text
stringlengths
8
5.77M
Ambrose Bury Ambrose Upton Gledstanes Bury (August 1, 1869 – March 29, 1951) was a politician in Alberta, Canada, a mayor of Edmonton, and a member of the House of Commons of Canada. Early life Ambrose Bury was born in Downings House, County Kildare, Ireland on August 1, 1869. He was educated at the Liverpool Institute, the Royal School in Raphoe, Dublin High School, Trinity College, and the King's Inn in Dublin, from which he received a Bachelor of Arts in 1890 and a Master of Arts in 1893. He married Margaret Amy Beatrice Owen on June 16, 1897, with whom he would have one son. He was called to the Irish Bar in 1906, and practiced law in Ireland before immigrating to Edmonton in 1912. The following year, he was admitted to the Law Society of Alberta. He practiced law as a partner of Ewing, Harvie & Bury (later Harvie, Bury & Yanda), and was chancellor of the Anglican diocese at Athabasca from 1919. Political career Bury's first attempt at public office was running for the Legislative Assembly of Alberta in the 1921 provincial election as a Conservative in Edmonton. He was defeated, finishing fourteenth of twenty-six candidates. Later that year, in the 1921 municipal election, Bury was elected to the Edmonton City Council for a two-year term as alderman, finishing fourth of nineteen candidates in a race in which the top seven candidates were elected. He was re-elected to another two-year term in the 1923 election. Towards the end of his second term on council, Bury was elected to the House of Commons of Canada as a Conservative in the riding of Edmonton East in the 1925 election. However, Parliament was dissolved amid the King-Byng Affair the following year, and Bury was narrowly defeated in the ensuing election by Liberal (and incumbent mayor of Edmonton) Kenny Blatchford. Blatchford had taken his job, and Bury set out to take Blatchford's, running for mayor in the 1926 election. He defeated Daniel Kennedy Knott (who would go on to become mayor himself after Bury left municipal politics), and was re-elected in 1927 and 1928. He did not seek re-election in 1929, anticipating a rematch against Blatchford in the next federal election. Bury defeated Blatchford by a substantial margin in the 1930 election as R. B. Bennett's Conservative government swept to power. He opted not to seek re-election in the 1935 election. He was appointed as a district court judge that year, and served in that capacity until he reached the retirement age of 75 in 1944. Later life and death In 1946, Bury's wife died, and Bury moved to England to live with his brother. He died in Ottawa March 29, 1951. His funeral was held in Edmonton, and he was buried in the Edmonton Cemetery. Bury had been an active Freemason. References Edmonton Public Library Biography of Ambrose Bury City of Edmonton biography of Ambrose Bury External links Category:1869 births Category:1951 deaths Category:Alumni of Trinity College Dublin Category:Canadian Anglicans Category:Canadian people of Anglo-Irish descent Category:Edmonton city councillors Category:Conservative Party of Canada (1867–1942) MPs Category:Irish barristers Category:Irish emigrants to Canada (before 1923) Category:Judges in Alberta Category:Lawyers in Alberta Category:Mayors of Edmonton Category:Members of the House of Commons of Canada from Alberta Category:People from Athabasca County Category:Politicians from County Kildare Category:Progressive Conservative Association of Alberta candidates in Alberta provincial elections
The U.S. envoy for efforts to end the Ukrainian conflict, Kurt Volker, is set to meet with Kremlin aide Vladislav Surkov on November 13 to explore deploying United Nations peacekeepers to eastern Ukraine. Volker has said he would meet Surkov in Serbia’s capital, Belgrade, for a “discussion of principles” to see if they can agree on what a peacekeeping force might look like. “We are not in agreement on this yet,” he told reporters in Washington on November 3. Fighting between Kyiv government forces and Russia-backed separatists who hold parts of Ukraine’s Donetsk and Luhansk regions has killed more than 10,000 people since April 2014. Several cease-fire deals announced as part of the Minsk accords -- September 2014 and February 2015 pacts aimed to resolve the conflict -- have reduced fighting but not stopped it. Alexander Hug, the principal deputy chief monitor of the Organization for Security and Cooperation in Europe's Special Monitoring Mission (OSCE SMM) to Ukraine, said last week that 425 civilians have been killed or injured in the conflict since the beginning of this year, according to Ukrainian media. Thirty-nine of them were children. In a tweet on November 12, Volker said the civilian casualty toll for 2017 is "outpacing 2016" and added: "People of Donbas deserve a real ceasefire." Russian President Vladimir Putin in September proposed deploying UN peacekeepers on the contact line separating the sides of the conflict to protect monitors from the OSCE. The plan swiftly drew criticism from both Kyiv and the West, in part because of concerns that deployment only along the front line would cement Russian control over separatist-held territory. Volker said Washington wants the mission to monitor the entire conflict area and make sure heavy weapons are pulled back. Putin later said he was open to adjustments to his initial proposal, but no agreement has been reached. Ukrainian President Petro Poroshenko's office said on November 4 that he held a telephone conversation with U.S. Secretary of State Rex Tillerson during which they “coordinated further steps for the deployment of an international UN mission” in the separatist-held parts of Luhansk and Donetsk, including the border between those areas and Russia, which Kyiv says is used to ship weapons and military personnel in from Russia. Volker last met Surkov on October 7 in Belgrade. The venue of the talks was not disclosed, although Serbian media said the two men met at a hotel. Belgrade is a neutral venue. Volker had refused to meet with Surkov in Russia, and Surkov is barred from the European Union under sanctions imposed in response to Russia's aggression against Ukraine. The two held talks for the first time on August 21 in the Belarusian capital, Minsk. Tillerson appointed Volker, a former U.S. ambassador to NATO, as the U.S. special representative for Ukraine negotiations in July. With reporting by Bloomberg
If you’ve ever yelled at a customer service representative when reporting a problem with a product or service, you’re not the only one. A customer “rage” survey designed by Customer Care Measurement and Consulting and the W.P. Carey School of Business at Arizona State University showed that 68 percent of U.S. households experienced “customer rage” this year — up 8 percentage points since 2011. “We’re yelling and cursing at customer service representatives more when dealing with the worst problems, with yelling up from 25 percent in previous rage studies to 36 percent now, and cursing up from 7 to 13 percent,” a press release about the survey says. So, what is it that makes consumers so angry? Here are a few notable statistics from the survey: The product most often responsible for enraging people is cable or satellite TV. 50 percent of consumers reported problems this year, up from 45 percent in 2011. 56 percent of complainants received no remedy for their troubles, up 9 percentage points from 2011. Customer satisfaction doubled from 37 to 74 percent when customers were given free remedies, such as an apology, along with a financial remedy. It also said: Despite the rise of the Internet, people are still 11 times more likely to complain via phone than Web. However, customer-complaint posting on social-networking sites, such as Facebook, has nearly doubled from 19 to 35 percent since 2011. Companies are spending a lot of money on customer care, but they’re obviously doing something wrong. And that’s costing them customer loyalty and money. “If the customer was satisfied or at least pacified, he or she only told an average of 10 to 16 people about the problem, but if customers were left dissatisfied, they told an average of about 28 people,” the press release said. But is this totally the fault of companies? You also have to wonder if customers themselves are more likely to become rude. Have you had an unpleasant experience with customer service this year? Were you polite or did you start yelling? Let us know in the comments below or on our Facebook page. This article was originally published on MoneyTalksNews.com as 'Rage Against Customer Service Reps Is on the Increase'. More from Money Talks News
12. Hong Kong is on Point. Sometimes there are things that other countries just do much, much better than the US. One thing I can think of off the top of my head is the subway systems in Shanghai and Hong Kong. Another thing that I’ll discuss in detail is the Octopus Card, a feature of Hong Kong. The Octopus Card is a debit card and a transportation card in one. It’s amazing because you can refill it at machines in the MTR (Mass Transit Railway) stations as well as the customer service booths in said stations. It’s also really nice because the machines have an English option, so it isn’t difficult to add money onto the card. The MTR staff are able to speak English, too. To get into the MTR, you just scan your card at the turnstile. It’s really quick and easy and definitely wins over the flimsy monthly cards that Septa offers (as well as heavy tokens). I’ve heard that Septa is updating all of their facilities, however, so I’m excited about that. Octopus Cards aren’t just used to get into the MTR stations, though. What I absolutely love is that you can use it to pay for other things. The vending machines at the school don’t accept coins or bills but Octopus. You just select the drink you want, scan your card, and you get your drink. Octopus is accepted in other stores, too. Convenience stores like 7-11 accept it as a form of payment (say goodbye to handing bills and coins!). Other stores like 759 Store (a small grocery chain specializing in imported Asian foods), Taste (the closest international supermarket to CityU), and Wellcome (a cheaper grocery option, also near the school) all accept the Octopus Card. Many other stores accept Octopus as payment. The CityU canteens all accept Octopus, too. My favorite place to go to utilize the Octopus to its max potential is the canteen at Academic Building 1. There are tons of stations/booths that specialize in a type of food. To order, you can go up to the main counter and talk to people behind the counter, but that isn’t needed if you have an Octopus! If you’re like me and have suddenly developed an aversion to talking to people (I’m still dealing with the language barrier…), you can use the Octopus at the order machines. There are about 6 machines around the canteen. You can go and select the meal that you want — everything is in English, so it’s easy. The machines are touchscreens, so it’s very high-tech. Once you’ve completed your order, you scan your Octopus, then your receipt prints out. You grab the receipt, then go to the station that the receipt directs you to, hand your receipt to the attendant, and get your food. It’s easy peasy and you don’t even have to talk to people. How great is that? A bonus that CityU students (as well as other university students) have is a discount off MTR rides — up to 50% off the regular fare, I think? The only issue is applying for the student-status MTR. I applied on the September 1st, the earliest day, and I can only pick up the card on November 16th. This is a long time considering the fact that I am leaving the country on December 20th! Luckily, though, we get a temporary student-status MTR card to use before we get our real MTR card. The MTR card I have now works perfectly fine, but I just can’t wait to get my real card. Another feature that it has is personalization. That is, the card will have a photo of my face on it. This feature is really cute… Philly, get on your game. Post navigation Share this: Published by Christine Tang Hello and welcome! My name is Christine and I'm a university student in the United States, more specifically Philadelphia. I'm here to share my experiences. Hope you'll all enjoy! View all posts by Christine Tang
Kevin CrossmanT3Coaching, LLC USAT Certified Coach for 11 years. I will find the most methodical approach towards making your journey rewarding - not only for the participant, but also family, friends, and those who you associate with. Big believer in balance of life...not merely triathlon.
Radical perineal prostatectomy: a learning curve? To determine a learning curve for radical perineal prostatectomy after formal training in radical retropubic prostatectomy. Using the William Beaumont Hospital Prostatectomy database, we analyzed peri-operative data from two surgeons performing radical perineal prostatectomies from their initial 96 cases to determine a learning curve. Over time, data between the first and last quarters showed consistent, excellent results in terms of skin time (143 SD ± 22 and 136 SD ± 24 min), blood loss (310 SD ± 120 and 335 ± 216 cc), and length of stay (1.3 SD ± 0.6 and 1.2 SD ± 0.5 days), without significant change. However, only two positive margins were obtained in the 4th quartile representing a significant change and possibly representing a learning curve. These data show that excellent, reproducible results can be obtained using basic surgical principles, without incorporating expensive technology and resources.
The overall aim of the National Heart, Lung and Blood Institute (NHLBI)/Suburban Hospital Cardiovascular MRI Research Project is to develop new approaches in assessing patients with cardiovascular disease with MRI technology.[unreadable] 1) Detection and characterization of acute coronary syndrome with MRI. We found that a rest MRI scan had higher sensitivity and specificity for diagnosing non-ST elevation acute coronary syndrome than cardiac risk factors, ECG, and troponin Kwong RY, Schussheim AE, Rekhraj S, Aletras AH, Geller N, Davis J, Christian TF, Balaban RS, Arai AE. Detecting acute coronary syndrome in the emergency department with cardiac magnetic resonance imaging. Circulation 2003; 107:538-544. The sensitivity and specificity for detecting acute coronary syndrome was 84% and 85% by MRI, 80% and 61% by an abnormal ECG, 16% and 95% for ST depression or T-wave inversion, 40% and 97% for peak troponin-I, and 48% and 85% for a TIMI risk score >3. The MRI was more sensitive than strict ECG criteria for ischemia (p< 0.001), peak troponin-I (p< 0.001), and the TIMI Risk Score (p=0.004). The MRI was more specific than an abnormal ECG (p< 0.001). Multivariate logistic regression analysis showed an abnormal MRI was the strongest predictor of acute coronary syndrome and added statistically significant diagnostic value over clinical parameters (p< 0.001). We concluded that the resting MRI scan exhibited diagnostic operating characteristics suitable for triage of patients with chest pain in the emergency department.[unreadable] [unreadable] We have extended this work in a second protocol that used adenosine stress MRI to evaluate 141 consecutive patients with troponin-negative acute coronary syndrome. The overall sensitivity and specificity for detecting ischemic heart disease were both greater than 90%. An abnormal adenosine stress MRI had significant 1 year prognostic value. (Ingkanisorn et al. JACC 2006; 47: 1427).[unreadable] [unreadable] We have determined that gadolinium delayed enhancement cardiovascular magnetic resonance corrrelates with clinical measures of myocardial infarction. Ingkanisorn et al. J Am Coll Cardiol 43:2253-9. This study imaged patients with acute myocardial infarction an average of 2 days post-MI. The transmural extent of delayed enhancement predicted the recovery of regional myocardial function.[unreadable] [unreadable] We completed a project that aims to characterize recently ischemic myocardium and demonstrated that we can image the ischemic area at risk after myocardial perfusion has been restored Natanzon A, Aletras AH, Hsu L, Arai AE. Determining Myocardial Area at Risk with Contrast Enhanced Manganese MRI. Radiology. 2005 Sep;236(3):859-66. This can be described as a form of "ischemic memory imaging." We found that T2-weighted MRI can determine the area at risk in acute MI and is thus complementary to delayed enhancement imaging (Aletras et al. Circulation 2006; 113: 1865). This methodology also works in non-reperfused myocardial infarction (Tilak et al. Investigative Radiology in press).[unreadable] [unreadable] Despite the promise of using T2-weighted images in diagnosing the ischemic area at risk associated with acute coronary syndrome, commercial software used to obtain these images is limited by artifacts and other technical factors that reduce the diagnostic accuracy to about 70%, an unacceptable level of performance. We developed 2 new methods for imaging myocardial edema associated with acute coronary syndrome (Kellman et al Magn Resonance Med 2007; 57: 891) and a second method that may offer better signal to noise ratio but is more difficult to implement (Aletras AH et al Magn Reson Med 2008; 59: 229). The steady state free precession methodology markedly improved the diagnostic accuracy of determining the coronary territory associated with an acute myocardial infarction.[unreadable] [unreadable] 2) Characterizing myocardial infarction and viability with MRI. We also developed a phase sensitive reconstruction method which improves the quality of heart attack images and minimizes the influence of user selected parameters on the apparent size of the heart attack Kellman P, Arai AE, McVeigh ER, Aletras AH. Phase-sensitive inversion recovery for detecting myocardial infarction using gadolinium-delayed hyperenhancement. Magnetic Resonance in Medicine 2002 47(2):372-383. Our histopathological validation of the phase sensitive reconstruction method and a validation study showing that a computer algorithm can accurately measure infarct size on in vivo and ex vivo images is now in press. We have also extended this work to characterize IL-2 myocarditis and community acquired myocarditis. We have extended our validations of the phase sensitive inverson recovery methods for imaging myocardial infarction with another study: Artifact suppression in imaging of myocardial infarction using B1-weighted phased-array combined phase-sensitive inversion recovery (Kellman et al. Magn Reson Med 2004; 51:408-12). We developed comuter algorithms with advanced image processing logic to improve the accuracy of measuring the size of myocardial infarction (Hsu et al. J Magn Resonance Imaging 2006; 23: 298-308 and Hsu et al. J Magn Resonance Imaging 2006; 23: 309-314). We developed a method to improve the contrast between myocardial infarction and the blood in the left ventricular cavity (Kellman et al. J Magn Resonance Imaging 2005; 22: 605-613) and a method that allows imaging myocardial infarction without resorting to breatholds that are not feasible in all patients (Kellman et al. 2005; 53: 194-200). We recently completed analysis of the ICELAND MI study of the prevalence of myocardial infarction in 978 participants in the AGES-Reykjavik study. Preliminary results indicate a much higher than expected prevalence for unrecognized myocardial infarction than suggested by prior epidemiological studies relying on ECG methods. [unreadable] [unreadable] 3) Improving first pass myocardial perfusion imaging. We have extended our first pass perfusion methods to provide quantitative analysis methods. We have shown that the MRI can measure myocardial perfusion as accurately as microsphere injections (a gold standard method only usable in animal models) Christian TF, Rettmann D, Aletras AH, Liao S, Taylor JL, Balaban RS, Arai AE. Absolute Myocardial Perfusion by MRI Using a Dual-Bolus First-Pass Method: Benefits Over Qualitative and Semi-Quantitative Analysis. Radiology 2004; 232:677-84. We confirmed that most of the conclusions derived from Dr. Christian's work applies to humans (Hsu et al. JMRI 2006; 23: 315). We completed a study in humnas comparing the diagnostic accuracy of quantitative stress perfusion with quantiative coronary angiography. This work, which is in review, indicates that the fully objective quantitative stress perfusion methods can diagnose patients with significant coronary stenosis without needing additional input from delayed enhancement images or cine MRI. We also developed methods for accelerating perfusion image acquisition (Kellman et al. Mag Resonance Med 2004; 52: 200-204) and used a variant of these methods to measure T2* during the first pass of contrast through the heart (Kellman et al. Mag Resonace Med 2006; 56: 1132-4). This later paper is important since T2* is thought to be a major source of image artifacts and false positive findings on MRI perfusion studies. In fact, T2* does not appear affected severely enough to explain the endocardial artifacts seen on many patients.
Tiyaha bedouin The Tiyaha or Tiyahah is a Sinai/Negev Bedouin tribe. Their traditions state that they originated from near Madina and settled in the Sinai Peninsula during the early years of the Muslim conquests. They were led by one named Rabab and the five main sub-groups trace their roots to his five sons. The word Al-Tiyaha means "the lost ones" in Arabic, the tribe is called Al-Tiyaha relative to the Al-Tiyah area (the country of Al-Tiyaha, ) in central of Sinai, which is the land where the children of Israel lost for forty years. it is unknown if Al-Tiyaha tribe have Israelite roots. Al-Tiyaha bedouins along with "Al-Badara bedouins" are thought to be the indigenous pre-Islamic bedouins of Negev and Sinai. Probably related to ancient biblecal Arabians who inhabited the area like the Nabateans and the Arabu. Their alleged Arab ancestory is mysterious and despite claiming a Najdi Arabian origin, their surrounding Arab neighbors like the Tawarah bedouins to the south and Tarabin bedouins to the North see them as foreigners . They are recorded to be the oldest Arab tribe to arrive and settle Sinai due to the Islamic conquest of Egypt. Their name "Al-Tiyaha" came from the Al-Tih plateau (in Arabic: هضبة التيه ) which means the "lost land" and this is a very strange occasion since Arab tribes usually don't change their name to the name of the region easily. At-Tih plateau is an isolated unwanted desert, a perfect shelter for a fleeing people who were displaced from their homelands by new settlers. Sub-Groups The Hukuk Formerly the paramount clan, the Hukuk grazed the land from Jebel al-Kahlil (Hebron) to Wadi al-'Araba, south of the Dead Sea and taxed anyone wishing to cross their territory. In the 1930s their leader was one Sheikh Suleyman whose grandfather had been hung by the Turkish authorities for abducting women and levying illegal dues on bedouin around Gaza. The 'Allamat In the 1930s this clan numbered less than 2,000. After the British authorities put their Sheikh, Salama ibn Musa Abu Shunnar, in prison for "misbehaviour" they split into three sub-groups, each with their own Sheikh. 'Iyal 'Umari Taking their name from one of Rabab's sons called 'Umari who had a reputation as a Tiyaha war leader. Despite this he has an evil reputation and his grave on the left bank of Wadi al-Abya regarded as a place of bad-omen. In the 1930s the clan numbered some 500, divided into two sub groups: The 'Urur and the Rawashida. The Nutush Also known as the 'Atawina. One of their Sheikhs, Salim, was killed fighting Ibrahim Pasha. Exceeding 2,000 in 1930, they were one of the senior branches of the Tiyaha. In the nineteenth century they levied taxes on the people of Gaza and Hebron. Two of their Sheikhs, 'Awda and 'Amir, played a leading role in the war with the Tarabin, which weakened their influence over other sections of the Tiyaha including the Hukuk leading tribe Alhuzayyel. During the early years of the twentieth century they were led by Shaykh Ali ibn 'Atiya, who was widely respected, serving on local official bodies as well as the General Council in Jerusalem. Unusually he sent his sons to school. The Qadirat Numbering 4,000: during the early years of the British occupation a number of them, under the leadership of Ibrahim ibn Salama, committed numerous acts of lawlessness, living as outlaws until making peace with the government. Many of the residents of Lakiya, north of Beersheba, identify themselves as Qadirat. The Dhullam The grave of one of their ancestors, Mahna, in Wadi al-Hafir is a place of pilgrimage. Numbering 2,000 in 1930, they had a reputation as fighters. They lost eighty horsemen in one engagement with the Tarabin during the nineteenth century. Other sub-groups A number of other tribes and clans were allied to the Tiyaha: The Shallaliyin (1,000); The Bani 'Uqba living around Beersheba; The Qatatiwa also arriving in the Negev in the early nineteenth century; The Qalazin (200) and the Badinat (350). Nineteenth century In 1843 a Scottish missionary was amongst a small group that set out from Cairo to explore possible routes taken by Moses across Sinai. Their itinerary included Saint Catherine's Monastery, central Sinai, then East to Petra and to Jerusalem via Hebron. In Cairo they hired a guide and 47 camels from the Aleika bedouin, a branch of the Tawarah bedouin. For part of their journey West from Suez they were accompanied by Sheikh Saleh, the leader to the Tawarah, who was based in Wadi esh Sheikh west of Mount Sinai. North West of Saint Catherine's, near the fort at Nakhl where the Haj road enters Jebel Tih, their progress was stopped by a large group of Tiyaha who refused to allow the Tawarah to cross their territory. In the negotiations that followed it was agreed that the Tawarah would continue to Gaza with half of the party and the Tiyaha would provide 20 camels to transport the rest to Petra and back as far as Dhahariya at a cost of 220 piasters per camel. The writer observed that the Tiyaha were armed with guns plundered from the retreating Egyptian army in 1841, and on the way back from Petra, south of the Dead Sea, they came across bones and complete skeletons of soldiers who had been attempting to reach Gaza. He comments on several occasions of finding areas of rye planted for grazing and that the Tiyaha were more observant about prayers than his previous escort. He does speculate this might be due to the appearance of a large comet during the journey. The Tiyaha's territory did not extend to Wadi 'Arabah, they had poor relations with the bedouin living there. Negotiations were required with the residents of Petra before the party were allowed to set up camp because of antagonism towards the escorts. On the way back across Wadi 'Arabah they were joined by four Tiyaha men escorting 40 camels from grazing East of Mount Seir which they were taking to Gaza to sell. The journey ended outside Dhahariya when the Tiyaha escort refused to enter the town due to a murder that had been committed in the recent past. In an 1874 list of Bedouin tribes produced by a member of the Palestine Exploration Fund survey team, the Tiyaha are described as "in the Desert of the Tih". In April 1875, Lieut. Claude R. Conder, who was surveying Gaza District for the Palestine Exploration Fund, reported that part of the territory belonging to the Tiyaha included 200 square miles north of Beersheba. References Category:Bedouins in Israel Category:Bedouin groups
1. Field of the Invention The present invention relates to a receptacle for packaging, storing, and dispensing gloves to be used by health care or emergency rescue personnel. Traditionally, the use of surgical gloves was based upon the desideratum of maintaining sanitary conditions for the protection of the sick or disabled. With the advent of acquired immune deficiency syndrome, more commonly known as AIDS, the fears of possible infection from handling human blood and/or body fluids have become somewhat of a phobia among health care and/or emergency rescue personnel. As a result of the fears of such health care and/or emergency rescue personnel, there has been a significant increase in the use of protective gloves which heretofore were worn principally for the protection of the sick or disabled. The use of such gloves now serve the manifold purpose of allaying the fears of the health care and/or emergency rescue personnel as well as of protecting the sick and the disabled. Hopefully, the use of such gloves will realistically afford the health care and/or emergency rescue workers the desired protection against infection in their work place and permit OSHA requirements of January 1988 to be met. In any event, the allaying of such fears should at least enhance the availability of health care and rescue personnel as well as provide them with surer hands in their work. 2. Description of the Prior Art Prior art packages generally are of the type which contain a single pair of surgical gloves for use by a single health care worker who individually scrubbed himself or herself and drew out a single pair of gloves to use. While it is possible that some prior art packages contain more than one pair of gloves, such packages if they do exist probably were based upon economics and/or convenience rather than upon the prevalent need for numerous pairs of gloves on any given situation to meet the demands of teams of rescue workers and/or health care persons.
Q: Manipulatinng JQuery's Autocomplete List I want to call my own function on JQuery's Autocomplete list. JQuery Code: //JQuery UI AutoComplete $( "#tut_search" ).autocomplete({ minLength: 2, source: "PHP_Code/MyAjax.php?page=tut_search_ac" }).data("autocomplete")._renderItem = function(ul, item) { return $("<li></li>") .data("item.autocomplete", item) .append("<a href='javascript:alert();'>" + item.name + "</a>") .appendTo(ul); }; Function is not calling on the clicking of autocomplete list. Please give me any solution to call function on JQuery Autocomplete List. Thank you in advance. A: _renderItem function should be part of the autocomplete options: $( "#tut_search" ).autocomplete({ minLength: 2, source: "PHP_Code/MyAjax.php?page=tut_search_ac", _renderItem: function(ul, item) { return $("<li></li>") .data("item.autocomplete", item) .append("<a href='javascript:alert();'>" + item.name + "</a>") .appendTo(ul); } }).data("autocomplete");
[Bronchoscopic assessment algorithms for the practical evaluation of the rheological properties of the tracheobronchial secretion and the classification of the degree of the disordered drainage function of the tracheobronchial tree (TBT) in chest and combined trauma with chest trauma as the leading injury]. Ventilation impairment, due to ineffective elimination of the mucous-hemorrhagic content from the tracheobronchial tree (TBT), obstructs the upper airways with the ensuing ventilation reduction giving rise to atelectases and progressive alveolar block. There is evidence of transudation and exudation into the pulmonary pathways and pleural cavity. A series of 276 patients presenting closed chest trauma are subjected to fibrobronchoscopy (FBS) and follow-up study. In 92 of them bronchoscopy is performed 2 to 15 times per patient, accordingly: in 75-twice, in 10-five times and in 15-twice. One-hundred twenty-nine of the total of 276 cases under study are on mechanical ventilation. In 56 instances FBS is carried out through a tracheostomy cannula, in 73-by intubation, in 18-through the mouth, and in two--through the nose. Based on the obtained results, algorithms for assessment of the rheological properties of tracheobronchial secretion and degree of impairment of TBT drainage function during emergency FBS in closed chest injuries are worked out, having an essential practical bearing on the diagnostic and therapeutic approach to closed thoracic trauma.
Replacement Doors When considering the exterior of their homes, most people tend to focus on the condition of the siding or the roof since those components cover majority of the exterior. Another important piece to consider is the condition and functionality of the front doors, patio doors, and garage doors. As a matter of fact, exterior doors are the most frequently used elements of homes which contributes to the importance of keeping them looking great and serving their purpose. If the doors on your house show signs of wear and tear, don’t open or close properly, leak outside air, or become a security risk, it may be time for a replacement. Nowadays, most options in doors are quite affordable considering their longevity and positive influence on the value of your property. New doors are considered a small investment that pay offs in the long run. At Top to Bottom Construction, Inc. our style and design experts can help you sift through the many options in materials, textures, glass details, and hardware in order to help you create the complete finished look that will complement the exterior of your property. When it comes to patio doors, proper function can make a difference between utter frustration and total bliss. Sliding glass doors or French doors are typically the entry point into the backyard oasis of your property. The signs of faulty function of these types of doors include drafts and difficulty in opening and secure locking. Top to Bottom Construction, Inc. can assist you in recognizing whether or not a full replacement is necessary or if the issue can be resolved with repair. We also work with garage doors to assure ease of use and security. All our door systems including office doors are backed by our 12-month workmanship and installation warranty. Call us or schedule an estimate below to speak with one of our door replacement professionals today. SCHEDULE YOUR FREE ESTIMATE Schedule your free in home estimate today! Special Financing Available Need financing for your next project? No problem. We have partnered with GreenSky® Trade Credit to bring you exclusive financing options that are flexible and affordable. Wisconsin At Top to Bottom Construction, Inc. we pride ourselves on delivering reliable and quality service to our customers. We treat every project with utmost attention to detail as we strive to meet and exceed homeowners’ expectations. Our outstanding reputation has been built over many years of commitment to quality interior and exterior building solutions. Our products and labor are backed by industry’s leading warranty and maintenance program options. We are proud of our A+ rating awarded by the Better Business Bureau.
Letter from Roger Casement to Gertrude and Elizabeth Bannister stating he cannot visit Falcarragh, that he is writing two articles for the 'Anglo-Saxon Press', and that Agnes Newman has lost her savings to the "Selfridge Business",
[A case report of successful one-stage operation in TGA (group III) with WPW syndrome]. A patient who had received balloon atrioseptotomy and B-T shunt operation previously experienced recurrent episodes of supraventricular tachycardia, and was refractory to medical treatment since the age to 3. At 9 years, the patient underwent intraoperative electrophysiological mapping which confirmed the earliest breakthrough at the crux of posterior septal region. Rastelli's operation and division of posterior septal Kent was simultaneously performed successfully. Post operative ECG was normalized with abolition of delta wave, and PSVT was gone. We concluded that the division of Kent bundle should be simultaneously performed with operative reconstruction in patients with congenital heart disease and WPW syndrome on postoperative care for SVT.
4. Let o be u(b). Let z be (-12)/(-8)*o/(-36). Put 4, -3, z in descending order. 4, z, -3 Let m = -898 - -896. Sort 5, m, -1/6. m, -1/6, 5 Let b(f) = -27*f - 24. Let p be b(-1). Put -0.2, p, 0.4, 1 in decreasing order. p, 1, 0.4, -0.2 Let w = 70.5 - -8.5. Let g = w + -74. Put g, -6, -0.4 in increasing order. -6, -0.4, g Let j = 145.5 - 146. Sort -0.4, j, -3/2, -4 in increasing order. -4, -3/2, j, -0.4 Let p = 2.44 + -1.94. Put p, -1, 51 in descending order. 51, p, -1 Let a(t) = t**3 - 6*t**2 - t + 6. Let p be a(6). Let g(u) = -u**2 + 2*u + 1. Suppose 9*m - 15 = 4*m. Let n be g(m). Sort p, -3, n. -3, n, p Let v = 262 + -263. Sort v, 0.4, 13, -4/11 in decreasing order. 13, 0.4, -4/11, v Let l be (-51)/(-78) - -2 - 2. Let m = l + -2/13. Let p = 442 - 438. Put p, 1, m in decreasing order. p, 1, m Let b(a) = -a**3 + 4*a**2 + 9*a - 17. Let f be 7 - (-52)/(-8) - 18/(-4). Let u be b(f). Sort u, -1, 63 in descending order. 63, u, -1 Suppose -4*y = 20, -3*q + q + 5 = -y. Suppose 0*c + 23 = -5*t - 3*c, q = 5*t + c + 31. Put 0, 2, t in increasing order. t, 0, 2 Let y = -37.959 - -38. Let m = -0.541 + y. Put 4, -4, m, 5 in descending order. 5, 4, m, -4 Let u be (-6 - (-12)/4)*-1. Put u, 1, 4, -3 in decreasing order. 4, u, 1, -3 Suppose 0 = 2*b + 4*l - 7 - 13, 0 = b + 4*l - 12. Sort b, -5, 0 in descending order. b, 0, -5 Let r = -1.89 + 1.79. Put r, 0.08, -0.2, 1/3 in increasing order. -0.2, r, 0.08, 1/3 Let g = -0.49 + 0.85. Let k = g - 0.36. Put -1/2, -1/3, k, 0.2 in ascending order. -1/2, -1/3, k, 0.2 Let o be (1/27)/(12 + (-1144)/96). Put 0, 1, o in increasing order. 0, o, 1 Suppose -357*t + 366*t - 171 = 0. Suppose 0 = 4*f + 5 + 3. Put t, 3, -4, f in decreasing order. t, 3, f, -4 Let a(h) = -h**2 + 15*h + 49. Let f be a(18). Suppose -3*b = 1 + 2. Put f, -10, b in decreasing order. b, f, -10 Let b = -1.6 + 20.6. Let x = 93 - 84. Let q = x - b. Put q, -1/5, 5 in descending order. 5, -1/5, q Let q be 33/(-77) - ((-114)/(-56))/(-3). Sort -0.3, -5, q, 0.03 in descending order. q, 0.03, -0.3, -5 Let n(q) = -q**2 + 2*q + 2. Let f be n(5). Let c = f + 77/6. Let o be -4 + (-1365)/(-392) - 3/(-8). Put o, -1/3, c in ascending order. -1/3, c, o Let g be 10/(-75) - (-3 + 428/(-60)). Put g, -1, 0.2 in decreasing order. g, 0.2, -1 Let w = 1781 - 1767. Sort w, 1, -2, 3 in descending order. w, 3, 1, -2 Let f = 12.43 + -15.43. Put -5/3, -0.82, f in increasing order. f, -5/3, -0.82 Let p = -133 - -133.85. Let l = p + -0.95. Suppose 10 = y - 6*y. Sort 2, l, y in decreasing order. 2, l, y Let m = -2352 - -2405. Sort m, -2, 3, -4 in decreasing order. m, 3, -2, -4 Let r = 271.9 - 272. Sort r, 179, -3, -5 in ascending order. -5, -3, r, 179 Suppose -3*g = 126 + 12. Let n be g/(-6)*3*5/(-5). Sort -2, n, -3. n, -3, -2 Let u be 2/((44/(-297))/(2/(-3))). Sort 4, u, 1. 1, 4, u Let f be (-30)/((-15)/3) + -5. Let h be f + -2 + (-3)/(-1). Sort h, -1, -11, 1 in decreasing order. h, 1, -1, -11 Let h = -0.05 + -1.95. Let w be (2 + 0)*(-5)/14*12/(-30). Put w, h, 3, -3 in descending order. 3, w, h, -3 Let h be (-6)/10 - 7/((-70)/(-4)). Sort -3, h, 12, 11 in descending order. 12, 11, h, -3 Suppose -4*g = -36 + 44. Let t = 0.415 - 0.115. Sort g, -1, t in decreasing order. t, -1, g Let t = -21.98 + 19.98. Sort -764, 0, t. -764, t, 0 Let i(j) = -j**3 + 9*j**2 - 17*j. Let a(t) = -2*t**2 + 20*t - 12. Let z be a(9). Let x be i(z). Let h be (3 - 0)/((-3)/(-4)). Put x, h, -5 in increasing order. -5, h, x Let z be (2/(-1))/10 - 960/200. Sort 0, -2, -10, z. -10, z, -2, 0 Let r = -16 - -11. Let x(v) = 4*v - 188. Let p be x(47). Sort -1, p, r in ascending order. r, -1, p Let w = 1402 + -1407. Let c be (-3)/(-4) - 1/(-4). Put w, 2, c, -2 in increasing order. w, -2, c, 2 Let v = -32 - -41. Suppose y + 16 = v*y. Sort y, -6/7, -4, -3 in ascending order. -4, -3, -6/7, y Let m = -211 + 218. Suppose -7 = -3*n + f, -2*n + 0*n - 2*f - 6 = 0. Sort m, n, 4 in ascending order. n, 4, m Let k(x) = -2*x**2 - 16*x + 5. Let f be k(-8). Let n = f + -9. Put 2, -21, n in increasing order. -21, n, 2 Let o(p) = -p**3 - p**2 - 2*p + 20. Let d be o(0). Let k = 17 - d. Let m be 28/(-12) - (-1)/3. Sort m, k, 0 in descending order. 0, m, k Suppose 3*d + 5 - 12 = l, 0 = -l + 5*d - 11. Let q = -452841/8 - -56688. Let k = q - 83. Put k, -0.3, l in descending order. k, -0.3, l Let n = -11 + 8. Let o be (n + 3 + -4)/(-14). Put 0.3, 0.6, o in increasing order. o, 0.3, 0.6 Let y = -83/585 + 1/117. Let q = -7.7 - -8. Let b = -0.01306 + -1.98694. Put q, b, y in descending order. q, y, b Let h = -21 - -20.95. Let j = 0.25 - h. Let g = 4.9 + -5. Put g, j, -5 in decreasing order. j, g, -5 Suppose -2*p = 5*y - 7, 2*p - y + 5*y = 6. Suppose 2*o + x = -1, -14 = -3*x + p. Let g be -8*(3/6 - 0). Sort g, o, -5 in decreasing order. o, g, -5 Let n = 2251/1170 - 24/13. Let q = n - -1/45. Put 2, 0.9, q, -0.1 in decreasing order. 2, 0.9, q, -0.1 Let l be (-7 - (-4 + 1)) + (-2)/(-2). Suppose 6*z = z + 10. Suppose 3*f - 2*f + z = 0. Sort l, -5, f in ascending order. -5, l, f Suppose 0 = -2*p + 303 - 31. Put -4, p, -1 in decreasing order. p, -1, -4 Let x(y) = 0*y + 15 + 4*y - 3*y. Let o(j) = -19*j - 465. Let d be o(-24). Let h be x(d). Put h, 2, -2 in increasing order. -2, 2, h Let t(c) = 47*c**3 - 5*c**2 - 3*c - 4. Let d be t(-4). Let n be (-4)/(-14) - 2984/d. Let w = -16/11 + n. Put 2, 0.4, w in descending order. 2, 0.4, w Suppose 0 = -3*l + 4*f - 5, 5*l - 11*f + 15*f = -19. Sort -366, 4, l in increasing order. -366, l, 4 Let t be 4/(-30)*45/36. Let c be 0/2 - (10 + -12). Put t, -2, c, 0.3 in ascending order. -2, t, 0.3, c Let j(x) = -4*x + 1. Suppose 2*n = -4*k + 10, -5*n + 0*n = -2*k + 11. Let w be j(n). Suppose w*a - 16 = a. Put -3, a, -5 in descending order. a, -3, -5 Let w be 5/(-5) - (2 - 7 - -9). Let q(t) = t**3 - 5*t**2 + 6*t - 5. Let m be q(4). Let x be (8/(-6))/(2/6). Sort m, x, w. w, x, m Let t = 19 + 17. Let x = t + -36.8. Sort x, -2/3, -2. -2, x, -2/3 Let x be (-117)/18 + 8 + 38/(-20). Sort -5, 0.01, x in ascending order. -5, x, 0.01 Let w(a) = a**2 + 4*a + 4. Let k be w(-2). Sort k, 26, 2 in decreasing order. 26, 2, k Let v be 32/225 - 26/(-325). Sort v, -2/63, -0.3. -0.3, -2/63, v Let k be ((-2)/(-3))/(8/60). Let l(d) = d**3 + 6*d**2 + 3*d + 22. Let f be l(-7). Let b = -44 - f. Sort -2, k, b in descending order. k, b, -2 Suppose -19 = -4*a + m, m + 11 = a + a. Sort a, -1, -2, 10 in ascending order. -2, -1, a, 10 Let k(t) = 10*t - 1. Let f be k(-1). Suppose 4 = 6*r - 2. Let g = -25 + 29. Sort r, f, g in ascending order. f, r, g Suppose 4*c + o + 9 = 3, c = -o. Let z = 5926 - 5931. Sort z, c, 5, 3 in increasing order. z, c, 3, 5 Let u(c) = -c**2 + c. Let j(s) = -s**3 + 8*s**2 - 6*s + 11. Let h(n) = j(n) + 3*u(n). Let z be h(5). Put z, -2, 4 in decreasing order. 4, -2, z Let k be ((-12)/12)/(((-12)/(-16))/3). Sort -1, -3, -0.304, k. k, -3, -1, -0.304 Let u(l) = -5*l - 16. Let f be u(-3). Suppose -4 = -4*q, -4*m - 20 = q - 5*q. Suppose -5*r + 35 = -5*x, 5*r = -4*x + 2*x + 21. Put m, x, f in descending order. f, x, m Let b(q) = -2*q**2 - 6*q + 1. Let m(i) = 2 - 2 + 11*i + 4*i**2 + 1 - 4. Let a(p) = 7*b(p) + 4*m(p). Let d be a(-3). Put 3, d, 5 in descending order. d, 5, 3 Let y = -1 - -3. Let h be 3*(0 - (3 + -4)). Sort y, h, -1/2 in descending order. h, y, -1/2 Let t = -47 - -47.6. Let c = 112 - 1006/9. Sort t, c, -0.3, -3. -3, -0.3, c, t Let b be (-3)/(-6) - 17/18. Let l = 0.24 - 0.04. Let r = l - 1.2. Put b, r, 3 in decreasing order. 3, b, r Let f be (-10)/3*(-348)/290. Sort 87, -2, 2, f in increasing order. -2, 2, f, 87 Let o be -1*(4 + 10 + -9). Let k = -64 + 317/5. Let b be (-1)/(-4) + 5/(-36). Put b, o, k in descending order. b, k, o Let h be (-22)/2 - (2 - -3 - 9). Sort 2, h, 5 in increasing order. h, 2, 5 Let p = -953 - -947. Sort -17, -3, p, 2 in descending order. 2, -3, p, -17 Let s(y) = -2*y**3 - 111*y**2 - 55*y + 2. Let b be s(-55). Sort b, -2/33, 5, -3 in ascending order. -3, -2/33, b, 5 Let v = 156 + -161. Sort v, 1, 0 in decreasing order. 1, 0, v Let y = 6 + -3. Suppose -7 = -62*l + 69*l. Sort l, -3, 1, y in descending order. y, 1, l, -3 Let g = 626 + -621. Put 4, g, -9 in ascending order. -9, 4, g Let u = -0.9 - -0.7. Let f be 6/18*(-1 - 1). Let a be (-36)/(-60) - 26/10. Sort f, a, u in descending order. u, f, a Let s = 3
Key to success: Hackley will count on tenacious defense to compensate for what it lost in height and speed. It will look to be efficient on offense while harassing opponents into mistakes and quick possessions. Key to success: The Lady Bulldogs feature exceptional depth, including a promising group of sophomores and freshmen. Coach Maher will seek to capitalize on that by ramping up the defense and substituting frequently to ensure that players are able to compete with great energy at all times during a demanding schedule. “I’m very optimistic. If they continue to work as hard as they’ve been working, they should be very successful. They’ve played together for a long time; they get along very well together. They’re excited and I’m excited. I’m not going to say we’ll be 23-2 again because it’s going to be very challenging.” – Maher Key to success: Turnovers and lack of confidence played a huge part in Hackley’s struggles last season. There is a renewed emphasis on maximizing possessions and overcoming adversity. “As a first-year coach last season, we struggled to adjust to a new system. In my second full year, players will have a better understanding and familiarity with our style of play and expectations within our system.”– Johnson Key to success: Players bought into a rigorous off-season conditioning program, hitting the weights often and hard. There is every reason to expect that it will pay off with a stronger team that will be harder to keep off the boards and harder to defend. “This is a very athletic team. We are going to be very up tempo and try to dictate the pace of the game.”– Starace You might find interesting... Drop-Off at Greenburgh Town Hall The Greenburgh Town Hall lobby is functioning as a repository for charitable holiday donations of food, clothing, and toys to several organizations collecting for the less fortunate. The Town Hall is located at 177 Hillside Ave... More »
Underpinning Croydon Hills While constructing or renovating buildings and structures, the foundation needs to be strong enough to hold the structure steadily and evenly. Underpinning is the actual process of strengthening these foundations resulting in better stability and durability to these structures. In some cases the foundations of the structure might not be strong, stable and even experience slight movements which might result to cracks and visible damages to the structure. To avoid further damage to the structure, a well planned and executed underpinning procedure helps to stabilize the foundations and reduction of cracks and physical damages. In some cases, Underpinning might include series of procedures according to the nature of the damage or renovation. Procedures like excavations, steel works, pilings, injections, concreting, basements might be required in few cases as damages could be caused due to natural soil movement, earthquake, drought, flooding or other natural causes. Underpinning might also be required in order to strengthen the foundation for addition of storeys in the existing building. Get the Strongest and Safest Underpinning Croydon Hills Got an underpinning related crisis with your property? Come to Deep Underpinning Croydon Hills – the one stop solution for all such issues. We are the reliable professionals of Croydon Hills delivering finest and safest underpinning solutions. We have some of the best underpinners working with us to ensure our customers get state-of-the-art underpinning service. Our excellent underpinning solutions strengthen the foundations of a building thereby making it more stable and durable. This leads to lessening of physical damages to the building. If you see a cracked wall/floor, a misaligned door/window, or a sinking floor at your home/office then probably it needs an underpinning expert. At Deep Underpinning Croydon Hills we are adequately equipped to handle all kinds of procedures involved in underpinning services. From steel works, excavations, injections, basements, pilings, to concreting – we do it all. At Deep Underpinning Croydon Hills we take full care of your safety. Our technicians are thoroughly trained to deliver guaranteed underpinning solutions every time. Check out some of our major underpinning services and for more please explore our website: Underpinning Contractors Croydon Hills We at Deep Underpinning work to ensure that every building in Croydon Hills has a rock solid foundation. With our underpinning solutions we provide a reliable foundation and a stable structure to your home/office. A building needs underpinning service for two reasons. Firstly, if it has not been constructed properly at the first attempt and secondly if it has got worn off with time. Buildings that are made with concrete slabs and brick veneer walls are bound to get affected over a period of time. Usually the alignment of the brick veneer loosens creating cracks in the slabs. We correct this problem by using heavy jacks to support the sinking/cracked slabs. Then we use concrete to do brick alignment to improve the foundation’s strength. Restumping or Reblocking Croydon Hills Underpinning and restumping are more or less similar in nature. However in restumping we do not repair the stumps but replace them. Reblocking is another name for restumping. What we do is dig up the foundation with jacks and put new stumps in place of the cracked ones. At times, this process causes some kind of minor damage to the floor or wall. But with Deep Underpinning Croydon Hills you don’t need to worry about these petty issues. We will take care of such damages and rectify them as well. Sinking Floor Solution Croydon Hills A sinking floor is one of the major problems caused due to improper construction of any building. Even rotting joists and sagging beams can lead to sinking floors. If you wish to check whether there is any such problem or not then look at the floor from underneath (from a basement). The floor will seem to be bowing in the middle if it is sinking. Don’t fret if you are unable to figure it out. Just give us a call at Deep Underpinning Croydon Hills and we will resolve the issue. If you don’t feel sure, call our experts from First Choice Underpinning for a free consultation. Salt Damp Removal Croydon Hills Salt damp is the problem caused in any building due to excess of salt or moisture. You can easily detect salt damp because of its visible signs such as strong odour, bubbly paint, gassy plaster, and falling mortar. Deep Underpinning Croydon Hills provides exceptional salt damp removal services to both domestic and commercial buildings. Our answer for salt damp is plastic dampcourse that protects your building in future too. Subfloor Installation & Repair You will need subfloor repair services if there is any damage underneath the floors or tiles. Don’t worry. We cover that as well at Deep Underpinning Croydon Hills. Our underpinners use processed wood to repair subfloors. If you want or the damage is too worse, we can also install a new subfloor at an affordable price. Floor Replacement Deep Underpinning Croydon Hills offers lowest prices for floor replacement. So if you wish to get a new one for your office or home, contact us! We also provide floor recoating and floor stain removal services. Re-Leveling Croydon Hills If the floors of a building suffer from differential settlement then re-leveling is required. When concrete stumps get settled they lead to uneven floors, jammed doors, and even cracks. We do re-leveling with the help of hydraulic jacks but before we do that, we need to do underpinning of the building. You can even get a free consultation at Deep Underpinning Croydon Hills. Cracked Wall Repairs Croydon Hills Cracked Wall Repairs Croydon Hills Cracked wall repairing is another of our fortes at Deep Underpinning Croydon Hills. Cracked appears in your walls due to various reasons such as poor construction, leaking taps, unattended plumbing issues, and certain weather scenarios. You need to get these fixed as soon as possible because these can be dangerous. Get in touch with us for affordable prices for cracked wall repairs in Croydon Hills. Other Underpinning Services in Croydon Hills Other Underpinning Services in Croydon Hills Apart from these Deep Underpinning also provides repairs and renovations for your homes and offices in Croydon Hills. Whether it is a crack repair or a renovation required for a new design of your home/office – we are equipped to do it all. Ask for a free quote today and we might surprise you with an unbelievable estimate! Why Choose Deep Underpinning Croydon Hills? Why Choose Deep Underpinning Croydon Hills? Deep Underpinning is a local company of Croydon Hills. We have been serving our clients here for more than 20 years. But there is more to that:
-- -- Legal Notice -- -- This document and associated source code (the "Work") is a part of a -- benchmark specification maintained by the TPC. -- -- The TPC reserves all right, title, and interest to the Work as provided -- under U.S. and international laws, including without limitation all patent -- and trademark rights therein. -- -- No Warranty -- -- 1.1 TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE INFORMATION -- CONTAINED HEREIN IS PROVIDED "AS IS" AND WITH ALL FAULTS, AND THE -- AUTHORS AND DEVELOPERS OF THE WORK HEREBY DISCLAIM ALL OTHER -- WARRANTIES AND CONDITIONS, EITHER EXPRESS, IMPLIED OR STATUTORY, -- INCLUDING, BUT NOT LIMITED TO, ANY (IF ANY) IMPLIED WARRANTIES, -- DUTIES OR CONDITIONS OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR -- PURPOSE, OF ACCURACY OR COMPLETENESS OF RESPONSES, OF RESULTS, OF -- WORKMANLIKE EFFORT, OF LACK OF VIRUSES, AND OF LACK OF NEGLIGENCE. -- ALSO, THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT, -- QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION OR NON-INFRINGEMENT -- WITH REGARD TO THE WORK. -- 1.2 IN NO EVENT WILL ANY AUTHOR OR DEVELOPER OF THE WORK BE LIABLE TO -- ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO THE -- COST OF PROCURING SUBSTITUTE GOODS OR SERVICES, LOST PROFITS, LOSS -- OF USE, LOSS OF DATA, OR ANY INCIDENTAL, CONSEQUENTIAL, DIRECT, -- INDIRECT, OR SPECIAL DAMAGES WHETHER UNDER CONTRACT, TORT, WARRANTY, -- OR OTHERWISE, ARISING IN ANY WAY OUT OF THIS OR ANY OTHER AGREEMENT -- RELATING TO THE WORK, WHETHER OR NOT SUCH AUTHOR OR DEVELOPER HAD -- ADVANCE NOTICE OF THE POSSIBILITY OF SUCH DAMAGES. -- -- Contributors: -- define YEAR = random(1998,2002,uniform); define MONTH = random(8,10,uniform); define _LIMIT=100; [_LIMITA] select [_LIMITB] s_store_name ,s_company_id ,s_street_number ,s_street_name ,s_street_type ,s_suite_number ,s_city ,s_county ,s_state ,s_zip ,sum(case when (sr_returned_date_sk - ss_sold_date_sk <= 30 ) then 1 else 0 end) as "30 days" ,sum(case when (sr_returned_date_sk - ss_sold_date_sk > 30) and (sr_returned_date_sk - ss_sold_date_sk <= 60) then 1 else 0 end ) as "31-60 days" ,sum(case when (sr_returned_date_sk - ss_sold_date_sk > 60) and (sr_returned_date_sk - ss_sold_date_sk <= 90) then 1 else 0 end) as "61-90 days" ,sum(case when (sr_returned_date_sk - ss_sold_date_sk > 90) and (sr_returned_date_sk - ss_sold_date_sk <= 120) then 1 else 0 end) as "91-120 days" ,sum(case when (sr_returned_date_sk - ss_sold_date_sk > 120) then 1 else 0 end) as ">120 days" from store_sales ,store_returns ,store ,date_dim d1 ,date_dim d2 where d2.d_year = [YEAR] and d2.d_moy = [MONTH] and ss_ticket_number = sr_ticket_number and ss_item_sk = sr_item_sk and ss_sold_date_sk = d1.d_date_sk and sr_returned_date_sk = d2.d_date_sk and ss_customer_sk = sr_customer_sk and ss_store_sk = s_store_sk group by s_store_name ,s_company_id ,s_street_number ,s_street_name ,s_street_type ,s_suite_number ,s_city ,s_county ,s_state ,s_zip order by s_store_name ,s_company_id ,s_street_number ,s_street_name ,s_street_type ,s_suite_number ,s_city ,s_county ,s_state ,s_zip [_LIMITC];
An evaluation of a global vitamin and mineral nutrition surveillance system. Evaluation of public health surveillance systems is essential to ensure that problems of public health importance are monitored efficiently and effectively. The WHO's Vitamin and Mineral Nutrition Information System (VMNIS) was evaluated from the perspective of public health surveillance and informatics. Steps included: engaging the stakeholders of the evaluation; describing the surveillance system; focusing the evaluation design; gathering credible evidence regarding system performance; justifying and stating conclusions and recommendations, and sharing lessons learned from the evaluation. Following this assessment, WHO has begun major efforts to upgrade and expand the VMNIS and now the database is more flexible and efficient. The database evaluation summarized in this paper provides a good example of how public health evaluation frameworks can lead to improved surveillance and enhanced information systems, thus making progress toward the ultimate goal of improving public health.
