{ // 获取包含Hugging Face文本的span元素 const spans = link.querySelectorAll('span.whitespace-nowrap, span.hidden.whitespace-nowrap'); spans.forEach(span => { if (span.textContent && span.textContent.trim().match(/Hugging\s*Face/i)) { span.textContent = 'AI快站'; } }); }); // 替换logo图片的alt属性 document.querySelectorAll('img[alt*="Hugging"], img[alt*="Face"]').forEach(img => { if (img.alt.match(/Hugging\s*Face/i)) { img.alt = 'AI快站 logo'; } }); } // 替换导航栏中的链接 function replaceNavigationLinks() { // 已替换标记,防止重复运行 if (window._navLinksReplaced) { return; } // 已经替换过的链接集合,防止重复替换 const replacedLinks = new Set(); // 只在导航栏区域查找和替换链接 const headerArea = document.querySelector('header') || document.querySelector('nav'); if (!headerArea) { return; } // 在导航区域内查找链接 const navLinks = headerArea.querySelectorAll('a'); navLinks.forEach(link => { // 如果已经替换过,跳过 if (replacedLinks.has(link)) return; const linkText = link.textContent.trim(); const linkHref = link.getAttribute('href') || ''; // 替换Spaces链接 - 仅替换一次 if ( (linkHref.includes('/spaces') || linkHref === '/spaces' || linkText === 'Spaces' || linkText.match(/^s*Spacess*$/i)) && linkText !== 'OCR模型免费转Markdown' && linkText !== 'OCR模型免费转Markdown' ) { link.textContent = 'OCR模型免费转Markdown'; link.href = 'https://fast360.xyz'; link.setAttribute('target', '_blank'); link.setAttribute('rel', 'noopener noreferrer'); replacedLinks.add(link); } // 删除Posts链接 else if ( (linkHref.includes('/posts') || linkHref === '/posts' || linkText === 'Posts' || linkText.match(/^s*Postss*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } // 替换Docs链接 - 仅替换一次 else if ( (linkHref.includes('/docs') || linkHref === '/docs' || linkText === 'Docs' || linkText.match(/^s*Docss*$/i)) && linkText !== '模型下载攻略' ) { link.textContent = '模型下载攻略'; link.href = '/'; replacedLinks.add(link); } // 删除Enterprise链接 else if ( (linkHref.includes('/enterprise') || linkHref === '/enterprise' || linkText === 'Enterprise' || linkText.match(/^s*Enterprises*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } }); // 查找可能嵌套的Spaces和Posts文本 const textNodes = []; function findTextNodes(element) { if (element.nodeType === Node.TEXT_NODE) { const text = element.textContent.trim(); if (text === 'Spaces' || text === 'Posts' || text === 'Enterprise') { textNodes.push(element); } } else { for (const child of element.childNodes) { findTextNodes(child); } } } // 只在导航区域内查找文本节点 findTextNodes(headerArea); // 替换找到的文本节点 textNodes.forEach(node => { const text = node.textContent.trim(); if (text === 'Spaces') { node.textContent = node.textContent.replace(/Spaces/g, 'OCR模型免费转Markdown'); } else if (text === 'Posts') { // 删除Posts文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } else if (text === 'Enterprise') { // 删除Enterprise文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } }); // 标记已替换完成 window._navLinksReplaced = true; } // 替换代码区域中的域名 function replaceCodeDomains() { // 特别处理span.hljs-string和span.njs-string元素 document.querySelectorAll('span.hljs-string, span.njs-string, span[class*="hljs-string"], span[class*="njs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换hljs-string类的span中的域名(移除多余的转义符号) document.querySelectorAll('span.hljs-string, span[class*="hljs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换pre和code标签中包含git clone命令的域名 document.querySelectorAll('pre, code').forEach(element => { if (element.textContent && element.textContent.includes('git clone')) { const text = element.innerHTML; if (text.includes('huggingface.co')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 处理特定的命令行示例 document.querySelectorAll('pre, code').forEach(element => { const text = element.innerHTML; if (text.includes('huggingface.co')) { // 针对git clone命令的专门处理 if (text.includes('git clone') || text.includes('GIT_LFS_SKIP_SMUDGE=1')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 特别处理模型下载页面上的代码片段 document.querySelectorAll('.flex.border-t, .svelte_hydrator, .inline-block').forEach(container => { const content = container.innerHTML; if (content && content.includes('huggingface.co')) { container.innerHTML = content.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 特别处理模型仓库克隆对话框中的代码片段 try { // 查找包含"Clone this model repository"标题的对话框 const cloneDialog = document.querySelector('.svelte_hydration_boundary, [data-target="MainHeader"]'); if (cloneDialog) { // 查找对话框中所有的代码片段和命令示例 const codeElements = cloneDialog.querySelectorAll('pre, code, span'); codeElements.forEach(element => { if (element.textContent && element.textContent.includes('huggingface.co')) { if (element.innerHTML.includes('huggingface.co')) { element.innerHTML = element.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { element.textContent = element.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); } // 更精确地定位克隆命令中的域名 document.querySelectorAll('[data-target]').forEach(container => { const codeBlocks = container.querySelectorAll('pre, code, span.hljs-string'); codeBlocks.forEach(block => { if (block.textContent && block.textContent.includes('huggingface.co')) { if (block.innerHTML.includes('huggingface.co')) { block.innerHTML = block.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { block.textContent = block.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); }); } catch (e) { // 错误处理但不打印日志 } } // 当DOM加载完成后执行替换 if (document.readyState === 'loading') { document.addEventListener('DOMContentLoaded', () => { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); }); } else { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); } // 增加一个MutationObserver来处理可能的动态元素加载 const observer = new MutationObserver(mutations => { // 检查是否导航区域有变化 const hasNavChanges = mutations.some(mutation => { // 检查是否存在header或nav元素变化 return Array.from(mutation.addedNodes).some(node => { if (node.nodeType === Node.ELEMENT_NODE) { // 检查是否是导航元素或其子元素 if (node.tagName === 'HEADER' || node.tagName === 'NAV' || node.querySelector('header, nav')) { return true; } // 检查是否在导航元素内部 let parent = node.parentElement; while (parent) { if (parent.tagName === 'HEADER' || parent.tagName === 'NAV') { return true; } parent = parent.parentElement; } } return false; }); }); // 只在导航区域有变化时执行替换 if (hasNavChanges) { // 重置替换状态,允许再次替换 window._navLinksReplaced = false; replaceHeaderBranding(); replaceNavigationLinks(); } }); // 开始观察document.body的变化,包括子节点 if (document.body) { observer.observe(document.body, { childList: true, subtree: true }); } else { document.addEventListener('DOMContentLoaded', () => { observer.observe(document.body, { childList: true, subtree: true }); }); } })(); \n\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Github\"\n}"}}},{"rowIdx":213772,"cells":{"text":{"kind":"string","value":"tag:blogger.com,1999:blog-3387432784515675172.post3015838284678599536..comments2017-09-26T00:35:29.832-07:00Comments on Color Sepia: ...meanwhile...Magdalenahttp://www.blogger.com/profile/06239907437555388396noreply@blogger.comBlogger14125tag:blogger.com,1999:blog-3387432784515675172.post-3566724855915436232015-04-26T23:43:53.174-07:002015-04-26T23:43:53.174-07:00Glad that you found me :) Thank you !Glad that you found me :) Thank you !Magdalenahttps://www.blogger.com/profile/06239907437555388396noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-73151959816060130962015-04-26T23:42:52.530-07:002015-04-26T23:42:52.530-07:00 Dear Donna , I´m so glad that you like the neckla... Dear Donna , I´m so glad that you like the necklace , while making it I was thinking about you...it just felt that it´s destiny should be you. Magdalenahttps://www.blogger.com/profile/06239907437555388396noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-76618379218383871912015-04-26T14:09:41.637-07:002015-04-26T14:09:41.637-07:00Hi Magdalena, I have been to your shop at Etsy an...Hi Magdalena, I have been to your shop at Etsy and I love all your new stuff there... I wore your beautiful necklace last night to a gallery art reception and I wear it often and think of you and how nice you are to send it to me. thank you again. donna watsonlayershttps://www.blogger.com/profile/10991288165260934778noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-30549746217324271502015-04-20T16:47:47.663-07:002015-04-20T16:47:47.663-07:00Hello Magdalena! I just found you somehow (I don&...Hello Magdalena! I just found you somehow (I don't remember how!?) What an absolutely beautiful blog you have. I've now subscribed to you ... looking forward to following you! :-)thewannabewabisabianhttps://thewannabewabisabian.wordpress.com/noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-64793047411545951052015-04-12T11:28:17.161-07:002015-04-12T11:28:17.161-07:00Dziekuje kochana! Sciskam!Dziekuje kochana! Sciskam!Magdalenahttps://www.blogger.com/profile/06239907437555388396noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-13650489040450952582015-04-12T11:27:40.878-07:002015-04-12T11:27:40.878-07:00Gracias !!! Abrazo fuerte :)Gracias !!! Abrazo fuerte :)Magdalenahttps://www.blogger.com/profile/06239907437555388396noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-78223940804134423712015-04-12T10:50:07.958-07:002015-04-12T10:50:07.958-07:00Cudne zdjęcie jak wszystkie u Ciebie. Jak na nie p...Cudne zdjęcie jak wszystkie u Ciebie. Jak na nie patrzę, odpoczywam.
:)pracownia garderobahttps://www.blogger.com/profile/16597732560765253483noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-18456108114323584962015-04-12T03:55:13.511-07:002015-04-12T03:55:13.511-07:00Excepcional!Excepcional!Remei (Bitàcora)https://www.blogger.com/profile/18093893012505702718noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-42984023647240913672015-04-11T23:18:42.354-07:002015-04-11T23:18:42.354-07:00Dziekuje Kochana! milej niedzieli i tobie zycze! s...Dziekuje Kochana! milej niedzieli i tobie zycze! sciskam!Magdalenahttps://www.blogger.com/profile/06239907437555388396noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-35482610421370543912015-04-11T11:16:13.903-07:002015-04-11T11:16:13.903-07:00Piękny :)\nSłonecznej niedzieli!Piękny :)
Słonecznej niedzieli!Ellehttps://www.blogger.com/profile/17797866752864059035noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-24038509052232957672015-04-11T11:13:55.883-07:002015-04-11T11:13:55.883-07:00Gracias linda , abrazo fuerte!Gracias linda , abrazo fuerte!Magdalenahttps://www.blogger.com/profile/06239907437555388396noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-33000474367625548552015-04-11T11:13:29.213-07:002015-04-11T11:13:29.213-07:00dziekuje! sciskam mocno!!dziekuje! sciskam mocno!!Magdalenahttps://www.blogger.com/profile/06239907437555388396noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-10775633528828626442015-04-11T07:29:36.716-07:002015-04-11T07:29:36.716-07:00Una maravilla. Que tengas un lindo fin de semana!Una maravilla. Que tengas un lindo fin de semana!Yekahttps://www.blogger.com/profile/14332488143489767603noreply@blogger.comtag:blogger.com,1999:blog-3387432784515675172.post-76719269032219259022015-04-11T06:38:35.303-07:002015-04-11T06:38:35.303-07:00Piekny naszyjnik! milego weekendu kochana!Piekny naszyjnik! milego weekendu kochana!Amelihttp://villaartis.blogspot.com/noreply@blogger.com"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Pile-CC\"\n}"}}},{"rowIdx":213773,"cells":{"text":{"kind":"string","value":"Home > News > Volunteers remove over six tons of trash during river cleanup\n\nVolunteers remove over six tons of trash during river cleanup\n\n9/27/2010\n\nMore than 100 volunteers removed over six tons of trash from one of the state’s major waterways during the 21st annual Great Kanawha River Cleanup earlier this month.\n\nThe Sept. 11 event was sponsored by the West Virginia Department of Environmental Protection’s REAP (Rehabilitation Environmental Action Plan) program.\n\nCovering five sites in Kanawha, Putnam and Fayette counties, 135 volunteers picked up 6.75 tons of debris along the river and 117 tires. They worked 540 man hours.\n\n“This year, we had more volunteers who removed more trash and tires,” said REAP’s Travis Cooper, who organized the cleanup. “It’s very encouraging to see how citizens want to do what they can and pitch in to clean up the environment. We had all facets of the community, from Girl Scouts, to college students, to retired folks, helping out.”\n\nREAP supplied bags, gloves and trash grabbers for the cleanup and arranged for the debris to be hauled away."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Pile-CC\"\n}"}}},{"rowIdx":213774,"cells":{"text":{"kind":"string","value":"<%@ page language=\"java\" contentType=\"text/html; charset=UTF-8\"\n pageEncoding=\"UTF-8\"%>\n<%@ taglib uri=\"http://java.sun.com/jsp/jstl/core\" prefix=\"c\" %>\n<%@ taglib uri=\"http://www.springframework.org/security/tags\" prefix=\"sec\" %>\n\n\n\n\nHome Page\n\n\n

Home Page

\n\n\t

\n Hello
\n Roles: \n

\n \n
\n \n \n
\n\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Github\"\n}"}}},{"rowIdx":213775,"cells":{"text":{"kind":"string","value":"Q:\n\nProper use of async, await and task.delay for a game loop\n\nI'm currently in the process of making a game loop in a console application. I'm trying to make the game loop wait at the end of its loop for (1000*10000/fps) - ElapsedTicks to put a cap on game loop speed. For reference 1 millisecond is 10,000 ticks.\nIf the ElapsedTicks < FrameTimeTicks I execute await Task.Delay(FrameTimeTicks - ElapsedTicks) but this ends my console application.\nThe code responsible is the await Task.Delay so I assume I'm not using it properly.\nMy code:\nusing System;\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text;\nusing System.Threading.Tasks;\nusing System.Diagnostics;\n\nnamespace ConsoleApp1\n{\n class Program\n {\n static byte fps = 30;\n public static byte Fps { get { return fps; } set { fps = value; } }\n //user specified fps\n\n static long frameTimeTicks = (1000 * 10000) / Fps;\n static long FrameTimeTicks { get { return frameTimeTicks; } }\n //amount of ticks desired in one frame\n\n static bool draw = true;\n public static bool Draw { get { return draw; } set { draw = value; } }\n\n static long elapsedTicks;\n static long ElapsedTicks { get { return elapsedTicks; } set { elapsedTicks = value; } }\n //ticks elapsed in one game loop\n\n static void Main(string[] args)\n {\n GameLoop();\n }\n\n static void UpdateGame()\n {\n int a = 0;\n a++;\n }\n static void Render()\n {\n Console.WriteLine(\"@\");\n }\n\n public static async void GameLoop()\n {\n Stopwatch gameLoopTicks = Stopwatch.StartNew();\n\n while (true)\n {\n gameLoopTicks.Restart();\n\n if (Console.KeyAvailable == true)\n {\n char KeyPressed = Console.ReadKey().KeyChar;\n }\n UpdateGame();\n if (Draw == true)\n {\n Render();\n }\n ElapsedTicks = gameLoopTicks.ElapsedTicks;\n if (ElapsedTicks > FrameTimeTicks)\n {\n Draw = false;\n }\n else\n {\n Draw = true;\n await Task.Delay(TimeSpan.FromTicks(FrameTimeTicks - ElapsedTicks));\n }\n }\n }\n }\n}\n\nI Have also tried this variation but to the same result, my console application ends.\npublic static async void GameLoop()\n {\n Stopwatch gameLoopTicks = Stopwatch.StartNew();\n async Task PauseGameLoop()\n {\n //Console.ReadKey(); execution ends here!\n await Task.Delay(TimeSpan.FromTicks(FrameTimeTicks - ElapsedTicks));\n GameLoop();\n }\n\n while (true)\n {\n gameLoopTicks.Restart();\n\n if (Console.KeyAvailable == true)\n {\n char KeyPressed = Console.ReadKey().KeyChar;\n }\n UpdateGame();\n if (Draw == true)\n {\n Render();\n }\n ElapsedTicks = gameLoopTicks.ElapsedTicks;\n if (ElapsedTicks > FrameTimeTicks)\n {\n Draw = false;\n }\n else\n {\n Draw = true;\n await PauseGameLoop();\n }\n }\n\nTask.Delay MSDN, await MSDN. Am I tackling this problem the wrong way ? This post is why I chose this method. Thanks for the help!\n\nA:\n\nHow do keep the program from exiting when there's an active async function running?\n\nYou GameLoop is async but your Main function is not. By default, starting a Task starts it on pooled thread. The minimal changes to avoid exiting Main are to return a Task and wait on it in Main:\nstatic void Main() { \n GameLoop().Wait();\n}\n\npublic static async Task GameLoop() {\n .. same as before ..\n}\n\nA bigger issue will be that the resolution of the timer in Task.Delay is (system-dependent) probably only around 15ms, so you're not going to get very stable framerates. In fact, the resolution of sleeping a thread in general is going to be too low. \n\nHow to get consistent sleep times if Task.Delay isn't high-resolution enough?\n\nFor most consistent results, You'll want to look into implementing a fixed-timestep game loop where you just render as fast as possible (or perhaps spinwait any extra time away) or use VSync to naturally limit your loop speed. \nThe Go-to article on how to implement a fixed-timestep game loop has been Fix your Timestep, and there have been plenty of previous fixed-timestep questions asked here.\nWe take a page from the standard fixed-timestep pattern and wrap a main loop around a time-delta generating function. When that delta goes above our desired frameTime we call Update(). The rest of the loop consists of either a Thread.Sleep(1) if your platform has a high-resolution sleep timer or an empty loop while you're waiting for enough time to pass, to get a spinwait. In theory, you could use unsafe / unmanaged code to call the equivalent of _mm_pause to reduce your power consumption in the spinwait, but that's outside the scope of this answer.\nusing System;\n\nclass Program {\n public Program(double fps) {\n DesiredFPS = fps;\n frameTime = TimeSpan.FromSeconds(1.0 / fps);\n }\n double DesiredFPS;\n TimeSpan frameTime;\n // counts how many times we've looped while waiting\n int spinCounter = 0;\n System.Diagnostics.Stopwatch sw = new System.Diagnostics.Stopwatch();\n\n // this is the function we run at the desired FPS\n void Update() {\n Console.WriteLine(\"{0} {1}\", spinCounter, sw.Elapsed);\n spinCounter = 0;\n }\n\n void MainLoop() {\n sw.Start();\n var last = sw.Elapsed;\n var update_time = new TimeSpan(0);\n while (true) {\n var delta = sw.Elapsed - last;\n last += delta;\n update_time += delta;\n while (update_time > frameTime) {\n update_time -= frameTime;\n Update();\n }\n spinCounter++;\n // On some systems, this returns in 1 millisecond\n // on others, it may return in much higher.\n // If so, you should just comment this out, and let the main loop\n // spin to wait out the timer.\n System.Threading.Thread.Sleep(1);\n }\n }\n\n static void Main() { new Program(30.0).MainLoop(); }\n}\n\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"StackExchange\"\n}"}}},{"rowIdx":213776,"cells":{"text":{"kind":"string","value":"Q:\n\nThe approach to avoid including js file twice\n\nthis is a simple html file:\n\n\n \nTest Uploading Func.\n\n \n\n \n\n \n \n\n\n \n \n\n\nAnd this is the js file I want to include:\n$( '#Upload' ).bind('click', function(){\nalert(\">\");\n});\n\nIf I just include the js file in the beginning, the selector # can't know the id Upload so that I have to include it again \nat the end of the file... I do know it's not correct. But I don't know how to resolve it? Don't we just include all the js file within the tag head? \nWhat's the appropriate coding style I show have?\nThanks. \nUPDATE question!!!\nIf I have a lot of scenario like this, should I add \"$(document).ready()\" to all the functions? A little weird...\nStill another approach? Or web developers always do so. \nAnd where should I include my js file? In the begin or the end?\nIf I include them all in the end, this kind of problem won't appear.\nThen why lots of people include the js file just in the start?\n\nA:\n\nWait for the DOM to be ready before selecting elements:\n$(document).ready(function () {\n $( '#Upload' ).bind('click', function(){\n alert(\">\");\n });\n});\n\nUpdate:\nYou should always use $(document).ready(...) if you are manipulating elements that you expect to be on the page when your code runs. This is especially important if your code is in the of the document.\nYou are not required to use $(document).ready(...) if your code is inside the tag, but be aware that there are differences between the two.\n\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"StackExchange\"\n}"}}},{"rowIdx":213777,"cells":{"text":{"kind":"string","value":"Favorite Sites: Other\n\nNew Eyes\n\nWhile on a lecture tour in the fall of 2000, I spent some time in Seattle, on a leg of my trip organized by the estimable Walter Bodle, guiding light of Youth in Focus, an award-winning program for teaching photography to at-risk inner-city young people in that fine, damp city. Watching Walt and his dedicated crew at work with a cluster of excited, creative teens reminded me that this kind of grass-roots photo education took off in the 1960s.\n\nThere’s now close to half a century’s worth of collective, cumulative experiment in this approach to visual education, which has taken place not just all across this country but in fact all around the world. Yet you’ll find little published trace of any of that effort, and almost no reference to it in the literature of photo education specifically and visual education — a sad fact.\n\nIt struck me that the time might at last have come around for some project to distill the experience of those three decades plus — to consolidate the gains, assess the lessons, and seek to draw often isolated programs into a larger framework. With the 2005 Oscar for best Documentary Film going to Ross Kauffman and Zana Briski’s splendid Born into Brothels, which came out of the Kids with Cameras project, surely the moment has arrived to weigh what’s happened so far, and to plan what should happen next.\n\nSo I conferred with Nearby Café webmaster John Alley, whose day job has him teaching teaching photography in high school. In early 2006 we launched The New Eyes Project, a website intended to serve as a resource for everyone teaching photography to young people.\n\nIf you’re interested in this set of issues — and, of course, especially if, now or in the past (or in the future), you have had or expect to have any involvement in a program teaching photography to young people, at any age level and in any context — we’d like to hear from you. You can register yourself as a present or former K-12 photo-ed teacher or program director, and tell us about your program, at the New Eyes website. There you’ll also find readings, forums, links, and much useful material.\n\nIf you’d like to take part in the expansion of this site as a resource, contact me: adcoleman [at] k12photoed [dot] org. Much research remains to be done on the history of this important experiment in photo education. I’ll gladly confer with you about carving out a manageable chunk of that unexplored territory, and we can publish the results at the New Eyes site."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Pile-CC\"\n}"}}},{"rowIdx":213778,"cells":{"text":{"kind":"string","value":"Specification TableSubjectBiomedical signal processing, NeuroscienceSpecific subject areaCognitive neuroscience, Steady-state visual evoked potential, EEG acquisition.Type of dataRaw data of 22-channel EEG signals and a single-lead electrocardiogram (ECG) signal before and after the stimulus (consumption of caffeinated coffee).How data were acquiredData were acquired using a 32-channel EEG acquisition system (RMS Maximus 32 EEG machine)Data formatRaw data (.mat file)Parameters for data collection6 healthy participants (22--28 years age range) were considered for the analysis.Description of data collectionThe EEG signals were acquired prior-consumption as well as post-consumption of caffeinated coffee. The recordings were made by providing photic stimuli of frequencies that lie within the range of 3 Hz--30 Hz. The corresponding recorded signals were used to understand the influence of caffeinated coffee consumption on the SSVEP signal generation.Data source locationNational Institute of Technology, Rourkela, IndiaData accessibilityWith the article**Value of the Data**•The current dataset is recorded in the presence of seven photic stimuli frequencies during before and after-consumption of coffee. The pre-consumption data can be used to analyze the effect of SSVEP stimulus frequencies in the different parts of the brain.•The pre- and post-stimulus data combined can be used to assess the effect of caffeinated coffee on altering the SSVEP signals.•The 22-channel EEG data can be used for frequency-domain analysis and mapping of different brain regions using the Fast Fourier transform algorithm.•The single-lead ECG data can be used to study the impact of caffeinated coffee on heart physiology.•The dataset can also be explored with different feature extraction, classification, and SSVEP detection algorithms.\n\n1. Data {#sec1}\n=======\n\nThe steady-state visual evoked potential (SSVEP) is generated in the parieto-occipital regions of the brain whenever a source of light of constant stimuli frequency, is focused on the retinal cells \\[[@bib2],[@bib3]\\]. Caffeine, an essential constituent of coffee, is believed to have a partial impact on different brain regions such as parietal and occipital cortex areas \\[[@bib4],[@bib5]\\]. The current data set can be used to evaluate the post-consumption effect of coffee on the SSVEP activity in the brain regions. The EEG signals were recorded using a clinical EEG acquisition machine (RMS Maximus 32 CH). The equipment has 22 EEG channel electrodes, 2 mastoid electrodes, 1 ground electrode and two limb electrodes for ECG recording. The EEG electrodes were placed on the brain following the 10--20 standard positioning ([Fig. 1](#fig1){ref-type=\"fig\"}). The sampling frequency of the recording was maintained at 256 Hz.Fig. 1Placement of electrodes on the scalp using 10--20 international standard.Fig. 1\n\nThe recorded EEG data from a single volunteer contains the embedded signal of 7 different photic stimulus frequencies of 20s duration and the resting period of 10-sec in between two stimuli frequency. The useful 20s data for each photic stimulus frequency is then extracted \\[[@bib1]\\]. The 20s duration data can be divided into different trials of varying length to increase the sample size as per user requirement. The EEG data of each volunteer was stored in a.mat file, represented in the format of \"Vn_B\" and \"Vn_A\", where n represents the serial number of volunteers, and B and A represent before coffee and after coffee consumption condition, respectively. Information regarding the data collected is presented in [Table 1](#tbl1){ref-type=\"table\"}. Each.mat file contains a 7X2 cell array. The first column of the cell array contains the EEG signal in a 5120X23 matrix format, and the 2nd column contains the corresponding photic stimuli frequency. The number of rows in each data matrix is equal to the number of data points (256X20 = 5120) and the first 22 columns contains the corresponding amplitude value of each EEG channel (FP1, FP2, PG1, PG2, F7, F3, FZ, F4, F8, C3, CZ, C4, P3, P4, PZ, T3, T4, T5, T6, O1, O2, and OZ) at that data point. The last column contains the amplitudes of a single lead ECG signal ([Fig. 2](#fig2){ref-type=\"fig\"}) during the recording.Table 1The data of recorded EEG signals.Table 1Volunteer IDAge (in years)SexStimulus condition (Caffeinated Coffee).mat file00123MaleBeforeV1_BAfterV1_A00229MaleBeforeV2_BAfterV2_A00321MaleBeforeV3_BAfterV3_A00425MaleBeforeV4_BAfterV4_A00524MaleBeforeV5_BAfterV5_A00626MaleBeforeV6_BAfterV6_AFig. 2Description of the data (.mat file) of a single recording.Fig. 2\n\n2. Experimental design, materials, and method {#sec2}\n=============================================\n\nThis experiment is based on a within-group analysis that consists of two stages. In stage 1, EEG signals were acquired in the presence of seven photic stimuli frequency (3 Hz, 5 Hz, 10 Hz, 15 Hz, 20 Hz, 25 Hz, and 30 Hz). In stage 2, EEG signals were recorded 5 min after consumption of caffeinated coffee following the same protocol as in stage 1. Two types of stimuli were used in this experiment. A primary, photic stimulus of a certain frequency (to generate the SSVEP response) and a secondary stimulus, caffeinated coffee (to find the effect of coffee consumption on SSVEP). The stimuli frequency values used in this experiment were chosen in such a way that it will cover all the EEG bands ([Table 2](#tbl2){ref-type=\"table\"}) \\[[@bib6]\\].Table 2List of stimuli frequency considered in the experiment.Table 2Frequency BandRange of Frequency (in Hz)Frequency considered in this study (in Hz)Delta0--43Theta4--85Alpha8--1310Low-beta12.5--1615Beta16.5--2020High-beta20.5--2825Low-gamma30--10030\n\nSix healthy male volunteers, who are living a sedentary life and frequent coffee drinkers, were included in this experiment. Prior to recording, permission from the Institute ethical committee (NIT Rourkela) was taken for the recording of the EEG signals vide office order \\#NITRKL/IEC/FORM/2/35/4/11/001, Dated 13/12/2013. The participants were explained the detailed procedure and purpose of the experiment. Further, they were urged to sign a consent form as a record of agreement of their voluntary participation in the experiment. The consent form was prepared following the guidelines of WHO\\'s (World Health Organisation) informed consent for clinical study as a reference \\[[@bib7]\\] and is divided into three parts. Part-I contains the information related to the research, part-II contains the Information related to the volunteers and part-III contain the declaration made by the participant. A sample consent form has also been attached as a supplementary file. [Fig. 3](#fig3){ref-type=\"fig\"} shows the different sections of the consent form, used in this experiment. The volunteers were also assured that they can leave the experimental procedure at any time if they feel uncomfortable or change their minds.Fig. 3The different subsections of the consent form.Fig. 3\n\nThe EEG signals were recorded using a 32-channel EEG machine, capable of recording 22 EEG signals from different brain regions. The electrodes were placed on the scalp using an electrode cap. The electrodes on the cap were arranged following the 10--20 international standard configurations. After mounting the electrode cap, the contact impedances of the electrodes were adjusted to \\<20 KΩ. This was achieved by applying a conducting gel on the electrode scalp interface. The sampling frequency of the recording was maintained at 256 Hz. The volunteers were instructed to abstain from food and beverages before 2 h of recording. During recording, they were asked to sit on a chair inside a dim-lit room in a relaxed position. A set of LED was placed in front of their eyes at a distance of 60 cm. The LEDs were made to flicker at seven different frequencies (3 Hz, 5 Hz, 10 Hz, 15 Hz, 20 Hz, 25 Hz, and 30 Hz). The volunteers were requested to stare at the flickering light source during the process of EEG recording. The LED flickered at each stimulus frequency for a period of 20s with a 10s gap between two consecutive frequency stimulation. In the first phase, the EEG signals were recorded without any stimulus (pre-consumption of coffee). In the next phase, the volunteers were served a hot cup of coffee (120 ml containing 1.5 mg of coffee powder). After 5 min of consumption, the EEG signals were re-recorded following the same protocol.\n\nConflict of Interest {#sec3}\n====================\n\nThe authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.\n\nAppendix A. Supplementary data {#appsec1}\n==============================\n\nThe following are the Supplementary data to this article:Multimedia component 1Multimedia component 1Multimedia component 2Multimedia component 2Multimedia component 3Multimedia component 3Multimedia component 4Multimedia component 4Multimedia component 5Multimedia component 5Multimedia component 6Multimedia component 6Multimedia component 7Multimedia component 7Multimedia component 8Multimedia component 8Multimedia component 9Multimedia component 9Multimedia component 10Multimedia component 10Multimedia component 11Multimedia component 11Multimedia component 12Multimedia component 12Multimedia component 13Multimedia component 13Multimedia component 14Multimedia component 14\n\nSupplementary data to this article can be found online at .\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"PubMed Central\"\n}"}}},{"rowIdx":213779,"cells":{"text":{"kind":"string","value":"\"More doors are now open to women, but they can now see how far they are from equality in high-level jobs.\"\n\nWASHINGTON — Young American women are increasingly likely to receive pay nearly equal to their male counterparts, with earnings at 93 percent of men, a new study finds. Still, those women remain as pessimistic as their mothers and grandmothers regarding gender equality.\n\nWhile women under 32 now have higher rates of college completion than men that age, the analysis of census and labor data shows their hourly earnings will slip further behind by the women's mid-30s, if the experience of the past three decades is a guide.\n\nMore online\n\nwww.pewresearch.org\n\nThat widening gap is due in part to the many women who take time off or reduce their hours to start families. Other factors cited in the report are gender stereotyping, discrimination, weaker professional networks and women's hesitancy to aggressively push for raises and promotions, which together may account for 20 to 40 percent of the pay gap.\n\nIn all, 75 percent of women ages 18-32 say the U.S. needs to do more to bring about equality in the workplace, a percentage similar to baby boomer women ages 49-67 and higher than other age groups. Some 57 percent of young men answered that way.\n\nEven so, just 15 percent of young women say they have been discriminated against because of their gender.\n\n\"Today's generation of young women is entering the labor force near parity with men in terms of earnings and extremely well prepared in terms of their educational attainment,\" said Kim Parker, associate director with the Pew Social & Demographic Trends Project. \"They feel empowered in many ways, yet when they look at the workplace, they see it as a 'man's world' with the deck stacked against them.\"\n\n\"They think that men earn more than women for doing the same job and that it's easier for men to get top executive jobs than it is for women,\" she said.\n\nWomen are increasingly moving into higher career positions both in government and business. They make up nearly half the workforce, and the share of women in managerial and administrative occupations is nearly equal to that of men — 15 percent compared to 17 percent. Another landmark came Tuesday, when General Motors picked Mary Barra, a 33-year company veteran, as the first female head of a major U.S. car company. Still, women currently hold just 4.5 percent of Fortune 1000 CEO positions, the Pew report said.\n\nAndrew Cherlin, a sociology professor at Johns Hopkins University, attributed young women's negative assessments about gender equality to their rising career expectations. \"More doors are now open to women, but they can now see how far they are from equality in high-level jobs,\" he said.\n\nThe near-equal pay for young women is being driven in large part by their educational gains. Some 38 percent of women ages 25-32 now hold bachelor's degrees, compared to 31 percent of young men. As a result, 49 percent of employed workers with at least a bachelor's degree last year were women, up from 36 percent in 1980. That means more women in higher-skilled, higher-paying positions.\n\nThe current ratio of hourly earnings for young women to young men, now at 93 percent, is up from 67 percent in 1980 and is the highest in government records dating back to at least 1979. Across all age groups, the median hourly wage for women last year was 84 percent as much as men — $14.90 vs. $17.79, up from 64 percent in 1980.\n\nAt the same time, the Pew study indicates that a woman's job advancement often will hit a ceiling, due in part to competing demands of work and family. Women remain twice as likely as men to work part-time and are more likely to take significant time off from employment during their lives to care for children or other family members.\n\nAmong young women, 59 percent say that being a working parent makes it harder to advance in a job or career, compared to just 19 percent of young men. Across all age groups, 22 percent of women and 9 percent of men report having quit jobs for family reasons at some point during their working lives.\n\nFewer young women than young men aspire to become a boss or top manager. Some 34 percent say they're not interested, compared to 24 percent of young men. And the vast majority of adults of all ages who reduced their work hours to care for family members — 94 percent — say they are glad they did it.\n\n\"This report shows that we are still very much in a 'stalled revolution' when it comes to gender equality in the workplace — and young women see it,\" said Pamela Smock, a sociology professor at the University of Michigan. \"When we see our male CEOs taking off a day to care for a sick child, then we will be working in a more gender-equal workplace — and a more gender-equal world.\"\n\nThe Pew study was based on interviews with 2,002 adults by cellphone or landline from Oct. 7 to 27. The Pew poll has a margin of error of plus or minus 2.7 percentage points."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Pile-CC\"\n}"}}},{"rowIdx":213780,"cells":{"text":{"kind":"string","value":"The Marcellus Shale has been underneath Pennsylvania for centuries, but the extraction of natural gas began only recently. The \"fracking\" boom is changing the landscape of northeastern and southwestern Pennsylvania. Use this tool to learn which operators are drilling, and where. Find active wells in your county or municipality — and see whether the drillers have been cited for violating state environmental regulations. Read more about the data."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"OpenWebText2\"\n}"}}},{"rowIdx":213781,"cells":{"text":{"kind":"string","value":"Increasing top-down suppression from prefrontal cortex facilitates tactile working memory.\nNavigated transcranial magnetic stimulation (TMS) combined with diffusion-weighted magnetic resonance imaging (DW-MRI) and tractography allows investigating functional anatomy of the human brain with high precision. Here we demonstrate that working memory (WM) processing of tactile temporal information is facilitated by delivering a single TMS pulse to the middle frontal gyrus (MFG) during memory maintenance. Facilitation was obtained only with a TMS pulse applied to a location of the MFG with anatomical connectivity to the primary somatosensory cortex (S1). TMS improved tactile WM also when distractive tactile stimuli interfered with memory maintenance. Moreover, TMS to the same MFG site attenuated somatosensory evoked responses (SEPs). The results suggest that the TMS-induced memory improvement is explained by increased top-down suppression of interfering sensory processing in S1 via the MFG-S1 link. These results demonstrate an anatomical and functional network that is involved in maintenance of tactile temporal WM."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"PubMed Abstracts\"\n}"}}},{"rowIdx":213782,"cells":{"text":{"kind":"string","value":"Dr. Philippe Szapary plans a career as a clinician investigator at the University of Pennsylvania School of Medicine, focusing his research on the critical evaluation of complementary and alternative medicine (CAM). His training will include formal course work towards a Master's of Science in Clinical Epidemiology with a specific focus on patient-oriented research (POR). To supplement his formal research training, he also plans to take courses in pharmacognosy and ethnobotany at the University of the Sciences in Philadelphia (USP). Using his formal training in POR and botanical pharmacology, Dr. Szapary plans to establish himself as an independent investigator focusing on new and existing cardiovascular CAM therapies. Environment: The University of Pennsylvania and nearby USP are uniquely suited to provide complementary training and resources for this award. At Penn, the Center for Clinical Epidemiology and Biostatistics will provide the formal POR research training. The Cardiovascular Risk Intervention Program and the Division of General Internal Medicine will provide study subjects. The General Clinical Research Center will provide ancillary support including nurses, a dietitian, a biostatistical programmer and laboratory services. At USP, the Department of Pharmacognosy will provide technical support in the analysis of study drugs. Research: In the last 10 years, patients have markedly increased their use of dietary supplements to treat and prevent chronic medical conditions like atherosclerotic cardiovascular disease. This widespread use continues despite little scientific evidence of benefit from randomized controlled trials (RCTs). Current estimates suggest that 30 percent of Americans are hypercholesterolemic. Serum cholesterol remains one of the strongest predictors of risk for coronary artery disease, the leading cause of death in Americans. Herbal therapies have multiple mechanisms of action making them attractive in the prevention of a multifactorial disease process like atherosclerosis. Two Ayurvedic herbals, gugulipid and curcuminoids, appear to have hypolipidemic, antioxidant and anti- inflammatory effects in humans. In this protocol, Dr. Szapary will primarily study the hypolipidemic effects of standardized extracts of curcuminoids and gugulipid in two RCTs. These trials will assess the safety and efficacy of these two agents when used alone and in combination, as done in Ayurvedic medicine, over a 3 to 6 month period. In addition, Dr. Szapary will examine their effects on state of the art biomarkers of oxidant stress and vascular micro-inflammation, both of which are important processes in the pathogenesis of atherosclerosis. These studies will help define the role of these herbal therapies in the prevention of atherosclerosis, and serve as a model for the critical evaluation of dietary supplements in cardiovascular disease."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"NIH ExPorter\"\n}"}}},{"rowIdx":213783,"cells":{"text":{"kind":"string","value":"\n23 B.R. 392 (1982)\nIn the Matter of Oliver PLUNKETT, Monica Plunkett, Debtors.\nQUARLES HOUSE APARTMENTS, Plaintiff,\nv.\nOliver PLUNKETT, Monica Plunkett, Thomas Korb, Interim Trustee, Defendants.\nQUARLES HOUSE APARTMENTS, Plaintiff,\nv.\nOliver PLUNKETT, Monica Plunkett, Ralph Anzivino, Trustee, Defendants.\nBankruptcy No. 82-01119, Adv. Nos. 82-0481, 82-0674.\nUnited States Bankruptcy Court, E.D. Wisconsin.\nSeptember 27, 1982.\n*393 Harry W. Theuerkauf, Keith R. Varner, Milwaukee, Wis., for plaintiff.\nDonald A. Schoenfeld, Habush, Habush & Davis, James Shellow, Shellow, Shellow & Glynn, Milwaukee, Wis., for debtors/defendants.\nDavid A. Erne, Reinhart, Boerner, Van Deuren, Norris & Rieselbach, S.C., Milwaukee, Wis., for trustee Anzivino.\nRichard E. Braun, Whyte & Hirschboeck, Milwaukee, Wis., for Unsecured Creditors' Committee.\nStephen E. Kravit, Godfrey & Kahn, Milwaukee, Wis., for Continental Bank.\n\nMEMORANDUM DECISION\nC.N. CLEVERT, Bankruptcy Judge.\nThe narrow issue before the court, on the Trustee's motion for partial summary judgment, is whether, as of the date of the filing of his Chapter 11 petition, Oliver Plunkett's right to manage the Quarles House Apartments and to receive 6% of the annual gross rental as a management fee, in accordance with the Quarles House Apartments partnership agreement, constituted property of the estate under 11 U.S.C. § 541.\nFor the purpose of this motion, the parties have stipulated to the facts. The relevant facts are as follows: The plaintiff, Quarles House Apartments (\"Quarles House\"), is a Wisconsin general partnership, organized on or about June 1, 1978, for the purpose of purchasing, owning and operating income producing property, including the Quarles House Apartments, located at 1570 North Prospect Avenue, Milwaukee, Wisconsin.\nSection 5.01[1] of the partnership agreement designated Oliver Plunkett (\"Plunkett\"), the debtor, as the managing partner of the Quarles House and gave him \"full charge and control of the management, conduct and operation of the ordinary affairs of the Partnership business\". The provision further entitled him to receive a management fee equal to 6% of the annual gross rental income, which amounted to $31,320 in 1981. From June of 1978, Plunkett acted as managing partner of the Quarles House and was acting in that capacity on April 15, 1982, the date that he and his wife filed a joint Chapter 11 petition.\nOn April 20, 1982, five days after the filing of the petition, at a meeting of investors of the Quarles House, 73.56% of the investors voted to remove Oliver Plunkett as managing partner. The legal effect of the vote to remove him is the ultimate issue presented by this motion.\n11 U.S.C. § 541 provides, in pertinent part:\n(a) The commencement of a cause under section 301, 302, or 303 of this title creates an estate. Such estate is comprised of all the following property\n\n*394 (1) . . . all legal or equitable interests of the debtor in property as of the commencement of the case.\nThe broad language of the statute reflects Congress' intent to expand the scope of \"property of the estate\" to eliminate substantial litigation which arose under § 70 of the Bankruptcy Act of 1898:\nThe bill makes significant changes in what constitutes property of the estate. Current law is a complicated melange of references to State law, and does little to further the bankruptcy policy of distribution of the debtor's property to his creditor in satisfaction of his debts. . . .\nThe bill determines what is property of the estate by a simple reference to what interests in property the debtor has at the commencement of the case. This includes all interests, such as interests in real or personal property, tangible and intangible property, choses in action, causes of action, rights such as copyrights, trade-marks, patents and processes, contingent interests and future interests, whether or not transferable by the debtor. . . .\nThese changes will bring anything of value that the debtors have into the estate. The exemption section will permit an individual debtor to take out of the estate that property that is necessary for a fresh start and for the support of himself and his dependents. Certain restrictions on the transferability of property will prevent the trustee from realizing on some items of property of the estate. But on the whole, the trustee will be able to bring all property together for a coherent evaluation of its value and transferability, and then to dispose of it for the benefit of the debtor's creditors.\nH.R.Rep.No. 95-595, 95th Cong., 1st Sess. 175-176 (September 8, 1977), U.S.Code Cong. & Admin.News 1978, pp. 5787, 6136.\nFollowing the intended comprehensive approach to property of the estate, courts interpreting § 541 have generally protected a debtor's contractual right as an asset of the estate.[2]\nBy its very nature and terms, the managing agreement between Plunkett and the other general partners of Quarles House constituted a contract, a necessary element of a partnership under Wisconsin law.[3] Absent any evidence that the Partnership Agreement is unenforceable, this court must conclude that the contractual provision in dispute was valid and enforceable. Any rights, benefits or duties flowing from this provision, therefore, constituted property of the estate of the debtor within the meaning of 11 U.S.C. § 541 as of April 15, 1982.\nAccordingly, the trustee's motion for partial summary judgment is hereby granted and Oliver Plunkett's right to manage the ordinary affairs of the Quarles House Apartments and receive a management fee equal to 6% of the annual gross rental income from the Quarles House Apartments, in accordance with § 5.01 of the Quarles House partnership agreement dated June 1, 1978, is hereby held to be property of the joint Chapter 11 estate of Oliver and Monica Plunkett, as defined by 11 U.S.C. § 541(a).\nNOTES\n[1] Section 5.01. Managing Partner. For convenience and for the efficient management of Partnership affairs, and not in derogation of any managerial rights which the other Partners may have, Oliver Plunkett shall be the Managing Partner under this Agreement, and he shall have full charge and control of the management, conduct and operation of the ordinary affairs of the Partnership business. The Managing Partner shall promptly take all action which may be necessary or appropriate for the purchase and development of the project in accordance with the provisions of this Agreement and applicable laws and regulations. The Managing Partner shall devote to the Partnership such time as may be necessary for the proper performance of his duties. The Managing Partner shall cause the Partnership to obtain and keep in force insurance of such types, including fire and extended coverage in public liability insurance, in such amounts, on such terms and with such carriers as will in his judgment adequately protect the Partnership and its property. The Managing Partner shall be entitled to a management fee equal to 6% of the annual gross rental income.\n[2] See, In re Adana Mortgage Bankers, Inc., 12 B.R. 989, 7 B.C.D. (CRR) 1085 (Bkrtcy.N.D.Ga. 1980) (the debtor's right to hold and service mortgages under an agreement with Government National Mortgage Association was property of the estate); Varisco v. Oroweat (In re Varisco), 16 B.R. 634, 8 B.C.D. (CRR) 772, Bankr.L.Rep. (CCH), ¶ 68528 (Bkrtcy.M.D.Fla. 1981) (the debtor's exclusive right under a franchise agreement to distribute baked goods constituted property of the estate).\n[3] Sander v. Newman, 174 Wis. 321, 327-328, 181 N.W. 822 (1921); see, also, Heck & Paetow Claim Service, Inc. v. Heck, 93 Wis.2d 349, 359, 286 N.W.2d 831 (1980).\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"FreeLaw\"\n}"}}},{"rowIdx":213784,"cells":{"text":{"kind":"string","value":"Why 'MAGAnomics' Isn't Likely To Work\n\nEnlarge this image toggle caption Mandel Ngan/AFP/Getty Images Mandel Ngan/AFP/Getty Images\n\nThe Trump administration this week unveiled its strategy for the economy and dubbed it \"MAGAnomics.\"\n\nIn the Wall Street Journal, Trump budget director Mick Mulvaney wrote that \"the focus of MAGAnomics is simple: Grow the economy and with it the wealth of, and opportunity for, all Americans.\"\n\nThe simple plan: Ratchet the economic growth rate up to a sustained 3 percent annually. That's an ambitious target, given current levels of around 2 percent.\n\nBut there are a couple of problems. One is that sustained 3-percent growth is highly unlikely — and it's not a simple proposition.\n\n\"I can't see how it's achievable,\" said Joel Naroff, chairman of Naroff Economic Advisers, an economic consulting firm. \"I never say never. Anything is possible. But the possibility of that happening is between slim and none.\"\n\nAnother problem is that some Trump policies could in fact work against achieving that level of economic growth.\n\nAnd a Congressional Budget Office analysis released the day after Mulvaney's op-ed delivered a blow to \"MAGAnomics,\" estimating the Trump budget would fall well short of its economic growth goal.\n\nThe nonpartisan referee of all things money on Capitol Hill estimated that the Trump budget would only yield 1.9 percent economic growth on average over the next decade. That's not only below the 3-percent goal, it's also not much of an improvement — it's just 0.1 percentage point higher than what growth would be under current law.\n\nExperts say sustained 3-percent growth is unrealistic\n\nIt's possible, of course, for the economy to get to 3 percent for a short while — tax cuts, for example, could bump growth up to that mark \"for a few quarters, but not a few years.\"\n\nIndeed, GDP growth bounces up and down from quarter to quarter. In the third quarter of 2016, for example, it reached 3.5 percent. But the economy hasn't held around or above 3 percent for an extended period of time since the booming 1990s.\n\nAnd there are significant economic factors holding the U.S. back from that kind of growth. The Committee for a Responsible Federal Budget illustrated this in a May report. In order to get to near 3-percent growth, major factors that contribute to growth would have to bounce back to the booming levels of a quarter century ago.\n\n\"By our estimates, returning capital growth, productivity growth, and prime-age labor force participation to where they were in the 1990s would result in 2.9-percent growth,\" they wrote, adding that that's \"an unlikely scenario given recent trends.\"\n\nAnd top economists from both sides of the political spectrum have recently framed 3 percent as an unreasonably high aim.\n\n\"If we could move the U.S. from where it is now, which is say somewhere between 1.8 and 2 [percent GDP growth rate] to somewhere like 2.5, or God forbid 2.75,\" said Doug Holtz-Eakin, former director of the CBO and president of the conservative American Action Forum, at a May panel discussion in Chicago. \"If we did that, that's hall-of-fame work. That's hard.\"\n\n\"Yeah. If you went from 2 to 2-and-a-half, that would be amazing,\" concurred Austan Goolsbee, who chaired President Obama's Council of Economic Advisers.\n\nOne big Trump policy area could undermine growth\n\nThe size of the labor force and productivity growth are the two big factors that dictate the size of the economy, according to Holtz-Eakin. And growth in the labor force — that is, growth in the pool of people working or looking for work — has slowed way down, largely due to an aging population.\n\nHere is how the annual growth rate in the labor force looks over time:\n\n\"The only way to reverse that is to have a fundamental change in our immigration policies and generate more workers in the near term,\" said Holtz-Eakin at that May event. \"Without immigration, the U.S. is Japan: it shrinks and gets old.\"\n\nBoomers are aging out of the workforce; there's no reversing that. And the birth rate has fallen off. So immigration could be key here. People oppose or promote immigration for a variety of reasons, including a view that immigrants take American jobs. But, actually, slashing the number of immigrants — in the country illegally or legally — would likely mean negative economic consequences for the U.S.\n\nIt's true that Mulvaney proposes more work incentives — encouraging people back into the labor market via welfare reform. That could boost the labor force, but not by a lot, said one expert.\n\n\"So the slower economic growth that's due to the labor force, about 80 percent of that is from the aging of the population,\" said Maya McGuineas, president of the Committee for a Responsible Federal Budget. And once again: lower immigration levels, and you offset whatever you gain from doing welfare reform.\n\nThe other factor here is productivity — and economists aren't totally sure why it's so low. A few policies could potentially help — for example, the tax reform that Mulvaney proposes. But, McGuineas said, if it increased the debt, it's possible it could also slow economic growth in the long run.\n\nNot only that, but tax reform might only be a short-term shot in the arm, Naroff added. It may not deliver productivity growth that lasts.\n\nOne more policy area to consider is trade. The Trump administration pulled the U.S. out of the Trans-Pacific Partnership, one area that CRFB and some economists predicted would contribute to economic growth. Trump has talked about inserting the U.S. into what he believes would be \"fair\" trade deals. Depending on what the administration ends up doing on trade, that could also play a part in boosting (or hurting) U.S. growth.\n\n\"They\" said it can't be done\n\nThere's something distinctly Trumpian about the administration's economic plan (The MAGA in MAGAnomics derives its acronym from Trump's Make America Great Again campaign slogan.)\n\nPart of it is the fact that its main 3 percent goal seems unattainable. Trump proposed other similarly difficult-to-imagine policies during his campaign: deporting 11 million people in the U.S. illegally and promising to bring the federal debt to zero in eight years are examples.\n\nMulvaney acknowledges that many have called 3-percent growth unfeasible but shrugs it off with a kind of tough, rugged-individualistic attitude:\n\n\"For merely suggesting that we can get back to that level, the administration has been criticized as unrealistic. That's fine with us. We heard the same pessimism 40 years ago, when the country was mired in 'stagflation' and 'malaise.' But Ronald Reagan dared to challenge that thinking and steered us to a boom that many people thought unachievable.\"\n\nThe premise here seems to be that getting the economy to hit a certain level is in large part a function of having leaders who are independent-thinking enough to go their own way and really try. A failure of the economy here seems to be merely a failure of the imagination.\n\nAnd, in fact, a slow economy may not be just a failure of policy but a kind of conspiracy, in Mulvaney's telling — that there are unnamed, shadowy forces \"who don't want you to remember—what a great America means.\"\n\nThis kind of \"they said it couldn't be done\" thinking is a common theme for the Trump administration — it pops up every time the president gloats about how no one thought he could win the election.\n\nNow, it has brought it over into the realm of economics. It makes the administration's message coherent rhetorically, but it doesn't mean that the economic policies will deliver.\n\nWinning the Electoral College, it turns out, is a very different beast from growing the economy.\n\nWith reporting from Uri Berliner."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"OpenWebText2\"\n}"}}},{"rowIdx":213785,"cells":{"text":{"kind":"string","value":"Category Archives: Business\n\nAs the pace of business continues to accelerate, there seems to be one aspect of the business process model that is struggling to keep up: The Business Case. There was a time where capital expenditures were looked upon as long term investments by the business. The life-cycle and pay-back processes, as well as the accounting amortization of these investments, were expected to last years, and in some instances, even decades. The average business case became attuned to these norms.\n\nBut those days are long gone. As the speed with which technology has changed has continued, by necessity the business case used to justify the new or incremental investment has needed to become shorter. If Moore’s law of eighteen-month capability doubling (it was actually Intel executive David House, who predicted that chip performance would double every 18 months. Gordon Moore, for whom the law is named, was the co-founder of Fairchild Semiconductor and Intel, and whose 1965 paper described a doubling every two years in the number of transistors per integrated circuit was the basis for the coining of the “law”) is to be believed, then the asymptote for the length of an acceptable business case should approach that eighteen month to two year limit as well.\n\nThat doesn’t mean that a product’s useful life is only limited to eighteen months. I think quite the contrary. There are aspects of the Public Switched Telephone Network (PSTN) that have been in place for more than fifty years, and are still providing beneficial service to the communications carriers and their subscribers alike.\n\nOn the other hand, people are known to line up and over-night camp out every eighteen to twenty-four months in order to be the first to get the next generation of the Apple iPhone.\n\nIt appears that customers who are being asked for either capital or operational expenditures associated with technology oriented products, are driving their partners and their vendors to ever more rigorous and aggressive value propositions and rates of return. This is the genesis of the short horizon business case.\n\nThe simplest definition of value is how much money is made or saved over what period of time. The more you make, or the more you save over a given period, the better the value. In the past it was acceptable for a business case to extend out over a long enough time period as to show an acceptable return. If the initial business case for the sale didn’t make sense for one period of time, it was easy just to lengthen out the time frame until it did.\n\nWhat appears to be happening is that as the rate of technological based product change has continued at the speed of Moore’s Law, the period that a customer is willing to measure value has shrunk. Business cases still need to show the customer value, they now must do it in far less time. The tried and true form of extending the business case period to make the value and pay back equations work is now gone. Customers will no longer accept it, and are driving for shorter and shorter review periods.\n\nI think there are several factors in addition to technical obsolescence that are helping to drive a short horizon on the business case:\n\nAs each new generation of technology arrives it almost exponentially drives down the (residual) value of previous generations. I think it is no secret that one generation old technology is viewed as old and disadvantaged, and that two-generation old technology is probably approaching the zero value state. We have all seen this in our consumer based technology purchases as well. Products get old so quickly that we have developed a disposable attitude toward them. With Personal computers now going for a few hundred dollars, what is the value of a two-generation old computer? What was once repaired and retained is now simply expected to be replaced.\n\nHow would consumers (and manufacturers) react if the same logic was applied to say, automobiles and two to three model year old car was considered almost valueless?\n\nWe also see (comparatively) decreasing operational returns as each new technology generation is introduced. This means that as each new product gets smaller and more efficient the value of generating operational savings associated with the previous generation of product also tends to get devalued.\n\nThe idea of saving something with what you have is not as attractive as the possibility of saving more with something new. I guess this is what they call “Marketing”.\n\nI think one of the final evolution’s of the short horizon business case is the “Cloud”. I am sure everyone has heard of this thing. It’s in all the magazines.\n\nOne of the many ways that manufacturers and vendors have adapted to the evolving business case rules is to try and remove both the obsolescence associated with technology and to more closely align the delivered solution with the customer’s need. The idea being that if a customer only needs a four-unit solution but the technology only comes in six or eight unit increments, there is a delivered solution miss-match.\n\nBy delivering a function from the cloud as opposed to a product based solution, the vendor has effectively removed technology obsolescence from the customer’s decision process, as well as matched the required amount of solution with the required amount of need.\n\nThe net result is a much shorter period needed to achieve the required business case. Customer purchases can be made in smaller increments, which in turn only require smaller pay-backs. Future product purchases and existing product obsolescence are removed from the customer’s decision criteria as the customer is now only purchasing the product’s function, not the product itself. The obsolescence issue, and all the other costs associated with operation of the product are now retained by the vendor (and should be built into their business case).\n\nThe continued drive for more value has driven customers and business cases to the short horizon. Capital for technology can no longer be viewed as a long-term investment. It must be judged and justified by how quickly it can pay back on its cost and the relative business value it generates. It is this drive for better business returns that continues to reduce the time scale associated with the business case.\n\nThis trend would appear to potentially be a seed cause for future changes to the way business is conducted. On one hand it will continue to make the sale of capital based technology products more difficult. By demanding shorter pay-back and business case periods, customers are in essence expecting lower prices for products, and higher value delivered. That is a demanding and difficult environment for any supplier.\n\nIt should also continue to drive product virtualization and the Cloud as ways for suppliers to retain costs and risks, and hence remove them from the customer’s business case. This will continue to be an interesting market, but not all technologies and products may be potential candidates for the cloud.\n\nIt could also be argued that a potentially unexpected result of the drive to align business cases with product life cycles could be the reversal of Moore’s Law. It has long been expected that there is some sort of limit to the capacity doubling process. It has been going on for over fifty years. There are recent articles in no less than the MIT Technology Review, Ars Technica, and The Economist (to name just a few) that are now stating that Moore’s Law have in fact run its course.\n\nAnd this may also be of benefit to business. If customers want to align their capital business case length with the product’s life cycle, and the current eighteen to twenty-four month life cycle of the product makes this increasingly difficult, then one of the solutions may be to lengthen the product life cycle to more than twenty-four months. If there truly is a link between business case length and product life cycle, then this could be a possible solution.\n\nThis will be an interesting cause and effect discussion. Is the potential slowing of Moore’s Law going to cause the reversing of the short horizon trend associated with customer’s business cases, or is the demand for short horizon business cases going to accelerate the slowing of Moore’s Law due to business necessities? Either way, customers are requiring businesses to change the way they put together the business case for capital technology sales, and that is having a significant effect on how business can successfully get done.\n\n“My mind is aglow with whirling, transient nodes of thought careening through a cosmic vapor of invention. My mind is a raging torrent, flooded with rivulets of thought, cascading into a waterfall of creative alternatives…”\n\n(Hedley (not Hedy) Lamarr in Mel Brooks’ “Blazing Saddles”.)\n\nDitto.\nExtra points if you knew who said that as well as who uttered the response.\n\nI seem to have costs on my mind (as well as a lot of other things, apparently) these days. I didn’t know what I wanted to address in this posting: Cost Reduction, Business Cases, Business Predictability all seemed to have been foremost in my mind among the possible group of posting topics. It seemed like the best thing to do was get started and see where it went. It went to “Blazing Saddles”. I don’t know if it is recoverable from there, but I will try.\n\nSince this is nominally a Business Blog, and I did at least tangentially address cost reduction as one of the primary growth industries in business in my last posting, I think that I will head over into business cases. However, do not lament the transition away from cost reduction entirely, as costs do play an important role in the creation of any good business case.\n\nIt appears that creating or generating a really good business case is becoming a lost art. Coming up with an idea, specifying the investment parameters, analyzing the markets and demands, and ultimately defining the returns and value to the company are some of the building blocks of a successful business. It is a rigorous process (and it should be) because it deals with the lifeblood of the business – money.\n\nThis is not going to be some sort of a “how to” do a business case primer. It’s more about what they are and why they’re needed. Simply put, a business case is the justification package that you put together when you want the company or organization to invest in something. This is a very high level definition. The “something” to be invested in can be almost anything: research and development for new products, production automation equipment to reduce the labor component associated with manufacturing, additional sales people in an effort to expand the addressable market and grow sales, are just a few of the fun ones that come to mind.\n\nBusiness cases are all about what the company should invest in. Investing is all about money, specifically when you spend it, how much of it you spend, when you get it back and how much more of it you get back. Businesses are in business to make money. Like every good investor, when money is spent or invested, a return is expected on that money or investment. If that does not seem to be the case, then the business case process has probably broken down.\n\nI do not claim to be a business case guru. I have put several of them together and have found a few topics that I look for in every good business case. If you want to find out all that should be included in a business case, just Google “Business Case Template”. I think you will get a little more than eight million results.\n\nIn my experience, every good business case should have the following three major components:\n\nWhat is it that is wanted?\nWhat are you asking for and how much is it going to cost? Every business case is about asking for money. In the examples I cited above you would be asking for a specific amount of money for either research and development (people, lab space, lab equipment, etc.), money for manufacturing equipment for automated production, or money for salaries for incremental sales people. This amount is known as the investment.\n\nWhat is it that you get for the money?\nWhy would the organization or business want to give you this money? What are they going to get in return? If it is for research and development, what products are they going to get and how will they positively affect the growth of the company. If it is for an automated production line, how much are production costs going to be decreased. If it is for additional sales people, how much are sales going to increase.\n\nWhen do they get their money back?\nNo, the organization is not “giving” you money. Think of it as a loan. Every loan needs to be paid back, with interest. This interest is usually in the form of increased profits for the company, either in the form of margins from increased sales or reduced costs. If you don’t believe me on this repayment with interest thing, just ask the bank or financing company the next time you want to invest in a car or house. I think they will be quite specific regarding the interest you will be paying on the loan and the expected repayment schedule that they will require you to comply with. This money that is given back to the company is known as the return on investment.\n\nBusiness Case Tip #1.\nOne of the guiding principles of a good business case is that the return on investment should be greater than the investment itself was.\n\nI don’t think there are many (any?) other business case tips that can be given that have the same importance as this one. A proper business case requests a specific amount of money. It defines what the money will be used for (spent on). It specifies what will be produced (new products, cost reductions, increased sales, etc.). It also forecasts when and how much the returns will be. It is all about the numbers.\n\nIt is this last part which is especially important. When are they going to get their money back. It is during this discussion when you may hear a term such as “pay-back”. Pay-back is when they get all of their original investment back. This is the break-even point. After this, everything that is returned to the company is a benefit or profit.\n\nBusiness Case Tip #2\nNo matter how soon or how quickly the business case hits the “pay-back” point, it will not be soon enough.\n\nContrary to what some may believe, money in a company is not free. A company must pay for its money, one way or the other. A company can fund a business case investment via either debt or equity financing. In debt financing it is the interest and overheads that it must pay on the loan (debt) it takes out to get the money. In equity financing it is the relative risk and return it must pay in the form of stock appreciation or dividends to the equity investor in order to attract them. This is called “the cost of capital”. It is in effect the interest or discount rate that the company must use in the business case when it looks at the future returns on its investment.\n\nThe longer it takes to reach pay back to the company, the more the amount of discount that is applied to the return. The greater the discount, the more difficult it should be to make the business case work.\n\nRemember that there is a limited amount of investment money that is available to any company. There is only so much that the company can borrow before the financial position of the company is adversely affected by its debt position and only so much stock that can be issued before the market adversely affects the equity price and expectation for the stock.\n\nThere are also other businesses and organizations within the company that would like to invest in their opportunities as well. That will create a competition for those investment funds. So how should the company decide where to invest?\n\nThere are usually two instances where a company will invest. One of the easiest is to invest only in those business cases that provide the greatest return on the investment. That would be those opportunities that have the best business cases. You have just seen above what should be expected at a high level for a good business case.\n\nThe second place that a company usually invests is in those strategic initiatives that may not provide the best return but are required for the long term health of the company. What are these strategic initiatives you may ask? That’s a good question. I have found business cases to try to define themselves as a strategic initiative when they contain a request for funding that does not show a reasonable return on the requested investment.\n\nThat’s probably not entirely true. There are investments for things such as core technologies that other products are built from that could be defined as strategic (among the many others of this type) as well as initiatives outside of the financially definable realm such as the reduction of carbon footprints or diversity that may not contribute directly to the financial well being of the company, but should be done none the less for the greater good of the company.\n\nCompanies expect and need to make money. Otherwise they normally do not get to remain companies for very long. I think a great deal of any company’s success can probably be attributed to how strong their business case process is, and how well they adhere to it. Having people who understand what a good business case is can go a long way to attaining that success.\n\nI like to read. My son says he would prefer to wait for the movie. Any movie. Seeing as how he is still only fifteen years old, I don’t think that there is much that I can do about that right now. What I can do is control what I read. I was under the misguided idea that occasionally I should read articles, magazines and books written by and for successful people, who like to tell us other presumably less successful people what we should do to become more successful, just like them.\n\nI don’t think I am going to do this anymore.\n\nEvery time I read one of these success missives, I can’t help but feel inferior. It has a tendency to either depress me or drive me nuts.\n\nI’ll demonstrate by example:\n\nI got an email notification that my college alma mater (of all things) “liked” an article on one of those professional networking sites. I take being a mighty Lobo alumnus of the University of New Mexico very seriously so I thought it best to go check out what my alma mater deemed important enough to actually like. I clicked on the link in the notification.\n\nVia the magic of the internet I was immediately whisked to the site of some business and technology e-zine with the appropriately titled article (and I am paraphrasing here as I don’t wish to have to provide attribution)\n\n“27 Things that People Who Are More Successful Than You Do Every Day – Including Weekends – Before They Leave Work, That You Probably Don’t Do Which Explains Why They Are Successful And You Aren’t”\n\nYou would be surprised how close to the real title that paraphrase is.\n\nAs I said, I like to read. I read for information and enjoyment. I also believe it is something of a dying art. I mean why read when you can text or IM or as my son does, watch the movie anyway? But that is not the point. The point here is that I was already at the site. I consider myself to be reasonably successful. I have not ruled the world but I have done moderately okay. I figured I would peruse the first few topics of the list of successful attributes purely out of self interest and compare what the list said successful people do with what I do and see how much similarity there was.\n\nBig mistake.\n\nAfter furiously reading through the entire list with ever increasing disbelief to see if there was anything at all that I did at the end of the day that even remotely resembled something that a successful person was purported to have done at the end of the day, I came to the crushing conclusion that I am not fit to leave work at the end of the day, let alone work anywhere.\n\nIn case some of you have not experienced the joy that accompanies an epiphany that springs from reading an article like this, let me provide an example as a means of explanation. Most of us know how to sign our names. There are probably a few of us who don’t, and due to the penmanship challenges associated with the inability to sign their name these people are hence genetically selected to become doctors. Over time we have all probably evolved our “signature”.\n\nNow take the pen that you normally sign your name with, put in the other hand (the hand that normally holds the paper while the first hand signs your signature) and now be told that all successful people are ambidextrous and in order for you too to be considered successful you should immediately be able to use that other hand to sign your signature as quickly, clearly and effortlessly as the first hand.\n\nGive it a try. See how that works for you.\n\nYou now have only the slightest of inklings how it feels to read these articles about the habits, traits, customs, manners, dispositions, styles, fashions, penchants and proclivities of successful business people.\n\nIt depresses me that I don’t seem to have any resemblance at all to these so called successful people. It depresses me that I don’t spring out of bed at four o’clock in the morning prepared to shampoo the dog and rotate the tires on my wife’s car, and jog six or eight miles while thinking great world changing thoughts, all before going into the office like successful people are being depicted as doing. I am crestfallen that I don’t seem to be the appropriate whirl wind of activity in the last ten minutes of my business day closing off to-do lists, clearing my desk while simultaneously creating a workable plan to solve world hunger as I prepare to do battle with the other presumably unsuccessful souls on my commute home from the office.\n\nIt further concerns me that almost all the people that I know that I would consider to be successful also seem to have nothing in common with the ideal successful person that these articles describe.\n\nIn the past I have discussed how happiness cannot be derived from the actions and relative performance of others. I guess the corollary here is that feelings of depression and inferiority in the office should also not be the result of the actions and relative performance of others either.\n\nUnfortunately that approach does not seem to sell articles, magazines and books. Nor does it seem like a very good way to drive people to specific web sites where their eyeballs can be assaulted by both an article describing in detail why they should by inference not consider themselves to be successful as well as those advertisers that are on that site who have specifically tailored their self-help ads to those people who after reading the article are now feeling so insecure about their relative worth and success in business.\n\nWhat this epiphany does open up to me is the idea of a new opportunity to address a whole new segment of the self help article, magazine and book market. It is the segment of the market that is for the business person that is at least in part moderately successful, and wants to feel good about what they have accomplished. Think about that for a moment. Doesn’t everyone want a little recognition, reinforcement and reaffirmation that they have in fact been doing things well?\n\nThink about the titles for these articles, magazines and books that could be generated, based on this new and previously untapped market approach:\n\n“From Good to Better”\n“Twelve Habits of the Moderately Successful”\n“Congratulations on Making it to the Office on Time”\n“How to Get Back From Lunch in One Hour”\n“Speakerphone Etiquette in the Cube Farm”\n“The Art of Aiming Low and Meeting Your Objectives”\n\nThe list could go on and on.\n\nI understand that in this day and age that it is hyperbole that sells. As another example, in the past it used to be enough to just report the news. Now we seem to have a never ending stream of talking heads that are associated with one end of the political spectrum or the other that are now presenting their “version” of the news. Everything now has “spin” and now screams for our attention. I think the same is now the case for the plethora of business “self help” articles, magazines and books that are vying for our attention.\n\nEach of these new and improved lists of elements associated with success seems to be more outlandish than the previous. As I noted before, based on these items it is hard to understand how I or anyone else is or can ever be considered successful. Hence the source of my concerns over these feelings of inferiority.\n\nI think the bottom line is that when you take everything into consideration it is still things like drive, determination, attention to detail, effort, honesty, knowledge, experience, cooperation, preparation and maybe just a smidgeon of luck that are some of the determining factors in success. These concepts are not particularly exciting and don’t promise any secret short cuts to success. Maybe that explains why there doesn’t seem to be a market for a book titled:\n\n“Be Smart, Work Hard, Perform Well and Move Ahead”\n\nPerhaps another answer to being considered a success is to write a book that tells other people what they should do in order to be considered a success.\n\nI am sure as children we have all heard the parable “If a tree falls in the forest and there is no one there to hear it, does it make a sound?” No matter how you answered the question, the rejoinder was “How do you know for sure?”\n\nThe business equivalent of this parable is “If you work very hard all month, and you do not generate a monthly report of your activities, did you really do any work?” The answer to this one is a little bit simpler. If you did not document your progress and activities then in reality you didn’t do any work. If you want to argue this point, my rejoinder will be “How will management know for sure?”\n\nI have heard many reasons and excuses for not generating a monthly report. It takes too much time. I didn’t have a great month so I don’t want to document so little progress. I had a great month so I don’t want to seam self aggrandizing. The bottom line is that there is no excuse for not generating a monthly report.\n\nThey don’t take a lot of time. If they do, you’re probably doing them wrong. Some monthly reports may be stronger than others. That is the nature of business. The fact is that a brief 1-2 page monthly report is your opportunity to capture the value that you and your team brought to the company. Businesses are focused on generated value. If you are not showing and documenting your value, how can they know what value you are to them?"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Pile-CC\"\n}"}}},{"rowIdx":213786,"cells":{"text":{"kind":"string","value":"Q:\n\nHow did Indy know to not look at the Ark?\n\nMy grasp of Scripture is poor, but the only thing I can recall in the Bible along these lines is Uzzah being struck down because he TOUCHED the Ark. How did Indy know that they should close their eyes and escape being fried by the Ark?\n\nA:\n\nCross-referenced from that initial link is 1 Samuel 6:19.\n\nBut God struck down some of the men of Beth Shemesh, putting seventy of them to death because they had looked into the ark of the LORD. ..\n\nSee also 1 Samuel 6:19 in the King James Bible.\n\nAnd he smote the men of Bethshemesh, because they had looked into the ark of the LORD, even he smote of the people fifty thousand and threescore and ten men: and the people lamented, because the LORD had smitten many of the people with a great slaughter. \n\nThose versions are pretty much in agreement, though the number jumped from 70 to over 50 thousand.\n\nA:\n\nIt wasn't so much the Ark he wasn't looking at, but the everything. The Ark, the angels, and the whole thing.\nI remember seeing a special on TV, a \"Making of\" type show, and they had a shot of Spielberg working with Harrison Ford and Karen Allen and he said something to the effect of, \"And, according to the Gospel of Lucas, Indy and Marion are spared because of their goodness.\" I thought that was interesting because his comment, as the director, indicated that in his mind it wasn't so much whether they looked at the Ark and angels (were they ark-angels?), but that the angels actually distinguished between good people and bad people.\n\nA:\n\nThis is a common idea in Judaism. To paraphrase: \nIt is impossible for a human to behold God, because He is too mind-boggling for a mortal to comprehend. If you see God, you die. \nThis is what my Hebrew instructor taught me.\n\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"StackExchange\"\n}"}}},{"rowIdx":213787,"cells":{"text":{"kind":"string","value":"1. Field of the Invention\nThe present invention generally relates to automobile lamps positioned at the automobile's front end and/or rear end. More specifically, this invention relates to an automobile headlamp or taillamp housing that is capable of elastic deformation, yet is rigidly, directly or indirectly, attached to a fixed chassis component or body component (i.e. trunk, fenders, rear quarter, etc.) of the automobile. The flexible lamp mounting arrangement is able to withstand substantial flexure when the automobile bumper sustains an impact by an object and, therefore, the flexible lamp arrangement is particularly well suited for use with impact-absorbing bumpers that automatically rebound from a frontal impact.\n2. Description of the Prior Art\nGenerally, automobile designers or stylists would like to create aerodynamic body shapes. Their motivation is not merely to reduce drag, but to create contemporary sculpted shapes that appeal to the marketplace. The automobile designers or stylists, however, are hampered by a variety of functional, economical, and other restraints.\nWith the advent of energy or impact-absorbing bumpers, front and rear ends of an automotive vehicle have been required to undergo significant design changes in order to accommodate the stroke of the bumper, that commonly can be as much as three to four inches. Generally, with respect to the front and rear end of a vehicle, designers would like a clean, convex transition from the front edge of the bumper rearward to the hood area and from the rear edge of the rear bumper forward to the sheet metal associated with the trunk area and rear deck lid. However, when viewing most vehicle designs currently available in the marketplace, this transition is normally an inward, concave box shape as shown in FIG. 1. The front bumper protrudes forward from the vehicle body, or the rear bumper protrudes rearward from the rear sheet metal in order to provide compliance with federal and automotive original equipment manufacturer's vehicle impact standards. These standards generally state that no damage can occur to non-bumper components or safety items, such as headlamps or taillamps, during 5 miles per hour barrier and front impacts, or 3 miles per hour pendulum impacts. Therefore, to achieve this objective, the original equipment manufacturing engineers have brought the bumper out away from the front and rear body panels, headlights, taillights, hood and grille, so that the bumper may stroke, thereby absorbing the impact energy without allowing intrusion into the components with subsequent damage. The clear result from such design is that the vehicle appears boxy, non-aerodynamic, and antiquated.\nA closely related problem to the ability to absorb the impact energy of these federal and automotive vehicle impact standards concerns the location of the engine within the engine compartment. For example, in an attempt to obtain more passenger space within a vehicle, recent practice has been to push the mounts of the engine further and further towards the front of the vehicle. Accordingly, the ability to provide additional passenger compartment space is directly affected by the space available in front of the engine to enable moving the engine forward to obtain the maximum passenger compartment space. However, since the overall length of the vehicle is subject to limits dictated by the original equipment manufacturer, bringing the bumper forward away from the body, headlight, hood and grille intrudes into the maximum length, and the front end space of the vehicle becomes extremely valuable in that it directly affects the ability of automotive engineers to move the engine forward in an attempt to create additional passenger compartment space.\nSimilar problems existed with respect to automobile grilles, and such problems were solved by the use of a grille that is mounted substantially flush with the surrounding automobile body panels and bumpers, while also being capable of deflecting with the stroke of the impact-absorbing bumper during impact, thereby obviating the need for the grille to either pivot about an anchor point or to be mechanically displaceable with the additional hardware. Such a grille is disclosed in U.S. Pat. No. 5,205,597, owned by the common assignee hereof. The use of the teachings of this earlier invention, however, allowed the grille to be brought into the impact zone and absorb impact without damage. Unfortunately, while this helped to achieve a more aerodynamic and contemporary look in the grille area, the transformation is incomplete because along either side of the grille the fragile headlight system still requires protection, resulting in the boxy, non-aerodynamic situation as depicted in FIG. 1.\nSeveral automotive equipment manufacturers have attempted specific solutions to this problem, but in doing so have failed to take into consideration the original equipment manufacturer's limitations set forth above, as well as the availability of space between the front bumper and the front of the engine in an engine compartment where the headlight system must be appropriately mounted. As set forth above, the traditional solution is to position the headlamps or taillamps entirely out of the path of the bumper during recoil after impact. This approach generally entails placing the automobile's headlamps rearward of the bumper or taillamps forward of the bumper, resulting in an extremely square looking profile that has little appeal according to modern design trends as depicted in FIG. 1. In addition, clearly such a design is not aerodynamic, but this approach has been generally followed for lack of a better solution. Another solution recently attempted by some of the original equipment manufacturers, is to require the headlamp and/or taillamp to be displaceable such that it can either pivot or otherwise move out of the path of the bumper during energy absorbing impact. Preferably, this approach allows the headlamp and/or taillamp to be mounted flush with the surrounding hood, front end, body panels and bumper, to enhance the styling and aerodynamics of the automobile by proving aesthetically pleasing, continuous smooth contour surfaces between the hood, bumper and headlamp lens surfaces. Such an approach is illustrated in Tomforde, U.S. Pat. No. 4,475,148, wherein the headlamp upper and lower housing compartments 3, 6, are pivotably mounted to a fixed component 4, at axis 5, to allow resilient cushioning of an impact in the longitudinal direction of the vehicle to minimize property damage and personal injury. This approach allows the top of the headlamp to pivot rearward when the headlamp is contacted at the bottom edge so as to reduce or prevent property damage in a collision with the vehicle and/or a stationary obstacle, as well as to avoid injury to a pedestrian by yielding in a longitudinal direction about pivot point 5. This approach appears extremely impractical as bumper heights are standardized on passenger vehicles, and an impact on the lower portion of the headlamp would not cause enough rotation to prevent the headlights from becoming severely damaged in case of an impact in a minor collision with another vehicle or a stationary obstacle.\nAnother example of an attempt to solve the above problems relating to the location of headlamps or taillamps in the impact zone is taught by Delmastro et al., U.S. Pat. No. 4,466,646. In this reference the lamp assemblies are mounted to an impact bar by the use of U-shaped springs to permit the lamp assembly to swing from its illustrated operating position to a protected position within the confines of the impact bar assembly in response to predetermined frontal impacts. The bumper fascia is mounted to an impact energy absorbing unit and its associated impact bar to absorb side or frontal impacts, store the energy in the impact bar and to avoid transmitting the energy into the vehicle frame, bodywork, or other vehicle components. Any frontal or side impact will permit the hinge assembly limited side and compound movement of the lamp assembly, so that it will not be damaged by any material of the energy absorbing unit crowding the headlamp assembly on corner impacts. After the impact load is removed, the impact bar and end section recover at predetermined rates to their original positions. The lamp assembly, of course, being connected to the U-shaped spring member, will likewise recover to its original position. Note that although this type of solution is proposed for fog lamps and signal lamps, the reference completely fails to set forth any solution, whatsoever, for avoiding damage to the headlamp in a frontal zone collision. Clearly, the design criteria to avoid damage to headlamps requires the headlamps to be set rearward a sufficient amount to allow the bumper to properly stroke during frontal impacts.\nAnother attempt to protect fog and taillamps mounted in the impact zone is shown in Vogelgesang, U.S. Pat. No. 5,288,177, wherein a fog lamp and turn signal lamp are mounted to the elastic bumper covering to allow the fog and turn signal lamp unit to move backwards in the case of a 30.degree. pendulum impact after it has been acted upon by the impact and to return to its original position. The fog lamp and turn signal housing are attached to a bumper covering that, when impacted, moves towards the rear of the vehicle by pivoting about a fixed pivot mounted on the chassis that provides appropriate support for the fog lamp and turn signal housing, and allows the housing to pivot rearwards to absorb the impact and return to its original position thereafter. The supporting element is mounted at one end at a fixed member attached to the wheel housing and to the fog lamp and turn signal housing to allow the supporting element to pivot rearwards. After impact, the elastic bumper covering with the lamp units and the supporting element are returned to their original positions by the restoring force of the pneumatic impact absorbing devices.\nIn Roschinski et al., German patent publication DE 3802104 A1, the lighting unit is mounted in the area of the impact zone. Through the use of spherical balls mounted in a spherical socket the lighting unit is allowed to be removed from the socket upon impact in the longitudinal direction, and returned into the spherical socket by two compression coil springs located between the housing and the body of the vehicle. Because of the use of two spherical sockets that are mounted respectively in an upper and lower zone, the reference further teaches that a shock load acting obliquely from one side only will cause only one of the spherical balls to be displaced from the spherical socket and resume its original position through the use of one coil spring providing sufficient force to again engage the spherical ball with the spherical socket upon removal of the impact force. A similar arrangement is proposed for the fog and turn signal lamps, as well as for the rear lamps of the vehicle. As an alternative to the coil springs, a hydraulic, pneumatic or magnetic system that generates an appropriate force for restoring the position of the housing is also contemplated.\nA further attempt to allow headlamps to be mounted forward, flush with the front fascia of the vehicle, is discussed in Kodama et al., Japanese Patent JP3-208738-A2, wherein the headlamp is mounted to a guide rail spaced a predetermined distance from side frame members, and interconnected with a connecting bar whose lower end is connected to the side member and upper end to the movable frame containing the headlamp, and adapted for sliding on the guide rail. The torsion bar system has a front part mounted in close proximity to the bumper fascia so that upon impact the bumper fascia collapses and retreats, activating the crank portion of the torsion bar system whereby the connecting bars are pivoted to slide the headlamp in a rearward direction away from the area of the impact zone to prevent damage thereto. After restoration of the bumper fascia to its original position, through the use of impact absorbing material such as foam, the torsion bar system utilizes its stored energy to return the headlamp along the guide rails to its original forward position. An alternate embodiment discloses the use of a scissor-like two bar mechanism that operates in combination with a torsion bar system to retract the headlamp in a rearward direction upon impact and through the stored torsional energy in the torsion bar system return the headlamp to the original position upon release of the impact with the bumper fascia.\nAs can clearly be observed from a review of the prior art, with the exception of German Patent DE 3802104-A1 and Japanese Patent 3-208738-A2, the prior art addressing of this problem only concerns fog lamps or turn signal lamps where damage criteria after impact, as established by government entities or original equipment manufacturers, is very low, or nonexistent. The proposal disclosed in the German reference relies mostly on a complex spring system to return the housing to its original position while the Japanese reference teaches that the bumper impact absorbing material will allow the pivoting mechanism cooperating therewith to return the lamp to its original position Since none of the bumper impact absorbing materials are required to return a headlamp to its original position by any automotive regulations, it is not possible to rely on such a system to permit controlling the headlamp to return to its original position after a bumper impact due to the strict regulations and tight tolerances on headlight aim patterns that would not allow any misalignment of aim pattern after impact outside of the tolerance limitations. Further, both the teachings of the German and Japanese patents have completely neglected the value of the space considerations surrounding the headlamp mounting area that directly reflects upon the forward placement of the engine and, in turn, the amount of space available in the passenger compartment of the vehicle. Accordingly, none of the systems provided in the prior art are adaptable to headlamps or taillamps that have strict regulations concerning damage after bumper impacts.\nTherefore, what is needed is a simple, cost effective headlight and/or taillight system that can be brought into the impact zone to provide designers the freedom to create flush, convex-shaped, aerodynamic front end systems for vehicles that after impact return to their original positions without damage and continue to operate within the limits of the specifications set forth for headlamps and taillamps for automotive vehicles."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"USPTO Backgrounds\"\n}"}}},{"rowIdx":213788,"cells":{"text":{"kind":"string","value":"Q:\n\nWhat is this English doing in the middle of my Japanese?\n\nNote: I understand this question is on the edge of being off topic. I'll accept the community assessement if enough people feel that is the case.\nI'm reading 脳{のう}は0.1秒{びょう}で恋{こい}をする by 茂木{もぎ}健一郎{けんいちろう}, and out of the blue, there's an English word right in the middle of a sentence:\n\nThe sentence reads 人生{じんせい}は「偶有性{ぐうゆうせい}」(contingency)に満{み}ちています。 I think I basically understand it, in that it says life is full of contingencies.\nMy question, though, is why is this English word here? The book is written by and for Japanese. The way the word is offered, it looks as though it is a clarification of 偶有性{ぐうゆうせい}, where 偶有{ぐうゆう} means having an accident, and 性{せい} means the suffix ~ness, so I guess it's supposed to approximate the word \"contingencies\".\nI just don't get how this would help a Japanese person reading the book? Does Mogi San expect that a Japanese person who doesn't know 偶有性{ぐうゆうせい} would be helped by knowing that it meant \"contingencies\"? That doesn't seem very likely to me.\nI appreciated it, because it helped me understand what he meant, but I don't think this is for the benefit of Japanese learners.\nWhat is going on here?\n\nA:\n\nTechnical subjects usually have a large English-speaking community, and theses and books on that subject are often published in English (or some other international language, but you probably get a wider readership by publishing in English).\nIt's important to know the English technical terms so you can understand those books and theses, so even when reading a Japanese technical book that introduces its terms in Japanese, it will often include the corresponding English terms in parentheses so that you're not completely confused when you try to read foreign material on the subject.\nWhether or not this particular sentence is actually from a technical work or field, and even if you are never likely to need to look it up anywhere else, the inclusion of an English word here reminds the reader of that kind of technical text, which does two things:\n\nemphasizes \"this is an important word to this discussion\" (so important you'd want to learn it in English too)\ncreates a feeling of \"this is a scientific explanation\", and implies the presence of other information published elsewhere on the same subject that corroborates the statement \n\nLooking on Amazon, the cover of this book has a subtitle of 「『赤い糸』の科学」 on it, so it seems to fit the context.\n\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"StackExchange\"\n}"}}},{"rowIdx":213789,"cells":{"text":{"kind":"string","value":"Indirect light is a pleasing manner of providing the light required for various tasks. With indirect light, less foot-candles (quantity of light) is required to provide the same illumination levels as with direct light. The infinite reflector series allows you the possibility of indirect illumination in the most unique and innovative way. Reflectors permit you to redirect light.\nThe IRS (Infinite Reflector Series) offers the opportunity of infinite lighting design. You have a choice of reflective surfaces and shapes of reflectors to provide you infinite bouncing beams of light to illuminate various objects. You can with one source illuminate infinite objects or you can with infinite sources illuminate one object. You can redefine existing spaces with interceptors (reflectors) portable or fixed. The method of fixing to floors, walls or ceilings can be accomplished with clamps, suction cups, mounting plates, cables (stainless steel, nylon, rubber, rope, etc.), or tubes, as well as other means.\nInterceptors (reflectors) can be placed in inaccessible places while the lamp source is placed in an accessible location and obtain the same results as if the source were in an inaccessible location. As an example, in a ceiling of 30 feet or more, which might normally have recessed fixtures, you can place reflectors. The light source could be mounted on walls at 6 or 8 feet in height (easily accessible). The light would be directed towards the reflectors, which would in turn redirect the light in a similar manner of a downlight. The reflector, therefore, replaces the source of illumination. As a result, high ceilings no longer present a relamping problem. In addition, wiring cost savings can be achieved, as it may no longer be necessary to run wiring in the ceiling."