text
stringlengths
24
612k
Q: Can I do "special subscribe" to one of the properties in Vue2? I have view component that displays info about RECORD. This component contains contains some properties for description of user interactions with view (let's say it is lastPushedButton). So I need to reset this lastPushedButton property when view is receiving new RECORD's model. I have tried to use updated event but then it resets lastPushedButton everytime something changed, not only RECORD. What is the right approach? A: I assume your record is passed in via a property to your component? What you probably want is a watch on your property variable: https://vuejs.org/v2/guide/computed.html#Watchers watch: { record: function (newValue, oldValue) { this.lastPushedButton = '' } },
It has already been proposed to provide a process for the removal of particles from a flowing medium in a filter device operating by a repetition of three main working phases. The filter chamber is provided with closable inlet and outlet openings and can be formed with a support fabric for a filter layer, this fabric subdividing the chamber into two compartments. In each deposition phase, a filter-aid agent, i.e. a fibrous or particulate material, is entrained by a carrier medium through the filter cloth from an upstream compartment to a downstream compartment to deposit a layer of this filter aid in the form of a filter layer upon the support fabric. In each filtering phase of the sequence, the medium to be filtered is introduced into the upstream compartment and traverses the filter layer upon which its particles deposit. The purified filtrate is removed from the downstream compartment. The third or final main phase in the operation of such a system is a cleaning phase in which the contaminated filter layer is backwashed from the support fabric and removed from the upstream compartment. A process of this type has been described in German Pat. DT-PS No. 965 850. In this process, surface water is filtered to remove impurities. In this case, the backwashing uses a clarified or purified liquid, namely, the filtrate from a previous filtering stage. This filtrate loss during the backwashing to release the deposited filter layer can be considered acceptable only if the filtered medium is not especially valuable or is not available only in limited quantities. This may be the case for water but is usually not the case for other liquids and hence this process has been found to be practical only for water filtration. A similar process is described in Austrian patent AT-PS No. 316 583. In this process, backwashing is carried out with the filtrate in such manner that a mixing of the medium to be filtered with the filtrate during the cleaning phase is unavoidable. Since this process also deals only with the cleaning of water, the disadvantage is only of limited significance. However, with the filtration of valuable liquids, which are only produced in small quantities, i.e. in a variety of processes in which losses of the filtrate are undesirable and a mixing of the washing medium and the medium to be filtered can occur, problems have been encountered with the prior-art systems. This is especially the case in the production of wine and beer where filtration is necessary. In such cases, the filtered elements must be removed, cleaned, and re-introduced into the processing line if contamination of the filtered product as a result of the backwashing is not to occur. Such procedures are time-consuming and limit the size of the apparatus which can be utilized because of the need to manipulate the filter surfaces at frequent intervals. It is frequently necessary to provide a large number of filter surfaces to minimize the down time of the apparatus and increase the interval between two cleaning operations. In filter systems for such comestible materials of relatively high value, the filter-aid agent is usually a high-quality expensive substance, such as kieselguhr (a silica) which is added to the medium during the filter process so that the filter process also involves a progressive increase in the size of the filter layer. Both this type of filtering operation and the subsequent cleaning have been found to require extremely high operating pressures and the use of such high pressures necessitates the formation of a pressure-resisting filter device. Such filter units, capable of resisting the significantly elevated pressures required by the processes, are extremely expensive, create cleaning difficulties, and can only be operated at high energy cost. Filter devices are also known for the recovery of solid particles. The residues of the medium to be filtered are removed so far as possible by pressing the filter cake formed on the filter layer. Sych a system is described, for example, in Swiss Pat. CH-PS No. 399 422. The filter cake is then washed and dried, e.g. as described in German open application DT-OS No. 1 805 478. For the pressing of the filter cake, movable walls, e.g. membranes, can be used and can be urged against one another by pressurization of compartments defined between these membranes and other walls of the filter chamber. The filtrate is usually intended to run off through grooves in the movable walls. After the filter cake has been pressed, the filter device is usually opened and the filter cake removed. Obviously, in such case, it is of no significance that backwashing does not use the filtered medium. The process there described is not satisfactory when the material removed on the filter layer is contaminated or is not readily handled. It will not be effective, moreover, when a coherent filter cake is not formed. It is obvious from the foregoing that conventional filter systems, whether they use the backwashing technique or the filter cake removal technique, have disadvantages especially when the processes are intended for the removal of biological materials from a liquid. Other prior art systems are described for example in German patent document (Auslegeschrift) No. 1,761,617 and British Pat. No. 786,570.
IVF Clinical Trial of Two Different Treatment Protocols. The safety and scientific validity of this study is the responsibility of the study sponsor and investigators. Listing a study does not mean it has been evaluated by the U.S. Federal Government. Read our disclaimer for details. The purpose of this study is to compare two different in vitro fertilization (IVF) treatments: conventional IVF protocol and minimal stimulation IVF protocol, in terms of success rates, stress of treatment, drug-related side effects, multiple pregnancies and cost of treatment. Condition or disease Intervention/treatment Infertility Other: in vitro fertilization (IVF/ICSI) Detailed Description: A random population of 564 sub-fertile women or couples with a female between ages of 18 and 38 years and a desire to undergo their first IVF cycle will be included in this outpatient clinical trial. The participation in this study will be approximately six months with a total of 20 to 25 visits. After successful completion of the pre-screening tests participants are randomized into one of the two arms of the study: Arm A - mini IVF protocol, and Arm B - conventional IVF protocol. The Mini IVF method entails pre-treatment with oral contraceptive pills. Ovarian stimulation is achieved using an oral anti-estrogen in conjunction with injections of gonadotropin (225IU-600IU per cycle), with initial dose of 75IU-150IU per injection. Ovulation is induced by a GnRH (gonadotropin-releasing hormone) agonist nasal spray/hCG (human chorionic gonadotropin) injection. Retrieved oocytes following in vitro fertilization (IVF/ICSI) are cultured to the blastocyst stage. Blastocyst stage embryos are vitrified using the CryoTop method. No fresh embryo transfer is conducted. Subsequently, SET of a thawed blastocyst is performed in a natural cycle/HRT that does not involve ovarian stimulation. SETs are conducted until pregnancy is achieved or all vitrified blastocysts have been used. Other: in vitro fertilization (IVF/ICSI) Active Comparator: Arm B - Conventional IVF The standard IVF method entails pre-treatment with a GnRH analog injections in the midluteal phase. Controlled ovarian hyperstimulation is achieved with injections of gonadotropin (150IU-300IU/day). Ovulation is induced by hCG injection and retrieved oocytes following in vitro fertilization (IVF/ICSI) are cultured to the blastocyst stage. If this occurs on day 5, then fresh SET/DET (single embryo transfer/double embryo transfer) is performed. Remaining blastocysts are cryopreserved and transferred in subsequent natural cycles/HRT (hormone replacement therapy) that does not involve ovarian stimulation. Choosing to participate in a study is an important personal decision. Talk with your doctor and family members or friends about deciding to join a study. To learn more about this study, you or your doctor may contact the study research staff using the contacts provided below. For general information, Learn About Clinical Studies.
