condensation on it until it dries. I got the same answer a few months ago when I asked and I did it, hesitantly, but it came out perfect! I too have frozen many cakes in advance and no one (even a snooty booty who "KNEW" she could tell) never knew the wiser.I triple saran wrap mine, tight as I can. I take them out to thaw (at room temp on the counter - leave wrapped) the night before I need to frost. By morning they are perfect & moist as ever.Sometimes, if I need to torte, I partially thaw, then torte while its still good and cold. I get a nice clean cut that way. I always freeze mine, even if it is just overnight. It definately does make the cakes moister. I know frozen cakes have gotten a bad "rap" in the past - but I'm trying to educate people on that! I work full-time too, so this is a great time saver for me! You can freeze a torted cake with SMBC or ganache filling, but a lot of the other fillings won't do so well. I wouldn't go that far. The cakes will freeze fine, but I would fill them closer to the delivery date. Yes, you can freeze cupcakes. I have put them in a freezer bag before and it's worked fine. I would set them on a cookie sheet first and let them freeze for a few hours - then put them in the bag though. And I have also just covered them on the cookie sheet with plastic wrap and foil. I also know of people who keep them in the muffin tins and wrap it to freezer.