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"USPTO Backgrounds\"\n}"}}},{"rowIdx":213790,"cells":{"text":{"kind":"string","value":"Party Leader Anna Troberg\n\n[\n23 Nov 2012 |\ninga kommentarer ]\n\nThe Party Leader leads the Leading Group in their daily operations and is the party’s face outward. The Party Leader can decide upon political positions in line with the party’s principles between member meetings. Anna Troberg became Party Leader for the Pirate Party on January 1, 2011, after being deputy Party Leader since 2009.Anna was born in the year of ABBA winning in Brighton, 1974. She lives in Stockholm with her girlfriend and her three cats.Before starting off her political career she had several other character defining jobs. While studying she worked cleaning, sorting mail, designing wedding cakes, securing for Y2K and writing freelance. She has also been an English post-graduate, translator, publishing house executive and writer.\n\nHer humorous novel ”Chefer från helvetet” (”Bosses from Hell”) was published by Wahlström & Widstrand in 2007 under the pseudonym Rosetta Sten. The novel has also been published in Norway and Finland. You can ofcourse download it for free (in Swedish). Sharing is caring.\n\nAnna has eight shelves with different editions of Jeanette Winterson books. She can also brag with a glorious past in sports. For one year she was Borlänge champion in table tennis, football and shot-put. (She was 11 at the time, and emphasis lie on ”past” and not ”glorious”.) Dolly Parton is her homegirl and yes, she has a cardboard Xena in real life size watching over her while she’s working. It’s good for the creativity."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Pile-CC\"\n}"}}},{"rowIdx":213791,"cells":{"text":{"kind":"string","value":"Background\n==========\n\nThe concept of self-management is not new and can be traced back in the UK to the start of the 20^th^ century \\[[@B1]\\]. Nevertheless, despite its longevity, defining self-management as a concept and clarifying its meaning for, and use, in practice has been found to be particularly challenging in the field of palliative care. Major obstacles to seeking clarity on self-management as a concept are that in spite of a plethora of available literature on self-management, the dominant focus is on managing chronic disease. However managing chronic illness presents patients and professionals with very different challenges to those found in palliative care \\[[@B2]\\]. An example of this is a UK government document, which defines self-care as 'the actions people take for themselves, their children and their families to stay fit and maintain good physical and mental health; meet social and psychological needs; prevent illness or accidents; care for minor ailments and long term conditions; and maintain health and wellbeing after an acute illness or discharge from hospital' \\[[@B3]\\]. Issues which are not the main focus in advanced disease when people are seriously ill, may lack functional capacity, and may be dependent on others for help.\n\nThese issues and challenges are compounded by the ambiguity found in the terminology surrounding self-management, including the interchangeable use of similar terms such as self-care, self-efficacy, self-help \\[[@B2],[@B4]\\]. In a thematic analysis of the conceptualisation of self-care, self-management and self-management support in the long term conditions management literature, Jones et al. \\[[@B5]\\] found that the terms differed regarding the nature of the *imperative for action*. For instance, self-care is inevitable but includes choice; self-management is an inevitable activity whereas self-management support is an essential activity. Self-management support lies within context of coordinated networks derived from the health and social care system. This process is person-centred and any imperative for action is derived from the collaboration between people with long term conditions and thus improving support services. This concept analysis, therefore, is particularly focussed on self-management support.\n\nPolitical interest in self-management has also increased over the last decade, internationally, as governments attempt to contain the costs of health care, alongside addressing goals to improve health outcomes, patient satisfaction ratings and service delivery \\[[@B3],[@B6]\\]. This shift in the balance of care addresses the challenges associated with the increasing number of people suffering long-term conditions. Professionals, patients and politicians alike are, therefore, part of a trend in seeking health care and health service delivery solutions that are more patient focused and recognise the central role of patients in the care process.\n\nA factor that can affect self-care behaviors is health literacy. Health literacy is \"cognitive and social skills which determine the motivation and ability of individuals to gain access to, understand and use information in ways which promote and maintain good health\" \\[[@B7]\\]. Health Literacy includes skills and behaviours, that all people need, to for instance, find their way to the right place in a hospital, to fill out medical forms, and to communicate with healthcare providers. Poor literacy and numeracy skills can, therefore, result in difficulties in interpreting and performing self-care activities.\n\nThis concept analysis was conducted as part of a larger study: Integrating Self-Management and Palliation Concepts (IMPACT), which was commissioned and funded by the ATLANTIS programme (Actions for Transatlantic Links and Academic Networks in Training and Integrated Studies) aimed at facilitating cooperation in higher education and vocational training in the European Union and the United States. The original study involved a partnership of four universities in Scotland, Lithuania, New York and Ohio. Two aims of IMPACT were the development of a comparative framework for policy analysis pertaining to palliative care and self-management and the creation of policy benchmarks for the delivery of palliative care to guide best practice in the management of self-care practices, in palliative care nursing in Europe and the Unites States of America (USA).\n\nWhy exploring self-management support and palliative nursing is important\n-------------------------------------------------------------------------\n\nLiving with a life limiting condition, be it advanced cancer, or any other non-malignant disease, for which there is no cure, can have a devastating effect on a person. The impact can extend to psychological, social, physical, economic and cultural aspects of people's lives \\[[@B8]-[@B10]\\]. Individuals tend to cope as well as they can, with the support they have, whether that be from family or other sources, but often they do not have the information, skills or knowledge to make well informed decisions or the appropriate response \\[[@B11]\\]. Many patients do not understand what health professionals have said to them and do not, therefore, participate in decisions about their care, this leaves them ill-prepared to make daily decisions and take actions that lead to good care management. A collaborative relationship between nurses, health care teams, and patients and their families is, therefore important. Supported self-management in palliative care, by nurses, can, therefore, empower people to acknowledge the impact of their condition on their life, and enable them, where possible, to face the range of challenges they may have, and identify areas where they need further support, help or care \\[[@B8]\\].\n\nIn seeking to address the above issues this paper is concerned with exploring the issue of how self-management support in palliative nursing is conceptualised in the literature.\n\nMethods\n=======\n\nConcept analysis\n----------------\n\nConcept analysis is considered a relatively new research approach, method or process \\[[@B12]\\] and is not an approach which is universally accepted \\[[@B13]\\]. The term concept analysis refers to the unfolding, exploring and understanding of concepts for the purposes of concept development, delineation, clarification, correction, identification, refinement and validation \\[[@B14]-[@B17]\\].\n\nWalker and Avant \\[[@B16]\\] in the method chosen here, propose that; concepts are mental representations of a phenomenon or an idea, of an action or a thing that can accurately represents these occurrences within clinical practice. They advocate that the conceptualisation of concepts and their use in describing nursing practice is a stepping-stone towards the standardization of nursing language. In addition, concepts can be described as efforts to categorize information into meaningful constructs when applied to a phenomenon that occurs within the field of health care. A concept analysis is, therefore, a rigorous and precise process of operationalizing the defining characteristics and attributes of a phenomenon into a communicable understanding, and is undertaken using a structured framework \\[[@B16]\\].\n\nConcept analysis is a method of conceptual knowledge representation and data analysis that can be used to clarify meanings and develop operational definitions, through considering evidence from multiple disciplines and sources. By applying a recognised methodological framework a more objective approach to concept clarification is accomplished. The systematic framework also means that the process is applicable within diverse scientific disciplines \\[[@B16]\\].\n\nTo guide the process of literature and analysis a modified version of the eight-step model presented by Walker and Avant was applied \\[[@B16]\\]. The eight steps of the model do not need to be, and were not, used in chronological order and can and were modified as the enquiry progressed.\n\nTable [1](#T1){ref-type=\"table\"} outlines the 8 steps and whether and how applied for this concept analysis.\n\n###### \n\nWalker and Avant concept analysis steps\n\n **Step** **Used in this concept analysis**\n -------------------------------------------------------------------------------------------------- ---------------------------------------------\n 1\\. Select the concept Yes (dictionary definition-methods)\n 2\\. Determining the aim or purpose of the analysis Yes (research question and aim-methods)\n 3\\. Identifying all the known uses of the concept Yes (literature review-methods and results)\n 4\\. Determining the defining attributes Yes (literature review- results)\n 5\\. Identifying a model case (\"real life\" example, which contains all of the critical attributes No\n 6\\. Identifying any of the borderline, related, contrary, invented and illegitimate cases No\n 7\\. Identifying antecedents and consequences Yes (literature review- results)\n 8\\. Identifying empirical referents  \n\nSelecting the concept\n---------------------\n\nThe concept self-management support and how it relates to palliative nursing will be analysed in this paper.\n\nIn Walker and Avant's method the first stage is usually a literature review.\n\n### Search strategy\n\nPrimary data was identified by searching three online electronic databases via EBSCO Host: Medline, CinAHL and PsycINFO which cover literature from disciplines such as medicine, nursing, allied health, sociology and psychology. The key search terms are presented in Table [2](#T2){ref-type=\"table\"}.\n\n###### \n\nSearch terms and key words\n\n **Search string/number** **Keywords**\n -------------------------- -----------------------------\n 1 Self care\n 2 Self management\n 3 Self management support\n 4 1 or 2 or 3\n 5 Palliative care\n 6 Terminally ill\n 7 Terminal care\n 8 Hospice\n 9 Life limiting illness\n 10 End of life care\n 11 Nurs\\$\n 12 5 or 6 or 7 or 8 or 9 or 10\n 13 4 and 11\n\nSearch string in Medline, CinAHL and PsycINFO, keywords: 1. self care.\n\nThe search led to 205 potential articles, with duplicates removed this left 165 to review. Of these 165 12 provided definitions of self-care and palliative care but no definitions of palliative nursing.\n\nA 'google' web search was also conducted for the terms palliative nursing, end of life care self-care, and self-management support. According to Web search workshop a UK consultancy service for optimising and marketing of websites users searching on the internet rarely go beyond the top 30 results \\[[@B18]\\]. Therefore, only the top 30 results were reviewed for keywords which always took longer than the 30 minutes to review the first 30 sites.\n\nThis search string was then combined using Boolean operator 'OR' and 'AND'. Searches were limited only to the English language. Reference lists of all identified papers were scrutinised, hand searches of international journal of palliative nursing, grey literature and key websites was also conducted, using google and google scholar. The University of Dundee Library Catalogue and google scholar were also searched for key textbooks and book chapters. Additional websites were identified via links identified within the Google search and in collaboration with subject experts revealed additional websites, which yielded 11 potentially useful definitions or concepts. The top 30 results of a Google search were reviewed for the keywords of self-care and self-management support revealed 16 relevant articles. Key terms and words included self-care, self-management, self-efficacy and self-help. To place self-management in a professional context the palliative care and palliative nursing literature was examined to further elicit usage of the terms self-care and self-management (Google search Table [3](#T3){ref-type=\"table\"}).\n\n###### \n\nGoogle search and results\n\n **Google search term** **Number of useful results**\n ------------------------- ------------------------------\n Self care 8\n Self management support 8\n Palliative care 8\n Terminally ill 3\n Terminal care 4\n Hospice 11\n Life limiting illness 7\n Palliative nursing 5\n End of life care 7\n\nInclusion and exclusion was applied to ensure that only relevant publications were included in the review (Table [4](#T4){ref-type=\"table\"}). All titles and abstracts returned from the initial search were independently appraised by four authors. Full articles were obtained and appraised if they met the inclusion criteria.\n\n###### \n\nInclusion criteria for literature review\n\n **Inclusion** **Rationale**\n ---------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------\n Published between 1990-2013 It was necessary to put time limits on the review. It was also determined that the majority of relevant literature was published during this period\n English text Due to budgetary constraints text other than English was excluded\n Described the results of empirical research publications Opinion or theoretical pieces were not included. It was determined that a more comprehensive review would be obtained if only empirical papers were used\n Adults only Palliative care and self care issues affecting children are different and palliative care services for adults and children are different, therefore only studies relating to adults were included\n\nDefining attributes palliative nurse\n\nSupportive\n\nIntensive caring, continuous knowing and continuous giving\n\nFostering hope\n\nProviding comfort\n\nProving an empathic relationship\n\nBeing there\n\nActing on the patients behalf\n\nMeeting the patients' needs\n\nWorking together/teamwork\n\nKnows what they are doing\n\nKnowing the patient\n\nDignity\n\nProviding information\n\nResults\n=======\n\nResults reviewed by BJ and ER\n-----------------------------\n\n### Dictionary definitions\n\nThe concept analysis framework identified by Walker and Avant indicates that definitions of terms are first sought as dictionary definitions *as part of identifying the concept.*\n\nPalliative\n----------\n\nPalliate has its origins in medieval Latin *palliativus*, from the verb *palliare* 'to cloak'.\n\n### *Adjective*\n\n(of a medicine or medical care) relieving pain without dealing with the cause of the condition: *orthodox medicines tend to be palliative rather than curative.*\n\n(of an action) intended to alleviate a problem without addressing the underlying cause: *short-term palliative measures had been taken.*\n\n### *Noun*\n\nA palliative medicine, measure, etc.: *antibiotics and other palliatives social projects presented as palliatives for the urban crisis oxford*\\[[@B19]\\].\n\nSelf-care\n---------\n\nSelf-care has been defined in the dictionary as: \"The care of oneself without medical, professional, or other assistance or oversight\" \\[[@B20]\\].\n\nSelf management support\n-----------------------\n\nSelf-management can be defined as the decisions and behaviours that patients with chronic illness engage in that affect their health. Self-management support is the care and encouragement provided to people with chronic conditions and their families to help them understand their central role in managing their illness, make informed decisions about care, and engage in healthy behaviours \\[[@B21]\\].\n\nSelf-management is 'the successful outcome of the person and all appropriate individuals and services working together to support him or her to deal with the very real implications of living the rest of their life with one or more long term condition' \\[[@B22]\\].\n\nSupport for self management is what services provide to encourage people to take decisions and make choices that improve their health, wellbeing and health-related behaviours \\[[@B22]\\].\n\nLiterature definitions of palliative care, palliative nursing and self managent support\n---------------------------------------------------------------------------------------\n\n### Palliative care\n\nPalliative care is among one of the fastest-growing specializations globally in the fields of nursing and medical education and referred to by current International government documents as not only focussing on death and dying but also on improving the quality of life for the patient and family \\[[@B23],[@B24]\\]. For almost a generation, to varying degrees, palliative care has been associated with total, active, holistic and therapeutic intervention/s, which focus on the quality of life for the patient and his/her family \\[[@B24],[@B25]\\]. The universal worldwide accepted definition is that proffered by the World Health Organisation (WHO) \\[[@B26]\\]. The WHO state that palliative care is an approach that improves the quality of life of patients and their families facing the problem associated with life threatening illness through the prevention and relief of suffering by means of early identification and impeccable assessment and treatment of pain and other problems, physical, psychological and spiritual.\n\nPalliative care:\n\n•provides relief from pain and other distressing symptoms;\n\n•affirms life and regards dying as a normal process;\n\n•intends neither to hasten or postpone death;\n\n•integrates the psychological and spiritual aspects of patient care;\n\n•offers a support system to help patients live as actively as possible until death;\n\n•offers a support system to help the family cope during the patients illness and in their own bereavement;\n\n•uses a team approach to address the needs of patients and their families, including bereavement counselling, if indicated;\n\n•will enhance quality of life, and may also positively influence the course of illness;\n\n•is applicable early in the course of illness, in conjunction with other therapies that are intended to prolong life, such as chemotherapy or radiation therapy, and includes those investigations needed to better understand and manage distressing clinical complications\" \\[[@B26]\\].\n\nPalliative nursing\n------------------\n\nThe development of palliative care nursing has been part of a movement that has grown from roots in the nineteenth century, and particularly the second half of the twentieth century through the UK hospice movement and principally Cicely Saunders, who was originally a nurse \\[[@B27]\\] Seymour \\[[@B28]\\] argues that one of the clearest definitions of palliative nursing is that of Johnston \\[[@B27]\\] p. 2): \"All life-threatening illnesses -- be they cancer, neurological, cardiac or respiratory disease -- have implications for physical, social, psychological and spiritual health, for both the individual and their family. The role of palliative nursing is therefore to assess needs in each of these areas and to plan, implement and evaluate appropriate interventions. It aims to improve the quality of life and to enable a dignified death\" \\[[@B29]\\].\n\nThe palliative nurse, therefore, enters into a unique therapeutic relationship with the patient, which requires excellent communication skills and emphasises role aspects such as educator and information giver \\[[@B27],[@B29],[@B30]\\] and highlights their key involvement in the delivery of individualised, holistic care \\[[@B27],[@B30]\\]. The expert palliative nurse is someone who is interpersonally skilled, particularly in terms of the ability to be willing to listen, has personal humane characteristics such as warmth, kindness and compassion, and who helps the patient by meeting their needs, is there for them and provides them with emotional support, knows the patient as person and is knowledgeable, in particular, about pain and symptom control \\[[@B27]\\].\n\nSelf-management support\n-----------------------\n\nAs discussed previously, the political and professional agenda over the last decade has changed favourably in terms in of integrating self-management into the health care agenda. This interest has the potential to benefit greatly palliative care delivery and the development of palliative care services. The challenge remains, however, as to how this is accomplished and, in particular, how best self-management can be implemented in practice. It is recognised that incorporating the concept of self-management into palliative nursing practice brings additional challenges when managing symptoms at the end of life and when there is no known cure \\[[@B7]\\]. However, it is understood that if self-management can be utilised to a greater degree it will result in a better quality of life for patients and their families and may reduce the financial costs \\[[@B7],[@B28]\\].\n\nSelf-management has for a long time been associated with a process whereby patients deliberately act on their own behalf in health promotion and prevention of illness and the detection and treatment of health deviations \\[[@B28]\\]. It has, however, historically taken second place to the medicalisation of disease and the patient's passive acceptance of the care given by the medical and nursing professions. In examining the future potential of the concept for palliative care practice two observations are relevant. Firstly, up to the first decade of the twenty-first century most self-management strategies reviewed in the literature were professionally initiated and led \\[[@B2]\\]. Secondly, from a research perspective, few studies up to 2005 appeared to incorporate the patient's views on palliative nursing care, particularly the concept of the expert palliative nurse \\[[@B27]\\].\n\nNevertheless, the concept of self-management is not unique to nursing practice as the concept was identified in the latter half of the twentieth century as part of the development of nursing theory and models to define and support the principles of nursing practice linked to other concepts such as coping \\[[@B31],[@B32]\\]. Orem in particular championed the concept of self-management and defined it as the supported activities of individuals, in order to maintain health and wellbeing. Her research identified that deficits in self-management were often related to factors such as lack of knowledge, side effects of treatment, or physical, social and psychological aspects related specific to the individual \\[[@B33]\\]. These factors remain central to the consideration of self-management in the context of palliative nursing and Orem's model has relevance to palliative nursing as it links the concept to aspects of self-management in the contemporary literature, particularly in relation to wellbeing. Self-management in general has been shown to improve health outcomes, promote a feeling of well-being and improve the quality of life for those suffering incurable conditions \\[[@B28]\\].\n\nA useful broad starting point to clarifying the meaning, relevance and use of the concept self-management in the context of palliative care and palliative nursing, is the definition put forward by Corner \\[[@B34]\\] (p.516). In palliative care the goal is to 'live with dying' with the focus on the self and not just the physical effects of illness. the following definition is, therefore, appropriate: maintaining ones usual practices of self-care, those things that are important and unique to oneself in maintaining ones sense of self; being given the means to master or deal with problems, rather than relinquish them to others\". This definition emphasises the patient; 'being in control' and 'maintaining independence', which are important in end of life care \\[[@B27]\\]. This definition immediately places the patient at the centre of the care and caring processes. However, it also introduces the idea of self-management as part of the caring process. In countries where the focus of health care has moved from hospital to the community, many patients desire to be cared for at home, whenever possible, and the goal is often concerned with achieving patient and family choice \\[[@B35]\\]. This provides an ideal opportunity for the individual and his/her family to be involved fully in and have control of, their care. Health care policy has reinforced this objective incorporating self-management as an additional focus with emphasis on enabling patients to *manage* their own health and well-being \\[[@B6],[@B35],[@B36]\\]. While willingness and ability to self-management will change over time, it is also affected by the unpredictable nature and complexity of health related challenges with the person receiving palliative care \\[[@B37]\\].\n\nSelf-management challenges may be compounded by the plethora of information which is now available in the public domain. This is increasing more recently, with ease of access through information technology. These developments bring with them the potential of patients to access incorrect information \\[[@B38]\\]. Informed decision-making and knowing the patient's preferred choice \\[[@B37]\\] stress the importance of open and collaborative dialogue and knowledge of the patient's own story past and present. These recommendations imply that palliative care is a continuous process enabling the patient to cope with and respond appropriately to challenges as and when they arise and make choices and decisions about the future. These key aspects of self-management highlight the importance of 'knowing' the patient as a person \\[[@B27]\\]. They also highlight that in the field of palliative care, the facilitation of self-management brings additional challenges in managing symptoms and helping patients to live a life focused on quality as opposed to quantity (time).\n\nMoreover, an important issue for using self-management in practice is that not all individuals are either able to, or wish to, engage fully in self-management activities and that part of the professional's assessment is to identify the degree of self-management need and capability that is appropriate at any point in time \\[[@B2]\\]. Degrees of self-management engagement can be identified through robust physical and emotional management that enables the individual to adjust and match their self-management capability to their identified self-management needs, thus enabling them to stay in control of their unique and individual situation. Table [5](#T5){ref-type=\"table\"} identifies the essential themes aimed at initiating and supporting self-management actions \\[[@B8]\\].\n\n###### \n\n**Supporting self-management: themes and sub themes**\\[[@B8]\\]\n\n **Theme** **Sub-theme**\n ----------------------------------- -------------------------------------------------------------------------------------------------------------------------\n Maintaining normality Goal setting; How others treat you; Maintain normality-taking a break/holiday\n Preparing for death Euthanasia; Getting worse; Leaving family behind; Planning funeral; Process of dying\n Support from family/friends Carer support/information; Talking about difficult issues; Respite\n Self-cares strategies/physical Activities of daily living management; Aids to house; Complementary therapy; Financial help benefits; Managing symptoms\n Self-care strategies/emotional Accepting; Being positive; Choice; Control; Religion; Support from others with cancer\n Support from health professionals Clinical nurse specialist fixer/coordinator; Home help carer; Hospice day care; Out-of-hours care\n\nVarious attempts have been made to clarify the terms self-management. For instance, it has been viewed as a transition and how people incorporate the consequences of illness into their lives \\[[@B39]\\]. As well as, associating the concept with the professional support and direction patients receive, including how to follow given instructions and manage other aspects of their condition \\[[@B28],[@B31]\\]. While these definitions allow to patients a semi-passive role in their care; they are also associated with active patient and professional collaboration in decision making, facilitating choice and decisions that support independent patient activities. While many of these factors are relevant to the palliative care context Johnston et al. \\[[@B2]\\] identify the description by Foster et al. \\[[@B39]\\] as most appropriate to palliative care as it highlights strategies used by individuals to enhance control and maximize wellbeing and the effects and approaches used by the individual to optimise living as closer than any other to being appropriate for people with advanced disease at the end of life.\n\nThe capability to manage self-management appears to be associated strongly with the use of effective and robust assessment techniques, tools and processes, which are dependent on the patient with support from the nurse, assessing their own self-management needs and capability \\[[@B2],[@B8],[@B28]\\]. In addition, self-management in a palliative care context is linked to capability to control pain, manage other symptoms as well as evaluating the effectiveness of interventions.\n\nThe concept of 'supported self-management' can, therefore, be said to embrace both self-care and self-management. In 'supported self-management' the concept of self-management can be linked closely to the patient's capability, while the professional is facilitating the patient to assess and identify their needs, moreover, self-management can be linked to outcomes of care and the patient's actual and potential capability to act in a way that meets their identified needs.\n\nPalliative care, therefore, needs to be underpinned by robust needs assessment, by the nurse, considering the patient's wishes, skills, behaviours and knowledge. The fundamental concepts underpinning palliative nursing assessment are that it is, *\"... dynamic, Individualised, patient and family centred, sensitive and appropriate, holistic, therapeutic, contextual, comprehensive, based on reliable, current and valid information, evidence-based, driven by and focussed on process and outcomes\"*\\[[@B27]\\]. This definition of assessment can be used to guide the professional to achieve the goal of supported self-management as a contemporary concept, with strong underpinnings in the effectiveness of the patient/professional relationship and the skills of the professional to support the patient in his/her self-management endeavours \\[[@B5]\\].\n\nAssessment also brings into sharp focus the effectiveness of the Multi-Disciplinary Team (MDT) in supporting self-management. Johnston \\[[@B8],[@B27]\\] highlights the importance of effective collaboration and communication in supported self-management, which could be considered as the heart of the Multi-Disciplinary Team's (MDT).\n\nKey characteristics of self-management support in palliative nursing are, therefore, presented in Table [6](#T6){ref-type=\"table\"} according to the Walker and Avant theoretical process.\n\n###### \n\nAttributes of self-management and nursing role with author\n\n **Attribute** **Nursing role** **Author**\n ----------------------------------- ------------------------------------- -------------------------------------\n Maintaining normality Knowing the patient Jarret et al., Skilbeck et al.\n Preparing for death Support Johnston et al., O'Berle and Davies\n Being there Zabalgui \n Comfort   \n Excellent communication skills Johnston et al. \n O'Berle and Davies \n Support from family/friends Emotional support Zabalegui\n Self-care strategies/physical Promoting independence Johnston et al., Rhodes et al.\n Good pain and symptom control Rhodes et al. \n Self-care strategies/emotional Promoting independence Johnston et al., Rhodes et al.\n support   \n Support from health professionals Teamwork Johnston et al.\n Referral role   \n   Collaborating providing information Skilbeck et al.\n\nAntecedents and consequences\n----------------------------\n\nThe identification of antecedents and consequences helps to refine the critical attributes and elucidate the contexts in which the concept is generally used \\[[@B16]\\]. Antecedents are factors that must be present before the occurrence of the concept whereas consequences are events that occur as a result of the concept.\n\nFor supportive self-management in palliative nursing to occur we identified four antecedents; *presence of the nurse* and *spending time with the patient*; \\[[@B27],[@B40]\\]*development of a relationship with the patient,*\\[[@B8],[@B27],[@B40]-[@B44]\\]. *Skills, knowledge and expertise of the nurse*; \\[[@B45]-[@B49]\\], *team working and the ability of nurse to recognise when to refer on to other professionals or support services*.\n\nIn analysing the concept of supportive self-management and palliative nursing this requires the demonstration of events that occur as a result of support being experienced/delivered. These consequences can be either a positive or negative experience for patients. Positive experiences for patients include feeling cared for and having their needs met; \\[[@B27],[@B46]\\] being informed \\[[@B27],[@B47]-[@B50]\\] and being supported \\[[@B27],[@B48]\\]. Negative experiences include pain and symptom control needs not met \\[[@B51],[@B52]\\] not having their needs met and not being supported, \\[[@B27],[@B42],[@B43]\\] as wellbeing unable to manage, particular in relation to activities of daily living \\[[@B10]\\].\n\nDiscussion\n==========\n\nStrengths and limitations of the method\n---------------------------------------\n\nThe purpose of this analysis was to define the concept of self management support in relation to palliative nursing. Whist literature was retrieved from a variety of sources, certain limitations are worth mentioning. Literature in languages other than English were not accessed. A broader search could have produced a more comprehensive definition. Additionally, an alternative concept analysis method may have produced a different outcome.\n\nThis concept analysis has identified that there is no universal definition of supportive self-management in palliative nursing. A clarified definition for nursing use based on this concept analysis is proposed below.\n\nSupportive self-management in palliative nursing is; *assessing, planning, and implementing appropriate care to enable the patient to live until they die and supporting the patient to be given the means to master or deal with their illness or their effects of their illness themselves.*\n\nThe use of a model such as that proposed by Walker and Avant \\[[@B16]\\] was found to be beneficial in facilitating a systematic approach to literature retrieval, review and analysis. While stages 1 and 2 of the model were used to clarify the direction of travel and inform key words and terms for the literature review stages 3 -- 5 and 7 informed the focus of the analysis as well as the breadth and depth of literature retrieved. Stage 8 was important to supporting synthesis, which re-define self-management. Stages eight of the model helped to focus attention on the relevance and applicability of self-management to practice.\n\nConclusions\n===========\n\nFor this concept analysis references to self-management were drawn mainly from chronic and disease management literature, as well as, the few articles on self-management available in the palliative care field. Self-management has been conceptualised in relation to how patients can gain and remain in control of their care process and how professionals can support this process. The concept analysis led to consideration of the extended concept of 'supported self-management'. The important role nurses have in supporting patients with palliative care needs to be able to maintain normality and independence and be in control for as long as possible is highlighted and to be encouraged. Figure [1](#F1){ref-type=\"fig\"} is proposed as a guide to aid current discussion, for clinical practice and to aid further research and development of the concept 'supported self-management' in palliative care nursing and education.\n\n![Characteristics and attributes of palliative nursing and supported self care.](1472-6955-13-21-1){#F1}\n\nCompeting interests\n===================\n\nThe authors declare that they have no competing interests.\n\nAuthors' contributions\n======================\n\nBJ devised the concept analysis and wrote the first draft ER contributed to the first draft and edited future drafts AB and JM and PC helped devise the concept analysis and edited the first draft. All authors read and approved the final manuscript.\n\nPre-publication history\n=======================\n\nThe pre-publication history for this paper can be accessed here:\n\n\n\nAcknowledgments\n===============\n\nThis concept analysis was carried out as part of an EACEA/FIPSE funded policy orientated measure grant 2010--2013.\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"PubMed Central\"\n}"}}},{"rowIdx":213792,"cells":{"text":{"kind":"string","value":"1. Field of the Invention\nThe present invention relates to a production system that is configured by disposing, downstream of a supply device for supplying foodstuffs or other such articles, a plurality of constituent devices including a weighing machine for weighing articles, a packaging machine, and a seal checker or another such quality inspection device.\n2. Background Information\nIn conventional practice, production systems in use include a weighing unit for weighing foodstuffs or other such articles supplied from a supply unit, a packaging unit for packaging the weighed articles, a quality inspection unit for detecting the quality of the packaged articles, and other various devices.\nFor example, Japanese Laid-Open Patent Application No. 9301327 (published Nov. 25, 1997) discloses a management method and a management device (production system) for a production line that varies the set capacities of certain devices according to the processing capacities (yield rate) of other devices disposed downstream when operation is initiated or during operation. Since the set capacities of these devices are varied on the basis of the processing capacities (yield rate) of the other devices, the yield rate of the entire production line can be improved, and higher capacities can be elicited from the devices to improve production efficiency.\nHowever, this conventional production system has the following problems.\nSpecifically, in the production system disclosed in the aforementioned publication, the set capacities are varied on the basis of the processing capacities (yield rate) of the devices, making it impossible to deal with problems such as a lack of uniformity in the rates at which articles are fed from the supply unit in the weighing unit during operation and halted operation of one weighing unit in a plurality of weighing units.\nFor example, when articles are supplied from the supply unit at non-uniform rates while the set capacities of the supply unit for supplying articles to the weighing unit are kept constant, the set capacity of the weighing unit is set in accordance with the setting of the supply unit. Therefore, fluctuations in the supply rates cannot be appropriately dealt with merely by performing control based on the processing capacities or the yield rates of the devices, and production cannot be carried out efficiently.\nWhen the operation of a single weighing unit among a plurality of weighing units is halted due to a malfunction, a control procedure is performed to increase the set capacities of the other weighing units because the operating rate of the single weighing unit is zero. However, in such cases as well, merely allocating a processing rate that is proportionate to the operating rate reduction to the other weighing units brings the operating rate of the other weighing units closer to the maximum set capacities, and may instead result in a lower yield rate and reduced production quantities.\nIn view of the above, it will be apparent to those skilled in the art from this disclosure that there exists a need for an improved production system in which high production efficiency can be maintained in the entire production line, even in cases in which the articles are actually supplied from the supply unit at non-uniform rates, some of the weighing units, packaging units, quality inspection units, and other constituent units stop operating, and/or other problems occur. This invention addresses this need in the art as well as other needs, which will become apparent to those skilled in the art from this disclosure."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"USPTO Backgrounds\"\n}"}}},{"rowIdx":213793,"cells":{"text":{"kind":"string","value":"How the University handles your information\n\nThe University of Manchester handles a wide variety of information which is used for teaching, learning, research, commercial and administrative activities.\n\nThe University's Information Governance Office (IGO) provides a framework of people, policies and technical and organisational controls to help protect this information, promoting openness but mindful of the needs and rights of individuals who entrust their personal data to the University and the requirements of other interested parties, funding and regulatory bodies.\n\nThrough a network of Information Governance Guardians, we provide training, support and guidance to enable staff to ensure that information is created, used, archived and disposed of appropriately and in accordance with records retention requirements.\n\nThe use of some information is constrained either by legislation, such as current data protection law, or in order to protect the interests of the University, while other information may need to be made freely available, such as information in response to freedom of information legislation requests and research papers. The IGO co-ordinates responses to these requests.\n\nInformation is a valuable asset to the University and we facilitate a risk-based approach to ensure these assets are protected. If incidents occur which jeopardise the confidentiality, integrity or availability of this information, we ensure that appropriate action is taken to minimise any harm or distress to individuals or impact on the University, and requires that arrangements are put in place to prevent the incident reoccurring.\n\nVision\n\nOur vision is:\n\nTo build and embed an Information Governance framework to establish best practice, ensure the University’s legal and statutory compliance and to achieve a recognised standard of excellence.\n\nTo challenge established processes, manage risks, develop policies and provide guidance to ensure leadership and staff process all information in a secure, consistent way."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Pile-CC\"\n}"}}},{"rowIdx":213794,"cells":{"text":{"kind":"string","value":"UNITED STATES DISTRICT COURT\nFOR THE DISTRICT OF COLUMBIA\n\n)\nKatrina L. Robinson, )\n)\nPlaintiff, )\n)\nv. ) civil Acri@n N@. 12 0\n\n) 073\nPresident Barack Obama et al., )\n)\nDefendants. )\n)\n\nMEMORANDUM OPINION\n\nThis matter is before the Court on review of plaintiff s motion for a temporary restraining\norder (\"TRC)\"), which is accompanied by her complaint and application for leave to proceed in\nforma pauperis The Court will grant the z`n_forma pauperis application, deny the TRO motion,\nand dismiss the case pursuant to 28 U.S.C. § l9l5(e)(2)(B), which requires dismissal of a\ncomplaint that is found to be frivolous.\n\nPlaintiff is a resident of Richmond, Virginia, who is suing President Barack Obama and\nPastor Tony Smith of Baltimore, Maryland. See Compl. Caption. She alleges that Smith \"has\npresented to numerous Police Departments and Media Outlets an Executive Order to force the\nPlaintiff (Katrina Robinson) a public prostitute.\" Compl. at l (parenthesis in original).\nAccording to plaintiff, \"[t]he latest presentation\" was at a shelter in San Antonio, Texas. Id.\nPlaintiff seems to claim that as a result of the alleged executive order, she is under surveillance\nby the FBI and \"a group of people from Baltimore, MD\" who allegedly is \"promoting me as a\nprostitute across state lines.\" Id. She alleges that Smith “claims to have permission from the\n\nwhite house to publish naked pictures, false media to TV stations, offer satellite TV’s [sic] for\n\no\n\npublic viewing and false newspaper articles (including Camden Yards, Walmart, and H.E.B.\nmarkets). Id. (parenthesis in original). In addition, plaintiff alleges that \"[f]ootage is being\ndistributed in several regions: MD, NC, TX, to judges, media and online[,] [and that] a Facebook\ngroup [is] dedicated to this effort.” Id. She seeks, among other relief, \"all documents issued by\nthe President, his cabinet, or administration with my name identified as the person of interest . . .\n.,\" and \"[a]ll documents distributed by Pastor Tony Smith, his membership, or business affiliates\nwith my name identified as the person of interest . . . .\" Ia’. at 2.\n\nln the TRO motion, plaintiff seeks an order directing defendants to \"cease\" from issuing\nexecutive orders and \"memorandum [sic] developed & implemented by the President naming me\nas person of interest[,]\" and any \"accompanying orders given to militia, FBI Agents, or Secret\nService Agents [,] [and the Richmond, Virginia, police department] to have me restrained or\nrestricted or arrested.\" TR() Mot. at l.\n\nA complaint may be dismissed under 28 U.S.C. § l9l5(e)(2) as frivolous when, as found\nhere, it describes fantastic or delusional scenarios, or contains \"fanciful factual allegation[s].\"\nNeitzke v. Williams, 490 U.S. 319, 325 (1989); see Best v. Kelly, 39 F.3d 328, 330-31 (D.C. Cir.\nl994). Furthermore, a complaint must be dismissed when, as also found here, it is so \"patently\ninsubstantial\" as to deprive the Court of subject matter jurisdiction. Tooley v. Napolitano, 586\nF.3d 1006, l0l0 (D.C. Cir. 2009); accord Cala’well v. Kagan, 777 F. Supp.Zd 177, 178 (D.D.C.\n201 l). Because the complaint is frivolous, no basis exists for issuing a TRO. Accordingly, a\n\nseparate order denying plaintiffs TRO motion and dismissing the case accompanies this\n\nMemorandum Opinion. y\n/“\n/\n\n§\nUn` dSt ?/IF trictJudge\nDate: January l_/\\_, 2012 ' ‘/}(p/.,LL,?\n\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"FreeLaw\"\n}"}}},{"rowIdx":213795,"cells":{"text":{"kind":"string","value":"Haematologists' approaches to the management of adolescents and young adults with acute leukaemia.\nApproaches to the management of adolescents and young adults with acute leukaemia were investigated by sending a questionnaire to hospitals identified as having diagnosed or treated patients aged 15-29 years. The responses demonstrated the types of hospital treating these patients, the haematologists' perceived practice for entry of patients to Medical Research Council (MRC) leukaemia trials and reasons for non-entry. Data were linked to MRC trials data to determine the proportion of patients aged 15-29 years at diagnosis in responding hospitals actually treated in MRC leukaemia trials in the 5 years preceding the questionnaire. Eighty-two per cent of haematologists stated that they entered patients 'always' or 'whenever possible' for acute myeloid leukaemia (AML) and 76% for acute lymphoblastic leukaemia (ALL), but actual entry rates from the study hospitals were 46% of 239 AML patients and 36% of 182 ALL patients. The reasons most commonly reported for not entering eligible patients to national leukaemia trials were clinician preference for one arm of an MRC trial, a regional study or non-trial protocol, and concern about workload and ethical approval."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"PubMed Abstracts\"\n}"}}},{"rowIdx":213796,"cells":{"text":{"kind":"string","value":"It seems that everywhere you look, Maroon 5 are smashing another record, dropping another classic, making another surprise collaboration, or just plain astounding you with the seemingly endless run of creativity that Adam Levine and co seem to enjoy. Not just charting the history of a band, Maroon 5’s best moments trace the development of pop music in the 21st Century, whether it’s revelling in their gleefully genre-blind mash up of styles, or harnessing the power of social media and their devoted fanbase to create truly astonishing moments that will go down in history.\n\nWith their much-anticipated Super Bowl performance seemingly set to add another to the list, we take a look at ten of Maroon 5’s best moments.\n\nListen to the best of Maroon 5 on Apple Music and Spotify, and scroll down to read our pick of Maroon 5’s best moments.\n\n10: The band ask fans to help with The Daylight Project\n\nSometimes the flashier tracks get all the glory, but ‘Daylight’ – from Maroon 5’s fourth album, Overexposed – proves that slow burners can often linger the longest. Released in November 2012 as Overexposed’s third single, the song showcased the melodic charisma of the band’s softer material and gave Maroon 5 another US Top 10 success. Acclaimed producer Jonas Åkerlund crafted an innovative video from The Daylight Project, a platform where fans could share their thoughts and feelings. Frontman Adam Levine has said many times that ‘Daylight’, created with legendary hitmaker Max Martin, is his favourite track on Overexposed.\n\n9: ‘This Love’ becomes an international smash\n\nThe band’s debut single, ‘Harder To Breathe’, had nibbled at the upper tiers of the charts, but this – the band’s second single – was their big international breakthrough and their first radio staple, likely to feature on playlists for decades to come. Adam Levine wrote the song with keyboardist Jesse Carmichael and it ended up becoming the third most-played song of 2004, earning the band a Grammy for Best Pop Performance. Written about Adam’s relationship at the time, ‘This Love’ bears all the hallmarks of classic Maroon 5: soulful melody, a rocky spine and an assured, memorable vocal from the band’s charismatic frontman. The videos would get a little slicker, but the ‘This Love’ secured an MTV Award for Best New Artist and would showcase what was to come. The earliest among a long list of Maroon 5’s best moments.\n\n8: The ‘Payphone’ video breaks the bank, unnerves parents\n\nBy 2012, Maroon 5 videos had become marquee events, but ‘Payphone’, featuring rapper Wiz Khalifa, had the sort of big-budget treatment you would expect from a Hollywood blockbuster… It’s the clip you’ll most likely find in a Maroon 5 time capsule. The sharp way the band’s compositions flirted successfully with contemporary pop styles is clearly in evidence here – ‘Payphone’ fit easily in pop and urban playlists, and, while its explicit lyrics and the video’s edge-of-your-seat drama unnerved parents, there’s no doubting this was Technicolor, widescreen Maroon 5, fast on their way to becoming the biggest band in the world.\n\n7: Maroon 5 give newlyweds the wedding present of their lives with ‘Sugar’\n\nDistancing this summery pop standard from its simple yet effective video treatment is now almost impossible – a testament to the band’s visual flair. From a run of great video performances, ‘Sugar’ actually takes one of the simplest approaches. Casting Maroon 5 as the ultimate LA wedding band adds a magic accessibility to a song that was lifted from 2014’s V; despite being the third single taken from the album, ‘Sugar’ would become the biggest of them all. Written with Mike Posner, it was performed on TV shows, including The Voice, but no matter how good those appearances were, it’s the great video we’re always going to return to, easily staking its claim among Maroon 5’s best moments.\n\n6: A single Ellen performance of ‘Don’t Wanna Know’ hits big on both sides of the Atlantic\n\nKendrick Lamar guested on the first single from Red Pill Blues, but wasn’t featured in the kooky Pokémon-inspired video. Benny Blanco shares production duties on the song, neatly bridging contrasting aspects of Maroon 5’s work: contemporary dance influences, soul and R&B top-notes, and the rock foundations that all their songs are built on. Performing ‘Don’t Wanna Know’ live on Ellen for the first time helped the band score another Top 10 hit on both sides of the Atlantic in 2016.\n\n5: ‘She Will Be Loved’ proves they were no one-trick ponies\n\nFollowing a first big hit is a challenge that many bands fail at, but Maroon 5 bettered ‘This Love’ with ‘She Will Be Loved’ – a powerful ballad that further broadened the band’s audience away from its alt.rock base. In Australia, the song introduced the group to the top of a singles chart, three years before they reached the same position stateside (though ‘She Will Be Loved’ matched the No.5 placing of ‘This Love’ in their homeland). Sophie Muller steered the band’s first truly memorable video production with a clip that starred actress Kelly Preston trapped in a complex love triangle involving Adam Levine. The impact Down Under led to Australian singer Kate Ceberano being one of the first artists to cover a Maroon 5 song when she recorded ‘She Will Be Loved’ for her So Much Beauty album four years later.\n\n4: The ‘One More Night’ Live On Letterman shows everyone how its done\n\nAs the second single from Overexposed, ‘One More Night’ was heavily promoted across a range of TV slots and live shows, but it’s the Live On Letterman performance in New York that goes down as one of Maroon 5’s best moments in front of the cameras, showcasing the then-five-piece at their tightest. Shellback and Max Martin collaborated on the track, and the dramatic video, which amped up Adam Levine’s sex appeal to red-hot pitch, is among their most memorable. Keyboardist and guitarist Jesse Carmichael was on a break from the band during the creation of Overexposed, but PJ Morton stepped into the breach after a spell supporting the group’s live shows. The song became another Billboard chart-topper for Maroon 5 and reached the Top 10 in the UK.\n\n3: ‘Makes Me Wonder’ makes Billboard chart history\n\nThere’s a moment when you know a group are in it for the long haul. ‘Makes Me Wonder’ was Maroon 5’s inaugural US chart-topper and launched the It Won’t Be Soon Before Long album in 2007, signalling that important gear change to the world. The band’s soul and funk influences were truly front of stage for the first time, helping the catchy track make Billboard chart history, when it registered one of the biggest-ever jumps to the top spot, vaulting from No.64 to the pole position. The song secured another Grammy win for Best Pop Performance and saw the band celebrated as innovative songwriters who were prepared to experiment and adapt their sounds to accommodate contemporary influences. ‘Makes Me Wonder’ might have borrowed its hooks from dancefloors of the past, but it had its sights fixed firmly on the future.\n\n2: ‘Girls Like You’ makes a potent statement for the 21st Century\n\nMaroon 5’s fourth US chart-topper, recorded with rapper Cardi B, is one of those infectious earworms that we’ll likely still be humming decades from today. Its simple, nagging hooks build and build, and saw the track – the third single from Red Pill Blues – become one of the biggest radio hits in years (and arguably the biggest 21st-century hit to date). The clever video, featuring a host of celebrity cameos alongside Adam Levine, chimes perfectly with contemporary culture, which is now finally looking hard at how we treat each other. A simple, understated celebration of women that makes its point with potency, ‘Girls Like You’ easily ranks among Maroon 5’s best moments.\n\n1: ‘Moves Like Jagger’ gets approval from the man himself\n\nIn the unlikely event that someone doesn’t know who Maroon 5 are, they’ll certainly know this song, which broke records to become one of the world’s biggest selling singles of all time, and tops our list of Maroon 5’s best moments. Adam Levine’s fellow-The Voice coach Christina Aguilera was drafted in to guest on the final single release from a repackage of 2010’s Hands All Over album, while the Jonas Åkerlund video was another gem that still receives regular airplay. Mick Jagger called the homage “very flattering”, but has joked that he’d wished he could collect royalties from the track. A perennial party favourite since 2011, it’s been nagging him ever since!\n\nLooking for more? Discover the best Maroon 5 songs of all time."},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"OpenWebText2\"\n}"}}},{"rowIdx":213797,"cells":{"text":{"kind":"string","value":"Tuesday, April 23, 2013\n\nThe BabbyFamily House Tour Pt. I: Welcome!\n\nAt my house, 99% of visitors come in through the kitchen, so I thought it makes sense to start my house tour in what is clearly the heart of my home. Is your house like that, too? I swear I have a living room, but guests nearly always end up in the kitchen!\n\nIt's weird, too, because we don't have like epic levels of seating. Two grownup chairs, the Tripp Trapp, and the hairpin leg bench I made, plus Bo's way too big highchair now. People are so drawn to the kitchen that they don't mind standing! Can you tell I love red? I also love having the art supplies out where we can get at 'em.\n\nHere's my kitchen clock, and here's where I say 'I made that!'\n\nWe have bright purple kitchen cabinets. The mister was originally anti purple but I convinced him and now he loves it. Before the purple, we had dark brown wood cabinets. Dark brown in a tiny south-facing kitchen. Seriously.\n\nFree printables, woo!\n\nI originally wanted to put some kind of framed picture over the stove - where there's not enough room to put much anything else. But I didn't have any frames and I did have paint, so this was the result. We <3 coffee!\n\nA certain someone convinced me that repainting with chalkboard paint would be a bad idea, so I compromised with a chalkboard panel. We have fun posting recipes and messages to one another so I consider it worth the hassle of wiping up chalk dust.\n\nIt's a fridge. It's an art gallery. It's a strategic planning center. How much stuff is hanging on your refrigerator at any given time?\n\nAnd that's my kitchen! Stay tuned for House Tour Pt. II, coming tomorrow... probably. I'll be giving you a glimpse into the kids' rooms!\n\nI LOVE your table area. All that color makes me happy. We use a lot of red in our house too, but this makes me really want to pump it up! Don't think I'll go with purple cabinets, though (yours look fantastic)"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Pile-CC\"\n}"}}},{"rowIdx":213798,"cells":{"text":{"kind":"string","value":"import { Badge } from 'terra-icon/package.json?dev-site-package';\n\nimport ChangeLog from 'terra-icon/CHANGELOG.md';\n\n\n\n\n"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Github\"\n}"}}},{"rowIdx":213799,"cells":{"text":{"kind":"string","value":"Gérald Fauteux\n\nJoseph Honoré Gérald Fauteux, (October 22, 1900 – September 14, 1980) was the 13th Chief Justice of Canada from 1970 to 1973.\n\nBorn in Saint-Hyacinthe, Quebec, the son of Homère Fauteux and Héva Mercier, he studied at the Université de Montréal and graduated with an LL.L in 1925. Called to the bar that year, he settled in Montreal, where he practised with his grandfather, Honoré Mercier Jr., forming the law firm of Mercier & Fauteux. From 1930 to 1936, he was Crown Prosecutor for Montreal, and in 1939 he became Chief Crown Prosecutor of the province of Quebec.\n\nIn 1946 he was a legal adviser with the Royal Commission on Spying Activities in Canada. He taught criminal law as a sessional lecturer at McGill University for 14 years and was the dean of the Faculty of Law from 1949 to 1950. In 1947 he was appointed to the Quebec Superior Court and to the Supreme Court of Canada on December 22, 1949. He was also one of the founders of the University of Ottawa's law faculty, serving as dean from 1953 to 1962. He was appointed the Chancellor of the University of Ottawa in 1973. On March 23, 1970, he was named Chief Justice of Canada, retiring on December 23, 1973, having served for 24 years on the court, four as Chief Justice. In 1974 he was made a Companion of the Order of Canada. Fauteux Hall which houses the Faculty of Law at the University of Ottawa is named after him.\n\nChief Justice Fauteux died on September 14, 1980, at the age of 79 and was interred in the Notre Dame des Neiges Cemetery in Montreal.\n\nHis brother was the politician Gaspard Fauteux.\n\nExternal links \n Supreme Court of Canada biography\n Order of Canada Citation\n\nCategory:1900 births\nCategory:1980 deaths\nCategory:Chancellors of the University of Ottawa\nCategory:Chief Justices of Canada\nCategory:Justices of the Supreme Court of Canada\nCategory:Companions of the Order of Canada\nCategory:French Quebecers\nCategory:People from Saint-Hyacinthe, Quebec\nCategory:Lawyers in Quebec\nCategory:Université de Montréal alumni\nCategory:20th-century Canadian lawyers\nCategory:Université de Montréal Faculty of Law alumni"},"meta":{"kind":"string","value":"{\n \"pile_set_name\": \"Wikipedia (en)\"\n}"}}}],"truncated":false,"partial":false},"paginationData":{"pageIndex":2137,"numItemsPerPage":100,"numTotalItems":214670,"offset":213700,"length":100}},"jwt":"eyJhbGciOiJFZERTQSJ9.eyJyZWFkIjp0cnVlLCJwZXJtaXNzaW9ucyI6eyJyZXBvLmNvbnRlbnQucmVhZCI6dHJ1ZX0sImlhdCI6MTc1NzY3MjM3Mywic3ViIjoiL2RhdGFzZXRzL21pdC1oYW4tbGFiL3BpbGUtdmFsLWJhY2t1cCIsImV4cCI6MTc1NzY3NTk3MywiaXNzIjoiaHR0cHM6Ly9odWdnaW5nZmFjZS5jbyJ9.wdnmG3Lvc4rBGBZCN9sOC4J-WSjc_41Ue3_hcqsoEDgbYsigutNZYfeRTUuHRvYVJaxkOVhyGVzcn4KXuSgnBA","displayUrls":true},"discussionsStats":{"closed":1,"open":0,"total":1},"fullWidth":true,"hasGatedAccess":true,"hasFullAccess":true,"isEmbedded":false,"savedQueries":{"community":[],"user":[]}}">
text
stringlengths
0
3.78M
meta
dict
Pages Contact Contact For questions, collaborations, features or anything you would like to speak about just email me at [email protected] About Pins, Needles & Fashion I was born and raised in New York City. My passion for all aspects of design/fashion started at a young age and continues to motivate me today. One of the main goals of P, N & F is to showcase how you can style pieces on a budget and look great doing so.
{ "pile_set_name": "Pile-CC" }
Q: como sumar 2 propiedades de 2 objetos diferentes en js (nodejs) Tengo estos 3 objetos const leagues = [ { id: 1, country: 'England', name: 'Premier League' }, { id: 2, country: 'Germany', name: 'Bundesliga' }, { id: 3, country: 'Netherlands', name: 'Eredivisie' }, { id: 4, country: 'Spain', name: 'La Liga' }, { id: 5, country: 'Italy', name: 'Serie A' }, { id: 6, country: 'Portugal', name: 'Liga NOS' }, { id: 7, country: 'France', name: 'Lige 1' } ] const teamsByLeague = [ { teamId: 12, leagueId: 5 }, { teamId: 6, leagueId: 3 }, { teamId: 2, leagueId: 5 }, { teamId: 3, leagueId: 4 }, { teamId: 4, leagueId: 2 }, { teamId: 8, leagueId: 1 }, { teamId: 10, leagueId: 6 }, { teamId: 5, leagueId: 1 }, { teamId: 7, leagueId: 5 }, { teamId: 9, leagueId: 1 }, { teamId: 11, leagueId: 2 }, { teamId: 1, leagueId: 4 }, { teamId: 13, leagueId: 7 } ] const winsByTeams = [ { teamId: 10, wins: 2 }, { teamId: 6, wins: 4 }, { teamId: 5, wins: 5 }, { teamId: 1, wins: 13 }, { teamId: 7, wins: 3 }, { teamId: 4, wins: 5 }, { teamId: 8, wins: 3 }, { teamId: 2, wins: 7 }, { teamId: 9, wins: 1 }, { teamId: 3, wins: 5 }, { teamId: 11, wins: 1 }, { teamId: 12, wins: 2 }, { teamId: 13, wins: 1 } ] y tengo que saber el total de wins por league, osea sumar los wins del objeto 3 que están relacionados al objeto 1 a través del objeto 2. He ocupado funciones como .find (wins: (winsByTeams.find(win => win.teamId === team.id)).wins) Para encontrar las id que sean igual, pero me pregunto si hay alguna funcion especial para sumar los wins del 3 objeto sin transformarlos en arreglo a través de .map ( const ligasOrdenadas = leagues.map((leagues) => ({ name: leagues.name, winsTotal: (winsByTeams.find(win => win.teamId === leagues.id)).wins }));) A: Como siempre, todo es aplicar divide y vencerás: Dada una liga, filtras los IDs de los equipos que pertenecen a dicha liga: const teamIds = teamsByLeague .filter(team => team.leagueId ===leagueId) //nos quedamos los equipos de la liga .map(team => team.teamId); // y cogemos sus IDs Una vez que tenemos los equipos, sumamos sus victorias: return winsByTeams .reduce((acc,tw) => teamIds.includes(tw.teamId) ? acc + tw.wins: acc, 0); Que también se podría escribir como: return winsByTeams .filter(tw => teamIds.includes(tw.teamId)) .reduce((acumulador,team) => acumulador + team.wins, 0); Y todo junto queda así: function getWinsByLeague(leagueId) { const teamIds = teamsByLeague .filter(team => team.leagueId ===leagueId) //nos quedamos los equipos de la liga .map(team => team.teamId); // y cogemos sus IDs console.log('Equipos de la liga',leagueId,':',teamIds.toString()); // sumamos las victorias de los equipos si su ID está en la lista obtenida return winsByTeams .filter(tw => teamIds.includes(tw.teamId)) .reduce((acumulador,team) => acumulador + team.wins, 0); } const leagues = [ { id: 1, country: 'England', name: 'Premier League' }, { id: 2, country: 'Germany', name: 'Bundesliga' }, { id: 3, country: 'Netherlands', name: 'Eredivisie' }, { id: 4, country: 'Spain', name: 'La Liga' }, { id: 5, country: 'Italy', name: 'Serie A' }, { id: 6, country: 'Portugal', name: 'Liga NOS' }, { id: 7, country: 'France', name: 'Lige 1' } ] const teamsByLeague = [ { teamId: 12, leagueId: 5 }, { teamId: 6, leagueId: 3 }, { teamId: 2, leagueId: 5 }, { teamId: 3, leagueId: 4 }, { teamId: 4, leagueId: 2 }, { teamId: 8, leagueId: 1 }, { teamId: 10, leagueId: 6 }, { teamId: 5, leagueId: 1 }, { teamId: 7, leagueId: 5 }, { teamId: 9, leagueId: 1 }, { teamId: 11, leagueId: 2 }, { teamId: 1, leagueId: 4 }, { teamId: 13, leagueId: 7 } ] const winsByTeams = [ { teamId: 10, wins: 2 }, { teamId: 6, wins: 4 }, { teamId: 5, wins: 5 }, { teamId: 1, wins: 13 }, { teamId: 7, wins: 3 }, { teamId: 4, wins: 5 }, { teamId: 8, wins: 3 }, { teamId: 2, wins: 7 }, { teamId: 9, wins: 1 }, { teamId: 3, wins: 5 }, { teamId: 11, wins: 1 }, { teamId: 12, wins: 2 }, { teamId: 13, wins: 1 } ] leagues.forEach(l => console.log('La liga',l.name,'tiene',getWinsByLeague(l.id),'victorias'));
{ "pile_set_name": "StackExchange" }
LOS ANGELES — Elon Musk might have lost the battle to build a tunnel below one of the nation's busiest freeways, but he's digging in with a long-term dream to build a subterranean transportation system beneath Los Angeles. On Wednesday Musk's Boring Company announced it was withdrawing its plans to develop a "test tunnel" beneath Sepulveda Boulevard, which runs parallel to the 405 freeway, as part of a settlement with community groups that sued the city because it exempted the project from normal environmental review requirements. The Los Angeles City Attorney's office said it was not a party to the settlement. In March an "initial study" on the Sepulveda test tunnel published by the city said the 2.7-mile project would be completed in nine months. Elon Musk answers questions during SXSW at ACL Live on March 11, 2018, in Austin, Texas. Diego Donamaria / Getty Images for SXSW It's not clear how much of it was completed, but Boring has been busy. Last year the city of Hawthorne initially gave the company permission to dig a tunnel from SpaceX's One Rocket Road office to its employee parking garage across the street. Musk, who lives in Bel Air and who once called his 405 commute south to the city of Hawthorne "soul crushing," tweeted Wednesday, "We're moving forward with a much larger tunnel network under L.A." Musk's dream of a web of tunnels beneath the region, however, is news to many of the regulators who would very likely have to give it approval if it's ever going to see the light of day. Officials from the California Department of Transportation, the Los Angeles County Metropolitan Transportation Authority (Metro), and the L.A. County Department of Public Works all said Musk's plans for a tunnel network have not been formally or informally submitted for review or permits. "No formal plan submitted for a 'Tunneling Network' so far," Metro spokesman Rick Jager said via email. Neonika Walker, community engagement manager for Los Angeles County Public Works, said even if such a large-scale project didn't appear to touch county property, including buildings, county roads and flood control right-of-ways, planners should probably check in with the county "just to make sure they're not encroaching on our jurisdiction." This did happen with Boring Company's Sepulveda test tunnel proposal about a year ago, she said, and Boring Company was rejected for a permit. It's not clear if that was a contributing factor in the demise of Musk's most publicized tunneling project so far, but as early as August there were indications that this particular experiment was not long for this world, especially as the Boring Company began to focus on a new proposal to build a transportation tunnel to Dodger Stadium. A company answer to a question on its website from August 16, since scrubbed, stated, "The Boring Company has made technical progress much faster than expected and has decided to make its first tunnel in Los Angeles an operational one, hence Dugout Loop!" This new proposal would create a three mile route from Los Feliz, East Hollywood or Rampart Village to Dodger Stadium. The tunnel would utilize Boring's "electric skate" concept, explained by Mike Thompson, the company's principal geologist, during a public meeting on the Dodger tunnel in August. "Each electric skate can carry up to 16 passengers," he said. "They're battery operated, and are, basically, based off of modified Tesla Model X chassis. The great thing about Loop is that they're high speed and can travel at up to 150 miles per hour." This "Loop" concept would involve either ramps or "Loop Lifts" to take passengers to tunnel level and whisk them away on modified Teslas. The idea has raised eyebrows in the transportation world, but the Boring Company has had some success persuading governments in Los Angeles and Chicago, where it's working on the "Chicago Express Loop," that this future is near. Boring has demonstrated that it can dig big round holes — and a public showing of a tunnel in Hawthorne was scheduled for Dec. 10 — but it has not demonstrated the viability of its "electric skate" concept beyond a YouTube video and slideshows at public meetings. The Dugout Loop would initially be limited to 1,400 round trip bookings per game day, which would only amount to about 2.5 percent of home game attendees, according to a city analysis. And there are concerns that even at that, the Loop's ingress and egress points would create their own traffic as travelers vie to get in the tunnel. Juan Mutate, deputy director of the UCLA Institute of Transportation Studies, said a Loop system under L.A. "would create a lot of car congestion at the stations where you get on these skates." In other words, this could be a solution that creates another problem. "We’ll have a lot more info if and when the Dugout Loop or whatever first tunnel is constructed," Mutate said.
{ "pile_set_name": "OpenWebText2" }
Sensor fish A sensor fish is a small, plastic tubular device containing sensors. It is designed to record information such as the physical stresses that a fish experiences while navigating currents from dam turbines. Description Created by the US Department of Energy's Pacific Northwest National Laboratory (PNNL), the tubular device is 9 cm (3.5 inches) long, 2.5 cm (1 inch) in diameter, and weighs 42 grams (1.5 ounces). It is roughly the same size as a juvenile salmon. The sensor fish has neutral buoyancy allowing it to remain underwater. Inside are sensors and a lithium-ion battery. Taking 2,048 measurements each second, it is able to record five minutes of turbulence, pressure, and acceleration, saving the data to a flash memory. It records a maximum of 1.2 MPa (174 pounds per square inch) of external pressure, up to 200 gs of acceleration, temperatures ranging from -40 to 127° C (-40 and +260 degrees F), and rotational velocity of up to 2,000 degrees per second. Construction The sensor fish is built manually at the Bio-Acoustics & Flow Laboratory within the PNNL. It receives funding from the Electric Power Research Institute and the US Department of Energy’s Office of Energy Efficiency and Renewable Energy. Specifications The following are the specifications as stated by the Pacific Northwest National Laboratory: Power: rechargeable 3.7-volt lithium-ion battery Length: ~90 mm Diameter: ~25 mm Mass: ~42.1g Cost: $1,200 each Gyroscope: Model ITG-3200, InvenSense Inc. Orientation: Model LSM303DLHC eCompass module made by STMicroelectronics, Geneva, Switzerland Usage: Kaplan turbine; Francis turbine; small hydropower structures; pumped storage hydroelectric facilities Memory: ~5 minutes of data with flash memory Speed: 2,048 measurements per second Pressure: Model MS5412-BM, Measurement Specialties, Inc., made in Hampton, Virginia capable of 174 pounds per square inch of pressure Acceleration: Model ADXL377 accelerometer, Analog Devices, Inc. Rotational velocity: 2,000 degrees per second Temperature range: -40 to +125 degrees Celsius using model TC1046 by Microchip Technology Inc. Buoyancy: neutral Other features: There is a device that releases two, small weights after a certain period of time causing the device to come to the surface for retrieval. Four LED lights for retrieval and diagnostics that flash orange, yellow and green Purpose Data collected from the sensor fish is used to help create new designs for dam turbines. Aging dams require retrofits and upgrades, and considerations about the impact on fish can be taken into account. The sensor fish was initially designed to examine the effects of the most common kind of turbine in the Columbia River Basin, the Kaplan turbine. Most of the tests were carried out at the Ice Harbor Dam, a 100-foot-high structure. Inside the turbine of that dam, the pressure changes experienced are the same as moving from sea level to the peak of Mount Everest in an instant. In 2015, the sensor fish will evaluate a dam in Southeast Asia's Mekong River, irrigation structures in Australia, a conventional dam as well as three small hydro installations within the United States. Data acquisition process The fish sensor is deposited into the fish release tank at the top of the dam. There, it begins recording data as it travels down through the hub release pipe. It then enters and passes through the turbine. From there, it is flushed into the tailrace and is retrieved by boat. The device is then placed into a docking station where it begins to recharge its battery and awaits transfer of the data it has gathered. The docking station employs a transistor-transistor-logic to Universal Serial Bus (TTL-to-USB) converter module. This is used to send the data to a laptop computer using software developed by PNNL. Once the serial port has been set to 921.6 kbps, 8 data bits, 1 start bit, 1 stop bit, and no parity, transfer can take place. The software can also convert the raw, binary data file into CSV spreadsheet data (comma separated). This enables scientists to plot the data. Earlier version The first version was developed in the late 1990s and was called the "Flubber Fish". It was created to increase the survival rate of salmon during their journey through the Columbia River Basin's dams. It was clear, rubber-coated, and looked like a fish. Future design The second generation model will be able to accommodate other hydraulic structures and turbines. It has improved sensors for detecting pressure, better accelerometers, and better gyroscopes which detect rotational velocity. Within the device is a radio transmitter. Also, there is a device that releases two weights after a specific period of time. This allows the sensor fish to come to the surface for retrieval. Commercial production In January 2019, Advanced Telemetry Systems, Inc., Isanti, Minn., began manufacturing and selling the Sensor Fish for commercial use, under license from PNNL. A press release from PNNL announcing the licensing agreement between the two parties was formally published at that time. Deliveries to customers will begin in April of 2019. Fisheries and Oceans Canada will be the first customer to receive the commercial version of the Sensor Fish (ATS model ARC800). The unit sells for around $3000. References External links Design and implementation of a new autonomous sensor fish to support advanced hydropower development, Z. D. Deng, J. Lu, M. J. Myjak, J. J. Martinez, C. Tian, S. J. Morris, T. J. Carlson, D. Zhou and H. Hou Technical report: Characterization of Fish Passage Conditions through the Fish Weir and Turbine Unit 1 at Foster Dam, Oregon, Using Sensor Fish, 2012, February 2013 Synthesis of Sensor Fish Data for Assessment of Fish Passage Conditions at Turbines, Spillways, and Bypass Facilities – Phase 1: The Dalles Dam Spillway Case Study, December 31, 2007 Evolution of the Sensor Fish Device for Measuring Physical Conditions in Severe Hydraulic Environments, T. J. Carlson, J. P. Duncan, February 2003 Category:Sensors
{ "pile_set_name": "Wikipedia (en)" }
121 P.3d 285 (2005) The PEOPLE of the State of Colorado, Plaintiff-Appellee, v. Robin M. JOHNSON, Defendant-Appellant. No. 03CA2339. Colorado Court of Appeals, Div. IV. April 7, 2005. Rehearing Denied May 12, 2005. Certiorari Granted October 11, 2005. *286 John W. Suthers, Attorney General, Catherine P. Adkisson, Assistant Attorney General, Denver, Colorado, for Plaintiff-Appellee. Robin M. Johnson, Pro Se. GRAHAM, J. Defendant, Robin M. Johnson, appeals the trial court's order denying her Crim. P. 35 motions. We reverse the order, vacate defendant's sentence, and remand for resentencing. Defendant pled guilty to one felony theft count in each of two cases, resulting in her conviction of a class 3 and a class 4 felony. The presumptive range of sentencing for a class 3 felony is four to twelve years with five years of mandatory parole. The presumptive range of sentencing for a class 4 felony is two to six years with three years of mandatory parole. Section 18-1.3-401(1)(a)(V)(A), C.R.S.2004. Following revocation of defendant's community corrections sentence, the trial court resentenced her to an aggravated term of twenty-four years in the Department of Corrections (DOC). The sentence was aggravated pursuant to § 18-1.3-401(6), C.R.S.2004, for reasons other than the fact of prior convictions. In her first postconviction motion, defendant asserted her conviction and sentence must be vacated because she received ineffective assistance of counsel. Defendant also filed a motion asserting that the trial court did not make findings of aggravation and that the sentence was an abuse of discretion. The trial court denied the motions, and this appeal followed. I. Recently, the Supreme Court decided Blakely v. Washington, 542 U.S. 296, 124 S.Ct. 2531, 159 L.Ed.2d 403 (2004), which applied and explained a rule expressed in Apprendi v. New Jersey, 530 U.S. 466, 490, 120 S.Ct. 2348, 2362-63, 147 L.Ed.2d 435 (2000): "Other than the fact of a prior conviction, any fact that increases the penalty for a crime beyond the prescribed statutory maximum must be submitted to a jury, and proved beyond a reasonable doubt." Apprendi was decided prior to defendant's sentencing. Blakely was decided after she was sentenced and while her appeal was pending. In light of Blakely's explanation of Apprendi and its likely retroactive application to the date of Apprendi, we asked the parties to file supplemental briefs on the application of that case to this appeal. A. We first conclude, as a threshold matter, that Blakely applies retroactively to the date that Apprendi established its new rule. *287 In People v. Bradbury, 68 P.3d 494 (Colo. App.2002), a division of this court concluded that Apprendi did not apply retroactively because it "established a new rule" and "imposed a new obligation" upon trial courts. People v. Bradbury, supra, 68 P.3d at 497. We adopt the reasoning in Bradbury and conclude that because Apprendi established a new rule which had the effect of overriding a widespread practice of allowing judges to decide facts used to aggravate sentences, Blakely's interpretation of that rule must necessarily apply retroactively to the date the rule was established. Writing for the majority in Blakely, Justice Scalia clearly limited the holding back to the date of Apprendi when he wrote: "the relevant `statutory maximum' is not the maximum sentence a judge may impose after finding additional facts, but the maximum he may impose without any additional findings." Blakely, supra, 542 U.S. at 303-05, 124 S.Ct. at 2537. Because Blakely explains and clarifies Apprendi, we apply it retroactively to defendant's sentence, which was imposed after Apprendi was announced. We note at least two federal cases which have held that Blakely does not apply retroactively to collateral attacks against convictions. See, e.g., In re Dean, 375 F.3d 1287, 1290 (11th Cir.2004); United States v. Stoltz, 325 F.Supp.2d 982, 987 (D.Minn.2004). In concluding that retroactive application should be made here, we nevertheless do not apply Blakely to collateral attacks against convictions unless those convictions post-dated Apprendi. People v. Dunlap, 124 P.3d 780, 2004 WL 2002439 (Colo.App. No. 01CA1082, Sept. 9, 2004). B. We discern from defendant's pro se supplemental brief a contention that the trial court abused its discretion in sentencing her without making proper findings to support an aggravated sentence. She also argues that she "is unaware of agreeing to any aggravating circumstances, and the People have failed to show proof of any aggravating circumstances." The record supports the former contention. Blakely provides that a judge may not sentence a defendant above the statutory maximum on the basis of facts other than prior convictions unless those facts are "reflected in the jury verdict or admitted by the defendant" and the "statutory maximum" is the sentence the court may impose "without any additional findings." Blakely v. Washington, supra, 542 U.S. at 303-05, 124 S.Ct. at 2537 (emphasis in original). To justify the imposition of a discretionary aggravated range sentence pursuant to § 18-1.3-401(6), the trial court is required to make findings of extraordinary aggravating circumstances. Under Apprendi, as explained in Blakely, such a sentence violates the Sixth Amendment right to trial by jury unless the facts found by the trial court to support the sentence are reflected in the jury verdict, are admitted by the defendant for purposes of sentencing, or involve the defendant's prior criminal convictions. See People v. Moon, 121 P.3d 218, 2004 WL 2503424 (Colo.App. No. 03CA1107, Oct. 21, 2004); see also People v. Solis-Martinez, 121 P.3d 215, 2004 WL 2002525 (Colo.App. No. 03CA1365, Sept. 9, 2004). A defendant may waive her Apprendi rights, if she "either stipulates to the relevant facts or consents to judicial factfinding." Blakely v. Washington, supra, 542 U.S. at 310, 124 S.Ct. at 2541. Here, defendant agreed to a fifteen-to twenty-five-year term in community corrections, or to an alternative fifteen- to twenty-five-year sentence to the DOC if she was not accepted to a community corrections program. She did not admit to any specific aggravators or agree to judicial factfinding regarding those aggravators. The People argue that because defendant agreed to a range which was wholly within the aggravated range, she in effect stipulated to the factors necessary to aggravate her sentence or, at the very least, waived her right to a jury determination of aggravating factors. In this particular circumstance we do not agree. By the time defendant entered her guilty plea, several divisions of this court had held that Apprendi did not apply to a trial court's imposition of an aggravated *288 range sentence under § 18-1.3-401(b). See People v. Allen, 78 P.3d 751 (Colo.App.2001); see also People v. Trujillo, 75 P.3d 1133 (Colo.App.2003); People v. Harrison, 58 P.3d 1103 (Colo.App.2002); People v. Ramos, 53 P.3d 1178 (Colo.App.2002); People v. Martinez, 32 P.3d 520 (Colo.App.2001). The Colorado Supreme Court did not review any of these decisions on certiorari. Thus, given the state of Colorado law post-Apprendi but pre-Blakely, defendant could not have knowingly and voluntarily waived her right to a jury determination of aggravating factors. In dealing with the aftermath of Blakely, courts in other jurisdictions have reached the same conclusions. See, e.g., Strong v. State, 817 N.E.2d 256 (Ind.Ct.App.2004), aff'd on reh'g, 820 N.E.2d 688 (Ind.Ct.App.2005); State v. Fairbanks, 688 N.W.2d 333 (Minn.Ct.App.2004)(review granted Jan. 20, 2005). We therefore conclude that the sentence imposed here is unconstitutional and cannot stand. In so concluding, we note that defendant's stipulation to a factual basis for the two felonies does not require a different result. A defendant's admission of a factual basis for the guilty plea is not the equivalent of either an admission that the same facts constitute aggravating factors for sentencing purposes or a consent to judicial factfinding. See Blakely v. Washington, supra (noting that the sentencing judge cannot impose an aggravated sentence solely on the basis of facts admitted in the guilty plea because the judge must consider factors other than those used in computing a sentence within the standard or statutory maximum range). II. In light of our conclusion, we see no need to reach the remaining issues posed in defendant's appeal. The order is reversed, the sentence is vacated, and the case is remanded for resentencing. Judge ROY and Judge WEBB concur.
{ "pile_set_name": "FreeLaw" }
Q: How to get the CategoryId using the name in Magento 1.9? Looking to find the category ID using the Name attribute programmatically. My script returns a 1 when it should be a 19. Here is my code: $collection = Mage::getModel('catalog/category')->getCollection() ->addAttributeToFilter('is_active', 1) ->addAttributeToFilter('parent_id', $currentCategoryId) ->addAttributeToFilter('name', $categoryName); which should return the category right? Then the script utilizes $catid = $collection->getFirstItem()->getId(); to get the ID, however it is returning the wrong ID. Any ideas? A: $category = Mage::getResourceModel('catalog/category_collection') ->addFieldToFilter('name', 'Men') ->getFirstItem() // The parent category ->getChildrenCategories() ->addFieldToFilter('name', 'Clothing') ->getFirstItem(); // The child category $categoryId = $category->getId(); A: Please try using the following. $_category = Mage::getResourceModel('catalog/category_collection') ->addFieldToFilter('name', $categoryName) ->getFirstItem(); $categoryId = $_category->getId();
{ "pile_set_name": "StackExchange" }
Maria Olsson Maria Olsson (born 8 December 1986) is a Swedish handball player for Aalborg DH and the Swedish national team. References Category:1986 births Category:Living people Category:Swedish female handball players
{ "pile_set_name": "Wikipedia (en)" }
Lorraine Perkins McInnis, Scott Schlegel and John Sudderth, who also are asking voters to elect them as the newest judge at the Jefferson Parish Courthouse in Gretna, combined to spend just over $158,000 through March 17, according to the reports available at the Louisiana Ethics Administration's website. Landry spent $187,286 during the same period, giving herself high visibility with campaign signs and through at least three television advertisements that have appeared so far. Voters in East Jefferson's Election Section 2, which comprises 80 precincts, will decide the race. The election section roughly includes Metairie west of Clearview Parkway to Kenner, and all of River Ridge and Harahan. A runoff, if needed, is May 4. The winner will serve the remainder of Murphy's term, which ends in 2014. The Supreme Court rule says candidates "shall'' file the statement within 10 days of filing their notices of candidacy. Landry's media consultant, Greg Buisson, said Thursday that the campaign's position is that filing disclosure statements "is not a requirement" under Supreme Court rules. The Landry campaign has complied with ethical requirements, "but we don't believe that this one applies in this race," Buisson said. McInnis reports no business ownership, but owns her home and has a mortgage, according to her disclosure statement. Schlegel reported he has no business ownerships, sold his stock options in 2011, earning less than $25,000, and owns a home, according to his statement. Sudderth earned modest income with his part time private law practice and through stock dividends. He, too, is a homeowner, according to his disclosure statement. Landry has raised $217,225 through March 29, much of it from law firms, and has bolstered her coffers with three loans she made to herself, totaling $177,198 since Aug. 8, 2012, her reports show. For the past four years, Landry held a part time job as an assistant district attorney in Jefferson Parish. She was assigned to the 24th Judicial District's Drug Court program. The mother of three children, she is married to Mickey Landry, a plaintiff's lawyer whose New Orleans firm, Landry, Swarr & Canella, specializes in asbestos cases. In 2003, he ran for a state House seat but lost in a runoff to John LaBruzzo. University of New Orleans political scientist Ed Chervenak said candidates often lend their campaigns cash as "seed money," and then seek donations to pay off the debt. "Typically if they borrow money they hold fundraisers to retire that debt. That happens all the time," Chervenak said. Sudderth doesn't appear to be following that strategy. A married father of three children who attend Catholic schools, Sudderth, who has taken leave from his job as an assistant attorney general, loaned his campaign $137,000, his reports show. However, his campaign raised only $15,200 in cash, the least amount in the race. Sudderth has spent $88,420 through March 17, his reports show. He, too, has aired television commercials. Schlegel, a married father of one child who resigned as a felony prosecutor in Jefferson Parish to launch his campaign, has spent $42,400 through March 17. He raised $65,785 during the same period, his records show. McInnis, a divorced mother of four and the only candidate who has experience as a judge, trailed the pack in spending, at $27,385, her reports show. Her campaign raised $37,215 through March 17. McInnis' campaign has also run a television commercial.
{ "pile_set_name": "Pile-CC" }
Q: Reading data from a text file into a 2D array and getting out of bounds exception I've been having trouble with reading data in from a text file to a 2D array. I am not too sure what the issue with the out of bounds exception is because I thought I initialized it correctly but I am not sure. Here is my code. String [][] f_team = new String [20][6]; //20 and 6 int cnt = 0; int cnt2 = 0; String line = ""; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); loadData(); } public void loadData() { try { BufferedReader br = new BufferedReader(new InputStreamReader(getAssets().open("team.txt"))); while(cnt<=20) { line = br.readLine(); f_team[cnt][cnt2] = line; cnt2 = cnt2 + 1; if (cnt2 == 5) { cnt = cnt + 1; cnt2 = 0; } } br.close(); } catch (IOException e) { e.printStackTrace(); } } } Here is my logcat for the error: 05-16 17:33:29.119 26312-26312/com.jmac.jmac.footy E/AndroidRuntime: FATAL EXCEPTION: main Process: com.jmac.jmac.footy, PID: 26312 java.lang.RuntimeException: Unable to start activity ComponentInfo{com.jmac.jmac.footy/com.jmac.jmac.footy.Pitch}: java.lang.ArrayIndexOutOfBoundsException: length=20; index=20 at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:2693) at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:2758) at android.app.ActivityThread.access$900(ActivityThread.java:177) at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1448) at android.os.Handler.dispatchMessage(Handler.java:102) at android.os.Looper.loop(Looper.java:145) at android.app.ActivityThread.main(ActivityThread.java:5942) at java.lang.reflect.Method.invoke(Native Method) at java.lang.reflect.Method.invoke(Method.java:372) at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:1399) at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1194) Caused by: java.lang.ArrayIndexOutOfBoundsException: length=20; index=20 at com.jmac.jmac.footy.Pitch.loadData(Pitch.java:82) at com.jmac.jmac.footy.Pitch.onCreate(Pitch.java:74) at android.app.Activity.performCreate(Activity.java:6289) at android.app.Instrumentation.callActivityOnCreate(Instrumentation.java:1119) at android.app.ActivityThread.performLaunchActivity(ActivityThread.java:2646) at android.app.ActivityThread.handleLaunchActivity(ActivityThread.java:2758)  at android.app.ActivityThread.access$900(ActivityThread.java:177)  at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1448)  at android.os.Handler.dispatchMessage(Handler.java:102)  at android.os.Looper.loop(Looper.java:145)  at android.app.ActivityThread.main(ActivityThread.java:5942)  at java.lang.reflect.Method.invoke(Native Method)  at java.lang.reflect.Method.invoke(Method.java:372)  at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:1399)  at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:1194)  A: If your array has size 20, you can only access index [0;19] you are accessing index 20 in your while clause while(cnt<=20) you have to put: while(cnt<20) see https://docs.oracle.com/javase/tutorial/java/nutsandbolts/arrays.html
{ "pile_set_name": "StackExchange" }
Get in touch with a representative from Lax Playground! Harvard Announces 2012 Men’s Lacrosse Schedule CAMBRIDGE, Mass. –The Harvard men’s lacrosse team will play seven home games and face four teams which reached last year’s NCAA tournament during the 2012 campaign. Under Chris Wojcik ’96, who is in his second season as The Frisbie Family Head Coach for Harvard Men’s Lacrosse, the Crimson will host 2011 NCAA tournament participant Hofstra and will visit Duke, Cornell and Penn, who made the NCAA postseason a year ago. Harvard, which posted a 10-6 overall record, including a 3-3 mark in the Ivy League, reached the final of the Ivy tournament. This year’s Ancient Eight tournament will be held May 4-6 at the home field of the regular-season champion. The winner of the tournament will receive the Ancient Eight’s automatic berth to the NCAA championship. “Our players and coaches eagerly await the 2012 season and the opportunity to compete in the Ivy League,” coach Wojcik said. “In addition, we have assembled a competitive out of conference schedule, and our program is looking forward to the challenge.” The Crimson will open the 2012 season at home, hosting Vermont Feb. 25. Harvard will then visit local rival Holy Cross Feb. 28, before returning home to welcome Hofstra March 3. A week late, Harvard travels to play Georgetown March 10, before visiting Duke March 12. The Ivy League season begins by hosting Brown under the lights at Harvard Stadium March 17 at 7 p.m. The Crimson will remain in Cambridge to welcome Dartmouth March 24. Harvard will take a step out of conference play when it faces Massachusetts in Amherst, Mass., for a midweek game March 27. The Crimson will also host Michigan, who is entering its first season at the Division I level, at Harvard Stadium March 31. Coach Wojcik and the Crimson makes the trip to Cornell April 7, before returning home to welcome Quinnipiac for a Tuesday night game April 10. Harvard will then close out the regular season by visiting Penn April 14, hosting Princeton April 21 and then heading back on the road to play at Yale April 28. Harvard will serve as host of the NCAA Championships at Gillette Stadium May 26-28, 2012.
{ "pile_set_name": "Pile-CC" }
Q: Inner class with main method doesn't compile abstract class Manager { static void test() { System.out.println(12); } class Manager1 { public static void main(String args[]) { System.out.println(Manager.test()); } } } It's producing a compile time error. Can an abstract class have a static method with void type? A: Non-static inner classes cannot have static methods - only top-level and static classes can (as per JLS §8.1.3). Furthermore: System.out.println(Manager.test()); Manager.test() is void: you can't print that.
{ "pile_set_name": "StackExchange" }
The Future of Japanese-Chinese Relations Under Japan’s New Government: An Expert Weighs In The United States was not the only country that voted for change this past year. On August 30, 2009, after fifty-four years of essentially one-party rule, the Japanese people voted overwhelmingly to usher in a completely new government and a new way of thinking. The Liberal Democratic Party (LDP), which ruled Japan since 1955, was completely rejected. Obtaining only 119 out of 480 seats of the House of Representatives (the lower Diet), the LDP took a second seat to the younger and fresher Democratic Party of Japan (DPJ). The DPJ won 308 seats in the House, ensuring that their leader, Yukio Hatoyama, would become Prime Minister. The DPJ’s victory guarantees that much change will come to Japan. Already in the first few weeks of Prime Minister Hatoyama’s tenure, he has called for the complete transformation of the traditional government-bureaucracy relationship, the need to rework Japan’s economic recovery plan, and has called for a review of U.S. troops in stationed in Japan. But little has been made of the impact of Japan’s new government on its relation with its large and imposing neighbor to the west: China. Will the Hatoyama government seek to work with China or further alienate China by continuing to glorify Japan’s World War II past? Is Japan’s goal to look inward to Asia at the expense of its relationship with the U.S.? To answer these questions, I spoke with Gerald Curtis, a Columbia University political science professor and expert on Japanese politics, government and society. In analyzing the future of Japanese-Chinese relations, Professor Curtis left me with another word that has been used frequently in recent elections: hope. Transcript of Interview with Prof. Gerald Curtis EL: My first question is: how do you envision the China-Japanese relationship changing with the change of government in Japan? GC: Well, I think it’s going to get better. It’s already gotten better in the last few years, but it will get better. One reason being Hatoyama’s view on the so-called history issue, on Japan’s responsibility for its behavior during the War and the years leading up to the War, is very heartfelt and the Chinese will appreciate his view on the history issue. Unlike some of the LDP leaders who apologized but didn’t really mean it, Hatoyama believes Japan was behaving very badly and will say so. So I think that will be very good. Also, he wants to see a stronger relationship with China. He’s not going to go to the Yakasuni shrine which has been a source of difficulty. He wants to create an alternative site in which foreign leaders can go, as well as Japanese leaders, to pay respects to all those who died in the War regardless of nationality. He wants to encourage greater cooperation on issues like environmental, pollution control and so on, which the Chinese desperately need. And I think he understands well that improving relations with China doesn’t come at the expense of relations with the U.S. The U.S. wants to improve relations with China, so does Japan, but the U.S. and Japan together can do a lot in dealing with China and some of the problems it faces. So I think the relationship is likely to get better. EL: In regards to his [Hatoyama’s] request to the [U.S.] military bases to close, my understanding is that Japan has been open to having a U.S. military presence in Asia in order to protect it against any problems with China or if China happens to invade Taiwan or become more bellicose toward Taiwan because that would adversely impact shipments to Japan. What will Japan do, or does it no longer fear a military threat from China? GC: Hatoyama has not suggested that the U.S. military presence in Japan should be abolished. They think that some of, the extent of the presence in Okinawa is unsustainable, that there are simply too many bases in too many congested urban areas in Okinawa with no ostensible reason for there being there in terms of the threats that either Japan or the United States faces. So they want to see some adjustments made but I think the government understands that this military alliance with Japan is critical for Japanese security and that to have a military alliance you have to provide some facilities but maybe not as much as currently exists. So that is what the negotiation will be about. It’s not about eliminating the U.S. military presence. EL: Has Prime Minister Hatoyama made any direct overtures yet to the Chinese government, as far as you know? GC: Yes, he met with Hu Jintao yesterday [Sept. 22, 2009] in New York and that was their first face to face and I believe he is going to visit Beijing in October for an extended discussion with the Chinese leadership. But he has already taken the initial step with this bilateral here in New York City. EL: In regards to the ability, because there have been some issues, the Chinese-Japanese relationship has become more of a politically sensitive relationship in both countries, in China as well as in Japan, especially when the Japanese people saw the response of the Chinese people protesting against Japan. Do you think that [Hatoyama’s] making overtures with the Chinese will have a negative impact on his popularity in Japan? GC: No, not at all. Nobody wants a fight or a lot of tension with China. I think the way he deals with China will be welcomed in Japan. Hu Jintao in the meeting with Hatoyama yesterday was talking about the need for more cultural exchange and the need to educate both their publics about the importance of the relationship. That came from the Chinese side, that’s really very important. Neither country wants trouble with the other. China doesn’t want trouble with anyone right now, they have to concentrate on their economic development, they don’t need any fights with neighbors and with Japan in particular. So I think the sentiment is to try to move this relationship forward in a positive way. I think they have a good shot at it. Elizabeth M. Lynch is an attorney focusing on legal development and reform in China and blogs at China Law and Policy.
{ "pile_set_name": "Pile-CC" }
[The surface ECG in the diagnosis of cardiac arrhythmias: the value of the right precordial leads]. The surface electrocardiogram (ECG) is a simple noninvasive method to assess the electrical activity of the heart and provides important information to identify patients with cardiac arrhythmias and increased arrhythmic risk. This brief review highlights cardiac conditions in which the right precordial leads recorded on the surface ECG during sinus rhythm or tachycardia are of important diagnostic and prognostic value. Epsilon waves seen in the right precordial ST segments are the electrocardiographic hallmark of arrhythmogenic right ventricular cardiomyopathy. The diagnosis of Brugada syndrome and risk stratification of affected patients are based on a coved-type >or=2 mm ST-segment elevation in the right precordial leads. This typical ECG pattern may be present persistently, intermittently or only after administration of sodium-channel blockers. The early repolarization syndrome, most commonly seen in healthy young individuals, is characterized by a ST-segment elevation of 1 to 4 mm in the mid-precordial leads with a notched and elevated J point in lead V4. The precordial ECG T-wave repolarization pattern may be helpful in identifying the genotype in patients with suspected long QT syndrome. In patients with overt preexcitation, the surface leads V1 and V2 play a key role in localizing the site of bypass-tract insertion. Finally, the right precordial lead V1 is often crucial in the diagnosis of narrow and broad QRS-complex tachycardias.