Differentiating between spatial and object-based working memory using complex stimuli: an erp study. Event-related potential studies using simple low-level stimuli have associated early visual-spatial processing with P1 amplitude, and early visual object-based processing with N2 amplitude. Other studies have linked later spatial processing and spatial working memory with posterior slow wave activity. Using complex real world representations in a matched object and spatial processing task, P1 was found to reflect spatially based information, and N2 was found to reflect object-based information. Furthermore, object-based working memory was associated with larger slow wave amplitude compared with spatial working memory, raising the possibility that spatial and object-based working memory utilize common processing resources.
Q: Android - Errors when trying to change activities For some reason this came up when trying to switch activities. I've had no problem running the same kind of code with other activities in this project. I'll post the code and see if anyone can figure it out ;( I can't get my error to format right in this, so here's the error log http://textuploader.com/oe6g Here's my different activities. The Problem occurs when I click on the button in my New Game Activity Layout, and that button runs the confirm(View view) NewGameActivity.java public class NewGameActivity extends Activity { EditText title; TextView team1, team2; SqliteHelper db; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_newgame); //ListViews team1 = (TextView) findViewById(R.id.textView4); team2 = (TextView) findViewById(R.id.textView5); title = (EditText) findViewById(R.id.editText1); db = new SqliteHelper(this.getApplicationContext()); populateListViews(); registerClickCallback(); } /* * * Database Functions * */ /* * * ListView Stuff * */ private void populateListViews() { // THIS HERE WILL POPULATE BOTH TEAM LIST VIEWS //Create list of items Cursor cursor = db.getTeams(); ArrayList<String> values = new ArrayList<String>(); if (cursor != null && cursor.getCount() != 0) { cursor.moveToFirst(); while (!cursor.isAfterLast()) { values.add(cursor.getString(cursor.getColumnIndex("Team_Names"))); cursor.moveToNext(); } } //Build Adapter ArrayAdapter<String> t1adapter = new ArrayAdapter<String>( this, // Context R.layout.teamlistviews, // Layout to use values); // Items to be displayed ArrayAdapter<String> t2adapter = new ArrayAdapter<String>( this, // Context R.layout.teamlistviews, // Layout to use values); //Configure the List View ListView t1list = (ListView) findViewById(R.id.listView1); t1list.setAdapter(t1adapter); ListView t2list = (ListView) findViewById(R.id.listView2); t2list.setAdapter(t2adapter); } private void registerClickCallback() { //This uses the List View and adds a listener to check for clicks/taps on different //list view items. It will then display a message telling you which one you have selected. ListView t1list = (ListView) findViewById(R.id.listView1); ListView t2list = (ListView) findViewById(R.id.listView2); t1list.setOnItemClickListener(new AdapterView.OnItemClickListener() { @Override public void onItemClick(AdapterView<?> parent, View viewClicked, int position, long id) { //team 1 TextView textView = (TextView) viewClicked; //Changing team name TextView t1 = (TextView) findViewById(R.id.textView4); String team1 = textView.getText().toString(); t1.setText(team1); //Toast message String message = "You Selected " + textView.getText().toString() + " for Team 1"; Toast.makeText(NewGameActivity.this, message, Toast.LENGTH_SHORT).show(); } }); t2list.setOnItemClickListener(new AdapterView.OnItemClickListener() { @Override public void onItemClick(AdapterView<?> parent, View viewClicked, int position, long id) { //team 2 TextView textView = (TextView) viewClicked; //Changing Team name TextView t2 = (TextView) findViewById(R.id.textView5); String team2 = textView.getText().toString(); t2.setText(team2); //Toast message String message = "You Selected " + textView.getText().toString() + " for Team 2"; Toast.makeText(NewGameActivity.this, message, Toast.LENGTH_SHORT).show(); } }); } public void confirm(View view) { String t1, t2, gTitle; t1 = team1.toString(); t2 = team2.toString(); gTitle = title.toString(); Intent intent = new Intent(this, CourtActivity.class); intent.putExtra("TEAM1", t1); intent.putExtra("TEAM2", t2); intent.putExtra("GAME_TITLE", gTitle); startActivity(intent); } @Override public boolean onCreateOptionsMenu(Menu menu) { // Inflate the menu; this adds items to the action bar if it is present. getMenuInflater().inflate(R.menu.new_game, menu); return true; } @Override public boolean onOptionsItemSelected(MenuItem item) { // Handle action bar item clicks here. The action bar will // automatically handle clicks on the Home/Up button, so long // as you specify a parent activity in AndroidManifest.xml. int id = item.getItemId(); if (id == R.id.action_settings) { return true; } return super.onOptionsItemSelected(item); } } CourtActivity.java package com.example.statapalpha; import android.app.Activity; import android.content.Intent; import android.os.Bundle; import android.view.Menu; import android.view.MenuItem; import android.view.MotionEvent; import android.view.View; import android.widget.Button; import android.widget.PopupMenu; import android.widget.PopupMenu.OnMenuItemClickListener; import android.widget.TextView; import android.widget.Toast; import java.lang.Math; import java.util.ArrayList; // Court Screen public class CourtActivity extends Activity implements OnMenuItemClickListener{ // Opens database SqliteHelper db; ArrayList<String> homePlayersIn = new ArrayList<String>(); ArrayList<String> awayPlayersIn = new ArrayList<String>(); ArrayList<String> homePlayersBench = new ArrayList<String>(); ArrayList<String> awayPlayersBench = new ArrayList<String>(); String team1, team2, team1n, team2n; String player = "0"; // Player number for current play String action = ""; // Action text for current play position position = new position(); // Position for current play int playNumber = 0; private PopupMenu popupMenu; boolean isHome = false; int playerButton = 0; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_court); db = new SqliteHelper(this.getApplicationContext()); //Get Team 1 and 2 and Game Title convertStrings(); // Gets players getPlayers(); } public void convertStrings() { Intent mIntent = getIntent(); team1n = mIntent.getStringExtra("TEAM1"); team2n = mIntent.getStringExtra("TEAM2"); } // Populates arrays with player numbers void getPlayers() { homePlayersBench.add("12"); homePlayersBench.add("10"); homePlayersBench.add("32"); homePlayersBench.add("16"); homePlayersBench.add("13"); homePlayersBench.add("19"); homePlayersIn.add("13"); homePlayersIn.add("14"); homePlayersIn.add("15"); homePlayersIn.add("16"); homePlayersIn.add("17"); awayPlayersBench.add("21"); awayPlayersBench.add("22"); awayPlayersBench.add("23"); awayPlayersBench.add("24"); awayPlayersBench.add("25"); awayPlayersBench.add("26"); awayPlayersIn.add("31"); awayPlayersIn.add("32"); awayPlayersIn.add("33"); awayPlayersIn.add("34"); awayPlayersIn.add("35"); } // Stores x and y coordinate public class position { public int x; public int y; } // Sets current player when a player button is clicked public void setPlayer(View v) { Button b = (Button)v; player = b.getText().toString(); playerButton = b.getId(); switch(b.getId()) { case R.id.p1: case R.id.p2: case R.id.p3: case R.id.p4: case R.id.p5: isHome = true; break; default: isHome = false; break; } } // Sets string Action to whatever action the user taps // then records play