text
stringlengths
8
5.77M
Cardiopulmonary indications for endothelin receptor antagonists: review of recent efficacy trials. Recent clinical and experimental animal trials indicate that endogenously produced endothelin-1 (ET-1) contributes to the abnormal systemic and pulmonary vascular resistance associated with congestive heart failure (CHF) and pulmonary hypertension (PH). In experimental CHF, the chronic blockade of ET-1 actions by ET receptor antagonists clearly improves haemodynamic status, and improves cardiac structure and survival. The latter is based on limited results. In experimental PH there are consistent reports of prevention and reversal of PH, pulmonary vascular remodelling and right ventricular hypertrophy, independent of the inciting mechanisms. These results in experimental animals illustrate the potential efficacy of the ET receptor antagonists in future clinical trials. With five ET receptor antagonists in clinical development, and more on the way, their potential will soon be realised.
Q: How to run multiple jetty instances How do you run multiple jetty instances without maven? I am using jetty jetty-9.2.15.v20160210. I did some google search for this and found https://sagarkarnati.wordpress.com/2012/09/18/run-multiple-instances-of-jetty-on-the-same-machine-with-different-ports/ But the version of jetty is 6 and the file structure in that version is totally different from 9.2.15. Does anyone have any idea? I want to run two jetty instances on two different ports. A: In jetty 9, you will deal with $jetty.home and $jetty.base directory. Jetty advises to run jetty from $jetty.base directory. E.g. C:/jetty = $jetty.home directory and C:/jetty/demo-base = $jetty.base directory. You can specify which $jetty.base directory to use while running each jetty instance on the same machine. To solve this issue, I copied $jetty.base directory in $jetty.home directory and renamed it as C:/jetty/demo-base-A. Before we can run two instances of jetty, make sure to change the port used otherwise we can run into port conflict issue. Go to $jetty.base/start.d/ directory and change https.ini and http.ini for port.
Sri Lankan Blast: 15 people died in the clashes, police said, including three women and six children. The ISIS group has claimed responsibility for three men who blew themselves up in clashes with Sri Lankan police, the militant group said in a statement. The men set off explosives after an hour-long gun battle with police Saturday, inside what was believed to be a jihadist hideout near the eastern town of Kalmunai, in the latest fallout from the Easter attacks. In a statement posted Saturday by the ISIS propaganda unit the Amaq News Agency, ISIS said the three men were part of the ISIS group and detonated their bombs after the fight with police. The statement said the men "clashed with them (Sri Lankan police) with automatic weapons, and after exhausting their ammunition, detonated on them their explosive belts." Fifteen people died in the clashes, police said, including three women and six children. The violence came six days after the Easter Day bombings on three churches and three luxury hotels which killed at least 253 people and injured 500. Security forces armed with emergency powers have stepped up search operations for Islamic extremists since the bombings. Kalmunai is in the same region as the home town of the jihadist Zahran Hashim who founded the group accused of staging the attacks.
Tcp Ip Cp Reported Error 2 Vpn http://bit.do/bKhjA Reply Obat Meningitis says: January 21, 2016 at 7:41 am Thank you for the information, and healthy greetings. But i think when you have a problem first you are checking it from internet then create question on here then answer your question aanhh method man... Join over 733,556 other people just like you! http://goo.gl/DJtm1e Reply Obat Infeksi Saluran Kemih says: February 12, 2016 at 4:39 am Thank you for the information, and healthy greetings. http://thesweepdoctor.com/tcp-ip/tcp-ip-reported-error-736.html http://obattradisionaljantungkoroner55.blogspot.com/ http://obattradisionaljantungkoroner55.blogspot.com/p/cara-membeli-ace-maxs.html http://obattradisionaljantungkoroner55.blogspot.com/p/cara-konsumsi.html http://obattradisionaljantungkoroner55.blogspot.com/p/legalitas-ace-maxs.html http://obattradisionaljantungkoroner55.blogspot.com/p/testimoni-ace-maxs.html http://obattradisionaljantungkoroner55.blogspot.com/p/pengertian-kolesterol.html Reply OBAT PARU PARU BASAH says: January 14, 2016 at 2:13 am Thank you for the information, and healthy greetings. Click Here to join Tek-Tips and talk with other members! The IP in the internat card of the Routing and Remote Access Service is 10.0.0.1, I set the IP pool to 10.0.0.1 to 10.0.0.254. Re: Virtualizied PPTP-VPN Error 733 kleinbaas Jul 3, 2009 7:09 AM (in response to gfischer_prisma) FIXED: Error 733 or lost internet connection when connecting a VPNProblem:Internet connection is lost when connected Intelligence you can learn from, and use to anticipate and prepare for future attacks. this contact form Thread Status: Not open for further replies. http://bit.do/bE9DW">Obat Syaraf Kejepit Reply Obat Tbc Paru Tradisional says: December 24, 2015 at 1:31 am Thank you for the information, and healthy greetings. http://zon9.xyz/6XIF5 Reply OBAT LUKA DIABETES says: January 22, 2016 at 7:37 am Thank you for the information, and healthy greetings. If the above steps do not help you resolve the issue please call Microsoft Technical Support. http://bit.do/bL7ho Reply Obat Tradisional Rematik Jantung says: February 13, 2016 at 4:55 am Thank you for the information, and healthy greetings. This error may be intermittent, and is usually caused by a problem in the registry. have a peek here Thanks a lot. Join our community for more solutions or to ask questions. Configure the Network setting on ISA 2004 correctly. 1.Start the ISA Server Management program. Thank you so much. The physical computer still exists. Run the SBS RAS wizard. If you're looking for how to monitor bandwidth using netflow or packet s… Network Analysis Networking Network Management Paessler Network Operations Advertise Here 764 members asked questions and received personalized solutions network cards: Same error From what I read on the Web, people have reinstalled XP without resolving the issue? Privacy Policy Site Map Support Terms of Use Articles Authors Blogs Books Events FAQs Free Tools Hardware Links Message Boards Newsletter Software Site Search Advanced Search Welcome to ISAserver.org Forums | Yes, my password is: Forgot your password? http://bit.do/bL7qJ Reply Glucoberry says: February 15, 2016 at 4:37 am Thank you for the information, and healthy greetings. Your name or email address: Do you already have an account? http://thesweepdoctor.com/tcp-ip/tcp-ip-reported-error-733.html http://short8.net/ODgj3 Reply Obat Kelenjar Tiroid says: January 8, 2016 at 3:54 am Thank you for the information, and healthy greetings. MSPAnswers.com Resource site for Managed Service Providers. This is very useful for me. You may not be able to remove the phantom adapter with normal tools in which case editing the registry is required. Otherwise valid packets may be dropped as spoofed. In the right pane, click the "Toolbox" tab, and then click "Network Objects". 4. http://ow.ly/WJAJs Reply OBAT KATARAK says: January 7, 2016 at 7:06 am Thank you for the information, and healthy greetings. http://www.arel.info/internet/google-tricks/ http://www.arel.info http://www.arel.info/internet/google-gravity-im-feeling-lucky/ Reply sewa mobil surabaya says: June 16, 2015 at 12:47 pm http://new-weekend.com This is an interesting service providers Reply Silver Queen says: August 9, 2015 at 3:18 pm http://goo.gl/W84BEY Reply Obat Polip Telinga says: February 8, 2016 at 2:50 am Thank you for the information, and healthy greetings. http://zon9.xyz/WYlA1 Reply joe dark says: January 24, 2016 at 1:05 am hi thanks http://groupspaces.com/localgum/ https://huzzaz.com/collection/how-to-make-natural-viagra http://www.nature.com/protocolexchange/labgroups/83565 http://m.exteen.com/blog/nadianderson/20160110/cure-for-impotency-is-here http://www.articlespromoter.com/Art/763722/85/Components-of-Generic-Viagra-Online.html http://dropr.com/portfolio122858/153419/viagra/+?p=1197697 http://dropr.com/portfolio122858/153419/cialis/+?p=1197705 https://www.referralkey.com/profile.html?id=34211965 Reply Obat Polip Empedu says: January 28, 2016 at 3:12 Further research suggests that the IP stack can be reset by using the netsh command as below: http://support.microsoft.com/default.aspx?scid=kb;en-us;299357. Check if KB 936594 is installed. Booting him instead of the VM, trying VPN, everything works like a charm.
Testicular torsion in an adolescent with Fragile X Syndrome. Fragile X syndrome (FraX) is the most common hereditary form of mental retardation. The clinical syndrome includes mental retardation, macroorchidism, and typical but variable facial features. Although macroorchidism has been recognized as a cardinal feature of FraX, descriptions of testicular pathology are rare. Testicular torsion is a relatively common surgical emergency in young men, peaking at the onset of puberty when the testes undergo a period of rapid growth. However, testicular torsion has never been associated with macroorchidism. We report the first known case of testicular torsion in a 14-year-old boy with FraX and macroorchidism. Although we are unable to establish a definitive relationship between macroorchidism and testicular torsion in an isolated case report, primary care takers of children with macroorchidism should be aware of this occurrence. We recommend measurement of testicular volume during annual evaluations of children and adolescents with macroorchidism. Acute scrotal pain or increased testicular volume should be promptly evaluated.
Q: What did the Buddha mean by "no truth can be spoken?" What did the Buddha mean by "no truth can be spoken" in the Diamond Sutra? A: The truth about the nature of reality is, strictly speaking, cannot be spoken, because reality is so multifaceted that it can never be fully and precisely expressed in words and concepts. This is in line with the rest of Diamond Sutra which tries to give the reader a taste of the experience of Emptiness.
/* * Copyright 2016-2020 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.springframework.vault.config; import org.springframework.beans.BeansException; import org.springframework.beans.factory.BeanFactory; import org.springframework.beans.factory.DisposableBean; import org.springframework.beans.factory.InitializingBean; import org.springframework.beans.factory.ObjectProvider; import org.springframework.context.ApplicationContext; import org.springframework.context.ApplicationContextAware; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; import org.springframework.core.env.Environment; import org.springframework.http.client.ClientHttpRequestFactory; import org.springframework.lang.Nullable; import org.springframework.scheduling.concurrent.ThreadPoolTaskScheduler; import org.springframework.util.Assert; import org.springframework.vault.authentication.ClientAuthentication; import org.springframework.vault.authentication.LifecycleAwareSessionManager; import org.springframework.vault.authentication.SessionManager; import org.springframework.vault.client.ClientHttpRequestFactoryFactory; import org.springframework.vault.client.RestTemplateBuilder; import org.springframework.vault.client.RestTemplateCustomizer; import org.springframework.vault.client.RestTemplateFactory; import org.springframework.vault.client.SimpleVaultEndpointProvider; import org.springframework.vault.client.VaultEndpoint; import org.springframework.vault.client.VaultEndpointProvider; import org.springframework.vault.core.VaultTemplate; import org.springframework.vault.core.lease.SecretLeaseContainer; import org.springframework.vault.support.ClientOptions; import org.springframework.vault.support.SslConfiguration; import org.springframework.web.client.RestOperations; import org.springframework.web.client.RestTemplate; /** * Base class for Spring Vault configuration using JavaConfig. * * @author Spencer Gibb * @author Mark Paluch */ @Configuration(proxyBeanMethods = false) public abstract class AbstractVaultConfiguration implements ApplicationContextAware { private @Nullable ApplicationContext applicationContext; /** * @return Vault endpoint coordinates for HTTP/HTTPS communication, must not be * {@literal null}. */ public abstract VaultEndpoint vaultEndpoint(); /** * @return a {@link VaultEndpointProvider} returning the value of * {@link #vaultEndpoint()}. * @since 1.1 */ public VaultEndpointProvider vaultEndpointProvider() { return SimpleVaultEndpointProvider.of(vaultEndpoint()); } /** * Annotate with {@link Bean} in case you want to expose a * {@link ClientAuthentication} instance to the * {@link org.springframework.context.ApplicationContext}. * @return the {@link ClientAuthentication} to use. Must not be {@literal null}. */ public abstract ClientAuthentication clientAuthentication(); /** * Create a {@link RestTemplateBuilder} initialized with {@link VaultEndpointProvider} * and {@link ClientHttpRequestFactory}. May be overridden by subclasses. * @return the {@link RestTemplateBuilder}. * @see #vaultEndpointProvider() * @see #clientHttpRequestFactoryWrapper() * @since 2.3 */ protected RestTemplateBuilder restTemplateBuilder(VaultEndpointProvider endpointProvider, ClientHttpRequestFactory requestFactory) { ObjectProvider<RestTemplateCustomizer> customizers = getBeanFactory() .getBeanProvider(RestTemplateCustomizer.class); RestTemplateBuilder builder = RestTemplateBuilder.builder().endpointProvider(endpointProvider) .requestFactory(requestFactory); builder.customizers(customizers.stream().toArray(RestTemplateCustomizer[]::new)); return builder; } /** * Create a {@link RestTemplateFactory} bean that is used to produce * {@link RestTemplate}. * @return the {@link RestTemplateFactory}. * @see #vaultEndpointProvider() * @see #clientHttpRequestFactoryWrapper() * @since 2.3 */ @Bean public RestTemplateFactory restTemplateFactory(ClientFactoryWrapper requestFactoryWrapper) { return new DefaultRestTemplateFactory(requestFactoryWrapper.getClientHttpRequestFactory(), it -> { return restTemplateBuilder(vaultEndpointProvider(), it); }); } /** * Create a {@link VaultTemplate}. * @return the {@link VaultTemplate}. * @see #vaultEndpointProvider() * @see #clientHttpRequestFactoryWrapper() * @see #sessionManager() */ @Bean public VaultTemplate vaultTemplate() { return new VaultTemplate( restTemplateBuilder(vaultEndpointProvider(), getClientFactoryWrapper().getClientHttpRequestFactory()), getBeanFactory().getBean("sessionManager", SessionManager.class)); } /** * Construct a {@link LifecycleAwareSessionManager} using * {@link #clientAuthentication()}. This {@link SessionManager} uses * {@link #threadPoolTaskScheduler()}. * @return the {@link SessionManager} for Vault session management. * @see SessionManager * @see LifecycleAwareSessionManager * @see #restOperations() * @see #clientAuthentication() * @see #threadPoolTaskScheduler() () */ @Bean public SessionManager sessionManager() { ClientAuthentication clientAuthentication = clientAuthentication(); Assert.notNull(clientAuthentication, "ClientAuthentication must not be null"); return new LifecycleAwareSessionManager(clientAuthentication, getVaultThreadPoolTaskScheduler(), restOperations()); } /** * Construct a {@link SecretLeaseContainer} using {@link #vaultTemplate()} and * {@link #threadPoolTaskScheduler()}. * @return the {@link SecretLeaseContainer} to allocate, renew and rotate secrets and * their leases. * @see #vaultTemplate() * @see #threadPoolTaskScheduler() */ @Bean public SecretLeaseContainer secretLeaseContainer() throws Exception { SecretLeaseContainer secretLeaseContainer = new SecretLeaseContainer( getBeanFactory().getBean("vaultTemplate", VaultTemplate.class), getVaultThreadPoolTaskScheduler()); secretLeaseContainer.afterPropertiesSet(); secretLeaseContainer.start(); return secretLeaseContainer; } /** * Create a {@link ThreadPoolTaskScheduler} used by * {@link LifecycleAwareSessionManager} and * {@link org.springframework.vault.core.lease.SecretLeaseContainer}. Annotate with * {@link Bean} in case you want to expose a {@link ThreadPoolTaskScheduler} instance * to the {@link org.springframework.context.ApplicationContext}. This might be useful * to supply managed executor instances or {@link ThreadPoolTaskScheduler}s using a * queue/pooled threads. * @return the {@link ThreadPoolTaskScheduler} to use. Must not be {@literal null}. */ @Bean("vaultThreadPoolTaskScheduler") public ThreadPoolTaskScheduler threadPoolTaskScheduler() { ThreadPoolTaskScheduler threadPoolTaskScheduler = new ThreadPoolTaskScheduler(); threadPoolTaskScheduler.setThreadNamePrefix("spring-vault-ThreadPoolTaskScheduler-"); threadPoolTaskScheduler.setDaemon(true); return threadPoolTaskScheduler; } /** * Construct a {@link RestOperations} object configured for Vault session management * and authentication usage. Can be customized by providing a * {@link RestTemplateFactory} bean. * @return the {@link RestOperations} to be used for Vault access. * @see #restTemplateFactory(ClientFactoryWrapper) */ public RestOperations restOperations() { return getRestTemplateFactory().create(); } /** * Create a {@link ClientFactoryWrapper} containing a {@link ClientHttpRequestFactory} * . {@link ClientHttpRequestFactory} is not exposed as root bean because * {@link ClientHttpRequestFactory} is configured with {@link ClientOptions} and * {@link SslConfiguration} which are not necessarily applicable for the whole * application. * @return the {@link ClientFactoryWrapper} to wrap a {@link ClientHttpRequestFactory} * instance. * @see #clientOptions() * @see #sslConfiguration() */ @Bean public ClientFactoryWrapper clientHttpRequestFactoryWrapper() { return new ClientFactoryWrapper(ClientHttpRequestFactoryFactory.create(clientOptions(), sslConfiguration())); } /** * @return {@link ClientOptions} to configure communication parameters. * @see ClientOptions */ public ClientOptions clientOptions() { return new ClientOptions(); } /** * @return SSL configuration options. Defaults to * {@link SslConfiguration#unconfigured()}. * @see SslConfiguration * @see SslConfiguration#unconfigured() */ public SslConfiguration sslConfiguration() { return SslConfiguration.unconfigured(); } /** * Return the {@link Environment} to access property sources during Spring Vault * bootstrapping. Requires {@link #setApplicationContext(ApplicationContext) * ApplicationContext} to be set. * @return the {@link Environment} to access property sources during Spring Vault * bootstrapping. */ protected Environment getEnvironment() { Assert.state(this.applicationContext != null, "ApplicationContext must be set before accessing getEnvironment()"); return this.applicationContext.getEnvironment(); } @Override public void setApplicationContext(ApplicationContext applicationContext) throws BeansException { this.applicationContext = applicationContext; } /** * Return the {@link RestTemplateFactory}. * @return the {@link RestTemplateFactory} bean. * @since 2.3 */ protected RestTemplateFactory getRestTemplateFactory() { return getBeanFactory().getBean(RestTemplateFactory.class); } BeanFactory getBeanFactory() { Assert.state(this.applicationContext != null, "ApplicationContext must be set before accessing getBeanFactory()"); return this.applicationContext; } ThreadPoolTaskScheduler getVaultThreadPoolTaskScheduler() { return getBeanFactory().getBean("vaultThreadPoolTaskScheduler", ThreadPoolTaskScheduler.class); } private ClientFactoryWrapper getClientFactoryWrapper() { return getBeanFactory().getBean("clientHttpRequestFactoryWrapper", ClientFactoryWrapper.class); } /** * Wrapper for {@link ClientHttpRequestFactory} to not expose the bean globally. */ public static class ClientFactoryWrapper implements InitializingBean, DisposableBean { private final ClientHttpRequestFactory clientHttpRequestFactory; public ClientFactoryWrapper(ClientHttpRequestFactory clientHttpRequestFactory) { this.clientHttpRequestFactory = clientHttpRequestFactory; } @Override public void destroy() throws Exception { if (this.clientHttpRequestFactory instanceof DisposableBean) { ((DisposableBean) this.clientHttpRequestFactory).destroy(); } } @Override public void afterPropertiesSet() throws Exception { if (this.clientHttpRequestFactory instanceof InitializingBean) { ((InitializingBean) this.clientHttpRequestFactory).afterPropertiesSet(); } } public ClientHttpRequestFactory getClientHttpRequestFactory() { return this.clientHttpRequestFactory; } } }
[Clinical dynamics of cenesto-hypochondriacal neurosis-like disorders in schizophrenia with onset in adolescence (clinico-catamnestic study)]. For 10-15 years the authors studied the time-course of neurosis-like disturbances in 46 patients with schizophrenia manifested in adolescence with cenesthopathic symptomatology (23 patients presented the cenesthopathic-hypochondriac syndrome, in 17 cenesthopathia was attended by phobias, in 6 it was combined with manifestations of derealization and depersonalization). The study showed that in 87% of the observations the disease ran continuously (torpidly in 29, by the type of the simple form in 5 and by the type of the paranoid form in 6 patients), in 13% of the patients the disease ran a paroxysm-progressive course. In 10-15 years the clinical picture in half of the patients continued to be characterized by the leading cenestho-hypochondriac symptomatology, in one-fourth of patients cenestho-hypochondriac disturbances were transformed into hallucinational-paranoid, in another one-fourth of patients into either psychosis-like or apathoabulic (by the type of the simple form) symptomatology. The authors discuss the degree of progression of the disease in different variants of its course, the social and marital status of patients, the specificity of personality changes and peculiarities of disease relapses.
Duterte’s hype fizzling out with students and teachers MANILA (Agencies): The problem with Philippine president, Rodrigo Duterte, is that he “lives on hype, on promises.” Fidelino Josol, a 50-year old public schoolteacher, was reported as saying in an article in La Croix on July 25. She said, “I voted for him because he sounded firm and full of convictions,” but noted that Duterte’s promises “all went down the drain.” The article noted that Duterte, seems to have failed to impress his “children.” It noted that in many of his speeches Duterte has always portrayed himself as the father of the nation, especially the young people, but when he delivered his third State of the Nation address on July 23, thousands of students in cities across the Philippines took to the streets to protest. “The President is in no way a father to the country nor are we yearning for one,” Dean Lacandazo, a youth leader from the central Philippines, said on July 27. The Sun Star Tacloban quoted him as saying, “(Duterte) is nothing but a populist-fascist puppet of not only to the United States but subservient too to China.” Lacandazo, called Duterte’s speech “no more than a blabber of his imaginations in his own perceived universe.” Jastine Domdom, was quoted by the Sun Star Tacloban as saying, “I cannot accept that the likes of Duterte will be compared to a father. Duterte is an embarrassment to all real fathers who worked hard for their children and their country,.” They are not impressed with the president’s directive to provide free tuition to all Filipinos who want to go to college. The La Croix article quoted Mira Legion, chairperson of the youth group, Anakbayan, in the Eastern Visayas region as saying, “Education remains inaccessible to the youth, especially the poor.” She said thousands of students failed to avail the free tuition either because they were disqualified from taking up the grant or are enrolled in private schools. Legion said Duterte’s free tuition offer “falls short in truly making education free.” She cited provisions in the law that provides donation schemes in schools and a return service system for students. “These are manifestations that the law does not provide the free education that students have clamored and fought for,” she said. La Croix reported that students also protested the increase in tuition and other school fees in private schools that are approved by the Department of Education. Ella Gaile Uy, an 18-year old college student, said that while she can receive free tuition, her family is burdened by the increasing prices of basic commodities. Uy, the eldest of three siblings, takes food to school to save money. “My daily allowance is $10.20 (US$1.30),” said the girl whose parents work as a maid and a driver. Duterte’s tax reforms have seen a rise in the price of almost all commodities—including school supplies. Jireh Escanillas, stopped her studies. She the problem for many young people is money. “There is only one thing that I would like to tell the president and that would be to make education available to all,” she said. La Croix reported that Benjo Basas, chairperson of the Teachers’ Dignity Coalition, said that during the election campaign in 2016, Duterte promised teachers a US$200 ($1,569) across the board pay increase. “After two years, the increase in our salaries is pegged under the context of the salary standardisation law that only provides for little more than a US$10 ($78) increase from 2016,” said Basas. “While there are occasional pronouncements, these are not manifested in policies,” he said, adding the president should invest more on education and other social services. The teacher remains hopeful that the president will come good on his promise.
[Epidemiologic cancer research--new aspects for health education and early detection?]. Effective prevention has in the first place to be based on the knowledge of causal factors. In preventive oncology difficulties arise from the fact that our knowledge of causal mechanisms is--with some exceptions--not sufficient to provide clear guidelines for preventive action. Furthermore, it seems beyond doubt that development of cancer is a multifactorial process in which individual disposition, age and exposure to carcinogens participate. Only exposure can be modified by preventive measures. Epidemiological analysis of available data suggests that the effect of environmental carcinogens such as air pollution, contamination of food or occupational hazards on the general population is usually overestimated, although their effect cannot be ignored altogether. On the other hand, the real impact of tobacco products on carcinogenesis seems not yet to be fully realized. Not enough details are known about the probably major importance of dietary habits. In secondary prevention screening programs for the general population are only to be recommended at present for early detection of carcinoma of the cervix uteri. On the other hand, selective case finding in general practice, on the basis of knowledge of risk factors which are at least partially known, could be substantially improved.
JAN. 7 Citizen assist. 5 a.m. 100 block of Las Flores. A woman said her husband was mean to her before he left for work. JAN. 6 Suspicious person in vehicle. 11:27 p.m. Springdale and Mayfair. A woman said she saw condoms and women’s panties on the ground near a white Toyota sedan. She also said she heard “giggling.” Hit-and-run parked car. 11:57 a.m. Aliso Creek Road and Pacific Park Drive. A motorist in a white Honda Pilot reportedly hit three parked cars near a T.J. Maxx store. Disturbance. 1:37 a.m. 26700 block of Aliso Creek Road. A large group of people fought in front of a restaurant. JAN. 5 Disturbance. 7:15 p.m. 0 block of Briarglenn. At least one person was arrested after a woman accused her husband of throwing objects around the house. Disturbance. 8:17 a.m. Aliso Creek Road and State Route 73. A boy reportedly threw pine cones at passing motorists on the northbound toll road lanes. JAN. 4 Citizen assist. 8:15 p.m. 26800 block of Aliso Creek Road. A man said someone inside a store was attempting to use a prescription from a doctor’s office that had been burglarized. Vandalism in progress. 4:36 p.m. 100 block of Vantis. Two people were detained after a caller said a man and a woman were spray-painting a car inside a garage. JAN. 3 Disturbance. 1:18 p.m. 100 block of Park Avenue. Six boys were on top of a roof at Aliso Viejo Middle School, a caller said. Disturbance. 1:02 p.m. 0 block of Las Flores. A man accused his son of throwing punches at him. JAN. 2 Disturbance. 8:24 p.m. 0 block of Lynoak. A man said his roommate got violent with him. JAN. 1 Vandalism in progress. 9:44 a.m. 0 block of Royal Tern Lane. A man said he was driving through a neighborhood when his car was shot with tennis balls. Grass fire. 7:25 a.m. Pacific Park Drive and Alicia Parkway. Firefighters were called to put out a camp fire or a small brush fire that had broken out. DEC. 31 Prowler. 4:18 a.m. 23400 block of Via Jacinto. A woman said someone tried to open her bedroom window, but was chased off by the sounds of barking dogs and her screaming mother. The blotter is compiled from the Orange County’s Sheriff’s Department website. The outcome of calls often differs from what was initially reported. No assumption of criminal guilt or association should be drawn from the information provided.
Gorgeous picture and I like the beauty in her face with the rosy cheeks and nose. I like how soft the colors look in your pics. Very vibrant, clear, and so soft. Her muscles look very nice as does her outfit. Very lovely indeed.
<samba:parameter name="unix charset" context="G" type="string" constant="1" handler="handle_charset" xmlns:samba="http://www.samba.org/samba/DTD/samba-doc"> <description> <para>Specifies the charset the unix machine Samba runs on uses. Samba needs to know this in order to be able to convert text to the charsets other SMB clients use. </para> <para>This is also the charset Samba will use when specifying arguments to scripts that it invokes. </para> </description> <value type="default">UTF-8</value> <value type="example">ASCII</value> </samba:parameter>
As of January 2014, this is the largest study of planned, midwife-led home birth in the U.S. to date. Outcomes are reported for nearly 17,000 women who went in to labor intending to deliver at home between 2004 and 2009. Results for low-risk mothers are consistent with most studies of planned homebirth.
Survey of heat use during peripheral IV insertion by health care workers. Health care workers at an academic medical center in the Midwest were surveyed to identify common practices regarding heat use during peripheral intravenous (PIV) catheter insertion. Of the 907 who responded, the majority used heat to facilitate PIV insertion at least sometimes, when veins were not easily seen or not palpable, applying a commercial dry hot pack for 2 to 5 minutes before selecting an insertion site. Heat use correlated with practice role and population, frequency of PIV insertion, and perceived PIV skill. Findings will guide development of a research protocol to compare the effects of dry heat, moist heat, and no heat on PIV insertion success.
Religion Prof Phyllis Zagano on Gun Control in Church In her latest blog, Dr. Zagano recounts a tragic incident in Phoenix where a priest – armed with a gun – went out to confront an intruder. His gun was apprehended by the perpetrator and fired at another priest, who died. Dr. Zagano expresses multiple concerns: Namely, why did the priest have a gun? One might think that it should be inferred that priests shouldn’t carry firearms, but is this something the Church now needs to spell out?
Alexander George Morison Robertson Alexander George Morison Robertson (September 3, 1867–August 21, 1947) was Chief Justice of the Supreme Court of Hawaii from March 9, 1911 to January 1, 1918. Robertson was the son of George Morison Robertson, "a distinguished associate justice of the Hawaii Supreme Court", and Robertson "maintained family tradition as an outstanding jurist". On February 9, 1888, Robertson became a second lieutenant in the Honolulu Rifles division, later becoming a captain of the Hawaiian Volunteers, First Battalion. From August 12, 1893 Robertson became a District Magistrate in Honolulu, serving in this capacity until May 29, 1894. In 1894, he became Deputy Attorney General of the Republic of Hawaii, and "was a delegate to the Hawaiian Constitutional Convention and served as a member of Governor Dole's staff". He was elected to the Hawaiian House of Representatives for three terms, serving from 1895 to 1901. In 1910, President William Howard Taft appointed Robertson to be the territorial United States district judge for Hawaii. On March 9, 1911, Robertson was appointed Chief Justice of the Hawaii Supreme Court. He was reappointed on August 5, 1915. He announced his resignation from the court on December 10, 1917, effective January 1, 1918. He returned to private practice, but returned to public service decades later, serving on the Hawaii Equal Rights Commission from November 19, 1942 to July 1, 1947. He married May 29, 1907 to Hawaiian opera singer Ululani McQuaid (1890–1970). Further reading References Category:Hawaii Supreme Court justices Category:1867 births Category:1947 deaths
Daily Photo Galleries Allegheny Photo Galleries Traveling by Jeep, boat and foot, Tribune-Review investigative reporter Carl Prine and photojournalist Justin Merriman covered nearly 2,000 miles over two months along the border with Mexico to report on coyotes — the human traffickers who bring illegal immigrants into the United States. Most are Americans working for money and/or drugs. This series reports how their operations have a major impact on life for residents and the environment along the border — and beyond. The art community in Pittsburgh has lost out on thousands, perhaps millions of dollars, because city officials ignored a decades-old law requiring them to set aside public money for art. Pittsburgh's “Percent for Art” law, written in 1977, requires the city to set aside 1 percent of municipal funding allocated to major construction or renovation projects for public art projects. That hasn't happened, said Pittsburgh's Public Art Manager Morton Brown, who is spearheading an effort to craft an enforceable law as part of the city's master art and design plan. “City directors don't look into the art commission code to see what they need to do with the project,” Brown said. “They didn't even know about it, unless someone like me was there to tap them on the shoulder to say, ‘Hey, you owe us a piece of art.' ” Brown has tapped shoulders to make sure recent city projects have contained public art. Pittsburgh artist Kim Beck designed the subtle etchings on the covered, first-floor windows of the new Zone 3 police station. Beck's work cost about 1 percent of the $1.8 million budgeted to convert the former youth hostel in Allentown into a police station, Brown said. The city put an artist on the team that designed the $3 million Shady Liberty pedestrian bridge over the Martin Luther King Jr. East Busway that connects East Liberty and Shadyside, Brown said. An artist is designing the stormwater management system for the environmental center at Frick Park. “I told them, ‘You owe me 1 percent for art for this project,' ” Brown said of the environmental center. City Council President Darlene Harris has worked with Brown on rewriting the law and felt other council members supported it. She set aside $25,000 in the 2013 capital budget to maintain the city's public art and war memorials. Allegheny County has a similar law, passed in 2005 and requiring 2 percent to be set aside for art. Previous administrations have not enforced the law, said county spokeswoman Amie Downs. The current administration does not appear to be interested in enforcing the law. Instead, the county wants to develop a maintenance and upkeep plan for the art it has, “before we move forward with any implementation of the existing law,” Downs wrote in a statement. Since Brown took over as the city's public art chief in 2009, he has lobbied for enforcement of the 1 percent for art law, he said. He is studying past construction and renovation projects to determine how much money the city has withheld from the art community. According to the formula, the nearly $2 million the city contributed toward building spray parks between 2008 and 2012 should have generated $20,000 for public art projects. The city should have set aside $28,000 for public art for the $2.8 million it allocated the past four years toward a new community and senior center in Riverview Park. Brown's rewrite of the law, which will require city council approval, would likely make the 1 percent contribution to art automatic, wresting enforcement power out of the hands of department heads and not relying “on a political whim,” he said. Brown hopes to publish a draft of the law early next year. “There's this opportunity that has been missing for the city of Pittsburgh,” said Carolyn Speranza, who with other art leaders started a petition asking city and county leaders to enforce their percent for art laws. “I think artists are angry. I think, for the most part, artists have been politically disempowered for years.” Speranza's petition has received more than 1,600 signatures. The city's “Percent for Art” law had early success. During its first decade, the law funded 15 pieces of public art, including a sculpture at Paulson Pool, a mural at the West End Park shelter and fabric banners at the Sheraden Library. Pittsburgh artist Fran Gialamas said blame for ignoring the “Percent for Art” law cannot fall solely on city officials. Early on, “Percent for Art” had strong advocates — Irene Pasinski, who helped draft the law, for one — who pushed the city, Gialamas said. Since then, artists have let down their vigilance. “You needed people who were really on top of it, and it really fell apart,” said Gialamas, who founded a Pittsburgh chapter of Artists Equity in 1982. “You have got be aware of the 1 percent. “You have to go after that.” Aaron Aupperlee is a staff writer for Trib Total Media. He can be reached at 412- 320 -7986 or [email protected]. TribLive commenting policy You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service. We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information. While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers. We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments — either by the same reader or different readers. We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites. We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation. We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly. We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article. Total Promotional Solutions A division of Trib Total Media is your one-stop-shop for all of your branded merchandise needs. We specialize in providing quality affordable promotional products for every type of business including non-profits, schools, universities, sports teams and more. With 1000’s of products to choose from, our knowledgeable staff can help you find the perfect apparel item or product to suit your needs and budget. Digital Sales We offer a wide variety of traditional and new digital advertising options customized to fit your needs! Whether you're just starting out, or you've been a keystone in the community for years, our knowledgeable staff can provide you with a customized package including online banners/advertisements, Social Media Marketing (Facebook / Twitter), Website development, Search Engine Optimization, Email Marketing solutions and much more! Contact your local sales rep today for details, personalized proposal and a meeting to discuss how we can meet your needs.
Expression and function of the neuronal gap junction protein connexin 36 in developing mammalian retina. With the advent of transgenic mice, much has been learned about the expression and function of gap junctions. Previously, we reported that retinal ganglion cells in mice lacking the neuronal gap junction protein connexin 36 (Cx36) have nearly normal firing patterns at postnatal day 4 (P4) but many more asynchronous action potentials than wild-type mice at P10 (Torborg et al. [2005] Nat. Neurosci. 8:72-78). With the goal of understanding the origin of this increased activity in Cx36-/- mice, we used a transgenic mouse (Deans et al. [2001] Neuron 31:477-485) to characterize the developmental expression of a Cx36 reporter in the retina. We found that Cx36 was first detected weakly at P2 and gradually increased in expression until it reached an adult pattern at P14. Although the onset of expression varied by cell type, we identified Cx36 in the glycinergic AII amacrine cell, glutamatergic cone bipolar cell, and retinal ganglion cells (RGCs). In addition, we used calcium imaging and multielectrode array recording to characterize further the firing patterns in Cx36-/- mice. Both correlated and asynchronous action potentials in P10 Cx36-/- RGCs were significantly inhibited by bath application of an ionotropic glutamate receptor antagonist, indicating that the increase in activity was synaptically mediated. Hence, both the expression patterns and the physiology suggest an increasing role for Cx36-containing gap junctions in suppressing RGC firing between waves during postnatal retinal development.
More from Football Foley makes Shrews move Shrewsbury confirm that they have signed Yeovil winger Sam Foley on a one-month loan. Last Updated: 07/03/14 5:19pm Sam Foley: One-month loan at New Meadow Shrewsbury confirm that they have signed Yeovil winger Sam Foley on a one-month loan. The 27-year-old former Newport man was a crucial cog in the Glovers side that clinched promotion to the Championship last season but has been restricted to just seven appearances this term. "I spoke to Gary Johnson about him and he came on the radar a week or two ago so I've been doing some checks on him," said manager Mike Jackson, who could hand Foley his debut against Bristol City on Saturday. "He's scored goals for Newport and he did for Yeovil last season. I was impressed when he played for Yeovil last year and he's been part of a promotion team which is always good. "He's got an energy about him and he can play off the left, off the front, so he gives us a few options. It will be competition for places again so I'm made up he's here."
hey I'm new here, there's a lot of interesting stuff going on, and everyone seems really knowledgeable:-), I'll start by saying that I've been in the Saltwater aquarium fish hobby for several years and have gotten quite good I take care of several reefs at home, I'm heading off to college though and being on my own I discovered that I did not have enough money to start a new reef tank. I do however have a JBJ 12 gallon nanocube that I bought earlier planning to start a reef tank, I started thinking about what I could do and the next best thing is definitely a planted tank. I've done some preliminary reading and it seems like everything is good to go and that i don't really have to make too many modifications to the nanocube:-P (please correct me if i'm wrong) but soon after this I discovered that I knew absolutely nothing about freshwater plants, which ones are easy to take care of, which ones look good, how fast they grow all those things. since i'm new i'm looking for plants of easy to medium difficulty I'm not sold on any one plant yet but there are a few things, i'm going to have access to RO/DI water and i'm going to use flourite or eco-complete for as a substrate. I'll do water changes as often as is recommended, I don't think I plan on initially doing C02 injection but I might be convinced over time but I think I should lay it out assuming that I won't be doing any. I also want to keep fish, which kind of fish doesn't really make that much of a differen't as long as these plants don't totally exclude me keeping a wide variety of fish. a few things I know that I do want though I want a plant that floats at the top of my tank like a lilly-pad type thing, doesn't have to be flowering ut that would awesome as well. I'd like if this plant had roots that went to the bottom I want a relatively easy to keep plant that completely covers the ground of my tank forming a green mat. I want a red plant of some kind I want a plant that that takes up a good part of the middle of the tank any suggestions on any of these would be very appreciated. If I haven't provided enough specifics please tell me So -no c02 injection at least initially -48 watts of CFL lighting -good filtration, good water parameters -all eco-complete/flourite substrate -there will be fish but I can negotiate on the type any livestock recommendations would be great too Mikaila31 08-16-2009 08:51 PM You really need to cut back on the lighting. As of right now that tank has very high lighting for a planted tank and will be difficult to maintain with pressurized co2. At the very most you would want 24 watts of light, starting out 18 watts would be best IMO. Also the light should have a kelvin temp of 5,000k to 10,000K. for plants I would look at tiger lotus, cabomba, java moss, brown and green crypts. Azazel 08-16-2009 11:04 PM well two of them are actinic an and don't really put much light in the correct part of the spectrum so I have 24 watts of 10,000 kelvin lighting. I can probably even turn the actinics off, and those all seemed like good suggestions, does java moss grow a long ways upward though because I want something that grows pretty much horizontally, any other suggestions would also be great thanks. Byron 08-17-2009 10:43 AM Quote: Originally Posted by Azazel (Post 228500) well two of them are actinic an and don't really put much light in the correct part of the spectrum so I have 24 watts of 10,000 kelvin lighting. I can probably even turn the actinics off, and those all seemed like good suggestions, does java moss grow a long ways upward though because I want something that grows pretty much horizontally, any other suggestions would also be great thanks. I've personally never used actinic lights since the plant experts all agree that plants do not grow well under them, so I would get rid of those. I agree with Mikaila31 that you need to significantly reduce the intensity of light over a 12g tank; otherwise algae will be rampant. The best plant growth light is full spectrum as M mentioned. A single tube over a 12g wuld be quite sufficient, whatever the wattage (probably a 15w, they are standard), a Life-Glo 2 is my preference for single tube tanks, or a Ultra-Sun or Tropic-Sun from Zoo Med. When you say horizontally, do you mean like a carpet across the substrate, or horizontally as in Anubias? Anubias grows from a rhizome, which grows sort of at a 45 degree angle out with leaves arising along the rhizome, and the rhizome frequently divides as it spreads. Anubias is a very slow grower. I had one in my former 90g that grew 10+ years into a plant with about 3 feet of rhizome in different directions. You can break it apart and place the pieces where ever. It does not grow roots in the substrate, but attaches to wood and rocks like Java Fern. And yes, JF grows vertical, although it also spreads by a growing rhizome as well as daughter plants from the leaves. Byron. 1077 08-17-2009 11:08 AM I would also keep in mind that floating plants or lily type plants(see tiger lotus),, will or could block light from reaching the plants below. May not be a problem with Anubias which I have found grow slowly but grow with minimal lighting. Wisteria if kept trimmed will grow horizontally. Crypt plants would I think look nice and they would do well with low to moderate lighting. I would think a dozen neons and possibly some cherry shrimp would look nice. Hope some of this helps. Azazel 08-17-2009 12:30 PM Quote: I've personally never used actinic lights since the plant experts all agree that plants do not grow well under them, so I would get rid of those. I agree with Mikaila31 that you need to significantly reduce the intensity of light over a 12g tank; otherwise algae will be rampant. The best plant growth light is full spectrum as M mentioned. A single tube over a 12g wuld be quite sufficient, whatever the wattage (probably a 15w, they are standard), a Life-Glo 2 is my preference for single tube tanks, or a Ultra-Sun or Tropic-Sun from Zoo Med. When you say horizontally, do you mean like a carpet across the substrate, or horizontally as in Anubias? Anubias grows from a rhizome, which grows sort of at a 45 degree angle out with leaves arising along the rhizome, and the rhizome frequently divides as it spreads. Anubias is a very slow grower. I had one in my former 90g that grew 10+ years into a plant with about 3 feet of rhizome in different directions. You can break it apart and place the pieces where ever. It does not grow roots in the substrate, but attaches to wood and rocks like Java Fern. And yes, JF grows vertical, although it also spreads by a growing rhizome as well as daughter plants from the leaves. Byron. I mean a carpet across the substrate, I want something that doesn't grow more than 3 or 4 inches vertically, the Actinics are just for visual appeal, they don't emit very much light in the spectrum useful for plants, but the light they emit also isn't useful for algae so its kind of a non-issue I probably will disable them anyway though. I think I have too much light so blocking out some of it with floating plants seems like a good idea :) Byron 08-17-2009 01:47 PM Quote: Originally Posted by Azazel (Post 228726) I mean a carpet across the substrate, I want something that doesn't grow more than 3 or 4 inches vertically, the Actinics are just for visual appeal, they don't emit very much light in the spectrum useful for plants, but the light they emit also isn't useful for algae so its kind of a non-issue I probably will disable them anyway though. I think I have too much light so blocking out some of it with floating plants seems like a good idea :) Yes, I would disable the actinic; if you have proper plant light (full spectrum) algae will use it if the plants don't and/or nutrients aren't used by the plants; I can't see actinic lighting having any impact, since to do so would mean it has to somehow counter the full spectrum...probably not possible, but not something you'd want anyway.