{ "pile_set_name": "PubMed Abstracts" }
Molina‐Romero M, Gómez PA, Sperl JI, et al. A diffusion model‐free framework with echo time dependence for free‐water elimination and brain tissue microstructure characterization. Magn Reson Med. 2018;80:2155--2172. 10.1002/mrm.27181 29573009 **Funding information** German Excellence Initiative; European Commission, Grant/Award Number: 605162; New Investigator Award from the Wellcome Trust, Grant/Award Number: 096646/Z/11/Z; Wellcome Trust Strategic Award (104943/Z/14/Z) The copyright line for this article was changed on 28 September 2019 after original online publication. 1. INTRODUCTION {#mrm27181-sec-0005} =============== More than 50 years have passed since Stejskal and Tanner published their early research on pulsed gradient spin‐echo.[1](#mrm27181-bib-0001){ref-type="ref"} Thereafter, diffusion weighted imaging became an essential tool for nondestructive tissue microstructure characterization. The pioneering studies on ex vivo tissue and simulations of Krägger,[2](#mrm27181-bib-0002){ref-type="ref"} Latour et al.,[3](#mrm27181-bib-0003){ref-type="ref"} Szafer et al.,[4](#mrm27181-bib-0004){ref-type="ref"} and Stanisz et al.[5](#mrm27181-bib-0005){ref-type="ref"} established the theoretical basis of the compartmental model of neural tissue. These early contributions were later translated to target specific biomarkers for in vivo human studies. White matter (WM) anisotropy became fiber orientation with the introduction of diffusion tensor imaging (DTI).[6](#mrm27181-bib-0006){ref-type="ref"} The composite hindered and restricted model of diffusion MR imaging (CHARMED)[7](#mrm27181-bib-0007){ref-type="ref"} extended DTI to two compartments with restricted and hindered diffusion behavior. Using the same principles, the neurite orientation dispersion and density imaging (NODDI) model[8](#mrm27181-bib-0008){ref-type="ref"} introduced fiber orientation dispersion metrics and added an isotropic compartment. Additionally, axon diameter was addressed by AxCaliber[9](#mrm27181-bib-0009){ref-type="ref"} and ActiveAx.[10](#mrm27181-bib-0010){ref-type="ref"} These and other approaches rely on diffusion signal representations or a variety of geometric biophysical assumptions about the underlying tissue compartments, producing a wide range of possible configurations.[11](#mrm27181-bib-0011){ref-type="ref"} In parallel with the development of multicomponent diffusion tissue models, relaxometry addressed the compartmental nature of tissue microstructure from a different perspective.[12](#mrm27181-bib-0012){ref-type="ref"} Multi‐echo spin echo (SE) experiments combined with regularized inverse Laplace transforms (ILTs) for multi‐exponential fitting showed the presence of multiple water compartments in the tissue. Nonnegative least squares (NNLS)[13](#mrm27181-bib-0013){ref-type="ref"} is the current gold standard for computing a regularized discrete ILTs for several components.[14](#mrm27181-bib-0014){ref-type="ref"}, [15](#mrm27181-bib-0015){ref-type="ref"} Alternatively, the exponential analysis via system identification using Steiglitz‐McBride (EASI‐SM) for multicomponent estimation was introduced by Stoika et al.[16](#mrm27181-bib-0016){ref-type="ref"}, [17](#mrm27181-bib-0017){ref-type="ref"} Additionally, mcDESPOT,[18](#mrm27181-bib-0018){ref-type="ref"} used a spoiled gradient‐recalled echo and a balanced steady‐state free precession to yield relaxation, volume fraction, and water exchange parameters for three compartments. Nevertheless, the paths of diffusion MRI and MR relaxometry have become entangled over the years. Studies on ex vivo nerves with a diffusion‐weighted Carr‐Purcell‐Meiboom‐Gill (CPMG) sequence[19](#mrm27181-bib-0019){ref-type="ref"}, [20](#mrm27181-bib-0020){ref-type="ref"} showed the relationship that existed between compartmental *T* ~2~ decay and diffusivity. However, diffusion‐weighted CPMG experiments need long acquisition times and high specific absorption rates, which makes them unsuitable for human in vivo studies. Typically, two‐dimensional ILTs were used to fit the data, but this approach is highly ill‐posed and requires large amounts of data for stabilization. Recently, Benjamini et al.[21](#mrm27181-bib-0021){ref-type="ref"} introduced the marginal distributions constrained optimization (MADCO), a nonCPMG compressed‐sensing based solution that reduced the amount of data necessary for NMR diffusion--relaxation correlation experiments. Kim et al. translated diffusion--relaxation correlation spectroscopy (DR‐COSY)[22](#mrm27181-bib-0022){ref-type="ref"}, [23](#mrm27181-bib-0023){ref-type="ref"} into imaging (DR‐CSI)[24](#mrm27181-bib-0024){ref-type="ref"} using spatial regularization to reduce the amount of necessary data and stabilize the ILTs. However, they require specific diffusion protocols with increasing *b*‐values along a unique diffusion direction and repeated echoes or inversion times. Other alternatives combine diffusion models with multicompartmental relaxation. For instance, inversion recovery diffusion weighted imaging has been used to identify fiber populations,[25](#mrm27181-bib-0025){ref-type="ref"}, [26](#mrm27181-bib-0026){ref-type="ref"} and WM integrity has been characterized using the axonal stick model and multiple echo times (TE).[27](#mrm27181-bib-0027){ref-type="ref"} Compartmental analysis of the diffusion signal is intimately related to a recurring issue: cerebrospinal fluid (CSF) or free‐water contamination.[28](#mrm27181-bib-0028){ref-type="ref"}, [29](#mrm27181-bib-0029){ref-type="ref"} All the existing contributions agree on using a bi‐tensor signal model: parenchyma and CSF. However, this is an ill‐posed problem for a single‐shell and ill‐conditioned for multiple‐shell acquisitions.[30](#mrm27181-bib-0030){ref-type="ref"} Spatial regularization was proposed by Pasternak et al.,[31](#mrm27181-bib-0031){ref-type="ref"} relying on the local smoothness of the diffusion tensor. Later, a protocol optimization for multiple shells was presented by Hoy et al.,[32](#mrm27181-bib-0032){ref-type="ref"} eliminating such a constraint. Other solutions regularize the problem by adding priors[33](#mrm27181-bib-0033){ref-type="ref"} or finding the best fit to the model.[34](#mrm27181-bib-0034){ref-type="ref"} Nevertheless, the CSF contribution to the diffusion signal depends on the TE. Thus, disentangling the tissue CSF volume fraction requires an approach that includes *T* ~2~ compartmental dependencies.[33](#mrm27181-bib-0033){ref-type="ref"}, [35](#mrm27181-bib-0035){ref-type="ref"}, [36](#mrm27181-bib-0036){ref-type="ref"} We propose a general framework for studying diffusion and relaxation characteristics in tissue microstructures. We call it general because it does not model the compartmental diffusion behavior. It replaces the ILTs by a blind source separation (BSS) technique, reducing the minimum number of distinct echo times required to the number of compartments in the tissue, less than for ILTs‐based methods. Other than the requirement to measure at more than one echo time, this framework is diffusion protocol‐agnostic, and can be used in combination with any protocol of interest. Our approach quantifies proton density, compartmental volume fractions, and transverse relaxation times. Importantly, it handles diffusion signals from each compartment independently, allowing for individual analyses, and thus performs CSF partial volume correction as a direct application. 2. THEORY {#mrm27181-sec-0006} ========= Following the Bloch--Torrey equation, we describe the diffusion signal as a weighted sum of the signals from the compartments comprising the tissue $$X(\text{TE},b,\mathbf{g}) = S_{0}{\sum\limits_{i = 1}^{M}f_{i}}e^{- \frac{\text{TE}}{T_{2_{i}}}}S_{i}(b,\mathbf{g}).$$ Where *b* summarizes the gradient effects[1](#mrm27181-bib-0001){ref-type="ref"}, [37](#mrm27181-bib-0037){ref-type="ref"} and **g** defines the gradient directions. Here, the compartmental diffusion sources $S_{i}(b,\mathbf{g})$ are weighted by their volume fraction, *f~i~*, TE, and $T_{2_{i}}$. The exponent (the ratio between TE and $T_{2_{i}}$) scales the contribution of each compartment to the acquired signal. Therefore, measuring at different TEs produces distinct diffusion signals[38](#mrm27181-bib-0038){ref-type="ref"} with different weights from the compartmental signal sources. As a result, the signal of a single voxel measured with a protocol that accounts for multiple echoes can be formulated as $$\begin{bmatrix} {X_{1}(\text{TE}_{1},b,\mathbf{g})} \\ \vdots \\ {X_{N}(\text{TE}_{N},b,\mathbf{g})} \\ \end{bmatrix} = S_{0}\begin{bmatrix} {f_{1}e^{\frac{- \text{TE}_{1}}{T_{2_{1}}}}} & \cdots & {f_{M}e^{\frac{- \text{TE}_{1}}{T_{2_{M}}}}} \\ \vdots & \ddots & \vdots \\ {f_{1}e^{\frac{- \text{TE}_{N}}{T_{2_{1}}}}} & \cdots & {f_{M}e^{\frac{- \text{TE}_{N}}{T_{2_{M}}}}} \\ \end{bmatrix}\begin{bmatrix} {S_{1}(b,\mathbf{g})} \\ \vdots \\ {S_{M}(b,\mathbf{g})} \\ \end{bmatrix},$$where *X~j~* (*j* $\in$ $\lbrack 1,N\rbrack$) are the diffusion signals acquired for the *N* TEs. *f~i~* and $T_{2_{i}}$ (*i* $\in$ $\lbrack 1,M\rbrack$) are the volume fraction and *T* ~2~ decay for the *i*th compartment, respectively, and *M* is the number of compartments. Equation [(2)](#mrm27181-disp-0002){ref-type="disp-formula"} can be expressed in matrix form as **X = AS**. This is a matrix factorization of the measurements, $\mathbf{X} \in \mathbb{R}_{\geq 0}^{N \times n}$, into two new matrices: the mixing matrix, $\mathbf{A} \in \mathbb{R}_{\geq 0}^{N \times M}$, which is defined by the experimental TEs, the compartmental volume fractions *f*, and *T* ~2~ decays; and the sources matrix, $\mathbf{S} \in \mathbb{R}_{\geq 0}^{M \times n}$, representing the diffusion sources in each sub‐voxel compartment. Interestingly, we noticed from the definition of **A** that the ratio between the experimental TEs and $T_{2_{i}}$ determines the direction (or slope for *N* = 2) of the *i*th column vector of the mixing matrix. Therefore: $$T_{2_{i}} = \frac{\text{TE}_{k} - \text{TE}_{l}}{\log\left( \frac{a_{li}}{a_{ki}} \right)},$$where TE~*k*~ \< TE~*l*~, and *a~ki~* and *a~li~* are the *k*th and *l*th elements of the *i*th column of the mixing matrix, respectively. Additionally, diffusion is an attenuation contrast and as such, $S(b = 0) = 1$, allowing Equation [(2)](#mrm27181-disp-0002){ref-type="disp-formula"} to be rewritten as $$\begin{bmatrix} {X_{1}(\text{TE}_{1},b = 0,\mathbf{g})} \\ \vdots \\ {X_{N}(\text{TE}_{N},b = 0,\mathbf{g})} \\ \end{bmatrix} = S_{0}\begin{bmatrix} e^{\frac{- \text{TE}_{1}}{T_{2_{1}}}} & \cdots & e^{\frac{- \text{TE}_{1}}{T_{2_{M}}}} \\ \vdots & \ddots & \vdots \\ e^{\frac{- \text{TE}_{N}}{T_{2_{1}}}} & \cdots & e^{\frac{- \text{TE}_{N}}{T_{2_{M}}}} \\ \end{bmatrix}\begin{bmatrix} f_{1} \\ \vdots \\ f_{M} \\ \end{bmatrix},$$which, together with ${\sum\limits_{i = 1}^{M}f_{i}} = 1$, allows us to solve for the volume fractions and proton density (*f~i~* and *S* ~0~) when the number of measurements matches the number of compartments (*M* = *N*). Contrary, when there are more compartments than measurements (*M* \> *N*), Equation [(4)](#mrm27181-disp-0004){ref-type="disp-formula"} is undetermined and *f~i~* and *S* ~0~ cannot be estimated. Factorizing **X** into **A** and **S** is known as BSS[39](#mrm27181-bib-0039){ref-type="ref"} of mixed measurements into their generating sources (Figure [1](#mrm27181-fig-0001){ref-type="fig"}). For BSS to identify these sources, they have to be distinct: $S_{i} \neq S_{j}$ $\forall$ $i \neq j$. Therefore, based on previous work,[19](#mrm27181-bib-0019){ref-type="ref"}, [20](#mrm27181-bib-0020){ref-type="ref"} we assumed them to be different. ![Factorization of measurements, **X**, into the sources, **S**, and mixing matrix, **A**. Example of a BSS operation for two mono‐exponential sources (*M* = 2) and two TE measurements (*N* = 2). In this illustration, the measurements, **X**, show a bi‐exponential decay profile. BSS is capable of separating these two independent exponential source functions, **S**; and calculating their mixing matrix, **A**. The parameters that determine the degree of mixing ( $T_{2_{1}},\, T_{2_{2}}$, and *f*), and the scaling factor, *S* ~0~, were estimated as described in Equations [(3)](#mrm27181-disp-0003){ref-type="disp-formula"} and [(4)](#mrm27181-disp-0004){ref-type="disp-formula"}. We showed an exponential case for simplicity, but BSS is not limited to this choice; any signal can be processed in the same manner](MRM-80-2155-g001){#mrm27181-fig-0001} There are four main approaches to BSS: principal component analysis,[40](#mrm27181-bib-0040){ref-type="ref"} independent component analysis,[41](#mrm27181-bib-0041){ref-type="ref"} nonnegative matrix factorization (NMF),[42](#mrm27181-bib-0042){ref-type="ref"} and sparse component analysis.[43](#mrm27181-bib-0043){ref-type="ref"} Principal component analysis is not an applicable solution for this problem because the diffusion sources are not orthogonal. Independent component analysis assumes, as prior knowledge, that the signal sources are statistically independent and have nonGaussian distributions. However, diffusion MRI signals are correlated with the tissue structure and temperature and they present nonGaussian distributions only in restricted compartments, meaning that independent component analysis is not suitable either. We previously explored sparse component analysis[44](#mrm27181-bib-0044){ref-type="ref"} and found that even though the results for simulations and real data for specific diffusion protocols were encouraging, finding a sparse and disjoint domain to meet the method\'s requirements was not always possible for arbitrary protocols. We observed the same issue for a version of NMF that enforces sparsity similarly.[36](#mrm27181-bib-0036){ref-type="ref"} In the present work, we took a BSS approach based on NMF (assuming **X**, **A**, and **S** are nonnegative). Instead of depending on sparsity, we used a popular NMF solver: the alternating least squares algorithm (ALS).[42](#mrm27181-bib-0042){ref-type="ref"}, [45](#mrm27181-bib-0045){ref-type="ref"}, [46](#mrm27181-bib-0046){ref-type="ref"} We chose ALS instead of the multiplicative update algorithm[47](#mrm27181-bib-0047){ref-type="ref"} due to its faster convergence.[48](#mrm27181-bib-0048){ref-type="ref"} We extended ALS to account for physically plausible limitations, resulting in Algorithm 1, which we refer to as constrained ALS (cALS). Compartmental *T* ~2~ values available from the literature[15](#mrm27181-bib-0015){ref-type="ref"} allowed us to limit the solution space of the columns of **A** (Equation [(3)](#mrm27181-disp-0003){ref-type="disp-formula"}). Additionally, for in vivo data, the diffusion behavior of CSF is known to be approximately isotropic with $3 \times 10^{- 3}$ mm^2^/s diffusivity,[28](#mrm27181-bib-0028){ref-type="ref"} adding extra prior information. These constraints and priors make cALS converge toward physically realistic solutions (Figure [1](#mrm27181-fig-0001){ref-type="fig"}). **Algorithm 1** Constrained Alternating Least Squares (cALS) Constrained ALS initializes the column vectors of **A** at the central *T* ~2~ of their given constraints, avoiding random initializations in regions that are not physically feasible and increasing the stability. After each iteration, cALS verifies that the resulting *T* ~2~ of each column vector is between its boundaries, and sets it back to the center of its constrained solution space otherwise. Following the factorization of **A**, we estimated *T* ~2~ and *f* for each compartment, (Equations [(3)](#mrm27181-disp-0003){ref-type="disp-formula"} and [(4)](#mrm27181-disp-0004){ref-type="disp-formula"}), and recalculated the real **A**. This is important since the column norms of the factorized **A** do not tell us about the volume fractions. Then, **S = A^−1^X** is calculated. An iterative algorithm like cALS inverts **A** repeatedly, requiring it to be nonsingular and introducing a new condition. From Equation [(2)](#mrm27181-disp-0002){ref-type="disp-formula"}, **A** is nonsingular when $T_{2_{i}} \neq T_{2_{j}}$ $\forall$ $i \neq j$. Hence, in accordance with the literature,[19](#mrm27181-bib-0019){ref-type="ref"}, [20](#mrm27181-bib-0020){ref-type="ref"} we assumed that the transverse relaxation times for each compartment were distinct. An open source implementation can be found in <https://github.com/mmromero/dwybss>. 3. METHODS {#mrm27181-sec-0007} ========== 3.1. Simulations {#mrm27181-sec-0008} ---------------- NMF is known for converging to local minima.[45](#mrm27181-bib-0045){ref-type="ref"} Thus, it is necessary to assess the impact of the constraints. We ran simulations with Rician noise for signal‐to‐noise ratio (SNR) levels of 50, 100, and 150 at the nondiffusion weighted volume and minimum TE. We accounted for *T* ~2~ values, volume fractions, and diffusivities supported by literature.[15](#mrm27181-bib-0015){ref-type="ref"}, [28](#mrm27181-bib-0028){ref-type="ref"} 3.2. Two compartments {#mrm27181-sec-0009} --------------------- Two compartments were simulated mimicking intra/extra‐axonal (IE) and CSF water. The diffusion protocol included one nondiffusion weighted volume and 30 directions. We modeled diffusion as a Gaussian process (see Supporting Information Figure S4). For all the simulations we used $T_{2_{\text{CSF}}}$ = 2000 ms, and varied $T_{2_{\text{IE}}}$ from 50 to 150 ms in 30 increments.[15](#mrm27181-bib-0015){ref-type="ref"} Values of *f* ~IE~ = 0.25, 0.5 and, 0.75 were used. We fixed TE~1~ = 60 ms, and explored TE~2~ from 70 to 150 ms in 31 increments. We defined ΔTE = TE~2~ − TE~1~. The performance of the cALS algorithm was tested under the following conditions: **Overlapped *T*~2~ constraints**: $T_{2_{\text{IE}}}$ and $T_{2_{\text{CSF}}}$ were bounded from 0--1000 and 0--3000 ms, respectively, and no assumption on *S* ~CSF~ was made (Figure [2](#mrm27181-fig-0002){ref-type="fig"} and Supporting Information Figure S5).Figure 2Convergence for two compartments (IE and CSF) with overlapping *T* ~2~ constraints and no *S* ~CSF~ prior (SNR = 50). The mean of *f* ~IE~ absolute error and its standard error (SEM) (A, B), and the mean of $T_{2_{\text{IE}}}$ (C) and $T_{2_{\text{CSF}}}$ (E) relative errors per unit (p.u.), and their standard error (D, F). Red and white lines mark the 0.2 and 0.1 contour respectively. One thousand simulations were run for each combination of *f* ~IE~, $T_{2_{\text{IE}}}$, and ΔTE. $T_{2_{\text{IE}}}$ and $T_{2_{\text{CSF}}}$ were bounded between 0--1000 ms and 0--3000 ms respectively, and no prior was imposed on *S* ~CSF~. We defined the convergence area as the one with error lower than 0.1 for *f* ~IE~ and $T_{2_{\text{IE}}}$. The bias of *f* ~IE~ and $T_{2_{\text{IE}}}$ decreases for long ΔTEs as *f* ~IE~ increases. See Supporting Information Figure S5 for more SNR levels**Overlapped *T*~2~ constraints and prior *S*~CSF~**: $T_{2_{\text{IE}}}$ and $T_{2_{\text{CSF}}}$ were bounded from 0--1000 and 0--3000 ms, respectively. CSF diffusivity was assumed to be isotropic with value 3 × 10^−3^ mm^2^/s (Supporting Information Figure S10).**Separated *T*~2~ constraints**: $T_{2_{\text{IE}}}$ and $T_{2_{\text{CSF}}}$ were bounded from 0--300 and 300--3000, ms, respectively, and no assumption on *S* ~CSF~ was made (Supporting Information Figure S11).**Separated *T*~2~ and prior *S~CSF~***: $T_{2_{\text{IE}}}$ and $T_{2_{\text{CSF}}}$ were bounded from 0--300 and 300--3000 ms, respectively. CSF diffusivity was assumed to be isotropic with value 3 × 10^−3^ mm^2^/s (Supporting Information Figure S13).**Fixed** $T_{2_{\text{CSF}}}$: $T_{2_{\text{IE}}}$ was bounded from 0 to 300 ms. $T_{2_{\text{CSF}}}$ was fixed to 2000 ms. No assumption on *S* ~CSF~ was made (Supporting Information Figure S12).**Fixed** $T_{2_{\text{CSF}}}$ **and prior *S*~CSF~**: $T_{2_{\text{IE}}}$ was bounded from 0 to 300 ms. $T_{2_{\text{CSF}}}$ was fixed to 2000 ms. CSF diffusivity was assumed to be isotropic with value 3 × 10^−3^ mm^2^/s (Figure [3](#mrm27181-fig-0003){ref-type="fig"} and Supporting Information Figure S6).Figure 3Convergence for two compartments (IE and CSF) with nonoverlapping *T* ~2~ constraints and *S* ~CSF~ prior (SNR = 50). The mean of *f* ~IE~ absolute error and its standard error (SEM) (A, B), and the mean of $T_{2_{\text{IE}}}$ (C) and $T_{2_{\text{CSF}}}$ (E) relative error per unit (p.u.), and their standard errors (D, F). Red and white lines mark the 0.2 and 0.1 contour respectively. One thousand simulations were run for each combination of *f* ~IE~, $T_{2_{\text{IE}}}$, and ΔTE. $T_{2_{\text{IE}}}$ and $T_{2_{\text{CSF}}}$ were bounded between 0--300 ms and 2000 ms, respectively, and *S* ~CSF~ was set to have isotropic diffusivity with value 3 $\times 10^{- 3}$ mm^2^/s. We defined the convergence area as the one with error lower than 0.1 for *f* ~IE~ and $T_{2_{\text{IE}}}$. This area is larger than for Figure [2](#mrm27181-fig-0002){ref-type="fig"} stressing the importance of priors. See Supporting Information Figure S6 for more SNR levels We repeated the last simulation for values of *f* ~IE~ = 0 and 1, accounting only for IE or CSF (Figure [4](#mrm27181-fig-0004){ref-type="fig"} and Supporting Information Figure S7). ![Convergence for two compartments (IE and CSF) with nonoverlapping *T* ~2~ constraints and *S* ~CSF~ prior when only one is actually present in the tissue (SNR = 50). The mean of *f* ~IE~ absolute error and its standard error (SEM) (A, B), and the mean of $T_{2_{\text{IE}}}$ (C) and $T_{2_{\text{CSF}}}$ (E) relative error per unit (p.u.), and their standard errors (D, F). Red and white lines mark the 0.2 and 0.1 contour respectively. One thousand simulations were run for each combination of *f* ~IE~, $T_{2_{\text{IE}}}$, and ΔTE. $T_{2_{\text{IE}}}$ and $T_{2_{\text{CSF}}}$ were bounded between 0--300 ms and 2000 ms, respectively, and *S* ~CSF~ was set to have isotropic diffusivity with value 3 $\times 10^{- 3}$ mm^2^/s. We defined the convergence area as the one with error lower than 0.1 for *f* ~IE~ and $T_{2_{\text{IE}}}$. Estimates of *f* ~IE~ are reliable for ΔTE \> 45 ms (A, B). Estimates of $T_{2_{\text{IE}}}$ and $T_{2_{\text{CSF}}}$ are accurate for each case. See Supporting Information Figure S7 for more SNR levels](MRM-80-2155-g004){#mrm27181-fig-0004} Finally, intra‐cellular (IC) and extra‐cellular (EC) *T* ~2~ values are similar.[15](#mrm27181-bib-0015){ref-type="ref"} We assessed the potential of BSS to separate them. Two diffusion signals were generated (see Supporting Information Figure S14). We used *f* ~IC~ = 0.25, 0.5, and 0.75. The $T_{2_{\text{IC}}}$ vales ranged from 50 to 90 ms in 30 increments, and $T_{2_{\text{EC}}}$ = 100 ms. TE~1~ was fixed to 60 ms and TE~2~ was varied between 70 and 150 ms in 31 increments. No assumption was made on the diffusion signals, and *T* ~2~ constraints were defined between 0--150 and 0--200 ms for IC and EC, respectively (Figure [5](#mrm27181-fig-0005){ref-type="fig"} and Supporting Information Figure S8). ![Convergence for two compartments (IC and EC) with overlapping *T* ~2~ constraints and no other priors (SNR = 50). The mean of *f* ~IE~ absolute error and its standard error (SEM) (A, B), and the mean of $T_{2_{\text{IE}}}$ (C) and $T_{2_{\text{CSF}}}$ (E) relative error per unit (p.u.), and their standard errors (D, F). Red and white lines mark the 0.2 and 0.1 contour respectively. One thousand simulations were run for each combination of *f* ~IC~, $T_{2_{\text{IC}}}$, and ΔTE. $T_{2_{\text{IC}}}$ and $T_{2_{\text{EC}}}$ were bounded between 0--150 ms and 0--200 ms, respectively, and no other prior was imposed in the signal sources. We define the convergence area as the one with error lower than 0.1 for *f* ~IC~, $T_{2_{\text{IC}}}$, and $T_{2_{\text{EC}}}$. Estimate of *f* ~IC~ is biased for all *f* ~IC~ levels. *T* ~2~ estimates show a narrow band of convergence limited by the lack of prior knowledge (see Figure [2](#mrm27181-fig-0002){ref-type="fig"}, Supporting Information Figures S5, S10) and the condition of **A** when the *T* ~2~ values are similar. See Supporting Information Figure S8 for more SNR levels](MRM-80-2155-g005){#mrm27181-fig-0005} We simulated 1000 times each combination of parameters, and reported the mean value of the absolute error of *f*, the relative error of *T* ~2~, and their standard errors (SEM). 3.3. Three compartments: Searching for myelin {#mrm27181-sec-0010} --------------------------------------------- We incorporated a fast decaying component to model myelin, and fixed the *T* ~2~ of myelin ( $T_{2_{M}}$) to 15 ms.[15](#mrm27181-bib-0015){ref-type="ref"} $T_{2_{\text{IE}}}$ was varied from 50 to 150 ms in 30 increments, and $T_{2_{\text{CSF}}}$ = 2000 ms. To account for short T2 components we needed to reduce the minimum TE of our simulations (see phantom experiments in the supporting information). Therefore, we fixed TE~1~ = 10 ms, TE~3~ = 150 ms, and varied TE~2~ from 20 to 140 ms in 31 increments. We defined ΔTE = TE~2~ − TE~1~. Three cases were explored: (1) *f* ~M~ = 0.1, *f* ~IE~ = 0.6; (2) *f* ~M~ = 0.2, *f* ~IE~ = 0.5; and (3) *f* ~M~ = 0.3, *f* ~IE~ = 0.4; keeping *f* ~CSF~ = 0.3 for all of them. Simulations were run for two cases: **Overlapped *T*~2~ constraints**: $T_{2_{M}},\, T_{2_{\text{IE}}}$, and $T_{2_{\text{CSF}}}$ were bounded from 0--40, 0--300, and 0--3000 ms, respectively. No assumption on *S* ~CSF~ was made.**Separated *T*~2~ constraints, fixed** $T_{2_{\text{CSF}}}$ **and prior *S~CSF~***: $T_{2_{M}}$ and $T_{2_{\text{IE}}}$ were bounded from 0--40 and 41--300 ms, respectively, while $T_{2_{\text{CSF}}}$ = 2000 ms. CSF diffusivity was assumed to be isotropic with value 3 × 10^−3^ mm^2^/s (Figure [6](#mrm27181-fig-0006){ref-type="fig"} and Supporting Information Figure S9).Figure 6Convergence for three compartments (myelin, IE, and CSF) with nonoverlapping *T* ~2~ constraints and *S* ~CSF~ prior (SNR = 50). The mean absolute errors of the volume fraction estimates and their standard errors (SEM) (A--D); and the mean of $T_{2_{M}}$ (E) and $T_{2_{\text{IE}}}$ (G) relative error per unit (p.u.), and their standard errors (F, H). Red and white lines mark the 0.2 and 0.1 contour respectively. There is a large convergence area when TE~1~ = 10 ms, TE~2~ = 46 ms, and TE~3~ = 150 ms, which is not reachable with current clinical hardware. See Supporting Information Figure S9 for more SNR levels Each combination of parameters was simulated 1000 times. The mean value of the absolute error of *f*, the relative error of *T* ~2~, and their SEM were reported. 3.4. In vivo clinical data: Free‐water elimination {#mrm27181-sec-0011} -------------------------------------------------- We aim to show that BSS has potential applications in clinical settings. To this end, we ran an experiment to analyze its performance for estimating tissue parameters and correcting for CSF contamination. 3.5. Data acquisition {#mrm27181-sec-0012} --------------------- Two volunteers, a male (age 28 years) and a female (age 24 years) were scanned in a 3.0 T GE MR750w (GE Healthcare, Milwaukee, WI). The in vivo study protocol was approved by our institutional review board and prior informed consent was obtained. We acquired seven diffusion pulsed gradient spin‐echo with echo planar imaging volumes for TE values from 75.1 to 135.1 ms in 10 ms increments. The following parameters were constant: FOV = 240 mm; 4 mm slice thickness; TR = 6000 ms; 96 × 96 matrix size; ASSET = 2; and 30 directions. Additionally, we measured fluid‐attenuated inversion recovery (FLAIR) SE echo planar imaging for 17 equally‐spaced TEs ranging from 20 to 260 ms. The same imaging parameters were used as for the diffusion experiments but with no acceleration (ASSET = 0). 3.6. Data analysis {#mrm27181-sec-0013} ------------------ Diffusion data for all TEs were first registered with FSL FLIRT[49](#mrm27181-bib-0049){ref-type="ref"} to the shortest TE volume. We then processed them with BSS in pairs ( $M = N = 2$) with a fixed short TE of 75.1 ms. The long TE was increased from 85.1 to 135.1 ms for a total ΔTE of 60 ms (Figures [7](#mrm27181-fig-0007){ref-type="fig"} and [8](#mrm27181-fig-0008){ref-type="fig"}). We used literature CSF values ( $T_{2_{\text{CSF}}} = 2$ s and $D_{\text{CSF}} = 3 \times 10^{- 3}$ mm^2^/s) as the prior knowledge, and constrained the possible values of $T_{2_{\text{IE}}}$ between 0 and 200 ms.[15](#mrm27181-bib-0015){ref-type="ref"}, [28](#mrm27181-bib-0028){ref-type="ref"} We report maps of the BSS relative factorization error (Figure [7](#mrm27181-fig-0007){ref-type="fig"}A,B,G), CSF volume fraction (Figure [7](#mrm27181-fig-0007){ref-type="fig"}C,H), proton density (Figure [7](#mrm27181-fig-0007){ref-type="fig"}D,I), $T_{2_{\text{IE}}}$ (Figure [7](#mrm27181-fig-0007){ref-type="fig"}E,J), and number of compartments (Figure [7](#mrm27181-fig-0007){ref-type="fig"}F,K). ![BSS relative factorization error for increasing ΔTE values. The evolution of the relative factorization error with ΔTE, averaged over the whole brain, is shown in (A). As an example of how this error reduction affects BSS estimates we also show the relative error maps (B) and (G), CSF volume fractions (C) and (H), proton densities (D) and (I), $T_{2_{\text{IE}}}$ values (E) and (J) and the number of compartments (F) and (K) for ΔTEs values of 20 and 60 ms. The mean relative factorization error decreases as ΔTE increases, improving the parameter estimates](MRM-80-2155-g007){#mrm27181-fig-0007} ![Comparison of the BSS‐estimated $T_{2_{\text{IE}}}$ values against a FLAIR reference. A comparison of the reference (A, upper middle), for subject one with the BSS $T_{2_{\text{IE}}}$ estimate is shown for increasing values of ΔTE. The visual comparison was quantified by SSIM[50](#mrm27181-bib-0050){ref-type="ref"} and mean relative error (B). Histograms of the BSS‐estimated $T_{2_{\text{IE}}}$ values are plotted against the reference (C) and (D). High *T* ~2~ values in the ventricles for the reference indicate that the suppression of the CSF signal in the FLAIR experiment was not perfect, although they appeared dark in the raw images. This might have induced a positive bias for the reference. Finally, the BSS‐estimated of $T_{2_{\text{IE}}}$ values for ΔTE above 50 ms showed good agreement with the reference](MRM-80-2155-g008){#mrm27181-fig-0008} For reference, FLAIR multi‐echo echo planar imaging data were also registered with FLIRT to the shortest TE nondiffusion weighted volume. The signal decay for each voxel was then matched to a dictionary of mono‐exponential decays from 0 to 300 ms with a grid of 1 ms. We compared this map against the BSS $T_{2_{\text{IE}}}$ map (Figure [8](#mrm27181-fig-0008){ref-type="fig"}). We defined the relative error of the matrix factorization for the in vivo data as follows: $$\epsilon = \frac{\left| \mathbf{X} - S_{0}\mathbf{A}\mathbf{S} \right|_{2}}{\left| \mathbf{X} \right|_{2}}.$$ This is a measure of the performance of BSS for each voxel. Given that we calculated **S = A^−1^X**, this error formulation is sensitive to: (1) breaches of the BSS conditions due to artifacts, and (2) numerical instabilities due to the condition of **A**. Point one is the result of B~0~ drift, subject motion, flow, and eddy currents. These effects produce a violation of the BSS condition, making the signal sources different between TE measurements. The second point is the error amplification factor. A high ϵ denotes that the factorization could not find a solution within the constrained space and thus, results might not be trustworthy. Finally, BSS does not model the compartmental diffusion signal. However, to demonstrate a simple way to perform compartment‐independent analysis and correct for CSF contamination, we fitted the disentangled signals to the DTI model.[6](#mrm27181-bib-0006){ref-type="ref"} We further fitted the measured diffusion volumes at the shortest TE, and the BSS separated signals for the IE and CSF compartments to a mono‐exponential model using standard linear regression (FSL FDT Toolbox (<http://www.fmrib.ox.ac.uk/fsl>)). For comparison, bi‐exponential models using Pasternak\'s and Collier\'s methods were used (Figures [9](#mrm27181-fig-0009){ref-type="fig"}, [10](#mrm27181-fig-0010){ref-type="fig"}, Supporting Information Figure S15). Fractional anisotropy (FA) and mean diffusivity (MD) maps were derived for each fit. ![FA and MD of the BSS‐disentangled IE signal against the standard DTI and Pasternak\'s free‐water elimination (FWE) for subject two. Comparisons of the FA (B) and MD (D) histograms calculated from the separated IE signals are plotted against the standard DTI fit and Pasternak\'s method for the short TE measured data. MD (C) and colored FA (A) maps are also included for comparison. We observed a CSF correction effect in the long ΔTE BSS for FA in agreement with Pasternak\'s FWE. However, both method disagree for MD, where Pasternak\'s introduces spatial over‐regularization. See Supporting Information Figure S15 for the subject one](MRM-80-2155-g009){#mrm27181-fig-0009} ![Evolution of the MD histogram of the BSS‐disentangled CSF component with ΔTE. The MD histograms, calculated from the DTI fits for the signals disentangled for the CSF compartment, are plotted in (A) and (C). MD maps (B) and (D) are shown for anatomical inspection. The CSF MD histograms tends toward 3 $\times 10^{- 3}$ mm^2^/s, in agreement with the literature](MRM-80-2155-g010){#mrm27181-fig-0010} 4. RESULTS {#mrm27181-sec-0014} ========== 4.1. Simulations {#mrm27181-sec-0015} ---------------- ### 4.1.1. Two compartments {#mrm27181-sec-0016} The convergence area is the region where the mean relative error of $T_{2_{\text{IE}}}$ is lower than 0.1 per unit (p.u). Its shape for all the simulations (Figures [2](#mrm27181-fig-0002){ref-type="fig"}, [3](#mrm27181-fig-0003){ref-type="fig"}, [4](#mrm27181-fig-0004){ref-type="fig"}, [5](#mrm27181-fig-0005){ref-type="fig"}, Supporting Information Figures S5, S6, S7, S8, S10, S11, S12, and S13) follows two effects. First, the condition number of the mixing matrix limits the lower bound of ΔTE: similar TE values produce more linearly dependent column vectors of **A**. And second, the SNR plays a double role, it increases the error regions where **A** is bad‐conditioned (small ΔTE), and limits the maximum ΔTE due to the *T* ~2~ decay of the signals. Thus, when the SNR increases the convergence area grows and the region of minimum SEM, denoting an improvement on the stability of the algorithm. The convergence area also depends on the IE volume fraction. The larger is the contribution of IE, the better is the $T_{2_{\text{IE}}}$ estimate. Adding priors on *S* ~CSF~ improves the $T_{2_{\text{IE}}}$ estimate, even at SNR = 50 (Supporting Information Figure S10). Bounding the solution space into nonoverlapping regions also improves the results of $T_{2_{\text{IE}}}$ (Supporting Information Figure S11), although less than combining it with CSF prior knowledge (Supporting Information Figure S13). The $T_{2_{\text{CSF}}}$ estimate shows a 0.17 p.u. due to the small variation of *S* ~CSF~ along the acquired TEs (4.4%). This is corrected when relaxometry prior is incorporated (Figure [3](#mrm27181-fig-0003){ref-type="fig"} and Supporting Information Figure S12). The comparison between Figures [2](#mrm27181-fig-0002){ref-type="fig"} and [3](#mrm27181-fig-0003){ref-type="fig"}, show the benefit of including prior knowledge into the factorization algorithm, specially at low SNR. Then, the accuracy of the estimates will be influenced by the selection of ΔTE, the *T* ~2~ boundaries, the *S* ~CSF~ prior, and the expected $T_{2_{\text{IE}}}$ and *f* ~IE~ values. We used literature values for $T_{2_{\text{IE}}},\, T_{2_{\text{CSF}}}$ ~,~ [15](#mrm27181-bib-0015){ref-type="ref"} and *S* ~CSF.~ [28](#mrm27181-bib-0028){ref-type="ref"} According to Figure [3](#mrm27181-fig-0003){ref-type="fig"}A,B one needs a minimum ΔTE of 26 ms for an accurate *f* ~IE~ estimate. Interestingly, *f* ~IE~ is a reliable parameter that tell us about the bias of $T_{2_{\text{IE}}}$, the larger *f* ~IE~ is, the more accurate $T_{2_{\text{IE}}}$ becomes (Figure [3](#mrm27181-fig-0003){ref-type="fig"}A,C). For one tissue compartment BSS is able to precisely (SEM \< 0.01) estimate the volume fraction with mean absolute error below 0.1 when ΔTE \> 35 ms (Figure [4](#mrm27181-fig-0004){ref-type="fig"}A,B). When *f* ~IE~ = 1 the area of mean convergence of the $T_{2_{\text{IE}}}$ estimate is almost independent from ΔTE (Figure [4](#mrm27181-fig-0004){ref-type="fig"}C,D). We found an equivalent result for the mean relative error of $T_{2_{\text{CSF}}}$ when *f* ~IE~ = 0 (Figure [4](#mrm27181-fig-0004){ref-type="fig"}E,F), although in this case it comes from the $T_{2_{\text{CSF}}}$ prior. Notice the large error and instability of $T_{2_{\text{IE}}}$ and $T_{2_{\text{CSF}}}$ in the opposite cases, *f* ~IE~ = 0 and *f* ~IE~ = 1, respectively (Figure [4](#mrm27181-fig-0004){ref-type="fig"}C,E). This results when BSS tries to find a component that is not in the tissue and thus, cannot be estimated. For two components with similar *T* ~2~ values and little priors (IC and EC) cALS losses efficiency. The volume fraction estimates are biased (Figure [5](#mrm27181-fig-0005){ref-type="fig"}A), and $T_{2_{IC}}$ shows a narrow convergence region that is almost independent of ΔTE. The lower bound of this region is limited by the proximity of $T_{2_{\text{IC}}}$ and $T_{2_{\text{EC}}}$ that worses the condition of **A**. The upper bound results of the lack of prior on the signal of one of the compartments, in contrast with the *S* ~CSF~ prior used before (compare Figure [2](#mrm27181-fig-0002){ref-type="fig"} and Supporting Information Figure S10) that increased the convergence area toward lower *T* ~2~ values. ### 4.1.2. Three compartments: Searching for myelin {#mrm27181-sec-0017} The convergence area is the one where the errors of *f* ~M~, *f* ~IE~, $T_{2_{M}}$, and $T_{2_{\text{IE}}}$ are lower than 0.1 in absolute value for the volume fractions and per unit for *T* ~2~. Figure [6](#mrm27181-fig-0006){ref-type="fig"}A, C, E, G shows and optimal ΔTE = 36 ms. Notice that when ΔTE increases the error of the myelin parameters grows due to the reduction of the myelin contribution to the second TE, worsening the SNR of that component (Figure [6](#mrm27181-fig-0006){ref-type="fig"}A,E). Since all the volume fractions add up to one, errors on *f* ~M~ increase the error on *f* ~IE~ (Figure [6](#mrm27181-fig-0006){ref-type="fig"}A,C). The estimate of $T_{2_{\text{IE}}}$ is dependent on SNR and its volume fraction, compounding its calculation for SNR \< 50 and *f* ~IE~ \< 0.4 (Supporting Information Figure S9G lower left corner). One should notice that including a third compartment increases the condition number of **A**, rising the instability of the factorization (Figure [6](#mrm27181-fig-0006){ref-type="fig"}F). See the phantom experiments in the Supporting Information. 4.2. In vivo clinical data: Free‐water elimination {#mrm27181-sec-0018} -------------------------------------------------- We observed that the mean relative error for the whole brain ( $\langle\epsilon\rangle$) decreased as ΔTE increased (Figure [7](#mrm27181-fig-0007){ref-type="fig"}A,B,G), in agreement with phantom findings (see supporting information) and the results of the simulations for two compartments. Interestingly, for the maximum ΔTE, we can see that the number of compartments is two in regions next to the ventricles and the cortex, but one inside the ventricles and in some deep WM areas (Figure [7](#mrm27181-fig-0007){ref-type="fig"}K). It is also noteworthy that the pure CSF areas (eg, the ventricles) have been removed from the $T_{2_{\text{IE}}}$ map (Figure [7](#mrm27181-fig-0007){ref-type="fig"}E,J), while the opposite is observed in the CSF volume fraction (Figure [7](#mrm27181-fig-0007){ref-type="fig"}C,H), indicating a successful disentangling effect. We compared the BSS‐estimated $T_{2_{\text{IE}}}$ maps for increasing ΔTE values with the reference map obtained from the FLAIR multi‐echo SE data. We noted how the structural similarity index[50](#mrm27181-bib-0050){ref-type="ref"} increased and the mean relative error decreased as ΔTE grew (Figure [8](#mrm27181-fig-0008){ref-type="fig"}A,B). Additionally, the histograms for both subjects tended toward the reference as the difference between the short and long TEs grew. This reflects an underestimation of $T_{2_{\text{IE}}}$ for small ΔTE values that can be explained by Equation [(3)](#mrm27181-disp-0003){ref-type="disp-formula"} and Supporting Information Figure S1C. Moreover, the FLAIR *T* ~2~ map showed high values in the ventricles, possibly indicating imperfect CSF suppression and, thus, slightly increased reference values (Figure [8](#mrm27181-fig-0008){ref-type="fig"}A,C,D). FA and MD maps and histograms were calculated from the BSS IE and CSF disentangled signals for both subjects (Figures [9](#mrm27181-fig-0009){ref-type="fig"}, [10](#mrm27181-fig-0010){ref-type="fig"}, Supporting Information Figure S15). These maps displayed an overestimation of the CSF volume fraction for low ΔTE values (the low FA peak in Figure [9](#mrm27181-fig-0009){ref-type="fig"}B and Supporting Information Figure S15B was removed). This resulted in a compensation effect for the previously shown underestimation of $T_{2_{\text{IE}}}$. Additionally, the FA histograms (Figure [9](#mrm27181-fig-0009){ref-type="fig"}B and Supporting Information Figure S15B) showed a tendency toward higher FA values and a reduction of the low FA peak associated with free‐water. At long ΔTE values, FA seems to tend toward a stable distribution. We also observed an enlargement of the corpus callosum and a general recovery of peripheral WM tracts and the fornix in the colored FA maps (Figure [9](#mrm27181-fig-0009){ref-type="fig"}A and Supporting Information Figure S15A). Additionally, on the MD histograms for IE water (Figure [9](#mrm27181-fig-0009){ref-type="fig"}D and Supporting Information Figure S15D) we found a reduced number of voxels with diffusivities greater than $1 \times 10^{- 3}$ mm^2^/s. In contrast, the main peak at 0.7 $\times 10^{- 3}$ mm^2^/s, associated with the parenchyma, remained in its original position, indicating that IE water represents a nonCSF tissue. This MD reduction was also visible in the maps (Figure [9](#mrm27181-fig-0009){ref-type="fig"}C and Supporting Information Figure S15C). Finally, the MD histograms for CSF water (Figure [10](#mrm27181-fig-0010){ref-type="fig"}) showed a tendency toward $3 \times 10^{- 3}$ mm^2^/s as ΔTE increased, in agreement with the literature.[28](#mrm27181-bib-0028){ref-type="ref"} All these findings agreed with a disentangling of IE and CSF signals and thus, a correction of the free‐water partial volume effect in the diffusion signal. 5. DISCUSSION {#mrm27181-sec-0019} ============= 5.1. Stability {#mrm27181-sec-0020} -------------- Four main approaches exist for the BSS problem (independent component analysis, principal component analysis, NMF, and sparse component analysis). Choosing the appropriate method depends on the prior knowledge of the signal sources. In our experiments, we relied on NMF, using a constrained version of the ALS algorithm (cALS). Others explored these algorithms before. Pauca et al.[51](#mrm27181-bib-0051){ref-type="ref"} used low‐rank and sparsity constraints to distinguish semantic features in text mining, and later[52](#mrm27181-bib-0052){ref-type="ref"} smoothness regularization to identify space objects from spectral data. Gao and Church[53](#mrm27181-bib-0053){ref-type="ref"} also employed sparseness for cancer class discovery through gene clustering, which was later extended by Kim and Park[54](#mrm27181-bib-0054){ref-type="ref"} improving the balance between accuracy and sparseness through regularization. They also introduced a variation based on the active set method[55](#mrm27181-bib-0055){ref-type="ref"} and low‐rank approximation.[56](#mrm27181-bib-0056){ref-type="ref"} Liu et al.[57](#mrm27181-bib-0057){ref-type="ref"} incorporated label information to create a semi‐supervised matrix decomposition method. Sun and Févotte[58](#mrm27181-bib-0058){ref-type="ref"} introduced a version based on the alternating direction method of multipliers[59](#mrm27181-bib-0059){ref-type="ref"} (ADMM), that was further stabilized by Zhang et al.[60](#mrm27181-bib-0060){ref-type="ref"} Supported by previous work, we presented a biophysical inspired solution to constrain the diffusion‐relaxometry NMF compartmental problem. Essentially, our cALS algorithm imposes two constraints: (1) the rows of **A** must follow exponential relationships (relaxometry); and (2) when the analytical expression of one component is known (ie, CSF) the corresponding row in **S** is fixed (diffusion). The stability of cALS is linked to the condition of **A** and SNR; an ill‐conditioned mixing matrix will lead to error propagation due to numerical instability. We optimized the experimental TEs to reduce the condition number of **A** for literature values of *T* ~2~. However, further research based on ADMM might yield better results. We ran extensive simulations for two compartments at clinical TE values with different priors, and three compartments at lower TEs. These simulations highlighted the importance of choosing literature supported priors to improve the convergence, especially at low SNR. Constrained ALS converges when the number of compartments in tissue is equal or lower than the expected, but it looses performance for species with similar *T* ~2~. Phantom experiments (see supporting information) agreed with simulation results, validating that BSS was able to accurately estimate *T* ~2~ for one compartment and separate diffusion signal sources and estimate *T* ~2~ and *f* for two compartments. However, they also showed that scaling the cALS algorithm to three compartments, including fast *T* ~2~ decaying species, is unstable in the range of the clinically available TE values. Finally, repeatability and reproducibility analyses (see supporting informtaion) show that cALS yield consistent results across repetitions and subjects, highlighting its stability. 5.2. Relaxation time and volume fraction estimates {#mrm27181-sec-0021} -------------------------------------------------- BSS provides the means to estimate *T* ~2~ relaxation values and volume fractions. Interestingly, only a number of TE repetitions equal to the number of compartments that are assumed to be in the tissue is necessary. This results of the substitution of the ILTs by BSS, in comparison to other techniques.[15](#mrm27181-bib-0015){ref-type="ref"}, [17](#mrm27181-bib-0017){ref-type="ref"}, [21](#mrm27181-bib-0021){ref-type="ref"}, [24](#mrm27181-bib-0024){ref-type="ref"} We found a good agreement between the $T_{2_{\text{IE}}}$ estimates of the FLAIR multi‐echo SE for 17 TEs and those of BSS for 2 TEs. In this sense, all the measurements along the diffusion space are considered for both TEs, incorporating redundancy and reinforcing the estimation of *T* ~2~. The SNR for the in vivo data were 147 and 104 for subjects one and two. According to the simulations at ΔTE = 60 ms, the expected absolute error for the volume fraction estimate is below 0.03, meaning that $T_{2_{\text{IE}}}$ is highly reliable in WM areas, and lesser in the CSF borders. 5.3. Myelin detection {#mrm27181-sec-0022} --------------------- Simulations proved that our method has the potential to disentangle three compartments by reducing the minimum TE in diffusion experiments. As a result, myelin water could be incorporated into the model (Figure [6](#mrm27181-fig-0006){ref-type="fig"}). However, we are prevented from conducting such experiments by gradient performance on clinical scanners. 5.4. Disentangling the diffusion sources and free water elimination {#mrm27181-sec-0023} ------------------------------------------------------------------- Unlike other multicompartment diffusion models[2](#mrm27181-bib-0002){ref-type="ref"}, [7](#mrm27181-bib-0007){ref-type="ref"}, [8](#mrm27181-bib-0008){ref-type="ref"}, [11](#mrm27181-bib-0011){ref-type="ref"} or more recent contributions,[27](#mrm27181-bib-0027){ref-type="ref"}, [35](#mrm27181-bib-0035){ref-type="ref"} our approach does not model compartmental diffusion. Our framework instead relies on three assumptions: (1) microstructural water compartments have distinct *T* ~2~ relaxation times;[14](#mrm27181-bib-0014){ref-type="ref"}, [15](#mrm27181-bib-0015){ref-type="ref"} (2) each have different diffusion characteristics;[19](#mrm27181-bib-0019){ref-type="ref"}, [20](#mrm27181-bib-0020){ref-type="ref"} and (3) the effects of the water exchange are negligible on the timescale of our experiments.[9](#mrm27181-bib-0009){ref-type="ref"}, [61](#mrm27181-bib-0061){ref-type="ref"} Furthermore, our solution is diffusion protocol‐agnostic (only two TEs and one nondiffusion weighted volume are necessary), allowing for flexibility in the design of the acquisition protocol, which might include any number of diffusion directions and *b*‐values. This gives it an advantage over diffusion--relaxation correlation techniques based on regularized ILTs.[21](#mrm27181-bib-0021){ref-type="ref"}, [24](#mrm27181-bib-0024){ref-type="ref"} A promising application of the protocol‐agnostics nature of our framework is correcting for free water contamination. Recently Collier et al.[35](#mrm27181-bib-0035){ref-type="ref"} included TE dependence in their bi‐exponential diffusion tensor model to regularize the fitting problem. However, they fitted the bi‐exponential DTI model directly. Contrary, our solution does not assume any particular diffusion model, we instead separated the signal from each compartment, allowing more flexible and independent study. In this regard, analysis of the signal associated with the CSF compartment can be seen as a disentanglement quality assurance metric (Figures [9](#mrm27181-fig-0009){ref-type="fig"}, [10](#mrm27181-fig-0010){ref-type="fig"}, Supporting Information Figure S15), or in brain tissue applications, a general indicator of the goodness‐of‐fit for IE and CSF. We fitted our data to Collier\'s model[35](#mrm27181-bib-0035){ref-type="ref"} without reaching convergence, which resulted due to our single‐shelled dataset. Comparison of BSS with Pasternak\'s free‐water elimination method[31](#mrm27181-bib-0031){ref-type="ref"} is show in Figure [9](#mrm27181-fig-0009){ref-type="fig"} and Supporting Information Figure S15. We observed a good agreement between BSS for ΔTE = 60 ms and Pasternak\'s free‐water elimination for FAs between 0‐0.2 and 0.8‐1. In the middle FA range both methods disagree, BSS shows an homogeneous correction, while Pasternak\'s results follow the standard DTI fit from 0.2 to 0.4 and shows a correcting effect from 0.4 to 1 (Figure [9](#mrm27181-fig-0009){ref-type="fig"}A,B, Supporting Information Figures S15A and S15B). It is impossible to determine which method is better (no ground‐truth). However, there are two indicators that BSS might be performing better: (1) the BSS FA curve runs in parallel to the standard DTI fit from 0.2 to 0.8, denoting an stable correction without favoring any FA range; and (2) Pasternak\'s MD is spatially over‐regularized (Figure [9](#mrm27181-fig-0009){ref-type="fig"}C,D, Supporting Information Figures S15C and S15D), while BSS\'s MD keeps its maximum at 0.7 mm^2^/s, the reference for parenchyma.[28](#mrm27181-bib-0028){ref-type="ref"} Long ΔTE values benefit our framework, which is not surprising and agrees with the findings of Collier et al.[35](#mrm27181-bib-0035){ref-type="ref"} This is not only due to the relationship between **A** and *T* ~2~ (Equation [(3)](#mrm27181-disp-0003){ref-type="disp-formula"} and Supporting Information Figure S1C) but also because longer differences between TEs produce more distinct levels of mixing and thus better codification of the information from each source. That is to say, the short TE contains more information about the fast‐relaxing species, while the long TE is dominated by CSF. 6. CONCLUSIONS {#mrm27181-sec-0024} ============== We have introduced for the first time a BSS framework for expressing the relationships between diffusion signals acquired at different TEs. This new approach does not rely on diffusion modeling or the ILT. Our results show that, with the current hardware, blind source separation allows for disentangling the diffusion signal sources generated by each sub‐voxel compartment up to two compartments, making it a suitable tool for free‐water elimination. Moreover, it simultaneously estimates proton density, volume fractions, relaxation times and the number of compartments in the underlying microstructure, paving the way for tissue microstructure characterization when the hardware constraints are relieved. CONFLICT OF INTEREST {#mrm27181-sec-0026} ==================== Miguel Molina Romero and Pedro A. Gómez receive research support by GE Global Research. Dr. Jonathan I. Sperl was GE Global Research employee during the process of this work and currently is Siemens Healthcare employee. Dr. Marion I. Menzel is GE Healthcare employee. Supporting information ====================== Additional Supporting Information may be found online in the supporting information tab for this article. ###### **FIGURE S1** Evolution of the relative error in the *T* ~2~ estimate with ΔTE for one compartment. The mean relative error of *T* ~2~ estimated using BSS is shown in (a) for NNLS and in (b) for EASI‐SM references. ΔTE goes from 5 ms (darker colors) to 50 ms (lighter colors). The dependence of *T* ~2~ on the direction (slope) of the columns of **A** (Equation 3) is shown in (c), where it can be seen how increasing ΔTE improves the dynamic range of the slope of **A**, resulting in a better estimate for *T* ~2~. Except for ROI~1~ and ROI~11~, the remaining ones reduce the *T* ~2~ mean relative error as ΔTE increases (a and b, lighter colors are closer to zero), in agreement with plot c. **FIGURE S2** Separation of two compartments and parameter estimation for the phantom data. The signal sources of the *simulated* dataset are plotted in (a), and the *measured* data generated from the sources in (b). The resulting mixtures for both datasets are shown in (c). We use the subscripts *M* and *S* to refer to estimates for the *measured* and *simulated* datasets, respectively. Measurement errors are highlighted by the differences between the *measured* and *simulated* signals, shown in (c). BSS disentangled the original sources for both datasets, as shown in (d). We chose a ΔTE of 50 ms to minimize the condition of **A** (shown in (e)) and increase the numerical stability of the framework. Finally, the relative errors in the estimated parameters, ${\hat{T}}_{2_{ROI_{6}}}$ and ${\hat{f}}_{ROI_{6}}$, are plotted in (f) for all possible values of ΔTE. We observed good agreement between the reference signals and those disentangled with BSS. **FIGURE S3** Separation of three compartments and parameter estimation for the phantom data. The *simulated* dataset was generated from the signal sources in (a). The *measured* datasets were calculated from the measured signals for ROI~5~ (b), ROI~6~ (c), and ROI~11~ (d). The mixed signals for both datasets (shown in (e)) show a mismatch due to measurement errors. They were disentangled with BSS, as shown in (f). We fixed TE~1~ = 77.5 ms and TE~3~ = 127.5 ms, and varied TE~2~ to minimize the condition number of **A** (shown in (g)). The relative errors of the estimated parameters are plotted for different values of the TE~2~ in (h). **FIGURE S4** Simulated diffusion signals for IE and CSF. Synthetically generated diffusion signals for 30 directions (*b* = 1000 s/mm^2^) and one non‐diffusion weighted measurement. We modeled diffusion as a Gaussian process with MD of IE and CSF equal to $0.7 \times 10^{- 3}$ and $3 \times 10^{- 3}$ mm^2^/s respectively,[^28^](#mrm27181-bib-0028){ref-type="ref"} and standard deviations of $0.3 \times 10^{- 3}$ and $0.1 \times 10^{- 3}$ mm^2^/s respectively to distinguish between hindered anisotropic (IE) and free isotropic (CSF) diffusivity. **FIGURE S5** Convergence for two compartments (IE and CSF) with overlapping *T* ~2~ constraints and no *S~CSF~* prior. This figure extends the analysis of Figure 2 for SNR = 100 and 150. The stability for *f~IE~* increases with SNR (a and b) and with *f~IE~* for $T_{2_{IE}}$ (c and d). **FIGURE S6** Convergence for two compartments (IE and CSF) with non‐overlapping *T* ~2~ constraints and *S~CSF~* prior. This figure extends the analysis of Figure 3 for SNR = 100 and 150. The size and stability of the convergence area for *f~IE~* and $T_{2_{IE}}$ increase with SNR. **FIGURE S7** Convergence for two compartments (IE and CSF) with non‐overlapping *T* ~2~ constraints and *S~CSF~* prior when only one is actually present in the tissue. This figure extends the analysis of Figure 4 for SNR = 100 and 150. The SNR does not play an important role in the definition of the convergence area. **FIGURE S8** Convergence for two compartments (IC and EC) with overlapping *T* ~2~ constraints and no other priors. This figure extends the analysis of Figure 5 for SNR = 100 and 150. The influence of SNR on *f* and $T_{2_{IC}}$ is small. **FIGURE S9** Convergence for three compartments (myelin, IE, and CSF) with non‐overlapping *T* ~2~ constraints and *S~CSF~* prior. This Figure extends the analysis of Figure 6 for SNR = 100 and 150. **FIGURE S10** Convergence for two compartments (IE and CSF) with overlapping *T* ~2~ constraints and *S~CSF~* prior. The mean and the standard error of *f~IE~* absolute error (a and b), and the mean and the standard error of $T_{2_{IE}}$ (c and d), and $T_{2_{CSF}}$ (e and f) relative error per unit (p.u.). Red and white lines mark the 0.2 and 0.1 contour respectively. One thousand simulations were run for each combination of SNR, *f~IE~*, $T_{2_{IE}}$, and ΔTE. $T_{2_{IE}}$ and $T_{2_{CSF}}$ were bound between 0--1000 ms and 0--3000 ms respectively. *S~CSF~* was set to have isotropic diffusivity with value $3 \times 10^{- 3}$ mm^2^/s. We defined the convergence area as the one with error lower than 0.1 for *f~IE~* and $T_{2_{IE}}$. Notice the growth of the converge area compared to the lack of priors (Figures 2 and S5). **FIGURE S11** Convergence for two compartments (IE and CSF) with non‐overlapping *T* ~2~ constrained and no *S~CSF~* prior. The mean and the standard error of *f~IE~* absolute error (a and b), and the mean and the standard error of $T_{2_{IE}}$ (c and d), and $T_{2_{CSF}}$ (e and f) relative error per unit (p.u.). Red and white lines mark the 0.2 and 0.1 contour respectively. One thousand simulations were run for each combination of SNR, *f~IE~*, $T_{2_{IE}}$, and ΔTE. $T_{2_{IE}}$ and $T_{2_{CSF}}$ were bound between 0--300 ms and 300--3000 ms respectively. No prior was imposed on *S~CSF~*. We defined the convergence area as the one with error lower than 0.1 for *f~IE~* and $T_{2_{IE}}$. Non‐overlapping *T* ~2~ bounds stabilize the factorization, compared to Figures 2 and S5, although not as much as using priors on the signal sources (Figure S10). **FIGURE S12** Convergence for two compartments (IE and CSF) with fixed $T_{2_{CSF}}$ and no *S~CSF~* prior. The mean and the standard error of *f~IE~* absolute error (a and b), and the mean and the standard error of $T_{2_{IE}}$ (c and d), and $T_{2_{CSF}}$ (e and f) relative error per unit (p.u.). Red and white lines mark the 0.2 and 0.1 contour respectively. One thousand simulations were run for each combination of SNR, *f~IE~*, $T_{2_{IE}}$, and ΔTE. $T_{2_{IE}}$ was bound between 0--300 and $T_{2_{CSF}}$ fixed to 2000 ms. No prior was imposed on *S~CSF~*. We defined the convergence area as the one with error lower than 0.1 for *f~IE~* and $T_{2_{IE}}$. Fixing the value of $T_{2_{CSF}}$ does not have any effect on the size of the convergence area, while bounding $T_{2_{IE}}$ does it (see Figure S11). **FIGURE S13** Convergence for two compartments (IE and CSF) with non‐overlapping *T* ~2~ constraints and *S~CSF~* prior. The mean and standard error of *f~IE~* absolute error (a and b), and mean and standard error of $T_{2_{IE}}$ (c and d), and $T_{2_{CSF}}$ (e and f) relative error per unit (p.u.). Red and white lines mark the 0.2 and 0.1 contour respectively. One thousand simulations were run for each combination of SNR, *f~IE~*, $T_{2_{IE}}$, and ΔTE. $T_{2_{IE}}$ and $T_{2_{CSF}}$ were bound between 0--300 ms and 300--3000 ms respectively. *S~CSF~* was set to have isotropic diffusivity with value $3 \times 10^{- 3}$ mm^2^/s. We defined the convergence area as the one with error lower than 0.1 for *f~IE~* and $T_{2_{IE}}$. Incorporating prior knowledge on the behavior of the signal sources (as CSF) improves convergence and stability more than bounding *T* ~2~ (Compare with Figures S10 and S11) **FIGURE S14** Simulated diffusion signals for intra and extra‐cellular water compartments. Synthetically generated diffusion signals for 30 directions (b = 1000 s/mm^2^) and one non‐diffusion weighted measurement. We modeled diffusion as a Gaussian process with MD of intra‐cellular (IC) and extra‐cellular (EC) equal to $0.6 \times 10^{- 3}$ and $0.8 \times 10^{- 3}$ mm^2^/s respectively (to keep the MD of parenchyma equals to $0.7 \times 10^{- 3}$ mm^2^/s)[^28^](#mrm27181-bib-0028){ref-type="ref"} and standard deviations of $0.3 \times 10^{- 3}$ and $0.1 \times 10^{- 3}$ mm^2^/s respectively to distinguish between a more (IC) and less (EC) hindered anisotropic diffusivity. **FIGURE S15** FA and MD of the BSS‐disentangled IE signal against the standard DTI and Pasternak\'s free‐water elimination (FWE) for subject one. Comparisons of the FA (b) and MD (d) histograms calculated from the separated IE signals are plotted against the standard DTI fit and Pasternak\'s method for the short TE measured data. MD (c) and colored FA (a) maps are also included for comparison. We observed a CSF correction effect in the long ΔTE BSS for FA in agreement with Pasternak\'s FWE. However, both method disagree for MD, where Pasternak\'s introduces spatial over‐regularization. See Figure 9 for subject two. **FIGURE S16** Repeatability analysis showing intra‐subject variability. A healthy volunteer was scanned six times. The FA (a) and MD (b) histograms for standard DTI, BSS and Pasternak\'s method are shown. These histograms were fragmented in sectors and the relative changes in number of voxels per sector and repetition for BSS and Pasternak\'s methods were computed. Statistical t‐tests were run per sector to determine the level of significance of the differences between BSS and Pasternak\'s results (d and e). BSS and FLAIR $T_{2_{IE}}$ histograms (c) showed good agreement. Their peak and the full width half maximum (FWHM) were used for t‐test comparison between BSS and FLAIR (f) highlighting the concordance. **FIGURE S17** Reproducibility analysis showing inter‐subject variability. Twenty healthy volunteers were scanned. The FA (a) and MD (b) histograms for standard DTI, BSS and Pasternak\'s method are shown. These histograms were fragmented in sectors and the relative changes in number of voxels per sector and repetition for BSS and Pasternak\'s methods were computed. Statistical t‐tests were run per sector to determine the level of significance of the differences between BSS and Pasternak\'s results (d and e). Notice that the inter‐subject variability is larger than intra‐subject (Figure S16). BSS and FLAIR $T_{2_{IE}}$ histograms (c) were depicted. Their peak and the full width half maximum (FWHM) were used for t‐test comparison between BSS and FLAIR (f). **Table S1** Phantom reference values and BSS estimates. The ROIs in the phantom experiment was built using the concentrations of agar and sucrose shown here. Signal decays along the diffusion dimension were compared to each other to ensure that they were all different, as required by BSS (see supplementary Figure S18). For reference, the *T* ~2~ values were characterized using an NNLS fit. Confidence intervals were taken at the half maxima of the NNLS spectral peaks. In addition, a second method, EASI‐SM,[^17^](#mrm27181-bib-0017){ref-type="ref"} was used to confirm the validity of the fits. Finally, the $T_{2_{BSS}}$ values were estimated for ΔTE = 50 ms and compared with the NNLS and EASI‐SM references (where *ϵ* refers to the relative error). ###### Click here for additional data file. The authors want to thank Dr. Ofer Pasternak for his support in the comparison of the methods. This work was supported by the TUM Institute of Advanced Study, funded by the German Excellence Initiative, and the European Commission (Grant Agreement Number 605162). DKJ was supported by a Wellcome Trust Investigator Award (096646/Z/11/Z) and a Wellcome Trust Strategic Award (104943/Z/14/Z).
{ "pile_set_name": "PubMed Central" }
Q: Storekit: How to check if the product is purchased or not? I think everyone knows that Apple In-App Purchases are a little bit difficult thing to implement. (Especially for Swift newbies). Anyway, I tried to learn working with it. Maybe it's better to say that I followed the tutorial Kilo Loco made on YouTube. Here I did everything what he did and it's working but it's obvious that I don't understand everything yet. My question is.. how to check if the customer already purchased it or not? Maybe there's some kind of status? Then I would just write something like that: if(status=="purchased") { // I would do something what premium user can do. } I know it's not really clear but I guess who have more experience in it can help me to understand more. (or maybe I should go watch tutorial once again and once again) THANK YOUU! A: You can check this tutorial, the section about Purchased Items. In short, you should save locally if the Item has been already purchased, maybe in UserDefaults A more secure alternative is to validate the receipt of the purchase, as shown in the Apple Documentation.
{ "pile_set_name": "StackExchange" }
AN ACT relating to surface mining. Amend KRS 350.450 to require when conducting mountain top removal or approximate original contour mining that overburden be returned to mined areas to the extent possible; require remaining overburden to be disposed of in permitted area or in an area under the abandoned mine land program if approved as a disposal site, or transported and placed in specially constructed lifts; prohibit overburden from being placed in intermittent, perennial, or ephemeral streams or other water of the Commonwealth; make requirements on overburden placement mandatory for permits that specify a post-mine land use; amend KRS 350.440 to require any spoil material not be disposed of in intermittent, perennial, or ephemeral streams and that spoil not returned to the mine area be disposed of by placing in a site eligible under the abandoned mine land program or in specially constructed lifts; amend KRS 350.410 to prescribe that restoration to approximate original contour include both the configuration of the site and the elevation of the site prior to the coal removal and to prohibit spoil from being placed in streams and require placement in either a disposal site on lands under the abandoned mine land program or in specially constructed fills.
{ "pile_set_name": "Pile-CC" }
942 F.2d 1473 ESTATE OF William F. McALLISTER, Deceased; SharonMcAllister; Sean McAllister; and LoriMcAllister, individually, Plaintiffs-Appellants,v.UNITED STATES of America, Defendant-Appellee. No. 90-35184. United States Court of Appeals,Ninth Circuit. Argued and Submitted March 12, 1991.Decided Aug. 28, 1991. L.E. Ashcroft, Rhoten, Speerstra, Rinehart & Ashcroft, Salem, Or., for plaintiffs-appellants. Steven Bransdorfer, U.S. Dept. of Justice, Washington, D.C., for defendant-appellee. Appeal from the United States District Court for the District of Oregon. Before GOODWIN, THOMPSON and O'SCANNLAIN, Circuit Judges. O'SCANNLAIN, Circuit Judge: 1 The estate and heirs of William McAllister appeal from the district court's dismissal of their wrongful-death action under the Feres doctrine. See Feres v. United States, 340 U.S. 135, 71 S.Ct. 153, 95 L.Ed. 152 (1950). We must affirm. 2 * On New Year's Eve five years ago, Private Leon Tarver attacked, stabbed, and killed Lieutenant Colonel William McAllister near the Post Exchange ("PX") on the premises of the Presidio in San Francisco, California.1 "It is undisputed that [Lieutenant Colonel] McAllister was off duty and not under [the] compulsion of [military] orders at the time of his death. He was not performing any military duties, was on personal business, and [was] in the process of leaving the base." Estate of McAllister v. United States, No. 89-6150 at 3 (D.Or. Dec. 6, 1989) (magistrate's findings and recommendation), adopted by No. 89-6150 (D.Or. Dec. 28, 1989) (order of dismissal). 3 At the time of the killing, Private Tarver, on the other hand, was under the government's care and supervision as a patient of the Letterman Army Hospital on the Presidio grounds. Tarver, who had been diagnosed while serving in Germany as a paranoid schizophrenic with potentially dangerous tendencies, had been assigned to the Letterman Hospital for treatment and evaluation in March 1986. Three months later, the Army reassigned Tarver to active duty in South Korea, but he was again diagnosed as schizophrenic and potentially dangerous and was transferred back to the Letterman Hospital in October 1986, where he remained through the date of the murder. 4 Charging the Army with medical malpractice in its supervision of Private Tarver, the estate and heirs of Lt. Col. McAllister filed suit under the Federal Tort Claims Act ("FTCA") on April 25, 1989. The government subsequently filed a motion to dismiss for lack of subject matter jurisdiction pursuant to the Feres doctrine, and the district court granted that motion upon the recommendation of a federal magistrate on December 28, 1989. The estate and heirs then filed this timely appeal. II 5 The presence or absence of subject matter jurisdiction under the FTCA, 28 U.S.C. §§ 1346(b), 2671-80, is a question of law reviewable de novo. See Atkinson v. United States, 825 F.2d 202, 204 (9th Cir.1987), cert. denied, 485 U.S. 987, 108 S.Ct. 1288, 99 L.Ed.2d 499 (1988). In the process of reviewing that question, the court must "review independently the question whether the Feres doctrine is applicable to the facts reflected in the record." McGowan v. Scoggins, 890 F.2d 128, 129 (9th Cir.1989); see also Persons v. United States, 925 F.2d 292, 294 (9th Cir.1991) (quoting same). III 6 * The FTCA provides in relevant part that: 7 The United States shall be liable, respecting the provisions of this title relating to tort claims, in the same manner and to the same extent as a private individual under like circumstances.... 8 28 U.S.C. § 2674 (1988). As a specific exception to this general waiver of sovereign immunity, the Act provides that the government shall not be liable for "[a]ny claim arising out of the combatant activities of the military or naval forces, or the Coast Guard, during time of war." Id. § 2680(j) (emphasis added). Notwithstanding the explicit terms of this latter provision, the Supreme Court has determined that the military exception to the Act's waiver of immunity is considerably broader than this provision suggests. Upholding decisions to dismiss an action by the heirs of a soldier who had perished by fire in the barracks of an Army camp "while on active duty in service of the United States," the Court unanimously held in 1950 that "the Government is not liable under the Federal Tort Claims Act for injuries to servicemen where the injuries arise out of or are in the course of activity incident to service." Feres, 340 U.S. at 137, 146, 71 S.Ct. at 155, 159 (emphasis added). 9 The Court reached the same conclusion in two other cases that were consolidated and decided along with Feres: Jefferson v. United States and United States v. Griggs. Like the present case, both of these cases involved allegations of medical malpractice by Army doctors. In Jefferson, a soldier who had received an abdominal operation in an Army hospital brought suit on his own behalf when, "eight months later, in the course of another operation after [he had been] discharged, a towel 30 inches long by 18 inches wide, marked 'Medical Department U.S. Army' was discovered and removed from his stomach." Id. at 137, 71 S.Ct. at 155. In Griggs, the executrix of a soldier's estate alleged that "while on active duty [the soldier had] met death because of negligent and unskillful medical treatment by army surgeons." Id. In the Court's view, "[t]he common fact underlying the three cases [was] that each claimant, while on active duty and not on furlough, [had] sustained injury due to negligence of others in the armed forces." Id. at 138, 71 S.Ct. at 156. Under such circumstances and in light of the fact that Congress created separate statutory schemes to compensate for the deaths and injuries of armed services personnel, the Court concluded that there could be no government liability under the FTCA. See id. at 144, 71 S.Ct. at 158. 10 The Feres doctrine, as the rule of these three cases has come to be known, is highly controversial. It has been criticized "by countless courts and commentators," including this court. Persons, 925 F.2d at 295. Some have found fault with the Court's creation of a judicial exception to a clear statutory pronouncement and the unfairness that the rule has often produced. See, e.g., United States v. Johnson, 481 U.S. 681, 700, 107 S.Ct. 2063, 2074, 95 L.Ed.2d 648 (1987) (Scalia, J., dissenting and joined by Brennan, Marshall, and Stevens, JJ.) ("Feres was wrongly decided and heartily deserves the 'widespread, almost universal criticism' it has received.") (citation omitted); id. at 703, 107 S.Ct. at 2075 (urging Court to "limit our clearly wrong decision in Feres and confine the unfairness and irrationality that decision has bred"); Atkinson, 825 F.2d at 206; id. at 206-07 (Noonan, J., concurring); Atkinson, 804 F.2d 561 (9th Cir.1986), withdrawn by, 825 F.2d 202. Others have found fault with the essential vagueness and ambiguity of the doctrine itself. See, e.g., Millang v. United States, 817 F.2d 533, 535 (9th Cir.1987) (per curiam) (noting the "somewhat elusive 'incident to service' standard"), cert. denied, 485 U.S. 987, 108 S.Ct. 1290, 99 L.Ed.2d 500 (1988); Monaco v. United States, 661 F.2d 129, 132 (9th Cir.1981) (noting that "the basis for the exception has recently become the subject of some confusion"), cert. denied, 456 U.S. 989, 102 S.Ct. 2269, 73 L.Ed.2d 1284 (1982); Persons, 925 F.2d at 295 (citing Millang and Monaco and noting that "it is entirely unclear which of the doctrine's original justifications survive"). A comparison of reasoning with outcomes in cases that have applied the doctrine validates these concerns: the results have not flowed easily from the doctrine's purported rationales. 11 Nonetheless, the Feres doctrine remains the law of the land, and we must undertake to apply it. B 12 In the Feres case itself, the Supreme Court enunciated two rationales for the "intramilitary immunity" exception to the FTCA's waiver. Twenty-seven years later, the Court enunciated a third. See Stencel Aero Eng'g Corp. v. United States, 431 U.S. 666, 671-72, 97 S.Ct. 2054, 2057-58, 52 L.Ed.2d 665 (1977). As we recently explained in Persons, these three rationales are: 13 "(1) the distinctively federal nature of the relationship between the government and members of its armed forces, which argues against subjecting the government to liability based on the fortuity of the situs of the injury; (2) the availability of alternative compensation systems [for military personnel and their families]; and (3) the fear of damaging the military disciplinary structure." 14 925 F.2d at 294-95 (quoting Atkinson, 825 F.2d at 204). 15 In United States v. Shearer, 473 U.S. 52, 105 S.Ct. 3039, 87 L.Ed.2d 38 (1985), however, the Supreme Court stated that "[t]he Feres doctrine cannot be reduced to a few bright-line rules," thereby eviscerating any hope that a simple application of these three rationales to the facts at hand might produce the proper result. Id. 473 U.S. at 57, 105 S.Ct. at 3042. The Shearer Court explained that: 16 Although the Court in Feres based its decision on several grounds, "[i]n the last analysis, Feres seems best explained by the 'peculiar and special relationship of the soldier to his superiors, the effects of the maintenance of such suits on discipline, and the extreme results that might obtain if suits under the Tort Claims Act were allowed for negligent orders given or negligent acts committed in the course of military duty.' " 17 Id. (quoting United States v. Muniz, 374 U.S. 150, 162, 83 S.Ct. 1850, 1857, 10 L.Ed.2d 805 (1963) (quoting United States v. Brown, 348 U.S. 110, 112, 75 S.Ct. 141, 143, 99 L.Ed. 139 (1954))). The Shearer Court went on to explain that the first two rationales--the only two mentioned in the Feres opinion itself--were "no longer controlling," leaving only the military-discipline rationale as a reason for invoking the Feres bar. Id. 473 U.S. at 58 n. 4, 105 S.Ct. at 3043 n. 4; see also Persons, 925 F.2d at 295 (citing Shearer and noting same). 18 Only two years later, however, the Supreme Court appeared to reverse course in United States v. Johnson, 481 U.S. 681, 107 S.Ct. 2063, 95 L.Ed.2d 648 (1987), reasserting the relevance and validity of all three purported rationales over the vociferous dissent of four Justices who were inclined to abandon the doctrine altogether. See id. at 684 n. 2, 688-691, 107 S.Ct. at 2065 n. 2, 2067-69. Precisely how a court should apply the Feres doctrine to the facts of a given case, therefore, remains unclear. A reconciliation of prior pronouncements on the subject is not possible.2 IV 19 When presented with conflicting messages from the Supreme Court, lower courts have typically resorted to comparing fact patterns in previous cases with that in the case before them in an effort to produce the most appropriate outcome. Although intellectually unsatisfying, a comparison of fact patterns to outcomes in cases that have applied the Feres doctrine compels the conclusion that the rule bars the appellants' action here. 20 * As an initial matter, we must consider the decisions in Jefferson and Griggs, the two companion cases that accompanied Feres. There, the Supreme Court held that the Feres rationales barred claims of medical malpractice when the treatment complained of was provided by military surgeons. Feres, 340 U.S. at 137, 146, 71 S.Ct. at 155, 159. Because appellants seek to escape operation of the Feres doctrine by characterizing their claim as a medical malpractice claim, reference to Jefferson and Griggs alone suffices to repudiate that distinction. 21 Appellants purport to differentiate Jefferson, Griggs, and Feres by relying upon Brooks v. United States, 337 U.S. 49, 69 S.Ct. 918, 93 L.Ed. 1200 (1949), which the Supreme Court decided one year earlier. There, the Court held that "members of the United States armed forces can recover under th[e Federal Tort Claims] Act for injuries not incident to their service." Id. at 50, 69 S.Ct. at 919 (emphasis added). In Brooks, two brothers who were members of the armed services were struck by a military-owned vehicle driven by a civilian employee of the Army while they were out on furlough and driving along a public highway. The Court held that the subsequent tort suit could proceed. When the Court decided Jefferson, Griggs, and Feres one year later, it did not overrule Brooks; rather, as appellants point out, the Court distinguished the earlier case: 22 The injury to Brooks did not arise out of or in the course of military duty. Brooks was on furlough, driving along the highway, under compulsion of no orders or duty and on no military mission. A government owned and operated vehicle collided with him. Brooks' father, riding in the same car, recovered for his injuries and the Government did not further contest the judgment but contended that there could be no liability to the sons, solely because they were in the Army. This Court rejected the contention, primarily because Brooks' relationship while on leave was not analogous to that of a soldier injured while performing his duties under orders. 23 Feres, 340 U.S. at 146, 71 S.Ct. at 159. Arguing that McAllister was similarly off duty and under the compulsion of no military orders at the time of his death, appellants contend that their case is more like Brooks than it is like Jefferson or Griggs. 24 If the evolution of the Feres doctrine had stopped in 1950, appellants would have the better argument. Subsequent cases, however, have expanded greatly the factual circumstances under which the conduct of military personnel will be deemed "incident to service." As the government correctly points out, the facts in this case are strikingly analogous to the facts in Shearer, where the Supreme Court also found a Feres-based bar to suit. When he was off duty and away from his base, United States Army Private Vernon Shearer was kidnapped and murdered by another serviceman, Private Andrew Heard. Shearer's mother, as administratrix of his estate, brought suit against the United States under the FTCA. She alleged that the Army's negligence had caused her son's death. Prior to the murder, Heard had served in Germany, where he had been convicted of manslaughter by a German court and sentenced to a four-year prison term. After Heard served his term, the Army transferred him to Fort Bliss, where he eventually killed Private Shearer. In her suit, Mrs. Shearer alleged that the Army had been fully aware of Heard's dangerous nature and had been negligent in failing to control him and in failing to warn others about him. Shearer, 473 U.S. at 53-54, 105 S.Ct. at 3040-41. The Supreme Court, however, ordered dismissal of the suit, holding that allowing the action to proceed would infringe impermissibly upon the military's command and disciplinary decisions with respect to its personnel. Id. at 58-59, 105 S.Ct. at 3043-44.3 25 The present facts are also substantially similar to the facts in Persons, where this court very recently found a Feres-based bar to suit. In Persons, the estate and heirs of a naval officer brought suit against the government alleging medical malpractice on the part of the physicians and staff of a military hospital. The decedent had presented himself to the hospital's emergency room with "seven deep slash marks on each of his wrists [that] bore witness to his deeply distressed emotional state and attested to his attempted suicide." 925 F.2d at 294. Apparently, "[a]fter a few hours, and without being admitted to the hospital for observation, he was released. Some three months later, on December 23, 1987, Kelly Persons committed suicide." Id. The claimants contended that the hospital's doctors had been negligent in failing to provide Persons with adequate counseling or treatment. Admitting its reluctance but acknowledging its obligation, this court affirmed dismissal of the claims pursuant to Feres. Id. at 299.4 26 We must do the same. There is no meaningful difference between the facts in Persons, where a serviceman's mental disorder and the alleged negligence of a military hospital in treating it resulted in the death of that serviceman by suicide, and the facts in the case before us, where a serviceman's mental disorder and the alleged negligence of a military hospital in treating it resulted in the death of another serviceman at the hands of the first. 27 Appellants, however, argue otherwise. They purport to distinguish Persons on the basis of the fact that in Persons the decedent serviceman was himself the alleged victim of medical malpractice, whereas here the decedent serviceman was the victim of a failure to control a second, mentally disturbed serviceman. Because McAllister was not the army hospital patient himself, they point out, the nexus between the victim and the various benefits and obligations "incident to military service" is more strained in this case. 28 This argument has intuitive appeal, and if the legal slate were clean, it might carry the day. Unfortunately for appellants, however, this factual distinction cannot overcome the breadth of the Feres rule as it has been applied in prior decisions. In Millang, for example, this court held that the Feres doctrine barred an action by an officer who was run over by a military police vehicle while off duty and attending a picnic. The court found that the accident arose out of activity incident to service because Millang's presence at and use of the picnic area hinged on his military status and because the tortious driver was an officer acting subject to military command. 817 F.2d at 534-35. Similarly, in Bon v. United States, 802 F.2d 1092 (9th Cir.1986), this court held that Feres barred a claim by a servicewoman who, while paddling a canoe rented from a naval facility, was struck and injured by a motor boat operated by another service member. The court found the motor boat operator's status as a member of the military "subject to discipline" relevant to its decision. Id. at 1095. Given Millang and Bon, the difference between Persons and the present appeal cannot alter the outcome. B 29 Even putting Shearer and Persons aside, virtually every other significant precedent suggests that the Feres doctrine bars appellants' suit. For example, in Atkinson, this court held that a servicewoman could not pursue a claim for allegedly negligent prenatal care received at a military hospital while she was on active-duty status. The court explained that even though the lawsuit did not implicate concerns of military discipline or encroach upon " 'complex, subtle, and professional decisions as to the composition, training, equipping, and control of a military force,' " the broad reach of the Feres doctrine nonetheless precluded the action. Atkinson, 825 F.2d at 205 (quoting Gilligan v. Morgan, 413 U.S. 1, 10, 93 S.Ct. 2440, 2445, 37 L.Ed.2d 407 (1973)). Similarly, in Veillette v. United States, 615 F.2d 505 (9th Cir.1980), this court held that the parents of an Air Force serviceman who had been treated at a naval hospital after an off-duty motorcycle accident could not sue the government for the alleged negligence of the hospital's doctors and employees. In the court's view, it was immaterial that Veillette had been off duty at the time of the accident; that he had been a member of the Air Force and not a member of the Navy; and that the treating naval hospital attended to both civilian and military personnel. As the court explained, "allegations of medical malpractice, the basis of two of the claims rejected in Feres, have consistently been held to fall within the bounds of the doctrine when the plaintiff was a serviceman on active duty at the time of the alleged malpractice." 615 F.2d at 507 (citing numerous cases); see also Persons, 925 F.2d at 296 ("In this Circuit, Atkinson ... and Veillette ... are controlling."). C 30 Regardless of the merits of the Feres doctrine or the persuasiveness of its rationales, there is no doubt that it provides a broad blanket of immunity to protect the government against allegations of negligence in military contexts: 31 For all the complexity of the evolution of the doctrine, ... what is not unclear and escapes all current confusion is its overall trend. From Brooks, 337 U.S. 49 [69 S.Ct. 918], the first Supreme Court case addressing an FTCA suit brought by a service person, to United States v. Johnson, supra, jurisprudence has been guided by an increasing sense of awe for things military. As a result, practically any suit that "implicates the military judgments and decisions," id. [481 U.S.] at 691 [107 S.Ct. at 2069], runs the risk of colliding with Feres. 32 Id. at 295 (emphasis in original). As the Sixth Circuit has observed: 33 Review of the [ ] Supreme Court precedents makes it clear that in recent years the Court has embarked on a course dedicated to broadening the Feres doctrine to encompass, at a minimum, all injuries suffered by military personnel that are even remotely related to the individual's status as a member of the military, without regard to the location of the event, the status (military or civilian) of the tortfeasor, or any nexus between the injury-producing event and the essential defense/combat purpose of the military activity from which it arose. 34 Major v. United States, 835 F.2d 641, 644-45 (6th Cir.1987) (emphasis in original), cert. denied, 487 U.S. 1218, 108 S.Ct. 2871, 101 L.Ed.2d 906 (1988); see Johnson, 481 U.S. 681, 107 S.Ct. 2063 (1987) (Feres doctrine barred heirs of Coast Guard pilot from maintaining wrongful death action based on negligence of civilian air traffic controllers); United States v. Stanley, 483 U.S. 669, 107 S.Ct. 3054, 97 L.Ed.2d 550 (1987) (logic of Feres barred Army officer who was secretly administered doses of LSD from maintaining a Bivens action against the Army); Chappell v. Wallace, 462 U.S. 296, 103 S.Ct. 2362, 76 L.Ed.2d 586 (1983) (logic of Feres bars enlisted military personnel from maintaining Bivens actions against their superior officers). Indeed, appellants have not been able to cite a single Supreme Court case in support of their position since Brooks, and we are aware of no such case. V 35 In light of the foregoing, we must affirm. In so doing, we follow a long tradition of reluctantly acknowledging the enormous breadth of a troubled doctrine. See, e.g., Persons, 925 F.2d at 299 ("Seemingly manacled by precedent, this Circuit has repeatedly expressed its strong reservations [about the Feres doctrine] before ultimately overcoming them.") (citing Atkinson, 825 F.2d at 206 (grudgingly reversing a prior decision in light of Johnson ), Monaco, 661 F.2d at 134 (confessing that "[t]he result in this case disturbs us ... If developed doctrine did not bind us we might be inclined to make an exception ... Unfortunately, we are bound"), and Veillette, 615 F.2d at 506 ("Reluctantly, we affirm")). 36 AFFIRMED. 1 "Because this case involves an appeal from an order dismissing for want of jurisdiction, we accept as true the factual allegations contained in appellants' complaint. Broudy v. United States, 661 F.2d 125, 126 n. 1 (9th Cir.1981)." Persons v. United States, 925 F.2d 292, 294 n. 1 (9th Cir.1991) 2 For an exhaustive analysis of the "evolution" of this troubled doctrine, see McGowan v. Scoggins, 890 F.2d 128, 129-36 (9th Cir.1989) 3 In its brief, the government has set forth an instructive comparison between the language in Mrs. Shearer's complaint and the language in appellants' complaint. The critical passages are nearly identical: Respondent's complaint strikes at the core of [the Feres ] concerns. In particular, respondent alleges that Private Shearer's superiors in the Army "negligently and carelessly failed to exert a reasonably sufficient control over Andrew Heard, ... failed to warn other persons that he was at large, [and] negligently and carelessly failed to ... remove Andrew Heard from active military duty." This allegation goes directly to the "management" of the military; it calls into question basic choices about the discipline, supervision, and control of a serviceman. Shearer, 473 U.S. at 58, 105 S.Ct. at 3043 (footnotes and citation omitted). The direct and proximate cause of the death of the decedent was the negligence of the defendant, the Department of the Army and its agents and employees[,] in carelessly, wrongfully and negligently failing to properly supervise, control and treat said Private Tarver and in failing to otherwise protect the decedent, William F. McAllister, from said Private Leon Tarver when defendant, it's [sic] employees and agents knew or should have known that Private Tarver posed a foreseeable risk of harm to the public. The supervision, control and treatment of said Private Leon Tarver did not require defendants, employees, and agents to exercise complex, subtle, and professional judgment as to composition, training[,] equipping and controlling of a military force. Estate of McAllister v. United States, Complaint at p 10. 4 The court in Persons affirmed dismissal of the medical malpractice claims only to the extent that those claims related to the treatment of the decedent. The court reversed and reinstated a claim that the government had been negligent in failing to provide psychological counseling to the decedent's family in the aftermath of his suicide. The court held that Feres did not bar this latter claim. See 925 F.2d at 297-99. Appellants have not alleged such a claim in their complaint here
{ "pile_set_name": "FreeLaw" }
Case: 18-15072 Date Filed: 07/30/2020 Page: 1 of 19 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT ________________________ No. 18-15072 Non-Argument Calendar ________________________ D.C. Docket No. 5:17-cr-00026-MTT-CHW-1 UNITED STATES OF AMERICA, Plaintiff-Appellee, versus ISAAC J. CULVER, III, Defendant-Appellant. ________________________ No. 18-15073 Non-Argument Calendar ________________________ D.C. Docket No. 5:17-cr-00026-MTT-CHW-3 UNITED STATES OF AMERICA, Plaintiff-Appellee, versus Case: 18-15072 Date Filed: 07/30/2020 Page: 2 of 19 PROGRESSIVE CONSULTING TECHNOLOGIES, INC., Defendant-Appellant. ________________________ Appeals from the United States District Court for the Middle District of Georgia ________________________ (July 30, 2020) Before MARTIN, ROSENBAUM, and ANDERSON, Circuit Judges. PER CURIAM: Isaac Culver appeals his convictions and 87-month sentence for conspiracy to commit mail and wire fraud, mail and wire fraud, and money laundering. His appeal was consolidated with that of his company, Progressive Consulting Technologies, Inc. (“Progressive”). Progressive was convicted of the same offenses and sentenced to 5-years probation and a $500,000 fine. In their consolidated appeal, Culver and Progressive (“Appellants”) first argue that insufficient evidence supported their conspiracy and substantive convictions for mail and wire fraud, because the government failed to show any intentional scheme to defraud. Second, they argue that insufficient evidence supported their convictions for conspiracy to commit money laundering because the government failed to prove concealment. Finally, Culver argues that the district court improperly applied a two-level sophisticated means enhancement in calculating his 2 Case: 18-15072 Date Filed: 07/30/2020 Page: 3 of 19 guideline sentence. After careful review, we affirm Appellants’ convictions and Culver’s sentence. I. In 2012, the Bibb County School District decided to upgrade the school system’s technology infrastructure. In June of that year, the School District published a Request for Qualifications (an “RFQ”) for an entity to fill the upgrade project’s Technical Project Manager role. The School District looked for a firm capable of providing “technical project management and network management support.” The School District wanted a firm to oversee the purchase and installation of the technology upgrades, rather than a firm to complete the installation itself. The RFQ was the first step in the process for an applicant to become the project manager. Relevant here, another step required applicants to submit letters of recommendation from companies with whom they had recently worked. In July 2012, Culver, on behalf of Progressive, completed an RFQ outlining Progressive’s qualifications. As part of its submission package, Progressive included a letter from Allen Stephen, CEO of CompTech, Inc., a federal contracting firm located in Dayton, Ohio. However, Culver actually wrote the recommendation letter and at Culver’s direction, Stephen put Culver’s letter on CompTech stationary. At trial, evidence was introduced that Culver knew the 3 Case: 18-15072 Date Filed: 07/30/2020 Page: 4 of 19 assertions contained in the letter were “totally made up.” Stephen also acknowledged that some assertions made in the letter were entirely false.1 Progressive was ultimately selected to serve as the project manager for the upgrade. The “Services Agreement” reflects the terms of the parties’ agreement. It states that as project manager, Progressive would “[i]nstall, relocate, configure, modify and test routers, switches, and servers”; assist with “infrastructure deployments and technical hardware refresh, renovation, and transition initiatives”; and “[e]valuate and recommend new and evolving networking technologies.” Appellants recommended the School District use the NComputing L300 device as part of its technology upgrade and the School Board approved the purchase. Culver was involved with the purchase of these devices. However, the School District believed the devices were purchased from CompTech, because Culver was directing CompTech to invoice the School District. The School District paid CompTech $3,768,000, but CompTech wired $2,151,750 of that amount back to Progressive so that Progressive could pay for the NComputing devices. In a separate transaction, CompTech wired $1,537,990 in profit to Progressive and kept the remaining $78,260 for itself. Out of the over $1.5 million wired to Progressive, Progressive wrote several checks payable to Culver. The 1 For example, Progressive and CompTech never worked together on the project Culver described in the letter. And, despite the letter’s claim that CompTech had an office in Atlanta, CompTech did not. 4 Case: 18-15072 Date Filed: 07/30/2020 Page: 5 of 19 School District did not know that CompTech was sending money back to Progressive as part of the purchase. In March 2013, the School District contacted CompTech to ask when the NComputing devices would be installed. Stephen, however, never intended CompTech to perform the installation because he believed Progressive was doing it. When Stephen contacted Culver about this issue, Culver sent Stephen information about the equipment and deployment and directed Stephen to respond to the School District’s inquiries. At some point during the spring of 2013, the School District began to question how the technical upgrade was being managed. On April 17, 2013, Culver sent Stephen a letter advising him that the School was putting together a timeline and record of payments to vendors for 2012. Culver again directed Stephen how to respond on behalf of CompTech. Culver told Stephen to say that in order to get the School District a discount on the NComputing devices, Progressive asked CompTech to purchase the devices and take a small profit “as a pass through for using CompTech’s GSA schedule.” Then on April 22, 2013, Culver sent Stephen a “heads up” email, letting Stephen know that he should tell the School District that CompTech was doing the install of the NComputing devices, and that CompTech had two “employees.” None of this information was true. 5 Case: 18-15072 Date Filed: 07/30/2020 Page: 6 of 19 Eventually, the School District shut down the technology upgrade project. Only 300 of the 15,000 NComputing devices purchased were installed. The School District deemed the rest of the devices “unusable” because key components, like monitors and keyboards, were not purchased. In June 2017, the government indicted Progressive and Culver based on their roles in this scheme. A jury found them guilty of conspiracy to commit mail and wire fraud, mail and wire fraud, and money laundering. Culver was sentenced to a term of 87-months imprisonment and Progressive was sentenced to 5-years probation and a $500,000 fine. This appeal followed. II. We review de novo whether sufficient evidence supported a jury’s guilty verdict. United States v. Foster, 878 F.3d 1297, 1303–04 (11th Cir. 2018). In doing so, we view the evidence in the light most favorable to the prosecution and resolve all reasonable inferences and credibility evaluations in favor of the verdict. Id. at 1304. In considering the sufficiency of the evidence, our only task is to determine whether any rational trier of fact could have found all the essential elements of the crime beyond a reasonable doubt. United States v. Feldman, 931 F.3d 1245, 1258 (11th Cir. 2019). The jury’s guilty verdict must be affirmed unless there is no reasonable construction of the evidence from which the jury could have found the defendant guilty beyond a reasonable doubt. Foster, 878 6 Case: 18-15072 Date Filed: 07/30/2020 Page: 7 of 19 F.3d at 1304. A jury is free to choose among reasonable constructions of the evidence, so it is unnecessary that the evidence exclude every reasonable theory of innocence or be wholly inconsistent with every conclusion except that of guilt. Id. It is not enough for a defendant to put forth a reasonable hypothesis of innocence, as the issue is not whether a jury reasonably could have acquitted, but whether it reasonably could have found guilt beyond a reasonable doubt. United States v. Beckles, 565 F.3d 832, 840–41 (11th Cir. 2009). Credibility determinations are also left to the jury. United States v. Flores, 572 F.3d 1254, 1263 (11th Cir. 2009) (per curiam). A jury is entitled to believe as much or as little of a witness’s testimony as it finds credible. United States v. Matthews, 431 F.3d 1296, 1312 (11th Cir. 2005) (per curiam). If the jury does not believe a defendant’s testimony, the jury may take it as evidence that “the opposite of his testimony is true.” United States v. Williams, 390 F.3d 1319, 1325 (11th Cir. 2004) (quotation marks omitted). That said, we turn to Culver and Progressive’s two sufficiency-of-the- evidence arguments. A. MAIL AND WIRE FRAUD A conviction for wire fraud requires that the government prove beyond a reasonable doubt that the defendants (1) participated in a scheme or artifice to defraud, (2) with intent to defraud, and (3) used, or caused the use of, interstate 7 Case: 18-15072 Date Filed: 07/30/2020 Page: 8 of 19 wire transmissions for the purpose of executing the scheme or artifice to defraud. United States v. Machado, 886 F.3d 1070, 1082–83 (11th Cir. 2018). Mail and wire fraud “are analytically identical save for the method of execution.” United States v. Bradley, 644 F.3d 1213, 1238 (11th Cir. 2011); see also 18 U.S.C. §§ 1341, 1343. Courts have construed the phrase “scheme to defraud” broadly. United States v. Pendergraft, 297 F.3d 1198, 1208 (11th Cir. 2002). The word “defraud” means “the deprivation of something of value by trick, deceit, chicane, or overreaching.” Id. (quotation marks omitted). To establish a scheme to defraud, the government must offer “proof of a material misrepresentation, or the omission or concealment of a material fact calculated to deceive another out of money or property.” Bradley, 644 F.3d at 1238 (quotation marks omitted). In addition, the government must prove the defendant’s intent to defraud. Id. at 1239. “To gauge a defendant’s intent to commit a fraudulent scheme . . . we must determine whether the defendant attempted to obtain, by deceptive means, something to which he was not entitled.” Id. at 1240. An intent to defraud for purposes of mail and wire fraud may be inferred from the defendant’s conduct. United States v. Maxwell, 579 F.3d 1282, 1301 (11th Cir. 2009). “Evidence that a defendant personally profited from a fraud may provide circumstantial evidence of 8 Case: 18-15072 Date Filed: 07/30/2020 Page: 9 of 19 an intent to participate in that fraud.” United States v. Naranjo, 634 F.3d 1198, 1207 (11th Cir. 2011). Appellants’ sufficiency argument rests on United States v. Takhalov, 827 F.3d 1307 (11th Cir. 2016), which held that mere deception is insufficient to constitute a “scheme to defraud.” Id. at 1313–14. In Takhalov, this Court reversed a wire fraud conviction because the district court refused to give an instruction to the jury that the defendants intended to defraud their victims. Id. at 1315–16, 1325. In that case, the government presented evidence to establish that the defendants tricked men into coming into the defendants’ nightclubs by paying women (B-girls) to lure them into their clubs. Id. at 1310. Once inside, club employees “would pour vodka in the men’s beer to get them drunker, misrepresent the prices of drinks, hide menus, cover up prices, and even forge the men’s signatures on credit-card receipts.” Id. The defendants asked the district court to instruct the jury that “[f]ailure to disclose the financial arrangement between the B- girls and the Bar, in and of itself, is not sufficient to convict a defendant of any offense[.]” Id. at 1314 (alterations in original) (quotation marks omitted). On appeal, this Court held that the district court should have charged the jury that in order to find a scheme to defraud, it had to find both deception about the nature of the transaction and an intent to harm. Id. at 1312–16. 9 Case: 18-15072 Date Filed: 07/30/2020 Page: 10 of 19 Here, Appellants argue that although there was sufficient evidence that they deceived the school district, the evidence was not sufficient to prove their intent to defraud. Appellants claim there was no evidence of intent to misrepresent the price or fees charged and no evidence that they misrepresented the characteristics or quality of the devices. However, Appellants’ Takhalov-based arguments are not persuasive. There was sufficient evidence here to support Culver’s and Progressive’s conspiracy and substantive wire and mail fraud convictions. Progressive, through its agents, “constructed an elaborate scheme that allowed them to reap inflated profits” and left the School District “with almost nothing for its $3,768,000.00 investment.” R. Doc. 202 at 3. Witnesses testified that Appellants deceived the School District into hiring Progressive as the project manager because Progressive fabricated a recommendation letter from CompTech. There was also testimony that Appellants used CompTech as a pass-through for the purchase of the devices to hide the fact that Progressive was acting as a vendor. This is relevant because under the agreement with the School District, Progressive was to provide product management services, and when Progressive acted as a vendor, it created a conflict of interest. Based on this evidence, the jury could reasonably infer that Appellants made misrepresentations to the School District in an “attempt[] to obtain, by 10 Case: 18-15072 Date Filed: 07/30/2020 Page: 11 of 19 deceptive means, something to which [they were] not entitled.” Bradley, 644 F.3d at 1240. Appellants also argue that any misrepresentations they made did not affect the essential nature of the parties’ bargain and therefore were not material. Because fraud requires a false statement of “material” fact, Appellants argue this evidence was not sufficient to prove mail and wire fraud. See Maxwell, 579 F.3d at 1299 (“A scheme to defraud requires proof of a material misrepresentation . . . calculated to deceive another out of money or property.”). This Court addressed a similar situation in Maxwell. There, the defendant acquired state and federal contracts to perform work as minority contractors, even though they were not minorities. Id. at 1291. The defendant argued that, although various contracts he signed had explicit provisions requiring the work to be performed by a minority contractor, he did not deprive the victims of money or property because they received the work they sought. Id. at 1302. A panel of this Court rejected the defendant’s argument, noting that the mail and wire fraud statutes “also seek to punish the intent to obtain money or property from a victim by means of fraud and deceit.” Id. Appellants argue that Maxwell is distinguishable because the contract in that case “contained explicit provisions that only minority businesses could apply,” whereas Progressive’s agreement with the School District “did not include any 11 Case: 18-15072 Date Filed: 07/30/2020 Page: 12 of 19 provision preventing them from acting as the vendor for the NComputing transaction and/or to provide conflict-free advice.” Br. of Appellants at 31. But this fact does not distinguish Appellants’ case. A misrepresentation need not be a term included in the parties’ agreement for it to be material. Rather, a misrepresentation is material if it has “a natural tendency to influence, or is capable of influencing, the decision maker to whom it is addressed.” Maxwell, 579 F.3d at 1299 (alteration adopted) (quotation marks omitted). A jury could reasonably find that Appellants’ fabricated recommendation letter and misrepresentations about CompTech’s role influenced the School District in purchasing the NComputing devices. We therefore affirm the jury’s verdict as to the mail and wire fraud convictions. B. MONEY LAUNDERING We next examine the sufficiency of the evidence supporting Appellants’ convictions on the money laundering counts under 18 U.S.C. § 1956(a)(1)(B)(i). Section 1956(a)(1)(B)(i) is sometimes referred to as the “concealment” provision of the money laundering statute. United States v. Majors, 196 F.3d 1206, 1211 (11th Cir. 1999). This section “was designed to punish defendants who thereafter take the additional step of attempting to legitimize their proceeds so that observers think their money is derived from legal enterprises.” Id. at 1212. 12 Case: 18-15072 Date Filed: 07/30/2020 Page: 13 of 19 In this case, the government had to prove to the jury that: (1) Appellants conducted or attempted to conduct a financial transaction; (2) the transaction involved the proceeds of a statutorily specified unlawful activity; (3) Appellants knew the proceeds were from some form of illegal activity; and (4) they knew a purpose of the transaction was to conceal or disguise the nature, location, source, ownership, or control of the illegal proceeds. United States v. Miles, 290 F.3d 1341, 1355 (11th Cir. 2002) (citing § 1956(a)(1)(B)(i)). Appellants challenge the sufficiency of the evidence only as to the fourth element. Specifically, Appellants argue the government’s evidence was insufficient to prove the existence of “any transaction that was designed to conceal the nature, location, source, ownership, or control of any illegal proceeds” as required under the concealment provision in § 1956(a)(1)(B)(i). Appellants say they did not disguise any transaction with aliases, fake addresses, complicated or unnecessary transactions, or engage in any other concealment efforts, so the government’s evidence did not show the “animating purpose” of the transaction made it more difficult for law enforcement to trace the funds at issue. Br. of Appellants at 33. In determining whether there was a purpose of concealment, this Court looks to whether there is evidence of: [S]tatements by a defendant probative of intent to conceal; unusual secrecy surrounding the transaction; structuring the transaction in a way to avoid attention; depositing illegal profits in the bank account of a legitimate business; highly irregular features of the transaction; using 13 Case: 18-15072 Date Filed: 07/30/2020 Page: 14 of 19 third parties to conceal the real owner; a series of unusual financial moves cumulating in the transaction; or expert testimony on practices of criminals. United States v. Blankenship, 382 F.3d 1110, 1130 (11th Cir. 2004) (alteration adopted) (quoting Majors, 196 F.3d at 1213 n.18). In Blankenship, the defendant deposited illegitimate funds into his business account, and then transferred those funds into bank accounts in his own name. Id. at 1128–29. We held the evidence was insufficient to show concealment because (1) the money was in accounts in the defendant’s name, and (2) the accounts were private so the defendant “could not reasonably have anticipated” receiving a “marginal increase in secrecy” by moving the money between those accounts. Id. By comparison, in Majors, defendants deposited illegitimate funds in business accounts of two corporations, transferred those funds to other, legitimate third-party corporations, and then transferred those funds from the legitimate corporations directly into their own pockets. Majors, 196 F.3d at 1214. This Court held that evidence was sufficient to prove money laundering because, in the light most favorable to the government, it supported the jury’s finding that the defendants “had a specific intent to structure their financial transactions so as to conceal or disguise the true nature and source of the transfer of funds between corporations and, ultimately, to them.” Id. Appellants say this case is different because they funneled funds through CompTech only for the purpose of defrauding the School District, not to conceal 14 Case: 18-15072 Date Filed: 07/30/2020 Page: 15 of 19 the funds themselves. Although the evidence introduced at trial shows that Appellants funneled the purchase of NComputing devices through CompTech to deceive the School District, there was other evidence in the record that showed concealment of the funds. For instance, investigators had to examine CompTech’s account statements in order to discover the fact that, after Progressive paid NComputing, it retained a profit from the funds paid by the school district for the NComputing devices. In addition, Progressive instructed CompTech to wire the funds from the NComputing devices in two separate transactions in two separate amounts. Based on this evidence, a rational juror could—and did—conclude that Appellants’ use of CompTech as a third party, and directions to wire funds of $2,151,750 and $1,537,990 in two separate transactions, was intended to conceal the illegitimate proceeds of their fraud. See Blankenship, 382 F.3d at 1130 (looking to “secrecy surrounding the transaction,” “depositing illegal profits in the bank account of a legitimate business,” and “using third parties to conceal the real owner”). In sum, and taking the evidence in a light most favorable to the government, Culver and Progressive’s transfer of money in two amounts through a third-party company constituted sufficient evidence to show that a purpose of the transaction was to conceal or disguise the source, ownership, or control of the illegal proceeds. 15 Case: 18-15072 Date Filed: 07/30/2020 Page: 16 of 19 We therefore affirm Appellants’ convictions for conspiracy to commit money laundering. III. Culver also argues that the district court miscalculated the Sentencing Guidelines range by erroneously finding his conduct fell within the “sophisticated means” enhancement. See U.S. Sentencing Guidelines § 2B1.1(b)(10)(C). He says Appellants’ scheme “was neither complex nor intricate,” as is required to increase a sentence based on a sophisticated-means offense. Br. of Appellants at 37. We review for clear error the district court’s findings of fact related to the imposition of sentencing enhancements, including a finding that the defendant used sophisticated means. United States v. Ghertler, 605 F.3d 1256, 1267 (11th Cir. 2010). When reviewing for clear error, we will not disturb a district court’s findings “unless we are left with a definite and firm conviction that a mistake has been committed.” Id. (quotation marks omitted). After careful review, we hold that the district court did not clearly err in applying the sophisticated-means enhancement. The Sentencing Guidelines provide for a two-point enhancement of a defendant’s offense level if the “offense . . . involved sophisticated means.” USSG § 2B1.1(b)(10)(C). The sophisticated means enhancement should only be applied 16 Case: 18-15072 Date Filed: 07/30/2020 Page: 17 of 19 to “especially complex or especially intricate offense conduct pertaining to the execution or concealment of” the scheme. Id. § 2B1.1(b)(10) cmt. n.9(B). “Conduct such as hiding assets or transactions, or both, through the use of fictitious entities, corporate shells, or offshore financial accounts also ordinarily indicates sophisticated means.” Id. There is no requirement that each of a defendant’s individual actions be sophisticated in order to impose the enhancement. Ghertler, 605 F.3d at 1267. Rather, it is enough if the totality of the scheme was sophisticated. Id. We cannot say the district court clearly erred in finding that Culver used sophisticated means to perpetrate or conceal his fraudulent scheme because his offense conduct could be viewed as “especially complex or . . . intricate.” See USSG § 2B1.1(b)(10) cmt. n.9(B). Here, the district court found that increasing Culver’s sentence was warranted because of the “significan[ce]” of Culver’s attempts to cover up his conduct by directing CompTech to communicate with the School District. The district court also found (albeit when discussing a separate ground for increasing Culver’s sentence) that the scheme continued for an extended period of time; Appellants “us[ed] deception to get the contract to become the project manager”; and Appellants engaged in a well-documented cover-up “as the School District began to ask questions.” 17 Case: 18-15072 Date Filed: 07/30/2020 Page: 18 of 19 Like in Ghertler, it may be true that “aspects of [Culver’s] scheme were not sophisticated,” but under our deferential standard of review, the totality of his activities spanning July 2012 through April 2013 is sufficient to support the district court’s finding that Culver used sophisticated means. 605 F.3d at 1268; see United States v. Feaster, 798 F.3d 1374, 1381 (11th Cir. 2015) (“Regardless of whether the defendant undertook affirmative acts of concealment, the scheme itself may be designed in a sophisticated way that makes it unlikely to be detected, allowing it to continue for an extended period and to impose larger losses.”). These activities included: providing a fabricated reference letter to obtain a government contract; using false invoices to hide Progressive’s role as a profiting vendor; sending a deceptive email, copying the School District, that gave the appearance of a fake arm’s length negotiation; and feeding CompTech responses to the School District’s inquiries. In short, Culver’s offenses “involved repetitive, coordinated conduct designed to allow him to execute his fraud and evade detection.” United States v. Bane, 720 F.3d 818, 826–27 (11th Cir. 2013) (affirming imposition of a longer sentence when offense involved multiple corporations, required employees to create a paper trail to mask the fraud, and involved steps to conceal the offense). Thus, although Culver did not attempt to conceal his role in the fraud through false identities or fictitious entities, the totality of his activities carried out over the course of his relationship with the School District were sufficiently 18 Case: 18-15072 Date Filed: 07/30/2020 Page: 19 of 19 complex to support finding that he used sophisticated means. See Ghertler, 605 F.3d at 1267–68. We therefore affirm the district court’s application of the sophisticated-means enhancement and Culver’s 87-month sentence. AFFIRMED. 19
{ "pile_set_name": "FreeLaw" }
INTRODUCTION ============ Robotic-assisted laparoscopic radical prostatectomy (RALP) has gained popularity around the world. This year the number of robotic cases again exceeds that of traditional open prostatectomy cases in the United States, with 85% performed robotically.^[@B1]^ We performed a review of our prostate cancer database to demonstrate trends in biochemical recurrence (BCR) in a large cohort of patients undergoing RALP, as a function of preoperative prostate-specific antigen (PSA) levels, Gleason score, TNM stage, and surgical margins (SM). Our primary objective was to determine prostate cancer BCR rates with respect to SM status for patients undergoing RALP. We also compared our BCR rates to other open and laparoscopic radical prostatectomy series reported in the literature. MATERIALS AND METHODS ===================== A retrospective review of a prospectively maintained, Internal Review Board (IRB)-approved radical prostatectomy database was performed. Patients undergoing RALP between December 1, 2003 and January 1, 2009 were eligible for analysis. All RALP procedures were performed via a transperitoneal approach by 1 of 3 surgeons using a modified Vattikuti Institute technique.^[@B2]^ DaVinci, DaVinci S, and DaVinci S HD Surgical Systems (Intuitive Surgical, Sunnyvale, CA, USA) were used to perform the procedures. Learning curves when present for all surgeons were included. The demographic information, clinical staging, and intraoperative details were prospectively collected and entered into the database. Using preoperative data, patients were stratified as low, intermediate, and high risk according to D'Amico\'s risk classification.^[@B3]^ Specifically, the low-risk group was defined as having serum PSA \<10ng/mL, Gleason score \<7, and clinical stage \<cT2b. The intermediate-risk group was defined as having serum PSA between 10ng/mL and 20ng/mL or Gleason score equal to 7. The high-risk group was defined as having serum PSA \>20ng/mL or Gleason score 8 to 10. Surgical margin status was determined by pathologic evaluation of the specimen at a single institution. AJCC 2002 staging guidelines were consistently used by the pathologists.^[@B4]^ All specimens were whole-mounted and step-sectioned at 3-mm intervals with apex and base being additionally cross-sectioned. Positive surgical margin was defined as the presence of cancer cells at the inked resection margin in the final specimen. Intraoperative biopsy results or additional tissue excisions were not used to determine margin positivity. Margin presence (negative/positive), margin multiplicity (single/multiple), and margin length (≤3mm focal and \>3mm extensive) were noted. Postoperative PSA values were routinely obtained at 1, 3, 6, 9, 12, 18, and 24 mo and annually thereafter. PSA recurrence was defined as ≥0.2ng/mL. Patients receiving adjuvant treatment were included in our analyses and were considered as having recurred at the time of adjuvant treatment. We excluded 278 patients due to lack of postoperative PSA or lack of follow-up at our institution. Demographic comparison was performed between excluded and included patients. Data were extracted from the prostate database and entered into SPSS v 14.0 statistical software (SPSS, Inc., Chicago, IL, USA.) Univariate analysis was performed for the overall cohort, as well as for patients stratified by Gleason score, TNM stage, and D'Amico classification, comparing biochemical recurrence-free survival (BRFS) with respect to SM status. BRFS was defined as time from RALP to BCR. Patients without BCR were censored on the date of their last PSA measurement. Kaplan-Meier plots of BRFS were generated for the above categories. Differences relative to SM status were evaluated using the log-rank test. Multivariate Cox regression analysis was also performed. Pathologic stage (≤pT2N0M0, pT3aN0M0, pT3b/4N0M0, pTxN1Mx), pathologic grade (pathologic Gleason score ≤6, 7, and 8 to 10), SM status (negative/positive), margin multiplicity (single/multiple), and margin length (≤3mm focal and \>3mm extensive) were entered as categorical variables with the first category as the reference group. Preoperative PSA, transformed to its natural logarithm to minimize effects of extreme values, an approach previously described in the literature, was entered as a continuous variable.^[@B5]^ Statistical significance was set at 2-sided *P* \< .05. To evaluate whether nerve-sparing status is a risk factor for positive margins, a univariate analysis was performed for bilateral, unilateral, and non--nerve-sparing procedures. The impact of the learning curve on margin status was examined by performing a univariate analysis on each quartile of cases. RESULTS ======= Between December 1, 2003 and January 2009, 1437 patients underwent RALP procedures performed by 3 surgeons at our institution. Of these, 278 patients were excluded due to lack of follow-up at our institution and lack of postoperative PSA. Sixteen patients received adjuvant therapy and were included in our analysis. Specifically, 9 patients underwent adjuvant radiation therapy, 3 received adjuvant androgen deprivation therapy, and 4 received both. A total of 1159 patients were included in our analysis. Patient demographics are presented in **[Table 1](#T1){ref-type="table"}**. Mean age, body mass index (BMI), and preoperative PSA values were 59.3 y, 28.1kg/m^2^, and 5.9ng/mL, respectively. Patients had a mean follow-up of 15.9 mo (0 to 60). Predictably, preoperative serum PSA demonstrated a statistically significant difference between the 2 groups, with higher values for those with positive surgical margins (*P* \< .001). The distribution of clinical Gleason score (*P* = .003), D'Amico risk stratification (*P* = .001), pathological Gleason (*P* = .001), and pathologic stage (*P* = .001) also demonstrated a statistically significant difference. Patients with positive margins had higher stage, grade, and risk. Neither performance of pelvic lymphadenectomy (*P* = .182) nor presence of positive lymph nodes (*P* = .139) was statistically different between the 2 groups. ###### Demographic Data Negative Margin Positive Margin All Patients P Value ------------------------------------------------------------------------------------------------------- ----------------- ----------------- --------------- --------- Number of patients (%) 843 (72.7%) 316 (27.3%) 1159 (100.0%) Mean age, years (SD[^a^](#TF1-1){ref-type="table-fn"}) 59.3 (6.5) 59.2 (6.4) 59.3 (6.5) .987 Mean BMI, kg/m^2^ (SD[^a^](#TF1-1){ref-type="table-fn"}) 28.1 (7.2) 28.0 (3.9) 28.1 (6.4) .693 Mean preoperative PSA[^a^](#TF1-1){ref-type="table-fn"}, ng/mL (SD[^a^](#TF1-1){ref-type="table-fn"}) 5.4 (2.8) 7.4 (6.7) 5.9 (4.4) \<.001 Clinical Gleason score .003     ≤6 485 (76.6%) 148 (23.4%) 633 (100.0%)     7 295 (68.6%) 135 (31.4%) 430 (100.0%)     8--10 61 (64.9%) 33 (35.1%) 94 (100.0%) Clinical stage .073     cT1 588 (73.2%) 215 (26.8%) 803 (100.0%)     cT2 246 (72.8%) 92 (27.2%) 338 (100.0%)     cT3 7 (46.7%) 8 (53.3%) 15 (100.0%) Risk class (D'Amico) \<.001     Low 439 (77.0%) 131 (23.0%) 570 (100.0%)     Intermediate 329 (71.4%) 132 (28.6%) 461 (100.0%)     High 74 (58.3%) 53 (41.7%) 127 (100.0%) Pathologic Gleason score \<.001     ≤6 294 (82.4%) 63 (17.6%) 357 (100.0%)     7 483 (69.1%) 216 (30.9%) 699 (100.0%)     8--10 60 (61.9%) 37 (38.1%) 97 (100.0%) Pathologic stage \<.001     pT0--pT2N0M0 718 (79.9%) 183 (20.3%) 901 (100.0%)     T3aN0M0 89 (46.8%) 101 (53.2%) 190 (100.0%)     T3b and pT4N0M0 25 (50.0%) 25 (50.0%) 50 (100.0%)     TxN1Mx (positive nodes) 8 (53.3%) 7 (46.7%) 15 (100.0%) Mean follow-up, months (SD[^a^](#TF1-1){ref-type="table-fn"}) 15.6 (13.0) 16.5 (14.3) 15.9(13.4) .337 Learning curve .248 First quartile 201 (69.3%) 89 (30.7%) 290 (100%) Second quartile 217 (74.8%) 73 (25.2%) 290 (100%) Third quartile 219 (75.8%) 70 24.2%) 289 (100%) Fourth quartile 206 (71.0%) 84 (29.0%) 290 (100%) Nerve sparing status .672 Bilateral nerve sparing 564 (72.7%) 212 (27.3%) 776 (100%) Unilateral nerve sparing 217 (73.8%) 77 (26.2%) 294 (100%) Non nerve sparing 60 (69.0%) 27 (31.0%) 87 (100%) SD=standard deviation; BMI=body mass index; PSA=prostate-specific antigen. Excluded patients were compared with the analyzed patients and no statistically significant differences were found in the demographic, operative, or pathologic characteristics, with exception of frequency of pelvic lymphadenectomy. Pelvic lymphadenectomy was performed on 48.6% of excluded patients vs. 58.9% in the analyzed population (*P* = .002). The frequency of positive margins in the overall cohort was 27.3%, 20.3% for pathologic stage T2, and 52.3% for pathologic stage ≥T3a disease. Specifically, in patients with Gleason score ≤6, pathologic stage T2N0M0 and T3aN0M0 had 14.9% and 65% incidence of positive surgical margin (PSM), respectively. In patients with Gleason score 7, the incidence of PSM for stage T2N0M0, T3aN0M0, T3b/T4N0M0, and TxN1Mx was 24.1%, 53.2%, 51.7%, and 12.5%, respectively. In patients with Gleason score 8 to 10, the incidence of PSM for stage T2N0M0, T3aN0M0, T3b/T4N0M0, and TxN1Mx was 17.9%, 45.2%, 50.0%, and 85.7%, respectively. BRFS curves were generated for the overall cohort as well as individual D'Amico risk groups and are depicted in **[Figure 1](#F1){ref-type="fig"}**. Low-risk and intermediate-risk groups achieved a statistically significant difference in BRSF with respect to SM. In the low-risk group, mean BRFS was 56.7 vs. 51.0 mo (*P* = .005), and in the intermediate-risk group it was 55.2 vs. 43.5 mo (*P* \< .001) for negative and positive SM, respectively. The high-risk group did not reach statistical significance with respect to SM. The overall cohort mean BRFS was statistically significant, 54.9 vs. 45.9 mo (*P* \< .001) for negative and positive SM, respectively. ![Biochemical recurrence-free survival for D'Amico risk groups and over all by surgical margin status.](jls0031228960001){#F1} Similar curves were generated for individual pathologic tumor stage and pathologic Gleason score for positive and negative SM and are depicted in **[Figure 2](#F2){ref-type="fig"}**. Patients with Gleason score of 7 and pathologic stage T2N0M0 had a statistically significant difference in mean BRFS of 55.6 and 48.7 mo (*P* \< .001) for negative and positive margins, respectively. Others did not have a statistically significant difference in BCRF survival with respect to SM. ![Cumulative biochemical recurrence-free survival by Gleason score and pathologic stage.](jls0031228960002){#F2} When surgical margins were further categorized by multiplicity and length, multiple margins and extensive margins carried a higher rate of BCR (*P* \< .001) **([Figures 3](#F3){ref-type="fig"} and [4](#F4){ref-type="fig"})**. The rates of positive surgical margins did not change significantly between quartile of cases (*P* = .243, [Table 1](#T1){ref-type="table"}). Nerve-sparing surgical status did not significantly affect the incidence of positive surgical margins (*P* = .672, [Table 1](#T1){ref-type="table"}). ![Biochemical recurrence-free survival by margin length.](jls0031228960003){#F3} ![Biochemical recurrence-free survival buy margin multiplicity.](jls0031228960004){#F4} The multivariate prediction of time to BRFS showed pathological stage (*P* \< .001), pathologic Gleason grade (*P* \< .001), and SM (*P* = .035) as significant covariates. Data for preoperative PSA was suggestive but missed statistical significance (*P* = .053). While margin multiplicity and margin length were significant in univariate analysis, they were not in multivariate analysis. Hazard ratios (HR) and confidence intervals (CI) for each variable in the equation are listed in **[Table 2](#T2){ref-type="table"}**. ###### Multivariate analysis of biochemical recurrence-free survival Variable HR[^c^](#TF2-3){ref-type="table-fn"} CI[^c^](#TF2-3){ref-type="table-fn"} (95%) P Value ---------------------------------------------------------- -------------------------------------- -------------------------------------------- --------- Pathologic stage \<.001     ≤pT2N0M0 1.0 (reference)     pT3aN0M0 2.30 1.34--3.97 .003     pT3b/T4N0M0 5.22 2.72--9.99 \<.001     pTxN1Mx 13.48 5.61--32.42 \<.001 Pathologic Gleason score \<.001     ≤6 1.0 (reference)     7 3.42 1.34--8.75 .01     8--10 10.13 3.66--28.02 \<.001 Surgical margin status[^a^](#TF2-1){ref-type="table-fn"} .035     Negative 1.0 (reference)     Positive 1.63 1.83--2.56 .035 Margin multiplicity[^b^](#TF2-2){ref-type="table-fn"}     Single 1.0 (reference)     Multiple .98 .48--2.01 .954 Margin length[^b^](#TF2-2){ref-type="table-fn"}     [\<]{.ul}3mm 1.0 (reference)     \>3mm 1.45 .74--2.87 .281 Preoperative PSA[^c^](#TF2-3){ref-type="table-fn"} 1.44 0.995--2.09 .053 Comparing negative vs positive margin for all patients. Comparing length and multiplicity among those with positive margins. HR=hazard ratio; CI = confidence interval); PSA=prostate-specific antigen. DISCUSSION ========== The importance of positive SM, its impact on BRFS, and as a result, its impact on disease-specific survival has been previously established in univariate and multivariate analyses.^[@B6]--[@B8]^ In our series, the frequency of positive SM for the overall cohort was slightly higher than but within the range reported in the literature for both open and robotic series.^[@B5],[@B9]--[@B13]^ While some series have shown that margin rates improve with surgical volume, this was not our experience.^[@B5],[@B14],[@B15]^ Our margin rates were fairly constant over the time period examined, most likely because 2 of our 3 surgeons had gone through their learning curves during fellowship and/or prior to joining our institution; the learning curve of only 1 surgeon is present in our data. With respect to SM status, our analyses demonstrate that the following groups reached statistically significant difference in BRFS: pT2/Gleason 7, D'Amico low-risk and intermediate--risk groups, and the overall cohort. The rest of the groups did not show a statistically significant difference for BCRF survival with respect to SM. One possible explanation is that these groups were underpowered. Alternatively, the lack of statistical difference may be real and represents the minimal impact of SM on BRFS in certain subgroups. It is known that prostate cancer in patients with Gleason score ≤6 tends to not recur, regardless of SM status, as demonstrated by our pT2/Gleason score ≤6 subgroup. This phenomenon is supported by a recent publication by Caire et al.^[@B16]^ where authors concluded that patients with pathologic Gleason score \<7 had a significantly delayed BCR as compared with those with Gleason score ≥7. These authors also found that delayed BCR confers a disease-specific survival advantage. Similarly, Karakiewicz et al.^[@B13]^ determined SM to be a significant predictor of BCR only for Gleason score ≥7. In the multivariate analysis, SM remained a significant predictor of BCR, as did pathologic stage and Gleason score. When positive margins were further categorized by length and multiplicity, multiple positive margins and extensive positive margins carried a higher rate of BCR. Preoperative PSA did not quite reach statistical significance. Pavlovich et al.^[@B17]^ also failed to find significant association between preoperative PSA levels and BCR. Once pathologic stage, Gleason score, and margin status were included in the analysis, the significance of preoperative PSA was lost. Although serum PSA level may play a role in screening and as a tumor marker to detect BCR postoperatively, the prognostic ability of preoperative serum PSA with respect to BCR is not supported by our analysis. Our cumulative BRFS was 93.3%, 90.6%, 86.2%, 79.7%, and 72.0% at 1, 2, 3, 4, and 5 y after RALP, respectively. The 5-y BRFS of 72% is comparable to other series in the literature. Murphy et al.^[@B15]^ reported 74.0% for robotic-assisted, Rassweiler et al.^[@B18]^ 73.1% for laparoscopic, and Karakiewicz et al.^[@B13]^ 75.4% for open radical retropubic prostatectomy series. Sixteen patients in our study received adjuvant therapy and were included in our analysis as failures whether PSA nadired or not. Whether to include or exclude these patients is not well defined in the literature. Swindle et al.^[@B6]^ confirmed the persistent significance of positive surgical margins on BRFS when patients receiving adjuvant therapy were either considered to recur at the time of adjuvant therapy or were excluded. Although our database contains few patients receiving adjuvant therapy, when a similar analysis was performed our outcomes did not change significantly (results not shown). We acknowledge that the retrospective nature of this study may allow for selection bias. Although patients with positive and negative margins differed in pathologic and clinical characteristics, subgroup analyses by D'Amico risk, TNM stage, and Gleason grade attempted to minimize the above differences. Patients who had insufficient clinical and pathological data, who were lost to follow-up, or who chose to follow-up elsewhere were not captured by this study, although every effort was made to do so. Analysis of available data for 278 excluded patients compared with the 1159 included patients did not show any significant difference except for the frequency of pelvic lymph node dissection, which was lower in the excluded group (48.6% vs. 58.9%). Performance of lymph node dissection was at the surgeon\'s discretion, and lower frequency of lymphadenectomy in the excluded patients suggests that this group was at a lower risk for nodal metastasis and recurrence. Thus, if these patients were included, resultant BRFS would likely increase. This study is also limited by the length of follow-up. Early stage/low-grade prostate cancer is indolent and BCR may not be captured within our follow-up interval, thus possibly minimizing the significance of SM. Because we are a tertiary care center, most of our patients receive follow-up care with their local urologists, and we are exploring other avenues for data capture such as on-line surveys, automated calls, and other such things. Future studies with longer follow-up would allow evaluation of more direct metrics, such as disease-specific survival, metastasis-free survival, and overall survival. CONCLUSIONS =========== This study confirms the significance of SM on BRFS in a large cohort of RALP patients. BCR rates for robotic, laparoscopic, and open series appear to be comparable. Our BRFS further validates a robotic-assisted approach for the treatment of prostate cancer. Longer follow-up is needed to better define the impact of margin status on BCR. A multi-institutional approach would further strengthen the role of RALP as comparable to radical retropubic prostatectomy.