to database. public void setAction(View v) { Button b = (Button)v; String toastAction = ""; String message = ""; String team = ""; switch(b.getId()) { case R.id.fgMade: action = "F" + goal(position) + "H"; toastAction = "made " + goal(position) + " point shot"; break; case R.id.fgMissed: action = "F" + goal(position) + "M"; toastAction = "missed " + goal(position) + " point shot"; break; case R.id.ftMade: action = "FTH"; toastAction = "made freethrow"; break; case R.id.ftMissed: action = "FTM"; toastAction = "missed freethrow"; break; case R.id.rebound: action = "RB"; toastAction = "rebound"; break; case R.id.assist: action = "AST"; toastAction = "assist"; break; case R.id.block: action = "BL"; toastAction = "block"; break; case R.id.steal: action = "STL"; toastAction = "steal"; break; case R.id.turnover: action = "TO"; toastAction = "turnover"; break; case R.id.sub: action = "SUB"; toastAction = "substitution"; break; case R.id.foul: action = "FC"; toastAction = "commited foul"; break; case R.id.undoPlay: undoPlay(v); break; } if (action == "SUB") { popupMenu = new PopupMenu(this.getBaseContext(), v); Menu menu = popupMenu.getMenu(); if (isHome == true) { for (String number : homePlayersBench) { menu.add(number); } } else { for (String number : awayPlayersBench) { menu.add(number); } } popupMenu.setOnMenuItemClickListener(this); popupMenu.show(); return; } else { message = "Player " + player + " " + toastAction + " at (" + Integer.toString(position.x) + ", " + Integer.toString(position.y) + ")"; } if (isHome == true) team = team1; else team = team2; playNumber++; db.recordPlay(Integer.parseInt(player), team, action, position, playNumber); Toast.makeText(CourtActivity.this, message, Toast.LENGTH_SHORT).show(); refreshPlayers(); } // Gets tap position and saves it to 'position' @Override public boolean onTouchEvent(MotionEvent event) { if (event.getAction() == MotionEvent.ACTION_UP) { position.x = (int)event.getX(0); position.y = (int)event.getY(0); } return super.onTouchEvent(event); } int goal(position position) { int points=3; if ((Math.sqrt(Math.pow((position.x - 1082), 2) + Math.pow((position.y - 453), 2)) < 270) || (Math.sqrt(Math.pow((position.x - 193), 2) + Math.pow((position.y - 453), 2)) < 270)) points = 2; return points; } public void undoPlay(View v) { db.undoPlay(Integer.toString(playNumber)); } @Override public boolean onMenuItemClick(MenuItem item) { Button button = (Button)findViewById(playerButton); button.setText(item.getTitle()); refreshPlayers(); return false; } } activity_court.xml <RelativeLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:background="@drawable/bg2court" tools:context="${relativePackage}.${activityClass}" xmlns:android1="http://schemas.android.com/apk/res/android"> <Button android:id="@+id/editPlays" android:layout_width="190dp" android:layout_height="75dp" android:layout_alignParentRight="true" android:layout_alignParentTop="true" android:onClick="editPlays" android:text="@string/edit_plays" /> <Button android:id="@+id/undoPlay" android:layout_width="190dp" android:layout_height="75dp" android:layout_alignParentRight="true" android:layout_below="@+id/editPlays" android:onClick="undoPlay" android:text="@string/undo" /> <Button android:id="@+id/ftMissed" android:layout_width="190dp" android:layout_height="85dp" android:layout_alignParentBottom="true" android:layout_alignParentRight="true" android:onClick="setAction" android:text="@string/miss" /> <Button android:id="@+id/ftMade" android:layout_width="190dp" android:layout_height="85dp" android:layout_above="@+id/ftMissed" android:layout_alignParentRight="true" android:onClick="setAction" android:text="@string/made" /> <Button android:id="@+id/fgMade" android:layout_width="190dp" android:layout_height="85dp" android:layout_above="@+id/fgMissed" android:layout_alignParentRight="true" android:onClick="setAction" android:text="@string/made" /> <Button android:id="@+id/fgMissed" android:layout_width="190dp" android:layout_height="85dp" android:layout_above="@+id/ftMade" android:layout_alignParentRight="true" android:layout_marginBottom="52dp" android:onClick="setAction" android:text="@string/miss" /> <TextView android:id="@+id/fgText" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_above="@+id/fgMade" android:layout_alignLeft="@+id/playerStats" android:layout_alignParentRight="true" android:layout_marginLeft="10dp" android:layout_marginRight="10dp" android:text="@string/field_goal" android:textAppearance="?android:attr/textAppearanceLarge" android:textSize="38sp" /> <Button android:id="@+id/playerStats" android:layout_width="190dp" android:layout_height="75dp" android:layout_alignParentRight="true" android:layout_below="@+id/undoPlay" android:onClick="redoPlay" android:text="@string/playerStats" /> <TextView android:id="@+id/ftText" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_above="@+id/ftMade" android:layout_alignRight="@+id/fgText" android1:layout_alignLeft="@+id/ftMade" android:text="@string/free_throw" android:textAppearance="?android:attr/textAppearanceLarge" android:textSize="34sp" /> <Button android:id="@+id/foul" android:layout_width="190dp" android:layout_height="80dp" android:layout_alignParentLeft="true" android:layout_below="@+id/ftMade" android:onClick="setAction" android:color= "#FF0079FF" android:text="@string/foul" /> <Button android:id="@+id/steal" android:layout_width="190dp" android:layout_height="80dp" android:layout_above="@+id/turnover" android:layout_alignParentLeft="true" android:onClick="setAction" android:text="@string/steal" /> <Button android:id="@+id/block" android:layout_width="190dp" android:layout_height="80dp" android:layout_above="@+id/steal" android:layout_alignParentLeft="true" android:onClick="setAction" android:text="@string/block" /> <Button android:id="@+id/assist" android:layout_width="190dp" android:layout_height="80dp" android:layout_above="@+id/block" android:layout_alignParentLeft="true" android:onClick="setAction" android:text="@string/assist" /> <Button android:id="@+id/rebound" android:layout_width="190dp" android:layout_height="80dp" android:layout_above="@+id/assist" android:layout_alignParentLeft="true" android:onClick="setAction" android:text="@string/rebound" /> <Button android:id="@+id/p1" android:layout_width="80dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toRightOf="@+id/rebound" android:onClick="setPlayer" android:text="@string/p1" /> <Button android:id="@+id/p2" android:layout_width="85dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toRightOf="@+id/p1" android:onClick="setPlayer" android:text="@string/p2" /> <Button android:id="@+id/p3" android:layout_width="85dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toRightOf="@+id/p2" android:onClick="setPlayer" android:text="@string/p3" /> <Button android:id="@+id/p4" android:layout_width="85dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toRightOf="@+id/p3" android:onClick="setPlayer" android:text="@string/p4" /> <Button android:id="@+id/p5" android:layout_width="85dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toRightOf="@+id/p4" android:onClick="setPlayer" android:text="@string/p5" /> <Button android:id="@+id/p10" android:layout_width="85dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toLeftOf="@+id/editPlays" android:onClick="setPlayer" android:text="@string/p10" /> <Button android:id="@+id/p9" android:layout_width="85dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toLeftOf="@+id/p10" android:onClick="setPlayer" android:text="@string/p9" /> <Button android:id="@+id/p8" android:layout_width="85dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toLeftOf="@+id/p9" android:onClick="setPlayer" android:text="@string/p8" /> <Button