--- abstract: 'We use chiral perturbation theory to study the extrapolations necessary to make physical predictions from lattice QCD data for the electromagnetic form factors of pseudoscalar mesons. We focus on the quark mass, momentum, lattice spacing, and volume dependence and apply our results to simulations employing mixed actions of Ginsparg-Wilson valence quarks and staggered sea quarks. To determine charge radii at quark masses on the lattices currently used, we find that all extrapolations except the one to infinite volume make significant contributions to the systematic error.' author: - 'T. B. Bunton' - 'F.-J. Jiang' - 'B. C. Tiburzi' bibliography: - 'hb.bib' title: Extrapolations of Lattice Meson Form Factors --- ł Ł ø Ø § \#1 \#1[[(\[\#1\])]{}]{} Introduction ============ As computing resources and numerical algorithms improve, first principles determination of hadronic observables will be possible with lattice QCD. In the foreseeable future, these numerical determinations will rely on effective field theories to address systematic errors in lattice data. There has been considerable effort to understand and compute effects from the finite volume of the lattice, the discretization chosen for fermions, and most notably the quark mass dependence of observables. To address systematic error related to the treatment of the fermionic determinant, quenched chiral perturbation theory [@Morel:1987xk; @Sharpe:1992ft; @Bernard:1992mk], and partially quenched chiral perturbation theory [@Bernard:1994sv; @Sharpe:1997by; @Golterman:1998st; @Sharpe:2000bc; @Sharpe:2001fh] have been developed. In the respective approximation made in the former case, the determinant is replaced by a constant leading to uncontrolled systematic error, while in the latter the determinant is computed but with larger quark masses used than in the propagators connected to external legs. Only through this latter approximation can connection to real QCD observables be made; moreover, effective field theory is required to make this connection systematically. In this work we study the extraction of the electromagnetic charge radii of pseudoscalar mesons from lattice QCD within the framework of partially quenched chiral perturbation theory. We consider the various extrapolations in quark mass, momentum, volume and lattice spacing needed to extract the radii. Experimentally, the pion charge radius is rather well determined from pion scattering off atomic electrons [@Amendolia:1986wj; @Eidelman:2004wy]. As such it can be used as a crucial test of lattice and effective field theory methods. Away from small momentum transfer, the pion form factor has been experimentally probed from the virtual pion cloud of the nucleon [@Volmer:2000ek]; however, extraction is limited by model dependence assumed in extrapolating the experimental data to zero virtuality. Ultimately lattice methods will enable first principles QCD calculation of meson form factors over a wide range of momentum transfer. The original lattice QCD calculations of the pion form factor were pursued by two groups [@Martinelli:1988bh; @Draper:1989bp]. Since these pioneering calculations there have been various further computations and refinements using improved actions, larger volumes, and different lattice fermions; for recent investigations see, e.g., [@Nemoto:2003ng; @vanderHeide:2003kh; @Abdel-Rehim:2004gx; @Capitani:2005ce]. These calculations are all limited by the quenched approximation. There have been, however, recent lattice calculations that include dynamical quarks [@Bonnet:2004fr; @Hashimoto:2005am]. The results with dynamical quarks in [@Bonnet:2004fr] use a mixed lattice action of domain wall valence quarks on staggered sea quarks, and the lightest pion mass $\sim 300 \, \texttt{MeV}$ is arguably within the chiral regime. Indeed such mixed action simulations are currently popular due to both the publicly available MILC configurations [@Bernard:2001av], and the desirable chiral symmetry properties of domain wall fermions [@Kaplan:1992bt] (or more generally, of Ginsparg-Wilson fermions [@Luscher:1998pq]). For other observables calculated with such mixed actions, see [@Renner:2004ck; @Bowler:2004hs; @Beane:2005rj; @Edwards:2005kw; @Alexandrou:2005em; @Edwards:2005ym; @Beane:2006mx; @Beane:2006pt; @Beane:2006fk; @Beane:2006kx]. The low-energy effective theory for mixed lattice actions is a partially quenched chiral perturbation theory even when the valence and sea quark masses are degenerate. An additional reason for us to study the pion form factor is to learn about the low-energy constants of mixed action chiral perturbation theory [@Bar:2005tu]. At the order we work, only one new parameter $C_\text{mix}$ \[see Eq. \] enters in the continuum extrapolation of the pion charge radius. We find, however, that the data in [@Bonnet:2004fr] allow for only a rough estimate of the parameter $C_\text{mix}$, a problem that can be remedied with more lattice data for differing valence quark masses, or at different lattice spacings. The organization of the paper is as follows. First in Sec. \[s:pqqcd\], we review the basics or partially quenched chiral perturbation theory. In Sec. \[s:infinite\], we derive the meson form factors at one-loop order in partially quenched chiral perturbation theory. Our result improves upon an earlier calculation [@Arndt:2003ww] by using a computationally judicious choice for the quark charges. Next in Sec. \[s:a\], we include the effects from the lattice discretization for the case of a mixed action of Ginsparg-Wilson valence quarks and staggered sea quarks. The finite volume corrections are presented in Sec. \[s:finite\]. Extrapolations are considered in Sec. \[s:extrap\], where we use our results to investigate the chiral, momentum, volume, and continuum extrapolations of meson form factors. Lastly we conclude with a brief summary of our work, Sec. \[s:summy\]. Partially Quenched Chiral Lagrangian {#s:pqqcd} ==================================== In partially quenched QCD, the quark part of the continuum Lagrangian is written as$$\begin{aligned} \label{eqn:LPQQCD} {\cal L} &=& \sum_{j=1}^{9} \bar{Q}_j(\Dslash + m_Q) Q_j \, .\end{aligned}$$ The nine quarks appear in the vector $$Q=(u,d,s,j,l,r,\tilde{u},\tilde{d},\tilde{s})^{\text{T}} ,$$ that transforms in the fundamental representation of the graded group $SU(6|3)$ [@BahaBalantekin:1981qy; @BahaBalantekin:1982bk]. The quark mass matrix is given by $$m_Q=\text{diag}(m_u,m_d,m_s,m_j,m_l,m_r,m_u,m_d,m_s),$$ to maintain the cancellation of path integral determinants from the valence and ghost sectors. Effects of dynamical quarks are present due to the contribution of the finite-mass sea quarks. Additionally we choose to work in the isospin limit in the valence and sea sectors: $m_d = m_u$ and $m_l = m_j$. The light quark electric charge matrix $\cQ$ is not uniquely defined in partially quenched QCD [@Golterman:2001qj]. The only constraint one must impose is that the charge matrix $\cQ$ has vanishing supertrace. Following [@Tiburzi:2004mv; @Detmold:2005pt], we use $$\cQ = \diag \left( q_u,q_d,q_s,q_j,q_l,q_r,q_u,q_d,q_s \right) ,$$ along with the condition $q_j + q_l + q_r = 0$. QCD is recovered in the limit of degenerate valence and sea quarks only for the particular choice: $q_u = q_j = \frac{2}{3}$, and $q_d = q_s = q_l = q_r = - \frac{1}{3}$. Letting the charges be arbitrary, however, enables us to track the flow of charge in loop diagrams. For massless quarks, the Lagrangian in Eq. (\[eqn:LPQQCD\]) exhibits the graded symmetry $SU(6|3)_L \otimes SU(6|3)_R \otimes U(1)_V$ that we assume is spontaneously broken to $SU(6|3)_V \otimes U(1)_V$. The low-energy effective theory of partially quenched QCD is written in terms of the pseudo-Goldstone mesons emerging from spontaneous chiral symmetry breaking. At lowest order in the chiral expansion, the dynamics of these mesons can be described by the $\order(p^2)$ Lagrangian[^1] $$\label{eqn:Lchi} {\cal L} = \frac{f^2}{8} \str\left(D_\mu\Sigma^\dagger D_\mu\Sigma\right) - \frac{\l}{4}\,\str\left(m_Q^\dagger\Sigma+m_Q\Sigma^\dagger\right) + \a\partial_\mu\Phi_0\partial_\mu\Phi_0 + \mu_0^2\Phi_0^2 ,$$ where $$\label{eqn:Sigma} \Sigma=\exp\left(\frac{2i\Phi}{f}\right) ,$$ $$\Phi= \left( \begin{array}{cc} M & \chi^{\dagger} \\ \chi & \tilde{M} \end{array} \right) ,$$ $f=132 \, \texttt{MeV}$, and we have defined the electromagnetic gauge-covariant derivative $D_\mu\S=\partial_\mu\S+ie\cA_\mu[\cQ,\S]$. The str() denotes a supertrace over flavor indices. The $M$, $\tilde{M}$, and $\chi$ are matrices of pseudo-Goldstone bosons with quantum numbers of $q\ol{q}$ pairs, pseudo-Goldstone bosons with quantum numbers of $\tilde{q}\ol{\tilde{q}}$ pairs, and pseudo-Goldstone fermions with quantum numbers of $\tilde{q}\ol{q}$ pairs, respectively. Upon expanding the Lagrangian in one finds that quark basis mesons with quark content $Q\bar{Q'}$ have masses $$\label{eqn:mqq} m_{QQ'}^2=\frac{\lambda}{f^2}(m_Q+m_{Q'}) .$$ The flavor singlet field appearing above is given by $\Phi_0=\str(\Phi)/\sqrt{6}$. Just as in chiral perturbation theory, but in contrast to the quenched case, the singlet field is rendered heavy by the strong $U(1)_A$ anomaly and is integrated out of the theory. The resulting flavor neutral propagators, however, deviate from simple pole forms [@Sharpe:2001fh]. We do not display these propagators here as they are not explicitly needed in our final results for meson form factors. Additionally there are three terms in the $\order(p^4)$ Lagrangian $$\begin{aligned} \label{eqn:L4PQQCD} {\cal L} &=& \a_4 \, \str(D_\mu\Sigma D_\mu\Sigma^\dagger) \, \str(m_Q^\dagger\Sigma+m_Q \Sigma^\dagger) + \a_5 \, \str(D_\mu\Sigma D_\mu\Sigma^\dagger (m_Q^\dagger\Sigma+m_Q \Sigma^\dagger)) \nonumber \\ &&- i\a_9 \, \str(L_{\mu\nu}D_\mu\Sigma D_\nu\Sigma^\dagger +R_{\mu\nu}D_\mu\Sigma^\dagger D_\nu\Sigma) ,\end{aligned}$$ that contribute to meson form factors at tree level. Here $L_{\mu\nu}$, $R_{\mu\nu}$ are the field-strength tensors of the external sources, which for an electromagnetic source are given by $$\begin{aligned} \label{eqn:LR} L_{\mu\nu} = R_{\mu\nu} = e\cQ(\partial_\mu \cA_\nu-\partial_\nu \cA_\mu)+ie^2\cQ^2[\cA_\mu,\cA_\nu] .\end{aligned}$$ Unlike quenched chiral perturbation theory, where the low-energy constants are distinct from those in chiral perturbation theory, the partially quenched parameters in Eq.  are the dimensionless Gasser-Leutwyler parameters of chiral perturbation theory [@Gasser:1985gg], which can be demonstrated by matching. Form Factors in Infinite Volume {#s:infinite} =============================== The electromagnetic form factor $G_{X}$ of an octet meson $\phi_X$ is required by Lorentz invariance and gauge invariance to have the form $$\label{eqn:mesonff} \langle\phi_{X}(p')|J_\mu|\phi_{X}(p)\rangle = e \, G_{X}(q^2)(p+p')_\mu,$$ where $p$ ($p'$) is the momentum of the incoming (outgoing) meson, and $q_\mu=(p'-p)_\mu$ is the momentum transfer. Conservation of electric charge protects it from renormalization, hence at zero momentum transfer $e \, G_X(0)=Q_X$, where $Q_X$ is the charge of $\phi_X$. The charge radius $r_{X}$ is related to the slope of $G_{X}(q^2)$ at $q^2=0$, namely $$<r_{X}^2> = -6\frac{d}{dq^2}G_{X}(q^2)\Big|_{q^2=0} .$$ Charge conjugation implies the form factor relations: $G_{\pi^+}(q^2) = - G_{\pi^-}(q^2)$, $G_{K^+}(q^2) = - G_{K^-}(q^2)$, and $G_{K^0}(q^2) = - G_{\overline{K}^0}(q^2)$, as well as $G_{\pi^0}(q^2) = G_{\eta}(q^2) = 0$. To calculate the charge radii to lowest order in the chiral expansion one has to include operators of $\cL$ in Eq.  to one-loop order \[see Figs. (\[F:pions\]) and (\[F:pions-wf\])\] ![ Loop diagrams contributing to the octet meson charge radii in partially quenched chiral perturbation theory. Octet mesons are denoted by a dashed line, singlets (hairpins) by a crossed dashed line, and the photon by a wiggly line. []{data-label="F:pions"}](F-pion.eps){width="75.00000%"} ![ Wavefunction renormalization diagrams in partially quenched chiral perturbation theory. []{data-label="F:pions-wf"}](F-pion-wf.eps){width="50.00000%"} and operators of Eq.  to tree level. Using dimensional regularization, where our subtraction scheme removes $\frac{1}{\e}+1-\gamma_{\text{E}}+\log 4\pi$, we find the form factors have the form $$\label{eq:answer} G_X(q^2) = Q_X \left( 1 - \frac{4 \alpha_9}{f^2} q^2 \right) + \frac{1}{(4\pi f)^2} \sum_\phi A^X_\phi \, F(m_\phi^2, q^2) .$$ In this general expression, $Q_X$ is the meson charge, the sum on $\phi$ runs over all non-degenerate loop mesons of mass $m_\phi$. The coefficients $A_\phi^X$ are products of charge and Clebsch-Gordan factors for the coupling of the loop meson $\phi$ to the external state meson $X$. These coefficients are listed in Table \[t:A\]. If a particular loop meson is not listed, then the values of $A_\phi^X$ are identically zero for all states $X$. Notice that in the isospin limit the charges $q_j$ and $q_l$ always enter in the combination $q_j + q_l = - q_r$ and for this reason do not explicitly appear in coefficients listed in the table. Lastly the non-analytic function $F(m^2, q^2)$ above is defined to be $$F(m^2, q^2) = \frac{1}{6} \left[ q^2 \, \log\frac{m^2}{\mu^2} + 4 m^2\, {\mathcal F}\left(\frac{-q^2}{4 m^2}\right) \right] ,$$ where the auxiliary function ${\mathcal F}(a)$ is given by $$\label{eqn:Fa} {\mathcal F}(a) = \left( a- 1 \right) \sqrt{1-\frac{1}{a}} \log\frac{\sqrt{1-\frac{1}{a}+i\e}-1}{\sqrt{1-\frac{1}{a}+i\e}+1} +\frac{5}{3} a -2 .$$ In the limit $m_j\to m_u$, $m_r\to m_s$ and using the physical quark charges, we recover the chiral perturbation theory result [@Gasser:1985gg; @Gasser:1985ux]. --------- -------------------- -------------------- -------------------- -------------------- $X$ $\qquad ju \qquad$ $\qquad ru \qquad$ $\qquad js \qquad$ $\qquad rs \qquad$ $\pi^+$ $2 (q_u - q_d)$ $q_u - q_d$ $0$ $0$ $K^+$ $2 q_u + q_r$ $q_u - q_r$ $- 2 q_s - q_r$ $q_r - q_s$ $K^0$ $2 q_d + q_r$ $q_d - q_r$ $- 2 q_s - q_r$ $q_r - q_s$ --------- -------------------- -------------------- -------------------- -------------------- : \[t:A\] Coefficients $A_\phi^X$ of loop mesons contributing to electromagnetic form factors. We list the coefficients only for $X = \pi^+$, $K^+$, and $K^0$ states because the rest follow from charge conjugation: $A_\phi^{\pi^+} = - A_\phi^{\pi^-}$, $A_\phi^{K^+} = - A_\phi^{K^-}$, and $A_\phi^{K^0} = - A_\phi^{\overline{K}^0}$ for all $\phi$. And of course $A_\phi^{\pi^0} = A_\phi^{\eta} = 0$. Using the values from the Table, the form factor of the $\pi^+$, e.g., appears as $$\begin{aligned} \label{eqn:donaldduck} G_{\pi^+}(q^2) &=& Q_{\pi^+} \left\{ 1 - \frac{4 \a_9}{f^2}q^2 + \frac{1}{(4 \pi f)^2} \left[2 F (m_{ju}^2, q^2) + F(m_{ru}^2, q^2) \right] \right\} ,\end{aligned}$$ where the charge of the pion is $Q_{\pi^+} = q_u - q_d$. The pion form factor appears rather special at one loop due to its independence from the charges of the sea quarks.[^2] In fact, this independence from sea quark charges holds non-perturbatively and was shown using the behavior of lattice correlators under charge conjugation in [@Draper:1989bp]. We demonstrate this more simply as follows. The electromagnetic current $J_\mu$ can be decomposed into isosinglet and isovector combinations, $J_\mu = J^I_\mu + J_\mu^3$. Matrix elements of the former involve the charges of the sea quarks; while in the isospin limit, matrix elements of the latter are independent of these sea charges. Now consider the electromagnetic current matrix element of the neutral pion,[^3] $$\langle \pi^0(P') | \, J_\mu \, | \pi^0(P) \rangle = \langle \pi^0(P') | \, J^I_\mu \, | \pi^0(P) \rangle + \langle \pi^0(P') | \, J^3_\mu \, | \pi^0(P) \rangle .$$ This vanishes by charge conjugation invariance. Furthermore the isovector contribution vanishes, hence, so too must the isosinglet contribution. The matrix element of the isosinglet current is the same for all pions in the isospin limit. Thus as a consequence of isospin symmetry and charge conjugation invariance, we have $$\langle \pi^+(P') | \, J_\mu \, | \pi^+(P) \rangle = \langle \pi^+(P') | \, J^3_\mu \, | \pi^+(P) \rangle ,$$ and hence the charged pion form factor is independent of the sea quark charges. As a result of this independence from sea quark charges, one can efficaciously ignore operator self-contractions and still determine the pion form factor [@Draper:1989bp]. Note that while the pion form factor is insensitive to contributions from closed quark loops with photon insertion, it is sensitive to sea quarks. As pointed out in [@Arndt:2003ww], the analogous calculation in quenched chiral perturbation theory shows that there is no meson mass dependence at one-loop order. This result is also clear from the Table: only valence-sea loop mesons enter our one-loop expressions. Notice that the kaon form factors are not independent from the sea quark charges. This dependence only disappears in the $SU(3)$ limit, which is badly violated in nature.[^4] Finally we derive expressions for the charge radii at one-loop order. In infinite volume, we can take $q^2 \ll m^2$ to find that the meson charge radii are given by $$\label{eq:radius} < r_X^2 > = Q_X \frac{24 \alpha_9}{f^2} - \frac{1}{(4\pi f)^2} \sum_\phi A^X_\phi \left( \log \frac{m_\phi^2}{\mu^2} + 1 \right) .$$ Lattice Spacing Dependence {#s:a} ========================== In this Section, we detail the modifications to our results at finite lattice spacing. We consider a mixed lattice action consisting of Ginsparg-Wilson valence quarks and staggered sea quarks. To address the effects of the lattice spacing, one formulates the continuum effective theory of the lattice action and then matches this effective theory onto a chiral perturbation theory. In this work we assume the natural hierarchy of scales $$\notag m_q \ll \Lambda_{\text{QCD}} \ll \frac{1}{a},$$ and choose the power counting $$p^2 \sim m_\pi^2 \sim a^2 \Lambda_{\text{QCD}}^4 .$$ The form factors can now be systematically calculated in the dual expansion in quark mass and lattice spacing. Such modifications to the electromagnetic form factors of mesons are rather simple. It was demonstrated in Ref. [@Arndt:2004we] that no local $a$-dependent operators contribute to the form factors to $\mathcal{O}(p^2)$ due to charge conservation. In our power counting, local corrections to the current in the $a^2$ chiral Lagrangian will contribute at $\mathcal{O}(p^4)$ and will be competitive with two-loop effects. These local terms can thus be neglected here. The lattice spacing corrections to meson form factors then enter only through the dependence of the meson masses on the lattice spacing. With a mixed lattice action, there is no symmetry that relates the valence and sea sectors of the theory. The Symanzik Lagrangian thus contains dimension-six mixed field bilinears of the form [@Bar:2003mh; @Bar:2005tu] $$\notag \delta \mathcal{L}^{(6)} \sim \left( \ol Q \, \Gamma \, P_V Q \right) \left( \ol Q \, \Gamma \, P_S Q \right) ,$$ where $P_V$ is a diagonal matrix that has unit entries corresponding to the valence sector, and $P_S$ is a diagonal matrix that has unit entries corresponding to the sea sector (we have also implicitly enlarged the vector $Q$ to transform under the continuum $SU(15|3)$ that includes four tastes for each flavor of sea quark). Above $\Gamma = \gamma_\mu$, $\gamma_\mu \gamma_5$ are the only Dirac matrices allowed by the chiral symmetry of the valence sector and the axial symmetry of the sea sector. The mapping of such mixed bilinears onto operators in the chiral perturbation theory at finite lattice spacing produces one new operator of the form [@Bar:2005tu] $$\label{eq:mixed} \delta \mathcal{L} = - \frac{1}{8} a^2 C_{\text{mix}} \, \str (T_3 \, \Sigma \, T_3 \, \Sigma^\dagger ) ,$$ where $T_3 = P_S - P_V$. This operator contributes to masses of mesons formed from one valence and one sea quark. Such valence-sea mesons are not protected from additive mass renormalization due to the mixed action’s symmetry. Thus to $\mathcal{O}(p^2)$, the loop meson consisting of a staggered quark $Q_i$, i.e. of flavor $Q$ and taste $i$, and a valence quark $Q'$ have masses given by [@Bar:2005tu] $$\label{eq:mixedmass} m_{Q_i Q'}^2 = \frac{\lambda}{f^2} (m_Q + m_{Q'}) + \frac{a^2}{f^2} C_{\text{mix}} .$$ These masses are independent of the staggered quark taste and hence there is a four-fold taste degeneracy in the valence-sea meson loops. This four-fold degeneracy is exactly canceled by the $\frac{1}{4}$ factor that must be inserted by hand to implement the fourth-root trick. Hence in a mixed action simulation, the meson form factors at $\mathcal{O}(p^2)$ are given by Eq.  with the loop meson masses given in Eq. . Volume Dependence {#s:finite} ================= On the lattice, the available momentum modes are quantized and observables calculated thus inherit a dependence on the lattice volume. This dependence, which is inherently a long-distance effect, can be ascertained using chiral perturbation theory. We customarily choose a hypercubic box of three equal spatial dimensions $L$, and time dimension $T$, with $T \gg L$. With periodic boundary conditions on the quark fields, the available meson momenta have the form $k_\mu = (k_0, \bm{k})$, with $\bm{k} = \frac{2\pi}{L} \bm{n}$, and $\bm{n}$ represents a triplet of integers. Due to the assumed length of the time direction, we treat $k_0$ as continuous. As spontaneous symmetry breaking does not occur in finite volumes, we must be careful also to specify that $m_\pi L > 1$ so that mesonic zero modes do not become strongly coupled [@Gasser:1987ah]. This restriction ensures that the zero modes do not conspire to restore chiral symmetry. Provided this is the case, the standard $p$-counting of chiral perturbation theory remains intact and integrals over loop momenta can merely be replaced by corresponding sums over quantized momenta. This replacement leads to a dependence of physical quantities on the lattice size $L$. Calculation of the finite volume correction to our one-loop results for meson form factors is straightforward. Considering pionic matrix elements of the charge density[^5] in a box, we have $$\begin{aligned} \frac{\langle\phi_{X}(p')|J_4 |\phi_{X}(p)\rangle}{p'_4 + p_4} &=& e \, Q_X \left( 1 - \frac{4 \alpha_9}{f^2} q^2 \right) \notag \\ &&+ \sum_{\phi, \, \bm{k}} \frac{e A^X_\phi}{2 f^2 L^3} \int_0^1 dx \left[\frac{1}{\sqrt{(\bm{k} + x \bm{q})^2 + m_\phi^2 + x(1-x) q^2}} - \frac{1}{\sqrt{\bm{k}^2 + m_\phi^2}} \right]. \notag\end{aligned}$$ The finite volume shift can then be obtained using the Poisson re-summation formula and the resulting sums can be cast into exponentially convergent forms, see, e.g. [@Sachrajda:2004mi]. We find the finite volume shift to the meson form factors $$\label{eq:volume} \delta_{L} G_X(q^2) = \frac{1}{(4 \pi f)^2} \sum_\phi A_\phi^X \int_0^1 dx \left[ \, \mathcal{I}(x {\bm q}, m_\phi^2 + x(1-x)q^2) - \mathcal{I}(\bm{0}, m_\phi^2) \, \right] ,$$ where we have defined $$\mathcal{I}(\bm{q}, \Delta) = \int_0^\infty d\tau \frac{e^{-\tau \Delta}}{\tau^2} \left[ \prod_{j=1}^3 \vartheta_3 \left( \frac{q_j L}{2}, e^{-\frac{L^2}{4 \tau}} \right) - 1 \right] ,$$ with $\vartheta_3(q,z)$ as the Jacobi elliptic theta function of the third kind. Extrapolations of the charge radii {#s:extrap} ================================== We now consider each of the various extrapolations necessary to make physical predictions from lattice data for meson form factors. For simplicity we consider the pion form factor and this will enable us to compare with the lattice data in [@Bonnet:2004fr]. To perform our analysis, we fix the low-energy constant $\alpha_9 (\mu = 1 \texttt{GeV}) = 0.0069$ by using the one-loop result Eq.  along with the experimentally determined pion charge radius [@Eidelman:2004wy]. ![Momentum transfer dependence of the pion form factor. The ratio of the pion form factor to its slope at zero momentum transfer is plotted versus $q^2$ for a range of pion masses. []{data-label="f:mom"}](mom.eps){width="50.00000%"} Momentum Extrapolation ---------------------- First we shall deal with the limitation of discrete lattice momenta. Above we have determined the effect of the finite volume on the radii by using the allowed lattice momenta in a periodic box. Another consequence of periodic boundary conditions is that the momentum transfer is quantized; hence, the limit leading to Eq.  cannot be taken. Provided the lowest momentum transfers are in the chiral regime, the effective field theory can be used to perform a momentum extrapolation, *cf*. Eq. . It is questionable whether at current lattice volumes the minimum spatial momentum $| \bm{q}_\text{min}| \approx 0.5 \, \texttt{GeV}$ meets this restriction. For a relativistic object like the pion, a slight reduction is seen because $q^2 < \bm{q}^2$ (unlike the nucleon where $q^2 \approx \bm{q}^2$). Furthermore, corrections to Eq.  from higher terms in the chiral expansion are of order $q^2 / \Lambda_\chi^2$, for which the smallest available $q^2$ in Ref. [@Bonnet:2004fr] yields $\sim 20 \%$ corrections. Thus we shall assume that the momentum transfer dependence of the lattice data at the minimal value of $q^2$ is captured by the effective field theory. With this assumption, let us investigate the momentum transfer dependence of the pion form factor at one-loop order. If the minimal momentum transfer $q^2$ is indeed small compared to $m^2$, then the form factor will have linear behavior in $q^2$ and no momentum extrapolation is necessary to determine the slope near $q^2 = 0$. On the other hand, imagine that $m^2$ is small compared to $q^2$. In this limit, the chiral logarithm dominates the form factor, which is multiplied by $q^2$, and again the behavior is linear. In the intermediate region $q^2 \sim 4 m^2$ the behavior of the function $\mathcal{F}[-q^2 / (4 m^2)]$ in Eq.  becomes important. This is the region of parameters relevant for current lattice simulations. In Figure \[f:mom\], we plot the function $\D G(q^2)$, defined by $$\D G(q^2) = \frac{G_\pi(q^2) - Q_\pi}{q^2 G'_\pi(q^2)} ,$$ as a function of $q^2$ in order to see the deviation from linearity. The largest deviation from linearity over this range of momentum transfer is for the physical pion mass. For the larger pion masses employed on the lattice, the plot shows that for all practical purposes we can treat the form factor as linear in $q^2$. For example, the data at the lowest $q^2_\text{min}$ and at lightest pion mass in Ref. [@Bonnet:2004fr], the difference from linearity is less than one percent. Comparatively, the neglected higher-order terms in the chiral expansion are more than an order of magnitude larger (these terms, however, modify the momentum transfer dependence). ![Meson mass dependence of the pion charge radius. []{data-label="f:chiral"}](chiral.eps){width="50.00000%"} Chiral Extrapolation -------------------- Most striking is the well-known behavior of the charge radii near the chiral limit. This can be seen from the chiral logarithm in Eq. . For arbitrarily light pions the virtual cloud of pionic excitations in a meson extends arbitrarily far, and hence there is considerable variation of the charge radius as a function of the pion mass. One must be careful, however, not to assume that such variation with mass will necessarily be seen in lattice data. Looking at Eqs. , and , we see that the valence-sea meson mass is what dominates the chiral behavior at one-loop order. Thus while the valence-valence and sea-sea meson masses are light, the additive mass renormalization allowed by the mixed-action symmetry breaking may actually push one away from the chiral regime. In Figure \[f:chiral\], we plot the meson mass dependence of the pion charge radius. Keep in mind that the meson mass which is relevant is the valence-sea mass. Ignoring other systematic errors, lattice calculations with valence-sea meson masses $\sim 350 \, \texttt{MeV}$ will undershoot the pion charge radius by $\sim 10 \%$. Volume Extrapolation -------------------- The virtual pion cloud will be affected by the boundary conditions imposed in the lattice simulation. Due to the chiral singularity in the one-loop contribution, one might also expect that the volume effects are substantial for light pions because these corrections stem from the long distance physics. Using Eq.  we can plot the volume effect as a function of $L$ for various values of the (valence-sea) pion mass. In Figure \[f:vol\], this is done for the quantity $\D \, r_\pi^2$ which is defined by $$\D \, r_\pi^2 = \frac{< r_\pi^2>_L}{< r_\pi^2>} ,$$ where $< r_\pi^2>$ is the infinite volume radius, which is given in Eq. , and $< r_\pi^2>_L = -6 \frac{d}{dq^2} \delta_L G_\pi(q^2)\big|_{q^2 = 0}$ is the finite volume modification. We see that at the physical value of the pion mass, volume effects are substantial $\sim 12\%$ in a $3 \, \texttt{fm}$ box consistent with our intuition. However, the volume effects drop considerably for larger pion masses. For an $m = 0.35 \, \texttt{GeV}$ valence-sea pion in a $2.5 \, \texttt{fm}$ box \[which roughly corresponds to the values used in [@Bonnet:2004fr] ignoring the effects of the mixed action in Eq. \], the effects of periodic boundary conditions in a finite box lead to a bigger positively charged pion, but by only a negligible $0.5 \%$. ![Volume dependence of the pion charge radius. The relative difference $\D \, r_\pi^2$ of the charge radius in finite to infinite volume is plotted as a function of the lattice size $L$. The curve for $m_\pi = 0.14 \, \texttt{GeV}$ terminates for $m_\pi L = 2$ where pionic zero modes become important. []{data-label="f:vol"}](vol.eps){width="50.00000%"} Continuum Extrapolation ----------------------- Lastly we investigate the systematic error in the pion form factor data due to the finite size of the lattice spacing. The lattice spacing $a$ enters our expressions only through the valence-sea meson masses, Eq. . Ideally we would have data at multiple values of the lattice spacing and quark mass to enable a proper continuum and chiral extrapolation of the data. In Ref. [@Bonnet:2004fr], there is only one lattice spacing employed and only one valence-valence meson mass light enough to warrant a chiral analysis. As we have commented above, volume and momentum extrapolations produce negligible corrections compared to neglected higher-order chiral contributions. Thus we need only use the infinite volume expression in Eq.  to make contact with the data. Fixing $\alpha_9$ and $f$ to their physical values, we can estimate the mixed action low-energy constant $C_\text{mix}$. Using the form factor data at the lowest value of $q_{\text{min}}^2 = 0.18 \, \texttt{GeV} \, {}^2$ with the valence pion mass $m_{\pi} = 0.32 \, \texttt{GeV}$ and the sea pion mass $m_{jj} = 0.35 \, \texttt{GeV}$, we estimate $C_\text{mix} = 0.0064 \, \texttt{GeV}\,{}^6$. We will not cite errors on this value because it is a rough estimate—only one datum is used to determine $C_\text{mix}$. Moreover as it enters our expressions logarithmically, any error in the form factor exponentiates into our estimate of $C_\text{mix}$. Using the statistical error bars from the lattice data for a high-low estimate, we find a rather wide range statistically allowed for $C_\text{mix}$ from $-0.0040$ to $0.080$ in units of $\texttt{GeV} \, {}^6$. The range produced from the systematic uncertainty is comparable. Summary {#s:summy} ======= Above we have investigated various extrapolations necessary to connect lattice QCD data for meson form factors at small momentum transfer to the physical meson charge radii. We find that while volume effects are sizable at the physical pion mass, they are negligible for $m_\pi \sim 250$ - $350 \, \texttt{MeV}$ in current lattice volumes. Provided the minimum lattice momentum $q_\text{min} \lesssim 300 \, \texttt{MeV}$, there is no need for a momentum extrapolation: the small $q^2$-dependence predicted from chiral perturbation theory is very linear. The corrections to this linearity arise from next-to-next-to-leading order contributions in the chiral expansion. At these pion masses and momenta, we thus conclude that systematic error is dominated by higher-order terms in the chiral expansion: $\sim 10\%$ from corrections that scale generically as $m_\pi^2 / \L_\chi^2$, and $\sim 20\%$ from terms of order $q^2/\L_\chi^2$ with $q^2 = q^2_{\text{min}}$ of [@Bonnet:2004fr]. For the mixed action data in [@Bonnet:2004fr], there are additional errors from lattice spacing artifacts. Demanding that their data be described within the effective field theory, we are able to estimate the low-energy constant $C_\text{mix}$ that parametrizes the explicit breaking of the mixed action symmetry \[$SU(6|3) \to SU(3|3) \otimes SU(3)$\] at $\cO(a^2)$. We obtained a rough value $C_\text{mix} \approx 0.006 \, \texttt{GeV}\,{}^6$, where there is sizable error in this value arising from the statistical error in the lattice data and systematic error due to neglecting of two-loop results (for both the quark mass and momentum dependence of the pion form factor). Because $C_\text{mix}$ enters the expression for the form factor through a logarithm, a small $\sim 10 \%$ statistical or systematic error in the lattice data results in a very large uncertainty for $C_\text{mix}$. Data at multiple lattice spacings or with varying quark mass would be ideal for a better determination of this low-energy constant. Nonetheless, the pion charge radius is a quantity that is sensitive to the fermion discretization, and can be used to understand the errors associated with the continuum extrapolation of mixed-action lattice data. The computation of meson form factors on the lattice is challenging. For the pion, however, the absence of operator self-contractions in the isospin limit [@Draper:1989bp], puts the charge radius in reach of current lattice technology. Further data at additional values of the valence quark mass and lattice spacing will thus allow one to predict the pion charge radius at about the $\sim 10$–$20\%$ level or better, without any model assumptions. We would like to thank A. Walker-Loud for initial involvement, and R. Lewis for providing the lattice data from [@Bonnet:2004fr]. B.C.T. acknowledges the Institute for Nuclear Theory at the University of Washington for hospitality and partial support during the completion of this work. This work is supported in part by the U.S. Department of Energy under Grant No. DE-FG02-05ER41368-0. [^1]: Here $p \sim m_\pi$ where $p$ is an external momentum. [^2]: At one loop, we can see explicitly that the independence from sea quark charges arises from cancellations between isospin degenerate loop mesons. Away from the isospin limit the sea charges remain, e.g., in non-degenerate $SU(4|2)$ the non-vanishing loop coefficients for the $\pi^+$ are: $A^{\pi^+}_{ju} = q_u - q_j$, $A^{\pi^+}_{lu} = q_u - q_l$, $A^{\pi^+}_{jd} = -(q_d - q_j)$, and $A^{\pi^+}_{ld} = -( q_d - q_l)$. [^3]: As with the proof in [@Draper:1989bp], our argument holds for charged $SU(2)$ mesons of arbitrary spin and parity in the isospin limit, e.g. one can use the charge conjugation invariance of the $\rho^0$ to establish that the form factor of the $\rho^+$ is independent of the charges of the sea. [^4]: Indeed the argument presented in [@Draper:1989bp] only applies for mesons consisting of degenerate flavors. In the non-degenerate case, the argument reduces to a demonstration that the sum of operator self-contractions in the meson and its charge conjugate vanish. [^5]: We do this only for simplicity. The form factors can be extracted from any component of the current, and this is the one commonly chosen in lattice QCD simulations. The volume effects from extracting form factors from the spatial components can similarly be calculated.
Brock Tennyson of Howell, Colin Duffy of Pinckney and Nic Hoffman of Hartland were near the top of the leaderboard at the KLAA Association golf tournament. They came away confident heading into regionals next Thursday. Bill Khan Nic Hoffman shot 74, tying for third individually, to lead Hartland to the title in the KLAA Association golf tournament on May 23, 2017 at Bay Pointe Golf Club.(Photo: Bill Khan) "I've known he can do it for a while," Pinckney coach Bruce Rabbitt said. "His older brother (Patrick) played four years for me. They live and breathe golf. I knew he had it in him. It was just a confidence thing. Hopefully, this will be the start for him." Colin Duffy(Photo: Bill Khan) It was a huge improvement after tying for 16th with an 84 in a smaller field at the 12-team Lakes Conference preseason tournament on April 17. "I had a couple bad rounds in my matches, but it's great to start closing out the season on a good note," Duffy said. "I'm looking forward to regionals and states and playing well throughout." Another Livingston County golfer who had a season-best round near the top of the leaderboard was Howell's Brock Tennyson. Tennyson shot 74 to tie Hartland's Nic Hoffman for third place. Tennyson's best round before Tuesday was 79. "I've been frustrated quite a bit this season," he said. "I played really well last year. For the results not to come, it was a little frustrating at the beginning, but it's golf." Hartland prevailed in a three-way tie with Howell and Grand Bland on the basis of No. 5 golfer Blake Rose's 83. Howell was second and Grand Blanc third. Hartland has won the KLAA title two of the last three years, finishing second the other two years that the league held an association tournament. "Goodness, that's incredibly close, isn't it?" Hartland coach Nathan Oake said. "It just shows the importance of every shot from every player on the course. We preach that all year and we preach, 'Never say quit.' This is exactly why." A year ago, Hartland was on the wrong end of a tiebreaker for the third and final state-qualifying berth at regionals. Hartland will host the Division 1 regional at Dunham Hills Golf Club on June 1. "You've got to fight for every shot," Hoffman said. "Every shot matters. One stroke can be the difference between you going through or going home."
. -3 Solve 0 = 247*n - 259*n + 69 + 63 for n. 11 Solve 0 = 316*u - 51*u - 3710 for u. 14 Solve -3*c - 4963 = -4996 for c. 11 Solve -35*b + 527*b = -10824 for b. -22 Solve -340*l + 37 + 56 = -309*l for l. 3 Solve -68 = 58*q - 310 - 222 for q. 8 Solve -3554 = -148*r - 150 for r. 23 Solve 252*m = 24*m + 1824 for m. 8 Solve -2243 - 1964 = 120*w - 1687 for w. -21 Solve -295*a - 155 = 3975 for a. -14 Solve 296 = -15688*g + 15614*g for g. -4 Solve 9*u + 1067 - 1166 = 0 for u. 11 Solve 50*h = 58*h - 30 + 102 for h. -9 Solve -6973 = 465*l + 3722 for l. -23 Solve 24*s + 72350 = 72782 for s. 18 Solve -117*a = -1128 - 159 for a. 11 Solve 163*l + 18 = 181 for l. 1 Solve -8*v = 21*v - 13*v - 400 for v. 25 Solve 2554*l + 46 = 2578*l + 382 for l. -14 Solve -31*c - 2533 = -168*c + 1029 for c. 26 Solve -11726*r + 11725*r + 13 = 0 for r. 13 Solve 24*z + 35*z = 40*z - 133 for z. -7 Solve -67*h - 1386 = 59*h for h. -11 Solve 9*v = 38*v + 1404 - 795 for v. -21 Solve -2440*x + 15059 = -2847*x for x. -37 Solve -75*j - 19*j - 4*j - 686 = 0 for j. -7 Solve -180*c = 16*c + 98*c - 2352 for c. 8 Solve -152656*u = -152633*u + 69 for u. -3 Solve -81*v - 34*v - 2400 = -15*v for v. -24 Solve 373*a + 3623 + 3464 = 0 for a. -19 Solve 0 = -39*a + 59162 - 57992 for a. 30 Solve 697*d + 6572 = 1732 - 2827 for d. -11 Solve 46*u - 100*u - 63 = -33*u for u. -3 Solve 246*j + 16 = 244*j for j. -8 Solve -342*a + 20289 = 5925 for a. 42 Solve 206*c = -875 + 3965 for c. 15 Solve -164*d - 12458 = -11638 for d. -5 Solve 67*g - 3*g + 768 = 0 for g. -12 Solve 690 = -24*q - 78*q - 2370 for q. -30 Solve 581*y = 584*y + 24 for y. -8 Solve 455*u = -250*u - 22560 for u. -32 Solve 295*u + 2011 + 1529 = 0 for u. -12 Solve -121*i + 230*i - 183*i = -1702 for i. 23 Solve -613 + 203 = -82*z for z. 5 Solve -56*s - 400 - 48 = 0 for s. -8 Solve 6*j - 63*j = 745*j - 21654 for j. 27 Solve 2036 + 6024 = -310*y for y. -26 Solve 690*m - 14731 = -3691 for m. 16 Solve 153*z + 146*z - 273*z + 676 = 0 for z. -26 Solve 24*o + 52 = 31 - 435 for o. -19 Solve -16 + 38 = -19*h - 73 for h. -5 Solve -w + 14*w = w + 36 for w. 3 Solve 14*y - 36*y + 154 = -11*y for y. 14 Solve -155*k + 16 = -149*k - 32 for k. 8 Solve -196*p - 185*p - 91*p + 10384 = 0 for p. 22 Solve 0 = -67*c - 14*c + 1352 - 4430 for c. -38 Solve 199 = 338*x - 107 - 32 for x. 1 Solve 120*k + 5 = -258*k + 5 for k. 0 Solve 0 = -59*p + 43 + 16 for p. 1 Solve -297 + 59 = 32*b - 151*b for b. 2 Solve 48*h - 6896 = -178*h - 1698 for h. 23 Solve 37*z - 25*z + 18 = 6*z for z. -3 Solve -160*u + 13020 = -135*u + 440*u for u. 28 Solve 740 = -426*v - 557 - 407 for v. -4 Solve -61*n - 272 = -27*n for n. -8 Solve 7*f + 5*f = 2*f + 7*f for f. 0 Solve -6920 + 314 = -288*o + 306 for o. 24 Solve 155 = -10*h + 55 for h. -10 Solve -784*o + 9333 = 4530 - 10093 for o. 19 Solve -229*d + 69*d = -77*d - 76*d for d. 0 Solve -15*i + 11655 = 11490 for i. 11 Solve 0 = -124*t + 41*t + 913 for t. 11 Solve -1032 = 5*w - 1002 for w. -6 Solve -214298 = 27*g - 214433 for g. 5 Solve 0 = 44*q + 44*q - 1442 - 318 for q. 20 Solve 118*t + 105*t - 32*t = 3629 for t. 19 Solve 2*v + 7 - 3 = -12 for v. -8 Solve 0 = -79*j - 116*j - 71*j - 3990 for j. -15 Solve 0*f = -50*f - 5*f + 825 for f. 15 Solve -672*f - 13000 = -172*f for f. -26 Solve -6 = 33*z - 29 - 10 for z. 1 Solve 0 = -63*o - 236*o + 41*o - 3612 for o. -14 Solve 247*h - 167*h - 133*h - 1060 = 0 for h. -20 Solve 98 = 2*v + 96*v for v. 1 Solve 3362 = -304*d + 1310 - 3420 for d. -18 Solve -82 - 42 = 27*q + 119 for q. -9 Solve -43*q - 6989 = -7204 for q. 5 Solve 0 = 1981*b - 1872*b - 654 for b. 6 Solve -61*f - 49 - 176 = 80 for f. -5 Solve 9*i + 537 = 618 for i. 9 Solve 105*o = -380 + 25 - 170 for o. -5 Solve 323*f + 447 = -648 - 2458 for f. -11 Solve 0 = -133*h + 120*h + 26 for h. 2 Solve 0 = 7*i + 84 + 69 - 69 for i. -12 Solve 1258*r - 1539 = 1177*r for r. 19 Solve -1679*v - 18512 = -522*v for v. -16 Solve 3741 = 43*f + 892*f + 24311 for f. -22 Solve 2878 - 6926 = -253*c for c. 16 Solve -1448 = -93*m - 550 + 1241 for m. 23 Solve 15*j = -25*j + 440 for j. 11 Solve 7*q - 37 + 95 = -26 for q. -12 Solve 346 - 379 = -3*x for x. 11 Solve -33*n + 10*n - 26 = -10*n for n. -2 Solve 216*s = 183*s - 66 for s. -2 Solve 168*s - 786*s - 138*s = -18144 for s. 24 Solve -112*y - 203*y = -96*y + 876 for y. -4 Solve -25 = -x - 20 - 7 for x. -2 Solve 27*a + 25 = 67 + 309 for a. 13 Solve 10*p + 0*p - 8*p = 0 for p. 0 Solve 45*m = 98*m - 45*m - 88 for m. 11 Solve 40*i - 22*i + 358 + 2 = 0 for i. -20 Solve -51 - 14 = -2*i - 33 for i. 16 Solve 19228*p = 19227*p - 2 for p. -2 Solve -4563 = -5*n - 4553 for n. 2 Solve -5*i + 440 = 20*i + 19*i for i. 10 Solve 75*i + 36*i - 1443 = 777 for i. 20 Solve -464*w + 30 = -455*w - 6 for w. 4 Solve 0 = -50*u - 1455 + 2505 for u. 21 Solve 149*i + 818 = 58*i + 2092 for i. 14 Solve -362 = -13*a - 505 for a. -11 Solve 8237*q + 949 = 8310*q for q. 13 Solve 438 + 159 = -112*z - 187 for z. -7 Solve -340*f + 9903 = 370 + 1033 for f. 25 Solve -170*t = -202*t + 256 for t. 8 Solve 26 - 3749 = 18*z + 201*z for z. -17 Solve -8*v + 17 = -29 + 6 for v. 5 Solve -13161*s + 238 = -13144*s for s. 14 Solve 23*p + 129 = 66*p for p. 3 Solve -55*i = -9*i + 502 - 180 for i. -7 Solve 0 = -152*u + 158*u + 36 for u. -6 Solve -464 = -1509*g + 1567*g for g. -8 Solve 467 = 142*n - 785 - 26 for n. 9 Solve -88*v = 789 + 51 - 48 for v. -9 Solve -1168 - 1723 + 798 = -161*c for c. 13 Solve -2*d + 176 - 92 = -8*d for d. -14 Solve -1473*b + 1500*b - 9 = 18 for b. 1 Solve 18 = -48*h + 20 + 46 for h. 1 Solve 2*b - 76 + 27 = -33 for b. 8 Solve -52*r - 19 + 539 = 0 for r. 10 Solve 128*v - 392 = -26*v + 224 for v. 4 Solve -196 - 83 + 94 = -37*d for d. 5 Solve -549 + 328 = -45*i + 769 for i. 22 Solve -8602*i - 1635 = -8493*i for i. -15 Solve 6*c - 135 + 38 = 23 for c. 20 Solve -63692 = 35*m - 12*m - 63991 for m. 13 Solve -31*l - 30 - 5 = -4 for l. -1 Solve -229*n = 5732 + 222 for n. -26 Solve 61175*q = 61162*q - 169 for q. -13 Solve -2 + 2 = -85*o + 75*o for o. 0 Solve 0 = 10*j + 4247 - 4087 for j. -16 Solve 413*l + 79*l + 26*l = 1554 for l. 3 Solve 4080 = 14*x + 3982 for x. 7 Solve -47246 = -8*l - 47366 for l. -15 Solve -1260*z = -1073*z + 3179 for z. -17 Solve 0 = 14*y + 127 - 29 for y. -7 Solve 165*f + 1107 = 288*f for f. 9 Solve 112*x - 560 = 182*x for x. -8 Solve 95*g = 102*g - 77 for g. 11 Solve 66*u - 167*u + 2323 = 0 for u. 23 Solve -1084 = -152*o - 20 for o. 7 Solve 128*t = -3040 - 544 for t. -28 Solve 0 = -415*i + 539*i + 1736 for i. -14 Solve -21*m + 13 - 93 = 25 for m. -5 Solve 15*g + 16663 - 16213 = 0 for g. -30 Solve -158888 + 159131 = 27*v for v. 9 Solve 36*c + 0*c - 224 = -764 for c. -15 Solve -2*q + 104 = 9*q + 49 for q. 5 Solve 0 = -175*t + 1945 - 112 + 267 for t. 12 Solve -103*n - 563 = -526 - 2303 for n. 22 Solve -35*n = -7591 + 8396 for n. -23 Solve -4*m + 9 + 111 = -64*m for m. -2 Solve -864 = -37*g - 20*g - 51*g for g. 8 Solve 55*d + 234 = -60*d + 89*d for d. -9 Solve -135*b = 153*b - 88*b + 800 for b. -4 Solve -91*k + 733 = -249*k - 215 for k. -6 Solve 275*o = -9072 + 272 for o. -32 Solve 16*z = -371 + 547 for z. 11 Solve 2000*y = 1952*y - 480 for y. -10 Solve 6270 = -584*s - 13*s + 27*s for s. -11 Solve 4716 = -314*m - 936 for m. -18 Solve 329 = -192*m - 387 - 628 for m. -7 Solve 348 + 162 + 1085 = 55*u for u. 29 Solve -4*j - 7*j + 44 = 0 for j. 4 Solve 320 - 655 = -123*l + 772 for l. 9 Solve 0 = -28*g + 13*g + 101 - 386 for g. -19 Solve 142*b - 26*b + 273 = 77*b for b. -7 Solve -1713*i + 1649*i + 256 = 0 for i. 4 Solve -344 + 866 + 941 = -77*l for l. -19 Solve 26*z - 342 = -56 for z. 11 Solve -15159*o - 132 = -15137*o for o. -6 Solve 134*t - 2453 = 250*t + 795 for t. -28 Solve 193 = 25*q - 107 for q. 12 Solve 4 + 9 + 15 = 7*z for z. 4 Solve -18 - 21 = i - 45 for i. 6 Solve -3009 = 170*f + 112*f + 1785 for f. -17 Solve -73*f - 19*f = -8*f - 168 for f. 2 Solve 93*f - 19*f - 576 = -22*f for f. 6 Solve 497*c + 490 = 532*c for c. 14 Solve -3359*j = -3277*j - 1640 for j. 20 Solve -612 = 293315*p - 293281*p for p. -18 Solve 22*q + 67 = 353 for q. 13 Solve -14*t + 263 = -312 + 407 for t. 12 Solve -328 - 772 = 275*z for z. -4 Solve -89991 = -21*y - 90201 for y. -10 Solve 174 + 53 - 11 = 18*b for b. 12 Solve 0 = -25*x + 7119 - 7769 for x. -26 Solve -71*m +
Chad Bond Chad Bond (born 20 April 1987) is a Welsh footballer. He is a former Wales under-19 international and has also represented his country at semi-professional level. Career Born in Neath, Bond started his career with Swansea City and spent time on loan at Conference South side Newport County. He made his professional debut for Swansea in a 4–0 win over Rushden & Diamonds in the Football League Trophy on 22 November 2005, but was released by manager Kenny Jackett in 2005. He joined Port Talbot Town in the Welsh Premier League. Following the appointment of former Swansea player Roberto Martínez as manager, Bond was handed a trial at Swansea in a pre-season friendly against Hamilton in which he came off the bench to score twice. His performance convinced Martinez to hand him a one-year deal to return to the Liberty Stadium. In early 2008 he was loaned out to Spanish side CF Balaguer and during the summer of 2008 was involved in first-team preparations for the Championship, which included a few appearances on the club's tour of Spain. On 22 August 2009, Bond made his league debut for Swansea when he started in a 1–0 win over Coventry City. He also went out on loan to Swedish team Östersunds FK. Prior to the start of the 2010–11 season, Bond spent time on trial with Newport County before eventually joining Neath on 5 August 2010. He left the club in June 2011 and joined Llanelli the following month before joining Afan Lido on loan in January 2012. In February 2012 he cut short his loan period at Lido and his contract with Llanelli was terminated by mutual consent. Bond had been on trial in January 2012 with Los Angeles Blues of the USL Professional Division and on leaving Llanelli, his former club reported he was leaving to join the LA Blues having secured a playing contract with the US club. In March 2012 the deal was confirmed by his new club. He then returned home to Wales at the end of the season and joined Port Talbot Town, where he found success. On 20 March 2014, Bond signed for new USL Pro League team Sacramento Republic. Bond cancelled his contract with Sacramento Republic in August 2014, and signed with Port Talbot Town for the third time. Bond returned to the United States in March 2015, signing with Tulsa Roughnecks. He recorded 8 assists in 24 appearances for the club. On 7 January 2016, USL club Saint Louis FC announced that they had signed Bond for the 2016 season. Bond played the 2017 season with USL side OKC Energy FC, but was released at the end of the season. References External links Category:1987 births Category:Living people Category:Footballers from Swansea Category:Association football forwards Category:Expatriate footballers in Spain Category:Expatriate footballers in Sweden Category:Expatriate soccer players in the United States Category:English Football League players Category:Cymru Premier players Category:USL Championship players Category:Welsh footballers Category:Wales semi-pro international footballers Category:Wales youth international footballers Category:Afan Lido F.C. players Category:CF Balaguer footballers Category:Llanelli Town A.F.C. players Category:Neath F.C. players Category:Newport County A.F.C. players Category:Östersunds FK players Category:Port Talbot Town F.C. players Category:FC Tulsa players Category:Swansea City A.F.C. players Category:Orange County SC players Category:Sacramento Republic FC players Category:Saint Louis FC players Category:OKC Energy FC players Category:Welsh expatriate footballers Category:Welsh expatriate sportspeople in Spain Category:Welsh expatriate sportspeople in the United States
-3*l**2/4 - 15633*l/2 - 81463563/4 = 0? -5211 Factor 10*t**3 - 132*t**2 + 254*t - 132. 2*(t - 11)*(t - 1)*(5*t - 6) What is c in c**3/3 - 4*c**2 + 13*c - 28/3 = 0? 1, 4, 7 Let 2*s**3 - 23316*s**2 + 90605976*s - 117364940912 = 0. Calculate s. 3886 Suppose -m**2/6 - 395*m/6 - 131 = 0. What is m? -393, -2 What is l in 2*l**2/15 - 4*l + 30 = 0? 15 Factor -4*n**2 + 41336*n - 106791556. -4*(n - 5167)**2 Let -2*o**5/5 + 16*o**4/5 - 46*o**3/5 + 56*o**2/5 - 24*o/5 = 0. Calculate o. 0, 1, 2, 3 What is p in 5*p**2 - 1030*p + 53045 = 0? 103 Determine g, given that 9*g**4 - 24*g**3 - 93*g**2 - 60*g = 0. -4/3, -1, 0, 5 Factor 2*b**4/13 + 16*b**3/13 + 14*b**2/13. 2*b**2*(b + 1)*(b + 7)/13 Suppose -4374*s**5/7 - 47304*s**4/7 - 75462*s**3/7 - 5236*s**2 - 4264*s/7 - 144/7 = 0. Calculate s. -9, -1, -2/3, -2/27 Factor -2*s**4/3 - 380*s**3/9 - 896*s**2 - 6468*s - 2058. -2*(s + 21)**3*(3*s + 1)/9 Suppose 2*t**4/7 - 72*t**3/7 + 10*t**2 = 0. What is t? 0, 1, 35 Factor -4*u**2/5 - 568*u/5 + 2336/5. -4*(u - 4)*(u + 146)/5 Suppose -4*h**5 + 24*h**4 - 44*h**3 + 24*h**2 = 0. What is h? 0, 1, 2, 3 Let -4*p**5 - 148*p**4 - 1872*p**3 - 8640*p**2 - 6912*p = 0. Calculate p. -12, -1, 0 Factor -4*c**2 + 59*c - 42. -(c - 14)*(4*c - 3) Let 2*q**2/7 - 8*q + 54/7 = 0. Calculate q. 1, 27 Suppose 2*u**5/7 - 6*u**4/7 - 12*u**3/7 + 16*u**2/7 = 0. What is u? -2, 0, 1, 4 Factor 2*q**3/7 - 16*q**2/7 + 10*q/7 + 4. 2*(q - 7)*(q - 2)*(q + 1)/7 Factor -2*c**3/15 + 114*c**2/5. -2*c**2*(c - 171)/15 Let -2*n**4 - 16*n**3 - 40*n**2 - 32*n = 0. What is n? -4, -2, 0 Determine z, given that -2*z**4/9 - 16*z**3/9 + 26*z**2/9 + 64*z/9 - 8 = 0. -9, -2, 1, 2 Suppose r**4 - 27*r**3 - r**2 + 27*r = 0. Calculate r. -1, 0, 1, 27 Suppose 3*r**5/4 + 45*r**4/4 + 45*r**3 + 15*r**2 - 72*r = 0. What is r? -8, -6, -2, 0, 1 Factor 3*g**2/2 + 1725*g/2 - 3474. 3*(g - 4)*(g + 579)/2 Solve 4*w**3 - 16*w**2 - 28*w + 40 = 0. -2, 1, 5 Factor -2*l**3/9 - 38*l**2/3 + 884*l/9 - 256/3. -2*(l - 6)*(l - 1)*(l + 64)/9 Let 3*c**5 + 45*c**4 - 99*c**3 + 51*c**2 = 0. Calculate c. -17, 0, 1 Determine m, given that -196*m**5/5 + 252*m**4 - 1976*m**3/5 + 112*m**2/5 + 672*m/5 + 128/5 = 0. -2/7, 1, 2, 4 Factor -p**4 + 2*p**3 + p**2 - 2*p. -p*(p - 2)*(p - 1)*(p + 1) Let -o**5/2 - 19*o**4/2 - 91*o**3/2 - 181*o**2/2 - 80*o - 26 = 0. Calculate o. -13, -2, -1 Factor -o**3/10 + o**2/2 + 16*o/5 + 18/5. -(o - 9)*(o + 2)**2/10 Factor -2*u**3/7 + 78*u**2/7 + 162*u/7 + 82/7. -2*(u - 41)*(u + 1)**2/7 Solve -3*j**2/2 - 369*j/2 - 183 = 0 for j. -122, -1 Factor r**3 - 53*r**2 + 50*r + 104. (r - 52)*(r - 2)*(r + 1) Let m**5/3 + 23*m**4/3 + 160*m**3/3 + 296*m**2/3 - 80*m/3 - 400/3 = 0. Calculate m. -10, -2, 1 Find m, given that -3*m**4/5 + 6*m**3/5 + 111*m**2/5 - 474*m/5 + 504/5 = 0. -7, 2, 3, 4 Determine f so that 2*f**5/5 + 198*f**4/5 - 404*f**3/5 + 4*f**2/5 + 402*f/5 - 202/5 = 0. -101, -1, 1 What is y in 2*y**4/5 - 4*y**3/5 - 14*y**2/5 + 8*y - 24/5 = 0? -3, 1, 2 Factor -4*t**3 + 1092*t - 1088. -4*(t - 16)*(t - 1)*(t + 17) Find h such that -2*h**2 + 28*h - 66 = 0. 3, 11 Factor j**5 - 10*j**4 - 2*j**3 + 20*j**2 + j - 10. (j - 10)*(j - 1)**2*(j + 1)**2 Factor k**2/10 - 19*k. k*(k - 190)/10 Find k such that 474*k**2/7 - 170*k/7 + 4/7 = 0. 2/79, 1/3 Let 8*q**3 + 12*q**2 - 12*q - 8 = 0. Calculate q. -2, -1/2, 1 Solve 5*o**4 + 10*o**3 - 5*o**2 - 10*o = 0 for o. -2, -1, 0, 1 Find t, given that -t**2/4 - 5*t/4 + 3/2 = 0. -6, 1 What is h in -2*h**4/5 - 2*h**3 - 4*h**2/5 + 16*h/5 = 0? -4, -2, 0, 1 Factor -5*i**4/3 - 480*i**3 - 100760*i**2/3 + 140160*i - 426320/3. -5*(i - 2)**2*(i + 146)**2/3 Factor 3*m**3 - 90*m**2 + 756*m - 1176. 3*(m - 14)**2*(m - 2) Let 2*k**2/7 + 8*k - 58/7 = 0. What is k? -29, 1 Factor -26*i**2/17 + 222*i/17 - 432/17. -2*(i - 3)*(13*i - 72)/17 Find f such that -f**5/9 + f**4/3 + f**3 + 5*f**2/9 = 0. -1, 0, 5 Factor -q**4/6 + 13*q**2/6 + 2*q. -q*(q - 4)*(q + 1)*(q + 3)/6 Factor -2*g**2 + 74*g - 572. -2*(g - 26)*(g - 11) Factor p**2/5 + 453*p/5 - 454/5. (p - 1)*(p + 454)/5 Suppose 2*b**2/7 - 18*b/7 - 20/7 = 0. Calculate b. -1, 10 Suppose -2*r**5 + 20*r**4 + 222*r**3 - 496*r**2 + 256*r = 0. Calculate r. -8, 0, 1, 16 Suppose -2*c**2/7 + 120*c/7 - 1800/7 = 0. Calculate c. 30 Factor 93*b**2 + 1680*b + 108. 3*(b + 18)*(31*b + 2) What is k in -5*k**4 - 70*k**3 - 160*k**2 + 640*k = 0? -8, 0, 2 Let -4*x**2/5 - 132*x/5 + 592/5 = 0. Calculate x. -37, 4 Factor -g**3/4 - 7*g**2/4 - 5*g/2. -g*(g + 2)*(g + 5)/4 Factor 5*n**2 - 60*n + 135. 5*(n - 9)*(n - 3) Find v such that 12*v**3 + 44*v**2 - 16*v = 0. -4, 0, 1/3 Let -2*c**4 - 38*c**3 + 24*c**2 + 3168*c + 10368 = 0. Calculate c. -12, -4, 9 Factor 2*s**4/11 + 2*s**3/11 - 2*s**2/11 - 2*s/11. 2*s*(s - 1)*(s + 1)**2/11 Factor 5*f**4 + 120*f**3 + 225*f**2 + 110*f. 5*f*(f + 1)**2*(f + 22) Let -h**3/2 + 15*h**2/2 + 26*h + 18 = 0. What is h? -2, -1, 18 Find n such that -518*n**2/5 + 516*n/5 + 2/5 = 0. -1/259, 1 Factor -c**2 + 120*c - 119. -(c - 119)*(c - 1) What is m in -2*m**5/9 - 140*m**4/3 + 856*m**3/3 - 5168*m**2/9 + 384*m = 0? -216, 0, 2 Determine b, given that -64*b**3 + 1936*b**2 - 11513*b + 19343 = 0. 29/8, 23 Factor -4*z**5 + 12*z**4 + 36*z**3 - 108*z**2. -4*z**2*(z - 3)**2*(z + 3) Let 3*p**2 + 2888*p - 963 = 0. Calculate p. -963, 1/3 Find x such that x**4/2 + 3*x**3 - 23*x**2/2 - 30*x - 16 = 0. -8, -1, 4 Let -b**3 + 8*b**2 + 9*b = 0. What is b? -1, 0, 9 Factor -1047*y**4 - 3123*y**3 - 3087*y**2 - 993*y + 18. -3*(y + 1)**3*(349*y - 6) Determine b so that -2*b**4 - 58*b**3 + 746*b**2 - 1310*b + 624 = 0. -39, 1, 8 Determine c, given that -105*c**4/2 + 5157*c**3/2 + 2337*c**2 - 594*c - 300 = 0. -1, -2/7, 2/5, 50 Factor -3*d**2/5 + 96*d/5 - 93/5. -3*(d - 31)*(d - 1)/5 Determine n so that n**3/2 + 123*n**2 + 10086*n + 275684 = 0. -82 Factor 3*i**2 + 99*i - 324. 3*(i - 3)*(i + 36) Factor 4*m**3/5 + 1384*m**2/5 - 2784*m/5. 4*m*(m - 2)*(m + 348)/5 Factor -p**3/2 - 12*p**2 + 79*p/2 - 27. -(p - 2)*(p - 1)*(p + 27)/2 Factor z**3/4 - 39*z/4 + 35/2. (z - 5)*(z - 2)*(z + 7)/4 Factor 4*j**2 + 384*j + 3740. 4*(j + 11)*(j + 85) Find b such that 4*b**5 - 64*b**4/5 + 72*b**3/5 - 32*b**2/5 + 4*b/5 = 0. 0, 1/5, 1 Factor b**4 + 4*b**3 - 3*b**2 - 10*b + 8. (b - 1)**2*(b + 2)*(b + 4) Solve 2*k**4/9 + 14*k**3/3 - 2*k**2/9 - 14*k/3 = 0 for k. -21, -1, 0, 1 Determine j so that -2*j**2/7 - 244*j/7 - 7442/7 = 0. -61 Determine t so that -5*t**2 - 5*t + 60 = 0. -4, 3 Determine r, given that 1280*r**5 - 118560*r**4 + 2781645*r**3 - 1652825*r**2 - 916320*r - 95220 = 0. -3/16, 1, 46 Find k, given that -3*k**5 - 24*k**4 - 18*k**3 + 120*k**2 - 75*k = 0. -5, 0, 1 Factor -k**2/6 - 11*k/2. -k*(k + 33)/6 Factor 2*j**3/11 - 324*j**2/11. 2*j**2*(j - 162)/11 Factor -5*z**2 - 655*z + 1330. -5*(z - 2)*(z + 133) Let 2*z**2/7 + 30*z/7 - 32/7 = 0. What is z? -16, 1 Factor -2*g**3/15 + 4*g**2/5 - 16*g/15. -2*g*(g - 4)*(g - 2)/15 Suppose 48*u**3 + 408*u**2 + 867*u = 0. What is u? -17/4, 0 Suppose -3*d**4 + 2571*d**3 - 736155*d**2 + 70909425*d - 138894750 = 0. Calculate d. 2, 285 Factor -2*t**2/7 + 68*t/7 + 990/7. -2*(t - 45)*(t + 11)/7 Let -n**2/2 + 12*n + 26 = 0. Calculate n. -2, 26 Solve -8*d**2/21 - 74*d/21 = 0 for d. -37/4, 0 Solve -2*q**5/7 - 8*q**4/7 + 2*q**3/7 + 8*q**2/7 = 0 for q. -4, -1, 0, 1 What is v in 8*v**4 + 82*v**3/11 - 76*v**2/11 - 82*v/11 - 12/11 = 0? -1, -3/4, -2/11, 1 Factor -3*t**4/4 + 81*t**3/4 + 171*t**2/4 + 87*t/4. -3*t*(t - 29)*(t + 1)**2/4 Find h, given that -2*h**4/3 + 26*h**3/3 - 32*h**2 + 24*h = 0. 0, 1, 6 Factor -i**3 - 100*i**2 - 197*i - 98. -(i + 1)**2*(i + 98) Factor 3*o**4/4 + 15*o**3 + 237*o**2/4 + 45*o. 3*o*(o + 1)*(o + 4)*(o + 15)/4 Factor -3*i**2 - 1674*i + 1677. -3*(i - 1)*(i + 559) Factor p**3 - 58*p**2 + 57*p. p*(p - 57)*(p - 1) Factor 180*x**2 + 420*x + 245. 5*(6*x + 7)**2 Factor -4*z**3 + 4*z. -4*z*(z - 1)*(z + 1) Factor 2*o**3/11 + 24*o**2/11 + 42*o/11 + 20/11. 2*(o + 1)**2*(o + 10)/11 Factor -3*r**2 + 3*r. -3*r*(r - 1) Factor -p**5 + 6*p**4 - 5*p**3. -p**3*(p - 5)*(p - 1) Determine i so that 2*i**4/3 - 2*i**3 - 8*i**2/3 + 8*i = 0. -2, 0, 2, 3 Solve g**2/2 + 19*g/2 + 30 = 0. -15, -4 Factor -2*t**3/9 + 12*t**2 - 208*t/9. -2*t*(t - 52)*(t - 2)/9 Factor 2*i**5 + 30*i**4 + 28*i**3 - 1372*i**2 - 6174*i - 4802. 2*(i - 7)*(i + 1)*(i + 7)**3 Factor 58*l**2/13 - 56*l/13 - 2/13. 2*(l - 1)*(29*l + 1)/13 Find x, given
Q: Faster and more efficient alternative for Tunnelblick I have to use Tunnelblick (VPN) to be able to connect to a server, the problem is that Tunnelblick is very buggy and laggy and sometimes also causes wierd problems like overheating when the laptop is folded (it does not shut off). Or frequent crashes. Now I was wondering if there was a better alternative for doing so. Kind regards, Robbert A: I recently switched from Tunnelblick to Viscosity. Awesome, never gives me that laggy trouble, but it requires a license. A pretty good free option is OpenVPN but I have had login issues with it sometimes. Once you're logged in it's solid though.
class Sslsplit < Formula desc "Man-in-the-middle attacks against SSL encrypted network connections" homepage "https://www.roe.ch/SSLsplit" url "https://github.com/droe/sslsplit/archive/0.5.5.tar.gz" sha256 "3a6b9caa3552c9139ea5c9841d4bf24d47764f14b1b04b7aae7fa2697641080b" license "BSD-2-Clause" revision 1 head "https://github.com/droe/sslsplit.git", branch: "develop" bottle do cellar :any sha256 "a533ccfc4c05e2affcfa4c697c38d995239abfd1fe4c383ffaa1a8ed42a933e6" => :catalina sha256 "10534d989706ca1d29b7f1cbffc59ef07b02d0d755cb8aec5bdf9430c52769bb" => :mojave sha256 "4f7a3cb7333641658889a55830a69d0ac64cf93dca8a6de32052d4080f477058" => :high_sierra end depends_on "check" => :build depends_on "pkg-config" => :build depends_on "libevent" depends_on "libnet" depends_on "libpcap" depends_on "[email protected]" def install system "make" system "make", "install", "PREFIX=#{prefix}" end test do port = free_port cmd = "#{bin}/sslsplit -D http 0.0.0.0 #{port} www.roe.ch 80" output = pipe_output("(#{cmd} & PID=$! && sleep 3 ; kill $PID) 2>&1") assert_match "Starting main event loop", output end end
Iceland first country having a petition to boycott next year’s Eurovision More than 18,000 people have signed a petition calling for Iceland to boycott next year’s Eurovision Song Contest in Israel, citing human rights violations against Palestinian people, Euronews reports. The petition, started by developer Árni Steingrímur Sigurðsson, calls on national broadcaster RUV to withdraw Iceland from the contest. With more than 18,000 signatures by Wednesday afternoon, the petition argues that “in view of the human rights abuses of Israel against the Palestinian people, it is morally indefensible to engage in a glamorous event like the Eurovision.” Netta Barzilai won the contest at the weekend with the song “Toy”, giving Israel the right to host the event in 2019.
media / press you may also like: Experience Sonesta Family Haven at Sharm Club Sonesta Club Sharm El Sheikh has introduced a "Family Haven Package" from $45 per person per night based on double occupancy, and children under 12 stay free with parent. This rate is offered through July 31, 2007 and again September 1-30, 2007 and includes full breakfast and dinner daily as well as one complimentary lunch for the whole family. The Club features 3 freshwater swimming pools including a children's pool. Sonesta's Just Us Kids program and access to the beach are provided at the Sonesta Beach Resort in Sharm. Package rate includes: Breakfast and Dinner Buffet, per person, per night based on double occupancy Children up to 12 years old stay free of charge when sharing parents' room with the same meal plan (maximum 2 children per room) 1 Complimentary Lunch for the whole family per stay Service Charge and Taxes The Sonesta Club is a 409-room, 4-star resort located on famed Naama Bay, overlooking the South Sinai's desert and mountains. The property is only a 10-minute drive from Sharm El Sheikh International Airport and a 50-minute flight from Cairo. This traditional Nubian-style resort offers a two-story Nubian interior design surrounded by landscaping and pool area. Guest room amenities include balcony or roof terrace, individual climate control, television with digital satellite programming, mini-bar, hair dryer, in-room safe, and direct-dial telephone. Sonesta Club features 3 fresh-water swimming pools, dive center, Health Club with sauna, steam bath, Jacuzzi, fitness room and massage treatments. The Resort is also within walking distance of the center of Naama Bay's city market with traditional spice shops, local handicrafts and souvenir shops.