{ "pile_set_name": "PubMed Central" }
Characteristic features of the heterologous functional synthesis in Escherichia coli of a 2[4Fe-4S] ferredoxin. Different strategies have been used to express synthetic genes all encoding Clostridium pasteurianum 2[4Fe-4S] ferredoxin (Fd) in Escherichia coli. The polypeptide can be produced as the C-terminal addition to a hybrid Cro::Protein A fusion protein lacking the metallic centers. The incorporation of the [4Fe-4S] clusters into the cleaved apoFd cannot be carried out in the same conditions as those affording holoFd from purified C. pasteurianum apoFd. In contrast, fully functional Fds can be produced from non-fused synthetic genes under the dependence of strong promoters. The yields of recombinant Fd, although sufficient to purify significant quantities of protein, are limited by the very short half-life of the 2[4Fe-4S] Fd in E. coli, irrespective of the expression system used. These features are characteristic of 2[4Fe-4S] Fds when compared with the far more stable recombinant rubredoxin, and probably other small iron-sulfur proteins which have already been produced in high yields. The reasons for the high turnover of 2[4Fe-4S] Fds are discussed.
{ "pile_set_name": "PubMed Abstracts" }
Image copyright Getty Images Deaf school pupils in Wales underachieve at every key stage and face being left behind without urgent action, a charity has said. The latest Welsh Government figures suggest the attainment gap widened again at GCSE level. National Deaf Children's Society Cymru is calling for more support and awareness in classrooms. Ministers said they were raising educational standards and investing in pupils with additional learning needs. Media playback is unsupported on your device Media caption Jayne Dulson from NDCS says nothing is changing The attainment results for deaf children in the last three years fluctuated, according to figures obtained by BBC Wales. In 2014, 48% of deaf children achieved a grade A* to C in the core subjects at key stage four - English/Welsh, maths and science - compared to 64% of peers who can hear. The following year the attainment gap narrowed - but last year it grew again with 48.5% of deaf pupils achieving the grades, compared to 69.5% of hearing children. And the problem is not confined to Year 11. Over the last three years, the attainment gap has remained the same or worsened at foundation phase and for primary school children aged 7 to 11. The figures come as organisations across the UK mark Deaf Awareness Week, which runs from 15 to 21 May. Four years ago, the National Deaf Children's Society Cymru launched the Close the Gap petition following a poor set of results. Debbie Thomas, policy and campaigns officer, said the latest results were "unacceptable". "Deafness is not a learning disability so that gap shouldn't be there and we need to make sure that deaf children and young people are appropriately supported so they can reach their full potential," she said. "There's no reason why they should be underachieving - other than the fact they're not accessing the appropriate support." Image copyright NDCS Image caption Poor acoustics in the classroom can make hearing even more difficult for partially deaf children Ms Thomas said there were also practical steps which could be taken. "The big thing that deaf children and young people tell us time after time is about raising deaf awareness and also about improving acoustics in the classroom but it's also about making sure that deaf children and their families are supported from the start," she added. The Welsh Government said its "national mission" was to improve attainment for all children, including those with additional learning needs (ALN), aims to raise standards via a range of reforms. A spokesman said: "Our ambitious Additional Learning Needs (ALN) Bill, if passed, will completely overhaul the system for supporting pupils with additional learning needs, including learners with hearing impairments. "The bill will place the learner at the heart of that process and will make the system far simpler and less adversarial for those involved." A £20m package of reforms will support the bill's implementation and wider plans, the spokesman added.
{ "pile_set_name": "OpenWebText2" }
Voyage of Time: The IMAX Experience is the logical next step for writer, director, and enthusiast of hands gently grazing wheat stalks Terrence Malick. The 45-minute, large-format version of his spin on the history of the world is as visually stunning, languid, and heavy on the voice over—a feature-length cut subs in Cate Blanchett for Brad Pitt as narrator—as you’d expect, but the nature doc framing gives him permission to ignore story and character entirely. In practice, the result is something much closer to the IMAX films of old—the kind of thing school children would watch during a field trip to a museum, except with a bit too much elliptical narration. (While seeing the movie’s stunning global-and-galaxy-trodding visuals on the IMAX-sized screen is enough reason to opt for the shorter cut, this thing does not need to be any longer.) Enjoyed on that level, Voyage of Time is a beautiful diversion, but almost entirely empty, even in its inquisitive big swings for profundity. C+
{ "pile_set_name": "OpenWebText2" }
Q: htaccess 301 redirect entire site but with exceptions I am trying to create an htaccess file to redirect my entire site except with some exceptions, but I can't get it working. I need to redirect the entire thing, provide a specific redirect, and exclude two pages. Below is my non-working sample. Thanks! RewriteCond %{REQUEST_URI} !^/events/index.html RewriteCond %{REQUEST_URI} !^/calendar/index.html Redirect 301 /info/faq.html http://mynewsite.com/my-page Redirect 301 / http://mynewsite.com A: You're attempting to mix mod_rewrite with mod_alias, but the RewriteCond statements cannot condition the Redirect statements, as they don't come from the same module. I believe you want something more like this, if I've correctly understood what you were trying to accomplish: RewriteEngine On RewriteCond %{REQUEST_URI} !=/events/index.html RewriteCond %{REQUEST_URI} !=/calendar/index.html RewriteCond %{REQUEST_URI} !=/info/faq.html RewriteRule ^.*$ http://mynewsite.com/$0 [R=301,L] Redirect 301 /info/faq.html http://mynewsite.com/my-page A: I had a similar issue. Trying to redirect an entire domain with the exception of its robots.txt file. Tim's answer didn't work for me, but this did RewriteEngine On RewriteRule robots.txt - [L] RewriteRule ^.*$ http://www.newsite.com/$0 [R=301,L]
{ "pile_set_name": "StackExchange" }
In one aspect, the present inventions described and illustrated herein relate to an integrated circuit device having a memory cell array including error checking and correcting (ECC) circuitry and/or column redundancy, and techniques for programming, configuring, controlling and/or operating such device. More particularly, in one aspect, the present inventions relate to an integrated circuit having random access memory (“RAM”) array having a plurality of memory cells (for example, memory cells having an electrically floating body in which an electrical charge is stored) arranged in a matrix of rows and columns wherein the integrated circuit includes an ECC architecture and/or a column redundancy architecture including at least one redundant column to substitute or replace a column of memory cells having at least one defective memory cell. Briefly, with reference to FIG. 1A, memory cell array 10 typically includes a plurality of memory cells 12 arranged in a matrix of rows 14 (each typically having a common word line 16) and columns 18. A row address decoder 20 enables one or more rows to be read by sensing circuitry 22 (for example, a plurality of sense amplifiers). A column decoder 24, in response to an address, selects one or more of the outputs of the sensing circuitry 22. One technique to improve the reliability of the data stored and/or output by dense memories is to employ ECC techniques. ECC techniques (for example, techniques to correct or reduce the impact of alpha particle induced soft error rate and/or errors caused by random defects in memory structures due to, for example, various complex fabrication processes) generally require the implementation of exclusive OR gates (“XOR”) to calculate the parity of the ECC word. A longer ECC word requires the calculation of parity of more bits and hence requires “wider” XOR gates. Conventional schemes for parity calculation using wide XOR gates must address the challenges associated with wiring the various bits (sometimes from across the width of memory array 10) to the inputs of XOR gates. Notably, conventional techniques tend to employ a XOR tree in the read path (Read XOR Tree) and write path (Write XOR Tree). (See, FIG. 1B). In addition, conventional implementations of the Single Error Correction (SEC) scheme using Hamming code often have a critical path for speed that begins from the bits read from the memory array (data and check bits), through the wide XOR gates to calculate the “syndrome” vector, which is then decoded to identify the position of the erroneous bit in the “ECC word”. This information is used to correct the error during the read operation. During the memory write operation, wide XOR gates are used to calculate the parity and produce the “check bits” for the ECC word, which are then written into the array along with the data. In order to improve, enhance and/or maintain a predetermined manufacturing yield of a memory cell array and/or device, one or more redundant columns 18r are often incorporated into memory array 10 to logically “replace” one or more columns 18 having one or more defective memory cells 12 and/or sense circuitry 22. In one conventional technique, column redundancy is implemented by including a redundant column address decoder 24r which is programmed or mapped to logically replace a defective column (i.e., a column of memory cells having one or more defective memory cells and/or defective sense circuitry 22) with spare, replacement, redundant or another column 18r of memory cells 12r in memory array 10 (i.e., redundant column 18r of memory cells 12r). The individual address comparators (not illustrated) of redundant column decoder 20r are programmed to “enable” spare or redundant data sense circuitry 22r when the “applied” address matches the address of the defective column (which is fixed/stored in redundant column address decoder 24r). In this regard, the address of the defective column 18 is programmed into address comparators of redundant column decoder 24r during wafer testing. In this way, the redundant column address comparators enable a spare or redundant data sense circuitry 22r to be active when a set of column address signals match the address of a defective column 18 which is programmed into redundant column address decoder 24r. One conventional redundancy technique employs a set of fuses to program or configure redundant column decoder 24r. In this regard, spare or redundant columns are programmed by selectively “blowing” fuses (not illustrated) within redundant column decoder 24r to “match” or correspond to the address of the columns having defective memory cells. Such fuses are often programmed prior to packaging, during the wafer testing stage, or immediately after packaging, during the device testing stage. In this way, spare or redundant data sense circuitry 22r (and data output path corresponding thereto) is enabled when the address matches the address programmed into redundant column decoder 24r. A multiplexer may be employed in the data output path that responsively selects between the data from normal column and a spare column. Under normal operation, the multiplexers select the data from normal column. The multiplexer associated with the defective column may be enabled to select the data from the spare column which thereby incorporates the data from the spare or redundant column into the output path. A multiplexer may also be implemented on the write input path, where the data slated to be written into the defective column is “steered” to the spare or redundant column. Notably, disabling circuitry may be implemented in memory array 10 to disable the data sense circuitry corresponding to the defective column when the address matches the address programmed into redundant column decoder 24r. As such, in response to a “match” between the applied column address and the address programmed in redundant column decoder 24r, normal data sense circuitry 22 (and data output path corresponding thereto) associated with the defective column is disabled and redundant data sense circuitry 22r (and data output path corresponding thereto) is enabled.
{ "pile_set_name": "USPTO Backgrounds" }
package cn.rongcloud.im.viewmodel; import android.app.Application; import android.net.Uri; import androidx.annotation.NonNull; import androidx.lifecycle.AndroidViewModel; import androidx.lifecycle.LiveData; import androidx.lifecycle.ViewModel; import androidx.lifecycle.ViewModelProvider; import cn.rongcloud.im.db.model.UserInfo; import cn.rongcloud.im.im.IMManager; import cn.rongcloud.im.model.Resource; import cn.rongcloud.im.model.Result; import cn.rongcloud.im.task.UserTask; import cn.rongcloud.im.utils.SingleSourceLiveData; import cn.rongcloud.im.utils.log.SLog; public class UserInfoViewModel extends AndroidViewModel { private final UserTask userTask; private IMManager imManager; private SingleSourceLiveData<Resource<UserInfo>> userInfo = new SingleSourceLiveData<>(); private SingleSourceLiveData<Resource<Result>> setNameResult = new SingleSourceLiveData<>(); private SingleSourceLiveData<Resource<Result>> uploadPotraitResult = new SingleSourceLiveData<>(); private SingleSourceLiveData<Resource<Result>> changePasswordResult = new SingleSourceLiveData<>(); private SingleSourceLiveData<Resource<Result>> setStAccountResult = new SingleSourceLiveData<>(); private SingleSourceLiveData<Resource<Result>> setGenderResult = new SingleSourceLiveData<>(); public UserInfoViewModel(@NonNull Application application) { super(application); imManager = IMManager.getInstance(); userTask = new UserTask(application); requestUserInfo(imManager.getCurrentId()); } public UserInfoViewModel(String userId, @NonNull Application application) { super(application); userTask = new UserTask(application); requestUserInfo(userId); } /** * 获取 UserInfo * * @return */ public LiveData<Resource<UserInfo>> getUserInfo() { return userInfo; } /** * 设置name 结果 * * @return */ public LiveData<Resource<Result>> getSetNameResult() { return setNameResult; } /** * 设置 StAccount 结果 * * @return */ public LiveData<Resource<Result>> getSetStAccountResult() { return setStAccountResult; } /** * 设置性别结果 * * @return */ public LiveData<Resource<Result>> getSetGenderResult() { return setGenderResult; } /** * 上传头像结果 * * @return */ public LiveData<Resource<Result>> getUploadPortraitResult() { return uploadPotraitResult; } /** * 密码修改 * * @return */ public LiveData<Resource<Result>> getChangePasswordResult() { return changePasswordResult; } /** * 设置用户名 * * @param newName */ public void setName(String newName) { setNameResult.setSource(userTask.setMyNickName(newName)); } /** * 设置自己的 SealTalk 账号 * * @param stAccount */ public void setStAccount(String stAccount) { setStAccountResult.setSource(userTask.setStAccount(stAccount)); } /** * 设置性别 * * @param gender */ public void setGender(String gender) { setGenderResult.setSource(userTask.setGender(gender)); } /** * 上传头像 * * @param uri */ public void uploadPortrait(Uri uri) { uploadPotraitResult.setSource(userTask.setPortrait(uri)); } /** * 修改密码 * * @param oldPassword * @param newPassword */ public void changePassword(String oldPassword, String newPassword) { changePasswordResult.setSource(userTask.changePassword(oldPassword, newPassword)); } /** * 请求用户信息 * * @param userId */ private void requestUserInfo(String userId) { SLog.d("ss_usertask", "userId == " + userId); userInfo.setSource(userTask.getUserInfo(userId)); } /** * 退出 */ public void logout() { imManager.logout(); userTask.logout(); } public static class Factory extends ViewModelProvider.NewInstanceFactory { private String userId; private Application application; public Factory(String userId, Application application) { this.userId = userId; this.application = application; } @NonNull @Override public <T extends ViewModel> T create(@NonNull Class<T> modelClass) { try { return modelClass.getConstructor(String.class, Application.class).newInstance(userId, application); } catch (Exception e) { throw new RuntimeException("Cannot create an instance of " + modelClass, e); } } } }
{ "pile_set_name": "Github" }
--- abstract: 'Mid-infrared observations of the Andromeda galaxy, M31, obtained with the Infrared Array Camera on board the Spitzer Space Telescope are presented. The image mosaics cover areas of approximately $3\fdg7 \times 1\fdg6$ and include the satellite galaxies M32 and NGC 205. The appearance of M31 varies dramatically in the different mid-infrared bands, from the smooth bulge and disk of the old stellar population seen at 3.6[ $\mu$m ]{}to the well-known ‘10 kpc ring’ dominating the 8[ $\mu$m ]{}image. The similarity of the 3.6[ $\mu$m ]{}and optical isophotes and nearly constant optical-mid-infrared color over the inner 400 confirms that there is no significant extinction at optical wavelengths in M31’s bulge. The nuclear colors indicate the presence of dust but not an infrared-bright active galactic nucleus. The integrated 8[ $\mu$m ]{}non-stellar luminosity implies a star formation rate of $0.4 M_{\sun}$ yr$^{-1}$, consistent with other indicators that show M31 to be a quiescent galaxy.' author: - 'P. Barmby, M.L.N. Ashby, L. Bianchi, C.W. Engelbracht, R.D. Gehrz, K.D. Gordon, J.L. Hinz, J.P. Huchra, R.M. Humphreys, M.A. Pahre, P.G. Pérez-González, E.F. Polomski, G.H. Rieke, D.A. Thilker, S.P. Willner, C.E. Woodward' title: 'Dusty waves on a starry sea: the mid-infrared view of M31' --- Introduction ============ The proximity of the Andromeda galaxy, M31, has long made it a prime target for studies of galaxy structure and stellar populations. One technique has been to isolate particular populations: for example, studies of luminous stars [@hmf90] showed that M31 has a lower massive star formation rate than M33 and the LMC. Global studies of particular components have also been valuable: H I maps provide estimates of the mass distribution [@bt04] and have recently revealed a population of high-velocity clouds [@thil04]. [*ISOPHOT*]{} [@haas98], [*MSX*]{} [@kraemer02], and [*IRAS*]{} [@habing84] observations showed a bright ring of infrared emission with radius 10 kpc coincident with many of the H II regions. Mapping the entire disk of M31 at mid-infrared wavelengths allows [*both*]{} local and global studies of the galaxy. Observations with the Infrared Array Camera [IRAC; @irac] on the [*Spitzer Space Telescope*]{} simultaneously trace the dust in the spiral arms at 8[ $\mu$m ]{}and the oldest stars in the disk and bulge at 3.6 and 4.5[ $\mu$m ]{}without the complicating extinction or distance effects that make such studies in the Milky Way difficult. IRAC observations of M31 are complemented by deep data now available at many other wavelengths. They also complement [*Spitzer*]{} studies of other nearby galaxies. This paper presents an initial look at the IRAC observations of M31, focusing on the surface brightness profiles and extended emission. Companion papers discuss longer-wavelength MIPS observations of M31 [@gordon06], IRAC and MIPS observations of the M31 satellite galaxy NGC 205 [@marleau06], and the implications of the galaxy’s morphology as seen in 8[ $\mu$m ]{}non-stellar emission [@block06]. A distance to M31 of 783 kpc [@sg98] is assumed throughout. All magnitudes are on the Vega system, using the calibration given by @reach05. Observations and Data Reduction =============================== The IRAC observations of M31 were taken as part of [*Spitzer*]{} General Observer program 3126 in 2005 January and August.[^1] Fifteen Astronomical Observation Requests (AORs) were used to map a region approximately $3\fdg7 \times 1\fdg6$ (chosen to match the [*Spitzer*]{}/MIPS observations made as part of program ID 99), with an extension to the NW to include NGC 205. The central $1\fdg6 \times 0\fdg4$ was covered by three AORs, each having two 12-second frames per position. The outer regions were covered by two AORs each with two dithered 30-second frames per position. This mapping strategy ensured that observations of each position in the galaxy were separated by at least 2.5 hours, allowing efficient asteroid rejection in data processing. The complete dataset consists of 3000 individual images in each of the IRAC channels. Data reduction began with the Basic Calibrated Data (BCD) produced by versions 11 (for the January data) or 12 (the August data) of the [*Spitzer*]{} Science Center (SSC) Pipeline. A ‘delta dark’ offset correction was applied to the 12-second 5.8[ $\mu$m ]{}frames to correct for the first-frame effect, followed by use of the ‘artifact corrector’ software developed by S. Carey, which attempts to remove the electronic effects caused by bright stars. The remaining processing steps were carried out using the “IRAC\_proc”[^2] software with the 2005 September 5 version of the SSC MOPEX package. The ‘overlap correction’ necessary to make the sky background consistent between frames was computed and applied. Median-combined mosaics of the full dataset were created, then projected into the reference frame of each input BCD image to create ‘source maps’. These source maps were used as the input ‘uncertainty images’ for creating the final photometric mosaics — this step prevents the outlier rejection used by MOPEX from rejecting pixels in bright sources and thereby biasing the photometry. The final mosaics were created with a pixel scale of 086, sub-sampling the native IRAC pixel scale by a factor of $\sqrt{2}$ to better sample the point spread function (FWHM $\sim1\farcs9$). The sky background was removed using the [iraf]{} task [imsurfit]{} to model the background as a polynomial surface sampled by ‘blank sky’ regions near the edge of the mosaics. After subtraction, the mean image counts in small areas within these regions were computed, and the standard deviation of these means used to estimate the photometric uncertainties due to the background. The final step in mosaic production was photometric calibration. Although calibration of point source photometry varies slightly over the IRAC arrays’ field of view [@reach05], we did not correct for this since doing so would have corrupted the extended emission. The calibration of IRAC is known to differ between point and extended sources, particularly at 5.8 and 8[ $\mu$m ]{}where a significant fraction of point-source light is scattered on scales comparable to the array size. We used the results of recent work by T. Jarrett (priv. comm.) to correct from point to extended source calibration in the M31 mosaics by multiplying the images by (0.91, 0.94, 0.66, 0.74) in the four IRAC bands, respectively \[these values differ slightly from those given in @reach05\]. The standard deviations of the background levels are about 0.04[ MJy sr$^{-1}$]{} in all bands except 5.8[ $\mu$m]{}, where the background subtraction was more difficult, and the noise was 0.1[ MJy sr$^{-1}$]{}(1$\sigma$). These correspond to limiting surface brightness levels of $21.2, 20.9, 19.0$, and 19.6 mag arcsec$^{-2}$ in the four IRAC bands. The final of mosaics are shown in Figure \[m31\_bw\]. As with other recent works on IRAC observations of nearby galaxies we assumed that the 3.6[ $\mu$m ]{}emission is purely due to stars, and used this to construct maps of the ‘non-stellar’ emission at 5.8 and 8[ $\mu$m]{}. The stellar emission at the two wavelengths is assumed to correspond to 0.399 and 0.232 $\times$ the 3.6[ $\mu$m ]{}emission [@helou04]. The 8[ $\mu$m ]{}non-stellar image is shown in Figure \[m31\_bw\]. Morphology and surface brightness profiles ========================================== M31’s appearance changes dramatically over the IRAC bands, in a similar way to other spiral galaxies such as M81 [@irac_m81] and NGC 300 [@helou04]. The 3.6[ $\mu$m ]{}view is similar to the $K_s$-band image presented in @2mass_lga: dominated by the bulge, with the spiral arms and disk relatively faint.[^3] At 8[ $\mu$m]{}, M31’s bulge is much less prominent, and the spiral arms and the 10 kpc ring are the dominant features. The outer (14 kpc) ring detected at far-infrared wavelengths [@haas98; @gordon06] and tentatively detected with [*MSX*]{} [@kraemer02] is also seen in the 8[ $\mu$m ]{}image. The 8[ $\mu$m ]{}image — particularly the non-stellar version — looks extremely similar to the 24[ $\mu$m ]{}image presented by @gordon06, showing the same split on the southwest side of the 10 kpc ring that @gordon06 attribute to interactions with M32. The ‘hot spots’ seen near the nucleus at 160[ $\mu$m ]{}are also prominent in the 8[ $\mu$m ]{}non-stellar image, where they coincide with the ends of spiral arms. Disk images $3\fdg3\times0\fdg9$ were extracted from the mosaics and used to derive IRAC surface brightness profiles of M31. Peaks of bright stars, a 1-radius region around M32, and image regions with no coverage were all masked from the profile measurements. Profiles were measured using two methods: making 20-wide cuts along the disk major and minor axes using the [iraf]{} task [pvector]{}, and fitting elliptical isophotes to the images using the [ellipse]{} task. Because [ellipse]{} can be unstable at low surface brightnesses, the isophote shape parameters (ellipticity, position angle, center) were constrained to be constant beyond the edge of the visible disk at semi-major axes $>0\fdg88$. The isophote fit at this distance has an ellipticity ($\epsilon=1-b/a$) of 0.73 and position angle of 38. Profiles in the three longer-wavelength bands were measured on the ellipses fit to the 3.6[ $\mu$m ]{}image, so that colors could be measured at the same spatial locations. The relative prominence of the M31 disk and bulge in the four IRAC bands is reflected in the major and minor axis profiles, shown in Figure \[fig\_axes\]. Out to a semi-major axis of $\sim400$ (approximately the edge of M31’s bulge), all four bands have very similar profiles. Beyond 400, the 5.8[ $\mu$m ]{}and 8.0[ $\mu$m]{}-band profiles decline more slowly and show more variability due to the clumpy nature of the dust emission. The 10 kpc ring is visible in all of the major-axis profiles; the 8.0[ $\mu$m ]{}profile in particular appears highly asymmetric because of the split in the ring. The minor axis profiles are smoother because they sample mainly the bulge. Both major and minor axis profiles are quite similar in shape to the optical profiles presented by @wk87, indicating that dust extinction does not have a major effect on the optical profiles. The nucleus of M31 is smaller than the IRAC PSF, and does not separate from the bulge emission in the radial profile. The color profiles of M31 shown in Figure \[fig\_colors\] also depict the disk/bulge separation. The median isophote colors within 400 are $[3.6]-[4.5] = -0.14$, $[3.6]-[5.8]=0.03$ and $[3.6]-[8.0]=0.13$. The $[3.6]-[4.5]$ color is consistent with theoretical expectations for M0 giant stars [see @pahre04]; the $[3.6]-[5.8]$ and $[3.6]-[8.0]$ colors are slightly redder, presumably because of dust emission. At larger distances, the disk dominates the light and the colors become redder, particularly at the location of the 10 kpc ring. Comparing the 3.6[ $\mu$m ]{}profile to the $r$-band optical profile of @kent87 shows that the $r-[3.6]$ color is nearly constant over the central 400, with a luminosity-weighted mean of $r-[3.6]=3.41$ mag. This corresponds to $r-K\approx3.1$, reasonably consistent with the predictions of @mar05. The colors of the M31 nucleus (measured in a 24-radius aperture, with the IRAC point source calibrations and aperture corrections applied) are $[3.6]-[4.5] = -0.15$, $[3.6]-[5.8]=0.19$ and $[3.6]-[8.0]=0.51$. The red colors at the longer wavelengths suggest that the nucleus has more dust than the bulge, but are not the very red colors characteristic of an AGN [e.g. @stern05]. Table \[tab\_mag\] gives integrated flux densities and magnitudes of M31 as measured in the largest elliptical isophote ($a=$18). The uncertainties in these values include the effects of background variation and a 10% uncertainty in the absolute extended source calibration. The IRAC flux densities are consistent with the COBE/DIRBE measurements at 3.5 and 4.9[ $\mu$m ]{}[245 and 128 Jy with 20% uncertainties; @ons98] and the [*MSX*]{} A-band (8.3[ $\mu$m]{}) value [$159\pm32$ Jy; @gordon06]. Near-to-mid-infrared colors are another way to check our photometry: @amh80 measured $H=1.42$ in a 1554 diameter circular aperture centered on M31. In the same aperture the 3.6[ $\mu$m ]{}magnitude is 0.84, giving $H-[3.6]=0.58$. Using M81’s $K_s-[3.6]\approx0.3$ [@irac_m81] and the mean $H-K_s= 0.27$ measured for early-type (S0/Sa/Sb) spirals by @2mass_lga, one would predict $H-[3.6]=0.57$, in very good agreement with our measurement. A model light distribution consisting of an $r^{1/4}$ bulge and exponential disk were fit to the 3.6[ $\mu$m ]{}semi-major axis surface brightness (SB) profile. The structural parameters fitted to the disk are sensitive to inclusion of the ring at semi-major axis lengths $2000 \leq a \leq 3500$ arcsec, while the bulge effective radius is sensitive to the inner fitting cutoff due to deviations from the idealized $r^{1/4}$ model at $a < 100$ arcsec [see @kent83]. The sky value for the image was determined at isophotes roughly corresponding to $3.5$ disk scale lengths. As there is still some galaxy emission at this radius, our sky value is likely over-estimated and is probably the dominant cause of the significant reduction in the SB at $a > 4000$ arcsec (smaller, but still significant, errors will be present in the profile at $a < 4000$ arcsec). We chose the fitting regions of $100 \leq a \leq 2000$ and $3500 \leq a \leq 4000$ arcsec to minimize these effects, and for consistency with previous work. The resulting model has (bulge,disk) half-light semi-major axis lengths of $(10.3\pm 0.4,44.7\pm 0.6)$ arcmin, average ellipticities near to those scale lengths of $(0.48\pm 0.02,0.68\pm 0.04)$, total magnitudes $(0.84\pm 0.13,0.58\pm 0.06)$, and RMS of $0.02$ mag. The corresponding circularized effective radii are $(7.5\pm 0.3,25.2\pm 0.7)$ arcmin. This disk major axis scale length of $6.08\pm 0.09$ kpc compares well with the longest wavelength ($R$-band) value of 5.9 kpc measured by @wk88. The ratio of the bulge effective radius of $1.70\pm 0.07$ kpc to disk scale length place M31 on the upper envelope of local spiral galaxies [@dej96]. The fitted bulge and disk models have a flux ratio $B/D = 0.78 \pm 0.11$. This value is biased high relative to the true ratio, however, because the bulge model is too bright at $a < 100$ arcsec and the disk model is too faint at the location of the 10 kpc ring. @wk88 calculate a similar value in the $R$-band. The model-fitting allows an estimate of M31’s total magnitude at 3.6[ $\mu$m ]{}through extrapolation of the disk model to infinite radius. The magnitude within $a < 4000$ mag is 0.19 mag, the extrapolated disk from 2.5 scale lengths to infinity adds an additional 0.38 mag, and the sky subtraction errors on the SB profile within this isophote result in an additional 0.15 mag. The implied total magnitude of M31 is therefore $-0.34$ mag. We have chosen not to quote this model-dependent value in Table 1 for consistency with previous work and our measurements at other wavelengths, but it is consistent with the measurement in the 18 isophote given there when similar corrections are applied. The errors on the total magnitude of M31 are dominated by the systematic error of sky subtraction on this large galaxy, and less so on the extrapolation of the disk emission. The 3.6[ $\mu$m ]{}luminosity of M31 can be used to estimate the galaxy’s stellar mass. Using a typical value of $B-R=1.5$ from @wk87 and the color-dependent mass-to-light ratios of @bdj01, an estimated $M/L_K$ for M31 is about 0.8 in solar units. Using $K-[3.6]=0.3$ and multiplying by $M/L_K$, the resulting stellar mass is $1.1\times10^{11} M_{\sun}$. Recent dynamical mass estimates of the M31 disk+bulge [e.g., @wps03; @gee06] are $\sim10^{11}M_{\sun}$, in reasonable agreement with this derived stellar mass. Asymptotic giant branch (AGB) stars can be important contributors to the total near-infrared luminosities of galaxies [@mar05]. However, the most luminous AGB stars are predicted by @gro06 to have much redder colors ($0.5<[3.6]-[4.5]<1$) than observed for M31, so we conclude that they do not dominate M31’s 3.6[ $\mu$m ]{}luminosity. The 8[ $\mu$m ]{}non-stellar emission is dominated by the 7.7[ $\mu$m ]{}polycyclic aromatic hydrocarbon (PAH) band, which is a useful though imperfect star formation rate (SFR) indicator. It is therefore instructive to compare the M31 8[ $\mu$m ]{}luminosity with other star formation indicators, such as H$\alpha$, radio, and total infrared luminosities and with these values for other galaxies. @wu05 derived a calibration for SFR as a function of 8[ $\mu$m ]{}non-stellar luminosity $\nu L_{\nu}[8\mu{\rm m(dust)}]$ (hereafter $L_8$) using correlations between $L_8$ and $L({\rm H}\alpha)$ and $L(1.4 {\rm GHz})$. The IRAC 8[ $\mu$m ]{}non-stellar flux density measured for M31 corresponds to a luminosity of $\log(L_8/L_{\sun})={8.8}$. The @wu05 calibration yields an SFR of $0.4 M_{\sun}$ yr$^{-1}$. It is possible to compare M31’s 8[ $\mu$m]{}-derived SFR with SFRs from other indicators, but since all such indicators have calibration uncertainties \[e.g., the @wu05 8[ $\mu$m]{}/SFR calibration is based on a small number of galaxies with a limited range of properties\], we instead compare the observed properties directly. To estimate the $H\alpha$ luminosity of M31, we convert the value given by @dev94 to the 780 kpc distance, multiply by 0.8 to account for \[NII\] contamination, and multiply by 3.4 [as done by @wb94] to correct for extinction. The resulting $L({\rm H}\alpha)=2.6\times 10^7 L_{\sun}$, which predicts $\log(L_8/L_{\sun})=9.1$. The 1.4 GHz radio flux density measured by @bbh98, $3.34\times 10^{20}$ W Hz$^{-1}$, yields a predicted $\log(L_8/L_{\sun})=8.4$. Figure 12 of @dale05 gives the ratio of $\nu f_{\nu}[8\mu{\rm m(dust)}]/f(3-1100\mu{\rm m})$ as a function of $f_{\nu}(70 \mu{\rm m})/f_{\nu}(160 \mu{\rm m})$ for SINGS galaxies. From @gordon06, M31 has $f(70)/f(160)=0.12$, with the corresponding $f(3-1100\mu {\rm m})=2.57\times10^{-10}$ W m$^{-2}$, yielding a predicted $\log(L_8/L_{\sun})=9.0$. The H$\alpha$ and far-infrared predictions are in reasonably good agreement, and are consistent with the observed 8[ $\mu$m ]{}luminosity given the scatter in the relationships. The 8[ $\mu$m ]{}luminosity predicted from the radio flux is lower than observed, perhaps indicating that some extended emission was resolved out of the radio maps. All of the ‘star-formation’ luminosities are at the low end of the galaxy distribution. Despite its prominent star forming ring, M31 is a predominantly quiescent galaxy. We thank the referee for helpful suggestions. This work is based on observations made with the Spitzer Space Telescope, which is operated by the Jet Propulsion Laboratory, California Institute of Technology under a contract with NASA. Support for this work was provided by NASA through an award issued by JPL/Caltech. Facilities: , M., [Mould]{}, J., & [Huchra]{}, J. 1980, , 237, 655 , R., [Berkhuijsen]{}, E. M., & [Hoernes]{}, P. 1998, , 129, 329 , E. F. & [de Jong]{}, R. S. 2001, , 550, 212 , D. L., [Bournaud]{}, F., [Combes]{}, F., [Groess]{}, R., [Barmby]{}, P., [Ashby]{}, M. L. N., [Fazio]{}, G. G., [Pahre]{}, M. A., & [Willner]{}, S. P. 2006, Nature, 443, 832 , R. & [Thilker]{}, D. A. 2004, , 417, 421 , D. A. [et al.]{} 2005, , 633, 857 , N., [Price]{}, R., [Wells]{}, L., & [Duric]{}, N. 1994, , 208, 1667 , R. S. 1996, , 313, 45 , G. G. [et al.]{} 2004, , 154, 10 , J. J., [Fardal]{}, M. A., [Babul]{}, A., & [Guhathakurta]{}, P. 2006, , 366, 996 , K. D. [et al.]{} 2006, , 638, L87 , M. A. T. 2006, , 448, 181 , M., [Lemke]{}, D., [Stickel]{}, M., [Hippelein]{}, H., [Kunkel]{}, M., [Herbstmeier]{}, U., & [Mattila]{}, K. 1998, , 338, L33 , H. J. [et al.]{} 1984, , 278, L59 , G. [et al.]{} 2004, , 154, 253 , R. M., [Massey]{}, P., & [Freedman]{}, W. L. 1990, , 99, 84 , T. H., [Chester]{}, T., [Cutri]{}, R., [Schneider]{}, S. E., & [Huchra]{}, J. P. 2003, , 125, 525 , S. M. 1983, , 266, 562 , S. M. 1987, , 94, 306 , K. E., [Price]{}, S. D., [Mizuno]{}, D. R., & [Carey]{}, S. J. 2002, , 124, 2990 , C. 2005, , 362, 799 , F. R., [Noriega-Crespo]{}, A., [Misselt]{}, K., [Gordon]{}, K., [Engelbracht]{}, C., [Rieke]{}, G., [Barmby]{}, P., & [Willner]{}, S. P. 2006, , 646, 929 , S., [Newmark]{}, J., & [Smoot]{}, G. 1998, , 500, 554 , M. A., [Ashby]{}, M. L. N., [Fazio]{}, G. G., & [Willner]{}, S. P. 2004, , 154, 229 , W. T. [et al.]{} 2005, , 117, 978 Stanek, K. Z. & Garnavich, P. M. 1998, , 503, L131 , D. [et al.]{} 2005, , 631, 163 , D. A., [Braun]{}, R., [Walterbos]{}, R. A. M., [Corbelli]{}, E., [Lockman]{}, F. J., [Murphy]{}, E., & [Maddalena]{}, R. 2004, , 601, L39 , R. A. M. & [Braun]{}, R. 1994, , 431, 156 , R. A. M. & [Kennicutt]{}, R. C. 1987, , 69, 311 , R. A. M. & [Kennicutt]{}, R. C. 1988, , 198, 61 , L. M., [Perrett]{}, K. M., & [Suyu]{}, S. H. 2003, , 588, 311 , S. P. [et al.]{} 2004, , 154, 222 , H., [Cao]{}, C., [Hao]{}, C.-N., [Liu]{}, F.-S., [Wang]{}, J.-L., [Xia]{}, X.-Y., [Deng]{}, Z.-G., & [Young]{}, C. K.-S. 2005, , 632, L79 [crr]{} 3.6 & $259\pm32$ &$ 0.09\pm0.13$\ 4.5 & $144\pm20$ &$ 0.24\pm0.15$\ 5.8 & $190\pm35$ &$ -0.55\pm0.20$\ 8.0 & $151\pm21$ &$ -0.93\pm0.15$\ 8.0 (non-stellar) & $91\pm21$& [^1]: A large solar proton event made most of the January data unusable; re-observations were made in August. [^2]: IRAC\_proc was developed by M. Schuster, M. Marengo and B. Patten at the Smithsonian Astrophysical Observatory. [^3]: The 2MASS Large Galaxy Atlas image of M31 is suspected of having an overly-faint disk due to problems with background subtraction (T. Jarrett, pers. communication). We do not compare the IRAC quantitative measurements to those given by @2mass_lga, instead estimating M31’s $K-[3.6]$ color by M81’s value of 0.3 [@irac_m81].
{ "pile_set_name": "ArXiv" }
{ "created_at": "2015-02-27T22:29:06.719801", "description": "Utilite to backup items from Google Reader", "fork": false, "full_name": "wistful/grbackup", "language": "Python", "updated_at": "2015-02-27T23:43:57.928050" }
{ "pile_set_name": "Github" }
"Mark?" "Mark?" "Mark, please ask your father if he wants a burger." "Mom." "I know." "You're defending the free world." "Please ask your Dad if he wants a burger." "Dad?" "Dad?" "Mom wants to know if you want a burger." "Mom, I don't know what he wants." "You ask him." "Aunt Arlene!" "Want a burger?" "Okay." "The guy drove his wheelchair into a pool." "House would love that." "He'll be bored." "It's a great visual, but it's diagnostically boring." "What about post-hair-transplant aphasia guy?" "Infection-throwing clots." "House will shoot it down and call you an idiot." "Oh, well, we wouldn't want that." "What about yoga girl?" "It has a good hook." "Should we lead with it?" "His first day back, he might want to flex his sarcasm muscle." "Maybe we open with one of the weaker pitches." "You ran here?" "It's just eight miles." "Why did you..." "Why does a dog lick its workplace-acceptable euphemism for testicles?" "Because he can." "What have you got for me, boss?" "I thought you said you needed eight weeks of rehab." "You should have been back here..." "If I'd come back sooner, then I'd only be able to run six miles." "I never would have made it in." "What have you got for me?" "You're completely pain-free?" "The ketamine treatment can wear off." "It's been two months." "It's not wearing off." "What have you got for me?" "You can take as long as..." "Why are we having this discussion?" "Want to hear me thank you again?" "Thank you, Doctor Cuddy, not just for removing the bullet, but thank you for putting me into a ketamine-induced coma and changing my life." "Happy?" "I am." "Middle-aged man had hair transplant about two months ago..." "Infection-throwing clots." "You're an idiot." "Except you're not an idiot, and she is holding a file for a 26-year-old female." "What have you really got for me?" "Girl was doing an inverted yoga pose, neck snapped, paralyzed from the neck down, except the x-rays show no evidence of spinal injury." "And she's cute." "Oh, well played, sir." "What about Stephen Hawking trying to do the 500 butterfly?" "Forget it." "Brain cancer, brain surgery." "There's nothing left to diagnose." "I would take the other one." "I'll take them both." "You don't think he had brain cancer?" "Of course he had brain cancer." "Even oncologists don't screw up for eight years." "So if there's no diagnostic issue, why are you taking the case?" "Treatment can be interesting." "Not to you." "I've changed." "No, you haven't." "No, I haven't." "So why are you taking the case?" "The guy tried to kill himself." "The guy had cancer." "He's a lump." "He hasn't been able to touch his wife, speak to his kids." "He's been in that chair for eight years." "His muscles have atrophied." "Maybe I can help him with the pain." "Isn't that enough of a reason to want to help?" "Not for you." "I've changed." "No, you haven't." "Then why am I taking this case?" "Let's start with the cute paraplegic." "Welcome back." "Hey." "You look..." "Healthy." "Quad with no broken neck." "Struck me as odd." "You can take a whole two minutes to ease into being back." "I would've taken a whole month to ease back, but eight weeks is the maximum rehab time for a gunshot wound to the stomach and neck, so go." "We heard they never found the guy." "There's no new leads." "What?" "You think he might have shot this patient, too?" "It would explain her symptoms." "It could be MS." "See?" "It's not so difficult." "It's not MS." "She had no symptoms before she climbed onto her head." "Unless she's been upside-down for the last 10 years, MS ain't it." "Could be transverse myelitis, swelling in the disks, choking off nerve function." "MRI is negative for that." "Your leg looks fine." "Totally pain-free?" "When did this turn into, "What did you do over your summer vacation?"" "It's a little weird to discuss the case while you're staring at your blood on the floor." "I asked Cuddy to replace the carpet." "I like the carpet." "What did you do over the summer?" "I..." "Redo the tests." "Let's see if the source of the problem is in the limbs or the spine." "Do an EMG." "Whoa, whoa, whoa, whoa, whoa." "We've got a whole other quad to cover." "This guy's still got fluid in his lungs." "You don't think that's from the pool he drank?" "Give him an O2 mask." "His leg muscles have atrophied." "Tendons have shortened from disuse, causing intense pain." "Tendon surgery will make him more comfortable." "Comfortable?" "Scoot." "Thanks for being here." "Not a problem." "My Dad wouldn't kill himself." "You haven't spoken to him in over six years." "I know my dad." "Mark, the doctor's just trying to..." "He wouldn't kill himself." "Fine." "I'm wrong." "You obviously have a better understanding of this man who drools in front of your TV set 24 hours a day." "Doctor House?" "Look, he must have been confused, all right?" "It must have been an accident." "I hope it was a suicide attempt." "If he was trying to kill himself, then he knows how miserable his life is." "It means there's still something there to kill." "It means your dad's still there." "Sorry." "Need you." "Thank you." "We were doing the EMG, but we never got past the insertion of the conduction pin." "Did she just say, "Thank you"?" "I loaned her some money." "What went wrong?" "Nothing went wrong." "If nothing went wrong, then something went right." "You're not gonna tell me why she thanked you?" "You're not gonna tell me what went right?" "You did something for which she is grateful, and you're embarrassed?" "For you." "She saw you coming up, thought you were a 1 4 year-old boy." "I set her straight." "I am not telling you what went wrong or right until you tell me why she said, "Thank you."" "Oh, you got me." "You know I need to know." "I am so gonna fold." "Except you're forgetting there's one thing I can do now." "It's either that or a reflex response." "What happened?" "Okay." "This is Doctor House." "House, this is Caren..." "Pleasure's all mine." "What happened?" "When we inserted the conduction pin, she flinched." "She flinched?" "Did you hear?" "Does that mean I'm getting better?" "How big is a flinch?" "Bigger than a twitch?" "Smaller than a spasm?" "Do you smoke?" "Socially, not a lot." "You do yoga, and you smoke?" "I know it's hypocritical, but..." "No, the world sees your legs." "No one's checking out your lungs." "How would smoking cause..." "It wouldn't." "I just needed a lighter." "House." "Oh, my God!" "The case was looking so promising." "Hey, I'm not faking." "You moved, therefore you can move." "Get this lunatic out of here before she bores again." "I'm not faking!" "I heard you were watching surgery with a patient's family, talking to a patient's family." "It's because of your hallucination, isn't it?" "After you were shot." "You chose life." "You decided you wanted meaning, so you took a case with no mystery, something any doctor could do, a case with no upside except the satisfaction of helping another human being." "She thanked me." "And you felt nothing." "I wasn't sure what I was supposed to feel." "It's like your leg." "It's atrophied." "Keep working it." "The feeling will come." "Sorry." "Need you again." "I told you to get rid of her." "It's a good thing we didn't." "Tightness in her chest." "She can't breathe." "It could be pleural effusion." "Right." "Either that or she's holding her breath like a four-year-old." "Relax." "I'm not gonna burn you again." "I'm going to stab you!" "Look, either you're faking, or you've got a pleural effusion." "That's a buildup of fluid around the lungs, which is very serious, and I would have no choice but to stab you in the back with this needle and suck all of the fluid out of you." "So..." "We should give her a local." "That would defeat the point of me being nasty." "Ready?" "Down." "She can't breathe if she's down." "Down." "She can't..." "Down, down, down!" "Come on!" "That's not a pleural effusion." "The problem's in her heart." "Can't fake that." "Had to relieve the pressure three times in the last two hours, so either we figure out what's causing blood to build up around her heart, or I follow her around with a needle for the rest of her life." "Echo was clean." "No structural abnormalities." "It could be an infectious process, TB." "Or vasculitis would also explain the effusion." "But not the paralysis." "Let's assume that she wasn't faking it." "She moved, therefore she could move." "She wasn't paralyzed." "Doesn't mean she was faking." "It could have been a delusion." "Now, either she was faking and coincidentally got a real cardiac problem at the exact same time, or it's a delusion, and the fake paralysis is a real neurological symptom." "Are you thinking vascular tumor on her spine?" "Her platelets are normal." "And she's been scanned up and down." "It's all clean." "So open her up and find it." "So what do you want us to do?" "Just start at her neck and just keep on cutting down her spine until we stumble on something?" "That should work." "His heart rate's a little high." "Should I be worried?" "Probably just means he's still in discomfort from the surgery." "I'm gonna up his morphine a little." "You've been so nice to us." "It's the job." "No, I mean, all the other doctors, all they did was obsess on the cancer, the treatment, the damage, just trying to fix him." "You're the first doctor that's ever given a damn about the quality of his life." "His heart rate's come down." "The morphine worked." "I was right." "What a touching moment." "That's why we become doctors, for these rare moments when our hearts are warmed..." "Would you like to get a drink?" "Are you serious, or are you just trying to change the subject?" "No, I'm serious." "I drink." "You drink." "We could do it at the same time, the same table." "If you eat, we could do that, too." "I mean, if the answer's no, that's cool, but..." "No, it's just you're just coming off of surgery, and you're not yourself yet, and I work for you, and even though last year's..." "You're smiling." "I'm saying no, and you're smiling." "Well, don't take it personally." "It's just 'cause you're full of crap." "You have no interest in going out with me." "Maybe you did, when I couldn't walk, when I was a sick puppy that you could nurture back to health." "Now that I'm healthy, there's nothing in it for you." "You are not healthy." "Cuddy wants to see you." "You've been back at work 24 hours, and you're already playing hide-and-seek in a woman's spine." "Who won the pool?" "There's no tumor." "Her platelets are normal." "The scans didn't..." "What's the worst that can happen?" "Might paralyze her." "She won't even notice." "Her lawyers might." "You're not doing the surgery." "And lower the morphine on your other patient." "Fine, I'll lower it if you let me do the surgery." "What?" "You want to trade?" "We're not swapping a couple of goats for your help putting up a barn." "You want something." "I want something." "We compromise." "It's the grownup way to resolve our differences." "There already is a mechanism for that, it's called the employer-employee relationship," "I get what I want, and you don't." "You tried to swap?" "Ran a few more tests." "They came back negative." "The surgery's on." "You really don't give a crap, do you?" "Does that make me evil?" "Yeah." "The girl's life is at stake." "All we're talking about with the guy is..." "All we're talking about is the reason you took the case, to help someone." "Too bad for them." "Too bad for you." "The reason we crave meaning is because it makes us happy." "The first level of happiness..." "I'm not going away." "The fifth level of happiness involves creation, changing lives." "The sixth level is heroin." "The seventh level is you going away." "You're saving lives, which is tantamount to creating lives, but all you're taking away from this is the game." "You don't have to listen to them thanking you." "You don't have to change the cases you take or even how you handle them." "You just have to know that you made a difference." "House!" "You're not..." "I'm not an idiot." "Move." "House, leave her alone." "Close her up." "You want to know why?" "The room's no longer sterile." "True, but it's not the most interesting reason." "That is not a sexy big toe." "You'd never put that in your mouth." "What the hell does that got to do..." "I told you it was interesting, but it gets even better." "Scurvy?" "Yeah." "Drink." "Like what sailors get when they don't eat right?" "Aye, aye." "Your arms and leg tissues are choked with blood." "It makes it hard to move." "It also damages your hair and toenails." "But I'm on this great diet, lots of protein, lots of..." "No vitamin C. Now drink." "Well, thank you." "And thank Doctor House." "You can send him a note." "The nurse changed his morphine." "I thought you were worried about..." "It's just post-op discomfort." "He's ready to go home." "So he won't have any pain?" "Eventually." "Thank you." "Everything else will be the same." "Well, you took away his pain, and that changes a lot." "Why don't you put him in some sort of facility, some place without a pool?" "Yeah, I could dump him there, except he's my husband." "He's my son's father." "Right." "Kids need a dad, someone to play catch with, talk about girls." "You know, Mark's learning that you don't have to abandon someone just because..." "Get a dog." "I'm taking care of him for the same reason you helped us." "Because some guy shot you, and you hallucinated?" "I have a responsibility." "So he's just an anchor, weighing you and your family down, sapping your energy, wasting your life?" "That's the meaning you take from this?" "I want to take care of him." "You enjoy this?" "I can't abandon him." "So you don't want to take care of him?" "Taking care of him doesn't fulfill you, make you happy, but not taking care of him would make you miserable?" "Hmm." "Okay, here we go." "Okay, slowly." "I don't need your help." "I've done this a million times." "Here, lie him like that." "Do that again." "Make that sound." "What was that?" "That was talking." "You guys are lousy doctors." "You were in such a rush to make the patient feel better, you forgot to check what was wrong." "Yoga girl walked out of here two hours ago." "You fixed her." "Not her." "The other guy." "He had brain cancer." "They removed it eight years ago." "His condition's been the same ever since." "Until last night." "He spoke." "What'd he say?" "He grunted?" "You want us to dissect eight years of medical history with grunting in the differential?" "Sounds good." "Call me when you're done." "You're fabricating a mystery because you're bored." "I am not bored." "Damn it!" "You didn't tell the wife it was only a grunt?" "Of course not." "'Cause then she would never have consented to" "I don't remember you being this bitchy." "The Vicodin dulled it." "In the sober light of day, I'm a buzz-kill." "You're giving false hope to a family that's been wrecked." "Don't torture them." "Let it go." "Tell the wife it was only a grunt." "Tell her to go home." "I can't let her down like that." "I pumped her up with too much false hope." "I stuck that primo!" "How rad am I?" "2002, patient had dry eyes." "Dry eyes plus a grunt." "It all makes sense." "Could be a neurological issue." "I get hay fever, I put drops in my eyes." "I don't go to a neurologist." "Dry eyes could indicate an autonomic dysfunction." "It goes on the board." "What about coughing or boogers?" "Should we include boogers?" "I'm happy we're doing this." "I'd much rather do this than lengthen some guy's tendon." "Patient's headaches increased." "Doc scanned his head, found a tumor." "You like wasting your time?" "I'm learning." "To do what?" "Reconsider solved cases because you don't wanna deal with the real world?" "He's pushing where there's nothing." "Cameron, you are an excellent doctor." "You'll get lots of tearful thank-yous from grateful patients." "Yeah, aren't I such a bitch for wanting that?" "No, it's not a bad thing, but it's not why I'm here." "I took this fellowship to learn from House." "He's teaching you to be a masochist." "Dry eyes goes on the board." "In eight years, the patient experienced 214 symptoms, many of them repeated." "Any patterns?" "Fever plus frequent urination could mean prostatitis." "Or a urinary-tract infection." "White count was normal." "No infection." "If you add pain into the mix, fever, frequent urination could indicate a kidney problem." "I like it." "No, creatinine and BUN were both normal." "Not the kidney part." "The pain part." "Abdominal pain plus all that stuff could equal a pancreatic cyst." "Perfect." "You managed to pick the one symptom he never had, abdominal pain." "It's the first symptom on the board, "grunt."" "Grunting isn't pathognomonic for abdominal pain." "No, the traditional diagnostic marker is compression of the diaphragm, vibration of the larynx, leading to the audible sound," ""I have a pain in my abdomen."" "Richard's symptoms are culled from eight years of medical history." "They're not patterned." "These are random, individual events over time." "Illnesses have incubation periods." "Do an upper endoscopic ultrasound." "His throat will collapse." "Muscle degeneration in his neck won't tolerate the scope." "It's an automatic trach." "You're talking about him like he's an invalid." "We were insensitive." "Does he drool?" "Can he hold his neck straight?" "Does he choke on his food?" "His neck's fine." "His throat's not gonna collapse." "Cameron, get consent from the wife." "Open." "I need you to swallow." "Sorry about that." "Here we go." "We're passing through the lower esophageal sphincter into the antrum of the stomach." "There's the tail of the pancreas." "Looks clean." "Moving medially." "The body and the head of the pancreas look clean." "Get it out." "Get it out." "It's stuck." "I can't move it." "His throat's collapsed." "His vitals are all over the place." "We're losing him." "Cutting." "We trached him, endoscopically removed the probe, and he's breathing again, so, all in all, great idea." "Get a look at the pancreas before the world ended?" "It was clean." "Which means, barring anything else, meaning you, he can go home tomorrow." "This man nearly died." "How can you discharge him?" "His throat collapsed because of what we predicted." "You stick something down someone's throat, they gag, spasm, which he did." "It took us a half an hour to get the thing out." "Except our patient's throat was sedated, which means the brain should have sent a signal not to do anything." "This could be cancer or some bizarre neuro-degeneration, even a new type of vascular..." "Stop it." "You're enjoying this." "I find it interesting." "It's interesting only if you're right." "If you're wrong, we're torturing this guy to amuse you." "Half hour to remove the probe?" "House." "It's not a spasm." "His throat didn't collapse." "It locked down." "The brain is supposed to tell every muscle in the body to relax and contract at the same time." "This muscle was only contracting, which means the signal from the brain was not getting through." "There are no lesions on his brain, nothing to interrupt any orders." "All it takes is one wire down." "You have no evidence of any wires down." "A few microtumors on the meninges, and suddenly you're choking to death." "You want to look at the lining of his brain?" "The amount of contrast material you need to pump up there just to see..." "He'll bleed into his brain!" "No, he won't." "Because that wouldn't be interesting." "You can get permission this time." "The brain is enclosed in a sack called the meninges." "Does this mean the cancer's back?" "No." "No, no, no." "House." "If we found cancer, it wouldn't be the original cancer." "It'd be new." "So, what, more surgery, more radiation." "Might not be the worst thing." "If this isn't just ancient history, then maybe it's something we can correct." "Might even get some brain function back." "He could get better?" "No." "But understanding what you're saying will be nice." "Maybe you could figure out ways to communicate." "Thank God he spoke to you." "Mrs. McNeil, the test to do this is very risky." "He could die." "He's already dead." "Chase, go slow." "I've already injected it into his spinal canal." "Next stop, his brain." "Contrast material entering into the fourth ventricle." "No parenchymal bleeds." "Blood pressure's high, but it's holding." "Meninges are intact." "No bleeding." "Oh, God." "Foreman, get in here." "Surgeon repaired the CSF leak." "You're lucky he didn't die." "I'm lucky?" "He's the one who didn't die." "We told you he'd hemorrhage." "You told me he'd bleed into his brain, not out of his ear." "You've got to drop this." "We're missing something." "We did a dangerous test, and something bad happened." "That's all this is." "Give me a tour of the brain, Foreman." "Walk me through the scans." "1998, what happened?" "Five-centimeter, grade-four astrocytoma between the parietal..." "Nothing." "Next?" "The speck on the superior temporal region." "It's a re-growth, benign." "The star thingy next to the Rathke cleft?" "Scar tissue from a biopsy." "House, every speck is not a suspect." "It's years of surgeons digging around in his head." "Let him go." "Redo every blood test he's ever had." "Rescan his head." "No." "He's been sick and suffering for eight years." "I'm not gonna help you make it worse." "I'm not gonna help you make it interesting." "That's okay." "Foreman's better at that stuff than you are." "We need five-millimeter cuts through the occipital and hypothalamic regions." "No." "How many millimeters?" "I can help him." "That's it?" "That's your argument?" "It seems like a good one." "If I thought for a second you wanted to help him, you'd have carte blanche." "You're doing this because it's fun." "Does nobody in this hospital have anything better to talk about than my motives?" "My motives have nothing to do with the case." "Your motives have everything to do with your judgment." "For the first time in years, I got no opiates in my body." "Now you question my judgment?" "Twenty-four times a year, you come storming into my office, spouting that you can help someone, only you never say those words." "You say something like," ""His pancreas is gonna explode because his brain is on fire."" "You come here with medicine, not with platitudes." "I didn't wanna bore you with the details." "There are no details." "You have a hunch." "House, you don't use hunches." "You always have reasons." "This hospital doesn't exist for your whims." "I'm sorry." "As of 7:00 a.m. tomorrow morning, I'm sending your patient home." "The answer's no." "Cuddy called 30 seconds after you left and said you'd try an end-around." "My leg hurt." "How bad?" "Enough that I'm telling you." "Did it go away?" "Ached for a while." "First time I've felt anything there since the surgery." "But it went away?" "It was muscular." "There was some cramping." "What are you smiling about?" "You're 40-something years old." "You've been running God knows how many miles a day, fallen a hundred times off that skateboard, and you're shocked to have some soreness?" "Just give me a prescription." "For Vicodin?" "House, people get aching joints, cramps." "They put on an ice pack." "They take some ibuprofen." "I know what the pangs of middle age feel like." "No, you don't because you've been stuffing Vicodin every five minutes since you turned middle-aged." "The surgery didn't work." "Don't play me." "You think this is a scam?" "I think you want me to feel sorry for you and either do the end-around on Cuddy or give you the drugs." "Either way, you get the high you think you need." "House, your surgery worked." "You're fine." "It's just gonna take time for it to feel good." "Circumventricular system senses cytokines released in the early stages of the immune response, but CVOS releases prostaglandins that reset the hypothalamic set point upward unless it's countered by antipyretic therapy, so, yeah, his brain is on fire." "The suicide attempt was not a suicide attempt." "He drove that wheelchair into the pool because he couldn't regulate his body temperature." "He had a hypothalamic dysregulation." "And you discovered this when you stepped into the university pool?" "Fountain." "I can cure him." "Cure him!" "Even if the fountain proved anything, fixing hypothalamic dysregulation isn't gonna regenerate brain." "No, but if the scar tissue on his hypothalamus is resting against the pituitary, the adrenals would shut down." "Addison's disease." "You didn't see any scar tissue on his MRI, his CT scans..." "His brain is functional." "His temperature's normal." "There is nothing wrong with his hypothalamus or his pituitary!" "I can make him walk." "I can make him talk." "This is a wild guess that came to you because you were sweating." "Inject him with cortisol." "The guy will have sex with his wife again." "He'll hug his kid again." "Hopefully, that's the combination he was using." "It'd be a shame if I had cured a pedophile." "You're smiling." "That's a bad sign." "You're high." "I told you, I haven't had anything in three months." "This is as high as you get, a theory that ties your case up in a neat little bow, but you don't have a lick of substantiating proof." "Your decision doesn't make any sense." "There is no risk to a cortisol injection." "If I'm wrong, big deal." "He goes home a vegetable like he already is, but if I'm right..." "This is not about downsides or risk management." "It is a big deal for you to understand the word "No."" "I'm sorry, House." "He's on his way out of here." "I figured you'd be on your scooter, racing down the halls to stab the patient in the neck with cortisol." "She was right to say no." "I had no objective reason to think that I was right." "Just needed the puzzle." "Hold on a sec." "Is everything all right?" "Yeah, it's just something I forgot." "What's that?" "This is cortisol, and it's to fight infection." "Want to hold onto that?" "Let's put a bandage on it." "Is he okay?" "Yes." "Can we go now?" "You can go." "Excuse me." "Richard." "Richard." "Dad, you okay?" "Richard?" "Richard!" "Richard!" "Richard!" "Richard." "Richard, you're standing." "Thank you." "He got up." "I have to go tell House." "No." "Cuddy, you can't tell him." "I have to tell him." "He was right." "Why did you do it?" "Why did you think he might be right?" "Because he's House." "Medically, what made you think he was right?" "Nothing." "He got lucky." "That's all that happened." "Telling him no was a good thing because next time, he won't get lucky." "He'll kill someone." "Just because he was right doesn't mean he wasn't wrong." "I see him every day." "I can't just..." "Everybody lies."
{ "pile_set_name": "OpenSubtitles" }
namespace Ombi.Notifications.Templates { public interface INewsletterTemplate { string LoadTemplate(string subject, string intro, string tableHtml, string logo); } }
{ "pile_set_name": "Github" }
Potato processors are rushing to buy supplies and ship them across North America in order to keep French fries on the menu after cold, wet weather damaged crops in key producers in Canada and the U.S. Cool conditions started to hit growing regions in October, lashing potatoes with frost. Farmers in Alberta and Idaho were able to dig up some damaged crops for storage. But growers in Manitoba, North Dakota and Minnesota received snow and rain, forcing them to abandon some supplies in fields. As the wild weather hurt crops, an increase in fry-processing capacity in Canada has boosted demand. The combination will lead to tight supplies, and it’s likely that potato prices could climb this year across North America, Stephen Nicholson, a senior grains and oilseeds analyst at Rabobank, said. International costs may also rise as the U.S. won’t be able to export as much. “French fry demand has just been outstanding lately, and so supplies can’t meet the demand,” Travis Blacker, industry-relations director with the Idaho Potato Commission, said. The United Potato Growers of Canada estimates about 4,900 Manitoba hectares, or 18 per cent of the province’s planted area, were left unharvested — equal to what was abandoned for all of Canada last season. About 6.5 per cent of Alberta’s potatoes are estimated to be frost damaged. Manitoba is the country’s second-largest grower, followed by Alberta. Prince Edward Island is No. 1. The government will issue estimates for the nation’s crop on Dec. 6. The U.S. Department of Agriculture forecasts domestic output will drop 6.1 per cent this year, to the lowest since 2010, the agency said in a Nov. 8 report. In Idaho, the top producer, output is forecast to fall 5.5 per cent. Part of the problem for processors is that crop damage means potatoes are coming in smaller. French-fry makers usually favour longer spuds. In Canada, Cavendish Farms recently opened a new processing plant in Lethbridge, Alta. Thanks to a better harvest on the country’s East Coast, the company isn’t expecting any customer shortages at this time, Mary Keith, a spokesperson, said by email. “It’s a manageable situation,” Kevin MacIsaac, general manager of the United Potato Growers of Canada, said. “Potatoes are going to have to move from one channel to another that they sometimes don’t move in a normal year.” Read more about:
{ "pile_set_name": "OpenWebText2" }
/*global QUnit*/ sap.ui.define([ "sap/ui/thirdparty/jquery", "sap/ui/core/util/reflection/JsControlTreeModifier", "sap/ui/fl/registry/ChangeRegistry", "sap/ui/fl/registry/ChangeRegistryItem", "sap/ui/fl/registry/SimpleChanges", "sap/ui/fl/changeHandler/MoveControls", "sap/ui/fl/changeHandler/AddXML", "sap/ui/fl/changeHandler/UnhideControl", "sap/ui/fl/changeHandler/HideControl", "sap/ui/fl/Layer", "sap/base/Log", "sap/ui/thirdparty/sinon-4" ], function( jQuery, JsControlTreeModifier, ChangeRegistry, ChangeRegistryItem, SimpleChanges, MoveControlsChangeHandler, AddXMLChangeHandler, UnhideControlChangeHandler, HideControlChangeHandler, Layer, Log, sinon ) { "use strict"; var sandbox = sinon.sandbox.create(); QUnit.module("sap.ui.fl.registry.ChangeRegistry", { beforeEach: function () { this.oChangeRegistry = new ChangeRegistry(); }, afterEach: function () { sandbox.restore(); } }, function() { QUnit.test("getInstance", function (assert) { var changeRegistryInstance = ChangeRegistry.getInstance(); assert.ok(changeRegistryInstance); }); QUnit.test("on load uxap changeHandler are registered", function (assert) { var changeRegistryInstance = ChangeRegistry.getInstance(); assert.ok(changeRegistryInstance._registeredItems, "sap.uxap.ObjectPageLayout"); assert.ok(changeRegistryInstance._registeredItems, "sap.uxap.ObjectPageSection"); }); QUnit.test("constructor", function (assert) { assert.ok(this.oChangeRegistry); assert.deepEqual(this.oChangeRegistry._registeredItems, {}); }); QUnit.test("addRegistryItem", function (assert) { var registryItem = { getControlType: function () { return "sap.ui.fl.DummyControl"; }, getChangeTypeName: function () { return "myChangeType"; } }; this.oChangeRegistry.addRegistryItem(registryItem); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems).length, 1); assert.strictEqual(this.oChangeRegistry._registeredItems["sap.ui.fl.DummyControl"]["myChangeType"], registryItem); }); QUnit.test("removeRegistryItem - remove complete item", function (assert) { var registryItem = { getControlType: function () { return "sap.ui.fl.DummyControl"; }, getChangeTypeName: function () { return "myChangeType"; } }; this.oChangeRegistry.addRegistryItem(registryItem); var mParam = { controlType: "sap.ui.fl.DummyControl", changeTypeName: "myChangeType" }; this.oChangeRegistry.removeRegistryItem(mParam); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems).length, 0); }); QUnit.test("removeRegistryItem - remove changetypemetadata only", function (assert) { var registryItem1 = { getControlType: function () { return "sap.ui.fl.DummyControl"; }, getChangeTypeName: function () { return "myChangeType"; } }; var registryItem2 = { getControlType: function () { return "sap.ui.fl.DummyControlGroup"; }, getChangeTypeName: function () { return "myChangeType"; } }; this.oChangeRegistry.addRegistryItem(registryItem1); this.oChangeRegistry.addRegistryItem(registryItem2); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems).length, 2); var mParam = { changeTypeName: "myChangeType" }; this.oChangeRegistry.removeRegistryItem(mParam); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems).length, 2); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems["sap.ui.fl.DummyControl"]).length, 0); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems["sap.ui.fl.DummyControlGroup"]).length, 0); }); QUnit.test("removeRegistryItem - remove complete controltype", function (assert) { var registryItem1 = { getControlType: function () { return "sap.ui.fl.DummyControl"; }, getChangeTypeName: function () { return "myChangeType1"; } }; var registryItem2 = { getControlType: function () { return "sap.ui.fl.DummyControlGroup"; }, getChangeTypeName: function () { return "myChangeType2"; } }; this.oChangeRegistry.addRegistryItem(registryItem1); this.oChangeRegistry.addRegistryItem(registryItem2); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems).length, 2); var mParam = { controlType: "sap.ui.fl.DummyControl" }; this.oChangeRegistry.removeRegistryItem(mParam); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems).length, 1); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems["sap.ui.fl.DummyControlGroup"]).length, 1); assert.deepEqual(this.oChangeRegistry._registeredItems["sap.ui.fl.DummyControlGroup"]["myChangeType2"], registryItem2); }); QUnit.test("_createChangeRegistryItemForSimpleChange - when we register a change with an unsupported layer in change.layers", function(assert) { var simpleDummyControlChange1 = { changeType: "myChangeType1", changeHandler: {}, // stub layers: { unsupportedLayer: true } }; assert.throws(function() { this.oChangeRegistry._createChangeRegistryItemForSimpleChange("sap.ui.fl.DummyControl1", simpleDummyControlChange1); }, "then we throw an error"); }); QUnit.test("registerChangeHandlersForControl understands 'default' as a parameter", function (assert) { var someChangeType = "someChange"; var sSomeChangeModuleName = "some/module/name"; var sHideControlChangeType = "hideControl"; var sControlType = "my.control.Implementation"; var oChangeHandlers = {}; oChangeHandlers[someChangeType] = sSomeChangeModuleName; oChangeHandlers[sHideControlChangeType] = "default"; var registerControlStub = sandbox.stub(this.oChangeRegistry, "registerControlForSimpleChange"); return this.oChangeRegistry._registerChangeHandlersForControl(sControlType, oChangeHandlers) .then(function() { assert.equal(registerControlStub.callCount, 2, "two change handlers were registered for the control"); assert.equal(registerControlStub.firstCall.args[0], sControlType, "the first registration was for the passed control"); assert.equal(registerControlStub.firstCall.args[1].changeType, someChangeType, "the some change type was registered"); assert.equal(registerControlStub.firstCall.args[1].changeHandler, sSomeChangeModuleName, "the 'some/module/name' module was registerd for the 'some change' type"); assert.equal(registerControlStub.secondCall.args[0], sControlType, "the second registration was for the passed control"); assert.equal(registerControlStub.secondCall.args[1].changeType, sHideControlChangeType, "the hideControl change type was registered"); assert.equal(registerControlStub.secondCall.args[1].changeHandler, this.oChangeRegistry._oDefaultChangeHandlers[sHideControlChangeType], "the default change handler was registerd for the 'hideControl' type"); }.bind(this)); }); QUnit.test("registerChangeHandlersForControl understands {changeHandler: 'default'} as a parameter", function (assert) { var someChangeType = "someChange"; var sSomeChangeModuleName = "some/module/name"; var sHideControlChangeType = "hideControl"; var sControlType = "my.control.Implementation"; var oChangeHandlers = {}; oChangeHandlers[someChangeType] = sSomeChangeModuleName; oChangeHandlers[sHideControlChangeType] = { changeHandler: "default" }; var registerControlStub = sandbox.stub(this.oChangeRegistry, "registerControlForSimpleChange"); return this.oChangeRegistry._registerChangeHandlersForControl(sControlType, oChangeHandlers) .then(function() { assert.equal(registerControlStub.callCount, 2, "two change handlers were registered for the control"); assert.equal(registerControlStub.firstCall.args[0], sControlType, "the first registration was for the passed control"); assert.equal(registerControlStub.firstCall.args[1].changeType, someChangeType, "the some change type was registered"); assert.equal(registerControlStub.firstCall.args[1].changeHandler, sSomeChangeModuleName, "the 'some/module/name' module was registerd for the 'some change' type"); assert.equal(registerControlStub.secondCall.args[0], sControlType, "the second registration was for the passed control"); assert.equal(registerControlStub.secondCall.args[1].changeType, sHideControlChangeType, "the hideControl change type was registered"); assert.equal(registerControlStub.secondCall.args[1].changeHandler, this.oChangeRegistry._oDefaultChangeHandlers[sHideControlChangeType], "the default change handler was registerd for the 'hideControl' type"); }.bind(this)); }); QUnit.test("registerChangeHandlersForControl understands a module path as a parameter", function (assert) { var sControlType = "my.control.Implementation"; var oChangeHandlers = "sap/ui/fl/test/registry/TestChangeHandlers"; var registerControlStub = sandbox.stub(this.oChangeRegistry, "registerControlForSimpleChange"); return this.oChangeRegistry._registerChangeHandlersForControl(sControlType, oChangeHandlers) .then(function() { assert.equal(registerControlStub.callCount, 2, "two change handlers were registered for the control"); assert.equal(registerControlStub.firstCall.args[0], sControlType, "the first registration was for the passed control"); assert.equal(registerControlStub.firstCall.args[1].changeType, "doSomething", "the some change type was registered"); assert.equal(registerControlStub.secondCall.args[0], sControlType, "the second registration was for the passed control"); assert.equal(registerControlStub.secondCall.args[1].changeType, "doSomethingElse", "the hideControl change type was registered"); }); }); QUnit.test("registerChangeHandlersForControl does not crash if the loading of a module path leads to an error (file not found)", function (assert) { assert.expect(3); var sControlType = "my.control.Implementation"; var oChangeHandlers = "sap/ui/fl/test/registry/DefinitelyNotAChangeHandlers"; var fnRegisterControlStub = sandbox.stub(this.oChangeRegistry, "registerControlForSimpleChange"); sandbox.stub(Log, "error").callsFake(function (sErrorMessage) { if (sErrorMessage.indexOf(sControlType) !== -1) { assert.ok(true, "then error was logged"); } }); return this.oChangeRegistry._registerChangeHandlersForControl(sControlType, oChangeHandlers) .then(function() { assert.ok(true, "the js processing continues"); assert.equal(fnRegisterControlStub.callCount, 0, "no registration was done"); }); }); QUnit.test("registerChangeHandlersForControl does not crash if the loading of a module path leads to an error (broken file)", function (assert) { var sControlType = "my.control.Implementation"; var sChangeHandler = "sap/ui/fl/test/registry/TestChangeHandlersBROKEN"; var registerControlStub = sandbox.stub(this.oChangeRegistry, "registerControlForSimpleChange"); var errorLoggingStub = sandbox.stub(Log, "error"); sandbox.stub(sap.ui, "require") .callsArgWithAsync(2, {message: "error"}); return this.oChangeRegistry._registerChangeHandlersForControl(sControlType, sChangeHandler) .then(function() { assert.ok(true, "the js processing continues"); assert.equal(registerControlStub.callCount, 0, "no registration was done"); assert.equal(errorLoggingStub.callCount, 1, "the error was logged"); }); }); QUnit.test("registerControlsForChanges shall add a map of controls and changes to the registry", function (assert) { var sLayer = Layer.CUSTOMER; return this.oChangeRegistry.registerControlsForChanges({ controlA: [SimpleChanges.unhideControl, SimpleChanges.hideControl], controlB: [SimpleChanges.unhideControl, SimpleChanges.hideControl] }) .then(this.oChangeRegistry.getChangeHandler.bind(this.oChangeRegistry, "unhideControl", "controlA", undefined, JsControlTreeModifier, sLayer)) .then(function (oChangeHandler) { assert.strictEqual(oChangeHandler, UnhideControlChangeHandler, "then the corresponding changehandler is registered in a new registry item."); }) .then(this.oChangeRegistry.getChangeHandler.bind(this.oChangeRegistry, "hideControl", "controlA", undefined, JsControlTreeModifier, sLayer)) .then(function (oChangeHandler) { assert.strictEqual(oChangeHandler, HideControlChangeHandler, "then the corresponding changehandler is registered in a new registry item."); }) .then(this.oChangeRegistry.getChangeHandler.bind(this.oChangeRegistry, "unhideControl", "controlB", undefined, JsControlTreeModifier, sLayer)) .then(function (oChangeHandler) { assert.strictEqual(oChangeHandler, UnhideControlChangeHandler, "then the corresponding changehandler is registered in a new registry item."); }) .then(this.oChangeRegistry.getChangeHandler.bind(this.oChangeRegistry, "hideControl", "controlB", undefined, JsControlTreeModifier, sLayer)) .then(function (oChangeHandler) { assert.strictEqual(oChangeHandler, HideControlChangeHandler, "then the corresponding changehandler is registered in a new registry item."); }); }); QUnit.test("registerControlsForChanges: when adding a propertyChange or propertyBindingChange without 'default' changeHandler", function (assert) { return this.oChangeRegistry.registerControlsForChanges({ controlA: { propertyChange: { changeHandler: {} } } }) .catch(function() { assert.ok(true, "then it should reject the promise"); }) .then(function() { return this.oChangeRegistry.registerControlsForChanges({ controlA: { propertyBindingChange: { changeHandler: {} } } }); }.bind(this)) .catch(function() { assert.ok(true, "then it should reject the promise"); }); }); QUnit.test("registerControlForSimpleChange shall do nothing if mandatory parameters are missing", function (assert) { this.oChangeRegistry.registerControlForSimpleChange(null, null); assert.strictEqual(Object.keys(this.oChangeRegistry._registeredItems).length, 0, "There shall be no registered items"); }); QUnit.test("registerControlForSimpleChange shall add a new registry item", function (assert) { var sLayer = Layer.CUSTOMER; this.oChangeRegistry.registerControlForSimpleChange("ganttChart", SimpleChanges.unhideControl); return this.oChangeRegistry.getChangeHandler("unhideControl", "ganttChart", undefined, JsControlTreeModifier, sLayer) .then(function (oChangeHandler) { assert.strictEqual(oChangeHandler, UnhideControlChangeHandler, "then the corresponding changehandler is registered in a new registry item."); }); }); QUnit.test("can determine if a given control has registered change handlers", function (assert) { var sControlType = "sap.ui.fl.DummyControl"; var registryItem = { getControlType: function () { return sControlType; }, getChangeTypeName: function () { return "myChangeType"; } }; this.oChangeRegistry.addRegistryItem(registryItem); var bHasRegisteredChangeHandlers = this.oChangeRegistry.hasRegisteredChangeHandlersForControl(sControlType); assert.strictEqual(bHasRegisteredChangeHandlers, true, "the registry tells that there is a registered change handler for the given control"); }); QUnit.test("can determine if a given control has NO registered change handlers", function (assert) { var sControlType = "sap.ui.fl.DummyControl"; var sSomeOtherControlType = "sap.ui.fl.DummyControlWithNoHandlers"; var registryItem = { getControlType: function () { return sControlType; }, getChangeTypeName: function () { return "myChangeType"; } }; this.oChangeRegistry.addRegistryItem(registryItem); var bHasRegisteredChangeHandlers = this.oChangeRegistry.hasRegisteredChangeHandlersForControl(sSomeOtherControlType); assert.strictEqual(bHasRegisteredChangeHandlers, false, "the registry tells that there is NO a registered change handler for the given control"); }); QUnit.test("can determine if a given control has a change handler for a specific type of changes", function (assert) { var sControlType = "sap.ui.fl.DummyControl"; var sChangeType = "myChangeType"; var registryItem = { getControlType: function () { return sControlType; }, getChangeTypeName: function () { return sChangeType; } }; this.oChangeRegistry.addRegistryItem(registryItem); var bHasRegisteredChangeHandlers = this.oChangeRegistry.hasChangeHandlerForControlAndChange(sControlType, sChangeType); assert.strictEqual(bHasRegisteredChangeHandlers, true, "the registry tells that there is a registered change handler for the given control and change"); }); QUnit.test("can determine if a given control has NOT a change handler for a specific change type if it has no change handlers at all registered for that control", function (assert) { var sControlType = "sap.ui.fl.DummyControl"; var sChangeType = "myChangeType"; var sSomeOtherControlType = "sap.ui.fl.DummyControlWithNoHandlers"; var registryItem = { getControlType: function () { return sControlType; }, getChangeTypeName: function () { return sChangeType; } }; this.oChangeRegistry.addRegistryItem(registryItem); var bHasRegisteredChangeHandlers = this.oChangeRegistry.hasChangeHandlerForControlAndChange(sSomeOtherControlType, sChangeType); assert.strictEqual(bHasRegisteredChangeHandlers, false, "the registry tells that there is NO registered change handler for the given control and change"); }); QUnit.test("can determine if a given control has NOT a change handler for a specific change type if it has some change handlers registered for other change types for that control", function (assert) { var sControlType = "sap.ui.fl.DummyControl"; var sChangeType = "myChangeType"; var sSomeOtherChangeType = "myOtherChangeType"; var registryItem = { getControlType: function () { return sControlType; }, getChangeTypeName: function () { return sChangeType; } }; this.oChangeRegistry.addRegistryItem(registryItem); var bHasRegisteredChangeHandlers = this.oChangeRegistry.hasChangeHandlerForControlAndChange(sControlType, sSomeOtherChangeType); assert.strictEqual(bHasRegisteredChangeHandlers, false, "the registry tells that there is NO registered change handler for the given control and change"); }); QUnit.test("can determine if a given control has NOT a change handler for a specific control if neither the control has registered change handlers nor the change handler is registered anywhere else", function (assert) { var sControlType = "sap.ui.fl.DummyControl"; var sChangeType = "myChangeType"; var sSomeOtherControlType = "sap.ui.fl.DummyControlWithNoHandlers"; var sSomeOtherChangeType = "myOtherChangeType"; var registryItem = { getControlType: function () { return sControlType; }, getChangeTypeName: function () { return sChangeType; } }; this.oChangeRegistry.addRegistryItem(registryItem); var bHasRegisteredChangeHandlers = this.oChangeRegistry.hasChangeHandlerForControlAndChange(sSomeOtherControlType, sSomeOtherChangeType); assert.strictEqual(bHasRegisteredChangeHandlers, false, "the registry tells that there is NO registered change handler for the given control and change"); }); QUnit.test("returns the property change handler for a control not having any explicit registered change handlers", function (assert) { var sControlType = "aControlType"; var sPropertyChangeType = "propertyChange"; var mRegistryItem = this.oChangeRegistry._getRegistryItem(sControlType, sPropertyChangeType); assert.equal(mRegistryItem, this.oChangeRegistry._oDefaultActiveChangeHandlers.propertyChange, "the default property change handler was retrieved"); }); QUnit.test("returns the property change handler for a control having other registered change handlers", function (assert) { var sControlType = "aControlType"; var sPropertyChangeType = "propertyChange"; this.oChangeRegistry._registeredItems[sControlType] = { someOtherChange: {} }; var mRegistryItem = this.oChangeRegistry._getRegistryItem(sControlType, sPropertyChangeType); assert.equal(mRegistryItem, this.oChangeRegistry._oDefaultActiveChangeHandlers.propertyChange, "the default property change handler was retrieved"); }); QUnit.test("returns the explicit for a given control type registered change handler for the property changes", function (assert) { var sControlType = "aControlType"; var sPropertyChangeType = "propertyChange"; var oExplicitRegisteredChangeHandlerStub = {}; var oSimpleChangeObject = { changeType: sPropertyChangeType, changeHandler: oExplicitRegisteredChangeHandlerStub }; var oChangeRegistryItem = this.oChangeRegistry._createChangeRegistryItemForSimpleChange(sControlType, oSimpleChangeObject); this.oChangeRegistry._registeredItems[sControlType] = { someOtherChange: {}, propertyChange: oChangeRegistryItem }; var mRegistryItem = this.oChangeRegistry._getRegistryItem(sControlType, sPropertyChangeType); assert.equal(mRegistryItem, oChangeRegistryItem, "the explicit registered change handler item was retrieved"); }); QUnit.test("returns the property binding change handler for a control not having any explicit registered change handlers", function (assert) { var sControlType = "aControlType"; var sPropertyBindingChangeType = "propertyBindingChange"; var mRegistryItem = this.oChangeRegistry._getRegistryItem(sControlType, sPropertyBindingChangeType); assert.equal(mRegistryItem, this.oChangeRegistry._oDefaultActiveChangeHandlers.propertyBindingChange, "the default property binding change handler was retrieved"); }); QUnit.test("returns the property change handler for a control having other registered change handlers", function (assert) { var sControlType = "aControlType"; var sPropertyBindingChangeType = "propertyBindingChange"; this.oChangeRegistry._registeredItems[sControlType] = { someOtherChange: {} }; var mRegistryItem = this.oChangeRegistry._getRegistryItem(sControlType, sPropertyBindingChangeType); assert.equal(mRegistryItem, this.oChangeRegistry._oDefaultActiveChangeHandlers.propertyBindingChange, "the default property binding change handler was retrieved"); }); QUnit.test("returns the explicit for a given control type registered change handler for the property binding changes", function (assert) { var sControlType = "aControlType"; var sPropertyBindingChangeType = "propertyBindingChange"; var oExplicitRegisteredChangeHandlerStub = {}; var oSimpleChangeObject = { changeType: sPropertyBindingChangeType, changeHandler: oExplicitRegisteredChangeHandlerStub }; var oChangeRegistryItem = this.oChangeRegistry._createChangeRegistryItemForSimpleChange(sControlType, oSimpleChangeObject); this.oChangeRegistry._registeredItems[sControlType] = { someOtherChange: {}, propertyBindingChange: oChangeRegistryItem }; var mRegistryItem = this.oChangeRegistry._getRegistryItem(sControlType, sPropertyBindingChangeType); assert.equal(mRegistryItem, oChangeRegistryItem, "the explicit registered change handler item was retrieved"); }); QUnit.test("when _getInstanceSpecificChangeRegistryItem is called without flexibility path defined on given control", function (assert) { var oGetChangeHandlerModuleStub = sandbox.stub(JsControlTreeModifier, "getChangeHandlerModulePath").returns(null); var oControl = {}; var oSimpleChangeObject = {}; return this.oChangeRegistry._getInstanceSpecificChangeRegistryItem(oSimpleChangeObject, oControl, JsControlTreeModifier) .then(function(oChangeRegistryItem) { assert.equal(oGetChangeHandlerModuleStub.callCount, 1, "then getChangeHandlerModule function is called"); assert.equal(oChangeRegistryItem, undefined, "then no registry item is returned"); }); }); QUnit.test("when _getInstanceSpecificChangeRegistryItem is called with invalid flexibility path defined on given control", function (assert) { assert.expect(3); var oGetChangeHandlerModuleStub = sandbox.stub(JsControlTreeModifier, "getChangeHandlerModulePath").returns("invalid/path/TestChangeHandlers"); var oControl = {}; var sControlId = "controlId"; var sPropertyBindingChangeType = "propertyBindingChange"; var oExplicitRegisteredChangeHandlerStub = {}; var oSimpleChangeObject = { changeType: sPropertyBindingChangeType, changeHandler: oExplicitRegisteredChangeHandlerStub }; sandbox.stub(JsControlTreeModifier, "getId").returns(sControlId); sandbox.stub(Log, "error").callsFake(function(sErrorMessage) { if (sErrorMessage.indexOf(sControlId) !== -1) { assert.ok(true, "then error was logged"); } }); return this.oChangeRegistry._getInstanceSpecificChangeRegistryItem(oSimpleChangeObject, oControl, JsControlTreeModifier) .then(function(oChangeRegistryItem) { assert.equal(oGetChangeHandlerModuleStub.callCount, 1, "then getChangeHandlerModule function is called"); assert.equal(oChangeRegistryItem, undefined, "then no registry item is returned"); }); }); QUnit.test("when _getInstanceSpecificChangeRegistryItem is called and passed parameter is a valid changeType", function (assert) { var oErrorLoggingStub = sandbox.stub(Log, "error"); sandbox.stub(JsControlTreeModifier, "getChangeHandlerModulePath").returns("sap/ui/fl/test/registry/TestChangeHandlers.flexibility"); sandbox.stub(JsControlTreeModifier, "getControlType").returns("controlType"); var oControl = {}; var sChangeType = "doSomething"; return this.oChangeRegistry._getInstanceSpecificChangeRegistryItem(sChangeType, oControl, JsControlTreeModifier) .then(function(oChangeRegistryItem) { // assert.equal(oGetChangeHandlerModuleStub.callCount, 1, "then getChangeHandlerModule function is called"); assert.equal(oErrorLoggingStub.callCount, 0, "then no error was logged"); assert.ok(oChangeRegistryItem instanceof ChangeRegistryItem, "then registry item is returned"); assert.equal(oChangeRegistryItem.getChangeTypeName(), sChangeType, "then returned registry item has the correct changeType"); }); }); QUnit.test("when _getInstanceSpecificChangeRegistryItem is called and passed parameter is a change with a valid changeType", function (assert) { var oErrorLoggingStub = sandbox.stub(Log, "error"); var oGetChangeHandlerModuleStub = sandbox.stub(JsControlTreeModifier, "getChangeHandlerModulePath").returns("sap/ui/fl/test/registry/TestChangeHandlers.flexibility"); sandbox.stub(JsControlTreeModifier, "getControlType").returns("controlType"); var oControl = {}; var sChangeType = "doSomethingElse"; return this.oChangeRegistry._getInstanceSpecificChangeRegistryItem(sChangeType, oControl, JsControlTreeModifier) .then(function(oChangeRegistryItem) { assert.equal(oGetChangeHandlerModuleStub.callCount, 1, "then getChangeHandlerModule function is called"); assert.equal(oErrorLoggingStub.callCount, 0, "then no error was logged"); assert.ok(oChangeRegistryItem instanceof ChangeRegistryItem, "then registry item is returned"); assert.equal(oChangeRegistryItem.getChangeTypeName(), sChangeType, "then returned registry item has the correct changeType"); }); }); QUnit.test("when getChangeHandler is called for a control without instance specific changeHandler", function (assert) { var oControl = {}; var sChangeType = "moveControls"; var sControlType = "VerticalLayout"; var sLayer = Layer.CUSTOMER; var oErrorLoggingStub; var oGetChangeHandlerModuleStub; return this.oChangeRegistry.registerControlsForChanges({ VerticalLayout : { moveControls: "default" } }) .then(function() { oErrorLoggingStub = sandbox.stub(Log, "error"); oGetChangeHandlerModuleStub = sandbox.stub(JsControlTreeModifier, "getChangeHandlerModulePath").returns("sap/ui/fl/test/registry/TestChangeHandlers.flexibility"); sandbox.stub(JsControlTreeModifier, "getControlType").returns(sControlType); return this.oChangeRegistry.getChangeHandler(sChangeType, sControlType, oControl, JsControlTreeModifier, sLayer); }.bind(this)) .then(function(oChangeHandler) { assert.equal(oGetChangeHandlerModuleStub.callCount, 1, "then getChangeHandlerModule function is called"); assert.equal(oErrorLoggingStub.callCount, 0, "then no error was logged"); assert.equal(oChangeHandler, MoveControlsChangeHandler, "then correct changehandler is returned"); }); }); QUnit.test("when getChangeHandler is called for a control with instance specific and default changeHandlers", function (assert) { var oControl = {}; var sChangeType = "doSomething"; var sControlType = "VerticalLayout"; var sLayer = Layer.CUSTOMER; sandbox.stub(JsControlTreeModifier, "getChangeHandlerModulePath").returns("sap/ui/fl/test/registry/TestChangeHandlers.flexibility"); sandbox.stub(JsControlTreeModifier, "getControlType").returns("VerticalLayout"); return this.oChangeRegistry.registerControlsForChanges({ VerticalLayout : { doSomething: "default" } }) .then(function() { return this.oChangeRegistry.getChangeHandler(sChangeType, sControlType, oControl, JsControlTreeModifier, sLayer); }.bind(this)) .then(function(oChangeHandler) { assert.equal(oChangeHandler.dummyId, "testChangeHandler-doSomething", "then instance specific changehandler is returned"); }); }); QUnit.test("when getChangeHandler is called for a control with instance specific changeHandler but with the wrong layer", function (assert) { var oControl = {}; var sChangeType = "doSomething"; var sControlType = "VerticalLayout"; var sLayer = Layer.CUSTOMER; sandbox.stub(JsControlTreeModifier, "getChangeHandlerModulePath").returns("sap/ui/fl/test/registry/TestChangeHandlersUserLayer.flexibility"); sandbox.stub(JsControlTreeModifier, "getControlType").returns("VerticalLayout"); return this.oChangeRegistry.getChangeHandler(sChangeType, sControlType, oControl, JsControlTreeModifier, sLayer) .catch(function(oError) { assert.equal(oError.message, "Change type " + sChangeType + " not enabled for layer " + sLayer, "then an error is thrown"); }); }); QUnit.test("when getChangeHandler is called for previously existing changetype and existing instance specific changehandler for another changetype", function (assert) { var oControl = {}; var sChangeType = "moveControls"; var sControlType = "VerticalLayout"; var sLayer = Layer.CUSTOMER; sandbox.stub(JsControlTreeModifier, "getChangeHandlerModulePath").returns("sap/ui/fl/test/registry/TestChangeHandlers.flexibility"); sandbox.stub(JsControlTreeModifier, "getControlType").returns("VerticalLayout"); return this.oChangeRegistry.registerControlsForChanges({ VerticalLayout : { moveControls: "default" } }) .then(function() { return this.oChangeRegistry.getChangeHandler(sChangeType, sControlType, oControl, JsControlTreeModifier, sLayer); }.bind(this)) .then(function(oChangeHandler) { assert.equal(oChangeHandler, MoveControlsChangeHandler, "then correct default changehandler is returned"); }); }); QUnit.test("when getChangeHandler is called for without a handler registered for the control", function (assert) { var oControl = {}; var sChangeType = "moveControls"; var sControlType = "VerticalLayout"; var sLayer = Layer.CUSTOMER; sandbox.stub(JsControlTreeModifier, "getControlType").returns("VerticalLayout"); return this.oChangeRegistry.getChangeHandler(sChangeType, sControlType, oControl, JsControlTreeModifier, sLayer) .then(function() { assert.ok(false, "should not resolve"); }) .catch(function(oError) { assert.ok(oError, "the function rejects with an error"); assert.ok(oError.message.indexOf("No Change handler registered for the Control and Change type") > -1, "the error contains the correct message"); }); }); QUnit.test("when getChangeHandler is called without control type specified", function (assert) { var oControl = {}; var sChangeType = "addXML"; var sControlType; var sLayer = Layer.VENDOR; return this.oChangeRegistry.getChangeHandler(sChangeType, sControlType, oControl, JsControlTreeModifier, sLayer) .then(function(oChangeHandler) { assert.strictEqual(oChangeHandler, AddXMLChangeHandler, "then the function should return the change handler specified just by change type"); }) .catch(function(oError) { assert.notOk(oError, "then the function should not rejects with an error"); }); }); QUnit.test("when getChangeHandler is called with invalid layer specified", function (assert) { var sControlType = "aControlType"; var sPropertyBindingChangeType = "propertyBindingChange"; var oExplicitRegisteredChangeHandlerStub = {}; var sLayer = "INVALIDLAYER"; var oSimpleChangeObject = { changeType: sPropertyBindingChangeType, changeHandler: oExplicitRegisteredChangeHandlerStub }; this.oChangeRegistry.registerControlForSimpleChange(sControlType, oSimpleChangeObject); return this.oChangeRegistry.getChangeHandler(sPropertyBindingChangeType, sControlType, undefined, JsControlTreeModifier, sLayer) .catch(function (oError) { assert.strictEqual(oError.message, "Change type " + sPropertyBindingChangeType + " not enabled for layer " + sLayer, "then an error is thrown"); }); }); }); QUnit.done(function () { jQuery("#qunit-fixture").hide(); }); });
{ "pile_set_name": "Github" }
Our knowledge about the organisation of cells, biological specimen structures, composition and properties in submicroscopic detail of biological samples is associated to a large extent to transmission electron microscopy (TEM). The Electron Microscopy Core (EM Core) Facility provides advice, technical services, training, equipment and facilities to NHLBI intramural scientists if their research requires electron microscopy (EM) to clarify questions. Using an electron microscope offers the advantage of increasing both the magnification of an object and the resolution over other imaging tools. These could be issues involving subcellular, supramolecular or macromolecular structure at a level of resolution below that obtained by a light microscope. The NHLBI EM Core Facility has supported projects using the following techniques in the past year: 1. Chemical fixation, embedding, ultra-thin sectioning and transmission EM digital imaging of tissues and cell culture. 2. EM immunocytochemistry, including immunogold, nanogold with silver enhancement and immunoperoxidase localisation of proteins and other antigens within and on the surface of tissues and cells by pre-embedding techniques. 3. Negative staining of large proteins, polymers and supramolecular structures as well as lipid and membrane vesicles for transmission EM digital imaging. 4. Rotary shadowing of large protein molecules, DNA and other macromolecules. 5. Preparation of platinum replicas of cytoskeletons, partially lysed cells and freeze-fractured/freeze- dried tissues and cells. 6. Chemical fixation, critical point drying, sputter-coating and scanning EM digital imaging of small organisms, organs, tissues and cells, as well as other materials such as artificial matrices. 7. Thawed cryosection immuno labelling technique (also called Tokuyasu method). 8. Immuno correlative light and electron microscopy (CLEM) on Tokuyasu cryosections. 9. Cryo-electron microscopy of vitreous sections (CEMOVIS) to observe biological samples in their most native, fully hydrated state. 10. High-pressure freezing (HPF) and freeze substitution (FS) allows improved morphological preservation compared to the conventional preparation. These techniques are available as a service to be performed by the EM Core Staff for the customer or they are available to be learned by users who will be trained to be independent users of the EM Core. In the past year, the NHLBI EM Core supported a total of 89 recorded projects for 37 investigators within the NIH. 62% of the services were requested by NHLBI research groups. The remaining 38% are divided as follows: NHGRI (8%), NCI (8%), NIA (1%), NIAID (2%), NIDCR (10%), NINDS (7%), NINR (1%) and OD (1%). We have also trained several postdoctoral fellows, students, and contractors in the use of the scanning and transmission electron microscopes and sample preparation techniques.