android:id="@+id/p7" android:layout_width="85dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toLeftOf="@+id/p8" android:onClick="setPlayer" android:text="@string/p7" /> <Button android:id="@+id/p6" android:layout_width="85dp" android:layout_height="50dp" android:layout_alignParentTop="true" android:layout_toLeftOf="@+id/p7" android:onClick="setPlayer" android:text="@string/p6" /> <Button android:id="@+id/sub" android:layout_width="190dp" android:layout_height="80dp" android:layout_above="@+id/foul" android:layout_toLeftOf="@+id/p1" android:onClick="setAction" android:text="@string/sub" /> <Button android:id="@+id/turnover" android:layout_width="190dp" android:layout_height="80dp" android:layout_above="@+id/sub" android:layout_toLeftOf="@+id/p1" android:onClick="setAction" android:text="@string/turnover" /> <TextView android:id="@+id/points" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_above="@+id/court" android:layout_alignRight="@+id/rebound" android:text="@string/points" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/fouls" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignTop="@+id/undoPlay" android:layout_toLeftOf="@+id/p1" android:text="@string/fouls" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p1p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p1" android:layout_marginRight="35dp" android:text="@string/p1p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p1f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p1" android:layout_marginRight="35dp" android:text="@string/p1f" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p2p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p2" android:layout_marginRight="35dp" android:text="@string/p2p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p2f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p2" android:layout_marginRight="35dp" android:text="@string/p2f" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p3p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p3" android:layout_marginRight="35dp" android:text="@string/p3p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p3f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p3" android:layout_marginRight="35dp" android:text="@string/p3f" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p4p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p4" android:layout_marginRight="35dp" android:text="@string/p4p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p4f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p4" android:layout_marginRight="35dp" android:text="@string/p4f" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p5p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p5" android:layout_marginRight="35dp" android:text="@string/p5p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p5f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p5" android:layout_marginRight="35dp" android:text="@string/p5f" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p6p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p6" android:layout_marginRight="35dp" android:text="@string/p6p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p6f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p6" android:layout_marginRight="35dp" android:text="@string/p6f" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p7p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p7" android:layout_marginRight="35dp" android:text="@string/p7p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p7f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p7" android:layout_marginRight="35dp" android:text="@string/p7f" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p8p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p8" android:layout_marginRight="35dp" android:text="@string/p8p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p8f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p8" android:layout_marginRight="35dp" android:text="@string/p8f" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p9p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p9" android:layout_marginRight="35dp" android:text="@string/p9p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p9f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p9" android:layout_marginRight="35dp" android:text="@string/p9f" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p10p" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/points" android:layout_alignRight="@+id/p10" android:layout_marginRight="35dp" android:text="@string/p10p" android:textAppearance="?android:attr/textAppearanceMedium" /> <TextView android:id="@+id/p10f" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_alignBaseline="@+id/fouls" android:layout_alignRight="@+id/p10" android:layout_marginRight="35dp" android:text="@string/p10f" android:textAppearance="?android:attr/textAppearanceMedium" /> <ImageView android:id="@+id/court" android:layout_width="900dp" android:layout_height="600dp" android:layout_alignParentBottom="true" android:layout_alignRight="@+id/p10" android:contentDescription="@string/undo" android:src="@drawable/court" /> </RelativeLayout> I mean it tells me the error occurs in the onCreate of the CourtActivity, however I can't see anything that's wrong. This is part of my school project, I'm only concerned with the things that are causing me errors currently, not too worried about anything else. Note:This is a group project. The courtactivity screen is the only one I've not had a part in making, so I'm not sure exactly what went into it. However now I'm trying to put everything together and running into this. Anything helps! Thanks! A: The error is happening while attempting to load an image specified on the Layout file, as reported by the following part of the log: ...: Caused by: java.lang.OutOfMemoryError ...: E/AndroidRuntime(2137): at android.graphics.BitmapFactory.nativeDecodeAsset(Native Method) ...: E/AndroidRuntime(2137): at android.graphics.BitmapFactory.decodeStream(BitmapFactory.java:503) I bet if you remove the line android:background="@drawable/bg2court" from the root container (RelativeLayout) in the file activity_court.xml the error will be gone. If that is the case I would suggest you to try a smaller (lower resolution) version of that image. While looking for a replacement, keep an eye on the heap memory allocation messages on logcat so you will know how much progress you are making. Loading high resolution images on Android is usually a tricky process because of the following reasons: Bitmap files loaded in memory have to be decompressed so they can be rendered, making them a lot larger then their original .JPG and .PNG files. To calculate how many bytes of memory will be allocated to load a given image, just follow this simple formula: width (pixels) x height (pixels) x number bytes per pixel (3 for 24 bit images). Example: a bitmap with the size of 2048x2048 pixels takes exactly 12mb of memory; Bitmaps are loaded into the heap space which happens to be a pretty small portion of memory given by the OS to your app when it starts. The size of the heap space usually ranges from 16 to 64mb depending on the device. Finally, I would suggest one of the following approaches: Replace the large background image by a lower resolution version that can be scaled up to fill the background space (at the cost of quality of corse); Load bitmaps programmatically. There are BitmapFactory methods that can downsample images on the fly, during the load process. More on this here; Use a 3rd party library to do it for you. Picasso is an excelent choice.