Q: Reloading log configuration in JBoss 6 AS I am currently trying to configure logging in JBoss 6 and looking at the different alternatives. My requirements are: 1) Automatic reload of any log configuration changes without application re-deployment. 2) Multiple log files one for each log level. E.g. one myApp-error.log that logs only error messages, myApp-debug.log that logs only debug messages, etc. This means being able to set minimum and maximum levels for each of the appenders/handlers set for each file. Now, I know I can use the jboss-logging.xml file which is shipped with JBoss 6 AS. I do get automatic reload by using this file as it takes advantage of the hot deployment feature in JBoss (this file is located in the deploy directory). However, I can't get to configure my log to set a maximum level for each of the handlers. I can set a minimum level, but that means that e.g. my debug file will get debug and all levels above. Not what I need. Other option would be using an external configuration file. E.g. log4j.xml. This can be achieved by setting a system property as stated here. Good since I can use a org.apache.log4j.varia.LevelRangeFilter filter to limit the maximum and minimum log levels. However this doesn't allow for automatic reload of logging configuration without re-deploying the application. Is there any chance I can get both requirements using JBoss 6 AS whether with the shipped logging system or with an external one? A: 1) About automatic reload.: You should be able to periodically check log4j.xml file for change and if it change, than call org.apache.log4j.xml.DOMConfigurator.configure("<path to log4j.xml>").
Tuesday, September 1, 2009 Sweeping Observations Some crap I thought up after the St. Louis series: 1. Rizzo's pitch-to-contact ground ball philosophy works, sometimes. The pitchers are indeed pitching to contact, but please ignore the poor middle infield defense and the inconvenient fact that some of that contact lands over the outfield walls. The Nats don't so much have a pitch-to-contact rotation as they have a rotation that gives up hits. While the Nats' starters have a GB/FB ratio of 1.24 (T7th best in the NL), those starters also have an even 5.00 ERA (3rd worst in the NL). Add in peripheral stats like a .304 BABIP, a 4.88 FIP, a K/9 of 5.20 (worst in the NL), a K/BB of 1.56, and a HR/9 ratio of 1.20, and there's only so much that can be blamed on bad defense. Groundballpitchers with a low K/9 are iffy propositions. The historical data tends to show that if a pitcher ends up with a lot of ground balls, it's best to have a lot of strikeouts, too. Luckily, the low strikeout rate should be worked out in next season's rotation. A very rough draft of the rotation in the middle of 2010 would have Strasburg, Olsen, Mock, Lannan, and a free agent. You've got a classic power pitcher, a two guys with decent strikeout rates, a soft-tosser who may or may not be sinking to his level, and a wild card (worst-case scenario: Livan). Add Zimmermann back in 2011 and you've got a staff that's going to either get batters to strike out or beat it into the ground (when Olsen and Zimmermann aren't giving up home runs). 2. Dukes looked pretty good in RF, maybe the best he's looked all year. Has he been reading the Bozchat? 3. Jorge Sosa is the king of suck and I don't understand why he's still on the team. Every time someone says something about how Riggleman's doing a great job and he deserves to be the permanent manager, I'm going to obnoxiously remind them that Riggleman keeps putting Jorge Sosa into ballgames. Bergmann has also shown he doesn't deserve a roster spot. Clippard is surprising me. 4. After a truly crappy April-July, Garrett Mock went on a tear in August. Is it real? Mock's August numbers aren't that far out of line with what he did in AAA in 2008-9, and I penciled him into the 2010 rotation, but I need to see consistency. Right now, all Mock's August means is that I no longer moan in agony when I see him on the mound. 5. How is it that Khalil Greene is so shitty yet he still manages to hammer the Nats? Maybe the Nats need to sign Greene just to keep him from hitting against them. 6. Ray Knight knows things about baseball and is able to communicate them in a fairly effective manner despite not being the most articulate person ever to sit behind a microphone. Rob Dibble makes my ears and brain bleed. Last season, when Knight would fill in for Sutton, I would do nothing but bitch until Sutton returned. Ha! Little did I know that Dibble would make Knight sound like a Rhodes Scholar. What's the difference between Knight and Dibble? Perspective. Dibble is a real-life Kenny Powers, viewing every baseball interaction through the tiny pinhole of his years as a late-innings reliever with a fastball in the high 90s and a penchant for throwing at people. What do the viewers get? Meaningless cliches like "Let them beat you with your best stuff," endless whining about hitters standing too close to the plate, and suggestions that the pitcher's best move might just be to throw at the batter. As a former position player and manger, Knight has a broader perspective on the game. Unlike Dibble's commentary, which it would be charity to call analysis, Knight's observations actually add to the game. Dibble knows nothing about hitting. Sure, he can give you a rudimentary breakdown of a batter's swing, but more often than not he does nothing more than coo over the super-neat qualities of MASN's X-Mo camera. He's basically a lousy sports talk radio host masquerading as a color commentator. And it's not just because Dibble was a pitcher. Sutton made real contributions to the broadcast. SNY's Ron Darling and ESPN's Orel Hershiser add to their broadcasts. But they were all starters. Maybe the relief pitcher's role is too one-dimensional to lend itself to the ability to analyze all aspects of the game. Jeff Brantley is pretty terrible. And so is Dibble. (For example, here's what Dibble said about Livan last night as part of the "PNC Bank Scouting Report" segment. "'I Shall Return.' Like MacArthur said, and Livan Hernandez is back. He was the student years ago, here maybe, in Washington. Now he's a teacher of these young pitchers." That's right, please pay no attention to Livan's Cuban seasons or the six seasons he played in MLB before being traded to Montreal or the 19 1/3 World Series innings he pitched for Florida and San Francisco. I'm sure it didn't really click for Livan until he walked onto the patchy brown grass of RFK in 2005. And this was something Dibble wrote in advance.) The role of baseball will be played this evening by Marshall McLuhan. You can figure out who Dibble is.
Bernucca: Why the Lakers have to trade Dwight Howard It would be a tremendous dice roll for the Clippers, who haven’t gotten Chris Paul’s word that he will re-sign with them this summer and would be trading away his young, extremely promising insurance policy. They also would be getting back another impending free agent in Millsap. But if the Clippers are serious about winning a championship, they have to fill their biggest need, which is a scoring big. DeAndre Jordan protects the rim but is an intentional foul target late in games. And for all his versatility, Lamar Odom has scored in double figures once this season. In the offseason, the Clippers can decide whether to keep Odom or Millsap, then use the savings on a backup point guard if Chauncey Billups isn’t brought back. The Jazz would have a point guard with All-Star potential to team with fellow youngsters Gordon Hayward, Derrick Favors and Enes Kanter, who will play more in Millsap’s absence. Utah takes on an extra $2 million for Hill next season but still has phenomenal flexibility as incumbent point guards Mo Williams, Jamaal Tinsley and Earl Watson all have expiring contracts. You can speculate whether these deals are realistic. But they make sense. TRIVIA: Of the seven players who have averaged 20 points per game in the All-Star Game, three are active. Who are they? Answer below. THE END OF CIVILIZATION AS WE KNOW IT: Among the banners hanging in the rafters of the Barclays Center in Brooklyn is one touting New York City’s record-low number of 419 homicides in 2012. “I love Batman. He doesn’t have any super powers, it’s just him and a cape and he’s learned some karate over the years.” LINE OF THE WEEK: Chris Bosh, Miami vs. Portland, Feb. 12: 32 minutes, 13-16 FGs, 0-1 3-pointers, 6-6 FTs, 11 rebounds, two steals, zero turnovers, 32 points in a 117-104 win. Bosh was unbelievably efficient in his first 30-10 game of the season, which was obscured by the 30-60 streak by teammate LeBron James. LINE OF THE WEAK: David West and Paul George, Indiana vs. Brooklyn, Feb. 11: combined 64 minutes, 3-21 FGs, 1-5 3-pointers, 5-6 FTs, 12 rebounds, three assists, three steals, three blocks, four turnovers, eight fouls, 12 points in an 89-84 overtime loss. After George fouled out with 1:03 to go in regulation, West missed three straight mid-range jumpers as Indiana squandered a four-point lead. Comments Send Howard to Dallas if the Mavs will give up Nowitzki for the trade. Dirk would fit in with the Lakers roster of players very well and he isn’t a prima donna like Howard, and isn’t out with injury for every little hangnail. Agree with all your points, but Cuban would be taking a risk to sign Howard, without having Dirk. Howard could easily leave for Houston in Summer and have a better team. Also, tomorrow’s game of Boston vs. LA could be a huge one. If LA loses, they would have to go 20-7 the rest of way to finish 45-37 as you say. A Howard for Rondo trade makes sense for Boston, since Celts would then believe they have a shot at title this season (though I don’t think Howard can finish season). Lakers could then move Nash for talent for next year, since they wouldn’t make playoffs if they lose tomorrow. Might Dirk retire at the end of this season if traded to the Lakers? Its not like next year is guaranteed to be that much fun for the Lakers with all of theirs stars approaching social security age (Bryant, Gasol, Nash and the newly installed Dirk, not to mention MWP) He might. But he also might retire in 2 years if he stays in Dallas. The Mavs’ plan is flawed because whoever comes there has to carry Dirk, whom I love but is done as a superstar. He could extend his career – as could all of those old guys – by playing together. Thanks for reading
Q: Matching all columns with all search phrases I want to let a user search through all the columns in a table for a set of phrases defined in a textbox (split terms with whitespace). So what first came to mind is finding a way in SQL to concatenate all the columns and just use the LIKE operator (for each phrase) in this result. The other solution I thought of is writing an algorithm which takes all the phrases searched, and match them with all the columns. So I ended up with the following: String [] columns = {"col1", "col2", "col3", "col4"}; String [] phrases = textBox.Text.Split(' '); I then took all the possible combinations of columns and phrases, and put that into a where-clause-format for sql and then the result was "(col1 LIKE '%prase1%' AND col1 LIKE '%phrase2%') OR (col1 LIKE '%phrase1%' AND col2 LIKE '%phrase2%') OR (col1 LIKE '%phrase2%' AND col2 LIKE '%phrase1%') OR (col2 LIKE '%phrase1%' AND col3 LIKE '%phrase2%')" The above is just an example snippet of the output, the amount of conditions being created in this algorith is measured by conditions=columns^(phrases+1) So I observed that having 2 search phrases can still give good performance, but more than that will certainly decrease performance drastically. What is the best practise when searching all the columns for the same data? A: Edwin, I didn't know you was using ORACLE. My solution is using SQL Server. Hopefully you will get the gist of the solution and translate into PL/SQL. Hopefully this is useful to you. I am manually populating the #search temp table. You will need to somehow do that. Or look for some Split Function that will take the delimited string and return a Table. IF OBJECT_ID('tempdb..#keywords') IS NOT NULL DROP TABLE #keywords; IF OBJECT_ID('tempdb..#search') IS NOT NULL DROP TABLE #search; DECLARE @search_count INT -- Populate # search with all my search strings SELECT * INTO #search FROM ( SELECT '%ST%' AS Search UNION ALL SELECT '%CL%' ) T1 SELECT @search_count = COUNT(*) FROM #search; PRINT @search_count -- Populate my #keywords table with all column values from my table with table id and values -- I just did a select id, value union with all fields SELECT * INTO #keywords FROM ( SELECT client_id AS id ,First_name AS keyword FROM [CLIENT] UNION SELECT client_id ,last_name FROM [CLIENT] ) AS T1 -- see what is in there SELECT * FROM #search SELECT * FROM #keywords -- I am doing a count(distinct #search.Search). This will get me a count, --so if I put in 3 search values my count should equal 3 and that tells me all search strings have been found SELECT #keywords.id ,COUNT(DISTINCT #search.Search) FROM #keywords INNER JOIN #search ON #keywords.keyword LIKE #search.Search GROUP BY #keywords.id HAVING COUNT(DISTINCT #search.Search) = @search_count SELECT * FROM [CLIENT] WHERE [CLIENT].client_id IN ( SELECT #keywords.id FROM #keywords INNER JOIN #search ON #keywords.keyword LIKE #search.Search GROUP BY #keywords.id HAVING COUNT(DISTINCT #search.Search) = @search_count )
It is known to use oil as a transfer medium in heat exchangers for steam production. Thus, U.S. Pat. No. 2,222,575 discloses cooling of hot oil by direct contact of the oil with cooling water which immediately evaporates, thereby generating steam for use. The hot oil is pumped into a chamber having a temperature of approximately 343.degree. C., and water is sprayed over its surface from a plurality of nozzles. As the water evaporates, the oil is cooled and replaced by new, hot oil. U.S. Pat. No. 4,164,202 also discloses cooling of hot oil. In this reference, hot oil (about 350.degree. C.) and water are both sprayed into the interior of a vessel in the form of little droplets. When the droplets meet, the water evaporates and the oil, cooled to some extent, falls down and collects at the bottom. U.S. Pat. No. 4,207,840 discloses a steam generator comprising a bath of oil in a spherical vessel which is continuously heated from below by wood combustion. In order to generate steam, water is injected into the bath underneath the heated oil. As the water comes into intimate contact with the heated oil, it evaporates and rises to the surface of the oil where it is discharged from the spherical vessel as steam. Thus, in the prior art, the oil does not take part in producing, but only in transporting heat. Claim 1 refers generally to this process in its preamble.
For the longest time, nothing at all was known about him, and he was only listed in encyclopedias by his - incorrect - last name, Bickerson. He was in fact the business partner of Lloyd Moxley, owner of the Nationals, who apparently made his friend a favor by managing his ball team for a day.
Paul - Forest Added on February 12th, 2018 Viewed 835 views Maple leaf Paul asked for a forest cuff tattoo designed to cover his forearm, with different shades of black to give the feeling of depth and with a Canadian maple leaf at the base. Fading shades were used in the background to suggest distance while some foreground parts were deliberately kept blank in order to enliven and brighten the whole tattoo, keeping a balance between dark and light areas.< ...
Targeting the epidermal growth factor receptor in cancer: apoptosis takes center stage. Aberrant activation of the epidermal growth factor receptor (EGFR) is frequently observed in neoplasia,notably in tumors of epithelial origin. Attempts to treat such tumors with EGFR antagonists have met with remarkable initial successes, particularly when EGFR antagonists were used in combination with chemotherapy or ionizing radiation. Considering the almost ubiquitous expression of the EGFR in normal epithelial tissues, these clinical trials also revealed a surprisingly low rate of adverse side effects associated with EGFR blockade. This review highlights antiapoptotic effects of EGFR activation as they relate to therapeutic efficacy of EGFR blockade. We introduce the concept that control of cell survival through EGFR activation is conditional in the sense that it is rate limiting to tumor cell survival but not to survival of normal epithelial cells. Specifically, normal epithelial cells are provided with a full complement of physiological cell-cell contacts and cell-matrix interactions that lessen their dependence on survival signals provided by the EGFR. By contrast, malignant tumor cells faced with inadequate cell-matrix contacts critically depend on EGFR activation for survival, rendering them more susceptible to apoptosis induction by EGFR blockade. Redundant control of cell survival by the EGFR and extracellular matrix/cell adhesion receptors is enabled, in part, by shared signal transduction pathways that control expression and activation states of members of the Bcl-2 family of apoptosis regulators.
[Oxygen regimen of rat kidneys in regeneration and carcinogenesis]. Oxygen tension in the kidneys in compensatory hyperplasia after nephrectomy and in renal carcinogenesis induced by nitrosodimethylamine was studied in 80 albino noninbred rats. Regeneration and malignant transformation were found to involve similar changes in oxygen conditions in rat's kidneys, viz. disturbances in the function of microvessels and decreased utilization of oxygen.
Palmitoylethanolamide relieves pain and preserves pancreatic islet cells in a murine model of diabetes. We previously demonstrated that the intraperitoneal administration of palmitoylethanolamide (PEA) in mice with chronic constriction injury of the sciatic nerve evoked a relief of both thermal hyperalgesia and mechanical allodynia in neuropathic mice. Since diabetic neuropathy is one of the most common long-term complications of diabetes, we explored the ability of PEA to also relief this kind of chronic pain, employing the well established streptozotocin-induced animal model of type 1 diabetes. Our findings demonstrated that PEA relieves mechanical allodynia, counteracts nerve growth factor deficit, improves insulin level, preserves Langerhans islet morphology reducing the development of insulitis in diabetic mice. These results suggest that PEA could be effective in type 1-diabetic patients not only as pain reliever but also in controlling the development of pathology.
Comparison of drug eluting stents with bare metal stents in daily practice for bifurcation lesions in Chinese patients. Recently, numerous randomized and controlled trials have demonstrated great advantages of drug eluting stents (DES) with respect to significant reduction of restenosis and recurrence of symptoms and improvement of clinical outcomes after percutaneous coronary intervention (PCI). Little is known about the comparative effects between DES and bare metal stents (BMS) for bifurcation angioplasty in the Chinese population. We compared the inpatient and 7-month follow-up outcomes between DES and BMS for the treatment of bifurcation lesions. From April 2004 to October 2005, 291 Chinese patients [85.9% male, mean age (57.8 +/- 10.4) years] underwent DES (387 lesions) and/or BMS (297 lesions) implantation for bifurcation lesions. Clinical and angiographic follow-up was performed at 7 months. Compared with BMS group, patients in DES group had significantly lower rates of restenosis at main branch (9.5% vs 28.7%, P < 0.001) or side branch (14.5% vs 37.0%, P < 0.001) and major adverse cardiac events (MACE) (14.0% vs 26.3%, P = 0.000). The occurrence rate of late in-stent thrombosis did not differ between the two groups in both main (0.8% vs 0, P = 0.224) and side branches (1.4% vs 0, P = 0.198). Target lesion revascularization (TLR) was less frequent in DES group for main branch (8.3% vs 21.3%, P < 0.001) and for side branch (7.6% vs 23.5%, P < 0.001). Multivariate regression analysis revealed that total stent length (OR = 1.029, P = 0.01), postprocedural in-stent minimum lumen diameter (OR = 0.476, P = 0.03) and stent type (OR = 3.988, P = 0.0001) were independent predictors of TLR for main branch. Prior history of coronary intervention (OR = 2.424, P = 0.041), angulated lesion (OR = 2.337, P = 0.033), postdilation (OR = 0.267, P = 0.035) and stent type (DES vs BMS, OR = 5.459, P = 0.000) were independent predictors of TLR for side branch. The implantation of DES may be associated with greater reduction of restenosis and TLR than BMS in bifurcations angioplasty.
Retired Staff Sgt., Colleen Bushnell of the USAF delivered an impassioned response to Fox News commentator Liz Trotta. As you may recall, Trotta suggested “that women who defend this country should expect to get raped” when serving in the military. Ms. Trotta’s detractors have continued to call on her to apologize, and on Fox News to fire her. What is clear to many female military sexual trauma survivors is that Ms. Trotta’s attacks, at core, stem from her belief that women should not serve in the military at all… Did you really have to go there, Ms. Trotta? It is time for you, and others of your mindset, to join the rest of us in the year 2012 to recognize what women have been doing in the military for decades. Bushnell goes on to describe personal trauma that she has endured while serving in the military. She speaks to Trotta from experience, then states: With these circumstances as my truths, Ms. Trotta, I hear you. However, it is ludicrous to revisit an argument decided on more than thirty-years ago, beginning with the Women’s Armed Services Integration Act of 1948, which granted women permanent status in the regular, and reserve forces of the Army, Navy, Marine Corps and Air Force. Women are here to stay. It is time for you to get with the program. Women constitute about fifteen percent of the military’s end strength. Some say our work is responsible for avoiding the need for the draft.