{ "pile_set_name": "NIH ExPorter" }
Find Your Family - Losing Online Sources Article | 16 August, 2012 - 16:15 Article Date: 17 August, 2012 (All day) The online world has created many opportunities to find additional information and connect with others who are researching our ancestors like never before. The ability to search indexes and view the original images from home at our convenience is changing the world of family history. Digital is here to stay and will continue to enhance our ability to identify our ancestors, but it does bring some challenges. The goal in identifying and documenting a source is to know what we have searched, what we have found (and what we have not found) and where to find the information again when we want to look at it later. The challenge is that when we go back several years later, many websites that we used to access sources no longer exist, or if they exist, they no longer have that the same structure. When we try to visit the URL (the web address i.e. morgannewspaper.com) instead of the record, we dutifully recorded we receive the dreaded 404 error. Several organizations have been working on this problem. FamilySearch has been deploying what they call a Persistent Archive Link (PAL) so that when a user comes back in 10 years even if the site has been re-arranged in the mean time the link will still take the user back to the record. This type of approach is one that all of the commercial organizations ought to be using. Just in case they are not using this type of approach and for all the companies that go out of business and all the personal websites where we find information, it is important to store more than the URL. It is worthwhile to treat the online source just as we would a microfilm or a book or other type of record. When information is found in a film or microfilm we record the original source, but we normally will take a copy with us. Sometimes it is a physical copy, sometimes it is a digital copy, and sometimes it is an abstract. We take the copy to ensure that we will have access to it later and can easily find it. I suggest the same approach for websites. Take a screen shot of the image and index and store it as you do your other sources. Keep either a digital copy of the source and back up these digital copies to more than one place (online services such as dropbox facilitate this) or keep a physical copy that you print from the screen shot organized with the physical sources you own. An important part of online research is ensuring that you can repeat the process you used to find the information and can know why you came to the conclusions you did. A little work now in preserving these online sources will save hundreds of hours down the road. We are all still learning to manage the world of online genealogy. Learning to manage sources is just one more element of this change
{ "pile_set_name": "Pile-CC" }
Q: OleDbCommand: SQL syntax error I am having trouble with a ALTER TABLE command that I am trying to use on a MS Access database in a C# project. I am trying to rename a column and change the type at the same time. Here is my command: string sqlCommand = "ALTER TABLE " + tableName + " CHANGE [" + oldColName + "] [" + newColName + "] " + colType; What is wrong in this command and what do I need to do to make this it work? *Edits: -The type and the names of the table, new column and old column are not the problem! -The exception that is catched is : Syntax error in ALTER TABLE statement. -The final string looks like this: ALTER TABLE [Big List] CHANGE [num] [test] CHARACTER -Connection provider: Microsoft.ACE.OLEDB.12.0 A: I don't think you can rename a column with SQL and access. The best way to achieve this is to create a new column with the new name, update the new column and drop the old one. ALTER TABLE [Big List] ADD COLUMN [num] YOURTYPE; UPDATE [Big List] SET [num] = [test]; ALTER TABLE [Big List] DROP COLUMN [test];
{ "pile_set_name": "StackExchange" }
William H.G. FitzGerald Tennis Center The William H.G. FitzGerald Tennis Center is a tennis venue located in Rock Creek Park in Washington, D.C. It is named after William H. G. FitzGerald, a Washington-based private investor who was active in philanthropies and served as United States Ambassador to Ireland. It houses 15 hard courts and 10 clay courts. There are also five indoors courts which are heated and available in winter. The main stadium seats 7,500 spectators, including 31 suites with air conditioning. The center is the home of the Citi Open, an annual ATP World Tour and WTA Tour event. External links Rock Creek Park tennis William H.G. FitzGerald Tennis Center map .F/P[Y{T90'0-P' Gallery Citi Open Category:Tennis venues in Washington, D.C. Category:1991 establishments in Washington, D.C. Category:Sports venues completed in 1991 Category:Rock Creek Park
{ "pile_set_name": "Wikipedia (en)" }
Category: Best online shopping market I have completely adored Pamela Munson’s timeless straw accessories because the label launched simply final year. The primary itinerary explores the neighbourhood around the ModeNatie that has been often known as ‘the guts of Belgian fashion’ since Dries Van Noten opened his Modepaleis in the Nationalestraat. Meanwhile, various designers and stores pursuing an avant-garde profile have settled down here. The Kammenstraat, a side-road of the Nationalestraat, is the place to be when you find yourself in search of shops that offer the newest streetwear collections. Free Skate to Amarcord by Nino Rota-As soon as again, Marchei and Hotarek went the Italiano route; this time for his or her Free Skate, they skated to the music of the Academy Award-successful Federico Fellini movie “Amarcord”. They had been daring and fun in their “Harlequin” print embellished costumes in black, crimson and white. It was kooky and barely “Circus”-like. However visually, at least … The perfect NZ designers, worldwide style labels, markets & boutiques. In Sydney’s favorite neighbourhood purchasing streets is a diverse mix of boutiques, cool cafes and hip bars At buzzy markets browse for the following huge thing in fashion. Paddington Markets helped launch Dinosaur Designs and the style careers of luminaries such as Sass & Bide and Zimmerman. Shopbop has among the finest on-line choices of must-have kinds. The Shopbop app permits you to save your favorites and place your orders on the go—plus, as a subsidiary of Amazon, Amazon Prime members can use their accounts to receive free two-day shipping. Free, obtainable for iOS and Android. In posh Chelsea’s King’s Street you may discover an eclectic mixture of stylish boutiques, distinctive labels, designer retailers and high-road staples, alongside an unlimited array of cafes and restaurants. It is also an incredible place for inspirational inside design, with Peter Jones , Heal’s … I have absolutely adored Pamela Munson’s timeless straw accessories since the label launched just final 12 months. For those in the know, Wolf & Badger is the procuring destination of choice for one thing somewhat bit completely different. Alongside its selection of items from established designers you will discover a host of inspiring new names that cover the whole lot from womenswear, menswear, children and home. Paseo de Gracia is where you will see the very best luxurious outlets reminiscent of Chanel, Prada, Santa Eulalia (which is the best multi-model store right here), Saint Laurent, Miu Miu and so on. We also have more reasonably priced ones like Mango and Zara. The perfect NZ designers, worldwide fashion labels, markets & boutiques. A stroll away is the Strand Arcade , one other beautiful colonial arcade the place you’ll find hatters, shoemakers, dressmakers, jewellers, cafes and restaurants. Stroll though this charming arcade to the Pitt Road Mall and Westfield Sydney , a gleaming complex with more than 250 engaging shops. I beloved the thought of making suggestions primarily based on the gadgets in your Amazon buying cart. Add a couple issues, see what pops up. Add a pair more, see what changes. My early twenties have been punctuated with vibrant bursts of colour; a kaleidoscopic rainbow and cacophony of prints that I wore for the mere sake of it. At the time, I could barely fathom the considered carrying the same outfit twice, particularly given that almost all objects I wore were an actual assertion in themselves. My wardrobe was always changing, as … The perfect NZ designers, worldwide fashion labels, markets & boutiques. It isn’t solely the fairer sex who love to buy online. From the same style group that forged Internet-a-porter, is the menswear model, Mr Porter – equally as glossy and as well stocked as its award-profitable counterpart. Despite being just 4-years-old, In The Fashion has quickly grow to be the go-to website for style conscience girls. A model that doesn’t shrink back from the spotlight, it’s well known for its collaborations with celebrities like Charlotte Crosby, Billie Faiers, Binky Felstead and Sarah Ashcroft. At Northridge Trend Heart, you may discover the perfect in retail to attraction to each style and price range, from luxury objects to your favorite nationwide brands. Delight your self or someone you like with a special something from one among 170 stores, and deal with the entire household to a meal at one of the household-pleasant …
{ "pile_set_name": "Pile-CC" }
Stewart Nicoll was found guilty of professional misconduct Stewart Nicoll was struck off by the General Teaching Council for Scotland after being found guilty of professional misconduct. He faced suspension from teaching at Grantown Grammar School because of his alleged right-wing views. Mr Nicoll resigned just before he was to face a disciplinary hearing. Police revoked Mr Nicoll's gun licences three years ago because of the "propaganda and indoctrination" he taught at the school. I feel that positive discrimination has gone too far and has to be roped in Stewart Nicoll In court, as he tried to win his certificates back, the history and modern studies teacher was compared to Thomas Hamilton, who murdered 16 children and a teacher in Dunblane 11 years ago. A solicitor for Northern Constabulary, Norman Phillips, also claimed Mr Nicoll's life bore similarities to Hungerford killer Michael Ryan, who killed 14 people. The teacher, who joined Grantown Grammar in 1979, had caused controversy with some of his methods. During lessons he showed teenage pupils SAS tapes of dead bodies and videos of the Columbine massacre in the US. He was also said to have repeatedly played video footage of the assassination of US President John F Kennedy. A disciplinary panel of the General Teaching Council for Scotland met in Edinburgh and found he had behaved in an inappropriate manner towards pupils. Media attention They found he had made reference to racial and minority groups in an inappropriate manner; repeatedly presented topics to pupils which included graphic video, pictures of violence, use of guns and other firearms and conducted himself in a manner which caused alarm and stress to pupils and other staff. He had previously been suspended by the local authority on full pay after his civil case against the police to win back his guns attracted media attention. During the hearing at Inverness Sheriff Court three years ago, the police lawyer said Nicoll had "a tendency to dwell on matters, lose his temper and may resort to violence". Mr Nicoll, who lives alone, told the court: "Those men had nothing else in their lives except firearms. I have lots of things in my life. "I would never revenge myself on an innocent person, nor with a shotgun. That man killed children and that is wrong."
{ "pile_set_name": "OpenWebText2" }
function data = loadjson(fname,varargin) % % data=loadjson(fname,opt) % or % data=loadjson(fname,'param1',value1,'param2',value2,...) % % parse a JSON (JavaScript Object Notation) file or string % % authors:Qianqian Fang (fangq<at> nmr.mgh.harvard.edu) % created on 2011/09/09, including previous works from % % Nedialko Krouchev: http://www.mathworks.com/matlabcentral/fileexchange/25713 % created on 2009/11/02 % François Glineur: http://www.mathworks.com/matlabcentral/fileexchange/23393 % created on 2009/03/22 % Joel Feenstra: % http://www.mathworks.com/matlabcentral/fileexchange/20565 % created on 2008/07/03 % % $Id: loadjson.m 460 2015-01-03 00:30:45Z fangq $ % % input: % fname: input file name, if fname contains "{}" or "[]", fname % will be interpreted as a JSON string % opt: a struct to store parsing options, opt can be replaced by % a list of ('param',value) pairs - the param string is equivallent % to a field in opt. opt can have the following % fields (first in [.|.] is the default) % % opt.SimplifyCell [0|1]: if set to 1, loadjson will call cell2mat % for each element of the JSON data, and group % arrays based on the cell2mat rules. % opt.FastArrayParser [1|0 or integer]: if set to 1, use a % speed-optimized array parser when loading an % array object. The fast array parser may % collapse block arrays into a single large % array similar to rules defined in cell2mat; 0 to % use a legacy parser; if set to a larger-than-1 % value, this option will specify the minimum % dimension to enable the fast array parser. For % example, if the input is a 3D array, setting % FastArrayParser to 1 will return a 3D array; % setting to 2 will return a cell array of 2D % arrays; setting to 3 will return to a 2D cell % array of 1D vectors; setting to 4 will return a % 3D cell array. % opt.ShowProgress [0|1]: if set to 1, loadjson displays a progress bar. % % output: % dat: a cell array, where {...} blocks are converted into cell arrays, % and [...] are converted to arrays % % examples: % dat=loadjson('{"obj":{"string":"value","array":[1,2,3]}}') % dat=loadjson(['examples' filesep 'example1.json']) % dat=loadjson(['examples' filesep 'example1.json'],'SimplifyCell',1) % % license: % BSD, see LICENSE_BSD.txt files for details % % -- this function is part of JSONLab toolbox (http://iso2mesh.sf.net/cgi-bin/index.cgi?jsonlab) % global pos inStr len esc index_esc len_esc isoct arraytoken if(regexp(fname,'[\{\}\]\[]','once')) string=fname; elseif(exist(fname,'file')) fid = fopen(fname,'rb'); string = fread(fid,inf,'uint8=>char')'; fclose(fid); else error('input file does not exist'); end pos = 1; len = length(string); inStr = string; isoct=exist('OCTAVE_VERSION','builtin'); arraytoken=find(inStr=='[' | inStr==']' | inStr=='"'); jstr=regexprep(inStr,'\\\\',' '); escquote=regexp(jstr,'\\"'); arraytoken=sort([arraytoken escquote]); % String delimiters and escape chars identified to improve speed: esc = find(inStr=='"' | inStr=='\' ); % comparable to: regexp(inStr, '["\\]'); index_esc = 1; len_esc = length(esc); opt=varargin2struct(varargin{:}); if(jsonopt('ShowProgress',0,opt)==1) opt.progressbar_=waitbar(0,'loading ...'); end jsoncount=1; while pos <= len switch(next_char) case '{' data{jsoncount} = parse_object(opt); case '[' data{jsoncount} = parse_array(opt); otherwise error_pos('Outer level structure must be an object or an array'); end jsoncount=jsoncount+1; end % while jsoncount=length(data); if(jsoncount==1 && iscell(data)) data=data{1}; end if(~isempty(data)) if(isstruct(data)) % data can be a struct array data=jstruct2array(data); elseif(iscell(data)) data=jcell2array(data); end end if(isfield(opt,'progressbar_')) close(opt.progressbar_); end %% function newdata=jcell2array(data) len=length(data); newdata=data; for i=1:len if(isstruct(data{i})) newdata{i}=jstruct2array(data{i}); elseif(iscell(data{i})) newdata{i}=jcell2array(data{i}); end end %%------------------------------------------------------------------------- function newdata=jstruct2array(data) fn=fieldnames(data); newdata=data; len=length(data); for i=1:length(fn) % depth-first for j=1:len if(isstruct(getfield(data(j),fn{i}))) newdata(j)=setfield(newdata(j),fn{i},jstruct2array(getfield(data(j),fn{i}))); end end end if(~isempty(strmatch('x0x5F_ArrayType_',fn)) && ~isempty(strmatch('x0x5F_ArrayData_',fn))) newdata=cell(len,1); for j=1:len ndata=cast(data(j).x0x5F_ArrayData_,data(j).x0x5F_ArrayType_); iscpx=0; if(~isempty(strmatch('x0x5F_ArrayIsComplex_',fn))) if(data(j).x0x5F_ArrayIsComplex_) iscpx=1; end end if(~isempty(strmatch('x0x5F_ArrayIsSparse_',fn))) if(data(j).x0x5F_ArrayIsSparse_) if(~isempty(strmatch('x0x5F_ArraySize_',fn))) dim=data(j).x0x5F_ArraySize_; if(iscpx && size(ndata,2)==4-any(dim==1)) ndata(:,end-1)=complex(ndata(:,end-1),ndata(:,end)); end if isempty(ndata) % All-zeros sparse ndata=sparse(dim(1),prod(dim(2:end))); elseif dim(1)==1 % Sparse row vector ndata=sparse(1,ndata(:,1),ndata(:,2),dim(1),prod(dim(2:end))); elseif dim(2)==1 % Sparse column vector ndata=sparse(ndata(:,1),1,ndata(:,2),dim(1),prod(dim(2:end))); else % Generic sparse array. ndata=sparse(ndata(:,1),ndata(:,2),ndata(:,3),dim(1),prod(dim(2:end))); end else if(iscpx && size(ndata,2)==4) ndata(:,3)=complex(ndata(:,3),ndata(:,4)); end ndata=sparse(ndata(:,1),ndata(:,2),ndata(:,3)); end end elseif(~isempty(strmatch('x0x5F_ArraySize_',fn))) if(iscpx && size(ndata,2)==2) ndata=complex(ndata(:,1),ndata(:,2)); end ndata=reshape(ndata(:),data(j).x0x5F_ArraySize_); end newdata{j}=ndata; end if(len==1) newdata=newdata{1}; end end %%------------------------------------------------------------------------- function object = parse_object(varargin) parse_char('{'); object = []; if next_char ~= '}' while 1 str = parseStr(varargin{:}); if isempty(str) error_pos('Name of value at position %d cannot be empty'); end parse_char(':'); val = parse_value(varargin{:}); eval( sprintf( 'object.%s = val;', valid_field(str) ) ); if next_char == '}' break; end parse_char(','); end end parse_char('}'); %%------------------------------------------------------------------------- function object = parse_array(varargin) % JSON array is written in row-major order global pos inStr isoct parse_char('['); object = cell(0, 1); dim2=[]; arraydepth=jsonopt('JSONLAB_ArrayDepth_',1,varargin{:}); pbar=jsonopt('progressbar_',-1,varargin{:}); if next_char ~= ']' if(jsonopt('FastArrayParser',1,varargin{:})>=1 && arraydepth>=jsonopt('FastArrayParser',1,varargin{:})) [endpos, e1l, e1r, maxlevel]=matching_bracket(inStr,pos); arraystr=['[' inStr(pos:endpos)]; arraystr=regexprep(arraystr,'"_NaN_"','NaN'); arraystr=regexprep(arraystr,'"([-+]*)_Inf_"','$1Inf'); arraystr(arraystr==sprintf('\n'))=[]; arraystr(arraystr==sprintf('\r'))=[]; %arraystr=regexprep(arraystr,'\s*,',','); % this is slow,sometimes needed if(~isempty(e1l) && ~isempty(e1r)) % the array is in 2D or higher D astr=inStr((e1l+1):(e1r-1)); astr=regexprep(astr,'"_NaN_"','NaN'); astr=regexprep(astr,'"([-+]*)_Inf_"','$1Inf'); astr(astr==sprintf('\n'))=[]; astr(astr==sprintf('\r'))=[]; astr(astr==' ')=''; if(isempty(find(astr=='[', 1))) % array is 2D dim2=length(sscanf(astr,'%f,',[1 inf])); end else % array is 1D astr=arraystr(2:end-1); astr(astr==' ')=''; [obj, count, errmsg, nextidx]=sscanf(astr,'%f,',[1,inf]); if(nextidx>=length(astr)-1) object=obj; pos=endpos; parse_char(']'); return; end end if(~isempty(dim2)) astr=arraystr; astr(astr=='[')=''; astr(astr==']')=''; astr(astr==' ')=''; [obj, count, errmsg, nextidx]=sscanf(astr,'%f,',inf); if(nextidx>=length(astr)-1) object=reshape(obj,dim2,numel(obj)/dim2)'; pos=endpos; parse_char(']'); if(pbar>0) waitbar(pos/length(inStr),pbar,'loading ...'); end return; end end arraystr=regexprep(arraystr,'\]\s*,','];'); else arraystr='['; end try if(isoct && regexp(arraystr,'"','once')) error('Octave eval can produce empty cells for JSON-like input'); end object=eval(arraystr); pos=endpos; catch while 1 newopt=varargin2struct(varargin{:},'JSONLAB_ArrayDepth_',arraydepth+1); val = parse_value(newopt); object{end+1} = val; if next_char == ']' break; end parse_char(','); end end end if(jsonopt('SimplifyCell',0,varargin{:})==1) try oldobj=object; object=cell2mat(object')'; if(iscell(oldobj) && isstruct(object) && numel(object)>1 && jsonopt('SimplifyCellArray',1,varargin{:})==0) object=oldobj; elseif(size(object,1)>1 && ndims(object)==2) object=object'; end catch end end parse_char(']'); if(pbar>0) waitbar(pos/length(inStr),pbar,'loading ...'); end %%------------------------------------------------------------------------- function parse_char(c) global pos inStr len skip_whitespace; if pos > len || inStr(pos) ~= c error_pos(sprintf('Expected %c at position %%d', c)); else pos = pos + 1; skip_whitespace; end %%------------------------------------------------------------------------- function c = next_char global pos inStr len skip_whitespace; if pos > len c = []; else c = inStr(pos); end %%------------------------------------------------------------------------- function skip_whitespace global pos inStr len while pos <= len && isspace(inStr(pos)) pos = pos + 1; end %%------------------------------------------------------------------------- function str = parseStr(varargin) global pos inStr len esc index_esc len_esc % len, ns = length(inStr), keyboard if inStr(pos) ~= '"' error_pos('String starting with " expected at position %d'); else pos = pos + 1; end str = ''; while pos <= len while index_esc <= len_esc && esc(index_esc) < pos index_esc = index_esc + 1; end if index_esc > len_esc str = [str inStr(pos:len)]; pos = len + 1; break; else str = [str inStr(pos:esc(index_esc)-1)]; pos = esc(index_esc); end nstr = length(str); switch inStr(pos) case '"' pos = pos + 1; if(~isempty(str)) if(strcmp(str,'_Inf_')) str=Inf; elseif(strcmp(str,'-_Inf_')) str=-Inf; elseif(strcmp(str,'_NaN_')) str=NaN; end end return; case '\' if pos+1 > len error_pos('End of file reached right after escape character'); end pos = pos + 1; switch inStr(pos) case {'"' '\' '/'} str(nstr+1) = inStr(pos); pos = pos + 1; case {'b' 'f' 'n' 'r' 't'} str(nstr+1) = sprintf(['\' inStr(pos)]); pos = pos + 1; case 'u' if pos+4 > len error_pos('End of file reached in escaped unicode character'); end str(nstr+(1:6)) = inStr(pos-1:pos+4); pos = pos + 5; end otherwise % should never happen str(nstr+1) = inStr(pos), keyboard pos = pos + 1; end end error_pos('End of file while expecting end of inStr'); %%------------------------------------------------------------------------- function num = parse_number(varargin) global pos inStr len isoct currstr=inStr(pos:end); numstr=0; if(isoct~=0) numstr=regexp(currstr,'^\s*-?(?:0|[1-9]\d*)(?:\.\d+)?(?:[eE][+\-]?\d+)?','end'); [num, one] = sscanf(currstr, '%f', 1); delta=numstr+1; else [num, one, err, delta] = sscanf(currstr, '%f', 1); if ~isempty(err) error_pos('Error reading number at position %d'); end end pos = pos + delta-1; %%------------------------------------------------------------------------- function val = parse_value(varargin) global pos inStr len true = 1; false = 0; pbar=jsonopt('progressbar_',-1,varargin{:}); if(pbar>0) waitbar(pos/len,pbar,'loading ...'); end switch(inStr(pos)) case '"' val = parseStr(varargin{:}); return; case '[' val = parse_array(varargin{:}); return; case '{' val = parse_object(varargin{:}); if isstruct(val) if(~isempty(strmatch('x0x5F_ArrayType_',fieldnames(val), 'exact'))) val=jstruct2array(val); end elseif isempty(val) val = struct; end return; case {'-','0','1','2','3','4','5','6','7','8','9'} val = parse_number(varargin{:}); return; case 't' if pos+3 <= len && strcmpi(inStr(pos:pos+3), 'true') val = true; pos = pos + 4; return; end case 'f' if pos+4 <= len && strcmpi(inStr(pos:pos+4), 'false') val = false; pos = pos + 5; return; end case 'n' if pos+3 <= len && strcmpi(inStr(pos:pos+3), 'null') val = []; pos = pos + 4; return; end end error_pos('Value expected at position %d'); %%------------------------------------------------------------------------- function error_pos(msg) global pos inStr len poShow = max(min([pos-15 pos-1 pos pos+20],len),1); if poShow(3) == poShow(2) poShow(3:4) = poShow(2)+[0 -1]; % display nothing after end msg = [sprintf(msg, pos) ': ' ... inStr(poShow(1):poShow(2)) '<error>' inStr(poShow(3):poShow(4)) ]; error( ['JSONparser:invalidFormat: ' msg] ); %%------------------------------------------------------------------------- function str = valid_field(str) global isoct % From MATLAB doc: field names must begin with a letter, which may be % followed by any combination of letters, digits, and underscores. % Invalid characters will be converted to underscores, and the prefix % "x0x[Hex code]_" will be added if the first character is not a letter. pos=regexp(str,'^[^A-Za-z]','once'); if(~isempty(pos)) if(~isoct) str=regexprep(str,'^([^A-Za-z])','x0x${sprintf(''%X'',unicode2native($1))}_','once'); else str=sprintf('x0x%X_%s',char(str(1)),str(2:end)); end end if(isempty(regexp(str,'[^0-9A-Za-z_]', 'once' ))) return; end if(~isoct) str=regexprep(str,'([^0-9A-Za-z_])','_0x${sprintf(''%X'',unicode2native($1))}_'); else pos=regexp(str,'[^0-9A-Za-z_]'); if(isempty(pos)) return; end str0=str; pos0=[0 pos(:)' length(str)]; str=''; for i=1:length(pos) str=[str str0(pos0(i)+1:pos(i)-1) sprintf('_0x%X_',str0(pos(i)))]; end if(pos(end)~=length(str)) str=[str str0(pos0(end-1)+1:pos0(end))]; end end %str(~isletter(str) & ~('0' <= str & str <= '9')) = '_'; %%------------------------------------------------------------------------- function endpos = matching_quote(str,pos) len=length(str); while(pos<len) if(str(pos)=='"') if(~(pos>1 && str(pos-1)=='\')) endpos=pos; return; end end pos=pos+1; end error('unmatched quotation mark'); %%------------------------------------------------------------------------- function [endpos, e1l, e1r, maxlevel] = matching_bracket(str,pos) global arraytoken level=1; maxlevel=level; endpos=0; bpos=arraytoken(arraytoken>=pos); tokens=str(bpos); len=length(tokens); pos=1; e1l=[]; e1r=[]; while(pos<=len) c=tokens(pos); if(c==']') level=level-1; if(isempty(e1r)) e1r=bpos(pos); end if(level==0) endpos=bpos(pos); return end end if(c=='[') if(isempty(e1l)) e1l=bpos(pos); end level=level+1; maxlevel=max(maxlevel,level); end if(c=='"') pos=matching_quote(tokens,pos+1); end pos=pos+1; end if(endpos==0) error('unmatched "]"'); end
{ "pile_set_name": "Github" }
PROVO — It was a case of getting caught red-handed. Four suspects were arrested and cited for criminal mischief for vandalizing the cougar statue outside of LaVell Edwards Stadium the night before the BYU-Utah football game, the first game in Provo between the two schools since 2013. Lt. Steven Messick of the Brigham Young University police department told the Deseret News that around 4:50 a.m., a student called police and reported seeing people painting the cougar statue, which sits on the southwest corner outside of the stadium. Messick said officers responded and located the suspects in a vehicle with red paint on their hands. The suspects admitted to vandalizing the statue, were cited for criminal mischief and released. By 11:30 a.m., BYU grounds crew personnel were finishing cleaning the statue of the vandalism. That was the only statue on BYU’s campus that was vandalized. Pictures of the vandalized statue began to circulate in the early morning hours on Saturday. I can confirm that this is a completely legit photo. Did BYU seriously not wrap up the statues this year? pic.twitter.com/adPnVHsp9I — Drew Troutner (@drewsky5) September 9, 2017 BYU students began lining up around the stadium around 9 a.m. to fill the “Roar of the Cougars” section. University and athletics department officials did not immediately return a request for comment. BYU athletic director Tom Holmoe reacted on Twitter.
{ "pile_set_name": "OpenWebText2" }
1. Introduction {#sec1-cancers-12-00417} =============== Small-molecule inhibitors such as tyrosine kinase inhibitors (TKIs) target intracellular signal pathways and are designed to cross cellular membranes passively due to their size and lipophilicity. Inside the cell they may exert their action by blocking the ATP-binding pocket of their target protein, thereby inhibiting protein signal transduction. Drug distribution within the cell is therefore an important consideration for drug efficacy. Sunitinib is an orally administered, multi-targeted TKI approved by the United States Food and Drug Administration and the European Medicines Agency for the treatment of imatinib-resistant gastrointestinal stromal tumor, advanced renal cell carcinoma and advanced pancreatic neuroendocrine tumors \[[@B1-cancers-12-00417]\]. Sunitinib exerts its anti-cancer effect directly both on the tumor vasculature and tumor cells \[[@B2-cancers-12-00417]\]. In addition, sunitinib has been shown to inhibit tumor growth by inducing anti-tumor immunity, through reduction of both myeloid-derived suppressor cells (MDSCs) and T regulatory cells (Tregs) \[[@B3-cancers-12-00417],[@B4-cancers-12-00417]\]. The main targets of sunitinib are vascular endtothelial growth factor receptors (VEGFRs), platelet-derived growth factor receptors (PDGFRs), fms-related tyrosine kinase 3 (FLT-3), the stem cell factor receptor (KIT) and the colony stimulating factor 1 (CSF-1), which all are inhibited at nanomolar concentrations \[[@B5-cancers-12-00417]\]. Sunitinib is a weak base (pKa = 8.95, [Figure S1](#app1-cancers-12-00417){ref-type="app"}) and is therefore subjected to increased protonation at decreasing pH values in the physiological pH span. Consequently, protonated sunitinib is sequestered in acidic lysosomes, which impact its intracellular distribution and may reduce its target interaction and, hence, drug efficacy \[[@B6-cancers-12-00417],[@B7-cancers-12-00417]\]. Lysosomal sequestration of sunitinib has previously been shown in acquired sunitinib-resistant HT-29 colon cancer cells \[[@B7-cancers-12-00417]\]. The impact of sequestration on sunitinib resistance has, however, not been studied. Lysosomal sequestration is not only limited to sunitinib, but is also observed for other anti-cancer weak-basic drugs such as other TKIs (gefitinib, lapatinib \[[@B8-cancers-12-00417]\]), anthracyclines (doxorubicin \[[@B9-cancers-12-00417]\], daunorubicin \[[@B10-cancers-12-00417]\]) and preclinical imidazocridinones \[[@B6-cancers-12-00417],[@B11-cancers-12-00417],[@B12-cancers-12-00417]\]. Photochemical internalization (PCI) represents a clinically relevant treatment modality for release of drugs that are entrapped in endosomes and lysosomes \[[@B13-cancers-12-00417],[@B14-cancers-12-00417],[@B15-cancers-12-00417]\]. This method is based on amphiphilic photosensitizers (PSs), such as meso-tetraphenylchlorin disulfonate (TPCS~2a~) ([Figure S1](#app1-cancers-12-00417){ref-type="app"}), which localize in the membrane of endocytic vesicles \[[@B14-cancers-12-00417]\]. Upon illumination, reactive oxygen species (ROS) generated during photochemical reactions destabilize the vesicle membrane and induce cytosolic release of the content entrapped in these vesicles \[[@B16-cancers-12-00417],[@B17-cancers-12-00417]\]. Drugs which accumulate in endo/lysosomal compartments can in this way be released to interact with their intracellular target. PCI may be applied with two different protocols; in the "light after" protocol light exposure is applied after administration of the drug to be released, while in the "light first" protocol the photochemical reaction is generated before administration of the drug \[[@B18-cancers-12-00417]\]. PCI was first documented as a delivery technology of hydrophilic macromolecules which do not readily penetrate the plasma membrane. Recent evidence has, however, indicated the technology as efficient also for small molecules entrapped in endocytic vesicles, such as gemcitabine and doxorubicin \[[@B13-cancers-12-00417],[@B19-cancers-12-00417],[@B20-cancers-12-00417],[@B21-cancers-12-00417]\]. Here, we evaluated PCI as a strategy to release lysosomal sequestered sunitinib, thereby enhancing the cytotoxicity of sunitinib in cancer cells. 2. Results {#sec2-cancers-12-00417} ========== 2.1. Lysosomal Localization of Sunitinib and TPCS~2a~ {#sec2dot1-cancers-12-00417} ----------------------------------------------------- PCI is dependent on endo/lysosomal localization of both the PS and the molecule subjected to cytosolic release. Fluorescence microscopy of sunitinib and TPCS~2a~ was therefore employed to evaluate the intracellular localization of both compounds. Granular fluorescence of sunitinib was detected after 24 h incubation in HT-29 cells ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}a). The fluorescence was to a large degree overlapping with LysoTracker Red in agreement with a previous report by Nowak-Sliwinska et al. \[[@B22-cancers-12-00417]\], indicating accumulation of sunitinib in endo/lysosomal vesicles. TPCS~2a~ enters the cell by means of adsorptive endocytosis and accumulates in the membrane of endo/lysosomal vesicles \[[@B13-cancers-12-00417],[@B16-cancers-12-00417]\]. An 18 h incubation of TPCS~2a~ resulted in granular fluorescence, partly overlapping with LysoTracker, indicating endo/lysosomal localization in HT-29 cells ([Figure S2](#app1-cancers-12-00417){ref-type="app"}). Fluorescence was, however, also detected on the plasma membrane indicating non-endocytosed PS. Plasma membrane associated TPCS~2a~ was largely removed by a 4 h incubation in TPCS~2a~-free medium, resulting in an overall granular pattern of fluorescence. Thus, TPCS~2a~ accumulates mainly in endo/lysosomes in HT-29 cells when used as in a standard PCI protocol ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}b, left panel) in agreement with previous reports \[[@B14-cancers-12-00417],[@B16-cancers-12-00417]\]. Photochemical destabilization of the endo/lysosomal membrane and subsequent cytosolic release of the entrapped drug of interest is the basic mechanism behind PCI. Light exposure was here shown to relocalize TPCS~2a~ to the cytosol in HT-29 cells, which corresponded with a reduction of the LysoTracker signal ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}b, right panel). 2.2. No Enhanced Toxicity by PCI "Light After" of Sunitinib {#sec2dot2-cancers-12-00417} ----------------------------------------------------------- The fluorescence images in [Figure 1](#cancers-12-00417-f001){ref-type="fig"}a,b reveal endo/lysosomal localization of both TPCS~2a~ and sunitinib, and it was therefore expected that light activation of the photosensitizer would result in cytosolic release of sunitinib. This PCI protocol was in accordance with the PCI "light after" procedure where light exposure is applied after administration of the drug to be released. No enhanced cytotoxicity was, however, indicated following PCI of sunitinib exposing the cells to blue light from LumiSource™ ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}c). The observed combined effect was found to be slightly higher than the theoretical additive effect, and the synergy/antagonism parameter difference in log (DL) indicated a negative value −0.089 ± 0.075 although not significantly different from additively (*p* = 0.367). The absorption maximum for sunitinib has previously been reported at 429 nm, which is near the maximum emission wave length of blue light source (λ~max~ = 437 nm) \[[@B22-cancers-12-00417]\]. The PS TPCS~2a~ is also activated at its secondary maxima λ = 652 nm, allowing the circumvention of a putative blue-light induced inactivation of sunitinib. However, no increase in cytotoxicity was observed by PCI of sunitinib with the red light source ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}d) yielding a slightly negative DL value −0.023 ± 0.09 (*p* = 0.834, not significant). PCI of the protein toxin gelonin (rGel) was included as a positive control for the PCI procedure, which resulted in synergistic cytotoxicity between rGel and the photochemical treatment, supported with a positive DL 0.262 ± 0.0048 (*p* \< 0.001) ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}e). Hence, PCI "light after" does not enhance the efficacy of sunitinib. 2.3. Sunitinib Is a Target for ROS-Mediated Photodamage {#sec2dot3-cancers-12-00417} ------------------------------------------------------- We investigated if the lack of enhanced cytotoxicity of sunitinib-PCI ("light after") could be explained by ROS mediated photodamage of sunitinib. Singlet oxygen (^1^O~2~) is considered as the most important ROS formed during photochemical treatment as applied in this work \[[@B23-cancers-12-00417],[@B24-cancers-12-00417]\]. The short half-life (\<0.04 µs) and diffusion distance (10--20 nm) of singlet oxygen in cellular membranes \[[@B25-cancers-12-00417]\] implicate that TPCS~2a~ should be in close intracellular vicinity of sunitinib in order to induce photochemical damage of the TKI. Super-resolution microscopy was therefore performed in order to evaluate the subcellular/suborganellar localization of TPCS~2a~ and sunitinib in detail. TPCS~2a~ and sunitinib partially co-localized in ring-like structures in single optical sections, indicating both compounds to be associated with vesicular membranes ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}f). These results are in support for ROS-mediated photochemical damage of sunitinib. Photodamage of sunitinib in the presence of TPCS~2a~ was further evaluated by absorption and fluorescence spectroscopy in solutions at pH 7 containing 1% fetal bovine serum (FBS) to solubilize these compounds. The emission spectra of both sunitinib and TPCS~2a~ prepared without light exposure were attenuated when they were combined ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}g). However, the sunitinib fluorescence was reduced by approximately 50% while that of TPCS~2a~ was only reduced by \~20% ([Figure S3](#app1-cancers-12-00417){ref-type="app"}). The fluorescence spectrum of sunitinib overlaps well the 4 Q-band absorption spectrum of TPCS~2a~ \[[@B16-cancers-12-00417]\]. Thus, these results may be due to Förster resonance energy transfer (FRET) between sunitinib and TPCS~2a~ i.e., emission from sunitinib is absorbed by TPCS~2a~ and added to the directly excited TPCS~2a~. FRET may occur if the distance between the donor (sunitinib) and acceptor (TPCS~2a~) is short enough, typically 1--10 nm and is in line with the close proximity of the drugs in endo/lysosomal membranes \[[@B26-cancers-12-00417]\]. The light exposure of both sunitinib and TPCS~2a~ separately lead to a smaller attenuation of sunitinib fluorescence (28%) than of TPCS~2a~ fluorescence (57%) ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}g, table). When sunitinib and TPCS~2a~ was combined and exposed to light the TPCS~2a~ fluorescence was reduced to the same extent as in the absence of sunitinib, while the reduction in sunitinib fluorescence was much stronger in the presence of TPCS~2a~. These results indicate that the photooxidation of TPCS~2a~ is independent of the presence of sunitinib, while photoactivation of TPCS~2a~ contribute to the photooxidation of sunitinib. Similar results were observed with the absorption spectra where the broad absorption peak, 330--495 nm of sunitinib disappeared after light exposure of TPCS~2a~ ([Figure S4](#app1-cancers-12-00417){ref-type="app"}). Photochemical targeting of the endosomal membrane has previously been shown to release H^+^ from the endosomal lumen and thereby increase the endosomal pH prior to escape of endocytosed molecules \[[@B27-cancers-12-00417]\] and pH 7 was therefore selected as the experimental condition. Nevertheless, the absorption spectra were also collected at pH 5 showing similar results as for pH 7 ([Figure S4](#app1-cancers-12-00417){ref-type="app"}). These results therefore imply that sunitinib is photodamaged after light exposure of TPCS2a, most likely due to single oxygen-induced photooxidation. 2.4. Synergistic Cytotoxicity by "Light First" Sunitinib-PCI {#sec2dot4-cancers-12-00417} ------------------------------------------------------------ PCI has usually been performed as in [Figure 1](#cancers-12-00417-f001){ref-type="fig"}c,d with the photochemical reaction initiated after administration of the drug of interest in combination with PS ("light after" procedure). However, PCI of non-targeting therapeutics has also been shown just as effective when the drug is administrated after the photochemical treatment ("light first" procedure) \[[@B17-cancers-12-00417],[@B18-cancers-12-00417]\]. The suggested mechanism behind the "light first" procedure is fusion between photochemically damaged vesicles and intact vesicles containing the drug of interest \[[@B18-cancers-12-00417]\]. Circumvention of the photochemical destruction of sunitinib during sunitinib-PCI was therefore attempted by applying PCI with the "light first" procedure. Indeed, treatment of HT-29 cells with sunitinib immediately after TPCS~2a~ incubation and light exposure was found to induce a synergistic reduction of viability as measured by the MTT assay ([Figure 2](#cancers-12-00417-f002){ref-type="fig"}a). The survival after sunitinib-PCI was found to be significantly lower than the theoretical additive effect at 8 µM sunitinib (*p* = 0.015) ([Figure 2](#cancers-12-00417-f002){ref-type="fig"}b) supported by a synergy/antagonism parameter DL of 0.84 ± 0.49 (*p* = 0.0035), indicating synergism. The effect of sunitinib-PCI was further verified by clonogenic assay indicating reduction of clonal cell survival by the PCI treatment ([Figure 2](#cancers-12-00417-f002){ref-type="fig"}c). The "light first" procedure was also applied to CT26.WT cells confirming enhanced reduction in cell viability by PCI of sunitinib ([Figure 2](#cancers-12-00417-f002){ref-type="fig"}d). At 2 µM sunitinib in CT26.WT, the DL value was 0.32 ± 0.046 (*p* = 0.019). Thus, PCI with the "light first" procedure enhances sunitinib cytotoxicity in both HT-29 and CT26.WT colon cancer cell lines in a synergistic manner. Fluorescence imaging was performed to confirm cytosolic release of sunitinib ([Figure 2](#cancers-12-00417-f002){ref-type="fig"}e). Cytosolic release of sunitinib should result in a change in fluorescence from granules (endocytic vesicles) to diffuse fluorescence from the cytoplasm. The PCI "light after" protocol, with the photochemical treatment applied after sunitinib incubation, showed little difference in the fluorescence pattern of sunitinib upon light exposure, indicating poor cytosolic release with this procedure. This was in contrast to the PCI "light first" protocol where a pronounced cytosolic fluorescence from sunitinib was observed upon light exposure. Thus, PCI with the "light first" procedure was indicated to release sunitinib from endosomal compartments, while PCI with the "light after" procedure was not. 2.5. Acquired Resistance and Endo/Lysosomal Accumulation Following Prolonged Sunitinib Exposure {#sec2dot5-cancers-12-00417} ----------------------------------------------------------------------------------------------- Lysosomal accumulation of sunitinib has been reported as a mechanism of resistance \[[@B7-cancers-12-00417],[@B28-cancers-12-00417],[@B29-cancers-12-00417],[@B30-cancers-12-00417],[@B31-cancers-12-00417],[@B32-cancers-12-00417]\] and we tested if PCI could counteract this mechanism by releasing endosomal sunitinib sequestered during long-term exposure. Sunitinib resistant HT-29 cells, HT-29/SR, was generated by continuous exposure to 2 µM. The low drug dose of 2 µM sunitinib reduced the viability in parental cells by approximately 20% ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}a). The sunitinib concentration required to reduce the cell viability by 40% was 1.8 ± 0.08 (*p* \< 0.001) fold higher in HT-29/SR cells compared to the parental cells. The sunitinib response in HT-29/SR cells measured by MTT assay was found similar within the time frame of these experiments indicating a stabilized sunitinib response in HT-29/SR cells ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}a). The decreased sensitivity to sunitinib in HT-29/SR cells was demonstrated even more substantial by clonal cell survival as compared to overall cell viability (MTT) ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}b). Overall, sunitinib sensitivity in HT-29 cells is higher than previously reported \[[@B7-cancers-12-00417]\]. This is probably due to shorter incubation times (72 h versus 96 h). The proliferation rate of HT-29/SR and HT-29 in the presence of sunitinib was also investigated ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}c). A 2 µM sunitinib incubation for 120 h resulted in 42% confluence in the HT-29/SR cells while only 31% confluence was observed in the parental HT-29 cell line. The same tendency was shown for all sunitinib concentrations tested. Thus, the proliferation rate of HT-29/SR cells in the presence of 1--10 µM sunitinib was increased compared to the parental cells, further documenting the successful generation of sunitinib-resistant cells. High degree of co-localization of sunitinib with LysoTracker Red confirmed lysosomal sequestering of sunitinib in HT-29/SR cells as verified by fluorescence microscopy ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}d). The fluorescence images indicated higher fluorescence signals from sunitinib in HT-29/SR cells compared to the parental HT-29 cells ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}a). Accumulation of sunitinib in HT-29 cells was further documented by flow cytometry, indicating a\~1.8 fold higher accumulation in HT-29/SR cells that have been continuously incubated with sunitinib compared to parental cells subjected to 72 h sunitinib incubation (*p* = 0.03, one-tailed *p* value) ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}e). Accumulated sunitinib in HT-29/SR cells was released when removing sunitinib from the media for 24 h ([Figure S5](#app1-cancers-12-00417){ref-type="app"}). In agreement with this, there was no difference in sunitinib accumulation between HT-29 and HT-29/SR cells when a 24 h wash in drug-free medium was added before the 72 h sunitinib incubation ([Figure S5](#app1-cancers-12-00417){ref-type="app"}). 2.6. Photochemical Release of Sequestered Sunitinib Does Not Abolish Sunitinib Resistance in HT-29/SR {#sec2dot6-cancers-12-00417} ----------------------------------------------------------------------------------------------------- As sunitinib was found subjected to photochemical damage by TPCS~2a~ and light, it was expected that sunitinib-PCI with "light after" would not induce synergistic effects on cell viability. Indeed, no difference in light-induced toxicity was found between TPCS~2a~-treated HT-29/SR and HT-29 cells ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}f), and PCI with "light after" procedure yielded no statistically significant difference between sunitinib alone and PCI "light after" at 8 µM sunitinib ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}g). The antagonism/synergy DL parameter −0.161 ± 0.154 (*p* = 0.49, not significant) indicated additivity, but towards antagonism similar to the parental HT-29 cells ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}c,d). PCI with the "light first" strategy induced reduction in HT-29/SR cell viability ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}h, *p* = 0.044 at 8 µM sunitinib compared to PCI). The effect was further evaluated using the DL parameter and was at 8 µM sunitinib 0.049 ± 0.094 (*p* = 0.66, not significant) indicating that the effect was additive with this strategy. Thus, the sunitinib resistance was not abolished by the sunitinib concentration applied to reduce viability with neither "light first" nor "light after" PCI. Notably, PCI of rGel with "light after" strategy was found similarly efficient in both HT-29 ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}e) and HT-29/SR implying rGel-PCI to circumvent sunitinib resistance ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}i). 2.7. Modest HT-29 Tumor Growth Delay After Sunitinib-PCI in Athymic Mice {#sec2dot7-cancers-12-00417} ------------------------------------------------------------------------ Based on the in vitro results, PCI with "light first" protocol, was selected for the in vivo evaluation of sunitinib-PCI in HT-29 xenografts in athymic mice. rGel-PCI has previously been reported as least as efficient with the "light first" procedure as with the "light after" procedure in vivo \[[@B17-cancers-12-00417]\]. The "light first" effect is previously indicated up to \~8 h post-photochemical treatment \[[@B18-cancers-12-00417]\] while sunitinib reaches a maximum plasma concentration 3--6 h post-oral administration \[[@B33-cancers-12-00417]\]. In the first in vivo treatment protocol (Sun1-PCI) sunitinib was therefore administrated 3 h prior to and 30 min after light exposure. Fluorescence microscopy of frozen tumor sections revealed the presence of both TPCS~2a~ and sunitinib in the tumor at the point of light exposure ([Figure 4](#cancers-12-00417-f004){ref-type="fig"}a). The granular TPCS~2a~ fluorescence indicated localization in endosomes and lysosomes. The sunitinib fluorescence was, however, mostly weak and too diffuse to make any conclusions on intracellular localizations. However, some overlap in granular sunitinib and TPCS~2a~ fluorescence was detected in the frozen sections indicating in vivo co-localization. Light exposure of the tumors at 15 J/cm^2^ induced a reduction of both TPCS~2a~ and sunitinib fluorescence ([Figure 4](#cancers-12-00417-f004){ref-type="fig"}b), most likely reflecting photochemical damage of sunitinib as observed in vitro and photobleaching of TPCS~2a~ ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}g) \[[@B16-cancers-12-00417]\]. Sun1-PCI did not increase the overall treatment effect compared to PS + light only or Sun1 only, as shown in the Kaplan-Meier plot and in the estimated mean time to reach endpoint (tumor size \< 900 mm^3^) ([Figure 4](#cancers-12-00417-f004){ref-type="fig"}c,e). In an effort to enhance the anti-tumor efficacy, we extended the duration of sunitinib treatment after light exposure by additional administration on day 1, 2, 3 and 4 post-light exposure (Sun2 protocol). The estimated time to reach endpoint was significantly increased compared to untreated controls in all groups receiving sunitinib, and the longest estimated time to reach endpoint was found for the Sun2-PCI-treated animals (25 d compared to 12 d for untreated animals) ([Figure 4](#cancers-12-00417-f004){ref-type="fig"}d,e). The growth curves of each individual animal indicated tumor growth delay the first 10 days after Sun1-PCI and Sun2-PCI ([Figure S6](#app1-cancers-12-00417){ref-type="app"}). The average tumor size at day 6 and 10 after treatment was therefore assessed in all treatment groups ([Figure 4](#cancers-12-00417-f004){ref-type="fig"}f). The one-way ANOVA test revealed significant differences between the treatment groups at both time points (*p* \< 0.001 at day 6, and *p* = 0.013 at day 10). Further pair-wise multiple comparison (Holm-Sidak method) indicated significant PCI-Sun1-, Sun2- and PCI-Sun2-induced tumor growth delay at 6 days compared to untreated controls ([Figure 4](#cancers-12-00417-f004){ref-type="fig"}g). The tumor volume of PCI-Sun1-treated animals was also significantly smaller than in Sun1-treated animals at day 6. However, no significant difference was found in tumor size between Sun1-PCI- and Sun2-PCI-treated animals at day 6 and 10. The only significant difference at day 10 was found between Sun1-PCI and untreated controls ([Figure 4](#cancers-12-00417-f004){ref-type="fig"}g). Thus, even though sunitinib-PCI showed some initial anti-tumor efficacy compared to non-treated controls, the overall treatment effect was less than expected. Since PCI in vitro could not circumvent sunitinib resistance, the HT-29/SR model was not continued in vivo. 2.8. Poor CT26.WT Tumor Growth Delay After Sunitinib-PCI in Immunocompetent Mice {#sec2dot8-cancers-12-00417} -------------------------------------------------------------------------------- We have previously shown that T-cell activation is important to achieve curative effects after PCI \[[@B34-cancers-12-00417],[@B35-cancers-12-00417]\]. In addition, sunitinib is shown to stimulate anticancer immune response \[[@B3-cancers-12-00417],[@B4-cancers-12-00417]\]. Hence, sunitinib-PCI was explored in CT26.WT tumor-bearing thymic mice. The overall tumor responses of sunitinib-PCI was, however, smaller in the CT26.WT model compared to the HT-29 model ([Figure 5](#cancers-12-00417-f005){ref-type="fig"}a,b). The normalized growth curves indicated a response at early time points ([Figure S7](#app1-cancers-12-00417){ref-type="app"}). Although not significant, the estimated time to reach endpoint was found increased in all the treatment groups compared to untreated controls ([Figure 5](#cancers-12-00417-f005){ref-type="fig"}c). Early treatment responses were evaluated by comparing average tumor sizes in the different treatment groups at day 4 and 7 post-light exposure ([Figure 5](#cancers-12-00417-f005){ref-type="fig"}d,e). Significant difference among the treatment groups was found at day 4 (*p* = 0.015, one-way ANOVA), associated with a significant \~50% reduction in tumor volume in the Sun1-PCI group compared to untreated controls (Holm-Sidak method) ([Figure 5](#cancers-12-00417-f005){ref-type="fig"}e). No significant difference was found between any of the other treatment groups at day 4 ([Figure 5](#cancers-12-00417-f005){ref-type="fig"}e). Furthermore, no significant difference among the treatment groups was found at 7 d post-light exposure in this model (*p* = 0.216, one-way ANOVA) ([Figure 5](#cancers-12-00417-f005){ref-type="fig"}e). 2.9. Tumor Tissue Response {#sec2dot9-cancers-12-00417} -------------------------- The poor response of sunitinib-PCI in the two tumor models was surprising in the light of the promising in vitro data on the "light first" procedure, especially in the CT26.WT model in immunocompetent mice where a strong treatment response was expected. The CT26.WT tumors at endpoint (900 mm^3^) revealed irregular shaped tumors in the PCI-treated animals as compared to the spherical shaped controls. Tumors following the Sun2-PCI protocol and corresponding controls were therefore harvested at endpoint and further evaluated for necrotic-, vascular- and immune-mediated treatment responses by hematoxylin and eosin (H&E) and immunohistochemistry (IHC) staining. Treatment-induced necrosis was detected in PS + light and Sun2-PCI-treated tumors compared to untreated and Sun2-treated tumors where no necrosis was observed ([Figure 6](#cancers-12-00417-f006){ref-type="fig"}a). The necrotic area in the Sun2-PCI-treated tumors were larger compared to in the PS + light group indicating more pronounced cancer parenchymal cell death in agreement with the in vitro results. The immunologic anti-tumor response of light activated TPCS~2a~ is dependent on T-cells infiltrating the treated area \[[@B34-cancers-12-00417],[@B36-cancers-12-00417]\]. An increase in tumor-associated-CD3-positive T-cells was observed in both PS + light and Sun2-treated tumors compared to untreated controls ([Figure 6](#cancers-12-00417-f006){ref-type="fig"}b). Quantification of CD3-stained cells revealed a significant 5- and 3-fold increase in PS + light- and Sun2-treated sections respectively compared to untreated tumors ([Figure 6](#cancers-12-00417-f006){ref-type="fig"}c). No increase was, however, detected in Sun2-PCI-treated tumors ([Figure 6](#cancers-12-00417-f006){ref-type="fig"}c), indicating an antagonistic effect on tumor infiltrating T-cells in this treatment group. A strong Ki-67 staining, indicating proliferating cells, was found in all viable areas in agreement with the H&E stains ([Figure 6](#cancers-12-00417-f006){ref-type="fig"}d), further indicating a stronger treatment response in Sun2-PCI-treated tumors compared to all the other treatment groups. TPCS~2a~ and light has previously been shown to target the tumor vasculature, and sunitinib efficacy has been strongly associated with a vascular response \[[@B16-cancers-12-00417],[@B37-cancers-12-00417],[@B38-cancers-12-00417]\]. IHC with an αCD31 antibody was therefore applied to evaluate vascular responses of the combined treatment. A vascular treatment response was found in both photochemical-treated (PS + light), Sun2-treated and Sun2-PCI-treated tumor tissues, as visualized by rounded fragmented vessels compared to in the untreated controls. No additional effect was, however, found in the Sun2-PCI-treated tumors compared to the PS + light and Sun2 monotherapies ([Figure 6](#cancers-12-00417-f006){ref-type="fig"}e). 3. Discussion {#sec3-cancers-12-00417} ============= Lysosomal degradation is a resistance mechanism for several intracellular acting anticancer therapeutics of different chemical and pharmacologic classes \[[@B39-cancers-12-00417],[@B40-cancers-12-00417]\]. Drugs may accumulate in lysosomes through several ways including different forms of endocytosis \[[@B39-cancers-12-00417]\], transporter-mediated uptake \[[@B6-cancers-12-00417]\] and lysosomal sequestration of hydrophobic weak bases \[[@B12-cancers-12-00417]\]. Within the lysosomes the drugs are inhibited to interact with their cytosolic target \[[@B41-cancers-12-00417]\]. PCI is designed to overcome lysosomal entrapment of anticancer therapeutics, and the method has been shown to potentiate the activity of a variety of drugs including protein toxins, RNA, DNA, nanoparticles and also some conventional chemotherapeutic drugs \[[@B13-cancers-12-00417],[@B14-cancers-12-00417]\]. This is the first report demonstrating direct mechanistic evidence of endo/lysosomal membrane localization and light-controlled cytosolic release of a smallmolecule inhibitor sequestered in endo/lysosomal compartments. Enhancement of sunitinib toxicity with PCI was, however, highly dependent on the treatment protocol, as no increase in cytotoxicity was observed when sunitinib was administrated prior to the photochemical treatment ("light after" strategy, [Figure 1](#cancers-12-00417-f001){ref-type="fig"}c,d). Using super-resolution fluorescence microscopy we were able to show subcellular co-localization of sunitinib and TPCS~2a~ ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}f)~.~ Our data indicate that sunitinib is photodamaged at pH 7 ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}g), which is in agreement with Ohtsuki et al. who report increased endosomal pH prior to release of endocytosed molecules \[[@B27-cancers-12-00417]\]. The absorption spectra ([Figure S4](#app1-cancers-12-00417){ref-type="app"}) suggest that photodamage of sunitinib by TPCS~2a~ can also occur at pH 5. However, due to the amphiphilic nature of TPCS~2a~ \[[@B42-cancers-12-00417]\], the PS will localize and accumulate in the cellular membranes in an in vitro and in vivo setting. This is in agreement with our SIM microscopy images ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}f). Hence, the very close vicinity of these two drugs facilitates ROS-mediated photodamage of sunitinib after light-activation of TPCS~2a~ ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}f,g). The light-triggered, ROS-induced damage of sunitinib most likely also took place when sunitinib-PCI was applied to the sunitinib resistant HT-29/SR cells. PCI was therefore unlikely to release and potentiate sunitinib that was accumulated in the in endo/lysosomal compartments in HT-29/SR cells. This was confirmed by the similar response to photochemical treatment in HT-29 and HT-29/SR cells, indicating no enhanced toxicity from cytosolic release of sunitinib in HT-29/SR cells ([Figure 3](#cancers-12-00417-f003){ref-type="fig"}i). Thus, ROS-mediated photodamage of sunitinib is probably one reason why the photochemical treatment applied here failed to potentiate lysosomal sequestrated sunitinib in resistant cells. As observed in the parental HT-29 cells, sunitinib-PCI with the "light first" protocol was also found to increase the cell toxicity in HT-29/SR cells. This effect was however found to be additive at the highest concentration tested, indicating that the mechanism of sunitinib resistance is not related to lysosomal sequestration. Lysosomal sequestering of sunitinib has been associated with resistance by others \[[@B7-cancers-12-00417],[@B29-cancers-12-00417],[@B31-cancers-12-00417]\]. To our knowledge, direct experiments addressing the cytotoxic impact of lysosomal accumulation of sunitinib in resistant cells has only been included in two reports where only modest increase in sunitinib toxicity was reported by combining sunitinib with Leu-Leu-O-Methyl in vitro \[[@B29-cancers-12-00417]\] or chloroquine in vivo in sunitinib-resistant HT-29 xenografts \[[@B30-cancers-12-00417]\]. These reports therefore also indicate other mechanisms than lysosomal sequestering to orchestrate sunitinib resistance. Further analysis on molecular pathways controlling cellular sunitinib-resistance is needed to conclude on the mechanisms of sunitinib-resistance in the HT-29/SR cells. Even though PCI failed to activate lysosomal sequestrated sunitinib in resistant cells, we here show that the technology can be applied to circumvent sunitinib resistance when combined with the protein toxin gelonin. PCI of protein toxins has previously been shown to circumvent resistance mediated through increased expression of P-glycoprotein \[[@B43-cancers-12-00417],[@B44-cancers-12-00417]\] and the present results in the HT-29/SR cells further documents this strategy as highly efficient for the treatment of therapy resistant cancer. Even though sunitinib-PCI with the "light first" protocol was shown highly efficient in vitro, the treatment did not result in synergistic tumor growth delay in mice. Continuous administration of sunitinib has previously been reported to induce a strong tumor growth delay in similar in vivo models \[[@B30-cancers-12-00417],[@B45-cancers-12-00417]\]. Here, a moderate dose of sunitinib (two or six doses only) and TPCS~2a~ + light was selected to reach a therapeutic window for synergy evaluations. The lack of an increased treatment response with sunitinib-PCI may be due to a narrow therapeutic window. On the other hand, the in vitro data suggest PCI to potentiate sunitinib induced cytotoxicity at low sunitinib concentrations and doses of light. The "light first" protocol has been shown most efficient within \~2--3 h after the photochemical treatment \[[@B18-cancers-12-00417]\], while the estimated time for maximum tumor accumulated sunitinib post-oral administration is 3--4 h \[[@B33-cancers-12-00417]\]. There is therefore a possibility that the amount of sunitinib was too low to synergize with PCI. The lack of overall treatment response to sunitinib-PCI in vivo may also be a result of vascular responses. The photochemical treatment alone targets the tumor vasculature as shown by the IHC on CD31 in CT26.WT tumors in agreement with previous studies \[[@B37-cancers-12-00417],[@B38-cancers-12-00417]\]. This vascular response may inhibit sunitinib penetration into the tumor when administrated after light exposure, and thereby counteract the action of sunitinib-PCI. The H&E data and IHC on Ki-67 supplied here demonstrate, however, larger treatment-induced necrosis in CT26.WT tumor bearing thymic animals receiving sunitinib-PCI compared to any of the control groups. This indicates that sunitinib had access to tumor after the photochemical treatment and induced an additive or supra-additive effect that is not reflected in the tumor growth measurements. The lack of overall treatment response following sunitinib-PCI despite the apparent larger treatment-induced necrosis may reflect a balance between growth of viable cells in the tumor rim and rate of removal of necrotic tissue. Resistance towards vascular disruptive agents, including PS and light, has previously been associated with a residual tumor rim \[[@B46-cancers-12-00417],[@B47-cancers-12-00417]\]. The tumors studied here by H&E and IHC were harvested several days after treatment when the tumors reached their endpoints of 1000 mm^3^. The absence of distinct treatment-induced viable rims was therefore not unexpected, and may have been present at earlier time points. Enhanced efficacy of sunitinib-PCI may therefore be expected by adjuvant treatment targeting this viable rim. The treatment response following sunitinib-PCI in HT-29-bearing athymic mice was smaller than expected, and the response was even further reduced in CT26.WT-bearing immunocompetent mice ([Figure 5](#cancers-12-00417-f005){ref-type="fig"}a,b). PCI in combination with several different drugs has been shown to generate immune-mediated anticancer activity and the overall response has in general been better in immunocompetent mice compared to athymic mice \[[@B34-cancers-12-00417],[@B35-cancers-12-00417]\]. Since the tumor models in athymic and immunocompetent mice here are of different cell line origin, the two models cannot be directly compared. Nevertheless, the IHC data demonstrate an antagonistic effect on CD3+ tumor infiltrating cells in CT26.WT tumors following sunitinib-PCI compared to the agonistic effect observed post- sunitinib- or TPCS~2a~ + light- monotherapy. The combination of sunitinib with immunotherapeutic approaches is somewhat controversial. Sunitinib has been shown to enhance intratumoral infiltation of CD8+ T-cells in combination with a CD40 agonist, a member of the tumor necrosis factor (TNF) superfamily \[[@B48-cancers-12-00417]\] and to suppress immune regulatory cells in combination with celecoxib \[[@B49-cancers-12-00417]\]. On the contrary, sunitinib has been reported to inhibit anti-tumor vaccination by decreasing antigen presenting cells \[[@B50-cancers-12-00417]\] and to impair proliferation and function of phytohemagglutinin (PHA) stimulated human T-cells \[[@B51-cancers-12-00417]\], in agreement with our results showing a decrease in tumor infiltrating T-cells following sunitinib-PCI. Jaini et al. also showed that the decreased immunoresponse following sunitinib and tumor vaccination could be avoided by careful scheduling of the applied drugs, and that enhanced vaccination could be achieved by administration of sunitinib after the priming phase of the vaccination \[[@B50-cancers-12-00417]\]. It is therefore possible that the combination of sunitinib and TPCS~2a~+light would be more effective if sunitinib was delivered one week post-photochemical treatment. This procedure will, however, probably not induce cytosolic release of sunitinib from endocytic vesicles since the time-frame between the photochemical treatment and sunitinib administration will be too long. Sunitinib has previously been suggested as a photosensitizer for endo/lysosomal destruction and it was argued that this approach could be used for the release of sunitinib entrapped in endo/lysosomal compartments \[[@B22-cancers-12-00417]\]. As the activity of sunitinib is here shown to be reduced upon blue light exposure ([Figure 1](#cancers-12-00417-f001){ref-type="fig"}g), dual utilization of sunitinib as a TKI and a photosensitizer is probably little effective at the cellular level. The enhanced tumor growth delay observed by this approach may be due to pharmacologic interactions in the tumor and vascular system. The clinical potential of this suggestion is, however, highly limited due to the absorption maximum of sunitinib in the blue region where the tissue light penetration is only a few 100 µm into the tissue. 4. Materials and Methods {#sec4-cancers-12-00417} ======================== 4.1. Cell Lines and Cultivation {#sec4dot1-cancers-12-00417} ------------------------------- The human colorectal adenocarcinoma cell line HT-29 (ATCC HT-38™) and the murine colorectal carcinoma cell line CT26.WT (ATCC CRL-2638™) were obtained from the American Type Culture Collection (ATCC, Manassas, VA, USA). The cells were subcultured 2--3 times a week in McCoy's 5a medium (Sigma-Aldrich, St. Louis, MO, USA) and RPMI-1640 (Sigma-Aldrich), respectively. The culture media were supplied with 10% fetal bovine serum (FBS) (Thermo Fisher Scientific, Waltham, MA, USA), 100 U/mL penicillin and 100 U/mL streptomycin (Sigma-Aldrich). Sunitinib-resistant HT-29 cells, named HT-29/SR, were generated by continuous exposure to 2 µM sunitinib for up to 5 months and the resistance was routinely verified during this time frame. Untreated parental HT-29 cells were cultured in parallel with the HT-29/SR cells. The cell lines were maintained at 37 °C in a humidified atmosphere containing 5% CO~2~. 4.2. Drugs and Chemicals {#sec4dot2-cancers-12-00417} ------------------------ The photosensitizer (PS) TPCS~2a~ (PCI Biotech AS, Oslo, Norway) was dissolved at 0.4 mg/mL in 3% Tween 80, 2.8% mannitol, 50 mM Tris, pH 8.5 (all from Sigma-Aldrich), and kept protected from light at 4 °C. Sunitinib malate (PZ0012, Sigma-Aldrich) was for in vitro experiments dissolved in dimetylsulfoxid (DMSO) to a final concentration of 2.5 mM, stored as aliquots at −20 °C, and subjected to maximum two freeze-thaw cycles. Sunitinib malate for in vivo experiments was dissolved at a concentration of 8 mg/mL (20 mM) in a vehicle containing distilled water with 1.8% NaCl, 0.5% carboxymethylcellulose, 0.4% Tween 80 and 0.9% benzylalcohol. The pH of the solution was adjusted to 6.0. The sunitinib mixture was sonicated to achieve stable dispersion \[[@B45-cancers-12-00417]\] and used within 24 h after sonication. All sunitinib reagents were stored protected from light. Recombinant gelonin (rGel) was generously provided by Dr. Michael Rosenblum's laboratory at M.D. Anderson Cancer Center (Houston, TX, USA). Aliquots of rGel were stored in phosphate-buffered saline (PBS) at −20 °C. All experiments in vitro and in vivo with sunitinib and/or TPCS~2a~ were performed under subdued light. 4.3. In Vitro Light Sources {#sec4dot3-cancers-12-00417} --------------------------- Illumination of the cells was performed with an in-house made diode lamp or a LumiSource™ lamp (PCI Biotech AS). The diode lamp delivers red light (E~max~ = 650--652 nm) at a fluence rate of 6 mW/cm^2^. LumiSource™ consists of four 18-W Osram L 18/67 light tubes and delivers blue light (λ= 400--500, λ~max~ = 435 nm) at a fluence rate of 7.1--9.6 mW/cm^2^. 4.4. In Vitro PCI Treatment {#sec4dot4-cancers-12-00417} --------------------------- 4000 HT-29 or HT-29/SR cells/well or 1500 CT26.WT cells/well were seeded in 96-well plates (Nuncon Delta, Thermo Fisher Scientific) and allowed to attach overnight. For clonogenic assay, 500 cells were seeded in 6-well plates (Nuncon Delta, Thermo Fisher Scientific). In the "light after" protocol, the cells were incubated with sunitinib prior to light exposure. The cells were incubated with sunitinib for 48 h, at indicated concentrations, prior to an 18 h co-incubation with 0.4 µg/mL TPCS~2a~. The cells were incubated in total 66 h with sunitinib. At the end of the incubation, cells were washed with PBS twice and chased 4 h in drug-free mediums before light exposure in order to remove plasma membrane bound-TPCS~2a~. In the "light first" protocol, the cells were subjected to light before sunitinib incubation. The cells were incubated with 0.4 µg/mL TPCS~2a~ for 18 h, washed with PBS twice and chased in medium for 4 h before light exposure. Sunitinib at indicated concentrations was then added immediately after illumination and incubated for 72 h. For the MTT-assay, sunitinib was removed and treatment efficacy was assessed as described in [Section 4.5](#sec4dot5-cancers-12-00417){ref-type="sec"}. For the clonogenic assay, the sunitinib incubation was sustained until the end of the experiment. PCI of rGel was only performed with the PCI "light after" protocol. Here, rGel at indicated concentrations was added to the wells during the chase period (4 h) and replaced with fresh medium before light exposure. 4.5. Treatment Efficacy In Vitro; Colony Formation Capacity, Viability and Proliferation {#sec4dot5-cancers-12-00417} ---------------------------------------------------------------------------------------- Cell viability was assessed using the MTT (3-(4,5-dimethyl-2-thiazolyl)-2,5-diphenyltetrazolium bromide). MTT was evaluated 48 h post-light exposure in all PCI "light after" protocols, except from experiments in [Figure 1](#cancers-12-00417-f001){ref-type="fig"}c. Experiments using PCI "light first" protocol was evaluated using the MTT assay 72 h post-light. Cells were incubated with 0.25 mg/mL MTT (Sigma-Aldrich) for 3--4 h. The medium was then removed, and the formazan-crystals were solubilized in DMSO. Absorbance was measured at 570 nm using a plate reader (PowerWave XS2 microplate spectrophotometer) with the Gen5 software program (Biotek Instruments Inc., Winooski, VT, USA). The colony formation assay was performed 10--14 d post-treatment, when sufficiently large colonies (\>50 cells/colony) were formed in controls \[[@B52-cancers-12-00417]\]. The medium was removed, and the cells were washed with 0.9% NaCl solution and fixed with absolute ethanol for 10 min. The colonies were stained with methylene blue (Sigma-Aldrich, 12 mg/mL in 0.1% NaOH) for 5 min. Colonies were manually counted under a magnifying glass using an automatic E-Count™ colony counter pen (Heathrow Scientific, Vernon Hills, IL, USA). Real-time monitoring of cell proliferation was measured using IncuCyte FLR kinetic imaging system (Essen Bioscience, MI, USA). 4000 HT-29 or HT-29/SR cells/well were seeded out in 96-well plates. The cells were treated as indicated and monitored for up to a week. Phase-contrast images were acquired every 3 h in each well, processed using by IncuCyte software Rev2 and presented as cell confluence over time. 4.6. Intracellular Localization of TPCS~2a~ and Sunitinib by Fluorescence Microscopy {#sec4dot6-cancers-12-00417} ------------------------------------------------------------------------------------ HT-29 or HT-29/SR cells were seeded on cover slips (No. 1014/10, Assistent, Sondheim, Germany) in 48-well plates (3 × 10^4^ cells/well) and allowed to attach overnight. The cells were then incubated with 0.4 μg/mL TPCS~2a~ for 18 h and either studied directly after the end of incubation or after wash and a 4-h chase in drug-free medium to remove TPCS~2a~ from the plasma membrane as done in the PCI procedures. For intracellular detection of sunitinib, attached cells were incubated for 24 h with 2 µM sunitinib. HT-29/SR cells were seeded out in the presence of 2 µM sunitinib to maintain sunitinib accumulation in the cells. For evaluation of cytosolic release of sunitinib after PCI "light first" and "light after" procedure, 1.5 × 10^4^ HT-29 cells/well were seeded, allowed to attach and treated as described in [Section 4.4](#sec4dot4-cancers-12-00417){ref-type="sec"} to mimic the PCI protocols. For the "light after" procedure, cells were incubated with 2 µM sunitinib for 48 h, and co-incubated with 0.4 µg/mL TPCS~2a~ for 18 h. The cells were washed and chased 4 h in drug-free medium before light exposure. In the "light first" procedure, the cells were incubated with 0.4 µg/mL TPCS~2a~ for 18 h, washed and chased 4 h before light exposure. Sunitinib, 6 µM, was added immediately after light exposure. Image acquisition after light exposure was performed at least an hour after illumination to allow cytosolic release of the endo/lysosomal content. Lysosomes and endosomes were visualized by 30 min incubation with LysoTracker Red DND-99 or LysoTracker Green DND-26 (both from Life Technologies, Carlsbad, CA, USA) at 75 nM. Hoechst 33342 (Sigma-Aldrich) was added at 10 µM and incubated for 15 min to visualize the nucleus. Upon image acquisition, the cover slip was carefully removed from the well, washed twice in ice cold PBS with Ca^2+^ and Mg^2+,^ and inverted on a microscope slide. Image acquisition was performed with a Zeiss Axioplan epifluorescence and phase contrast microscope using 63x/NA1.4 PlanApo objective (Carl Zeiss AG, Oberkochen, Germany). The images were acquired with a cooled charge-coupled device (CCD) camera (AxioCam MRm camera, Carl Zeiss AG). The TPCS~2a~ fluorescence was recorded using a 395--440 nm excitation filter, a 460 nm dichroic mirror and a 620 nm long pass filter. For recording fluorescence from sunitinib or LysoTracker Green, a 450--490 nm band pass excitation filter, a 495 nm dichroic mirror and a 500--550 nm band pass emission filter was used. The LysoTracker Red fluorescence was recorded using a 595 nm excitation filter and a 620 nm emission filter. The AxioVision Analysis (Carl Zeiss AG) software program was used to process and analyze the images. 4.7. Subcellular Localization of Sunitinib and TPCS~2a~ {#sec4dot7-cancers-12-00417} ------------------------------------------------------- Wide-field and structured illumination microscopy (SIM) were performed in order to determine the subcellular localization of sunitinib and TPCS~2a~ within the endocytic vesicles in live cells. 3 × 10^5^ HT-29/SR cells were seeded in glass bottom dishes (Cat. no. P35GC-1.5-10-C, MatTek Corporation, Ashland, MA, USA) and allowed to attach overnight. The cells were co-incubated with 2 µM sunitinib and 0.4 µg/mL TPCS~2a~ for 18 h, washed twice with PBS and chased in serum-free FluoreBrite DMEM (Thermo Fisher Scientific). Trolox (Sigma-Aldrich) was added to the cells 15 min prior to image acquisition. SIM imaging was performed on a DeltaVision OMX V4 Blaze 3D-SIM microscope (GE Healthcare, Chicago, IL, USA) equipped with an Olympus 60× 1.42 NA Plan Apochromat objective and sCMOS cameras. Sunitinib and TPCS~2a~ were excited with a 488 nm and a 647 nm laser, respectively, and imaged sequentially. Z-stacks were recorded with a z-spacing of 125 nm. For each focal plane, 15 raw images (five phases for three different angular orientations of the illumination pattern) were captured. The fluorescence was detected through the band-pass filters 528/48 nm for sunitinib and 683/40 nm for TPCS~2a~. SI-images were reconstructed and aligned using Softworx software (GE Healthcare), and further processed using ImageJ (<https://www.nature.com/articles/nmeth.2089>). 4.8. Cellular Accumulation of Sunitinib {#sec4dot8-cancers-12-00417} --------------------------------------- For quantification of sunitinib accumulation in the HT-29 parental and sunitinib resistant cell line, 1.5 × 10^5^ cells per well were seeded in 6-well plates. The HT-29/SR cells were seeded in the presence of 2 µM sunitinib, whereas the parental cells where allowed to attach overnight in drug-free medium before adding sunitinib. Both HT-29 and HT-29/SR were then incubated with 2 µM sunitinib, and at the end of a 72 hour-incubation, the cells were detached with 0.25% (*w/v*) trypsin-0.53 mM EDTA (Sigma-Aldrich), washed with PBS and filtered through a 5 mL round-bottom tube with a cell strainer cap (Becton, Dickinson and Company, Franklin Lakes, NJ, USA). Sunitinib accumulation in cells was quantified using a BD LSRII flow cytometer (Becton, Dickinson and Company). Live and single cells were gated based on forward (FSC) and side scatter (SSC) parameters. Sunitinib was excited by a 100 mW 406 nm laser. The fluorescence was collected through a 585/42 nm band pass filter combined with a 545 nm long pass dichroic filter. Data were processed by the FlowJo version 10 software (Tree Star Inc., Ashland, OR, USA). 4.9. Absorption and Fluorescence Spectroscopy of TPCS~2a~ and Sunitinib {#sec4dot9-cancers-12-00417} ----------------------------------------------------------------------- Photochemical damage of sunitinib in solution pH 7 was evaluated by absorbance and emission measurements. Sunitinib (0.15 µM) and TPCS~2a~ (0.15 µg/mL) were prepared in PBS without Ca^2+^ and Mg^2+^ (Sigma-Aldrich) and subjected to blue light exposure (LumiSource™). The sunitinib and TPCS~2a~ concentration was selected based on optical density \<0.1 when both compounds are combined to avoid inner filter effect. The samples were illuminated in quartz cuvettes with lid, and sealed with Parafilm^®^ (Thermo Fisher Scientific) to avoid evaporation during illumination. The absorption and emission spectra were recorded immediately after light exposure at ambient temperature. Absorption spectra were recorded using a Shimadzu UV-2550 spectrophotometer connected to a computer with the software program UVProbe 2.62 (Shimadzu Corporation, Kyoto, Japan). All absorption spectra were recorded from 300 to 750 nm. Emission was recorded with a Cary Eclipse spectrofluorimeter (Agilent, Santa Clara, CA, USA) using the Scan Software V1.1. (Agilent) in the range 360--750 nm. The excitation and emission slit widths were 5 nm for TPCS~2a~ and 20 nm for sunitinib. TPCS~2a~ was excited at 420 nm and sunitinib at 432 nm, based on the recorded absorption spectra ([Figure S4](#app1-cancers-12-00417){ref-type="app"}). Relative decrease in peak intensity was calculated at 656 nm and 505 nm for TPCS~2a~ and sunitinib, respectively. Absorption spectra was also collected at pH 5 where sunitinib was prepared in citrate-phosphate buffer containing 1% FBS (Thermo Fischer Scientific). This citrate-phosphate buffer was prepared by dissolving sodium citrate tribasic dehydrate (Sigma-Aldrich) and disodium hydrogen phosphate dehydrate (Merck KGaA, Darmstadt, Germany) in distilled water \[[@B53-cancers-12-00417]\] and pH-adjusted to pH 5. 4.10. Animals {#sec4dot10-cancers-12-00417} ------------- All animal procedures were performed according to protocols approved by the Norwegian Food Safety Authority (FOTS ID 4593), which is the national animal research authority and were conducted according to the regulations of the Federation of European Laboratory Animal Science Association (FELASA). Handling of animals was therefore performed in compliance with EUs Directive 2010/63/EU on the protection of animals used for scientific purposes. Two different strains of female mice were used in this study. HSD athymic Nude-Foxn1^nu^ mice were bred at the Department of Comparative Medicine at the Norwegian Radium Hospital, Oslo University Hospital. BALB/c mice were obtained from Envigo (Horst, The Netherlands). The mice were maintained under specific pathogen-free conditions in a temperature-controlled room. Food and water were supplied ad libitum. The mice were on average 17--20 g (4--8 weeks old) when experiments were initiated. 4.11. Tumor Grafts {#sec4dot11-cancers-12-00417} ------------------ HT-29 cells (2.5 × 10^6^) in 30 µL PBS or CT26.WT cells (1 × 10^5^) in 15 µL PBS were injected subcutaneously on the left flank in athymic Nude-Foxn1^nu^ or thymic BALB/c mice respectively. The tumors and body weight were monitored 2--3 times per week. Tumor size was calculated using the following formula: V = (W^2^ × L)/2, where W is the width and L the length of the tumor measured by a digital caliper. The protocol was designed with two endpoints; tumor size 1000 mm^3^ and weight loss ≥20%. The animals were euthanized by cervical dislocation. 4.12. In Vivo Experimental Design and Methods {#sec4dot12-cancers-12-00417} --------------------------------------------- TPCS~2a~ was administered intravenously through the lateral tail vein at 5 mg/kg five days (CT26.WT) or seven days (HT-29) after tumor inoculation. Seventy-two hours post-TPCS~2a~ administration, the tumors were irradiated using a 652 nm red diode laser (CeramOptec GmbH, Bonn, Germany) at an irradiance of 90 mW/cm^2^ and a total dose of 15 J/cm^2^ for Nude-Foxn1^nu^ and 10 J/cm2 for BALB/c. The mice were anesthetized (sevofluran inhalation) and kept on a 37 °C heating pad during light exposure. The penetration depth of 652 nm red light into tissue is 4--5 mm \[[@B54-cancers-12-00417]\] which is sufficient for the s.c. tumors at \~100 mm^3^ here subjected to light exposure. The selected light doses are in addition previously reported as sufficient for PCI \[[@B35-cancers-12-00417]\]. Before light exposure, the animals were covered with aluminum foil with an opening diameter 2--3 mm larger than the tumor. Two different procedures, one with 2 doses of sunitinib (Sun1) and the other with 6 doses of sunitinib (Sun2) were performed for assessment of therapeutic effects of sunitinib-PCI in vivo. In both procedures sunitinib (40 mg/kg) was administered by oral gavage \[[@B30-cancers-12-00417],[@B45-cancers-12-00417]\] using a feeding needle (22 Gauge, 25mm, \#7901, Angthos AB, Lidingö, Sweden) 3 h prior to \[[@B22-cancers-12-00417]\] and 30 min after light exposure. In the Sun2 procedure administration of sunitinib at 40 mg/kg was continued for four more days, to a total of 6 administrations. Animals receiving TPCS~2a~ were kept in the dark for one week after administration of TPCS~2a~ or three days after sunitinib administration to avoid photo-toxicity. For evaluation of tumor growth delay, animals were randomized into six treatment groups including no treatment (NT), PS and light (PS + light), sunitinib only Sun1-procedure (Sun1), sunitinib only Sun2-procedure (Sun2), Sun1-PCI and Sun2-PCI. The experiment was set up with 3 treatment sessions for each tumor model and NT, PS + light and sunitinib only controls were included in each session. Intratumoral distribution of TPCS~2a~ and sunitinib in vivo was only evaluated in HT-29-bearing athymic Nude-Foxn1^nu^ mice with the Sun1 protocol. Animals were randomized into three groups; no treatment, TPCS~2a~ + Sun1 and Sun1-PCI with two mice in each group. 30 min post-light exposure the animals were sacrificed and the tumors were immediately placed on liquid nitrogen. 8 µm freeze sections were prepared and images acquired using Zeiss microscope as described above with 5×, 20× and 40× magnification immersion objectives (Carl Zeiss AG). TPCS~2a~ and sunitinib fluorescence was recorded using the filter combinations described in [Section 4.6](#sec4dot6-cancers-12-00417){ref-type="sec"}. The AxioVision software program (AxioVs40, version 4.8.0.0, Carl Zeiss AG) was used to process and analyze the images. For IHC, NT-, PS + light-, Sun2- and Sun2-PCI-treated CT26.WT tumors in BALB/c mice reaching 1000 mm^3^ were harvested, fixed in formalin and embedded in paraffin before they were prepared as previously described \[[@B37-cancers-12-00417]\] using αCD3 (A0452, Dako, Agilent Technologies), αKi-67 (ab15580, Abcam, Cambridge, UK) and αCD31(ab28364, Abcam). The tumor sections (2.5--3 µm) were also stained with H&E for evaluation of viable/necrotic tumor regions. Images were acquired using an AxioImager Z1 CellObserver microscope system (Carl Zeiss AG) with a 20x/NA0.8 lens and a 1ccc1 CCD camera (Carl Zeiss AG). 6 tiles were imaged with 10% overlap using an automatic stage. The images were stitched together using the Zen blue software (Carl Zeiss AG). The imaged area was selected to visualize the tumor from the distal and into the central part. Three ROI was defined at distant sites of the imaged area avoiding necrotic tissue. For CD3 stains, the number of positive cells in each ROI was counted and presented as an average. Two tumors were evaluated from each treatment group except from the PCI-Sun2 group, where three tumors were analyzed. 4.13. Evaluation of Combination Therapy and Statistical Analysis {#sec4dot13-cancers-12-00417} ---------------------------------------------------------------- Evaluation of synergy of sunitinib-PCI treatment was determined with a statistical model based on the assumption that PS + light and sunitinib have distinct and independent mechanisms of action \[[@B55-cancers-12-00417],[@B56-cancers-12-00417]\]. The theoretical additive effect in this model is a product of the survival fraction (SF) of each treatment separately calculated as follows: SF~add~ = SF~sunitinib~ × SF~PS+light~ (or log SF~add~ = log SF~sunitinib~ + log SF~PS+light~). The calculated SF~add~ was compared to the observed combined effect (SF~comb~). Synergy was further evaluated using the parameter DL (difference in logarithm) between observed SF~comb~ and the calculated SF~add~. DL = −(log SF~comb~ − log SF~add~) = log SF~add~/log SF~comb~ = log SF~sunitinib~ + log SF~PS+light~ − log SF~comb~. Synergistic effects resulted in positive DL values, antagonistic effects resulted in negative values and additive effects close to zero. Significant deviation from zero was established through one sample *t*-tests. Sigmaplot version 14.0 (Systat Sofware Inc., San Jose, CA, USA) was used for statistical analysis where *p* ≤ 0.05 was considered statistically significant. Two-sided student's *t*-test was performed for in vitro data, unless otherwise stated. For in vivo experiments, one-way ANOVA test and Holm-Sidak post-hoc test were performed to evaluate significant differences in tumor growth between the treatment groups. Statistical differences in survival were evaluated by pairwise log-rank analysis in IBM SPSS Statistics version 25.0 (IBM, Armonk, NY, USA). 5. Conclusions {#sec5-cancers-12-00417} ============== In conclusion, this is the first report demonstrating cytosolic delivery of a small-moleculeinhibitor by PCI. Sunitinib-PCI was found highly promising in vitro when utilizing the "light first" protocol and was also indicated to increase treatment-induced necrosis in vivo. The overall treatment response in our animal models was, however, less than expected which indicate mechanisms in the tumor stroma to attenuate an overall treatment response. Particularly in CT26.WT tumor-bearing thymic animals where an antagonistic effect on infiltrating T-cells was observed. Hence, our work indicates PCI to potentiate sunitinib cytotoxicity although adjuvant therapy aimed at the tumor stroma should be evaluated to improve the therapeutic efficacy. The following are available online at <https://www.mdpi.com/2072-6694/12/2/417/s1>, Figure S1: Chemical structure of disulfonated tetraphenyl chlorin (TPCS~2a~) and sunitinib, Figure S2. TPCS~2a~ localization after 18 h incubation without wash. Representative live cell fluorescence imaging of TPCS~2a~ in HT-29 cells after 18 h incubation with 0.4 µg/mL TPCS~2a~ without wash and chase. TPCS~2a~ (red), LysoTracker Green (green), Hoechst 33342 (blue). Co-localization indicated in yellow. Scale bar: 20 µm, Figure S3. Signals from fluorescence spectroscopy of sunitinib, TPCS~2a~ or the combination at pH\~7 (PBS containing 1% FBS). Fluorescence detected in sunitinib, TPCS~2a~ or the combination without light exposure. Data are mean of three experiments ± S.E, Figure S4. Absorbance spectra of sunitinib and TPCS~2a~. Representative absorbance spectra of sunitinib alone, TPCS~2a~ and the combination before and after blue light exposure at pH 7 and 5, Figure S5. Sunitinib accumulation in HT-29 and HT-29/SR after 72 h incubation. Median sunitinib fluorescence intensities in live and single cells. Cells were subjected to a 24 h wash before incubation with sunitinib. (Mean of three experiments ± S.E.), Figure S6. Tumor growth curves for HT-29 xenografts in athymic Nude-Foxn1^nu^ mice, Figure S7. Tumor growth curves for CT26.WT allografts in BALB/c mice. ###### Click here for additional data file. Conceptualization, A.W.; Methodology, J.J.W.W., M.B.B., S.P., V.S., and A.W.; investigation, J.J.W.W., M.B.B., A.S.V.F., V.S. and A.W.; resources, S.P., K.B., V.S., Q.P. and A.W.; data curation, J.J.W.W. and A.W.; writing-original draft preparation, J.J.W.W. and A.W.; writing-review and editing, J.J.W.W., M.B.B., A.S.V.F., K.B., S.P., V.S., Q.P., P.K.S. and A.W.; Visualization, J.J.W.W., S.P., V.S. and A.W.; supervision, A.W., P.K.S and K.B.; project administration, A.W.; funding acquisition, K.B., P.K.S. and A.W. All authors have read and agreed to the published version of the manuscript. This research was funded by the South-Eastern Norway Regional Health Authority (Helse Sør-Øst), grant number 2016023 (J.J.W.W.). The authors declare no conflict of interest. ![Close proximity of photosensitizer and sunitinib in endo/lysosomal membranes results in photochemical damage of sunitinib and lack of enhanced cytotoxicity with "light after" sunitinib-photochemical internalization (PCI). Representative fluorescence microscopy images of (**a**) intracellular co-localization (yellow) of sunitinib (green) and LysoTracker Red (red) after 24 h 2 µM sunitinib incubation in live HT-29 cells and (**b**) LysoTracker Green (green) and TPCS~2a~ (red) co-localization (yellow) after 18 h 0.4 µg/mL TPCS~2a~ incubation and 4 h wash (left) followed by 60 s blue light exposure (right). Blue: Hoechst 33342 stained nucleus. Scale bars: 20 µm. Cellular viability (MTT) of HT-29 cells (**c**) post-PCI "light after" procedure of 1 µM sunitinib (48 + 18 h incubation) with blue light at LD~50~ (\~60 s) or (**d**) post-PCI "light after" procedure of 8 µM sunitinib (48 + 18 h incubation) with 90 s red light (mean of three experiments ± S.E.) or (**e**) 0.5 µM rGel using 60 s blue light (representative experiment of three, mean of triplicates ± S.D.). 60 s blue light ≈ 0.58 J/cm^2^, 90 s red light ≈ 0.54 J/cm^2^. (**f**) Superresolution (structured illumination microscopy, SIM) images of 2 µM sunitinib (green) and 0.4 µg/mL TPCS~2a~ (red) in live HT-29/SR cells after 18 h TPCS~2a~ incubation and 4 h chase. Co-localization indicated in yellow. Images are presented with maximum intensity projection of seven z-sections. One single z-section is presented for the enlarged images. Scale bars: 2 µm and 200 nm (enlarged) (**g**) Representative fluorescence emission spectra of 0.15 µg/mL TPCS~2a~, 1.5 µM sunitinib, and the combination in phosphate-buffered saline (PBS) with 1% fetal bovine serum (FBS) before and after blue light exposure (≈18.9 J/cm^2^) at pH 7. Data in the table are presented as decrease in peak intensity (%) after light exposure (mean of three experiments ± S.E.). n.s.: not significant. Statistical significance calculated with Student's test (two-tailed *p* value).](cancers-12-00417-g001){#cancers-12-00417-f001} !["Light first" sunitinib-PCI induces a synergistic cytotoxic treatment response. Cellular viability (MTT) of HT-29 cells post-PCI "light first" of (**a**) sunitinib at increasing concentrations (representative of three experiments, mean of triplicates ± S.D.) or (**b**) 8 µM sunitinib (data are mean of three independent experiments ± S.E.) exposed to 90 s red light. (**c**) PCI "light first" of sunitinib at increasing concentrations evaluated with clonogenic assay (60 s blue light, representative experiment of three, mean of triplicates ± S.D.). (**d**) Cellular viability (MTT) of CT26.WT cells post-PCI "light first" of sunitinib exposed to 40 s blue light. Sun: sunitinib. Statistical significance calculated with Student's test (two-tailed *p* value) where \*\*\* indicates *p* ≤ 0.001 and \*\* *p* ≤ 0.01. Cells were incubated with sunitinib for 72 h after light-exposure (**e**) Representative live cell fluorescence microscopy images of "light after" PCI of 2 µM sunitinib and (**f**) "light first" PCI of 6 µM sunitinib before and 1 h after blue light exposure (60 s). Sunitinib (green), TPCS~2a~ (red), Hoechst-stained nucleus (blue). Co-localization indicated in yellow. Scale bar: 20 µm. 60 s blue light ≈ 0.58 J/cm^2^, 90 s red light ≈ 0.54 J/cm^2.^](cancers-12-00417-g002){#cancers-12-00417-f002} !["Light first" sunitinib-PCI enhance cytotoxicity in HT-29/SR cells but cannot overcome sunitinib resistance. (**a**) Relative viability 72 h after sunitinib incubation measured by MTT. The HT-29/SR cells had been exposed to sunitinib for 3 months and were seeded in sunitinib-free medium. The graph is a representative experiment of five, mean of triplicates ± S.D. Sunitinib resistance in HT-29/SR cells was verified with (**b**) clonogenic assay and (**c**) proliferative capacity. The data points show % confluence at different sunitinib concentrations using IncuCyte live-cell analysis system. HT-29/SR cells were seeded out without sunitinib present. (**d**) Live cell fluorescence image of HT-29/SR showing co-localization (yellow) of sunitinib (green) and LysoTracker Red (red). Nucleus stained with Hoechst 33342 (blue). HT-29/SR cells were continuously incubated with sunitinib. Scale bar = 20 µm. (**e**) Evaluation of sunitinib accumulation in HT-29 (72 h incubation) and HT-29/SR (long-term sunitinib exposure) cells with flow cytometry. HT-29/SR cells were continuously incubated with sunitinib. Median sunitinib fluorescence intensities in live and single cells (mean of three experiments ± S.E.). (**f**) Photochemical treatment (photosensitizer and light) response of HT-29 and HT-29/SR evaluated with MTT assay post-90 s red light exposure (representative experiment of three, mean of triplicates ± S.D.). Cellular viability of sunitinib in HT-29/SR cells using (**g**) "light after" with 8 µM sunitinib or (**h**) "light first" protocol assessed by MTT post-90 seconds red light exposure, respectively (representative data based on three independent experiments, mean of triplicates ± S.D.). HT-29/SR cells were seeded in sunitinib-free medium. (**i**) Cell viability after PCI "light after" of 0.5 µM rGel as assessed by MTT post-60 seconds blue light exposure (representative experiment of three, mean of triplicates ± S.D.). 60 s blue light ≈ 0.58 J/cm^2^, 90 s red light ≈ 0.54 J/cm^2^ NT: no treatment, Sun: sunitinib. Statistical significance calculated with Student's test (two-tailed *p* value) where \*\*\* indicates *p* ≤ 0.001, \*\* *p* ≤ 0.01 and \* *p* ≤ 0.05, n.s.: not significant.](cancers-12-00417-g003){#cancers-12-00417-f003} ![Sunitinib-PCI treatment response of HT-29 xenografts in athymic Nude-Foxn1^nu^ mice Intra-tumoral distribution of sunitinib (green) and TPCS~2a~ (red) (**a**) before and (**b**) 30 min post-light exposure of HT-29 tumors treated with the Sun1- PCI protocol. Error bars: 20 µm Co-localization (yellow) indicated with white arrows. Kaplan-Meier plots illustrating overall treatment response following (**c**) Sun1- and (**d**) Sun2-PCI, \* indicates significance compared to no treatment. Statistical significance established by pairwise long-rank analysis. (**e**) Mean estimated time to reach endpoint in each treatment group. SE: standard error. (**f**) Average tumor size in the indicated treatment groups at day 6 (left) and day 10 (right) post-light exposure. Statistical significance with asterisk where \*\*\* indicates *p* ≤ 0.001 and \* *p* ≤ 0.05. (**g**) Table of *p* values is shown in cases where the difference in tumor size between the treatment groups is significant (*p* ≤ 0.05) at day 6 and day 10. Significant difference established by one-way ANOVA test followed by pair wise multiple comparison procedure (Holm-Sidak). NT: No treatment, n.s.: not significant.](cancers-12-00417-g004){#cancers-12-00417-f004} ![Sunitinib-PCI treatment response of CT26.WT allografts in BALB/c mice. Kaplan-Meier plots illustrating treatment responses following (**a**) Sun1- and (**b**) Sun2-PCI, where asterisk indicates significance compared to no treatment. (**c**) Mean estimated time to reach endpoint in each treatment group. (**d**) Average tumor size in the indicated treatment groups at day 4 (upper panel) and day 7 (lower panel) post-light exposure. (**e**) Table of *p* values is shown in cases where the difference in tumor size between the treatment groups is significant (*p* ≤ 0.05) at day 4 and day 7. Significant difference established by one-way ANOVA test followed by pairwise multiple comparison procedure (Holm-Sidak). NT: No treatment, n.s.: not significant.](cancers-12-00417-g005){#cancers-12-00417-f005} ![IHC of CT26. WT tumor tissue sections from BALB/c mice treated with the Sun-2-PCI procedure. Representative images of CT26.WT tumor sections, following PS + light, Sun2 or Sun2-PCI treatment. (**a**) H&E stain (N: necrotic V: viable) and (**b**) CD3 stain. (**c**) Quantification of CD3 staining based on three ROIs in each tumor (two tumors in each group). Mean ± S.E. Significant difference established by one-way ANOVA test followed by pair wise multiple comparison procedure. (**d**) Ki-67 stain and (**e**) CD31 stain. Arrows indicate intact (white) and collapsed (yellow) vessels. Magnification in overview 20×, scale bar: 500 µm. ROI: region of interest.](cancers-12-00417-g006){#cancers-12-00417-f006}
{ "pile_set_name": "PubMed Central" }
Second terms are almost inevitably let-downs, but friends and foes alike say Mayor Bloomberg – unbound by political debts or concerns about his next job – has an unprecedented opportunity to reshape the city. “The last four years there were at least slight constraints. That’s the end. That’s over,” declared City Councilman Simcha Felder, one of the first Democrats to cross party lines for the mayor. “I’m saying that in a positive way,” he added. A top City Hall Democratic operative agreed. “He has an opportunity to make historical structural changes. It could get very interesting,” the Democrat said. As independent as he is, Bloomberg couldn’t completely cast aside politics when he was running for re-election. But now one administration insider says, “He can focus on things and not worry how they’ll play.” There’ll be a lot to focus on. Bloomberg has laid out ambitious agendas in all five boroughs, from restoring Ground Zero to opening the new Bronx Terminal market to shepherding Bruce Ratner’s massive Downtown Brooklyn complex to the construction stage. The battle shaping up over the configuration of Ground Zero promises to be the most fascinating, since Gov. Pataki – who’s taken the lead on the city’s most-watched development – will be leaving at the end of 2006. The mayor dropped a bombshell a couple of weeks ago when he suddenly changed course and declared that the market called for more apartments and less office space. Then there are the 165,000 apartments the mayor has promised to add – the most ambitious housing undertaking in the city’s history. In an editorial board meeting a couple of weeks ago with The Post, Bloomberg said he didn’t expect an exodus of commissioners and senior aides. “There’ll always be a handful,” said the mayor. “There’s always somebody who can’t afford public service. There’s always somebody who has a health problem. But fundamentally, most of the people in the administration have said to me they would love to stay, and I think I would like to have them stay.” One of those in the financial hardship class is also one of the mayor’s most innovative aides, Deputy Mayor Marc Shaw. Sources said Verna Eggleston, commissioner of the Human Resources Administration, is also expected to depart. Speculation is also swirling around the mayor’s relationship with Albany, which is sure to change as Pataki’s lame-duck status takes hold. “The change in the governor’s office and who knows what else, it has to be different,” said the administration insider. Former City Council Speaker Peter Vallone, a Democrat who backed Bloomberg, predicted he’d be a lot more aggressive in his dealings with the state. But Bill Cunningham, a senior mayoral adviser, said Bloomberg’s style isn’t about to shift dramatically at this point. “On big things, he’ll always have the same M.O.,” said Cunningham. Even before the results were announced, the mayor’s stature upstate soared several notches. State Sen. Majority Leader Joseph Bruno yesterday was touting Bloomberg as a possible candidate for governor next year. “He comes out of this, he wins big, he’s term-limited,” said Bruno, who’s desperate to stop the expected gubernatorial juggernaut of Democrat Eliot Spitzer in 2006. “Who knows after a month or six weeks what life looks like?” Mayoral aides say Bruno is wasting his time. “How many times does he [Bloomberg] have to say no?” asked one aide. With a mandate from the electorate, Bloomberg’s biggest worry is that a severe economic downturn – or some other unpredictable event – will force him to dramatically change course. “Most mayors don’t get through [their term] without some significant challenge,” Cunningham concluded.