In April 2017 we had the privilege to do a spring bear hunt with the Absaroka-Beartooth Outfitters in Big Timber. Our two awesome and hardworking Wounded Warriors were Josh Beckett and Dean Murray. These two Warriors were excited to get this opportunity to bag their first bear. Before the week long hunting trip even started, Dean went out scouting with one of the guides to just see the huge abundance of elk in the hills and they drove right up on a gorgeous cinnamon sow crossing the road. Dean hopped out and positioned himself to get a shot on the bear before she spotted them. She did indeed spot them and scattered to a brush pile and stood up, but Dean was ready for her and made a great shot to drop her without a problem. With a very pleased guide and a very excited Warrior, they loaded up the bear to bring back to the lodge and tell their story. This was a great bear and tested to be very old. With one Warrior tagged out before the second Warrior even had shown up for the hunt, we were doing pretty good. Josh showed up and had all the work cut out for him, or so he thought. The very next day of hunting had a little surprise. There were over ten inches of snow and a cold weather front was forecasted to stay for his week of hunting. That didn’t stop Josh or his guide. For six straight days of 12-16 hours of walking and spotting in the cold wet winter weather, Josh never quit or gave up as not one bear had presented itself in this weather. On the last evening of the last day, just before dark, Josh headed into the Timber to walk down a hillside. Just at that moment, a quick flash of a big black bear ran out in front of Josh about 100 yards and stood up only presenting a partial face. With very little light, Josh pulled up and fired at the big black bear. The bear disappeared and we searched for any sign of a hit, but could not find anything and another storm was quickly moving in. The guide and Josh went another day looking for the bear but with several inches of fresh snow again, they could not find any sign that the bear was hit. Josh was disappointed but had an absolute amazing time and would not admit failure. It was a great trip that was one of the most challenging trips we have experienced but was well worth the experience to see these great Warriors thrive. Great job Josh and Dean, and a huge thank you to our outfitters.
Hi and thanks for visiting the best Ravens forum on the planet. You do not have to be a member to browse the various forums, but in order to post and interact with your purple brethren, you will have to **register**. It only takes a couple of minutes. You can also use your Facebook account to log in....just click on the blue 'FConnect' link at the very top of the page. Re: The Ravens approached the offense the wrong way. How do you not explain all the great performances he's had in a Ravens uniform then? I don't need to mention them all, like this year nearly all his home games have been amazing. We wouldn't be 6-2 if it wasn't for Joe Flacco, the defense has been awful in most the games this year. That's what I am saying. He has to be perfect to fit his passes into such a small window, over and over again. The room for error is too small. It should NOT be that way. We have Torrey Smith and Jacoby Jones on the outside, and Pitta and Boldin on the inside. Look at the Steelers just last week. Ben is getting his passes out quicker, by DESIGN AND YET, his receivers are running free...WHY IS THAT? Who is helping them get open? Are all the receivers in the league better than the Ravens' receivers? If Joe looked downfield and saw all his receivers open all over the place, his biggest decision would be WHICH ONE to throw to?! Instead...he looks downfield and sees every receiver wearing a DB for a jersey. Re: The Ravens approached the offense the wrong way. Originally Posted by Ravens44 That's what I am saying. He has to be perfect to fit his passes into such a small window, over and over again. The room for error is too small. It should NOT be that way. We have Torrey Smith and Jacoby Jones on the outside, and Pitta and Boldin on the inside. Look at the Steelers just last week. Ben is getting his passes out quicker, by DESIGN AND YET, his receivers are running free...WHY IS THAT? Who is helping them get open? Are all the receivers in the league better than the Ravens' receivers? If Joe looked downfield and saw all his receivers open all over the place, his biggest decision would be WHICH ONE to throw to?! Instead...he looks downfield and sees every receiver wearing a DB for a jersey. For a while we all wondered if guys not getting open was scheme or personnel. The Ravens WR personnel is fast enough and more than talented enough to get open. How much more evidence do we need to know its scheme? “A linebacker's job is to knock out running backs, to knock out receivers, to chase the football,” -Ray Lewis Re: The Ravens approached the offense the wrong way. Originally Posted by srobert96 flacco can't get the wrs separation. Until we have an oc that can modernize the scheme it does not matter who is the qb. Every ravens broadcast the announcers talk about the receivers not getting separation. The oline fails to progress under cam and moeller. That is not joe's fault. Birk is pushed back into his face on every passing plays. Lg doesnt pick up his block allowing guys to come untouched. The tackles barely slow down the better pass rushers. Flacco has the shortest time of any qb in the league to get off a pass. Last year in the playoffs the team could not run the ball. The running game was putrid. We could not pick up 3rd and 1s. This is a poorly coached offense. If i were flacco there is no way i would sign with the ravens if they retain cam. This team has coaching problems first and foremost. It is time to move on from the 60s and modernize. Re: The Ravens approached the offense the wrong way. I still cannot figure out why Cam doesn't adjust to the game either, that to me is even worse than his vanilla play calling in the passing game. Why did it take until the 4th quarter to adjust a game plan after the Browns started stacking the box and were stuffing our run game? Re: The Ravens approached the offense the wrong way. Originally Posted by Ravens44 That's what I am saying. He has to be perfect to fit his passes into such a small window, over and over again. The room for error is too small. It should NOT be that way. We have Torrey Smith and Jacoby Jones on the outside, and Pitta and Boldin on the inside. Look at the Steelers just last week. Ben is getting his passes out quicker, by DESIGN AND YET, his receivers are running free...WHY IS THAT? Who is helping them get open? Are all the receivers in the league better than the Ravens' receivers? If Joe looked downfield and saw all his receivers open all over the place, his biggest decision would be WHICH ONE to throw to?! Instead...he looks downfield and sees every receiver wearing a DB for a jersey. Yeah bro, watch tonight's TNF game for example. Watch how even a terrible team like Jacksonville can get separation so easily, not that Gabbert will hit them, because he is truly the definition of a below average QB. Then watch how well the colts will do it, they've had a lot of success recently with Andrew Luck, I just wish we had that luxury, it is far from a talent issue, it's so obviously a coaching issue! Nobody can tell me that Boldin who was an out and out pro bowl WR before coming here can never get separation because of a lack of talent, and the same for Torrey Smith who's one of the fastest receivers in the league. Aside from that, I hate the fact that Cam cannot adjust or plan a balanced gameplan more than I hate his lack of creativity with the offense. Re: The Ravens approached the offense the wrong way. Originally Posted by Ravenous1 For a while we all wondered if guys not getting open was scheme or personnel. The Ravens WR personnel is fast enough and more than talented enough to get open. How much more evidence do we need to know its scheme? Took the words straight out of my mouth, this is simply not a personell issue anymore. It was maybe excusable saying that when all of our receivers were pure possession (Heap, Mason, Boldin) receivers, that excuse cannot stand anymore. Re: The Ravens approached the offense the wrong way. Originally Posted by Ravenous1 For a while we all wondered if guys not getting open was scheme or personnel. The Ravens WR personnel is fast enough and more than talented enough to get open. How much more evidence do we need to know its scheme? Yes, the EXCUSE was that we had 4 old, slow receivers who couldn't get open. But I was on the thinking we had 4 veterans who knew how to play the game, but were constricted by the scheme. Going younger and faster hasn't changed anything. Now, there is no excuse for receivers not getting open. When our receiver physically outruns the coverage downfield and Flacco has enough time to throw AND the throw is right on the mark, a great play occurs. Pitta's strength turns out to be run a few yards downfield, turn out and catch the ball with his fingertips while a defender is literally ontop of him. The throw has to be perfect, the protection just long enough and with no Dlinemen jumping up and swatting it down because they are unblocked. Re: The Ravens approached the offense the wrong way. Originally Posted by leachisabeast I still cannot figure out why Cam doesn't adjust to the game either, that to me is even worse than his vanilla play calling in the passing game. Why did it take until the 4th quarter to adjust a game plan after the Browns started stacking the box and were stuffing our run game? Its just his DNA. Cam is the kinda of guy who just seems to believe that if the plan is not working and if the offense cannot execute his plays....well thats not his fault. A really good coach looks at it and says....what plays can these guys run, what plays feed to their strengths, what can I change to increase the odds they can execute. I have not seen that ability from Cam even week to week....why would anyone expect to see it within the context of a game situation. “A linebacker's job is to knock out running backs, to knock out receivers, to chase the football,” -Ray Lewis Re: The Ravens approached the offense the wrong way. Originally Posted by Ravens44 Yes, the EXCUSE was that we had 4 old, slow receivers who couldn't get open. But I was on the thinking we had 4 veterans who knew how to play the game, but were constricted by the scheme. Going younger and faster hasn't changed anything. Now, there is no excuse for receivers not getting open. When our receiver physically outruns the coverage downfield and Flacco has enough time to throw AND the throw is right on the mark, a great play occurs. Pitta's strength turns out to be run a few yards downfield, turn out and catch the ball with his fingertips while a defender is literally ontop of him. The throw has to be perfect, the protection just long enough and with no Dlinemen jumping up and swatting it down because they are unblocked. I tend to think that the problem is that by the time the routes Cam has these guys running lead to separation, Joe is either on his back or running for his life. How many screens do we see, how many slants. You have a weapon in Torrey Smith who if you hit in stride with a slant could potentially break it the way Wallace did against the NYG. That's a play you go to multiple times a game....not a few times a season. My biggest problem with Cam is that he does not adjust things to ensure that the ball gets into the hands of guys with a chance to make a play. Throwing down field to Torrey and hoping he outruns the opposing D or out jumps him is ok from time to time but not the sole or best utilization of a guy with is speed and ability to make guys miss. “A linebacker's job is to knock out running backs, to knock out receivers, to chase the football,” -Ray Lewis Re: The Ravens approached the offense the wrong way. Originally Posted by Ravenous1 I tend to think that the problem is that by the time the routes Cam has these guys running lead to separation, Joe is either on his back or running for his life. How many screens do we see, how many slants. You have a weapon in Torrey Smith who if you hit in stride with a slant could potentially break it the way Wallace did against the NYG. That's a play you go to multiple times a game....not a few times a season. My biggest problem with Cam is that he does not adjust things to ensure that the ball gets into the hands of guys with a chance to make a play. Throwing down field to Torrey and hoping he outruns the opposing D or out jumps him is ok from time to time but not the sole or best utilization of a guy with is speed and ability to make guys miss. I agree. Every single game is a fluid situation and one must act accordingly. This is what I see...Cam finds out the down and distance, looks at his sheet of plays that he has decided during the week will work in those specific situations. And he calls that in, no matter if it didn't work on 3rd and 2 the previous 5 times or not. There are assistant coaches upstairs, yes? What are they seeing and relaying to him? Does he ignore it? What exactly is going on that a coach refuses to adapt during a game where the opponent always is adapting to some extent? Running the same play over and over again when it is not working is beyond my comprehension. Re: The Ravens approached the offense the wrong way. Originally Posted by RavensNTerps For the life of me I've never seen an entire fanbase defend poor QB play nearly unanimously by blaming the OC. It is unfathomable! Jets fans did it with Sanchez. Although Walsh's system of offense can compensate for lack of talent; however, defense is a different story. According to Walsh, talent on defense was essential and could not be compensated for. What did Walsh do in 1981? He acquired physical and talented players on defense.
The provision of Bill C-42 that would give gun owners with expired licenses a 6-month grace period is finally set to come into force by November 30 More than two years after Bill C-42, known as the Common Sense Firearms Licensing Act, received royal assent and became law, a much-anticipated provision is finally coming into force on November 30. The provision gives gun owners with expired licenses a grace period in which they can renew their license without fear of being treated as a criminal. Under current laws, any person with an expired license may be charged with unauthorized possession of a firearm, a criminal offence that carries up to 5 years in prison if convicted. The grace period, which would last 6 months, will treat a recently-expired license simply as an administrative or paperwork issue and not a legal one. The federal government, however, still intends to repeal “certain provisions” of Bill C-42, something they have stated during their election platform prior to being elected. While they haven’t indicated precisely which provisions would go and which would stay, they have repeated on many occasions the provision that they say would allow gun owners to transport restricted and prohibited firearms without a permit – a glaringly false and misleading statement that is devoid of fact-based decision making they also claimed they would utilized, as opposed to the previous government’s “emotion-based” decisions.
Server Error The requested document or data could not be found. Details: Could not find product requested: 34259531 Click here to go back.
Travel :: Stock :: Photography :: Technology For the past two years I have been exploring all the peaks, ridges, summits and hills of the greater San Francisco Bay Area, hiking and photographing some of the amazing wildlands in the region (and some not-so-wild lands). We live in a part of the world surrounded by marvelous natural beauty and much of it has been preserved thanks to dedicated conservation efforts of so many people. Yet many of the people who live here are unaware of so many of the natural wonders that surround us. There are over 500 hills peaks ridges and mountains in the San Francisco Bay area. www.bayareapeaks.com is now live with an initial presentation of many of the summits with notes on photography, conservation efforts, hiking and history. Additional summits are being added on an ongoing basis. A book will follow with a wider selection of Bay Area peaks and more extensive text commentary. Even in the middle of the Bay Area it is amazing how easily one can get away from it all. One of the hidden gems of the Mid Peninsula Open Space District is this trail through the redwoods to the top of Bald Knob, a wooded summit off Tunitas Creek Road. When I visited I was keen to try out the new ‪#‎iPhone6‬ camera with improved closeups and better focus control. Using “The camera I have with me” is an important part of this project, but it’s always a help when the technology improves. So far I have not been disappointed. Of all the summits I think this was the quietest so far, no auto noise, no airplanes, not even any wind, just silence….. The vast Diablo range stretches south from the Bay Area between the Central Valley and the coastal ranges. On this 13-mile hike deep in the interior the land was rugged with little sign of human habitation, far from the main roads, ineffably quiet and spectacularly beautiful. These gnarled trees were high on a ridgetop and shrouded in fog as we approached. California seems at times a crowded metropolis, but in truth most of the state is wild land, sparsely occupied. I think it’s these wildernesses and forests that keep us sane. After a 4-mile hike up a dry forested trail, and another half hour of bushwhacking, I finally reached the obscure summit of peak 1380 on Inverness Ridge in Point Reyes National Seashore. There was no view at all, just trees, bushes and overgrown vegetation. On the way down however I crossed a stream (still running despite the drought) and found a lovely presentation of leaves and stones in a shaded dell. “Last summer, Albany resident David Sanger decided he wanted to find a new challenge — one that would combine his love of the outdoors, his joy upon discovering new places, his hiking and climbing skills and his talents as a photographer. He found it on the many peaks in the Bay Area, climbing as many as he can, as often as he can…….” In July 2014 I began a landscape photography project on summits, peaks and high points of the greater Bay Area. For 121 days between July and November I climbed at least one new peak every day, a total of 196 summits, over 650 miles and over 150,000 vertical feet. Rather than use my standard Nikon gear I decided to shoot with the camera at hand, my iPhone 6. It has been quite a challenge, without long lenses or ancillary lighting, relying only on composition and natural light. Since then I have continued to find new peaks, climbing several times a week, and the photo project has turned into a book project, tentatively titles “Bay Area Peaks” So far I have been posting images and some commentary on Instagram and Facebook. Now I’ll be reposting some of the best, plus new images here. The image above is morning above the South San Jose Valley. This lone oak is yet to get its leaves this year. I loved the green grass on the hills in the original images but decided the sepia filter emphasized the intricate form of the oak branches – form and light. Just outside the vineyard where my son lives with his wife and two kids is Okell Hill, a tall oak-covered grassy hill overlooking the vineyards of Wooden Valley near Fairfield. I have often wanted to climb it, so when we got the opportunity we all hiked up to the top in the late afternoon light. Little Samantha (2 1/2) ran ahead while William (9 months) rode in the backpack. The summit did not disappoint, with clear views as far as San Francisco Bay, and bright backlight on these California Oaks. This was from Day 90 of the consecutive peaks string. When I started this adventure I had no ideas I’d still be going strong after 90 consecutive days climbing peaks hills summits and high points in California. This hike was a return trip to Black Diamond Mines Regional Preserve in the East Bay to a small, unnamed peak called 919 above an old abandoned mine called Star Mine. It was a steep short scramble through brush and up grassy slopes once I left the trail, and then suddenly the top, with a late afternoon view north across the valley. On the way back I saw a lone coyote crossing the meadow. As I hastened back towards the parking lot while the hills glowed bronze in the deepening light.
Monthly Archives: October 2013 Is President Obama trying to destroy America from within? He refuses to approve funding for Veterans Death Benefits, medicine for kids with cancer and he is forcing a health care system that doesn’t work on the American people. God help … Continue reading →
Enhanced radioresponse of paclitaxel-sensitive and -resistant tumours in vivo. Paclitaxel is a potent chemotherapeutic drug and also has the potential to act as a radioenhancing agent. The latter is based on its ability to arrest cells in the radiosensitive G2M phases of the cell cycle; the weight of supporting evidence is derived mainly from in vitro studies. Our previous in vivo experiments identified enhanced tumour radioresponse predominantly attributable to tumour reoxygenation occurring as a result of paclitaxel-induced apoptosis. The current study investigated whether paclitaxel enhanced the radioresponse of tumours which are insensitive to apoptosis induction, but exhibited mitotic arrest, and compared the degree and kinetics of the response to that in tumours which develop apoptosis. The mouse mammary carcinoma MCa-29 (apoptosis sensitive) and the squamous cell carcinoma SCC-VII (apoptosis resistant) were used. In addition, the study investigated whether paclitaxel affected normal skin radioresponse to determine if a therapeutic gain could be achieved. Paclitaxel enhanced the radioresponse of both types of tumours. In the SCC-VII tumour, radiopotentiation occurred within 12 h of paclitaxel administration coincident with mitotic arrest, where enhancement factors (EFs) ranged from 1.15 to 1.37. In MCa-29 tumour, the effect was greater, EFs ranging from 1.59 to 1.91 and occurred between 24 and 72 h after paclitaxel when apoptosis was the predominant microscopic feature of treated tumours and when tumour oxygenation was found to be increased. The acute skin radioresponse and late leg contracture response were essentially unaffected by prior treatment with paclitaxel. Therefore, by two distinct mechanisms, paclitaxel was able to enhance the radioresponse of paclitaxel-sensitive and -resistant tumours, but not the normal tissue radioresponse, thus providing true therapeutic gain.
News On April 8-9, 2015, "The Challenges Facing the Arabic Language" conference was held at the Academy of the Arabic Language in Cairo, in collaboration with the International Institute of Islamic Thought- Cairo, Egypt.
/* ============================================================================== This file is part of the JUCE library. Copyright (c) 2017 - ROLI Ltd. JUCE is an open source library subject to commercial or open-source licensing. By using JUCE, you agree to the terms of both the JUCE 5 End-User License Agreement and JUCE 5 Privacy Policy (both updated and effective as of the 27th April 2017). End User License Agreement: www.juce.com/juce-5-licence Privacy Policy: www.juce.com/juce-5-privacy-policy Or: You may also use this code under the terms of the GPL v3 (see www.gnu.org/licenses). JUCE IS PROVIDED "AS IS" WITHOUT ANY WARRANTY, AND ALL WARRANTIES, WHETHER EXPRESSED OR IMPLIED, INCLUDING MERCHANTABILITY AND FITNESS FOR PURPOSE, ARE DISCLAIMED. ============================================================================== */ /******************************************************************************* The block below describes the properties of this module, and is read by the Projucer to automatically generate project code that uses it. For details about the syntax and how to create or use a module, see the JUCE Module Format.txt file. BEGIN_JUCE_MODULE_DECLARATION ID: juce_osc vendor: juce version: 5.0.2 name: JUCE OSC classes description: Open Sound Control implementation. website: http://www.juce.com/juce license: GPL/Commercial dependencies: juce_core, juce_events END_JUCE_MODULE_DECLARATION *******************************************************************************/ #pragma once #define JUCE_OSC_H_INCLUDED #include <juce_core/juce_core.h> #include <juce_events/juce_events.h> //============================================================================== namespace juce { #include "osc/juce_OSCTypes.h" #include "osc/juce_OSCTimeTag.h" #include "osc/juce_OSCArgument.h" #include "osc/juce_OSCAddress.h" #include "osc/juce_OSCMessage.h" #include "osc/juce_OSCBundle.h" #include "osc/juce_OSCReceiver.h" #include "osc/juce_OSCSender.h" }
Cor triatriatum dextrum simulating right ventricular myxoma and pulmonary stenosis. A case of enormous Chiari's network in a 7-year-old girl is described. It formed a parachute or spinnaker-like sack which moved freely into the pulmonary artery causing mild pulmonic stenosis. The preoperative diagnosis was believed to be myxoma of the right ventricle. The real condition was recognized during the operation. This is the seventh reported case of correction of so-called cor triatriatum dextrum.
29 Kan. App.2d 1089 (2001) 36 P.3d 839 STATE OF KANSAS, Appellee, v. CAGER J. SPATES, Appellant. No. 86,104. Court of Appeals of Kansas. Opinion filed December 14, 2001. Sandra Carr, assistant appellate defender, and Jessica R. Kunen, chief appellate defender, for appellant. Angela M. Wilson, assistant district attorney, Christine Kenney, district attorney, and Carla J. Stovall, attorney general, for appellee. Before GREEN, P.J., KNUDSON, J., and STEPHEN D. HILL, District Judge, assigned. GREEN, J.: Cager J. Spates was convicted of aggravated assault and was sentenced to 22 months in prison. On appeal, Spates contends that the trial court imposed an illegal sentence when it calculated his criminal history using a juvenile adjudication. We disagree and affirm. Spates was charged with attempted voluntary manslaughter and criminal possession of a firearm as a result of events which occurred on February 27, 2000. Under a plea agreement, Spates entered a guilty plea to the charge of aggravated assault under K.S.A. 21-3410(a), and the State dismissed the remaining charges. The trial court accepted Spates' guilty plea and found him guilty. A presentence investigation report showed Spates' criminal history included no adult convictions, but did include a juvenile adjudication for aggravated battery, a person felony. The juvenile adjudication was not decayed. At sentencing, Spates objected to his criminal history, arguing that the juvenile adjudication should not have been used in calculation of the criminal history score. The trial court found that under the Kansas Sentencing Guidelines Act (KSGA), K.S.A. 21-4701 *1090 et seq., aggravated assault was a severity level 7 offense, that Spates' criminal history score was D, and that the sentencing range for prison was 22, 24, and 26 months with presumptive imprisonment because a firearm was used in the commission of the felony. The trial court denied Spates' motion for a dispositional departure and sentenced him to the mitigated term of 22 months' imprisonment. Spates argues that the trial court erred in determining that his criminal history category was D. He insists that his juvenile adjudication should not have been included in his criminal history because it resulted from a proceeding in which he did not have the right to a jury trial. To support this argument, Spates relies upon Apprendi v. New Jersey, 530 U.S. 466, 147 L. Ed. 2d 435, 120 S. Ct. 2348 (2000). Spates contends his criminal history is category I and his presumptive sentence is 7 to 9 months' imprisonment under K.S.A. 2000 Supp. 21-4704(a). Whether a statute is unconstitutional is a question of law subject to unlimited review. State v. Heironimus, 262 Kan. 796, 802, 941 P.2d 1356 (1997). When a statute is challenged as unconstitutional, this court must search for a way to uphold the statute. State v. Gould, 271 Kan. 394, 405, 23 P.3d 801 (2001). Spates has not specified which statute he is challenging on constitutional grounds. The statute which requires the inclusion of juvenile adjudications in calculating a defendant's criminal history is K.S.A. 21-4710. The pertinent portion of the statute provides: "(a) Criminal history categories contained in the sentencing guidelines grid for nondrug crimes ... are based on the following types of prior convictions:... person felony juvenile adjudications, nonperson felony juvenile adjudications... person misdemeanor juvenile adjudications, nonperson class A misdemeanor juvenile adjudications [and] select class B nonperson misdemeanor juvenile adjudications...." Spates has not specifically articulated how this statute is unconstitutional except to cite Apprendi. We assume Spates is challenging K.S.A. 21-4710 upon the constitutional challenges raised in Apprendi. The issue in Apprendi was "whether the Due Process Clause of the Fourteenth Amendment requires that a factual determination authorizing an increase in the maximum prison sentence *1091 for an offense from 10 to 20 years be made by a jury on the basis of proof beyond a reasonable doubt." 530 U.S. at 469. Apprendi relied upon a juvenile case where the United States Supreme Court held that "`the Due Process Clause protects the accused against conviction except upon proof beyond a reasonable doubt of every fact necessary to constitute the crime with which [the accused] is charged.'" 530 U.S. at 477 (quoting In re Winship, 397 U.S. 358, 364, 25 L. Ed.2d 368, 90 S. Ct. 1068 [1970]). In Apprendi, a state statute authorized a prison term of 5 to 10 years for a second-degree offense of possession of a firearm for an unlawful purpose and a prison term of 3 to 5 years for a third-degree offense of possession of a firearm for an unlawful purpose. Another statute, described as a "hate crime" statute, provided for an increased prison term of 10 to 20 years if the trial judge found by a preponderance of the evidence that the crime was committed with the purpose to intimidate an individual or group because of race, color, gender, handicap, religion, sexual orientation, or ethnicity. Apprendi was charged with numerous offenses regarding several shootings and the unlawful possession of weapons. None of the offenses referred to the hate crime statute or alleged that he acted with a racially biased purpose. After Apprendi was arrested, he stated he did not want the African-American occupants of the house living in the white neighborhood. Under a plea agreement, Apprendi pleaded guilty to two counts of second-degree possession of a firearm for an unlawful purpose and one count of third-degree unlawful possession of an antipersonnel bomb. At sentencing, Apprendi argued the hate crime statute was unconstitutional because the finding of bias upon which the hate crime sentence was based must be proven to a jury beyond a reasonable doubt pursuant to Winship. After considering the evidence, the judge rejected Apprendi's constitutional challenge to the statute and concluded his actions were done for the purpose of intimidation and the hate crime statute applied. Apprendi was sentenced to a 12-year prison term on one of the second-degree offenses and to shorter concurrent sentences on the remaining two offenses. *1092 The United States Supreme Court noted that judges have long exercised discretion by taking into consideration various factors relating both to the offense and to the offender when imposing a sentence within the statutory limits of an individual case. 530 U.S. at 481. However, the principles of the right to a jury trial can be lost by erosion when a legislative scheme removes the jury from determining a fact that, if found to exist, exposes a defendant to a penalty exceeding the maximum which a defendant would have received if punished based on the facts reflected only in the jury verdict. 530 U.S. at 482-83. The Court held: "Other than the fact of a prior conviction, any fact that increases the penalty for a crime beyond the prescribed statutory maximum must be submitted to a jury, and proved beyond a reasonable doubt." 530 U.S. at 490. Our Supreme Court adopted the rationale of Apprendi in Gould, 271 Kan. at 411. Gould was convicted of three counts of child abuse, each a severity level 5 person felony. Because Gould had a criminal history score of I, the sentencing range was 31-32-34 months' imprisonment. The State moved for an upward departure because the victims were Gould's children, the abuse to the infant twins was severe, and Gould showed no emotion or remorse until her conviction. The trial court found the aggravating factors were substantial and compelling reasons, granted the motion, and sentenced Gould to two consecutive prison terms of 68 months on the offenses involving the twins and a concurrent prison term of 34 months on the offense involving the third child. Gould argued K.S.A. 2000 Supp. 21-4716 was flawed because it allowed for an upward departure based upon aggravating factors which were "facts, other than that of a prior conviction, not found by a jury beyond a reasonable doubt, [and] used to justify imposing a sentence beyond the statutory maximum for the underlying crime." 271 Kan. at 411. This argument mirrored the rationale in Apprendi. The Gould court determined the jury's verdict authorized a sentence of 31 to 34 months for each child abuse conviction and the two 68-month sentences exposed Gould to punishment greater than that authorized by the jury's verdict. It held the scheme for imposing upward departure sentences under K.S.A. 2000 Supp. *1093 21-4716 violated the due process and jury trial rights contained in the Sixth and Fourteenth Amendments to the United States Constitution and vacated Gould's sentence. 271 Kan. at 414. Clearly, the courts in Apprendi and Gould limited the requirement for a jury determination to facts other than a prior conviction and Spates' complaint involves only a prior conviction. However, Spates also relies upon language in Apprendi regarding a prior decision with the same issue involving recidivism. The Apprendi Court stated its decision in Almendarez-Torres v. United States, 523 U.S. 224, 140 L. Ed. 2d 350, 118 S. Ct. 1219 (1998), was "at best an exceptional departure from the historical practice that we have described." 530 U.S. at 487. In Almendarez-Torres, under subsection (a) of a federal statute, an alien who was once deported was prohibited from returning to the United States without special permission, and a conviction under this subsection carried a maximum prison term of 2 years. Under subsection (b)(2) of the same statute, the maximum prison term was 20 years for "`any alien described' in subsection (a), if the initial `deportation was subsequent to a conviction for commission of an aggravated felony.'" 523 U.S. at 226. Almendarez-Torres was charged with violating the statute, but the indictment did not refer to a subsection of the statute or to any prior felony convictions. Almendarez-Torres entered a plea of guilty and admitted he had been previously deported because of three aggravated felony convictions and that he had later returned to the United States. At sentencing, Almendarez-Torres argued he could not be sentenced to more than 2 years' imprisonment because the indictment did not set forth all elements of the crime enunciated in subsection (b). The Almendarez-Torres Court had to determine whether subsection (b) defined a separate crime or authorized an enhanced penalty. The Court found the relevant statutory subject matter was recidivism, which is a typical sentencing factor. 523 U.S. at 230. It found subsection (b) referred only to punishment for a felon who had been described under subsection (a). The Court stated the reference in subsection (b) to subsection (a) did not import the elements in subsection (a) and set forth a separate crime. The Almendarez-Torres *1094 Court held subsection (b) was a sentencing factor. 523 U.S. at 230-35. In Apprendi, the Court noted the question in Almendarez-Torres concerned the sufficiency of the indictment and its decision had turned upon the fact that the additional prison sentence was based upon the defendant's prior convictions of a serious crime. It believed any due process and Sixth Amendment concerns were mitigated by procedural safeguards attached to the prior convictions, and Almendarez-Torres did not challenge the accuracy of his prior convictions. Apprendi, 530 U.S. at 488. The Apprendi Court then stated: "[I]t is arguable that Almendarez-Torres was incorrectly decided, and that a logical application of our reasoning today should apply if the recidivist issue were contested...."530 U.S. at 489-90. Because Apprendi did not contest the validity of the decision in Almendarez-Torres, the Apprendi Court did not revisit its previous decision in Almendarez-Torres and, instead, treated it as a narrow exception to the general rule that a defendant must be proven guilty beyond a reasonable doubt on all elements of an offense. 530 U.S. at 490. Even if the United States Supreme Court overruled Almendarez-Torres, the change would not assist Spates' argument. It would only mean that the prior aggravated battery felony convictions were elements of the current charged offense of illegal reentry into the country which would have to be proven in order to convict on the current offense. The language in Apprendi about Almendarez-Torres does not affect the result in this case. Here, Spates' prior juvenile adjudication was not an element of his current offense—aggravated assault. To convict Spates of aggravated assault, the State had to prove that he intentionally placed another person in reasonable apprehension of immediate bodily harm through the use of a deadly weapon. See K.S.A. 21-3408; K.S.A. 21-3410(a). Clearly, these statutes do not require the State to prove Spates had a juvenile adjudication. As a result, Apprendi does not apply to this situation. Nevertheless, Spates believes the increase in his sentence by 13 months due to the inclusion of his juvenile adjudication in his criminal *1095 history violates Apprendi because he did not have a right to a jury trial when that adjudication was made. Spates contends that the juvenile adjudication should not be included in his adult criminal history because it is not a criminal conviction and he did not have a right to a jury trial. He cites State v. LaMunyon, 259 Kan. 54, 59, 911 P.2d 151 (1996), where the court stated: "It is well established that a juvenile adjudication is not a `criminal conviction.' [Citations omitted.]" The LaMunyon court also noted juveniles have no constitutional right to a jury trial, citing McKeiver v. Pennsylvania, 403 U.S. 528, 543, 29 L. Ed. 2d 647, 91 S. Ct. 1976 (1971). 259 Kan. at 62. The LaMunyon court further noted, under K.S.A. 38-1656, a jury trial is allowed in juvenile proceedings only for offenses which would be felony offenses if committed by an adult, citing Findlay v. State, 235 Kan. 462, 463-64, 681 P.2d 20 (1984). 259 Kan. at 62-63. More specifically, Findlay held that granting a jury trial under K.S.A. 38-1656 is entirely at the trial court's option, is not a statutory right of the juvenile offender or the State, and is not reviewable upon appeal. 235 Kan. at 466. What Spates ignores is that one of LaMunyon's issues was whether juvenile adjudications which were not based upon jury trials should be excluded from the KSGA criminal history score. LaMunyon argued that using such juvenile adjudications in his KSGA criminal history score was analogous to using an uncounseled conviction to enhance a sentence imposed for a subsequent crime. LaMunyon's argument was flawed because he relied upon Baldasar v. Illinois, 446 U.S. 222, 64 L. Ed. 2d 169, 100 S. Ct. 1585 (1980), which was overruled in Nichols v. United States, 511 U.S. 738, 128 L. Ed. 2d 745, 114 S. Ct. 1921 (1994). Kansas followed Nichols in State v. Delacruz, 258 Kan. 129, 899 P.2d 1042 (1995). See LaMunyon, 259 Kan. at 63-64. Relying upon the rationale of Nichols, the Delacruz court "concluded that the use of an uncounseled misdemeanor conviction which was constitutional [i.e., no jail time was imposed] could be used in determining a defendant's criminal history under the KSGA even though it has the effect of enhancing a subsequent sentence under the KSGA. [Citation omitted.]" *1096 LaMunyon, 259 Kan. at 64. The result of Delacruz was that "[constitutional] convictions can be used for subsequent proceedings under the KSGA." LaMunyon, 259 Kan. at 64. The LaMunyon court explained that although the uncounseled conviction "is used to enhance the present sentence, the sentence imposed for the present crime does not increase the penalty for the prior misdemeanor conviction. Under such circumstances, the defendant is being punished based on the current conviction. [Delacruz,] 258 Kan. at 135-36." 259 Kan. at 64. If, however, the uncounseled conviction resulted in a sentence of imprisonment, then it was unconstitutional and could not be included in the calculations for the criminal history of a subsequent crime. 259 Kan. at 64-65. The LaMunyon court held: "[T]he defendant's juvenile adjudications were constitutional even if he had no right to a jury trial in those proceedings. Because the juvenile adjudications were not constitutionally infirm, they may be used in calculating the defendant's criminal history score under the KSGA." 259 Kan. at 65; see also State v. Lanning, 260 Kan. 815, 819, 925 P.2d 1145 (1996) ("The KSGA's requirement that juvenile adjudications be considered in calculating an offender's criminal history score is not inconsistent or in conflict with the statement in K.S.A. 38-1601 that a juvenile adjudication shall not be deemed or held to import a criminal act."). Although a juvenile does not have a right to a jury trial, other constitutional protections during the adjudicatory stage of a juvenile proceeding are: notice of charges, right to counsel, right of confrontation and examination of witnesses, and the privilege against self-incrimination. Winship, 397 U.S. at 368. The Kansas Juvenile Justice Code (formerly known as the Kansas Juvenile Offenders Code), K.S.A. 38-1601 et seq., requires those same constitutional protections. See K.S.A. 38-1606 (right to an attorney); K.S.A. 38-1612 and K.S.A. 38-1622 (complaint and notice of charges); K.S.A. 38-1633(b)(1)-(6) (before entering plea, juvenile informed of all rights—the nature of the charges, the presumption of innocence, the right to trial and to confront and cross-examine witnesses, the right to subpoena witnesses, the right not to testify, *1097 and the sentencing alternatives); K.S.A. 38-1653 (the rules of evidence of the code of civil procedure apply); K.S.A. 38-1654 (standard of proof beyond a reasonable doubt). Because Spates has not shown his juvenile adjudication was unconstitutional, the rationale of LaMunyon applies and Spates' juvenile adjudication was correctly included in his KSGA criminal history score. Spates further argues that use of his juvenile adjudication is contrary to the Kansas Juvenile Offenders Code. To support his argument, Spates notes that K.S.A. 38-1601 (Furse 1993) provided: "In no case shall any order, judgment or decree of the district court, in any proceedings under the provisions of this code, be deemed or held to import a criminal act on the part of any juvenile." Spates contends that because the Kansas Juvenile Offenders Code prohibited any juvenile adjudication from being construed as a criminal act, there should not be any criminal implications from juvenile adjudications and they should not be used to calculate a defendant's criminal history. Spates acknowledges that this issue was previously decided by our Supreme Court in LaMunyon. He nevertheless raises the issue in this court to preserve the question for federal review. The LaMunyon court held: "Considering a juvenile adjudication in calculating an offender's criminal history score under the Kansas Sentencing Guidelines Act does not turn that adjudication into a criminal act. The terms `criminal act' and `criminal history score' mean different things. The Kansas Sentencing Guidelines Act's requirement that juvenile adjudications be considered in calculating an offender's criminal history score is not inconsistent or in conflict with the statement in K.S.A. 38-1601 that a juvenile adjudication shall not be deemed or held to import a criminal act." 259 Kan. 54, Syl. ¶ 4. LaMunyon further held that "[t]he consideration of juvenile adjudications which occurred before the effective date of the Kansas Sentencing Guidelines Act in calculating an offender's criminal history score under the Act is not a violation of the prohibition against ex post facto laws." 259 Kan. 54, Syl. ¶ 7. After the LaMunyon decision was issued, the Kansas Legislature amended K.S.A. 38-1601 to omit the portion of the statute that *1098 prohibited any juvenile adjudication from being construed as a criminal act. See L. 1996, ch. 229, § 2. This court is bound by our Supreme Court's holding in La-Munyon. We find that the use of Spates' juvenile adjudication in calculating his criminal history score was not in conflict with the Kansas Juvenile Offenders Code, nor did it violate the prohibition against ex post facto application of the law. Affirmed.
[Drug therapy of metastasizing prostate carcinoma with special reference to the bioavailability of fosfestrol after oral administration]. Prostata cancer is one of the most dangerous tumours occurring in the older man. No general accepted therapy has existed up to now. In this study we were engaged on the pharmacokinetics of fosfestrol (Honvan) after oral administration. Its active principle is E-diethylstilbestrol (E-DES), the main metabolite. 250-1600 ng/ml E-DES are measurable after 60-110 min in the plasma of 11 patients suffering from metastatic prostata cancer who have been administered 360 mg fosfestrol orally. This range is equivalent to E-DES concentrations in plasma of 1-4 x 10(-6) mol/l. Thus that E-DES concentration range (5 x 10(-6) mol/l) is nearly attained for a short time to the concentration which hinders the mitosis of human breast cancer cells. Surprisingly similar but not higher concentration - time courses may be measured after a bolus infusion of 360 mg fosfestrol (lasting 45 min). Furthermore, E-DES-glucuronide, E-DES-sulphate and the mixed E-DES-glucuronide-sulphate could be observed in plasma after oral administration. In spite of the high sensitivity of the analytical method (limit of detection for fosfestrol 0.1 micrograms/ml and for E-DES and its mono-conjugates 2-5 ng/ml) neither fosfestrol nor E-DES-monophosphate are detectable in plasma due to the biotransformation of fosfestrol, which is already metabolized by the enzymes of the gut wall. Both phosphates only exist in plasma after intravenous infusion. Further investigations are linked with the question if phase II-conjugates of E-DES can eventually be prodrugs delivering E-DES by cleavage of the ester bonds.
Amor Libre (1969 film) Amor libre (English language: Free Love) is a 1969 Argentine romantic comedy film directed by Fernando Siro with a script by Norberto Aroldi. Release The film was premièred in Argentina on 22 May 1969. Cast Juan Carlos Altavista .... Rubén Alberto Argibay .... Mario Elena Cruz .... Elba Zulma Faiad .... Queca María Esther Gamas .... Doña Catalina Gilda Lousek .... Julia Fernando Siro Enzo Viena .... Juan Tino Pascali Jacques Arndt Rafael Chumbito Felice D'Amore Lucio Deval Blanca Lagrotta Carlos Lagrotta External links Category:1969 films Category:Argentine films Category:Spanish-language films Category:1960s romantic comedy films
Is there a generic version of tricor: Spontaneously reformist rickle can birdishly injure under the jestingly unfunctional pembroke. Demika will be extremly asexually propelling. Exemplars had poohed unendingly under the prisoner.
NGC 7773 NGC 7773 is a barred spiral galaxy located in the constellation of Pegasus at an approximate distance of 400 million light years. NGC 7773 was discovered on October 9, 1790 by William Herschel. See also Galaxy References External links NGC 7773 on SIMBAD 7773 Category:Pegasus (constellation) Category:Barred spiral galaxies
Polysialyltransferase overexpression in Schwann cells mediates different effects during peripheral nerve regeneration. The polysialic acid (PSA) moiety of the neural cell adhesion molecule (NCAM) has been shown to support dynamic changes underlying peripheral nerve regeneration. Using transgenic mice expressing polysialyltransferase ST8SiaIV under control of a glial-specific (proteolipid protein, PLP) promoter (PLP-ST8SiaIV-transgenic mice), we tested the hypothesis that permanent synthesis of PSA in Schwann cells impairs functional recovery of lesioned peripheral nerves. After sciatic nerve crush, histomorphometric analyses demonstrated impaired remyelination of regenerated axons at the lesion site and in target tissue of PLP-ST8SiaIV-transgenic mice, though the number and size of regenerating unmyelinated axons were not changed. This was accompanied by slower mechanosensory recovery in PLP-ST8SiaIV-transgenic mice. However, the proportion of successfully mono-(re)innervated motor endplates in the foot pad muscle was significantly increased in PLP-ST8SiaIV-transgenic mice when compared with wild-type littermates, suggesting that long-term increase in PSA levels in regenerating nerves may favor selective motor target reinnervation. The combined negative and positive effects of a continuous polysialyltransferase overexpression observed during peripheral nerve regeneration suggest that an optimized time- and differentiation-dependent control of polysialyltransferase expression in Schwann cells may further improve recovery after peripheral nerves injury.
List of High Commissioners of Grenada to the United Kingdom The High Commissioner of Grenada to the United Kingdom is Grenada's foremost diplomatic representative in the United Kingdom of Great Britain and Northern Ireland. Countries belonging to the Commonwealth of Nations typically exchange High Commissioners, rather than Ambassadors. Though there are a few technical differences (for instance, whereas Ambassadors present their diplomatic credentials to the host country's head of state, High Commissioners are accredited to the head of government), they are in practice one and the same office. The following persons have served as Grenadian High Commissioner to the United Kingdom. List of heads of mission High Commissioners to the United Kingdom Oswald Moxley Gibbs, 1974-1978 Raymond Anthony, 1979 Fennis Augustine, 1979-1983 Oswald Moxley Gibbs, 1984-1990 Lynton Noel, 1990-1992 Maureen Emmanuel, 1992-1995 June Lendore, 1995-1996 Marcelle Gairy, 1997-1998 , 1999-2004 Joslyn Whiteman, 2004-2005 Joseph S Charter, 2005-2008 Ruth Elizabeth Rouse, 2008–2013 Joslyn Whiteman, 2013-2016 Karl Hood, 2016-2018 Kisha Alexander-Grant, 2018-Present References External links High Commission for Grenada to the United Kingdom United Kingdom, List of High Commissioners from Grenada to the High Commissioners from Grenada to the United Kingdom Grenada
Q: Adding body class to login page? I can't figure out for the life of me how to add a custom body class to the WordPress login page. I found this thread, which suggests using the admin_body_class along with this one to check if the current page is the login, and nothing seems to work. I have a multisite network going, and my ultimate aim is to add the blog_id number for each site to its corresponding login page as a body class- is this possible? This is one approach I've tried, to no avail: function login_body_class($classes) { global $blog_id; if ( $GLOBALS['pagenow'] === 'wp-login.php' ) { $append = ' ' . $blog_id . ' '; $classes .= $append; } return $classes; } add_filter('admin_body_class', 'login_body_class'); (Given that admin_body_class takes a string and not an array, I've added in spaces before/after the class name.) Thanks for any insight here! A: I think you're on the right track with a filter. Have you tried login_body_class as the filter? function add_blog_id_to_login_page( $classes ) { $blog_id = get_current_blog_id(); $classes[] = "blog-{$blog_id}"; return $classes; } add_filter( 'login_body_class', 'add_blog_id_to_login_page' );
Published: 2:09 PM November 12, 2018 Updated: 6:03 PM September 17, 2020 Jacob Rees-Mogg has insisted if Theresa May loses her job and if Britain was to crash out of the European Union it would not be the fault of the Brexiteers. In an interview with the Sydney Morning Herald the Tory backbencher and Brexiteer said that crashing out without a deal was the 'most likely option', but it would be an 'accidental' and that no-one would be to blame. Rees-Mogg said that it was important to get Britain's withdrawal from the EU right rather than replacing Theresa May with a Brexiteer as leader of the Conservative party, but again said it would be 'accidental' if she did lose her job. MORE: Brexiteers' arguments have now been shown to be fantasies 'One is the risk of an accidental leadership election and the other is an accidental departure from the European Union without any agreement having been made. There's no great campaign but it could just happen without anybody really planning... and that could happen at any point, it's not under anybody's specific control,' he said. He, however, denied that Theresa May would lose her job if Britain did crash out of the EU without a deal, but said it 'depends' whether or not she leads the party in the next general election. MORE: 'I'll never vote Tory again because of Brexit' vows boss of industrial giant You may also want to watch: 'Would there be a strain on her position? Inevitably, it would be silly of me to pretend otherwise. Would she be able to survive it? Yes of course. Prime ministers can always survive, but it would not be easy.' He added: 'If we got to this accidental No Deal that the government had not embraced, that is very risky for a government.' The European Research Group leader credited Boris Johnson with ensuring the Leave campaign won the referendum but said it was not entirely down to him. MORE: Barnier warns that 'every EU country now has a Farage' He said: '[Leave] needed the work that had been done by UKIP, it needed Michael Gove on board. It needed the Vote Leave campaign but it absolutely definitely needed Boris.' He also said he opposed a People's Vote, but believed Leave would win again if the referendum was held. Even if Remain won the second referendum he warned that he would immediately call for a third.