Background ========== Fossil fuels helped literally ignite the industrial revolution, and from then on radically changed the way we live; today, thousands of products are generated from fossil fuels \[[@B1]\]. Unfortunately, fossil fuels are non-renewable and their reserves will foreseeably run dry. Moreover, the reckless use of this resource has resulted in a tremendous release of greenhouse gases leading to adverse effects to our earth's climate and to the creatures living on our planet. These drawbacks have driven researchers to look for alternative renewable replacements for petroleum and petroleum-derived products. Amongst the petroleum-derived products; polyethylene with an annual productivity of 80 million metric tons per annum stands out as one of the most commonly used plastics \[[@B2]\]. Polylactic acid (PLA) is made by the polymerization of lactic acid and has the potential to replace polyethylene as a biodegradable alternative \[[@B3]\]. Lactic acid is a chiral compound and exists in two isomeric forms: D (-) lactic acid and L (+) lactic acid. The various properties of polylactic acid are modulated by the mixing ratio of the D (-) and L (+) lactic acid and, henceforth, it is essential to produce both the isomers \[[@B4]\]. It has been estimated that for the PLA production to be profitable, the lactic acid price should be less than 0.8\$/kg \[[@B5]\]. This necessitates the production of lactic acid from a cheaper source. Although microbial fermentation can produce lactate from sugar-based feedstock, such process may compete with global food supplies. Therefore, this work focuses on cyanobacterial process development for the sustainable synthesis of D (-) lactic acid, with CO~2~ as the carbon substrate and sunlight as an energy source. Cyanobacteria have the ability to reduce atmospheric CO~2~ into useful organic compounds by using solar energy and have been engineered to synthesize a number of value-added products \[[@B6]-[@B9]\]. *Synechocystis* sp. PCC 6803 (hereafter *Synechocystis* 6803) with its ability to uptake foreign DNA naturally, has been the model organism of choice for various metabolic engineering works \[[@B10]-[@B12]\]. *Synechocystis* 6803 also has the ability to grow mixotrophically with glucose and acetate \[[@B13]\]. Therefore, along with CO~2~, its versatile carbon metabolism allows the co-utilization of cheap organic compounds for product biosynthesis. For example, acetate abundant wastewater generated from biomass hydrolysis and anaerobic digestion \[[@B14]\] can be potentially used for promoting cyanobacterial productivity. More importantly, there are numerous molecular biology tools for *Synechocystis* 6803, making it an attractive organism for metabolic engineering works \[[@B15],[@B16]\]. *Synechocystis* 6803 has recently been engineered for the production of L-lactate (a maximal titer of 1.8 g/L and a maximal productivity of 0.15 g/L/day) \[[@B17]-[@B19]\]. However, engineering *Synechocystis* 6803 for the production of optically pure D-lactate synthesis is more difficult due to the lack of an efficient D-lactate dehydrogenase. Recently, a mutated glycerol dehydrogenase (GlyDH\*) was discovered by Wang et al. \[[@B20]\] and this enzyme was found to behave as a D-lactate dehydrogenase, exhibiting an unusually high specific activity of 6.9 units per mg protein with pyruvate and NADH as substrates. This enzyme allows a *Bacillus coagulans* strain to produce 90 g/L of D-lactate. Their work served as a motivation for us to engineer *Synechocystis* 6803 through the heterologous expression of *gldA101* (encodes GlyDH\*). We found that this original enzyme was able to synthesize optically pure D-lactate in *Synechocystis* 6803. To further improve cyanobacterial productivity, we employed three strategies: 1. Codon optimization of *gldA101* (Additional file [1](#S1){ref-type="supplementary-material"}: Figure S1); 2. Heterologous expression of a transhydrogenase; 3. Supplementing cultures with extracellular carbon sources (such as glucose, pyruvate and acetate). The final engineered strain demonstrated a high D-lactic acid productivity and titer (titer \>1 g/L). Results and discussion ====================== Cyanobacteria need a lactate dehydrogenase to synthesize lactate from pyruvate (Figure  [1](#F1){ref-type="fig"}). Earlier works on *Synechocystis* 6803 for lactate production involved the expression of an *ldh* from *Bacillus subtilis* for synthesis of L-lactate \[[@B18]\]. As a first step, we tested the activity of GlyDH\* for D-lactate production \[[@B20]\] by transferring the gene from *Bacillus coagulans* to *Synechocystis* 6803. A plasmid pYY1 was constructed that contained the gene *gldA101* under the control of an Isopropyl β-D-1-thiogalactopyranoside (IPTG) inducible promoter, P~trc~. The *gldA101* gene was then subsequently transferred to the glucose tolerant wild type *Synechocystis* 6803 through natural transformation, generating the strain AV08. The optical density and the D-lactate concentration of the AV08 cultures were monitored in shake flasks. As can be verified from Figure  [2](#F2){ref-type="fig"}, AV08 did not show any significant levels of D-lactate in the initial 12 days. The D-lactate levels started increasing steadily at the late autotrophic growth phase and reached a final titer of 0.4 g/L, whereas a wild type strain of *Synechococcus* 7002 was able to produce only \~ 7 mg/L of D-lactate through glucose fermentation \[[@B21]\]. ![**Metabolic engineering of*Synechocystis*6803 for the synthesis of D-lactic acid. (A)** Metabolic pathway for D-lactate synthesis. Lactate permeation through the cell membrane occurs either via a lactate transporter or by passive diffusion \[[@B22],[@B23]\]. Red arrows indicate the heterologous pathway engineered into *Synechocystis* 6803. **Abbreviations:** GlyDH^\*^, mutant glycerol dehydrogenase; TH, Transhydrogenase; 3PGA, 3-phosphoglycerate; CoA, Coenzyme A; G1P, glucose 1-phosphate; F6P, fructose 6-phosphate; PHB, poly-β-hydroxybutyrate; RuBP, ribulose 1,5-bisphosphate. **(B)** Colony PCR to verify the presence of the heterologous genes of the mutant glycerol dehydrogenase (Left picture) and transhydrogenase (Right picture) in the engineered strains of *Synechocystis* 6803. *gldA101* was amplified with primers gldA-o-F3 and gldA-o-R; *gldA101*-*syn* was amplified with primers gldA-o-F and gldA-o-R2; *sth* was amplified with primers tranNADH-F and tranNADH-R (Table  [1](#T1){ref-type="table"}).](1475-2859-12-117-1){#F1} ![**Autotrophic production of D-Lactate in the engineered strains of*Synechocystis*6803. (A)** Growth curves and **(B)** D-lactate production in the engineered strains (n = 3). Circles: AV08 (with *gldA101*). Triangles: AV10 (with *gldA101*-*syn* and *sth*) and Squares: AV11 (with *gldA101*-*syn*).](1475-2859-12-117-2){#F2} A familiar strategy to increase the synthesis of a target product would be to increase the levels of the heterologous enzyme inside the cell. This can be achieved by modifying the enzyme regulation either at the transcriptional level or at the translational level. Cyanobacteria are known to have their own preference in the use of codons for synthesizing amino acids \[[@B24]\]. Lindberg et al. \[[@B25]\] have employed codon optimization for the isoprene synthase gene *IspS* and have found a 10-fold increase in the *IspS* expression level. More recently, this strategy was applied to increase the expression of the *efe* gene (from *Pseudomonas syringae*) in *Synechocystis* 6803 for ethylene production \[[@B26]\]. Since the gene involved in this work was borrowed from a gram-positive organism and *Synechocystis* 6803 being gram-negative, we hypothesized that this would be a useful strategy. The codon optimized gene *gldA101*-*syn* (synthesized by Genewiz Inc, South Plainfield, NJ) was integrated into the *psbA1* gene loci in the genome of the WT *Synechocystis* 6803 using the plasmid pDY3 to obtain the strain AV11. Further improvements in product synthesis can be achieved by rectification of bottlenecks in the metabolic pathway. The lactate dehydrogenase enzyme utilizes NADH as its cofactor, whereas the ratio of NADH to NADPH is reported to be much lower in cyanobacteria. For example, the ratio of NADH to NADPH in *Synechococcus* 7942 under light conditions was estimated to be 0.15, and in *Synechocystis* 6803 under photoautotrophic conditions the intracellular NADH concentration was only 20 nmol/g fresh weight, whereas the intracellular NADPH concentration was about 140 nmol/g fresh weight \[[@B27]-[@B29]\]. This lower concentration of NADH in cyanobacteria, points to the fact that availability of NADH could be a major limiting factor for synthesizing D-lactate. Henceforth, a soluble transhydrogenase, *sth* from *Pseudomonas aeruginosa*\[[@B30]\], was introduced downstream of the gene *gldA101*-*syn.* This engineered strain was called AV10. The heterologous genes in AV10 and AV11 are under the control of the same single promoter, P~trc~, located upstream of *gldA101*-syn and *sth* in AV10 and located upstream of *gldA101*-syn in AV11. The three strains (AV08, AV10 and AV11) showed similar growth rates to wild type strain under photoautotrophic conditions, and thus the production of D-lactate did not introduce growth defects in the engineered strains (Figure  [2](#F2){ref-type="fig"}A and Additional file [1](#S1){ref-type="supplementary-material"}: Figure S2). However, the three strains differed in the production rate of D-lactic acid. The strain AV11 with codon optimization (*gldA101*-*syn*) had an improved productivity for D-lactate compared to the AV08 strain (Figure  [2](#F2){ref-type="fig"}B). Both strains produced D-lactate mainly during the later growth stage. Introduction of the transhydrogenase improved the D-lactate synthesis further in AV10, and this strain produced D-lactate in both the growth phase and non-growth phase. The rate of photoautotrophic D-lactate production by AV10 increased significantly (achieving a maximum productivity of \~0.1 g/L/day and \~0.2 mmol/g cell/day) during the late phase of the culture and the final titer of D-lactate reached 1.14 g/L. We observed that the D-lactate production rate reached its peak in the later stages of cultivation, suggesting that more carbon flux has been directed to lactate production during the non-growth phase. This increased flux was expected because the lactate precursor (pyruvate) is a key metabolic node occupying a central position in the synthesis of diverse biomass components, and more pyruvate becomes available for lactate synthesis when biomass growth becomes slow. Therefore, an obvious thought would be to enhance lactate production by supplementing the cultures with pyruvate \[[@B31]\]. However, our experiments found that addition of pyruvate did not yield apparent improvements in D-lactate synthesis (data not shown), possibly because *Synechocystis* 6803 may lack an effective pyruvate transporter. The alternate option would be to grow AV10 with glucose and increase the glycolysis flux for pyruvate synthesis. In our previous study, addition of glucose was found to increase isobutanol production in *Synechocystis* 6803 \[[@B32]\]. However in this study, when we grew the AV10 strain under mixotrophic conditions (with 5 g/L glucose), it did not show a higher growth rate or display improvements in the final D-lactate titer compared to the autotrophic condition. The AV10 cultures grown in the presence of glucose instead showed an impaired growth, possibly because the engineered pathways caused a metabolic imbalance during glucose catabolism (Figure  [3](#F3){ref-type="fig"}). ![**Mixotrophic production of D-Lactate by AV10. (A)** Growth and **(B)** D-lactate production in the engineered *Synechocystis* 6803 strain AV10 (n = 3), with the provision of additional organic carbon source, i.e., with glucose and acetate (Mixotrophic metabolism). Squares: with acetate. Circles: with glucose.](1475-2859-12-117-3){#F3} We also hypothesized that the intracellular pyruvate pool can be increased for lactate production by addition of exogenous acetate. Supplementing cultures with acetate can redirect more carbon from pyruvate to lactate in three possible ways \[[@B33]\]: (1) acetate is used as a building block for lactate production; (2) acetate provides additional carbon source for biomass synthesis and reduce pyruvate consumption; (3) acetate conversion by acetyl-CoA synthetase consumes Coenzyme-A (CoA), decreasing the CoA pool available for pyruvate decarboxylation. To test this hypothesis, the AV10 cultures were supplemented with 15 mM acetate. We found that growth rate of the AV10 cultures with acetate (Figure  [3](#F3){ref-type="fig"}A) remained comparable to their growth rate under autotrophic condition, but there was substantial improvement in the synthesis of D-lactate (the maximal titer reached 2.17 g/L and the peak productivity reached \~0.19 g/L/day, Figure  [3](#F3){ref-type="fig"}B). To further understand the role played by glucose and acetate in D-lactate synthesis, AV10 cultures were grown with \[1,2-^13^C\] glucose and \[1,2-^13^C\] acetate (Sigma, St. Louis). Cultures were collected from the mid-log phase and were used for amino acid and D-lactate analysis. As an example, mass spectrum of D-lactate from a cyanobacterial culture is shown in Additional file [1](#S1){ref-type="supplementary-material"}: Figure S3. The ^13^C abundance in the amino acids and lactate were obtained as mass fraction m~i~, where \'i' indicates the number of ^13^C in the molecule. As can be seen from Figure  [4](#F4){ref-type="fig"}A, glucose-fed cells have significant ^13^C-carbon distributed in amino acids (indicated by an increase in m~1~ and m~2~). Also, D-lactate from glucose-fed cultures was partially ^13^C-labeled (m~2~ \~0.22). The isotopomer data in Figure  [4](#F4){ref-type="fig"}A proved that ^13^C-glucose provided the carbon source for both biomass and lactate production. However, glucose-based mixotrophic fermentation is not beneficial to D-lactate production compared to autotrophic cultures, possibly because carbon flux from glycolysis may cause some carbon and energy imbalance \[[@B32]\]. As for the acetate-fed cultures, only leucine and glutamate (which both use acetyl-CoA as their precursor) were significantly labeled (an m~2~ of 0.31 and 0.32 respectively), while other amino acids (e.g., aspartate and alanine) were nonlabeled (Figure  [4](#F4){ref-type="fig"}B). Interestingly, D-lactate from acetate-fed culture was almost nonlabeled, indicating that the carbons of lactate molecules were mainly derived from CO~2~. Therefore, the observed enhancement of lactate synthesis in the presence of acetate can be explained by two complementary mechanisms. First, acetate is an additional carbon source for synthesizing biomass building blocks, such as fatty acids and some amino acids, thus redirecting the extra carbon flux from CO~2~ to lactate. Secondly, acetate may limit the pyruvate decarboxylation reaction by reducing the CoA pool by the formation of acetyl-CoA and thus improve pyruvate availability for lactate synthesis. ![**Isotopomer analysis showing the mass fraction of isotopomers for selected proteinogenic amino acids \[TBDMS based measurement\] and D-lactate \[MSTFA based measurement\].** Standard abbreviations are used for amino acids in the figure. **(A)** Cultures grown with 5 g/L of \[1,2-^13^C\] glucose and **(B)** Cultures grown with 15 mM of \[1,2-^13^C\] acetate. \"white bar\" m~0~ -- mass fraction without any labeled carbon; \"grey bar\" m~1~ -- mass fraction with one labeled carbon; \"black bar\" m~2~ -- mass fraction with two labeled carbon. (Note: natural ^13^C makes up about 1.1% of total carbon as measurement background).](1475-2859-12-117-4){#F4} Conclusions =========== The results reported here are for the autotrophic production of D-lactate in cyanobacteria via the heterologous expression of a novel D-lactate dehydrogenase (GlyDH\*) and by balancing the precursors and cofactors. Other molecular strategies may also be applied to further improve the D-lactate production: (1) by seeking stronger promoters \[[@B16]\]; (2) optimizing ribosomal binding sites \[[@B34]\]; (3) improving activity of GlyDH\* via protein engineering; (4) introducing powerful lactate transporter \[[@B22]\]; (5) knocking out competing pathways (such as the glycogen and polyhydroxybutyrate synthesizing pathways); (6) duplicating the heterologous genes by integrating at multiple sites \[[@B35]\]; and (7) limiting biomass production by knocking down the pyruvate decarboxylation reaction. Also, considering the future outdoor algal processes for scaled up D-lactate production, we hypothesize that knocking out metabolic pathways that synthesize carbon storage molecules (polyhydroxybutyrate and glycogen) may be deleterious to algal growth during the night phase in day-night cultivation \[[@B36]\]. On the other hand, process optimization by employing better light conditions, along with proper CO~2~ concentration, pH and temperature control, may also be employed to increase the D-lactate productivity in a scaled-up system. Materials and methods ===================== Chemicals and reagents ---------------------- Restriction enzymes, Phusion DNA polymerase, T4 DNA ligase and 10-Beta electro-competent *E. coli* kit were purchased from Fermentas or New England BioLabs. Oligonucleotides were purchased from Integrated DNA Technologies (IDT). All organic solvents, chemicals, ^13^C-labeled acetate, and glucose used in this study were purchased from Sigma-Aldrich (St. Louis, MO). Medium and growth conditions ---------------------------- *E. coli* strain 10-Beta was used as the host for all plasmids constructed in this study. *E. coli* cells were grown in liquid Luria-Bertani (LB) medium at 37°C in a shaker at 200 rpm or on solidified LB plates. Ampicillin (100 μg/mL) or kanamycin (50 μg/mL) was added to the LB medium when required for propagation of the plasmids in *E. coli*. The wild-type (glucose-tolerant) and the recombinant strain of *Synechocystis* 6803 were grown at 30°C in a liquid blue-green medium (BG-11 medium) or on solid BG-11 plates at a light intensity of 100 μmol of photons m^-2^ s^-1^ in ambient air. Kanamycin (20 μg/mL) was added to the BG-11 growth medium as required. Growth of the cells was monitored by measuring their optical density at 730 nm (OD~730~) with an Agilent Cary 60 UV--vis spectrophotometer. 10 mL cultures for the synthesis of D-lactate were grown (initial OD~730~, 0.4) in 50-mL shake flasks without any antibiotic and 1 mM Isopropyl β-D-1-thiogalactopyranoside (IPTG) was added for induction. Mixotrophic cultures of *Synechocystis* 6803 were started in BG-11 medium containing a known amount of glucose (0.5%) or acetate (15 mM) as an organic carbon source. Plasmid construction and transformation --------------------------------------- The vector pTKA3 \[[@B32]\] served as the backbone for all the plasmids constructed in this study. The gene *gldA101* encoding GlyDH\* \[[@B20]\], was amplified from the plasmid pQZ115 with the primers gldA-o-F2 and gldA-o-R (Tables  [1](#T1){ref-type="table"} and [2](#T2){ref-type="table"}). The obtained 1.2 kb fragment was digested with BamHI/NheI and cloned into the same restriction sites of pTKA3, yielding the vector pYY1. A gene cassette, which consists of the codon optimized *gldA101* (i.e., *gldA101-syn*) with the promoter P~trc~ in the upstream and the transhydrogenase (*sth*) gene from *Pseudomonas aeruginosa*\[[@B30]\] in the downstream, was chemically synthesized by Genewiz Inc (South Plainfield, NJ) and cloned into the commonly used *E. coli* vector pUC57-kan resulting in the plasmid vector pUC57-glda_sth. The vector pUC57-glda_sth was digested with BamHI/NheI, and the yielding 2.6 kb fragment was cloned into the corresponding restriction sites of pTKA3, resulting in the vector pDY2. The vector pDY3 was constructed by self-ligation of the 8.2 kb fragment obtained through the digestion of pDY2 with KpnI. ###### Primer sequences **Primer name** **Sequence (5′ → 3′)** ----------------- ------------------------------------------------------------------------------------------------------------------------------ gldA-o-F GGATCCTTGACAATTAATCATCCGGCTCG gldA-o-F2 GGATCCTTGACAATTAATCATCCGGCTCGTATAATGTGTGGAATTGTGAGCGGATAACAATTTCACACAGGAGATATAATCATATGACGAAAATCATTACCTCTCCAAGCAAGTTTATACAAGG gldA-o-F3 ATGACGAAAATCATTACCTCTCCAAG gldA-o-R GCTAGCTCATGCCCATTTTTCCTTATAATACCGCCCG gldA-o-R2 TTAGGCCCACTTTTCCTTGTAATAGC tranNADH-F CCTAAGCTAGCGGAGGACTAGCATGG tranNADH-R GCTAGCGGTACCTCAAAAAAGCCGG ptka3-F CCCGAAGTGGCGAGCCCGAT CO-F TTGATGTTGCCTTTGAACCC O-F ATGGATACGAAAGTGATTGC sth-F GAGCTACCACCTGCGCAACA AMV17R GCGCGACTCCCCGTCTTTGACTATCCTTTTTAGGATGGGGCA ps1_up_fwda TACCGGAACAGGACCAAGCCTT ###### Plasmids and strains **Plasmids/Strains** **Description** **Source or reference** ------------------------------ --------------------------------------------------------------------------------------------------------------- ----------------------------------- pUC57-glda_sth Chemically synthesized gene cassette consisting of P~trc~, *gldA101-syn* and *sth*. Genewiz; \[[@B20],[@B30],[@B37]\] pQZ115 Plasmid carrying *gldA101* \[[@B20]\] pTKA3 Backbone plasmid for all vectors constructed in this study, with *psbA1* as the integration loci. \[[@B32]\] pYY1 Derived from pTKA3 with *gldA101* and the promoter, P~trc~. This study pDY2 Derived from pTKA3 with *gldA101-syn*, *sth* and the promoter, P~trc~. This study pDY3 Derived from pTKA3 with *gldA101-syn* and the promoter, P~trc~. This study **Strains** *E. coli* 10-Beta Cloning host strain. New England Biolabs *Synechocystis* sp. PCC 6803 Glucose tolerant wild type, naturally competent. This study AV08 *Synechocystis* P~trc~::*gldA101*::Km^r^, GlyDH\* of *Bacillus.* This study AV10 *Synechocystis* P~trc~::(*gldA101-syn)-sth*::Km^r^, GlyDH\* of *Bacillus,* transhydrogenase of *Pseudomonas.* This study AV11 *Synechocystis* P~trc~::*gldA101-syn*::Km^r^, GlyDH\* of *Bacillus.* This study Natural transformation of *Synechocystis* 6803 was performed by using a double homologous-recombination procedure as described previously \[[@B38]\]. Recombinant colonies appeared between 7 and 10 days post inoculation. The genes of interest were finally integrated into the *psbA1* gene loci (a known neutral site under normal growth conditions) in the genome of *Synechocystis* 6803 \[[@B32]\]. For segregation, the positive colonies were propagated continuously onto BG-11 plates containing kanamycin and segregation of colonies was verified through a colony PCR with the primers AMV17R and ps1_up_fwda (Table  [1](#T1){ref-type="table"}). The promoter and the heterologous genes in the engineered strains were PCR amplified with respective primers (ptka3-F, CO-F, O-F, sth-F) (Table  [1](#T1){ref-type="table"}) and sent for sequencing to Genewiz to verify the cloning accuracy. D (-) lactate analysis ---------------------- D(-)/L(+) lactic acid detection kit (R-biopharm) was used to measure the D-lactate concentration. Samples of the cyanobacterial culture (50 μL) were collected every 3 days and centrifuged at 12,000 rpm for 5 min. The supernatant was collected and the D-lactate concentration assay was performed following the manufacturer's instruction. All the reactions were performed in a 96-well plate reader at room temperature (Infinite 200 PRO microplate photometer, TECAN). ^13^C isotopomer experiment --------------------------- To estimate the carbon contributions of glucose and acetate for biomass and D-lactic acid synthesis a ^13^C labeling experiment was performed. The mutant AV10 was grown in a BG-11 medium with 0.5% glucose (1,2-^13^C~2~ glucose) or 15 mM acetate (U-^13^C~2~ acetate) (Sigma, St. Louis). Cultures were started at an OD~730~ of 0.4 and were grown with labeled glucose or acetate for over 48 hours. The biomass samples and supernatant were collected for measurement of lactate and amino acid labeling. The proteinogenic amino acids from biomass were hydrolyzed and then derivatized with TBDMS \[*N*-(tert-butyldimethylsilyl)-*N*-methyl-trifluoroacetamide\], as described previously \[[@B39]\]. The derivatized amino acids were analyzed for their ^13^C mass fraction by GC-MS (Hewlett Packard 7890A and 5975C, Agilent Technologies, USA) equipped with a DB5-MS column (J&W Scientific) \[[@B39]\]. The fragment \[M-57\]^+^ containing information of the entire amino acid was used for calculating the ^13^C mass fractions (M: the molecular mass of the derivatized amino acids). The fragment \[M-15\]^+^ was used only for leucine, since its \[M-57\]^+^ overlaps with other mass peak \[[@B40]\]. To analyze extracellular D-lactic acid labeling, the supernatant (0.2 mL) was first freeze-dried at -50°C. The dried samples were then pre-derivatized with 200 μL of 2% methoxyamine hydrochloride in pyridine for 60 minutes at 37°C and then derivatized with 300 μL *N*-Methyl-*N*-(trimethylsilyl) trifluroacetamide (TMS) for 30 minutes at room temperature. The natural abundance of isotopes, including ^13^C (1.13%), ^18^O (0.20%), ^29^Si (4.70%) and ^30^Si (3.09%) changes the mass isotopomer spectrum. These changes were corrected using a published algorithm and the detailed measurement protocol can be found in our previous paper \[[@B41]\]. Competing interests =================== The authors declare competing financial interests since this work is being covered by a pending patent application from Washington University in St. Louis. Authors\' contributions ======================= AMV conceived the initial idea for this research. AMV, YY, and YJT designed the experiments. AMV, YY, and YL performed the experiments. All authors read and approved the manuscript. Supplementary Material ====================== ###### Additional file 1: Figure S1 Nuleotide sequence alignment of *gldA101* and the codon-optimized *gldA101* (i.e., *gldA101-syn*, synthesized by Genewiz Inc). Conserved nucleotide sequences in *gldA101-syn* are indicated as dotted lines. **Figure S2.** Autotrophic growth curve for *Synechocystis* 6803 strains shows similar growth of the engineered D-lactate producing strains as compared to the wild type strain. Diamond: Wild type. Square: AV08. Triangle: AV10. Circle: AV11. **Figure S3.** Mass spectra obtained via GC-MS confirm the presence of lactate in the cell culture supernatant of AV10 strain. D/L lactate enzyme kit (R-Biopharm) was used to further confirm that the product is an optically pure D-lactate. ###### Click here for file Acknowledgements ================ We thank Professor K. T. Shanmugam for offering us the plasmid pQZ115. We thank Professor Himadri Pakrasi at WUSTL for his advice on this project. We also thank Dianyi Liu, Kanimozhi, and Zach Hembree for their help with experiments, and Sandra Matteucci from the WUSTL Engineering Communication Center, for her close reading of the manuscript. This research was funded by an NSF Career Grant (MCB0954016).
Haloalkaline Bioconversions for Methane Production from Microalgae Grown on Sunlight. Microalgal biomass can be converted to biofuels to replace nonsustainable fossil fuels, but the widespread use of microalgal biofuels remains hampered by the high energetic and monetary costs related to carbon dioxide supply and downstream processing. Growing microalgae in mixed culture biofilms reduces energy demands for mixing, maintaining axenic conditions, and biomass concentration. Furthermore, maintaining a high pH improves carbon dioxide absorption rates and inorganic carbon solubility, thus overcoming the carbon limitation and increasing the volumetric productivity of the microalgal biomass. Digesting the microalgal biomass anaerobically at high pH results in biogas that is enriched in methane, while the dissolved carbon dioxide is recycled to the phototrophic reactor. All of the required haloalkaline conversions are known in nature.
No Dozing, Pletcher pair among Tampa Bay Derby contenders OLDSMAR, Fla. - The biggest day of the Tampa Bay Downs season is Saturday, with large fields expected for the card's five stakes races, which are worth a total of $925,000, making for the richest card in track history. The highlight of the annual Festival Day program is the Grade 2, $350,000 Tampa Bay Derby, a 1 1/16-mile test for 3-year-olds that offers 85 Kentucky Derby qualifying points to its top four finishers on a 50-20-10-5 basis. Here's a look at the major players expected for the Tampa Bay Derby. No Dozing (trainer Arnaud Delacour): After finishing second in the Grade 2 Remsen Stakes, he began his 3-year-old season Feb. 11 with a dull sixth-place finish in the Grade 3 Sam F. Davis Stakes, the key local prep for the Tampa Bay Derby. The Sam F. Davis was won in track-record time by early Kentucky Derby favorite McCraken, who will miss Saturday's race with a minor ankle injury. No Dozing has breezed twice since the Sam F. Davis, a bullet four furlongs in 47.40 seconds Feb. 26 and five furlongs in 1:01.60 on Sunday. Delacour said No Dozing began Sunday's drill slowly due to another horse breezing just ahead of him and got his final furlong in 12.20 seconds. "He came back happy, and I'm very encouraged by the way he's handling his training and behaving," Delacour told track publicity. "I wouldn't run him if I didn't think he will perform well, and the way he breezed last week was very good." Beasley (trainer Mark Hennig): He was scratched out of the Grade 2 Fountain of Youth last Saturday to run in this spot and ripped through a half-mile workout in a bullet 46.90 seconds at Gulfstream earlier that day. He has finished second in allowances at Gulfstream in his last two starts. Tapwrit (Todd Pletcher): He finished a good second, beaten 1 1/2 lengths, in the Sam F. Davis after winning his maiden and the Pulpit Stakes at Gulfstream Park in his prior two starts. Last Saturday, he breezed an easy four furlongs in 50.80 seconds at Palm Beach Downs. Pletcher has won the Tampa Bay Derby in three of the last four years, including in 2016 with Destin. State of Honor (Mark Casse): He's placed in four of his five stakes tries, including a third in the Sam F. Davis and a second in the Mucho Macho Man in his two outings this year. Last Friday, he breezed half a mile in 47.75 seconds at Palm Meadows. Wild Shot (Rusty Arnold): He was second to McCraken last fall in the Grade 2 Kentucky Jockey Club Stakes and fourth in the Sam F. Davis. Third Day (Pletcher): He's perfect in two starts after taking the Just One More Stakes at Gulfstream on Feb. 8. Last Saturday, he breezed four furlongs in 50.80 seconds at Palm Beach Downs. Tale of Silence (Barclay Tagg): He's lost four straight starts and was sixth in the Remsen in his only stakes race, but he finished second in an allowance Feb. 12 at Gulfstream Park in his most recent start. Last Friday, he zipped a half-mile in 47.30 seconds at Palm Meadows. More from Daily Racing Form Also on the Festival Day card are the Grade 2, $200,000 Hillsborough Stakes, a 1 1/8-mile turf race for older fillies and mares; the Grade 3, $200,000 Florida Oaks, a 1 1/16-mile turf race for 3-year-old fillies; the $100,000 Challenger Stakes, for older horses at 1 1/16 miles on the main track; and the $75,000 Columbia Stakes, for 3-year-olds at a mile on turf. The prospective field for the Hillsborough is led by Grade 2 stakes winner Isabella Sings, who wired the field in the key local prep, the Endeavour Stakes on Feb. 11, to earn the third Grade 3 stakes victory of her career. Trained by Pletcher, Isabella Sings almost scored a front-running victory in last year's Hillsborough but was reeled in late by Tepin, the best female turf runner in North America over the past two seasons. Among the other likely starters are Grade 3 stakes winners Dickinson, Evidently, My Impression, and Family Meeting. The Oaks contenders are topped by Daddys Lil Darling, who won the Grade 2 Pocahontas Stakes last year for trainer Ken McPeek, along with Grade 3 winners Rymska and La Coronel. Adirondack King, who won last year's Challenger Stakes for trainer John Servis, will face a stern test in defending that title. His rivals are expected to include Grade 2 stakes winners Stanford and Blofeld, Grade 3 winner Ami's Flatter, and Idolo Porteno, a Group 1 winner in his native Argentina who placed in two Grade 3 races in the United States last year. Tiz a Slam, the winner of the Cup and Saucer Stakes last fall at Woodbine for trainer Roger Attfield, is among the top contenders in the Columbia Stakes. The track will be giving commemorative umbrellas to the first 7,500 fans through the gates Saturday with paid admission. The inside lining of the umbrellas feature colorful photographs of the 2016 Festival Day stakes winners.
Conventionally, for example, information to be saved is stored in a recording medium, such as a magnetic tape and a DVD, and such a recording medium is stored in a predetermined location to store the information for a long time. Much of the information to be saved for a long time is information that requires strict security management, such as customer information in a company, and for example, to discard the recording medium where the information is recorded, an act, such as mechanically destroying the recording medium before discarding, is performed (for example, see Patent Citation 1). Incidentally, a recording medium cartridge including a magnetic tape and the like capable of recording a large amount of information is widely used as a thing suitable for long-term storage of information. In general, takeout of such a recording medium cartridge is strictly managed from the viewpoint of the security management, and information leakage caused by illicit takeout of the recording medium cartridge from the storage location is prevented. For example, the information leakage is also prevented by a method of, for example, recording information in a recording medium of a recording medium cartridge in a state in which reading is possible only by use of a predetermined software-like secret code key. Furthermore, a so-called RFID (Radio_Frequency_IDentification) tag capable of wirelessly exchanging information is attached to a commodity to be managed so that an act such as managing takeout of the commodity is performed (for example, see Patent Citation 2), and such takeout management using the RFID tag is applied to the prevention of the information leakage. The prevention of the information leakage using the RFID tag is performed, for example, as follows. First, to each recording medium cartridge in the storage location, a memory and an RFID tag storing identification information for distinguishing a recording medium cartridge from other recording medium cartridge are attached. Then, a security gate, which has a function for communicating with the RFID tags and stores identification information of recording medium cartridges prohibited from being taken out of the storage location, is installed at a gateway of the storage location. When a person carrying a recording medium cartridge passes through the security gate, the security gate queries the RFID tag of the recording medium cartridge carried by the person for an identification number. The security gate generates an alarm when the identification number provided by the RFID tag in response to the query is identification information of a recording medium cartridge prohibited from being taken out of the storage location. The actions by the RFID tags and the security gate prevent the information leakage caused by illicit takeout of recording medium cartridges from the storage location. Patent Citation 1: Japanese Laid-open Patent Publication No. 2007-234129 Patent Citation 2: Japanese Laid-open Patent Publication No. 2004-288004
The sight of Baltimore city students huddling in coats in freezing classrooms amid bitter cold temperatures touched a nerve across the country yesterday, with Republican Governor Larry Hogan dismissing talk of providing aid for repairs, Democratic gubernatorial challengers denouncing him for it and the teachers’ union calling for all schools to be closed until the buildings can be made habitable. “The older children will walk out when it’s this cold – but it’s the little children who have to sit there in their coats and hats and gloves and have no way to leave that I’m worried about,” said Marietta English, president of the Baltimore Teacher’s Union (BTU). After teachers complained yesterday of classrooms with temperatures in the 30s and 40s, the union called on schools CEO Sonja Santelises to close all schools so that heating issues could be the assessed and repaired. English said the prolonged period of freezing temperatures was unusual, but that it didn’t justify failing to prepare the buildings for the students’ return. “The school system should have anticipated the problems the cold would cause after the holiday break,” she said. In a sharply-worded letter hand-delivered to school headquarters, English derided Santelises for her reassuring statement issued Tuesday – ahead of her decision to open most city schools on time Wednesday morning. “Your expectation [of] our members and the children, that they endure bursting boilers, drafty windows, frigid temperatures in classrooms, and risk getting sick in these ‘less than ideal’ conditions,” English wrote, “is utterly ridiculous.” “Can’t feel my toes” Along with anger at school officials’ handling of the immediate problem today came a deeper criticism, from some, for the historic under-funding of Baltimore’s predominantly African-American schools. “When we discuss systematic inequality & institutional racism, this is a glowing example,” ESPN’s Jemele Hill tweeted, as the story received national coverage. “How would your kids concentrate if you sent them to school in a refrigerator for eight hours? With failing lighting. Two classes in one room?” Some, like parent Nikki Massie, posted accounts of their own shivering children in city schools. “My 16 year-old daughter texted me from her seat in a Baltimore City Public School, ‘Mom, I can’t feel my toes. There’s no heat in school today!’” Massie wrote on Facebook. Others asked where they could donate a space heater? One answer came from ex NFL player-turned city school arts mentor Aaron Maybin – who is promoting a GoFundMe site to buy 600 heaters, as well as coats, hats and gloves. As part of the effort, Maybin posted a video of his students at Matthew A. Henson Elementary School wearing coats in his classroom, which he said was about 40 degrees yesterday. “How would your kids concentrate if you sent them to school in a refrigerator for eight hours? With failing lighting. Two classes in one room?” he said, in an interview with The Brew. “We tried our best as educators. They tried their best as scholars. But they are dealing with a lot already. And now they are supposed to learn in the dark and in the cold.” At the West Baltimore school where he is a teacher-mentor through a program called Leaders of Tomorrow Youth Center, electricity has only worked in half the building since students returned from break. “I’m told it was due to nobody being there during the holidays to make sure the heat stayed on and pipes didn’t freeze,” Maybin said. Maybin was livid about the conditions his students endure. “The fact that everyone is just looking at the video today and getting outraged about the situation – but not when it comes time to hold our school system and politicians accountable on that same issue – outrages me,” he said, noting that the issues he and the children run deep. “I’ve been in 90 degree classrooms in the summer and now I’m in a 40 degree classroom in the winter,” he said. “My schools have all suffered from severe lack of resources and basic necessities of education.” “Unprecedented frigid temperatures” Taking to Facebook Live, Santelises was by turns defiant and contrite, acknowledging at one point “we should have closed some schools earlier than we did.” She reiterated past comments that staff had checked out school buildings (“our facilities team did not have a holiday break”) and explained that extreme weather and fast-changing conditions may have caught them by surprise in some cases. “We have had unprecedented frigid temperatures – two weeks solid – that has not happened, in terms of the people I’ve checked with, for well over a decade,” she began, in the video Q&A conducted by her chief spokesperson, Edie House-Foster. School officials did not respond to a request from The Brew to explain whether a memo from Santelises that we obtained – giving the central office December 28th and 29th off – may have led to many facilities workers failing to come in over the weekend to prepare schools. About 60 schools were the subject of weather-related complaints according to Santelises, who said in the live video that facilities teams would be checking buildings out over the next 48 hours. “If we need to close schools we will, but I want it to be based on data, not based on just a collection of information that in some cases has been resolved,” she said. “I don’t knee-jerk shut down schools,” she said, calling the union’s proposed system-wide shutdown “overly simplistic.” Santelises urged critics to look back at the history of the state’s under-funding of Baltimore schools and said her administration had sought more funding “for black and brown children.” “Too many of our buildings have outdated heating systems, poor insulation, and aging pipes as a result of years of inadequate funding for maintenance and facilities improvements,” she said. Teachers: Clearer Policy Needed Teacher Corey Gaber said long-term funding issues shouldn’t obscure the school system’s shorter-term failings when it comes to decision-making about school closures. “They need to make more humane, more consistent, smarter, quicker decisions on when to close a school and why,” said Gaber, who teaches 6th grade English at the Southwest Baltimore Charter School. Understanding that each school is different, a threshold temperature of perhaps 60 degrees could be set for a guideline, he said. Patterson High School barely has heat and there’s literally water spraying out the heaters? With not enough maintenance workers, the school system “should empower principals to take a temperature reading,” Gaber said. Children are often in school for two or three hours before facilities staff arrive to tackle problems, he noted. Teachers also should be trusted more to make assessments of school conditions, he said, noting that instructional staff have been advocating for such policies “for at least eight years.” “This is not a new problem,” said Gaber, part of a teachers’ group called BMORE (Baltimore Movement of Rank and file Educators). Cold Schools a Campaign Issue It didn’t take long for the plight of Baltimore students in under-heated buildings to become political fodder. Treasurer Nancy K. Kopp, a Democrat, put the issue before Gov. Hogan in Annapolis yesterday. The past focus by Hogan and Comptroller Peter Franchot on air conditioning in schools, Kopp said, may have hurt funding for heating or other needs. Hogan replied that the state had already put “billions of dollars” into city schools. Pretty soon, Lt. Gov. Boyd Rutherford was coming to Hogan’s defense on Twitter. Democratic candidates who have announced plans to challenge Hogan – Ben Jealous, Rich Madaleno and Krish Vignarajah – all denounced him yesterday. “While Hogan will crow about the amount of money he has allocated for Baltimore City schools overall,” Madaleno said, “every family understands that you fix a roof when the sun is shining – or in this case, you fix heating systems BEFORE a deep freeze sets in.” Baltimore State Senator Bill Ferguson noted that $5 million was withheld facilities account in Annapolis last year “because of the arbitrary decision to prioritize air conditioning over heating.” “The whole AC debate was a political charade to attract votes in Baltimore County,” he said, noting that some of the city schools HVAC projects delayed are now among those experiencing problems. At the conservative blog Red Maryland, meanwhile, Democrats were accused of “demagoguing” on the heating problems, which were the fault of “the school bureaucracy.” Asked for comment on the school heating crisis, Mayor Catherine Pugh said the matter is under the purview of the city schools CEO and the president of the school board. She noted that, since 1997, the state has had oversight of city schools. Last year, Pugh won full control of school board appointment after the state legislature voted to end the arrangement. But she added, “I have just regained appointment power and will not have full control of the school board for a few years.” Pugh said she contacted Santelises yesterday to encourage her to answer the media’s questions about the school building problems. As Cold Outside as Inside For those listening, the loudest comments yesterday were the ones that came en masse from parents, teachers and students. Four schools with heating problems were closed. And some additional shutdowns took place – Frederick Douglass High School and Cecil Elementary School closed early. But most schools opened on time and City Schools’ Twitter account was under siege by people demanding their cold school be closed for repairs too. The Baltimore Polytechnic Institute building barely has heat and it takes a while for the heat in the building to actually have results, please consider a closing. Patterson High School barely has heat and there’s literally water spraying out the heaters? I don’t understand. Also we had a fire “drill” and it was just as cold outside as inside. Please close Patterson High how are we supposed to learn? Carver go-tech has busted pipes in the lunch room and is freezing cold how can we learn like that? LIES!!! Why so many schools without heat. Leith Walk, Furley, Patterson, Western, Poly, and others. By the time the heat comes on and warms the buildings it will be Friday. This is sad. But I’m sure North Ave has adequate heat! Today, they got their wish and schools were closed, though not for the precise reasons they wanted them to be. As forecast, a bitter wind was blowing and snow was falling across the city. – Reporter Fern Shen can be reached at [email protected] or Baltimore Brew, P.O. Box 5626 Baltimore, MD. 21210. ________________________________________
Outcome of cardiopulmonary resuscitation in the intensive care units of a university hospital. The purpose of this study is to evaluate the demographic characteristics of patients who suffered cardiac arrest in our ICUs and to identify those factors influencing outcome after resuscitation following cardiac arrest. We reviewed the records of all patients who underwent CPR in the two ICUs at the Georg-August University Hospital Goettingen, Germany from 1 January, 1999 to 31 December, 2003. During the study period 169 patients underwent CPR and 80 of the 169 patients survived to hospital discharge, giving a survival to hospital discharge rate of 47.3%. The initial monitored rhythm recorded at the time of arrest was asystole in 99 (58.6%) patients, ventricular tachycardia/fibrillation in 59 (34.9%) and pulseless electrical activity in 7 (4.1%) patients. The respective survival rates were 46 (54.8%), 31 (36.9%) and 5 (6.0%) to hospital discharge. Of the 80 patients that survived to hospital discharge 75 (93.8%) achieved good cerebral recovery (CPC 1 or 2) and were alert and fully oriented on discharge; 4 patients (5.0%) were severely disabled (CPC 3), while 1 (1.2%) remained unconscious and was reported dead five days after discharged to another local hospital. Illness severity as assessed by SAPS II score on admission was 38.8 +/- 16.0. None of our patients with > 40 SAPS II score 24 hours after CPR survived to be discharged from the ICU. Our study showed that nearly half the patients that had cardiac arrest in our hospital ICUs had a favourable outcome despite initial rhythms that are traditionally associated with a poor outcome. This confirms that good results are achievable in these groups of patients.
Antibodies in human sera specific to hypervariable region 1 of hepatitis C virus can block viral attachment. It has been postulated that antibodies specific to the hypervariable region 1 (HVR1) within the putative envelop protein E2 of hepatitis C virus (HCV) can neutralize virus. We studied such antibodies in sera of patients who were infected in a single-source outbreak by a contaminated anti-D immunoglobulin preparation (HCV-AD78). The nucleotide sequences of cDNAs encoding HVR1 of HCV-AD78 were determined. The four major variants (HVR1.A, B, C, and D) were expressed as fusion proteins in Escherichia coli. Sixty-seven percent of sera contained antibodies to HVR1.A. Sera unrelated to infection of the outbreak also recognized HVR1.A but to a lesser extent (15%), suggesting that not all HVR1-specific antibodies are absolutely isolate-specific. Antibodies directed against individual variants of HVR1 were found in sera obtained early postinfection (p.i.) (< or = 1 year) but also in sera obtained several years later. An in vitro binding assay of HCV to tissue culture cells was employed to further characterize these sera. Five of seven sera that were obtained early p.i. prevented binding of HCV to cells. Preincubation of such sera with HVR1-specific fusion proteins restored binding of HCV to cells in four of five sera. These findings suggest that the majority of neutralizing antibodies are directed against HVR1.
Waterman faces farmers’ ire The Krishna River Conservation Yatra led by Magsaysay award winner Rajendra Singh along with noted professor Vikram Soni faced the wrath of farmers in Amaravati capital villages here on Friday. The local farmers opposed the team members at Undavalli and Neerukonda. Important updates in your mailbox Amaravati: The Krishna River Conservation Yatra led by Magsaysay award winner Rajendra Singh along with noted professor Vikram Soni faced the wrath of farmers in Amaravati capital villages here on Friday. The local farmers opposed the team members at Undavalli and Neerukonda. Rajendra Singh tells protesters that his yatra is for protection of Krishna river not against Amaravati Tension prevailed for some time, when the farmers led by local representatives including TDP leaders blocked the road at Undavalli, when the members tried to visit the lift irrigation scheme which is under construction on Kondaveeti Vaagu. Similarly, some group of farmers stopped their convoy at Neerukonda village outskirts by raising slogans against their visit. They damaged the flexes which were setup on Yatra vehicle of Rajendra Singh. The police foiled the attempt of farmers to attack the convoy. However, the police changed route direction thus the team members of Rajendra Singh reached to Tulluru, where they interacted with local people. On this occasion, Rajendra Singh explained them his plans as were not against to Amaravati capital city. He also said that his intention is to protect rivers. On the other hand, the local farmers have too explained how they have voluntarily given their lands to Amaravati capital city under land pooling scheme. They said that nearly the 25,000 farmers have given their lands to state government without any objection. Only the owners of 2000 acres were misleading the people like members of Conservation Yatra, they lamented. Rajendra Singh also said that just he wants to see the developments including how the river was being protected by the government. He said that he would submit some precautionary measures to be taken to state government to protect Krishna river.
Suspect in post office slayings: 'I lost it, man' A former Tennessee prison guard said in a videotaped interrogation that he and his son tried to rob a rural post office because they needed money and angrily shot two female postal workers multiple times after they found less than they expected: only $63. The video of the Feb. 15 interrogation was played Tuesday as evidence in a hearing for Montgomery, who faces six federal charges related to the Oct. 18 shootings of Paula Robinson, who was black, and Judy Spray, who was white. The father's hearing offered the first details of the slayings that happened inside a small red brick post office four months ago and shook the small west Tennessee town of Henning. Montgomery told two U.S. Postal Inspection Service investigators that he expected the post office the small West Tennessee town of Henning to have $25,000 when he and his 18-year-old son went to rob it because they were low on money. "I was going through a rough time," he said. "I didn't think I'd get caught." Montgomery told the investigators that after he shot Robinson, his son, Chastain Montgomery Jr., shot Spray. They then drove back to the Nashville area, where they lived, Montgomery said. Chastain Montgomery Jr. was killed in a Feb. 14 shootout with police in Mason after they tried to stop him in a stolen truck. The teen started firing at officers with two guns before he was shot by a deputy from 57 yards away, authorities said. His father was arrested on evidence tampering and other state charges when he went to the crime scene and tried to get into the truck, authorities said. The father drove to the scene in a black Chevrolet Impala that matched the description of a car investigators identified as the possible getaway vehicle in the post office shooting, authorities said. Michael Scholl, Montgomery's defense attorney, entered a plea of not guilty. U.S. Magistrate Judge Charmiane Claxton ordered Montgomery held in custody until trial. He faces the death penalty or life in prison if convicted. Postal Inspector Dwight Jones testified that Robinson, a retail clerk, was shot five times with a .40 caliber handgun. Spray, a rural mail carrier, was shot four times with a 9mm weapon, Jones said. Only $63 was missing from the post office safe. A 9mm weapon used by the son in his shootout with police matched the 9mm used in the post office shootings, Jones said, citing a ballistics test done by the Tennessee Bureau of Investigation. A .40-caliber weapon recovered from the trunk of the father's Impala matched the one used to shoot Robinson, Jones said. In the videotape, Montgomery Sr. told investigators that he knew the Henning post office well and he and his son went to rob it the morning of Oct. 18. The man had been separated from his wife and the family was having money problems, he said. Montgomery said they drove around until they could find the right time to enter the post office. Montgomery said he jumped over the counter of the post office, with his son covering his back. The women were shot moments later. Relatives of the two women were in the courtroom on Tuesday. Some wept during the hearing. Prosecutor Vivian Donelson presented as evidence a written confession allegedly made by Montgomery. In it, he said he has "nothing else to live for." "I hope your family can ever forgive me, but if you can't, I understand," the written confession said. Investigators also asked whether Montgomery had robbed banks in the Nashville area in the past few months. Authorities have said that searches of both the son and the father turned up dye-stained cash. Montgomery did not confess to any bank robberies. The defense attorney asked Jones whether Montgomery had been given his medication for paranoid schizophrenia before his five-hour interrogation. Jones said he did not know. Scholl also questioned how the inspectors got the confession, which was only secured after they presented Montgomery with evidence against him.