{ "pile_set_name": "Pile-CC" }
Q: Maximize and Minimize $\vec C$ s.t. $|\vec A + \vec B + \vec C| \le 2400$ Given three vectors: $|\vec A| = 2850$ and forms a $150^\circ$ angle with the positive $x$-axis, $|\vec B| = 650$ and forms a $60^\circ$ angle with the positive $x$-axis, $\vec C$ which has a positive $x$-component and zero $y$-component. I need to find the minimum and maximum values of $|\vec C|$ such that $|\vec A + \vec B + \vec C| \le 2400$. I initially thought about using law of cosines, \begin{align*} |\vec A + \vec B|^2 &= |\vec A|^2 + |\vec B|^2 - 2|\vec A||\vec B|\cos 90^\circ \\ |\vec A + \vec B|^2 &= 2850^2 + 650^2 - 0 \\ |\vec A + \vec B| &\approx 2923.183 \\ \end{align*} And I could repeat this using $|\vec A + \vec B|$ and $|\vec C|$, to see what value of $|\vec C|$ gives me $2400$, but I don't see how this gives me the minimum and maximum possible values. What approach should I be taking to find the min and max values? A: All three vectors are essentially given, so maybe we can simply write them all in components, add them together, and solve the given inequality for the unknown component of $\vec C$? Here's what I mean. From its description, $$\vec A = \left\langle 2850\cos(150^{\circ}),2850\sin(150^{\circ}) \right\rangle = \left\langle -1425\sqrt{3},1425 \right\rangle.$$ Similarly, you can find vector $\vec B$. And $\vec C=\langle x,0 \rangle$ with the unknown component $x$. Add them together to form $\vec A+\vec B+\vec C$, and then set up the inequality $\left|\vec A+\vec B+\vec C\right|\le2400$ to solve for the unknown $x$. By the way, to avoid the square root in the norm of a vector formula, you should square both sides to be solving $\left|\vec A+\vec B+\vec C\right|^2\le5760000$.
{ "pile_set_name": "StackExchange" }
Q: Multiple Event Machine causing one to report undefined method `stop' for nil:NilClass I have two classes in two separate modules (I know that is not a good use for now :/) I have something like this: module MQ class Client def self.start(opts = {}) new(opts).start end def initialize(queue, message) @template_message = message @queue = queue end def start EventMachine.run do #some code to send message via AMQP Signal.trap("INT") { connection.close { EventMachine.stop { exit } }} Signal.trap("TERM") { connection.close {EventMachine.stop { exit(0) } }} Signal.trap("INFO") { puts "Current active statements: #{statements.keys.inspect}" } end end def stop EventMachine.stop end end end And next I have defined Server class: module Esper class Server def self.start(opts = {}) new(opts).start end def initialize(options) end def start EventMachine.run do #some code here to receive messages Signal.trap("INT") { connection.close { EventMachine.stop { exit } }} Signal.trap("TERM") { connection.close {EventMachine.stop { exit(0) } }} Signal.trap("INFO") { puts "Current active statements: #{statements.keys.inspect}" } end end def stop EventMachine.stop end end end Now I have in rspec (and here is the error reporting): context "matched messages" do before :each do @template_message = { } @server = Esper::Server.new @client = MQ::Client.new("queue_name", @template_message) end describe "transfer" do it "should receive statements" do Thread.new do @server.start end Thread.new do @client.start end puts "Sleep for 6 seconds" sleep(6.0) #some check here @server.stop @client.stop # and here it reports when I am trying to access nil class in class client in method stop. end end It is reporting in Client class in method stop when trying to call EventMahine.stop It is saying: undefined method `stop' for nil:NilClass Can someone point me where am I wrong and if you have any suggestion how to fix it? A: I have had this problem because I was trying to incorporate esper and ampq. The problem which is showing I overcome by using somewhat different approach. I still don't know why it was giving the nil pointer exception. My solution was to use a deamon-kit gem for rails. I have created a deamon using this kit. The deamon is a separate application inside my original application. That way I can test the ampq in it's separate folders and when I want to test the whole application, I can run the deamon from within original application, send data to the deamon and then check returned values in the original application.
{ "pile_set_name": "StackExchange" }
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ import org.apache.ofbiz.entity.util.EntityUtil import org.apache.ofbiz.entity.condition.EntityCondition import org.apache.ofbiz.entity.condition.EntityOperator shipmentId = parameters.shipmentId items = [] shipment = from("Shipment").where("shipmentId", shipmentId).queryOne() partyId = shipment.partyIdTo shipmentItems = shipment.getRelated("ShipmentItem", null, null, false) shipmentItems.each { shipmentItem -> productId = shipmentItem.productId internalName = shipmentItem.getRelated("Product", null, null, false).internalName EntityCondition cond = EntityCondition.makeCondition([EntityCondition.makeCondition("returnId", shipment.primaryReturnId), EntityCondition.makeCondition("productId", productId)], EntityOperator.AND) returnItem = from("ReturnItem").where("returnId", shipment.primaryReturnId, "productId", productId).cache(true).queryFirst() returnQuantity = Double.valueOf(returnItem.returnQuantity) shipmentItemQty = Double.valueOf(shipmentItem.quantity) itemIssuances = shipmentItem.getRelated("ItemIssuance", [shipmentId : shipmentId, shipmentItemSeqId : shipmentItem.shipmentItemSeqId], ["inventoryItemId"], false) totalQtyIssued = 0 issuedItems = [] itemIssuances.each { itemIssuance -> totalQtyIssued = totalQtyIssued + Double.valueOf(itemIssuance.quantity) issuedItems.add([inventoryItemId : itemIssuance.inventoryItemId, quantity : itemIssuance.quantity]) } qtyStillNeedToBeIssued = returnQuantity - totalQtyIssued items.add([shipmentId : shipmentId, shipmentItemSeqId : shipmentItem.shipmentItemSeqId, returnId : returnItem.returnId, returnItemSeqId : returnItem.returnItemSeqId, orderId : returnItem.orderId, partyId : partyId, productId : productId, internalName : internalName, shipmentItemQty : shipmentItemQty, returnQuantity : returnQuantity, totalQtyIssued : totalQtyIssued, issuedItems : issuedItems, qtyStillNeedToBeIssued : qtyStillNeedToBeIssued, ]) } context.shipmentId = shipmentId context.items = items
{ "pile_set_name": "Github" }
BRENTWOOD, Tennessee, January 31, 2018 (LifeSiteNews) – While 'smart' technology gives the impression that it knows just about everything, it appears that Google Home cannot answer the question, "who is Jesus?" Author and television producer David Sams conducted an experiment and streamed it live on Facebook. He noted answers from the most popular “smart” machines when asked, “Who is Jesus Christ?” When he asked Google Home “Who is Jesus Christ?” the reply he received was, “I’m not sure how to help you with that.” When asked about Jesus, or about Jesus Christ, or about God, Google Home answered, “My apologies, I don’t understand.” The answer is puzzling given that the Google device has an encyclopedia of answers about Mohammed, Allah, Buddha, and other religious figures – even Satan. “It’s almost like Google has taken Jesus and God out of smart audio,” Sams said. “I even asked Google, who is David Sams?” the speaker told Nashville’s Fox TV affiliate. “Google knew who I was, but Google did not know who Jesus was, Google did not know who Jesus Christ was, and Google did not know who God was.” “Is there somebody at Google that has something against Jesus, something against God?” Sams asked. “Is this a corporate mandate of some sort?” He said Google should reprogram its speaker to be “Jesus-friendly.” The Amazon Echo (“Alexa”) did offer information about Jesus. And Google Home did refer to Jesus when asked about the Last Supper.​ Jillian Blackwell first ran the experiment and found the same suspicious ignorance from the “smart speaker.” In a video post, she facetiously asked if there was a law requiring the “separation of church and technology.” “They think just taking Jesus out of everything is politically correct these days and I think that’s the stem of a lot of our problems,” Martin Collins charged. He says he is certain that Google’s removal of Jesus and God is intentional. “I don’t know if there’s some kind of wizard making these decisions or if it’s some kind of oversight, but whatever it is, they need to address it immediately,” Sams warned. “This is the hottest technology trend – and spreading like a wildfire. Soon, smart audio will be in our vehicles,” Sams reasoned. “To eliminate ‘Jesus’ from the knowledge base of this technology would be so very alarming.” Sams appealed to Christians to speak out against such discrimination and censorship. “We need to help...the generations to come by making sure that we do everything possible to protect and share THE TRUTH,” he posted. Google admitted it did withhold information about Jesus, but says the company did so not “out of disrespect but instead to ensure respect.” Responding to the backlash, Google decided to disable all answers about religious figures. A company-issued statement reads, “We’re exploring different solutions and temporarily disabling these responses for religious figures on the Assistant.” Last year, Amazon’s device told inquirers that Jesus “is a fictional character.” Talk show blogger Steven Crowder exposed the historically false answer, which apparently has been corrected. Home speaker/encyclopedias have grown in popularity, with 40 million people in the U.S. – one in every six adults – issuing voice commands and receiving instant answers. Devices like Google Home or Amazon Echo (“Alexa”) play music on request, call people, and answer questions.
{ "pile_set_name": "OpenWebText2" }
Interesting... earlier I thought it requires libc6 2.15 just because devs initially built it in Ubuntu 12.04 (so the dependency was added automatically by the build system, using the current libc6 version). Now, after the dependencies are somewhat cleaned, it seems Steam really uses some new features not present in libc6 < 2.15... or does it? It's hard to guess when the source code isn't available
{ "pile_set_name": "Pile-CC" }
Oxidative burden in prediabetic and diabetic individuals: evidence from plasma coenzyme Q(10). Individuals with diabetes and prediabetes are at risk of vascular injury. However, the exact mechanisms are unclear. The mitochondria mobile electron carrier coenzyme Q(10) (CoQ(10)) is a potent lipophilic antioxidant. We hypothesize that oxidative stress, detectable as changes in plasma CoQ(10) concentrations and composition, plays an important role in vascular disease in diabetes. We measured plasma CoQ(10) concentrations (including reduced ubiquinol and oxidized ubiquinone subfractions) in 60 subjects with normal glucose tolerance [NGT; fasting plasma glucose (FPG) < 5.5 mmol/l], 63 with impaired fasting glucose (IFG; FPG 5.6-6.9 mmol/l) and 69 with Type 2 diabetes (DM; FPG > 6.9 mmol/l). In men and women, the total CoQ(10)/total cholesterol ratio was reduced in DM (mean +/-sd) [male (M) 0.09 +/- 0.04; female (F) 0.07 +/- 0.04] compared with NGT (0.29 +/- 0.08; 0.21 +/- 0.07) and IFG (0.27 +/- 0.07; 0.23 +/- 0.07) (DM vs. NGT and IFG P = 0.001). A stepwise reduction in the plasma ubiquinol fraction (ubiquinol/total CoQ10) was observed from NGT (M 0.93 +/- 0.06; F 0.95 +/- 0.06) compared with IFG (0.43 +/- 0.25; 0.41 +/- 0.15) and DM (0.24 +/- 0.11; F 0.29 +/- 0.16) (DM vs. IFG vs. NGT P = 0.001). In contrast, the plasma ubiquinone/ubiquinol ratio increased from NGT (M 0.08 +/- 0.07, F 0.06 +/- 0.08) to IFG (2.14 +/- 1.84, 1.75 +/- 1.04) to DM (4.77 +/- 4.88, 3.81 +/- 3.71) (DM vs. IFG vs. NGT P = 0.001). These differences remained after adjusting for age, body mass index and FPG. The change in CoQ(10) with increasing FPG concentration suggests an increase in oxidative burden, already evident in the prediabetic IFG individuals. This increase in oxidative stress might contribute to the increased risk of vascular disease.
{ "pile_set_name": "PubMed Abstracts" }
This library provides a few building blocks for operating on data in parallel, particularly iterators. At the moment, it is not designed to be robust or eke out every last drop of performance, but rather explore some ways in which Rust's type system allows for some fairly fancy things to be written with a guarantee of safety, all without a garbage collector. The core design is to simply allow for operations that could occur on a single thread to execute on many, it is not intending to serve as a hard boundary between threads; in particular, if something (a panic!) would take down the main thread when run sequentially, it will also take down the main thread (eventually) when run using the functions in this library. On the point of performance and robustness, the top level functions do no thread pooling and so everything essentially spawns a new thread for each element, which is definitely suboptimal for many reasons. Fortunately, not all is lost, the functionality is designed to be as generic as possible, so the iterator functions work with many many iterators, e.g. instead of executing a thread on every element of a vector individually, a user can divide that vector into disjoint sections and spread those across much fewer threads (e.g. the chunks method). Further, the thread pooling that does exist has a lot of synchronisation overhead, and so is actually rarely a performance improvement (although it is a robustness improvement over the top-level functions, since it limits the number of threads that will be spawned). letmutdata= [0; 10]; // fill the array, with one thread for each element:simple_parallel::for_(data.iter_mut().enumerate(), |(i, elem)| { *elem=iasi32; }); // now adjust that data, with a threadpool:letmutpool=simple_parallel::Pool::new(4); pool.for_(data.iter_mut(), |elem|*elem*=2); Transform each element of an ordered map in a fancy way, in parallel, with map (map ensures the output order matches the input order, unlike unordered_map), Sum an arbitrarily long slice, in parallel, by summing subsections and adding everything to a shared mutex, stored on the stack of the main thread. (A parallel fold is currently missing, hence the mutex.) Alternatively, one could use a thread pool, and assign an absolute number of elements to each subsection and let the pool manage distributing the work among threads, instead of being forced to computing the length of the subsections to limit the number of threads spawned. A sketch of a very simple recursive parallel merge-sort, using both to handle the recursion. (A working implementation may really need some temporary buffers to mangle the data, but the key point is both naturally running things in parallel.)
{ "pile_set_name": "Pile-CC" }
include "sub/include_test2.fbs"; include "sub/include_test2.fbs"; // should be skipped include "include_test1.fbs"; // should be skipped table TableA { b:MyGame.OtherNameSpace.TableB; }
{ "pile_set_name": "Github" }
**Core tip:** Lymphoma is known to be a cause of syndrome of inappropriate antidiuretic hormone secretion (SIADH). Moreover, Epstein-Barr virus (EBV) has a high infection rate, and in very rare cases, it can lead to extranodal natural killer (NK)/T-cell lymphoma. A very limited number of patients with lymphoma accompanied by SIADH have been reported, but NK/T-cell lymphoma with concomitant SIADH has not yet been reported in PubMed. Here, we present a case of NK/T-cell lymphoma in a 64-year-old woman with EBV infection accompanied by SIADH, suggesting the importance of monitoring serum ions, especially serum sodium, in patients with NK/T-cell lymphoma. INTRODUCTION ============ Epstein-Barr virus (EBV) is a well-recognized carcinogen that has been implicated in the etiology of several malignancies, including nasopharyngeal carcinoma\[[@B1]\]. The viral tropism of EBV is toward the B lymphocyte, but in very rare cases it can infect ectopic T and/or natural killer (NK) cells, leading to extranodal NK/T-cell lymphoma. Syndrome of inappropriate antidiuretic hormone secretion (SIADH) is a common cause of hyponatremia\[[@B2]\], but the symptoms of SIADH are nonspecific, which make it hard to detect and treat promptly. Untreated acute hyponatremia can cause substantial morbidity and mortality\[[@B3]\]. Many cancers can lead to SIADH\[[@B4]\], including lymphoma. According to the 2016 revision of the World Health Organization classification of lymphoid neoplasms\[[@B5]\], lymphomas are classified as either Hodgkin or non-Hodgkin lymphomas, and NK-cell lymphomas are in the latter class. Although non-Hodgkin lymphoma with concomitant SIADH has been reported internationally, NK/T-cell lymphoma with concomitant SIADH has not been reported in PubMed. Herein, we present a case of NK/T-cell lymphoma in a 64-year-old woman with EBV infection accompanied by SIADH, and suggest that monitoring serum ions, especially serum sodium, is vital in patients with NK/T-cell lymphoma. CASE REPORT =========== A 64-year-old woman was admitted with a chief complaint of intermittent fever for 2 mo. Two months previously, the patient had a sinus infection resulting from a cold, accompanied by intermittent fevers in the afternoon, with body temperature reaching as high as 38.9 °C. The patient had a history of nasopharyngeal carcinoma of over 30 years, which was controlled with chemotherapy; there was no recurrence to this point. One year prior, she had traveled to Europe, where she ate local food including sausage and fish. Physical examination after admission indicated a body temperature of 37.1 °C, heart rate of 80 bpm, respiratory rate of 18 breaths per minute, and blood pressure of 14.7/9.3 kPa. A 2.5 cm × 1 cm swollen, hard, unfixed, and painless lymph node was palpated below the left jaw. No blood congestion was found in the throat area. The left abdomen was soft with tender. No other obvious abnormalities were observed. Laboratory tests indicated the following biochemical results: serum sodium, 137.6 mmol/L; white blood cell (WBC) count, 2.4 × 10^9^/L; neutrophil count, 4.9 × 10^9^/L; C-reactive protein, 11.7 mg/L; EBV quantitative DNA test, 2.19E × 10^4^ copies/mL; EBV NA-IgG antibodies, positive (+) (\> 600); EBV VCA-IgG antibodies, positive (+) (\> 750); and EBV-IgM antibodies, negative. No abnormalities were found in the remaining tests. An imaging examination was performed on admission. Computed tomography of the lungs indicated that the bilateral axillary and mediastinal lymph nodes were slightly enlarged; enhanced computed tomography of the whole abdomen indicated swollen lymph nodes in the hepatic portal region and retroperitoneum, which did not rule out lymphoma; and bilateral ultrasound of the submandibular glands indicated several visible bilateral swollen lymph nodes. To determine the characteristics of the lymph nodes, whether lymphoma was present, and the margins of the lesion, we performed positron emission tomography-computed tomography, bone marrow biopsy, and left submandibular lymph node biopsy. Positron emission tomography-computed tomography indicated multiple swollen lymph nodes throughout the body accompanied by increased fluorodeoxyglucose metabolism, consistent with lymphoma (Figure [1](#F1){ref-type="fig"}). Bone marrow biopsy and immunotyping showed a myelogram with hyperplastic activity and a small number of abnormal lymphocytes, accounting for 4.80% of the visible cells other than NK lymphocytes. Biopsy of the left submandibular lymph nodes confirmed NK/T-cell lymphoma, and *in situ* hybridization showed multiple cells with strongly positive signal for EBV-encoded small RNA (Figure [2](#F2){ref-type="fig"}). ![^18^F-fluorodeoxyglucose-positron emission tomography/computed tomography. A: A swollen lymph node in the left submandibular region accompanied by increased fluorodeoxyglucose metabolism; B: Multiple lesions in the skeleton and the abdominal cavity with abnormally high metabolic activity; C: Swelling of the liver and spleen with increased metabolic activity accompanied by nodes with high metabolic activity in the parenchyma.](WJCC-6-694-g001){#F1} ![Histological findings. A and B: Lymph node biopsy showing diffuse infiltration of malignant lymphoid cells (A: HE, ×100, B: ×400). Immunohistochemical staining for (C) CD20(+), (D) CD3(+), and (E) CD56(+) (× 400). F: *In situ* hybridization showing EBV-encoded small RNA positivity, with most cells showing strongly positive staining (×400). HE: Hematoxylin and eosin; EBV: Epstein-Barr virus.](WJCC-6-694-g002){#F2} At day 10 after admission, the patient developed lethargy, and had a serum Na^+^ level of 116.9 mmol/L. Once daily concentrated sodium chloride solution of 20 mL + 250 mL 0.9% normal saline was administered intravenously. One day later, the serum Na^+^ level decreased rapidly to 109.3 mmol/L. The serum K^+^ level was 3.36 mmol/L, urea level was 2.99 mmol/L, serum creatinine was 47.8 μmol/L, blood glucose level was 7.08 mmol/L, plasma osmolality was 235.39 mOsm/kg, and urine osmolality was 494 mOsm/kg. The patient's blood pressure was normal during that time. The fluid intake of the patient was immediately restricted, and three times daily, two salt capsules and 10 mL of concentrated sodium chloride were administered orally. After 2 d, the patient's blood Na^+^ level gradually increased to 126.5 mmol/L (8.6 mmol/L per day). Her mental state returned to normal, and the endocrinology department was consulted. Based on the patient's decreased plasma osmolality, urine osmolality greater than plasma osmolality, lack of skin swelling, normal blood pressure, normal renal function, no adrenal function detected on serology, and no abnormalities in imaging examination of the adrenal glands, as well as the effect of treatment, the likelihood of SIADH in the patient was high. The supplemental infusion of intravenous concentrated sodium chloride solution was discontinued, and renal sodium secretion was assayed. The hematology department was also consulted, and the patient was administered with epirubicin, vinorelbine sulfate, flumethasone, cyclophosphamide, and asparaginase chemotherapy, along with supportive treatment. We believed that the patient might be involved in stage 4B NK/T-cell lymphoma with concomitant SIADH, although with slightly lower renal sodium levels (20 mmol/L). On day 30 after admission, the patient's white blood cell (WBC) count gradually decreased to 0.1 × 10^9^/L, and the neutrophil count rapidly decreased to 0/L. The immune function of the patient declined, there were severe symptoms of infection, and respiratory function further deteriorated. On day 31 after admission, the WBC count gradually decreased to 0, various vital signs declined, and the patient died after failed resuscitation. DISCUSSION ========== SIADH has a hidden onset and is a syndrome caused by excessive antidiuretic hormone (ADH) secretion by the posterior pituitary\[[@B6]\]. It has a high mortality rate\[[@B3]\]. SIADH has many causes, and many cancers can lead to SIADH. It has been reported that lymphoma cells secrete ADH, and this prolonged ADH production results in SIADH\[[@B7]-[@B9]\]. SIADH secondary to lymphoma is relatively rare, and SIADH secondary to NK/T-cell lymphoma has not yet been reported. The symptoms of SIADH are nonspecific, and are primarily based on diagnostic standards published by Bartter et al\[[@B10]\] in 1967: (1) decreased plasma osmolality; (2) urine osmolality greater than plasma osmolality; (3) increased renal sodium secretion; (4) no skin swelling and normal blood pressure; and (5) normal renal and adrenal function. Recent studies showed that a fractional excretion of uric acid \> 12% has a high sensitivity and specificity for diagnosing SIADH\[[@B11]\] and can serve as a new basis for confirming an SIADH diagnosis. The first-line treatment for SIADH is restriction of fluid intake. If urine osmolality is higher than 500 mOsm/kg H~2~O and fluid restriction is ineffective, demethylchlortetracycline, urea, tolvaptan, and other drugs are instead used for treatment\[[@B12]-[@B14]\]. Intravenous infusion of 20-40 mg furosemide is used to manage volume overload, and 3% hypertonic saline solution by mouth or continuous intravenous infusion can be used as necessary for correcting hyponatremia\[[@B10],[@B15]\]. During sodium solution infusion, the focus should be on changes in blood sodium rather than the rate of sodium solution infusion. In the first 24-48 h, changes in blood sodium should be closely monitored, and treatment should be adjusted accordingly to rapidly correct blood sodium to within the safe range; otherwise, correction to normal ranges will not be achieved. Studies have shown that drugs and malignant tumors are the most common causes of SIADH\[[@B16]\], and the prognosis for SIADH secondary to malignant tumors is poorer than that caused by drugs\[[@B4]\]. To reduce the development of SIADH, regular examinations of blood sodium should be performed when malignant tumors are discovered as well as when beginning to administer drugs that are known to cause SIADH; this can help facilitate the immediate discovery of decreased blood sodium and thus immediately manage symptoms and improve prognosis. According to the 2016 revision of the World Health Organization classification of lymphoid neoplasms\[[@B5]\], lymphomas are classified as either Hodgkin or non-Hodgkin lymphomas. Non-Hodgkin lymphomas are classified as either mature B cell lymphomas or mature T-cell lymphomas, and NK-cell lymphomas are the latter. Currently, 34 cases of non-Hodgkin lymphoma with concomitant SIADH have been reported internationally\[[@B7],[@B8],[@B17]-[@B34]\] (Table [1](#T1){ref-type="table"}). ###### Published cases of non-Hodgkin lymphoma with concomitant syndrome of inappropriate antidiuretic hormone secretion **Classification** **Ref**. **Country** **Gender** **Age** **EBV status** **Lymphoma classification** **Symptoms** **Treatment** **Outcome** --------------------------------- --------------------------------- ------------- ---------------- ------------ ------------------------------------------------------------------------------------------------------------------- ----------------------------------------- --------------------------------------- ------------------------- ------------- T-cell lymphoma Chubachi et al\[[@B18]\] 1995 Japan M/ F 53/78 yr Infected Nasal T-cell lymphoma Fever following adjuvant chemotherapy Fluid restriction Died Demirkan et al\[[@B19]\] 2001 Turkey M 23 yr Unknown Anaplastic large cell lymphoma Weight loss Fluid restriction Died Night sweats Fever Hirata et al\[[@B8]\] 2012 Japan F 40 yr Unknown Primary cutaneous anaplastic large cell lymphoma Erythema Fluid restriction Died Right shoulder ulceration Isotonic saline Nishiwaki et al\[[@B30]\] 2014 Japan F 70 yr Unknown Acute adult T-cell leukemia/lymphoma Rash Fluid restriction Cured Isotonic saline Sun et al\[[@B34]\] 2018 China M 71 yr Uninfected Extranodal nasal type natural killer (NK) /T cell lymphoma Testicular enlargement Fluid restriction Died Multiple rashes with eschar Sodium chloride for oral Obstinate hyponatremia Hypertonic saline infusion Hydrocortisone infusion Phan et al\[[@B25]\] 1998 Indonesia M 53 yr Unknown Burkitt's lymphoma Left maxillary swelling Plasma exchanges Died Methotrexate Cytarabine Hydrocortisone B-cell lymphoma Sica et al\[[@B22]\] 1999 Italy F 41 yr Unknown Primary central nervous system lymphoma None Fluid restriction Cured Normal saline Diuretics Watabe et al\[[@B23]\] 2000 Japan M 70 yr Infected Angiotropic B-cell lymphoma Anemia Fluid restriction Died High LDH Ohara et al\[[@B27]\] 2007 Japan F 65 yr Unknown Diffuse large B-cell lymphoma Abdominal pain Fluid restriction Cured Acyclovir infusion Morimoto et al\[[@B20]\] 2007 Japan M 75 yr Unknown Intravascular large B-cell lymphoma Nothing Fluid restriction Died Hypertonic saline infusion Furosemide Fludrocortisone acetate Brodmann et al\[[@B26]\] 2007 Switzerland F 76 yr Unknown Mantle cell lymphoma Unknown Fluid restriction Cured Sodium chloride Potassium chloride Kobayashi et al\[[@B7]\] 2008 Japan F 84 yr Unknown Diffuse large B-cell lymphoma Left cervical tumor increased Fluid restriction Cured Isotonic saline Polprasert et al\[[@B21]\] 2011 Thailand F 64 yr Unknown Follicular lymphoma Watery diarrhea Ganciclovir Cured Rituximab Cyclophosphamide Vincristine Prednisolone Onishi et al\[[@B28]\] 2011 Japan F/ M/ M 73/80/83 yr Unknown Asian variant of intravascular large B cell lymphoma Unknown Unknown Unknown M 69/83 yr Died Onishi et al\[[@B28]\] 2011 Japan M/M/F 75/60/83 yr Unknown Diffuse large B-cell lymphoma Unknown Unknown Unknown F/M 84/64 yr Died Onishi et al\[[@B28]\] 2011 Japan M/M/F/M 74/69/75/75 yr Unknown Plasmablastic lymphoma/ Primary central nervous system lymphoma/ Mantle cell lymphoma/ Lymphoplasmacytic lymphoma Unknown Unknown Died/Died/Unknown/ Died Bockorny et al\[[@B29]\] 2012 America M 70 yr Unknown Marginal zone lymphoma Fatigue Fluid restriction Cured Confusion Demeclocycline Skin lesions Rituximab Zhu et al\[[@B24]\] 2013 China F 70 yr Unknown Diffuse large B-cell lymphoma Nausea Fluid restriction Cured Vomiting CHOP Left leg radiating pain Akhtar et al\[[@B17]\] 2013 United Kingdom M 75 yr Unknown Intravascular large B-cell lymphoma Weight loss Fluid restriction Died Clammy Demeclocycline Fludrocortisone Incontinent hypoxic Sumiyoshi et al\[[@B31]\] 2014 Japan F 61 yr Unknown Follicular lymphoma Epigastralgia Aciclovir Cured Peritoneal irritation Intestinal pseudo-obstruction Itaya et al\[[@B32]\] 2015 Japan M 81 yr Unknown Diffuse large B-cell lymphoma Fever Hypertonic saline Died Fatigue Hydrocortisone sodium succinate Anorexia Shimizu et al\[[@B33]\] 2017 Japan F 73 yr Unknown Mucosa-associated lymphoid tissue lymphoma Unknown Fluid restriction Cured Hypertonic saline F: Female; M: Male; EBV: Epstein-Barr virus; LDH: Lactate dehydrogenase; CHOP: Cyclophosphamide, doxorubicin, vincristine, prednisone. The male/female ratio of these 34 cases was 19:15, mean age was 69 years (range 23-84 years), and patients aged between 60 and 90 years accounted for 85% (29/34) of the patients. The clinical manifestations of SIADH in these cases were nonspecific, and large B-cell lymphoma made up 47% (16/34) of all the pathological types. Based on the known treatment data, the main treatment was fluid restriction, which was administered to 80% (16/20). The ratio of outcomes died/cured/unknown was 17:10:7, and the mortality rate of known outcomes was 63% (17/27). The clinical characteristics of known cases may be useful for clinicians to remain aware for these characteristics in patients who may be at risk for SIADH. The pathogenesis of SIADH secondary to lymphoma is complex. One potential cause is abnormal secretion of ADH by lymphocytes\[[@B7],[@B10],[@B30]\]. In our case, because of the death of the patient, whether hyponatremia was recurrent could not be determined, and abnormal secretion of ADH by lymphocytes could not be ruled out. Central nervous system injury secondary to non-Hodgkin lymphomas may also play an important role in the pathogenesis of SIADH\[[@B10]\]. Hyponatremia can also lead to nervous system symptoms\[[@B10]\], but the likelihood of central nervous system injury in our patient was low. The use of chemotherapy drugs such as vinca alkaloids and cyclophosphamide can also induce SIADH\[[@B35]\]. However, before SIADH was discovered in our patient, no chemotherapy drugs had been administered, so this did not apply in our case. Hypercytokinemia is another important factor in the development of SIADH secondary to lymphoma. Studies have shown that the levels of epidermal growth factor (EGF), granulocyte colony-stimulating factor (G-CSF), interleukin (IL)-5, IL-6, IL-12, IP-10, sIL-2Rα, membrane immunoglobulin (MIG), IL-1RA, and other cytokines are significantly elevated in T-cell lymphomas\[[@B36],[@B37]\]. In extranodal nasal type NK/T-cell lymphomas, sIL-2Rα, IL-6, and IL-10 are significantly elevated\[[@B38]\]. Increased IL-2, sIL-2R, IL-6, IL-1β, and tumor necrosis factor (TNF)-α can lead to abnormal secretion of ADH\[[@B39]\]. Watabe et al\[[@B23]\] found that patients with high levels of the cytokine IL-6 are more likely to develop SIADH. We did not examine the levels of cytokines in our patient; however, it cannot be ruled out that SIADH in our patient was associated with abnormal secretion of ADH by lymphocytes or that the lymphoma regulated ADH secretion through cytokines. EBV is a member of the human herpesvirus family and its genome consists of a single double-stranded DNA molecule. It has a high infection rate, with potentially 90% or more of all individuals infected worldwide\[[@B40],[@B41]\]. Humans are the only host for EBV and they become lifelong carriers of the virus after infection. Most hosts can live with EBV for a long period without any serious effects, but in some individuals, EBV is closely associated with the development of malignant tumors\[[@B42]\], including nasopharyngeal carcinoma and lymphomas. The viral tropism of EBV is toward B lymphocytes, but in very rare cases, it can infect ectopic T and/or NK cells, leading to chronic active EBV infection, extranodal NK/T-cell lymphoma, or invasive NK cell leukemia\[[@B43]\]. EBV can be divided into three latency programs. Latency II shows expression of EBV nuclear antigen 1 (EBNA1) and latent membrane proteins (LMPs), and is closely associated with the development of peripheral NK/T-cell lymphoma and nasopharyngeal carcinoma in elderly patients\[[@B42],[@B44]-[@B46]\]. Our patient had been diagnosed with both nasopharyngeal carcinoma and NK/T-cell lymphoma, and the possibility of long-term latent EBV infection cannot be ruled out. According to the 2016 revision of the World Health Organization classification of lymphoid neoplasms, NK/T-cell lymphoma is categorized into mature T-cell lymphoma and extranodal nasal type NK/T-cell lymphoma. The latter type is a relatively rare lymphoma characterized by high invasiveness, poor prognosis, and high likelihood of recurrence. According to a 2010 report, extranodal nasal type NK/T-cell lymphoma accounts for 6.9% of non-Hodgkin lymphomas and 28.2% of T-cell and NK cell lymphomas in China\[[@B47],[@B48]\]. Eighty to ninety percent of patients with nasal type NK/T-cell lymphoma report symptoms of nasal congestion, sinus infection, ulceration, and epistaxis\[[@B48]\]. Traditional treatments include chemotherapy, radiotherapy, and multimodal therapy, but even in patients with stage I or II disease, the 3-year survival rate is only 40%-50%\[[@B49]-[@B51]\]. Most published studies related to the efficacy of chemotherapy in extranodal NK/T-cell lymphoma have shown that the recurrence rate is as high as 50%\[[@B52]\]. Our patient was diagnosed with nasopharyngeal carcinoma 30 years earlier without recurrence following control with chemotherapy, but specific pathological examination results were not obtained. In addition, paraffin sections from over 30 years ago cannot be re-stained. Given the limitations of previous pathological examinations, the possibility that the patient developed extranodal nasal type NK/T-cell lymphoma cannot be ruled out. However, based on its biological characteristics, namely, a high recurrence rate, high invasiveness, and poor prognosis, the likelihood that our patient developed extranodal nasal type NK/T-cell lymphoma 30 years ago is small. In summary, NK/T-cell lymphoma with concomitant SIADH is relatively rare. Blood sodium must be closely monitored in lymphoma patients as an indicator of the development of SIADH, and immediate treatment by restricting fluid intake and replenishing sodium should be administered based on blood sodium levels. At the same time, actively searching for the cause of the disease and planning adjunctive therapy with drugs as needed will prevent critical patients from developing hyponatremia and hypo-osmolality, thereby improving their prognosis. ARTICLE HIGHLIGHTS ================== Case characteristics -------------------- A 64-year-old woman was admitted with intermittent fever for 2 mo. Clinical diagnosis ------------------ Stage 4B natural killer (NK)/T-cell lymphoma with concomitant syndrome of inappropriate antidiuretic hormone secretion (SIADH). Differential diagnosis ---------------------- Infection, typhia, brucellosis, *etc*. Laboratory diagnosis -------------------- As determined by blood and urine sampling examination, serum Na^+^ was 109.3 mmol/L, urea was 2.99 mmol/L, serum creatinine was 47.8 μmol/L, plasma osmolality was 235.39 mOsm/kg, and urine osmolality was 494 mOsm/kg. Imaging diagnosis ----------------- Positron emission tomography-computed tomography indicated multiple swollen lymph nodes throughout the body accompanied by increased fluorodeoxyglucose metabolism, consistent with lymphoma. Pathological diagnosis ---------------------- Biopsy of the left submandibular lymph nodes confirmed NK/T-cell lymphoma. Treatment --------- Chemotherapy, fluid restriction, and administration of sodium chloride. Related reports --------------- This is the first known report of NK/T-cell lymphoma with concomitant SIADH in PubMed. Term explanation ---------------- Lymphoma is one of the causes of SIADH; however, NK/T-cell lymphoma with concomitant SIADH has not been reported. Experiences and lessons ----------------------- This case report emphasizes the importance of monitoring serum ions and etiological treatment in patients with NK/T-cell lymphoma. Informed consent statement: The patient was not required to give informed consent to the study because the analysis used anonymous data that were obtained after the patient gave written consent for treatment. Conflict-of-interest statement: The authors declare that they have no conflicts of interest. CARE Checklist (2013) statement: The authors have read the CARE Checklist (2013), and the manuscript was prepared and revised according to the CARE Checklist (2013). Manuscript source: Unsolicited manuscript Peer-review started: July 31, 2018 First decision: August 31, 2018 Article in press: October 11, 2018 Specialty type: Medicine, research and experimental Country of origin: China Peer-review report classification Grade A (Excellent): 0 Grade B (Very good): B Grade C (Good): C, C, C Grade D (Fair): D Grade E (Poor): E P- Reviewer: Akbulut S, Chowdhury FH, Dasgupta S, Ohashi N, Vaudo G, Vidal EIO S- Editor: Ma RY L- Editor: Wang TQ E- Editor: Song H [^1]: Author contributions: Zheng R and Liu QB designed the report; Liu QB collected the patient's clinical data and wrote the paper. Correspondence to: Rui Zheng, MD, PhD, Doctor, Professor, Teacher, Department of Respiratory Medicine, Shengjing Hospital of China Medical University, No. 36, Sanhao Street, Heping District, Shenyang 110004, Liaoning Province, China. <[email protected]> Telephone: +86-2496-61521211 Fax: +86-2496-61572116
{ "pile_set_name": "PubMed Central" }
The field of this invention relates to antennas, and more particularly to an antenna for picking up a radio signal. An antenna is a device for transmitting or receiving radio waves. The transmitting antenna converts the electrical signals from a transmitter (radio, television or radar) into an electromagnetic wave which spreads out from the transmitter. A receiving antenna intercepts this wave and converts it back into electrical signals; that can be amplified and decoded by a receiver such as a radio, television or radar set. A radio transmitter produces its signal in the form of an alternating electric current, that is, one which oscillates rapidly back and forth along its wire. The rate of this oscillation can be anything from tens of thousands of times a second to thousands of millions times a second. The rate is known as a frequency and is measured in kilohertz or kilocycles and for higher frequencies in MegaHertz or Megacycles. The oscillating current in the transmitting antenna produces an electromagnetic wave around it, which spreads out from it like ripples in a pond. This wave sets up electric and magnetic fields. The lines of the electric field run along the antenna and those of the magnetic field around it. Both the electric and magnetic fields oscillate in time with the electric current. Whenever this wave comes into contact with the receiving antenna, it induces a small electric current in the antenna. This small electric current alternates back and forth along the antenna in time with the oscillations of the wave. The air is full of radio waves at all frequencies which the antenna picks up indiscriminately. Each radio set has a means of selecting a narrow band of frequencies at any one time. This is what happens when a particular signal is tuned in. Each radio set can be tuned within a certain frequency range and will respond to signals only in that range. Electricity travels along a wire at a speed close to the speed of light. It will greatly increase the efficiency of an antenna if its length is correctly correlated to the wavelength of the signal it received or transmits. Ideally, antennas are normally selected to be one-half or one-quarter of the wavelength that they are designed to receive with the addition of a small amount of length to compensate for loss within the antenna itself. An AM radio signal is over one thousand feet in length. An FM radio signal is substantially shorter and is approximately one hundred eight inches in length. Therefore, within conventional radio sets, it is difficult to design an antenna which is any significant percentage in length of either AM or FM. Clearly, AM would be more difficult since the quarter wave length in AM would be over two hundred fifty feet in length. A quarter wavelength for FM would require an antenna approaching thirty inches which is still too large in size for most radio sets which would result in a rather unattractive appearance. A typical antenna for a radio set will usually take the form of some form of coil or wound wire which is mounted on some form of a stand which is placed on or near the radio set.
{ "pile_set_name": "USPTO Backgrounds" }
AIS also operates a certified European Repair Centre for the 'Ingersoll Rand' hand reader, ensuring a professional and reliable after sales service. Our Support and maintenance department can handle all 'Ingersoll Rand' punch clock problems throughout the North African and Mediterranean region.
{ "pile_set_name": "Pile-CC" }
Hello Windows Insiders! Today we are excited to release Windows 10 Insider Preview Build 16257 for PC to Windows Insiders in the Fast ring and also in Skip Ahead! We are also releasing Windows 10 Mobile Insider Preview Build 15237 to Insiders in the Fast ring. We won’t have a new Windows Server Insider Preview build for Windows Insiders this week. What’s New in Build 16257 For PC Eye Control (beta) Yesterday, we announced Eye Control, which makes Windows 10 more accessible by empowering people with disabilities to operate an on-screen mouse, keyboard, and text-to-speech experience using only their eyes. The experience requires a compatible eye tracker, like the Tobii Eye Tracker 4C, which unlocks access to the Windows operating system to be able to do the tasks one could previously accomplish with a physical mouse and keyboard. We are starting by supporting the EN-US keyboard layout, and we are looking to expand to more keyboard layouts in the future. We are excited to release this experience as a beta and would love your feedback! Setting up Eye Control: Own or purchase a Tobii Eye Tracker 4C (Coming next will be support for Tobii Dynavox PCEye Mini, PCEyePlus, EyeMobile Plus, and I-series.) Download and update to Tobii’s Core eye tracking hot fix release 2.10.11.6458 and run calibration with your own profile Check for Windows Updates; the new Tobii Eye Tracker HIDClass Driver should be found on Windows Update and installed automatically. Make sure your Tobii eye tracker is connected to your PC and turn on Eye Control by going to Settings > Ease of Access > Other Options > Eye control. Eye Control launchpad – When you turn on Eye Control, the launchpad will appear on the screen. This allows you to access the mouse, keyboard, text-to-speech, and to reposition the UI to the opposite side of the screen. Eye Control interaction model – To interact with the UI for Eye Control, simply look at the UI with your eyes until the button activates. A visual affordance will appear around the UI that you are looking at. Eye Control mouse – To control the mouse, select the mouse from the launchpad, position your eyes on the screen where you want the cursor to be placed, fine tune the position, and select what action you want to take (left click, double left click, right click, or cancel). Eye Control keyboard – To use the keyboard, select the keyboard from the launchpad, and dwell at the characters you want to type. You can type numbers and symbols on the &123 page and function keys on the Fn page. We currently support the EN-US keyboard layout. Eye Control shape-writing – Type faster with your eyes by shape-writing on the Eye Control keyboard. To use shape writing, turn it on from the keyboard settings (found on the Fn page). Once it is on, you can form words by dwelling at the first and last character of the word, and simply glancing at letters in between. A hint of the word predicted will appear on the last key of the word. If the prediction was incorrect, you can simply select an alternative prediction provided. Eye Control text-to-speech – Communicate with your family and friends in person by using text-to-speech. To use text-to-speech, select text-to-speech from the launchpad. From here, you can use the keyboard to type sentences and have it spoken aloud. At the top are phrases that are spoken aloud immediately and can be edited to say different words. This uses the default text-to-speech voices, which can be changed in Settings > Time & Language > Speech > Text-to-speech. Eye Control settings – Access settings from the Fn keyboard page to adjust the dwell times, turn on/off shape-writing, and turn on/off the gaze cursor used to test hardware calibration. Known Issues: Eye tracking does not work well in direct sunlight. The device may require new calibration when moving to a location with different lighting conditions. The launchpad partially blocks the Tobii UI during device calibration. To work around this, turn off Eye Control during calibration and turn it back on when you are done. You can also use touch or mouse to reposition the UI during calibration. Sometimes shape-writing can get stuck on. You can fix this by dwelling at the shape-writing icon to turn it on and off again Sometimes the reposition UI icon in the launchpad takes focus after exiting text-to-speech Hardware support: Currently, Eye Control works with select Tobii hardware. We are open to working with additional hardware vendors to provide customers a broader set of hardware options to enable this experience. To learn more: If you have questions or feedback on how we can continue to improve our products and services, you can also contact us through the Disability Answer Desk (now with ASL support) and Accessibility User Voice Forum. You can learn more about accessibility at Microsoft by visiting, http://microsoft.com/accessibility. Microsoft Edge Improvements We’re giving Microsoft Edge a refreshed and more modern look in the browser frame, inspired by the Fluent Design System. The use of Acrylic material provides depth and transparency to the tab bar and other controls, and we’ve improved button animations to feel more responsive and delightful. Based on your feedback we’ve adjusted the design of the address bar so now even if the address bar isn’t in focus to start with when you click and drag the text it will remain under the cursor. Previously the text would shift as the “http://” appeared – this change will make it easier to quickly edit parts of the URL. We fixed an issue where right-clicking on an image in Microsoft Edge and selecting copy then later pasting the clipboard content would result in the image URL being pasted rather than the image itself. We fixed an issue where if a tab had been opened while Microsoft Edge was in full screen mode, using Ctrl + W to close that tab while still in full screen mode would close the content but leave the tab in the frame. We fixed an issue where if you had two unrelated tabs in Microsoft Edge and opened a link from the first in a new tab, the new tab would appear to the right of the second tab rather than the first. Console Improvements During the Creators Update development we updated the Windows Console to support full 24-bit RGB color and today the Windows Console’s default colors are getting their first overhaul in more than 20 years! Yay! The default color values have been changed to improve legibility of darker colors on modern screens, and to give the Console a more modern look & feel. To preserve your preferences, this new color scheme will only be visible in Properties if you clean install this build. For more details about Windows Console, head to the Command Line Blog. Input Improvements We’ve improved the performance of launching the touch keyboard after tapping the touch keyboard button in the taskbar. We fixed an issue where using WIN+H to dictate into a UWP app’s text field wasn’t working. We fixed an issue resulting in the Japanese IME prediction candidates position being shifted and overlapping with typed text if you set the page zoom level to something other than “100%” in Microsoft Edge. We’ve adjusted the design of the Japanese curve-flick touch keyboard to display numbers and English letter keys in a smaller font that’s more consistent with the size of the Japanese character keys. Windows Defender Application Guard (WDAG) Improvements We have added new status strings to the WDAG splash dialog to provide more information about the startup stages for WDAG. These new strings will be displayed to users when WDAG is starting up and when it’s being resumed from a paused state. We have also made significant improvements to container launch times by optimizing background preparation of the WDAG container. We fixed a number of issues that were impacting networking inside the WDAG container as well as a poor user experience when connecting to the WDAG container. Fixed an issue where the WDAG launch resulted in Error Codes 0x02 / 0x00 or 0x02 / 0c. Fixed an issue where only part of the WDAG window was being displayed after launch. Added a registry key to allow users to optimize WDAG launch times during active browsing by not suspending the WDAG container when the WDAG window is closed. You can set the registry key to optimize for performance here: Computer\HKLM\Software\Microsoft\HVSI\, Value name: SuspendOnContainerClosed, REG_DWORD, Value data: 1. Note: Setting this key will result in the container not pausing and the container will not release committed memory. General changes, improvements, and fixes for PC We fixed an issue where the battery flyout might have shown unexpected text for the % charged (specifically “%1!s!%2!s!% until fully charged”). We’ve fixed an issue resulting in certain network setting being lost on upgrade and reverting to default. Specifically, static IP address configuration was reverted to DHCP, and networks marked private were reverted to public. If you had installed Builds 16226-16237 and had found Storage Spaces to not be working, today’s build expands upon the fix in 16241 to remediate those PCs that had upgraded from the impacted build range and were still in a bad state. Thanks again to the Insiders that have helped us investigate this! We fixed an issue where if you switched to a new tab and back in Microsoft Edge, Narrator would start reading from the top of the page again, rather than remember where you had been on the page. We fixed an issue where right-clicking on a folder in File Explorer and saying Scan with Windows Defender wouldn’t work if the folder name contained #. We fixed a rare issue where the Windows Search Service might get stuck on initialization after upgrade, resulting in File Explorer showing “Working on it…” infinitely when accessing certain folders. We fixed an issue resulting in certain games such as Wargaming’s World of Tanks, World of Warships, and World of Warplanes appearing to hang/freeze shortly after launch when played on x86 PCs in recent flights. We fixed an issue where some Insiders were not being offered builds higher than Build 16241. We fixed an issue where connecting to a VPN using a solution downloaded from the Windows Store may result in a system crash. Known issues for PC Start, Action Center and notification toasts may at times have a background that is 100% transparent. A fix will be available in later flight – for now, if you encounter this issue, try ending ShellExperienceHost.exe via Task Manager or rebooting to resolve the issue. We’re investigating reports where Action Center shows it has some number of notifications but when you click to open Action Center, there are no notifications shown. We’re investigating reports that suggested apps are visible in Start despite the related setting being off. For now, if you encounter this please try toggling Settings > Personalization > Start > “Occasionally show suggestions in Start”. When installing or updating a Windows Store app, you may see error 80070057. As a workaround, you can get the latest app by uninstalling the older version of the app from your device and reinstall latest version from Store. ADDED 8/3: The Virus and Threat Protection pillar in Windows Defender Security Center will show as “unknown” after upgrading to this build. We are investigating. The workaround is the reboot your PC and then Windows Defender Security Center will display the correct status. General changes, improvements, and fixes for Mobile We made some improvements to the Field Medic Store app, where we fixed an issue with collecting Watson crash data, enabled spell checking when editing a report, and updated the PowerOn/PowerOff profiles to include additional battery info. We fixed an issue where the screen would occasionally flash black after launching or rotating the Camera app. We fixed an issue with the HP Elite X3 reporting that the SD card had been removed from the device when it had not. We fixed an issue with Continuum where, after the attached monitor is unplugged, occasionally the mobile LCD does not power off and the mobile battery could be drained. We fixed an issue with the Windows inbox NFC driver where occasionally the wrong card type data was reported. We improved the Cortana resume-from-suspend behavior to enable a Cortana skill to be authenticated before the user interacts with the skill. We fixed an issue with the behavior of the hardware search button in countries where Cortana is not available. In this case, the OEM provides the search app or URI. Known issues for Mobile There is a problem with the HP Elite X3 with wired docks where the portrait orientation setting is lost when the external display is disconnected and reconnected. A workaround for this is to reboot the phone after tapping the “OK” button instead of disconnecting and reconnecting. This workaround must be performed every time you connect to an external display you want to use with Continuum in portrait orientation. If you have apps saved to your SD card, you may see error 8007000B when trying to update those apps. As a workaround, you can move these apps to internal memory, update them, and then move them back to your SD card. Thank you to all the Insiders who reported this to us! When installing or updating a Windows Store app, you may see error 80070057. As a workaround, you can get the latest app by uninstalling the older version of the app from your device and reinstall latest version from Store. Support for 3D in Office apps Windows Insiders who are also Office Insiders will be able to incorporate 3D objects in Word, Excel and PowerPoint. Easily insert a 3D object from the Remix 3D catalog or your PC, change its perspective and use transitions like Morph in PowerPoint to create cinematic animations between slides to bring 3D objects in your presentations to life. Not an Office Insider? Sign-up here! Community & Team Updates We have some updates to our team! Joining team “Something Happened” are: Marissa Zhang – Marissa, our intern, is reporting to Jason this summer and she is working on Insider communication channels. LinkedIn? Instagram? Forums? She is helping us choose the channels and what kind of content we want to show on each! Vivek Elangovan – Vivek is a software engineer AND a film-maker who just finished his first feature film. He’s helping us talk to the creatives, artists, film-makers, VR designers in our Insider audience and make sure their voices are heard in product development as well! He is also going to lead the charge on app flighting. As a reminder, the rest of the team and what they work on are: Tyler Ahn – leads the Insider MVP program, our website development (and soon forums) and the global Windows fan programs. – leads the Insider MVP program, our website development (and soon forums) and the global Windows fan programs. Jason Howard – leads debugging Insider issues on social and forums and is the resident Webcast MixerMaster. – leads debugging Insider issues on social and forums and is the resident Webcast MixerMaster. Jeremiah Marble – is our program architect who figures out what more we can be doing for our various Insider audiences. – is our program architect who figures out what more we can be doing for our various Insider audiences. Brandon LeBlanc – works with all the product teams to write content for our blogs, websites, Feedback Hub, etc for Insiders. Also has the best Star Trek outfit collection on earth! – works with all the product teams to write content for our blogs, websites, Feedback Hub, etc for Insiders. Also has the best Star Trek outfit collection on earth! Dona Sarkar – wrangles the product teams into making sure the right bugs are fixed and causes general chaos. – wrangles the product teams into making sure the right bugs are fixed and causes general chaos. Blair Glennon – is Lord of Insider Data. He works with the Data Science team to understand the telemetry, feedback and survey results from Insiders and make recommendations as well as leading WIP4Biz. One more thing – this month’s webcast on Mixer will be focused on our Engineering Systems. This includes the building of the Windows OS, code-flow processes, ISOs, symbols, our migration to Git, and much more. We’d love to take your questions in advance so we can try to address them in the webcast. Click here to submit your questions! No downtime for Hustle-As-A-Service, Dona <3
{ "pile_set_name": "OpenWebText2" }
Factors affecting the effectiveness of biomedical document indexing and retrieval based on terminologies. The aim of this work is to evaluate a set of indexing and retrieval strategies based on the integration of several biomedical terminologies on the available TREC Genomics collections for an ad hoc information retrieval (IR) task. We propose a multi-terminology based concept extraction approach to selecting best concepts from free text by means of voting techniques. We instantiate this general approach on four terminologies (MeSH, SNOMED, ICD-10 and GO). We particularly focus on the effect of integrating terminologies into a biomedical IR process, and the utility of using voting techniques for combining the extracted concepts from each document in order to provide a list of unique concepts. Experimental studies conducted on the TREC Genomics collections show that our multi-terminology IR approach based on voting techniques are statistically significant compared to the baseline. For example, tested on the 2005 TREC Genomics collection, our multi-terminology based IR approach provides an improvement rate of +6.98% in terms of MAP (mean average precision) (p<0.05) compared to the baseline. In addition, our experimental results show that document expansion using preferred terms in combination with query expansion using terms from top ranked expanded documents improve the biomedical IR effectiveness. We have evaluated several voting models for combining concepts issued from multiple terminologies. Through this study, we presented many factors affecting the effectiveness of biomedical IR system including term weighting, query expansion, and document expansion models. The appropriate combination of those factors could be useful to improve the IR performance.
{ "pile_set_name": "PubMed Abstracts" }
/** * MK4duo Firmware for 3D Printer, Laser and CNC * * Based on Marlin, Sprinter and grbl * Copyright (c) 2011 Camiel Gubbels / Erik van der Zalm * Copyright (c) 2020 Alberto Cotronei @MagoKimbra * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. * */ /** * mcode * * Copyright (c) 2020 Alberto Cotronei @MagoKimbra */ #define CODE_M204 /** * M204: Set planner.accelerations in units/sec^2 (M204 P1200 T0 R3000 V3000) * * P = Printing moves * T* R = Retract only (no X, Y, Z) moves * V = Travel (non printing) moves * * Also sets minimum segment time in ms (B20000) to prevent buffer under-runs and M20 minimum mechanics.feedrate_mm_s */ inline void gcode_M204() { if (commands.get_target_tool(204)) return; #if DISABLED(DISABLE_M503) // No arguments? Show M204 report. if (parser.seen_any()) { mechanics.print_M204(); return; } #endif if (parser.seen('S')) // Kept for legacy compatibility. Should NOT BE USED for new developments. mechanics.data.travel_acceleration = mechanics.data.acceleration = parser.value_linear_units(); if (parser.seen('P')) mechanics.data.acceleration = parser.value_linear_units(); if (parser.seen('R')) extruders[toolManager.extruder.target]->data.retract_acceleration = parser.value_linear_units(); if (parser.seen('V')) mechanics.data.travel_acceleration = parser.value_linear_units(); }
{ "pile_set_name": "Github" }
Wednesday, March 01, 2017 Vincent's Fire As soon as I came to know that I would be visiting The Netherlands, I made a to-do list. The first item on the list was "Visit Vincent van Gogh Museum" To be completely truthful, it was not a physical list but it existed only in my mind. As an aside, does a list that exists in the mind have a physical existence? Are phrases like "in the mind" and "a physical version of it" the result of arbitrary dichotomous thinking? Visit I did. It was a long-standing ambition, ever since I heard of van Gogh and fell in love with his paintings, fulfilled. It is a building with a modern design. Spacious and great for exhibiting van Gogh's works. These paintings were gifted to the museum by the wife of Vincent's brother Theo, Johanna. The museum has some of the most famous and more mature works of Vincent and is a pleasure to see them all together. While the raw power of his brush strokes and his unique vision can be discerned even in good colour prints, seeing them for real is an experience beyond compare. I entered the first floor of the museum and took in the overall look of the hall. As I moved inside I could see a painting come into view from behind a pillar. It is a painting depicting an old house the cooking fire in which is visible through a window. (Cottage at nightfall) From that distance and in that lighting, it looked as if someone had lit a red LED there to indicate the fire. I was captivated and went straight to the picture and peered at it. It appeared to have been made with a single stroke of a rough brush carrying red paint. In my imagination that has remained THE brush stroke in art.
{ "pile_set_name": "Pile-CC" }
Several hundred thousand revolutions after they started, the boys from Ridge View Academy are still criminals and their leader’s heart has stopped beating at least twice. But they’ve made it this far and there is no turning back. Over the past five days, they’ve ridden their bikes 256 miles from their medium-security school east of Denver to the lush, green farmlands of South Fork, Colorado. At midnight last night, they pulled into the town campground and ate cold turkey sandwiches while shivering in their matching gray-and-maroon sweat suits. Before bed, they’d pissed—three to a group, ­accompanied by guardians—in the grimy, cinder-block­­ bathroom. While some slept soundly­ in the cool, damp grass that smelled of mud and snowmelt, others tossed fitfully.­ Because to some of those boys, riding a bike and sleeping in a tent seemed far scarier than driving through the streets with a trunk full of semiautomatic weapons. Somehow they made it through the night. And now they are creeping up Highway 160, 428 miles from the Grand Canyon.­ This is their first big day: 101 miles with an elevation gain of 9,072 feet. They ride past creeks shimmering like tinfoil, trailheads beckoning hikers, and oily black cliffs cut through with waterfalls. There are nine boys total, all from Ridge View Academy in Watkins, Colorado, a school for some of the state’s most violent juvenile offenders that’s run by the Division of Youth Corrections (DYC). Some battle addiction, others belong to gangs, one once beat his mother with a pellet gun—but they are also members of the school’s remarkably successful cycling team, and despite their troubles, they still have hopes, dreams, and longings. At the front, Aaron*, 18, prays Thank you, God, for letting me do this. Several yards behind him, Austin, also 18, belts the ­lyrics to an Adele song. Not far off his wheel, Duncan, 16, lurches up the hill but manages to shout “Hoo-ah!” each time he crosses a seam in the tarmac. Nearly every boy has happily traded the regimented schedules of Ridge View for the chance to climb more than 48,000 feet over 675 miles. In the past, this trip has come at the end of cycling season, as a reward to the boys for training and racing without incident. But this year the multiday trip comes before race season. As a result, the kids are out of shape, which means their journey is even more grueling. Yet there is more at stake than simply pedaling to the Grand Canyon. For some students, the ride is a chance at reformation. If they can commit to pedaling up to 100 miles per day for 11 days, says their head coach, Greg Townsend, this can become a catalyst that helps them move past the pain, confusion, and mistakes that led them to Ridge View. Townsend has led these trips for two decades and has witnessed remarkable transformations. He also knows that marshaling nearly a dozen juvenile offenders several hundred miles by bike has risks, despite precautions set in place by the ­academy. On past trips, students have tried fleeing, fought each other, and told Townsend they wanted to swerve into traffic. This is why Townsend is paying close attention to tall, lanky, 17-year-old Tyler, who has fallen off the back. Townsend hoped this would be the day his student finally committed to the ride, but Tyler has only pedaled even slower. Near the top of the pass, the coach takes a hard line with the rider, who responds that this is the week he and his dad used to ­celebrate their birthdays. Cake, presents, everything, but then his dad killed himself in his apartment. The pain led Tyler to attempt his own ­suicide, the results of which still line his arms in long zipper scars. Townsend wants to give Tyler a bear hug. Instead, he says: “I get it. You’re hurting. But you’re back here blaming: your mom, your dad, circumstance, society. But what I want to know is what about you, Tyler? What do you want to get out of this trip?” Preparing for another leg of their 11-day journey, the Ridge View cyclists befriend a stray cat. (Sam Adams) *At the request of Ridge View Academy and Colorado’s Division of Youth Corrections, we have identified each student by only his first name. For Ridge View students (from left) Tyler, Duncan, and James, the nearly 700-mile Journey offered a chance to ride away from the pain in their pasts. (Sam Adams) THREE HOURS EARLIER, the boys had attained their first major accomplishment: 10,857-foot Wolf Creek Pass, crossing the Continental Divide. Up top, they ate, stretched, and posed for pictures. Afterward, Townsend pointed to several switchbacks knifing abruptly at right angles. Shouting over the wind, he said, “Ten seconds between riders! And watch for wind shear! Are you getting this? Because I’ve had pileups on this downhill, which you can trust me ain’t pretty.” When each Ridge View rider was nodding his head and bouncing in his bike shoes, Townsend yelled, “Okay! Hit it!” The boys took off, shouting as they flew down the pass. This, says Duncan, is because the feeling of flying is the exact opposite of how it feels most of the time at Ridge View. Like most students at the all-boys academy, Duncan ended up there after a series of bad decisions. He arrived in a van with the admissions director for Ridge View’s parent company,­ Rite of Passage (ROP). Fifteen miles east of Denver, they had turned down a long, undulating road bisecting acres of prairie and pulled onto the sprawling brick campus. But instead of seeing “normal” students texting their buddies on iPhones, Duncan saw dozens of kids with their heads shorn like cadets. They marched in formation and wore the maroon-and-gray sweat suits. Walking into his new home for the undetermined future, he passed through a metal detector into the main lobby. From then on, he experienced Ridge View’s unique reformation philosophy, which is that academics, coupled with intense daily exercise, can help rehabilitate juvenile offenders. To that end, every Ridge View day includes a 30-minute “adrenaline run” followed by regular, matriculated high school classes. Students then turn around and exercise again from 4 to 6 p.m. The program’s core comes from ROP, which opened in Minden, Nevada, in 1984 and now operates 10 treatment facilities across the US. According to Ridge View program director Bill Wood, the facility is not a prison, but rather an “academy,” run through a partnership between the Denver Public Schools, the Division of Youth Corrections, and ROP. There are no fences, ­isolation rooms, or cells, yet it houses many of the state’s troubled juvenile offenders, whose crimes range from burglary to armed ­robbery, to—occasionally—attempted homicide. But those who end up at Ridge View get an experience some parents of non-crime-committing youth would welcome. The $52 million facility has many of the amenities of a modern high school, from immaculate classrooms to a lavish vo-tech center. Academically, it has all the offerings of a traditional school, minus a few things, like AP classes. Even so, its robotics team has been regionally ranked; its shop students are currently framing walls for a Habitat for Humanity project. These opportunities, says former Colorado governor Bill Ritter, give “kids in the system, whose lives have seen a series of difficult turns, a chance at victory.” For many students, joining one of ROP’s many sports teams, which include everything from football to golf, may also help prepare them for a job or even college. Predictably, most kids choose ball sports. But every year, a few join cycling. Some do because they think it will let them escape their problems, while others remember the fun they had riding Huffys as children. Few are prepared for how hard they’ll work, because Ridge View cycling is grueling. Riders typically pedal six days a week, nine months per year, cross-hatching the plains in all kinds of weather. The weekly schedule, long miles, and Townsend’s coaching get results—since 2009, the team has won the Bicycle ­Racing Association of Colorado series title three times. And since it joined the Colorado High School Mountain Bike League in 2010, racers have twice stood on the podium. By the time Duncan arrived at Ridge View in 2011, he was a skinny 16-year-old on meth with a pregnant girlfriend. Social services had removed him from his family at age 10, when, he says, his mom, who was also using meth, had stopped caring for him and his 12 siblings. After the state attempted to place him with a string of adoptive families, he took off, living on the streets of Denver. But it wasn’t until he discovered that his then-girlfriend was being sexually abused by her mom’s drug-addled boyfriend that he knew he had to clean up to avoid the same future. He came to Ridge View and joined cycling months later. He’s a stout kid now, 5-feet-10 and 190 pounds. From our first meeting, he struck me with his politeness, how ­formally he regarded me. Riding isn’t his natural sport—that would be wrestling. But now, out on Highway 160 beyond Wolf Creek Pass, he is sweating, pushing, grinding up the incline. He looks determined to ride every mile, seems on his way to reformation. But Townsend tells me that the earlier a kid enters the social-­services system, the harder he can be to ­liberate from it. Apparently there are still cracks in ­Duncan’s composure, though none are evident at the moment. At times he curses, but he also says, “I used to hate climbing mountains on my bike, but now I look at it the same as weight lifting. More resistance, more strength. I’m definitely stronger.” Ridge View Academy, Grand Canyon Tour 2012 After a 101-mile day, an exhausted rider passes out on the cool grass outside Durango, Colorado. (Sam Adams) A number of Ridge View boys report having their own cycling-induced epiphanies. The Adele crooner, Austin, says that it’s the hardest thing he’s ever done but that it helps him make better choices. Another rider, 18-year-old Colton, says, “I’d go crazy at Ridge View without cycling.” Once enrolled at the academy, every boy must work his way from Rookie to Intern to Ram to Block R. At every step, they are expected to try to understand the reasons they committed crimes rather than simply atoning for them. Few, if any, have ever experienced the psychological benefits of a sport like cycling. But there’s another factor to the program’s success in reshaping these kids’ lives, one that science alone can’t explain: It’s the white-haired, wiry, 48-year-old Townsend, who began coaching the ­Minden, Nevada, Rite of Passage team in 1986. When ROP opened Ridge View Academy, Townsend left to start the cycling team there. ROP now has two other bike teams, but none have a coach like Townsend. Since joining ROP, he has led the Grand Canyon trip 19 times and cross-country trips several other times. Among the first was a 3,000-miler from California to New Jersey. On that trip he had a die-hard gang kid who insisted that Townsend would never change him. But as the miles passed he encountered the kindness of strangers, the open road, and, in essence, his true self, which showed him that his old ways would destroy him. By the time the team reached Pennsylvania, Townsend recalls, the kid finally broke down, saying, “Help me. I don’t want to hurt people. I don’t want to die.” ON THE SEVENTH morning of the trip, the sun creeps across the San Luis Valley as the boys from Ridge View roll out of their sleeping bags, yawn, fart, talk, and bicker. They are at a campground outside Durango and over the next five days they’ll climb approximately­ 21,000 feet. After riding to Mesa Verde National Park, they’ll cross briefly into Utah and drop into Hovenweep National Monument. From there—weather, breakdowns, and multi-kid pileups notwithstanding—it’s another 318 miles to the Grand Canyon. I joined the boys two days ago, in ­Salida, Colorado, but most of them haven’t yet warmed to me. Even this far into their reform, says Townsend, some choose to lay low and pretend they’re rehabilitating rather than do the hard work ROP espouses. I wouldn’t dare press them to show me how far they’ve come, because I, too, am still in my own process of rehabilitation. It stems from abuse I suffered as a young girl, and the years I’ve spent trying to overcome it. For now, I linger awkwardly as the boys crowd around a splintered picnic table. Soon a tall, bespectacled Latino-looking kid who is so skinny his bike shorts fan out from his quadriceps sidles up to me. Allen gestures toward the highway, then says, “Hi Miss. You ready for this?” “For what? The ride? I think so,” I say. “How about you?” He laughs. “Maybe. But I dunno. Because I’ve only ridden five times in my life.” Allen wanders off, leaving me with Alexis. He is also Latino, also skinny, but one of the team’s strongest riders. On every leg, he has led the pack, wearing thick tights instead of shorts. He watches me through long black eyelashes. Later I’ll find out that, like Duncan, he is hiding sadness. But he lights up when we talk about food. His favorite: Mexican, and bottomless bowls of sugary cereal. We shovel in spoonfuls of a generic version of Fruit Loops until another boy—18-year-old James—sits beside me. He’s tall, dark-haired, and his eyes are the electric green of Alaska’s northern lights. They widen as he says, “Before Ridge View, my mom and me cooked together. We once did a Denny’s pie: opened the package, turned on the stove, cooked it to perfection. But I was living with her when I got in trouble.” James says that he and his mom would get into arguments. She’d scream until he’d freak out and start whaling on her. One day he snapped, beating her with his pellet gun. When he came to she was calling the police, so he ran to his bedroom. He wanted to kill himself, to leave the hell of living with his mom. But the cops came before he could act and charged him with felony menacing. In another state, in another situation, James could have ended up in prison. But he made it to Ridge View after stints in two state-run facilities. By then, he was hyperactive, out of control, with the same tendency for explosive violence. But Bill Wood identified him as a kid who could benefit from cycling and from Townsend’s coaching. (Sam Adams) At the end of another ride, the boys ate pancakes. (Sam Adams) I first met several of these boys in 2010 while reporting on Colorado’s start-up high school mountain-bike league. Back then, James was the kid on the team who kept stopping when it got tough. I felt for him: He was big, crashed often, and seemed on the verge of crying. But as we talk now, I start to see how far he’s already come. He says that cycling has helped him mentally and physically. “Most kids think it’s a weenie sport but it’s endurance. I used to be 5-foot-9 and weigh 265. Now I’m 6-3 and 185. But I also want to say this: Most of the adults in my life taught me that violence is the way you get what you want. I got a whole bunch of other mental problems. Cycling helps because it gives me a purpose. Coach Townsend understands me because he’s been through what I have. I’m not taking meds anymore because I want to figure this out. But if I go to prison I’m not going to make it. I’ll either get killed or kill myself.” It’s clear that while effective, Townsend’s power is not so influential that it prevents James from relapsing. The three red fingernail welts running down his right cheek are evidence. He got them a month ago, when, after starting a fight with another student, he went after an ROP staff member. Back on the road, I think about James. I don’t know why, but he reminds me of myself. Maybe it’s the green eyes, or how once he starts talking he can’t seem to stop. That was me at 14, 15, 16. Like him, I had few boundaries. For eight horrible years, my stepfather came into my room and molested me. I finally ran away—but to a bridge spanning Idaho’s Snake River. Standing 400 feet above the water, I almost jumped. Instead, I turned around, walked 2 miles, and told a friend’s mother. She called the police, who took me to social services. At 14, I became a ward of the state, living first in a group home, then a foster home, and then with relatives. When my stepdad’s yearlong, court-appointed absence from me was up, the court recommended that my family reunite. Their thinking? Now healed, we could start over. Like James, I wasn’t healed. And like him I lashed out. I started drinking when I was 12. By 13, I was the girl at the party who’d always get dirty. Alcohol escalated into cocaine; reckless petting into careless sex. I didn’t really want to do any of these things. But I didn’t have anyone to help me turn my anger into forgiveness and my self-loathing into self-acceptance. I am barely getting to know the kids, but I can already see Townsend’s positive influence. FROM DURANGO, THE road climbs to the top of a low pass, then undulates through lush green farmland. We leave town late so it’s nearly dusk by the time we reach Mesa Verde. In the campground, Townsend starts dinner. When the tents are up, I sit down with Aaron. By now, word is out that I wrote a book detailing my troubled youth and my attempts to reconcile it. Since hearing this revelation, more boys want to talk. Aaron is medium height and muscular, the only black kid in the group, and quiet. But his calm hides a grief that wells in his body. When he was young, he says, police found his mom “naked, on a motel bed, all strung up by pillows.” Social services placed him and his sister with his aunt, who he now calls Mom. But something was missing. Out of loneliness, he got in with the wrong crowd, committed petty crimes, was caught, then cut off his ankle monitor. He came to Ridge View in 2011 and joined the cycling team shortly thereafter. Since then, he says, Townsend has taught him “lots of stuff,” but mostly how to forgive. Not those who hurt him, but how to forgive himself. “I still don’t know what I’ll do when I’m out of ROP,” he says. But he and Duncan want to bike-tour Japan. Self-forgiveness and a goal are signs of rehab, and Aaron is the only rider who, when I prompt him, speaks about the mistakes that led him to Ridge View. During our talk, he keeps going, even after Townsend yells “Dinner!” I sit with him in the dusk, feeling both motherly and conspiratorial as we talk about his accomplishments and joke about Townsend’s cooking. But after our interview, I start wondering about the effect I am having on the trip dynamic. I’ll find out later, when Townsend pulls me aside. Away from the boys, he’ll tell me that I may be calling up feelings they aren’t prepared to deal with and warns me that Tyler, specifically, is struggling with his past. “He’s been on papers, which means multiple suicide attempts,” Townsend says. “[Each boy has] a can of emotions, and if you open it, you have to be able to close it. Several of these guys can’t close the can.” I vow to be more cautious. But I want to keep talking with the riders, because I know the power of revealing one’s history. There is also something uniquely intimate about this trip and I feel obligated to listen. I pack my tent in the morning, before we load the van and drive to Mesa Verde. Since his Nevada ROP days, Townsend has had a love affair with Native American culture. The site contains some of the oldest Pueblo dwellings in America, including the famous Balcony House. With 290 miles to go, it seems we should keep riding. But Townsend insists: We’re sightseeing. (Sam Adams) (Sam Adams) In the parking lot of the visitors’ center we approach two 40-something dudes, their car rack loaded with bikes. Seeing our bikes and the Ridge View logo they ask, “You guys a bike team?” “We are,” I say. “From a school for adjudicated youth.” “Uh-oh,” they say. “Better get the padlocks.” Their words settle as we collect our bikes in the hot afternoon sun. The wind now feels like a hair dryer but our engines are revved so we pedal hard back onto Highway 160 toward ­Cortez, Colorado. First establishment to greet visitors: Shooters World (Guns! Ammo! Targets!). Total number of cool bike shops: one, Kokopelli’s, where we go so Townsend can buy a derailleur. Soon the sun drops and the wind calms. An hour later, we come to a sign pointing us toward Hovenweep Campground. I hear whoops, shouts of joy, laughter. But looking around, I see that Tyler has vanished. Somewhere between Mesa Verde and here he tumbled back into his depression. When Townsend’s assistant coach, Herb Reynolds, pulled alongside him with the van, Tyler gave up and climbed in. He did this despite the flat road and the sun, which painted the world orange. At the next intersection the rest of the team stops for portraits. Tyler emerges from the van and then sneers at the camera. Several boys comment on his pose, which they say makes him look like a model. For the first time since joining the ride, I see Tyler puff up. Fishing for more praise, he asks, “Do I?” Isaiah whistles. “Seriously, do you think I could be a model?” Tyler aks. “Maybe,” says Allen. “But just don’t get stuck up.” It almost seems like the boys have buoyed Tyler back into riding. But when the van revs to life, he climbs in. We’re dumbfounded. But it’s complicated. For months now Townsend has been trying to make Tyler believe that he can transcend his unhappy beginnings. He’s done this for all the boys, but for Tyler, transcending can feel impossible. He was born, like many Ridge View students, to parents who faltered. They found meth and, for a time, he says, spent up to $500 a day on it. They cared for Tyler, so he wasn’t technically a meth baby. But he grew up with the feeling that he would always be second. This led him to drinking, smoking, and huffing paint thinner before puberty. When he was five, his parents divorced and Tyler bounced between them. At some point, with no one paying much attention, Tyler quit school. Then one day his dad started hitting him—with a beer bottle, a cheese grater. At first Tyler hid the cuts and bruises. But when his mom saw them, she made him move in permanently. He would ultimately come to believe that this was one of the worst decisions ever made for him. Because one night, he was chilling out in the basement, when his sister yelled, “Mom wants you!” From the living room couch his mom said, “Tyler? Do you believe in God? I hope so. Because your dad died.” It’s hard to tell if he blames himself, but things unraveled quickly. “After that, I got really depressed,” he’ll tell me later. “I did a ton of drugs and started cutting. My mom freaked out, so I got sent to this group home.” There his cutting escalated from piercing his skin until it bled to something more serious. “One night, we’re all cutting and I’m like, ‘What am I doing wrong? Nothing’s happening,’” Tyler recalls. “Go longways,” said a kid next to him. Tyler did, and hit his vein. There it dangled, on the outside of his body. But instead of bleeding, he says, it only oozed white stuff. Trying again, he went deeper. “This time it gushed blood, so I laid down, but a girl found me. People were like, dude, you were crying for attention, which I guess I was.” By the time Tyler reached Ridge View, he had 10 felonies and initially refused to eat. When the boy hadn’t chewed even a grain of rice for days, Wood summoned Townsend, whose first job was chasing him down as he tried to flee across a prairie. On their second meeting, Tyler was farting around, trying to get out of the morning run. This time Townsend said, “You’re wasting a lot of energy. Why not put some to use on my cycling team? You don’t even have to try out. But if you want to join, you gotta eat.” Tyler says that something about Townsend struck him right. Or instilled trust. Or seemed safe enough that he wanted to please him. He can’t explain it, but that day, he ate lunch. When Townsend saw him, he said, “That’s good, but you gotta keep eating.” Tyler did, and started riding, and quickly exceeded Townsend’s expectations. On the first ride, he could barely clip into his pedals. But two weeks later, they were out on new pavement, and the team went by and there, says Townsend, “third in line was Tyler! A week after that, he attacked off the front, a 50- to 60-yard sprint.” TYLER MIGHT GET his mojo back yet. But right now, he is the greatest liability on our trip. We haven’t reached Hovenweep yet and there are still three long days of hard riding left. At our current pace, every kid will have to ride nine hours a day to cover the 230 miles between us and the Grand Canyon. At the pullout where we stopped to take pictures, Tyler boards the van while everyone­ else rides into the sunset. Water evaporates from the fields, making the air smell sweet and manurey. I feel a pang of sadness knowing what Tyler is missing. Even Townsend’s 12-year-old son, Gregory, is loving this. He’s done most of the ride and now cruises up front. As we finally roll into the Hovenweep Campground, it’s so dark that coach Reynolds has to light our way with his high beams. It’s cold. And the wind makes the night feel violent. Several times, I am spooked awake by thought that we are so far out here, that we have so far to go, and that the wind could drive the boys crazy. For a brief spell just before sunrise, the wind dies. But by the time we get up it’s screaming again at 40 miles per hour. We pull ourselves out of bed, knowing that today’s ride, to Mitten View Campground in Monument Valley, Arizona, spans 82 miles. A second assistant coach, Robert Gaston, estimates that our pace, with the gusts, will be 3 miles per hour. I’m no mathematician. But that should put us in Mitten View—tomorrow. It takes a herculean effort just to stand up, balance, and pedal forward. The stronger riders—Aaron, Colton, Alexis, Austin, James, Duncan, me—manage, although I am thinking, What kind of person makes kids ride into a maelstrom? Tyler and Allen fall so far behind that Gaston finally shouts, “Hold up!” Stuffing our faces into our jerseys to avoid the red dirt swirling off the Navajo reservation, we wait, until finally Tyler creeps into view. Behind him comes Allen—the kid who’s only ridden five times before. I can’t believe it, but he’s smiling. We huddle together, wishing that the wind would die long enough for us to keep pedaling. But when the sag wagon rolls up we load our bikes and drive to the campground. Yet the sites are closed for construction. Townsend backtracks and finally finds a state park several miles in the direction we came from. Everyone is exhausted and ­hungry. Now, retracing our steps feels demoralizing. From the back of the van, I hear a fight starting. The boys are speaking low, and I can barely make out their words over the hum of the road, but it sounds like: Isaiah: “What are you gonna do about it, Duncan?” Out of nowhere, cracks appear in Duncan’s normally placid persona. His body stills, but for a slight tremor. Duncan: “You don’t want to know.” Now Alexis bristles. “Don’t mess with my homeboy, cowboy.” Duncan: “Shut it, Alexis.” Isaiah: “Suck it, Duncan.” Townsend steers us down the winding road to Goosenecks State Park. But the evening’s trouble has just started. Goosenecks, it turns out, is more parking lot than park. Bits of toilet paper whip from sagebrush then fly into the San Juan River Canyon. Pulling the rig onto a gravel pad, Townsend tells the kids to grab the giant tents and work together to set them up. The boys try but the stakes won’t penetrate the ground and the wind grabs the tents and tries to launch them skyward. Every so often screams of frustrated hostility erupt (Grab it, idiot! Back off, dick!) as the sun falls and the gusts continue: Now the boys are fighting the tents in the cold and dark. They keep trying, until finally, Duncan yells at Alexis, who screams back, then grabs the nearest projectile—a full, 20-ounce water bottle—and hucks it at Duncan. It lands against the trailer with a crack. From inside, Townsend lunges out. But Alexis is already running and screaming and crying at the same time. Townsend chases, following him toward the canyon. When Townsend shouts again, Alexis stops. But shouts, “Fuck you! Don’t touch me!” and takes off again. Beyond this lot, the canyon wall plunges 1,000 feet to the San Juan River. Townsend screams, “No!” Alexis keeps sprinting. Seconds later, he drops. Not off the edge. But down, onto the ground. He is at the edge. But he will not let Townsend near him. “I said stay away!” he screams. For Alexis, who has kept his cool over 500 miles, the fight with Duncan shows that he has months or years to go before he can transcend the pain that brought him to Ridge View. Townsend sits on a low rock wall at the edge of the canyon and after several tense minutes, Alexis tunnels through the wind, sits down a few feet from Townsend, and listens. Later Townsend will say that, for the first time in the months that he has known the young man, he discovers that Alexis’s dad beat him. How remarkable, thinks Townsend—the similarities between him and this kid. Each day, Coach Townsend encouraged his team to push themselves. (Sam Adams) WHERE TO BEGIN? At 48, Townsend is a walking, talking litany of medical instabilities. He has several birth defects, including one that makes his heart rhythm falter, then start again. Several others he barely mentions. But one is evident every time he rides a bicycle. He is the one person out of 500,000 whose ligaments are too rigid for his body (a disease whose name he can’t even remember). His fingers, ankles, and toes break under force before they bend. And his knees stop bending just shy of what’s needed to comfortably pedal a bicycle. When he rides, he stands for miles. But something has kept him working with society’s at-risk youth every day, sometimes 24 hours a day, 10 or 12 or 14 days consecutively for so many years that his colleagues now call him the Lou Gehrig of youth services. It began on the morning of March 8, 1964. That’s the day Townsend dropped into the world, small and sickly, in a Mountain View, California, hospital. To help, his doctors placed him in an incubator, where they discovered, among other things, his knee problem. Freshly home, Townsend’s father, a WWII POW and the first chiropractor employed by Stanford University, rubbed his legs with hot oil and stretched them to improve their flexibility. When Townsend cried, he says, his father kept stretching. The painful manipulation continued for six years. By Townsend’s seventh birthday, he says, his father was regularly beating him, his two sisters, and his brother. Both Townsend and his sister Claudia insist that he wasn’t evil, but that he acted this way because of abuses he endured over nine months in a German prison camp. Although their father was violent, he was also caring, they say, and he was mindful of their intellectual development. Still, he would beat them for the “tiniest things,” like being minutes late after walking home from school. They all suffered, but Townsend may have gotten the worst of it. In one incident, his dad snatched the 40-pound boy, lifted him overhead, and slammed him into the ceiling and floor so many times he broke Townsend’s leg. When he grew older, Townsend would run away when his dad raged. The abuse could have ruined Townsend, but he found an outlet for the pain and the two would later reconcile. Nearly two years older, his brother, Doug, took another path, turning to drugs and petty crimes to mask his suffering. When he was 17, a Butte County judge ordered him into a juvenile drug-treatment center. Once there, he refused medications, so doctors strapped him to a gurney, stuck a catheter in him, and pumped him full of psychotropics. Today, Doug lives in a state hospital in California, where, says Townsend, there are people who don’t eat unless they take medication. “I go there, and my brother doesn’t have towels or soap or toothpaste,” he says. For the past three decades, Townsend has worked to free Doug, which is why he tells his students at ROP that the system “has a giant hook” in them. Through cycling—especially the Grand Canyon rides—he hopes to teach the kids how to remove the hook by becoming self reliant, by owning their mistakes, and taking control of their future. On the road, hundreds of miles from ROP or any other correctional institution, he attempts to show them hope amid the blinding hopelessness of their situations. Perhaps Townsend has lasted so long at ROP because his personal mission is remarkably similar to ROP’s philosophy toward ­reformation, which dictates that its students exercise, eat right, and complete their studies. Crucially, Ridge View also believes its sports teams, marching band, and Habitat for Humanity program help normalize students. “If we keep kids in a bubble and we institutionalize them, the first time they get out in the real world and someone says boo, they’re going to recidivate,” says ROP president Ski Broman. While his brother fell into the abyss, Townsend clawed for the light. He stayed in school, got a job, and found cycling. He raced only briefly as a teenager, but in 1984 he began working at ROP. Two years later, he started coaching and soon began pushing his team an average of 300 miles per week. By 1988, it was competing in the Milwaukee Super Week, the Utah Cycling Fest, and the Mammoth Cycling Classic. But Townsend says podiums were never the point. The point, says Claudia, has always been to help others. It’s a character trait that she believes Townsend inherited­ from their father. “Before the war, our dad was a free spirit, open, caring, and loving,” she says. “My brother is like that with these boys.” It’s a singular focus sharpened by his inability to untangle his brother from the correctional­ system—a system that he believes often does too little to rehabilitate those who need another chance. To illustrate the point, he tells me that sometimes Doug sits in his room flipping through magazines. If he sees a picture of a man on a bike, he’ll fold it, stuff it in an envelope, and mail it to Townsend. “It’s his way of saying I’m still here, I need you, come get me,” says Townsend. (Sam Adams) THE FOLLOWING MORNING, the wind is still blowing. In the trailer Townsend says: “It’s been rough circumstances over the last few days, and you all have been amazing. But we’re tired. We rode our bikes hard. We’re pretty beat up. So today, we won’t ride.” A sigh of relief reverberates through the trailer. We pack up and drive to Kayenta, ­Arizona. In an empty lot next to a Burger King, we lunch while assistant coach Reynolds congratulates us on our tenacity and patience, then adds, “Be tolerant. Be patient.” Back on the road, I practice tolerance until James enrages me. All week long he’s been goofing around, pulling beside me, acting like he’s going to pass me. Several times we’ve touched wheels, nearly crashing. This time, he pulls up, stalls, catches a gust, and topples hard—on me. Before I know it, I am up, flailing my arms, shouting: “Goddamn it, James! Watch where you’re going!” Almost instantly, I remember how he attacked his mom and the ROP staff member. As soon as I shout, a thousand watts of fear shoot through my chest. But he jumps up, recoils, and pleads, “Ohmygod! MissRoss! I’msorryI’msorryI’msorry!” I realize then that I am seeing Townsend’s work, the work of Ridge View, even the power of cycling in action. That James doesn’t jump me thrills me beyond expression. But maybe it’s like he says: The bike calms him and helps him deal with his problems. Perhaps, if he can keep riding, the bike will also keep him out of prison. That night, we sleep in a concrete “campground” next to a Quality Inn, in Tuba City, Arizona. By now, everyone is feeling the miles. But only Tyler dwells on it. Sitting at the picnic table he says, “I’m done. Give me a phone. I’m calling my grandma.” But Townsend ignores him, because there is just one more day of riding. We pedal 51 miles to the town of Tusayan, gateway to the Grand Canyon. The boys cruise through a giant gift shop under the watchful eyes of Reynolds and Gaston. Just as in Mesa Verde, people stop, stare, and ask if we’re a church group from Phoenix. Austin, basking in the pride of riding every possible mile, quips, “Nah, we’re just a bike team riding to the Grand Canyon.” Which we do, finally, after lunch and when we’re suited up in our last clean shorts and jerseys. Before we go, Townsend issues us a challenge: Catch Gaston, who is one hell of a rider. Townsend gives him a five-minute lead then sends us after him. From the parking lot, the road starts smooth and flat, before, eventually, climbing. In the hot sun, the wind slows for the first time in days. You can smell summer in the dirt and the rocks and the bark of the lodgepole pines. We ride just as we started: Gaston, way ahead, followed by Alexis, Colton, and Aaron; then a big gap to Austin, Duncan, and me. We seven are pushing so hard that we lose the rest. At some point, the wind dies down and I can sense something both beautiful and terrifying—the Grand Canyon. At the top of the pass, everyone stops, waiting for the final riders: Tyler, Townsend, Gregory, and Allen. They come, eventually, and I survey the boys from our perch on the pass that will soon drop to the chasm. Alexis straddles his bike, calm again but eager to keep riding. Aaron’s here, too, finally, with full certainty that he can “accomplish something.” Allen huffs up the pass looking proud but somehow thinner, a result of more cycling than he will likely ever do again in his lifetime. Austin is singing. James stares into the distance, perhaps imagining the day when he will cook food in his own kitchen. Colton says, “Can you believe it? I’m happy. But I don’t want it to be over.” Duncan gazes out over the vast, sage-covered landscape and says, “I’m here. I made it. I’m not stopping.” I don’t think he means that he will ride forever. But that he has come this far in his life, and that he will keep pushing forward. He has a plan to get his GED, finish his sentence, join the Marines, find his daughter. This, I see, is the point of riding to the Grand Canyon: It gives these kids something concrete to strive for. You encounter a hill and you have to pedal hard to reach the summit. But there will be another hill, and another—it’s an ongoing struggle. To keep reaching the top takes self-awareness and owning your own actions in spite of innumerable and unknowable obstacles. So close to the Grand Canyon, I witness the power of cycling to provide these kids a way to unhitch from the weight of their past. I know how it feels. Riding has been crucial in my own journey. I’m just one person, but I know the value of sweat and suffering, and also elation. In their smiles and cautiously hopeful gazes, I look for signs that they have gained a similar understanding on this trip. From the top of the pass, every inch to the Grand Canyon is downhill. But it will be imperative, when the boys finally do leave Ridge View, that they remember the pain of their journey. In the coming months, most will leave the academy. When that happens, some will disperse to better situations, some, arguably, to worse. But Tyler is the one I’ve followed most closely since joining the team back in Salida. So he is the one I seek out after the trip. I find him at Ridge View the following October, wearing the letter jacket that signifies he’s made Ram status. Under Townsend’s watch, we meet in a stark white room behind a door with a metal detector. There, he tells me that after the Grand ­Canyon, he kept riding his bike. He started racing, and he only quit once. “But it was only because this kid cut in front of me,” he says. It looks as if he has gained 30 or so pounds since the trip, and on the weekends, he goes to his mom’s house. Once, she took him to church, where he says an amazing thing happened: “When people heard that I rode all the way to the Grand Canyon, they came up and congratulated me.” He also says that three weeks from the day we talk, he will go before the parole board, which will decide his future. At the hearing, a representative from DYC will “want to know what I learned here and what I’m going to do to stay out of trouble once I’m out,” he says. When I ask him what he’ll say, he smiles. “My little brother has gotten into BMX riding. There’s a bike in the window of my local shop and my mom said she’d buy it for me when I get out. I don’t know, I’ve never ridden on BMX trails before. But I’m pretty sure that a mountain bike will work. When I get one, I’m going to teach my little brother about riding. I’m going to be like Coach Townsend. I’m going to coach him and help him stay out of trouble.”