{* /* * Script: add_invoice_item.tpl * Add new item to an existing invoice * * License: * GPL v2 or above * * Website: * http://www.simpleinvoices.org */ *} {if $smarty.post.submit != null} <meta http-equiv="refresh" content="1;URL=index.php?module=invoices&amp;view=details&amp;id={$smarty.post.id|urlencode}&amp;type={$smarty.post.type|urlencode}" /> <br /><br /> {$LANG.save_invoice_items_success}; <br /><br /> {else} <div id="top"><h3>{$LANG.add_invoice_item}</h3></div> <div id="gmail_loading" class="gmailLoader" style="float:right; display: none;"> <img src="images/common/gmail-loader.gif" alt="{$LANG.loading} ..." /> {$LANG.loading} ... </div> <hr /> <form name="add_invoice_item" action="index.php?module=invoices&amp;view=add_invoice_item" method="post"> <table align="center"> <tr> <td class="details_screen"> {$LANG.quantity} </td> <td> <input type="text" id="quantity1" name="quantity1" size="5" /> </td> </tr> <tr> <td class="details_screen"> {$LANG.product} </td> <td><input type="text" name="description" /> {if $products == null } <p><em>{$LANG.no_products}</em></p> {else} <select name="product1" onchange="invoice_product_change_price($(this).val(), 1, jQuery('#quantity1').val() );" > <option value=""></option> {foreach from=$products item=product} <option {if $product.id == $defaults.product} selected {/if} value="{$product.id|htmlsafe}">{$product.description|htmlsafe}</option> {/foreach} </select> {/if} </td> </tr> <tr> <td class="details_screen"> {$LANG.unit_price} </td> <td> <input id="unit_price1" name="unit_price1" size="7" value="{$invoiceItem.unit_price|number_format:2}" /> </td> </tr> {if $type == 3} <tr> <td class="details_screen" colspan="2" >{$LANG.description}</td> </tr> <tr> <td colspan="2"><textarea input type="text" class="editor" name="description" rows="3" cols="80" wrap="nowrap"></textarea></td> </tr> {/if} </table> <hr /> <div style="text-align:center;"> <input type="submit" name="submit" value="{$LANG.add_item|htmlsafe}" /> <input type="hidden" name="id" value="{$smarty.get.id|htmlsafe}" /> <input type="hidden" name="type" value="{$smarty.get.type|htmlsafe}" /> <input type="hidden" name="tax_id" value="{$smarty.get.tax_id|htmlsafe}" /> </div> </form> {/if}
Reliance Communications accused telecom gear maker Ericsson, which is an operational unsecured creditor of the company, of attempting media trial and sensationalising the issue of dues recovery, saying it might put interest of even secured lenders at risk. The Anil Ambani-led telecom firm, however, said it remained committed to clear dues of Ercisson from spectrum realisation. “It is deeply regrettable that Ericsson India Private Limited (Ericsson), an operational unsecured creditor, is attempting a trial by media and sensationalising issues, as evidenced in recent media reports,” RCom spokesperson said in a statement. Ericsson India on Friday moved the Supreme Court seeking initiation of contempt proceedings for the second time against Anil Ambani for allegedly not complying with its order to clear dues of ₹550 crore. Besides seeking contempt proceedings against the RCom chairman and two others, Ericsson has also sought that they be “detained in civil prison” unless they purge themselves by making the payment. It also sought directions to the Ministry of Home Affairs to prevent Ambani, Reliance Telecom Ltd chairman Satish Seth and chairperson of Reliance Infratel Ltd. Chhaya Virani from leaving the country. RCom spokesperson said no notice on recent contempt petition filed by Ericsson, as referred in media reports last week, has been served to it till date and alleged that the Swedish firm is widely sharing the matter with the media and distorting issues. “Needless to say, the Hon’ble Supreme Court has not even considered the matter till date. Ericsson’s conduct as an unsecured creditor gravely endangers and is at the cost of secured lenders comprising 38 banks and secured creditors including 17 public sector banks and 13 foreign banks,” the spokesperson said. The crisis-ridden telecom services firm has a debt of over ₹47,000 crore. RCom said it has taken all required steps towards enabling the settlement and remains fully committed to make the payment to Ericsson from the proceeds of the spectrum sale. “The Department of Telecom (DoT) approval is pending since August 7, 2018, for which RCom has moved a contempt petition against DoT before the Supreme Court which is listed on Monday, January 7, 2019,” RCom spokesperson said. Last year, RCom signed a pact with Reliance Jio for the sale of wireless spectrum, tower, fibre and media convergence nodes assets — the proceeds of which were to be used to pare debt. RCom expects to get ₹975 crore from sale of the spectrum which it has promised to pay dues of ₹550 crore to Ericsson and ₹230 crore to settle dues of minority stakeholder Reliance Infratel. The DoT has put the spectrum trading between the two companies on hold after Reliance Jio refused to bear the burden on any past dues that RCom owes to the government. Both RCom and Reliance Jio are learnt to have approached jointly the telecom ministry seeking clarification on the stand of the government over their spectrum trading deal. In a letter to the DoT on January 3, Jio cited petition of RCom before telecom tribunal TDSAT showing that the petitioners, who are the sellers, have retained the liabilities upon themselves.