The handshake that rebooted Kenya’s economy Kibera, the political bedrock of former Prime Minister Raila Odinga, has become the thermometer of Kenya’s political temperatures, followed by Mathare, among other major slums. When police quell riots here, the world media gets a field day telling all and sundry about what is wrong with the country and the continent at large as well as where the raw form of expression finds a voice – sometimes in the most violent of manners. The sprawling slum dissected into invisible political and ethnic boundaries is a cauldron of Kenyan interactions which had been one of a country completely fissured to the point of stroking the dangerous call for cessation. Today, a visit to Kibera’s Kamukunji area is met by calm. It is no longer the hotbed of near-militant political activities that sunk into plumes of teargas, stones, and burning of tyres during the electioneering period. It is bustling with commercial activities as if the intensive few months never happened. The prevailing peace is a boon for Gilean Onditi who offers laundry services at Kibera Town Centre – a community-based initiative that supplies water to the slums, among other activities. He feels the new-found calm is a golden treasure for businesses. “Business resumed in November 2017, but there was still some tension, so much so that we used to call our clients asking them to return,” says Onditi. At times, they were forced to go for the clothes themselves as some clients feared being caught up in the melee. Things could easily get out of hand should you be suspected of belonging to the ‘wrong’ tribe or political party. Political nemeses In perhaps the most bizarre of diplomatic grandstanding, one community chose to boycott food sold at Othaya Market as they did not want anything from their political enemies. Politics had erected an ion curtain in Kibera, cutting it into two. But the symbolic handshake between former Prime Minister Raila Odinga and President Uhuru Kenyatta has thawed the tension, bringing the economic curtain tumbling like the Berlin Wall. For President Uhuru and the technocrats around him, they realised that running a modern economy is complex and even when all other key economic variables remain unbroken, the psychology and perception played a bigger part in the unfolding economic rot. Insiders who are familiar with the deal say fixing these twin problems has been Uhuru’s administration’s biggest headache that needed to be addressed urgently. “The benefits of the new deal outweigh its cost,” noted an insider who declined to be named. What has been very clear to Uhuru’s administration is that economic revival requires more than the strict round of belt-tightening or the suggested austerity measures. All the key economic indicators pointed south and things were getting worse by the day. Kibera is a perfect microcosm of how the larger economy faired in the build-up to the August election last year as tensions flared. Common products The entire economy slowed down. At Toi Market, one of the largest informal markets, common products such as second-hand clothes for children were scarce. Most of the traders, estimated at about 5,000, were not restocking. Central Bank Governor Dr Patrick Njoroge boldly admitted in an interview with CNN that the economy was in bad shape because of the political upheaval. According to a poll done by Stanbic Bank in which procurement managers were asked about their decisions on whether to stock, employ and project output, the run-up to the elections was the worst time since Stanbic started the Purchasing Managers Index (PMI). The PMI slipped to 47.3 in June from a 49.9 in May. In PMI, readings above 50 signal an improvement in business conditions on the previous month while readings below 50 show deterioration. “The reading went below the crucial 50 threshold for the first time in April 2017 due to weaker underlying demand conditions, and lower willingness to spend,” said Stanbic Bank Regional Economist, East Africa Jibran Qureishi. The election itself was eventful. The waiting did not end and what was expected to be one election became two. The Supreme Court annulled President Uhuru Kenyatta’s August 8 election, citing irregularities in the electoral process. The political temperatures went up, polarising the country even further. The pulse of the economy grew faint in the wake of the shockwaves that hit the country’s businesses, especially those listed on the Nairobi Securities Exchange (NSE). After President Uhuru won the repeat election, with analysts predicting that the Supreme Court would uphold his win, investor cash started flowing into liquid counters. On August 22, Safaricom – the biggest capitalised firm in the market – hit Sh25 per share, pushing market capitalisation — the total value of investor funds – to more than Sh1 trillion. But after the Supreme Court annulled the win, the market literally crashed as investors struggled to pull their money out. Panic sells by foreign investors triggered a 30-minute halt at the NSE, with huge sales at Safaricom, Equity and East Africa Breweries causing a dip in share prices across several counters. And it got worse when Mr Odinga pulled out of the race and a legal circus ensued with no one certain about the economic implications arising from a political standoff. The second elections did nothing to cool investors’ taut nerves – even as IEBC could not be allowed to take ballot papers to some areas considered to opposition zones and many people died out of the circus. Even after the Supreme Court unanimously affirmed Kenyatta’s win, the opposition refused to recognise him as the President. Instead, they went ahead and conducted their own mock swearing-in at Uhuru Park, with Odinga being ‘installed’ as the People’s President. What should have been an innocuous democratic exercise insidiously, and violently altered the pulse-rate of the country’s economy. During the election period, the Nairobi County Government did not approve any building projects due to political jitters. Building projects According to the National Construction Authority (NCA), only 1,330 new building projects came into the pipeline in the first half of the current financial year, setting the stage for slower growth at the close of the year. This was a 50 per cent drop from the 2,300 building projects that were approved in a similar period in the previous financial year, meaning at least 1,000 extra projects need to come into the pipeline to match the performance. “The number of new projects has gone down about 50 per cent this year, according to the latest data we have,” said the NCA Manager for Regional Offices Stephen Mwilu at a press briefing in Nairobi. According to I&M Burbidge Capital Ltd, deal-making in 2018 began on a slightly lower pace, with nine deals reported across the region worth $30 million (Sh3 billion) over the past two months of the year compared to 11 deals worth $958 million (Sh95.8 billion) in 2017. “We attribute the decline to a muted transaction origination environment and more cautious decision making in the second half of 2017,” Chief Executive Officer Edward Burbidge said. The election menace affected the Government too. During the election, Kenya was expected to pay of Sh77 billion Syndicated loan in October. Treasury had to ask for an extra six months until the election noise could settle. But as the six months narrowed Treasury went to PTA Bank, now Trade Development Bank, and took another loan to pay off the syndicated lenders. But the government was still short of cash, having delayed disbursement to counties while the cost of running a new election depleted state coffers. KCB Group Chief Finance Officer Lawrence Kimathi said that in the last quarter of 2017, the government was not paying suppliers, releasing money to counties or spending in infrastructure reducing the money in the market. “Even this year, apart from the education fund and a bit of infrastructure we are not seeing much spend from government,” Kimathi said. The government had to go back to the Eurobond market in the midst of the political storm trying to convince foreigners to give Kenya money while the house was not in order. Transactional advisors to Kenya’s second Eurobond were quick to caution the bondholders in a prospectus that the decision by NASA not to recognise Uhuru Kenyatta as president posed a risk to their investment. The transactional advisors included a group of four banks – CitiGroup, Standard Bank, J.P. Morgan and Standard Chartered Bank – that helped Kenya sell its 30-year Sh200 billion dollar-bond. They noted that continued levels of political uncertainty in the country might affect capital markets, tourism, and foreign investment, as well as Kenya’s economy as a whole, a situation that would jeopardise the country’s prospect to pay back its debts. With a slowdown in the economy, where there are more dollars leaving the country than entering, the country’s reserve of foreign currencies critical for repayment of external debts such as the Eurobond, would be depleted. “Although some stability was achieved following the Supreme Court ruling in November 2017, political uncertainty remains as a result of NASA’s refusal to recognise Kenyatta as President,” read part of the prospectus prepared on February 28, six days after the National Treasury Cabinet Secretary Henry Rotich announced that Kenya’s Eurobond had been subscribed seven times. “There is no assurance that instability will not increase again in the future, which may impact Kenya’s level of tourism and foreign investment or risk of sudden withdrawal of foreign deposits among other things, which in turn may adversely affect Kenya’s economy and its ability to service its debt, including the Notes,” added the prospectus. A source close to the meeting between Kenyatta and Odinga intimates that Kenya was finding it difficult to market the Eurobond, thus the decision to price it expensively. Former US President Bill Clinton while running for Presidency in 1992 is said to have popularised the slogan: “It is the economy, fool.” The magic handshake between opposition leader Raila Odinga and President Uhuru Kenyatta may not have been viewed by many as an economic move, but it may just turn out to be the one that got businesses off the ground. She adds that sometimes the aid that Kenya receives is pegged on democratic rights. “Social sectors such as education, health and security are highly donor-dependent,” adds Dr Odhiambo. Pending bills Apart from turning to the Eurobond to raise cash urgently to pay for loans that are fast maturing, the government had also delayed remitting cash to counties for lack of cash delaying payment of pending bills. There have been fears in some quarters that increased political bickering was taking a toll on the economy, which saw the National Treasury Cabinet Secretary Henry Rotich announced that Kenya was broke, a statement he later on denied, saying he was quoted out of context. While the country sank further in turmoil, her neighbours – Uganda, Tanzania and Ethiopia were attracting huge investments – estimated to be in billions of shillings. Investor wealth at the Nairobi Securities Exchange which had been on a free fall since the beginning of the year as key stocks halted their price rally in the face of foreign investor selloffs and unimpressive financial results look promising. By the close of business a fortnight ago, the Nairobi All Share Index (NASI), a market cap weighted index consisting of all the securities listed on the Nairobi Securities Exchange hit a fresh all-time high, to close at 191.67 points. Pundits have argued, again and again, that for Kenya’s economy to bounce back the political uncertainty must go. It is the message Kenya’s transactional advisors for the recent Sh200 billion Eurobond that Kenya successfully issued gave to the bondholders. Business delegations are optimistic about increased products after the handshake. Also set to reap big is tourism sector that due to increased ‘insecurity’ after some European countries travel warnings to their nationals not to visit certain parts of the country and towns
Petoskey council mulls tax increase, OKs general budget cuts Various cost-cutting measures for Petoskey’s general budget received approval from the city council Monday. This portion of the budget covers programs such as public safety, parks and recreation and general government and administration. These reductions — projected to save up to $404,700 — would include wage and benefit reductions — by way of leaving vacant positions unfilled and seeking to lower overtime costs — along with cuts in spending on equipment purchases, education and training, contracted services, supplies, maintenance and repairs, utilities and capital outlays. Using the tax rate originally proposed, the current revenue projection for the general levy is about $339,363 lower than was expected a few months ago. Along with the cost-saving measures, staff are proposing that the general tax levy be adjusted upward by about .23 mill — bringing it to about 7.67 mills — which would restore about $109,000 in city revenue. The city’s various tax levies for the year are expected to be finalized in May. Advertisement Because of the property-value drop, city finance director Al Terry noted that revenues generated using the general levy would still be less than last year even with the rate increase in place. Other adjustments proposed to boost revenue include a 5 percent fee increase for parks and recreation program participants and higher prices for marina fuel sales — with staff noting that these would remain consistent with the local market. Small grants will be pursued in hope of funding some city purchases, and $50,000 in operating funds that would normally be transferred from the city’s electric utility to a street budget would instead be moved into the general fund. The tax-rate increase and other revenue-generating efforts are expected to produce about $189,000. Combined with the cost-cutting efforts, these would make about $593,000 available to address a revenue shortfall of about $361,000. Staff noted that the extra funds would allow for unforseen expenses and the possibility that some projected cost savings don’t come to fruition. Without the tax-rate increase, Terry said there’s a possibility that the city would need to look at staffing cuts. Another possibility which staff offered for the council to consider — re-establishment of an administrative fee on property tax bills that had been dropped about a decade ago — would generate more than $200,000 if collected at the maximum 1 percent rate allowed by the state and eliminate the need for the tax-rate increase, staff noted. With property-value declines expected to continue in 2011 and possibly 2012, city manager Dan Ralley noted that officials likely will need to have additional “difficult” discussions involving long-term financial strategies.
Many students encounter difficulties in science and mathematics that may stem from intuitive interference of salient irrelevant variables. We focused on the comparison of perimeters task, in which area is the irrelevant salient variable. In congruent trials (no interference), accuracy is higher and reaction time is shorter than in incongruent trials (area variable interference). A brain-imaging study related to this task indicated that correctly answering the incongruent condition is associated with activation in prefrontal brain regions known for their executive inhibitory control. In the current study we explored the relationship between inhibitory control mechanisms and the ability to overcome intuitive interference. Participants in the study were 90 ninth graders. The efficiency of their inhibitory control mechanisms was assessed and accuracy and reaction time of correct responses in the comparison of perimeters task were recorded. The findings indicate that students with efficient inhibitory control mechanisms scored significantly better in the incongruent conditions than did those with inefficient ones. In addition, the findings indicate that the higher the efficiency of inhibitory control mechanisms, the better students were in overcoming the intuitive interference. These findings indicate the importance of inhibitory control mechanisms in overcoming interference in science and mathematics. They point to the possibility of improving students’ ability to overcome intuitive interference by strengthening their inhibitory control mechanisms. We also demonstrate that applying cognitive psychology and neuroscience methodologies in science and mathematics education research contributes to both fields.
ERROR: type should be string, got "https://www.lombardiletter.com/gold-prices-could-soar-in-2019-institutional-investors-become-bullish/31455/\nGold Prices Could Soar in 2019: Institutional Investors Become Bullish\nMoe Zulfiqar, B.Comm.\nLombardi Letter\n2019-01-09T07:36:57Z\n2019-01-09 14:17:32 gold pricesprice of goldgold priceIt's not just the big banks favoring gold; institutional investors are also coming out in favor of the yellow precious metal. This could move gold prices much higher than they are now.\nCommodities,Gold\nhttps://www.lombardiletter.com/wp-content/uploads/2019/01/Gold-Prices-Could-Soar-in-2019-Institutional-Investors-Become-Bullish-150x150.jpg\n\nGold Prices Could Soar in 2019: Institutional Investors Become Bullish\n\nSentiment Turning, Gold Prices Could Register Solid Gains in 2019\n\nThose with a lot of money are turning bullish on gold. This could have very positive impacts on gold prices in 2019 and beyond.\n\nYou see, in recent years, institutional money didn’t really care about the yellow precious metal. Across the board, the sentiment toward gold was very similar: it’s a useless asset that won’t add much value to a portfolio.\n\nAdvertisement\n\nAs a result, institutional investors never bought in, and we saw the price of gold remain stagnant. Keep in mind that institutional investors have a lot of money. They can move markets up or down.\n\nNow it seems like sentiment is turning. At the very least, the tone is changing.\n\nHere at Lombardi Letter, we have presented a lot of evidence that big banks have been signaling that gold is worth a look.\n\nWe have seen major banks like Bank of America Corp (NYSE:BAC), Goldman Sachs Group Inc (NYSE:GS), and Bank of Montreal (NYSE:BMO) say that gold prices could move higher in 2019 and beyond.\n\nNow, institutional investors are also favoring gold—even talking about allocating significant amounts of capital toward it. This is the first time in several years that we have been hearing something like this.\n\nRuss Koesterich, portfolio manager at BlackRock Global Allocation Fund, Inc, said, “We’re constructive on gold.” He added, “We think it’s going to be a valuable portfolio hedge. We’re multi-asset investors: we think about its effect on the entire portfolio, and what we see value in right now is gold’s value as a diversifier.” (Source: “BlackRock Heaps Praise on Gold’s Role as a Tough Year Opens,” Bloomberg, January 6, 2019.)\n\nMind you, BlackRock Global Allocation Fund has $60.0 billion under management. If we assume that the fund allocates just 10% of its portfolio to gold, that’s $600.0 million.\n\nThis sum may not sound much, but don’t forget that the gold market is fairly small, relative to the stock market and the bond market. That amount of money could make an impact on the gold market.\n\nWhat’s Next for Gold Prices in 2019?\n\nDear reader, the case for higher gold prices is getting stronger by the day.\n\nThe decline in the price of gold between 2013 and 2015 was nothing but a blessing in disguise for those who never bought the yellow precious metal.\n\nIn the midst of the sell-off, the fundamentals of the gold market changed too.\n\nMark my words: if institutional money comes in to buy gold, we could see a shortage-like scenario in no time. Over the past few years, demand has been solid from central banks and consumers, while the supply side has faced a lot of problems.\n\nI will end with this: don’t be shocked if 2019 becomes a stellar year for gold.\n\nOn the upside, $1,375 is the gold price level to watch. If that level is taken out (it has acted as a resistance level for several years), we could see fireworks, to say the least. The next resistance level for gold prices isn’t until $1,550.\n\nIn the meantime, gold miners shouldn’t be ignored. If the price of gold makes a run for $1,375 (or even $1,550) in 2019, certain gold mining stocks could double in value (if not more).\n\nDear Reader : There is no magic formula to getting rich. Success in investment vehicles with the best prospects for price appreciation can only be achieved through proper and rigorous research and analysis. We are 100% independent in that we are not affiliated with any bank or brokerage house. Information contained herein, while believed to be correct, is not guaranteed as accurate. Warning: Investing often involves high risks and you can lose a lot of money. Please do not invest with money you cannot afford to lose. The opinions in this content are just that, opinions of the authors. We are a publishing company and the opinions, comments, stories, reports, advertisements and articles we publish are for informational and educational purposes only; nothing herein should be considered personalized investment advice. Before you make any investment, check with your investment professional (advisor). We urge our readers to review the financial statements and prospectus of any company they are interested in. We are not responsible for any damages or losses arising from the use of any information herein. Past performance is not a guarantee of future results. All registered trademarks are the property of their respective owners."
Joe Biden Tears Up Talking About Fallen Soldiers in Iraq Share U.S. Vice President Joe Biden became emotionally overwhelmed recently in a candid interview where he discussed Iraq, the U.S. troop pull-out and fallen soldiers. Biden spoke to ABC news correspondent Ann Curry while on his last official visit to Iraq before the U.S. Military withdrawals troops from the country by the end of the year. Biden discussed the current situation in Iraq with Curry and addressed why the Obama administration ultimately decided that eight years in, Iraq is in a stable enough position to overcome still prevalent security challenges without U.S. forces. “There’s still concerns here in Iraq, but if you take a look at it Ann, violence is down to an all-time low,” Biden told the news correspondent who made the journey all the way to Iraq to speak with the Vice President. “The idea that there is sufficient capacity to bring down this government, to fundamentally alter this democratic processes underway, that no longer exists,” he said. Biden become sentimental and choked up when Curry questioned him about his own son’s military service. Beau Biden joined the military in 2003 and was deployed to Iraq in 2008, during the height of violence in the country. He served in Iraq for one year. “First of all I say I am so damn proud of you, I am so incredibly proud of him and these kids, and I say it mattered, it mattered.” Biden told Curry. Biden expressed his view that those that are serving are an exceptional generation but lost his composure when he discussed how he felt when his eldest son returned from Iraq. “When Beau came home after a year, obviously there was an overwhelming sense of joy and relief. All I could think of was, those fallen angels,” he said through tears. Biden is on his eighth official visit to the country since becoming Vice President.
# Microsoft Developer Studio Project File - Name="mod_lbmethod_heartbeat" - Package Owner=<4> # Microsoft Developer Studio Generated Build File, Format Version 6.00 # ** DO NOT EDIT ** # TARGTYPE "Win32 (x86) Dynamic-Link Library" 0x0102 CFG=mod_lbmethod_heartbeat - Win32 Release !MESSAGE This is not a valid makefile. To build this project using NMAKE, !MESSAGE use the Export Makefile command and run !MESSAGE !MESSAGE NMAKE /f "mod_lbmethod_heartbeat.mak". !MESSAGE !MESSAGE You can specify a configuration when running NMAKE !MESSAGE by defining the macro CFG on the command line. For example: !MESSAGE !MESSAGE NMAKE /f "mod_lbmethod_heartbeat.mak" CFG="mod_lbmethod_heartbeat - Win32 Release" !MESSAGE !MESSAGE Possible choices for configuration are: !MESSAGE !MESSAGE "mod_lbmethod_heartbeat - Win32 Release" (based on "Win32 (x86) Dynamic-Link Library") !MESSAGE "mod_lbmethod_heartbeat - Win32 Debug" (based on "Win32 (x86) Dynamic-Link Library") !MESSAGE # Begin Project # PROP AllowPerConfigDependencies 0 # PROP Scc_ProjName "" # PROP Scc_LocalPath "" CPP=cl.exe MTL=midl.exe RSC=rc.exe !IF "$(CFG)" == "mod_lbmethod_heartbeat - Win32 Release" # PROP BASE Use_MFC 0 # PROP BASE Use_Debug_Libraries 0 # PROP BASE Output_Dir "Release" # PROP BASE Intermediate_Dir "Release" # PROP BASE Target_Dir "" # PROP Use_MFC 0 # PROP Use_Debug_Libraries 0 # PROP Output_Dir "Release" # PROP Intermediate_Dir "Release" # PROP Ignore_Export_Lib 0 # PROP Target_Dir "" # ADD BASE CPP /nologo /MD /W3 /O2 /D "WIN32" /D "NDEBUG" /D "_WINDOWS" /FD /c # ADD CPP /nologo /MD /W3 /O2 /Oy- /Zi /I ".." /I "../../../include" /I "../../../srclib/apr/include" /I "../../../srclib/apr-util/include" /D "NDEBUG" /D "WIN32" /D "_WINDOWS" /Fd"Release\mod_lbmethod_heartbeat_src" /FD /c # ADD BASE MTL /nologo /D "NDEBUG" /win32 # ADD MTL /nologo /D "NDEBUG" /mktyplib203 /win32 # ADD BASE RSC /l 0x809 /d "NDEBUG" # ADD RSC /l 0x409 /fo"Release/mod_lbmethod_heartbeat.res" /i "../../../include" /i "../../../srclib/apr/include" /d "NDEBUG" /d BIN_NAME="mod_lbmethod_heartbeat.so" /d LONG_NAME="lbmethod_heartbeat_module for Apache" BSC32=bscmake.exe # ADD BASE BSC32 /nologo # ADD BSC32 /nologo LINK32=link.exe # ADD BASE LINK32 kernel32.lib ws2_32.lib mswsock.lib /nologo /subsystem:windows /dll /out:".\Release\mod_lbmethod_heartbeat.so" /base:@..\..\..\os\win32\BaseAddr.ref,mod_lbmethod_heartbeat.so # ADD LINK32 kernel32.lib ws2_32.lib mswsock.lib /nologo /subsystem:windows /dll /incremental:no /debug /out:".\Release\mod_lbmethod_heartbeat.so" /base:@..\..\..\os\win32\BaseAddr.ref,mod_lbmethod_heartbeat.so /opt:ref # Begin Special Build Tool TargetPath=.\Release\mod_lbmethod_heartbeat.so SOURCE="$(InputPath)" PostBuild_Desc=Embed .manifest PostBuild_Cmds=if exist $(TargetPath).manifest mt.exe -manifest $(TargetPath).manifest -outputresource:$(TargetPath);2 # End Special Build Tool !ELSEIF "$(CFG)" == "mod_lbmethod_heartbeat - Win32 Debug" # PROP BASE Use_MFC 0 # PROP BASE Use_Debug_Libraries 1 # PROP BASE Output_Dir "Debug" # PROP BASE Intermediate_Dir "Debug" # PROP BASE Target_Dir "" # PROP Use_MFC 0 # PROP Use_Debug_Libraries 1 # PROP Output_Dir "Debug" # PROP Intermediate_Dir "Debug" # PROP Ignore_Export_Lib 0 # PROP Target_Dir "" # ADD BASE CPP /nologo /MDd /W3 /EHsc /Zi /Od /D "WIN32" /D "_DEBUG" /D "_WINDOWS" /FD /c # ADD CPP /nologo /MDd /W3 /EHsc /Zi /Od /I ".." /I "../../../include" /I "../../../srclib/apr/include" /I "../../../srclib/apr-util/include" /D "_DEBUG" /D "WIN32" /D "_WINDOWS" /Fd"Debug\mod_lbmethod_heartbeat_src" /FD /c # ADD BASE MTL /nologo /D "_DEBUG" /win32 # ADD MTL /nologo /D "_DEBUG" /mktyplib203 /win32 # ADD BASE RSC /l 0x809 /d "_DEBUG" # ADD RSC /l 0x409 /fo"Debug/mod_lbmethod_heartbeat.res" /i "../../../include" /i "../../../srclib/apr/include" /d "_DEBUG" /d BIN_NAME="mod_lbmethod_heartbeat.so" /d LONG_NAME="lbmethod_heartbeat_module for Apache" BSC32=bscmake.exe # ADD BASE BSC32 /nologo # ADD BSC32 /nologo LINK32=link.exe # ADD BASE LINK32 kernel32.lib ws2_32.lib mswsock.lib /nologo /subsystem:windows /dll /incremental:no /debug /out:".\Debug\mod_lbmethod_heartbeat.so" /base:@..\..\..\os\win32\BaseAddr.ref,mod_lbmethod_heartbeat.so # ADD LINK32 kernel32.lib ws2_32.lib mswsock.lib /nologo /subsystem:windows /dll /incremental:no /debug /out:".\Debug\mod_lbmethod_heartbeat.so" /base:@..\..\..\os\win32\BaseAddr.ref,mod_lbmethod_heartbeat.so # Begin Special Build Tool TargetPath=.\Debug\mod_lbmethod_heartbeat.so SOURCE="$(InputPath)" PostBuild_Desc=Embed .manifest PostBuild_Cmds=if exist $(TargetPath).manifest mt.exe -manifest $(TargetPath).manifest -outputresource:$(TargetPath);2 # End Special Build Tool !ENDIF # Begin Target # Name "mod_lbmethod_heartbeat - Win32 Release" # Name "mod_lbmethod_heartbeat - Win32 Debug" # Begin Group "Source Files" # PROP Default_Filter "cpp;c;cxx;rc;def;r;odl;hpj;bat;for;f90" # Begin Source File SOURCE=.\mod_lbmethod_heartbeat.c # End Source File # End Group # Begin Group "Header Files" # PROP Default_Filter ".h" # Begin Source File SOURCE=..\mod_proxy.h # End Source File # End Group # Begin Source File SOURCE=..\..\..\build\win32\httpd.rc # End Source File # End Target # End Project
namespace UltimaXNA.Ultima.Player { class SpellData { } }
Is your Rome, Georgia office or home taking on an aged appearance due to filthy windows? If this is the situation, hiring our window cleaning company in Rome, GA is one of the best investments you can make. Along with enhancing the appearance of the windows at your house or company in Rome, we also happen to offer a higher degree of customer support. Be sure to give our window cleaning crew from JT Window Cleaning a call at 866-514-1618 if you have questions regarding our window cleaner services in Rome. Call Now 866-514-1618 Customizing Our Cleaning Services in Rome, GA Unlike many Rome, GA window washing company , we understand that different clients will have distinct needs. Given that this is the situation, we find it rather easy to evaluate your window washing needs and come up with the easiest and most effective cleaning method. Even though most window washers in the area will not go out of their way to earn your business, we always will because of the repeat and referral business it creates. Our High-Quality Equipment and Staff Makes the Difference in Rome, GA Together with our premier level of customer care, we are also very proud of our top-notch equipment as well as our knowledgeable staff. Our staff has the required experience to evaluate your needs and have your window washingfinished in a timely fashion. With that in mind, they will shift most of the credit to the top-notch equipment they use on a daily basis. When you combine the high-quality equipment we use with the window cleaning experience our crew has, it is easy to realize why we receive so much repeat and referral business within Rome, GA. The window washing crew from JT Window Cleaning has the ability to make the process look incredibly easy. Our highly-trained and knowledgeable window washers in addition to our modernized equipment are what allow us to make the process look so easy. This is not to mention that we also price our window cleaning services really competitively as we understand that you want your windows to look just like new without needing to empty your bank account in the act. If you want to obtain the most bang for your buck during your upcoming window cleaning service, you will certainly want to get in touch with the personnel from JT Window Cleaning by calling 866-514-1618 now. How We Will Help You in Rome, GA No one in Rome, Georgia provides a higher degree of customer care for the money than JT Window Cleaning. To start with, our window cleaners will show up in a well-timed manner and work as efficiently as they can when cleaning your windows in Rome, GA. In addition, you will save money when you allow us to handle your window cleaning since we offer the most affordable rates. Lastly, we offer a free window washing consultation to all of our customers within Rome, which allows us to analyze your needs and present you with the most precise price quote. Be sure to call our window cleaning crew from JT Window Cleaning at 866-514-1618 if you want to receive the highest standard of customer care. Exceptional Customer Support in Rome, GA The first advantage of selecting our Rome, GA business is our quick service. You will never have to worry about our window washing staff wasting any of your valuable time since they will arrive promptly and work in the most effective manner. Free Estimate in Rome, GA Most window washing businesses within Rome, GA will offer you a guesstimate regarding your washing demands. Given that this is the scenario, you will typically end up paying more than necessary. At our window cleaning service, we offer a hassle-free consultation to determine your cleaning needs before we provide you with a quote. As a result of taking the time to discuss your personalized window washing needs, we have become the leader. For people with contacts or family in other cities such as Prairie View, TX window cleaning, make them aware that we present solutions all over the United States. Competitive Pricing Guarantee in Rome, GA Many window cleaning agencies in Rome, GA are out to make as much cash as is possible off of each cleaning process. We put things in a different perspective as we choose to do business based on volume rather than how much we can make off of a handful of customers. JT Window Cleaning in Rome, GA is the only window cleaning resource you need if you want the assistance of an expert. We work diligently to make certain that your personal needs are fulfilled for the most economical price. To top it all off, you will never need to wait around on our window washers to show up as we guarantee that we will appear on time and get the project completed as efficiently as possible. Call our team at 866-514-1618 if you wish to receive affordable and prompt service. Katy window cleaning is another location we service thus don’t forget to find out more about the other top notch cities.
This invention relates to an apparatus which is associated with a card, a roller card unit, a cleaner or a similar textile fiber processing machine and serves for advancing the fiber lap to the fiber processing machine. A fiber tuft feeding device, such as a feed chute is associated with the fiber processing machine and is arranged upstream thereof, as viewed in the feed direction of the fiber material. The apparatus includes a feed roller which advances the fiber material to a processing roller at the input of the fiber processing machine. With the feed roller there cooperates a counterelement such as a feed table or a counterroller. According to a known arrangement, between the lower end of the feed chute and the feed roller of the fiber processing machine, such as a carding machine, a transfer element, such as a transfer tray, is arranged for the fiber lap. The transfer element deflects the fiber lap from a vertical orientation (as it leaves the feed chute) into an approximately horizontal position. This change of orientation alters the inner construction of the fiber lap. Further, deflecting, guiding and compressing elements are present which adversely affect the uniformity of the fiber lap.
Researchers tell us that by the time children from low-income homes enter kindergarten, they have heard 30 million fewer words than their more affluent peers. The result of this word deficit is a smaller vocabulary, which leads to slower learning. Children learn words spoken directly to them, and the more words they hear at a very young age, the better prepared they’ll be when they start school. Read More Families that play together build strong relationships. Whether it's reading together, playing board games during cold, blustery days or playing outside in the summer, interacting with young children helps build the strong neural foundation and social-emotional skills they'll need to succeed in school and later in life. Read More Babies are born ready to learn. At birth, the brain contains about 100 billion neurons that are connected by synapses carrying electrochemical signals in response to stimuli from the world around us. During the earliest years, those synapses are firing at an astonishing rate, and they become the neural foundation upon which everything else is built. Read More Science and data drive our work. A child’s ability to learn is built upon a neurological foundation that begins before birth and is largely in place by age 5. The quality of a child’s earliest experiences, interactions and relationships physically shape the neural architecture of the developing brain during those first five years. Read More
The Reserve Bank board has kept its cash rate on hold at a record low of 1.5 per cent for the 13th consecutive month, amid a host of signs that the economy is picking up. Treasurer Scott Morrison told the Coalition party room as the board was meeting that job advertisements were growing strongly, climbing 13 per cent in the past year. Jobs growth was the strongest it had been since 1978, employers' wages bills had climbed 1.2 per cent in the June quarter and non-mining investment had climbed 2.6 per cent. The Australian Bureau of Statistics will provide a full accounting of the June quarter on Wednesday with the release of the national accounts at 11.30am. Market economists are expecting growth of 0.7 to 0.9 per cent, a jump from 0.3 per cent in the March quarter.
Q: ggplot2 + world map = old data? I'm trying to plot a world map using ggplot2. Here is what I have so far: library(ggplot2) world <- map_data("world") ggplot(aes(long, lat, group=group), data=world) + geom_polygon() This works well and is easy to do. Unfortunately, the world map data seems old. For example, countries like Singapore and Czech Republic are missing and instead there are regions like USSR. Any idea how I can get more up to date world map data? sort( unique(world$region) ) [1] "Afghanistan" "Albania" "Algeria" [4] "American Samoa" "Andaman Islands" "Andorra" [7] "Angola" "Anguilla" "Antarctica" [10] "Antigua" "Aral Sea" "Argentina" [13] "Aruba" "Australia" "Austria" [16] "Azores" "Bahamas" "Bahrain" [19] "Bangladesh" "Barbados" "Barbuda" [22] "Belgium" "Belize" "Benin" [25] "Bhutan" "Black Sea" "Bolivia" [28] "Bonaire" "Botswana" "Brazil" [31] "Brunei" "Bulgaria" "Burkina Faso" [34] "Burundi" "California" "Cambodia" [37] "Cameroon" "Canada" "Canary Islands" [40] "Cape Verde" "Caspian Sea" "Cayman Islands" [43] "Central African Republic" "Chad" "Chagos Archipelago" [46] "Chile" "China" "Colombia" [49] "Comoros" "Congo" "Cook Islands" [52] "Costa Rica" "Cuba" "Curacao" [55] "Cyprus" "Czechoslovakia" "Denmark" [58] "Djibouti" "Dominica" "Dominican Republic" [61] "Ecuador" "Egypt" "El Salvador" [64] "Equatorial Guinea" "Ethiopia" "Falkland Islands" [67] "Fiji" "Finland" "France" [70] "French Guiana" "French Polynesia" "Gabon" [73] "Gambia" "Gaza Strip" "Germany" [76] "Ghana" "Great Bitter Lake" "Great Lakes" [79] "Greece" "Greenland" "Grenada" [82] "Guadeloupe" "Guatemala" "Guinea" [85] "Guinea-Bissau" "Guyana" "Haiti" [88] "Hawaii" "Honduras" "Hungary" [91] "Iceland" "India" "Indonesia" [94] "Iran" "Iraq" "Ireland" [97] "Irian Jaya" "Isle of Man" "Isle of Wight" [100] "Israel" "Italy" "Ivory Coast" [103] "Jamaica" "Japan" "Jordan" [106] "Kenya" "Kiribati" "Kuwait" [109] "Lacul Greaca" "Lake Albert" "Lake Fjerritslev" [112] "Lake Kariba" "Lake Malawi" "Lake Pasvikelv" [115] "Lake Tanganyika" "Lake Titicaca" "Lake Victoria" [118] "Laos" "Lebanon" "Lesotho" [121] "Liberia" "Libya" "Liechtenstein" [124] "Luxembourg" "Madagascar" "Madeira Islands" [127] "Malawi" "Malaysia" "Maldives" [130] "Mali" "Malta" "Marshall Islands" [133] "Martinique" "Maug Island" "Mauritania" [136] "Mauritius" "Mexico" "Micronesia" [139] "Monaco" "Mongolia" "Montserrat" [142] "Morocco" "Mozambique" "Myanmar" [145] "Namibia" "Nauru" "Nepal" [148] "Netherlands" "Neutral Zone" "Nevis" [151] "New Caledonia" "New Zealand" "Nicaragua" [154] "Niger" "Nigeria" "North Korea" [157] "Northern Mariana Islands" "Norway" "Oman" [160] "Pakistan" "Panama" "Papua New Guinea" [163] "Paracel Islands" "Paraguay" "Peru" [166] "Philippines" "Pitcairn Islands" "Poland" [169] "Portugal" "Puerto Rico" "Qatar" [172] "Romania" "Rwanda" "Saint Eustatius" [175] "Saint Kitts" "Saint Lucia" "Saint Vincent" [178] "Saint-Barthelemy" "Saint-Martin" "Samoa" [181] "San Marino" "Sao Tome and Principe" "Sardinia" [184] "Saudi Arabia" "Senegal" "Seychelles" [187] "Sicily" "Sierra Leone" "Sin Cowe Island" [190] "Solomon Islands" "Somalia" "Sonsorol Island" [193] "South Africa" "South Korea" "South Sandwich Islands" [196] "Spain" "Spratly Island" "Sri Lanka" [199] "Sudan" "Suriname" "Swaziland" [202] "Sweden" "Switzerland" "Syria" [205] "Tanzania" "Thailand" "Tobago" [208] "Togo" "Tokelau" "Tonga" [211] "Trinidad" "Tunisia" "Turkey" [214] "Turks and Caicos" "Tuvalu" "Uganda" [217] "UK" "United Arab Emirates" "Uruguay" [220] "USA" "USSR" "Vanuatu" [223] "Venezuela" "Vietnam" "Virgin Islands" [226] "Vislinskiy Zaliv" "Wales" "West Bank" [229] "Western Sahara" "Yemen" "Yugoslavia" [232] "Zaire" "Zambia" "Zimbabwe" A: Have you compared it to the database in mapdata? If that's not better, you can use the Global Administration Database, or NOAA's GSHHG database. If you need help dealing with shapefiles, there's a fantastic example from Spatial Analysis (here) that uses ggplot2.
delhi Updated: Jul 04, 2018 14:02 IST One of the many notes recovered from the Burari house show that the family of 11 was preparing for an experience that would be “earth shattering” the moment they hanged themselves to complete their “religious ritual”. A police officer read out the contents of the note as, “Antim samay mein aakhiri ichcha ki poorti ke waqt aasmaan hilega, dharti kaapegi. Uss waqt tum ghabrana mat. Mantro ka jaap badha dena. Main aakar tumhein utaar loonga. Auron ko bhi utaarne mein madad karoonga. (At the last moment and during the fulfilment of the last wish, the sky will move and the earth will tremble. Do not panic at that moment. Chant more vigorously. I will come and bring you drown. I will also help bring down the others)”. The police have inferred that Lalit Bhatia, who is believed to have written all these notes, was referring either to God or his father or a possible outsider who had been dictating the rituals to the family. “It also adds to the theory that the family did not plan to die and were instead hoping to be rescued ,” said an investigator. “Some neighbours are also trying to relate to the earthquake in Delhi on Sunday afternoon to the note’s mention of earth trembling. There is a lot of superstitious talk in the colony ,” said the officer. As police continue to probe the possible role of an oculist or godman, they have started receiving calls from the public offering clues. “One of the calls we received on Tuesday afternoon was from south Delhi’s Jamia Nagar. The caller claimed that he suspected the role of a neighbour who he believed was an occulist. The caller claimed that the Bhatia family was in touch with the occulist. We are probing that but some other similar calls have proved bogus,” said another investigator. Meanwhile, the three-storey building in Sant Nagar continues to draw a host of curious people who click photographs of the house and offered explanations for the deaths and the 11 pipes mysteriously protruding from the building. The relatives and friends of the dead Bhatia family on Tuesday continued to insist that the 11 people were murdered and were not indulging in any ritualistic practices as claimed by the police. “Is it so easy for anyone in a group to convince 10 members to kill themselves,” said Ketan Nagpal, Lalit’s nephew.
Mesmerizing! With a flick of the switch, this rotating music box catches the eye with its luminous crystal moon, starry night or bubbling sea while it fills the room with a lovely version of Pachelbel’s famous Canon. Rotating crystal ball music box creates a unique light pattern on the ceiling as it plays a lovely melody Inset light illuminates crystal ball for 8 to 12 hours Choose a moon, star or bubbling sea crystal ball design on a maple wood base Includes charger See the top 3 reasons you need this crystal ball at the Apollo Box Blog.
#!/usr/bin/env python from __future__ import print_function import sys from datetime import datetime import time import array import struct import os import codecs import dpansf if sys.version_info[0] < 3: input = raw_input class Bye(Exception): pass def collect_screenshot(dest, ser): import Image t0 = time.time() match = b"!screenshot" have = b"X" * len(match) while have != match: have = (have + ser.read(1))[-len(match):] (w, h) = struct.unpack("II", ser.read(8)) print('%dx%d image' % (w, h),) sys.stdout.flush() if 0: imd = ser.read(4 * w * h) im = Image.fromstring("RGBA", (w, h), imd) else: # print [ord(c) for c in ser.read(20)] def getn(): b = ord(ser.read(1)) n = b while b == 255: b = ord(ser.read(1)) n += b # print ' length', n return n imd = "" for y in range(h): print('line', y) prev = 4 * chr(0) d = "" while len(d) < 4 * w: # print ' have', len(d) / 4 d += prev * getn() d += ser.read(4 * getn()) prev = d[-4:] assert len(d) == 4 * w, 'corrupted screen dump stream' imd += d im = Image.fromstring("RGBA", (w, h), imd) (b,g,r,a) = im.split() im = Image.merge("RGBA", (r, g, b, a)) im.convert("RGB").save(dest) took = time.time() - t0 print('took %.1fs. Wrote RGB image to %s' % (took, dest)) # ser.write(b'k') # ser.flush() class TetheredTarget: verbose = True cellsize = 4 def __init__(self, port): self.open_ser(port, 115200) self.searchpath = ['.'] self.log = open("log", "w") self.interpreting = True def open_ser(self, port, speed): try: import serial except: print("This tool needs PySerial, but it was not found") sys.exit(1) self.ser = serial.Serial(port, speed, timeout=None, rtscts=0) def custom(self): self.tex = open("log.tex", "wt") self.texlog(r"\begin{framed}" + '\n') self.texlog(r"\begin{Verbatim}[commandchars=\\\{\}]" + '\n') self.verbose = True def texlog(self, s): self.tex.write(s.replace('\r', '\n')) def listen(self): print('listen') while 1: c = self.ser.read(1) print(repr(c)) def command_response(self, cmd): ser = self.ser # print # print 'cmd', repr(cmd) ser.write(cmd.encode('utf-8') + b'\r') r = [] while True: c = ser.read(max(1, ser.inWaiting())).decode('utf-8') # print 'got', repr(c) r.append(c.replace(chr(30), '')) if chr(30) in c: # print 'full reponse', repr("".join(r)) return "".join(r) def interactive_command(self, cmd = None): ser = self.ser if cmd is not None: ser.write(cmd.encode('utf-8') + b'\r') r = [] while True: if ser.inWaiting() == 0: sys.stdout.flush() c = ser.read(max(1, ser.inWaiting())).decode('utf-8') clean = c.replace(chr(30), '') sys.stdout.write(clean) r.append(clean) if chr(30) in c: r = "".join(r) self.log.write(r) self.texlog(r) self.interpreting = r.endswith(' ok\r\n') return r def include(self, filename, write = sys.stdout.write): for p in self.searchpath: try: incf = codecs.open(p + "/" + filename, "r", encoding = 'utf-8') except IOError: continue for l in incf: # time.sleep(.001) # sys.stdout.write(l) while l.endswith('\n') or l.endswith('\r'): l = l[:-1] if self.verbose: print(repr(l)) if l == "#bye": raise Bye l = l.expandtabs(4) rs = l.split() if rs and rs[0] == 'include': self.include(rs[1]) elif l.startswith('#'): self.shellcmd(l) else: r = self.command_response(l) if r.startswith(' '): r = r[1:] if r.endswith(' ok\r\n'): r = r[:-5] if 'error: ' in r: print('--- ERROR ---') sys.stdout.write(l + '\n') sys.stdout.write(r) raise Bye else: write(r) # print repr(r) self.log.write(r) return print("Cannot find file %s in %r" % (filename, self.searchpath)) raise Bye def serialize(self): l = self.command_response('serialize') return [int(x, 36) for x in l.split()[:-1]] def shellcmd(self, cmd): ser = self.ser if cmd.startswith('#noverbose'): self.verbose = False elif cmd.startswith('#include'): cmd = cmd.split() if len(cmd) != 2: print('Usage: #include <source-file>') else: try: self.include(cmd[1]) except Bye: pass elif cmd.startswith('#flash'): cmd = cmd.split() if len(cmd) != 2: print('Usage: #flash <dest-file>') ser.write(b'\r') else: print('please wait...') dest = cmd[1] d = self.serialize() print('Image is', self.cellsize*len(d), 'bytes') if self.cellsize == 4: if dest.endswith('.hex'): open(dest, "w").write("".join(["%08x\n" % (x & 0xffffffff) for x in d])) else: open(dest, "wb").write(array.array("i", d).tostring()) else: if dest.endswith('.hex'): open(dest, "w").write("".join(["%04x\n" % (x & 0xffff) for x in d])) else: open(dest, "wb").write(array.array("h", d).tostring()) elif cmd.startswith('#setclock'): n = datetime.utcnow() cmd = "decimal %d %d %d %d %d %d >time&date" % (n.second, n.minute, n.hour, n.day, n.month, n.year) ser.write(cmd.encode('utf-8') + b'\r') ser.readline() elif cmd.startswith('#bye'): sys.exit(0) elif cmd.startswith('#invent'): def pp(s): return " ".join(sorted(s)) words = sorted((self.command_response('words')).upper().split()[:-1]) print('duplicates:', pp(set([w for w in words if words.count(w) > 1]))) print('have CORE words: ', pp(set(dpansf.words['CORE']) & set(words))) print('missing CORE words: ', pp(set(dpansf.words['CORE']) - set(words))) print() print(pp(words)) allwords = {} for ws in dpansf.words.values(): allwords.update(ws) print('unknown: ', pp(set(words) - set(allwords))) print('extra:', pp(set(allwords) & (set(words) - set(dpansf.words['CORE'])))) extra = (set(allwords) & (set(words) - set(dpansf.words['CORE']))) for ws in sorted(dpansf.words): s = set(dpansf.words[ws]) if s & set(words): missing = s - set(words) if missing: m = 'Providing names from the \wl{%s} word set' else: m = 'Providing the \wl{%s} word set' print(m % dpansf.ws[ws]) if 0: for w in sorted(extra): ref = allwords[w] part = ref[:ref.index('.')] print('\href{http://forth.sourceforge.net/std/dpans/dpans%s.htm#%s}{\wordidx{%s}}' % (part, ref, w.lower())) elif cmd.startswith('#profile'): p = self.ser.profile() for m in (max(p), max(p) - 1, max(p) - 2): print("max depth", m, "at:") print(" " + " ".join(["%04x" % (2 * i) for i,v in enumerate(p) if (v == m)])) elif cmd.startswith('#time '): t0 = time.time() self.shellcmd(cmd[6:]) t1 = time.time() print('Took %.6f seconds' % (t1 - t0)) elif cmd.startswith('#measure'): ser = self.ser # measure the board's clock cmd = ":noname begin $21 emit 100000000 0 do loop again ; execute\r\n" time.time() # warmup ser.write(cmd.encode('utf-8') + b'\r') while ser.read(1).decode('utf-8') != '!': pass t0 = time.time() n = 0 while True: ser.read(1) t = time.time() n += 1 print("%.6f MHz" % ((2 * 100.000000 * n) / (t - t0))) elif cmd.startswith('#screenshot'): cmd = cmd.split() if len(cmd) != 2: print('Usage: #screenshot <dest-image-file>') ser.write(b'\r') else: dest = cmd[1] ser.write(b'GD.screenshot\r\n') collect_screenshot(dest, ser) ser.write(b'\r\n') elif cmd.startswith('#movie'): cmd = cmd.split() if len(cmd) != 2: print('Usage: #movie <command>') ser.write(b'\r') else: dest = cmd[1] ser.write(b'%s\r' % cmd[1]) for i in xrange(10000): collect_screenshot("%04d.png" % i, ser) ser.write(b'\r\n') else: self.texlog(r"\underline{\textbf{%s}}" % cmd) self.texlog('\n') self.interactive_command(cmd) def texlog(self, s): pass def shell(self, autocomplete = True): try: import readline import os histfile = os.path.join(os.path.expanduser("~"), ".swapforthhist") try: readline.read_history_file(histfile) except IOError: pass import atexit atexit.register(readline.write_history_file, histfile) except ImportError: print('[readline library not found - continuing anyway]') autocomplete = False if autocomplete: words = sorted((self.command_response('words')).split()) print('Loaded', len(words), 'words') def completer(text, state): text = text.lower() candidates = [w for w in words if w.lower().startswith(text)] if state < len(candidates): return candidates[state] else: return None if readline.__doc__ and ('libedit' in readline.__doc__): readline.parse_and_bind("bind ^I rl_complete") else: readline.parse_and_bind("tab: complete") readline.set_completer(completer) readline.set_completer_delims(' ') ser = self.ser while True: try: if self.interpreting: prompt = '>' else: prompt = '+' cmd = input(prompt).strip() self.shellcmd(cmd) except KeyboardInterrupt: print self.interrupt() except EOFError: self.texlog(r"\end{Verbatim}" + '\n') self.texlog(r"\end{framed}" + '\n') break def main(Tethered): port = '/dev/ttyUSB0' image = None r = None searchpath = [] args = sys.argv[1:] while args: a = args[0] if a.startswith('-i'): image = args[1] args = args[2:] elif a.startswith('-h'): port = args[1] args = args[2:] elif a.startswith('-p'): searchpath.append(args[1]) args = args[2:] else: if not r: r = Tethered(port) r.boot(image) r.searchpath += searchpath if a.startswith('-e'): r.shellcmd(args[1]) args = args[2:] else: try: r.include(a) except Bye: pass args = args[1:] if not r: r = Tethered(port) r.boot(image) r.searchpath += searchpath r.shell()
Q: Magento 2 : How to check if we are on a category page or product page? Is there a way I can check that If a user on a category page,or an individual product page in Magento 2? Any help would be greatly appreciated! A: You can try below code it might help you. Inject an instance of \Magento\Framework\App\Request\Http in your class constructor. If you are in a controller you don't need to do it. You can already access it like this $request = $this->getRequest() public function __construct( ... \Magento\Framework\App\Request\Http $request ) { ... $this->_request = $request; } Then you can check if is category or product like this: if ($this->_request->getFullActionName() == 'catalog_product_view') { //you are on the product page } if ($this->_request->getFullActionName() == 'catalog_category_view') { //you are on the category page } A: You can use instance of \Magento\Framework\App\Request\Http in your class constructor. If you are in a controller you don't need to do it. You can already access it like this $request = $this->getRequest() public function __construct( ... \Magento\Framework\App\Request\Http $request ) { ... $this->_request = $request; } Then you can check if is homepage or categorypage or productpage like this: if ($this->_request->getFullActionName() == 'cms_index_index') { //you are on the homepage } if ($this->_request->getFullActionName() == 'catalog_product_view') { //you are on the product page } if ($this->_request->getFullActionName() == 'catalog_category_view') { //you are on the category page } Otherwise directly use in phtml file using object manager $objectManager = \Magento\Framework\App\ObjectManager::getInstance(); $request = $objectManager->get('\Magento\Framework\App\Request\Http'); A: I guess, we can directly use $this->getRequest()->getFullActionName() in .phtml file to get current page action.