{ "pile_set_name": "Pile-CC" }
--- author: - 'R. Mathieu, S. A. Ivanov, P. Nordblad, and M. Weil' date: 'Received: date / Revised version: date' title: 'Enhancement of antiferromagnetic interaction and transition temperature in $M_3$TeO$_6$ systems ($M$ = Mn, Co, Ni, Cu)' --- [example.eps]{} gsave newpath 20 20 moveto 20 220 lineto 220 220 lineto 220 20 lineto closepath 2 setlinewidth gsave .4 setgray fill grestore stroke grestore Introduction ============ There is currently a great interest in designing and finding new materials with multiferroic properties, or in a larger sense magnetic and dielectric ordering near room-temperature. It has been found that complex crystal structures with several independent sites for magnetic cations as well as complex magnetic structures favor concomitant coupled magnetic and dielectric states[@mf]. The structural, magnetic and dielectric properties of several members of the corundum-related class of complex oxides with structural formula $A_3B$O$_6$ ($A$ cation is divalent or trivalent, $B$ cation is pentavalent or hexavalent) have been investigated, as for example the $M_3$Te$^{6+}$O$_6$ systems with $M$ = Mg$^{2+}$[@blasse], Cd$^{2+}$[@kosse], Mn$^{2+}$, Co$^{2+}$, Ni$^{2+}$, Cu$^{2+}$[@MTO; @CTO; @NTO; @CuTO], or ($M_2A$)Sb$^{5+}$O$_6$ compounds with $M$ = Mn$^{2+}$, Ni$^{2+}$ and $A$ = In$^{3+}$, Sc$^{3+}$[@MTO-InSc; @NTO-InSc]. The $M_3$TeO$_6$ oxides with $M$ = Mn, Co, Ni, Cu order antiferromagnetically at low temperatures. Ni$_3$TeO$_6$ crystallizes in a non-centrosymmetric rhombohedral $R3$ structure, and displays a relatively simple collinear magnetic structure, consisting of ferromagnetic $ab$-planes stacked antiferromagnetically along the $c$-axis [@NTO]. On the contrary, the other compounds crystallize in centrosymmetric structures, with complex magnetic structures: monoclinic $C2/c$ Co$_3$TeO$_6$ displays an incommensurate, multi-propagation-vector and temperature-dependent, magnetic structure[@CTO]; rhombohedral $R\bar{3}$ Mn$_3$TeO$_6$ displays a two-orbit incommensurate antiferromagnetic structure[@MTO]; and cubic $Ia\bar{3}$ Cu$_3$TeO$_6$ orders in a “three-dimensional spin web” of hexagonal arrangements of magnetic moments[@CuTO]. We here report structural and magnetic properties of $M_3$TeO$_6$ single-crystals with $M$ = Mn, Co, Ni, Cu and Mn-doped $M_3$TeO$_6$ ($M$ = Co, Ni) ceramics. The antiferromagnetic interaction and antiferromagnetic transition temperature increase when Mn replaces the magnetic cation.\ ---------------------- --------------- ------------- ------- ------- ------- -- ------ --------- ------ ----------- ------------ ----------- ------- $M$-O $M$-$M$ $M^{2+}$ $<$ $r_A$ $>$ $s. g.$ min. max. mean min. max. mean $V_A$ $\omega_A$ $x_A$ $T_N$ Mn 0.83 $R\bar{3}$ 2.091 2.373 2.207 3.21 3.83 3.56 12.7 0.103 0.077 23 Mn$_{0.2}$Co$_{0.8}$ 0.762 $R\bar{3}$ 1.976 2.408 2.159 3.10 3.81 3.46 11.81 0.099 0.071 40 $^{a,b}$Co 0.745 $C2/c$ 1.856 2.333 2.064 2.71 3.93 3.38 3.5-13.0 0.02-0.06 0.06-0.24 26 $^a$Ni 0.69 $R3$ 2.008 2.148 2.079 2.78 4.02 3.40 11.6-11.9 0.01-0.03 0.14-0.24 52 Cu 0.73 $Ia\bar{3}$ 1.949 2.369 2.116 3.18 3.60 3.39 10.99 0.105 0.17 61 ---------------------- --------------- ------------- ------- ------- ------- -- ------ --------- ------ ----------- ------------ ----------- ------- \[table1\] Results and discussions ======================= $M_3$TeO$_6$ single crystals ($M$ = Mn, Co, Ni, Cu) and ceramics ($M$ = (Mn,Co), (Mn,Ni) were synthesized by chemical transport (see Refs. [@MTO; @CTO; @NTO; @CuTO] and [@MTO-MW]) and solid state reactions[@MTO], respectively. The magnetic properties were investigated by magnetization and heat capacity measurements (MPMS squid magnetometer and PPMS setup from Quantum Design Inc.). Crystal and magnetic structures of the samples with $M$ = Mn, Co, and (Mn,Co) have been studied by x-ray (XRD) and neutron (NPD) powder diffraction[@MTO; @CTO; @MCTO]. Corresponding data for the samples with $M$ = Ni and Cu was obtained from literature[@NTO; @CuTO]. The magnetic properties of ceramic samples with $M$ = Mn, Co, Ni, Cu were found to be similar to those of corresponding single crystals. Magnetic susceptibility and heat capacity experiments indicate low temperature antiferromagnetic states for all $M_3$TeO$_6$ single crystals. The magnetic transitions are evident from the heat capacity results plotted in the main frame of Fig. \[HC\]. The obtained antiferromagnetic transition temperatures ($T_N$), listed in Table \[table1\], are in agreement with the temperatures for which $ \partial $($MT/H$)$/ \partial T$ curves is maximum. Linear fits of $H/M$($T$) data recorded up to higher temperatures were performed, yielding estimates of Curie-Weiss temperatures $\theta_{CW}$ and the magnetic frustration parameter $f$=$-\theta_{CW}/T_N$. The variation of $f$ with $M$ is illustrated in the inset of Fig. \[HC\]. The incommensurate magnetic structure of Mn$_3$TeO$_6$ is frustrated. For this compound, $\theta_{CW}$ $\sim$ -120 K, i.e. about 5 times $T_N$ ($f$ $\sim$ 5), to compare to $\theta_{CW}$ $\sim$ -49 K ($f$ $\sim$ 1) and $\theta_{CW}$ $\sim$ -54 K ($f$ $\sim$ 2) for Ni$_3$TeO$_6$ and Co$_3$TeO$_6$ respectively. Similarly we find $\theta_{CW}$ $\sim$ -223 K ($f$ $\sim$ 3.6) for Cu$_3$TeO$_6$. Note that in that case only the higher-temperature data ($T$ $\ge$ 200 K) closely follows a Curie-Weiss behavior (see also [@CuTO]). As seen from the heat capacity and magnetization measurements shown in Fig. \[HCMT\], the antiferromagnetic ordering temperature increases in Mn-doped Co$_3$TeO$_6$ and Ni$_3$TeO$_6$ ceramics. In the case of (Mn$_{0.2}$Ni$_{0.8}$)$_3$TeO$_6$, the onset of antiferromagnetic ordering takes place near 67 K, i.e. above the $T_N$ of Cu$_3$TeO$_6$ (which has the highest reported undoped $T_N$ (61 K)). The $f$ parameter is nearly unaffected by Mn-doping, as shown in the inset of Fig. \[HC\], reflecting the co-variation of $T_N$ and $\theta_{CW}$, and thus the increase in antiferromagnetic interaction strength. We have also tried to dope Mn in Cu$_3$TeO$_6$; however, the temperature-dependent magnetization curves of e.g. (Mn$_{0.2}$Cu$_{0.8}$)$_3$TeO$_6$ show two features, near 50 K and 21 K, suggesting phase separation. Similar two phase features were obtained when doping Co in Ni$_3$TeO$_6$. For comparison, also $B$-site substitutions were attempted, e.g. Ni$_3$(Te,Mo)O$_6$, again resulting in phase separation. The structural and magnetic properties of the pure $M_3$TeO$_6$ systems and the 20% Mn-doped Co$_3$TeO$_6$ compound are summarized in Table \[table1\] and Fig. \[DIAG\]. The compounds contain different magnetic cations, and adopt different crystal structures with sometimes non-equivalent crystallographic and magnetic sites. It is thus difficult to determine an exact correlation between structural and magnetic properties. We have attempted to extract more structural parameters from the refinements, such as $M$-O-$M$ bond angles, but those angles were found to vary greatly (e.g. between 29$^o$ and 161$^o$ for $M$ = Mn). Nevertheless, as illustrated in Table \[table1\] and Fig. \[DIAG\], while Mn-doped Ni$_3$TeO$_6$ remains rhombohedral $R3$, Mn-doped Co$_3$TeO$_6$ surprisingly adopts the rhombohedral $R\bar{3}$ structure of Mn$_3$TeO$_6$ (even with only 10% Mn, see also Ref. [@MCTO]). As seen in the table, all the obtained structural and polyhedral parameters for Mn$_3$TeO$_6$ and (Mn$_{0.2}$Co$_{0.8}$)$_3$TeO$_6$ are relatively similar. Interestingly, by extrapolating the data presented in Fig. \[DIAG\], one can predict that if rhombohedral $R\bar{3}$ Co$_3$TeO$_6$ could be stabilized (e.g. by synthesis under pressure), it would have a $T_N$ of about 45 K, i.e. nearly twice that of monoclinic Co$_3$TeO$_6$. Similarly, assuming that Mn-doped Ni$_3$TeO$_6$ remains in the rhombohedral $R3$ structure for large amounts of Mn, such an Mn-rich (Ni,Mn)$_3$TeO$_6$ or pure Mn$_3$TeO$_6$ could order antiferromagnetically at temperatures around 100 K. Dielectric and ferroelectric properties of some $M_3$TeO$_6$ ($M$= Cd, Mg) have been investigated in earlier studies[@blasse; @kosse]. More recently, it was observed that Co$_3$TeO$_6$ could acquire an electronic polarization at low temperatures[@CTO-POL], and that Ni$_3$TeO$_6$ is ferroelectric below 1000 K[@NTO-InSc]. Since the non-centrosymmetric structure of Ni$_3$TeO$_6$ is preserved upon doping with Mn, our results suggest that rhombohedral $R3$ Mn-rich (Ni,Mn)$_3$TeO$_6$ or pure Mn$_3$TeO$_6$ would display enhanced magnetic properties (higher $T_N$) while retaining ferroelectric properties. Conclusions =========== We have observed significant changes in the structural and magnetic properties of $M_3$TeO$_6$ solid solutions. For example, the replacement of one fifth of the magnetic cation with Mn in Ni$_3$TeO$_6$ and Co$_3$TeO$_6$ yields an increase in antiferromagnetic interaction and transition temperatures. We predict that new $(M',M'')_3$TeO$_6$ multiferroics with higher magnetic ordering temperature, such as rhombohedral $R3$ Mn-rich (Ni,Mn)$_3$TeO$_6$ could be designed and synthesized. acknowledgement =============== We thank the Swedish Research Council (VR), the Göran Gustafsson Foundation, and the Russian Foundation for Basic Research for financial support. N. A. Spaldin and M. Fiebig, Science **309**, (2005) 391 ; D. I. Khomskii, J. Magn. Magn. Mater. **306**, (2006) 1; J. F. Scott, Nature Mater. **6**, (2007) 56; Y. Tokura and S. Seki, Adv. Materials **22**, (2010) 1554. G. Blasse and W. Hordijk, J. Solid State Chem. **5**, (1972) 395. L. I. Kosse, E. D. Politova, V. V. Chechkin, E. A. Myzgin, B. S. Medvedev, and Yu N. Venevtsev, Russ. J. Inorg. Chem. **18**, (1982) 1616. S. A. Ivanov, P. Nordblad, R. Mathieu, R. Tellgren, C. Ritter, N. Golubko, E. D. Politova, and M. Weil, Mater. Res. Bull. **46**, (2011) 1870. S. A. Ivanov, R. Tellgren, C. Ritter, P. Nordblad, R. Mathieu, G. André, N. V. Golubko, E. D. Politova, and M. Weil, Mater. Res. Bull. **47**, (2012) 63. I. Zivkovic, K. Prsa, O. Zaharko, and H. Berger, J. Phys.: Condens. Matter **22**, (2010) 056002. K. Y. Choi, P. Lemmens, E. S. Choi, and H. Berger, J. Phys.: Condens. Matter **20**, (2008) 505214. J. Rodriguez-Carvajal, Physica B **192**, (1993) 55. T. B. Zunic and I. Vickovic, J. Appl. Phys. **29**, (1996) 305. S. A. Ivanov, P. Nordblad, R. Mathieu, R. Tellgren, E. Politova, and G. André, Eur. J. Inorg. Chem. **2011**, (2011) 4691. S. A. Ivanov, R. Mathieu, P. Nordblad, R. Tellgren, C. Ritter, E. Politova, G. Kaleva, A. Mosunov , S. Stefanovich, and M. Weil, Chem. Mater. **25**, (2013) 935. M. Weil, Acta Crystallogr. E **62**, (2006) i244. S. A. Ivanov, R. Mathieu, P. Nordblad, C. Ritter, E. Politova, N. Golubko, R. Tellgren, A. Mosunov, and M. Weil, in preparation. M. Hudl, R. Mathieu, S. A. Ivanov, M. Weil, V. Carolus, Th. Lottermoser, M. Fiebig, Y. Tokunaga, Y. Taguchi, Y. Tokura, and P. Nordblad, Phys. Rev. B **84**, (2011) 180404(R).
{ "pile_set_name": "ArXiv" }
Play Streaming P-51 Dragon Fighter As World War Two rages on, the allies are about to push the Nazis out of North Africa. That's when the Nazis turn up the heat, unleashing their secret Weapon: DRAGONS!!! The allies quickly lose ground to the ancient monster, and are close to complete annihilation when the Allies put together a group of special fighter-pilots, specially trained to fight a beast everyone thought was a myth. Full Movie P-51 Dragon Fighter For Free ! Watch free P-51 Dragon Fighter online movie without downloading. You can watch online movie streaming in HD 84 Min length. Watch streaming movies online free trailer below and also watch full length P-51 Dragon Fighter Megavideo streaming movie on HD without investigation. You can watch the film with or without downloading here You've just seen the movie categories p51 titled P-51 Dragon Fighter (2014). You can bookmark this page with the URL http://livingthislifesimply.blogspot.com/2014/11/p-51-dragon-fighter-2014.html. Thank you!
{ "pile_set_name": "Pile-CC" }
Turning Dreams of Medicos Into Reality...!!! A) Is excreted mainly by the kidneyB) Can cross the placental barrier easilyC) Is well absorbed from the intestineD) Accumulates in the cellular lipidsAnswer (Select an option above to get the answer):
{ "pile_set_name": "Pile-CC" }
ProSeries Wall Map: New Hampshire State Rand McNally's regional wall map of New Hampshire is ideal for anyone needing a comprehensive representation of the area for planning, routing, or reference. It's a great choice for business and sales strategy, urban development, social work outreach, education, and marketing. New Hampshire residents, businesses, and government offices are sure to find this wonderful reference tool irreplaceable. Note: This map is not available for gift wrapping. Please allow 7-10 days for shipping. Map details include state highways, federal highways, county highways, county boundaries, city shading, cities and towns, major waterways, state/national parks, campsites, exit numbers, rest areas, military installations, airports, golf courses, universities, and much more City/county index Mileage chart with 72 mileage pairs between 17 cities Includes a hanging kit with rails for easy mounting just about anywhere
{ "pile_set_name": "Pile-CC" }
Chinese scientists announced they have converted sand into fertile soil using a new method they developed, which they hope to use to fight desertification. A 1.6-hectare sandy plot in Ulan Buh Desert in Inner Mongolia Autonomous Region, north China, has been transformed into fertile land. [Photo/www.cqnews.net] A team of researchers from Chongqing Jiaotong University has developed a paste made of plant cellulose that, when added to sand, helps it retain water, nutrients and air. A 1.6-hectare sandy plot in Ulan Buh Desert in Inner Mongolia Autonomous Region, north China, has been transformed into fertile land, yielding rice, corn, tomatoes, watermelon and sunflowers, after being treated by the new method. A forthcoming issue of the English-language journal "Engineering," published by the Chinese Academy of Engineering (CAE), will publish the research by the Chongqing scientists Yi Zhijian and co-author Zhao Chaohua. The new method will hopefully help turn desert areas into an ideal habitat for plants, said Yi. The plants in the sandy test plot needed about the same amount of water as those grown in regular soil, but required less fertilizer and bore higher yields, according to estimates by experts. Since 2013, scientists have been experimenting with outdoor cultivation at two sites with areas of approximately 550 and 420 square meters in Chongqing, where scientists simulated desert landform conditions. The plants have survived the heavy rain and high temperatures, the typical climate conditions in Chongqing. The crops, including rice, corn and potatoes, flourished in the newly converted soil, according to the scientists. To verify the method, a large-scale planting experiment in Ulan Buh Desert began in April this year. There is very little rain fall in the area. The converted sand has proved to be an ideal habitat for plant species with a strong resistance to wind erosion, according to the research findings. The paste is non-toxic, environmentally friendly, cheap, and suitable for mass production, they said. The cost of sand conversion is between 22,500 yuan and 40,500 yuan (3,373 to 6,071 U.S. dollars) per hectare, Yi said. Hopes, cautions Enabling plants to thrive in deserts just like in soil is a major breakthrough said, Li Jia'na, with the China Agro-technological Extension Association. The new method is an important breakthrough in combating desertification and may prove fundamental in transforming deserts into fertile, arable land, said Zhong Zhihua, an academic with the CAE. Desert control is a global challenge. If the sand conversion method could be used on a large-scale for agriculture it could help address several environmental problems, such as deforestation, bio-diversity loss and climate change, the paper said. There have been no publicized studies internationally about this method, according to Zhong, and the paper itself cautioned that its experiments had all been carried out in places with underground water. Despite the lack of rainfall, Ulan Buh Desert has abundant underground water reserves, perfect to support irrigation. Large-scale desert control through the sand-to-soil conversion "must take into consideration the risks of excessive or undue exploitation of underground water resources," the paper said. Before the large-scale application, planning and assessment must be carried out, and this might start in areas with access to adequate water resources, the paper added.
{ "pile_set_name": "OpenWebText2" }
<?php /** * This file is part of phpDocumentor. * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. * * @copyright 2010-2015 Mike van Riel<[email protected]> * @license http://www.opensource.org/licenses/mit-license.php MIT * @link http://phpdoc.org */ namespace phpDocumentor\Reflection; /** * Interface for files processed by the ProjectFactory */ interface File { /** * Returns the content of the file as a string. * * @return string */ public function getContents(); /** * Returns md5 hash of the file. * * @return string */ public function md5(); /** * Returns an relative path to the file. * * @return string */ public function path(); }
{ "pile_set_name": "Github" }
Q: Change content of dynamically on click of link from menu through Ajax I'm using JSF2 with Primefaces running on Tomcat 7. I have created a layout in baseLayout.xhtml as below: - <h:body> <p:layout fullPage="true"> <p:layoutUnit position="north" size="50" id="top"> <h:form> <ui:include src="/template/header.xhtml" /> </h:form> </p:layoutUnit> <p:layoutUnit position="south" size="20"> <h:form> <ui:include src="/template/footer.xhtml" /> </h:form> </p:layoutUnit> <p:layoutUnit position="west" size="400"> <h:form> <ui:include src="/template/menu.xhtml" /> </h:form> </p:layoutUnit> <p:layoutUnit position="center" size="400"> <h:panelGroup id="centerContentPanel"> <ui:include src="#{navigationBean.pageName}.xhtml" /> </h:panelGroup> </p:layoutUnit> </p:layout> </h:body> I want to dynamically change the source of centerContentPanel without refreshing the whole page and just the centerContentPanel i.e for on click of link present in the menu.xhtml as below: - <h:form id="form2"> <f:ajax render=":centerContentPanel" execute="@this"> <h:commandLink value="page1" action="#{navigationBean.doNav}" > <f:param name="test" value="/pages/page1" /> </h:commandLink> <h:commandLink value="page2" action="#{navigationBean.doNav}" > <f:param name="test" value="/pages/page2" /> </h:commandLink> </f:ajax> </h:form> . I tried doing that, but instead it refreshes the whole page without changing the URL, and when I refresh it again, the new page is included. I don't know what is happening. My NavigationBean as below:- public class NavigationBean { private String pageName="/template/body"; public NavigationBean() { } public String doNav() { System.out.println("Hello"); String str = FacesContext.getCurrentInstance().getExternalContext().getRequestParameterMap().get("test"); this.pageName = str; return pageName; } public String getPageName() { return pageName; } public void setPageName(String pageName) { this.pageName = pageName; } } A: change doNav() into void , no need to return value... (cause it will cause your commandLink to reload page...) you already updating the pageName that is in use in <ui:include src="#{navigationBean.pageName}.xhtml" /> doNav should look like this: public void doNav() { System.out.println("Hello"); String str = FacesContext.getCurrentInstance().getExternalContext().getRequestParameterMap().get("test"); this.pageName = str; } the returning value from your action="..." causes the refreshes the whole page without changing the URL
{ "pile_set_name": "StackExchange" }
--- name : dummy_pack_7_name description : dummy pack version : 0.1.0 author : st2-dev email : [email protected]
{ "pile_set_name": "Github" }
A map is both a beloved and bewildering companion to those who choose to navigate an unfamiliar city or traverse across country to find a blissful vacation spot. Map navigation becomes even more difficult for those who retreat into the wilderness, some becoming lost, unable to traverse the unfamiliar terrain with a map. Countless children, stuffed into the backseats of vacation-bound station wagons, sport utility vehicles and Volkswagen bugs, have pleaded to know if “we are there yet.” Befuddled parents search for convincing answers as they unfold yet another map. In some circles, orienteering and adventure racing rise to the level of competition, drawing crowds of participants and network audiences. Such competitions force participants to navigate through mountains, streams, and deserts, often guided only by a compass and map. Many young geography students, when presented with a world or area map, struggle to accurately place themselves within a map to determine their relationship to various area or world locations. Commercial and recreational boats and aircraft often travel through unfamiliar areas and must skillfully navigate in order to reach their intended destinations. Global positioning systems (GPS) have improved navigation by providing accurate location feedback. As will be appreciated by those skilled in the art, military and civilian water, ground, and airborne vehicles often use GPS systems for navigation. GPS is a satellite-based radio navigation system capable of providing continuous position, velocity, and time information. GPS receiver units receive positioning signals from a constellation of satellites deployed in various orbits about earth (e.g., 12-hour orbits). The satellites continuously emit electronic GPS signals (or telemetry) for reception by ground, airborne, or watercraft receiver units. By receiving GPS signals from a plurality of satellites, a properly configured receiver unit can accurately determine its position in three dimensions (e.g., longitude, latitude, and altitude). There are many known GPS systems. For example, U.S. Pat. No. 5,990,826 discloses an interbuilding and urban canyon extension solution for global positioning systems. U.S. Pat. No. 5,861,841 discloses a compact GPS receiver/processor. The GPS system including an antenna to receive Global Positioning System (GPS) signals from two or more GPS satellites and a credit card size GPS signal processing Smartcard. The Smartcard is attached to the antenna that receives the GPS signals and determines and displays the present position of the antenna. U.S. Pat. No. 5,964,821 discloses a navigation system for offering navigational assistance to a mobile user. The navigation system receives GPS position information signals, which are processed to determine current position latitude and longitude coordinates and direction of travel. Of course, there are many other GPS systems known to those of ordinary skill in the art. Some embodiments employ digital watermarking techniques to even further ease navigation and map orientation. In some embodiments, digital watermarking techniques are combined with GPS systems. Applications of the present invention include implementations in fields such as government work and field reconnaissance, commercial or recreational boating, hiking, mountaineering, travel, orienteering, geography, education, exploration, entertainment, sight seeing, etc. Digital watermarking, a form of steganography, is the science of encoding physical and electronic objects with plural-bit digital data, in such a manner that the data is essentially hidden from human perception, yet can be recovered by computer analysis. In physical objects, the data may be encoded in the form of surface texturing, or printing. Such marking can be detected from optical scan data, e.g., from a scanner, optical reader, input device, digital camera, or web cam. In electronic objects (e.g., digital audio or imagery—including video), the data may be encoded as slight variations in sample values. Or, if the object is represented in a so-called orthogonal domain (also termed “non-perceptual,” e.g., MPEG, DCT, wavelet, etc.), the data may be encoded as slight variations in quantization values or levels. The assignee's U.S. Pat. No. 6,122,403 and U.S. application Ser. No. 09/503,881 (now U.S. Pat. No. 6,614,914) are illustrative of certain watermarking technologies. Digital watermarking systems typically have two primary components: an encoder that embeds the watermark in a host media signal, and a decoder that detects and reads the embedded watermark from a signal suspected of containing a watermark (e.g., a suspect signal). The encoder embeds a watermark by altering the host media signal. The decoder component analyzes a suspect signal to detect whether a watermark is present. In applications where the watermark encodes information, the decoder extracts this information from the detected watermark. The analysis of the detected data can be accomplished in various known ways. Presently, most steganographic decoding relies on general purpose microprocessors that are programmed by suitable software instructions to perform the necessary analysis. Other arrangements, such as using dedicated hardware, reprogrammable gate arrays, or other techniques, can of course be used. Determining orientation of embedded data can be discerned by reference to visual clues. For example, some objects include subliminal graticule data, or other calibration data, steganographically encoded with the embedded data to aid in determining orientation. Others objects can employ overt markings, either placed for that sole purpose (e.g. reference lines or fiducials), or serving another purpose as well (e.g. lines of text), to discern orientation. Edge-detection algorithms can also be employed to deduce the orientation of the object by reference to its edges. In one example, subliminal graticule data can be sensed to identify the locations within the image data where the binary data is encoded. The nominal luminance of each patch before encoding (e.g., background shading on a map) is slightly increased or decreased to encode a binary “1” or “0.” The change is slight enough to be generally imperceptible to human observers, yet statistically detectable from the image data. Preferably, the degree of change is adapted to the character of the underlying image, with relatively greater changes being made in regions where the human eye is less likely to notice them. Each area thus encoded can convey plural bits of data (e.g., 16-256 bits). One problem that arises in many watermarking applications is that of object or positioning corruption. If the object is reproduced, skewed, or distorted, in some manner such that the content presented for watermark decoding is not identical to the object as originally watermarked, then the decoding process may be unable to recognize and decode the watermark. To deal with such problems, the watermark can convey a reference signal. The reference signal is of such a character as to permit its detection even in the presence of relatively severe distortion. Once found, the attributes of the distorted reference signal can be used to quantify the content's distortion. Watermark decoding can then proceed—informed by information about the particular distortion present. The assignee's U.S. application Ser. Nos. 09/503,881 (now U.S. Pat. No. 6,614,914) and 09/452,023 (now U.S. Pat. No. 6,408,082) detail certain reference signals, and processing methods, that permit such watermark decoding even in the presence of distortion. In some image watermarking embodiments, the reference signal comprises a constellation of quasi-impulse functions in the Fourier magnitude domain, each with pseudorandom phase. To detect and quantify the distortion, the watermark decoder converts the watermarked image to the Fourier magnitude domain and then performs a log polar resampling of the Fourier magnitude image. A generalized matched filter correlates the known orientation signal with the re-sampled watermarked signal to find the rotation and scale parameters providing the highest correlation. The watermark decoder performs additional correlation operations between the phase information of the known orientation signal and the watermarked signal to determine translation parameters, which identify the origin of the watermark message signal. Having determined the rotation, scale and translation of the watermark signal, the reader then adjusts the image data to compensate for this distortion, and extracts the watermark message signal as described above. Such watermarking techniques, and many others known to those skilled in the art, may be suitably employed to improve navigation, easy road journeys and enhance education, among other benefits. The foregoing and other features and advantages will be more readily apparent from the following detailed description, which proceeds with reference to the accompanying drawings.
{ "pile_set_name": "USPTO Backgrounds" }
/* * Copyright (C) 2013 Boris BREZILLON <[email protected]> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * */ #include <linux/clk-provider.h> #include <linux/clkdev.h> #include <linux/clk/at91_pmc.h> #include <linux/delay.h> #include <linux/of.h> #include <linux/mfd/syscon.h> #include <linux/regmap.h> #include "pmc.h" #define SLOW_CLOCK_FREQ 32768 #define MAINF_DIV 16 #define MAINFRDY_TIMEOUT (((MAINF_DIV + 1) * USEC_PER_SEC) / \ SLOW_CLOCK_FREQ) #define MAINF_LOOP_MIN_WAIT (USEC_PER_SEC / SLOW_CLOCK_FREQ) #define MAINF_LOOP_MAX_WAIT MAINFRDY_TIMEOUT #define MOR_KEY_MASK (0xff << 16) struct clk_main_osc { struct clk_hw hw; struct regmap *regmap; }; #define to_clk_main_osc(hw) container_of(hw, struct clk_main_osc, hw) struct clk_main_rc_osc { struct clk_hw hw; struct regmap *regmap; unsigned long frequency; unsigned long accuracy; }; #define to_clk_main_rc_osc(hw) container_of(hw, struct clk_main_rc_osc, hw) struct clk_rm9200_main { struct clk_hw hw; struct regmap *regmap; }; #define to_clk_rm9200_main(hw) container_of(hw, struct clk_rm9200_main, hw) struct clk_sam9x5_main { struct clk_hw hw; struct regmap *regmap; u8 parent; }; #define to_clk_sam9x5_main(hw) container_of(hw, struct clk_sam9x5_main, hw) static inline bool clk_main_osc_ready(struct regmap *regmap) { unsigned int status; regmap_read(regmap, AT91_PMC_SR, &status); return status & AT91_PMC_MOSCS; } static int clk_main_osc_prepare(struct clk_hw *hw) { struct clk_main_osc *osc = to_clk_main_osc(hw); struct regmap *regmap = osc->regmap; u32 tmp; regmap_read(regmap, AT91_CKGR_MOR, &tmp); tmp &= ~MOR_KEY_MASK; if (tmp & AT91_PMC_OSCBYPASS) return 0; if (!(tmp & AT91_PMC_MOSCEN)) { tmp |= AT91_PMC_MOSCEN | AT91_PMC_KEY; regmap_write(regmap, AT91_CKGR_MOR, tmp); } while (!clk_main_osc_ready(regmap)) cpu_relax(); return 0; } static void clk_main_osc_unprepare(struct clk_hw *hw) { struct clk_main_osc *osc = to_clk_main_osc(hw); struct regmap *regmap = osc->regmap; u32 tmp; regmap_read(regmap, AT91_CKGR_MOR, &tmp); if (tmp & AT91_PMC_OSCBYPASS) return; if (!(tmp & AT91_PMC_MOSCEN)) return; tmp &= ~(AT91_PMC_KEY | AT91_PMC_MOSCEN); regmap_write(regmap, AT91_CKGR_MOR, tmp | AT91_PMC_KEY); } static int clk_main_osc_is_prepared(struct clk_hw *hw) { struct clk_main_osc *osc = to_clk_main_osc(hw); struct regmap *regmap = osc->regmap; u32 tmp, status; regmap_read(regmap, AT91_CKGR_MOR, &tmp); if (tmp & AT91_PMC_OSCBYPASS) return 1; regmap_read(regmap, AT91_PMC_SR, &status); return (status & AT91_PMC_MOSCS) && (tmp & AT91_PMC_MOSCEN); } static const struct clk_ops main_osc_ops = { .prepare = clk_main_osc_prepare, .unprepare = clk_main_osc_unprepare, .is_prepared = clk_main_osc_is_prepared, }; static struct clk_hw * __init at91_clk_register_main_osc(struct regmap *regmap, const char *name, const char *parent_name, bool bypass) { struct clk_main_osc *osc; struct clk_init_data init; struct clk_hw *hw; int ret; if (!name || !parent_name) return ERR_PTR(-EINVAL); osc = kzalloc(sizeof(*osc), GFP_KERNEL); if (!osc) return ERR_PTR(-ENOMEM); init.name = name; init.ops = &main_osc_ops; init.parent_names = &parent_name; init.num_parents = 1; init.flags = CLK_IGNORE_UNUSED; osc->hw.init = &init; osc->regmap = regmap; if (bypass) regmap_update_bits(regmap, AT91_CKGR_MOR, MOR_KEY_MASK | AT91_PMC_MOSCEN, AT91_PMC_OSCBYPASS | AT91_PMC_KEY); hw = &osc->hw; ret = clk_hw_register(NULL, &osc->hw); if (ret) { kfree(osc); hw = ERR_PTR(ret); } return hw; } static void __init of_at91rm9200_clk_main_osc_setup(struct device_node *np) { struct clk_hw *hw; const char *name = np->name; const char *parent_name; struct regmap *regmap; bool bypass; of_property_read_string(np, "clock-output-names", &name); bypass = of_property_read_bool(np, "atmel,osc-bypass"); parent_name = of_clk_get_parent_name(np, 0); regmap = syscon_node_to_regmap(of_get_parent(np)); if (IS_ERR(regmap)) return; hw = at91_clk_register_main_osc(regmap, name, parent_name, bypass); if (IS_ERR(hw)) return; of_clk_add_hw_provider(np, of_clk_hw_simple_get, hw); } CLK_OF_DECLARE(at91rm9200_clk_main_osc, "atmel,at91rm9200-clk-main-osc", of_at91rm9200_clk_main_osc_setup); static bool clk_main_rc_osc_ready(struct regmap *regmap) { unsigned int status; regmap_read(regmap, AT91_PMC_SR, &status); return status & AT91_PMC_MOSCRCS; } static int clk_main_rc_osc_prepare(struct clk_hw *hw) { struct clk_main_rc_osc *osc = to_clk_main_rc_osc(hw); struct regmap *regmap = osc->regmap; unsigned int mor; regmap_read(regmap, AT91_CKGR_MOR, &mor); if (!(mor & AT91_PMC_MOSCRCEN)) regmap_update_bits(regmap, AT91_CKGR_MOR, MOR_KEY_MASK | AT91_PMC_MOSCRCEN, AT91_PMC_MOSCRCEN | AT91_PMC_KEY); while (!clk_main_rc_osc_ready(regmap)) cpu_relax(); return 0; } static void clk_main_rc_osc_unprepare(struct clk_hw *hw) { struct clk_main_rc_osc *osc = to_clk_main_rc_osc(hw); struct regmap *regmap = osc->regmap; unsigned int mor; regmap_read(regmap, AT91_CKGR_MOR, &mor); if (!(mor & AT91_PMC_MOSCRCEN)) return; regmap_update_bits(regmap, AT91_CKGR_MOR, MOR_KEY_MASK | AT91_PMC_MOSCRCEN, AT91_PMC_KEY); } static int clk_main_rc_osc_is_prepared(struct clk_hw *hw) { struct clk_main_rc_osc *osc = to_clk_main_rc_osc(hw); struct regmap *regmap = osc->regmap; unsigned int mor, status; regmap_read(regmap, AT91_CKGR_MOR, &mor); regmap_read(regmap, AT91_PMC_SR, &status); return (mor & AT91_PMC_MOSCRCEN) && (status & AT91_PMC_MOSCRCS); } static unsigned long clk_main_rc_osc_recalc_rate(struct clk_hw *hw, unsigned long parent_rate) { struct clk_main_rc_osc *osc = to_clk_main_rc_osc(hw); return osc->frequency; } static unsigned long clk_main_rc_osc_recalc_accuracy(struct clk_hw *hw, unsigned long parent_acc) { struct clk_main_rc_osc *osc = to_clk_main_rc_osc(hw); return osc->accuracy; } static const struct clk_ops main_rc_osc_ops = { .prepare = clk_main_rc_osc_prepare, .unprepare = clk_main_rc_osc_unprepare, .is_prepared = clk_main_rc_osc_is_prepared, .recalc_rate = clk_main_rc_osc_recalc_rate, .recalc_accuracy = clk_main_rc_osc_recalc_accuracy, }; static struct clk_hw * __init at91_clk_register_main_rc_osc(struct regmap *regmap, const char *name, u32 frequency, u32 accuracy) { struct clk_main_rc_osc *osc; struct clk_init_data init; struct clk_hw *hw; int ret; if (!name || !frequency) return ERR_PTR(-EINVAL); osc = kzalloc(sizeof(*osc), GFP_KERNEL); if (!osc) return ERR_PTR(-ENOMEM); init.name = name; init.ops = &main_rc_osc_ops; init.parent_names = NULL; init.num_parents = 0; init.flags = CLK_IGNORE_UNUSED; osc->hw.init = &init; osc->regmap = regmap; osc->frequency = frequency; osc->accuracy = accuracy; hw = &osc->hw; ret = clk_hw_register(NULL, hw); if (ret) { kfree(osc); hw = ERR_PTR(ret); } return hw; } static void __init of_at91sam9x5_clk_main_rc_osc_setup(struct device_node *np) { struct clk_hw *hw; u32 frequency = 0; u32 accuracy = 0; const char *name = np->name; struct regmap *regmap; of_property_read_string(np, "clock-output-names", &name); of_property_read_u32(np, "clock-frequency", &frequency); of_property_read_u32(np, "clock-accuracy", &accuracy); regmap = syscon_node_to_regmap(of_get_parent(np)); if (IS_ERR(regmap)) return; hw = at91_clk_register_main_rc_osc(regmap, name, frequency, accuracy); if (IS_ERR(hw)) return; of_clk_add_hw_provider(np, of_clk_hw_simple_get, hw); } CLK_OF_DECLARE(at91sam9x5_clk_main_rc_osc, "atmel,at91sam9x5-clk-main-rc-osc", of_at91sam9x5_clk_main_rc_osc_setup); static int clk_main_probe_frequency(struct regmap *regmap) { unsigned long prep_time, timeout; unsigned int mcfr; timeout = jiffies + usecs_to_jiffies(MAINFRDY_TIMEOUT); do { prep_time = jiffies; regmap_read(regmap, AT91_CKGR_MCFR, &mcfr); if (mcfr & AT91_PMC_MAINRDY) return 0; usleep_range(MAINF_LOOP_MIN_WAIT, MAINF_LOOP_MAX_WAIT); } while (time_before(prep_time, timeout)); return -ETIMEDOUT; } static unsigned long clk_main_recalc_rate(struct regmap *regmap, unsigned long parent_rate) { unsigned int mcfr; if (parent_rate) return parent_rate; pr_warn("Main crystal frequency not set, using approximate value\n"); regmap_read(regmap, AT91_CKGR_MCFR, &mcfr); if (!(mcfr & AT91_PMC_MAINRDY)) return 0; return ((mcfr & AT91_PMC_MAINF) * SLOW_CLOCK_FREQ) / MAINF_DIV; } static int clk_rm9200_main_prepare(struct clk_hw *hw) { struct clk_rm9200_main *clkmain = to_clk_rm9200_main(hw); return clk_main_probe_frequency(clkmain->regmap); } static int clk_rm9200_main_is_prepared(struct clk_hw *hw) { struct clk_rm9200_main *clkmain = to_clk_rm9200_main(hw); unsigned int status; regmap_read(clkmain->regmap, AT91_CKGR_MCFR, &status); return status & AT91_PMC_MAINRDY ? 1 : 0; } static unsigned long clk_rm9200_main_recalc_rate(struct clk_hw *hw, unsigned long parent_rate) { struct clk_rm9200_main *clkmain = to_clk_rm9200_main(hw); return clk_main_recalc_rate(clkmain->regmap, parent_rate); } static const struct clk_ops rm9200_main_ops = { .prepare = clk_rm9200_main_prepare, .is_prepared = clk_rm9200_main_is_prepared, .recalc_rate = clk_rm9200_main_recalc_rate, }; static struct clk_hw * __init at91_clk_register_rm9200_main(struct regmap *regmap, const char *name, const char *parent_name) { struct clk_rm9200_main *clkmain; struct clk_init_data init; struct clk_hw *hw; int ret; if (!name) return ERR_PTR(-EINVAL); if (!parent_name) return ERR_PTR(-EINVAL); clkmain = kzalloc(sizeof(*clkmain), GFP_KERNEL); if (!clkmain) return ERR_PTR(-ENOMEM); init.name = name; init.ops = &rm9200_main_ops; init.parent_names = &parent_name; init.num_parents = 1; init.flags = 0; clkmain->hw.init = &init; clkmain->regmap = regmap; hw = &clkmain->hw; ret = clk_hw_register(NULL, &clkmain->hw); if (ret) { kfree(clkmain); hw = ERR_PTR(ret); } return hw; } static void __init of_at91rm9200_clk_main_setup(struct device_node *np) { struct clk_hw *hw; const char *parent_name; const char *name = np->name; struct regmap *regmap; parent_name = of_clk_get_parent_name(np, 0); of_property_read_string(np, "clock-output-names", &name); regmap = syscon_node_to_regmap(of_get_parent(np)); if (IS_ERR(regmap)) return; hw = at91_clk_register_rm9200_main(regmap, name, parent_name); if (IS_ERR(hw)) return; of_clk_add_hw_provider(np, of_clk_hw_simple_get, hw); } CLK_OF_DECLARE(at91rm9200_clk_main, "atmel,at91rm9200-clk-main", of_at91rm9200_clk_main_setup); static inline bool clk_sam9x5_main_ready(struct regmap *regmap) { unsigned int status; regmap_read(regmap, AT91_PMC_SR, &status); return status & AT91_PMC_MOSCSELS ? 1 : 0; } static int clk_sam9x5_main_prepare(struct clk_hw *hw) { struct clk_sam9x5_main *clkmain = to_clk_sam9x5_main(hw); struct regmap *regmap = clkmain->regmap; while (!clk_sam9x5_main_ready(regmap)) cpu_relax(); return clk_main_probe_frequency(regmap); } static int clk_sam9x5_main_is_prepared(struct clk_hw *hw) { struct clk_sam9x5_main *clkmain = to_clk_sam9x5_main(hw); return clk_sam9x5_main_ready(clkmain->regmap); } static unsigned long clk_sam9x5_main_recalc_rate(struct clk_hw *hw, unsigned long parent_rate) { struct clk_sam9x5_main *clkmain = to_clk_sam9x5_main(hw); return clk_main_recalc_rate(clkmain->regmap, parent_rate); } static int clk_sam9x5_main_set_parent(struct clk_hw *hw, u8 index) { struct clk_sam9x5_main *clkmain = to_clk_sam9x5_main(hw); struct regmap *regmap = clkmain->regmap; unsigned int tmp; if (index > 1) return -EINVAL; regmap_read(regmap, AT91_CKGR_MOR, &tmp); tmp &= ~MOR_KEY_MASK; if (index && !(tmp & AT91_PMC_MOSCSEL)) regmap_write(regmap, AT91_CKGR_MOR, tmp | AT91_PMC_MOSCSEL); else if (!index && (tmp & AT91_PMC_MOSCSEL)) regmap_write(regmap, AT91_CKGR_MOR, tmp & ~AT91_PMC_MOSCSEL); while (!clk_sam9x5_main_ready(regmap)) cpu_relax(); return 0; } static u8 clk_sam9x5_main_get_parent(struct clk_hw *hw) { struct clk_sam9x5_main *clkmain = to_clk_sam9x5_main(hw); unsigned int status; regmap_read(clkmain->regmap, AT91_CKGR_MOR, &status); return status & AT91_PMC_MOSCEN ? 1 : 0; } static const struct clk_ops sam9x5_main_ops = { .prepare = clk_sam9x5_main_prepare, .is_prepared = clk_sam9x5_main_is_prepared, .recalc_rate = clk_sam9x5_main_recalc_rate, .set_parent = clk_sam9x5_main_set_parent, .get_parent = clk_sam9x5_main_get_parent, }; static struct clk_hw * __init at91_clk_register_sam9x5_main(struct regmap *regmap, const char *name, const char **parent_names, int num_parents) { struct clk_sam9x5_main *clkmain; struct clk_init_data init; unsigned int status; struct clk_hw *hw; int ret; if (!name) return ERR_PTR(-EINVAL); if (!parent_names || !num_parents) return ERR_PTR(-EINVAL); clkmain = kzalloc(sizeof(*clkmain), GFP_KERNEL); if (!clkmain) return ERR_PTR(-ENOMEM); init.name = name; init.ops = &sam9x5_main_ops; init.parent_names = parent_names; init.num_parents = num_parents; init.flags = CLK_SET_PARENT_GATE; clkmain->hw.init = &init; clkmain->regmap = regmap; regmap_read(clkmain->regmap, AT91_CKGR_MOR, &status); clkmain->parent = status & AT91_PMC_MOSCEN ? 1 : 0; hw = &clkmain->hw; ret = clk_hw_register(NULL, &clkmain->hw); if (ret) { kfree(clkmain); hw = ERR_PTR(ret); } return hw; } static void __init of_at91sam9x5_clk_main_setup(struct device_node *np) { struct clk_hw *hw; const char *parent_names[2]; unsigned int num_parents; const char *name = np->name; struct regmap *regmap; num_parents = of_clk_get_parent_count(np); if (num_parents == 0 || num_parents > 2) return; of_clk_parent_fill(np, parent_names, num_parents); regmap = syscon_node_to_regmap(of_get_parent(np)); if (IS_ERR(regmap)) return; of_property_read_string(np, "clock-output-names", &name); hw = at91_clk_register_sam9x5_main(regmap, name, parent_names, num_parents); if (IS_ERR(hw)) return; of_clk_add_hw_provider(np, of_clk_hw_simple_get, hw); } CLK_OF_DECLARE(at91sam9x5_clk_main, "atmel,at91sam9x5-clk-main", of_at91sam9x5_clk_main_setup);
{ "pile_set_name": "Github" }
Beyond the Votes Voting on an issue is the least of what a legislator can do. If a rep sees their base advocating strongly for an issue, it incentivizes them to advocate for it publicly and within their chamber, or they can even ask for a bill not to be brought up at all.
{ "pile_set_name": "OpenWebText2" }
Tinder Experiments II: Guys, unless you are really hot you are probably better off not wasting your time on Tinder — a quantitative socio-economic study by Worst-Online-Dater Abstract (TL;DR) This study was conducted to quantify the Tinder socio-economic prospects for males based on the percentage of females that will “like” them. Female Tinder usage data was collected and statistically analyzed to determine the inequality in the Tinder economy. It was determined that the bottom 80% of men (in terms of attractiveness) are competing for the bottom 22% of women and the top 78% of women are competing for the top 20% of men. The Gini coefficient for the Tinder economy based on “like” percentages was calculated to be 0.58. This means that the Tinder economy has more inequality than 95.1% of all the world’s national economies. In addition, it was determined that a man of average attractiveness would be “liked” by approximately 0.87% (1 in 115) of women on Tinder. Also, a formula was derived to estimate a man’s attractiveness level based on the percentage of “likes” he receives on Tinder: Introduction In my previous post we learned that in Tinder there is a big difference in the number of “likes” an attractive guy receives versus an unattractive guy (duh). I wanted to understand this trend in more quantitative terms (also, I like pretty graphs). To do this, I decided to treat Tinder as an economy and study it as an economist (socio-economist) would. Since I wasn’t getting any hot Tinder dates I had plenty of time to do the math (so you don’t have to). The Tinder Economy First, let’s define the Tinder economy. The wealth of an economy is quantified in terms its currency. In most of the world the currency is money (or goats). In Tinder the currency is “likes”. The more “likes” you get the more wealth you have in the Tinder ecosystem. Wealth in Tinder is not distributed equally. Attractive guys have more wealth in the Tinder economy (get more “likes”) than unattractive guys do. This isn’t surprising since a large portion of the ecosystem is based on physical appearance. An unequal wealth distribution is to be expected, but there is a more interesting question: What is the degree of this unequal wealth distribution and how does this inequality compare to other economies? To answer that question we are first going to need some data (and a nerd to analyze it). Tinder doesn't supply any statistics or analytics about member usage so I had to collect this data myself. The most important data I needed was the percent of men that these females tended to “like”. I collected this data by interviewing females who had “liked” a fake Tinder profile I set up. I asked them each several questions about their Tinder usage while they thought they were talking to an attractive male who was interested in them. Lying in this way is ethically questionable at best (and highly entertaining), but, unfortunately I had no other way to get the required data. Caveats (skip this section if you just want to see the results) At this point I would be remiss to not mention a few caveats about these data. First, the sample size is small (only 27 females were interviewed). Second, all data is self reported. The females who responded to my questions could have lied about the percentage of guys they “like” in order to impress me (fake super hot Tinder me) or make themselves seem more selective. This self reporting bias will definitely introduce error into the analysis, but there is evidence to suggest the data I collected have some validity. For instance, a recent New York Times article stated that in an experiment females on average swiped a 14% “like” rate. This compares vary favorably with the data I collected that shows a 12% average “like” rate. Additionally, I am only accounting for the percentage of “likes” and not the actual men they “like”. I have to assume that in general females find the same men attractive. I think this is the biggest flaw in this analysis, but currently there is no other way to analyze the data. There are also two reasons to believe that useful trends can be determined from these data even with this flaw. First, in my previous post we saw that attractive men did equally as well across all female age groups, independent of the age of the male, so to some extent all women have similar tastes in terms of physical attractiveness. Second, most women can agree if a guy is really attractive or really unattractive. Women are more likely to disagree on the attractiveness of men in the middle of the economy. As we will see, the “wealth” in the middle and bottom portion of the Tinder economy is lower than the “wealth” of the “wealthiest” (in terms of “likes”). Therefore, even if the error introduced by this flaw is significant it shouldn't greatly affect the overall trend. Ok, enough talk. (Stop — Data time) The Data As I stated previously the average female “likes” 12% of men on Tinder. This doesn't mean though that most males will get “liked” back by 12% of all the women they “like” on Tinder. This would only be the case if “likes” were equally distributed. In reality, the bottom 80% of men are fighting over the bottom 22% of women and the top 78% of women are fighting over the top 20% of men. We can see this trend in Figure 1. The area in blue represents the situations where women are more likely to “like” the men. The area in pink represents the situations where men are more likely to “like” women. The curve doesn’t go down linearly, but instead drops quickly after the top 20% of men. Comparing the blue area and the pink area we can see that for a random female/male Tinder interaction the male is likely to “like” the female 6.2 times more often than the female “likes” the male. Figure 1. We can also see that the wealth distribution for males in the Tinder economy is quite large. Most females only “like” the most attractive guys. So how can we compare the Tinder economy to other economies? Economists use two main metrics to compare the wealth distribution of economies: The Lorenz curve and the Gini coefficient. The Lorenz curve (Wikipedia link) is a graph showing the proportion of overall income or wealth assumed by the bottom x% of the people. If the wealth was equally distributed the graph would show a 45 degree line. The amount the curve bends below the 45 degree line shows the extent of wealth inequality. Figure 2 shows the Lorenz curve for the Tinder economy compared to the curve for the U.S. income distribution from a few years ago. Figure 2. The Lorenz curve for the Tinder economy is lower than the curve for the US economy. This means that the inequality in Tinder wealth distribution is larger than the inequality of income in the US economy. One way economists quantify this difference is by comparing the Gini coefficient for different economies. The Gini coefficient (Wikipedia link) is a number between 0 and 1, where 0 corresponds with perfect equality where everyone has the same income (damn commies) and 1 corresponds with perfect inequality where one person has all the income and everyone else has zero income (let them eat cake). The United States currently has one of the higher Gini coefficients (most income inequality) of all of the world’s biggest economies at a value of 0.41. The Tinder Gini coefficient is even higher at 0.58. This may not seem like a big difference but it is actually huge. Figure 3 compares the income Gini coefficient distribution for 162 nations and adds the Tinder economy to the list. The United States Gini coefficient is higher than 62% of the world’s countries. The Tinder economy has a higher Gini coefficient than 95.1% of the countries in the world. The only countries that have a higher Gini coefficient than Tinder are Angola, Haiti, Botswana, Namibia, Comoros, South Africa, Equatorial Guinea, and Seychelles (which I had never heard of before). Figure 3. What it all means From this data (and some data collected for the previous post) we can make an estimate as to the percentage of females on Tinder that are likely to “like” a male based on his attractiveness. This graph is shown as Figure 4. Note that the y-axis is in log scale and the curve is fairly linear. This means the curve has a high correlation to an exponential fit. Therefore, you can gauge your attractiveness level if you “like” all girls and keep track of the percentage of girls that “like” you back with a simple equation: attractiveness%=16.8*ln(like%)+52.3 Figure 4. According to my last post, the most attractive men will be liked by only approximately 20% of all the females on Tinder. This number is low due to a combination of factors including females that don’t regularly use the site, fake profiles, intimidation, and some variation in what the pickiest women find attractive. In the grand scheme of things, a 20% success rate can actually lead to a large number of matches very quickly. So attractive guys can do pretty well using Tinder (congratulations). Unfortunately, this percentage decreases rapidly as you go down the attractiveness scale. According to this analysis a man of average attractiveness can only expect to be liked by slightly less than 1% of females (0.87%). This equates to 1 “like” for every 115 females. The good news is that if you are only getting liked by a few girls on Tinder you shouldn’t take it personally. You aren’t necessarily unattractive. You can be of above average attractiveness and still only get liked by a few percent of women on Tinder. The bad news is that if you aren’t in the very upper echelons of Tinder wealth (i.e. attractiveness) you aren’t likely to have much success using Tinder. You would probably be better off just going to a bar or joining some coed recreational sports team. On the other hand, it doesn’t take much effort to swipe right… (So you are saying I have a 1 in 115 chance?)
{ "pile_set_name": "Pile-CC" }
Double Happiness Uranium Double Happiness Uranium is a 2013 Australian science fiction film directed by Cole Larson. Plot In a hypothetical near future Reuben Henschke (Nicholas Hope) is a physicist employed by Double Happiness Uranium, a wealthy Chinese-owned nuclear power company operating in the fictional Independent Republic of South Australia. It transpires that while working on an advanced weapon that targets specific human cells, Henschke simultaneously lost his co-worker wife and technical details which he had committed to memory. Languishing unappreciated in a backwater department, his efforts to recover this data are abetted by fellow employee, Russian psychologist Yuri Savchenko (Stephen Sheehan), who is employed by the Company for this purpose, aiming to revive the weapon program. Cast Nicholas Hope - Reuben Henschke Stephen Sheehan - Yuri Savchenko Jody Dry - Rebecca Jo Stone - Jeri Adam Schmerl - Jason Creswell Ken Yamamura - Mitch Credits Story and screenplay by Matthew P. Hawkins Production for the company Arctic Typewriter by Tom Young. Funding and technical facilities provided by Flinders University and Helpmann Academy. References External links IMdB article Stephen Sheehan website Category:Australian science fiction films Category:2013 films Category:2010s independent films Category:2010s science fiction films Category:Australian films Category:Dystopian films Category:Australian independent films Category:English-language films Category:Films shot in South Australia Category:Films set in South Australia
{ "pile_set_name": "Wikipedia (en)" }
The invention pertains to methods for modifying inner-layer circuit features of printed circuit boards. Printed circuit boards (PCBs) used in the electronic industry comprise a number of layers. Some of the layers comprise conductive traces, while other layers are non-conductive but for, perhaps, conductive vias joining traces found on other layers. Together, the layers of a PCB serve to route electrical signals between the various electrical components that are mounted to the PCB. The layers may also route signals to and from the PCB via traces that terminate at edge connectors, flex connectors, and other various contacts and connectors). The layers of a PCB, as well as the pattern of conductive traces formed within each layer, are typically based on Computer Aided Design (CAD) data. The CAD data, in turn, is based on various design requirements and constraints that a designer inputs to the CAD system. A significant problem with newly designed PCBs is that there is no easy way to test their functionality until their layers are fully assembled. Thus, in situations where an inner-layer layout error is detected during test, any repair effort must not only repair the inner-layer defect, but do so without endangering other surrounding circuit features. Unfortunately, this limits the available repair options. When a choice is made to repair an inner-layer defect, the defect is typically repaired by means of a cutting tool such as a diamond cutter or laser. In order to position the cutting tool over the defect, two quantities must be estimated: 1) the coordinates of the defect, and 2) the depth of the defect. Unfortunately, PCB manufacturing variances make both of these quantities difficult to estimate. Estimating the coordinates of a defect can be difficult due to manufacturing variances in the alignment of layers, the tight spacing of traces within a layer and variations therein, etc . . . Manufacturing variances can also make it difficult to map the coordinates of a defect to a visible reference marker that can be used for the purpose of navigating a cutting tool over the defect. Estimating the depth of a defect is difficult in that the layers of a PCB are very thin and also subject to manufacturing variances. If a cutting tool penetrates a PCB too deep, or at the wrong location, it is likely that other circuit features of the PCB will be damaged. In light of the above limitations of current PCB repair methods, there is no feasible way to repair an inner-layer defect of a PCB in significant quantities (i.e., when a large number of PCBs are found to carry the same inner-layer defect). As a result, the defective PCBs are typically scrapped; the inner-layer defect is fixed at the CAD level; a new lot of PCBs are assembled; and the test process is then repeated. One can therefore appreciate that an unanticipated inner-layer defect in a PCB is often associated with significant product development delays, and significant losses of time and money. In one embodiment of the invention, a method for modifying an inner-layer circuit feature of a printed circuit board commences with the identification of a trimming point on the inner-layer circuit feature using an x-ray inspection system. The coordinates of the trimming point are then related to the coordinates of a visible reference marker on the printed circuit board. Next, the relationship between the visible reference marker and the trimming point is used to position a cutting tool over the trimming point. Finally, the cutting tool is used to make one or more cuts into the printed circuit board, until the inner-layer circuit feature is acceptably modified at the trimming point.
{ "pile_set_name": "USPTO Backgrounds" }
<!DOCTYPE html> <html lang="en" ng-app="jpm"> <head> <meta charset="utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" /> <meta name="viewport" content="width=device-width, initial-scale=1" /> <link href="/releases/4.2.0/css/style.css" rel="stylesheet" /> <script src="https://code.jquery.com/jquery-3.4.1.min.js"></script> <script src="/js/releases.js"></script> <!-- Begin Jekyll SEO tag v2.5.0 --> <title>-runjdb PORT</title> <meta name="generator" content="Jekyll v3.7.4" /> <meta property="og:title" content="-runjdb PORT" /> <meta property="og:locale" content="en_US" /> <meta name="description" content="public int launch() throws Exception { prepare(); java = new Command(); // // Handle the environment // Map&lt;String,String&gt; env = getRunEnv(); for ( Map.Entry&lt;String,String&gt; e:env.entrySet()) { java.var(e.getKey(), e.getValue()); } java.add(project.getProperty(&quot;java&quot;, &quot;java&quot;)); String javaagent = project.getProperty(Constants.JAVAAGENT); if (Processor.isTrue(javaagent)) { for (String agent : agents) { java.add(&quot;-javaagent:&quot; + agent); } }" /> <meta property="og:description" content="public int launch() throws Exception { prepare(); java = new Command(); // // Handle the environment // Map&lt;String,String&gt; env = getRunEnv(); for ( Map.Entry&lt;String,String&gt; e:env.entrySet()) { java.var(e.getKey(), e.getValue()); } java.add(project.getProperty(&quot;java&quot;, &quot;java&quot;)); String javaagent = project.getProperty(Constants.JAVAAGENT); if (Processor.isTrue(javaagent)) { for (String agent : agents) { java.add(&quot;-javaagent:&quot; + agent); } }" /> <meta property="og:type" content="article" /> <meta property="article:published_time" content="2019-10-12T19:48:23-04:00" /> <script type="application/ld+json"> {"headline":"-runjdb PORT","dateModified":"2019-10-12T19:48:23-04:00","datePublished":"2019-10-12T19:48:23-04:00","@type":"BlogPosting","mainEntityOfPage":{"@type":"WebPage","@id":"/releases/4.2.0/instructions/runjdb.html"},"url":"/releases/4.2.0/instructions/runjdb.html","description":"public int launch() throws Exception { prepare(); java = new Command(); // // Handle the environment // Map&lt;String,String&gt; env = getRunEnv(); for ( Map.Entry&lt;String,String&gt; e:env.entrySet()) { java.var(e.getKey(), e.getValue()); } java.add(project.getProperty(&quot;java&quot;, &quot;java&quot;)); String javaagent = project.getProperty(Constants.JAVAAGENT); if (Processor.isTrue(javaagent)) { for (String agent : agents) { java.add(&quot;-javaagent:&quot; + agent); } }","@context":"http://schema.org"}</script> <!-- End Jekyll SEO tag --> </head> <body> <ul class="container12 menu-bar"> <li span=11><a class=menu-link href="/releases/4.2.0/"><img class=menu-logo src='/releases/4.2.0/img/bnd-80x40-white.png'></a> <a href="/releases/4.2.0/chapters/110-introduction.html">Intro </a><a href="/releases/4.2.0/chapters/800-headers.html">Headers </a><a href="/releases/4.2.0/chapters/825-instructions-ref.html">Instructions </a><a href="/releases/4.2.0/chapters/855-macros-ref.html">Macros </a><a href="/releases/4.2.0/chapters/400-commands.html">Commands </a><div class="releases"><button class="dropbtn">4.2.0</button><div class="dropdown-content"></div></div> <li class=menu-link span=1> <a href="https://github.com/bndtools/bnd" target="_"><img style="position:absolute;top:0;right:0;margin:0;padding:0;z-index:100" src="https://camo.githubusercontent.com/38ef81f8aca64bb9a64448d0d70f1308ef5341ab/68747470733a2f2f73332e616d617a6f6e6177732e636f6d2f6769746875622f726962626f6e732f666f726b6d655f72696768745f6461726b626c75655f3132313632312e706e67" alt="Fork me on GitHub" data-canonical-src="https://s3.amazonaws.com/github/ribbons/forkme_right_darkblue_121621.png"></a> </ul> <ul class=container12> <li span=3> <div> <ul class="side-nav"> <li><a href="/releases/4.2.0/chapters/110-introduction.html">Introduction</a> <li><a href="/releases/4.2.0/chapters/120-install.html">How to install bnd</a> <li><a href="/releases/4.2.0/chapters/123-tour-workspace.html">Guided Tour</a> <li><a href="/releases/4.2.0/chapters/125-tour-features.html">Guided Tour Workspace & Projects</a> <li><a href="/releases/4.2.0/chapters/130-concepts.html">Concepts</a> <li><a href="/releases/4.2.0/chapters/140-best-practices.html">Best practices</a> <li><a href="/releases/4.2.0/chapters/150-build.html">Build</a> <li><a href="/releases/4.2.0/chapters/160-jars.html">Generating JARs</a> <li><a href="/releases/4.2.0/chapters/170-versioning.html">Versioning</a> <li><a href="/releases/4.2.0/chapters/180-baselining.html">Baselining</a> <li><a href="/releases/4.2.0/chapters/200-components.html">Service Components</a> <li><a href="/releases/4.2.0/chapters/210-metatype.html">Metatype</a> <li><a href="/releases/4.2.0/chapters/220-contracts.html">Contracts</a> <li><a href="/releases/4.2.0/chapters/230-manifest-annotations.html">Manifest Annotations</a> <li><a href="/releases/4.2.0/chapters/250-resolving.html">Resolving Dependencies</a> <li><a href="/releases/4.2.0/chapters/300-launching.html">Launching</a> <li><a href="/releases/4.2.0/chapters/305-Junit-Testing-OSGi.html">Plain JUnit Testing with OSGi (PRELIMENARY)</a> <li><a href="/releases/4.2.0/chapters/310-testing.html">Testing</a> <li><a href="/releases/4.2.0/chapters/320-packaging.html">Packaging Applications</a> <li><a href="/releases/4.2.0/chapters/390-wrapping.html">Wrapping Libraries to OSGi Bundles</a> <li><a href="/releases/4.2.0/chapters/400-commands.html">Commands</a> <li><a href="/releases/4.2.0/chapters/600-developer.html">For Developers</a> <li><a href="/releases/4.2.0/chapters/700-tools.html">Tools bound to bnd</a> <li><a href="/releases/4.2.0/chapters/800-headers.html">Headers</a> <li><a href="/releases/4.2.0/chapters/820-instructions.html">Instruction Reference</a> <li><a href="/releases/4.2.0/chapters/825-instructions-ref.html">Instruction Index</a> <li><a href="/releases/4.2.0/chapters/850-macros.html">Macro Reference</a> <li><a href="/releases/4.2.0/chapters/855-macros-ref.html">Macro Index</a> <li><a href="/releases/4.2.0/chapters/870-plugins.html">Plugins</a> <li><a href="/releases/4.2.0/chapters/880-settings.html">Settings</a> <li><a href="/releases/4.2.0/chapters/900-errors.html">Errors</a> <li><a href="/releases/4.2.0/chapters/910-warnings.html">Warnings</a> <li><a href="/releases/4.2.0/chapters/920-faq.html">Frequently Asked Questions</a> </ul> </div> <li span=9> <div class=notes-margin> <h1> -runjdb PORT</h1> <div class="highlighter-rouge"><div class="highlight"><pre class="highlight"><code>public int launch() throws Exception { prepare(); java = new Command(); // // Handle the environment // Map&lt;String,String&gt; env = getRunEnv(); for ( Map.Entry&lt;String,String&gt; e:env.entrySet()) { java.var(e.getKey(), e.getValue()); } java.add(project.getProperty("java", "java")); String javaagent = project.getProperty(Constants.JAVAAGENT); if (Processor.isTrue(javaagent)) { for (String agent : agents) { java.add("-javaagent:" + agent); } } String jdb = getRunJdb(); if (jdb != null) { int port = 1044; try { port = Integer.parseInt(project.getProperty(Constants.RUNJDB)); } catch (Exception e) { // ok, value can also be ok, or on, or true } String suspend = port &gt; 0 ? "y" : "n"; java.add("-Xrunjdwp:server=y,transport=dt_socket,address=" + Math.abs(port) + ",suspend=" + suspend); } java.add("-cp"); java.add(Processor.join(getClasspath(), File.pathSeparator)); java.addAll(getRunVM()); java.add(getMainTypeName()); java.addAll(getRunProgramArgs()); if (timeout != 0) java.setTimeout(timeout + 1000, TimeUnit.MILLISECONDS); File cwd = getCwd(); if (cwd != null) java.setCwd(cwd); project.trace("cmd line %s", java); try { int result = java.execute(System.in, System.err, System.err); if (result == Integer.MIN_VALUE) return TIMEDOUT; reportResult(result); return result; } finally { cleanup(); listeners.clear(); } } </code></pre></div></div> </div> </ul> <nav class=next-prev> <a href='/releases/4.2.0/instructions/runfw.html'></a> <a href='/releases/4.2.0/instructions/runkeep.html'></a> </nav> <footer class="container12" style="border-top: 1px solid black;padding:10px 0"> <ul span=12 row> <li span=12> <ul> <li><a href="/releases/4.2.0/">GitHub</a> </ul> </ul> </footer> </body> </html>
{ "pile_set_name": "Github" }
tag:blogger.com,1999:blog-3387432784515675172.post3015838284678599536..comments2017-09-26T00:35:29.832-07:00Comments on Color Sepia: ...meanwhile...Magdalenahttp://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-3566724855915436232015-04-26T23:43:53.174-07:002015-04-26T23:43:53.174-07:00Glad that you found me :) Thank you !Glad that you found me :) Thank you !Magdalenahttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-73151959816060130962015-04-26T23:42:52.530-07:002015-04-26T23:42:52.530-07:00 Dear Donna , I´m so glad that you like the neckla... Dear Donna , I´m so glad that you like the necklace , while making it I was thinking about you...it just felt that it´s destiny should be you. Magdalenahttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-76618379218383871912015-04-26T14:09:41.637-07:002015-04-26T14:09:41.637-07:00Hi Magdalena, I have been to your shop at Etsy an...Hi Magdalena, I have been to your shop at Etsy and I love all your new stuff there... I wore your beautiful necklace last night to a gallery art reception and I wear it often and think of you and how nice you are to send it to me. thank you again. donna watsonlayershttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-30549746217324271502015-04-20T16:47:47.663-07:002015-04-20T16:47:47.663-07:00Hello Magdalena! I just found you somehow (I don&...Hello Magdalena! I just found you somehow (I don&#39;t remember how!?) What an absolutely beautiful blog you have. I&#39;ve now subscribed to you ... looking forward to following you! :-)thewannabewabisabianhttps://thewannabewabisabian.wordpress.com/[email protected]:blogger.com,1999:blog-3387432784515675172.post-64793047411545951052015-04-12T11:28:17.161-07:002015-04-12T11:28:17.161-07:00Dziekuje kochana! Sciskam!Dziekuje kochana! Sciskam!Magdalenahttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-13650489040450952582015-04-12T11:27:40.878-07:002015-04-12T11:27:40.878-07:00Gracias !!! Abrazo fuerte :)Gracias !!! Abrazo fuerte :)Magdalenahttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-78223940804134423712015-04-12T10:50:07.958-07:002015-04-12T10:50:07.958-07:00Cudne zdjęcie jak wszystkie u Ciebie. Jak na nie p...Cudne zdjęcie jak wszystkie u Ciebie. Jak na nie patrzę, odpoczywam.<br />:)pracownia garderobahttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-18456108114323584962015-04-12T03:55:13.511-07:002015-04-12T03:55:13.511-07:00Excepcional!Excepcional!Remei (Bitàcora)https://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-42984023647240913672015-04-11T23:18:42.354-07:002015-04-11T23:18:42.354-07:00Dziekuje Kochana! milej niedzieli i tobie zycze! s...Dziekuje Kochana! milej niedzieli i tobie zycze! sciskam!Magdalenahttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-35482610421370543912015-04-11T11:16:13.903-07:002015-04-11T11:16:13.903-07:00Piękny :) Słonecznej niedzieli!Piękny :)<br />Słonecznej niedzieli!Ellehttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-24038509052232957672015-04-11T11:13:55.883-07:002015-04-11T11:13:55.883-07:00Gracias linda , abrazo fuerte!Gracias linda , abrazo fuerte!Magdalenahttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-33000474367625548552015-04-11T11:13:29.213-07:002015-04-11T11:13:29.213-07:00dziekuje! sciskam mocno!!dziekuje! sciskam mocno!!Magdalenahttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-10775633528828626442015-04-11T07:29:36.716-07:002015-04-11T07:29:36.716-07:00Una maravilla. Que tengas un lindo fin de semana!Una maravilla. Que tengas un lindo fin de semana!Yekahttps://www.blogger.com/profile/[email protected]:blogger.com,1999:blog-3387432784515675172.post-76719269032219259022015-04-11T06:38:35.303-07:002015-04-11T06:38:35.303-07:00Piekny naszyjnik! milego weekendu kochana!Piekny naszyjnik! milego weekendu kochana!Amelihttp://villaartis.blogspot.com/[email protected]
{ "pile_set_name": "Pile-CC" }
Home > News > Volunteers remove over six tons of trash during river cleanup Volunteers remove over six tons of trash during river cleanup 9/27/2010 More than 100 volunteers removed over six tons of trash from one of the state’s major waterways during the 21st annual Great Kanawha River Cleanup earlier this month. The Sept. 11 event was sponsored by the West Virginia Department of Environmental Protection’s REAP (Rehabilitation Environmental Action Plan) program. Covering five sites in Kanawha, Putnam and Fayette counties, 135 volunteers picked up 6.75 tons of debris along the river and 117 tires. They worked 540 man hours. “This year, we had more volunteers who removed more trash and tires,” said REAP’s Travis Cooper, who organized the cleanup. “It’s very encouraging to see how citizens want to do what they can and pitch in to clean up the environment. We had all facets of the community, from Girl Scouts, to college students, to retired folks, helping out.” REAP supplied bags, gloves and trash grabbers for the cleanup and arranged for the debris to be hauled away.
{ "pile_set_name": "Pile-CC" }
<%@ page language="java" contentType="text/html; charset=UTF-8" pageEncoding="UTF-8"%> <%@ taglib uri="http://java.sun.com/jsp/jstl/core" prefix="c" %> <%@ taglib uri="http://www.springframework.org/security/tags" prefix="sec" %> <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>Home Page</title> </head> <body> <h3>Home Page</h3> <p> Hello <b><c:out value="${pageContext.request.remoteUser}"/></b><br> Roles: <b><sec:authentication property="principal.authorities" /></b> </p> <form action="logout" method="post"> <input type="submit" value="Logout" /> <input type="hidden" name="${_csrf.parameterName}" value="${_csrf.token}"/> </form> </body> </html>
{ "pile_set_name": "Github" }
Q: Proper use of async, await and task.delay for a game loop I'm currently in the process of making a game loop in a console application. I'm trying to make the game loop wait at the end of its loop for (1000*10000/fps) - ElapsedTicks to put a cap on game loop speed. For reference 1 millisecond is 10,000 ticks. If the ElapsedTicks < FrameTimeTicks I execute await Task.Delay(FrameTimeTicks - ElapsedTicks) but this ends my console application. The code responsible is the await Task.Delay so I assume I'm not using it properly. My code: using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Threading.Tasks; using System.Diagnostics; namespace ConsoleApp1 { class Program { static byte fps = 30; public static byte Fps { get { return fps; } set { fps = value; } } //user specified fps static long frameTimeTicks = (1000 * 10000) / Fps; static long FrameTimeTicks { get { return frameTimeTicks; } } //amount of ticks desired in one frame static bool draw = true; public static bool Draw { get { return draw; } set { draw = value; } } static long elapsedTicks; static long ElapsedTicks { get { return elapsedTicks; } set { elapsedTicks = value; } } //ticks elapsed in one game loop static void Main(string[] args) { GameLoop(); } static void UpdateGame() { int a = 0; a++; } static void Render() { Console.WriteLine("@"); } public static async void GameLoop() { Stopwatch gameLoopTicks = Stopwatch.StartNew(); while (true) { gameLoopTicks.Restart(); if (Console.KeyAvailable == true) { char KeyPressed = Console.ReadKey().KeyChar; } UpdateGame(); if (Draw == true) { Render(); } ElapsedTicks = gameLoopTicks.ElapsedTicks; if (ElapsedTicks > FrameTimeTicks) { Draw = false; } else { Draw = true; await Task.Delay(TimeSpan.FromTicks(FrameTimeTicks - ElapsedTicks)); } } } } } I Have also tried this variation but to the same result, my console application ends. public static async void GameLoop() { Stopwatch gameLoopTicks = Stopwatch.StartNew(); async Task PauseGameLoop() { //Console.ReadKey(); execution ends here! await Task.Delay(TimeSpan.FromTicks(FrameTimeTicks - ElapsedTicks)); GameLoop(); } while (true) { gameLoopTicks.Restart(); if (Console.KeyAvailable == true) { char KeyPressed = Console.ReadKey().KeyChar; } UpdateGame(); if (Draw == true) { Render(); } ElapsedTicks = gameLoopTicks.ElapsedTicks; if (ElapsedTicks > FrameTimeTicks) { Draw = false; } else { Draw = true; await PauseGameLoop(); } } Task.Delay MSDN, await MSDN. Am I tackling this problem the wrong way ? This post is why I chose this method. Thanks for the help! A: How do keep the program from exiting when there's an active async function running? You GameLoop is async but your Main function is not. By default, starting a Task starts it on pooled thread. The minimal changes to avoid exiting Main are to return a Task and wait on it in Main: static void Main() { GameLoop().Wait(); } public static async Task GameLoop() { .. same as before .. } A bigger issue will be that the resolution of the timer in Task.Delay is (system-dependent) probably only around 15ms, so you're not going to get very stable framerates. In fact, the resolution of sleeping a thread in general is going to be too low. How to get consistent sleep times if Task.Delay isn't high-resolution enough? For most consistent results, You'll want to look into implementing a fixed-timestep game loop where you just render as fast as possible (or perhaps spinwait any extra time away) or use VSync to naturally limit your loop speed. The Go-to article on how to implement a fixed-timestep game loop has been Fix your Timestep, and there have been plenty of previous fixed-timestep questions asked here. We take a page from the standard fixed-timestep pattern and wrap a main loop around a time-delta generating function. When that delta goes above our desired frameTime we call Update(). The rest of the loop consists of either a Thread.Sleep(1) if your platform has a high-resolution sleep timer or an empty loop while you're waiting for enough time to pass, to get a spinwait. In theory, you could use unsafe / unmanaged code to call the equivalent of _mm_pause to reduce your power consumption in the spinwait, but that's outside the scope of this answer. using System; class Program { public Program(double fps) { DesiredFPS = fps; frameTime = TimeSpan.FromSeconds(1.0 / fps); } double DesiredFPS; TimeSpan frameTime; // counts how many times we've looped while waiting int spinCounter = 0; System.Diagnostics.Stopwatch sw = new System.Diagnostics.Stopwatch(); // this is the function we run at the desired FPS void Update() { Console.WriteLine("{0} {1}", spinCounter, sw.Elapsed); spinCounter = 0; } void MainLoop() { sw.Start(); var last = sw.Elapsed; var update_time = new TimeSpan(0); while (true) { var delta = sw.Elapsed - last; last += delta; update_time += delta; while (update_time > frameTime) { update_time -= frameTime; Update(); } spinCounter++; // On some systems, this returns in 1 millisecond // on others, it may return in much higher. // If so, you should just comment this out, and let the main loop // spin to wait out the timer. System.Threading.Thread.Sleep(1); } } static void Main() { new Program(30.0).MainLoop(); } }
{ "pile_set_name": "StackExchange" }
Q: The approach to avoid including js file twice this is a simple html file: <!DOCTYPE html> <html> <head> <title>Test Uploading Func.</title> <script type="text/javascript" src="jquery-1.7.2.min.js"></script> <script type="text/javascript" charset="utf-8" src="jquery-1.7.2.js"> </script> <link type="text/css" href="jquery-ui-1.8.21.custom.css" rel="Stylesheet" /> <script type="text/javascript" src="jquery-ui-1.8.21.custom.min.js"></script> <!--Include js file--> <script type="text/javascript" src="upload.js" ></script> </head> <body> <button id="Upload" value="upload">upload</button> <script type="text/javascript" src="upload.js" ></script> </body> And this is the js file I want to include: $( '#Upload' ).bind('click', function(){ alert(">"); }); If I just include the js file in the beginning, the selector # can't know the id Upload so that I have to include it again at the end of the file... I do know it's not correct. But I don't know how to resolve it? Don't we just include all the js file within the tag head? What's the appropriate coding style I show have? Thanks. UPDATE question!!! If I have a lot of scenario like this, should I add "$(document).ready()" to all the functions? A little weird... Still another approach? Or web developers always do so. And where should I include my js file? In the begin or the end? If I include them all in the end, this kind of problem won't appear. Then why lots of people include the js file just in the start? A: Wait for the DOM to be ready before selecting elements: $(document).ready(function () { $( '#Upload' ).bind('click', function(){ alert(">"); }); }); Update: You should always use $(document).ready(...) if you are manipulating elements that you expect to be on the page when your code runs. This is especially important if your code is in the <head></head> of the document. You are not required to use $(document).ready(...) if your code is inside the </body> tag, but be aware that there are differences between the two.
{ "pile_set_name": "StackExchange" }
Favorite Sites: Other New Eyes While on a lecture tour in the fall of 2000, I spent some time in Seattle, on a leg of my trip organized by the estimable Walter Bodle, guiding light of Youth in Focus, an award-winning program for teaching photography to at-risk inner-city young people in that fine, damp city. Watching Walt and his dedicated crew at work with a cluster of excited, creative teens reminded me that this kind of grass-roots photo education took off in the 1960s. There’s now close to half a century’s worth of collective, cumulative experiment in this approach to visual education, which has taken place not just all across this country but in fact all around the world. Yet you’ll find little published trace of any of that effort, and almost no reference to it in the literature of photo education specifically and visual education — a sad fact. It struck me that the time might at last have come around for some project to distill the experience of those three decades plus — to consolidate the gains, assess the lessons, and seek to draw often isolated programs into a larger framework. With the 2005 Oscar for best Documentary Film going to Ross Kauffman and Zana Briski’s splendid Born into Brothels, which came out of the Kids with Cameras project, surely the moment has arrived to weigh what’s happened so far, and to plan what should happen next. So I conferred with Nearby Café webmaster John Alley, whose day job has him teaching teaching photography in high school. In early 2006 we launched The New Eyes Project, a website intended to serve as a resource for everyone teaching photography to young people. If you’re interested in this set of issues — and, of course, especially if, now or in the past (or in the future), you have had or expect to have any involvement in a program teaching photography to young people, at any age level and in any context — we’d like to hear from you. You can register yourself as a present or former K-12 photo-ed teacher or program director, and tell us about your program, at the New Eyes website. There you’ll also find readings, forums, links, and much useful material. If you’d like to take part in the expansion of this site as a resource, contact me: adcoleman [at] k12photoed [dot] org. Much research remains to be done on the history of this important experiment in photo education. I’ll gladly confer with you about carving out a manageable chunk of that unexplored territory, and we can publish the results at the New Eyes site.
{ "pile_set_name": "Pile-CC" }
Specification TableSubjectBiomedical signal processing, NeuroscienceSpecific subject areaCognitive neuroscience, Steady-state visual evoked potential, EEG acquisition.Type of dataRaw data of 22-channel EEG signals and a single-lead electrocardiogram (ECG) signal before and after the stimulus (consumption of caffeinated coffee).How data were acquiredData were acquired using a 32-channel EEG acquisition system (RMS Maximus 32 EEG machine)Data formatRaw data (.mat file)Parameters for data collection6 healthy participants (22--28 years age range) were considered for the analysis.Description of data collectionThe EEG signals were acquired prior-consumption as well as post-consumption of caffeinated coffee. The recordings were made by providing photic stimuli of frequencies that lie within the range of 3 Hz--30 Hz. The corresponding recorded signals were used to understand the influence of caffeinated coffee consumption on the SSVEP signal generation.Data source locationNational Institute of Technology, Rourkela, IndiaData accessibilityWith the article**Value of the Data**•The current dataset is recorded in the presence of seven photic stimuli frequencies during before and after-consumption of coffee. The pre-consumption data can be used to analyze the effect of SSVEP stimulus frequencies in the different parts of the brain.•The pre- and post-stimulus data combined can be used to assess the effect of caffeinated coffee on altering the SSVEP signals.•The 22-channel EEG data can be used for frequency-domain analysis and mapping of different brain regions using the Fast Fourier transform algorithm.•The single-lead ECG data can be used to study the impact of caffeinated coffee on heart physiology.•The dataset can also be explored with different feature extraction, classification, and SSVEP detection algorithms. 1. Data {#sec1} ======= The steady-state visual evoked potential (SSVEP) is generated in the parieto-occipital regions of the brain whenever a source of light of constant stimuli frequency, is focused on the retinal cells \[[@bib2],[@bib3]\]. Caffeine, an essential constituent of coffee, is believed to have a partial impact on different brain regions such as parietal and occipital cortex areas \[[@bib4],[@bib5]\]. The current data set can be used to evaluate the post-consumption effect of coffee on the SSVEP activity in the brain regions. The EEG signals were recorded using a clinical EEG acquisition machine (RMS Maximus 32 CH). The equipment has 22 EEG channel electrodes, 2 mastoid electrodes, 1 ground electrode and two limb electrodes for ECG recording. The EEG electrodes were placed on the brain following the 10--20 standard positioning ([Fig. 1](#fig1){ref-type="fig"}). The sampling frequency of the recording was maintained at 256 Hz.Fig. 1Placement of electrodes on the scalp using 10--20 international standard.Fig. 1 The recorded EEG data from a single volunteer contains the embedded signal of 7 different photic stimulus frequencies of 20s duration and the resting period of 10-sec in between two stimuli frequency. The useful 20s data for each photic stimulus frequency is then extracted \[[@bib1]\]. The 20s duration data can be divided into different trials of varying length to increase the sample size as per user requirement. The EEG data of each volunteer was stored in a.mat file, represented in the format of "Vn_B" and "Vn_A", where n represents the serial number of volunteers, and B and A represent before coffee and after coffee consumption condition, respectively. Information regarding the data collected is presented in [Table 1](#tbl1){ref-type="table"}. Each.mat file contains a 7X2 cell array. The first column of the cell array contains the EEG signal in a 5120X23 matrix format, and the 2nd column contains the corresponding photic stimuli frequency. The number of rows in each data matrix is equal to the number of data points (256X20 = 5120) and the first 22 columns contains the corresponding amplitude value of each EEG channel (FP1, FP2, PG1, PG2, F7, F3, FZ, F4, F8, C3, CZ, C4, P3, P4, PZ, T3, T4, T5, T6, O1, O2, and OZ) at that data point. The last column contains the amplitudes of a single lead ECG signal ([Fig. 2](#fig2){ref-type="fig"}) during the recording.Table 1The data of recorded EEG signals.Table 1Volunteer IDAge (in years)SexStimulus condition (Caffeinated Coffee).mat file00123MaleBeforeV1_BAfterV1_A00229MaleBeforeV2_BAfterV2_A00321MaleBeforeV3_BAfterV3_A00425MaleBeforeV4_BAfterV4_A00524MaleBeforeV5_BAfterV5_A00626MaleBeforeV6_BAfterV6_AFig. 2Description of the data (.mat file) of a single recording.Fig. 2 2. Experimental design, materials, and method {#sec2} ============================================= This experiment is based on a within-group analysis that consists of two stages. In stage 1, EEG signals were acquired in the presence of seven photic stimuli frequency (3 Hz, 5 Hz, 10 Hz, 15 Hz, 20 Hz, 25 Hz, and 30 Hz). In stage 2, EEG signals were recorded 5 min after consumption of caffeinated coffee following the same protocol as in stage 1. Two types of stimuli were used in this experiment. A primary, photic stimulus of a certain frequency (to generate the SSVEP response) and a secondary stimulus, caffeinated coffee (to find the effect of coffee consumption on SSVEP). The stimuli frequency values used in this experiment were chosen in such a way that it will cover all the EEG bands ([Table 2](#tbl2){ref-type="table"}) \[[@bib6]\].Table 2List of stimuli frequency considered in the experiment.Table 2Frequency BandRange of Frequency (in Hz)Frequency considered in this study (in Hz)Delta0--43Theta4--85Alpha8--1310Low-beta12.5--1615Beta16.5--2020High-beta20.5--2825Low-gamma30--10030 Six healthy male volunteers, who are living a sedentary life and frequent coffee drinkers, were included in this experiment. Prior to recording, permission from the Institute ethical committee (NIT Rourkela) was taken for the recording of the EEG signals vide office order \#NITRKL/IEC/FORM/2/35/4/11/001, Dated 13/12/2013. The participants were explained the detailed procedure and purpose of the experiment. Further, they were urged to sign a consent form as a record of agreement of their voluntary participation in the experiment. The consent form was prepared following the guidelines of WHO\'s (World Health Organisation) informed consent for clinical study as a reference \[[@bib7]\] and is divided into three parts. Part-I contains the information related to the research, part-II contains the Information related to the volunteers and part-III contain the declaration made by the participant. A sample consent form has also been attached as a supplementary file. [Fig. 3](#fig3){ref-type="fig"} shows the different sections of the consent form, used in this experiment. The volunteers were also assured that they can leave the experimental procedure at any time if they feel uncomfortable or change their minds.Fig. 3The different subsections of the consent form.Fig. 3 The EEG signals were recorded using a 32-channel EEG machine, capable of recording 22 EEG signals from different brain regions. The electrodes were placed on the scalp using an electrode cap. The electrodes on the cap were arranged following the 10--20 international standard configurations. After mounting the electrode cap, the contact impedances of the electrodes were adjusted to \<20 KΩ. This was achieved by applying a conducting gel on the electrode scalp interface. The sampling frequency of the recording was maintained at 256 Hz. The volunteers were instructed to abstain from food and beverages before 2 h of recording. During recording, they were asked to sit on a chair inside a dim-lit room in a relaxed position. A set of LED was placed in front of their eyes at a distance of 60 cm. The LEDs were made to flicker at seven different frequencies (3 Hz, 5 Hz, 10 Hz, 15 Hz, 20 Hz, 25 Hz, and 30 Hz). The volunteers were requested to stare at the flickering light source during the process of EEG recording. The LED flickered at each stimulus frequency for a period of 20s with a 10s gap between two consecutive frequency stimulation. In the first phase, the EEG signals were recorded without any stimulus (pre-consumption of coffee). In the next phase, the volunteers were served a hot cup of coffee (120 ml containing 1.5 mg of coffee powder). After 5 min of consumption, the EEG signals were re-recorded following the same protocol. Conflict of Interest {#sec3} ==================== The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. Appendix A. Supplementary data {#appsec1} ============================== The following are the Supplementary data to this article:Multimedia component 1Multimedia component 1Multimedia component 2Multimedia component 2Multimedia component 3Multimedia component 3Multimedia component 4Multimedia component 4Multimedia component 5Multimedia component 5Multimedia component 6Multimedia component 6Multimedia component 7Multimedia component 7Multimedia component 8Multimedia component 8Multimedia component 9Multimedia component 9Multimedia component 10Multimedia component 10Multimedia component 11Multimedia component 11Multimedia component 12Multimedia component 12Multimedia component 13Multimedia component 13Multimedia component 14Multimedia component 14 Supplementary data to this article can be found online at <https://doi.org/10.1016/j.dib.2020.105174>.
{ "pile_set_name": "PubMed Central" }
"More doors are now open to women, but they can now see how far they are from equality in high-level jobs." WASHINGTON — Young American women are increasingly likely to receive pay nearly equal to their male counterparts, with earnings at 93 percent of men, a new study finds. Still, those women remain as pessimistic as their mothers and grandmothers regarding gender equality. While women under 32 now have higher rates of college completion than men that age, the analysis of census and labor data shows their hourly earnings will slip further behind by the women's mid-30s, if the experience of the past three decades is a guide. More online www.pewresearch.org That widening gap is due in part to the many women who take time off or reduce their hours to start families. Other factors cited in the report are gender stereotyping, discrimination, weaker professional networks and women's hesitancy to aggressively push for raises and promotions, which together may account for 20 to 40 percent of the pay gap. In all, 75 percent of women ages 18-32 say the U.S. needs to do more to bring about equality in the workplace, a percentage similar to baby boomer women ages 49-67 and higher than other age groups. Some 57 percent of young men answered that way. Even so, just 15 percent of young women say they have been discriminated against because of their gender. "Today's generation of young women is entering the labor force near parity with men in terms of earnings and extremely well prepared in terms of their educational attainment," said Kim Parker, associate director with the Pew Social & Demographic Trends Project. "They feel empowered in many ways, yet when they look at the workplace, they see it as a 'man's world' with the deck stacked against them." "They think that men earn more than women for doing the same job and that it's easier for men to get top executive jobs than it is for women," she said. Women are increasingly moving into higher career positions both in government and business. They make up nearly half the workforce, and the share of women in managerial and administrative occupations is nearly equal to that of men — 15 percent compared to 17 percent. Another landmark came Tuesday, when General Motors picked Mary Barra, a 33-year company veteran, as the first female head of a major U.S. car company. Still, women currently hold just 4.5 percent of Fortune 1000 CEO positions, the Pew report said. Andrew Cherlin, a sociology professor at Johns Hopkins University, attributed young women's negative assessments about gender equality to their rising career expectations. "More doors are now open to women, but they can now see how far they are from equality in high-level jobs," he said. The near-equal pay for young women is being driven in large part by their educational gains. Some 38 percent of women ages 25-32 now hold bachelor's degrees, compared to 31 percent of young men. As a result, 49 percent of employed workers with at least a bachelor's degree last year were women, up from 36 percent in 1980. That means more women in higher-skilled, higher-paying positions. The current ratio of hourly earnings for young women to young men, now at 93 percent, is up from 67 percent in 1980 and is the highest in government records dating back to at least 1979. Across all age groups, the median hourly wage for women last year was 84 percent as much as men — $14.90 vs. $17.79, up from 64 percent in 1980. At the same time, the Pew study indicates that a woman's job advancement often will hit a ceiling, due in part to competing demands of work and family. Women remain twice as likely as men to work part-time and are more likely to take significant time off from employment during their lives to care for children or other family members. Among young women, 59 percent say that being a working parent makes it harder to advance in a job or career, compared to just 19 percent of young men. Across all age groups, 22 percent of women and 9 percent of men report having quit jobs for family reasons at some point during their working lives. Fewer young women than young men aspire to become a boss or top manager. Some 34 percent say they're not interested, compared to 24 percent of young men. And the vast majority of adults of all ages who reduced their work hours to care for family members — 94 percent — say they are glad they did it. "This report shows that we are still very much in a 'stalled revolution' when it comes to gender equality in the workplace — and young women see it," said Pamela Smock, a sociology professor at the University of Michigan. "When we see our male CEOs taking off a day to care for a sick child, then we will be working in a more gender-equal workplace — and a more gender-equal world." The Pew study was based on interviews with 2,002 adults by cellphone or landline from Oct. 7 to 27. The Pew poll has a margin of error of plus or minus 2.7 percentage points.