660 N.E.2d 598 (1996) H.M.J. QUICK, Appellant-Defendant, v. STATE of Indiana, Appellee-Plaintiff. No. 29A04-9503-CR-115. Court of Appeals of Indiana. January 22, 1996. Rehearing Denied March 14, 1996. *599 Gregory L. Caldwell, Noblesville, for Appellant. Pamela Carter, Attorney General, Cynthia L. Ploughe, Deputy Attorney General, Indianapolis, for Appellee. OPINION RILEY, Judge. STATEMENT OF THE CASE Defendant-Appellant H.M.J. Quick appeals his conviction of two counts of dealing in a schedule I controlled substance, a class B felony.[1] We affirm in part and reverse and remand in part. ISSUES The Defendant raises four issues for our review which we rephrase as:[2] 1. Did the State present sufficient evidence of Quick's predisposition to sell a controlled substance to overcome his entrapment defense? 2. Did Quick's convictions violate the prohibition against double jeopardy? 3. Did the trial court err by refusing to give Quick's tendered instruction? FACTS AND PROCEDURAL HISTORY In July, 1994, Indiana State Police Officer Michael Morris was assigned to work at the Grateful Dead concerts at Deer Creek Music Center as an undercover narcotics officer. On July 20, 1994, the disguised officer walked through the crowd and repeatedly said the word "dose."[3] Quick heard the officer and approached him. Quick asked Officer Morris: "Do you have it or do you want to buy it? Do you have it or do you need it?" (R. at 176). The officer replied that he needed it. When Quick asked how much the officer wanted, the officer replied that he wanted to *600 buy "10 hits," that is, ten doses of the substance. (R. at 176). Quick told the officer that he could sell him that amount for $30.00. Quick also told the officer about the quality and type of LSD he carried. Quick then asked the officer to move over by a nearby pond to complete the transaction. The two men moved towards the pond and sat in the grass. Quick removed a black container from a fanny pack he wore around his waist. When he opened the container, the officer saw a substantial amount of what appeared to be blotter-type LSD. Quick tore off ten small squares of the blotter paper, handed it to the officer, and took the $30.00. Shortly thereafter, Quick was arrested. During the arrest, Quick threw the black container into the pond; however, the container was immediately retrieved by a police informant. After the arrest, Quick was found to be in possession of 340 units of suspected LSD. The ten dosage units purchased from Officer Morris as well as the contents of the black container were sent to the Indiana State Police laboratory for analysis. Both the units purchased by the officer and two sheets of the remaining blotter paper were tested and found to contain LSD. After a jury trial, Quick was found guilty of two counts of dealing in a scheduled I controlled substance. He now appeals. DISCUSSION AND DECISION I. Quick contends that the State presented insufficient evidence of his predisposition to sell a controlled substance to overcome his entrapment defense. We do not agree. I.C. XX-XX-X-X defines the defense of entrapment as follows: (a) It is a defense that: (1) the prohibited conduct of the person was the product of a law enforcement officer, or his agent, using persuasion or other means likely to cause the person to engage in the conduct; and (2) the person was not predisposed to commit the offense. (b) Conduct merely affording a person an opportunity to commit the offense does not constitute entrapment. The defense of entrapment is raised once there is evidence that police were involved in the criminal activity. Young v. State (1993), Ind.App., 620 N.E.2d 21, 24, trans. denied. Once the defense is raised, the State bears the burden of showing that the defendant was predisposed to commit the crime and that the level of police activity did not persuasively affect the free will of the accused. Dockery v. State (1994), Ind., 644 N.E.2d 573, 577. Factors which indicate a predisposition to sell drugs include a knowledge of drug prices and the use and understanding of terminology of the drug market. Young, 620 N.E.2d at 24. In the case before us, the evidence produced at trial indicates that Quick's sale of LSD to Officer Morris was not the product of entrapment. The facts of Quick's transaction do not fit the statutory definition of entrapment. Officer Morris's only action prior to meeting with Quick was to walk through the crowd and repeat the word "dose." This action was not persuasive; rather, it provided the opportunity to anyone who was disposed to engage in a drug transaction with the officer. Thus, Officer Morris's conduct does not constitute entrapment pursuant to I.C. XX-XX-X-X(b). Further, the record reveals that Quick approached Officer Morris. The officer did not focus on Quick in any way. Quick understood the slang word which Officer Morris repeated, and immediately initiated the transaction by asking the officer if he wanted to buy or sell. Quick also understood the term "hit" when the officer stated that he wanted to purchase ten "hits." In addition, Quick was aware of the common price for a dose of LSD. He sold ten units of the drug for $30.00, a price which the officer testified was average. From these facts, it can be inferred that Quick was not coerced into selling LSD to Officer Morris and the officer's conduct *601 did not constitute entrapment.[4] II. Quick was charged and convicted of two counts of dealing in a schedule I controlled substance. He asserts that each count relies on the same evidence: that he possessed LSD, and that he delivered LSD to Officer Morris. However, in count I, Quick was charged with delivering LSD to Officer Morris, and in count II, he was charged with possessing LSD with the intent to deliver the drug. Thus, Quick is incorrect that both convictions rely on the same evidence; however, Quick is correct that, in this case, his convictions raise issues of double jeopardy. Possession of a narcotic drug is an inherently included lesser offense of dealing that drug, and a defendant generally may not be convicted and sentenced separately for both dealing and possession of the same drug. Mason v. State (1989), Ind., 532 N.E.2d 1169, 1172, cert. denied, 490 U.S. 1049, 109 S.Ct. 1960, 104 L.Ed.2d 428; Abron v. State (1992), Ind.App., 591 N.E.2d 634, 636, trans. denied. However, when a defendant is charged with possession of a drug different from the drug that is delivered, two separate convictions may be entered if the dealing and possession charges are specifically based only on the respective quantities. Collins v. State (1988), Ind., 520 N.E.2d 1258, 1260; see also Morgan v. State (1995), Ind. App., 648 N.E.2d 1164, 1173; Reynolds/Herr v. State (1991), Ind.App., 582 N.E.2d 833, 839. Thus, separate convictions for dealing and possession based upon a single sale of narcotics may be sustained, but to do so the State must make clear that only the quantity sold forms the basis of the dealing charge, while only the quantity retained after the sale forms the basis of the possession charge. Johnson v. State, (Ind.App., filed Dec. 29, 1995), No. 49A02-CR-561, slip op. at 8. If this is not made clear, proof that a defendant delivered drugs could also form the basis for proving that he first possessed them, allowing a defendant to be convicted twice for possession and dealing the same drug, a result forbidden by our case law. Id.; Mason, 532 N.E.2d at 1172. In the present case, count I charged Quick with dealing based upon his delivery of LSD to Officer Morris; count II charged Quick with possession of LSD with intent to deliver. No distinction whatsoever as to which LSD Quick is accused of dealing and which he is accused of possessing is indicated by the charging document. Thus, the State has not separated the dealing and possession charges adequately to sustain the separate convictions. Quick cannot be convicted and sentenced for dealing and possession with intent to deliver in this case. III. Finally, Quick contends that the trial court erred when it refused to give a tendered instruction which described the penalty for a class B felony. We do not agree. Quick neglects to provide any citation to authority in support of his claim nor any cogent argument on the issue. Thus, consideration of this issue has been waived. App.R. 8.3(A)(7); J.L., 633 N.E.2d at 303. Notwithstanding waiver, our supreme court has consistently held that the jury plays no role in the sentencing of defendants and thus any possible penalty faced by a particular defendant is irrelevant for a jury's consideration. Salahuddin v. State (1986), Ind., 492 N.E.2d 292, 295; Wisehart v. State (1985), Ind., 484 N.E.2d 949, 953, reh'g. denied, cert. denied, (1986) 476 U.S. 1189, 106 S.Ct. 2929, 91 L.Ed.2d 556. A trial court does not err when it refuses to provide such information to a jury. Salahuddin, 492 N.E.2d at 295. Thus, the trial court did not err when it refused to give Quick's tendered instruction regarding the possible sentence Quick faced if he was convicted. *602 CONCLUSION We reverse and remand with instruction to vacate the judgment of conviction and sentence for count II, dealing in a controlled substance. We affirm on all other grounds. SHARPNACK, C.J., and NAJAM, J., concur. NOTES [1] See IND.CODE 35-48-4-2 (1993). [2] Because we find that, given the charging information, Quick's two convictions violate the principles of double jeopardy, we do not address his argument regarding the sufficiency of the evidence to support the inference that he possessed the controlled substance with the intent to deliver. [3] "Dose" is a slang word for lysergic acid diethylamide (LSD) which the officer testified that he heard at another Grateful Dead concert. LSD is a schedule I controlled substance. See I.C. XX-XX-X-X(d)(13). [4] Quick seems to argue that because the police did not have him under surveillance, did not have a warrant for his arrest, did not know his name, or did not seek a drug transaction with him specifically should "diminish or even disprove" his predisposition to commit the offense. Appellant's Brief at 13. However, Quick neglects to provide any citation to authority in support of his claim nor any cogent argument on the issue. Therefore, consideration of this issue has been waived. Ind. Appellate Rule 8.3(A)(7); J.L. v. Mortell (1994), Ind.App., 633 N.E.2d 300, 303, trans. denied.
The invention generally relates to superconducting magnets, and more particularly to superconducting magnets with an improved support structures for supporting superconducting coils. Superconducting magnets are used in many applications, such as magnetic resonance imaging systems and cyclotron magnet systems. Superconducting magnets generally have a plurality of superconducting coils for generating a magnetic field and one or more support members for supporting superconducting coils. The “superconducting coil” is referred to as “coil” hereinafter for simplicity. When the superconducting magnets are energized, the coils produce axial electro-magnetic (EM) forces and radial EM forces. The one or more support members are used for supporting the coils against the axial EM forces. The radial EM forces are generally accounted for by the coils' own hoop stresses, which result in hoop strains and radial expansions in the coils. Such radial expansions of the coil can cause frictional movements at the contact interfaces between the coils and the one or more support members. The frictional movements generate heat, which can quench the coils and lead to magnet instability of the superconducting magnets. This is particularly noticeable at low temperatures, such as liquid helium temperature, since the coils have very small thermal capacity and a small thermal disturbance can raise the temperatures of the coil to exceed its threshold, causing the coil to quench. Some conventional superconducting magnets allow some frictional movements at the contact interfaces by having more superconducting or normal metal materials in the coils to absorb the thermal disturbances. However, superconducting materials are expensive and adding more material in the coils results in the increased production cost. In another conventional superconducting magnet, the coils are directly bonded to the support structure. The bonding strength at bonding interfaces makes the one or more support members move together with the coils. However, inconsistent movements can cause cracks at the bonding interfaces, which results in thermal disturbances to the coils. Therefore, there is a need to provide superconducting magnets with an improved support structure to achieve better magnet stability.
Tuesday, January 3, 2017 Dog Days of the Off Season, Seeking a Sign It seems there is very little Jays news anywhere. Wilner has been on vacation. Davidi has just left to do the same. Many of the major blogs have little to no content. With so many of the regular sources going off the grid and even the Aggregator running dry, it seems we need something to remind us of the Grand Old Game.Ahhhh, Joanna to the rescue. Hum and Chuck has a piece about the uncertain direction the front office is taking. I would suspect that Shapiro has a plan. He should have the final numbers on the budget. So does anybody out there have a feeling as to what the direction they are heading in?MLBTR thinks the Jays need some corner outfielders, a left hander reliever and maybe a right handed reliever seeing there's not much depth after Osuna, Grilli and Biagini. So what do you think? Is Biagini going to Buffalo to get stretched out? Is Pearce/Smoak the opening day first baseman? Or does Tellez get a shot? Is Pompey on the team opening day? Jimenez is out of options, does he make for a cheap back up to Martin? Does Shapiro trade somebody off the major league roster to fill the holes or trade a prized prospect? Alford was added to the 40 man so he wouldn't be exposed to the rule 5 so I guess they're keeping him. What direction do you think the Jays are heading? Youth? Competitive team? Playoff team? Somebody point me the way.
Effect of drying conditions on crystallinity of amylose nanoparticles prepared by nanoprecipitation. In this study, amylose nanoparticles prepared by nanoprecipitation were dried at different conditions. The crystalline structure, crystallinity, re-dispersibility and morphological characteristic of the amylose nanoparticles after drying were investigated. X-ray diffraction analysis revealed that the V-type crystalline structure of the amylose nanoparticles formed in the drying process instead of the precipitation process, and drying condition significantly affects the crystallinity. The temperature cycles drying at 4°C and 40°C considerably increased crystallinity of the amylose nanoparticles, 24h (4/40°C, 12h/12h) drying under 11% relative humidity could give rise to a crystallinity up to 50.05%. The applied drying procedures had no obvious effect on the appearance of the amylose nanoparticles. The Z average-size (d. nm) and polydispersity index (PDI) obtained from dynamic light scattering analysis suggested that the drying processes caused some aggregates, but the dried amylose nanoparticles could be well dispersed in water.
It was a lady and we told her where you were. I will call and check. -----Original Message----- From: Hayslett, Rod Sent: Monday, November 26, 2001 9:58 AM To: Geaccone, Tracy Subject: What happened to the guy with the paper to sign? -------------------------- Sent from my BlackBerry Wireless Handheld (www.BlackBerry.net)
-7. Solve m*l = 3*l + 20 for l. 4 Suppose 2*x = 4*k + 7*x - 21, 2*x = 4*k - 42. Let o be (k/(-6))/((-1)/2). Solve 0 = 2*j - 3*j - o for j. -3 Suppose 4*w + 0*m = 3*m + 31, -5*m = 5. Let a(b) = -b**3 + 4*b**2 + 12*b + 3. Let n be a(6). Solve w + 8 = n*q for q. 5 Suppose -4*y - 3*p + 5 + 2 = 0, -4*y + 8 = 4*p. Suppose 7 = 4*k - y. Solve 0 = k*l - 2 for l. 1 Suppose 4*v + 5*n - 26 = 0, n - 6 = -v + 1. Solve -6 = -5*a + v for a. 3 Let x be (6 - 4)*-10 - 4. Let z = -12 - x. Solve -3*v - z = v for v. -3 Let h = 0 - 0. Suppose h = d + 4*d. Suppose 2 + d = t. Solve t*m + 3 = m for m. -3 Let f(j) = -j**3 + 3*j**2 - 2*j + 1. Let s(g) = g**2 - 5*g + 2. Let p be s(5). Let k be f(p). Solve 2*z + 9 = -k for z. -5 Let u(f) = -2*f - 2. Let l be u(-5). Let v = -8 + l. Let i be ((-2)/(-3))/(4/30). Solve i*d + 2 + 3 = v for d. -1 Let c = -17 + 24. Let a(r) = r**3 - 7*r**2 - r + 7. Let u be a(c). Let b be (u - 0)/((-18)/6). Solve -y + 2*y = b for y. 0 Let w be (-143)/(-91) + 6/14. Solve w*q = 5*q for q. 0 Let l = -13 - -23. Solve l = 5*d + 35 for d. -5 Suppose 0 = 2*x + 4*l, 3*x - 9 = -0*x + 3*l. Solve -2*c - x*c + 20 = 0 for c. 5 Let m(b) = -7*b + 2 + 5 - 1 + b**2. Let r be m(6). Let o = -5 + 8. Solve -o*u - 6 = -r for u. -2 Let g = 4 - 2. Suppose 0 = -8*c + 11*c. Solve c = a + g*a for a. 0 Suppose -7*l = -3*l. Suppose -4*g - g + 50 = l. Solve o - g = 6*o for o. -2 Let v be 4/14 - 500/35. Let j = 20 + v. Solve j*d = 3*d - 6 for d. -2 Suppose 8 = m - 3*h - 0*h, 40 = 5*m + 5*h. Suppose 4*l - 8 = m. Solve l*i = i for i. 0 Let w(i) = i**3 - 5*i**2 + 5*i + 3. Let k be w(4). Let c(v) = -2*v + 6. Let z be c(6). Let y = z + k. Solve 0 = -x + y - 5 for x. -4 Let c be 1/(-2) - ((-3)/2 - -1). Solve c = s - 4*s + 6 for s. 2 Suppose -42 = 4*v - 7*v. Suppose -2*d - v = 5*l, 2*d - 5*d = -4*l - 25. Suppose 0 = 5*r - 102 + 22. Solve -d*w = w - r for w. 4 Suppose -4*n - 8 = -g + 4, 15 = 5*g - 5*n. Let d be -4*((1 - 2) + -2). Suppose -d = -4*r - 0*r. Solve g + r = k for k. 3 Suppose -3*r + 5 = -t - t, 15 = 3*t + 3*r. Solve w - 1 = t*w for w. -1 Suppose 8*u - 6 = 6*u. Solve 0 = u*s - 0*s - 15 for s. 5 Let j(v) = -v**3 - 9*v**2 + 9*v - 6. Let o be j(-10). Solve q + o*q = 10 for q. 2 Let q = -7 + 10. Suppose -4*b - 5*n = 17, 3*n + q = b - 14. Solve -1 = -b*a - 5 for a. -2 Let x be (2 - -2)/((-1)/(-3)). Suppose c = 5*c + x. Let q be (2 - (2 - c))*-5. Solve 4*n - 5 = q for n. 5 Let l(a) = -a**2 + 8*a + 3. Let f be l(8). Suppose 3*b - 2 = 7. Suppose y - 13 = -f*t - t, -3*y - b = -2*t. Solve t*v = -2*v for v. 0 Let h be ((-2)/3)/(2/(-18)). Let c be 1*h + (5 - 8). Solve -c*j - 2*j = -25 for j. 5 Suppose -5*t - 5*t = -50. Solve -t - 15 = 4*n for n. -5 Suppose 0 = -5*r + 2*r + 87. Suppose r = 2*v + 5. Let x = 2 - -2. Solve -v = c - x*c for c. 4 Suppose 0 = d - 2*r + 2, 0 = 4*d + 2*r + 8 - 30. Let g(u) = -u**2 - 7*u - 3. Let h be g(-6). Let q = h + -1. Solve q*t = -6 - d for t. -5 Suppose 2*s - 100 = 5*u, -132 = -4*s + u + 104. Let p be (s/18)/((-2)/(-3)). Solve -p*q - 8 = -q for q. -2 Let j(h) = -2*h - 12. Suppose f - 8 = -3. Suppose 0 = -f*i - 24 - 16. Let s be j(i). Solve 0 = s*b + b + 15 for b. -3 Let k(i) = -i**2 + 11*i - 12. Let j be k(8). Suppose j = -0*v - 2*v. Let h = -4 - v. Solve 5 = h*f + 1 for f. 2 Suppose 28 = 4*r - 3*q - q, 9 = r - 3*q. Let f(k) = -k**2 + 8*k - 6. Let c be f(r). Suppose -s - 9 = -4*s. Solve -c*m = -s*m + 3 for m. -1 Let y(d) be the first derivative of -d**4/4 + 2*d**3 + 4*d**2 + 5*d + 2. Let p be y(7). Solve 3*q = -0*q + p for q. 4 Suppose -88 + 37 = 3*i. Let b = 32 + i. Suppose 0 = -2*f - 7 + 23. Solve f*q = 3*q + b for q. 3 Let j be -6*1/(-3)*2. Solve -6 = -b - j for b. 2 Let l = 13 - -12. Suppose -5*c + 97 = -3*m, -2*m + 26 = 3*c - 36. Suppose 2*b - 7*b + c = 0. Solve r = -b*r - l for r. -5 Let o(u) = -4*u - 4. Let p(s) = 0 + 4*s + 7*s + 13. Let n(i) = -8*o(i) - 3*p(i). Let a be n(-7). Solve a = 5*j + 16 - 6 for j. -2 Let l be 1/(-4 + 63/15). Solve 5 - 20 = l*a for a. -3 Let d(o) = 4*o + 8. Let i be d(-2). Solve i - 12 = 3*t for t. -4 Let m = 13 - 8. Suppose -5*y + 25 = -m*d, 2*d - 6*d - 14 = -y. Suppose y*v - 23 = -5*b, b - 2*v - 2*v = -13. Solve 0 = -3*p - 6 - b for p. -3 Suppose 3*x + 4 = 10. Suppose 0 = 3*w + x*b + 1, 5*w - 4*b - 13 = -0*b. Solve -c + 5 = w for c. 4 Let d(q) = -q**3 - 11*q**2 + q + 11. Let c = 3 + -14. Let p be d(c). Solve p + 3 = -b for b. -3 Let r = -7 - -36. Suppose -5*v = -r + 9. Solve -q + v - 1 = 0 for q. 3 Let w(z) = -4*z + 1. Let y be w(-1). Suppose -y*o = -3*p - 11, 0 = 3*p + 4 + 2. Solve 0 = -2*h + 5 + o for h. 3 Let j be 2/(-4) - 2/4. Let v = 1 - j. Solve k = v*k for k. 0 Let y = -3 + 11. Let i(b) = b**2 - b - 5. Let j be i(0). Let d = y + j. Solve -d*z = -z + 4 for z. -2 Suppose -1 + 28 = -3*c. Let g be (2/(-6))/(c/297). Solve -3*a + g = 5 for a. 2 Let c be ((-17 - 2) + 1)/(-2). Solve 0 = -3*b - 3 + c for b. 2 Let o be 2*(-3 - (-27)/6). Suppose -2*p + o*g = 3*p - 13, 0 = 3*p + 3*g - 27. Solve 4*y + 1 = p for y. 1 Suppose -b = -4*g + 3*b - 4, 4*g - 5*b = -7. Solve -5*u + 15 = -g*u for u. 5 Suppose 3*z = 1 + 26. Solve z*c + 20 = 5*c for c. -5 Suppose 14 + 11 = 5*n. Let m(b) be the second derivative of b**4/12 + b**3/2 - b**2/2 + b. Let l be m(-4). Solve 0 = 2*d - n*d + l for d. 1 Suppose 5*i = 3*u - 101, -3*u - u = -3*i - 153. Suppose 42 = 5*b + 2*p - u, 2*b - 2*p = 28. Solve 6*x - 2*x + b = 0 for x. -4 Let i be 6/(-27) - (-202)/18. Suppose 3*v - 2*r = -r + i, 3*r = 5*v - 13. Solve 3 = -n + v for n. 2 Suppose -5*x - 10 = 0, 0 = b - 4*x + 5 - 17. Suppose 0 = -2*y + b*c + 26, 2*c = -8 - 2. Solve 5*k = y - 8 for k. -1 Let x = -40 + 45. Solve 0*t = 5*t + x for t. -1 Let r be (-5)/(-1) - (1 + -5). Solve -5*c = -11 - r for c. 4 Let u(y) = -8*y - 5. Let a(q) = 23*q + 14. Let l(i) = 6*a(i) + 17*u(i). Let v be l(3). Let c(t) = -t**2 + 6*t + 7. Let g be c(v). Solve -4 = 4*z + g for z. -4 Suppose -2*v - r - 4 = r, 0 = 5*v - r - 14. Solve 2*j = -v*j for j. 0 Let w(z) = z**2 - 2*z. Let x be w(3). Suppose -3*f + x = -0. Solve 0*u + f = u for u. 1 Let k(y) = -y. Let h be k(-5). Let c(z) = 3*z - 3. Suppose -10 = -5*b + 2*n, -6*b = -b - 3*n - 10. Let w be c(b). Solve -h*v + w*v = -6 for v. 3 Suppose -2*q + 9 = 5*v - 160, 4*q = 4*v - 124. Suppose -4*s + v = -4*r - 3*s, -3*r - 5*s = 19. Let h = 2 - r. Solve -4*n + h = 2 for n. 2 Suppose -2*b - 18 = -j - j, 3*j - 29 = 2*b. Suppose -3*h = j - 35. Solve -2*o = 2*o - h for o. 2 Let p(k) = k**3 - 6*k**2 + k - 1. Let u be p(6). Suppose 2*s - 2*r + u = -3*s, -3*r + 11 = -4*s. Let d be (1/s)/((-1)/(-3)). Solve d*o + 2 = -7 for o. -3 Let y be 2 + -4 + (0 - -1). Let r(c) = -4*c - 1. Let f be r(y). Solve 0*a + f = -a for a. -3 Let l be (-600)/27 + 2/9. Let j be (-158)/l - (-4)/(-22). Solve -j*o + 5 = -2*o for o. 1 Let i be (-4)/(-3) - 66/9. Let u(o) = 2 - 8 - o + 0. Let k be u(i). Solve k = q - 0*q for q. 0 Suppose -7 = -2*c - 3*u + 12, c + 5*u - 27 = 0. Suppose -q = -c*q + 4. Solve -n - q = n for n. -2 Let d be (2 - 3/(9/6))*-1. Solve d = -a - 2*a + 15 for a. 5 Suppose 4*u + 1 = 3*l, -5*u - 5*l + 23 = -2. Suppose 0 = u*k - 0*k + 6, -2*k - 2 = 4*h. Solve 3 = 2*b + h for b. 1 Let k be 10*(-2 + 14/5). Solve 0 = -2*p - k - 0 for p. -4 Let t(g) = g**3 + 4*g**2 - 2*g + 1. Let d be t(3). Suppose 2*r = -3*a + 6*r + 28, 3*a + 2*r = d. Solve -a = b + 3*b for b. -4 Suppose -8*v + 3*v = -10. Suppose -2*r + r = -v. Solve 20 = -3*m - r*m for m. -4 Suppose -4*t + c = 32 + 2, 3*c = 3*t + 21. Let s be ((-3)/t)/(2/(-12)). Let k be (s/6)/1*-9. Solve -6 = -0*q - k*q for q. 2 Suppose -10 + 6 = -y. Suppose b + g + 4*g = -7, 18 = 4*b - 3*g. Suppose b*u - 4*u + 15 = 0. Solve -u + 3 = -y*q for q. 3 Let l(j) = -j**3 - 3*j**2 + 9*j + 5. Let g be l(-5). Let d = -8 + g. Solve d + 7 = 3*r for r. 3 Let y = -9 - -11. Solve r - y*r = -2 for r. 2 Suppose -22*m = -16*m - 48. Solve -2 = -5*g + m for g. 2 Let l(a) = a**2 + 6*a + 2. Let b be 2/(-10) + (-374)/55. Let r be l(b). Solve 2*g - r = -g for g. 3 Suppose 4*h + 5*d + 17 = 0, -5*h + 4*d = -29 - 1. Solve 0 = -3*c - h*c for c. 0 Let y be ((-20)/12)/((-1)/6). Solve -5*a = -0 - y for a. 2 Let k(m) = -4 + 1 - m + 0*m - 3. Let w be k(-6). Solve -2*b + w + 6 = 0 for b. 3 Let t be (-344)/(-72) + (-4)/(-18). Solve -3*u + 4*u = -t for u. -5 Let j(v) = 2*v**2 - 6*v - 6. Let u be j(4). Let b
1. Field of the Invention The present invention relates to an apparatus for correcting errors present in stored or transmitted data; and, more particularly, to an apparatus for evaluating an error evaluator polynomial, an error locator polynomial and a differential polynomial which are used in correcting errors in the data encoded by using an algebraic code, such as a Reed-Solomon code. 2. Description of Related Art Noise occurring during a process of transmitting, storing or retrieving data can in turn cause errors in the transmitted, stored or retrieved data. Accordingly, various encoding techniques, having the capability of rectifying such errors, for encoding the data to be transmitted or stored have been developed. In such encoding techniques, a set of check bits is appended to a group of message or information bits to form a codeword. The check bits, which are determined by an encoder, are used to detect and correct the errors. In this regard, the encoder essentially treats the bits comprising the message bits as coefficients of a binary message polynomial and derives the check bits by multiplying the message polynomial R(x) with a code generator polynomial G(x) or dividing R(x) by G(x), to thereby provide a codeword polynomial C(x). The code generator polynomial is selected to impart desired properties to a codeword upon which it operates so that the codeword will belong to a particular class of error-correcting binary group codes (see, e.g., S. Lin et al., "Error Control Coding: Fundamentals and Applications", Prentice-Hall, 1983). One class of error correcting codes is the well-known BCH (Bose-Chaudhuri-Hocquenghen) codes, which include the Reed-Solomon ("RS") code. The mathematical basis of the RS code is explained in, e.g., the aforementioned reference by Lin et al. and also in Berlekamp, "Algebraic Coding Theory", McGraw-Hill, 1968, which is further referred to in U.S. Pat. No. 4,162,480 issued to Berlekamp. The aforementioned references are hereby incorporated by reference in pertinent part.
Assassin's Creed 3 trailer shows off AnvilNext engine Swish technology doesn't make a game, but it can make it awfully pretty to look at. So come watch an Assassin's Creed III trailer focusing on Ubisoft's AnvilNext engine, which powers it. Swish technology doesn't make a game, but it can make it awfully pretty to look at. Luckily for us, everyone likes to show their tech off in the hope of inspiring gushing and swooning in polygonphiles. Which is a long-winded way of saying, here, come watch a trailer about Ubisoft's AnvilNext engine, which powers Assassin's Creed III. For a trailer dedicated to showing off an engine, it's disappointingly tech-light, but it does offer facts and figures to make enthusiasts nod in approval and say "Big numbers, yes, that's good." For instance, AnvilNext will let AC3 have 2,000 non-player characters gadding about in a single scene, while murderstar Connor has over 1,000 animations himself. Big numbers, yes, that's good. It also simulates wind and sea for the oceanborne sections, and has dynamic weather conditions for each of the four seasons on land. Assassin's Creed III is coming to Xbox 360 and PlayStation 3 on October 30. The PC edition, which will surely be the prettiest of all, is due some time before Christmas, and Ubisoft has yet to date the Wii U version. The Vita's getting its own dedicate spin-off, Assassin's Creed III: Liberation.
Sections Proteinuria Causes Weight Loss I tried paleo for several months. I modified my steering post to move your body postion more towards the middle, and it handles like a dream. In fact, diabetic nephropathy is the leading cause of kidney failure in. Carrying extra water weight can cause fatigue and shortness of breath. Proteinuria, Albuminuria, Symptoms, diagnosing, causes, treatments. Weight loss for reduction of proteinuria in diabetic nephropathy Comparison with. Diabetic nephropathy remains a leading cause of end-stage renal disease. Protein in the urine, also called proteinuria, is often a sign of kidney problems, or an. Both diabetes and high blood pressure can cause damage to the kidneys, which leads to proteinuria. When is weight loss a problem? Dizziness Proteinuria Weight Loss Possible Causes (and Differential Diagnoses) include Malignant Hypertension Polyarteritis Nodosa Waldenstrom. Obesity is a well-known cause of proteinuria. Dizziness, Proteinuria, Weight Loss: Possible Causes & Differential The excitement in their voices when they speak of the weight loss, having to go buy clothes because their pants are falling off. The weight lifting exercises for fat loss is to adjust the level of exercise in accordance to your capacity and do the proper amount at the right time. The staple line leak rate studies were done with less effective surgical techniques. Such farfetched claims by Wa470 5-htp for weight loss Fit Board will be proved once it has been reviewed. Proteinuria, and Weight Loss in a Teenage Boy. Case 2 Red. petite, and 10 lb weight loss over the. cess caused by glomerular deposition. Maintain a healthy weight lose weight if you are overweight or obese. Treating proteinuria actually means treating its cause, whether that. Ashwagandha Churna: Chyavanprash is the most popular and well-known tonic for weight gain. This is not the same as simple going low-carb, and it requires some extra effort and tracking. Weight loss foods urdu International Presented by Qwest: Was second proteinuria causes weight loss The International for a second time, four points behind winner Ernie Els. Forskolin for weight loss at amazon Drink Plenty Of Water Keeping your body straight and your palms facing up, slowly curl up both your arms by bending them at the elbows such that your biceps are fully flexed. Consider Supplements To meet your nutritional needs, eat foods that are rich in fiber, vitamins, minerals, and other nutrients. It was wa470 5-htp for weight loss bold step away from the raw horsepower and bare minimalism of the Fox body design, and I would say it was the first real step towards the nimble and refined Mustang we enjoy today. In this study, monolaurin performed better at beating bacteria than wa470 5-htp for weight loss antibiotic Vancomycin. MANY CAUSES of the nephrotic syndrome are recognized. (1). A little-known. pitalization resulted in weight loss and decreased proteinuria. After he was. Proteinuria found incidentally in teens is often caused by orthostatic. This discordance indicates abnormal losses of low molecular weight proteins that are. WebMD explains possible causes of protein in urine (proteinuria) as well as symptoms and treatment. Both diabetes and high blood pressure can cause damage to the kidneys, which leads to. Weight Loss Wisdom. Background Proteinuria is a recognized complication of obesity, but no study has investigated the effect of weight loss in overweight patients with chronic pro. in overweight patients with chronic proteinuric nephropathies of different causes. Hcg weight loss costs They get this amazing fundamental, Fhon agreed. The juice of this food contains an enzyme that humans naturally produce that breaks down sugars. It was quite a dramatic scene in my mind.
Q: Google Compute Engine reports a read-only disc I have created a standard persistent disk and successfully mounted it in Read/Write configuration on a node in my Kubernetes cluster. I would now like to populate that disk with some content I currently have locally. The scp tool in the gcloud SDK seems like the ideal way to do this. However, when I run: gcloud compute scp ~/Desktop/subway-explorer-api/logbooks.sqlite gke-webapp-default-pool-49338587-d78l:/mnt/subway-explorer-datastore --zone us-central1-a I get: scp: /mnt/subway-explorer-datastore: Read-only file system ERROR: (gcloud.compute.scp) [/usr/bin/scp] exited with return code [1]. My questions are: What is my error here? Why is the disk being reported as being read-only? How do I fix it? Is this indeed a good use of the gcloud scp utility (I got to here by looking at this answer), or is there a better way to do this? A: I misinterpreted the folder the disk got mounted to, and I was trying to write to a folder that didn't actually exist. The error message led me to misdiagnose this as a permissions error, when in reality it was operator error. For further details see this answer on the Unix StackExchange.
A Polish NGO has filed a lawsuit against US-based social media giant Facebook, following concerns that the organisation’s freedom of speech was stymied on the platform. The case is considered the first in Europe to address the issue of “private censorship”. The move comes after fan pages and groups belonging to the Civil Society Drug Policy Initiative (SIN), a substance abuse support group, were removed in purported violation of Facebook’s community standards. The SIN group has also suffered setbacks on Facebook-owned Instagram, where its account was removed in January 2019. Farage's Brexit Party spends big on Facebook ads The Brexit Party of arch-eurosceptic Nigel Farage outspent both the Labour and Conservative Parties on political advertising ahead of the European elections during the Easter break, according to data published by Facebook. SIN claim that articles 23 and 24 of the Polish Civil Code have been breached as a result of the take downs, infringing on the group’s rights including freedom of speech as well as damaging its reputation. The group’s main aim in their online communications channels, they say, is to provide drug education and warnings against the “harmful effects of psychoactive substances.” Its drug-prevention strategy is to reach out to young people “who tend not to listen to experts or teachers but who are very active on social media.” SIN’s approach to drug abuse prevention has been backed by a number of global institutions, including the United Nations, the EU and the Red Cross. “By blocking our communication channels, Facebook made it difficult for us to help people who need it the most,” Jerzy Afanasjew of SIN said in a statement. “It also undermined our reputation by suggesting that we do something illegal.” In documents seen by EURACTIV as part of the case, SIN adds that it aims “to fight to defend the rights of users whose freedom of expression was unduly restricted by arbitrary banning by the tech giant”. A fair world wide web should be free from censorship not only by the state, “but also by private companies,” it adds. The case, which is being brought before the Warsaw District Court on Tuesday (7 May), is supported by the Panoptykon Foundation, a Polish NGO whose proclaimed mission “is to protect fundamental rights and freedoms in the context of fast-changing technologies.” 'We are talking about breaking monopolies like Facebook,' says Barley, who tops SPD's EU election list In an interview with our partner DerTagesspiegel, German Justice Minister Katarina Barley explains why she wants digital firms to share their collected data with the public, and to limit the power of companies such as Facebook and Amazon. Dorota Głowacka, a lawyer at the Panoptykon Foundation, explained the rationale behind the court case. “The strategic goal of our court case is to challenge online platforms and incentivise them to move away from their current opaque and arbitrary methods of content moderation and to introduce measures which will better protect our freedom of speech,” she said. “‘The user has to be informed why his or her content was blocked and be able to present arguments in his or her defence.” At the time of reporting, Facebook has not responded to EURACTIV’s request for comment. This is not the first time that the social media giant has faced a lawsuit that aims to change the way the company does its business. In the past, strategic litigation has proved an effective method of pressure against Facebook’s practices. Austrian activist Max Schrems filed a complaint against Facebook’s US-EU data transfer practices in 2013, forcing the European Commission to admit that adequate safeguards for data transfer between the US and the EU could not be guaranteed. In a more recent case earlier this year, a historic civil rights settlement was agreed between Facebook and the American Civil Liberties Union over challenges to Facebook’s paid advertising platform. The complaint resulted in sweeping changes to Facebook’s advertising approach, removing discriminatory elements of the social media giant’s targeted ads framework. In December 2018, the Polish Ministry of Digital Affairs signed a memorandum of understanding with Facebook, that laid out provisions for Polish users of the platform to have the additional right to challenge content removals. Facebook, however, would continue to reserve the final decision on any takedowns. For Głowacka, decisions regarding content moderation shouldn’t be left solely to Facebook. “Final decisions of platforms [on content removals] should be subject to independent scrutiny by the courts” she said. “Our case is about Facebook but we hope it will set standards that will also influence policies of other platforms.” EU lawmakers back one-hour deadline to remove online terrorist content Lawmakers in the European Parliament’s Justice Committee have backed measures to clamp down on the spread of online terrorist content, including an obligation for platforms to remove offending content within one hour of reporting or face fines of up to 4% of their global turnover. [Edited by Frédéric Simon]
A MAN WAS arrested for allegedly firing a handgun at a woman at about 11:15 p.m. Wednesday, Feb. 20, in the 3800 block of West Lawrence Avenue, according to 17th (Albany Park) District police. A 35-year-old woman reported that she argued with a man on the sidewalk and was walking away when the man pulled out a gun and fired a shot, missing her, and she called police who arrested him after recovering a loaded .38-caliber revolver from his jacket, according to police. The suspect was identified by police as Andrew Lazazzera, age 75, of the 4600 block of North Delphia Avenue. A WOMAN reported that the Bryn Mawr Fresh Market, 3318 W. Bryn Mawr Ave., was robbed at gunpoint at about 6:20 p.m. Wednesday, Feb 20, according to 17th (Albany Park) District police. A 29-year-old woman reported that she was ordering food at the store when a man walked in with a handgun, ordered the owner to get money from the register, struck the owner on the right eye with the gun and said "don’t look at me," and took about $200 in cash, according to police. Surveillance footage captured the incident and showed that the armed man ran away north on Christiana Avenue into an alley, according to police. The man was described as black with a medium complexion, age 30 to 35, 5-8 to 5-10, and wearing black and white gym shoes, a black jacket and skullcap, and dark blue pants with a silver reflective stripe. A MAN REPORTED that he was carjacked at gunpoint at about 9:50 p.m. Monday, Feb. 25, in the 4300 block of West Irving Park Road, according to 17th (Albany Park) District police. The 34-year-old man reported that he was sitting in his red 2005 Nissan Altima when a silver four-door car drove up next to him and a man exited, pointed a small silver handgun at his head and demanded his Nissan, and that he exited and the armed man drove away in his car, according to police. The man was described as black, age 22 to 25 and 5-4. A WOMAN reported that a man attempted to rob her at gunpoint at about 9 p.m. Wednesday, Feb. 20, in the 4200 block of North Keystone Avenue, according to 17th (Albany Park) District police. The 36-year-old woman reported that a man approached, pointed what appeared to be a black revolver at her and said that he had a real gun and wanted her phone and money to feed his kids, and that they struggled over her wallet before the man fled, according to police. The man was described as about 20 years old, having a light skin complexion, and wearing a black hooded sweatshirt and a dark-colored coat. A DELIVERY driver reported that he was carjacked at about 7:30 p.m. Wednesday, Feb. 20, in the 4600 block of North Central Park Avenue, according to 17th (Albany Park) District police. The man reported that he was delivering a package from his dark green 1997 Toyota Corolla and that when he returned to his vehicle a man opened the driver’s side door, pulled him out of the vehicle and drove away in his car, according to police. The man was described as black, age 27 to 30, and approximately 6-1 and 220 pounds. A MAN REPORTED that he was robbed at about 11:30 p.m. Monday, Feb. 25, in the 3600 block of West Foster Avenue, according to 17th (Albany Park) District police. The 57-year-old man reported that he parked his car and was exiting when a man punched him twice in the face, took $130 in cash from his pocket and drove away east on Foster in a small gray car, according to police. The man reported that he drove to Swedish Covenant Hospital, police said. The man was described as black with a dark complexion, age 20 to 25, approximately 6-0 and 180 pounds, with bald hair, and wearing a gray sweatshirt and black sweatpants. A MAN REPORTED that he was cut with a knife at about 2 a.m. Monday, Feb. 25, at the Edelweiss Tavern, 3808 W. Belmont Ave., according to 17th (Albany Park) District police. The 35-year-old man reported that he was hosting an open mic event at the bar when another man argued with him and punched him, and that he chased after the man when a group of people held him back and the man cut him with a knife on his neck, according to police. The 35-year-old man reported that he broke free from the group and chased the man out of the establishment, and he later transported himself to Illinois Masonic Hospital for treatment, police said. The man was described as white/Hispanic, age 40 to 50, about 5-8 and 200 pounds, wearing a black leather jacket, boots and dark blue jeans. A MAN REPORTED that a man vandalized his vehicle and threatened him at gunpoint during an apparent domestic-related incident at his home in the 3200 block of North Keeler Avenue, according to 17th (Albany Park) District police. The man reported that his girlfriend’s ex-boyfriend came to his house and tapped on his window to get his attention, and that when he went to the front door the pointed a black revolver through the door window and demanded to be let inside before he called police and the armed man left, according to police. The man reported that he discovered the windshield to his work van was also shattered, police said. The man was described as white/Hispanic, age 31 or 32, about 5-6 and 180 pounds, with a shaved head, an olive-colored skin complexion, and wearing a black sweater. A MAN REPORTED that his apartment in the 3800 block of West Belle Plaine Avenue was burglarized and that his car was stolen between 12:30 a.m. and 11 a.m. Saturday, Feb. 23, according to 17th (Albany Park) District police. The man reported that when he woke up he discovered that a front window screen was raised with a broken window lock mechanism, and that his Xbox One videogame console and house and car keys were missing from his home and that his vehicle was missing from its parking spot on Belle Plaine, according to police. A MAN AND two women reported that their apartment in the 3500 block of West Melrose Street was burglarized between 7 a.m. and 4:30 p.m. Tuesday, Feb. 26, according to 17th (Albany Park) District police. The residents reported that when they returned home they discovered that the front basement door was open and that six gold chains, four gold bracelets, three perfume bottles, two wedding rings, two gold watches, a gold ring, a pair of earrings, an HP laptop computer, an iPod music device and $240 in cash were missing. LINCOLNWOOD Crime 3-2 A WOMAN reported that her vehicle was vandalized between noon Sunday, Feb. 24, and 3:45 p.m. Monday, Feb. 25, in the 7000 block of North Hamlin Avenue, according to Lincolnwood police. The 31-year-old woman reported that when she returned to her 2014 Toyota Camry she discovered scratches on her driver’s side doors that appeared to be "keyed," according to police.
Anyone for cricket - in the middle of the sea? BRAMBLE BANK, England (Reuters) - Gathered on a strip of sand in what is normally a busy shipping lane, a group of men in white uniforms and a dog played cricket on Thursday, fusing Britain’s passion for sport and eccentricity. The match on Bramble Bank is played once a year in August, when enough of it appears during the spring tide. The sandbar sits in the Solent, the strait that runs between the Isle of Wight and England’s South Coast. The teams are formed by members of the Island Sailing Club in Cowes and The Royal Southern Yacht Club in Hamble, who by arrangement win in alternate years - in part because a rising tide can suddenly stop play. “How many other cricket matches do you play in the middle of nowhere, in a place which doesn’t exist a matter of moments after the game?” said Tom Richardson, 73, one of the organizers, when asked why the tradition has endured. Organizers said the first match was played in the 1960s, but it was not until 1986 that it became the regular event it is today - with crowds of spectators in boats and even a small post box erected to give the sandbank something of a village green feel. Summing up the fixture’s appeal, player Andrew Given, 53, said: “It’s quintessentially English and a little bit bonkers.” Reporting by Hannah McKay; Writing by Mark Hanrahan in London; editing by John Stonestreet
Effects of platinum (Pt4+) on Lumbriculus variegatus Müller (Annelida, Oligochaetae): acute toxicity and bioaccumulation. The acute toxicity and bioaccumulation (rates, kinetic) of tetravalent platinum in Lumbriculus variegatus under different physicochemical conditions (temperature and total water hardness) were investigated. Increased Pt4+ concentration (from 0.05 to 50 mg/L), exposure (up to 30 days), temperature (from 4 to 20 degrees C) and decreasing water hardness (from 300 to 0 mg/L CaCO3) increased Pt toxicity. The metal accumulated at a constant rate that was concentration, temperature and time dependent. The median lethal concentration (96h LC50) varied greatly from 0.397 mg/L in distilled water to 30 mg/L in the hard water from Champagne. Thus, L. var. can tolerate high levels of Pt. As a result, L. var. can be used in the laboratory to analyze mechanisms of adaptation to the induced stress and in the field as an indicator of Pt pollution.
Q: Issue with DatePicker - RSelenium I'm scraping publicly available data for academic research. The website I'm pulling the information from has a really annoying datepicker though. I'm not sure if they implement this to deter private companies from scraping criminal data but it seems pretty dumb. Here's the url. I can bypass the Captcha with my institutional credentials, FYI. You can see code - minus the login information - below: #Miami Scraper rm(list=ls()) remDr$close() rm(rD) gc() rm(list=ls()) setwd("~/Desktop/Miami Scrape") library(httr) library(rvest) library(zoo) library(anytime) library(lubridate) library(dplyr) library(RSelenium) browser <- remoteDriver(port = 5556, browserName = "firefox") remDr<-browser[["client"]] url <- "https://www2.miami-dadeclerk.com/PremierServices/login.aspx" rD <- rsDriver(verbose=FALSE,port=4444L,browser="firefox") remDr <- rD$client remDr$navigate(url) #Click the Logging In Option #Log-in stuff happens here url2 <- "https://www2.miami-dadeclerk.com/cjis/casesearch.aspx" remDr <- rD$client remDr$navigate(url2) #Here, you will read in the sheets. Let's start with a handful date <- c("02", "01", "01") sequence <- c("030686","027910","014707") seqbar <- remDr$findElement("id","txtCaseNo3") seqbar$sendKeysToElement(list(sequence[1])) type <- remDr$findElement("id","ddCaseType") type$clickElement() type$sendKeysToElement(list("F","\n")) yearbar <- remDr$findElement("id","txtCaseNo2") yearbar$clearElement() prev <- remDr$setTimeout("2000") yearbar$sendKeysToElement(list(date[1])) Invariably, the datepicker defaults to 19 but this isn't systematic. I'm only beginning to develop the code but I notice if I use the same case information for two searches in a row that it'll switch from "02" to "19" regularly. If I switch to another case, it may not work either. I'm not sure how to deal with this datepicker. Any help would be greatly appreciated. I've tried a couple of things. As you can see, I've tried to clear out the default and slow my code, too. That doesn't seem to work. Also one last note, if you line-by-line run the code it works but execution all at once won't run properly. A: I can't test with R as can't seem to get RSelenium set up, but changing the value attribute of the year input box seems to work. In R it looks like there are two ways to do that. Can't test, but something like: year <- '02' #method 1 using inbuilt method which executes js under hood remDr$findElement('id','txtCaseNo2')$setElementAttribute('value',year) #method 2 js direct js <- paste0("document.querySelector('#txtCaseNo2').value='", year,"';") remDr$executeScript(js) Anyway, might be enough to get you on track for a solution. I tested similar versions with Python successfully from selenium import webdriver d = webdriver.Chrome() d.get('https://www2.miami-dadeclerk.com/cjis/casesearch.aspx?AspxAutoDetectCookieSupport=1') case_nums = ["030686"] year = '02' d.execute_script("document.querySelector('#txtCaseNo2').value='" + year + "';") # d.execute_script("arguments[0].value = '02';", d.find_element_by_id('txtCaseNo2')) d.find_element_by_id('txtCaseNo3').send_keys(case_nums[0]) d.find_element_by_css_selector('[value=F]').click() captcha = input() d.find_element_by_id('CaptchaCodeTextBox').send_keys(captcha) d.find_element_by_id('btnCaseSearch').click()
// #Regression #Conformance #DeclarationElements #Accessibility // Verify error when using a private implicit constructor //<Expects id="FS0509" span="(24,10-24,18)" status="error">Method or object constructor 'C' not found</Expects> type A public (x : int) = member this.Value = x type B internal (x : int) = member this.Value = x type C private (x : int) = member this.Value = x // OK: Access public ctor let t1 = new A(1) if t1.Value <> 1 then exit 1 // OK: Access internal ctor let t2 = new B(2) if t2.Value <> 2 then exit 1 // ERROR: Access private ctor let t3 = new C(3) if t3.Value <> 3 then exit 1
I am very sure that to her it might mean nothing ... People put on cloth even worse and her clothing isn't something even dat bad. But she should be aware that uploading such on social media would bring comment like "Omo Pastor" or even put her in the news just like it just did.