The jing and ras1 pathways are functionally related during CNS midline and tracheal development. The Drosophila jing gene encodes a zinc finger protein required for the differentiation and survival of embryonic CNS midline and tracheal cells. We show that there is a functional relationship between jing and the Egfr pathway in the developing CNS midline and trachea. jing function is required for Egfr pathway gene expression and MAPK activity in both the CNS midline and trachea. jing over-expression effects phenocopy those of the Egfr pathway and require Egfr pathway function. Activation of the Egfr pathway in loss-of-function jing mutants partially rescues midline cell loss. Egfr pathway genes and jing show dominant genetic interactions in the trachea and CNS midline. Together, these results show that jing regulates signal transduction in developing midline and tracheal cells.
Q: Set up Jenkins to run a specific maven command I’m new to Jenkins and currently working on a maven project. I am able to run a simple Jenkins job using maven commands. mvn clean install However, the extended requirement requires me to us an additional parameter in the maven command mvn clean install -DfileName=file1 Is it possible to have a drop down with file names (e.g. file1, file2 ..) and have the user selected one append to the maven command. mvn clean install -DfileName = {selected filename from dropdown}. Could some one please assist with this along with what plugin and how can I setup. A: Parameterize your jenkins job see https://wiki.jenkins.io/plugins/servlet/mobile?contentId=34930782#content/view/34930782. Use choice parameter to add your file name choices Active Choices Plugin - https://wiki.jenkins.io/display/JENKINS/Active+Choices+Plugin The user selected choice can be used in your maven command using "{params.param_name}".
Q: ip_rcv (in ip_input.c for ipv4) behaviour in loopback mode So I wanted to put a few printk messages in ip_rcv function to see whether after receiving a packet from a particular IP there is a message printed. I am attaching the entire ip_rcv function which has the printk modifications: int ip_rcv(struct sk_buff *skb, struct net_device *dev, struct packet_type *pt, struct net_device *orig_dev) { const struct iphdr *iph; struct net *net; u32 len; /* When the interface is in promisc. mode, drop all the crap * that it receives, do not try to analyse it. */ if (skb->pkt_type == PACKET_OTHERHOST) goto drop; net = dev_net(dev); __IP_UPD_PO_STATS(net, IPSTATS_MIB_IN, skb->len); skb = skb_share_check(skb, GFP_ATOMIC); if (!skb) { __IP_INC_STATS(net, IPSTATS_MIB_INDISCARDS); goto out; } if (!pskb_may_pull(skb, sizeof(struct iphdr))) goto inhdr_error; iph = ip_hdr(skb); //**PSK's Modification** if (iph->saddr == 0x08080808) printk("\n***PSK: %x IP's message recieved: Google***\n", iph->saddr); if (iph->saddr == 0x0202000A) printk("\n***PSK: %x IP's message recieved: Gateway***\n", iph->saddr); if (iph->saddr == 0x010000FF) printk("\n***PSK: %x IP's message recieved : Home***\n", iph->saddr); /* RFC1122: 3.2.1.2 MUST silently discard any IP frame that fails the checksum. * * Is the datagram acceptable? * * 1. Length at least the size of an ip header * 2. Version of 4 * 3. Checksums correctly. [Speed optimisation for later, skip loopback checksums] * 4. Doesn't have a bogus length */ if (iph->ihl < 5 || iph->version != 4) goto inhdr_error; BUILD_BUG_ON(IPSTATS_MIB_ECT1PKTS != IPSTATS_MIB_NOECTPKTS + INET_ECN_ECT_1); BUILD_BUG_ON(IPSTATS_MIB_ECT0PKTS != IPSTATS_MIB_NOECTPKTS + INET_ECN_ECT_0); BUILD_BUG_ON(IPSTATS_MIB_CEPKTS != IPSTATS_MIB_NOECTPKTS + INET_ECN_CE); __IP_ADD_STATS(net, IPSTATS_MIB_NOECTPKTS + (iph->tos & INET_ECN_MASK), max_t(unsigned short, 1, skb_shinfo(skb)->gso_segs)); if (!pskb_may_pull(skb, iph->ihl*4)) goto inhdr_error; iph = ip_hdr(skb); if (unlikely(ip_fast_csum((u8 *)iph, iph->ihl))) goto csum_error; len = ntohs(iph->tot_len); if (skb->len < len) { __IP_INC_STATS(net, IPSTATS_MIB_INTRUNCATEDPKTS); goto drop; } else if (len < (iph->ihl*4)) goto inhdr_error; /* Our transport medium may have padded the buffer out. Now we know it * is IP we can trim to the true length of the frame. * Note this now means skb->len holds ntohs(iph->tot_len). */ if (pskb_trim_rcsum(skb, len)) { __IP_INC_STATS(net, IPSTATS_MIB_INDISCARDS); goto drop; } iph = ip_hdr(skb); skb->transport_header = skb->network_header + iph->ihl*4; /* Remove any debris in the socket control block */ memset(IPCB(skb), 0, sizeof(struct inet_skb_parm)); IPCB(skb)->iif = skb->skb_iif; /* Must drop socket now because of tproxy. */ skb_orphan(skb); return NF_HOOK(NFPROTO_IPV4, NF_INET_PRE_ROUTING, net, NULL, skb, dev, NULL, ip_rcv_finish); csum_error: __IP_INC_STATS(net, IPSTATS_MIB_CSUMERRORS); inhdr_error: __IP_INC_STATS(net, IPSTATS_MIB_INHDRERRORS); drop: kfree_skb(skb); out: return NET_RX_DROP; } I should get a message printed into the kernel buffer after getting a packet from either Google DNS, my local gateway (10.0.2.2) or loop-back address (127.0.0.1). This is working fine for the DNS and the gateway, but not when I ping localhost or try to run a program which involves back and forth from a localhost. Are there some other kernel function calls that specifically handle packets to localhost, or am I missing something very basic? I thought the loopback packets should trace the same path through the stack as any other packet at least until L3. I would also appreciate if someone briefly explains the handling of loopback traffic along with the answer. System Specs: System- Ubuntu on Virtual Machine Kernel- 4.15.0-70 generic A: I think there is something wrong here: if (iph->saddr == 0x010000FF) Perhaps you mean: if (iph->saddr == 0x0100007F) loopback packets should trace the same path Yep, in general. Investigate more about the details of loopback device. Also you always can operate with some useful tools like trace-cmd. F.e. to see the function graph you can do: trace-cmd record -p function_graph -g net_rx_action Then start ping 127.0.0.1, then stop tracing and watch report like trace-cmd report | vim - Here you can see the "path" and ensure that your localhost pinging eventually falls into ip_rcv().
Q: README extension for Python projects Python packaging tools expect that our readme file should be named README or README.txt. But if we follow this convention, GitHub displays it as plain text in the project page which is not pretty. (unlike the beautiful HTML version when named as README.rst) Is there any technique to make both PyPI and GitHub happy about README. A: PyPI has no requirement that the file is called README or README.txt, so just call it README.rst. In fact, PyPI will not as far as I'm aware look in your package at all (although I could be wrong there, I haven't studied the code or anything), the text that ends up ion the front is the long_description parameter. Then in your setup.py, you do something like this: setup(name='Your module name', version="1.0", description="Whatever, dude.", long_description=open('docs/README.rst', 'rt').read() ) A: A crude way I can think of is to make a symlink to README called README.rst and check them both in. A: You could use a git filter driver which would, on checkout, take your README.md (needed by GitHub) and generate a proper README (needed by Python, although Lennart Regebro's answer suggests that PyPI does not require any README file) So, keeping aside the fact that PyPI doesn't need a README (and the warning could be simply ignored), here is how you could (in general) generate the expected file with Git: However, any modification to that private file README would need to be reported manually to the README.md file (at least because of markdown syntax which no script can guess for you) That is why Noufal Ibrahim's answer (which I upvoted) might be more adapted, especially if you have access to symlinks (I am still with Windows Xp at work, so no luck for me): Having make README being a symlink to README.rst, or, as Arto Bendiken comments: => having README.rst being a symlink ro README. Git will store the symlink (and not the file the symlink refers to), so you can have both README and its README.rst file in your Git repo.
Vol. 213, No. 7, June 27, 2016. https://doi.org/10.1084/jem.20151110 The authors regret that in the original version of their paper, two values for patient 2 in [Table 2](#tbl2){ref-type="table"} were incorrect. The corrected values are red in the table below. ###### Immune phenotype of patient 1, 2, and 3 Patient 1 (6 yr) Patient 2 (8 yr) Patient 3 (2 yr) --------------------------------------------------------------- ------------------ ------------------ ------------------ -------------- ------- ------------ ----- -------------- ------ ------------ ------- -------------- **Lymphocytes** [^a^](#tblfn1){ref-type="table-fn"} 1,855 1,800--5,000 900 1,800--5,000 4,950 2,800--6,400 **B cells** [^a^](#tblfn1){ref-type="table-fn"} 2.0 8.5--20.2 37 296--784 3.8 8.5--20.2 34 296--784 29.9 17.3--30.0 1,480 686--1,732 **CD4** [^a^](#tblfn1){ref-type="table-fn"} 4.0 26.5--41.4 74 641--1,453 24.5 26.5--41.4 220 641--1,453 6.4 28.1--43.2 317 925--2,477 **CD8** [^b^](#tblfn2){ref-type="table-fn"} 45.0 13--47 834 200--1,700 38.3 13--47 345 200--1,700 4.5 9--49 223 200--1,800 **NK cells** [^b^](#tblfn2){ref-type="table-fn"} 6.0 2--31 114 70--590 1.7 2--31 16 70--590 0.9 2--25 45 61--510 **B cell subpopulations** [^a^](#tblfn1){ref-type="table-fn"} ND ND ND ND Transitional 21.1 3.4--9.0 5 13--63 Naive 68.7 47.8--69.8 23 154--413 IgM memory 3.5 6.3--22 2 24--135 IgM only 0.7 2--11.8 1 7--65 IgA cs memory 0 1.1--6.1 0 5--35 IgG cs memory 0 2.7--14 0 13--74 CD21^low^ 6.3 **CD4 subpopulations** [^a^](#tblfn1){ref-type="table-fn"} ND ND ND ND RTE[^c^](#tblfn3){ref-type="table-fn"} 24.4 61--84.2 1 Naive 2.4 55.6--75.8 5 375--1,096 CD45R0 97.5 24--43 T reg cells 2.0 2.3--7.7 5 18--86 cTFH[^d^](#tblfn4){ref-type="table-fn"} 35.0 18.4--29.9 112 51--218 Th~2~ ^+^Th~17~-like cTFH[^d^](#tblfn4){ref-type="table-fn"} 29.4 39.9--66.1 33 26--85 **CD8 subpopulations** [^b^](#tblfn2){ref-type="table-fn"} ND ND ND ND Naive 0.3 16--100 1 42--1,300 Central memory 2.4 1--6 8 6--43 Effector memory 65.9 5--100 227 45--410 Terminally differentiated 1.6 15--41 6 57--340 **γδ T cells** [^e^](#tblfn5){ref-type="table-fn"} ND ND 37.2 \<10 282 12--175 72 \<10 2,217 12--175 **DN T cells** [^e^](#tblfn5){ref-type="table-fn"} 51 38 72 **NK T cells** [^e^](#tblfn5){ref-type="table-fn"} ND ND 0.005 \>0.01 ND ND ND Relative counts are shown as a percentage of parental population. Absolute numbers refer to cells/microliter. CD4 T cell subpopulations: recent thymic emigrants (RTEs), CD31^+^ of CD45RA^+^ CD4 T cells; T reg cells, CD127^−^ CD25hi of CD45RA^−^ CD4 T cells; circulating T follicular helper--like cell (cTFH), CXCR5^+^ of CD45RA^−^ CD4 T cells; Th2/Th17-like cTFH, CXCR3^−^ of CXCR5^+^ CD45RA^−^ CD4 T cells. CD8 T cell populations: naive, CCR7^+^ CD45RA^+^ CD27^+^; terminally differentiated, CCR7^−^ CD45RA^+^ CD27^−^; central memory, CCR7^+^ CD45RA^−^ CD27^+^; effector memory, CCR7^−^ CD45RA^−^ CD27^−^. Double-negative (DN) T cells, CD4^−^/CD8^−^ of CD3 T cells. NK T cells, Vα24 Vβ11 CD3 T cells. cs, class switched. van Gent et al., 2009. Schatorjé et al., 2012. Percentage of naive CD4 T cells. Internal reference value. Internal reference value of CD3 T cells. This has been corrected in the online HTML and PDF versions. The error remains only in the print version.
In vitro anti-inflammatory activity of selected oxalate-degrading probiotic bacteria: potential applications in the prevention and treatment of hyperoxaluria. Oxalate (Ox) is a very common component of the human diet, capable to collect in the renal tissue and bind calcium to form calcium oxalate (CaOx) crystals. A supersaturation of CaOx crystal may cause nephrocalcinosis and nephrolithiasis. The inflammation derived from the CaOx crystal accumulation, together with innate or secondary renal alterations, could strongly affect the renal function. In this case a consumption of probiotics with either oxalate-degrading activity at intestinal level and systemic anti-inflammatory activity could be an alternative approach to treat the subjects with excess of urinary oxalate excretion. 11 strains of lactic acid bacteria (Lactobacilli and Bifidobacteria), already included in the list of bacteria safe for the human use, were investigated for their capability to degrade oxalate by mean of RP-HPLC-UV method and modulate inflammation in an in vitro model system based on peripheral blood mononuclear cells. Four promising bacterial strains (Lactobacillus plantarum PBS067, Lactobacillus acidophilus LA-14, Bifidobacterium breve PBS077, Bifidobacterium longum PBS078) were identified as innovative biological tools for the prevention and the therapeutic treatment of hyperoxaluria and the inflammatory events associated to the Ox accumulation. The oxalate-degrading activity of some probiotics and their capability to modulate the release of inflammation mediators could be exploited as a new nutraceutical and therapeutic approach for the treatment of oxalate accumulation and the related inflammatory state.
extends ../_docs-template block vars - var title = 'Messagebar | Framework7 Documentation'; block content include ../_docs-demo-device .docs-nav include ../_docs-menu .docs-content +improveDocsLink h1 Messagebar ul.docs-index p Framework7 comes with special resizable toolbar for usage with <a href="messages.html">Messages</a> h2 Messagebar Layout p Messagebar layour is pretty simple: :code(lang="html") <div class="toolbar messagebar"> <div class="toolbar-inner"> <div class="messagebar-area"> <!-- messagebar attachments --> <div class="messagebar-attachments">...</div> <!-- messagebar resizable textarea --> <textarea class="resizable" placeholder="Message"></textarea> </div> <a href="#" class="link">Send</a> </div> <!-- messagebar sheet --> <div class="messagebar-sheet">...</div> </div> p Where ul li `messagebar-attachments` - block with messagebar attachments. Optional li `messagebar-sheet` - block with messagebar sheet. Optional p Messagebar place is very important, it should be inside of `page` and right before `page-content`: :code(lang="html") <div class="page"> <!-- navbar --> <div class="navbar">...</div> <!-- messagebar --> <div class="toolbar messagebar">...</div> <!-- page-content/messages-content --> <div class="page-content messages-content"> ... messages </div> </div> h3 Messagebar Sheet Layout p If need additional sheet with, for example, images that we can attach to message then we use extra block designed for this: :code(lang="html") <div class="messagebar-sheet"> <!-- selectable sheet image --> <label class="checkbox messagebar-sheet-image" style="background-image:url(path/to/image1.png)"> <input type="checkbox"> <i class="icon icon-checkbox"></i> </label> <!-- another selectable sheet image --> <label class="checkbox messagebar-sheet-image" style="background-image:url(path/to/image2.png)"> <input type="checkbox"> <i class="icon icon-checkbox"></i> </label> <!-- some custom sheet item --> <div class="messagebar-sheet-item"> <!-- any custom content here --> </div> </div> h3 Messagebar Attachments Layout p Messages attachments block is designed to display currently attached message items/images: :code(lang="html") <div class="messagebar-attachments"> <!-- image attachment --> <div class="messagebar-attachment"> <img src="path/to/image1.png"> </div> <!-- deletable image attachment --> <div class="messagebar-attachment"> <img src="path/to/image2.png"> <!-- attachment delete button --> <span class="messagebar-attachment-delete"></span> </div> </div> h2 Messagebar App Methods p Now, when we have Messagebar' HTML, we need to initialize it. We need to use related App's method: table.methods-table tbody tr td app.messagebar.create(<span>parameters</span>) td Initialize Messagebar with parameters ul.method-parameters li span.parameter parameters | - <span class="parameter-type">object</span> - object with Messagebar parameters li.method-returns Method returns initialized Messagebar instance tr td app.messagebar.destroy(<span>el</span>) td Destroy Messagebar instance ul.method-parameters li span.parameter el | - <span class="parameter-type">HTMLElement</span> or <span class="parameter-type">string</span> (with CSS Selector) or <span class="parameter-type">object</span>. Messagebar element or Messagebar instance to destroy. tr td app.messagebar.get(<span>el</span>) td Get Messagebar instance by HTML element ul.method-parameters li span.parameter el | - <span class="parameter-type">HTMLElement</span> or <span class="parameter-type">string</span> (with CSS Selector). Messagebar element. li.method-returns Method returns Messagebar's instance h2 Messagebar Parameters p Let's look on list of all available parameters: table.params-table thead tr th Parameter th Type th Default th Description tbody tr td el td string<br>HTMLElement td td CSS selector or HTML element of messagebar element (`div class="messagebar"`) tr td textareaEl td string<br>HTMLElement td td CSS selector or HTML element of messagebar textarea element. By default (if not passed) will try to look for `textarea` inside of messagebar tr td maxHeight td number td null td Max height of textarea when it resized depending on amount of its text tr td attachments td array td [] td Array with attachments. For example `['path/to/image1.png', 'path/to/image2.png']` tr td resizePage td boolean td true td Disable if you don't want to resize messages page when messagebar textarea size changed tr td on td object td td p Object with events handlers. For example: :code(lang="js") var messagebar = app.messagebar.create({ el: '.messagebar', on: { change: function () { console.log('Textarea value changed') } } }) tr th(colspan="4") Render functions tr td renderAttachments td function(attachments) td td Function to render attachments block. Must return full attachments HTML string tr td renderAttachment td function(attachment) td td Function to render single attachment. Must return full attachment HTML string h2 Messagebar Methods & Properties p So to create Messagebar we have to call: :code(lang="js") var messagebar = app.messagebar.create({ /* parameters */ }) p After we initialize Messagebar we have its initialized instance in variable (like `messagebar` variable in example above) with helpful methods and properties: table.methods-table tbody tr th(colspan="2") Properties tr td messagebar.el td Messagebar HTML element. tr td messagebar.$el td Dom7 element with messagebar HTML element. tr td messagebar.textareaEl td Messagebar textarea HTML element tr td messagebar.$textareaEl td Dom7 element with messagebar textarea HTML element tr td messagebar.params td Object with passed initialization parameters tr td messagebar.attachments td Array with messagebar attachments tr th(colspan="2") Methods tr td messagebar.getValue(); td Get messagebar textarea value tr td messagebar.setValue(<span>value</span>); td Set messagebar textarea value/text tr td messagebar.clear(); td Clear textarea and update/reset its size tr td messagebar.focus(); td Focus messagebar textarea tr td messagebar.blur(); td Remove focus from messagebar textarea tr td messagebar.setPlaceholder(<span>placeholder</span>) td Set/change messagebar placeholder text tr td messagebar.resizePage() td Force Messagebar to resize messages page depending on messagebar height/size tr td messagebar.attachmentsCreate() td Dynamically create attachments block HTML element tr td messagebar.attachmentsShow() td Show attachments block tr td messagebar.attachmentsHide() td Hide attachments block tr td messagebar.attachmentsToggle() td Toggle attachments block tr td messagebar.renderAttachments() td Render attachments block based on attachments data tr td messagebar.sheetCreate() td Dynamically create messagebar sheet block HTML element tr td messagebar.sheetShow() td Show messagebar sheet tr td messagebar.sheetHide() td Hide messagebar sheet tr td messagebar.sheetToggle() td Toggle messagebar sheet tr td messagebar.destroy(); td Destroy messagebar instance h2 Messagebar Events p Messagebar will fire the following DOM events on messagebar element and events on app and messagebar instance: h3 DOM Events table.events-table thead tr th Event th Target th Description tbody tr td messagebar:change td Messagebar Element<span>&lt;div class="messagebar"&gt;</span> td Event will be triggered after messagebar textarea value changed tr td messagebar:focus td Messagebar Element<span>&lt;div class="messagebar"&gt;</span> td Event will be triggered when messagebar textarea gets focus tr td messagebar:blur td Messagebar Element<span>&lt;div class="messagebar"&gt;</span> td Event will be triggered when messagebar textarea loses focus tr td messagebar:resizepage td Messagebar Element<span>&lt;div class="messagebar"&gt;</span> td Event will be triggered when messagebar resizes messages page tr td messagebar:attachmentdelete td Messagebar attachment element<span>&lt;div class="messagebar-attachment"&gt;</span> td Event will be triggered after click on messagebar attachment delete button tr td messagebar:attachmentclick td Messagebar attachment element<span>&lt;div class="messagebar-attachment"&gt;</span> td Event will be triggered on messagebar attachment click tr td messagebar:beforedestroy td Messagebar Element<span>&lt;div class="messagebar"&gt;</span> td Event will be triggered right before Messagebar instance will be destroyed h3 App and Messagebar Instance Events p Messagebar instance emits events on both self instance and app instance. App instance events has same names prefixed with `messagebar`. table.events-table.double-events-table thead tr th Event th Target th Arguments th Description tbody tr td change td messagebar td(rowspan="2") <span>(messagebar)</span> td(rowspan="2") Event will be triggered after messagebar textarea value changed. As an argument event handler receives messagebar instance tr td messagebarChange td app tr td focus td messagebar td(rowspan="2") <span>(messagebar)</span> td(rowspan="2") Event will be triggered when messagebar textarea gets focus. As an argument event handler receives messagebar instance tr td messagebarFocus td app tr td blur td messagebar td(rowspan="2") <span>(messagebar)</span> td(rowspan="2") Event will be triggered when messagebar textarea loses focus. As an argument event handler receives messagebar instance tr td messagebarBlur td app tr td resizePage td messagebar td(rowspan="2") <span>(messagebar)</span> td(rowspan="2") Event will be triggered when messagebar resizes messages page. As an argument event handler receives messagebar instance tr td messagebarResizePage td app tr td attachmentDelete td messagebar td(rowspan="2") <span>(messagebar, attachmentEl, attachmentIndex)</span> td(rowspan="2") Event will be triggered after click on messagebar attachment delete button. As an argument event handler receives messagebar instance, clicked attachment HTML element and attachment index number tr td messagebarAttachmentDelete td app tr td attachmentClick td messagebar td(rowspan="2") <span>(messagebar, attachmentEl, attachmentIndex)</span> td(rowspan="2") Event will be triggered on messagebar attachment click. As an argument event handler receives messagebar instance, clicked attachment HTML element and attachment index number tr td messagebarAttachmentClick td app tr td beforeDestroy td messagebar td(rowspan="2") <span>(messagebar)</span> td(rowspan="2") Event will be triggered right before Messagebar instance will be destroyed tr td messagebarBeforeDestroy td app h2 Messagebar Auto Initialization p If you don't need to use Messagebar API and your Messagebar is inside of the page and presented in DOM on moment of page initialization then it can be auto initialized with just adding additional `messagebar-init` class to messagebar element, and all required parameters can be passed using `data-` attributes: :code(lang="html") <div class="toolbar messagebar messagebar-init" data-max-height="200"> <div class="toolbar-inner"> <div class="messagebar-area"> <textarea placeholder="Message"></textarea> </div> <a href="#" class="link">Send</a> </div> </div> .important-note p Parameters that used in camelCase, for example <b>maxHeight</b>, in data- attributes should be used in kebab-case as <b>data-max-height</b> +cssVars('messagebar') .with-device h2(data-device-preview="../docs-demos/core/messagebar.html") Examples :code(lang="html") <div class="page"> <div class="navbar"> <div class="navbar-bg"></div> <div class="navbar-inner"> <div class="title">Messages</div> </div> </div> <div class="toolbar messagebar"> <div class="toolbar-inner"> <a class="link toggle-sheet" href="#"> <i class="icon f7-icons if-not-md">camera_fill</i> <i class="icon material-icons md-only">camera_alt</i> </a> <div class="messagebar-area"> <textarea placeholder="Message"></textarea> </div> <a class="link" href="#">Send</a> </div> <div class="messagebar-sheet"></div> </div> <div class="page-content messages-content"> <div class="messages"> ... </div> </div> </div> :code(lang="js") var app = new Framework7(); var $$ = Dom7; // Init Messages var messages = app.messages.create({ ... }); // Init messagebar var messagebar = app.messagebar.create({ el: '.messagebar', attachments: [] }); // Available Images var images = [ 'https://cdn.framework7.io/placeholder/cats-300x300-1.jpg', 'https://cdn.framework7.io/placeholder/cats-200x300-2.jpg', 'https://cdn.framework7.io/placeholder/cats-400x300-3.jpg', 'https://cdn.framework7.io/placeholder/cats-300x150-4.jpg', 'https://cdn.framework7.io/placeholder/cats-150x300-5.jpg', 'https://cdn.framework7.io/placeholder/cats-300x300-6.jpg', 'https://cdn.framework7.io/placeholder/cats-300x300-7.jpg', 'https://cdn.framework7.io/placeholder/cats-200x300-8.jpg', 'https://cdn.framework7.io/placeholder/cats-400x300-9.jpg', 'https://cdn.framework7.io/placeholder/cats-300x150-10.jpg' ] // Create sheet items var sheetHtml = ''; images.forEach(function (image) { sheetHtml += '<label class="checkbox messagebar-sheet-image" style="background-image:url(' + image + ')">' + '<input type="checkbox">' + '<i class="icon icon-checkbox"></i>' + '</label>'; }); $$('.messagebar-sheet').html(sheetHtml); /*======================== Handle Attachments ========================*/ function checkAttachments() { if (messagebar.attachments.length > 0) { messagebar.attachmentsShow(); messagebar.setPlaceholder('Add comment or Send'); } else { messagebar.attachmentsHide(); messagebar.setPlaceholder('Message'); } } $$('.messagebar-sheet-image input').on('change', function (e) { var index = $$(e.target).parents('.messagebar-sheet-image').index(); var image = images[index]; if (e.target.checked) { // Add to attachments messagebar.attachments.unshift(image) } else { // Remove from attachments messagebar.attachments.splice(messagebar.attachments.indexOf(image), 1); } messagebar.renderAttachments(); checkAttachments(); }); messagebar.on('attachmentDelete', function (messagebar, attachmentEl, attachmentIndex) { var image = messagebar.attachments.splice(attachmentIndex, 1)[0]; messagebar.renderAttachments(); checkAttachments(); // Uncheck in sheet var imageIndex = images.indexOf(image); messagebar.$el.find('.messagebar-sheet .checkbox').eq(imageIndex).find('input').prop('checked', false); }); /*======================== Toggle Sheet ========================*/ $$('a.toggle-sheet').on('click', function () { messagebar.sheetToggle(); });
Man crashes into Metro PCS store, injures 5 kgo By ABC7 Archive DALY CITY, CA Around 6 p.m. on Thursday a man drove a car straight into a Metro PCS store at the shopping center. A blue Impala smashed into the front of the store and hit the back of the store when the driver, a 46-year-old man from San Francisco, was pulling into a parking spot. "For some unknown reason he did not break but continued into the path of the store. Initially there was some concern over a possible medical emergency, but there's also some development he may be under the influence of a drug," says Daly City Police Sgt. David Mackriss. Five people were rushed to the hospital including the driver of the car. The driver and four of the people injured inside the store were taken to SF General Hospital and one person was taken to South City Kaiser. Everyone is being treated for minor injuries. One Metro PCS employee appeared to be hurt in the neck and shoulder area. There was a huge response from area firefighters and police to secure the scene and stabilize the people injured from the crash. The Metro PCS store usually closes down around 7 p.m., but it closed immediately after the crash. All other businesses did stay open, despite access to their stores were completely blocked for a few hours. The driver will likely be charged with a DUI as well as causing injuries to others.
Respiratory failure and spontaneous hypoglycemia during noninvasive rewarming from 24.7°C (76.5°F) core body temperature after prolonged avalanche burial. Clinical reports on management and rewarming complications after prolonged avalanche burial are not common. We present a case of an unreported combination of respiratory failure and unexpected spontaneous hypoglycemia during noninvasive rewarming from severe hypothermia. We collected anecdotal observations in a 42-year-old, previously healthy, male backcountry skier admitted to the ICU at a tertiary care center after 2 hours 7 minutes of complete avalanche burial, who presented with a patent airway and a core body temperature of 25.0°C (77.0°F) on extrication. There was no decrease in core body temperature during transport (from 25.0°C [77.0°F] to 24.7°C [76.5°F]). Atrial fibrillation occurred during active noninvasive external rewarming (to 37.0°C [98.6°F] during 5 hours), followed by pulmonary edema and respiratory failure (SaO(2) 73% and PaO(2)/FIO(2) 161 mm Hg), which resolved with endotracheal intubation and continuous positive end-respiratory pressure. Moreover, a marked spontaneous glycemic imbalance (from 22.2 to 1.4 mmol/L) was observed. Despite a possible favorable outcome, clinicians should be prepared to identify and treat severe respiratory problems and spontaneous hypoglycemia during noninvasive rewarming of severely hypothermic avalanche victims.
--------------ofCamera parameters-------------- transformMatrix -0.97676, -0.0130288, 0.213939, 0 0.213327, -0.155834, 0.964473, 0 0.0207731, 0.987696, 0.154992, 0 2.02831, 524.852, 83.2131, 1 fov 60 near 1 far 100000 lensOffset 0, 0 isOrtho 0 --------------ofEasyCam parameters-------------- target 0, 0, 0 bEnableMouseMiddleButton 1 bMouseInputEnabled 0 drag 0.9 doTranslationKey m
Q: Callback inside AJAX success Im trying to add an optional callback inside an AJAX successful execution, but I can't seem to get the callback to run when I want it to. heres and example of my AJAX code function someAjaxFunction(hosturl, callback){ $.ajax({ type: "GET", url: hosturl, data: {'something': 'code' }, dataType: 'json', success: function(html){ var arr = $.map(html, function(val) { return val; }); if(arr[0] != 'false'){ console.log('1'); console.log('2'); if (callback) { console.log('calling the callback') callback(); } console.log('3'); }else{ console.log('fail') } } }); } here is the callback and example of how the AJAX is being executed function thisIsACallBack(){ console.log("i'm a callback"); } someAjaxFunction("some url", thisIsACallBack); If I run this code the console outputs. 1 2 3 i'm a callback I can even remove the callback if-condition all together and I would still get the same output. Also is here a better way to handle my Ajax return currently my response wrapped inside a json object. If the database can't find the object I have to place 'false' inside an array and convert it to a json object before echoing it back to ajax. A: Couse you have to pass your callback as string to your function someAjaxFunction("some url", thisIsACallBack); // <-- Wrong thisIsACallBack will be triggered after someAjaxFunction as some separate function call like this someAjaxFunction("some url", "thisIsACallBack()"); // <- Correct way // Then call eval( callback ); inside Ajax success .... success: function(html){ ... eval( callback ); } your problem was that in case of this code someAjaxFunction("some url", thisIsACallBack); it was triggering someAjaxFunction then thisIsACallBack function as you written someAjaxFunction name not as string UPDATE if you have to pass params to your callback your option is someAjaxFunction("some url", function(param1){ thisIsACallBack(param1) ); } ); ... success: function(html){ ... callback( yourArray ); } JavaScript has many ways how you can pass callbacks depends on your need
Newspaper headlines: Pension pinching and potential tax hikes By BBC News Staff Published duration 22 April 2017 image copyright AFP Many of the papers focus on the Chancellor's plans, if the Conservatives win the general election. The headline in the Financial Times is "Fears of Hammond tax bombshell". The paper says his statement yesterday about "flexibility" prompted alarm in No 10 - with claims from Labour that he was planning a post-election tax rise. The Daily Mirror warns of a "VAT bombshell" which could hit struggling families after 8 June. The Sun is even more critical - saying "No, No, No Prime Minister" - to the possibility of tax rises, an end to the pledge to protect pensions, and a commitment to maintain current levels of spending on foreign aid. It claims the Tories are ready to hit White Van Man - as well "strivers" and OAPs. But the Daily Mail strikes a more positive tone, saying Theresa May has made clear she will not shirk difficult decisions about tax and pensions - and that both her and the Chancellor have made clear that they will not make promises they can't keep. Paris elections The Guardian says the police shooting in Paris has cast a long shadow over the first round of voting in the French presidential election tomorrow. It reports there will be more than 50,000 police officers and 7,000 soldiers on duty for the election. The Daily Mail is one of a number of papers to profile the policeman who was killed. It describes Xavier Jugele, who was 37, as a hero who had rushed to the Bataclan theatre during the attacks in Paris in November 2015. It quotes a colleague describing him as "a sensitive, pleasant man, a man passionate about his job". The Daily Telegraph adds that Mr Jugele - who was shot twice in the head - was gay and in a civil partnership, and had recently adopted a child. US deal with EU The Times claims that Britain has been pushed behind the European Union in the queue to strike a free-trade deal with the United States. It says President Trump has softened his opposition to negotiating with the EU, after attempts to open talks with individual European countries were rebuffed. It quotes a White House source as saying that the Trump administration has now realised that a trade agreement with the EU is more important to US interests than a post-Brexit deal with the UK. The Sun says the general election means there will be delay to what it calls a "controversial" air quality plan that threatens to penalise the drivers of diesel vehicles. It claims the proposals, which are currently being consulted on by the Department for Environment, may not be published until mid-September. It adds that motoring groups are calling for a scrappage scheme to help people with older diesel cars.
// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "base/sys_info.h" #include <ApplicationServices/ApplicationServices.h> #include <CoreServices/CoreServices.h> #include <mach/mach_host.h> #include <mach/mach_init.h> #include <sys/sysctl.h> #include <sys/types.h> #include "base/logging.h" #include "base/stringprintf.h" namespace base { // static std::string SysInfo::OperatingSystemName() { return "Mac OS X"; } // static std::string SysInfo::OperatingSystemVersion() { int32 major, minor, bugfix; OperatingSystemVersionNumbers(&major, &minor, &bugfix); return base::StringPrintf("%d.%d.%d", major, minor, bugfix); } // static void SysInfo::OperatingSystemVersionNumbers(int32* major_version, int32* minor_version, int32* bugfix_version) { Gestalt(gestaltSystemVersionMajor, reinterpret_cast<SInt32*>(major_version)); Gestalt(gestaltSystemVersionMinor, reinterpret_cast<SInt32*>(minor_version)); Gestalt(gestaltSystemVersionBugFix, reinterpret_cast<SInt32*>(bugfix_version)); } // static int64 SysInfo::AmountOfPhysicalMemory() { struct host_basic_info hostinfo; mach_msg_type_number_t count = HOST_BASIC_INFO_COUNT; int result = host_info(mach_host_self(), HOST_BASIC_INFO, reinterpret_cast<host_info_t>(&hostinfo), &count); if (result != KERN_SUCCESS) { NOTREACHED(); return 0; } DCHECK_EQ(HOST_BASIC_INFO_COUNT, count); return static_cast<int64>(hostinfo.max_mem); } // static std::string SysInfo::CPUModelName() { char name[256]; size_t len = arraysize(name); if (sysctlbyname("machdep.cpu.brand_string", &name, &len, NULL, 0) == 0) return name; return std::string(); } } // namespace base
Q: Divide the values of two dictionaries in python I have two dictionaries with the same keys and I would like to do division on the values to update or create a new dictionary, keeping the keys intact, with the quotient as the new value for each of the keys. d1 = { 'a':12 , 'b':10 , 'c':2 } d2 = { 'a':0 , 'c':2 , 'b':5} d3 = d2 / d1 d3 = { 'a':0 , 'b':0.5 , 'c':1 } Aside from iterating through the key, value pairs and creating ordered lists of the values, then dividing, I'm not sure how to do this. I was hoping for a more elegant solution. A: Using viewkeys (python2.7): {k: float(d2[k])/d1[k] for k in d1.viewkeys() & d2} Same in python 3 (where we can drop the float() call altogether): {k: d2[k]/d1[k] for k in d1.keys() & d2} Yes, I am using a key intersection here; if you are absolutely sure your keys are the same in both, just use d2: {k: float(d2[k])/d1[k] for k in d2} And to be complete, In Python 2.6 and before you'll have to use a dict() constructor with a generator expression to achieve the same: dict((k, float(d2[k])/d1[k]) for k in d2) which generates a sequence of key-value tuples. A: This works for all pythons, I would however recommend the solution by @MartijnPieters if have Py 2.7+ >>> d1 = { 'a':12 , 'b':10 , 'c':2 } >>> d2 = { 'a':0 , 'c':2 , 'b':5} >>> d3 = dict((k, float(d2[k]) / d1[k]) for k in d2) >>> d3 {'a': 0.0, 'c': 1.0, 'b': 0.5} A: d1 = { 'a':12 , 'b':10 , 'c':2 } d2 = { 'a':0 , 'c':2 , 'b':5} d3={x:float(d2[x])/d1[x] for x in d1} print d3 output: {'a': 0.0, 'c': 1.0, 'b': 0.5}
Q: Disqus API for getting the list of posts from the forum I am using the Disqus API for getting the list of posts for a particular forum. The url that i am using to get the posts is - 'http://disqus.com/api/3.0/forums/listPosts.json' In the disqus api docs they have provided the parameters that can be passed to the above url. Out of which 'since' is one, which can be used to get all the posts after the specified date. In the api docs they have mentioned that we can use Unix timestamp (or ISO datetime standard) as the value for the 'since' param. I have tried with both types of values but it gives me all the posts i.e. the since constraint is never applied. Can you please help me out to know how to use 'since' param. Thanks !! A: yes the order param is bydefault set to 'desc'...you can get more info on this link: http://disqus.com/api/docs/forums/listPosts/
Q: How to add in a windows form project some columns and header without using databases? How can I make in a c# windows application , columns and header? Like this one: And yes , I would like to dynamically add rows . How can I do that? A: You can use DataTable with DataGridView: DataTable table = new DataTable(); table.Columns.Add("Name", typeof(string)); table.Rows.Add("Johnnie"); // I assume that you've already created dataGridView (in your form) dataGridView.DataSource = table;
All nucleotide sequence information has been published and made available from the Gene bank. Accession numbers: JQ928630, JQ928631, JQ928632, JQ928633, JQ928634, KC191719, KC191721. Introduction {#sec001} ============ There are more than 30000 fish species inhabiting a wide range of aquatic habitats worldwide \[[@pone.0149711.ref001]\], some of them being very important in the global economy and human diet. Moreover, as key integral members of ecosystems, fish are also becoming increasingly important sentinels of environmental health \[[@pone.0149711.ref002]\]. Some fish are also relevant laboratory models for the analysis of different developmental processes in vertebrates. In recent years, as part of the policy to improve fisheries management, the estimation of maturity and sex ratio of fish stocks in European waters has become a fundamental requirement of the European Data Collection Framework (<http://ec.europa.eu/fisheries/cfp/fishing_rules/data_collection/index_en.htm>). Due to the overexploitation of fish from ocean sources some extractive fisheries have reached a plateau or are depleted. The impossibility of fish populations to breed on time is resulting in a significant loss of potential yield. In this scenario, it is imperative to study the reproduction biology of fish stocks, understand the population dynamics and the different changes that can occur in their life history \[[@pone.0149711.ref003]\]. Moreover, as reproduction largely determines productivity and the resilience of populations, it is crucial to estimate the quality and quantity of gametes. These are indicators of the reproductive capacity of commercial fish populations towards scientifically-based fisheries management \[[@pone.0149711.ref003], [@pone.0149711.ref004]\]. Presently, the allocation of maturity and sex in some fish species is laborious and requires a large number of sampled target organisms for visual and/or histological analysis of their gonads \[[@pone.0149711.ref003], [@pone.0149711.ref004]\]. This task is difficult when oceanographic campaigns do not coincide with the spawning season of the species under investigation and their gonads are poorly developed. In addition, many reproductive traits are highly variable and life history parameters (such as maturity at size or age, sex ratio, fecundity and spawning time/fraction) vary between species and populations or temporally within a single population \[[@pone.0149711.ref003], [@pone.0149711.ref004]\]. It should not be overlooked either that sex-determining genetic systems are highly diversified in teleosts: environmental factors play a major role in sex differentiation \[[@pone.0149711.ref001]\]. All of these factors together highlight the importance of studying the molecular and cellular mechanisms that drive sexual differentiation in fish. Most particularly, the growth and maturation of oocytes in females \[[@pone.0149711.ref005], [@pone.0149711.ref006]\] to determine the most efficient way to exploit and conserve different fish stocks. On the other hand, fish biologists are increasingly applying molecular approaches in basic research studies to answer questions related to metabolism, reproduction, vertebrate development or to environmental stress and disease responses \[[@pone.0149711.ref001], [@pone.0149711.ref002], [@pone.0149711.ref007], [@pone.0149711.ref008]\]. Many molecular approaches need that the sex and the developmental stage of the particular individual under study are known, sometimes in the absence of the histological material necessary to obtain this knowledge. In these circumstances a molecular method towards fish sexing, carried out in the same biological material prepared for the specific methodological approaches of interest, would be advantageous \[[@pone.0149711.ref009]\]. Sex differentiation starts when primordial germ cells initiate their differentiation into either female or male germ line stem cells. During gametogenesis, oocytes and spermatozoids undergo diverse molecular and structural changes. Molecular changes during teleost oogenesis, for example, include variations in the level and nature of gene expression and in the accumulation of reserve substances (RNA, proteins, lipids, carbohydrates and hormones) necessary for early embryo development \[[@pone.0149711.ref007]\]. These molecules will be incorporated into the oocytes from surrounding ovarian follicular cells and from other organs such as the liver, which mobilises vitellogenin, a phospholipoprotein that is used in pollution monitoring as a biomarker of exposure to xenoestrogens in males and juveniles \[[@pone.0149711.ref008], [@pone.0149711.ref010]\]. 5S ribosomal RNA (5S rRNA) is the smallest rRNA of the ribosome large subunit in eukaryotic ribosomes. Two types of tandemly-arranged 5S rRNA genes have been described for the anuran *Xenopus laevis*: one is expressed in somatic cells and testes; the other only in oocytes \[[@pone.0149711.ref011], [@pone.0149711.ref012]\]. Similar organization with two paralogue gene classes has been described in fish, such as the tench (*Tinca tinca*), hakes or mullets, amongst others \[[@pone.0149711.ref013]--[@pone.0149711.ref015]\]. Intench, 5S rRNA has been described as constituting, together with tRNAs, 90% of the RNA content of the ovaries \[[@pone.0149711.ref013], [@pone.0149711.ref016]\]. Whilst the precursor of the other ribosomal RNAs, 45S ribosomal RNA (45S rRNA) is transcribed by the RNA polymerase I (Pol I) in the nucleolus, 5S rRNA gene is transcribed by RNA polymerase III (Pol III) \[[@pone.0149711.ref012]\]. The activity of Pol III is regulated positively by the General transcription factor IIIA protein (Gtf3a), which also binds 5S rRNA transcript to assist in its stockpiling in the form of small 7S ribonucleoprotein particles in the cytosol \[[@pone.0149711.ref012], [@pone.0149711.ref017]\]. In the case of being fertilized, the accumulated 5S rRNA molecules are incorporated into the nucleolus to initiate ribosome assembly. Thus, interactions of 5S rRNA with Gtf3a and ribosomal proteins are crucial for the regulation of 5S rRNA biosynthesis \[[@pone.0149711.ref012]\]; this implies that, during expression of 5S rRNA genes in oocytes, a massive accumulation of *gtf3a* transcript occurs \[[@pone.0149711.ref002], [@pone.0149711.ref018]\]. It has been shown that, in early oogenesis, *gtf3a* constitutes more than 10% of the total cytoplasmic protein. This decreases 5--10 folds in later stages \[[@pone.0149711.ref012]\]. Based upon the different gene expression patterns in testis and ovary, these molecules can be diagnostic of the sex of the studied fish \[[@pone.0149711.ref002], [@pone.0149711.ref018]\]. We have shown previously that the accumulation of 5S rRNA and the high transcription levels of accompanying proteins in ovaries permit the identification of sex in thicklip grey mullets during their whole annual reproductive cycle \[[@pone.0149711.ref018]\]. Moreover, as 5S rRNA and *gtf3a* transcript levels in oocytes constitute also strong markers of xenoestrogenicity, identifying intersex testis in mullets inhabiting polluted estuaries \[[@pone.0149711.ref018]\]. It might be suggested that 5S rRNA and *gtf3a* constitute useful sex and oocyte maturity markers in teleost fish \[[@pone.0149711.ref002]\]. Very recently, Espigares et al. \[[@pone.0149711.ref009]\] used the accumulation of 5S rRNA to sex their experimental prepubertal European sea bass in the absence of biological material to carry out any histological analysis. Within this context, the objectives of the present research are centered upon the study of 5S rRNA and *gtf3a* transcript levels as oocyte markers in several commercial teleost fish species captured in the Bay of Biscay (ICES Subareas VIII a, b, c and d; <http://www.fao.org/fishery/area/Area27/en>), then landed in the Basque Country fishing ports. Amongst the most important species in 2013 anchovy and pilchard constituted for the artisanal fleet 57% of the landings and 69% of the income or first sale value. European hake and blue whiting represented, for the bottom trawler fleet, 64% and 70% of the landings and income, respectively. Therefore, these species were chosen for their additional interest as economically relevant species in the Bay of Biscay, and due to the possible implications that studies on their reproduction could have for fisheries stock management. Materials and Methods {#sec002} ===================== Biological samples {#sec003} ------------------ All of the fish samples were obtained in the fish market of Ondarroa immediately after the fish were brought from the sea by commercial vessels that operate on working shifts of one day at sea. Samplings for each species depended on the season in which the different fisheries were open to the commercial fleet ([Table 1](#pone.0149711.t001){ref-type="table"}). The species collected were: Atlantic mackerel (*Scomber scombrus*); Atlantic chub mackerel (*Scomber colias)*; blue whiting (*Micromesistius poutassou*); bogue (*Boops boops*); European anchovy (*Engraulis encrasicolus*); European hake (*Merluccius merluccius*); European pilchard (*Sardina pilchardus*); horse mackerel (*Trachurus trachurus*); and megrim (*Lepidorhombus whiffiagonis*).All individuals were dead on arrival at the harbour; they were kept on ice until dissection within 24 hours following their capture. On each sampling occasion around 20 individuals were measured and weighted, with the gonads being extracted ([Table 1](#pone.0149711.t001){ref-type="table"}). Gonads were weighed and divided into two parts. One part was embedded in RNAlater® (Ambion, Life technologies), frozen in liquid nitrogen and then stored at -80°C until used further. The other part was fixed in 10% neutral buffered formalin containing 1% glutaraldehyde. All chemicals were of analytical grade and were obtained from Sigma-Aldrich (St. Louis, Missouri, USA) unless specified otherwise. 10.1371/journal.pone.0149711.t001 ###### Fish species studied in the present work with common and scientific names, capture locations and dates within the Bay of Biscay, number (n) of sampled individuals, sex ratio and histologically identified gametogenic stage according to the developmental stage of the oocytes in females (PV = previtellogenic, CA = cortical alveoli, AV = advanced vitellogenesis and Hy: hydrated). ![](pone.0149711.t001){#pone.0149711.t001g} Common name Scientific name Origin (ICES Subarea) Capture month \(n\) Sex ratio (F/M) Gametogenic stage ------------------------ ------------------------------ ----------------------- ------------------------------- ------- ----------------- ------------------- Atlantic chub mackerel *Scomber colias* VIII b November 2011 & May 2014 14 8/6 PV Atlantic mackerel *Scomber scombrus* VIII b February 2012 13 7/6 AV Blue whiting *Micromesistius poutassou* VIII c May 2012 15 13/2 PV Bogue *Boops boops* VIII b May 2014 10 8/2 PV European anchovy *Engraulis encrasicolus* VIII c April & May 2012 31 15/16 AV & Hy European hake *Merluccius merluccius* VIII b March 2011 11 7/4 PV European pilchard *Sardina pilchardus* VIII b November 2011 12 7/5 Hy Horse mackerel *Trachurus trachurus* VIII b February 2012 & May 2014 24 7/17 PV Megrim *Lepidorhombus whiffiagonis* VIII b February, May & November 2012 31 26/6 PV, CA & AV Histological analysis {#sec004} --------------------- After 24 hours in the fixative gonads were dehydrated in a graded series of ethanol (70%, 90% and 96%) and embedded in methacrylate resin according to the manufacturer's instructions (Technovit 7100; Heraeus Kulzer GmbH & Co. KG, Wehrheim, Germany). Resin sections (5 μm) were cut in a 2065 Supercut microtome (Leica Instruments GmbH, Nussloch, Germany) andstained with hematoxylin/eosin. Sex and gamete developmental stage were determined microscopically, following the gametogenic stage grading described by McDonough et al \[[@pone.0149711.ref019]\], and adapted for fish species with asynchronous developing gonads ([Table 1](#pone.0149711.t001){ref-type="table"}). Extraction of total RNA, capillary electrophoresis and quantification of 5S/18S rRNA index {#sec005} ------------------------------------------------------------------------------------------ Total RNA was extracted from 50--100 mg of tissue using TRIzol® (Invitrogen, Carlsbad, California, USA) and following the manufacturer´s instructions. Obtained RNA was purified using Qiagen RNeasy kit (Qiagen, California, USA) after a DNase digestion step (RNase-Free DNase Set, Qiagen). After purification, the same amount of RNA (250--500 ng), as estimated through absorbance at 260 nm, (good quality RNA established at 260/280 and 260/230 ratios around 2) was loaded in an Agilent RNA 6000 Nano Kit Bioanalyzer (Agilent Technologies, Santa Clara, California, USA). Electropherograms provided by the Bioanalyzer were used to quantify the concentration of the bands corresponding to 5S rRNA and 18S rRNA in each sample. The Time Corrected Area of each peak was used to calculate the 5S/18S rRNA ratio. When the presence of one of the rRNAs was below the levels of detection of the machine, 5S rRNA in the case of a few males and 18S rRNA in the case of a few females, a 0,1 value was given to each sample instead of 0 (the lowest recordable value was 0,2). The logarithm of the ratio was calculated in order to develop an index that allowed clear visualization of the differences between testes and ovaries. This study was also extended to the gonads of 5 female and 5 male adult zebrafish (*Danio rerio*; UB Tubingen) from our own stock. Zebrafish individuals were euthanized by an overdose of MS-222 (tricaine methane-sulfonate) following the protocol authorised by the ethics commission of the University of the Basque Country CEEA/337-2/2014/ORTIZ ZARRAGOITIA. Gonads were dissected, immersed in RNA Later® (Ambion) and immediately frozen in liquid nitrogen, and stored at -80°C until RNA extraction. These zebrafish samples served as controls, whose RNA profiles could be compared with those extracted from the commercial fish species that were not dissected directly upon capture. *gtf3a* cloning and sequencing {#sec006} ------------------------------ 2 μg of total RNA from each individual gonad were used for cDNA synthesis with AffinityScript Multiple Temperature cDNA Synthesis Kit (Agilent Technologies) using random primers. *gtf3a* mRNA fragments were amplified using conventional PCR and employing 0,8 mM degenerate primers: forward 5´-TGGARGCTCATCTKTGCAAACACAC-3´ and reverse 5´-GTCYCCDCAGGCTYTCCTTCATG-3´. Primers were designed through alignment (Clustalw2, <http://www.ebi.ac.uk/Tools/msa/clustalw2/>) of piscine *gtf3a* sequences available in Ensembl and GenBank and searching for highly conserved nucleotide regions. Properties of designed primers were checked employing the IDT OligoAnalyzer Tool (<https://eu.idtdna.com/calc/analyzer>). The amplification was run with commercial Taq DNA Polymerase, recombinant Kit and 100 mM dNTP Mix (Invitrogen) for 35 cyclesin a 2720 Thermal Cycler (Applied Biosystems, Carlsbad, California, USA). PCR procedure was as follows: 94°C for 2 minutes, denaturation at 94°C for 30 seconds, annealing at 58°C (Tm) for 30 seconds, elongation at 72°C for 8 minutes and finally 72°C for 8 seconds. PCR products were stored at 4°C until they were analysed by electrophoresis in ethidium bromide stained agarose gels (1,5%) and sent to the SGIker Sequencing Service of the University of Basque Country for sequencing. Once sequenced, fragments were aligned to obtain a consensus sequence and analyzed using CAP3 (<http://pbil.univ-lyon1.fr/cap3.php>) and ClustalW2 tools. All sequences obtained have been published in GenBank for Atlantic chub mackerel (JQ928632); Atlantic mackerel (JQ928631), blue whiting (KC191719), European hake (JQ928630), European pilchard (JQ928634), horse mackerel (KC191721) and megrim (JQ928633), and. Real time PCR {#sec007} ------------- cDNA obtained from megrim was quantified in the Synergy HT Multi-Made Microplate Reader (BioTek, Winoosky, USA) by Quant-it^TM^ OliGreen^®^ stain (Invitrogen). The quantification was performed in a reaction volume of 100 μl with a theoretical cDNA concentration range of 0,02--0,2 ng/μL, at 485/20 nm excitation and 528/20 nm emission wavelengths. Real PCR input cDNA concentration was calculated using the high-range standard curve according to the manufacturer's instructions. 5S and 18S rRNA transcript levels were quantified in megrim females by SYBR Green^®^ qPCR (Roche, Basel, Switzerland). qPCR was conducted in triplicates using a 7300 Applied Biosystems Thermocycler (Applied Biosystems). The 20 μl PCR reaction mixture consisted of 10 μl of 2× SYBR® Green PCR master mix, appropriate concentration of 5S and 18S rRNA primers diluted in RNase-free water (final primer concentration: 12,5 nM) and a 2 μl cDNA template. 5S rRNA primers are protected under Spanish patent P201130778 and international patent PCT/ES2012/070343. 18S rRNA primers were: forward 5'-CCTTTTAACGAGGATCCA-3'; and reverse 5'-ACGGCTACCACATCCAA-3' (Tm: 55°C). qPCR procedure was as follows: 50°C for 2 minutes, 95°C 10 minutes, then 40 cycles of denaturation at 95°C for 15 seconds and annealing temperature for one minute. Dissociation stage was added at the end with 95°C for 15 seconds, one minute in annealing temperature, 95°C for 15 seconds and a final step of 60°C for 15 seconds. *gtf3a* transcript levels were quantified also in megrims using Probe \#76 from the Universal Probe Library (Roche) according to the manufacturer's instructions; for 40 cycles and with 500 nM of the specific primers designed in Universal ProbeLibrary Assay Design Center (Roche): forward 5'-CAGCACCAAGAGAAGCGATA-3' and reverse 5'-TGGTTCCTCTTGTTGAAATCC-3', Tm: 60°C. All gene transcription results were normalized with the amount of cDNA charged in the qPCR (input cDNA, \[[@pone.0149711.ref020]\]) using for that a ΔCT formula adapted from the ΔΔCT normalization method: $$RQ = {Log}_{2}\left\lbrack \frac{{(1 + Eficiency)}^{|\Delta CT|}}{ng\ cDNA} \right\rbrack$$ Where Δ*CT* = *CT sample* − *CT plate internal control* Statistical Analysis {#sec008} -------------------- The statistical analyses were undertaken using SPSS (SPSS Inc., Chicago, Illinois). Significant differences in RNA levels between both sexes were evaluated by the non-parametric Mann-Whitney U-test. Significant differences in RNA levels, when ovarian developmental stages (and testis) in megrim were compared, were analysed applying one-way ANOVA. Significant differences between groups, in terms of qPCR gene transcription levels, were evaluated using the non-parametric Jonckhere-Terpstra test when *a priori* ordering was assumed for more than two independent samples (PV\>CA\>AV). In all cases, significant differences were established at *p*\< 0.05. Minimal data set for generation of figures and statistical analysis is provided in [S1](#pone.0149711.s004){ref-type="supplementary-material"} and [S2](#pone.0149711.s005){ref-type="supplementary-material"} Tables. Results {#sec009} ======= 5S rRNA in gonads: identification of sex in teleost fish {#sec010} -------------------------------------------------------- The electropherograms obtained from gonads of commercially-relevant fish species showed different RNA patterns when comparing total RNA extracted from adult testes and ovaries. No signs of RNA degradation, clearly observable in Agilent RNA chips run in the 2100 Bioanalyzer, were observed in any of the samples, In the case of ovaries, the relative 5S rRNA signal was always higher than in the testes. When ovaries presented oocytes in previtellogenic stages the 5S rRNA peak was higher than those of 18S and 28S rRNAs, which are prevailing in all eukaryotic cells ([Fig 1](#pone.0149711.g001){ref-type="fig"}, [S1](#pone.0149711.s001){ref-type="supplementary-material"} and [S2](#pone.0149711.s002){ref-type="supplementary-material"} Figs). The relative amount of 18S and 28S rRNA in ovaries becomes more similar to that of the testis the more advanced they are in the oogenesis process ([Fig 1](#pone.0149711.g001){ref-type="fig"}). ![Representative electropherograms of gonad total RNA of different fish species.\ Electropherograms of gonad total RNA from previously histologically sexed male (bottom) and female (top) Atlantic chub mackerel, European hake, horse mackerel, Atlantic mackerel, European pilchard and European anchovy. Electropherograms and histological micrographs (in all cases scale bars = 200 μm) are representative of all the individuals sampled and analysed per species. Oocytes in ovaries of chub mackerel, hake, and horse mackerels were at previtellogenic stage, in advanced vitellogenesis in Atlantic mackerel and hydrated in the case of pilchard and anchovy. Notice that 5S rRNA in ovaries was relatively the most prominent in the species where ovary only displayed previtellogenic oocytes. Arrows indicate the 5S rRNA peak. \* = 18S rRNA peak, \# = 28S rRNA peak.](pone.0149711.g001){#pone.0149711.g001} 5S/18S rRNA index: identification of oogenesis stage {#sec011} ---------------------------------------------------- The quantification of the concentrations of 5S and 18S rRNA in the electropherograms permitted the calculation of a 5S/18S rRNA index. This index separated males from females in all of the species being studied ([Fig 2](#pone.0149711.g002){ref-type="fig"}), including the model species zebrafish. Zebrafish from our own stock, allowed obtaining freshly prepared gonad samples. Electrophoretic profiles corroborated that profiles observed with RNA extracted from organs harvested from commercial fish species upon collection at the harbour were not the result of RNA degradation. When females were captured during advanced oocyte developmental stages (Atlantic mackerel, Euroepan anchovy and pilchard and zebrafish or) the ratio was significantly lower than in those captured during resting/previtellogenic stages (blue whiting, bogue, chub and horse mackerel, European hake). The index threshold value, which permited sex discrimination, was species and gametogenic stage dependent ([Fig 2](#pone.0149711.g002){ref-type="fig"}). This observation was confirmed in megrim where, as a result of three different samplings, females with oocytes in previtellogenic, in cortical alveoli and in advanced vitellogenic stages were available ([Fig 3](#pone.0149711.g003){ref-type="fig"}). The 5S/18S rRNA index grouped vitellogenic ovaries together and separated them from previtellogenic ones (Figs [2](#pone.0149711.g002){ref-type="fig"} and [3B](#pone.0149711.g003){ref-type="fig"}). Megrims in advanced vitellogenesis showed index levels closest but different to males ([Fig 3B](#pone.0149711.g003){ref-type="fig"}), as a consequence of the appearance of 18S rRNA. Similarly, two different samplings were carried out with anchovies. In both cases, females were captured during the spawning period but, in one case, oocytes were completely mature and index values were closest to those of males. In the other case, oocytes had not yet begun final maturation, with a higher 5S/18S rRNA index ([S3 Fig](#pone.0149711.s003){ref-type="supplementary-material"}). ![5S/18S rRNA index in the gonads of different commercial fish species.\ Red dots identify ovaries and blue dots identify testes. Each dot corresponds to an individual and numbers between parentheses identify the number of individuals analysed per sex. Species are ordered from left (previtellogenic oocytes) to right (hydrated oocytes) as follows: bogue, Atlantic chub mackerel, hake, blue withing, megrim, horse mackerel, zebrafish, Atlantic mackerel, pilchard and anchovy. Female samples for megrim and anchovy displayed ovaries in different developmental stages (see [Fig 3](#pone.0149711.g003){ref-type="fig"} and [S3 Fig](#pone.0149711.s003){ref-type="supplementary-material"}). Index values between both sexes were statistically different in all the 10 species studied (Mann-Whitney, p\< 0,05)](pone.0149711.g002){#pone.0149711.g002} ![Total RNA electropherograms and 5S/18S rRNA index in the gonads of megrims.\ (A) Gonad histology (scale bars = 200 μm) and electropherograms representative of total RNA distribution in megrim ovaries (captured in February, May and November) in different stages of oogenesis (previtellogenesis -PV-, cortical alveoli -CA- and advanced vitellogenesis -AV-). \[FU\] = Fluorescence, \[s\] = Time in seconds. The peak at around 20 seconds corresponds with the Agilent marker. 5S rRNA band appears between 25 and 30 seconds, 18S rRNA band around 40 seconds and 28S rRNA in between 45 and 50 seconds. (B) 5S/18S rRNA index in ovaries in different developmental stages and in testis as quantified from electropherograms. (C) 5S and 18S rRNA index as obtained after qPCR analysis of the levels of transcription of both genes in ovaries in different developmental stages. Numbers between parentheses indicate the number individuals analysed per group. Different letters indicate significant differences among pairs of means (one-way ANOVA, p\<0,05 in B, Jonckheere-Terpstra, p\<0,05 in C).](pone.0149711.g003){#pone.0149711.g003} To corroborate that we were really measuring 5S and 18S rRNA levels in the electropherograms and no anything else, specific transcription was analyzed through qPCR in megrim. The 5S/18S rRNA index generated matched perfectly the results obtained with measurements on electropherograms, distinguishing ovaries on the basis of their gametogenic stage ([Fig 3C](#pone.0149711.g003){ref-type="fig"}). *gtf3a* in commercial fish species; cloning and sex-specific transcript levels {#sec012} ------------------------------------------------------------------------------ Use of degenerate primers permitted the amplification and sequencing of *gtf3a* in ovaries of 7 of the studied fish species using conventional PCR. cDNAs used to obtain these sequences were produced with RNA extracted from ovaries with previtellogenic (Atlantic chub and horse mackerel, blue whiting and hake,), advance vitellogenic (Atlantic mackerel and megrim) and hydrated (pilchard) oocytes. All of the fragments published are 523--707 nucleotides in length ([S3 Table](#pone.0149711.s006){ref-type="supplementary-material"}). *gtf3a* was transcribed strongly in the ovaries in all the species (developmental stages for each species as before and in [Table 1](#pone.0149711.t001){ref-type="table"}), whilst nearly no transcription was detected in testes ([Fig 4A](#pone.0149711.g004){ref-type="fig"}). It was not possible to clone a *gtf3a* orthologue in anchovy and bogue. ![*gtf3a* transcription levels in ovaries and testis of fish.\ (A) Agarose gel electrophoresis of *gtf3a* fragments (around 700 nucleotides in length) amplified in one ovary and one testis through conventional PCR for 35 cycles. a: Atlantic mackerel; b: *chub mackerel*; c: megrim; d: blue whiting; e: hake; f: pilchard; g: horse mackerel. Developmental stages of ovaries as in [Table 1](#pone.0149711.t001){ref-type="table"}, megrim in advanced vitellogenesis. Ø = no template control, L = Standard 100 bp (Invitrogen). (B) Box plots representing *gtf3a* transcript levels in megrim ovaries in different developmental stages (PV = previtellogenic, CA = cortical alveoli, AV = advanced vitellogenesis) and in testis. Numbers between parentheses indicate the number of individuals analysed per group. Different letters indicate significant differences (Jonckheere-Terpstra, p\<0,05) between groups. Data normalized to cDNA ng per sample.](pone.0149711.g004){#pone.0149711.g004} qPCR analysis of *gtf3a* was performed on megrim gonads. The results obtained showed significant differences between females and males ([Fig 4B](#pone.0149711.g004){ref-type="fig"}). Besides, ovaries in previtellogenic and cortical stages presented the highest *gtf3a* transcript levels, coincident with the oogenesis stages in which 5S rRNA production was at its highest and 18S rRNA at its lowest ([Fig 4B](#pone.0149711.g004){ref-type="fig"}). A significant down regulation of g*tf*3a was recorded when ovaries reached advanced vitellogenesis. Discussion {#sec013} ========== The results of the present study revealed marked sex-related differences in 5S rRNA and *gtf3a* transcript levels in gonads of fish species commercially-relevant in the Bay of Biscay, irrespective of their reproductive stage. It has been shown that the electrophoretic analysis of total RNA extracted from gonads is sufficient to identify sex due to the high production and accumulation of 5S rRNA in the oocytes. This approach to sex fish only requires extraction of total RNA and running an electrophoresis so it is cheap, not as skill demanding as expert histological analysis and it requires a minimum amount of tissue. In 7 of these species *gtf3a* was sequenced and its quantification through PCR also permitted sex identification in all of the species analysed. Using this knowledge an index based on the quantification of 5S rRNA and 18S rRNA levels in electropherograms was developed; this allowing non-subjective female gametogenic stage identification in all the studied fish species. 5S rRNA: molecule useful in sex identification {#sec014} ---------------------------------------------- Evidence that 5S rRNA gene is expressed always in higher amounts in ovaries than in testes in fish, independent of gametogenic stage during the seasonal reproductive cycle, was presented firstly in thicklip grey mullets \[[@pone.0149711.ref018]\]. This observation was hypothesised as corresponding to a mechanism to accumulate rRNA intermediates that should be available in the oocyte to, in the event of being fertilised, allow rapid assembly of ribosomes and sustain protein production during early embryo development \[[@pone.0149711.ref002], [@pone.0149711.ref018]\]. It was confirmed here that this observation can be generalized to other teleosts, at least temperate marine fish species plus zebrafish, as 5S rRNA gene was also highly expressed in the ovaries of all of the commercially-relevant fish species that were studied. Therefore, it was confirmed that high levels of 5S rRNA in gonads could be diagnostic of teleost fish sex, identifying females independent of the period within their reproductive cycle and of the species studied. Such a molecular approach could provide an easy tool for the allocation of sex in other fish species, which is otherwise somewhat laborious and not easy when samplings do not coincide with the spawning season \[[@pone.0149711.ref018]\], when enough gonad tissue is not available or when tissue has not been processed for histological analysis \[[@pone.0149711.ref009]\]. For instance, in molecular biology laboratories where transcriptomic studies are carried out, electrophoretic analysis of RNA quality should be standard procedure, giving this additional information on the sex of the fish \[[@pone.0149711.ref009]\]. It should be taken into account though, that this is a post-mortem approach and that requires gonad dissection. Moreover this sexing approach is only effective when sex differentiation has already occurred, as high 5S rRNA transcription is the consequence of having oocytes. 5S rRNA accumulation in fish ovaries has been shown already elsewhere by other authors in different teleost fish \[[@pone.0149711.ref013], [@pone.0149711.ref016]\]. Very recently it was also proved in prepubertal European sea bass \[[@pone.0149711.ref009]\]. This observation might have important implications in transcriptomic studies using fish ovaries. The RNA Integrity Number (RIN), which has become the gold standard method to evaluate total RNA quality \[[@pone.0149711.ref021]\], proves to be not useful to analyze RNA extracted from ovary due to the prevailing presence of 5S rRNA and other small-sized RNA molecules \[[@pone.0149711.ref022]\]. For example, in sea bream (*Diplodus puntazzo*), and due to the presence of prevailing RNA peaks around 100 nucleotides, Manousaki *et al*. \[[@pone.0149711.ref023]\] concluded that it is not possible to use total RNA electrophoresis and the RIN number to estimate the RNA quality in ovaries that are in early developmental stages. Similar conclusion was reached by Kroupova et al. \[[@pone.0149711.ref024]\]. The fish species studied in this work presented different reproductive strategies, which have strong implications in the analysis of their fecundity. Following the classification proposed by Murua *et al*. \[[@pone.0149711.ref004]\] females can be classified as asynchronous indeterminate batch spawners (Atlantic chub and horse mackerels, blue whiting and European anchovy, hake and pilchard,), asynchronous determinate batch spawners (Atlantic mackerel) and group-synchronous batch spawners (megrim). No data are presented here on any synchronous-determined total spawner, but the previous study by Diaz de Cerio *et al*. \[[@pone.0149711.ref018]\] focused on thicklip grey mullet, which presents this reproductive strategy. In all cases, 5S rRNA distinguished males independent of the reproductive strategy. *gtf3a*: sex specific transcription levels {#sec015} ------------------------------------------ *gtf3a* was cloned and sequenced in 7 species of the 9 studied; and its high transcription levels in ovaries in comparison to testes also allowed easy identification of sex. In this way, *gtf3a* could be considered also a potent molecular sex marker for teleost fish. In all of the cells, ribosome biosynthesis monopolizes up to 80% of the cellular transcription activity and requires the synthesis of RNAs by three nuclear RNA polymerases: Pol I, which produces the precursor of 5.8S, 18S and 28S RNAs; RNA polymerase II(Pol II), which produces all mRNAs including those that encode ribosomal proteins; and Pol III, responsible for 5S rRNA gene transcription \[[@pone.0149711.ref025]\]. Activity of Pol III requires Gtf3a, which has the ability to bind both 5S rRNA gene and 5S rRNA itself. Firstly, it recognizes and binds the promoter sequence 5S rRNA gene helping in the assembly of the transcription machinery of Pol III \[[@pone.0149711.ref017]\]. Subsequently, Gtf3a binds 5S rRNA for stockpiling in the cytosol in the form of 7S ribonucleoprotein particles, formed by one molecule of 5S rRNA and one Gtf3a protein molecule \[[@pone.0149711.ref017]\]. While low *gtf3a* levels appear to be a common feature of somatic cells, extremely abundant *gtf3a* transcript levels have been long known in amphibian oocytes \[[@pone.0149711.ref011], [@pone.0149711.ref026]\]. Levels of *gtf3a* mRNA mirror those of 5S rRNA; in *Xenopus these* are about 1 million times higher in oocytes than in somatic cells \[[@pone.0149711.ref017]\]. Consistent with this observation, it has been reported that Gtf3a predominantly binds the oocyte-type and not the somatic-type 5S rRNA in *Xenopus*, even when both sequences only diverge in three nucleotides \[[@pone.0149711.ref011]\]. Moreover, *gtf3a* is overexpressed early in oogenesis, constituting even 10% of the total cytoplasmic protein in anurans, then decreasing 5-10-fold by later stages \[[@pone.0149711.ref017], [@pone.0149711.ref027]\]. Little is known about *gtf3a* transcription dynamics in fish \[[@pone.0149711.ref002]\]. Functional aspects of Gtf3a were studied only in catfish (*Ictalurus punctatus*) oocytes, showing a similar capacity to bind oocytic 5S rRNA \[[@pone.0149711.ref028]\]. Diaz de Cerio *et al*. \[[@pone.0149711.ref018]\] demonstrated, through qPCR analysis for the first time in fish, that *gtf3a* transcriptional regulation resembles that of 5S rRNA in ovaries. Interestingly, *gtf3a* appeared *also* in lists of zebrafish and flounder (*Paralichthys olivaceus*) ovary enriched transcripts \[[@pone.0149711.ref029], [@pone.0149711.ref030]\]. Our qPCR results clearly identified *gtf3a* early expression in megrim oocytes. *gtf3a* transcript levels were at their highest in the early stages of ovary maturation at cortical alveoli stage, decreasing during vitellogenesis, as in *Xenopus* \[[@pone.0149711.ref026]\]. No reference genes were used to normalize the target gene transcription data; instead, the amount of input cDNA per sample was used \[[@pone.0149711.ref009]\]. The traditional qPCR normalization method includes the use of reference or housekeeping genes with presumably invariant levels of transcription in each particular experimental system \[[@pone.0149711.ref031]\]. Ovaries suffer profound changes in terms of cell composition, physiological status, hydration level, or meiotic stage; as such their RNA content differs in amount and composition throughout growth and maturation. No valid reference gene exists in these circumstances. Libus and Štorchová \[[@pone.0149711.ref032]\] and Mittelholzer *et al*. \[[@pone.0149711.ref022]\] proposed the use of total amount of cDNA to normalize qPCR data in fish gonads. In addition, Filby and Tyler \[[@pone.0149711.ref020]\] used also ΔCT method with input cDNA amount for normalisation purposes when studying the usefulness of reference genes in fish ovaries. Also, De Santis and Smiths-Keune \[[@pone.0149711.ref033]\] used cDNA for the normalization of muscle data in barramundi (*Lates calcarifer*). These investigations concluded that this new normalization approach may produce the most biologically-valid results when studying very dynamic tissues where reference genes are not stably expressed. Similar conclusions were reached by other authors when studying different tissues and organs \[[@pone.0149711.ref034], [@pone.0149711.ref035]\]. 5S/18S rRNA index: female developmental stage identification {#sec016} ------------------------------------------------------------ 5S rRNA quantification provides an easy way to sex teleost fish species in a comparative basis (comparing a female and a male individual on the same electrophoresis) \[[@pone.0149711.ref002], [@pone.0149711.ref009], [@pone.0149711.ref017]\]. However, it would be useful to set threshold expression levels to unequivocally identify sex. For this purpose, a 5S/18S rRNA index was developed after quantifying the concentration of 5S and 18S rRNAs in the electropherograms provided by the Bionalyzer RNA nanochips. 18S rRNA was selected for the quantification of the index since 28S rRNA could be more prone to cleavage because of its bigger size. The logarithmic transformation of this ratio allowed improved visualization of the differences between both sexes. The index did not only allow absolute identification of sex without the need of comparing two individuals but also ranking the development stage of the oocytes present in the ovary due to changes in the relative amount of RNA species throughout oogenesis. Kroupova *et al*. \[[@pone.0149711.ref024]\] analyzed in detail the stage-dependent RNA composition in roach (*Rutilus rutilus*) ovaries, concluding also that during primary growth and early cortical alveoli stages smaller-size RNAs were accumulated. In megrim females the index was highest in previtellogenic females and lowest in advanced vitellogenic ones. Thus, a developed 5S/18S rRNA index could constitute a new approach to study the reproductive stage in females, independent of their reproductive strategy. It is true that as 5S rRNA predominated in previtellogenic oocytes this index should work better in identifying the reproductive stage in ovaries with synchronous development. In any case, in the present investigation, where most species studied displayed an asynchronous development with different type of oocytes mixed within the ovary, the index proved to be useful in grading the maturity of females. Thus, the developed index could be of considerable assistance in the characterization of reproductive potential; this is extremely important in the study of fish stocks dynamics \[[@pone.0149711.ref005]\] and fish biology research in general. The data presented here could also contribute to studies of fish fecundity, essential to develop an understanding of the stock and recruitment relationship in fish, or in the assessment of spawning stock biomass. Nowadays, methodological approximations to fish population fecundity studies depend on the spawning strategy of females; likewise, then are very laborious and required skilled histological capabilities \[[@pone.0149711.ref005], [@pone.0149711.ref036], [@pone.0149711.ref037]\]. In any case, the methodology presented here could be a very useful approach for laboratories that use molecular approaches in their research, and that could need of proper identification of sex and reproductive stage of their samples as supporting parameter \[[@pone.0149711.ref009]\]. Why did 5S rRNA and 18S rRNA relative amounts change during the development of the oocytes? {#sec017} ------------------------------------------------------------------------------------------- Previous studies on *Xenopus* have shown that during early previtellogenic stages rRNA genes are amplified to a final content of \~2x10^6^ per oocyte; this provides sufficient rRNA gene templates to produce 1x10^12^ ribosome particles per mature oocyte \[[@pone.0149711.ref038]\]. Despite this amount of rRNA genes, the transcription of 45S rRNA (precursor of 5.8S, 18S and 28S rRNA) takes place at very low levels in previtellogenic stages but increases dramatically in vitellogenic stages. 18S and 28S rRNA transcription occurs in response to the activation of Pol I during vitellogenesis \[[@pone.0149711.ref012]\]. On the contrary, Pol III activity is maximal in the previtellogenic stages in *Xenopus* \[[@pone.0149711.ref012]\]. The results described here, together with those presented for roach ovaries \[[@pone.0149711.ref024]\], would indicate the same trend as in the case of anurans. Ovaries at previtellogenic and cortical alveoli stages would accumulate small-sized RNAs. It could be hypothesised that, during early oogenesis, energetic investment in reproduction takes a decision towards the least energetically demanding production of 5S rRNA. When reproduction is envisaged to occur under favourable conditions, oocyte secondary growth is initiated. The real energetic investment in reproduction commences with the production of the large ribosomal RNA molecules and vitellogenesis. Thus, the 5S/18S rRNA index changed during differentiation, with the inactivation of Pol III activity (observed in megrim as decreased *gtf3a* transcript levels in advanced vitellogenic ovaries) and activation of Pol I at vitellogenesis. Overall, the results presented here confirmed that 5S rRNA and *gtf3a* are useful molecular sex markers in teleost fish; at least in the ones studied to date. Moreover, these molecular markers could be used easily to establish the gonad developmental stage in females. Presently attempts are being made to develop a fish sexing molecular kit, with technological transfer potential, based upon the qPCR assessment of the transcriptl levels of 5S rRNA. This molecular approach could be relevant for the study of basic fish biology \[[@pone.0149711.ref009]\] and for the analysis of fish populations and reproduction dynamics setting management policies to maximize exploitation whilst protecting the spawning potential of the stocks \[[@pone.0149711.ref006]\]. At the same time, it must be considered that different methods to quantify egg production are used to estimate spawning stock biomass, towards the implementation of scientifically-based fisheries management \[[@pone.0149711.ref003], [@pone.0149711.ref037]\]. Further investigations are needed to understand the molecular mechanisms that govern transcription of 5S rRNA and accompanying genes during gametogenesis and sex differentiation in fish. In addition, according to the development stage of ovaries, it will be crucial to understand the relationship between the activation of Pol I and III and the levels of 5S and 18S rRNA. It is also necessary to explore the possibilities to enlarge the scope of teleost fish species (with different reproductive strategies, geographical and habitat distribution, developmental history...) where the 5S/18S rRNA index could be successfully used as in the present work. The present authors consider that the pattern of accumulation of these ribosomal molecules could define the quality of the spawned oocytes, as levels of 5S rRNA can also be measured in in them. In this way, 5S rRNA quantitative analysis could be useful also in determining the quality of reproductive females in aquaculture hatcheries. Finally, 5S/18S rRNA index could be also used to study the environmental xenoestrogenicity and identify intersex individuals, as 5S rRNA levels can identify the presence of oocytes (mainly previtellogenic) in gonads. Supporting Information {#sec018} ====================== ###### Total RNA electrophoresis and electropherograms of 9 blue whitings captured in May 2014. Samples 1 to 7 belonged to females during early oogenesis with previtellogenic oocytes. Only 2 male individuals were available (samples 8 and 9). 5S rRNA predominated in females, while peaks belonging to 18S and 28S rRNA were very small. L: RNA 6000 Nano Kit Ladder. Two micrographs representative of the ovaries and the testes (early gametogenic stages) in the fish studied are shown. Scale bars = 200 μm. (TIF) ###### Click here for additional data file. ###### Total RNA electrophoresis and electropherograms of 9 bogues captured in May 2014. The band belonging to 5S rRNA was clearly observable in females (individuals 1 to 7), where nearly no 18S or 28S rRNA was observed. Only two males were available for the study (individual 8 and 9). All individuals were in an early gametogenic stage, as it could be observed in micrographs of a representative ovary and a testis. L: RNA 6000 Nano Kit Ladder. Scale bars: 200 μm. (TIF) ###### Click here for additional data file. ###### 5S/18S rRNA index in testes and ovaries of anchovies from two samplings. 15 female and 16 male anchovies sampled during the spawning season in April and May 2012. Anchovies normally spawn on the weekly basis for a period of a few months. So upon capture females could present many mature close to hydration oocytes, as it was the case in the sampling carried out in April, or could be initiating a new maturation cycle, as it was the case of the ovaries in May. In this last case less mature oocytes were observed. The 5S/18S rRNA index distinguished ovaries according to the maturation stage; ovaries with less mature oocytes showing highest index values. Males of both samplings are combined to simplify the graph. Different capital letters indicate significant differences between sexes and different lower case letters indicate differences between the two analysed ovary stages (Mann-Whitney, p\<0,005). Scale bars in both micrographs = 200 μm. (TIF) ###### Click here for additional data file. ###### Minimal data set used for the generation of Figs [2](#pone.0149711.g002){ref-type="fig"}, [3](#pone.0149711.g003){ref-type="fig"} and [S3 Fig](#pone.0149711.s003){ref-type="supplementary-material"}. Data provided as required by the journal. (PDF) ###### Click here for additional data file. ###### Minimal data set related to qPCR analyses and used for the generation of Figs [3](#pone.0149711.g003){ref-type="fig"} and [4](#pone.0149711.g004){ref-type="fig"}. Data provided as required by the journal. (PDF) ###### Click here for additional data file. ###### *gtf3a* sequences obtained from the different fish species studied. Table depicts size of amplified and sequenced fragments and e-value through BlastX analysis with the most similar sequences in Genbank. For comparative purposes the *Danio rerio gtf3ab* sequence (NP_001083013) appears in all the cases. (PDF) ###### Click here for additional data file. We thank the technical support of the SGiker Service (UPV/EHU) and the help during dissections of the scientific staff of the consolidated research group "Cell Biology in Environmental Toxicology" in the UPV/EHU. Thanks are due to Prof. Mike Collins for carefully reading the manuscript and helping in the editing and the English. [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: IC IR. Performed the experiments: IR OD GD IC. Analyzed the data: IR OD IC. Contributed reagents/materials/analysis tools: GD IC. Wrote the paper: IR IC.