{ "pile_set_name": "Pile-CC" }
The Marcellus Shale has been underneath Pennsylvania for centuries, but the extraction of natural gas began only recently. The "fracking" boom is changing the landscape of northeastern and southwestern Pennsylvania. Use this tool to learn which operators are drilling, and where. Find active wells in your county or municipality — and see whether the drillers have been cited for violating state environmental regulations. Read more about the data.
{ "pile_set_name": "OpenWebText2" }
Increasing top-down suppression from prefrontal cortex facilitates tactile working memory. Navigated transcranial magnetic stimulation (TMS) combined with diffusion-weighted magnetic resonance imaging (DW-MRI) and tractography allows investigating functional anatomy of the human brain with high precision. Here we demonstrate that working memory (WM) processing of tactile temporal information is facilitated by delivering a single TMS pulse to the middle frontal gyrus (MFG) during memory maintenance. Facilitation was obtained only with a TMS pulse applied to a location of the MFG with anatomical connectivity to the primary somatosensory cortex (S1). TMS improved tactile WM also when distractive tactile stimuli interfered with memory maintenance. Moreover, TMS to the same MFG site attenuated somatosensory evoked responses (SEPs). The results suggest that the TMS-induced memory improvement is explained by increased top-down suppression of interfering sensory processing in S1 via the MFG-S1 link. These results demonstrate an anatomical and functional network that is involved in maintenance of tactile temporal WM.
{ "pile_set_name": "PubMed Abstracts" }
Dr. Philippe Szapary plans a career as a clinician investigator at the University of Pennsylvania School of Medicine, focusing his research on the critical evaluation of complementary and alternative medicine (CAM). His training will include formal course work towards a Master's of Science in Clinical Epidemiology with a specific focus on patient-oriented research (POR). To supplement his formal research training, he also plans to take courses in pharmacognosy and ethnobotany at the University of the Sciences in Philadelphia (USP). Using his formal training in POR and botanical pharmacology, Dr. Szapary plans to establish himself as an independent investigator focusing on new and existing cardiovascular CAM therapies. Environment: The University of Pennsylvania and nearby USP are uniquely suited to provide complementary training and resources for this award. At Penn, the Center for Clinical Epidemiology and Biostatistics will provide the formal POR research training. The Cardiovascular Risk Intervention Program and the Division of General Internal Medicine will provide study subjects. The General Clinical Research Center will provide ancillary support including nurses, a dietitian, a biostatistical programmer and laboratory services. At USP, the Department of Pharmacognosy will provide technical support in the analysis of study drugs. Research: In the last 10 years, patients have markedly increased their use of dietary supplements to treat and prevent chronic medical conditions like atherosclerotic cardiovascular disease. This widespread use continues despite little scientific evidence of benefit from randomized controlled trials (RCTs). Current estimates suggest that 30 percent of Americans are hypercholesterolemic. Serum cholesterol remains one of the strongest predictors of risk for coronary artery disease, the leading cause of death in Americans. Herbal therapies have multiple mechanisms of action making them attractive in the prevention of a multifactorial disease process like atherosclerosis. Two Ayurvedic herbals, gugulipid and curcuminoids, appear to have hypolipidemic, antioxidant and anti- inflammatory effects in humans. In this protocol, Dr. Szapary will primarily study the hypolipidemic effects of standardized extracts of curcuminoids and gugulipid in two RCTs. These trials will assess the safety and efficacy of these two agents when used alone and in combination, as done in Ayurvedic medicine, over a 3 to 6 month period. In addition, Dr. Szapary will examine their effects on state of the art biomarkers of oxidant stress and vascular micro-inflammation, both of which are important processes in the pathogenesis of atherosclerosis. These studies will help define the role of these herbal therapies in the prevention of atherosclerosis, and serve as a model for the critical evaluation of dietary supplements in cardiovascular disease.
{ "pile_set_name": "NIH ExPorter" }
23 B.R. 392 (1982) In the Matter of Oliver PLUNKETT, Monica Plunkett, Debtors. QUARLES HOUSE APARTMENTS, Plaintiff, v. Oliver PLUNKETT, Monica Plunkett, Thomas Korb, Interim Trustee, Defendants. QUARLES HOUSE APARTMENTS, Plaintiff, v. Oliver PLUNKETT, Monica Plunkett, Ralph Anzivino, Trustee, Defendants. Bankruptcy No. 82-01119, Adv. Nos. 82-0481, 82-0674. United States Bankruptcy Court, E.D. Wisconsin. September 27, 1982. *393 Harry W. Theuerkauf, Keith R. Varner, Milwaukee, Wis., for plaintiff. Donald A. Schoenfeld, Habush, Habush & Davis, James Shellow, Shellow, Shellow & Glynn, Milwaukee, Wis., for debtors/defendants. David A. Erne, Reinhart, Boerner, Van Deuren, Norris & Rieselbach, S.C., Milwaukee, Wis., for trustee Anzivino. Richard E. Braun, Whyte & Hirschboeck, Milwaukee, Wis., for Unsecured Creditors' Committee. Stephen E. Kravit, Godfrey & Kahn, Milwaukee, Wis., for Continental Bank. MEMORANDUM DECISION C.N. CLEVERT, Bankruptcy Judge. The narrow issue before the court, on the Trustee's motion for partial summary judgment, is whether, as of the date of the filing of his Chapter 11 petition, Oliver Plunkett's right to manage the Quarles House Apartments and to receive 6% of the annual gross rental as a management fee, in accordance with the Quarles House Apartments partnership agreement, constituted property of the estate under 11 U.S.C. § 541. For the purpose of this motion, the parties have stipulated to the facts. The relevant facts are as follows: The plaintiff, Quarles House Apartments ("Quarles House"), is a Wisconsin general partnership, organized on or about June 1, 1978, for the purpose of purchasing, owning and operating income producing property, including the Quarles House Apartments, located at 1570 North Prospect Avenue, Milwaukee, Wisconsin. Section 5.01[1] of the partnership agreement designated Oliver Plunkett ("Plunkett"), the debtor, as the managing partner of the Quarles House and gave him "full charge and control of the management, conduct and operation of the ordinary affairs of the Partnership business". The provision further entitled him to receive a management fee equal to 6% of the annual gross rental income, which amounted to $31,320 in 1981. From June of 1978, Plunkett acted as managing partner of the Quarles House and was acting in that capacity on April 15, 1982, the date that he and his wife filed a joint Chapter 11 petition. On April 20, 1982, five days after the filing of the petition, at a meeting of investors of the Quarles House, 73.56% of the investors voted to remove Oliver Plunkett as managing partner. The legal effect of the vote to remove him is the ultimate issue presented by this motion. 11 U.S.C. § 541 provides, in pertinent part: (a) The commencement of a cause under section 301, 302, or 303 of this title creates an estate. Such estate is comprised of all the following property *394 (1) . . . all legal or equitable interests of the debtor in property as of the commencement of the case. The broad language of the statute reflects Congress' intent to expand the scope of "property of the estate" to eliminate substantial litigation which arose under § 70 of the Bankruptcy Act of 1898: The bill makes significant changes in what constitutes property of the estate. Current law is a complicated melange of references to State law, and does little to further the bankruptcy policy of distribution of the debtor's property to his creditor in satisfaction of his debts. . . . The bill determines what is property of the estate by a simple reference to what interests in property the debtor has at the commencement of the case. This includes all interests, such as interests in real or personal property, tangible and intangible property, choses in action, causes of action, rights such as copyrights, trade-marks, patents and processes, contingent interests and future interests, whether or not transferable by the debtor. . . . These changes will bring anything of value that the debtors have into the estate. The exemption section will permit an individual debtor to take out of the estate that property that is necessary for a fresh start and for the support of himself and his dependents. Certain restrictions on the transferability of property will prevent the trustee from realizing on some items of property of the estate. But on the whole, the trustee will be able to bring all property together for a coherent evaluation of its value and transferability, and then to dispose of it for the benefit of the debtor's creditors. H.R.Rep.No. 95-595, 95th Cong., 1st Sess. 175-176 (September 8, 1977), U.S.Code Cong. & Admin.News 1978, pp. 5787, 6136. Following the intended comprehensive approach to property of the estate, courts interpreting § 541 have generally protected a debtor's contractual right as an asset of the estate.[2] By its very nature and terms, the managing agreement between Plunkett and the other general partners of Quarles House constituted a contract, a necessary element of a partnership under Wisconsin law.[3] Absent any evidence that the Partnership Agreement is unenforceable, this court must conclude that the contractual provision in dispute was valid and enforceable. Any rights, benefits or duties flowing from this provision, therefore, constituted property of the estate of the debtor within the meaning of 11 U.S.C. § 541 as of April 15, 1982. Accordingly, the trustee's motion for partial summary judgment is hereby granted and Oliver Plunkett's right to manage the ordinary affairs of the Quarles House Apartments and receive a management fee equal to 6% of the annual gross rental income from the Quarles House Apartments, in accordance with § 5.01 of the Quarles House partnership agreement dated June 1, 1978, is hereby held to be property of the joint Chapter 11 estate of Oliver and Monica Plunkett, as defined by 11 U.S.C. § 541(a). NOTES [1] Section 5.01. Managing Partner. For convenience and for the efficient management of Partnership affairs, and not in derogation of any managerial rights which the other Partners may have, Oliver Plunkett shall be the Managing Partner under this Agreement, and he shall have full charge and control of the management, conduct and operation of the ordinary affairs of the Partnership business. The Managing Partner shall promptly take all action which may be necessary or appropriate for the purchase and development of the project in accordance with the provisions of this Agreement and applicable laws and regulations. The Managing Partner shall devote to the Partnership such time as may be necessary for the proper performance of his duties. The Managing Partner shall cause the Partnership to obtain and keep in force insurance of such types, including fire and extended coverage in public liability insurance, in such amounts, on such terms and with such carriers as will in his judgment adequately protect the Partnership and its property. The Managing Partner shall be entitled to a management fee equal to 6% of the annual gross rental income. [2] See, In re Adana Mortgage Bankers, Inc., 12 B.R. 989, 7 B.C.D. (CRR) 1085 (Bkrtcy.N.D.Ga. 1980) (the debtor's right to hold and service mortgages under an agreement with Government National Mortgage Association was property of the estate); Varisco v. Oroweat (In re Varisco), 16 B.R. 634, 8 B.C.D. (CRR) 772, Bankr.L.Rep. (CCH), ¶ 68528 (Bkrtcy.M.D.Fla. 1981) (the debtor's exclusive right under a franchise agreement to distribute baked goods constituted property of the estate). [3] Sander v. Newman, 174 Wis. 321, 327-328, 181 N.W. 822 (1921); see, also, Heck & Paetow Claim Service, Inc. v. Heck, 93 Wis.2d 349, 359, 286 N.W.2d 831 (1980).
{ "pile_set_name": "FreeLaw" }
Why 'MAGAnomics' Isn't Likely To Work Enlarge this image toggle caption Mandel Ngan/AFP/Getty Images Mandel Ngan/AFP/Getty Images The Trump administration this week unveiled its strategy for the economy and dubbed it "MAGAnomics." In the Wall Street Journal, Trump budget director Mick Mulvaney wrote that "the focus of MAGAnomics is simple: Grow the economy and with it the wealth of, and opportunity for, all Americans." The simple plan: Ratchet the economic growth rate up to a sustained 3 percent annually. That's an ambitious target, given current levels of around 2 percent. But there are a couple of problems. One is that sustained 3-percent growth is highly unlikely — and it's not a simple proposition. "I can't see how it's achievable," said Joel Naroff, chairman of Naroff Economic Advisers, an economic consulting firm. "I never say never. Anything is possible. But the possibility of that happening is between slim and none." Another problem is that some Trump policies could in fact work against achieving that level of economic growth. And a Congressional Budget Office analysis released the day after Mulvaney's op-ed delivered a blow to "MAGAnomics," estimating the Trump budget would fall well short of its economic growth goal. The nonpartisan referee of all things money on Capitol Hill estimated that the Trump budget would only yield 1.9 percent economic growth on average over the next decade. That's not only below the 3-percent goal, it's also not much of an improvement — it's just 0.1 percentage point higher than what growth would be under current law. Experts say sustained 3-percent growth is unrealistic It's possible, of course, for the economy to get to 3 percent for a short while — tax cuts, for example, could bump growth up to that mark "for a few quarters, but not a few years." Indeed, GDP growth bounces up and down from quarter to quarter. In the third quarter of 2016, for example, it reached 3.5 percent. But the economy hasn't held around or above 3 percent for an extended period of time since the booming 1990s. And there are significant economic factors holding the U.S. back from that kind of growth. The Committee for a Responsible Federal Budget illustrated this in a May report. In order to get to near 3-percent growth, major factors that contribute to growth would have to bounce back to the booming levels of a quarter century ago. "By our estimates, returning capital growth, productivity growth, and prime-age labor force participation to where they were in the 1990s would result in 2.9-percent growth," they wrote, adding that that's "an unlikely scenario given recent trends." And top economists from both sides of the political spectrum have recently framed 3 percent as an unreasonably high aim. "If we could move the U.S. from where it is now, which is say somewhere between 1.8 and 2 [percent GDP growth rate] to somewhere like 2.5, or God forbid 2.75," said Doug Holtz-Eakin, former director of the CBO and president of the conservative American Action Forum, at a May panel discussion in Chicago. "If we did that, that's hall-of-fame work. That's hard." "Yeah. If you went from 2 to 2-and-a-half, that would be amazing," concurred Austan Goolsbee, who chaired President Obama's Council of Economic Advisers. One big Trump policy area could undermine growth The size of the labor force and productivity growth are the two big factors that dictate the size of the economy, according to Holtz-Eakin. And growth in the labor force — that is, growth in the pool of people working or looking for work — has slowed way down, largely due to an aging population. Here is how the annual growth rate in the labor force looks over time: "The only way to reverse that is to have a fundamental change in our immigration policies and generate more workers in the near term," said Holtz-Eakin at that May event. "Without immigration, the U.S. is Japan: it shrinks and gets old." Boomers are aging out of the workforce; there's no reversing that. And the birth rate has fallen off. So immigration could be key here. People oppose or promote immigration for a variety of reasons, including a view that immigrants take American jobs. But, actually, slashing the number of immigrants — in the country illegally or legally — would likely mean negative economic consequences for the U.S. It's true that Mulvaney proposes more work incentives — encouraging people back into the labor market via welfare reform. That could boost the labor force, but not by a lot, said one expert. "So the slower economic growth that's due to the labor force, about 80 percent of that is from the aging of the population," said Maya McGuineas, president of the Committee for a Responsible Federal Budget. And once again: lower immigration levels, and you offset whatever you gain from doing welfare reform. The other factor here is productivity — and economists aren't totally sure why it's so low. A few policies could potentially help — for example, the tax reform that Mulvaney proposes. But, McGuineas said, if it increased the debt, it's possible it could also slow economic growth in the long run. Not only that, but tax reform might only be a short-term shot in the arm, Naroff added. It may not deliver productivity growth that lasts. One more policy area to consider is trade. The Trump administration pulled the U.S. out of the Trans-Pacific Partnership, one area that CRFB and some economists predicted would contribute to economic growth. Trump has talked about inserting the U.S. into what he believes would be "fair" trade deals. Depending on what the administration ends up doing on trade, that could also play a part in boosting (or hurting) U.S. growth. "They" said it can't be done There's something distinctly Trumpian about the administration's economic plan (The MAGA in MAGAnomics derives its acronym from Trump's Make America Great Again campaign slogan.) Part of it is the fact that its main 3 percent goal seems unattainable. Trump proposed other similarly difficult-to-imagine policies during his campaign: deporting 11 million people in the U.S. illegally and promising to bring the federal debt to zero in eight years are examples. Mulvaney acknowledges that many have called 3-percent growth unfeasible but shrugs it off with a kind of tough, rugged-individualistic attitude: "For merely suggesting that we can get back to that level, the administration has been criticized as unrealistic. That's fine with us. We heard the same pessimism 40 years ago, when the country was mired in 'stagflation' and 'malaise.' But Ronald Reagan dared to challenge that thinking and steered us to a boom that many people thought unachievable." The premise here seems to be that getting the economy to hit a certain level is in large part a function of having leaders who are independent-thinking enough to go their own way and really try. A failure of the economy here seems to be merely a failure of the imagination. And, in fact, a slow economy may not be just a failure of policy but a kind of conspiracy, in Mulvaney's telling — that there are unnamed, shadowy forces "who don't want you to remember—what a great America means." This kind of "they said it couldn't be done" thinking is a common theme for the Trump administration — it pops up every time the president gloats about how no one thought he could win the election. Now, it has brought it over into the realm of economics. It makes the administration's message coherent rhetorically, but it doesn't mean that the economic policies will deliver. Winning the Electoral College, it turns out, is a very different beast from growing the economy. With reporting from Uri Berliner.
{ "pile_set_name": "OpenWebText2" }
Category Archives: Business As the pace of business continues to accelerate, there seems to be one aspect of the business process model that is struggling to keep up: The Business Case. There was a time where capital expenditures were looked upon as long term investments by the business. The life-cycle and pay-back processes, as well as the accounting amortization of these investments, were expected to last years, and in some instances, even decades. The average business case became attuned to these norms. But those days are long gone. As the speed with which technology has changed has continued, by necessity the business case used to justify the new or incremental investment has needed to become shorter. If Moore’s law of eighteen-month capability doubling (it was actually Intel executive David House, who predicted that chip performance would double every 18 months. Gordon Moore, for whom the law is named, was the co-founder of Fairchild Semiconductor and Intel, and whose 1965 paper described a doubling every two years in the number of transistors per integrated circuit was the basis for the coining of the “law”) is to be believed, then the asymptote for the length of an acceptable business case should approach that eighteen month to two year limit as well. That doesn’t mean that a product’s useful life is only limited to eighteen months. I think quite the contrary. There are aspects of the Public Switched Telephone Network (PSTN) that have been in place for more than fifty years, and are still providing beneficial service to the communications carriers and their subscribers alike. On the other hand, people are known to line up and over-night camp out every eighteen to twenty-four months in order to be the first to get the next generation of the Apple iPhone. It appears that customers who are being asked for either capital or operational expenditures associated with technology oriented products, are driving their partners and their vendors to ever more rigorous and aggressive value propositions and rates of return. This is the genesis of the short horizon business case. The simplest definition of value is how much money is made or saved over what period of time. The more you make, or the more you save over a given period, the better the value. In the past it was acceptable for a business case to extend out over a long enough time period as to show an acceptable return. If the initial business case for the sale didn’t make sense for one period of time, it was easy just to lengthen out the time frame until it did. What appears to be happening is that as the rate of technological based product change has continued at the speed of Moore’s Law, the period that a customer is willing to measure value has shrunk. Business cases still need to show the customer value, they now must do it in far less time. The tried and true form of extending the business case period to make the value and pay back equations work is now gone. Customers will no longer accept it, and are driving for shorter and shorter review periods. I think there are several factors in addition to technical obsolescence that are helping to drive a short horizon on the business case: As each new generation of technology arrives it almost exponentially drives down the (residual) value of previous generations. I think it is no secret that one generation old technology is viewed as old and disadvantaged, and that two-generation old technology is probably approaching the zero value state. We have all seen this in our consumer based technology purchases as well. Products get old so quickly that we have developed a disposable attitude toward them. With Personal computers now going for a few hundred dollars, what is the value of a two-generation old computer? What was once repaired and retained is now simply expected to be replaced. How would consumers (and manufacturers) react if the same logic was applied to say, automobiles and two to three model year old car was considered almost valueless? We also see (comparatively) decreasing operational returns as each new technology generation is introduced. This means that as each new product gets smaller and more efficient the value of generating operational savings associated with the previous generation of product also tends to get devalued. The idea of saving something with what you have is not as attractive as the possibility of saving more with something new. I guess this is what they call “Marketing”. I think one of the final evolution’s of the short horizon business case is the “Cloud”. I am sure everyone has heard of this thing. It’s in all the magazines. One of the many ways that manufacturers and vendors have adapted to the evolving business case rules is to try and remove both the obsolescence associated with technology and to more closely align the delivered solution with the customer’s need. The idea being that if a customer only needs a four-unit solution but the technology only comes in six or eight unit increments, there is a delivered solution miss-match. By delivering a function from the cloud as opposed to a product based solution, the vendor has effectively removed technology obsolescence from the customer’s decision process, as well as matched the required amount of solution with the required amount of need. The net result is a much shorter period needed to achieve the required business case. Customer purchases can be made in smaller increments, which in turn only require smaller pay-backs. Future product purchases and existing product obsolescence are removed from the customer’s decision criteria as the customer is now only purchasing the product’s function, not the product itself. The obsolescence issue, and all the other costs associated with operation of the product are now retained by the vendor (and should be built into their business case). The continued drive for more value has driven customers and business cases to the short horizon. Capital for technology can no longer be viewed as a long-term investment. It must be judged and justified by how quickly it can pay back on its cost and the relative business value it generates. It is this drive for better business returns that continues to reduce the time scale associated with the business case. This trend would appear to potentially be a seed cause for future changes to the way business is conducted. On one hand it will continue to make the sale of capital based technology products more difficult. By demanding shorter pay-back and business case periods, customers are in essence expecting lower prices for products, and higher value delivered. That is a demanding and difficult environment for any supplier. It should also continue to drive product virtualization and the Cloud as ways for suppliers to retain costs and risks, and hence remove them from the customer’s business case. This will continue to be an interesting market, but not all technologies and products may be potential candidates for the cloud. It could also be argued that a potentially unexpected result of the drive to align business cases with product life cycles could be the reversal of Moore’s Law. It has long been expected that there is some sort of limit to the capacity doubling process. It has been going on for over fifty years. There are recent articles in no less than the MIT Technology Review, Ars Technica, and The Economist (to name just a few) that are now stating that Moore’s Law have in fact run its course. And this may also be of benefit to business. If customers want to align their capital business case length with the product’s life cycle, and the current eighteen to twenty-four month life cycle of the product makes this increasingly difficult, then one of the solutions may be to lengthen the product life cycle to more than twenty-four months. If there truly is a link between business case length and product life cycle, then this could be a possible solution. This will be an interesting cause and effect discussion. Is the potential slowing of Moore’s Law going to cause the reversing of the short horizon trend associated with customer’s business cases, or is the demand for short horizon business cases going to accelerate the slowing of Moore’s Law due to business necessities? Either way, customers are requiring businesses to change the way they put together the business case for capital technology sales, and that is having a significant effect on how business can successfully get done. “My mind is aglow with whirling, transient nodes of thought careening through a cosmic vapor of invention. My mind is a raging torrent, flooded with rivulets of thought, cascading into a waterfall of creative alternatives…” (Hedley (not Hedy) Lamarr in Mel Brooks’ “Blazing Saddles”.) Ditto. Extra points if you knew who said that as well as who uttered the response. I seem to have costs on my mind (as well as a lot of other things, apparently) these days. I didn’t know what I wanted to address in this posting: Cost Reduction, Business Cases, Business Predictability all seemed to have been foremost in my mind among the possible group of posting topics. It seemed like the best thing to do was get started and see where it went. It went to “Blazing Saddles”. I don’t know if it is recoverable from there, but I will try. Since this is nominally a Business Blog, and I did at least tangentially address cost reduction as one of the primary growth industries in business in my last posting, I think that I will head over into business cases. However, do not lament the transition away from cost reduction entirely, as costs do play an important role in the creation of any good business case. It appears that creating or generating a really good business case is becoming a lost art. Coming up with an idea, specifying the investment parameters, analyzing the markets and demands, and ultimately defining the returns and value to the company are some of the building blocks of a successful business. It is a rigorous process (and it should be) because it deals with the lifeblood of the business – money. This is not going to be some sort of a “how to” do a business case primer. It’s more about what they are and why they’re needed. Simply put, a business case is the justification package that you put together when you want the company or organization to invest in something. This is a very high level definition. The “something” to be invested in can be almost anything: research and development for new products, production automation equipment to reduce the labor component associated with manufacturing, additional sales people in an effort to expand the addressable market and grow sales, are just a few of the fun ones that come to mind. Business cases are all about what the company should invest in. Investing is all about money, specifically when you spend it, how much of it you spend, when you get it back and how much more of it you get back. Businesses are in business to make money. Like every good investor, when money is spent or invested, a return is expected on that money or investment. If that does not seem to be the case, then the business case process has probably broken down. I do not claim to be a business case guru. I have put several of them together and have found a few topics that I look for in every good business case. If you want to find out all that should be included in a business case, just Google “Business Case Template”. I think you will get a little more than eight million results. In my experience, every good business case should have the following three major components: What is it that is wanted? What are you asking for and how much is it going to cost? Every business case is about asking for money. In the examples I cited above you would be asking for a specific amount of money for either research and development (people, lab space, lab equipment, etc.), money for manufacturing equipment for automated production, or money for salaries for incremental sales people. This amount is known as the investment. What is it that you get for the money? Why would the organization or business want to give you this money? What are they going to get in return? If it is for research and development, what products are they going to get and how will they positively affect the growth of the company. If it is for an automated production line, how much are production costs going to be decreased. If it is for additional sales people, how much are sales going to increase. When do they get their money back? No, the organization is not “giving” you money. Think of it as a loan. Every loan needs to be paid back, with interest. This interest is usually in the form of increased profits for the company, either in the form of margins from increased sales or reduced costs. If you don’t believe me on this repayment with interest thing, just ask the bank or financing company the next time you want to invest in a car or house. I think they will be quite specific regarding the interest you will be paying on the loan and the expected repayment schedule that they will require you to comply with. This money that is given back to the company is known as the return on investment. Business Case Tip #1. One of the guiding principles of a good business case is that the return on investment should be greater than the investment itself was. I don’t think there are many (any?) other business case tips that can be given that have the same importance as this one. A proper business case requests a specific amount of money. It defines what the money will be used for (spent on). It specifies what will be produced (new products, cost reductions, increased sales, etc.). It also forecasts when and how much the returns will be. It is all about the numbers. It is this last part which is especially important. When are they going to get their money back. It is during this discussion when you may hear a term such as “pay-back”. Pay-back is when they get all of their original investment back. This is the break-even point. After this, everything that is returned to the company is a benefit or profit. Business Case Tip #2 No matter how soon or how quickly the business case hits the “pay-back” point, it will not be soon enough. Contrary to what some may believe, money in a company is not free. A company must pay for its money, one way or the other. A company can fund a business case investment via either debt or equity financing. In debt financing it is the interest and overheads that it must pay on the loan (debt) it takes out to get the money. In equity financing it is the relative risk and return it must pay in the form of stock appreciation or dividends to the equity investor in order to attract them. This is called “the cost of capital”. It is in effect the interest or discount rate that the company must use in the business case when it looks at the future returns on its investment. The longer it takes to reach pay back to the company, the more the amount of discount that is applied to the return. The greater the discount, the more difficult it should be to make the business case work. Remember that there is a limited amount of investment money that is available to any company. There is only so much that the company can borrow before the financial position of the company is adversely affected by its debt position and only so much stock that can be issued before the market adversely affects the equity price and expectation for the stock. There are also other businesses and organizations within the company that would like to invest in their opportunities as well. That will create a competition for those investment funds. So how should the company decide where to invest? There are usually two instances where a company will invest. One of the easiest is to invest only in those business cases that provide the greatest return on the investment. That would be those opportunities that have the best business cases. You have just seen above what should be expected at a high level for a good business case. The second place that a company usually invests is in those strategic initiatives that may not provide the best return but are required for the long term health of the company. What are these strategic initiatives you may ask? That’s a good question. I have found business cases to try to define themselves as a strategic initiative when they contain a request for funding that does not show a reasonable return on the requested investment. That’s probably not entirely true. There are investments for things such as core technologies that other products are built from that could be defined as strategic (among the many others of this type) as well as initiatives outside of the financially definable realm such as the reduction of carbon footprints or diversity that may not contribute directly to the financial well being of the company, but should be done none the less for the greater good of the company. Companies expect and need to make money. Otherwise they normally do not get to remain companies for very long. I think a great deal of any company’s success can probably be attributed to how strong their business case process is, and how well they adhere to it. Having people who understand what a good business case is can go a long way to attaining that success. I like to read. My son says he would prefer to wait for the movie. Any movie. Seeing as how he is still only fifteen years old, I don’t think that there is much that I can do about that right now. What I can do is control what I read. I was under the misguided idea that occasionally I should read articles, magazines and books written by and for successful people, who like to tell us other presumably less successful people what we should do to become more successful, just like them. I don’t think I am going to do this anymore. Every time I read one of these success missives, I can’t help but feel inferior. It has a tendency to either depress me or drive me nuts. I’ll demonstrate by example: I got an email notification that my college alma mater (of all things) “liked” an article on one of those professional networking sites. I take being a mighty Lobo alumnus of the University of New Mexico very seriously so I thought it best to go check out what my alma mater deemed important enough to actually like. I clicked on the link in the notification. Via the magic of the internet I was immediately whisked to the site of some business and technology e-zine with the appropriately titled article (and I am paraphrasing here as I don’t wish to have to provide attribution) “27 Things that People Who Are More Successful Than You Do Every Day – Including Weekends – Before They Leave Work, That You Probably Don’t Do Which Explains Why They Are Successful And You Aren’t” You would be surprised how close to the real title that paraphrase is. As I said, I like to read. I read for information and enjoyment. I also believe it is something of a dying art. I mean why read when you can text or IM or as my son does, watch the movie anyway? But that is not the point. The point here is that I was already at the site. I consider myself to be reasonably successful. I have not ruled the world but I have done moderately okay. I figured I would peruse the first few topics of the list of successful attributes purely out of self interest and compare what the list said successful people do with what I do and see how much similarity there was. Big mistake. After furiously reading through the entire list with ever increasing disbelief to see if there was anything at all that I did at the end of the day that even remotely resembled something that a successful person was purported to have done at the end of the day, I came to the crushing conclusion that I am not fit to leave work at the end of the day, let alone work anywhere. In case some of you have not experienced the joy that accompanies an epiphany that springs from reading an article like this, let me provide an example as a means of explanation. Most of us know how to sign our names. There are probably a few of us who don’t, and due to the penmanship challenges associated with the inability to sign their name these people are hence genetically selected to become doctors. Over time we have all probably evolved our “signature”. Now take the pen that you normally sign your name with, put in the other hand (the hand that normally holds the paper while the first hand signs your signature) and now be told that all successful people are ambidextrous and in order for you too to be considered successful you should immediately be able to use that other hand to sign your signature as quickly, clearly and effortlessly as the first hand. Give it a try. See how that works for you. You now have only the slightest of inklings how it feels to read these articles about the habits, traits, customs, manners, dispositions, styles, fashions, penchants and proclivities of successful business people. It depresses me that I don’t seem to have any resemblance at all to these so called successful people. It depresses me that I don’t spring out of bed at four o’clock in the morning prepared to shampoo the dog and rotate the tires on my wife’s car, and jog six or eight miles while thinking great world changing thoughts, all before going into the office like successful people are being depicted as doing. I am crestfallen that I don’t seem to be the appropriate whirl wind of activity in the last ten minutes of my business day closing off to-do lists, clearing my desk while simultaneously creating a workable plan to solve world hunger as I prepare to do battle with the other presumably unsuccessful souls on my commute home from the office. It further concerns me that almost all the people that I know that I would consider to be successful also seem to have nothing in common with the ideal successful person that these articles describe. In the past I have discussed how happiness cannot be derived from the actions and relative performance of others. I guess the corollary here is that feelings of depression and inferiority in the office should also not be the result of the actions and relative performance of others either. Unfortunately that approach does not seem to sell articles, magazines and books. Nor does it seem like a very good way to drive people to specific web sites where their eyeballs can be assaulted by both an article describing in detail why they should by inference not consider themselves to be successful as well as those advertisers that are on that site who have specifically tailored their self-help ads to those people who after reading the article are now feeling so insecure about their relative worth and success in business. What this epiphany does open up to me is the idea of a new opportunity to address a whole new segment of the self help article, magazine and book market. It is the segment of the market that is for the business person that is at least in part moderately successful, and wants to feel good about what they have accomplished. Think about that for a moment. Doesn’t everyone want a little recognition, reinforcement and reaffirmation that they have in fact been doing things well? Think about the titles for these articles, magazines and books that could be generated, based on this new and previously untapped market approach: “From Good to Better” “Twelve Habits of the Moderately Successful” “Congratulations on Making it to the Office on Time” “How to Get Back From Lunch in One Hour” “Speakerphone Etiquette in the Cube Farm” “The Art of Aiming Low and Meeting Your Objectives” The list could go on and on. I understand that in this day and age that it is hyperbole that sells. As another example, in the past it used to be enough to just report the news. Now we seem to have a never ending stream of talking heads that are associated with one end of the political spectrum or the other that are now presenting their “version” of the news. Everything now has “spin” and now screams for our attention. I think the same is now the case for the plethora of business “self help” articles, magazines and books that are vying for our attention. Each of these new and improved lists of elements associated with success seems to be more outlandish than the previous. As I noted before, based on these items it is hard to understand how I or anyone else is or can ever be considered successful. Hence the source of my concerns over these feelings of inferiority. I think the bottom line is that when you take everything into consideration it is still things like drive, determination, attention to detail, effort, honesty, knowledge, experience, cooperation, preparation and maybe just a smidgeon of luck that are some of the determining factors in success. These concepts are not particularly exciting and don’t promise any secret short cuts to success. Maybe that explains why there doesn’t seem to be a market for a book titled: “Be Smart, Work Hard, Perform Well and Move Ahead” Perhaps another answer to being considered a success is to write a book that tells other people what they should do in order to be considered a success. I am sure as children we have all heard the parable “If a tree falls in the forest and there is no one there to hear it, does it make a sound?” No matter how you answered the question, the rejoinder was “How do you know for sure?” The business equivalent of this parable is “If you work very hard all month, and you do not generate a monthly report of your activities, did you really do any work?” The answer to this one is a little bit simpler. If you did not document your progress and activities then in reality you didn’t do any work. If you want to argue this point, my rejoinder will be “How will management know for sure?” I have heard many reasons and excuses for not generating a monthly report. It takes too much time. I didn’t have a great month so I don’t want to document so little progress. I had a great month so I don’t want to seam self aggrandizing. The bottom line is that there is no excuse for not generating a monthly report. They don’t take a lot of time. If they do, you’re probably doing them wrong. Some monthly reports may be stronger than others. That is the nature of business. The fact is that a brief 1-2 page monthly report is your opportunity to capture the value that you and your team brought to the company. Businesses are focused on generated value. If you are not showing and documenting your value, how can they know what value you are to them?
{ "pile_set_name": "Pile-CC" }
Q: How did Indy know to not look at the Ark? My grasp of Scripture is poor, but the only thing I can recall in the Bible along these lines is Uzzah being struck down because he TOUCHED the Ark. How did Indy know that they should close their eyes and escape being fried by the Ark? A: Cross-referenced from that initial link is 1 Samuel 6:19. But God struck down some of the men of Beth Shemesh, putting seventy of them to death because they had looked into the ark of the LORD. .. See also 1 Samuel 6:19 in the King James Bible. And he smote the men of Bethshemesh, because they had looked into the ark of the LORD, even he smote of the people fifty thousand and threescore and ten men: and the people lamented, because the LORD had smitten many of the people with a great slaughter. Those versions are pretty much in agreement, though the number jumped from 70 to over 50 thousand. A: It wasn't so much the Ark he wasn't looking at, but the everything. The Ark, the angels, and the whole thing. I remember seeing a special on TV, a "Making of" type show, and they had a shot of Spielberg working with Harrison Ford and Karen Allen and he said something to the effect of, "And, according to the Gospel of Lucas, Indy and Marion are spared because of their goodness." I thought that was interesting because his comment, as the director, indicated that in his mind it wasn't so much whether they looked at the Ark and angels (were they ark-angels?), but that the angels actually distinguished between good people and bad people. A: This is a common idea in Judaism. To paraphrase: It is impossible for a human to behold God, because He is too mind-boggling for a mortal to comprehend. If you see God, you die. This is what my Hebrew instructor taught me.
{ "pile_set_name": "StackExchange" }
1. Field of the Invention The present invention generally relates to automobile lamps positioned at the automobile's front end and/or rear end. More specifically, this invention relates to an automobile headlamp or taillamp housing that is capable of elastic deformation, yet is rigidly, directly or indirectly, attached to a fixed chassis component or body component (i.e. trunk, fenders, rear quarter, etc.) of the automobile. The flexible lamp mounting arrangement is able to withstand substantial flexure when the automobile bumper sustains an impact by an object and, therefore, the flexible lamp arrangement is particularly well suited for use with impact-absorbing bumpers that automatically rebound from a frontal impact. 2. Description of the Prior Art Generally, automobile designers or stylists would like to create aerodynamic body shapes. Their motivation is not merely to reduce drag, but to create contemporary sculpted shapes that appeal to the marketplace. The automobile designers or stylists, however, are hampered by a variety of functional, economical, and other restraints. With the advent of energy or impact-absorbing bumpers, front and rear ends of an automotive vehicle have been required to undergo significant design changes in order to accommodate the stroke of the bumper, that commonly can be as much as three to four inches. Generally, with respect to the front and rear end of a vehicle, designers would like a clean, convex transition from the front edge of the bumper rearward to the hood area and from the rear edge of the rear bumper forward to the sheet metal associated with the trunk area and rear deck lid. However, when viewing most vehicle designs currently available in the marketplace, this transition is normally an inward, concave box shape as shown in FIG. 1. The front bumper protrudes forward from the vehicle body, or the rear bumper protrudes rearward from the rear sheet metal in order to provide compliance with federal and automotive original equipment manufacturer's vehicle impact standards. These standards generally state that no damage can occur to non-bumper components or safety items, such as headlamps or taillamps, during 5 miles per hour barrier and front impacts, or 3 miles per hour pendulum impacts. Therefore, to achieve this objective, the original equipment manufacturing engineers have brought the bumper out away from the front and rear body panels, headlights, taillights, hood and grille, so that the bumper may stroke, thereby absorbing the impact energy without allowing intrusion into the components with subsequent damage. The clear result from such design is that the vehicle appears boxy, non-aerodynamic, and antiquated. A closely related problem to the ability to absorb the impact energy of these federal and automotive vehicle impact standards concerns the location of the engine within the engine compartment. For example, in an attempt to obtain more passenger space within a vehicle, recent practice has been to push the mounts of the engine further and further towards the front of the vehicle. Accordingly, the ability to provide additional passenger compartment space is directly affected by the space available in front of the engine to enable moving the engine forward to obtain the maximum passenger compartment space. However, since the overall length of the vehicle is subject to limits dictated by the original equipment manufacturer, bringing the bumper forward away from the body, headlight, hood and grille intrudes into the maximum length, and the front end space of the vehicle becomes extremely valuable in that it directly affects the ability of automotive engineers to move the engine forward in an attempt to create additional passenger compartment space. Similar problems existed with respect to automobile grilles, and such problems were solved by the use of a grille that is mounted substantially flush with the surrounding automobile body panels and bumpers, while also being capable of deflecting with the stroke of the impact-absorbing bumper during impact, thereby obviating the need for the grille to either pivot about an anchor point or to be mechanically displaceable with the additional hardware. Such a grille is disclosed in U.S. Pat. No. 5,205,597, owned by the common assignee hereof. The use of the teachings of this earlier invention, however, allowed the grille to be brought into the impact zone and absorb impact without damage. Unfortunately, while this helped to achieve a more aerodynamic and contemporary look in the grille area, the transformation is incomplete because along either side of the grille the fragile headlight system still requires protection, resulting in the boxy, non-aerodynamic situation as depicted in FIG. 1. Several automotive equipment manufacturers have attempted specific solutions to this problem, but in doing so have failed to take into consideration the original equipment manufacturer's limitations set forth above, as well as the availability of space between the front bumper and the front of the engine in an engine compartment where the headlight system must be appropriately mounted. As set forth above, the traditional solution is to position the headlamps or taillamps entirely out of the path of the bumper during recoil after impact. This approach generally entails placing the automobile's headlamps rearward of the bumper or taillamps forward of the bumper, resulting in an extremely square looking profile that has little appeal according to modern design trends as depicted in FIG. 1. In addition, clearly such a design is not aerodynamic, but this approach has been generally followed for lack of a better solution. Another solution recently attempted by some of the original equipment manufacturers, is to require the headlamp and/or taillamp to be displaceable such that it can either pivot or otherwise move out of the path of the bumper during energy absorbing impact. Preferably, this approach allows the headlamp and/or taillamp to be mounted flush with the surrounding hood, front end, body panels and bumper, to enhance the styling and aerodynamics of the automobile by proving aesthetically pleasing, continuous smooth contour surfaces between the hood, bumper and headlamp lens surfaces. Such an approach is illustrated in Tomforde, U.S. Pat. No. 4,475,148, wherein the headlamp upper and lower housing compartments 3, 6, are pivotably mounted to a fixed component 4, at axis 5, to allow resilient cushioning of an impact in the longitudinal direction of the vehicle to minimize property damage and personal injury. This approach allows the top of the headlamp to pivot rearward when the headlamp is contacted at the bottom edge so as to reduce or prevent property damage in a collision with the vehicle and/or a stationary obstacle, as well as to avoid injury to a pedestrian by yielding in a longitudinal direction about pivot point 5. This approach appears extremely impractical as bumper heights are standardized on passenger vehicles, and an impact on the lower portion of the headlamp would not cause enough rotation to prevent the headlights from becoming severely damaged in case of an impact in a minor collision with another vehicle or a stationary obstacle. Another example of an attempt to solve the above problems relating to the location of headlamps or taillamps in the impact zone is taught by Delmastro et al., U.S. Pat. No. 4,466,646. In this reference the lamp assemblies are mounted to an impact bar by the use of U-shaped springs to permit the lamp assembly to swing from its illustrated operating position to a protected position within the confines of the impact bar assembly in response to predetermined frontal impacts. The bumper fascia is mounted to an impact energy absorbing unit and its associated impact bar to absorb side or frontal impacts, store the energy in the impact bar and to avoid transmitting the energy into the vehicle frame, bodywork, or other vehicle components. Any frontal or side impact will permit the hinge assembly limited side and compound movement of the lamp assembly, so that it will not be damaged by any material of the energy absorbing unit crowding the headlamp assembly on corner impacts. After the impact load is removed, the impact bar and end section recover at predetermined rates to their original positions. The lamp assembly, of course, being connected to the U-shaped spring member, will likewise recover to its original position. Note that although this type of solution is proposed for fog lamps and signal lamps, the reference completely fails to set forth any solution, whatsoever, for avoiding damage to the headlamp in a frontal zone collision. Clearly, the design criteria to avoid damage to headlamps requires the headlamps to be set rearward a sufficient amount to allow the bumper to properly stroke during frontal impacts. Another attempt to protect fog and taillamps mounted in the impact zone is shown in Vogelgesang, U.S. Pat. No. 5,288,177, wherein a fog lamp and turn signal lamp are mounted to the elastic bumper covering to allow the fog and turn signal lamp unit to move backwards in the case of a 30.degree. pendulum impact after it has been acted upon by the impact and to return to its original position. The fog lamp and turn signal housing are attached to a bumper covering that, when impacted, moves towards the rear of the vehicle by pivoting about a fixed pivot mounted on the chassis that provides appropriate support for the fog lamp and turn signal housing, and allows the housing to pivot rearwards to absorb the impact and return to its original position thereafter. The supporting element is mounted at one end at a fixed member attached to the wheel housing and to the fog lamp and turn signal housing to allow the supporting element to pivot rearwards. After impact, the elastic bumper covering with the lamp units and the supporting element are returned to their original positions by the restoring force of the pneumatic impact absorbing devices. In Roschinski et al., German patent publication DE 3802104 A1, the lighting unit is mounted in the area of the impact zone. Through the use of spherical balls mounted in a spherical socket the lighting unit is allowed to be removed from the socket upon impact in the longitudinal direction, and returned into the spherical socket by two compression coil springs located between the housing and the body of the vehicle. Because of the use of two spherical sockets that are mounted respectively in an upper and lower zone, the reference further teaches that a shock load acting obliquely from one side only will cause only one of the spherical balls to be displaced from the spherical socket and resume its original position through the use of one coil spring providing sufficient force to again engage the spherical ball with the spherical socket upon removal of the impact force. A similar arrangement is proposed for the fog and turn signal lamps, as well as for the rear lamps of the vehicle. As an alternative to the coil springs, a hydraulic, pneumatic or magnetic system that generates an appropriate force for restoring the position of the housing is also contemplated. A further attempt to allow headlamps to be mounted forward, flush with the front fascia of the vehicle, is discussed in Kodama et al., Japanese Patent JP3-208738-A2, wherein the headlamp is mounted to a guide rail spaced a predetermined distance from side frame members, and interconnected with a connecting bar whose lower end is connected to the side member and upper end to the movable frame containing the headlamp, and adapted for sliding on the guide rail. The torsion bar system has a front part mounted in close proximity to the bumper fascia so that upon impact the bumper fascia collapses and retreats, activating the crank portion of the torsion bar system whereby the connecting bars are pivoted to slide the headlamp in a rearward direction away from the area of the impact zone to prevent damage thereto. After restoration of the bumper fascia to its original position, through the use of impact absorbing material such as foam, the torsion bar system utilizes its stored energy to return the headlamp along the guide rails to its original forward position. An alternate embodiment discloses the use of a scissor-like two bar mechanism that operates in combination with a torsion bar system to retract the headlamp in a rearward direction upon impact and through the stored torsional energy in the torsion bar system return the headlamp to the original position upon release of the impact with the bumper fascia. As can clearly be observed from a review of the prior art, with the exception of German Patent DE 3802104-A1 and Japanese Patent 3-208738-A2, the prior art addressing of this problem only concerns fog lamps or turn signal lamps where damage criteria after impact, as established by government entities or original equipment manufacturers, is very low, or nonexistent. The proposal disclosed in the German reference relies mostly on a complex spring system to return the housing to its original position while the Japanese reference teaches that the bumper impact absorbing material will allow the pivoting mechanism cooperating therewith to return the lamp to its original position Since none of the bumper impact absorbing materials are required to return a headlamp to its original position by any automotive regulations, it is not possible to rely on such a system to permit controlling the headlamp to return to its original position after a bumper impact due to the strict regulations and tight tolerances on headlight aim patterns that would not allow any misalignment of aim pattern after impact outside of the tolerance limitations. Further, both the teachings of the German and Japanese patents have completely neglected the value of the space considerations surrounding the headlamp mounting area that directly reflects upon the forward placement of the engine and, in turn, the amount of space available in the passenger compartment of the vehicle. Accordingly, none of the systems provided in the prior art are adaptable to headlamps or taillamps that have strict regulations concerning damage after bumper impacts. Therefore, what is needed is a simple, cost effective headlight and/or taillight system that can be brought into the impact zone to provide designers the freedom to create flush, convex-shaped, aerodynamic front end systems for vehicles that after impact return to their original positions without damage and continue to operate within the limits of the specifications set forth for headlamps and taillamps for automotive vehicles.
{ "pile_set_name": "USPTO Backgrounds" }
Q: What is this English doing in the middle of my Japanese? Note: I understand this question is on the edge of being off topic. I'll accept the community assessement if enough people feel that is the case. I'm reading 脳{のう}は0.1秒{びょう}で恋{こい}をする by 茂木{もぎ}健一郎{けんいちろう}, and out of the blue, there's an English word right in the middle of a sentence: The sentence reads 人生{じんせい}は「偶有性{ぐうゆうせい}」(contingency)に満{み}ちています。 I think I basically understand it, in that it says life is full of contingencies. My question, though, is why is this English word here? The book is written by and for Japanese. The way the word is offered, it looks as though it is a clarification of 偶有性{ぐうゆうせい}, where 偶有{ぐうゆう} means having an accident, and 性{せい} means the suffix ~ness, so I guess it's supposed to approximate the word "contingencies". I just don't get how this would help a Japanese person reading the book? Does Mogi San expect that a Japanese person who doesn't know 偶有性{ぐうゆうせい} would be helped by knowing that it meant "contingencies"? That doesn't seem very likely to me. I appreciated it, because it helped me understand what he meant, but I don't think this is for the benefit of Japanese learners. What is going on here? A: Technical subjects usually have a large English-speaking community, and theses and books on that subject are often published in English (or some other international language, but you probably get a wider readership by publishing in English). It's important to know the English technical terms so you can understand those books and theses, so even when reading a Japanese technical book that introduces its terms in Japanese, it will often include the corresponding English terms in parentheses so that you're not completely confused when you try to read foreign material on the subject. Whether or not this particular sentence is actually from a technical work or field, and even if you are never likely to need to look it up anywhere else, the inclusion of an English word here reminds the reader of that kind of technical text, which does two things: emphasizes "this is an important word to this discussion" (so important you'd want to learn it in English too) creates a feeling of "this is a scientific explanation", and implies the presence of other information published elsewhere on the same subject that corroborates the statement Looking on Amazon, the cover of this book has a subtitle of 「『赤い糸』の科学」 on it, so it seems to fit the context.
{ "pile_set_name": "StackExchange" }
Indirect light is a pleasing manner of providing the light required for various tasks. With indirect light, less foot-candles (quantity of light) is required to provide the same illumination levels as with direct light. The infinite reflector series allows you the possibility of indirect illumination in the most unique and innovative way. Reflectors permit you to redirect light. The IRS (Infinite Reflector Series) offers the opportunity of infinite lighting design. You have a choice of reflective surfaces and shapes of reflectors to provide you infinite bouncing beams of light to illuminate various objects. You can with one source illuminate infinite objects or you can with infinite sources illuminate one object. You can redefine existing spaces with interceptors (reflectors) portable or fixed. The method of fixing to floors, walls or ceilings can be accomplished with clamps, suction cups, mounting plates, cables (stainless steel, nylon, rubber, rope, etc.), or tubes, as well as other means. Interceptors (reflectors) can be placed in inaccessible places while the lamp source is placed in an accessible location and obtain the same results as if the source were in an inaccessible location. As an example, in a ceiling of 30 feet or more, which might normally have recessed fixtures, you can place reflectors. The light source could be mounted on walls at 6 or 8 feet in height (easily accessible). The light would be directed towards the reflectors, which would in turn redirect the light in a similar manner of a downlight. The reflector, therefore, replaces the source of illumination. As a result, high ceilings no longer present a relamping problem. In addition, wiring cost savings can be achieved, as it may no longer be necessary to run wiring in the ceiling.
{ "pile_set_name": "USPTO Backgrounds" }
Party Leader Anna Troberg [ 23 Nov 2012 | inga kommentarer ] The Party Leader leads the Leading Group in their daily operations and is the party’s face outward. The Party Leader can decide upon political positions in line with the party’s principles between member meetings. Anna Troberg became Party Leader for the Pirate Party on January 1, 2011, after being deputy Party Leader since 2009.Anna was born in the year of ABBA winning in Brighton, 1974. She lives in Stockholm with her girlfriend and her three cats.Before starting off her political career she had several other character defining jobs. While studying she worked cleaning, sorting mail, designing wedding cakes, securing for Y2K and writing freelance. She has also been an English post-graduate, translator, publishing house executive and writer. Her humorous novel ”Chefer från helvetet” (”Bosses from Hell”) was published by Wahlström & Widstrand in 2007 under the pseudonym Rosetta Sten. The novel has also been published in Norway and Finland. You can ofcourse download it for free (in Swedish). Sharing is caring. Anna has eight shelves with different editions of Jeanette Winterson books. She can also brag with a glorious past in sports. For one year she was Borlänge champion in table tennis, football and shot-put. (She was 11 at the time, and emphasis lie on ”past” and not ”glorious”.) Dolly Parton is her homegirl and yes, she has a cardboard Xena in real life size watching over her while she’s working. It’s good for the creativity.
{ "pile_set_name": "Pile-CC" }
Background ========== The concept of self-management is not new and can be traced back in the UK to the start of the 20^th^ century \[[@B1]\]. Nevertheless, despite its longevity, defining self-management as a concept and clarifying its meaning for, and use, in practice has been found to be particularly challenging in the field of palliative care. Major obstacles to seeking clarity on self-management as a concept are that in spite of a plethora of available literature on self-management, the dominant focus is on managing chronic disease. However managing chronic illness presents patients and professionals with very different challenges to those found in palliative care \[[@B2]\]. An example of this is a UK government document, which defines self-care as 'the actions people take for themselves, their children and their families to stay fit and maintain good physical and mental health; meet social and psychological needs; prevent illness or accidents; care for minor ailments and long term conditions; and maintain health and wellbeing after an acute illness or discharge from hospital' \[[@B3]\]. Issues which are not the main focus in advanced disease when people are seriously ill, may lack functional capacity, and may be dependent on others for help. These issues and challenges are compounded by the ambiguity found in the terminology surrounding self-management, including the interchangeable use of similar terms such as self-care, self-efficacy, self-help \[[@B2],[@B4]\]. In a thematic analysis of the conceptualisation of self-care, self-management and self-management support in the long term conditions management literature, Jones et al. \[[@B5]\] found that the terms differed regarding the nature of the *imperative for action*. For instance, self-care is inevitable but includes choice; self-management is an inevitable activity whereas self-management support is an essential activity. Self-management support lies within context of coordinated networks derived from the health and social care system. This process is person-centred and any imperative for action is derived from the collaboration between people with long term conditions and thus improving support services. This concept analysis, therefore, is particularly focussed on self-management support. Political interest in self-management has also increased over the last decade, internationally, as governments attempt to contain the costs of health care, alongside addressing goals to improve health outcomes, patient satisfaction ratings and service delivery \[[@B3],[@B6]\]. This shift in the balance of care addresses the challenges associated with the increasing number of people suffering long-term conditions. Professionals, patients and politicians alike are, therefore, part of a trend in seeking health care and health service delivery solutions that are more patient focused and recognise the central role of patients in the care process. A factor that can affect self-care behaviors is health literacy. Health literacy is "cognitive and social skills which determine the motivation and ability of individuals to gain access to, understand and use information in ways which promote and maintain good health" \[[@B7]\]. Health Literacy includes skills and behaviours, that all people need, to for instance, find their way to the right place in a hospital, to fill out medical forms, and to communicate with healthcare providers. Poor literacy and numeracy skills can, therefore, result in difficulties in interpreting and performing self-care activities. This concept analysis was conducted as part of a larger study: Integrating Self-Management and Palliation Concepts (IMPACT), which was commissioned and funded by the ATLANTIS programme (Actions for Transatlantic Links and Academic Networks in Training and Integrated Studies) aimed at facilitating cooperation in higher education and vocational training in the European Union and the United States. The original study involved a partnership of four universities in Scotland, Lithuania, New York and Ohio. Two aims of IMPACT were the development of a comparative framework for policy analysis pertaining to palliative care and self-management and the creation of policy benchmarks for the delivery of palliative care to guide best practice in the management of self-care practices, in palliative care nursing in Europe and the Unites States of America (USA). Why exploring self-management support and palliative nursing is important ------------------------------------------------------------------------- Living with a life limiting condition, be it advanced cancer, or any other non-malignant disease, for which there is no cure, can have a devastating effect on a person. The impact can extend to psychological, social, physical, economic and cultural aspects of people's lives \[[@B8]-[@B10]\]. Individuals tend to cope as well as they can, with the support they have, whether that be from family or other sources, but often they do not have the information, skills or knowledge to make well informed decisions or the appropriate response \[[@B11]\]. Many patients do not understand what health professionals have said to them and do not, therefore, participate in decisions about their care, this leaves them ill-prepared to make daily decisions and take actions that lead to good care management. A collaborative relationship between nurses, health care teams, and patients and their families is, therefore important. Supported self-management in palliative care, by nurses, can, therefore, empower people to acknowledge the impact of their condition on their life, and enable them, where possible, to face the range of challenges they may have, and identify areas where they need further support, help or care \[[@B8]\]. In seeking to address the above issues this paper is concerned with exploring the issue of how self-management support in palliative nursing is conceptualised in the literature. Methods ======= Concept analysis ---------------- Concept analysis is considered a relatively new research approach, method or process \[[@B12]\] and is not an approach which is universally accepted \[[@B13]\]. The term concept analysis refers to the unfolding, exploring and understanding of concepts for the purposes of concept development, delineation, clarification, correction, identification, refinement and validation \[[@B14]-[@B17]\]. Walker and Avant \[[@B16]\] in the method chosen here, propose that; concepts are mental representations of a phenomenon or an idea, of an action or a thing that can accurately represents these occurrences within clinical practice. They advocate that the conceptualisation of concepts and their use in describing nursing practice is a stepping-stone towards the standardization of nursing language. In addition, concepts can be described as efforts to categorize information into meaningful constructs when applied to a phenomenon that occurs within the field of health care. A concept analysis is, therefore, a rigorous and precise process of operationalizing the defining characteristics and attributes of a phenomenon into a communicable understanding, and is undertaken using a structured framework \[[@B16]\]. Concept analysis is a method of conceptual knowledge representation and data analysis that can be used to clarify meanings and develop operational definitions, through considering evidence from multiple disciplines and sources. By applying a recognised methodological framework a more objective approach to concept clarification is accomplished. The systematic framework also means that the process is applicable within diverse scientific disciplines \[[@B16]\]. To guide the process of literature and analysis a modified version of the eight-step model presented by Walker and Avant was applied \[[@B16]\]. The eight steps of the model do not need to be, and were not, used in chronological order and can and were modified as the enquiry progressed. Table [1](#T1){ref-type="table"} outlines the 8 steps and whether and how applied for this concept analysis. ###### Walker and Avant concept analysis steps **Step** **Used in this concept analysis** -------------------------------------------------------------------------------------------------- --------------------------------------------- 1\. Select the concept Yes (dictionary definition-methods) 2\. Determining the aim or purpose of the analysis Yes (research question and aim-methods) 3\. Identifying all the known uses of the concept Yes (literature review-methods and results) 4\. Determining the defining attributes Yes (literature review- results) 5\. Identifying a model case ("real life" example, which contains all of the critical attributes No 6\. Identifying any of the borderline, related, contrary, invented and illegitimate cases No 7\. Identifying antecedents and consequences Yes (literature review- results) 8\. Identifying empirical referents   Selecting the concept --------------------- The concept self-management support and how it relates to palliative nursing will be analysed in this paper. In Walker and Avant's method the first stage is usually a literature review. ### Search strategy Primary data was identified by searching three online electronic databases via EBSCO Host: Medline, CinAHL and PsycINFO which cover literature from disciplines such as medicine, nursing, allied health, sociology and psychology. The key search terms are presented in Table [2](#T2){ref-type="table"}. ###### Search terms and key words **Search string/number** **Keywords** -------------------------- ----------------------------- 1 Self care 2 Self management 3 Self management support 4 1 or 2 or 3 5 Palliative care 6 Terminally ill 7 Terminal care 8 Hospice 9 Life limiting illness 10 End of life care 11 Nurs\$ 12 5 or 6 or 7 or 8 or 9 or 10 13 4 and 11 Search string in Medline, CinAHL and PsycINFO, keywords: 1. self care. The search led to 205 potential articles, with duplicates removed this left 165 to review. Of these 165 12 provided definitions of self-care and palliative care but no definitions of palliative nursing. A 'google' web search was also conducted for the terms palliative nursing, end of life care self-care, and self-management support. According to Web search workshop a UK consultancy service for optimising and marketing of websites users searching on the internet rarely go beyond the top 30 results \[[@B18]\]. Therefore, only the top 30 results were reviewed for keywords which always took longer than the 30 minutes to review the first 30 sites. This search string was then combined using Boolean operator 'OR' and 'AND'. Searches were limited only to the English language. Reference lists of all identified papers were scrutinised, hand searches of international journal of palliative nursing, grey literature and key websites was also conducted, using google and google scholar. The University of Dundee Library Catalogue and google scholar were also searched for key textbooks and book chapters. Additional websites were identified via links identified within the Google search and in collaboration with subject experts revealed additional websites, which yielded 11 potentially useful definitions or concepts. The top 30 results of a Google search were reviewed for the keywords of self-care and self-management support revealed 16 relevant articles. Key terms and words included self-care, self-management, self-efficacy and self-help. To place self-management in a professional context the palliative care and palliative nursing literature was examined to further elicit usage of the terms self-care and self-management (Google search Table [3](#T3){ref-type="table"}). ###### Google search and results **Google search term** **Number of useful results** ------------------------- ------------------------------ Self care 8 Self management support 8 Palliative care 8 Terminally ill 3 Terminal care 4 Hospice 11 Life limiting illness 7 Palliative nursing 5 End of life care 7 Inclusion and exclusion was applied to ensure that only relevant publications were included in the review (Table [4](#T4){ref-type="table"}). All titles and abstracts returned from the initial search were independently appraised by four authors. Full articles were obtained and appraised if they met the inclusion criteria. ###### Inclusion criteria for literature review **Inclusion** **Rationale** ---------------------------------------------------------- --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Published between 1990-2013 It was necessary to put time limits on the review. It was also determined that the majority of relevant literature was published during this period English text Due to budgetary constraints text other than English was excluded Described the results of empirical research publications Opinion or theoretical pieces were not included. It was determined that a more comprehensive review would be obtained if only empirical papers were used Adults only Palliative care and self care issues affecting children are different and palliative care services for adults and children are different, therefore only studies relating to adults were included Defining attributes palliative nurse Supportive Intensive caring, continuous knowing and continuous giving Fostering hope Providing comfort Proving an empathic relationship Being there Acting on the patients behalf Meeting the patients' needs Working together/teamwork Knows what they are doing Knowing the patient Dignity Providing information Results ======= Results reviewed by BJ and ER ----------------------------- ### Dictionary definitions The concept analysis framework identified by Walker and Avant indicates that definitions of terms are first sought as dictionary definitions *as part of identifying the concept.* Palliative ---------- Palliate has its origins in medieval Latin *palliativus*, from the verb *palliare* 'to cloak'. ### *Adjective* (of a medicine or medical care) relieving pain without dealing with the cause of the condition: *orthodox medicines tend to be palliative rather than curative.* (of an action) intended to alleviate a problem without addressing the underlying cause: *short-term palliative measures had been taken.* ### *Noun* A palliative medicine, measure, etc.: *antibiotics and other palliatives social projects presented as palliatives for the urban crisis oxford*\[[@B19]\]. Self-care --------- Self-care has been defined in the dictionary as: "The care of oneself without medical, professional, or other assistance or oversight" \[[@B20]\]. Self management support ----------------------- Self-management can be defined as the decisions and behaviours that patients with chronic illness engage in that affect their health. Self-management support is the care and encouragement provided to people with chronic conditions and their families to help them understand their central role in managing their illness, make informed decisions about care, and engage in healthy behaviours \[[@B21]\]. Self-management is 'the successful outcome of the person and all appropriate individuals and services working together to support him or her to deal with the very real implications of living the rest of their life with one or more long term condition' \[[@B22]\]. Support for self management is what services provide to encourage people to take decisions and make choices that improve their health, wellbeing and health-related behaviours \[[@B22]\]. Literature definitions of palliative care, palliative nursing and self managent support --------------------------------------------------------------------------------------- ### Palliative care Palliative care is among one of the fastest-growing specializations globally in the fields of nursing and medical education and referred to by current International government documents as not only focussing on death and dying but also on improving the quality of life for the patient and family \[[@B23],[@B24]\]. For almost a generation, to varying degrees, palliative care has been associated with total, active, holistic and therapeutic intervention/s, which focus on the quality of life for the patient and his/her family \[[@B24],[@B25]\]. The universal worldwide accepted definition is that proffered by the World Health Organisation (WHO) \[[@B26]\]. The WHO state that palliative care is an approach that improves the quality of life of patients and their families facing the problem associated with life threatening illness through the prevention and relief of suffering by means of early identification and impeccable assessment and treatment of pain and other problems, physical, psychological and spiritual. Palliative care: •provides relief from pain and other distressing symptoms; •affirms life and regards dying as a normal process; •intends neither to hasten or postpone death; •integrates the psychological and spiritual aspects of patient care; •offers a support system to help patients live as actively as possible until death; •offers a support system to help the family cope during the patients illness and in their own bereavement; •uses a team approach to address the needs of patients and their families, including bereavement counselling, if indicated; •will enhance quality of life, and may also positively influence the course of illness; •is applicable early in the course of illness, in conjunction with other therapies that are intended to prolong life, such as chemotherapy or radiation therapy, and includes those investigations needed to better understand and manage distressing clinical complications" \[[@B26]\]. Palliative nursing ------------------ The development of palliative care nursing has been part of a movement that has grown from roots in the nineteenth century, and particularly the second half of the twentieth century through the UK hospice movement and principally Cicely Saunders, who was originally a nurse \[[@B27]\] Seymour \[[@B28]\] argues that one of the clearest definitions of palliative nursing is that of Johnston \[[@B27]\] p. 2): "All life-threatening illnesses -- be they cancer, neurological, cardiac or respiratory disease -- have implications for physical, social, psychological and spiritual health, for both the individual and their family. The role of palliative nursing is therefore to assess needs in each of these areas and to plan, implement and evaluate appropriate interventions. It aims to improve the quality of life and to enable a dignified death" \[[@B29]\]. The palliative nurse, therefore, enters into a unique therapeutic relationship with the patient, which requires excellent communication skills and emphasises role aspects such as educator and information giver \[[@B27],[@B29],[@B30]\] and highlights their key involvement in the delivery of individualised, holistic care \[[@B27],[@B30]\]. The expert palliative nurse is someone who is interpersonally skilled, particularly in terms of the ability to be willing to listen, has personal humane characteristics such as warmth, kindness and compassion, and who helps the patient by meeting their needs, is there for them and provides them with emotional support, knows the patient as person and is knowledgeable, in particular, about pain and symptom control \[[@B27]\]. Self-management support ----------------------- As discussed previously, the political and professional agenda over the last decade has changed favourably in terms in of integrating self-management into the health care agenda. This interest has the potential to benefit greatly palliative care delivery and the development of palliative care services. The challenge remains, however, as to how this is accomplished and, in particular, how best self-management can be implemented in practice. It is recognised that incorporating the concept of self-management into palliative nursing practice brings additional challenges when managing symptoms at the end of life and when there is no known cure \[[@B7]\]. However, it is understood that if self-management can be utilised to a greater degree it will result in a better quality of life for patients and their families and may reduce the financial costs \[[@B7],[@B28]\]. Self-management has for a long time been associated with a process whereby patients deliberately act on their own behalf in health promotion and prevention of illness and the detection and treatment of health deviations \[[@B28]\]. It has, however, historically taken second place to the medicalisation of disease and the patient's passive acceptance of the care given by the medical and nursing professions. In examining the future potential of the concept for palliative care practice two observations are relevant. Firstly, up to the first decade of the twenty-first century most self-management strategies reviewed in the literature were professionally initiated and led \[[@B2]\]. Secondly, from a research perspective, few studies up to 2005 appeared to incorporate the patient's views on palliative nursing care, particularly the concept of the expert palliative nurse \[[@B27]\]. Nevertheless, the concept of self-management is not unique to nursing practice as the concept was identified in the latter half of the twentieth century as part of the development of nursing theory and models to define and support the principles of nursing practice linked to other concepts such as coping \[[@B31],[@B32]\]. Orem in particular championed the concept of self-management and defined it as the supported activities of individuals, in order to maintain health and wellbeing. Her research identified that deficits in self-management were often related to factors such as lack of knowledge, side effects of treatment, or physical, social and psychological aspects related specific to the individual \[[@B33]\]. These factors remain central to the consideration of self-management in the context of palliative nursing and Orem's model has relevance to palliative nursing as it links the concept to aspects of self-management in the contemporary literature, particularly in relation to wellbeing. Self-management in general has been shown to improve health outcomes, promote a feeling of well-being and improve the quality of life for those suffering incurable conditions \[[@B28]\]. A useful broad starting point to clarifying the meaning, relevance and use of the concept self-management in the context of palliative care and palliative nursing, is the definition put forward by Corner \[[@B34]\] (p.516). In palliative care the goal is to 'live with dying' with the focus on the self and not just the physical effects of illness. the following definition is, therefore, appropriate: maintaining ones usual practices of self-care, those things that are important and unique to oneself in maintaining ones sense of self; being given the means to master or deal with problems, rather than relinquish them to others". This definition emphasises the patient; 'being in control' and 'maintaining independence', which are important in end of life care \[[@B27]\]. This definition immediately places the patient at the centre of the care and caring processes. However, it also introduces the idea of self-management as part of the caring process. In countries where the focus of health care has moved from hospital to the community, many patients desire to be cared for at home, whenever possible, and the goal is often concerned with achieving patient and family choice \[[@B35]\]. This provides an ideal opportunity for the individual and his/her family to be involved fully in and have control of, their care. Health care policy has reinforced this objective incorporating self-management as an additional focus with emphasis on enabling patients to *manage* their own health and well-being \[[@B6],[@B35],[@B36]\]. While willingness and ability to self-management will change over time, it is also affected by the unpredictable nature and complexity of health related challenges with the person receiving palliative care \[[@B37]\]. Self-management challenges may be compounded by the plethora of information which is now available in the public domain. This is increasing more recently, with ease of access through information technology. These developments bring with them the potential of patients to access incorrect information \[[@B38]\]. Informed decision-making and knowing the patient's preferred choice \[[@B37]\] stress the importance of open and collaborative dialogue and knowledge of the patient's own story past and present. These recommendations imply that palliative care is a continuous process enabling the patient to cope with and respond appropriately to challenges as and when they arise and make choices and decisions about the future. These key aspects of self-management highlight the importance of 'knowing' the patient as a person \[[@B27]\]. They also highlight that in the field of palliative care, the facilitation of self-management brings additional challenges in managing symptoms and helping patients to live a life focused on quality as opposed to quantity (time). Moreover, an important issue for using self-management in practice is that not all individuals are either able to, or wish to, engage fully in self-management activities and that part of the professional's assessment is to identify the degree of self-management need and capability that is appropriate at any point in time \[[@B2]\]. Degrees of self-management engagement can be identified through robust physical and emotional management that enables the individual to adjust and match their self-management capability to their identified self-management needs, thus enabling them to stay in control of their unique and individual situation. Table [5](#T5){ref-type="table"} identifies the essential themes aimed at initiating and supporting self-management actions \[[@B8]\]. ###### **Supporting self-management: themes and sub themes**\[[@B8]\] **Theme** **Sub-theme** ----------------------------------- ------------------------------------------------------------------------------------------------------------------------- Maintaining normality Goal setting; How others treat you; Maintain normality-taking a break/holiday Preparing for death Euthanasia; Getting worse; Leaving family behind; Planning funeral; Process of dying Support from family/friends Carer support/information; Talking about difficult issues; Respite Self-cares strategies/physical Activities of daily living management; Aids to house; Complementary therapy; Financial help benefits; Managing symptoms Self-care strategies/emotional Accepting; Being positive; Choice; Control; Religion; Support from others with cancer Support from health professionals Clinical nurse specialist fixer/coordinator; Home help carer; Hospice day care; Out-of-hours care Various attempts have been made to clarify the terms self-management. For instance, it has been viewed as a transition and how people incorporate the consequences of illness into their lives \[[@B39]\]. As well as, associating the concept with the professional support and direction patients receive, including how to follow given instructions and manage other aspects of their condition \[[@B28],[@B31]\]. While these definitions allow to patients a semi-passive role in their care; they are also associated with active patient and professional collaboration in decision making, facilitating choice and decisions that support independent patient activities. While many of these factors are relevant to the palliative care context Johnston et al. \[[@B2]\] identify the description by Foster et al. \[[@B39]\] as most appropriate to palliative care as it highlights strategies used by individuals to enhance control and maximize wellbeing and the effects and approaches used by the individual to optimise living as closer than any other to being appropriate for people with advanced disease at the end of life. The capability to manage self-management appears to be associated strongly with the use of effective and robust assessment techniques, tools and processes, which are dependent on the patient with support from the nurse, assessing their own self-management needs and capability \[[@B2],[@B8],[@B28]\]. In addition, self-management in a palliative care context is linked to capability to control pain, manage other symptoms as well as evaluating the effectiveness of interventions. The concept of 'supported self-management' can, therefore, be said to embrace both self-care and self-management. In 'supported self-management' the concept of self-management can be linked closely to the patient's capability, while the professional is facilitating the patient to assess and identify their needs, moreover, self-management can be linked to outcomes of care and the patient's actual and potential capability to act in a way that meets their identified needs. Palliative care, therefore, needs to be underpinned by robust needs assessment, by the nurse, considering the patient's wishes, skills, behaviours and knowledge. The fundamental concepts underpinning palliative nursing assessment are that it is, *"... dynamic, Individualised, patient and family centred, sensitive and appropriate, holistic, therapeutic, contextual, comprehensive, based on reliable, current and valid information, evidence-based, driven by and focussed on process and outcomes"*\[[@B27]\]. This definition of assessment can be used to guide the professional to achieve the goal of supported self-management as a contemporary concept, with strong underpinnings in the effectiveness of the patient/professional relationship and the skills of the professional to support the patient in his/her self-management endeavours \[[@B5]\]. Assessment also brings into sharp focus the effectiveness of the Multi-Disciplinary Team (MDT) in supporting self-management. Johnston \[[@B8],[@B27]\] highlights the importance of effective collaboration and communication in supported self-management, which could be considered as the heart of the Multi-Disciplinary Team's (MDT). Key characteristics of self-management support in palliative nursing are, therefore, presented in Table [6](#T6){ref-type="table"} according to the Walker and Avant theoretical process. ###### Attributes of self-management and nursing role with author **Attribute** **Nursing role** **Author** ----------------------------------- ------------------------------------- ------------------------------------- Maintaining normality Knowing the patient Jarret et al., Skilbeck et al. Preparing for death Support Johnston et al., O'Berle and Davies Being there Zabalgui Comfort   Excellent communication skills Johnston et al. O'Berle and Davies Support from family/friends Emotional support Zabalegui Self-care strategies/physical Promoting independence Johnston et al., Rhodes et al. Good pain and symptom control Rhodes et al. Self-care strategies/emotional Promoting independence Johnston et al., Rhodes et al. support   Support from health professionals Teamwork Johnston et al. Referral role     Collaborating providing information Skilbeck et al. Antecedents and consequences ---------------------------- The identification of antecedents and consequences helps to refine the critical attributes and elucidate the contexts in which the concept is generally used \[[@B16]\]. Antecedents are factors that must be present before the occurrence of the concept whereas consequences are events that occur as a result of the concept. For supportive self-management in palliative nursing to occur we identified four antecedents; *presence of the nurse* and *spending time with the patient*; \[[@B27],[@B40]\]*development of a relationship with the patient,*\[[@B8],[@B27],[@B40]-[@B44]\]. *Skills, knowledge and expertise of the nurse*; \[[@B45]-[@B49]\], *team working and the ability of nurse to recognise when to refer on to other professionals or support services*. In analysing the concept of supportive self-management and palliative nursing this requires the demonstration of events that occur as a result of support being experienced/delivered. These consequences can be either a positive or negative experience for patients. Positive experiences for patients include feeling cared for and having their needs met; \[[@B27],[@B46]\] being informed \[[@B27],[@B47]-[@B50]\] and being supported \[[@B27],[@B48]\]. Negative experiences include pain and symptom control needs not met \[[@B51],[@B52]\] not having their needs met and not being supported, \[[@B27],[@B42],[@B43]\] as wellbeing unable to manage, particular in relation to activities of daily living \[[@B10]\]. Discussion ========== Strengths and limitations of the method --------------------------------------- The purpose of this analysis was to define the concept of self management support in relation to palliative nursing. Whist literature was retrieved from a variety of sources, certain limitations are worth mentioning. Literature in languages other than English were not accessed. A broader search could have produced a more comprehensive definition. Additionally, an alternative concept analysis method may have produced a different outcome. This concept analysis has identified that there is no universal definition of supportive self-management in palliative nursing. A clarified definition for nursing use based on this concept analysis is proposed below. Supportive self-management in palliative nursing is; *assessing, planning, and implementing appropriate care to enable the patient to live until they die and supporting the patient to be given the means to master or deal with their illness or their effects of their illness themselves.* The use of a model such as that proposed by Walker and Avant \[[@B16]\] was found to be beneficial in facilitating a systematic approach to literature retrieval, review and analysis. While stages 1 and 2 of the model were used to clarify the direction of travel and inform key words and terms for the literature review stages 3 -- 5 and 7 informed the focus of the analysis as well as the breadth and depth of literature retrieved. Stage 8 was important to supporting synthesis, which re-define self-management. Stages eight of the model helped to focus attention on the relevance and applicability of self-management to practice. Conclusions =========== For this concept analysis references to self-management were drawn mainly from chronic and disease management literature, as well as, the few articles on self-management available in the palliative care field. Self-management has been conceptualised in relation to how patients can gain and remain in control of their care process and how professionals can support this process. The concept analysis led to consideration of the extended concept of 'supported self-management'. The important role nurses have in supporting patients with palliative care needs to be able to maintain normality and independence and be in control for as long as possible is highlighted and to be encouraged. Figure [1](#F1){ref-type="fig"} is proposed as a guide to aid current discussion, for clinical practice and to aid further research and development of the concept 'supported self-management' in palliative care nursing and education. ![Characteristics and attributes of palliative nursing and supported self care.](1472-6955-13-21-1){#F1} Competing interests =================== The authors declare that they have no competing interests. Authors' contributions ====================== BJ devised the concept analysis and wrote the first draft ER contributed to the first draft and edited future drafts AB and JM and PC helped devise the concept analysis and edited the first draft. All authors read and approved the final manuscript. Pre-publication history ======================= The pre-publication history for this paper can be accessed here: <http://www.biomedcentral.com/1472-6955/13/21/prepub> Acknowledgments =============== This concept analysis was carried out as part of an EACEA/FIPSE funded policy orientated measure grant 2010--2013.
{ "pile_set_name": "PubMed Central" }
1. Field of the Invention The present invention relates to a production system that is configured by disposing, downstream of a supply device for supplying foodstuffs or other such articles, a plurality of constituent devices including a weighing machine for weighing articles, a packaging machine, and a seal checker or another such quality inspection device. 2. Background Information In conventional practice, production systems in use include a weighing unit for weighing foodstuffs or other such articles supplied from a supply unit, a packaging unit for packaging the weighed articles, a quality inspection unit for detecting the quality of the packaged articles, and other various devices. For example, Japanese Laid-Open Patent Application No. 9301327 (published Nov. 25, 1997) discloses a management method and a management device (production system) for a production line that varies the set capacities of certain devices according to the processing capacities (yield rate) of other devices disposed downstream when operation is initiated or during operation. Since the set capacities of these devices are varied on the basis of the processing capacities (yield rate) of the other devices, the yield rate of the entire production line can be improved, and higher capacities can be elicited from the devices to improve production efficiency. However, this conventional production system has the following problems. Specifically, in the production system disclosed in the aforementioned publication, the set capacities are varied on the basis of the processing capacities (yield rate) of the devices, making it impossible to deal with problems such as a lack of uniformity in the rates at which articles are fed from the supply unit in the weighing unit during operation and halted operation of one weighing unit in a plurality of weighing units. For example, when articles are supplied from the supply unit at non-uniform rates while the set capacities of the supply unit for supplying articles to the weighing unit are kept constant, the set capacity of the weighing unit is set in accordance with the setting of the supply unit. Therefore, fluctuations in the supply rates cannot be appropriately dealt with merely by performing control based on the processing capacities or the yield rates of the devices, and production cannot be carried out efficiently. When the operation of a single weighing unit among a plurality of weighing units is halted due to a malfunction, a control procedure is performed to increase the set capacities of the other weighing units because the operating rate of the single weighing unit is zero. However, in such cases as well, merely allocating a processing rate that is proportionate to the operating rate reduction to the other weighing units brings the operating rate of the other weighing units closer to the maximum set capacities, and may instead result in a lower yield rate and reduced production quantities. In view of the above, it will be apparent to those skilled in the art from this disclosure that there exists a need for an improved production system in which high production efficiency can be maintained in the entire production line, even in cases in which the articles are actually supplied from the supply unit at non-uniform rates, some of the weighing units, packaging units, quality inspection units, and other constituent units stop operating, and/or other problems occur. This invention addresses this need in the art as well as other needs, which will become apparent to those skilled in the art from this disclosure.
{ "pile_set_name": "USPTO Backgrounds" }
How the University handles your information The University of Manchester handles a wide variety of information which is used for teaching, learning, research, commercial and administrative activities. The University's Information Governance Office (IGO) provides a framework of people, policies and technical and organisational controls to help protect this information, promoting openness but mindful of the needs and rights of individuals who entrust their personal data to the University and the requirements of other interested parties, funding and regulatory bodies. Through a network of Information Governance Guardians, we provide training, support and guidance to enable staff to ensure that information is created, used, archived and disposed of appropriately and in accordance with records retention requirements. The use of some information is constrained either by legislation, such as current data protection law, or in order to protect the interests of the University, while other information may need to be made freely available, such as information in response to freedom of information legislation requests and research papers. The IGO co-ordinates responses to these requests. Information is a valuable asset to the University and we facilitate a risk-based approach to ensure these assets are protected. If incidents occur which jeopardise the confidentiality, integrity or availability of this information, we ensure that appropriate action is taken to minimise any harm or distress to individuals or impact on the University, and requires that arrangements are put in place to prevent the incident reoccurring. Vision Our vision is: To build and embed an Information Governance framework to establish best practice, ensure the University’s legal and statutory compliance and to achieve a recognised standard of excellence. To challenge established processes, manage risks, develop policies and provide guidance to ensure leadership and staff process all information in a secure, consistent way.
{ "pile_set_name": "Pile-CC" }
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) Katrina L. Robinson, ) ) Plaintiff, ) ) v. ) civil Acri@n N@. 12 0 ) 073 President Barack Obama et al., ) ) Defendants. ) ) MEMORANDUM OPINION This matter is before the Court on review of plaintiff s motion for a temporary restraining order ("TRC)"), which is accompanied by her complaint and application for leave to proceed in forma pauperis The Court will grant the z`n_forma pauperis application, deny the TRO motion, and dismiss the case pursuant to 28 U.S.C. § l9l5(e)(2)(B), which requires dismissal of a complaint that is found to be frivolous. Plaintiff is a resident of Richmond, Virginia, who is suing President Barack Obama and Pastor Tony Smith of Baltimore, Maryland. See Compl. Caption. She alleges that Smith "has presented to numerous Police Departments and Media Outlets an Executive Order to force the Plaintiff (Katrina Robinson) a public prostitute." Compl. at l (parenthesis in original). According to plaintiff, "[t]he latest presentation" was at a shelter in San Antonio, Texas. Id. Plaintiff seems to claim that as a result of the alleged executive order, she is under surveillance by the FBI and "a group of people from Baltimore, MD" who allegedly is "promoting me as a prostitute across state lines." Id. She alleges that Smith “claims to have permission from the white house to publish naked pictures, false media to TV stations, offer satellite TV’s [sic] for o public viewing and false newspaper articles (including Camden Yards, Walmart, and H.E.B. markets). Id. (parenthesis in original). In addition, plaintiff alleges that "[f]ootage is being distributed in several regions: MD, NC, TX, to judges, media and online[,] [and that] a Facebook group [is] dedicated to this effort.” Id. She seeks, among other relief, "all documents issued by the President, his cabinet, or administration with my name identified as the person of interest . . . .," and "[a]ll documents distributed by Pastor Tony Smith, his membership, or business affiliates with my name identified as the person of interest . . . ." Ia’. at 2. ln the TRO motion, plaintiff seeks an order directing defendants to "cease" from issuing executive orders and "memorandum [sic] developed & implemented by the President naming me as person of interest[,]" and any "accompanying orders given to militia, FBI Agents, or Secret Service Agents [,] [and the Richmond, Virginia, police department] to have me restrained or restricted or arrested." TR() Mot. at l. A complaint may be dismissed under 28 U.S.C. § l9l5(e)(2) as frivolous when, as found here, it describes fantastic or delusional scenarios, or contains "fanciful factual allegation[s]." Neitzke v. Williams, 490 U.S. 319, 325 (1989); see Best v. Kelly, 39 F.3d 328, 330-31 (D.C. Cir. l994). Furthermore, a complaint must be dismissed when, as also found here, it is so "patently insubstantial" as to deprive the Court of subject matter jurisdiction. Tooley v. Napolitano, 586 F.3d 1006, l0l0 (D.C. Cir. 2009); accord Cala’well v. Kagan, 777 F. Supp.Zd 177, 178 (D.D.C. 201 l). Because the complaint is frivolous, no basis exists for issuing a TRO. Accordingly, a separate order denying plaintiffs TRO motion and dismissing the case accompanies this Memorandum Opinion. y /“ / § Un` dSt ?/IF trictJudge Date: January l_/\_, 2012 ' ‘/}(p/.,LL,?
{ "pile_set_name": "FreeLaw" }
Haematologists' approaches to the management of adolescents and young adults with acute leukaemia. Approaches to the management of adolescents and young adults with acute leukaemia were investigated by sending a questionnaire to hospitals identified as having diagnosed or treated patients aged 15-29 years. The responses demonstrated the types of hospital treating these patients, the haematologists' perceived practice for entry of patients to Medical Research Council (MRC) leukaemia trials and reasons for non-entry. Data were linked to MRC trials data to determine the proportion of patients aged 15-29 years at diagnosis in responding hospitals actually treated in MRC leukaemia trials in the 5 years preceding the questionnaire. Eighty-two per cent of haematologists stated that they entered patients 'always' or 'whenever possible' for acute myeloid leukaemia (AML) and 76% for acute lymphoblastic leukaemia (ALL), but actual entry rates from the study hospitals were 46% of 239 AML patients and 36% of 182 ALL patients. The reasons most commonly reported for not entering eligible patients to national leukaemia trials were clinician preference for one arm of an MRC trial, a regional study or non-trial protocol, and concern about workload and ethical approval.
{ "pile_set_name": "PubMed Abstracts" }
It seems that everywhere you look, Maroon 5 are smashing another record, dropping another classic, making another surprise collaboration, or just plain astounding you with the seemingly endless run of creativity that Adam Levine and co seem to enjoy. Not just charting the history of a band, Maroon 5’s best moments trace the development of pop music in the 21st Century, whether it’s revelling in their gleefully genre-blind mash up of styles, or harnessing the power of social media and their devoted fanbase to create truly astonishing moments that will go down in history. With their much-anticipated Super Bowl performance seemingly set to add another to the list, we take a look at ten of Maroon 5’s best moments. Listen to the best of Maroon 5 on Apple Music and Spotify, and scroll down to read our pick of Maroon 5’s best moments. 10: The band ask fans to help with The Daylight Project Sometimes the flashier tracks get all the glory, but ‘Daylight’ – from Maroon 5’s fourth album, Overexposed – proves that slow burners can often linger the longest. Released in November 2012 as Overexposed’s third single, the song showcased the melodic charisma of the band’s softer material and gave Maroon 5 another US Top 10 success. Acclaimed producer Jonas Åkerlund crafted an innovative video from The Daylight Project, a platform where fans could share their thoughts and feelings. Frontman Adam Levine has said many times that ‘Daylight’, created with legendary hitmaker Max Martin, is his favourite track on Overexposed. 9: ‘This Love’ becomes an international smash The band’s debut single, ‘Harder To Breathe’, had nibbled at the upper tiers of the charts, but this – the band’s second single – was their big international breakthrough and their first radio staple, likely to feature on playlists for decades to come. Adam Levine wrote the song with keyboardist Jesse Carmichael and it ended up becoming the third most-played song of 2004, earning the band a Grammy for Best Pop Performance. Written about Adam’s relationship at the time, ‘This Love’ bears all the hallmarks of classic Maroon 5: soulful melody, a rocky spine and an assured, memorable vocal from the band’s charismatic frontman. The videos would get a little slicker, but the ‘This Love’ secured an MTV Award for Best New Artist and would showcase what was to come. The earliest among a long list of Maroon 5’s best moments. 8: The ‘Payphone’ video breaks the bank, unnerves parents By 2012, Maroon 5 videos had become marquee events, but ‘Payphone’, featuring rapper Wiz Khalifa, had the sort of big-budget treatment you would expect from a Hollywood blockbuster… It’s the clip you’ll most likely find in a Maroon 5 time capsule. The sharp way the band’s compositions flirted successfully with contemporary pop styles is clearly in evidence here – ‘Payphone’ fit easily in pop and urban playlists, and, while its explicit lyrics and the video’s edge-of-your-seat drama unnerved parents, there’s no doubting this was Technicolor, widescreen Maroon 5, fast on their way to becoming the biggest band in the world. 7: Maroon 5 give newlyweds the wedding present of their lives with ‘Sugar’ Distancing this summery pop standard from its simple yet effective video treatment is now almost impossible – a testament to the band’s visual flair. From a run of great video performances, ‘Sugar’ actually takes one of the simplest approaches. Casting Maroon 5 as the ultimate LA wedding band adds a magic accessibility to a song that was lifted from 2014’s V; despite being the third single taken from the album, ‘Sugar’ would become the biggest of them all. Written with Mike Posner, it was performed on TV shows, including The Voice, but no matter how good those appearances were, it’s the great video we’re always going to return to, easily staking its claim among Maroon 5’s best moments. 6: A single Ellen performance of ‘Don’t Wanna Know’ hits big on both sides of the Atlantic Kendrick Lamar guested on the first single from Red Pill Blues, but wasn’t featured in the kooky Pokémon-inspired video. Benny Blanco shares production duties on the song, neatly bridging contrasting aspects of Maroon 5’s work: contemporary dance influences, soul and R&B top-notes, and the rock foundations that all their songs are built on. Performing ‘Don’t Wanna Know’ live on Ellen for the first time helped the band score another Top 10 hit on both sides of the Atlantic in 2016. 5: ‘She Will Be Loved’ proves they were no one-trick ponies Following a first big hit is a challenge that many bands fail at, but Maroon 5 bettered ‘This Love’ with ‘She Will Be Loved’ – a powerful ballad that further broadened the band’s audience away from its alt.rock base. In Australia, the song introduced the group to the top of a singles chart, three years before they reached the same position stateside (though ‘She Will Be Loved’ matched the No.5 placing of ‘This Love’ in their homeland). Sophie Muller steered the band’s first truly memorable video production with a clip that starred actress Kelly Preston trapped in a complex love triangle involving Adam Levine. The impact Down Under led to Australian singer Kate Ceberano being one of the first artists to cover a Maroon 5 song when she recorded ‘She Will Be Loved’ for her So Much Beauty album four years later. 4: The ‘One More Night’ Live On Letterman shows everyone how its done As the second single from Overexposed, ‘One More Night’ was heavily promoted across a range of TV slots and live shows, but it’s the Live On Letterman performance in New York that goes down as one of Maroon 5’s best moments in front of the cameras, showcasing the then-five-piece at their tightest. Shellback and Max Martin collaborated on the track, and the dramatic video, which amped up Adam Levine’s sex appeal to red-hot pitch, is among their most memorable. Keyboardist and guitarist Jesse Carmichael was on a break from the band during the creation of Overexposed, but PJ Morton stepped into the breach after a spell supporting the group’s live shows. The song became another Billboard chart-topper for Maroon 5 and reached the Top 10 in the UK. 3: ‘Makes Me Wonder’ makes Billboard chart history There’s a moment when you know a group are in it for the long haul. ‘Makes Me Wonder’ was Maroon 5’s inaugural US chart-topper and launched the It Won’t Be Soon Before Long album in 2007, signalling that important gear change to the world. The band’s soul and funk influences were truly front of stage for the first time, helping the catchy track make Billboard chart history, when it registered one of the biggest-ever jumps to the top spot, vaulting from No.64 to the pole position. The song secured another Grammy win for Best Pop Performance and saw the band celebrated as innovative songwriters who were prepared to experiment and adapt their sounds to accommodate contemporary influences. ‘Makes Me Wonder’ might have borrowed its hooks from dancefloors of the past, but it had its sights fixed firmly on the future. 2: ‘Girls Like You’ makes a potent statement for the 21st Century Maroon 5’s fourth US chart-topper, recorded with rapper Cardi B, is one of those infectious earworms that we’ll likely still be humming decades from today. Its simple, nagging hooks build and build, and saw the track – the third single from Red Pill Blues – become one of the biggest radio hits in years (and arguably the biggest 21st-century hit to date). The clever video, featuring a host of celebrity cameos alongside Adam Levine, chimes perfectly with contemporary culture, which is now finally looking hard at how we treat each other. A simple, understated celebration of women that makes its point with potency, ‘Girls Like You’ easily ranks among Maroon 5’s best moments. 1: ‘Moves Like Jagger’ gets approval from the man himself In the unlikely event that someone doesn’t know who Maroon 5 are, they’ll certainly know this song, which broke records to become one of the world’s biggest selling singles of all time, and tops our list of Maroon 5’s best moments. Adam Levine’s fellow-The Voice coach Christina Aguilera was drafted in to guest on the final single release from a repackage of 2010’s Hands All Over album, while the Jonas Åkerlund video was another gem that still receives regular airplay. Mick Jagger called the homage “very flattering”, but has joked that he’d wished he could collect royalties from the track. A perennial party favourite since 2011, it’s been nagging him ever since! Looking for more? Discover the best Maroon 5 songs of all time.
{ "pile_set_name": "OpenWebText2" }
Tuesday, April 23, 2013 The BabbyFamily House Tour Pt. I: Welcome! At my house, 99% of visitors come in through the kitchen, so I thought it makes sense to start my house tour in what is clearly the heart of my home. Is your house like that, too? I swear I have a living room, but guests nearly always end up in the kitchen! It's weird, too, because we don't have like epic levels of seating. Two grownup chairs, the Tripp Trapp, and the hairpin leg bench I made, plus Bo's way too big highchair now. People are so drawn to the kitchen that they don't mind standing! Can you tell I love red? I also love having the art supplies out where we can get at 'em. Here's my kitchen clock, and here's where I say 'I made that!' We have bright purple kitchen cabinets. The mister was originally anti purple but I convinced him and now he loves it. Before the purple, we had dark brown wood cabinets. Dark brown in a tiny south-facing kitchen. Seriously. Free printables, woo! I originally wanted to put some kind of framed picture over the stove - where there's not enough room to put much anything else. But I didn't have any frames and I did have paint, so this was the result. We <3 coffee! A certain someone convinced me that repainting with chalkboard paint would be a bad idea, so I compromised with a chalkboard panel. We have fun posting recipes and messages to one another so I consider it worth the hassle of wiping up chalk dust. It's a fridge. It's an art gallery. It's a strategic planning center. How much stuff is hanging on your refrigerator at any given time? And that's my kitchen! Stay tuned for House Tour Pt. II, coming tomorrow... probably. I'll be giving you a glimpse into the kids' rooms! I LOVE your table area. All that color makes me happy. We use a lot of red in our house too, but this makes me really want to pump it up! Don't think I'll go with purple cabinets, though (yours look fantastic)
{ "pile_set_name": "Pile-CC" }
import { Badge } from 'terra-icon/package.json?dev-site-package'; import ChangeLog from 'terra-icon/CHANGELOG.md'; <Badge /> <ChangeLog />
{ "pile_set_name": "Github" }
Gérald Fauteux Joseph Honoré Gérald Fauteux, (October 22, 1900 – September 14, 1980) was the 13th Chief Justice of Canada from 1970 to 1973. Born in Saint-Hyacinthe, Quebec, the son of Homère Fauteux and Héva Mercier, he studied at the Université de Montréal and graduated with an LL.L in 1925. Called to the bar that year, he settled in Montreal, where he practised with his grandfather, Honoré Mercier Jr., forming the law firm of Mercier & Fauteux. From 1930 to 1936, he was Crown Prosecutor for Montreal, and in 1939 he became Chief Crown Prosecutor of the province of Quebec. In 1946 he was a legal adviser with the Royal Commission on Spying Activities in Canada. He taught criminal law as a sessional lecturer at McGill University for 14 years and was the dean of the Faculty of Law from 1949 to 1950. In 1947 he was appointed to the Quebec Superior Court and to the Supreme Court of Canada on December 22, 1949. He was also one of the founders of the University of Ottawa's law faculty, serving as dean from 1953 to 1962. He was appointed the Chancellor of the University of Ottawa in 1973. On March 23, 1970, he was named Chief Justice of Canada, retiring on December 23, 1973, having served for 24 years on the court, four as Chief Justice. In 1974 he was made a Companion of the Order of Canada. Fauteux Hall which houses the Faculty of Law at the University of Ottawa is named after him. Chief Justice Fauteux died on September 14, 1980, at the age of 79 and was interred in the Notre Dame des Neiges Cemetery in Montreal. His brother was the politician Gaspard Fauteux. External links Supreme Court of Canada biography Order of Canada Citation Category:1900 births Category:1980 deaths Category:Chancellors of the University of Ottawa Category:Chief Justices of Canada Category:Justices of the Supreme Court of Canada Category:Companions of the Order of Canada Category:French Quebecers Category:People from Saint-Hyacinthe, Quebec Category:Lawyers in Quebec Category:Université de Montréal alumni Category:20th-century Canadian lawyers Category:Université de Montréal Faculty of Law alumni
{ "pile_set_name": "Wikipedia (en)" }