1 = -s*i for i. 1 Let k = -30 + 46. Let f(w) = -w**3 + 5*w**2 - 4*w + 3. Let g be f(4). Solve -n = g*n + k for n. -4 Suppose k = -3*k. Solve -s = -k*s for s. 0 Let p = -2 - -4. Solve p = r - 0 for r. 2 Let q be (3 - 3)/(1/(-1)). Suppose b = -q*b + 2. Solve b*l = -3*l + 20 for l. 4 Let l(n) = n**2 + n - 1. Let p be l(2). Let o = 8 - p. Suppose 7 = -5*z - 3*m - 0*m, 0 = o*z + 4*m + 13. Solve 3*x = -z - 8 for x. -3 Suppose 0 = -2*a + 8 - 6. Let j be a + 2 + (-2)/2. Solve j*g = 7*g + 20 for g. -4 Let c(f) = 4*f - 1. Let r be c(1). Solve 0 = -r*u + 6*u for u. 0 Suppose -52 = -8*p - 12. Solve -31 = p*y - 11 for y. -4 Suppose -5*m - 26 - 19 = 0. Let t be 9*(3 - (-15)/m). Solve -t = -0*n - 3*n for n. 4 Let z(n) = n**3 - 6*n**2 + 2. Let q be z(6). Solve j + q*j = -3 for j. -1 Let g be (1/(-5))/(4/(-20)). Suppose 4*b - 7 = g. Solve 0*m + m - b = 0 for m. 2 Let f(k) = -7*k**3 + 2*k**2 - 1. Let w be f(-1). Suppose -a + w = a. Suppose -t + 30 = a*t. Solve 16 = -2*x + t*x for x. 4 Let c(r) = -r - 2. Suppose -5*a + 0*a = 3*n + 37, -4*a - 40 = 5*n. Let o be c(a). Suppose 12 = -2*s + 3*g, 5*s - 2*g - o*g + 20 = 0. Solve s*y = -y for y. 0 Suppose 6*u - 26 - 46 = 0. Solve -4*v - u = -v for v. -4 Let q(j) = -j**2 - 17*j - 24. Let n be q(-15). Solve n = -k + 4 for k. -2 Let p(l) = -l**3 + 4*l**2 - 2. Let y be p(4). Let u be 23/6*(8 + y). Solve -7 + u = 4*r for r. 4 Let h(y) = y**3 - 5*y**2 + 2*y - 6. Let r = -4 - -9. Let k be h(r). Solve d - k*d = -15 for d. 5 Let m(a) = 3 + a**3 - 4 + 2*a + 3*a - 5*a**2. Let u = 11 - 7. Let r be m(u). Solve 4*z - r = z for z. 1 Suppose 3*n + n + 4*q - 24 = 0, 3*n - 5*q + 14 = 0. Let r = n + 1. Solve -4 = r*b - b for b. -2 Let d be (2 + (-21)/4)*-4. Let h = d - 9. Let w(r) = -r**2 + 8*r - 5. Let o be w(4). Solve -h = -5*t + o for t. 3 Suppose 4*w - 10 = 2*w. Suppose 14 + 1 = 3*o. Solve w + 10 = o*v for v. 3 Let o = -35 - -40. Solve -o*u = -3*u + 6 for u. -3 Suppose 48 = 19*u - 16*u. Solve 0*i - u = -4*i for i. 4 Suppose -3*q + 8*q - 55 = 0. Let k = 15 - q. Let i = -8 + 11. Solve i*g - 10 = -k for g. 2 Let x(k) = k**2 + 4*k + 6. Let u be x(-4). Suppose 0 = -u*d + d, 0 = 4*z - d - 8. Suppose 3 = z*w + w. Solve -3 = 4*p + w for p. -1 Let q(t) = 10*t - 30. Let y be q(5). Solve -2*r = 3*r + y for r. -4 Let q be 18/(-5)*(-10)/4. Let d = -9 + q. Solve d = -3*o + 6*o + 3 for o. -1 Suppose 6*i = 82 - 58. Solve -11*a + 13*a = -i for a. -2 Suppose 8*g + 16 = 10*g. Solve 2*q + 2*q = -g for q. -2 Let t = -38 - -17. Let z = -21 - t. Solve z = 6*m - m + 20 for m. -4 Let t(q) = 14*q**3 + q**2 + q - 1. Let b be (12/(-16))/(1/4). Let r = -2 - b. Let m be t(r). Solve -5*k = -5 + m for k. -2 Let z(k) = -k**3 + 11*k**2 - k + 13. Let r be z(11). Solve -r*n - 9 = -1 for n. -4 Let m = -7 - -1. Suppose -g = g - 2*j, 0 = -3*g + j - 4. Let s = g - m. Solve -8*q + s = -4*q for q. 1 Suppose 0 = 5*c + 2*z - 3*z + 34, 2*z = 2*c + 12. Let l = 15 + c. Solve -l = -2*f + 6*f for f. -2 Suppose 0*t - 25 = -5*t. Let z = -716 - -720. Solve t*w - 1 = z for w. 1 Let j = 6 + -3. Suppose -j*d = -0*d. Solve d = 5*c - 9 + 34 for c. -5 Let h be (-142)/3 + 3/9. Let z be ((-2)/(-1))/(1/34). Let x = z + h. Solve x = 4*a + 5 for a. 4 Let h(a) = -a + 6. Let i be h(4). Let y = i - -8. Solve y = -4*d - d for d. -2 Let f be 18/(-4)*2/(-3). Let n(c) = -c - 2. Let w(d) = d**2 + 9*d + 9. Let z be w(-6). Let h be n(z). Solve f*i = h*i for i. 0 Suppose -4*r - 2*g + 36 = 2*g, -5*r - 3*g = -39. Suppose -4*f = -5*z, 0*z - z + 4 = 0. Solve -5*y - f = -r*y for y. 5 Let z be 1/(((-33)/44)/((-3)/2)). Suppose -2*p + 9 + 1 = 0. Solve z*s - 15 = p*s for s. -5 Let v = -7 - -10. Let y = 7 + 2. Solve v*p + y = -0*p for p. -3 Let j be (-8)/12 + (-8)/(-3). Let r(g) = 2*g - 2*g - j*g + 3. Let w be r(-4). Solve -w = -3*f - 5 for f. 2 Let i be ((-3)/12)/((-2)/248). Let o = -13 + i. Let v be 4/o - 112/(-63). Solve -v + 4 = d for d. 2 Suppose 0 = 7*g + 5 - 12. Solve -b = -2*b - g for b. -1 Let g be 1 - -2 - -1*1. Suppose 0*l + l = g. Solve -x - l = x for x. -2 Let f(q) = q**2 - q. Let v be f(0). Suppose 3*g = -5*s + 15, 2*s - 3*g - 2*g + 25 = 0. Let l = s - -3. Solve v = -l*o + 2 + 13 for o. 5 Let d(j) = -j + 7. Suppose -z = -0*z. Let u be d(z). Solve -2*l = u + 1 for l. -4 Suppose -4*w + 0*l - 5*l + 85 = 0, -115 = -4*w + 5*l. Solve 3*a + 2*a = w for a. 5 Let b(l) = l - 4. Let m be b(11). Let t = -6 + m. Let f = t - -1. Solve -f*g = 3*g for g. 0 Let i be -2*(-13)/6 - 16/(-24). Solve 10 = 3*l - i for l. 5 Let d = 12 + 2. Let o = 89 - 83. Solve d = -2*f + o for f. -4 Let f(l) = -l**2 - 4*l - 1. Let h be f(-3). Solve -h + 3 = -i for i. -1 Let s be (-2)/(0 - -2)*-1. Let y = 31 - 31. Suppose -s + y = -k. Solve 0 = -3*l - 8 - k for l. -3 Suppose -2*d + l + 7 = 0, -3 - 2 = -d + 2*l. Solve -d*c = 2*c - 10 for c. 2 Suppose 7*c = 10*c. Solve c - 4 = -4*n for n. 1 Suppose -4*n + 47 = 5*w, -4*w + 5 + 15 = n. Suppose -12 - n = -5*l. Suppose -4*y = -f + 2*f, 5*y = 4*f. Solve l*r = -f*r for r. 0 Let w be (1 - 4)*(-1 + 0/4). Solve 3*n + 6 = -w for n. -3 Let y(w) = -w**3 - 5*w**2 + 4. Let t be y(-5). Let k be (-39)/(-9) - (-2)/(-6). Solve 2*d - k*d + t = 0 for d. 2 Let j = -39 - -28. Let t = -8 - j. Suppose -t*v + 18 = -9. Solve -v = 3*h - 6*h for h. 3 Let f be (-2)/(-4)*(-2 - -8). Solve 2*r - 5 = -f for r. 1 Suppose -2*c = -0 - 20. Let v be 2/(-2 + 0) - -3. Suppose -12 = -q - v*q. Solve -c = -i - q*i for i. 2 Let n(w) = w**2 - w + 3. Let r be n(0). Let o(j) = -j**3 + 12*j**2 + 15*j - 24. Let m be o(13). Solve -r*l + m*l + 1 = 0 for l. 1 Let t be -2 + 4 + (4 - 2). Let p = 3 + t. Let h = -5 + p. Solve 0 = -h*d + 4*d for d. 0 Let j = 18 - 16. Let y be (-2*(-1)/(-2))/(-1). Solve y = -s - j for s. -3 Let s(o) = -3*o**3 + 5*o + 1 + 0*o**3 - 3*o. Let b be s(-1). Solve b*r = r for r. 0 Let c = 13 - 8. Suppose -4*r + c*h + 10 = r, -4*r = h + 2. Solve r = 2*o + 2*o for o. 0 Let s = -103 + 118. Solve s = -4*p - p for p. -3 Let i be (2/(-6))/((-1)/(-33)). Let n = 16 + i. Suppose 5*b - 62 = -2*k - 7, -n*b + 70 = 5*k. Solve 0 = 3*x + b + 6 for x. -5 Suppose -3*l + 3 = 0, 2*y - 6 = 3*l - 7. Solve -4 = -t - y for t. 3 Let p(z) = z + 13. Let b be p(-6). Let r = 7 - b. Solve r*l = 4*l - 16 for l. 4 Let m be 27/4 - 4/(-16). Solve -5*x = m + 3 for x. -2 Let y be 2 - ((-66)/18 - 2/(-3)). Solve 13 = -y*n + 3 for n. -2 Let b be (-4)/(-28) + 30/35. Solve -9 = -2*l - b for l. 4 Let s(x) = x**2 + x - 1. Suppose 5*t - 6 = 4. Let m be s(t). Suppose m*k - 3*a = -6 - 3, -2*a = -6. Solve -2 = z - k for z. -2 Let c be -16 + 11 - 66/(-2). Solve c - 3 = 5*d for d. 5 Let u(h) = -h**3 - 6*h**2 - 2*h - 6. Let q be u(-6). Let o = 0 - -4. Suppose 0 = o*g - q - 2. Solve g*w - 25 = 7*w for w. -5 Let h = 9 - 15. Suppose 4*x - 7 - 5 = 0, -3*c + x - 48 = 0. Let m be h/c - (-8)/5. Solve -r - m = r for r. -1 Suppose -4*p - 2*a - 3*a = -93, 2*p - a - 43 = 0. Let c be -2 + p - 0/1. Solve 2*b + 3*b = -c for b. -4 Let p = -5 + 1. Let f(t) = -t**2 - 6*t - 2. Let w be f(p). Solve 2*n + 8 = w*n for n. 2 Let l(k) be the third derivative of k**5/60 - k**4/24 + 8*k**3/3 + 6*k**2. Let f be l(0). Solve f = 4*u - 0 for u. 4 Suppose 0 = 5*z - 0*z. Suppose -q = q - 4. Let a(u) = -u**3 - 4*u**2 + 5*u. Let x be a(-5). Solve g + z - q = x for g. 2 Let s be (-34)/(-14) + (-12)/(-21). Solve -2*q + s + 7 = 0 for q. 5 Let h = -4 - -6. Let c be (-2)/(3 + 1)*-2. Let y be (c + 0 - 2)/(-1). Solve h - y = z for z. 1 Let c be (-26)/(3/(-3)*2). Solve -c = -5*n + 7 for n. 4 Suppose r - 6*r - 10 = 0. Suppose 5*v + 3 + 12 = 0. Let w = r - v. Solve w = l + 5 for l. -4 Suppose 0 = 2*a - 4. Suppose 3*y - a*y = 9. Suppose -1 = -5*f + y. Solve 0*j + f*j + 2 = 0 for j. -1 Suppose -2*y - 5 = -11. Solve -y*k + 4 = -8 for k. 4 Let o(u) = u + 5. Let h be o(-2). Solve 16 = -7*j + h*j for j. -4 Suppose 4*a - 20 = 28. Solve b = -3*b - a for b. -3 Let c(u) = -3*u + 55. Let y be c(17). Solve -6*m - 10 = -y*m for m. -5 Let z = 4 + -4. Let x be 2 - z - 0 - -1. Let v be 1 + 0 + x + 0. Solve -i - 1 = v for i. -5 Let i be (-1378)/(-117) + (-4)/(-18) - 2. Solve -3*u + u = i for u. -5 Let p = 2 + 1. Suppose -5*h = -p*h - 8. Solve -3*t - t - h = 0 for t. -1 Let u(s) = s**2 + 9*s - 6. Let g be u(-10). Suppose -4*p = -4*m - g, 0 = -m + 2*p - 1 - 4. Solve -m*l = -2*l for l. 0 Let w(t) = t**3 + 5*t**2 + 8*t + 8. Let x be
Melanoma Differentiation-Associated Gene 5 Positively Modulates TNF-α-Induced CXCL10 Expression in Cultured HuH-7 and HLE Cells. The molecular mechanisms of innate immunity are closely associated with the development of non-alcoholic fatty liver disease (NAFLD). TNF-α is a key cytokine involved in the pathogenesis of metabolic inflammation like NAFLD. Melanoma differentiation-associated gene 5 (MDA5) is a member of the intracellular RNA helicase family proteins that play a pivotal role in an antiviral immune response. Previous studies have demonstrated that TNF-α induces the expression of MDA5 in some types of cells. However, the correlation between TNF-α and the expression of MDA5 in hepatocytes remains unknown. In the present study, we used two human hepatocellular carcinoma cell lines, HuH-7 and HLE, and examined the expression of MDA5 in these cells upon stimulation with TNF-α. The expression of MDA5 induced by TNF-α was analyzed by quantitative real-time RT-PCR and western blotting. Next, RNA interference against MDA5 was performed and the expressions of CXCL10 and STAT1 were examined. We found that the expression of MDA5 had increased upon stimulation with TNF-α in a concentration-dependent manner. Gene silencing against MDA5 suppressed the expression of TNF-α-induced CXCL10 in both cells. In HLE cells, gene silencing of MDA5 impaired STAT1 phosphorylation 24 h after stimulation with TNF-α. On the other hand, TNF-α-induced STAT1 phosphorylation was not detected in HuH-7 cells. These results indicated that MDA5 positively modulated the TNF-α-induced expression of CXCL10 in both STAT1-dependent and -independent manner and may be associated with metabolic inflammation in the liver.
We’ve encountered Michael Voris before: the painfully dogmatic and fervent Catholic Dominionist kook. He has a ridiculous video in which he asserts that theology is the queen of all the sciences because everything reduces to god, ultimately — which does leave one wondering why theology never produces any ideas that are actually useful to all of those scientific disciplines. I mean, take math for example: mathematicians are constantly coming up with tools and ideas that chemists and physicists and biologists and geologists all find awesomely useful. But what has theology given us? Nothing. Michael drones on, going through the motions — he really seems dead-eyed and robotic in this video, doesn’t he? — and you probably got bored 30 seconds into the 5 minute clip. So I want to focus on just one point that Voris made, and mentioned in the caption, and which actually isn’t unique to Catholic nutjobs at all. The fields of science can offer all kinds of information in answer to the question how… through the observance of the human intellect. But when asking the question why, man MUST turn to the divinity of the Creator. How many times have you heard that claim: science can answer “how” questions, but it can never answer “why” questions, therefore we have to leave those kinds of questions to a non-scientific domain, which must be religion, therefore god. And that’s wrong at every step! There’s no reason the interpreter of “why” questions has to be religion…why not philosophy? That seems a more sensible objective source than a religion burdened with a dogma and a holy book and wedded to revelation rather than reason. Voris assumes there has to be a divine creator, but that’s one of the questions, and you don’t get to just let it go begging like that. The more fundamental question, though, is this oft-repeated distinction that science can’t answer “why” questions. Of course it can, if there’s a “why” in the first place! We are perfectly capable of asking whether there is agency behind a phenomenon, and if there is, of exploring further and identifying purpose. Why should we think otherwise? Imagine you came home, as I did the other day, and saw this on the edge of your yard. You’d immediately assume it was artificial, as I did — the perfectly circular outline suggests that a machine came by, and someone lowered some auger-like device and drilled a large hole in the yard. You could also look up and down the street and see that the hole-driller had struck several other places, all in a line parallel to the road and exactly the same distance from the curb. They are almost certainly the product of intent. Does that in any way imply that I’m now done, that asking why these holes were dug is beyond the scope of all rational inquiry? That I ought to drop to my knees and praise ineffable Jesus, who caused holes to manifest in the ground for reasons that I, as a mere mortal man, cannot possibly question? Oh, Lord, mine is not to question why, I must accept what is! Of course not. I can speculate reasonably; it looks like a hole for planting something in. I can check into the city offices, and learn that there’s concern about emerald ash borers killing trees in our community. I can see the next day that a city crew came by and put new saplings in place all up and down the street. Even without actually talking to anyone directly, I can figure out from the evidence why there is a hole in my yard. Similarly, if there was a god busily poofing the entirety of the cosmos into existence, that’s an awful lot of evidence that can be examined for motive…are we to instead believe it is so incoherent that we can discern no possible purpose behind all this data? And what if instead, I’d come home and found one hole in the neighborhood, it was a rough-edged and asymmetrical crater, and in the center of it was a small rocky meteorite? Then I could ask how it came to be there (it fell out of the sky and smacked into my yard), and I could try to ask why, but the answer would be that there was no agency behind it, there was no purpose, and it was simply a chance event of a kind that happens all the time. When people try to argue that science can’t answer “why” questions, what they’re actually saying is that they don’t like the answer they get — there is no why! There is no purpose or intent! — and are actually trying to say that the only valid answer they’ll accept is one that names an intelligence and gives it a motive. That is, they want an answer that names a god as an ultimate cause, and a description that doesn’t include agency doesn’t meet their presuppositions.
/* +----------------------------------------------------------------------+ | PHP Version 7 | +----------------------------------------------------------------------+ | Copyright (c) 1997-2017 The PHP Group | +----------------------------------------------------------------------+ | This source file is subject to version 3.01 of the PHP license, | | that is bundled with this package in the file LICENSE, and is | | available through the world-wide-web at the following url: | | http://www.php.net/license/3_01.txt | | If you did not receive a copy of the PHP license and are unable to | | obtain it through the world-wide-web, please send a note to | | [email protected] so we can mail you a copy immediately. | +----------------------------------------------------------------------+ | Authors: Rasmus Lerdorf <[email protected]> | | Zeev Suraski <[email protected]> | +----------------------------------------------------------------------+ */ /* $Id$ */ #include <stdio.h> #include "php.h" #include "ext/standard/php_standard.h" #include "ext/standard/credits.h" #include "zend_smart_str.h" #include "php_variables.h" #include "php_globals.h" #include "php_content_types.h" #include "SAPI.h" #include "zend_globals.h" #ifdef PHP_WIN32 # include "win32/php_inttypes.h" #endif /* for systems that need to override reading of environment variables */ void _php_import_environment_variables(zval *array_ptr); PHPAPI void (*php_import_environment_variables)(zval *array_ptr) = _php_import_environment_variables; PHPAPI void php_register_variable(char *var, char *strval, zval *track_vars_array) { php_register_variable_safe(var, strval, strlen(strval), track_vars_array); } /* binary-safe version */ PHPAPI void php_register_variable_safe(char *var, char *strval, size_t str_len, zval *track_vars_array) { zval new_entry; assert(strval != NULL); /* Prepare value */ ZVAL_NEW_STR(&new_entry, zend_string_init(strval, str_len, 0)); php_register_variable_ex(var, &new_entry, track_vars_array); } PHPAPI void php_register_variable_ex(char *var_name, zval *val, zval *track_vars_array) { char *p = NULL; char *ip = NULL; /* index pointer */ char *index; char *var, *var_orig; size_t var_len, index_len; zval gpc_element, *gpc_element_p; zend_bool is_array = 0; HashTable *symtable1 = NULL; ALLOCA_FLAG(use_heap) assert(var_name != NULL); if (track_vars_array && Z_TYPE_P(track_vars_array) == IS_ARRAY) { symtable1 = Z_ARRVAL_P(track_vars_array); } if (!symtable1) { /* Nothing to do */ zval_dtor(val); return; } /* ignore leading spaces in the variable name */ while (*var_name && *var_name==' ') { var_name++; } /* * Prepare variable name */ var_len = strlen(var_name); var = var_orig = do_alloca(var_len + 1, use_heap); memcpy(var_orig, var_name, var_len + 1); /* ensure that we don't have spaces or dots in the variable name (not binary safe) */ for (p = var; *p; p++) { if (*p == ' ' || *p == '.') { *p='_'; } else if (*p == '[') { is_array = 1; ip = p; *p = 0; break; } } var_len = p - var; if (var_len==0) { /* empty variable name, or variable name with a space in it */ zval_dtor(val); free_alloca(var_orig, use_heap); return; } /* GLOBALS hijack attempt, reject parameter */ if (symtable1 == &EG(symbol_table) && var_len == sizeof("GLOBALS")-1 && !memcmp(var, "GLOBALS", sizeof("GLOBALS")-1)) { zval_dtor(val); free_alloca(var_orig, use_heap); return; } index = var; index_len = var_len; if (is_array) { int nest_level = 0; while (1) { char *index_s; size_t new_idx_len = 0; if(++nest_level > PG(max_input_nesting_level)) { HashTable *ht; /* too many levels of nesting */ if (track_vars_array) { ht = Z_ARRVAL_P(track_vars_array); zend_symtable_str_del(ht, var, var_len); } zval_dtor(val); /* do not output the error message to the screen, this helps us to to avoid "information disclosure" */ if (!PG(display_errors)) { php_error_docref(NULL, E_WARNING, "Input variable nesting level exceeded " ZEND_LONG_FMT ". To increase the limit change max_input_nesting_level in php.ini.", PG(max_input_nesting_level)); } free_alloca(var_orig, use_heap); return; } ip++; index_s = ip; if (isspace(*ip)) { ip++; } if (*ip==']') { index_s = NULL; } else { ip = strchr(ip, ']'); if (!ip) { /* PHP variables cannot contain '[' in their names, so we replace the character with a '_' */ *(index_s - 1) = '_'; index_len = 0; if (index) { index_len = strlen(index); } goto plain_var; return; } *ip = 0; new_idx_len = strlen(index_s); } if (!index) { array_init(&gpc_element); if ((gpc_element_p = zend_hash_next_index_insert(symtable1, &gpc_element)) == NULL) { zval_ptr_dtor(&gpc_element); zval_dtor(val); free_alloca(var_orig, use_heap); return; } } else { gpc_element_p = zend_symtable_str_find(symtable1, index, index_len); if (!gpc_element_p) { zval tmp; array_init(&tmp); gpc_element_p = zend_symtable_str_update_ind(symtable1, index, index_len, &tmp); } else { if (Z_TYPE_P(gpc_element_p) == IS_INDIRECT) { gpc_element_p = Z_INDIRECT_P(gpc_element_p); } if (Z_TYPE_P(gpc_element_p) != IS_ARRAY) { zval_ptr_dtor(gpc_element_p); array_init(gpc_element_p); } } } symtable1 = Z_ARRVAL_P(gpc_element_p); /* ip pointed to the '[' character, now obtain the key */ index = index_s; index_len = new_idx_len; ip++; if (*ip == '[') { is_array = 1; *ip = 0; } else { goto plain_var; } } } else { plain_var: ZVAL_COPY_VALUE(&gpc_element, val); if (!index) { if ((gpc_element_p = zend_hash_next_index_insert(symtable1, &gpc_element)) == NULL) { zval_ptr_dtor(&gpc_element); } } else { /* * According to rfc2965, more specific paths are listed above the less specific ones. * If we encounter a duplicate cookie name, we should skip it, since it is not possible * to have the same (plain text) cookie name for the same path and we should not overwrite * more specific cookies with the less specific ones. */ if (Z_TYPE(PG(http_globals)[TRACK_VARS_COOKIE]) != IS_UNDEF && symtable1 == Z_ARRVAL(PG(http_globals)[TRACK_VARS_COOKIE]) && zend_symtable_str_exists(symtable1, index, index_len)) { zval_ptr_dtor(&gpc_element); } else { gpc_element_p = zend_symtable_str_update_ind(symtable1, index, index_len, &gpc_element); } } } free_alloca(var_orig, use_heap); } typedef struct post_var_data { smart_str str; char *ptr; char *end; uint64_t cnt; /* Bytes in ptr that have already been scanned for '&' */ size_t already_scanned; } post_var_data_t; static zend_bool add_post_var(zval *arr, post_var_data_t *var, zend_bool eof) { char *start, *ksep, *vsep, *val; size_t klen, vlen; size_t new_vlen; if (var->ptr >= var->end) { return 0; } start = var->ptr + var->already_scanned; vsep = memchr(start, '&', var->end - start); if (!vsep) { if (!eof) { var->already_scanned = var->end - var->ptr; return 0; } else { vsep = var->end; } } ksep = memchr(var->ptr, '=', vsep - var->ptr); if (ksep) { *ksep = '\0'; /* "foo=bar&" or "foo=&" */ klen = ksep - var->ptr; vlen = vsep - ++ksep; } else { ksep = ""; /* "foo&" */ klen = vsep - var->ptr; vlen = 0; } php_url_decode(var->ptr, klen); val = estrndup(ksep, vlen); if (vlen) { vlen = php_url_decode(val, vlen); } if (sapi_module.input_filter(PARSE_POST, var->ptr, &val, vlen, &new_vlen)) { php_register_variable_safe(var->ptr, val, new_vlen, arr); } efree(val); var->ptr = vsep + (vsep != var->end); var->already_scanned = 0; return 1; } static inline int add_post_vars(zval *arr, post_var_data_t *vars, zend_bool eof) { uint64_t max_vars = PG(max_input_vars); vars->ptr = ZSTR_VAL(vars->str.s); vars->end = ZSTR_VAL(vars->str.s) + ZSTR_LEN(vars->str.s); while (add_post_var(arr, vars, eof)) { if (++vars->cnt > max_vars) { php_error_docref(NULL, E_WARNING, "Input variables exceeded %" PRIu64 ". " "To increase the limit change max_input_vars in php.ini.", max_vars); return FAILURE; } } if (!eof && ZSTR_VAL(vars->str.s) != vars->ptr) { memmove(ZSTR_VAL(vars->str.s), vars->ptr, ZSTR_LEN(vars->str.s) = vars->end - vars->ptr); } return SUCCESS; } #ifdef PHP_WIN32 #define SAPI_POST_HANDLER_BUFSIZ 16384 #else # define SAPI_POST_HANDLER_BUFSIZ BUFSIZ #endif SAPI_API SAPI_POST_HANDLER_FUNC(php_std_post_handler) { zval *arr = (zval *) arg; php_stream *s = SG(request_info).request_body; post_var_data_t post_data; if (s && SUCCESS == php_stream_rewind(s)) { memset(&post_data, 0, sizeof(post_data)); while (!php_stream_eof(s)) { char buf[SAPI_POST_HANDLER_BUFSIZ] = {0}; size_t len = php_stream_read(s, buf, SAPI_POST_HANDLER_BUFSIZ); if (len && len != (size_t) -1) { smart_str_appendl(&post_data.str, buf, len); if (SUCCESS != add_post_vars(arr, &post_data, 0)) { smart_str_free(&post_data.str); return; } } if (len != SAPI_POST_HANDLER_BUFSIZ){ break; } } if (post_data.str.s) { add_post_vars(arr, &post_data, 1); smart_str_free(&post_data.str); } } } #undef SAPI_POST_HANDLER_BUFSIZ SAPI_API SAPI_INPUT_FILTER_FUNC(php_default_input_filter) { /* TODO: check .ini setting here and apply user-defined input filter */ if(new_val_len) *new_val_len = val_len; return 1; } SAPI_API SAPI_TREAT_DATA_FUNC(php_default_treat_data) { char *res = NULL, *var, *val, *separator = NULL; const char *c_var; zval array; int free_buffer = 0; char *strtok_buf = NULL; zend_long count = 0; ZVAL_UNDEF(&array); switch (arg) { case PARSE_POST: case PARSE_GET: case PARSE_COOKIE: array_init(&array); switch (arg) { case PARSE_POST: zval_ptr_dtor(&PG(http_globals)[TRACK_VARS_POST]); ZVAL_COPY_VALUE(&PG(http_globals)[TRACK_VARS_POST], &array); break; case PARSE_GET: zval_ptr_dtor(&PG(http_globals)[TRACK_VARS_GET]); ZVAL_COPY_VALUE(&PG(http_globals)[TRACK_VARS_GET], &array); break; case PARSE_COOKIE: zval_ptr_dtor(&PG(http_globals)[TRACK_VARS_COOKIE]); ZVAL_COPY_VALUE(&PG(http_globals)[TRACK_VARS_COOKIE], &array); break; } break; default: ZVAL_COPY_VALUE(&array, destArray); break; } if (arg == PARSE_POST) { sapi_handle_post(&array); return; } if (arg == PARSE_GET) { /* GET data */ c_var = SG(request_info).query_string; if (c_var && *c_var) { res = (char *) estrdup(c_var); free_buffer = 1; } else { free_buffer = 0; } } else if (arg == PARSE_COOKIE) { /* Cookie data */ c_var = SG(request_info).cookie_data; if (c_var && *c_var) { res = (char *) estrdup(c_var); free_buffer = 1; } else { free_buffer = 0; } } else if (arg == PARSE_STRING) { /* String data */ res = str; free_buffer = 1; } if (!res) { return; } switch (arg) { case PARSE_GET: case PARSE_STRING: separator = (char *) estrdup(PG(arg_separator).input); break; case PARSE_COOKIE: separator = ";\0"; break; } var = php_strtok_r(res, separator, &strtok_buf); while (var) { val = strchr(var, '='); if (arg == PARSE_COOKIE) { /* Remove leading spaces from cookie names, needed for multi-cookie header where ; can be followed by a space */ while (isspace(*var)) { var++; } if (var == val || *var == '\0') { goto next_cookie; } } if (++count > PG(max_input_vars)) { php_error_docref(NULL, E_WARNING, "Input variables exceeded " ZEND_LONG_FMT ". To increase the limit change max_input_vars in php.ini.", PG(max_input_vars)); break; } if (val) { /* have a value */ size_t val_len; size_t new_val_len; *val++ = '\0'; php_url_decode(var, strlen(var)); val_len = php_url_decode(val, strlen(val)); val = estrndup(val, val_len); if (sapi_module.input_filter(arg, var, &val, val_len, &new_val_len)) { php_register_variable_safe(var, val, new_val_len, &array); } efree(val); } else { size_t val_len; size_t new_val_len; php_url_decode(var, strlen(var)); val_len = 0; val = estrndup("", val_len); if (sapi_module.input_filter(arg, var, &val, val_len, &new_val_len)) { php_register_variable_safe(var, val, new_val_len, &array); } efree(val); } next_cookie: var = php_strtok_r(NULL, separator, &strtok_buf); } if (arg != PARSE_COOKIE) { efree(separator); } if (free_buffer) { efree(res); } } void _php_import_environment_variables(zval *array_ptr) { char buf[128]; char **env, *p, *t = buf; size_t alloc_size = sizeof(buf); unsigned long nlen; /* ptrdiff_t is not portable */ for (env = environ; env != NULL && *env != NULL; env++) { p = strchr(*env, '='); if (!p) { /* malformed entry? */ continue; } nlen = p - *env; if (nlen >= alloc_size) { alloc_size = nlen + 64; t = (t == buf ? emalloc(alloc_size): erealloc(t, alloc_size)); } memcpy(t, *env, nlen); t[nlen] = '\0'; php_register_variable(t, p + 1, array_ptr); } if (t != buf && t != NULL) { efree(t); } } zend_bool php_std_auto_global_callback(char *name, uint name_len) { zend_printf("%s\n", name); return 0; /* don't rearm */ } /* {{{ php_build_argv */ PHPAPI void php_build_argv(char *s, zval *track_vars_array) { zval arr, argc, tmp; int count = 0; char *ss, *space; if (!(SG(request_info).argc || track_vars_array)) { return; } array_init(&arr); /* Prepare argv */ if (SG(request_info).argc) { /* are we in cli sapi? */ int i; for (i = 0; i < SG(request_info).argc; i++) { ZVAL_STRING(&tmp, SG(request_info).argv[i]); if (zend_hash_next_index_insert(Z_ARRVAL(arr), &tmp) == NULL) { zend_string_free(Z_STR(tmp)); } } } else if (s && *s) { ss = s; while (ss) { space = strchr(ss, '+'); if (space) { *space = '\0'; } /* auto-type */ ZVAL_STRING(&tmp, ss); count++; if (zend_hash_next_index_insert(Z_ARRVAL(arr), &tmp) == NULL) { zend_string_free(Z_STR(tmp)); } if (space) { *space = '+'; ss = space + 1; } else { ss = space; } } } /* prepare argc */ if (SG(request_info).argc) { ZVAL_LONG(&argc, SG(request_info).argc); } else { ZVAL_LONG(&argc, count); } if (SG(request_info).argc) { Z_ADDREF(arr); zend_hash_str_update(&EG(symbol_table), "argv", sizeof("argv")-1, &arr); zend_hash_str_add(&EG(symbol_table), "argc", sizeof("argc")-1, &argc); } if (track_vars_array && Z_TYPE_P(track_vars_array) == IS_ARRAY) { Z_ADDREF(arr); zend_hash_str_update(Z_ARRVAL_P(track_vars_array), "argv", sizeof("argv")-1, &arr); zend_hash_str_update(Z_ARRVAL_P(track_vars_array), "argc", sizeof("argc")-1, &argc); } zval_ptr_dtor(&arr); } /* }}} */ /* {{{ php_register_server_variables */ static inline void php_register_server_variables(void) { zval request_time_float, request_time_long; zval_ptr_dtor(&PG(http_globals)[TRACK_VARS_SERVER]); array_init(&PG(http_globals)[TRACK_VARS_SERVER]); /* Server variables */ if (sapi_module.register_server_variables) { sapi_module.register_server_variables(&PG(http_globals)[TRACK_VARS_SERVER]); } /* PHP Authentication support */ if (SG(request_info).auth_user) { php_register_variable("PHP_AUTH_USER", SG(request_info).auth_user, &PG(http_globals)[TRACK_VARS_SERVER]); } if (SG(request_info).auth_password) { php_register_variable("PHP_AUTH_PW", SG(request_info).auth_password, &PG(http_globals)[TRACK_VARS_SERVER]); } if (SG(request_info).auth_digest) { php_register_variable("PHP_AUTH_DIGEST", SG(request_info).auth_digest, &PG(http_globals)[TRACK_VARS_SERVER]); } /* store request init time */ ZVAL_DOUBLE(&request_time_float, sapi_get_request_time()); php_register_variable_ex("REQUEST_TIME_FLOAT", &request_time_float, &PG(http_globals)[TRACK_VARS_SERVER]); ZVAL_LONG(&request_time_long, zend_dval_to_lval(Z_DVAL(request_time_float))); php_register_variable_ex("REQUEST_TIME", &request_time_long, &PG(http_globals)[TRACK_VARS_SERVER]); } /* }}} */ /* {{{ php_autoglobal_merge */ static void php_autoglobal_merge(HashTable *dest, HashTable *src) { zval *src_entry, *dest_entry; zend_string *string_key; zend_ulong num_key; int globals_check = (dest == (&EG(symbol_table))); ZEND_HASH_FOREACH_KEY_VAL(src, num_key, string_key, src_entry) { if (Z_TYPE_P(src_entry) != IS_ARRAY || (string_key && (dest_entry = zend_hash_find(dest, string_key)) == NULL) || (string_key == NULL && (dest_entry = zend_hash_index_find(dest, num_key)) == NULL) || Z_TYPE_P(dest_entry) != IS_ARRAY) { if (Z_REFCOUNTED_P(src_entry)) { Z_ADDREF_P(src_entry); } if (string_key) { if (!globals_check || ZSTR_LEN(string_key) != sizeof("GLOBALS") - 1 || memcmp(ZSTR_VAL(string_key), "GLOBALS", sizeof("GLOBALS") - 1)) { zend_hash_update(dest, string_key, src_entry); } else if (Z_REFCOUNTED_P(src_entry)) { Z_DELREF_P(src_entry); } } else { zend_hash_index_update(dest, num_key, src_entry); } } else { SEPARATE_ARRAY(dest_entry); php_autoglobal_merge(Z_ARRVAL_P(dest_entry), Z_ARRVAL_P(src_entry)); } } ZEND_HASH_FOREACH_END(); } /* }}} */ /* {{{ php_hash_environment */ PHPAPI int php_hash_environment(void) { memset(PG(http_globals), 0, sizeof(PG(http_globals))); zend_activate_auto_globals(); if (PG(register_argc_argv)) { php_build_argv(SG(request_info).query_string, &PG(http_globals)[TRACK_VARS_SERVER]); } return SUCCESS; } /* }}} */ static zend_bool php_auto_globals_create_get(zend_string *name) { if (PG(variables_order) && (strchr(PG(variables_order),'G') || strchr(PG(variables_order),'g'))) { sapi_module.treat_data(PARSE_GET, NULL, NULL); } else { zval_ptr_dtor(&PG(http_globals)[TRACK_VARS_GET]); array_init(&PG(http_globals)[TRACK_VARS_GET]); } zend_hash_update(&EG(symbol_table), name, &PG(http_globals)[TRACK_VARS_GET]); Z_ADDREF(PG(http_globals)[TRACK_VARS_GET]); return 0; /* don't rearm */ } static zend_bool php_auto_globals_create_post(zend_string *name) { if (PG(variables_order) && (strchr(PG(variables_order),'P') || strchr(PG(variables_order),'p')) && !SG(headers_sent) && SG(request_info).request_method && !strcasecmp(SG(request_info).request_method, "POST")) { sapi_module.treat_data(PARSE_POST, NULL, NULL); } else { zval_ptr_dtor(&PG(http_globals)[TRACK_VARS_POST]); array_init(&PG(http_globals)[TRACK_VARS_POST]); } zend_hash_update(&EG(symbol_table), name, &PG(http_globals)[TRACK_VARS_POST]); Z_ADDREF(PG(http_globals)[TRACK_VARS_POST]); return 0; /* don't rearm */ } static zend_bool php_auto_globals_create_cookie(zend_string *name) { if (PG(variables_order) && (strchr(PG(variables_order),'C') || strchr(PG(variables_order),'c'))) { sapi_module.treat_data(PARSE_COOKIE, NULL, NULL); } else { zval_ptr_dtor(&PG(http_globals)[TRACK_VARS_COOKIE]); array_init(&PG(http_globals)[TRACK_VARS_COOKIE]); } zend_hash_update(&EG(symbol_table), name, &PG(http_globals)[TRACK_VARS_COOKIE]); Z_ADDREF(PG(http_globals)[TRACK_VARS_COOKIE]); return 0; /* don't rearm */ } static zend_bool php_auto_globals_create_files(zend_string *name) { if (Z_TYPE(PG(http_globals)[TRACK_VARS_FILES]) == IS_UNDEF) { array_init(&PG(http_globals)[TRACK_VARS_FILES]); } zend_hash_update(&EG(symbol_table), name, &PG(http_globals)[TRACK_VARS_FILES]); Z_ADDREF(PG(http_globals)[TRACK_VARS_FILES]); return 0; /* don't rearm */ } /* Upgly hack to fix HTTP_PROXY issue, see bug #72573 */ static void check_http_proxy(HashTable *var_table) { if (zend_hash_str_exists(var_table, "HTTP_PROXY", sizeof("HTTP_PROXY")-1)) { char *local_proxy = getenv("HTTP_PROXY"); if (!local_proxy) { zend_hash_str_del(var_table, "HTTP_PROXY", sizeof("HTTP_PROXY")-1); } else { zval local_zval; ZVAL_STRING(&local_zval, local_proxy); zend_hash_str_update(var_table, "HTTP_PROXY", sizeof("HTTP_PROXY")-1, &local_zval); } } } static zend_bool php_auto_globals_create_server(zend_string *name) { if (PG(variables_order) && (strchr(PG(variables_order),'S') || strchr(PG(variables_order),'s'))) { php_register_server_variables(); if (PG(register_argc_argv)) { if (SG(request_info).argc) { zval *argc, *argv; if ((argc = zend_hash_str_find_ind(&EG(symbol_table), "argc", sizeof("argc")-1)) != NULL && (argv = zend_hash_str_find_ind(&EG(symbol_table), "argv", sizeof("argv")-1)) != NULL) { Z_ADDREF_P(argv); zend_hash_str_update(Z_ARRVAL(PG(http_globals)[TRACK_VARS_SERVER]), "argv", sizeof("argv")-1, argv); zend_hash_str_update(Z_ARRVAL(PG(http_globals)[TRACK_VARS_SERVER]), "argc", sizeof("argc")-1, argc); } } else { php_build_argv(SG(request_info).query_string, &PG(http_globals)[TRACK_VARS_SERVER]); } } } else { zval_ptr_dtor(&PG(http_globals)[TRACK_VARS_SERVER]); array_init(&PG(http_globals)[TRACK_VARS_SERVER]); } check_http_proxy(Z_ARRVAL(PG(http_globals)[TRACK_VARS_SERVER])); zend_hash_update(&EG(symbol_table), name, &PG(http_globals)[TRACK_VARS_SERVER]); Z_ADDREF(PG(http_globals)[TRACK_VARS_SERVER]); return 0; /* don't rearm */ } static zend_bool php_auto_globals_create_env(zend_string *name) { zval_ptr_dtor(&PG(http_globals)[TRACK_VARS_ENV]); array_init(&PG(http_globals)[TRACK_VARS_ENV]); if (PG(variables_order) && (strchr(PG(variables_order),'E') || strchr(PG(variables_order),'e'))) { php_import_environment_variables(&PG(http_globals)[TRACK_VARS_ENV]); } check_http_proxy(Z_ARRVAL(PG(http_globals)[TRACK_VARS_ENV])); zend_hash_update(&EG(symbol_table), name, &PG(http_globals)[TRACK_VARS_ENV]); Z_ADDREF(PG(http_globals)[TRACK_VARS_ENV]); return 0; /* don't rearm */ } static zend_bool php_auto_globals_create_request(zend_string *name) { zval form_variables; unsigned char _gpc_flags[3] = {0, 0, 0}; char *p; array_init(&form_variables); if (PG(request_order) != NULL) { p = PG(request_order); } else { p = PG(variables_order); } for (; p && *p; p++) { switch (*p) { case 'g': case 'G': if (!_gpc_flags[0]) { php_autoglobal_merge(Z_ARRVAL(form_variables), Z_ARRVAL(PG(http_globals)[TRACK_VARS_GET])); _gpc_flags[0] = 1; } break; case 'p': case 'P': if (!_gpc_flags[1]) { php_autoglobal_merge(Z_ARRVAL(form_variables), Z_ARRVAL(PG(http_globals)[TRACK_VARS_POST])); _gpc_flags[1] = 1; } break; case 'c': case 'C': if (!_gpc_flags[2]) { php_autoglobal_merge(Z_ARRVAL(form_variables), Z_ARRVAL(PG(http_globals)[TRACK_VARS_COOKIE])); _gpc_flags[2] = 1; } break; } } zend_hash_update(&EG(symbol_table), name, &form_variables); return 0; } void php_startup_auto_globals(void) { zend_register_auto_global(zend_string_init("_GET", sizeof("_GET")-1, 1), 0, php_auto_globals_create_get); zend_register_auto_global(zend_string_init("_POST", sizeof("_POST")-1, 1), 0, php_auto_globals_create_post); zend_register_auto_global(zend_string_init("_COOKIE", sizeof("_COOKIE")-1, 1), 0, php_auto_globals_create_cookie); zend_register_auto_global(zend_string_init("_SERVER", sizeof("_SERVER")-1, 1), PG(auto_globals_jit), php_auto_globals_create_server); zend_register_auto_global(zend_string_init("_ENV", sizeof("_ENV")-1, 1), PG(auto_globals_jit), php_auto_globals_create_env); zend_register_auto_global(zend_string_init("_REQUEST", sizeof("_REQUEST")-1, 1), PG(auto_globals_jit), php_auto_globals_create_request); zend_register_auto_global(zend_string_init("_FILES", sizeof("_FILES")-1, 1), 0, php_auto_globals_create_files); } /* * Local variables: * tab-width: 4 * c-basic-offset: 4 * End: * vim600: sw=4 ts=4 fdm=marker * vim<600: sw=4 ts=4 */
1.. Introduction {#S0001} ================ *Ophiocordyceps formosana* (Kobayasi & Shimizu) C. R. Li, M. Z. Fan and Z. Z. Li was first discovered in 1981 from Taiwan. It was also found in Huangshan Mountain of Anhui Province in mainland China (Li et al. [2002](#CIT0011), [2014](#CIT0013)), and *Hirsutella huangshanensis* was identified as its anamorph (Li et al. [2005](#CIT0012)). Subsequently, our group also reported the culture technology of mycelia and fruiting body of *O. formosana* (Li et al. [2005](#CIT0012), [2011](#CIT0010)), together with part of the active ingredients research (Li et al. [2014](#CIT0013)). For instance, the composition and content of volatile components of mycelia were significantly affected by different culture ways of *O. formosana* (Ding et al. [2012](#CIT0003)). Carbonyl amino acids, cyclic peptide antibiotics etc. were detected in the fruiting body of *O. formosana* (He et al. [2007](#CIT0007), [2010](#CIT0005)). Also, some reports on the comparison of cytotoxic extracts from fruiting bodies, infected insects and cultured mycelia of *O. formosana* revealed that rugulosin was cytotoxic against Chinese hamster ovary (CHO) cells, while skyrin was non-cytotoxic against CHO cells (He et al. [2007](#CIT0007), [2008](#CIT0006); Lu et al. [2014](#CIT0015)). Free radicals were regarded as harmful compounds produced by organism oxidation reaction, due to its unpaired electron and reactive oxygen causing oxidative damage to DNA, lipid, protein and other biological molecules when the endogenous antioxidant defence was insufficient (Aruoma [1998](#CIT0001)). For example, increase in the formation or metabolic loss of free radicals was closely related to most of the cardiovascular diseases. Studies have reported that preventing the uncoupling of vascular endothelial nitric oxide synthase brought a new way to the treatment of these diseases (Chen et al. [2012](#CIT0002)). However, the free radical scavenging activity and its chemical base of *O. formosana* have not yet been published. This article did some comparative study on 1,1-diphenyl-2-picryhydrazyl (DPPH)-free radical and hydroxyl-free radical scavenging activity of water extract and methanol extract of *H. huangshanensis* and analysed their bioactive constituents by liquid chromatography--mass spectrometry (LC--MS), which accumulated data for the development of biologically active ingredients in the insect fungus. 2.. Materials and methods {#S0002} ========================= 2.1.. Strain {#S0002-S2001} ------------ *H*. *huangshanensis* RCEF0868 was provided by the Research Center on Entomogenous Fungi in Anhui Agricultural University and also kept in China General Microbiological Culture Collection Center (CGMCC No. 4147). Fermented mycelia of *Ophiocordyceps sinensis* (FMOS) was purchased from Zhejiang Hangzhou Xueyu Biotech Co., Ltd. (Batch no. 201201215). 2.2.. Equipment {#S0002-S2002} --------------- HZQ-F160 full temperature shock incubator, Harbin East Electronics Company; FreeZone12 freeze-drying system, the United States Labonconco Company; KQ5 200DE CNC ultrasonic cleaner, Kunshan Ultrasonic Instrument Co., Ltd.; 2K-15 ultracentrifuge, Sigma Company; SpectraMaxM2 microplate reader, USA Molecular Device Company; centrifugal vacuum concentrator, Germany Christ Company; resolution LC--MS analyser (Agilent 6210 time-of-flight \[TOF\] LC/MS), including the Agilent 1100 high-performance liquid chromatography (HPLC), diode array detector (DAD), high-performance TOF MS with an electrospray ionisation (ESI) source and an Agilent workstation, Agilent; analytical separations was Phenomenex Synergi Hydro-RP (4 μm, 4.60 × 250 mm). 2.3.. Chemicals {#S0002-S2003} --------------- HPLC grade methanol offered by Shanghai Xingke Biochemical Co., Ltd.; HPLC grade acetonitrile, Tedia Company; DPPH, Sigma Company; other reagents were analytical grade chemicals. 2.4.. Shake culture {#S0002-S2004} ------------------- Each 250-mL flask with 100 mL of liquid special media was inoculated with mycelia mat (ca. 10 cm^2^) from a plate culture and incubated on a shaker at 130 rpm for 12 days at 25°C. The culture medium contained potato glucose medium complemented with maltose (1%), peptone (1%), KH~2~PO~4~ (0.3%), MgSO~4~ (0.15%), ammonium citrate tribasic (0.04%) and vitamin B (0.4%). The initial pH was adjusted to 6.5 before sterilisation. 2.5.. Submerged culture {#S0002-S2005} ----------------------- The strain was cultivated in a 30--300-L airlift fermentation system with working volume of 21 L, with inocula 8%, incubated at 25°C for 15 days under the following conditions: pressure 0.13 MPa, temperature 25 ± 1°C, the initial pH 6.5 and the air ventilation 1/0.8 (v/v). The media contained sugar (2%), milk powder (3%), yeast extract powder (1.5%), silk worm pupa powder (3%), ammonium citrate (0.04%), MgSO~4~ (0.15%) and KH~2~PO~4~ (0.3%). Mycelia were collected by centrifugation at 15,000*g* for 10 min after fermentation, washed for three times with sterile water. The mycelia were subjected to freeze drying and ground. All samples were stored at −20°C. 2.6.. Extraction {#S0002-S2006} ---------------- Seven mycelia samples were weighed at a mass to liquid ratio of 30 mg/mL and respectively extracted with water, methanol, ethanol, acetone, ethyl acetate, *n*-butanol and petroleum ether at 30°C, 80 kHz ultrasound for 30 min and then kept at 4°C overnight. The supernatant was measured after centrifugation. 2.7.. Bioassay methods {#S0002-S2007} ---------------------- ### 2.7.1.. DPPH-free radical scavenging assay {#S0002-S2007-S3001} The mycelial extract solution (100 μL) and an equal volume of 0.2 mmol/L DPPH ethanol solution were added to the 96-well microtitre plate, shock mixed for 30 s and then left in the darkness at room temperature for 20 min. The absorbance was measured at 517 nm (*A*~1~). The absorbance of solvent instead of mycelium extract solution was measured as *A*~0~ and that of sample solution without DPPH solution measured as *A*~2~ (Liu et al. [2010](#CIT0014)). Each sample was determined in triplicate. The scavenging rate of DPPH radicals by the sample was calculated according to the following equation: $${Scavenging}{rate}{of}{DPPH}{radicals}{(\%)} = \left\lbrack {1 - \frac{\left( {A_{1} - A_{2}} \right)}{A_{0}}} \right\rbrack \times 100\%.$$ ### 2.7.2.. Hydroxyl radical scavenging assay {#S0002-S2007-S3002} Ninety six-well microtitre plate was successively added with 50 μL 6 mmol/L FeSO~4~ solution, 50 μL mycelium extract solution and 50 μL 6 mmol/L salicylic acid ethanol solution. After vortex mixing, 50 μL 6 mmol/L H~2~O~2~ was added to initiate the reaction, and then left at room temperature for 20 min after vortex mixing. The absorbance was measured at 510 nm (*A*~1~). The absorbance of the solvent in place of the mycelial extract solution was measured as *A*~0~ and that of sample solution without H~2~O~2~ measured as *A*~2~, and each sample was tested triplicately. The equation for scavenging rate of hydroxyl radical by the sample was the same as [Equation (1](#M0001)). 2.8.. Separation by HPLC and analysis by HPLC-ESI-TOF-MS {#S0002-S2008} -------------------------------------------------------- The mycelial extract solution was chromatographed, and each tube was collected every minute. The separated components were concentrated and dried in the rotary apparatus, and then each aliquot was redissolved by adding 300 μL of extracting solvent. The bioassay of different components collected was performed. HPLC conditions: injection volume of 20 μL, flow rate 0.8 mL/min, column oven temperature at 30°C; mobile phase: acetonitrile and 0.1% formic acid aqeous solution; elution gradient for the water extract: 0--10 min acetonitrile from 0% up to 5%, 10--35 min acetonitrile from 5% to 100%, 35--45 min to 100% acetonitrile elution 10 min; elution gradient for ethanol extract: 0--10 min from 0% to rise to 5%; 10--30 min acetonitrile from 5% to 100%, 30--45 min 100% acetonitrile elution 15 min. The range of detection wavelength was from 190 to 800 nm. MS conditions: atomisation air pressure ESI ion source is 0.24 MPa (35 psi), a nitrogen flow rate of 12 L/min, capillary temperature was 325°C, ion scan range (*m*/*z*) 50--1000, the cationic ion mode of voltage 4000 V, debris voltage 250 V; ionisation voltage of 3500 V, debris voltage 175 V under negative ion mode. 3.. Results and analysis {#S0003} ======================== 3.1.. Determination of activity of different solvent extracts {#S0003-S2001} ------------------------------------------------------------- The FMOS was used as the control, and FMOF was obtained according to the method described in [Section 2.6](#S0002-S2006) Activity assays of various solvent extracts were tested according to the method of [Section 2.7](#S0002-S2007), and the results are shown in [Figures 1](#F0001) and [2](#F0002).10.1080/21501203.2017.1383318-F0001Figure 1.DPPH-free radical scavenging activity of different solvent extracts.10.1080/21501203.2017.1383318-F0002Figure 2.Hydroxyl radical scavenging activity of different solvent extracts. The results from [Figures 1](#F0001) and [2](#F0002) showed that DPPH-free radical scavenging activity of the methanol extract is slightly potent, and the hydroxyl radical scavenging activity of the water extract is relatively strong. There was no significant difference in the scavenging-free radical activity of methanol and water extracts from FMOF compared with FMOS group. The contents of free radical scavenging activity in the mycelia of RCEF0868 were soluble in both water and methanol. According to the principle of similar compatibility, it was deduced that the active component was dominated by high polarity and medium polarity. Compared with the FMOS, the scavenging activities of DPPH-free radicals and hydroxyl radicals in the two extracts of FMOF were similar, which indicated that FMOF had high application value on the antioxidant activity. It could be used as a suitable substitute for *O*. *sinensis*. 