Q: how to send ioctls to wifi driver using Android Apps I am a system programmer,i put my apps in /system/priv-app and try to interact with the wifi driver.My code able to get the socket fd by adding INTERNET permission in the manifest file. fd = sock = socket(AF_INET, SOCK_DGRAM, 0); res = ioctl(fd,SIOCIWFIRSTPRIV,&buffer); when executed this ioctl using JNI code is returning OPERATION NOT PERMITTED as the error code. But the same thing works when called using a c executable. what should i do? Thanks for first A: i have resolved this problem . I send ioctls to WiFi driver by c program,and another Android Apps communicate with this c program by socket .
Electroconvulsive therapy resolves cortical inhibition and manneristic omissions in a chronic catatonic patient. We investigated a patient with severe catatonic schizophrenia (manneristic catatonia according to Karl Leonhard) treated with electroconvulsive therapy (ECT) after pharmacological approaches did not result in any clinical improvement. Before and after nine ECT sessions a double-pulse transcranial magnetic stimulation (TMS) paradigm was used to measure intracortical inhibition (ICI) which has been shown to be reduced in a significant proportion of patients with schizophrenia. Although the patient showed no remission regarding some psychomotor aspects after ECT, we found an increase in ICI and a remarkable clinical improvement of catatonic omissions which might be due to changes in the GABAergic system.
Items tagged with rootkit Gamers that downloaded the latest update for Capcom’s Street Fighter V are getting quite a bit more than they bargained for — an unsecured rootkit. Redditor LoGicMoTion issued a warning to gamers that the latest update for the Windows version of the game was attempting to gain kernel level access to the operating system. The update puts capcom.sys in your System32 directory and in essence provides backdoor access to your PC, allowing a non-privileged user to run code. “The driver first registers itself using a pseudo-randomly generated name. That's kind of suspicious,” writes extrwi....Read more... It has been suggested that the microprocessors we use each and every day could pack in a bit more than we bargained for; namely, the tools needed for spying or undetectable access. And unfortunately, according to security researcher and developer Damien Zammit, there's a potential reason to be concerned over the "ME" or Management Engine module found in all Intel chipsets manufactured after the Core 2 era. If you've built your own Intel-based PC in recent years, or have at least reinstalled the OS and needed to install all of the drivers on your own, you've probably noticed a piece of software...Read more... When acquiring a new notebook or desktop, one of the first things many power users do is wipe it clean. No one likes the "junk" that comes preinstalled, and if time is available, sometimes it's just preferable to start fresh. But what if that was easier said than done? What if that preinstalled junk became more like a plague, persisting even through a fresh install of Windows? You might think, "That's crazy. Impossible." Well, it is crazy, but it's definitely not impossible. It seems that installing some asinine malware on customer PCs wasn't enough to satisfy Lenovo's insatiable appetite for intrusion,...Read more... There have been many juicy bits of info to come out of this year's Black Hat conference, including hacking into autos, Macs that suffer a Thunderbolt bug, Microsoft boosting its bug bounty, and yet more vulnerabilities relating to Android. But wait - there's more! According to Christopher Domas, a researcher for Battelle Memorial Institute, all of Intel's (and possibly AMD's, and with the exception of its absolute latest) x86-based processors dating back to 1997 are vulnerable to an exploit that could grant someone access to the lowest-level firmware in a PC. The exact target is System Management...Read more... Security firms the world over dream of a day like this, but this one belongs to Kaspersky. The Russian-based firm has discovered the existence of a threat actor that could be linked to the US Government, and NSA in particular. Kaspersky has dubbed the group Equation, as it became clear that the folks involved loved advanced encryption algorithms and other obfuscation techniques. Through its Global Research and Analysis Team (GReAT), Kaspersky has discovered that Equation has itself created advanced malware - dating back to at least the early 2000s - and also had extremely close ties to groups responsible...Read more...
Q: How to make all Builder methods required? I am constructing a car class that has an engine, gearbox, clutch etc. I don't want a bloated constructor that takes 7 parameters, so I decided to use the builder pattern. All the parts are required. However, how do I make the user of the Car class use all the parts' setters, as they are all mandatory? Throw exceptions? public class Car { private Engine engine; private Chassis chassis; private GearBox gearBox; private Coupe coupe; private Exterior exterior; private Interior interior; private Clutch clutch; public Car(Builder builder) { engine = builder.engine; chassis = builder.chassis; gearBox = builder.gearBox; coupe = builder.coupe; exterior = builder.exterior; interior = builder.interior; clutch = builder.clutch; } public static class Builder { private Engine engine; private Chassis chassis; private GearBox gearBox; private Coupe coupe; private Exterior exterior; private Interior interior; private Clutch clutch; private Car build() { return new Car(this); } public Builder setEngine(@NonNull Engine engine) { this.engine = engine; return this; } public Builder setChassis(@NonNull Chassis chassis) { this.chassis = chassis; return this; } public Builder setGearBox(@NonNull GearBox gearBox) { this.gearBox = gearBox; return this; } public Builder setCoupe(@NonNull Coupe coupe) { this.coupe = coupe; return this; } public Builder setExterior(@NonNull Exterior exterior) { this.exterior = exterior; return this; } public Builder setInterior(@NonNull Interior interior) { this.interior = interior; return this; } public Builder setClutch(@NonNull Clutch clutchs) { this.clutch = clutchs; return this; } } } I want the user so call ALL of the builder setters, not an optional subset of them. How do I do that? Is there another way to construct a car without having a huge constructor that takes so many parameters? EDIT: I looked at The builder pattern and a large number of mandatory parameters but there is no solution there that prevents huge constructors. A: Builders are for things where lots of parts are optional or you have many different configurations. The build() method then makes sure that the specific configuration works. A HTML builder makes sense, a string builder not so much. If there are no optional parts, you have these options: Get rid of the builder and use a constructor that requires all parts. Classic solution, least readable and hard to extend. You can throw an exception in the build() method for each missing part. That's a lot of code to write and kind of goes against the pattern. You can add methods with more than a single argument to the builder. That's a mix of the two above. You're still using the builder pattern (so you can easily add more configurations later) but your API also communicates more clearly which parts are mandatory. As an example, you might get an engine in the future which already contains the gearbox or which requires a specific gearbox (i.e. when you use this engine, you also select the gearbox). To implement this, you'd create a second builder method which just asks for the engine and determines the gearbox automatically. Use a factory with protected methods which build the parts. The factory will make sure all parts are supplied to the car. If you want to replace a part, you can override the protected method. This works well if you have lot of defaults and only 2-3 useful configurations. Use several builders. Instead of build everything from individual screws, create your car from larger building blocks: propulsion, interior, body. Create your car from those three with a constructor (three parameters is good). Now you can use three builders to create those three. Try to find a balance between required and optional elements. Chain builders as explained by mlk below. This forces the user to fill in all parts (since you can only call the build() at the end of the chain). Main drawbacks here are: A lot of code to write and hard to follow from the user perspective since the code is spread over many classes. jOOQ is an example here; the project implements the SQL syntax as a chain of builders. Remember what the builder pattern tries to solve: They make it easy to add more parts since all existing code doesn't need to change if the new part is optional. If the new part is mandatory, the builder pattern becomes a liability: With a huge (unreadable) constructor, you get compile errors in all places that needs fixing. The builder will fail at runtime in this case; you need an IDE to find all the places which need fixing. A: If the primary reason for this is to have a fluent API rather than removing a bloated constructor then you could chain builders together: class Engine {} class Door {} class Car { Car(Engine engine, Door door) { } } class CarBuilder { private Engine engine; public CarWithEngineBuilder withEngine(Engine engine) { this.engine = engine; return new CarWithEngineBuilder(); } class CarWithEngineBuilder { private Door door; public CarWithEngineAndDoor withDoor(Door door) { this.door = door; return new CarWithEngineAndDoor(); } class CarWithEngineAndDoor { public Car build() { return new Car(engine, door); } } } } class TestStuff { { Car c = new CarBuilder().withEngine(new Engine()).withDoor(new Door()).build(); } } Or if your main concern is the size of the constructor, maybe the constructor is telling you something, and you could look at the class and see is some parts are logically "together". I.e. are Engine, Gears & Brake are one part of larger component? Should the car be DriveSystem and Chassis (which includes an Exteriorand Interior). Then constructor for Car has a manageable number of parameters, as does DriveSystem and Chassis?
738 P.2d 159 (1987) Fred Vernon BUNCE, Appellant, v. STATE of Oklahoma, Appellee. No. F-84-691. Court of Criminal Appeals of Oklahoma. May 19, 1987. Lisbeth L. McCarty, Asst. Appellate Public Defender, Norman, for appellant. Michael C. Turpen, Atty. Gen., Tomilou Gentry Liddell, Asst. Atty. Gen., Deputy Chief, Crim. Div., Oklahoma City, for appellee. *161 OPINION BUSSEY, Judge: The appellant, Fred Vernon Bunce, was convicted in the District Court of Texas County, Case No. CRF-83-192, of First Degree Rape, and sentenced to twenty years' imprisonment. He was acquitted of the charge of kidnapping. He appeals his conviction raising eight assignments of error. During the trial, J.M. testified that during the early morning hours of November 11, 1983, she was driving around Guymon, Oklahoma after leaving a bar where she had half of a drink. She noticed a car following her and pulled over, turned off her lights and shifted into park to appear to have arrived at home. Her door was opened by Robert Trevino, one of the codefendants, who dragged her out by her hair, punched her twice in the face, and attempted to put her into the appellant's car. After driving a short distance with her legs hanging out, the car was stopped, and Daniel Vizcaino, the other codefendant of the appellant, assisted Trevino in placing J.M. into the car. The appellant was driving. She then testified that Trevino and Vizcaino ripped her clothes off and she was raped first by Trevino, then the appellant, and then Vizcaino. Afterward, as they neared a highway, the engine of the car died. J.M. was allowed to hurriedly dress, was told by Vizcaino that he had a gun and she was forced out of the car. She jumped into a ditch and was followed by Vizcaino. Shortly thereafter, when she looked up she saw a police car behind the disabled car, ran to it, told the officer they were trying to kill her, and was allowed into the backseat. She identified all three men at the trial. Officer Serpe of the Guymon Police Department located the victim's vehicle which had the driver's door open and the motor running. During the trial Dr. Larry Lowery and Lieutenant Wendy Dunham testified to the injuries they observed on J.M., including a black eye swollen shut and bleeding, scratch marks from fingernails down her back to her buttocks, and fresh bruises on her ribs and spine. An O.S.B.I. forensic chemist testified concerning hair samples he analyzed including one pubic hair, which was microscopically consistent with the victim's, found in the appellant's pubic hair. Also one scalp hair consistent with that of the victim was found in the appellant's underwear. Trevino testified that J.M. voluntarily got into the car with them, and consented to sexual intercourse with him, and that Vizcaino also had consensual sexual intercourse with her. He was uncertain as to whether or not the appellant had sexual intercourse with her. As his first assignment of error, the appellant complains that the court erred in failing to suppress evidence obtained as the result of what he claims was an illegal search. During a search of the appellant's car a white tennis shoe, an earring, and approximately fifty hairs were recovered. These were entered into evidence during the trial. The tennis shoe was the mate to the one taken from the victim, the earring belonged to her, and eight of the hairs were identified as having been most likely pulled from her scalp. (Tr. 267). During a suppression hearing, the appellant testified concerning a "confession" which he alleges in his brief was taken under "stressful circumstances." Although the court denied the motion to suppress, the State did not submit the confession as evidence during the trial. After an objection by the appellant to testimony concerning the items recovered from the car, the trial court dismissed the jurors, and held a hearing on the legality of the search because defense counsel argued that the appellant's consent was given so close in time to the allegedly involuntary confession that the consent to search must also be considered illegally obtained. The trial court found that the consent was too remote in time to be tainted by the circumstances surrounding the confession. This Court will not disturb a trial court's ruling concerning motions to suppress evidence where there is competent evidence in the record reasonably tending to support the findings of the trial *162 court. Mahan v. State, 508 P.2d 703 (Okl. Cr. 1973). The record reveals that the consent to search was obtained about five and a half hours after the interrogation resulting in a confession. The record further reveals that the consent and the appellant's rights were carefully explained to him. We find that the record is more than sufficient to support the trial court's ruling. This assignment of error is meritless. As his next assignment of error, the appellant contends that the trial court erred in failing to grant a change of venue. The basis for the motion was pretrial publicity and possible contact of a large number of prospective jurors with the victim or her parents. As we stated in Hammons v. State, 560 P.2d 1024, 1029 (Okl.Cr. 1977): When considering a motion for a change of venue, the presumption of law is that a defendant can get a fair and impartial trial in the county in which the offense charged was committed. The presumption is rebuttable, but the burden of persuasion is upon the defendant. Fry v. State, 91 Okl.Cr. 326, 218 P.2d 643 (1950). A mere showing that pretrial publicity was adverse to the defendant is not enough. Shapard v. State, Okl.Cr., 437 P.2d 565 (1967). The defendant must show by clear and convincing evidence that jurors were specifically exposed to the publicity and that he was thereby prejudiced. Tomlinson v. State, Okl.Cr., 554 P.2d 798 (1976). The granting of a change of venue is a discretionary matter within the powers of the trial court and unless it is clear from the record that the trial court has abused its discretion, or committed error in judgment, this Court will not overrule the trial court, especially where there has been an extensive voir dire examination to determine the prejudicial effect of the pretrial publicity. Shapard v. State, supra. In the case at bar, the trial court stated that no juror expressed any special knowledge of the case although some said that the case had been the subject of newspaper articles and gossip. The judge found that all of the jurors without exception stated that the knowledge would not influence their duties as they had no opinion concerning the guilt or innocence of the defendants. He further noted that defense counsel did not challenge the jurors for cause. The judge then denied the motion for change of venue. We do not find an abuse of discretion and therefore find this assignment of error to be without merit. As a third assignment of error the appellant maintains that his trial should have been severed from that of his codefendants. Although the appellant cites several reasons why the trial should have been severed, only one of them is supported by any argument or authority and therefore we will address that issue alone. See Perez v. State, 614 P.2d 1112 (Okl.Cr. 1980). In that instance, the appellant argues that the pictures taken of the victim and admitted into evidence were prejudicial. Those pictures show the victim with a bruised and swollen eye, partially closed due to swelling, and a scratch on one of her arms. Because the victim testified that one of the other defendants inflicted the injuries, he complains that these pictures could not be introduced against him as they were irrelevant and too prejudicial. We disagree. "`Relevant evidence' means evidence having any tendency to make the existence of any fact that is of consequence to the determination of the action more probable or less probable than it would be without the evidence." 12 O.S. 1981, § 2401. Injuries shown in the picture corroborate the testimony of the victim that she was forced to have sexual intercourse against her will, and that physical force was used against her. The fact that one of the other defendants is the one who actually inflicted the injuries is of no consequence as the appellant was present and an active participant in the crime. Consequently, he was equally culpable. See McDonald v. State, 674 P.2d 1154 (Okl.Cr. 1984). Therefore, even if the trials had been severed, the photographs would have been admissible against the appellant. Finding no abuse of discretion of the trial court, there is no merit in this assignment of error. See Faubion v. State, 569 P.2d 1022 (Okl. Cr. 1977). *163 The appellant next asserts error by the trial court in refusing to order the appearance of an out-of-state witness, or to grant a continuance in order that the witness could appear. The appellant wished to call a character witness, who was the assistant director of a half-way house in Wichita, Kansas, where the appellant had stayed about five months. Defense counsel admitted during the hearing of the motions that the witness was not material to the issue of the appellant's guilt or innocence, but that he would testify concerning the appellant's general reputation, and psychological records kept at the half-way house. Responding to questions from the court, defense counsel could not assure the court that the witness would be qualified to give any psychological information, nor could he assure the court that the acquaintance of the witness with the appellant was recent enough to be relevant. The court then expressed concerns that the witness would be brought from Kansas at great expense and then be unable to testify because he would lack the proper credentials to testify as an expert, and his acquaintance with the witness was too remote from the time of the alleged crimes to be relevant. He denied the motion to order the appearance of the witness, and at a later date denied the motion for continuance. No affidavit was attached to that motion for continuance as required by 12 O.S. 1981, § 668. This Court has consistently held that a motion for continuance must be accompanied by an affidavit for continuance. Nichols v. State, 555 P.2d 70 (Okl.Cr. 1976). The motion to summon an out-of-state witness, and a motion for continuance are within the discretion of the trial court to grant or deny. See 22 O.S. 1981, § 723, and Roberts v. State, 634 P.2d 729 (Okl.Cr. 1981). We do not find any abuse of that discretion. In a fifth assignment of error, the appellant alleges that the trial court committed fundamental error in failing to grant a new trial based upon comments by the prosecutor concerning the appellant's right to remain silent. Appellant cites three instances during the closing argument of the prosecutor where he calls attention to the fact that the appellant did not testify: As I recall in opening statement by the defendants you were told there was going to be an admission as I recall from all three defendants but only one got on and basically [sic] he in their behalf admitted that — he didn't specifically bring it in to Mr. Bunce because he wasn't watching. (Tr. 476). You were told in opening statement by one of the defendants that you were going to hear certain things. You didn't hear from that witness. Remember the opening statement, closing argument is not evidence. It is only what you heard from the witness stand, the evidence introduced by the court and what you remember. (Tr. 505). No. 10 the court tells you for sexual intercourse there must be penetration. Very specifically she answered the question as to each and every defendant. It certainly was not contradicted by the only defendant you heard from. (Tr. 506). We first note that no contemporaneous objection was made to the comments, and therefore any error is deemed waived except that which is fundamental.[1] "Whether the comment rises to fundamental error depends on the particular facts and circumstances of each case." Martin v. State, 674 P.d 37, 41 (Okl.Cr. 1983), cert. denied, 465 U.S. 1081, 104 S.Ct. 1448, 79 L.Ed.2d 767 (1984). In two of the comments quoted above, the prosecutor refers to the opening statement. The opening statement was given by the attorney representing Trevino and Vizcaino. An examination *164 of that statement reveals that counsel referred to what he believed the evidence would show, but did not mention whom, if anyone, the defense intended to call. The admission to which the prosecutor is apparently referring is the statement by the defense counsel that all three codefendants had sexual intercourse with J.M. Appellant's counsel reserved his opening statement, but later waived it. We find no error in the second and third comments quoted. The second is merely reminding the jurors that opening and closing statements are not evidence, and that there were statements made in defense counsel's opening statement which were not the subject of any testimony presented. This is a proper observation for closing argument. See Frazier v. State, 607 P.2d 709 (Okl.Cr. 1980). The third comment addresses the issue of whether sexual intercourse occurred, and the prosecutor argues that the fact that it did occur was uncontradicted. We have frequently held that a statement by the State that its evidence is uncontradicted is not a comment on the part of the prosecution relating to a defendant's failure to testify. Cameron v. State, 561 P.2d 118 (Okl.Cr. 1977). Concerning the first comment quoted above, we find that to be harmless beyond a reasonable doubt. See Bernard v. State, 538 P.2d 1109 (Okl.Cr. 1975) and McGaha v. State, 492 P.2d 1101 (Okl.Cr. 1971) which both quoted from Chapman v. California, 386 U.S. 18, 87 S.Ct. 824, 17 L.Ed.2d 705 (1967). The test for cases such as the one at bar is stated in Chapman as whether there is a reasonable possibility that the comments complained of might have contributed to the conviction. We find they do not. The appellant was charged with kidnapping and first degree rape. He was acquitted on the kidnapping charge, as were his two codefendants. On the rape charge the only controverted issue was the consent of the victim. The testimony of the State's witnesses concerning her injuries, and the photographs entered into evidence overwhelmingly support a lack of consent. The appellant also complains of a comment made by the arresting officer that after he arrested Trevino and Vizcaino and read to them their Miranda rights, they declined to make any statement. The appellant claims that this violation of the rights of his codefendants severely prejudiced him as well, due to their joint trial. The record reveals that the officer's answer was not fully responsive to the question of the prosecutor who was asking about the physical evidence taken from Trevino and Vizcaino. The officer replied that at the police department he warned Trevino of his rights, took his clothes from him and gave him overalls to wear. The officer then asked him if he wanted to make a statement and he said no. Nothing in the answer states that Vizcaino declined to make a statement. No objection was made to this answer, therefore the appellant has waived any error. See Boomershine v. State, 634 P.2d 1318 (Okl.Cr. 1981). As our review of the comments of which the appellant complains reveals no error warranting either reversal or modification of the sentence, and in light of the overwhelming evidence of guilt, we find this assignment of error has no merit. As a sixth assignment of error the appellant complains of prosecutorial comments during closing argument which he argues resulted in invoking societal alarm. None of the comments was preserved by an objection. Therefore none of the alleged errors are preserved for review. Mahorney v. State, 664 P.2d 1042 (Okl.Cr. 1983). Having reviewed the comments for fundamental error and finding no such error, this assignment is meritless. As his seventh assignment of error, the appellant urges that his sentence was excessive. This Court consistently holds that excessiveness of punishment is to be determined by a study of all the facts and circumstances surrounding each individual case, and that we do not have the power to modify a sentence under all these facts and circumstances unless the sentence is so excessive as to shock the conscience of the Court. Dilworth v. State, 611 P.2d 256 (Okl.Cr. 1980). Under 21 O.S. 1981, § 1115, *165 first degree rape is punishable by "death[2] or imprisonment in the penitentiary, not less than five (5) years, in the discretion of the jury... ." As twenty years is well within the limits prescribed by law, we find this assignment of error to be without merit. As his last assignment of error the appellant claims that he received ineffective assistance of counsel. A convicted defendant's claim that counsel's assistance was so defective as to require reversal of a conviction ... has two components. First, the defendant must show that counsel's performance was deficient. This requires showing that counsel made errors so serious that counsel was not functioning as the `counsel' guaranteed the defendant by the Sixth Amendment. Second, the defendant must show that the deficient performance prejudiced the defense. This requires showing that counsel's errors were so serious as to deprive the defendant of a fair trial, a trial whose result is reliable. Unless a defendant makes both showings, it cannot be said that the conviction ... resulted from a breakdown in the adversary process that renders the result unreliable. * * * * * * The defendant must show that there is a reasonable probability that, but for counsel's unprofessional errors, the result of the proceedings would have been different. A reasonable probability is a probability sufficient to undermine confidence in the outcome. Strickland v. Washington, 466 U.S. 668, 104 S.Ct. 2052, 80 L.Ed.2d 674 (1984). He states that the only evidence to support a rape conviction against him is the testimony of the victim, and the "admissions" by his attorney and the attorney representing the codefendants. He claims that his attorney was ineffective because he requested a rape instruction which confessed sexual intercourse, and because he failed to request an instruction on second degree rape. The instruction which admitted sexual intercourse instructed the jury that the defendants claimed that the act was accomplished with the consent of J.M. In reviewing counsel's effectiveness we are required to indulge a strong presumption that counsel's conduct falls within the wide range of reasonable professional assistance. Strickland, 466 U.S. at 690, 104 S.Ct. at 2066. "Counsel's actions are usually based, quite properly, on informed strategic choices made by the defendant and on information supplied by the defendant." Strickland, 466 U.S. at 691, 104 S.Ct. at 2066. A consent defense is certainly within the range of reasonable professional assistance. The position of his attorney concerning the second degree rape instruction is reflected in the transcript. He argued that the State had to meet the burden of proof for first degree rape, or there would be no rape conviction at all. Having heard the evidence, the trial court agreed. We find that the appellant's contention concerning a second degree rape instruction fails in the first component of the Strickland test because he has not shown that his counsel's performance was deficient. This assignment of error is without merit. Accordingly, the judgment and sentence is AFFIRMED. BRETT, P.J., concurs. PARKS, J., concurs in results. NOTES [1] In cases involving prosecutorial comment upon post-arrest silence we have held that where defense counsel fails to object to the improper comments the error is deemed waived unless it rises to the level of fundamental error. Martin, and Harris v. State, 645 P.2d 1036 (Okl. Cr. 1982), cert. denied, 459 U.S. 1069, 103 S.Ct. 487, 74 L.Ed.2d 631 (1982). Similarly, the absence of an objection in cases where a prosecutor comments upon the failure of a defendant to take the witness stand is waived unless the error is fundamental. [2] The Supreme Court of the United States in a plurality opinion has expressed the view that the death penalty is a disproportionate punishment for rape. Coker v. Georgia, 433 U.S. 584, 97 S.Ct. 2861, 53 L.Ed.2d 982 (1977).
Make a left at the big oak tree about a mile down the road. That kind of direction is common in landcapes filled with visual cues. But the Sahara desert is a much tougher place to navigate. Even any footprints you leave get erased as winds massage the sand. Nevertheless, ants in the desert go on searches for food—and once they find it they carry their prize directly back to the nest. In the late 1980’s, researchers discovered that the ants can achieve this impressive feat using a process called path integration. To gauge the direction home, they keep track of the sun's motion across the sky—just like sailors used to do. To calculate the distance, they count their steps. "It's a very hostile environment. They're foraging at the hottest times of the day and it’s a desert, so surface temperatures reach 60 to 70 degrees Celsius." Neurobiologist Matthias Wittlinger from Germany's Ulm University, on the podcast of the journal Science, which published this work. [Sarah E. Pfeffer & Matthias Wittlinger. Optic flow odometry operates independently of stride integration in carried ants.] "And they need to be really quick in finding food, and they really need to be very quick in getting the food back to the nest…they need to be really fast, and they're travelling at speeds of 100 body lengths per second." Wittlinger noticed that sometimes desert ants carry each other. "And here we had this unique opportunity to test traveling ants that are not walking." If they're not walking, then they can't count their steps. So would these ants be able to find their way home? Bees and wasps can’t count their steps, because they fly. Instead, to estimate distance they rely on what’s called optic flow, which tracks how much visual information flows past them while they travel. So, do carried ants also use optic flow? To find out, the researchers waited for an ant to emerge from its nest carrying another. After the pair walked for ten meters, the researchers separated them. And impressively, the carried ant marched straight on back to the nest—but not if their vision was blocked. "So if they were blindfolded while being carried, they have no chance of gaining any distance information." Which proves that they need eyesight—and therefore optic flow—to do it. These critters live in one of the harshest environments on the planet, so it makes sense that evolution endowed them with the tools for path integration and optic flow. “In the case of the desert ant, it’s really important that they’re getting navigation right…if one system fails, you still have a backup system." Because if you’re going to live in the desert you have to be very clever in finding ways to not die in the desert. —Jason G. Goldman [The above text is a transcript of this podcast.]
Rutin attenuates inflammatory responses induced by lipopolysaccharide in an in vitro mouse muscle cell (C2C12) model. White striping (WS) and woody breast (WB) are 2 of the major myopathies in the modern poultry industry. Even though the exact etiology for WS and WB is still unknown, differentially expressed genes in broiler breast muscle affected by WS and WB indicate that oxidative stress and inflammation could be involved in their occurrences. Therefore, it is very important to identify natural compounds with anti-oxidative stress and anti-inflammation properties that can reduce the occurrences of WS and WB in broiler chickens. Rutin is a polyphenol antioxidant that has been reported to be present in several plant extracts. In the current study, we established an in vitro inflammation model by using mouse muscle cells (C2C12) and evaluated the effects of rutin on lipopolysaccharide (LPS)-induced inflammatory responses in the muscle cells. Interleukin 6 (IL-6) secretion was measured by enzyme-linked immunosorbent assay. The mRNA abundance of cytokines and inducible nitric oxide synthase (iNOS) was measured by real-time PCR. Nuclear factor kappa B (NF-κB) activation was detected by electrophoretic mobility shift assay. The results showed that LPS (25 ng/ml) stimulation quickly activated NF-κB and induced significant IL-6 expression on both mRNA and protein levels (P < 0.05) in cells when compared with control cells without the LPS treatment. The rutin treatment decreased IL-6 mRNA abundance induced by LPS in a dose-dependent manner (P < 0.05). LPS-induced tumor necrosis factor-alpha and iNOS gene expression was significantly attenuated by 100 μM of rutin (P < 0.05). Moreover, LPS induced reactive oxygen species (ROS) production, and NF-κB activation was significantly blocked by 100 μM of rutin. These results suggest that rutin can attenuate LPS-induced inflammation in muscle cells and supplementation of rutin or rutin-containing plant extracts may present a promising approach to control WS and WB in broiler chickens.
LITTLE ROCK – The Arkansas Game and Fish Commission set the state’s deer hunting seasons last week, with modern gun deer season opening Nov. 8, archery season opening Sept. 27, and muzzleloader season opening Oct. 18. The deer season dates are part of the 2014-15 general hunting regulations approved during the Commission’s monthly meeting. The commission also approved the harvest of feral hogs only during bear, deer and elk firearms seasons on certain WMAs. The regulation permits some taking of nuisance feral hogs, without promoting the recreational hunting of feral hogs, on Commission-controlled property. In other business, the Commission: *Authorized AGFC Director Mike Knoedl, on behalf of the AGFC, to enter into an agreement to purchase 42 acres on Highway 7 near Jasper. Purchase price of the property is $250,000. The purchase will go forward after an appraisal and review, environmental analysis, survey, title commitment and other due diligence. *Discussed the Cane Creek Lake and Lake Chicot drawdowns and the daily creel limits on the two fisheries. *Authorized AGFC Director Mike Knoedl, on behalf of the AGFC, to enter into an agreement to purchase 959 acres adjacent to the Steve N. Wilson Raft Creek Bottoms Wildlife Management Area near Georgetown in White County. Purchase price of the property is $1.8 million. The purchase will go forward after an appraisal and review, environmental analysis, survey, title commitment and other due diligence. The AGFC has secured $1 million through a North American Wetlands Conservation Act grant to begin the acquisition and has a second NAWCA grant in review that would provide the balance of the anticipated purchase price. *Reviewed the 2013-14 deer harvest. AGFC Deer Program Coordinator Cory Gray told Commissioners that hunters checked 213,199 deer. The harvest is the second highest on record behind the 2012-13 record of 213,487 deer. Compared to last season, the buck harvest decreased slightly from 110,448 to 105,952 while the doe harvest increased from 103,039 to 107,247. *Agreed to execute a quitclaim deed on a 5.72-acre tract of the Gene Rush Buffalo River WMA in Searcy County. A land survey and title search revealed a claim of ownership by Kathryn Rogers superior to AGFC’s interest. The AGFC will quitclaim the land to Rogers. The agency’s title insurance will reimburse the AGFC $2,000 per acre for the loss of the acreage. *Honored 35 AGFC employees for their years of service to the agency. The group represented 430 years of experience. *Arkansas Wildlife Federation President Wayne Shewmake presented the AGFC’s Arkansas Stream Team with the group’s Water Conservationist of the Year award. Stream Team Program Coordinator Steve Filipek, as well as Stream Team coordinators Matthew Irvin and Ben Thesing, accepted the award on behalf of the program. The lesson was made indelible on Good Friday in southeastern Arkansas. Dale Bumpers White River National Wildlife Refuge is the new name of the sprawling complex of bottomland that hosts enormous numbers of migrating waterfowl in addition to year-round denizens ranging from black bear and white-tailed deer to squirrels, alligators, alligator snapping turtles and a plethora of songbirds. The refuge is an Arkansas treasure. Dale Bumpers is an Arkansas treasure. It took an act of Congress to put his name on the refuge, one of just a few in the nation bearing a human label. Arkansas Game and Fish Commission Director Mike Knoedl called Bumpers a legend in the state. “His conservation advocacy will leave an indelible mark on Arkansas for future generations. It is fitting and long overdue that he be honored for his work to preserve this unique region,” Knoedl said. Former U.S. Sen. Bumpers was the architect of an unusual and innovative land swap that greatly increased the size of the refuge. The three-party trade was 41,000-plus acres of Arkansas hardwood bottomlands. transferred from Potlatch Corp. to the U.S. Fish and Wildlife Service. in exchange for 17,000-plus acres of Idaho western pine land transferred from the U.S. Bureau of Land Management to Potlatch. It took place in 1993. Bumpers had leading roles in other Arkansas environmental developments as governor and senator. The battle against channelization of the Cache River turned during his gubernatorial term. The Cache River National Wildlife Refuge, just north of the refuge now bearing his name, was established in 1986 with Bumpers’ actions in Congress. Arkansas State Parks was revitalized and expanded during his governorship. Health issues prevented Bumpers from attending the naming ceremony at refuge headquarters at St. Charles in Arkansas County. Sons Bill and Brent were on hand, along with U.S. Sen. Mark Pryor, USFWS Director Dan Ashe and USFWS Southeast Regional Director Cindy Dohner. He (Bumpers) is a giant among conservationists and a visionary who followed an unconventional path to set aside some of Arkansas’s last wild places, Ashe said. “It is fitting that he will be forever linked with the White River.” After unveiling of a sign with the new name, Ashe and Dohner presented a smaller replica to Bill and Brent Bumpers. Bumpers is a native of the small town of Charleston in western Arkansas. As attorney for its school board in the 1950s, he helped it become the first Southern school to take in black students after the 1954 U.S. Supreme Court integration decision. He defeated incumbent governor Winthrop Rockefeller in 1970, won re-election and went on to four terms, 24 years, as a U.S. senator, retiring in 1999. He’s a member of the Arkansas Outdoor Hall of Fame. Public land elk hunting permit applications available May 1 LITTLE ROCK – If you want to have a chance to bag Arkansas’s largest game animal, then mark May 1 on your calendar. That’s the day the Arkansas Game and Fish Commission open’s up its public elk permit process. The application period is open during the month of May, and both the applications and the 25 available elk permits are free. There are a few requirements. Applicants 16 or older must have a current Arkansas sportsman hunting license or an Arkansas lifetime hunting license. They also must be at least 6 years old to hunt big game in the state - elk, deer, bear and turkey. All applications must be made online on the Arkansas Game and Fish Commission's website, http://www.agfc.com/licenses/pages/permitsspecialelk.aspx. One additional permit for the 2014 hunt is issued to the Rocky Mountain Elk Foundation for fundraising. Eighty-five percent of the proceeds from this granted permit are returned to Arkansas for wildlife habitat work. In addition, a youth permit is given to the Arkansas Game and Fish Foundation and Arkansas Wildlife Federation for fundraising activities. Three permits will be issued to Arkansas residents who complete applications during the Buffalo River Elk Festival at Jasper in late June. For these, the winners must be present. Two hunts, five days each, are scheduled this year – Oct. 6-10, and Oct. 27-Nov. 31. Permit winners will be notified by phone or mail and will receive an information packet by mail. Hunters will be required to attend an elk hunting orientation and training session held the day before the opening of each hunt. Improving elk habitat near the Buffalo River is another benefit of the permit process. Many applicants send donations to the elk program for food plots, prescribed burning and other work in the elk range. A donation is not a requirement for permit application, and a donation does not improve chances of being drawn for a permit. Applications for private land elk hunt permits will be available June 1-July 15. AGFC stocks more than 245,000 fish during March LITTLE ROCK – Fisheries crews from the Arkansas Game and Fish Commission stocked more than 245,000 fish in Arkansas lakes and rivers during March. The total stocking of fish weighed more than 111,000 pounds. Sportfish stocked included trout, catfish, bass and bream.