events-generated onOpen: anObject "Triggered when the suggestion menu is opened." self optionAt: 'open' put: anObject asFunction
Q: Elmah errorMail not working on production I am using ELMAH in my MVC3 application and logging the errors to a SQL Database and sending emails. Locally everything is working fine, and emails are being delivered (using casini). But on the production server (IIS7) no emails are being delivered. I am able however to send emails through code! <elmah> <errorLog type="Elmah.SqlErrorLog, Elmah" connectionStringName="Elmah.Sql" applicationName="qatar" /> <errorMail from="[email protected]" to="[email protected]" subject="Error" async="true" smtpPort="587" smtpServer="smtp.gmail.com" enablessl ="true" userName="[email protected]" password="mypassword" /> Any clues or direction? A: I found the reason, but still can't understand why it works locally: enablessl should be changed to useSsl
Transplanted human umbilical cord blood mononuclear cells improve left ventricular function through angiogenesis in myocardial infarction. Human umbilical cord blood contains an abundance of immature stem/progenitor cells, which may participate in the repair of hearts that have been damaged by myocardial infarction (MI). This study aimed to evaluate the effects of human umbilical cord blood mononuclear cells (hUCBC) transplantation on cardiac function and left ventricular remodeling in rat model of MI. Forty-five male Wistar rats were randomized into three groups: MI or control group (n = 15), MI plus cell transplantation (n = 15), and sham group (n = 15). Acute myocardial infarction (AMI) was established by ligating the left anterior descending artery, thereafter, hUCBC were implanted into the marginal area of infarcted myocardium. In MI/control group, DMEM was injected instead of hUCBC following the same protocol. Left ventricular function assessment was carried out by echocardiography and invasive hemodynamic measurements one month post MI. All rats were sacrificed for histological and immunochemical examinations. The transplanted hUCBC survived and engaged in the process of myocardial repair in the host heart. Echocardiography demonstrated that left ventricular function improved significantly in the rats that underwent cell transplantation. Hemodynamic studies found a significantly decreased left ventricular end-diastolic pressure (LVEDP) [(21.08 +/- 8.10) mmHg vs (30.82 +/- 9.59) mmHg, P < 0.05], increase in +dp/dt(max) [(4.29 +/- 1.27) mmHg/ms vs (3.24 +/- 0.75) mmHg/ms, P < 0.05), and increase in -dp/dt(max) [(3.71 +/- 0.79) mmHg/ms vs (3.00 +/- 0.49) mmHg/ms, P < 0.05] among MI group with hUCBC transplantation when compared with MI/control group. Masson's trichrome staining revealed that the collagen density in the left ventricle was significantly lower in rats of transplantation group than that in the MI control groups [(6.33 +/- 2.69)% vs (11.10 +/- 3.75)%, P < 0.01]. Based on immunostaining of alpha-actin, the numbers of microvessels were significantly (P < 0.01) increased at the boundary of infarction site. Similarly higher mRNA expression of vascular endothelial growth factor (VEGF) 164 and VEGF188 were found at 7- and 28-day post cell transplantation in MI group with hUCBC transplantation when compared with MI/control group. Transplanted hUCBC can survive in host myocardium without immunorejection, significantly improve left ventricular remodeling after AMI and promote a higher level of angiogenesis in the infarct zones. All these factors beneficially affect cardiac repair in the setting of MI. Therefore human umbilical cord blood may be potential source for cell-based therapy for AMI.
1935 Alberta general election The 1935 Alberta general election was the eighth general election for the Province of Alberta, Canada. It was held on August 22, 1935, to elect members of the Legislative Assembly of Alberta. The newly founded Social Credit Party of Alberta won a sweeping victory, unseating the 14-year government of the United Farmers of Alberta. It was one of only four times that Alberta has changed governments. Premier John E. Brownlee had resigned on July 10, 1934, when he was sued and found liable for the seduction of a young clerk working in the Attorney-General's office. Although the verdict was immediately set aside by the presiding judge, the scandal seriously damaged the UFA's reputation among socially conservative Albertans. Provincial Treasurer Richard G. Reid succeeded him, but was unable to change the party's fortunes. Social Credit won 56 of the 63 seats in the legislature, and over 50% of the popular vote, well beyond even the most optimistic Socred projections. Many of those gains came at the expense of the UFA, which lost all of its seats in one of the worst defeats ever suffered by a provincial government in Canada. Reid and Brownlee, for instance, were heavily defeated by Socred challengers, with Reid being pushed into third place. The UFA's wipeout happened just a month after the Prince Edward Island Tories lost all 18 of their seats at that year's provincial election. A similar wipeout would not happen again until the 1987 New Brunswick general election, when the governing New Brunswick Tories lost all 39 of their seats. The Alberta Liberals in this election ran with the tactically fatal slogan, the "rest of Canada can't be wrong"—referring to the popularity of the Liberal Party in the rest of the country. It did not work; they had their seat count cut in half. However, due to the UFA being swept from the legislature, the Liberals wound up as the Official Opposition. The Conservatives lost four of their six seats. The Socreds' expectations for the election had been so low that they had not even named a formal leader for the campaign. When the newly elected Socred MLAs held their first caucus meeting, the first order of business was to select a leader and premier-designate. The obvious choice was the party's founder and guiding force, Calgary-based Baptist pastor William Aberhart. Persuaded to accept the mantle of leadership, Aberhart was sworn in as premier on September 3. The turnout of the 1935 election topped 80%, and no election in Alberta has come close to this mark. This election campaign is seen as the most negative in Alberta's history, with reports of Social Credit members, operating openly and on Aberhart's directives, defacing the campaign signs of opponents and drowning their speeches by honking car horns. Many campaign ads also focused mostly on attacking the opposing parties. After the 1935 election results were in, newspapers across North America took notice, with the Boston Herald running the headline "Alberta Goes Crazy!". This shift marked the first in Social Credit's nine consecutive election victories, for a total of 36 years in office–one of the longest unbroken runs in government in the Commonwealth. The UFA never recovered from this wipeout defeat, and withdrew from politics altogether in 1937. Results Overall voter turnout was 81.8%, the highest in Alberta history. Members elected For complete electoral history, see individual districts References See also List of Alberta political parties Category:1935 elections in Canada 1935 Category:1935 in Alberta Category:August 1935 events