3.2.. Free radical scavenging activity of the water and methanol extracts of FMOF {#S0003-S2002} --------------------------------------------------------------------------------- The sample solution of the aqueous extract and the methanol extract at a concentration of 5.0 mg/mL was precisely arranged according to the method described in [Section 2.6](#S0002-S2006) and then subjected to activity measurement according to the method described in [Section 2.7](#S0002-S2007) after dilution to different concentrations. The results are shown in [Table 1](#T0001).10.1080/21501203.2017.1383318-T0001Table 1.Free radical scavenging rates of crude extracts from different concentrations of FMOF. DPPH scavenging rates (%)Hydroxyl radical scavenging rate (%)Concentration (mg/mL)Water extractMethanol extractWater extractMethanol extract0.535.42 ± 1.23\*26.35 ± 0.70\*25.30 ± 0.49\*18.05 ± 1.16\*1.056.50 ± 1.84\*43.00 ± 1.31\*37.79 ± 1.15\*29.00 ± 1.01\*2.070.58 ± 0.96\*61.75 ± 1.27\*53.16 ± 0.69\*43.51 ± 1.64\*3.078.06 ± 0.63\*68.85 ± 1.44\*68.08 ± 1.71\*51.35 ± 1.20\*4.082.49 ± 1.45\*80.51 ± 1.05\*81.15 ± 1.69\*54.83 ± 1.09\*5.087.83 ± 1.61\*91.70 ± 0.8490.04 ± 0.9161.60 ± 0.62\*Vc93.59 ± 0.3993.84 ± 0.9191.18 ± 0.3091.34 ± 0.69[^1] The scavenging activity on DPPH and hydroxyl radicals of FMOF samples showed a significant concentration-dependent manner, and there was no significant difference in the scavenging-free radical activity between the high concentration and the Vc group ([Table 1](#T0001)). With the increase of sample concentration, the scavenging activities of both free radicals were enhanced. The water extract of FMOF had obvious scavenging activity against DPPH and hydroxyl radicals, and the IC~50~ was 0.85 and 1.37 mg/mL, respectively. The clearance rate of the water extract at the concentration of 5.0 mg/mL reached 87.83% and 90.04% for DPPH and hydroxyl radicals, respectively, after reaction for 3 min. The scavenging activity on DPPH-free radicals of the methanol extract was slightly higher than that of the water extract, whereas the scavenging activity on hydroxyl radical of the water extract was obviously stronger than that of the methanol extract. The water extract of FMOF exhibited IC~50~ at 1.23 and 2.91 mg/mL, respectively. The clearance rate of the methanol extract at the concentration of 5.0 mg/mL was 91.70% and 61.60% for DPPH and hydroxyl radicals, respectively, after the reaction time. 3.3.. HPLC--HRMS combined qualitative analysis of the active extract {#S0003-S2003} -------------------------------------------------------------------- ### 3.3.1.. Analysis of active components by LC-DAD {#S0003-S2003-S3001} According to the method 2.8, the water extract and the methanol extract of FMOF were separated by HPLC, and free radical scavenging activity of each component was determined. The high-performance liquid chromatogram and activity determination results are shown in [Figures 3](#F0003)--[6](#F0006).10.1080/21501203.2017.1383318-F0003Figure 3.HPLC chromatogram of water extract of FMOF.10.1080/21501203.2017.1383318-F0004Figure 4.The free radical scavenging activity of the HPLC component of water extract from FMOS.10.1080/21501203.2017.1383318-F0005Figure 5.HPLC chromatogram of methanol extract of FMOF.10.1080/21501203.2017.1383318-F0006Figure 6.The free radical scavenging activity of the HPLC component of methanol extract from FMOS. There are several components in the water extract and the methanol extract of the FMOF, respectively, which have free radical scavenging activity ([Figures 4](#F0004) and [6](#F0006)). Among them, the active fractions of the water extract are mainly distributed in two parts, corresponding to the three chromatographic peaks at the retention time of 3.1, 13.9 and 16.1 min, respectively. The active parts of the methanol extract contained three chromatographic peaks at the retention times of 30.1, 31.7 and 34.6 min, respectively, besides the same peak as that of the water extract at the retention time of 3.1 min. The results showed that all the active components showed scavenging activity of DPPH-free radicals. Among them, three eluents at the retention time of 3.1, 30.1 and 31.7 min, respectively, showed both DPPH and hydroxyl radical scavenging activity. ### 3.3.2.. Qualitative analysis of active components by LC--MS {#S0003-S2003-S3002} #### 3.3.2.1.. Analysis of the active components of water extract by HPLC-TOF-MS {#S0003-S2003-S3002-S4001} The active fraction collected in the aqueous extract of [Figure 4](#F0004) for 3 min, including two chromatographic peaks in [Figure 3](#F0003), was recollected according to the peak, and the activity was determined to confirm the active fraction as a chromatographic peak with a retention time of 3.1 min. The active fraction was determined as the chromatographic peak with the retention time of 3.1 min. The active constituent was measured by the mass spectrometry (MS) method of [Section 2.8](#S0002-S2008) and the obtained mass spectrum was shown in [Figure 7](#F0007). It was found that there was a single mass-to-charge ratio (*m*/*z*) of 181.07169 (the relative error of 0.38 ppm) in the anionic mode, it can be seen that it is an excimer ion peak of \[M − H\]^−^ according to the ESI characteristic, the corresponding ionic formula is C~6~H~13~O~6~^−^. In the cationic mode, there is a peak with a mass-to-charge ratio (*m*/*z*) of 183.08611 (the relative error of 1.04 ppm), which is an excimer ion peak of \[M + H\]^+^, the corresponding ionic formula was C~6~H~15~O~6~^+^. According to the anion and cations analysis, the molecular formula of the component is C~6~H~14~O~6~. In combination with the natural products of related entomopathogenic fungi, and query the Chapman & Hall natural product database, it could be deduced that the active component is cordycepic acid ([d]{.smallcaps}-mannitol) shown in [Figure 13](#F0013).10.1080/21501203.2017.1383318-F0007Figure 7.The anion and cation mass spectra of component at the retention time of 3.1 min.10.1080/21501203.2017.1383318-F0008Figure 8.The anion and cation mass spectra of component at the retention time of 13.9 min.10.1080/21501203.2017.1383318-F0009Figure 9.The anion and cation mass spectra of component at the retention time of 16.1 min.10.1080/21501203.2017.1383318-F0010Figure 10.The anion and cation mass spectra of component at the retention time of 30.1 min.10.1080/21501203.2017.1383318-F0011Figure 11.The anion and cation mass spectra of component at the retention time of 31.7 min.10.1080/21501203.2017.1383318-F0012Figure 12.The anion and cation mass spectra of component at the retention time of 34.6 min.10.1080/21501203.2017.1383318-F0013Figure 13.The structure of the five compounds. Active components were collected at 13--14 min corresponding to the chromatographic peak at the retention time of 13.9 min shown in [Figure 4](#F0004). Mass spectra results are shown in [Figure 8](#F0008), which confirmed that in the anionic mode, it had a unique mass-to-charge ratio of 382.09880 (the relative error of 4.18 ppm), an excimer ion peak of \[M − H\]^−^ and the corresponding ionic formula was C~14~H~16~N~5~O~8~^−^. In the cationic mode, there is a peak with a mass-to-charge ratio (*m*/*z*) of 384.11493 (the relative error of 0.14 ppm), which is an excimer ion peak of \[M + H\]^+^, the corresponding ionic formula was C~14~H~18~N~5~O~8~^+^. According to the anion and cations analysis, the molecular formula of the component was C~14~H~17~N~5~O~8~. In combination with the natural products of related entomopathogenic fungi and the Chapman & Hall natural product database, it could be deduced that the active component is succinoadenosine shown in [Figure 13](#F0013). Collected active components at 15--16 min corresponding to the chromatographic peak at the retention time of 16.1 min are shown in [Figure 4](#F0004), MS test results showed that the anionic mode had a unique mass-to-charge ratio of 486.21982 (the relative error is 1.5 ppm) ([Figure 9](#F0009)), and it can be inferred that the corresponding ionic formula was C~20~H~32~N~5~O~9~^−^. In the cationic mode, there is a peak with a mass-to-charge ratio (*m*/*z*) of 488.23526 (the relative error of 0.33 ppm), which is an excimer ion peak of \[M + H\]^+^, and the corresponding ionic formula was C~20~H~34~N~5~O~9~^+^. According to the anion and cations analysis, the molecular formula of the component was C~20~H~33~N~5~O~9~. It was found that it had a maximum absorption peak at 258 nm from the chromatographic data. In combination with the natural products of related entomopathogenic fungi, and query the Chapman & Hall natural product database, we did not find a compound that matched it; it was initially deduced that the component might be a new compound. #### 3.3.2.2.. HRMS analysis of active components in methanol extracts {#S0003-S2003-S3002-S4002} The active fraction at 3 min collected from the methanol extract in [Figure 6](#F0006), corresponding to [Figure 5](#F0005), there are two UV absorption peaks. The peaks were collected and tested for activity, and the activity was determined to confirm the active fraction as a chromatographic peak with a retention time of 3.1 min. Further analysis by MS showed that the compound was the same compound as the active ingredient in the aqueous extract with a retention time of 3.1 min, i.e. cordycepic acid. The chromatographic peak retention time for the active fraction collected at 30 min in [Figure 6](#F0006) was 30.1 min, and the mass spectrum was obtained by MS according to the method 2.8 ([Figure 10](#F0010)). It was found that the mass fraction ratio obtained in the anionic mode was 557.10753 with the relative error of 2.51 ppm, the excimer ion peak \[M − H\]^−^ and the corresponding ion type is C~30~H~21~O~11~^−^. In the cationic mode, there is a peak with a mass-to-charge ratio (*m*/*z*) of 559.12253 with the relative error of 1.71 ppm, which is an excimer ion peak of \[M + H\]^+^, and the corresponding ionic formula is C~30~H~23~O~11~^+^. According to the analysis results of anion and cations, it is concluded that the molecular formula of the component is C~30~H~22~O~11~. Combining with its UV absorption peak at 375 nm, consulting the relevant active ingredients reported, and querying Chapman & Hall natural product database, it was inferred that the component was 4α-oxyrugulosin, and the structural formula was shown in [Figure 13](#F0013). The chromatographic peak retention time for the active fraction collected at 31 min in [Figure 6](#F0006) was 31.7 min, and the mass spectrum was obtained by MS ([Figure 11](#F0011)). It was found that the mass fraction ratio obtained in the anionic mode was 541.11285 peak; from the ESI characteristics, it can be inferred that it is \[M − H\]^−^ the excimer ion peak, the corresponding ion type is C~30~H~21~O~10~^−^, the relative error of 2.16 ppm. In the cationic mode, there is a peak with a mass-to-charge ratio (*m*/*z*) of 543.12822, which is an excimer ion peak of \[M + H\]^+^, the corresponding ionic formula is C~30~H~23~O~10~^+^ and the relative error is 0.65 ppm. According to the analysis results of anion and cations, it concludes that the molecular formula of the component is C~30~H~22~O~10~. According to the chromatographic data, it was found that the UV absorption characteristic wavelength was 389 nm, and the Chapman & Hall natural product database was consulted and the results were discussed with reference to He's antitumor component. It is deduced that the component is rugulosin ([Figure 13](#F0013)). Active components were collected at 34 min corresponding to the chromatographic peak at the retention time of 34.6 min shown in [Figure 6](#F0006) and the results of mass spectra shown in [Figure 12](#F0012). The results showed that the anionic mode has a unique peak at the mass-to-charge ratio of 537.08199 with the relative error of 1.36 ppm, which might be an excimer ion peak of \[M − H\]^−^ according to the ESI characteristic, and the corresponding ionic formula is C~30~H~17~O~10~^−^. In the cationic mode, there is a peak at the mass-to-charge ratio (*m*/*z*) of 539.09681 with the relative error of 0.86 ppm, which is an excimer ion peak of \[M + H\]^+^, and the corresponding ionic formula is C~30~H~19~O~10~^+^. According to the analysis results of anion and cations, it concludes that the molecular formula of the component is C~30~H~18~O~10~. According to the chromatographic data, the UV absorption characteristic wavelength was found at 453 nm, and the results were discussed with reference to He's natural pigment after consulting Chapman & Hall natural product database. It was inferred that the component was skyrin ([Figure 13](#F0013)). 4.. Conclusion and discussion {#S0004} ============================= In this study, the active components were analysed by liquid chromatography and high-resolution TOI MS (ESI-MS), and the molecular formulas and chemical structures of the active constituents were determined. Cordycepic acid is one of the main active ingredients of *Cordyceps*, which can be used to inhibit the growth of a variety of bacteria, regulate blood sugar and prevent cancer, cerebral thrombosis etc. (Holliday and Cleaver [2008](#CIT0008)). It is generally considered that the high content of cordycepic acid in *Cordyceps* indicates potentially important medicinal value. According to the Chapman & Hall natural product database, it was found that the compound succinoadenosine was a metabolite of *Penicillium chrysogenum* and other microbes, and DPPH-free radical scavenging activity was not published previously in insect fungi. Compound with the formula C~20~H~33~N~5~O~9~ has an unsaturation degree of 7 exhibited a strong polarity, depending on their scavenging activity on DPPH-free radicals and reference to the structural type of the parasite metabolite (Hu and Li [2007](#CIT0009); Gaikwad et al. [2010](#CIT0004)), suggesting that the compound may be phenolic hydroxyl peptide, and the specific chemical structure remains to be further confirmed. Compound 4α-oxyrugulosin, a metabolite of *Penicillium brunneum* (Shibata [1973](#CIT0016)), which has not been reported for its DPPH and hydroxyl radical scavenging activity, is also found for the first time in insect-borne fungi. Rugulosin and skyrin have been reported as metabolites of *H*. *huangshanensis*, in which rugulosin has CHO cytotoxicity and skyrin does not exhibit CHO cytotoxicity (He et al. [2007](#CIT0007), [2008](#CIT0006)). We found that rugulosin showed both DPPH-free radical and hydroxyl radical scavenging activity, while skyrin only exhibited DPPH-free radical scavenging activity. The removal of free radicals or the blocking of the associated oxidation plays a major role in the life of the organism. The content of cordycepic acid was higher in the FMOF. Also, its metabolite rugulosin not only had CHO cytotoxicity but also showed DPPH and hydroxyl-free radical scavenging activity; 4α-oxyrugulosin with DPPH and hydroxyl-free radical scavenging activity was found for the first time in this fungus. It suggests that the active ingredient of mycelia from the fungus has potentially high value and deserves further research and development (Wang et al. [2015](#CIT0017)). Disclosure statement {#S0005} ==================== No potential conflict of interest was reported by the authors. [^1]: Vc: Vitamin C, 1.0 mg/mL. \*Compared to Vc group.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. To find out more, including how to control cookies, see here: Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.To find out more, including how to control cookies, see here: Cookie Policy Humans have migrated for millennia. From the first crossing of the Bering Strait to the Spanish conquest, from British and French colonial expansion to the influx of students to London today, migration has always been a central feature of human life. Human migration is a sensitive topic which is easily politicised. It is often thought about in the context of international or illegal migration, most frequently from developing countries to developed ones, and as something that needs to be stopped. The debate around migration would surely benefit from more data and mathematical modelling, and from fewer sensationalist media reports that can often present a distorted reality. Modelling any social behaviour is complicated for many reasons. Firstly, it is impossible to observe all of the people involved or consider all of the reasons why they behave, or stop behaving, in the way that they do. Often this means that we can only spot emerging patterns that arise from collective behaviour. Secondly, there will always be outliers. For example: evidence shows that a person who smokes 20 cigarettes a day is 26 times more likely to develop lung cancer than a person who doesn’t smoke, but clearly, there will always be heavy smokers who remain cancer-free. Observing these ‘lucky’ individuals does not mean that evidence against smoking should be dismissed, but when we analyse social patterns we necessarily consider a general case that will not apply to each and every person. Mathematical models of migration There are many models of migration, each of which aims to capture a different aspect of the phenomenon. This depends on the purpose of the model (the question being considered) and the data that is available. Below, we present some of the most important models in current research. Stochastic migration and cumulative inertia The act of migration can be considered as a random variable that has a certain probability of occurring. The model of cumulative inertia (developed by Myers, McGinnis and Masnick in the 1960s) considers the probability $p$ that a person moves in a given year, taking into account the number of years $t$ that they have lived in their current location. For some fixed values of $\alpha>0$ and $\beta$, we have $$p = \alpha t ^{\beta}.$$ By using actual data, Myers et al. showed that $\beta<0$, so that as time increases the probability of migration decreases. Thus, a person is more likely to migrate from a city if they recently arrived there. Markov chains and migration Consider the possible locations in which a person might live. The simplest case has two locations, for instance, the city and the countryside. By looking at the probability that a person moves from one location to the other, the migration flux can be modelled as a Markov chain with a transition matrix $\mathbf{A}$. The interesting part of considering the migration flux in this way is that it gives the stationary distribution of the population: a rough approximation of how many people will live at each location after a long period of time. There is a stochastic (random) component to the act of migration and the choice of destination. The Markov chain model helps understand the flow of migration and the impact that it has on different cities. For example, hundreds of thousands of people moved to New York City last year but, surprisingly, more people moved away. The Big Apple is not getting bigger! The radiation model This model also considers a stochastic component of migration, as well as taking into account the population of each location. Migration is modelled as a decision problem in which a person decides whether to move based on, for example, the potential income from a job at their target location. The model can also be used to give an estimate of the number of people who will commute along a given route, or the maximum distance that people are likely to commute. The gravity model Our final model takes a different approach and is based on physical principles similar to Newton’s law of gravity. The model supposes that the attractiveness of moving from one location to another is proportional to the size of the target location, and inversely proportional to the distance between the two. Let $X_i$ and $X_j$ be the population of cities $i$ and $j$ respectively, and let $d_{ij}$ be the distance between them. The gravity model of migration says that the expected flux $F_{ij}$ of people moving from $i$ to $j$ is given by $$F_{ij} = \gamma \frac{X_i X_j}{d_{ij}^{\kappa}},$$ where $\gamma>0$ captures the total flux of migration, and $\kappa>0$ is the impact of the distance between $i$ and $j$. The gravity model is also frequently used to model trade between two locations, where now $X_i$ measures the economic power of a location instead of the population size. For instance, a farmer who produces milk will want to sell their products in a location that is large enough to guarantee demand, but also close enough to keep transportation costs low. Although mathematical models can’t give a perfect description of the complex pattern that is observed in reality, they can help us understand the reasons why more people might migrate to or from specific locations. They can also help explain the impact of distance on migration statistics and can be used to forecast, for example, the number of people who will migrate following a natural disaster and where they are most likely to go. Hands-on display of the gravity model of migration The Chalkdust team was invited to produce a hands-on exhibit about migration at Greenwich Maths Time, and we decided to focus on migration within Africa. To display the gravity model, we painted a large map of Africa onto elasticated fabric. We then placed a weight on each of the 23 largest cities on the continent, with the mass of the weight being proportional to the population of that city. The largest metropolitan areas of the continent (El Cairo, Lagos and Kinshasa) have several million inhabitants and so were given the heaviest weights, while the lightest weight was attached to Algiers, the smallest city that we considered. When the map was lifted off the ground, it deformed under the weight of the cities and our ‘population’ of seeds was able to move freely under the effects of gravity. The result was visually striking — the vast majority of the seed-people ended up at the largest cities, a few moved towards the smaller ones and even fewer stayed where they were. This gave a great feel for the workings of the gravity model, and how it predicts that migration and trade are attracted to the biggest cities. Migration data Although estimating the migration flux between two countries is a very challenging task, institutions like the UN work to provide the most accurate data possible. The results are often quite surprising as they can differ from the narrative that is established in the media. Some relevant facts about international migration: In 2015, the number of international migrants was nearly 250 million people. It is estimated that there are currently 5 million international migrants who originated in the UK, 4 million from Germany, 3 million from Italy, 2 million from France and 1 million from Netherlands. Nearly two-thirds of international migrants are people who move inside their own continent, for example, Europeans who move to another European country. These somewhat surprising statistics highlight the importance of real data in the debate around migration, and how its use can challenge predominant perceptions that are often based on feeling rather than facts. Migration has always been a central tenet of society, and being able to model it from a scientific perspective based on mathematics and data can allow us to understand patterns, predict trends and design better policies on both a national and international scale. Rafael Prieto Curiel Rafael Prieto Curiel is doing a PhD in mathematics and crime. He is interested in mathematical modelling of any social issues, such as road accidents, migration, crime, fear and gossip. @rafaelprietoc rafaelprietocuriel.wordpress.com + More articles by Rafael Pietro Servini Pietro is interested in history and sport. He also happens to be doing a PhD in fluid dynamics at UCL. If he can combine any two of the three it makes him a happy man. pietroservini.com + More articles by Pietro
# Run the server The first time, get all the dependencies loaded via ``` npm install ``` Then, run the server via ``` npm run site-dev-server Open http://localhost:8080/ ``` Anytime you change the contents, just refresh the page and it's going to be updated. # Publish the website Just run the publish script, this will setup your environment if it's not already then it'll automatically build a static version of the site and publish it to gh-pages. ``` npm run site-publish ```
252 F.3d 462 (D.C. Cir. 2001) Qwest Corporation, et al., Petitionersv.Federal Communications Commission and United States of America, RespondentsMetrocall, Inc., et al., Intervenors No. 00-1376 and 00-1377 United States Court of Appeals FOR THE DISTRICT OF COLUMBIA CIRCUIT Argued May 9, 2001Decided June 15, 2001 On Petitions for Review of an Order of the Federal Communications Commission Michael K. Kellogg argued the cause for petitioners. With him on the briefs were Aaron M. Panner, Michael E. Glover, Edward Shakin, Joseph Dibella, Dan L. Poole, Robert B. McKenna, Jeffry A. Brueggeman, James D. Ellis, Roger K. Toppins and Hope E. Thurrott. Alfred G. Richter entered an appearance. Richard K. Welch, Counsel, Federal Communications Commission, argued the cause for respondents. On the brief were Jane E. Mago, Acting General Counsel at the time the brief was filed, John E. Ingle, Deputy Associate General Counsel, Laurel R. Bergold, Counsel, John M. Nannes, Deputy Assistant Attorney General, U.S. Department of Justice, Catherine G. O'Sullivan and Nancy C. Garrison, Attorneys. Daniel M. Armstrong, Associate General Counsel, Federal Communications Commission, entered an appearance. Frederick M. Joyce, Christine McLaughlin, Ronald E. Quirk, Jr., Marianne Roach Casserly, Jonathan J. Nadler and Robert L. Hoggarth were on the brief for intervenors Metrocall, Inc., Arch Wireless, Inc. and Personal Communications Industry Association. Angela E. Giancarlo entered an appearance. Before: Williams, Ginsburg and Rogers, Circuit Judges. Opinion for the Court filed by Circuit Judge Williams. Williams, Circuit Judge: 1 When a local caller dials the number of a paging service customer, the caller's Local Exchange Carrier ("LEC") sends the call to a paging terminal, operated by the paging service. Once the terminal validates the call and receives the "call-back" number or message, it sends out a radio broadcast that sets off the customer's pager. Thus the call starts out on the LEC's network but is handed off to the paging carrier, which completes the call. This case concerns the Federal Communications Commission's rule forbidding any LEC charge to the paging company for carrying such calls, 47 CFR 51.703(b). 2 The Commission enforced this no-compensation rule through adjudication of complaints brought by providers of one-way paging services, who contended that certain LECs had violated 51.703(b). The LECs object to use of this procedure to resolve the dispute. They contend that under the Telecommunications Act of 1996, Pub. L. No. 104-104, 110 Stat. 56 (the "1996 Act"), such disputes can be resolved only through state-managed negotiation and arbitration under 47 U.S.C. §§ 251(c)(1), 252. But another court has already resolved against these very LECs an underlying issue that is vital to their claim. In Iowa Utilities Bd. v. FCC, 120 F.3d 753 (8th Cir. 1997), aff'd in part and rev'd in part sub nom., AT & T Corp. v. Iowa Utilities Bd., 525 U.S. 366 (1999), the Eighth Circuit rejected the LECs' claim that 47 CFR 51.703(b) was wholly ultra vires. Rather, the court found that, as applied to Commercial Mobile Radio Service ("CMRS"), which includes paging, the regulation was validly grounded in 47 U.S.C. 332, a provision adopted well before the 1996 Act, in the 1982 amendments to the Communications Act of 1934. See Communications Amendments Act of 1982, Pub. L. No. 97-259, 331, 96 Stat. 1087, 1096-97. The Eighth Circuit's decision meets the criteria for issue preclusion. Petitioners are therefore bound by its holding that the validity of 47 CFR § 51.703(b) (as applied to CMRS) is wholly independent of the 1996 Act. The LECs themselves do not contend that a rule so grounded may be enforced solely through the negotiation and arbitration procedures of the 1996 Act. Accordingly we uphold the Commission's use of its complaint procedure. We also affirm the Commission's substantive interpretation of 51.703(b) as barring charges for facilities used to deliver LEC-originated traffic. 3 * * * 4 The Commission promulgated 51.703(b) in its first major order implementing the 1996 Act. See Implementation of the Local Competition Provisions in the Telecommunications Act of 1996, 11 F.C.C.R. 15,499, 16,228 (1996) ("Local Competition Order"). The rule states: 5 A LEC may not assess charges on any other telecommunications carrier for local telecommunications traffic that originates on the LEC's network. 6 47 CFR 51.703(b); see also Local Competition Order, 11 F.C.C.R. at 16,016 p 1042. In resolving a broad challenge to that order, the Eighth Circuit upheld 51.703(b) as applied to CMRS providers, Iowa Utilities Bd., 120 F.3d at 800 n.21; the LECs did not petition for certiorari on that issue. 7 After the Eighth Circuit's decision the FCC's Common Carrier Bureau ruled that 51.703(b)'s bar on LEC charges for completion of LEC-originated calls also covered charges for certain facilities used by LECs to provide such services. In response to a request for clarification from several LECs, the then chief of the Common Carrier Bureau, A. Richard Metzger, Jr., issued a letter saying that the LECs could not charge paging service providers for the cost of "LEC transmission facilities that are used on a dedicated basis to deliver to paging service providers local telecommunications traffic that originates on the LEC's network." Metzger Letter of December 30, 1997, 13 F.C.C.R. 184, 184 (1997). The LECs filed applications for review of the letter; three years later, the Commission has yet to rule on the matter. 8 Shortly before and after the release of the Metzger letter, one-way paging providers TSR Wireless, LLC and Metrocall, Inc. filed a series of complaints with the Commission under 47 U.S.C. 208 (authorizing complaints "of anything done or omitted to be done by any common carrier subject to this chapter, in contravention of the provisions thereof"). The complaints claimed (in the aggregate) that the four LECs now petitioning for review had charged for facilities used to deliver LEC-originated traffic, in violation, as the paging companies saw it, of 51.703(b). TSR Wireless also challenged Qwest's refusal to provide a "T-1 circuit" to handle paging traffic between Yuma and Flagstaff, Arizona. The LECs argued that the Commission lacked jurisdiction to adjudicate the complaints, on the theory that the carriers could enforce the LECs' interconnection obligations only through the 1996 Act's negotiation and arbitration provisions. See 47 U.S.C. §§ 251(c)(1), 252. 9 The Commission held that it had jurisdiction to resolve the paging carriers' complaints. Although relying primarily on a different interpretation of the 1996 Act from the LECs', it also invoked 47 U.S.C. 332, the provision that had won the day for the Commission in the Eighth Circuit. TSR Wireless, LLC v. US WEST Communications, Inc., 15 F.C.C.R. 11,166, 11,172, 11,172-73 n.42, 11,189-90 p p 13, 41-42 (2000) ("Order"). On the merits the Commission concluded that 51.703(b) prevented the LECs from imposing charges for the facilities used to deliver LEC-originated traffic to the paging carriers. It also held (subject to a qualification) that Qwest was required to meet TSR Wireless's request for a T-1 line between Yuma and Flagstaff, Arizona at its own expense. Id. at 11,189 p 40. 10 * * * 11 The parties' dispute over the propriety of CMRS providers enforcing 51.703(b) via the Commission's 208 complaint procedure entails two steps--steps that the Commission collapses into one in its somewhat confusing issue preclusion argument. The first step is to identify the source of the Commission's authority to adopt 51.703(b) insofar as it applies to CMRS. (The LECs here do not challenge the substantive validity of 51.703(b) as applied to CMRS.) The second step is to determine whether adversely affected parties may pursue relief for non-compliance only via the 1996 Act's negotiation and arbitration provisions, see 47 U.S.C. §§ 251(c)(1), 252, or whether they may get relief via complaints to the Commission under 47 U.S.C. 208. 12 The link between the two is that if 51.703(b) (as applied to CMRS) rests solely on the 1996 Act, the second question, that of available remedy, is sharply contested. But if 51.703(b) (as applied to CMRS) is validated by prior legislation, specifically 47 U.S.C. 332, then 47 U.S.C. 208 is indisputably available. Perhaps because the second step (the proper channels of enforcement) is so easy on the second hypothesis (47 U.S.C. 332), the Commission tends to overlook it. By coincidence, the Eighth Circuit decision addressed the issues of both substantive power and remedy. 13 In the Eighth Circuit litigation the LECs challenged the substantive validity of 51.703(b) and many other provisions of the Local Competition Order. That order in fact rested on the 1996 Act, and for many contexts the court found the regulations adopted invalid. But insofar as 51.703(b) and several kindred sections applied to CMRS, the court found support in 47 U.S.C. 332: 14 Because Congress expressly amended section 2(b) to preclude state regulation of entry of and rates charged by Commercial Mobile Radio Service (CMRS) providers, see 47 U.S.C. §§ 152(b) (exempting the provisions of section 332), 332(c)(3)(A), and because section 332(c)(1)(B) gives the FCC the authority to order LECs to interconnect with CMRS carriers, we believe that the Commission has the authority to issue the rules of special concern to the CMRS providers, i.e., 47 C.F.R. §§ 51.701, 51.703, 51.709(b), 51.711(a)(1), 51.715(d), and 51.717, but only as these provisions apply to CMRS providers. Thus, rules 51.701, 51.703, 51.709(b), 51.711(a)(1), 51.715(d), and 51.717 remain in full force and effect with respect to the CMRS providers, and our order of vacation does not apply to them in the CMRS context. 15 Iowa Utilities Bd., 120 F.3d at 800 n.21 (emphasis added).1 In the Local Competition Order itself, interestingly, the Commission had not invoked 332 in support of the regulation. See 11 F.C.C.R. at 16,005-06 p p 1023, 1025. Compare SEC v. Chenery Corp., 332 U.S. 194, 196 (1947). 16 The LECs also raised the remedial issue presented here (though in a much broader version), persuading the court that the Commission could not use 208 complaint proceedings to enforce the whole family of duties to which 51.703(b) (as it applied generally) belonged. On this they won. Iowa Utilities Bd., 120 F.3d at 803-04. But the victory was short-lived; the Supreme Court vacated the ruling as unripe. AT&T Corp. v. Iowa Utilities Bd., 525 U.S. at 386. 17 The Eighth Circuit's substantive ruling that 51.703(b) was validly grounded in 332 seems on its face to meet the criteria for issue preclusion. Under that doctrine, judgment in a prior suit can preclude relitigation of an issue actually litigated and necessary to the outcome of the first action so long as no unfairness results. See Parklane Hosiery Co. v. Shore, 439 U.S. 322, 326 n.5 (1979); Milton S. Kronheim & Co. v. District of Columbia, 91 F.3d 193, 197 (D.C. Cir. 1996); see also Southern Pac. R.R. Co. v. United States, 168 U.S. 1, 48-49 (1897). 18 The LECs' strongest response is that Iowa Utilities Bd. did not really find that 332 was the statutory authority for 51.703(b). The court's use of 332, they say, was only to parry a claim that 51.703(b) and many associated regulations were invalid intrusions on state authority under 2(b) of the Communications Act of 1934, 47 U.S.C. 152(b). But this cuts the Iowa Utilities Bd. decision too fine. The LECs' basic attack was that the 1996 Act failed to support 51.703(b) and the associated regulations. The Eighth Circuit by and large agreed (though the Supreme Court did not). But having agreed on the general proposition, the Eighth Circuit was convinced that an exception applied for CMRS, as to which it plainly found an independent basis of support outside the 1996 Act, in 332. 19 The petitioners did not seek certiorari as to the Eighth Circuit's holding on 332--making it a final judgment with preclusive effects. The Supreme Court, discussing the preclusive effect of a judgment that the loser was entitled to appeal to the Supreme Court, has held that the loser's failure to do so left him as badly off as if he had appealed and lost. Angel v. Bullington, 330 U.S. 183, 189 (1947). As a general matter we cannot see that certiorari should be on a different footing. Of course the odds are against such relief; most litigants will not have it granted even if they do seek it. Yet the judgments of intermediate federal appellate courts nonetheless have issue preclusive effect. See Johnson Steel Street Rail Co. v. William Wharton, Jr. & Co., 152 U.S. 252, 261 (1894). 20 The LECs go on to argue that theirs is a special case--they "had no motivation to challenge section 51.703(b)" because they reasonably thought the rule applied only to traffic (for which they say they never charged); the FCC only later revealed its view that the rule embraced charges for facilities. See Petitioners' Br. at 38-39. But this seems somewhat disingenuous on two counts. First, so far as appears they did contest the rule in the Eighth Circuit. Indeed, they evidently did so in the specific context of CMRS (at least footnote 21 gives no hint that it sprang out of the blue, and the LECs make no claim that it did). Second, the Eighth Circuit disposed of rehearing petitions in Iowa Utilities Bd. on October 14, 1997, so that the 90-day period for filing a petition for a writ of certiorari, see S. Ct. R. 13, only closed well after the December 30, 1997 Metzger letter clearly put the LECs on notice of the rule's application to facilities. In any event, and recognizing that litigants must be highly selective in framing petitions for certiorari, we cannot see any serious unfairness in giving preclusive effect to the judgment of a sister circuit. 21 Petitioners also invoke the doctrine launched in Functional Music, Inc. v. FCC, 274 F.2d 543 (D.C. Cir. 1958). But that doctrine has no bearing on issue preclusion, as it relates simply to a party's right, once it has passed up a chance to bring suit attacking a rule, to resist its later application. Public Citizen v. Nuclear Regulatory Commission, 901 F.2d 147, 153 n.3 (D.C. Cir. 1990); Western Coal Traffic League v. Interstate Commerce Commission, 735 F.2d 1408, 1411 (D.C. Cir. 1984). 22 Petitioners' procedural victory, the Eighth Circuit's holding that the Commission could not use complaint proceedings to enforce the LECs' 47 U.S.C. §§ 251-252 obligations, is also of no use to them. Because of the Supreme Court's authoritative ruling that the issue was unripe, AT&T Corp. v. Iowa Utilities Bd., 525 U.S. at 386, the Commission cannot be bound by its loss, and petitioners cannot (contrary to the Commission's rather bizarre effort to deploy claim preclusion) be bound by their failure to pose the procedural issue in the CMRS context in the Eighth Circuit. See Norfolk & Western Ry. Co. v. United States, 768 F.2d 373, 377-78 (D.C. Cir. 1985). 23 Petitioners acknowledge that the Commission referred to 332 in the Order, but stress, in a footnote, that the references were tucked away in a diminutive footnote and in the ordering clauses. See Order, 15 F.C.C.R. at 11,172-73 n.42, 11,189-90 p p 41-42. Petitioners' footnoted claim that under McElroy Electronics Corp. v. FCC, 990 F.2d 1351 (D.C. Cir. 1993), a footnote will not suffice, is incorrect. There we held that an ambiguous footnote in a Commission order failed to provide adequate notice, id. at 1361-62, but here the footnote, though small, is not obscure. 24 * * * 25 The Commission makes no claim that Iowa Utilities Bd. bars petitioners' attack on its conclusion that 51.703(b) prohibits charges for facilities as well as traffic. We review the Commission's reading of its regulation under highly deferential standards, and would reverse only a clear misinterpretation. See, e.g., National Medical Enterprises, Inc. v. Shalala, 43 F.3d 691, 697 (D.C. Cir. 1995). 26 Petitioners argue that the Commission's inclusive reading is unreasonable and "contrary to the plain language of the FCC's regulation." See Petitioners' Br. at 43. We see no barrier in the plain language. As to reasonableness, the Commission's explanation seems compelling; its interpretation prevents LECs from "re-designating the 'traffic' charges as 'facilities' charges." Order, 15 F.C.C.R. at 11,181 p 25. The opposite reading would create an apparently artificial distinction, giving LECs an incentive to game the system by providing dedicated facilities at the paging providers' expense in cases where they could conveniently carry the traffic at their own expense. 27 Petitioners suggest that 47 CFR 51.709(b) contradicts the Commission's ruling. That section provides: 28 The rate of a carrier providing transmission facilities dedicated to the transmission of traffic between two carriers' networks shall recover only the costs of the proportion of that trunk capacity used by an interconnecting carrier to send traffic that will terminate on the providing carrier's network. Such proportions may be measured during peak periods. 29 That the regulation mentions facilities, while 51.703(b) does not, is surely not enough to establish the principle that when the Commission wants to target charges for facilities, it must do so explicitly. Moreover, as we do not understand the LECs to claim that the traffic in question "terminate[s] on the providing carrier's network," we do not see how the regulation assists them. The Commission reads 51.709(b) as entirely congruent with 51.703(b), confirming the ban on charges, whether labeled as for traffic or for facilities, for LEC-originated local calls. See Order, 15 F.C.C.R. at 11,181-82 p 26. The present case does not call on us to pass on the Commission's reading of 51.709(b), but we can say that the provision does not seem to pose the contradiction claimed by petitioners. 30 Finally, the petitioners say they reasonably fear that the paging carriers will use the Commission's interpretation to demand unnecessary and expensive facilities. But they have not by any means established that such "gold-plating" is likely. There are three uses of facilities--so far as appears not uncommon--for which the paging carriers themselves must pay: (1) for "transiting traffic"--"traffic that originates from a carrier other than the interconnecting LEC but nonetheless is carried over the LEC network to the paging carrier's network," Order, 15 F.C.C.R. at 11,177 n.70; (2) for connecting parts of a paging carrier's own network, such as those linking a paging terminal with its antennas, id.; and (3) for delivering traffic that originates or terminates outside the Major Trading Area (essentially the local calling area), id. at 11,184 n.102. As a result of these three facility uses, paging services that insisted on gold-plating would run up their own costs. Further, the Commission observes that LECs can ask the Commission for a waiver of 51.703. Commission Br. at 45 n.92. The suggestion seems to reflect a view that paging carriers' efforts at gold-plating would be unreasonable, and thus that the Commission would afford relief on a proper record. We cannot assume the contrary. In the absence of gold-plating, the Commission's order simply requires the LECs to look to their own customers to recoup the needed costs of their facilities. The LECs' petitions are 31 Denied. Notes: 1 Section 332(c)(1)(B) provides: "Upon reasonable request of any person providing commercial mobile service, the Commission shall order a common carrier to establish physical connections with such service pursuant to the provisions of section 201 of this title. Except to the extent that the Commission is required to respond to such a request, this subparagraph shall not be construed as a limitation or expansion of the Commission's authority to order interconnection pursuant to this chapter."
Q: Replace brackets from a number in following format ($n) e.g. ($57,282,341.26) with -$57,282,341.26 using regular expression I was working on Globalization currency formatting and I came through an issue where all the currency values in minus is showing brackets instead of minus symbol eg.-$57,282,341.26 is being shown as ($57,282,341.26). Now I wanted to make a global search and replace on such type of strings. So that I could get results as -$57,282,341.26 I tried: var str = "This sentence contains ($57,282,341.26) "; var patt1 = /(\()+(\$)+([0-9,.]+)+(\))/g; var result = str.match(patt1); document.getElementById("demo").innerHTML = result; I am able to find number in ($n) format but I couldn't do replace with back reference. A: You may use var result = str.replace(/\((\$[0-9][.,0-9]*)\)/g, '-$1'); See the regex demo Details: \( - a literal ( char (\$[0-9][.,0-9]*) - Group 1 capturing $, a digit and then 0+ digits, . or , chars \) - a literal ) char. The -$1 replacement pattern contains a literal - symbol and the $1 backreference to the value kept in Capturing group 1. var str = "This sentence contains ($57,282,341.26) "; var patt1 = /\((\$[0-9][.,0-9]*)\)/g; var result = str.replace(patt1, "-$1"); console.log(result);
~ Analyses, Reports, Briefings Search: About About the website This website was realised in order to gather the analyses I have been publishing. It is conceived as a portfolio, rather than as a traditional blog. About me I am a Teaching Fellow at the United Kingdom Joint Services Command and Staff College (JSCSC) at Shrivenham, and I hold a PhD from the Department of War Studies, King’s College London. My research focuses on Turkish civil-military relations and their evolution, but my research interests include security sector reform, counter-insurgency, counter-terrorism, intelligence, defense procurement, and NATO CIMIC (Civil-Military Cooperation) doctrine. In the past, I have worked as Research Assistant for the Defence and Military Analysis Programme at the International Institute for Strategic Studies (IISS), and I have acted as expert witness for the Metropolitan Police Counter Terrorism Command (SO15), and for the Counter Terrorism Division of the Crown Prosecution Service.
Viewpoints: Livable communities at stake if fuels aren’t in cap and trade By Curt Johansen - Special to The Bee August 22, 2014 12:00 AM UPDATED August 21, 2014 07:10 PM An important environmental debate right now centers on whether transportation fuels should remain part of the cap-and-trade program under California’s climate change law. At stake is our future: Will it be one where we build sustainable neighborhoods, with access to transit, bike and pedestrian paths, and local services? Or will we continue to subsidize the oil and gas industry, which has shown disdain for this kind of sustainable development? Given their way, oil companies would force Californians to remain tethered to the automobile as our only means of transportation for trips to work, shopping, education and recreation. Perea is a fine legislator who is unfortunately looking in the rear view mirror instead of forward. First, the price increases would be barely noticeable. An analysis by the UC Berkeley Haas School of Business found that it would likely be 9 to 10 cents per gallon, easily offset through simple measures such as driving 70 mph instead of 72 mph on the freeway and keeping tires properly inflated. Or the oil and gas industry could simply be accountable and absorb those increases, only reducing their nearly $200 billion in annual profits by what amounts to one or two less corporate jets. Never miss a local story. Sign up today for a free 30 day free trial of unlimited digital access. More importantly, Perea is missing a healthier potential for his own region. As a developer committed to sustainable communities, my company is working with the city of Reedley in Fresno County on the mixed-use Kings River Village community. This walkable and bicycle-friendly neighborhood features medical facilities, offices and shops for its market-rate and affordable housing. It includes solar energy, recycled stormwater, a farmers market, community garden and a full-service transit center integrated into Fresno County Transit Agency bus routes. Residents and visitors will have excellent transit access to key locations within Reedley, neighboring cities and Fresno itself, including Fresno State and the Amtrak station. Projects such as Kings River Village represent the future of the Central Valley. Consumers increasingly demand them, and more reliable, safe and affordable transit is coming to serve them. California’s pollution-fighting land use laws, such as SB 375, direct transportation investments away from sprawl and toward existing neighborhoods in our cities and towns. And the sale of pollution credits will help fund this shift, leading to healthier communities and more preservation of prime farmlands. AB 69 would undermine that revenue stream, harming the very constituents that Perea and other bill advocates seek to protect. AB 69 should die a quick and deserved death in the Legislature, much as the oil and gas industry’s attempt to kill the climate change law failed in 2010 with the defeat of Proposition 23, and as the state Senate on Thursday blocked a Republican proposal to exempt fuels from cap and trade. Californians know how distressed the state would become if bottom-line corporate interests have their way. You can bet those millions of lobbying dollars didn’t come from investors – but from the pockets of hard-working Californians the oil companies are now shilling as the “victims” of the climate change law. California remains an optimistic, forward-thinking society that knows change is inevitable and needs to be managed toward sustainable outcomes. AB 69 seeks to reverse that progress. We should urge our legislators to vote against it and ensure that California continues to lead the way toward healthier communities for its people and its environment.
accessories Nappy Wallets, Nappy bags and bibs are some of the items that I make for my customers. I can custom make your order for you and your precious one. We are an awesome place to go shopping for all your chlds needs and make everything with love. Come and check out my hand made items by visting my... My Little Love Heart is a boutique business that hand makes beautiful, trendy and stylish for newborns and babies. Our products include but not limited to Top Knot, Bandana Bibs, Headbands, Teething Rings, hair bows, baby gifts, Burp Cloths and baby boy and girl greeting cards. We also hand make a l... Hi im Hayley and I make hair accessories and dummy clips. I can do just about any colour/theme so if there's anything in particular that you are looking for just ask and I'll do my best to get it for you. Keep me in mind for stocking stuffers for Christmas and something a bit different... Bassinett Sheets (colourful ones) Burp cloths Reusable Nappies Bibs Baby towels And so much more! Most of the products listed are hand made in the Lockyer valley!! To view our range of products and say hello come and visit us on Facebook or our Website From one mum to another. Are you looking for that unique and cute hair accessory to match your kids outfit. Well head to Twirly Bum Tutus and check out the range of items they have. Made to order.... Various Colours & Options To find out more visit our facebook page to see our range of items Funky Frangipani Kids is located in Toowoomba and I have a wide range of Kids hand made clothing and accessories. I update my items regularly so to see what i currently have in stock or are looking for a particular item or design then why not contact me to discuss and see if I can help you. &n... Laura Elizabeth Designs make handcrafted Jewellery and Gifts - Made from local and imported ingredients, a dash of flair and a sprinkle of sparkle, topped off with a good dollop of love and care - De-lish! Like us on Facebook to find out more Email: [email protected] Kittyandzac is your go to for Fun and Funky handmade Kidsgear, Toys, Teepees, Accessories, Homewares and more. We pride ourselves on outstanding attention to detail, Unique and afordable products and great customer service We also love Custom orders for a complete one off design. Find us on Facebo... Are you looking for accessories to match your little princess's outfit. Or need a cute gift for a friend. We have a great range of items to choose from. Visit us on Facebook to see our range of accessories.