2448) + 1)) + 1)*-4 - (-1 + sqrt(2448) + sqrt(2448)*-1*-2 + sqrt(2448) + 3*sqrt(2448)*1). -84*sqrt(17) + 17 Simplify ((sqrt(180) + -2*sqrt(180) + sqrt(180) - sqrt(180) - sqrt(180))/sqrt(2)*-1)/(5*sqrt(90)/(sqrt(10)/sqrt(2))). 2*sqrt(5)/5 Simplify (sqrt(65) + (sqrt(65) - -3*sqrt(65))*6 - 4*(sqrt(65) + -1*sqrt(65)))/((sqrt(640)*-1)/((2*sqrt(8) - sqrt(8))*-3)). 75*sqrt(13)/4 Simplify (0 + -6*(-4*1*(-1 + (1*sqrt(475) + 0 - sqrt(475))) + -1))**2. 324 Simplify (sqrt(390)/(sqrt(810)*-3))/(sqrt(33)/(sqrt(11) - sqrt(44)/(-2*sqrt(4)))). -sqrt(13)/18 Simplify ((sqrt(2500) + ((1*sqrt(2500) - sqrt(2500))*1 - sqrt(2500)) - sqrt(2500)) + sqrt(2500) - -2*-1*sqrt(2500))/(-5*-4*sqrt(500)*3). -sqrt(5)/30 Simplify (4 + 0 + sqrt(2736)*2 + sqrt(2736) + -2 + sqrt(2736) + 2 + sqrt(171) + 0 + sqrt(171) + 2)**2. 648*sqrt(19) + 55440 Simplify (sqrt(10) + (sqrt(80)*-4)/sqrt(8) - sqrt(20)/sqrt(2)*5)/((-1*sqrt(72)*-4 + sqrt(72))*-2). 2*sqrt(5)/15 Simplify ((sqrt(75) + 2 + 1 - (sqrt(75) + -2 + sqrt(75) + 1) - (4 + -5 + sqrt(75)*3))*-4)**2. -3200*sqrt(3) + 19600 Simplify (5*-1*((-5*sqrt(140))/sqrt(10))/(sqrt(2) + sqrt(288) + -5*sqrt(288)))**2. 4375/2209 Simplify ((-4 + sqrt(208)/sqrt(4) + sqrt(104)/(4*sqrt(16)/sqrt(2)) + 3)*3)**2. -81*sqrt(13)/2 + 9621/16 Simplify (sqrt(39) - (sqrt(273)*-2)/sqrt(7))/((sqrt(24)/sqrt(2))/sqrt(4)) - (sqrt(52)/(sqrt(4) + (sqrt(4) - sqrt(4)*-1)*5) + 3). -3 + 32*sqrt(13)/11 Simplify (sqrt(1425)*3 - -6*sqrt(2052))/(((sqrt(18) + 1*sqrt(18))/sqrt(3))/(sqrt(32) + sqrt(288) - sqrt(32))). 306*sqrt(19) Simplify ((-5*sqrt(65) - sqrt(65))*-5 + -2*-1*sqrt(65))/(sqrt(80) - (sqrt(80) + (-5*(1*sqrt(80) + sqrt(80)) - sqrt(80)) + sqrt(80)) - 4*-2*sqrt(80)). 4*sqrt(13)/9 Simplify ((4*sqrt(216)*1)/(sqrt(6) - (1*sqrt(294) + sqrt(6))))/(1*sqrt(768)*-3*-2). -sqrt(3)/84 Simplify 4*(-4*(-3*sqrt(700)*-2 + -3 - 2*sqrt(700)*6*-3))**2. -161280*sqrt(7) + 79027776 Simplify (-5*(1*((sqrt(242) + 0 + 3 + sqrt(242) + sqrt(242) - sqrt(242)) + (sqrt(242) - 1*sqrt(242))*2 + sqrt(242)) + 2) + 3)**2. 7260*sqrt(2) + 54934 Simplify ((sqrt(68) - (1*sqrt(68)*1 + sqrt(68))) + sqrt(68))/(2*sqrt(484)) + (((sqrt(1377) + -1 + -2 - sqrt(1377) - sqrt(1377)) + sqrt(1377))*6)**2. 324 Simplify (1*sqrt(66)*-2)/(sqrt(486)*-2)*-4 - (3*(sqrt(1100) + 3)**2 + 5*(3 + sqrt(1100))). -3342 - 2074*sqrt(11)/9 Simplify 1 + (sqrt(17) - sqrt(119)/sqrt(7)) + sqrt(17) + sqrt(1377) + sqrt(1377)*-4 + sqrt(272) + 3 + sqrt(272) + sqrt(17) + sqrt(68)/sqrt(4) + 0. -16*sqrt(17) + 4 Simplify ((sqrt(300)/sqrt(5)*4 - sqrt(660)/(sqrt(396) - sqrt(11)))/((sqrt(972) - (sqrt(972) - (-4*sqrt(972) + sqrt(972) + sqrt(972))*-6))*-2))**2. 361/233280 Simplify 2*(-2*(4*sqrt(2) + sqrt(2)) + (0 + sqrt(2))*1 - (-3 + -4*sqrt(14)/sqrt(175)))**2. -492*sqrt(2)/5 + 7174/25 Simplify -6*(-5*(-3*(sqrt(1216) + 1) + 4 + 5*(sqrt(1216) - (sqrt(1216) - 1*(sqrt(1216) - (sqrt(1216) + -2))))) + -3)**2. -1661784 + 83520*sqrt(19) Simplify (1*2*sqrt(190)*6)/((sqrt(100) - (5*3*sqrt(100) + sqrt(100)))/sqrt(10)). -4*sqrt(19)/5 Simplify -4*(-4 + (sqrt(60) - sqrt(300)/(sqrt(5)*3))/(sqrt(108) - (sqrt(108)*4 - sqrt(108) - sqrt(108)) - sqrt(108)) + -2) + -5. 4*sqrt(5)/9 + 19 Simplify -4 + (-2*-4*(sqrt(1900) + sqrt(1900) + 1*sqrt(1900))*2 + -5)**2*-1. -4377629 + 4800*sqrt(19) Simplify ((-3 + (sqrt(7920) + 1*sqrt(7920) + sqrt(7920))/(sqrt(33)/sqrt(108)) + 1)*3 + 5)**2. -1296*sqrt(5) + 2099521 Simplify (-4 + (sqrt(2448) - -1*sqrt(2448)) + sqrt(2448) + -4 + 5 + sqrt(2448) + sqrt(2448)*3*6 + 0)**2. -1584*sqrt(17) + 1184841 Simplify 2*(-4*(1*(sqrt(1300)*-1 + sqrt(1300)) + 2 + 4)**2 + 1)*3. -858 Simplify 0 + (sqrt(216)/(-2*sqrt(8)) + sqrt(27) + (sqrt(108)/sqrt(4) + sqrt(27))*-3 + sqrt(27))/(sqrt(9)*-3*-2 + sqrt(36)/(sqrt(16)/sqrt(4))). -9*sqrt(3)/14 Simplify ((3*sqrt(2450) + sqrt(2450))*3*6)/(sqrt(1210) + (2*sqrt(1210)*-2 - sqrt(1210)) - sqrt(1210)*-2*3). 252*sqrt(5)/11 Simplify -6*(1 + 5*(sqrt(5) - (sqrt(5) + -1)) + 3 + 2 + sqrt(50)/(1*sqrt(40)))**2. -1467/2 - 66*sqrt(5) Simplify 2 + (((sqrt(325) + 0)*5 - sqrt(325)) + -5)**2*4*6 + 4. -4800*sqrt(13) + 125406 Simplify 3*((sqrt(25) + -2*sqrt(25)*-1)/(sqrt(5) + sqrt(60)/(sqrt(12)*2) - sqrt(5)) - ((sqrt(385)/(sqrt(275) - sqrt(11)))/(-2*sqrt(567)))**2). -5/1728 + 18*sqrt(5) Simplify (((sqrt(1584)*-1 + sqrt(1584))*-5 + sqrt(1584))*-1 + 1)**2 + -4 + (-1*sqrt(1584)*-2 - 6*(sqrt(1584) + -1*sqrt(1584)))**2. -24*sqrt(11) + 7917 Simplify -1*((-6*sqrt(44)/(sqrt(4) - (sqrt(24)/sqrt(6) - sqrt(4))) + 3)**2 + 4)*2. -818 + 72*sqrt(11) Simplify (5*(5 + -5 + sqrt(153)/(sqrt(576) - -2*sqrt(576)) + (-5*(sqrt(170) + (sqrt(170) - sqrt(170)*2)))/(sqrt(10) + -1*sqrt(250))))**2. 425/576 Simplify -5*5*(1 + (-4*-2*sqrt(468)*-3)**2*-1). 6739175 Simplify -3 + (sqrt(720) - (-5 + sqrt(720) + sqrt(720)*3))**2 - (4 + ((sqrt(300)/sqrt(250))/sqrt(6))**2). -360*sqrt(5) + 32489/5 Simplify ((sqrt(108)*3 + 0)*6 - 1*(sqrt(3) + sqrt(75) + -1)*1)**2. 204*sqrt(3) + 31213 Simplify (6*(sqrt(300) + 2 + sqrt(300) + sqrt(300) + sqrt(300)) + 5 + (sqrt(300)*-1 + sqrt(300))*-2 + 3)**2*6. 57600*sqrt(3) + 1039200 Simplify -2 + -5*((sqrt(2448) + 3)*6 - -4*sqrt(2448)*1) + 4. -600*sqrt(17) - 88 Simplify ((sqrt(128)/sqrt(4) + sqrt(8) + sqrt(8)*-2*3)*1)/(sqrt(4) + (sqrt(16)/sqrt(4) + sqrt(4))*3 - 5*(sqrt(4) + sqrt(16)/sqrt(4))) + 3. sqrt(2) + 3 Simplify 4 + ((3 + (1*sqrt(1053) + -2)*-4)**2 - (((sqrt(1053) + -1)*2)**2 + (sqrt(1053) + 0)**2*2)). -720*sqrt(13) + 10651 Simplify (-3*((sqrt(800) + 1 + 0)*3 + (sqrt(800) + 5*sqrt(800) + 2)*1))**2. 16200*sqrt(2) + 583425 Simplify (5 + sqrt(243)/(sqrt(9) + (sqrt(9) - (sqrt(9)*2 - sqrt(9)))))**2 + (-1 + sqrt(432) - sqrt(33)/(-2*sqrt(11))). 51 + 85*sqrt(3)/2 Simplify 3 + (((-5*(sqrt(143) - (sqrt(143) + sqrt(143)*-2 - sqrt(143))))/((sqrt(44) - sqrt(11))*4))**2 - (1*3*sqrt(156))/(sqrt(1728)*3)). -sqrt(13)/12 + 2973/16 Simplify (2*(-1*sqrt(132) + sqrt(33))*4)/(sqrt(88)/sqrt(2)*-6*5). 2*sqrt(3)/15 Simplify (-3 + -6*((sqrt(243) - sqrt(243)*-3)*3 + (1*sqrt(243))**2*-1)*1)*5. -3240*sqrt(3) + 7275 Simplify 5 + (-5 + (sqrt(147) + 1)**2 - (-5 + (1*sqrt(147))**2)) - (4 + -4*((sqrt(147) - (-1 + sqrt(147)*-2)) + sqrt(147))**2). 238*sqrt(3) + 9414 Simplify (-6*(-3*(4 + sqrt(192)*-1)*3 - (-1 + sqrt(192) + -4 - (sqrt(192) + -2 + sqrt(192) + -2))))**2. -201600*sqrt(3) + 735300 Simplify (6*2*-2*sqrt(3000))/(2*(sqrt(160) + 2*sqrt(160))*1). -10*sqrt(3) Simplify -4 + -4*((((sqrt(36) + sqrt(144)/sqrt(4))*1)/(-4*sqrt(108)))**2 - (sqrt(27)/(sqrt(90)/sqrt(40)) + 1)). -1/3 + 8*sqrt(3) Simplify 4*((-6*-4*-6*sqrt(3)*4)**2 + (sqrt(297)/(sqrt(55)/sqrt(5)))/(sqrt(180)/sqrt(5) + sqrt(9))). 4*sqrt(3)/3 + 3981312 Simplify ((-1 + -5*(-1 + sqrt(7)) + -3)**2 - (sqrt(56)/sqrt(2) - (sqrt(7) - sqrt(70)/(sqrt(20)/sqrt(2)) - sqrt(7))))*5. -65*sqrt(7) + 880 Simplify ((-2*(sqrt(190) + sqrt(190)*-3)*-5*1)/(-5*(sqrt(1960)*-6)/sqrt(4)))**2. 76/441 Simplify 3*(sqrt(931) + 1 + sqrt(931) + 2) + 0 + (sqrt(95)/(sqrt(5) - 2*sqrt(180)) - (1*-2*sqrt(190))/sqrt(10)). 9 + 483*sqrt(19)/11 Simplify ((sqrt(170) + (sqrt(170)*2 + sqrt(170))*-1 - sqrt(170))*6)/(sqrt(110)/(-2*sqrt(891)))*-6*-3. 5832*sqrt(17) Simplify (1 + 5*(-5 + (sqrt(2156)*-4*1)**2 + sqrt(2156)) + 0)*-6. -1034736 - 420*sqrt(11) Simplify (2*sqrt(864) + sqrt(24) - 5*sqrt(216))/((4*-1*sqrt(588) - sqrt(588)) + sqrt(588)) + 4. sqrt(2)/14 + 4 Simplify (sqrt(128) + -1 + -5)**2 - -4*(-1 + sqrt(128)) - (-4 + sqrt(12)/(sqrt(6)*1))*-6. -58*sqrt(2) + 136 Simplify (-4*(2*(sqrt(475) + -2)*-3 + 5*(1*sqrt(475) + sqrt(475) + -4)))**2 + -4. -5120*sqrt(19) + 122620 Simplify ((sqrt(147) + sqrt(147) + (sqrt(147) - sqrt(147)*-2)*2)/sqrt(3))/(sqrt(84)/(sqrt(12)*2)*2). 8*sqrt(7) Simplify (-2*(-5*sqrt(4)*1 - sqrt(396)/sqrt(11))/((sqrt(72)*-3 - sqrt(72))*-3))**2. 8/81 Simplify 4*sqrt(121)/(1*sqrt(1584)) + -3*(sqrt(396) + sqrt(396) + 6*(sqrt(396) + 5))**2. -78732 - 25919*sqrt(11)/3 Simplify (2*sqrt(468) + -3 + (sqrt(468) + 1)*-1 + (sqrt(104)/sqrt(8) + -1 - sqrt(13)) + sqrt(1300) + 4)**2*3. -96*sqrt(13) + 9987 Simplify (((sqrt(1215) - -4*sqrt(1215)*4)*1)/(-4*(sqrt(33) + -6*sqrt(3993))/sqrt(11)))**2. 23409/13520 Simplify (5 + -6*(sqrt(171) - -3*(sqrt(171) + -1)))**2 + (5 + -1*sqrt(171)*-1)**2*-4. -3432*sqrt(19) + 98241 Simplify (-5*(5 + sqrt(99)*-2 + sqrt(99)))**2 + -2 - (sqrt(110)/(sqrt(10)*-1*5) - (6*2*sqrt(11) + 1)**2). -3629*sqrt(11)/5 + 4683 Simplify -4*(
Q: Trouble with simple X.transform.rotate (rotation center offset) I’m very confused right now: the basic X.transform.rotate() function gives unexpected result for me, even with very simple scenes! The angles of the rotations are OK, as you can see here: http://jsfiddle.net/1sv25uLx/ The previous scene contains only objects for which Y = 0. The rotation of the yellow parallelepiped is good. However, if I introduce more objects, a translation is added and I can’t understand why: http://jsfiddle.net/1bo7zdfs/1/ // create XYZ widgets with spheres trysphere = new X.sphere(); trysphere.center = [0, 0, 0]; trysphere.color = [1, 1, 1]; trysphereX = new X.sphere(); trysphereX.center = [50, 0, 0]; trysphereX.color = [1, 0, 0]; trysphereY = new X.sphere(); trysphereY.center = [0, 50, 0]; trysphereY.color = [0, 1, 0]; trysphereZ = new X.sphere(); trysphereZ.center = [0, 0, 50]; trysphereZ.color = [0, 0, 1]; r.add(trysphere); r.add(trysphereX); r.add(trysphereY); r.add(trysphereZ); // create a parallelepiped cube = new X.cube(); cube.center = [0, 0, 0]; cube.color = [1, 1, 0]; // orient it along X cube.lengthY = cube.lengthZ = 5; cube.lengthX = 40; // add it r.add(cube); // rotate it (same result if done before or after .add) cube.transform.rotateY(90); I’ve tried using older versions of the plugin, entering the rotation matrix manually, changing the order of the .add, .transform and .render, ... but I can’t get rid of these annoying offsets. Can anyone help me, please? @haehn: I’m working on Ricola3D’s interface, he couldn’t make this work either back in 2012. Edit: I see you kinda talk about this issue in X/Wiki/Future. However, I don’t mind having to set the object’s position to [0,0,0], rotate it, then position it, but it doesn’t even work that way. A: OK, I have found the origin of the problem: you have to call r.resetBoundingBox() before adding rotating your object.
Blending in swimmingly with its surroundings, this shimmering home in San Bernadino, CA is an amalgam of natural rock, concrete and patinaed[1] corrugated steel[2]. Named the Joshua Tree Boulder House[3], both because of its location on the edge of the national park and its appearance, the house[4] has faux boulder walls that pay homage to its environment while also keeping the living area shaded and cool. And if the naturally daylit[5] interior doesn't sell you, maybe the great room's ability to turn into an indoor/outdoor space (via a wall of retracting windows) will. And if you're still not sold, did we mention the charming green roof? [6] [7] Designed by Garrett Carlson[8], the house has a rustic feel that contrasts nicely with its modern amenities. While the large boulders that make up the walls (which were erected by engineer Hossein Zand[9]) are made of concrete, the inside of the home incorporates several natural rock and rock-like materials. One concern about having boulders as walls was that daylighting[5] would be blocked in some areas of the house, but the designer incorporated a mirrored wall opposite from the kitchen’s large windows, doubling the natural light and giving the illusion that both ends of the room have views of the immediate landscape. The Boulder House[10]‘s use of steel[2], which is a largely recycled and recyclable material, is also noteworthy. On the exterior, both corrugated and smooth steel is used to give the residence a look that is both modern and extremely unique. Plus, the copper -colored patina that’s developed on the cladding makes the house look like it was always a part of the natural landscape. Inside, steel beams create an almost urban, industrial vibe. The same beams add character to a wall of windows that opens up, making you lose consciousness of where the great room ends and where Joshua Tree Park[11] begins. And with a home this gorgeous, you’d want to protect it from the elements for sure – that’s why the Joshua Tree Boulder House was designed to be able to withstand an earthquake[12] with a magnitude of 10.
This invention relates to an apparatus for providing a warning signal to trailing vehicles that the motor brake retarder (engine retarder) of a forward vehicle has been activated and the vehicle is decelerating. Rear end collisions present a serious safety issue on our public highways. Rear end collisions are caused by several factors, such as not paying attention and not receiving a warning that the forward vehicle is decelerating. The present invention addresses the latter. Until now, there has not been a device that interfaces with an existing motor brake retarder system for providing a warning signal to trailing vehicles when the motor brake retarder of the forward vehicle has been activated, causing the vehicle to decelerate. The prior art is replete with devices that turn on a warning light when a vehicle is decelerating. These devices operate through the use of a switch connected to the accelerator pedal. When the accelerator is released, the switch sends a signal to an indicator light such as a brake light. However, these inventions are designed for vehicles that do not have a motor brake retarder. In addition, these inventions can be confusing to trailing vehicles since a warning light is activated every time the accelerator is released regardless of whether the vehicle is actually decelerating, creating a false sense of security so that an activation of the warning light when the vehicle is actually decelerating is ignored or an appropriate response is delayed. For example, U.S. Pat. No. 4,223,649 to Robinson et al. describes a motor brake control system with warning lights that operate with a motor brake retarder to indicate that the vehicle is decelerating. However, the system described in Robinson et al. is activated by the release of the accelerator pedal and not by the motor brake retarder itself. When the operator removes his foot from the accelerator, the motor brake retarder and the warning lights are activated. If the operator turns the motor brake retarder off and releases the accelerator pedal, the warning lights are still activated giving the trailing vehicle a false indication of the forward vehicle's deceleration. The present invention addresses these problems by providing a brake warning apparatus that only activates when a motor brake retarder is being used. Thus, eliminating false warnings of deceleration.
Q: Objective-C: How to make a Framework? I'm new to Objective-C but has a lot experience with Java and .NET. I'm trying to add EGOPhotoViewer to my iOS 5 project in Xcode 4.2.1. But I get a lot of release, dealloc, retain etc. issues while compiling their code, since I'm using Automatic Reference Counting (I think!). How can I create a class library, framework or what it is called in Objective C for their code, that I can add to my project? EDIT: I've done the approach from JeremyP by inserting the code with a new target. I compiled in the beginning, but after a while I get this compile error: Undefined symbols for architecture i386: "_OBJC_METACLASS_$_EGOPhotoViewController", referenced from: _OBJC_METACLASS_$_PhotoViewController in PhotoViewController.o "_OBJC_CLASS_$_EGOPhotoViewController", referenced from: _OBJC_CLASS_$_PhotoViewController in PhotoViewController.o ld: symbol(s) not found for architecture i386 clang: error: linker command failed with exit code 1 (use -v to see invocation) Does anybody know why? A: For your purpose, a regular static library as described by beryllium would do fine. Just for unashamed plug purposes and for spreading the word, this document describes how to create versioned, documented frameworks using Xcode, GIT and DoxyGen. Creating a Versioned Framework 1.23 The main purpose of creating such frameworks is to redistribute them. I personally find it extremely annoying to manually include libraries and headers I receive from third parties - especially if the libraries are delivered in separate versions for simulator and device. That guide is meant for classic middleware developers. I have written it to allow people like those folks from Google Analytics to finally provide something worth their brand. This document gives you a step by step explanation, bundled with loads of screenshots. A: Open Xcode -> File -> New -> New Project -> Framework & Library -> Next -> Type Name, Choose Folder -> Create It will be a library called yourApp.a. You can find it in Derived Data folder A: You can't create frameworks for iOS. You can however, create static libraries using beryllium's technique. You can also add a static library to your existing project using File / New / New Target... Obviously, once you create the target you can change the Objective-C automatic reference counting build setting to "no" for your new target. I thought it was possible to turn ARC on and off at the source file level, but I can't figure out how.
Q: Safety differences between the various types of outlet (two-/three-prong, grounded/ungrounded, with/without GFCI) I am an ordinary person with absolutely no knowledge regarding electricity and how it works (things like circuits and such) and I never really cared before until now when I sense potential safety issues in the place I just moved in. I really hope you can explain things in a way that's easy for me to understand. I did some research about "ground" and "neutral" concepts and now I have a bunch of questions about safety. I'm in California, US. My apologies for the super-long post ahead. Basically I recently moved in to a relative's house. This relative had done some DIY electrical improvements or whatever and I'm not sure if I can trust his "improvements" so I'm asking questions here. From what I know, this house's electrical situation is as follows: There's no wire/system for ground All receptacles (outlets) are three-pronged (each has two three-hole smiling face to plug stuff in) (pretty sure this is the standard outlet used everywhere) Some of the outlets when plugged in, my surge protector says "Protected" but not "Grounded" (meaning light is on for Protected but light is off for Grounded) while the rest all have both lights on The relative told me that he knows it's better to have a ground system but upgrading this house's system to have that would not be possible due to the wiring in the walls or something like that so he connected the ground and neutral together in the outlets because he saw that these two are connected together at the main panel (I'm not even sure what "connected together" means - again I have no knowledge regarding circuits/electricity). I looked things up and this is supposed to be a dangerous bootleg ground The reason we have 3 prong receptacles for all outlets instead of 2 prong is because our devices use 3 prong plugs I looked things up even further and found a bunch of terms like GFCI, etc and then I got confused so my question is: How and in what situations are the following outlet setups safe or dangerous? (For each of the 3-prong setup, does the plug of the device (3 or 2 prong) matter? if so how?) I'm willing to learn a physics lesson to be able to solve this myself but if it's too hard I'd like to just have the answers with explanations. I'm trying to not get electrocuted A: 1 is against code 2 is allowed provided the correct stickers are applied ("GFCI protected" and "no equipment ground") 3&4 allowed and safe provided it is not a bootleg ground. Ground and neutral is only allowed to be connected at the main panel. Disconnect all those bootleg grounds from the neutrals in all other places. You can put the GFCI protection at the panel by using GFCI breakers. The other option is GFCI receptacles and if you do things right you can protect outlets downstream.
[Update 1]: Here's the latest from the Daily Texan and where and how things went down: The four had just placed an order at Roppolo's Pizza (316 E. 6th Street) a little after 1 a.m. when they were approached by a police officer, who instructed them to move along, according to a source with intimate knowledge of the situation. "They were at the window, waiting for their pizza and being a little loud when an officer all of the sudden came by and told them to "go on." Apparently, the police had been notified of a confrontation between the players and a group of guys a little on up the street," said the source. "Anyways, one of the guys got smart with the officer and, before you know it, they were all in the back of the cop car." If that is an accurate account of what happened, the odds of a suspension for any of the three would seem to decrease. --Wescott [Update 2]: Kenny Vaccaro took to Twitter just before 8:00 pm CST on Monday evening to, apparently, offer his side of the story: Everything is all good. Nothing happened.. Total misunderstanding — Kenny Dwayne Vaccaro (@KennyVaccaro4) May 8, 2012 Won't be standing in line for pizza ever again! — Kenny Dwayne Vaccaro (@KennyVaccaro4) May 8, 2012 --Wescott The only kind of points the Texas Longhorn football team can put on a scoreboard until the opener against Wyoming are those added to the Fulmer Cup standings -- ignominious points, all of them. There will be some additions for Spencer Hall to make in the Longhorn column after three current football players and one recent transfer were all arrested early Sunday morning in downtown Austin. Here's what went down, per KXAN: According to police, officers were called out to a disturbance in the 300 block of East Sixth Street at 1:29 a.m. The officers asked the four men to leave the establishment. But when they refused, the officers took them into custody, police said Players Alex Okafor, Kenneth Vaccaro, Barrett Matthews and former player Eryon Barnett were charged with failure to obey a lawful order, a misdemeanor charge. Barnet was also charged with failure to identify himself. He is in Travis County jail. Not intelligent decisions by any of them, but especially Okafor and Vaccaro, who are both supposed to be high draft picks next season and have been asked to step into larger leadership roles in their senior seasons to replace departed players like defensive tackle Kheeston Randall and linebackers Keenan Robinson and Emmanuel Acho. This is not the way to demonstrate that leadership. Expect suspensions to come down for the three current players as soon as Mack Brown sorts this out and the guess here is that none of the three will participate in the opener against Wyoming, if the charges stand.
Q: black left- / right-pointing triangles not the same size I'm using the black left pointing triangle / right left pointing triangle geometric shapes as links on a website, using their HTML codes ( ◀ and ▶): &#9664; &#9654; For some reason, the triangles are not displayed in the same size, even when I'm using them on a blank page with no other elements. On Chrome, the left pointing one is slightly larger than the right pointing one. On Firefox, the right pointing one is much larger then the left pointing one. I have the problem even when there's no CSS at all, on an otherwise blank page. Any idea what the reason might be or how to fix this? A: Just repeating Mr Lister's comment as an answer, as it worked for me (vote his comment up!) "... If all else fails, you could try other shapes, such as the left/right pointing pointer ◄ ► or left/right pointing small triangle ◂ ▸." – Mr Lister I copy/pasted the pointing pointer characters from this comment and it was a consistent size in FF/Chrome/IE. P.S. Changing the font family didn't make any difference for me. A: Try the following: ◄ and ► &#9668 and &#9658 A: I kept hitting this same problem with character after character. In the end I used the same arrow, triangle, pointer for both right and left. In my case I used a right facing arrow for both the right and left pointers. I flipped the left arrow using transform: scale(-1). Now they look identical.
Spring across the United States is known for its changeable and often severe weather. And this week has lived up to the season's expectations with destructive tornadoes, damaging hail and wildfires. The cold front's passage by this latest storm also brought some extreme winds to the Central Plains, Great Lakes and Northeast just in the last few days. Power was knocked out to over 1,200,000 customers in several states this week. Crews had already been put into place ahead of storm in anticipation of down power lines then worked late into Wednesday evening restoring electricity to hundreds of communities. At the Rochester Airport in the state of New York, a wind gust of 130 kilometres per hour was recorded on Wednesday. But it was at the Willow Run airport in Ypsilanti, Michigan where the gusty winds caused a plane to slide off the runway, causing extensive damage to the fuselage. On the rails a cargo train went off the tracks in Batavia, New York on Wednesday afternoon because of the high winds. Approximately 20 train cars went off the tracks, but there were no injuries reported. In Woodland, Michigan powerful winds caused extensive structural damage to that community. At their local elementary school over 200 children had to be evacuated after teachers noticed the roof shifting above them. All students were safely moved before the roof eventually blew off completely. As a safety precaution the Skydeck at the Willis Tower in Chicago, formerly known as the Sear Tower, was also closed on Wednesday morning because of the dangerous winds. It was in Detroit, Michigan where the winds helped to fuel a deadly house fire. Five people were killed and four injured when fire swept through an apartment building. Wind gusts topped 97 kph, spreading the flames quickly through the complex. Winds will begin to ease through the day on Thursday as the storm system moves away from the region.
Liverpool organising meeting, Monday 9 December Liverpool These Walls Must Fall organising meeting. The last of the year. We will be taking stock of 2019, formalising roles within the campaign and thinking about the year ahead. Let’s make 2020 the year we end immigration detention! And there will also be mince pies (of course). Liverpool organising meeting, November 11th Roll up for our next public organising meeting! Bringing folk together in Liverpool to challenge immigration detention. We’ll be talking about “answering difficult questions”, and planning for an event next month. Liverpool Council speaks out against immigration detention Last night Liverpool City Council passed a cross-party motion against immigration detention and in support of the local ‘These Walls Must Fall’ campaign. In a sign of a growing, community-based resistance to immigration detention, councillors from all four parties (Labour, Green, Lib Dems, Liberals) proposed a motion that called on the government to end indefinite detention, and that the system was “inhumane” and “not fit for purpose”. At the Council Chambers in Liverpool where the… Read more » These Walls Must Fall is an initiative coordinated by Right to Remain. We are building a network of community campaigns to raise awareness of and challenge the use of immigration detention in the UK. We are extremely grateful for the financial support through charitable grant funding from Paul Hamlyn Foundation, Ben and Jerry's, and from public donations.
Kawasaki Disease: A Condition of Many Guises.
A new survey found that 80 percent of people in the arts sector fear having 'controversial opinions' can lead to professional ostracism. Those views include supporting right-wing politics.
Fallout New Vegas Update 7 - SKiDROW 10-07-2011........Release Date ... Protection...............Steam FPS/RPG..............Game Type ... Disk(s)..............DOX + DLC RELEASE NOTES Fallout New Vegas Update 7 info: - New feature: system save is automatically created prior to endgame sequence. After credits, user is prompted to load save game. This will allow single save players to play DLC without creating a new game. - Fixed issue where Minigun audio could get stuck/keep playing indefinitely when fired out of VATS. - Script fix to restore destroyed ED-E. This should address issues players have with attempting to use certain companions (e.g. Rex) or when the player needs to clear his or her companions before entering an area (e.g. Zion / Honest Hearts). - New “Companion Dismissal Terminals” added to Gun Runners and Lucky 38. These will allow players with lost companions from earlier patches to force-fire if they are experiencing problems attempting to get into DLC or areas that prevent companions from entering. - Arms no longer lifted above head when sneaking with certain weapons. - Fixed sound cutting out after extended playthroughs. - Massive world optimizations in major areas for better stability/performance with multiple DLCs installed. - Players can now have six or more DLCs installed without encountering an infinite loading DLC message on startup. - Navmesh fixes/NPCs no longer getting stuck. - Scripts added to keep certain NPCs who were marked as dead from respawning. - Extensive world optimizations for Hoover Dam. - Fixed lockup with Ranger Grant’s forcegreet at HD/NCR path. - Fixed NPC AI packages so they don't get stuck at HD. - Fixed bug where upgraded ED-E could be killed in non-hardcore mode. - Post-assassination Kimball now gets removed prior to Hoover Dam battle. - Fixed navmesh around Camp Searchlight to improve performance over long soaks. - Searchlight Troopers don't bump into each other as often. - Fixed navmesh on HD Observation Deck. - New teleport locations for Legion path through Hoover Dam. Improves performance. - Radio stations will work properly now if DLC is uninstalled. - Fixed instances where it was possible to fast travel during Hoover Dam battle. - Fixed case where recruited Remnants were hostile to player during HD battle on Independent and House paths. They will still turn hostile if you shoot them too much though. - Two vending machines in Hoover Dam were facing the wrong way. - Made it so Big Sal/Nero no longer accepts yield if the other is already dead. - Removed Brotherhood objectives when ED-E is given to the Followers. - Fixed rare instance where Cachino turned hostile on the player if player attacks Big Sal/Nero prior to Cachino entering the room. - Fixed crashes in Ultra-Luxe. - Fixed Alpha Squad snipers getting stuck when told to support player. - Fix for Lily’s weapon being displayed oddly on her back.. - Improvements to navmesh and pathing in Great Khan Longhouse. Fixes crashes. - Plasma Spaz now gives 20% AP reduction (was 10%). - Fixed crash after hearing certain ED-E dialog triggers. - Fixed instance where Boone would constantly holster his rifle in combat if player had lost rep with the NCR. - Veronica no longer waits for player to speak to her before leaving after Hidden Valley is destroyed. - Extensive optimizations in McCarran. - Optimized NPC packages at Camp Golf to improve performance. Misfits now stay in a normal radius. - Arcade now properly rants against Caesar (once). - Motor-Runner Helmet now properly 0 weight. Also removed after quest completes. - NCR Heavy Troopers will now attack player if you attack Hsu. - Vulpes (and Alerio) now properly forcegreet if you somehow fast travel before their initial forcegreet fires. - Killing hostages while helping Khans no longer fails quest. - Gilbert/Ackerman now properly stay dead if murdered. - Mr. New Vegas will only mention failed NCR attack on Powder Gangers if Troopers are dead and Eddie is alive. - Fixed case where player could break quest with Orris if they fast traveled after he shoots thugs, but before forcegreet. - Generic Powder Gangers now set as Aggressive (previously Very Aggressive). - Fixed rare case of black screen during dialog at REPCONN facility. - Fixed phantom quest marker remaining on Major Knight after he’s killed. - Fix for incorrect dialog if player meets Bryce Anders after killing Motor Runner. - Player can no longer isolate the BoS virus by hitting “isolate virus” three times on a single console. - Fixed crash related to Arcade leaving the Remnants bunker. - Fixed Nightkin encounter at Tumbleweed Ranch to occur after user reloads a save. - Arcade will no longer attempt to initiate his quest during Hoover Dam. - Hoover Dam Boomer Bombing Run now works properly after save/reload. - Cass now only barks once per gameday and not every two gamehours. - Fixed XP exploits with MantisForeleg. - Massive optimizations in Westside, North Vegas and The Thorn. Improves AI pathing and performance with high uptimes. - Optimizations in Vault 19. - Fixed issue where Oliver Swanick would respawn after three days if killed. - Pathing improvements to The Strip and North Sewers. - Moved teleport doors on The Strip so NPCs don’t collide with players or other actors that stand in front of doors. - Ethel, Walter, and the Station Merchant no longer wander or patrol to avoid collisions with other NPCs. - Separated NPCs in the North Sewers. - Fixed issue where window in Vault 19 let player see through the world. - Greasers from Crandon’s quest now become disabled when the player leaves the area. - Fixed a Legion melee NPC near Nelson that was under the terrain. - Modified Legion and NCR hit-squad NPCs to use new level lists. They now have a smoother leveling curve that takes into account new level caps. Legion and NCR hit squad spawning was also - Revised to make their appearance more consistent and less memory-intensive. - Fixed issue where Omerta thugs wouldn’t leave Freeside if you killed Joana and Carlitos. - Cazador Poison Effect sound no longer plays globally if someone, somewhere gets stung. Only plays if the player is hit. - Player can no longer repair the Grenade Launcher with the minigun. - Fix for companions going into unconscious/conscious cycle over and over again when stung with Cazador poison. In normal mode (or against companions), Cazador poison now lasts 8 - Seconds, doing 18 points of damage per second. It is, in fact, even deadlier than the normal version, but lasts 1/4 as long. In hardcore mode or against the player, poison remains 30 seconds/5 damage per second. - Casino slot scripts altered so their max bets do not produce game economy-ruining levels of cap overflow - Hit the Deck and Stonewall now properly work with player’s weapon condition. Hit the Deck is now +25 DT vs. Explosives instead of +50% vs. Explosives. - Adjusted Deathclaw fatigue to make them less exploitable with certain attacks. Inconsistent health values for Deathclaws were also corrected (in favor of stronger Deathclaws). - Cazadores are now properly flagged as fliers, so they won’t set off mines. - Increased radii for plasma and pulse grenades. - Fixed bug where rescued Powder Gangers would return to the legion camp. - Added Followers of the Apocalypse supplies to three areas of Hoover Dam if you gain their support and fight on independent or NCR paths. This also enables the FoA + NCR "good" ending through Julie Farkas. - Optimizations for Westside. - Fixed issues with Recharger Pistol animation. - Fixed issue where Aba Daba Honeymoon wouldn’t update if the player was running O My Papa simultaneously. - Typo: Night Stalker Blood” changed to “Nightstalker Blood” - Yes-Man now checks both Loyal and Pearl’s status before the player can tell him the Boomer leaders are dead. - Removed “Intelligence” flag from Int<=2 check at REPCONN HQ, as engine doesnt support checks that low. - Fixed scripting on Lonesome Drifter barter check so player doesn’t get next objective with Tommy Torini if they fail. - Legion Assassins moveto script no longer occurs every frame (frees up memory). - Added recipe so player can now break down 12.7mm ammo. - Four Eyes now works with ball cap with glasses. - There is now always an option to give ED-E to Lorenzo, even if player has said no the first time. - Mister Sandman no longer works on The Forecaster (XP exploit). - Ultra-Luxe doors no longer disable player controls if player is an enemy of the White Gloves. - Fix scripting conflict between “Cold, Cold Heart” and Mojave Ghost with Vulpes/Benny. - Fixed issue where player could become control locked in Gommorah if they had installed Yes-Man. - Player can now re-hire Arcade if ED-E is in the party. - Ultra-Luxe now properly pays out in Legion and NCR money. - Veronica’s companion perks (as in the ones Veronica gets, not the player) now properly assigned. - Waiting companions will no longer get teleported by the Vault 22 elevator. - Changed objectives for How Little We Know to better reflect branching paths. - Return to Yes-Man” objective no longer reopens if player tells him to go to Lucky 38 in Wild Card: Change in Management. - Player can no longer pickpocket Button Man to break the scene where he shoots Cachino. - Player can no longer ask Cachino about plans if Bosses are already dead. - Fix for ED-E combat dialog. - Ranger Helmet now has weight/value. - Fixed Gomorrah holdout scripting to properly affect companions. - Lily now properly uses Stealth Boy when player is sneaking if told to keep it during her quest. - Fixed exploit where player could get infinite XP for punching Big Sals corpse. - Fixed scripting for For the Republic II where exposing Karl would prematurely complete the objective to destroy the Khans. - Fixed instance where fast travel was disabled when creating new game post-credits. - Inventory will now show cumulative weight of item stacks instead of weight of a single item. - Missile projectiles will no longer show in player’s target HUD. - Player will now unequip a weapon if consuming it in the crafting menu (fixes crash). - Weapons with recharging ammo now display ammo properly. - Fixed rare instance where player could be control-locked if loading an autosave created while lockpicking a transition door. - Beamsplitter mod fixed to proper DAM/DPS. - Crafting can no longer create weapons/armor at 100% condition. - Repair kits can no longer repair to 100% condition. - Throwing weapons can no longer take damage, and are dropped when shot at 100% condition. - DT Perks that increase DT based on enemy weapon should function properly. - Weapons using multiple rounds of ammunition per shot fired now show proper VATS damage estimate. - Fixed rare case where broken stick of dynamite could crash game if thrown. - NPCs will now play face cards on player’s stack in Caravan. - Various tweaks to audio system to improve memory performance. - Fixed issue where looping reload weapons would get stuck, causing VATS camera to point to the ground. - Fixed clock/calendar so that it doesn’t reset on a fresh load. - Fixed .45 auto pistol displaying incorrect condition/value on modding screen. - Both DAM and DPS now display on workbenches when creating explosives. - For ammo that reduce spread (like 12ga) effect is now properly applied to spread, not wobble. - Fixed crash when attempting to enter DLC1 with equipped quest items. INSTALL NOTES 1. Unpack release 2. Run Fallout.New.Vegas.Update.7.exe 3. Install 4. Copy the cracked content from the SKIDROW folder to the main install folder and overwrite 5. Play the game 6. Support the companies, which software you actually enjoy! ADDITIONAL NOTES This update contains all released DLC to date: Caravan Pack Classic Pack Mercenary Pack Tribal Pack Dead Money DLC Remember to enable them in the game's Launcher! You don't need to have any of the previous updates installed, as this update is featuring all previous updated content GREETINGS Unleashed - TiNYiSO - MRN - RADIKAL - POSTMORTEM - GENESIS - SHOCK CRUDE - ReUnion - VACE - OUTLAWS - BACKLASH - Titan
Starting at GCAS June 8 and running through June 29: “An Object That is Not Oriented: Lacan’s 10th Seminar”. Seminar 10: Anxiety is among his most thorough explorations of objet a, the object-cause of desire, and contains rich discussions of subject, desire, drive, language, embodiment, affect, anxiety, and the Other. This course will explore issues of drive, desire, objet a, subjectivity, ego, and anxiety as one, among many, of the capitalist affects. Beginning with Søren Kierkegaard in the 19th Century and throughout the 20th century, anxiety has become an increasingly important affect in philosophy. Accompanying this rise of interest in philosophy, the 20th century has seen an explosion of anxiety disorders in the clinic. Within philosophy, anxiety has generally been seen as a privileged affect signalling our relationship to death, our status as a subject, and so on. In the clinic, theories of affect have ranged from organic causes pertaining to neuro-chemistry to an affect signalling repressed childhood traumas as in the case of phobias. However, the historical timing in which anxiety arises as a particularly significant affect for both philosophy and psychotherapy is symptomatic. Kierkegaard is writing on the eve of the Industrial Revolution. Capitalism, tracing its unfolding trajectory from the 15th century to present, has come into full bloom. As Nietzsche would later note in his lament about the death of God, the Enlightenment has progressively eroded all points of stability found in authority, kings, beings such as God, truth, and so on. Might it be that there is something about capitalism that is particularly conducive to the production of anxiety as an affect? Might it be that this affect pertains to a very special kind of object, the objet a, that both disorients and that is no object at all, and that is deeply wedded to or that becomes particularly prominent with respect to the meanderings and délire of capital? Could it be that there’s a specifically capitalist subject that is perpetually accompanied by affects such as anxiety and depression? These are some of the questions that will be explored in this course through a close reading of Lacan’s 10th seminar. No prior familiarity with Lacan is required. Requirements: Reading Lacan’s 10th Seminar. Information for registration is available on GCAS’s website. Share this: Twitter Facebook Like this: Like Loading...
Custom puzzles / 5-12 years Think up any image you please: you’ll draw it out on a wooden or cardboard surface and, with our mentor’s help, edit it to become colourful and varied enough to make a good puzzle. Then, you’ll prep it for laser cutting. You’ll learn about new tools and technologies, and put together a cardboard box to fit your new puzzle, which you can try and reassemble at home. You’ll get to take your custom puzzles home with you after the workshop is concluded.
Granulocytic sarcoma of the small intestine. Granulocytic sarcoma is an extramedullary tumor of myeloblasts and/or immature myeloid cells, which can develop at any anatomic site and is often a forerunner to the development of acute myelogenous leukemia. Granulocytic sarcoma of the gastrointestinal tract most frequently involves the small intestine and most often presents with abdominal pain and obstruction. Pathologists must consider granulocytic sarcoma in any mass of unknown origin with a diffusely infiltrating population of tumor cells, as the diagnosis is often initially unrecognized, especially in nonleukemic patients. Multiple ancillary modalities are available to assist pathologists in making the correct diagnosis so that appropriate therapy can be initiated.
#version 450 #extension GL_ARB_separate_shader_objects : enable #extension GL_ARB_shading_language_420pack : enable // Read only image requires exact format layout (set=0, binding=0, rgba8) uniform readonly image2D Buffer0; // Read/write image format is flexible layout (set=0, binding=1, rgba32f) uniform image2D BufferOut; layout (local_size_x = 16, local_size_y = 16, local_size_z = 1) in; void main() { vec4 src = imageLoad(Buffer0, ivec2(gl_GlobalInvocationID.xy)); imageStore(BufferOut, ivec2(gl_GlobalInvocationID.xy), src.brga); }
Frostbite (disambiguation) Frostbite is a medical condition involving damage to skin and tissues due to extreme cold. The term may also refer to: Fictional characters Frostbite (comics): Frostbite (G.I. Joe), a character that has appeared in a number of G.I. Joe comics Frostbite, a Marvel Comics character who was a member of the team in X-Men 2099 Frostbite, a character that appeared in DC Comics' Young Heroes in Love Films Frostbite (2005 film), an American direct-to-video film Frostbite (2006 film), a Swedish horror film, originally entitled Frostbiten Frostbite (soundtrack), the soundtrack to the film by Anthony Lledo Games Frostbite (game engine), a game engine developed by EA DICE Frostbite (video game), a 1983 game for the Atari 2600 Literature Frostbite (Mead novel), a vampire novel written by Richelle Mead Frostbite (Wellington novel), a werewolf horror novel by David Wellington Music Frostbite (album), an album by Albert Collins Frostbite, a musical project by Einar Örn Benediktsson of the Sugarcubes and Hilmar Örn Hilmarsson aka HÖH "Frostbite", a song by Michael Learns to Rock from Take Me to Your Heart "Frostibe", a song by Parkway Drive from Horizons See also Freezer burn, the spoilage of food due to frost
a. Field of the Invention This invention relates to a tip protector for an instrument such as an endoscope or borescope, to an assembly comprising a tip protector and an endoscope or borescope, and to a blank for use in the construction of a tip protector. b. Related Art An endoscope or borescope is used to image cavities or other interior spaces that are not easily accessible and where direct observation of the space is not possible. An endoscope or other similar elongate optical probe comprises an elongate insertion shaft having a distal tip. An objective lens is provided at the distal tip and an optical transmission system is provided within the shaft of the endoscope to transmit images from the tip to a user of the device. Typically the optical transmission system will include optical fibres and/or lens assemblies. The shaft and tip are typically also configured to enable illumination of the area around the tip of the endoscope, and to allow other instruments to extend through the shaft and from the tip, for example biopsy forceps in the case of some medical endoscopes. Accordingly the tip of an endoscope can be very complex, very delicate and, therefore, relatively expensive. It is thought that for every endoscope being used in a hospital setting, at least half may be unavailable for use due to repair. Damaged endoscopes can be expensive to repair, can disrupt a facility's capacity to provide endoscopy services, and can potentially compromise patient safety. Furthermore, it is believed that approximately 70% of endoscope damage may be attributed to improper handling. During cleaning and storage of the endoscope or borescope, and additionally during sterilisation of medical endoscopes it is, therefore, desirable to protect the tip as much as possible from damage. A number of prior art devices are known, especially for use in medical applications, however, each of these devices has disadvantages. A first device comprises a generally cylindrical body made of sponge or soft foam and having a central opening for receiving the tip of the endoscope. The device, therefore, provides cushioning around the tip but the foam is also potentially capable of absorbing moisture from the tip. This absorption of moisture can cause the sponge or foam to harbour microorganisms that may contaminate the endoscope. A second device comprises an expandable plastic mesh sleeve that is configured to fit over the tip of the endoscope. The configuration of the mesh sleeve provides a degree of resilience protecting the tip from knocks. The mesh sleeve, however, can be difficult to put on and remove from the tip of the endoscope, which may lead to damage to the tip. Furthermore, the mesh sleeve contacts the endoscope tip over a relatively large area hindering the drying and aeration of the endoscope tip during cleaning and storage. It is an object of the present invention to provide an improved tip protector device that overcomes at least some of the disadvantages of prior art devices.