Q: Command line automation for bates stamping a pdf file I would like to create a windows command line script that would bates stamp pdf files. Does anyone know if that is possible? I'm reasonably proficient using python and vbscript. I'd be willing to suffer through the process of learning to use the latest Acrobat SDK if that would enable me to use command line scripting to automate bates stamping. Thank you for any tips. Marc A: Doing stuff like that in Python isn't supported very well. You might be able to do it with PyPDF. Here's a link to a script that has an example of sorts: http://coils.hg.sourceforge.net/hgweb/coils/coils/file/9d6c304dd405/src/coils/logic/workflow/actions/doc/watermark.py You might find the following useful as well: http://mail.python.org/pipermail/python-list/2012-May/623756.html Generating & Merging PDF Files in Python
RSS feed The naira is one of the world’s four worst performing currencies in 2016, according to a report by Bloomberg LP. The naira was said to have lost 36.68 per cent of its spot returns for the year, while the Egyptian pound, Suriname dollar and Venezuela bolivar’s currency spot returns dropped by 58.84 per cent, 46.68 per cent and 37 per cent, respectively, for the period. The Nigerian equity market fared worst in the year, according to the report, as the nation’s economy is set to contract in 2016 for the first time in more than 20 years as capital controls deter foreigners from investing and militants are blowing up pipelines. The five best performing currencies of the world are the Russian ruble, Brazilian real, the palladium, the Iceland krona, and silver, which appreciated by 21.31 per cent, 20.96 per cent, 20.08 per cent, 14.42 per cent and 14.41 per cent, respectively, in terms of spot returns. Two Africa currencies, the Zambian kwacha and South African rand, emerged as the sixth and seventh best performing currencies of the world. The kwacha and rand appreciated by 11.96 per cent and 11 per cent respectively. The report stated, “It was a particularly bad year for any currency called the ‘pound’. The Egyptian version was the worst performer in 2016 as the nation took the dramatic step of allowing it to trade freely in an attempt to stabilise an economy struggling with a dollar shortage and concerns over social unrest. Britain’s pound tumbled after the Brexit and never recovered.” On the other side of the spectrum, digital currency, bitcoin, was the best performer this year, rising more than 100 per cent as capital controls in places like China and isolationist rumblings in the United Kingdom and the United States fuelled interest in alternate currencies, according to the report. It added, “When it comes to currencies issued by governments and central banks, the Russian ruble has been the best performer of the year as the oil market rebounded. “While the UK currency’s slide didn’t match those in some emerging markets, it did tally the worst performance among major currencies.” Despite recent unrest, Brazil’s Ibovespa stock index remained the best performer for 2016 when looking at all indices in terms of the US dollar, the report noted, stating that this was largely due to hopes that President Michel Temer, who took office after Dilma Rousseff was impeached, would end the worst recession in a century and bring about political stability. (Punchng.com)
Wang, MA Baitao Wang, Belchertown, MA US Patent application number Description Published 20090273190 Asymmetric hydraulic press electric generator - The asymmetric hydraulic press electric generator is a device that converts mechanical energy to electrical energy using hydraulic pressure. It employs the principle that force acting on a small area can create a much larger force by virtue of hydrostatic pressure and that a large amount of energy can be carried by a small flow of highly pressurized fluid. 11-05-2009 Bingnan Wang, Boston, MA US Patent application number Description Published 20110133564 Wireless Energy Transfer with Negative Index Material - Embodiments of the invention disclose a system configured to exchange energy wirelessly. The system includes a structure configured to exchange the energy wirelessly via a coupling of evanescent waves, wherein the structure is electromagnetic (EM) and non-radiative, and wherein the structure generates an EM near-field in response to receiving the energy; and a negative index material (NIM) arranged within the EM near-field such that the coupling is enhanced. 06-09-2011 20110133565 Wireless Energy Transfer with Negative Index Material - Embodiments of the invention disclose a system configured to exchange energy wirelessly. The system includes a structure configured to exchange the energy wirelessly via a coupling of evanescent waves, wherein the structure is electromagnetic (EM) and non-radiative, and wherein the structure generates an EM near-field in response to receiving the energy; and a negative index material (NIM) arranged within the EM near-field such that the coupling is enhanced. 06-09-2011 20110133566 Wireless Energy Transfer with Negative Material - Embodiments of the invention disclose a system configured to exchange energy wirelessly. The system includes a structure configured to exchange the energy wirelessly via a coupling of evanescent waves, wherein the structure is electromagnetic (EM) and non-radiative, and wherein the structure generates an EM near-field in response to receiving the energy; and a negative index material (NIM) arranged within the EM near-field such that the coupling is enhanced. 06-09-2011 20110133568 Wireless Energy Transfer with Metamaterials - Embodiments of the invention disclose a system configured to exchange energy wirelessly. The system includes a structure configured to exchange the energy wirelessly via a coupling of evanescent waves, wherein the structure is electromagnetic (EM) and non-radiative, and wherein the structure generates an EM near-field in response to receiving the energy; and a metamaterial arranged within the EM near-field such that the coupling is enhanced. 06-09-2011 20120038219 Wireless Energy Transfer with Anisotropic Metamaterials - Embodiments of the invention disclose a system configured to exchange energy wirelessly. The system includes a structure configured to exchange the energy wirelessly via a coupling of evanescent waves, wherein the structure is electromagnetic (EM) and non-radiative, and wherein the structure generates an EM near-field in response to receiving the energy; and an anisotropic metamaterial arranged within the EM near-field such that the coupling is enhanced. 02-16-2012 20120080956 Wireless Energy Transfer Using Array of Resonant Objects - A system for exchanging energy wirelessly comprises an array of at least three objects having a resonant frequency, each object is electromagnetic (EM) and non-radiative, and generates an EM near-field in response to receiving the energy, wherein each object in the array is arranged at a distance from all other objects in the array, such that upon receiving the energy the object is strongly coupled to at least one other object in the array via a resonant coupling of evanescent waves; and an energy driver for providing the energy at the resonant frequency to at least one object in the array, such that, during an operation of the system, the energy is distributed from the object to all other objects in the array. 04-05-2012 20120217816 Wireless Energy Transfer Using Arrays of Resonant Objects - A system for exchanging energy wirelessly includes an array of at least three objects, wherein the objects have similar resonant frequencies, wherein each object is electromagnetic (EM) and non-radiative and generates an EM near-field in response to receiving the energy. Each object is electrically isolated from the other objects and arranged at a distance from all other objects, such that upon receiving the energy, the object is strongly coupled to at least one other object via a resonant coupling of evanescent waves. An energy driver provides the energy at the resonant frequency to at least one object in the array, such that, during an operation of the system, the energy is distributed from the at least one object to all other objects in the array via the resonant coupling of the evanescent waves. 08-30-2012 20120217817 Tuning Electromagnetic Fields Characteristics for Wireless Energy Transfer Using Arrays of Resonant Objects - A system for exchanging energy wirelessly includes an array of objects, wherein each object is electromagnetic (EM) and non-radiative and generates an EM near-field in response to receiving the energy. Each object in the array is electrically isolated from the other objects and arranged at a distance from all other objects. An energy driver provides the energy to the array of objects. A receiver, at a relative position with respect to the array receives the energy via resonant coupling of evanescent waves. The system can tunes characteristics of the EM near-field depending on a relative position of the receiver with respect to the array. The tuning can affect frequency, phase and amplitude of the energy field. 08-30-2012 20120217818 System and Method for Automatically Optimizing Wireless Power - A system transfers energy wirelessly from a source to a sink as an EM near-field according to parameters. The source includes a receive RF chain, and a receive controller. The sink includes a transmit RF chain, and a receive controller. The receive controller measures the energy received as feedback information, which is transmitted to the sink. Then, the transmit controller dynamically varies the parameters to optimized the energy received at the sink. 08-30-2012 20130127252 Wireless Energy Transfer with Perfect Magnetic Conductors - A system that transfers energy wirelessly includes a transmitter of the energy and a receiver of the energy. A housing made of a material that approximates properties of a perfect magnetic conductor. The housing is arranged to direct a magnetic field from the transmitter to the receiver to improve an efficiency of the energy transfer from the transmitter to the receiver. 05-23-2013 20130140908 Wireless Energy Transfer with Metamaterials - Embodiments of the invention disclose a system configured to exchange energy wirelessly. The system includes a structure configured to exchange the energy wirelessly via a coupling of evanescent waves, wherein the structure is electromagnetic (EM) and non-radiative, and wherein the structure generates an EM near-field in response to receiving the energy; and a metamaterial arranged within the EM near-field such that the coupling is enhanced. 06-06-2013 20130144588 System and Method for Analyzing Spiral Resonators - A spiral resonator is analyzed by modeling a set of loops of the spiral resonator with a model of a circuit including a set of units, wherein each unit includes a resistor and an inductor to model one loop of the spiral resonator. Values of the resistor and the inductor of each unit are based on properties of a corresponding loop. Electrical connection of the loops is modeled by electrically connecting the units in a corresponding order of the loops. A capacitive coupling in the spiral resonator is modeled by connecting adjacent units with at least one capacitor having a value based on the capacitive coupling between two corresponding adjacent loops. An inductive coupling in the spiral resonator is modeled based on inductive coupling between pairs of loops. The operation of the spiral resonator is simulated with the model of the circuit. 06-06-2013 20130156361 Mode-Evolution Compound Converter - A mode-evolution compound converter for processing an optical signal that includes a first component having a fundamental transverse magnetic (TM) mode and a second component having a fundamental transverse electric (TE) mode is disclosed. The compound converter includes a set of multiple converters connected to form a compound converter, wherein each converter is a mode-evolution converter selected from a group including a polarization converter, a spatial converter, and combination thereof, wherein the polarization converter at least converts a mode of a polarization of at least one component of the optical signal, and the spatial mode converter at least converts a spatial mode order of at least one component of the optical signal. 06-20-2013 20130272644 Multi-Mode Interference Manipulator - A multi-mode interference includes a core portion suitable, at any point, for propagating an optical signal having multiple spatial modes. The core portion includes a shifting section for shifting phases of the spatial modes of the optical signal. 10-17-2013 Patent applications by Bingnan Wang, Boston, MA US Chang-Ning J. Wang, Andover, MA US Patent application number Description Published 20090118484 FORMATION OF NOVEL NUCLEIC ACID COMPLEXES AND DETECTION THEREOF - This invention relates to a process and system to amplify and detect recombinational non-reciprocal cross-over reactions between homologous nucleic acid molecules without the assistance from a protein factor. The result of a chain reaction of non-reciprocal cross-overs is stoichiometrical formation of nucleic acid conglomerate complex that binds significantly more ethidium bromide or other fluorophores than a canonical B-form double helical nucleic acid does, emitting much stronger fluorescence. Such nucleic acid conglomerate complex can be easily detected by conventional methods, therefore can be used to detect any target molecule of interest. 05-07-2009 Chih-Hao Wang, Brimfield, MA US Patent application number Description Published 20110262090 SINGLE-POLARIZATION FIBER - Embodiments of the invention relate to a single-polarization fiber that may include a W-type refractive-index profile having a depressed region along an unguided principal axis of the fiber, and a quasi step-index profile along a guided principal axis of the fiber. The quasi step-index profile may have a depressed region with a radial extent at least twice that of the depressed region along the unguided axis. 10-27-2011 20130287338 Optical Couplers And Methods For Making Same - The present invention relates generally to optical waveguides for the transmission of electromagnetic energy. The present invention relates more particularly to optical couplers for coupling optical fibers, and methods for making them. One aspect of the present invention is an optical coupler for use with a polarization-maintaining input optical fiber and a polarization-maintaining output optical fiber. The coupler includes: a tube having a wide end, a narrow end having an end face, and a taper therebetween; a polarization-maintaining feed-through optical fiber having a first end having an end face and a second end, the polarization-maintaining feed-through optical fiber being disposed within the tube from the wide end to the narrow end, at least the narrow end of the tube being fused around a first length of the polarization-maintaining feed-through optical fiber including the first end of the polarization-maintaining feed-through optical fiber to form a coupler end face comprising the end face of the tube and the end face of the first end of the polarization-maintaining feed-through optical fiber. In one aspect of the invention, the polarization-maintaining feed-through optical fiber has an outer diameter no greater than about 200 μm in the region in which the tube is fused around it. In another aspect of the invention, the polarization-maintaining feed-through optical fiber has an outer diameter at the coupler end face no greater than about 75% of the diameter of the polarization-maintaining input optical fiber. 10-31-2013 Clarence J. Wang, Arlington, MA US Patent application number Description Published 20100062002 Brain Endothelial Cell Expression Patterns - To gain a better understanding of brain tumor angiogenesis, new techniques for isolating brain endothelial cells (ECs) and evaluating gene expression patterns were developed. When transcripts from brain ECS derived from normal and malignant colorectal tissues were compared with transcripts from non-endothelial cells, genes predominantly expressed in the endothelium were identified. Comparison between normal- and tumor-derived endothelium revealed genes that were specifically elevated in tumor-associated brain endothelium. These results confirm that neoplastic and normal endothelium in human brains are distinct at the molecular level, and have significant implications for the development of anti-angiogenic therapies in the future. 03-11-2010 Daniel Wang, Duxbury, MA US Patent application number Description Published 20100152099 MACROCYCLIC COMPOUNDS FOR INHIBITION OF TUMOR NECROSIS FACTOR ALPHA - The invention provides macrocyclic compounds and methods for their synthesis and use. In particular, the invention provides macrocyclic compounds that modulate the activity of tumor necrosis factor alpha and/or are useful in the treatment of medical conditions, such as, rheumatoid arthritis, psoriasis, and asthma. 06-17-2010 Dezhi Wang, Wellesley, MA US Patent application number Description Published 20080202575 METHODS FOR HIGH FIGURE-OF-MERIT IN NANOSTRUCTURED THERMOELECTRIC MATERIALS - Thermoelectric materials with high figures of merit, ZT values, are disclosed. In many instances, such materials include nano-sized domains (e.g., nanocrystalline), which are hypothesized to help increase the ZT value of the material (e.g., by increasing phonon scattering due to interfaces at grain boundaries or grain/inclusion boundaries). The ZT value of such materials can be greater than about 1, 1.2, 1.4, 1.5, 1.8, 2 and even higher. Such materials can be manufactured from a thermoelectric starting material by generating nanoparticles therefrom, or mechanically alloyed nanoparticles from elements which can be subsequently consolidated (e.g., via direct current induced hot press) into a new bulk material. Non-limiting examples of starting materials include bismuth, lead, and/or silicon-based materials, which can be alloyed, elemental, and/or doped. Various compositions and methods relating to aspects of nanostructured thermoelectric materials (e.g., modulation doping) are further disclosed. 08-28-2008 20090200912 Methods for Growing Carbon Nanotubes on Single Crystal Substrates - Methods for growing carbon nanotubes on single crystal substrates are disclosed. A method of producing a nanostructure material comprises coating a single crystal substrate with a catalyst film to form a catalyst coated substrate; annealing the catalyst film by supplying a first promoter gas to the catalyst coated substrate at a first temperature and a first pressure; and supplying a second promoter gas and a carbon-source gas to the catalyst coated substrate in a substantially water-free atmosphere at a second pressure and a second temperature for a time period to cause growth of nanostructures on the catalyst coated substrate. The nanostructure material is used in various applications. 08-13-2009 20150068574 METHODS FOR HIGH FIGURE-OF-MERIT IN NANOSTRUCTURED THERMOELECTRIC MATERIALS - Thermoelectric materials with high figures of merit, ZT values, are disclosed. In many instances, such materials include nano-sized domains (e.g., nanocrystalline), which are hypothesized to help increase the ZT value of the material (e.g., by increasing phonon scattering due to interfaces at grain boundaries or grain/inclusion boundaries). The ZT value of such materials can be greater than about 1, 1.2, 1.4, 1.5, 1.8, 2 and even higher. Such materials can be manufactured from a thermoelectric starting material by generating nanoparticles therefrom, or mechanically alloyed nanoparticles from elements which can be subsequently consolidated (e.g., via direct current induced hot press) into a new bulk material. Non-limiting examples of starting materials include bismuth, lead, and/or silicon-based materials, which can be alloyed, elemental, and/or doped. Various compositions and methods relating to aspects of nanostructured theromoelectric materials (e.g., modulation doping) are further disclosed. 03-12-2015 Patent applications by Dezhi Wang, Wellesley, MA US Di Wang, Worcester, MA US Patent application number Description Published 20110246223 ACTIVE COMPLEX EVENT PROCESSING OR INFECTION CONTROL AND HYGIENE MONITORING - An apparatus, system and method for processing a stream of events in accordance with a set of queries that apply complex event pattern matching, and for performance of actions in accordance with active rules associated with those queries. The execution of actions can take the form of system state changes that in turn can affect the outcome of other queries. Scheduling policies assure both correct and high-performance execution of concurrent event pattern queries and active rules. The stream of events can be associated with a variety of applications including monitoring of hygiene and infection control activities associated with health care. 10-06-2011 20120166417 ASYNCHRONOUS TRANSFER OF STATE INFORMATION BETWEEN CONTINUOUS QUERY PLANS - Described herein are technologies pertaining to migrating state information of operators in a first continuous query plan to a second continuous query plan in an asynchronous manner, such that the first continuous query plan need not cease executing during the migrating of the state information. State information pertaining to stateful operators, such as join operators, is migrated from the first continuous query plan to the second continuous query plan by way of a transformation plan. State matching is utilized to generate the transformation plan. 06-28-2012 Dunwei Wang, Boston, MA US Patent application number Description Published 20090117741 METHOD FOR FABRICATING MONOLITHIC TWO-DIMENSIONAL NANOSTRUCTURES - A patterning method for the creation of two-dimensional nanowire structures. Nanowire patterning methods are used with lithographical patterning approaches to form patterns in a layer of epoxy and resist material. These patterns are then transferred to an underlying thin film to produce a two-dimensional structure with desired characteristics. 05-07-2009 Dunwei Wang, Newton Highlands, MA US Patent application number Description Published 20100043877 Hetero-Nanostructures for Solar Energy Conversions and Methods of Fabricating Same - The embodiments disclosed herein relate to hetero-nanostructures for efficient solar energy conversions, and more particularly to the fabrication of titanium dioxide hetero-nanostructures and methods of using same for water splitting. In an embodiment, a hetero-nanostructure includes a plurality of connected and spaced-apart nanobeams linked together at an about 90-degree angle, the plurality of nanobeams including a conductive silicide core having an n-type photoactive titanium dioxide shell. In an embodiment, a device for splitting water to generate hydrogen and oxygen includes a first compartment two-dimensional hetero-nanostructure having a plurality of connected and spaced-apart nanobeams, each nanobeam substantially perpendicular to another nanobeam, the plurality of nanobeams including an n-type photoactive titanium dioxide shell having a highly conductive core; and a second compartment copper-doped titanium dioxide nanostructure, wherein the first compartment and the second compartment are separated by a semi-permeable membrane. 02-25-2010 20100044072 Methods of Fabricating Complex Two-Dimensional Conductive Silicides - The embodiments disclosed herein relate to the fabrication of complex two-dimensional conductive silicide nanostructures, and methods of fabricating the nanostructures. In an embodiment, a conductive silicide includes a plurality of connected and spaced-apart nanobeams linked together at an about 90-degree angle, the plurality of nanobeams forming a two-dimensional nanostructure having a mesh-like appearance. In an embodiment, a method of fabricating a two-dimensional conductive silicide includes performing chemical vapor deposition, wherein one or more gas or liquid precursor materials carried by a carrier gas stream react to form a nanostructure having a mesh-like appearance and including a plurality of connected and spaced-apart nanobeams linked together at an about 90-degree angle. Dual Absorber Electrodes - Dual absorber electrodes are disclosed. In some embodiments, a dual absorber electrode includes a first absorber material, such as silicon, having a first bandgap, and a second absorber material, such as hematite, deposited on a surface of the first absorber material, the second absorber material having a second bandgap larger than the first bandgap of the first absorber. In some embodiments, the dual absorber electrodes of the present embodiment may be utilized in an electrolytic cell for water splitting. Fengjiang Wang, Northborough, MA US Patent application number Description Published 20090005456 PHENYL SUBSTITUTED CYCLOALKYLAMINES AS MONOAMINE REUPTAKE INHIBITORS - Phenyl-substituted cyclohexylamine derivatives and method for their synthesis and characterization are disclosed. Use of these compounds to treat/prevent neurological disorders as well as methods for their synthesis are set forth herein. Exemplary compounds of the invention inhibit reuptake of endogenous monoamines, such as dopamine, serotonin and norepinephrine (e.g., from the synaptic cleft) and modulate one or more monoamine transporter. Pharmaceutical formulations incorporating compounds of the invention are also provided. 01-01-2009 20090163593 AMINES THAT INHIBIT A MAMMALIAN ANANDAMIDE TRANSPORTER, AND METHODS OF USE THEREOF - One aspect of the present invention relates to amines. A second aspect of the present invention relates to the use of the amines as inhibitors of a mammalian anandamide transporter. The compounds of the present invention will also find use in the treatment of numerous ailments, conditions and diseases which afflict mammals, including but not limited to asthma, neuropathic pain, persistent pain, inflammatory pain, hyperactivity, hypertension, brain ischemia, Parkinson's disease, spasticity, Tourette's syndrome, schizophrenia, hemorrhagic shock, septic shock, cardiac shock, migrane, Horton's headache, multiple sclerosis, anorexia, AIDS wasting syndrome, organ rejection, autoimmune diseases, allergy, arthritis, Crohn's disease, malignant gliomas, neurodegenerative diseases, Huntington's chorea, glaucoma, nausea, anxiety, psychosis, attention deficit hyperactivity disorder, premature ejaculation, and stroke. Another aspect of the present invention relates to combinatorial libraries of amines, and methods for preparing the libraries. 06-25-2009 20090258901 LIGANDS FOR MONOAMINE RECEPTORS AND TRANSPORTERS, AND METHODS OF USE THEREOF - One aspect of the present invention relates to heterocyclic compounds. A second aspect of the present invention relates to the use of the heterocyclic compounds as ligands for various mammalian cellular receptors, including dopamine, serotonin, or norepinephrine transporters. The compounds of the present invention will find use in the treatment of numerous ailments, conditions and diseases which afflict mammals, including but not limited to addiction, anxiety, depression, sexual dysfunction, hypertension, migraine, Alzheimer's disease, obesity, emesis, psychosis, schizophrenia, Parkinson's disease, inflammatory pain, neuropathic pain, Lesche-Nyhane disease, Wilson's disease, and Tourette's syndrome. An additional aspect of the present invention relates to the synthesis of combinatorial libraries of the heterocyclic compounds, and the screening of those libraries for biological activity, e.g., in assays based on dopamine transporters. 10-15-2009 20100190861 CYCLOALKYLAMINES AS MONOAMINE REUPTAKE INHIBITORS - The invention relates to novel cyclohexylamine derivatives and their use in the treatment and/or prevention of central nervous system (CNS) disorders, such as depression, anxiety, schizophrenia and sleep disorder as well as methods for their synthesis. The invention also relates to pharmaceutical compositions containing the compounds of the invention, as well as methods of inhibiting reuptake of endogenous monoamines, such as dopamine, serotonin and norepinephrine from the synaptic cleft and methods of modulating one or more monoamine transporter. 07-29-2010 20110313013 TRIPLE REUPTAKE INHIBITORS AND METHODS OF THEIR USE - Provided herein are bicyclic compounds and methods of synthesis thereof. The compounds provided herein are useful for the treatment, prevention, and/or management of various neurological disorders. Compounds provided herein inhibit uptake of endogenous monoamines, such as dopamine, serotonin and norepinephrine (e.g., from the synaptic cleft) and modulate one or more monoamine transporter. Pharmaceutical formulations containing the compounds are also provided. 12-22-2011 20140107175 TRIPLE REUPTAKE INHIBITORS AND METHODS OF THEIR USE - Provided herein are bicyclic compounds and methods of synthesis thereof. The compounds provided herein are useful for the treatment, prevention, and/or management of various neurological disorders. Compounds provided herein inhibit re-uptake of endogenous monoamines, such as dopamine, serotonin and norepinephrine (e.g., from the synaptic cleft) and modulate one or more monoamine transporter. Pharmaceutical formulations containing the compounds are also provided. 04-17-2014 20140121282 PHENYL SUBSTITUTED CYCLOALKYLAMINES AS MONOAMINE REUPTAKE INHIBITORS - Phenyl-substituted cyclohexylamine derivatives and method for their synthesis and characterization are disclosed. Use of these compounds to treat/prevent neurological disorders as well as methods for their synthesis are set forth herein. Exemplary compounds of the invention inhibit reuptake of endogenous monoamines, such as dopamine, serotonin and norepinephrine (e.g., from the synaptic cleft) and modulate one or more monoamine transporter. Pharmaceutical formulations incorporating compounds of the invention are also provided. 05-01-2014 Patent applications by Fengjiang Wang, Northborough, MA US Fugui Wang, Sterling, MA US Patent application number Description Published 20090156218 HANDING OFF ACTIVE CONNECTIONS - A connection is established between an access terminal and a first radio network controller through a first radio node. The first radio node is controllable primarily by the first radio network controller. The connection is maintained with the first radio network controller as the access terminal moves from a coverage area of the first radio node toward a coverage area of a second radio node. The second radio node is controllable primarily by a second radio network controller and controllable subordinately by the first radio network controller. A connection is also established through the second radio node. Upon a fulfillment of a predetermined criterion, the connection is transferred from the first radio network controller to the second radio network controller. 06-18-2009 20090300336 Microprocessor with highly configurable pipeline and executional unit internal hierarchal structures, optimizable for different types of computational functions - The invention resides in a flexible data pipeline structure for accommodating software computational instructions for varying application programs and having a programmable embedded processor with internal pipeline stages the order and length of which varies as fast as every clock cycle based on the instruction sequence in an application program preloaded into the processor, and wherein the processor includes a data switch matrix selectively and flexibly interconnecting pluralities of mathematical execution units and memory units in response to said instructions, and wherein the execution units are configurable to perform operations at different precisions of multi-bit arithmetic and logic operations and in a multi-level hierarchical architecture structure. 12-03-2009 20090300337 Instruction set design, control and communication in programmable microprocessor cases and the like - Improved instruction set and core design, control and communication for programmable microprocessors is disclosed, involving the strategy for replacing centralized program sequencing in present-day and prior art processors with a novel distributed program sequencing wherein each functional unit has its own instruction fetch and decode block, and each functional unit has its own local memory for program storage; and wherein computational hardware execution units and memory units are flexibly pipelined as programmable embedded processors with reconfigurable pipeline stages of different order in response to varying application instruction sequences that establish different configurations and switching interconnections of the hardware units. Gregory Wang, Brighton, MA US Patent application number Description Published 20090235172 METHOD, APPARATUS, AND COMPUTER PROGRAM FOR PROVIDING WEB SERVICE TESTING - A method, apparatus, and a computer program product for providing web service testing are provided. The apparatus may include a processor that is configured to provide a user interface for a testing tool accessible in a distributed network architecture. The processor may also be configured to receive selections of an application(s) to be tested that is accessible in a distributed network architecture, a function(s) that is associated with the selected application and a method(s) that is associated with the selected function(s). Additionally, the processor may be configured to receive selections of a test case(s) that is associated with the selected method(s). Moreover, the processor may be configured to automatically conduct the selected test case(s). 09-17-2009 Guan Wang, Worcester, MA US Patent application number Description Published 20110220915 Off-Axis Silicon Carbide Substrates - A method of epitaxial growth of a material on a crystalline substrate includes selecting a substrate having a crystal plane that includes a plurality of terraces with step risers that join adjacent terraces. Each terrace of the plurality or terraces presents a lattice constant that substantially matches a lattice constant of the material, and each step riser presents a step height and offset that is consistent with portions of the material nucleating on adjacent terraces being in substantial crystalline match at the step riser. The method also includes preparing a substrate by exposing the crystal plane; and epitaxially growing the material on the substrate such that the portions of the material nucleating on adjacent terraces merge into a single crystal lattice without defects at the step risers. 09-15-2011 20120167477 ABRASIVE PARTICLE AND METHOD OF FORMING SAME - An abrasive article comprising an abrasive particle including a core comprising a compressible material, an intermediate layer comprising a binder material overlying an exterior surface of the core, and an outer layer comprising abrasive grains overlying the intermediate layer. 07-05-2012 20130000210 ABRASIVE SEGMENT COMPRISING ABRASIVE AGGREGATES INCLUDING SILICON CARBIDE PARTICLES - An abrasive article can include an abrasive segment. The abrasive segment can have a body that includes a plurality of abrasive aggregates. In addition, the abrasive aggregates can include a plurality of silicon carbide particles bonded together by a binder material phase. The abrasive aggregates can be contained within a bond material that includes a magnesia-based cement. In an embodiment, the binder material phase can include a vitreous phase material and a crystalline phase material. In particular instances, the binder material phase can include a certain porosity. In another embodiment, the abrasive segment can be formed from a mixture of abrasive aggregates including silicon carbide and a magnesia-based bond material. 01-03-2013 20130000212 LIQUID PHASE SINTERED SILICON CARBIDE ABRASIVE PARTICLES - An abrasive article includes a bonded abrasive body having abrasive particles contained within a bond material. The abrasive particles include silicon carbide and are essentially free of carbon-based and boron-based sintering aid materials. In an embodiment, the bond material can include a phenolic resin. In another embodiment, the bonded abrasive body can include an oxide phase disposed interstitially between the silicon carbide abrasive particles. In an additional embodiment, the abrasive particles can consist essentially of silicon carbide and aluminum oxide in a ratio of silicon carbide to alumina of at least about 8:1. 01-03-2013 20130000215 ABRASIVE AGGREGATE INCLUDING SILICON CARBIDE AND A METHOD OF MAKING SAME - An abrasive article can include an abrasive aggregate with the abrasive aggregate having a plurality of silicon carbide particles bonded together by a binder material. The binder material can include a vitreous phase material, a crystalline phase material, or both. In an embodiment, the crystalline phase material can include an aluminosilicate material. In a particular embodiment, abrasive aggregates can be formed from a mixture including silicon carbide particles, a binder material, and a liquid carrier. The mixture can be formed into a number of green granules that are vibrated and heated on a platen. In an illustrative embodiment, the green granules can then be heated to form abrasive aggregates. 01-03-2013 20130000216 ABRASIVE ARTICLES INCLUDING ABRASIVE PARTICLES OF SILICON NITRIDE - An abrasive article includes a body having abrasive particles contained within a bond material. The abrasive particles can include a majority content of silicon nitride and a minority content of sintering material including at least two rare-earth oxide materials. In an embodiment, the rare-earth oxide materials can include Nd LIQUID PHASE SINTERED SILICON CARBIDE ABRASIVE PARTICLES - An abrasive article includes a bonded abrasive body having abrasive particles contained within a bond material. The abrasive particles include silicon carbide and are essentially free of carbon-based and boron-based sintering aid materials. In an embodiment, the bond material can include a phenolic resin. In another embodiment, the bonded abrasive body can include an oxide phase disposed interstitially between the silicon carbide abrasive particles. In an additional embodiment, the abrasive particles can consist essentially of silicon carbide and aluminum oxide in a ratio of silicon carbide to alumina of at least about 8:1. Hong-Xing Wang, Boston, MA US Patent application number Description Published 20110076694 METHOD OF ASSESSING MAMMALIAN EMBRYO QUALITY - A method of assessing the health of each oocyte or embryo of a mammal from a plurality of oocytes/embryos of the mammal is provided. The method comprises the steps of: measuring gap junctional coupling strength or connexin43 expression of follicular cells associated with each oocyte; and identifying the gap junctional coupling strength/connexin43 expression of follicular cells associated with each oocyte, wherein the greater the coupling strength/connexin43 expression of follicular cells associated with an oocyte relative to the coupling strength/connexin43 expression of follicular cells associated with each other oocyte, the healthier the oocyte and the embryo resulting from that oocyte. Kits for conducting these methods are also provided. 03-31-2011 Huashan Wang, Pittsfield, MA US Patent application number Description Published 20090126778 LUMINESCENT SOLAR CONCENTRATORS - A luminescent solar concentrator comprises a primary waveguide and at least one photovoltaic cell. The primary waveguide has a curved surface which concentrates light on a perimeter. The photovoltaic cell is oriented at the perimeter so that it can both receive the concentrated light and receive direct light as well. A back sheet may be provided that provides structural support and protection. The perimeter may have the shape of a polygon where a photovoltaic cell is oriented along each edge. Modules and arrays of such units are also disclosed. 05-21-2009 Jianfei Wang, Cambridge, MA US Patent application number Description Published 20110127547 CAVITY-ENHANCED MULTISPECTRAL PHOTONIC DEVICES - A multispectral pixel structure is provided that includes a plurality of stacked cavity arrangements for emitting or detecting a plurality of specified wavelengths, wherein each stacked cavity arrangement having a photoactive layer for spectral emission or detection of one of the specified wavelengths. The photoactive layer is positioned within a resonant cavity stack and the resonant cavity stack being positioned between two adjacent mirror stacks. A plurality of coupling-matching layers are positioned between one or more of the stack mirror arrangements for controlling optical phase and coupling strength between emitted or incident light and resonant modes in each of the stacked cavity arrangements. 06-02-2011 Jianna Wang, Grafton, MA US Patent application number Description Published 20100265561 ELECTRO-OPTIC DISPLAYS, AND METHODS FOR DRIVING SAME - The invention relates to electro-optic displays and methods for driving such displays. The invention provides (i) electrochromic displays with solid charge transport layers; (ii) apparatus and methods for improving the contrast and reducing the cost of electrochromic displays; (iii) apparatus and methods for sealing electrochromic displays from the outside environment and preventing ingress of contaminants into such a display; and (iv) methods for adjusting the driving of electro-optic displays to allow for environmental and operating parameters. 10-21-2010 20120167477 ABRASIVE PARTICLE AND METHOD OF FORMING SAME - An abrasive article comprising an abrasive particle including a core comprising a compressible material, an intermediate layer comprising a binder material overlying an exterior surface of the core, and an outer layer comprising abrasive grains overlying the intermediate layer. 07-05-2012 20120192500 COATED ABRASIVE AGGREGATES AND PRODUCTS CONTAING SAME - A coated abrasive product includes a particulate material containing green, unfired abrasive aggregates having a generally spheroidal or toroidal shape, the aggregates formed from a composition comprising abrasive grit particles, a nanoparticle binder, a dual function material, and a cross-linking agent. These green unfired abrasive aggregates can also be used in free abrasive products and bonded abrasive products. 08-02-2012 20130014445 COATED ABRASIVE AGGREGATES AND PRODUCTS CONTAING SAME - Abrasive aggregates and fixed abrasive articles comprising formaldehyde-free polymer binder and a plurality of abrasive grains are provided that are particularly suitable for machining operations, in which abrasion is carried out to remove material and improve surface quality. Certain embodiments combine an abrasive grain, which can be in the form of microparticles, and a formaldehyde-free polymer binder, which can be in the form of a polymer resin and cross-linking agent. Optionally, the abrasive aggregate can contain a secondary cross-linking agent, or a functional filler, such as a grinding aid. 01-17-2013 20130095731 ABRASIVE PRODUCTS AND METHODS FOR FINISHING HARD SURFACES - A coated abrasive product includes green, unfired abrasive aggregates having a generally spheroidal or toroidal shape, the aggregates formed from a composition comprising abrasive grit particles and a nanoparticle binder, wherein the abrasive aggregates are dispersed within a polymer resin coating, and wherein the coated abrasive product is capable of superfinishing a metal surface having an initial Ra in the range of about 1.5 micro inches to about 12.5 micro inches prior to application of the coated abrasive product and after application the surface has an Ra of less than 1.0 micro inch. 04-18-2013 20130189911 ABRASIVE PRODUCTS AND METHODS FOR FINISHING COATED SURFACES - A coated abrasive product includes green, unfired abrasive aggregates having a generally spheroidal or toroidal shape, the aggregates formed from a composition comprising abrasive grit particles, a nanoparticle binder, a sulfosuccinate, and a crosslinking, wherein the abrasive aggregates are dispersed within a polymer resin coating comprising a mixture of copolyester resin. The coated abrasive product is capable of finishing coated surfaces and repairing defects in coated surfaces, including surfaces coated with automotive primers, paints, clear coats, and combinations thereof. 07-25-2013 20130283702 ABRASIVE PRODUCTS AND METHODS FOR FINE POLISHING OF OPHTHALMIC LENSES - A coated abrasive product including green, unfired abrasive aggregates having a generally spheroidal or toroidal shape, the aggregates formed from a composition comprising abrasive grit particles and a nanoparticle binder, wherein the abrasive aggregates are dispersed within a polymer resin coating, and wherein the coated abrasive product is capable of polishing an optical component, including ophthalmic lenses without the need to apply an abrasive slurry. 10-31-2013 20130298471 ABRASIVE PRODUCTS AND METHODS FOR FINISHING SURFACES - An engineered coated abrasive product having a three dimensional pattern of abrasive structures formed by embossing an abrasive slurry formulation that was first surface coated with a functional powder, wherein the abrasive slurry includes green, unfired abrasive aggregates having a generally spheroidal or toroidal shape, the aggregates formed from a composition comprising abrasive grit particles and a nanoparticle binder. The coated abrasive product is capable of finishing and repairing defects in surfaces, including coated surfaces. 11-14-2013 Patent applications by Jianna Wang, Grafton, MA US Jia-Yu Wang, Amherst, MA US Patent application number Description Published 20080230514 METHOD OF PRODUCING NANOPATTERNED TEMPLATES - Nanopatterned substrates can be prepared by a method that includes forming a block copolymer film on a substrate, annealing the block copolymer film, surface reconstructing the annealed block copolymer film, coating an etch-resistant layer on the surface reconstructed block copolymer film, etching the resist-coated block copolymer film to create an etched article comprising a nanopatterned substrate, and separating the etch-resistant layer and the block copolymer film from the nanopatterned substrate. The method is applicable to a wide variety of substrate materials, avoids any requirement for complicated procedures to produce long-range order in the block copolymer film, and avoids any requirement for metal functionalization of the block copolymer. 09-25-2008 Jim Jianping Wang, Dover, MA US Patent application number Description Published 20100150157 PEER TO MULTI-PEER ROUTING - A collaboration system using peer-to-multi-peer distribution of messages representing changes to a shared workspace. Each peer determines a distribution mechanism for messages to each of the target peers sharing the workspace. The selected distribution mechanism may depend on capabilities of a home relay associated with a peer initiating a message. Further, messages to subsets of the target peers sharing the workspace may be distributed using a session for each subset on which each message is sent only one time. The subset of target peers associated with some of the sessions may be selected so that target peers for which communication attempts have failed are grouped in the same session. In some scenarios, the initiating peer may provide multiple routing paths for target peers in a session and the home relay server may appropriately forward the message to the target peers, using one of the routing paths. 06-17-2010 Jimpo Wang, Tyngsboro, MA US Patent application number Description Published 20090085419 Hybrid touchdown bearing system - Upon operation, flywheel assemblies sand other such rotational mechanisms are released by mechanical backup bearings, which then normally remain disengaged until shutdown as the flywheel assembly is levitated by the axial magnetic field. However, either due to over heating of bearings, power failure or other stimuli, flywheels often suffer a phenomenon deemed as touchdown down from the levitation state. During this touchdown event, flywheels inherently lose rotational momentum, thus ceasing to generate and release power and often cause damage to components as well as casing. Enhancements developed herein, through the introduction of the instant secondary hybrid touchdown bearing system, allow flywheels and other such systems to retain rotational momentum and continue generation of energy. Further, the instant system negates damage to system components, as well as bearing wear. 04-02-2009 Jimpo Wang, Westford, MA US Patent application number Description Published 20100156219 Advanced Flywheel and Method - A flywheel levitation apparatus and associated method are described for use in a flywheel driven power storage system having a rotor and which provides for an upward vertical movement of the rotor along an axis of rotation. The rotor includes a rotor face defining a cutaway section. A magnetic lifting force is applied to the rotor to at least in part serve in levitating the rotor. The magnetic lifting force exhibits a modified gap sensitivity that is smaller as compared to a conventional gap sensitivity that would be exhibited in an absence of the cutaway section. 06-24-2010 20130043750 ADVANCED FLYWHEEL AND METHOD - A flywheel levitation apparatus and associated method are described for use in a flywheel driven power storage system having a rotor and which provides for an upward vertical movement of the rotor along an axis of rotation. The rotor includes a rotor face defining a cutaway section. A magnetic lifting force is applied to the rotor to at least in part serve in levitating the rotor. The magnetic lifting force exhibits a modified gap sensitivity that is smaller as compared to a conventional gap sensitivity that would be exhibited in an absence of the cutaway section. 02-21-2013 Jimpo Wang, Wilmington, MA US Patent application number Description Published 20080315696 Lift magnet mechanism for flywheel power storage systems - Electric power is stored in a flywheel assembly, from a dc power buss, and supplied to the buss, through electronics associated with a motor/generator, its rotor integral with a flywheel supported by magnetic bearings. Upon operation, the flywheel assembly is released by mechanical backup bearings which then normally remain disengaged until shutdown as the flywheel assembly is levitated by the axial magnetic field. Enhancements developed herein smooth the flux density across discontinuities or segments present in permanent magnets due to presently limited capability for manufacture of large annular magnetic members. Herein, the introduction of a medium such as a steel cylindrical member to directly interface with the rotor as opposed to the segmented permanent magnet, greatly eradicates induced eddy current and heat on the rotor. In addition, exhibited is an annularly slotted rotor which allows for greater surface area for flux absorption. Methods for prognosing the ability of a zearalenone analog compound to treat cancer - The instant invention provides methods of prognosing the ability of a zearalenone analog compound to treat a cancer in a subject, methods of prognosing the ability of a zearalenone analog compound to inhibit the growth of a cancer in a subject, and methods of prognosing the ability of a zearalenone analog compound to promote the activation of apoptosis of a cancer in a subject. Methods of treating a cancer in a subject are also provided. The invention also pertains to methods of determining whether a cancer in a subject is sensitive to treatment with a zearalenone analog compound. 07-02-2009 20110144101 MACROCYCLIC COMPOUNDS USEFUL AS PHARMACEUTICALS - The present invention provides methods for the use of compounds having formula (I) in the treatment of various disorders including inflammatory or autoimmune disorders, and disorders involving malignancy or increased angiogenesis, wherein R 06-16-2011 20130196987 MACROCYCLIC COMPOUNDS USEFUL AS PHARMACEUTICALS - The present invention provides compounds, methods for the synthesis thereof and methods for the use thereof in the treatment of various disorders including inflammatory or autoimmune disorders, and disorders involving malignancy or increased angiogenesis. Joyce Jeanpin Wang, Watertown, MA US Patent application number Description Published 20090006382 SYSTEM AND METHOD FOR MEASURING THE QUALITY OF DOCUMENT SETS - Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining. 01-01-2009 20090006383 SYSTEM AND METHOD FOR MEASURING THE QUALITY OF DOCUMENT SETS - Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining. 01-01-2009 20090006384 SYSTEM AND METHOD FOR MEASURING THE QUALITY OF DOCUMENT SETS - Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining. 01-01-2009 20090006385 SYSTEM AND METHOD FOR MEASURING THE QUALITY OF DOCUMENT SETS - Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining. 01-01-2009 20090006386 SYSTEM AND METHOD FOR MEASURING THE QUALITY OF DOCUMENT SETS - Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining. 01-01-2009 20090006387 SYSTEM AND METHOD FOR MEASURING THE QUALITY OF DOCUMENT SETS - Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining. 01-01-2009 20090006438 SYSTEM AND METHOD FOR MEASURING THE QUALITY OF DOCUMENT SETS - Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining. 01-01-2009 20120124032 SYSTEM AND METHOD FOR CONCEPT VISUALIZATION - Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining. 05-17-2012 20120197877 SYSTEM AND METHOD FOR MEASURING THE QUALITY OF DOCUMENT SETS - Systems and methods are described that calculate the interestingness of a set of one or more records in a database, either absolutely (i.e., compared to an overall collection of records) or relative to some other set of records. In one embodiment, the measure is a relative entropy value that has been normalized. Various applications of the measure are described in the context of an information retrieval system. These applications include, for example, guiding query interpretation, guiding view selection and summarization, intelligent ranges, event detection, concept triggers and interpreting user actions, hierarchy discovery, and adaptive data mining. 08-02-2012 Julia Ying Wang, Brookline, MA US Patent application number Description Published 20090317410 USE OF ZWITTERIONIC POLYSACCHARIDES FOR THE SPECIFIC MODULATION OF IMMUNE PROCESSES - The invention relates to three-dimensional molecular structure determination of polymers, three-dimensional computer molecular modeling, rational drug design, and immunomodulatory polymers. In particular the invention is directed to immunomodulatory polymers, as well as to methods for designing, selecting, and screening therapeutic agents having immunomodulatory activity. 12-24-2009 Kaiyu Wang, Peabody, MA US Kenneth Kuan-Yuen Wang, Waltham, MA US Patent application number Description Published 20100113474 Antineoplastic Combinations of 4-Anilino-3-Cyanoquinolines and Capecitabine - A combination of a 4-anilino-3-cyanoquinoline compound (e.g. HKI-272, SKI-606, EKB-569) and a capecitabine compound in the treatment of a neoplasm is provided. Regimens, kits, and methods for treatment of neoplasm, including breast cancer including metastatic breast cancer, and lung cancer, using this combination, optionally in combination with other anti-neoplastic agents, or immune modulators are also described. 05-06-2010 20140171384 ANTINEOPLASTIC COMBINATIONS OF 4-ANILINO-3-CYANOQUINOLINES AND CAPECITABINE - A combination of a 4-anilino-3-cyanoquinoline compound (e.g. HKI-272, SKI-606, EKB-569) and a capecitabine compound in the treatment of a neoplasm is provided. Regimens, kits, and methods for treatment of neoplasm, including breast cancer including metastatic breast cancer, and lung cancer, using this combination, optionally in combination with other anti-neoplastic agents, or immune modulators are also described. Lu X. Wang, Northborough, MA US Poguang Wang, Westborough, MA US Patent application number Description Published 20090215185 Non-signal Imidazole Reagents for Mass Spectrometry Analysis of Phosphomonoesters - Analytical chemical reagents termed non-signal imidazoles and a method for their use that provide a host of advantages for analysis of phosphomonoesters are described. The method and compounds of the invention provide a host of advantages for the analysis of phosphomonoester-containing compounds, namely characteristic, multi-analyte detection with high sensitivity and specificity of known and unknown phosphomonoester-compounds simultaneously. Non-Signal Imidazole Reagents for Mass Spectrometry Analysis of Phosphomonoesters - Analytical chemical reagents termed non-signal imidazoles and a method for their use that provide a host of advantages for analysis of phosphomonoesters are described. The method and compounds of the invention provide a host of advantages for the analysis of phosphomonoester-containing compounds, namely characteristic, multi-analyte detection with high sensitivity and specificity of known and unknown phosphomonoester-containing compounds simultaneously. 11-03-2011 20130313198 CAGED BAGS OF POROUS MATERIALS - Systems and methods employing beds of bagged and caged absorbent and adsorbent materials are disclosed. These inventions are useful in the area of solid phase extraction. 11-28-2013 Patent applications by Poguang Wang, Westborough, MA US Qiuhong Wang, Tyngsboro, MA US Patent application number Description Published 20090071989 Apparatus and methods for automatic shoe cover stripping - Protective shoe covers have been widely used in health care setting and some industry environment that require clean room condition. To strip off the disposed shoe covers in a hand-free and automated fashion is very desirable to the users, which provide physical convenience, time saving and economic merits. This disclosed invention provides methods and an automatic system for stripping of disposable shoe cover from user's foot/feet that includes the electromechanical complex, a micro control unit and its embedded software programs, control algorithm to guide the execution of the stripping functions in automated and hand-free fashion. 03-19-2009 Ruike R. Wang, Lexington, MA US Patent application number Description Published 20080206632 BATTERY SEPARATOR - An alkaline battery includes a housing, a cathode disposed within the housing, an anode disposed within the housing, a separator disposed between the anode and the cathode, and an alkaline electrolyte contacting the anode and the cathode. The separator can include a tube having at an inner tube layer and an outer tube layer. The inner tube layer is disposed radially inward from the outer tube layer and no portion of the inner tube layer is disposed radially outward from any portion of the outer tube layer. The separator can also include a disc positioned at one end of the tube to create a closed end of the separator. 08-28-2008 Run-Ming Wang, Somerville, MA US Patent application number Description Published 20080242658 Inhibitors of Iap - Novel compounds that inhibit the binding of the Smac protein to Inhibitor of Apoptosis Proteins (IAPs) of the formula I Sha-Sha Wang, Wellesley, MA US Patent application number Description Published 20110059455 METHODS AND COMPOSITIONS FOR DIRECT CHEMICAL LYSIS - A direct chemical lysis composition includes an assay compatible buffer composition and an assay compatible surfactant. When combined with a specimen storage composition, such compositions prevent undesired modifications to nucleic acid and proteins lysed from cells in the biological sample. Assays of samples from such compositions do not require expensive and time-consuming steps such as centrifugation and prolonged high temperature processing. The direct chemical lysis composition of the present invention permits direct nucleic acid extraction from the cells in the biological sample without the need to decant off the transport media or otherwise exchange the transport media with assay compatible buffers. There is no need to combine the sample with proteinase K or another enzyme to extract nucleic acids from the cells. A method for lysing cells to obtain target nucleic acid for assay and a kit for combining the direct chemical lysis composition with a sample are also contemplated. 03-10-2011 20110244457 IMMUNO-AMPLIFICATION - A high-sensitivity, low-background immuno-amplification assay is provided, which offers a streamlined workflow suitable for high-throughput assays of clinically relevant samples, such as blood and other bodily fluids. The assay comprises the use of two proximity members that each comprise an analyte-specific binding component conjugated to an oligonucleotide. Binding an analyte brings the oligonucleotide moieties of the proximity members in sufficiently close contact that the oligonucleotides form an amplicon. The presence of the analyte then is detected through amplification of the amplicon and detection of the amplified nucleic acids. The sensitivity of the assay of the present invention is improved by preventing spurious or non-specific amplicon formation by proximity members that are not complexed with an analyte. 10-06-2011 Shiquan Wang, Northborough, MA US Patent application number Description Published 20100121511 LI-ION BATTERY ARRAY FOR VEHICLE AND OTHER LARGE CAPACITY APPLICATIONS - A large battery array, particularly for use in an electric vehicle, is formed of multiple modules, each containing plural battery cells and module management electronics. Each battery module has a nominal output voltage in the range of about 5 volts to about 17 volts. A controller communicates with individual battery modules in the array and controls switching to connect the modules in drive and charging configurations. The module management electronics monitor conditions of each battery module, including the cells it contains, and communicates these conditions to the controller. The module management electronics may place the modules in protective modes based upon the performance of each module in comparison to known or configurable specifications. The modules may be pluggable devices so that each module may be replaced if the module is in a permanent shutdown protective mode or if a non-optimal serviceable fault is detected. Weidong Wang, Lexington, MA US Patent application number Description Published 20090086727 Intelligent Routing in a Hybrid Peer-to-Peer System - Intelligent routing may be provided. First, a second peer via home relay may receive presence information indicating that a first peer is connected to a first foreign relay. Then the second peer may update, in response to the presence information, a routing table to indicate that a primary place to send data to the first peer is the first foreign relay. Next, the second peer may determine from the routing table that the primary place to send the data to the first peer is the first foreign relay. Next, the home relay may receive a request from a second peer to send data to the first peer via the first foreign relay. Then, in response to determining from the routing table that the primary place to send the data to the first peer is the first foreign relay, the data may be sent to the first foreign relay. 04-02-2009 Weisong Wang, Westford, MA US Patent application number Description Published 20090016404 INTELLIGENT THERMOMETER - A device for measuring the body temperature of a user is provided. The device comprises a casing having an opening; a sensing device extending from the opening of the casing, the sensing device configured for measuring the body temperature of the user and generating an output signal when the sensing device is received by the user, the output signal indicative of the body temperature of the user; and a controller in electrical communication with the sensing device, the controller configured to receive the output signal and to calculate a temperature reading representative of the body temperature of the user, the controller further configured to determine whether the temperature reading is within one of a plurality of temperature ranges based on the age of the user, and the controller further configured to generate a dosage amount of a plurality of medicines based on the age of the user and weight of the user. 01-15-2009 20090150496 AUTOMATED TRANSLATOR FOR SYSTEM-GENERATED PREFIXES - A method is provided for localizing a prefix in a subject header field of an incoming electronic message. The method comprises receiving a value string of a subject header in an electronic message; identifying a system-generated prefix in the value string by parsing the value string and accessing a database storing a plurality of system-generated prefixes and a corresponding comparable local prefix for each of the plurality of system-generated prefixes; and converting the system-generated prefix to its corresponding comparable local prefix in the database. 06-11-2009 Wender Wang, Wilmington, MA US Patent application number Description Published 20090294553 COMBINATION LIGHT AND A DEVICE FOR DISPENSING A VOLATILE SUBSTANCE - A combination lantern and insect repellent dispensing apparatus. Light is produced by light bulbs or LEDs whereas insect repellent is dispensed by heating a volatilizable insecticide The insecticide and portable light may be used either concurrently or independently of each other. 12-03-2009 20100276416 HEATING DEVICE HAVING ELECTRIC AND FUEL POWERED HEAT SOURCES - A portable device which generates heat and which can be used alternatively as a corded, plug-in device or as a cordless, fuel-powered device. The device has dual heating capabilities—each of which is powered by a unique cartridge. For use as a plug-in device an electric cartridge that connects the device to an adapter is utilized, whereas for use as a portable device a fuel cartridge is utilized for supplying a hydrocarbon fuel to support combustion. Use of one of the cartridges prevents the use of the other. 11-04-2010 20110057051 Combination Flashlight and a Device for Dispensing a Volatile Substance - A combination flashlight and insect repellent dispensing apparatus. Light is produced by light bulbs or LEDs whereas insect repellent is dispensed by heating a volatilizable insecticide. The insecticide and portable light may be used either concurrently or independently of each other. 03-10-2011 Patent applications by Wender Wang, Wilmington, MA US Wenqin Wang, Somerville, MA US Patent application number Description Published 20110002530 SUB-DIFFRACTION LIMIT IMAGE RESOLUTION IN THREE DIMENSIONS - The present invention generally relates to sub-diffraction limit image resolution and other imaging techniques, including imaging in three dimensions. In one aspect, the invention is directed to determining and/or imaging light from two or more entities separated by a distance less than the diffraction limit of the incident light. For example, the entities may be separated by a distance of less than about 1000 nm, or less than about 300 nm for visible light. In some cases, the position of the entities can be determined in all three spatial dimensions (i.e., in the x, y, and z directions), and in certain cases, the positions in all three dimensions can be determined to an accuracy of less than about 1000 nm. In one set of embodiments, the entities may be selectively activatable, i.e., one entity can be activated to produce light, without activating other entities. A first entity may be activated and determined (e.g., by determining light emitted by the entity), then a second entity may be activated and determined. The emitted light may be used to determine the x and y positions of the first and second entities, for example, by determining the positions of the images of these entities, and in some cases, with sub-diffraction limit resolution. In some cases, the z positions may be determined using one of a variety of techniques that uses intensity information or focal information (e.g., a lack of focus) to determine the z position. Non-limiting examples of such techniques include astigmatism imaging, off-focus imaging, or multi-focal-plane imaging. 01-06-2011 Xianghong S. Wang, Westford, MA US Patent application number Description Published 20110166915 SYSTEM AND METHOD FOR DETERMINING A CUSTOMER CONTACT STRATEGY - A system and method determines a customer contact strategy that creates associations between customer characteristics and customer responsiveness to direct email campaigns. A plurality of variables relating to historical customer purchasing behavior, and customer responsiveness to direct mail campaigns, are evaluated. In addition, customer responsiveness to direct email campaigns are also evaluated, while also enabling the evaluation of a customer based on customer characteristics and responsiveness. Conventional direct mail campaigns utilize various models to identify customer propensity and prospective customer propensity. The present invention adds to these models a model to determine how well a customer responds to direct email campaigns, and then determines which form of direct contact is preferred at a customer level (i.e., on a customer by customer basis). 07-07-2011 Xiaoying Wang, West Roxbury, MA US Patent application number Description Published 20110129526 COMPOSITIONS AND METHODS FOR TREATING VASCULAR DISEASE - The use of tPA to treat hemorrhagic transformation, neurotoxicity has been limited to short treatment time windows because a high dose of tPA required to generate sufficient amounts of the enzyme plasmin for clot lysis. The present invention combines tPA with recombinant Annexin A2 resulting in thrombolysis without hemorrhagic transformation at delayed times after stroke. This embodiment allows the administration of a lower, non-neurotoxic, tPA dose. Our results suggest this novel combination for stroke therapy may greatly improve both efficacy and safety, and prolong tPA therapeutic time window. 06-02-2011 Xihua Wang, Allston, MA US Patent application number Description Published 20100039126 NANOCHANNEL-BASED SENSOR SYSTEM FOR USE IN DETECTING CHEMICAL OR BIOLOGICAL SPECIES - A sensor system for detecting a chemical or biological species includes a sensing element and a bias and measurement circuit. The sensing element includes nanochannels, each having an outer surface functionalized to chemically interact with the species to create a corresponding surface potential, and each having a sufficiently small cross section to exhibit a shift of a differential conductance characteristic into a negative bias operating region by a shift amount dependent on the surface potential. The bias and measurement circuit applies a bias voltage across two ends of the nanochannels sufficiently negative to achieve a desired dependence of the differential conductance on the surface potential, wherein the dependence has a steeply sloped region of high amplification substantially greater than a reference amplification at a zero-bias condition, thus achieving relatively high signal-to-noise ratio. The bias and measurement circuit converts the measured differential conductance into a signal indicative of presence or activity of the species of interest. 02-18-2010 20110021894 GLUCOSE SENSOR EMPLOYING SEMICONDUCTOR NANOELECTRONIC DEVICE - A glucose sensor employs a programmable glucose sensor array of a relatively large number of nanoelectronic devices (e.g. semiconductor field-effect devices) having control surfaces functionalized with a glucose-reactive substance and generating sensing signals indicative of sensed glucose level of a bodily fluid. The devices are divided into sub-sets sequentially enabled over successive intervals to achieve overall sensor lifetime many times longer than the lifetime of any single device in operation. 01-27-2011 20140030747 NANOCHANNEL-BASED SENSOR SYSTEM FOR USE IN DETECTING CHEMICAL OR BIOLOGICAL SPECIES - A sensor system for detecting a chemical or biological species includes a sensing element and a bias and measurement circuit. The sensing element includes nanochannels having an outer surface functionalized for interaction with the species to create a surface potential, and each having a sufficiently small cross section to exhibit a shift of differential conductance into a negative bias operating region by a shift amount dependent on the surface potential. The bias and measurement circuit applies a bias voltage across two ends of the nanochannels sufficiently negative to achieve a desired dependence of the differential conductance on the surface potential. The dependence has a steeply sloped region of high amplification substantially greater than a reference amplification at a zero-bias condition, thus achieving relatively high signal-to-noise ratio. The bias and measurement circuit converts the measured differential conductance into a signal indicative of presence or activity of the species. 01-30-2014 Patent applications by Xihua Wang, Allston, MA US Xinwei Wang, Dunstable, MA US Patent application number Description Published 20090238313 STEPPED GAIN MIXER - An amplified stepped gain mixer portion improves the signal-to-noise ratio of a receiver by using multiple gain states to improve linearity. The mixer portion includes an amplifier, a switch and two transistors. The amplifier output is coupled to the sources of the two transistors. An oscillating signal is present on the transistor gates. The transistor drains are coupled to one another through the switch when the switch is closed. The mixer portion operates in two modes. In a 1/2 mode, the mixer portion output current flows only through the first transistor and not through the second transistor because the switch is open. In a 2/2 mode, the mixer portion output current flows through both transistors. The mixer portion is configured such that the switch is closed when a switching signal is asserted. The switching signal is asserted when a bit of a mixer control register is written to. 09-24-2009 20130324062 POWER DETECTOR WITH TEMPERATURE COMPENSTATION - Power detectors with temperature compensation and having improved accuracy over temperature are disclosed. In an aspect of the disclosure, variations of a power detector gain over temperature is reduced by varying both the gate and drain voltages of MOS transistors within a power detector. In an exemplary design, an apparatus includes at least one MOS transistor, which receives an input signal, detects the power of the input signal based on a power detection gain, and provides an output signal indicative of the power of the input signal. The at least one MOS transistor is applied a variable gate bias voltage and a variable drain bias voltage in order to reduce variations of the power detection gain over temperature. At least one additional MOS transistor may receive a second variable gate bias voltage and provide the variable drain bias voltage for the at least one MOS transistor. 12-05-2013 20140266518 Step Attenuator with Constant Input Capacitance - A step attenuator with constant input capacitance and having good performance is disclosed. In an exemplary design, an apparatus includes a step attenuator having a constant input capacitance for different amounts of attenuation. The step attenuator receives an input signal, provides a variable amount of attenuation for the input signal, and provides an output signal. The step attenuator may include a plurality of attenuator sections coupled in series. Each attenuator section may include a plurality of capacitors and may have the constant input capacitance. At least one of the plurality of attenuator sections may be selected or unselected to obtain a selected amount of attenuation for the step attenuator. An attenuator section may provide a predetermined amount of attenuation or a variable amount of attenuation when selected. The apparatus may further include a power detector that receives and determines the power of the output signal from the step attenuator. 09-18-2014 20150022024 SWITCH LINEARIZER - Exemplary embodiments are related to switch linearizer. A device may include at least one switch. The device may further include a linearizer coupled to the at least one switch and configured to cancel at least a portion of distortion generated by the at least one switch in an off-state. 01-22-2015 20150035550 HIGH ACCURACY MEASUREMENT OF ON-CHIP COMPONENT PARAMETERS - Techniques for measuring on-chip component parameters are described herein. In one embodiment, a method for measuring one or more on-chip component parameters comprises measuring a time for an on-chip capacitor to charge to a voltage approximately equal to a reference voltage, and measuring a time for the on-chip capacitor to charge to a voltage approximately equal to a voltage across an on-chip component. The method also comprises determining a parameter of the on-chip component based on the measured time for the on-chip capacitor to charge to the voltage approximately equal to the reference voltage, the measured time for the on-chip capacitor to charge to the voltage approximately equal to the voltage across the on-chip component, and the reference voltage. 02-05-2015 20150042399 ANALOG SWITCH FOR RF FRONT END - Techniques for improving the linearity of radio-frequency (RF) front-end switches. In an aspect, open-loop techniques are disclosed for superimposing the output voltage of one or more negative rectifiers on a negative substrate bias voltage to reduce the non-linearities associated with voltage-dependent substrate leakage current. In another aspect, closed-loop techniques are further disclosed for maintaining the substrate bias voltage close to a reference voltage. Exemplary embodiments of the circuit blocks are further described. 02-12-2015 20150042412 DIRECTIONAL COUPLER CIRCUIT TECHNIQUES - Techniques for efficiently integrating directional coupler circuitry with other circuit elements of an RF front end. In an aspect, one or more inductors of an RF front end filter is incorporated into a first inductor of the directional coupler, and a capacitor is further coupled in parallel with the first inductor. In another aspect, circuitry associated with matching components of the RF front end may further be incorporated into the directional coupler design. Further techniques are provided for coupling directivity tuning elements to a second inductor of the directional coupler to improve the linearity of the coupler over other tuning techniques. 02-12-2015 Patent applications by Xinwei Wang, Dunstable, MA US Xinwen Wang, Bedford, MA US Patent application number Description Published 20100331213 MICROPARTICLES WITH ENHANCED COVALENT BINDING CAPACITY AND THEIR USES - A polyelectrolyte having multiple exposed functional groups, each such group being capable of covalently bonding to a molecule, is immobilized on a surface for the purpose of bonding to a biomolecule. The biomolecule can be, for example, a nucleic acid, e.g., an amine functionalized oligonucleotide. The polyelectrolyte can include, e.g., BSA (Bovine Serum Albumin) which is bound to a functionalized surface using a covalent immobilization strategy, e.g., reaction with the surface of a tosyl-activated microparticle. Following such reaction, exposed reactive functional groups on the protein, such as amine, carboxyl, thiol, hydroxyl groups can further be utilized to covalently couple the oligonucleotide of interest using suitable chemistry. Xuerui Wang, Amherst, MA US Patent application number Description Published 20090132334 System and Method for Estimating an Amount of Traffic Associated with a Digital Advertisement - Systems and methods for estimating an amount of traffic associated with a digital ad are disclosed. Generally, a forecasting module identifies a set of candidate webpages on which a digital ad may be displayed and estimates a click through rate associated with the digital ad and a webpage of the set of candidate webpages. The forecasting module determines a ranking score associated with the digital ad based on the determined click through rate and a bid price associated with the digital ad. The forecasting module then examines historical data, such as search logs, to determine an estimate of traffic associated with the digital ad with respect to the webpage in response to determining the ranking score of the digital ad exceeds a ranking score associated with another digital ad that was previously displayed on the webpage. 05-21-2009 Yichun Wang, West Roxbury, MA US Patent application number Description Published 20110039148 ALKALINE PRIMARY CELLS - A battery is described. The battery includes an anode, a cathode, a separator disposed between the cathode and the anode, and an electrolyte. The anode further includes manganese. 02-17-2011 20110039149 ALKALINE PRIMARY CELLS - A battery is described. The battery includes an anode, a cathode, a separator disposed between the cathode and the anode, and an electrolyte. The cathode further includes manganese. 02-17-2011 20110039150 ALKALINE PRIMARY CELLS - A battery is described. The battery includes an anode, a cathode, a separator disposed between the cathode and the anode, and an electrolyte. The electrolyte further includes manganese. The manganese is selected from the group consisting of: cesium permanganate (CsMnO PRIMARY ALKALINE BATTERY - A primary battery includes a cathode having a non-stoichiometric metal oxide including transition metals Ni, Mn, Co, or a combination of metal atoms, an alkali metal, and hydrogen; an anode; a separator between the cathode and the anode; and an alkaline electrolyte. 09-15-2011 20130036603 PRIMARY ALKALINE BATTERY - A primary battery includes a cathode having a non-stoichiometric metal oxide including transition metals Ni, Mn, Co, or a combination of metal atoms, an alkali metal, and hydrogen; an anode; a separator between the cathode and the anode; and an alkaline electrolyte. 02-14-2013 Patent applications by Yichun Wang, West Roxbury, MA US Yifong Wang, Lexington, MA US Patent application number Description Published 20090087888 PRODUCTION OF MONATIN STEREOISOMERS - Methods and materials for the production of the high intensity sweetener, monatin, in stereoisomerically-pure or stereoisomerically-enriched form are disclosed. For example, methods using stereoisoselective hydrolysis and separation of a monatin-derived lactone ester are disclosed. 04-02-2009 Yige Wang, Natick, MA US Patent application number Description Published 20100058139 Method for constructing large-girth quasi-cyclic low-density parity-check codes - A method constructs a code, wherein the code is a large-girth quasi-cyclic low-density parity-check code. A base matrix is selected for the code. A cost matrix corresponding to the base matrix is determined. A single element in the base is changed repeatedly maximize a reduction in cost. A parity check matrix is constructing for the code from the base matrix when the cost is zero, and an information block is encoded as a code word using the parity check matrix in an encoder. 03-04-2010 20100077278 Method and System for Authenticating Reliable Biometric Data - A method for authenticating biometric data. Comprising of a processor that measures the reliability of each bit in enrollment biometric data; by arranging the bits; encoding the enrollment biometric data in the decreasing order to produce an enrollment syndrome; arranging the bits in the authentication biometric; decoding the authentication enrollment syndrome to produce an estimate of the enrollment biometric data; generating an output signal indicating that the estimate of the authentication biometric data is substantially the same as the enrollment biometric data. 03-25-2010 20100185870 Method and System for Managing a Hierarchy of Passwords - A method and system manage a hierarchy of passwords for users accessing a hierarchy of access control devices. First, a codeword is acquired and a syndrome of the codeword is determined. Next, the codeword is randomly modified with a probability p to produce a modified codeword. The modified codeword is selected and assigned to a user as a password, if the modified codeword is recoverable. 07-22-2010 20100192040 Multi-Stage Decoder for Error-Correcting Codes - A multi-stage decoder decodes a block of symbols, received via a noisy channel, to a codeword. The decoder includes multiple sub-decoders connected sequentially, and wherein a next sub-decoder has a slower processing time and better word error rate than a previous sub-decoder, and wherein the next sub-decoder is only executed if the previous decoder fails to decode the block sequence of symbols, and a last sub-decoder is executed until a termination condition is reached. 07-29-2010 20100263007 Method and Apparatus for Increasing Quality of IPTV Transmission - In a home network for Internet protocol (IP) television (IPTV), a controller of an IPTV-set-top box (STB) acquires and analyzes of an operation of the home network and data packets in the network. In a home gateway (HG), the statistics are received, and the packets are decoded, and then encodes into data packets, repair packets and according to the statistics to decrease packet loss. That is, the encoded packets have additional error correction codes. Method and System for Harmonizing QoS in Home Networks - Packet in a multimedia stream has and associated standard priority level specified by standard protocols. The standard priority level in input packets received by a home gateway is converted to a harmonized priority level. Then, the input packets are processed in the home gateway according to the harmonized priority level, and converted from the harmonized priority level to the standard priority level in corresponding output packets after the processing. 06-16-2011 20120140829 Signal Coding Using Spatial Statistical Dependencies - An encoded signal is decoded based on statistical dependencies between the encoded signal and the side information. A statistical reliability of each transform block of the side information is determined as a function of absolute values of transform coefficients of a transform block. The transform blocks of the side information are grouped into a set of groups based on the statistical reliability of each transform block. The decoding is performed using a statistical dependency between a transform block of the encoded signal and a group including a corresponding transform block of the side information. 06-07-2012 20120140922 Method for Generating Private Keys in Wireless Networks - The first and second nodes in a wireless network estimate first and second channel response. The first node quantizes the first channel response to produce a first bit sequence, and a feed-forward message, which is transmit as a feed-forward message to the second node. The second node quantizes the second channel response using the feed-forward message to produce and an estimate of the first bit sequence, a second bit sequence and a feed-back message, which is transmitted to the first node. Then, the first and second nodes delete bits in the respective bit sequences using the feed-back and feed-forward message to generate first and second private keys with low bit mismatch rate. 06-07-2012 20120148046 Secure Wireless Communication Using Rate-Adaptive Codes - Data are communicated in a wireless network between a transmitter to a receiver. The transmitter estimates a first channel response between the receiver and the transmitter at the transmitter, and generating a first key based on the first channel response. The data are encoded at the transmitter using a rate-adaptive code to produce encoded data, which is scrambling using the first key before broadcasting. Subsequently, the receiver can estimate a second channel response to generate a second key to be used to descramble the broadcast data. 06-14-2012 20120207027 Method for Minimizing Undetectable Errors in Data Packets in Communication Systems - Undetectable errors in packets are minimized by verifying the CRC in each packet, setting a CRC flag to 0 to indicate success, and setting the CRC flag to 1 to indicate failure. If at least one packet in the set of packets fails then generate an error pattern E for each packet by comparing the packet that fails with one packet that passed the CRC verification, and comparing the error pattern to a set of known error patterns. Then, setting a CRC flag to 0 to indicate success and passing the payload of each packet and the CRC flag to the application if the difference is less than a predetermined threshold, and otherwise, setting the CRC flag to 1 to indicate failure. 08-16-2012 Patent applications by Yige Wang, Natick, MA US Yigong Wang, Rutland, MA US Patent application number Description Published 20100207222 Hall Effect Element Having a Hall Plate with a Perimeter Having Indented Regions - A Hall effect element includes a Hall plate with an outer perimeter. The outer perimeter includes four corner regions, each tangential to two sides of a square outer boundary associated with the Hall plate, and each extending along two sides of the square outer boundary by a corner extent. The outer perimeter also includes four indented regions. Each one of the four indented regions deviates inward toward a center of the Hall plate. The Hall plate further includes a square core region centered with and smaller than the square outer boundary. A portion of each one of the four indented regions is tangential to a respective side of the square core region. Each side of the square core region has a length greater than twice the corner extent and less than a length of each side of the square outer boundary. Vertical Hall Effect Element with Improved Sensitivity - A vertical Hall Effect element includes a low voltage P-well region disposed at a position between pickups of a vertical Hall Effect element to result in an improved sensitivity of the vertical Hall Effect element. A method results in the vertical Hall Effect element having the improved sensitivity. 07-31-2014 20140264667 Vertical Hall Effect Element With Structures to Improve Sensitivity - A vertical Hall Effect element includes one or more of: a low voltage P-well region disposed at a position between pickups of the vertical Hall Effect element, Light-N regions disposed under the pickups, a pre-epi implant region, or two epi regions to result in an improved sensitivity of the vertical Hall Effect element. A method results in the vertical Hall Effect element having the improved sensitivity. 09-18-2014 Patent applications by Yigong Wang, Rutland, MA US Yingpi Karen Wang, Boxborough, MA US Patent application number Description Published 20100015652 ANTIBODY QUANTITATION - The invention relates to a novel method for determining the amount of an antibody of interest in a biological sample. In one embodiment, the method of the invention is characterized in that it comprises at least a step of protein depletion of said biological sample by pepsin digestion to produce F(ab) 01-21-2010 Yongzhong Wang, Melrose, MA US Patent application number Description Published 20090136981 METHODS OF MEASURING CELL VIABILITY IN TISSUE ENGINEERED PRODUCTS - This invention provides methods of measuring the viability of cultured cells by detecting one or more cell death-stable proteins or enzyme activities. Methods provided by the invention correlate viability to relative levels of enzyme activity in cell-containing and non-cell-containing fractions of a cell culture. 05-28-2009 20120282640 METHODS OF MEASURING CELL VIABILITY IN TISSUE ENGINEERED PRODUCTS - This invention provides methods of measuring the viability of cultured cells by detecting one or more cell death-stable proteins or enzyme activities. Methods provided by the invention correlate viability to relative levels of enzyme activity in cell-containing and non-cell-containing fractions of a cell culture. 11-08-2012 20140273050 METHODS OF MEASURING CELL VIABILITY IN TISSUE ENGINEERED PRODUCTS - This invention provides methods of measuring the viability of cultured cells by detecting one or more cell death-stable proteins or enzyme activities. Methods provided by the invention correlate viability to relative levels of enzyme activity in cell-containing and non-cell-containing fractions of a cell culture. 09-18-2014 Patent applications by Yongzhong Wang, Melrose, MA US Yuhu Wang, Littleton, MA US Patent application number Description Published 20080308528 Nanoporous ultrafine alpha-alumina powders and sol-gel process of preparing same - The present invention provides α-alumina powders comprising α-alumina particles of which at least 80% of the α-alumina particles have a particle size of less than 100 nm. The invention also provides slurries, particularly aqueous slurries, which comprise α-alumina powders of the invention. The invention further provides methods of manufacturing α-alumina powders and α-alumina slurries of the invention and methods of polishing using same. 12-18-2008 Yundong Wang, Lancaster, MA US Patent application number Description Published 20090186217 Article Comprising a Polymer Substrate and a Co-Extruded Polymer Coating - The present invention relates to an article comprising a polymer substrate and a co-extruded polymer coating. The polymer substrate is for example manufactured from a thermoset rubber, a styrene based thermoplastic elastomer, an olefinic based thermoplastic elastomer or mixtures of these polymers. The co-extruded coating comprises an optical brightener for example a fluorescent agent. The co-extruded coating for example has a thickness smaller than 700 micrometer. The article is for example used in automotive applications, in building and construction applications, in packaging, in food applications, consumer applications, in medical applications or in wire and cable applications. The present invention also relates to the use of the articles of the present invention in automotive sealing systems. 07-23-2009 20110294930 FLAME RETARDANT THERMOPLASTIC ELASTOMERS - The invention relates to a thermoplastic elastomer composition comprising a thermoplastic elastomer and a flame retardant, wherein the flame retardant comprises at least a compound selected from the group consisting of piperazine phosphate, piperazine pyrophosphate and piperazine polyphosphate, and a phosphoric acid compound. 12-01-2011 20140100310 THERMOPLASTIC ELASTOMER COMPOSITIONS HAVING BIORENEWABLE CONTENT - Thermoplastic elastomer compositions, in particular derived from one or more styrenic block copolymers, a plurality of biorenewable materials, preferably a softener and one or more synergistic additives such as a polar polymer; a synergistic block copolymer such as a relatively high molecular weight styrenic block copolymer; and/or filler. In one preferred embodiment, the styrenic block copolymer comprises a controlled distribution copolymer block including a conjugated diene and a mono alkenyl arene. Numerous desirable articles can be formed from the compositions. Processes for preparing the compositions and articles are disclosed. 04-10-2014 20140100311 THERMOPLASTIC ELASTOMER COMPOSITIONS HAVING BIORENEWABLE CONTENT - Thermoplastic elastomer compositions, in particular derived from one or more styrenic block copolymers wherein at least one styrenic block copolymer comprises a controlled distribution copolymer block including a conjugated diene and a mono alkenyl arene, a plurality of biorenewable materials, preferably a softener and one or more synergistic additives such as a polar polymer; a synergistic block copolymer such as a relatively high molecular weight styrenic block copolymer; and/or filler. Numerous desirable articles can be formed from the compositions. Processes for preparing the compositions and articles are disclosed. 04-10-2014 Patent applications by Yundong Wang, Lancaster, MA US Yunyan Wang, Framingham, MA US Patent application number Description Published 20110072137 INTEGRATED APPLICATION ACCESS - An integration portal provides a user with access to application entities of a plurality of remote applications. An authorization layer included in the integration portal includes a permission map indicating an association between the user and at least one of the application entities of the plurality of remote applications that the user is permitted to access. The authorization layer in the integration portal is synchronized with an authorization layer included in an application portal that provides the user with access to a subset of the remote applications, whereby the permission map is updated with information about at least one of the application entities that the user is permitted to access through the integration portal. Corresponding systems and methods are also disclosed. 03-24-2011 Yuxun Wang, Shrewsbury, MA US Patent application number Description Published 20090142855 Polynucleotides and Polypeptides of the IL-12 Family of Cytokines - The present invention relates to the primate family of cytokines. Provided herein are polynucleotides encoding such polypeptides, and reagents useful for producing the encoded polypeptides in a host source, and for identifying compounds which bind and modulate the activity of the encoded polypeptides. Also provided are reagents useful for the diagnosis or treatment of inflammatory and/or autoimmune related diseases in primates. 06-04-2009 Zhaolin Wang, Wellesley, MA US Patent application number Description Published 20090004108 Smmr (Small Molecule Metabolite Reporters) For Use As In Vivo Glucose Biosensors - Small Molecule Metabolite Reporters (SMMRs) for use as in vivo glucose biosensors, sensor compositions, and methods of use, are described. The SMMRs include boronic acid-containing xanthene, coumarin, carbostyril and phenalene-based small molecules which are used for monitoring glucose in vivo, advantageously on the skin. 01-01-2009 20140127137 SMMR (SMALL MOLECULE METABOLITE REPORTERS) FOR USE AS IN VIVO GLUCOSE BIOSENSORS - Small Molecule Metabolite Reporters (SMMRs) for use as in vivo glucose biosensors, sensor compositions, and methods of use, are described. The SMMRs include boronic acid-containing xanthene, coumarin, carbostyril and phenalene-based small molecules which are used for monitoring glucose in vivo, advantageously on the skin. 05-08-2014 Patent applications by Zhaolin Wang, Wellesley, MA US Zhaoxi Wang, Chelmsford, MA US Patent application number Description Published 20110086796 METHODS FOR PREDICTING THE DEVELOPMENT AND RESOLUTION OF ACUTE RESPIRATORY DISTRESS SYNDROME - The subject invention features methods for predicting whether a subject at risk of developing Acute Respiratory Distress Syndrome (ARDS) will develop ARDS by determining the amount of elafin present in a subject sample, or by determining the ration of elafin:neutrophil elastase in a subject sample. The invention also features methods for monitoring the efficacy of a treatment regimen for ARDS as well as methods of treatment for ARDS. The invention also features methods to determine a subject's predisposition for developing ARDS by determining whether certain genomic polymorphisms are present in the subject's DNA. 04-14-2011 Zhirui Wang, Malden, MA US Patent application number Description Published 20110104789 NON-INTEGRATING REV-DEPENDENT LENTIVIRAL VECTOR AND METHODS OF USING THE SAME - Non-integrating, Rev-dependent (NIRD) lentiviral vectors and NIRD lentiviral particles carrying a therapeutic gene, such as DT-A or TRAF6 and methods of making the same are disclosed. The intracellular expression of DT-A or TRAF6 results in the selective killing of HIV-positive cells and, thus, these NIRD lentiviral vectors and lentiviral particles can be used in methods to kill HIV-infected cells or treat to HIV-infected subjects. Also disclosed is a human cell line comprising a mutation in the EF2 gene that confers resistance to DT-A. 05-05-2011 Zhongguo Wang, Lexington, MA US Patent application number Description Published 20090209530 INHIBITORS OF CYCLIN-DEPENDENT KINASES, COMPOSITIONS AND USES RELATED THERETO - The invention pertains to novel cyclin dependent kinase inhibitors (cdks) and specifically, but not exclusively, as inhibitors of cdk/cyclin complexes. As described herein, the inhibitors of this invention are capable of inhibiting the cell-cycle machinery and consequently may be useful in modulating cell-cycle progression, ultimately controlling cell growth and differentiation. Such compounds would be useful for treating subjects having disorders associated with excessive cell proliferation. 08-20-2009 20100004207 Inhibitors of cyclin-dependent kinases, compositions and uses related thereto - The invention pertains to novel cyclin dependent kinase inhibitors (cdks) and specifically, but not exclusively, as inhibitors of cdk/cyclin complexes. As described herein, the inhibitors of this invention are capable of inhibiting the cell-cycle machinery and consequently may be useful in modulating cell-cycle progression, ultimately controlling cell growth and differentiation. Such compounds would be useful for treating subjects having disorders associated with excessive cell proliferation. 01-07-2010 20110046362 METHODS OF MAKING NUCLEOSIDE TETRAPHOSPHATE - The invention provides compounds and methods for making adenosine-ribofuranoside tetraphosphate compounds. The compounds are contemplated to have activity at the P2Y receptor and may be used in the treatment of medical disorders such as cystic fibrosis and upper respiratory disorders.
I recently went to a IME Doctor, I have a herninated L-5 disc which is now in my canal, have problems walking and unable to move or balance on my foot. He viewed me for 10 minutes never looked at my foot watched me walk 5 ft, in his report he said I was fine, go back to full duty climbing 300 ft aday1 5 nerou surgens say in need back surgery if its not to late, this has been going on for 1-1\2 years, WC DROPPED me, thanks to this so called doctor report lol I went another doctor on my own after the Ime doctor seen me, He could not believe this so called IME doctors report! Now we are fighting and it looks to be a long one, I am thinking of using RICO against this Doctor, he needs to be have his so called fake doctors degree takin away from Him! Peace Beware of the workers comp docs. They don't work for you. Their paid whether you are well or not. My doctor said he found problems with my FCE so he would not sign off on it and told me to return to work. But he didi say I could come and see him whenever I needed. injured1956 Wrote:Beware of the workers comp docs. They don't work for you. Their paid whether you are well or not. My doctor said he found problems with my FCE so he would not sign off on it and told me to return to work. But he didi say I could come and see him whenever I needed. Jammer, no attorney fights against the IME, they will perfom a Depo with that doctor, and try to clean up the medical report for you. It's up to you, not a comp attorney to report the doctor if you think there was fraud. I caution you there too. For if you look at the IME report, it flat out states the doctor is saying in their own words it's a Medical Opinion... That does not state their giving Facts.... Only a medical Opinion... Reply's are intended solely for informational purposes. They are based on personal opinions, experience, or research and are "not to be taken as fact or legal advice", otherwise, always consult an attorney or a doctor. Bad Boy Bad Boy Wrote:Jammer, no attorney fights against the IME, they will perfom a Depo with that doctor, and try to clean up the medical report for you. It's up to you, not a comp attorney to report the doctor if you think there was fraud. I caution you there too. For if you look at the IME report, it flat out states the doctor is saying in their own words it's a Medical Opinion... That does not state their giving Facts.... Only a medical Opinion... Thanks bad bad boy, You are so correct, that was just an opinion, That opinion almost could have cost me my life, by trying to make me climb at great height`s very danderous work i perform, Now my company expects me to climb or get fired! Thanks for the reply! Jammer I was sent to several IME's, I only had 1 that was in agreement with my doctor, my surgeon, and second opinion Neurosurgeon I had. All the others were like you had, some not as bad, but still not good. Reply's are intended solely for informational purposes. They are based on personal opinions, experience, or research and are "not to be taken as fact or legal advice", otherwise, always consult an attorney or a doctor. Bad Boy Bad Boy Wrote:Jammer I was sent to several IME's, I only had 1 that was in agreement with my doctor, my surgeon, and second opinion Neurosurgeon I had. All the others were like you had, some not as bad, but still not good. Thanks Did you finally have surgery? I am probably unemployed as of this week, and they called be back for a little bit of light duty yet they say we expect full duty as they say we will rely on the ime doctor`s report, So I am stuck between a rock and a hard spot right where they want me, I worked light duty a year and 4 months, I think I did my time there time to go. Have a good one Jammer, yes, I had surgeries, not just one though. I was 1st injured, tried ever conservative measure medically could be spoke of, then had surgery, a 3 level Cervical (neck) Spine Fusion. I went to pt, and I was healed. Went back to heavy duty work. Close to a year later from that injury, a co-worker from another department played a prank on me. I blew out that fusion, plate and screws in my neck, it was an ouch, heard a pop, and a crack in less then a second. Found out I then needed a 6 level cervical fusion. But first the 3 level had to be re-done right away for my safety. That healed, went back, took that plate and screws out, stitched me up in the front, flipped me over, cut me from have way up my head to half way down my back, and performed the 6 level cervical fusion, with a Bone growth Stimulator that does work , and help the healing process, and healed the fusions. What is the strange part, I was removed from work, meaning advised no work both times by my treating doctor, on the exact same month and date, just the year was different. I also found I have Spinal Stenosis in the Lumbar Spine at levels L1 - L2 - L3. No surgery, and can be somewhat painful at times. Then in 2006 during an FCE test, I finished up ruining my left knee. (This I did not put or try to put on work comp) I had the left Knee replaced with a new joint in 2007. Now my right knee is giving me problems, most likely need it replaced also soon. Seems Arthritis likes me. If you ask, yes I am legally medicated for the rest of my life now. I won't tell you what you should, or could do with your employer, because there is not one good answer to give you. But, I'm going to say, your body, and your mind will guide you, but, you must let it do it's job so you know what you have to do. That is all you can do. Would I fight your case if I were you. That is an easy answer for me, and it is Yes, hell yes, I would fight to the end. Most times your going to win. The down fall is the time it takes, and no money or income coming in at times makes it hard. I was lucky, survived that money part, not always easy, never is, nor never will it be. You just have to somehow start to prepare for it. You want to fight it, prepare now, any way you can think of prepare, as I said, it wont be an easy step. Then I say to you, if you fight it, you can stop ever, for you will then loose out big time. You wont get rich, you wont fill your pockets with money, and when it's all over, and done with, if you break even, or come out with some cash, consider yourself ahead of the game. That my friend is work comp. No winners.... Reply's are intended solely for informational purposes. They are based on personal opinions, experience, or research and are "not to be taken as fact or legal advice", otherwise, always consult an attorney or a doctor.
SET @start_global_value = @@global.lock_wait_timeout; SELECT @start_global_value; @start_global_value 31536000 SET @start_session_value = @@session.lock_wait_timeout; SELECT @start_session_value; @start_session_value 31536000 '#--------------------FN_DYNVARS_002_01-------------------------#' SET @@global.lock_wait_timeout = 100; SET @@global.lock_wait_timeout = DEFAULT; SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 31536000 SET @@session.lock_wait_timeout = 200; SET @@session.lock_wait_timeout = DEFAULT; SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 31536000 '#--------------------FN_DYNVARS_002_02-------------------------#' SET @@global.lock_wait_timeout = @start_global_value; SELECT @@global.lock_wait_timeout = 31536000; @@global.lock_wait_timeout = 31536000 1 SET @@session.lock_wait_timeout = @start_session_value; SELECT @@session.lock_wait_timeout = 31536000; @@session.lock_wait_timeout = 31536000 1 '#--------------------FN_DYNVARS_002_03-------------------------#' SET @@global.lock_wait_timeout = 1; SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 1 SET @@global.lock_wait_timeout = 60020; SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 60020 SET @@global.lock_wait_timeout = 65535; SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 65535 '#--------------------FN_DYNVARS_002_04-------------------------#' SET @@session.lock_wait_timeout = 1; SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 1 SET @@session.lock_wait_timeout = 50050; SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 50050 SET @@session.lock_wait_timeout = 65535; SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 65535 '#------------------FN_DYNVARS_002_05-----------------------#' SET @@global.lock_wait_timeout = 0; Warnings: Warning 1292 Truncated incorrect lock_wait_timeout value: '0' SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 1 SET @@global.lock_wait_timeout = -1024; Warnings: Warning 1292 Truncated incorrect lock_wait_timeout value: '-1024' SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 1 SET @@global.lock_wait_timeout = 31536001; Warnings: Warning 1292 Truncated incorrect lock_wait_timeout value: '31536001' SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 31536000 SET @@global.lock_wait_timeout = ON; ERROR 42000: Incorrect argument type to variable 'lock_wait_timeout' SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 31536000 SET @@global.lock_wait_timeout = OFF; ERROR 42000: Incorrect argument type to variable 'lock_wait_timeout' SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 31536000 SET @@global.lock_wait_timeout = test; ERROR 42000: Incorrect argument type to variable 'lock_wait_timeout' SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 31536000 SET @@session.lock_wait_timeout = 0; Warnings: Warning 1292 Truncated incorrect lock_wait_timeout value: '0' SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 1 SET @@session.lock_wait_timeout = -2; Warnings: Warning 1292 Truncated incorrect lock_wait_timeout value: '-2' SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 1 SET @@session.lock_wait_timeout = 31537000; Warnings: Warning 1292 Truncated incorrect lock_wait_timeout value: '31537000' SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 31536000 SET @@session.lock_wait_timeout = ON; ERROR 42000: Incorrect argument type to variable 'lock_wait_timeout' SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 31536000 SET @@session.lock_wait_timeout = OFF; ERROR 42000: Incorrect argument type to variable 'lock_wait_timeout' SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 31536000 SET @@session.lock_wait_timeout = test; ERROR 42000: Incorrect argument type to variable 'lock_wait_timeout' SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 31536000 '#------------------FN_DYNVARS_002_06-----------------------#' SELECT @@global.lock_wait_timeout = VARIABLE_VALUE FROM INFORMATION_SCHEMA.GLOBAL_VARIABLES WHERE VARIABLE_NAME='lock_wait_timeout'; @@global.lock_wait_timeout = VARIABLE_VALUE 1 '#------------------FN_DYNVARS_002_07-----------------------#' SELECT @@session.lock_wait_timeout = VARIABLE_VALUE FROM INFORMATION_SCHEMA.SESSION_VARIABLES WHERE VARIABLE_NAME='lock_wait_timeout'; @@session.lock_wait_timeout = VARIABLE_VALUE 1 '#------------------FN_DYNVARS_002_08-----------------------#' SET @@global.lock_wait_timeout = TRUE; SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 1 SET @@global.lock_wait_timeout = FALSE; Warnings: Warning 1292 Truncated incorrect lock_wait_timeout value: '0' SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 1 '#---------------------FN_DYNVARS_001_09----------------------#' SET @@global.lock_wait_timeout = 10; SET @@session.lock_wait_timeout = 11; SELECT @@lock_wait_timeout = @@global.lock_wait_timeout; @@lock_wait_timeout = @@global.lock_wait_timeout 0 '#---------------------FN_DYNVARS_001_10----------------------#' SET @@lock_wait_timeout = 100; SELECT @@lock_wait_timeout = @@local.lock_wait_timeout; @@lock_wait_timeout = @@local.lock_wait_timeout 1 SELECT @@local.lock_wait_timeout = @@session.lock_wait_timeout; @@local.lock_wait_timeout = @@session.lock_wait_timeout 1 '#---------------------FN_DYNVARS_001_11----------------------#' SET lock_wait_timeout = 1; SELECT @@lock_wait_timeout; @@lock_wait_timeout 1 SELECT local.lock_wait_timeout; ERROR 42S02: Unknown table 'local' in field list SELECT session.lock_wait_timeout; ERROR 42S02: Unknown table 'session' in field list SELECT lock_wait_timeout = @@session.lock_wait_timeout; ERROR 42S22: Unknown column 'lock_wait_timeout' in 'field list' SET @@global.lock_wait_timeout = @start_global_value; SELECT @@global.lock_wait_timeout; @@global.lock_wait_timeout 31536000 SET @@session.lock_wait_timeout = @start_session_value; SELECT @@session.lock_wait_timeout; @@session.lock_wait_timeout 31536000
/* * Copyright (c) 2019 Linaro Limited * * SPDX-License-Identifier: Apache-2.0 */ &i2c1 { status = "okay"; clock-frequency = <I2C_BITRATE_STANDARD>; adxl372@11 { compatible = "adi,adxl372"; reg = <0x11>; label = "ADXL372"; int1-gpios = <&gpioc 6 0>; }; };
The late Michael Suleiman and others have argued that Arab American identity was formed as a result of negative portrayals of Arabs and strong pro-Israeli bias in the U.S. media during and after the 1967 Arab-Israeli War. Certainly, the media acted as a negative motivating force behind the solidification of an ethnic “Arab American” identity and was key to the formation of a handful of key community organizations, such as the Association of Arab-American University Graduates (AAUG). In AAUG publications and scholarly sources in the 1960s and ‘70s, the founders and founding members of AAUG distinguished between the “recent arrivals” and past generations from the Middle East in the U.S. They mostly framed these differences in terms of transnational politics, demographics, and ethnic identity; claiming a pan-Arab, secular nationalism as opposed to religious, ethnic, village based identities popular among earlier generations of immigrants from the Middle East. The two groups, however, were not so clearly defined into oppositional binaries. This paper will examine how Arab immigrants reflect on the period 1945-80 in memoirs and autobiographies, and how they related to the politics of “homeland” through emotional and financial connections with ecclesiastical structures, Islamic organizations and states in the region. The sources for this project will be AAUG publications, including memoir-articles in Arab Studies Quarterly, biographies and autobiographies published in the 1970s and 1980s as well as materials from the Antiochian Orthodox Church and the Washington Mosque Foundation.
Q: Saving Backbone JSON object to MySQL table with PHP I'm saving Backbone model data, which POSTs a JSON object to my save.php file. As the model data will be for my application's users, I'd like to store unique values in a MySQL table. Currently, I'm using this method: $values = json_decode(file_get_contents('php://input'), true); $name = $values["name"]; $sql="INSERT INTO `users` (name) VALUES $name"; It's giving me this error Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'John Doe' at line 1 If I pass a simple string in the query, it works the way I'd like: $sql="INSERT INTO `users` (name) VALUES ('John Doe')"; My questions are: Why is $name not a string? Is this the best way to insert a JSON object into a MySQL table? Thank you! A: JSON is just a representation of your data : once decoded $values["name"] contains a string with your value, John Doe. This means that, as is, your request expands to $sql="INSERT INTO `users` (name) VALUES John Doe"; which is both an invalid syntax and very insecure. Use the PDO class wherever you can, something like this : $sql = "INSERT INTO users (name) VALUES(?)"; $sth = $dbh->prepare($sql); $sth->execute(array( $name ));
Ultrasound-based combination therapy: potential in urologic cancer. Immune-sensitive urologic malignancies include prostate, kidney and bladder cancers. To date, most immunotherapeutic treatments have been applied to advanced metastatic disease. Limited efficacy in this setting is likely due to an excessive disease burden, which overwhelms the capacity of the immune system. Immunotherapy has not been widely utilized in a low-disease-burden state - a setting in which the immune system may be best suited to effectively mount a clinically meaningful response. The emergence of high-intensity focused ultrasound, and more recently, low-intensity focused ultrasound technologies, have demonstrated not only immune-stimulatory effects but also an interesting capacity to alter tissue architecture and cell membrane properties, which may be exploited to increase tumoral uptake of drugs and vaccines. In this article, we review the literature supporting the novel use of ultrasound combination therapy with adjunctive agents in the treatment of urologic malignancy.
Welcome to the Piano World Piano ForumsOver 2.5 million posts about pianos, digital pianos, and all types of keyboard instruments Join the World's Largest Community of Piano Lovers (it's free) It's Fun to Play the Piano ... Please Pass It On! A piano tuner will be able to provide the proper system for your piano. Dampp-Chaser have to be install by a tuner. Dampp-Chaser provides information for various piano on their web site in area reserves for techs. Call your local piano tuner and have him/her install the system for you. I installed the Dampp-chaser in my 178cm Thürmer grand myself. More info here . Please ignore the part about wanting to become a DC installer, this no longer applies! I'm now due to part company with the Thürmer and I'm getting a 173 cm Yamaha C2M instead. For various reasons (geographical location and otherwise) I will transfer the DC to the Yamaha myself. My reason for asking about the dehumidifier rods is that I noticed during last summer that the RH at the humidistat location never went below 54% (+/- 2 or 3%). The RH in the room in general was mostly in the 70's but occasionally in the low 80's. Whenever I touched the heater rods (which was regularly) they were hot. Additionally, the humidifier used hardly any water other than, I guess, through evaporation. Right now in winter the RH at the humidistat is consistently in the region of 43% and I'm adding water regularly (heater rods are often cold to the touch). And so, as I suspect, are the heaters which were specified by the tech not up to the job of reducing the RH in summer to the point where the DC cycles between humidification and de-humidification, as I believe it's designed to? Also, will the fact that the Yamaha is slightly smaller than the Thürmer make a significant difference to the DC's performance? I haven't got the rod wattages info to hand but as best I can remember the long rod is 35 W and the short rod 18W (something close to these figures anyway). As I'll soon be transferring the equipment, I would greatly appreciate your views on what I've written. Further info: Due to unrelated piano buying issues, I've fallen out with the tech/salesman mentioned (the guy's crazy!) and so, I'm on my own with this. One easy method to determine if you have enough power is to plug in an analog clock to the dehumidification side (along with the bars). Then during the humid time of the year, check to see if the clock loses time. If the bars never turn off, the system is underpowered... You may want to consider a bottom cover and/or string cover to provide more stability.
Phenanthrene degradation in Arthrobacter sp. P1-1: initial 1,2-, 3,4- and 9,10-dioxygenation, and meta- and ortho-cleavages of naphthalene-1,2-diol after its formation from naphthalene-1,2-dicarboxylic acid and hydroxyl naphthoic acids. Arthrobacter sp. P1-1, isolated from a polycyclic aromatic hydrocarbon (PAH)-contaminated site in Hilo, HI, USA, can decompose phenanthrene (40 mg l(-1)) completely within 7 days. A detailed phenanthrene metabolism map was constructed based on metabolite analysis and replacement cultures. Initial dioxygenation occurs on 1,2-, 3,4-, and 9,10-C of phenanthrene, dominantly on 3,4-C positions. Rapid accumulation of 5,6- and 7,8-benzocoumarin suggests that phenanthrene-1,2- and -3,4-diols mainly undergo meta-cleavage. However, a trace amount of o-carboxyvinylnaphthoates and diphenic acid indicates a limited extent of ortho-cleavage of the diols. Naphthalene-1,2-diol, as a common and converged metabolite, was formed from 1-[(E)-2-carboxyvinyl]-2-naphthoic acid, naphthalene-1,2-dicarboxylic acid, and 1-hydroxy-2-naphthoic acid in separate culture tests. Naphthalene-1,2-diol is then degraded in a dominant phthalic acid pathway and a minor salicylic acid pathway. Several metabolites of phthalic acid were found, while no salicylic acid metabolites were detected. The strain P1-1 likely has a very diverse set of PAH-degrading enzymes or the enzymes having relaxed substrate-specificity.
Rapid regression of retinal hemorrhage and neovascularization in a case of familial exudative vitreoretinopathy treated with intravitreal bevacizumab. To report a case of familial exudative vitreoretinopathy (FEVR) rapidly resolved by intravitreal injection of bevacizumab. A 36-year-old woman complained about floaters and visual field defect. Funduscopic examinations revealed retinal vessel anastomosis located between the equator and ora serrata in both eyes. The right eye was accompanied with slight vitreous hemorrhage. Since the patient declined retinal cryopexy for cosmetic reasons, intravitreal bevacizumab injections (1.25 mg/0.05 ml) were performed in both eyes. Treatment resulted in the rapid regression and the accelerated fibrosis of neovascular tissues. At 4-month follow-up in the right eye and 1-month follow-up in the left, no signs of systemic or ocular complications were detected. Intravitreal injection of bevacizumab may be considered as an alternative method in treating FEVR.
A wiring substrate including a single insulating layer and a single wiring layer to reduce thickness is known. One surface of the wiring layer is exposed at one surface of the insulating layer, and the other surface of the wiring layer is exposed in an opening provided in the other surface of the insulating layer. According to such a wiring substrate, the wiring layer is formed by, for example, forming a resist layer having an opening, depositing a metal having a certain plating thickness in the opening of the resist layer by, for example, electroplating, and thereafter removing the resist layer. (See, for example, Japanese Laid-open Patent Publication No. 2011-124555.)
Paul W. Voorhies Paul Warren Voorhies (December 17, 1875 – January 8, 1952) was a Michigan lawyer who served as Wayne County Prosecutor and Michigan Attorney General. Biography Voorhies was born in Plymouth, Michigan on December 17, 1875. He graduated from the University of Michigan in 1898 with a Bachelor of Letters degree and the University of Michigan Law School with a Bachelor of Laws in 1900. He was admitted to the bar and practiced briefly in Erie County, New York before returning to Michigan and establishing himself as an attorney in Detroit. In the 1910s Voorhies served in the Wayne County Prosecutor's office and advanced to Chief Deputy. A Republican, Voorhies won election as Wayne County Prosecutor in 1920 and 1922, serving from 1921 to 1925. In the late 1920s he was a Special Assistant Attorney General, working under Attorney General Wilber M. Brucker. In 1930 Voorhies was the successful Republican nominee for Attorney General of Michigan, succeeding Brucker, and served from 1931 to 1933. Voorhies returned temporarily to the Wayne County Prosecutor's office in 1940, appointed after the incumbent had been removed on corruption charges. He died in Detroit on January 8, 1952 and was buried in Plymouth's Riverside Cemetery. References Category:1875 births Category:1952 deaths Category:People from Plymouth, Michigan Category:Politicians from Detroit Category:Michigan Republicans Category:Michigan lawyers Category:Michigan Attorneys General Category:University of Michigan Law School alumni
Traders can use arbitration techniques to make a profit out of the rate difference between the 2 markets, with very little risk. A Fx arbitration refers to making make use of of a state of inequality between markets, where a trader can make use of the difference of a decided currency in one market with another to obtain gainings by purchasing the currency at a bottom rate market and trading it off at a higher price market. A supply including 2 currencies is a plain arbitration supply, as long as distribute involving 3 or more currencies is a complex arbitrage deal. It is significant to note that not everyone currencies are introduced for make use of in a Fx arbitrage trade; depending upon the country as well as the Fx market itself, certain currencies may as well as may not be entertained for Forex arbitration trades. Forex arbitrage review is an extremely important personality in starting point your on the internet trading strives. A Trading robot is a software program that automatically enters and escapes trades in the forex market with the intent of turning a profit. Fx arbitration computer will help seem whether a special scheme is coming to provide the required profits as well as not. A Forex arbitrage calculator are sold for a fee on a great amount of Sites by both third parties and foreign exchange brokers; and also is offered for free as well as for trial by a number of upon opening an account.
We have received the following contribution from a young sympathiser of the Communist Left which we have no hesitation in publishing not only as a contribution to the debate on the crisis of the British ruling class but to recognise the fact that a new generation is increasingly taking up the task of developing an independent movement of the working class. We cordially invite readers'comments. Following the EU referendum, and the success of the Leave campaign which won with 51.89% of the vote, the politics of the British ruling class is in a bit of a mess. As we showed in our article on the Brexit vote (see leftcom.org) capitalism’s insoluble economic crisis is undermining the old political order. For the Tories, the result triggered a leadership contest as Cameron, the face of the Remain campaign, had to resign. A number of even more unsavoury characters now compete for his position. For Labour, the result served as a signal for the centre and the right of the party to carry out a coup against their leader. Corbyn stands accused of supporting the Remain vote only reluctantly, but by this point any excuse would do as the Blairites increasingly want to pull in the reins. The Labour left is now rallying once again, in a bid to #KeepCorbyn as their leader. The traditional ruling classes and their parties throughout the world have no answer to the global economic crisis of capitalism. They are losing their grip and not just in the UK. The rise of so-called “populism” is just one symptom of this. In 2013 we saw the growth of UKIP, a party of the Eurosceptic anti-immigrant right with a stock broker leader who plays the act of being ‘one of the people’. In 2014 the Scottish independence referendum, with a turnout of 84.6%, the highest in the UK since 1928 when universal suffrage was first introduced, was celebrated by both left and right as the ‘greatest democratic experience in Scotland’s history’. [1] The referendum cemented the Scottish National Party as the main party in Scotland overturning decades of Labour dominance. In 2015 Corbyn was elected leader of the Labour Party, with 250 000 votes in his favour, and thousands of new members. And finally this year the EU membership referendum was called by Cameron in order to calm down the Eurosceptics within his own party. The turnout of the referendum was 72.21%, higher than any recent election in the UK. Now with a second Scottish independence referendum on the horizon, and the leadership crises in two of the biggest British parties, increased participation in these political spectacles is not likely to stop any time soon. Already in major cities there are rallies in support of Corbyn. Of special interest here is the renewed capability of the Labour Party to bring thousands back into the dead-end of parliamentary politics. Much of this is thanks to Corbyn and the election contests, as even some of those who would normally not get involved in Labour, suddenly have changed their minds (an article published by the anarchist Freedom Press appeals to the left to ‘#KeepCorbyn as a transitional demand’!). [2] Just over the recent crisis the party has gained 60 000 new members, many joining only to vote for Corbyn. [3] For British politics these are huge numbers (the entire Liberal Democrat party membership is about 60 000), but they may sound more impressive than they are in reality. There are three ways to have a say in a Labour leadership election: 1) join the Labour Party as a member (which requires a monthly membership fee), 2) become a supporter (which only requires a one-time payment of £3), or 3) be a member of an affiliated trade union. Whichever of these categories a Corbyn enthusiast may belong to, it doesn’t necessarily mean they will be engaged in party structures or stay active beyond just voting in the election contest. This is especially true for many young people, who increasingly get involved in politics on an ad-hoc basis (it’s not uncommon to see someone jump from Labour to the Greens, and then once again to Labour just to support Corbyn). Nevertheless the participation of self-avowed communists or even anarchists in Labour has to be explained. The history of the party, it’s origin as a platform for trade union bureaucrats, and it’s many betrayals both in and out of power (be it support for both World Wars, sending troops against striking workers, or the neo-liberal turn) are not a secret. [4] Labour is a party of the capitalist class and always has been. At best, it tried to moderate some of the more nasty elements of the system; at worst it embraced them whole. Yet many leftists still believe that it can be transformed, that it can be made a ‘workers’ party’ again. Others join it out of opportunism – these groups may want to split the party or just recruit new members. Historically the most successful example of this was the Militant tendency. In the 1970s these Trotskyists were able to build a base within Labour, grow in size and by the 1980s dominate the Liverpool City Council. It didn’t take long for Labour higher-ups to realise what’s happening, and soon the process of expelling the entryists commenced. By the 1990s Militant abandoned entryism, formed its own ‘true workers’ party’, the Socialist Party of England and Wales, which nowadays stands in elections as the Trade Unionist and Socialist Coalition. Unsurprisingly, the electoral front has not been fruitful, and now we find SPEW as one among the many groups that sing the chorus of defending Corbyn. And so the cycle starts again. The left-wingers in Labour right now have to deal with many of the same problems as Militant did. Some have already been expelled, others hide their aims and politics to avoid it. Every once in a while there is an article in the news decrying the ‘hard-left’ that is wrecking Labour. It turns out that the biggest enemy of the Labour left and Corbyn is actually their own party (particularly the Parliamentary Labour Party). What’s more, a look at Corbyn’s policies reveals how inoffensive he is to capital. A crackdown on tax avoidance, higher income tax for the wealthy, ‘people's quantitative easing’, opposition to TTIP, and [gasp!] nationalisation. His vision for new politics is not drastic even by petty bourgeois standards – at the end of the day, ‘Labour’s new leader wants a prosperous economy’. [5] The attempts to appear ‘electable’ have led McDonnell to claim that ‘Labour will tackle the deficit’ and that ‘we in the Labour Party have to show [the public] how we will act as a responsible custodian’. [6] And that’s what Corbyn will be at best – a custodian of the capitalist system. Momentum or the Labour left in general may shout about socialism, but the programme behind which they have rallied is strictly that of capitalist reform. This is not unlike the other left populist projects across Europe, such as Syriza, which tried to ‘save capitalism from itself’, or Podemos, which even according to finance investors ‘can improve Spanish capitalism’. [7] Corbyn’s ‘new politics’ certainly sounds awfully familiar to the ‘l'autre politique’ of François Mitterrand of the French Parti Socialiste, who, elected in 1981 on a programme of reform, soon after unleashed a programme of austerity instead. While naïve optimists hope that Corbyn in power will not turn out as bad, history shows that even a mass movement will not stop a social democrat from capitulating on their promises. The role of Internationalist Communists is to dispel illusions in reformist agendas and show how they fail to disturb underlying capitalist dynamics. While the Corbyn phenomenon may be a positive sign that more and more people have begun to question the current condition, as a response to capitalist crisis this is not enough. Do not depend on left leaders of capitalist parties, in the vain hope that they will somehow move against capitalism for you. Only an international working class, fighting on its own terrain and with its own independent organs, can bring the fight to capital and its states. Dyjbas 2 July 2016 Notes
- a system designed to facilitate not only data acquisition and archiving, but integrating, transforming, analyzing, and synthesizing ecological and biodiversity data that was previously intractable. + SEEK is a system designed to facilitate not only data acquisition and archiving, but integrating, transforming, analyzing, and synthesizing ecological and biodiversity data that was previously intractable. Line 5 was replaced by line 5 - The goals of SEEK are to make an ecological cyberinfrastructure which creates fundamental improvements in how researchers can: + The goals of SEEK are to build cyberinfrastructure which creates fundamental improvements in how researchers can: This material is based upon work supported by the National Science Foundation under award 0225676. Any opinions, findings and conclusions or recomendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF).
The following letter was delivered to the apostles earlier today. Dear Apostles of the Church of Jesus Christ of Latter-day Saints, By now, I’m assuming that you are aware of what is taking place nightly in the shadow of our gorgeous and sacred Salt Lake Temple. Just in case, here are the details again. For a total of fifteen days, an event is being held across the street from temple square. It is called Temple-side Chat with an Apostle. Each day, one of the apostles will be invited to join us. A chair will be provided for his comfort. The chat will last around an hour, unless the apostle desires to extend it. People will gather each evening. Many will be victims and survivors of the heartbreaking consequences resulting from youth interviews. They desire to speak directly with those responsible for the policies that enabled the crippling indignities suffered while they were mere children. The stories of hundreds of these good people were delivered to your offices last March. Elder Christofferson has read them all. He described them as TRAGIC. To many survivors, it has been highly meaningful that their accounts actually landed on Elder C’s desk. That he read them is huge. Just think what it would mean to them for an actual apostle to listen in-person to these TRAGIC stories. A central purpose of the Savior’s gospel is healing. Our gentle Lord was in constant out-reach to those who were shunned by the priesthood holders of his time. Jesus is lauded for healing in his wings. As a Special Witness of Christ, please come and spread that healing to those we have harmed. You will be spreading the Balm of Gilead not only among those present, but among thousands upon thousands around the world. The Temple-side Chat with an Apostle begins every night at 7:00pm on the sidewalks of South Temple Street. If you would prefer a different venue, please let me know and we’ll happily convene there. Here is the schedule of invitations. July 29: Elder Soares—Failed to show. July 30: Elder Gong–Failed to show. July 31: Elder Renlund–Failed to show. Aug 1: Elder Stevenson–Failed to show. Aug 2: Elder Rasband—Failed to show. Aug 3: Elder Anderson–-Failed to show. Aug 4: Elder Christofferson–-Failed to show. Aug 5: Elder Cook–Failed to show. Aug 6: Elder Bednar–Failed to show. Aug 7: Elder Uchtdorf–-Failed to show. Aug 8: Elder Holland–Failed to show. Aug 9: Elder Ballard–Failed to show. Aug 10: President Eyring–Failed to show. Aug 11: President Oaks–Failed to show. Aug 12: President Nelson–Failed to show. Thanks for your heartfelt consideration, Sam Young P.S. Yesterday, referring to me, you stated: “Further meetings with him are not necessary.” If you prefer that I not to be at the Temple-Side Chat when you are present, I’ll gladly accommodate. Healing victims and protecting children are my primary concerns.
Hybrid and electric cars have gone pretty mainstream. But it's hard to get a sense of whether the charging infrastructure is keeping pace. Especially since there are lots of proposals for how we could transition away from the gas station model. In fact, if you don't have an electric car you might not even be aware that there are really charging stations around at all in a significant way. But as of May there were more than 20,000 of them in the U.S., which is not nothing. Of course, that's not quite on the level of the roughly 121,000 gas stations around the country, but it's actually not that far off. Especially when you think about the fact that most electric cars can charge up in residential homes. Come on North and South Dakota, all the cool kids are doing it. [Green Car Reports]
Description The apartment has got two very tasteful and cozy bedrooms/living rooms, each one with its own balcony, decorated in warm colors and with wooden floors. The comfortable double beds (200cm x 200cm and 180cm x 200cm) ensure restful sleep. In addition to seating, wardrobe and dresser there is also a dining area/workplace in these rooms. The modern and fully equipped kitchen offers everything you need for cooking and self catering including refrigerator, cooker, oven/ microwave, dishwasher, Senseo coffee machine, kettle, toaster and so on. Each room has got its own bathroom. WIFI, TV, music system with connections for MP3 players and USB flash drive in each bedroom are at your disposal as well as iron and ironing board. Bed linen and towels are also included. Please note that there is only one bedroom and one bathroom available if the apartment is booked for 2 persons. For renting the whole apartment we charge the rate for 3 persons. Location: Your beautiful guest apartment is situated in a small side street next to Aegidientorplatz with its eponymous subway station. Although it is very centrally located it's wonderful quiet. In just a few minutes walk you will reach several museums such as Sprengel Museum, Regional or Kestner Museum as well as the City Hall and Maschpark, Maschsee, Georgstraße and pedestrian zone, Theater am Aegi, opera, Old Town, parliament and many more. The central station is also within walking distance. There is also a direct connection from the Aegidientorplatz to the fair (14 minutes), the Herrenhäuser Gärten or the Medical School. Cafe/bakery, restaurants and shops are located nearby. Hospitality is very important to us! We want you to enjoy your stay in our bright and modern non smoking apartment and look forward to your visit. House rules Please complete your guest profile and contact me BEFORE sending your booking request. I would like to know you a little better before I welcome you in my home. The apartment has been furnished with great care and should be treated very carefully. Beautiful apartment in / near the center of Hanover. Everything is within walking distance. Supermarkets, shopping center (shopping area). In the apartment everything looks neat and tidy. There is a large bed and a nice bathroom. Cancellation Policy: Strict You will be refunded half of the total price minus the cancellation fee if you cancel the booking at least 7 days before check-in by 12 noon CET (Central European Time) For cancellations that are made less than 7 days before check-in, you will be refunded 5% of the total price minus the cancellation fee.
Q: Adjusting the Size of Summation Symbol inside an Enumerate Environment Situation: I am making a compilation of problems involving the summation symbol. Problem: I want to resize my summation symbols but unable to do inside the enumerate environment even with the relsize package. Question: Is there an alternative way to resize (i.e enlarge) the summation symbols? Also, does this apply to other math symbols (e.g., integrals)? Thank you. EDIT: I forgot to mention that I already included the \everymath{\displaystyle} to my document. However, I would like to enlarge further the summation symbols beyond what \displaystyle could offer. Is there any way to do this? Any suggestion would be greatly appreciated. Code : \documentclass[12pt]{article} \usepackage[utf8]{inputenc} \usepackage[english]{babel} \usepackage[includeheadfoot,footskip=0in,paperheight=11in,paperwidth=8.5in,left=1in,right=0.5in,top=0.7in,bottom=0.5in,]{geometry} \usepackage{amsmath, amsfonts, amssymb, amsxtra, fancyhdr} \usepackage{graphicx, parskip, xcolor, url, enumerate} \usepackage{amsbsy, amstext, amsthm, relsize} %Commands \newcommand\sumone{\sum\limits_{n=1}^{+\infty}} \newcommand\sumzero{\sum_{n=0}^{+\infty}} \newcommand\sumtwo{\sum\limits_{n=2}^{+\infty}} \begin{document} Determine whether the following given items are absolutely convergent, conditionally convergent or divergent. \setlength\columnsep{-1.3cm} \begin{multicols}{4} \begin{enumerate}[a.] \item $\sumzero \cfrac{2n - 1}{n+3}$ \item $\sumone \frac{\raisebox{0.15ex}{$6n^2 - 9n + 4$}}{n^3}$ \item $\sumone \dfrac{3n - 2n^2}{n^2+1}$ \item $\sumone \dfrac{2 + \sin n}{4+n^2}$ \item $\sumone \dfrac{2n}{n^{3/2} +2}$ \item $\sumone \dfrac{(-1)^n}{\sqrt{n+n^2}}$ \item $\sumone \dfrac{n}{n+1}$ \item $\sumone \dfrac{n + \sqrt{n}}{n^3 + 1}$ \item $\sumtwo \dfrac{1}{n\sqrt{\ln n}}$ \item $\sumone \left(\dfrac{2}{n\sqrt{n}} + \left( \dfrac{-4}{3} \right)^n\right)$ \end{multicols} \end{enumerate} \end{document} A: By "resizing" the summation symbols, I assume you want to enlarge them, so that they have the size used in display-math environments. This may be achieve most directly by placing \displaystyle directives ahead of \sum macros that occur in inline-math environment. This works for \int, \prod, and other so-called variable-sized operator symbols as well. Having to remember to type \displaystyle at the start of lots of inline math groups is tedious. To make all inline-math instances behave according to \displaystyle, provide the instruction \everymath{\displaystyle} at the start of the environment of interest -- here: an enumerate environment. \documentclass[12pt]{article} \usepackage[utf8]{inputenc} \usepackage[english]{babel} \usepackage[includeheadfoot,footskip=0in,letterpaper, left=1in,right=0.5in,top=0.7in,bottom=0.5in, ]{geometry} \usepackage{amsmath, enumerate, multicol} %Commands \newcommand\sumone{\sum_{n=1}^{\infty}} \newcommand\sumzero{\sum_{n=0}^{\infty}} \newcommand\sumtwo{\sum_{n=2}^{\infty}} \begin{document} Determine whether the following given items are absolutely convergent, conditionally convergent, or divergent. \setlength\columnsep{-1cm} \begin{multicols}{4} \begin{enumerate}[a.] \everymath{\displaystyle} % <-- new! \item $\sumzero\frac{2n - 1}{n+3}$ % I wouldn't use "\cfrac" \item $\sumone \frac{6n^2 - 9n + 4}{n^3}$ % I removed the "\raisebox" wrapper \item $\sumone \frac{3n - 2n^2}{n^2+1}$ \item $\sumone \frac{2 + \sin n}{4+n^2}$ \item $\sumone \frac{2n}{n^{3/2} +2}$ \item $\sumone \frac{(-1)^n}{\sqrt{n+n^2}}$ \item $\sumone \frac{n}{n+1}$ \item $\sumone \frac{n + \sqrt{n}}{n^3 + 1}$ \item $\sumtwo \frac{1}{n\sqrt{\ln n}}$ \item $\sumone \left(\frac{2}{n\sqrt{n}} + \left(\frac{-4}{3}\right)^{\!\!n}\,\right)$ \end{enumerate} \end{multicols} \end{document}
from sickchill import logger, settings from sickchill.helper.common import try_int from sickchill.oldbeard import tvcache from sickchill.providers.nzb.NZBProvider import NZBProvider class Provider(NZBProvider): def __init__(self): super().__init__("OMGWTFNZBs") self.username = None self.api_key = None self.cache = OmgwtfnzbsCache(self) self.url = 'https://omgwtfnzbs.me/' self.urls = { 'rss': 'https://rss.omgwtfnzbs.me/rss-download.php', 'api': 'https://api.omgwtfnzbs.me/json/' } self.proper_strings = ['.PROPER.', '.REPACK.'] def _check_auth(self): if not self.username or not self.api_key: logger.warning('Invalid api key. Check your settings') return False return True def _check_auth_from_data(self, parsed_data, is_XML=True): if not parsed_data: return self._check_auth() if is_XML: # provider doesn't return xml on error return True if 'notice' in parsed_data: description_text = parsed_data.get('notice') if 'information is incorrect' in description_text: logger.warning('Invalid api key. Check your settings') elif '0 results matched your terms' not in description_text: logger.debug('Unknown error: {0}'.format(description_text)) return False return True def _get_title_and_url(self, item): return item['release'], item['getnzb'] def _get_size(self, item): return try_int(item['sizebytes'], -1) def search(self, search_strings, age=0, ep_obj=None): results = [] if not self._check_auth(): return results search_params = { 'user': self.username, 'api': self.api_key, 'eng': 1, 'catid': '19,20,30', # SD,HD,UHD 'retention': settings.USENET_RETENTION, } for mode in search_strings: items = [] logger.debug(_("Search Mode: {mode}".format(mode=mode))) for search_string in {*search_strings[mode]}: search_params['search'] = search_string if mode != 'RSS': logger.debug(_("Search String: {search_string}".format(search_string=search_string))) data = self.get_url(self.urls['api'], params=search_params, returns='json') if not data: logger.debug(_('No data returned from provider')) continue if not self._check_auth_from_data(data, is_XML=False): continue for item in data: if not self._get_title_and_url(item): continue logger.debug(_('Found result: ') + f'{item.get("release")}') items.append(item) results += items return results class OmgwtfnzbsCache(tvcache.TVCache): def _get_title_and_url(self, item): title = item.get('title') if title: title = title.replace(' ', '.') url = item.get('link') if url: url = url.replace('&amp;', '&') return title, url def _get_rss_data(self): search_params = { 'user': self.provider.username, 'api': self.provider.api_key, 'eng': 1, 'catid': '19,20,30', # SD,HD,UHD } return self.get_rss_feed(self.provider.urls['rss'], params=search_params)