# coding=utf-8 # -------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for # license information. # # Code generated by Microsoft (R) AutoRest Code Generator. # Changes may cause incorrect behavior and will be lost if the code is # regenerated. # -------------------------------------------------------------------------- from .resource import Resource class IntegrationAccountMap(Resource): """The integration account map. Variables are only populated by the server, and will be ignored when sending a request. All required parameters must be populated in order to send to Azure. :ivar id: The resource id. :vartype id: str :ivar name: Gets the resource name. :vartype name: str :ivar type: Gets the resource type. :vartype type: str :param location: The resource location. :type location: str :param tags: The resource tags. :type tags: dict[str, str] :param map_type: Required. The map type. Possible values include: 'NotSpecified', 'Xslt', 'Xslt20', 'Xslt30', 'Liquid' :type map_type: str or ~azure.mgmt.logic.models.MapType :param parameters_schema: The parameters schema of integration account map. :type parameters_schema: ~azure.mgmt.logic.models.IntegrationAccountMapPropertiesParametersSchema :ivar created_time: The created time. :vartype created_time: datetime :ivar changed_time: The changed time. :vartype changed_time: datetime :param content: The content. :type content: str :param content_type: The content type. :type content_type: str :ivar content_link: The content link. :vartype content_link: ~azure.mgmt.logic.models.ContentLink :param metadata: The metadata. :type metadata: object """ _validation = { 'id': {'readonly': True}, 'name': {'readonly': True}, 'type': {'readonly': True}, 'map_type': {'required': True}, 'created_time': {'readonly': True}, 'changed_time': {'readonly': True}, 'content_link': {'readonly': True}, } _attribute_map = { 'id': {'key': 'id', 'type': 'str'}, 'name': {'key': 'name', 'type': 'str'}, 'type': {'key': 'type', 'type': 'str'}, 'location': {'key': 'location', 'type': 'str'}, 'tags': {'key': 'tags', 'type': '{str}'}, 'map_type': {'key': 'properties.mapType', 'type': 'str'}, 'parameters_schema': {'key': 'properties.parametersSchema', 'type': 'IntegrationAccountMapPropertiesParametersSchema'}, 'created_time': {'key': 'properties.createdTime', 'type': 'iso-8601'}, 'changed_time': {'key': 'properties.changedTime', 'type': 'iso-8601'}, 'content': {'key': 'properties.content', 'type': 'str'}, 'content_type': {'key': 'properties.contentType', 'type': 'str'}, 'content_link': {'key': 'properties.contentLink', 'type': 'ContentLink'}, 'metadata': {'key': 'properties.metadata', 'type': 'object'}, } def __init__(self, **kwargs): super(IntegrationAccountMap, self).__init__(**kwargs) self.map_type = kwargs.get('map_type', None) self.parameters_schema = kwargs.get('parameters_schema', None) self.created_time = None self.changed_time = None self.content = kwargs.get('content', None) self.content_type = kwargs.get('content_type', None) self.content_link = None self.metadata = kwargs.get('metadata', None)
Q: std::move on the return value is causing extra temporary object creation Why calling get_data2() results in additional c-tor call (g++ 4.7.1 -std=c++11 -O3)? Code: #include <iostream> struct data { data(data&&){std::cout << "cted(&&): " << (void*) this << std::endl; } data(data const&){std::cout << "cted(c&): " << (void*) this << std::endl; } data(){std::cout << "cted(): " << (void*) this << std::endl; } ~data(){std::cout << "dted(): " << (void*) this << std::endl; } }; data create_data() { return data(); } // with this one the c-tor is called twice data get_data2() { return std::move(create_data()); } // with this one the c-tor is called once data get_data1() { return create_data(); } int main() { data var = get_data1(); return 0; } Output with get_data2(): cted(): 0x7ffffb2cd3df cted(&&): 0x7ffffb2cd40f dted(): 0x7ffffb2cd3df dted(): 0x7ffffb2cd40f Output with get_data1(): cted(): 0x7ffffd7f230f dted(): 0x7ffffd7f230f A: The problem is that the explicit std::move prohibits copy elision, see Why does std::move prevent RVO? Another problem is that the explicit move is also unnecessary because in data create_data() { return data(); } you are already returning an rvalue. As a side note: A very similar question came up a while ago and it turned out that the way you are using to track object creation is very unreliable, partly because the object is empty, see RVO force compilation error on failure. Long story short: use only the data create_data() { return data(); } version.
Q: Less. Авто-компиляция файла less в css, ubuntu 16.04 Как сделать авто-компиляцию файла less в css, чтобы каждый раз не вводить в терминале команду? Ubuntu 16.04, sublime text 3 A: -- Установите node.js -- создайте папку в вашем проекте tools, перейдите в новую папку. -- введите npm install gulp (в консоле, находясь в нужной папке) вы получите файл package.json куда пропишите примерно следующее: { "devDependencies": { "gulp": "^3.9.1", "gulp-clean-css": "^2.0.8", "gulp-concat": "^2.6.0", "gulp-cssnano": "^2.1.2", "gulp-less": "^3.1.0", "gulp-minify-css": "^1.2.4", "gulp-notify": "^2.2.0", "gulp-plumber": "^1.1.0", "gulp-rename": "^1.2.2", "gulp-sass": "^2.3.1", "gulp-uglify": "^1.5.3", "gulp-uglifyjs": "^0.6.2", "less-plugin-autoprefix": "^1.5.1", "pump": "^1.0.1" }, "dependencies": { "pageres": "^4.3.0" } } создайте файл gulpfile.js туда поместите примерно следующее: var gulp = require('gulp'); var minifyCss = require('gulp-minify-css'); var concat = require('gulp-concat'); var rename = require('gulp-rename'); var cleanCSS = require("gulp-clean-css"); var less = require("gulp-less"); var LessAutoprefix = require("less-plugin-autoprefix"); var path = require('path'); var plumber = require('gulp-plumber'); var uglify = require('gulp-uglify'); var pump = require('pump'); var autoprefix = new LessAutoprefix({ browsers: ["last 2 versions"] }); var path_src = "../где лежат исходники/"; var path_pub = "../../куда помещать готовое/"; var ps = { less: [path_src + "путь к лесс файлам/src/**/*.less"], less_main: [path_src + "путь к лесс файлам/src/less/main.less"], less_out: path_pub + "css/папка с готовыми css", less_second_all: [path_src + "custom/**/*.less"], //less_second: [path_src+"custom/main.less"], less_second_out: path_pub + "css/custom", resetCSS_in: [ path_src + "reset_css/reset.css", path_src + "reset_css/normalize.css" ], resetCSS_out: path_pub + "css/reset", scripts: [path_src + "js/**/*.js"], scripts_out: path_pub + "js" }; gulp.task("minResetCss", function() { return gulp.src(ps.resetCSS_in) .pipe(concat("reset.css")) .pipe(cleanCSS()) .pipe(rename({ suffix: ".min" })) .pipe(gulp.dest(ps.resetCSS_out)); }); gulp.task("mainCssProcessor", function() { return gulp.src(ps.less_main) .pipe(plumber()) .pipe(less({ plugins: [autoprefix] })) .pipe(concat("main.css")) .pipe(cleanCSS({ advanced: false })) .pipe(rename({ suffix: ".min" })) .pipe(plumber.stop()) .pipe(gulp.dest(ps.less_out)); }); gulp.task("secondCssProcessor", function() { return gulp.src(ps.less_second_all) .pipe(plumber()) .pipe(less({ plugins: [autoprefix] })) // .pipe(concat("custom.css")) .pipe(cleanCSS({ advanced: false })) .pipe(rename({ suffix: ".min" })) .pipe(plumber.stop()) .pipe(gulp.dest(ps.less_second_out)); }); gulp.task("mainScriptProcessor", function(cb) { pump([ gulp.src(ps.scripts), // uglify(), gulp.dest(ps.scripts_out) ], cb ); }); gulp.task("watcher", function() { console.log("===================="); gulp.watch(ps.less, ["mainCssProcessor"]); gulp.watch(ps.less_second_all, ["secondCssProcessor"]); gulp.watch(ps.scripts, ["mainScriptProcessor"]); }); gulp.task("default", ["watcher", "minResetCss", "mainCssProcessor", "secondCssProcessor", "mainScriptProcessor" ]); введите в консоли npm install после установки, введите gulp в консоле, после чего будут автоматически собираться лесс файлы в css. В примере используются дополнительные тулзы для минификации и ренейма файлов. + плюс есть таск перекладывающий и могущий минифицировать js файлы. Настройте пути, чутка прочитайте про gulp, и я думаю у вас все получится. теперь gulp следит за лесс файлами и если вы внесли изменения -- все будет перекомпилироваться автоматом. в случае с больши лесс файлами, на компиляцию может уходить более 5 секунд(css более полумегабайта), учитываете это, иногда вводит в замешательство. В некоторых случаях имеет смыл перезапустить gulp. Если на этапе установки не вышло установить пакеты. -- удалите файл package.json -- и попробуйте ввести отдельно команды npm install имя_пакета, npm сам создаст этот файл и сам туда все запишет. по поводу npm -- я там далеко не мастер, просто использую эту схему из проекта в проект, и некоторые детали забыл.
1. Technical Field The present invention relates to a method of generating images for a multi-projection theater and, more particularly, to a method of generating projection images for a multi-projection theater, wherein a source image is mapped to a sphere, virtual planes according to the structure of a multi-projection theater are generated, and the source image on the sphere is projected on the virtual planes. 2. Description of the Related Art In order to provide audiences with a new three-dimensional effect and immersive experience, a so-called “multi-projection system” different from a known screening system based on a single screen is proposed. The “multi-projection system” is a technology in which a plurality of projection surfaces is disposed on the periphery of stands (e.g., the front, the left, the right, the ceiling, and the bottom) and an image having a three-dimensional effect and immersive experience can be provided to audiences although a 3D technology is not applied to the image itself. Such a multi-projection system may be constructed in different structures depending on the conditions of theaters because a plurality of projection surfaces is disposed in various directions around stands. More specifically, a plurality of projection surfaces disposed in each theater may have different disposition angles, different areas, etc. depending on the conditions of each theater. Accordingly, it is essential to taken into consideration the structural characteristics of each theater in a process of generating projection images (i.e., images projected on a plurality of projection surfaces) for such a multi-projection system. However, there is no prior art capable of generating projection images by taking the structure of a theater into consideration. The reason for this is that a need to generate projection images by taking into consideration the structural characteristics of a theater is low because a conventional theater includes only a single projection surface disposed at the front as described above. Accordingly, there is a need for a technology capable of generating projection images for a theater by taking into consideration the structural characteristics of the theater. The present invention has been invented based on such a technical background and also has been invented to satisfy the aforementioned technical needs and to provide additional technical elements that may not be easily invented by those skilled in the art to which the present invention pertains. Accordingly, the present invention should not be construed as being limited by the technical background.
Friday, October 14, 2011 If you hear actions to increase the capital base for French and German banks, expect Greek default soon. When multinationals call East Asia home, they will invest enough to treat East Asian consumers like their western counterparts. The investment process will lift the salaries of the Asian workers to the western level. They then have the consumption power to make the investment pay off. This would be a gigantic project to build a new global economy. 2011-09-26 / Andy Xie summary ------------ The global crisis has turned into a chronicle one. The eurozone's response to its recurring debt crisis is another bandaid that would ease the pain for the time being. So are the expected Fed's QE 3 and the Obama Administration's $447 billion fiscal stimulus proposal. The structural headwinds and debt hangover plague the global economy. Neither can be solved quickly. The expectation that the eurozone debt crisis would be worse than the US's crisis is wrong. Eurozone's indebtedness and fiscal deficits are much lower than the US's. When the region's governments run out of resources to contain the crisis, they will allow the ECB to print money to ease the crisis. In short, the eurozone crisis lasts but doesn't explode like the US's subprime crisis. The bandaid measures by the eurozone and the US may spark a rally in risk assets like stocks. Like the previous rallies, this one would be relatively short, possibly for three months. The recurring crisis will generate short cycles in asset markets. The global economy is on a path of slow growth-1-2% in the developed world and 4-6% in the emerging world, while inflation would be 3-5% for the former and 5-10% for the later. This stagflation world may last for a decade. Betting on inflation is likely the best investment approach in this decade. While gold is consolidating, its bull market isn't over. Energy and agriculture are similarly on bullish trends. Multinational companies that sell to consumers in emerging markets may do well too. Greek tragedy ------------------- 'History always repeats itself twice: first time tragedy, second time farce', so said Karl Marx. What if it repeats the third time? It could only be described as a Greek tragedy. The expectation of an imminent Greek default set off another round of turmoil in the world's financial markets. The fear was based on its contagion through the eurozone banking system. The eurozone banks, especially French and German ones, are loaded with Greek bonds. The fear manifests through (1) the banks' unwillingness to lend to each other and (2) their share prices plummeting. Their collasping share prices reminded investors of what occurred before the Lehman crash, which sent stocks falling everywhere. The irony is that this is mainly about accounting. The Greek bond prices already predict a Greek default almost for sure. But, the accounting rules allow the banks not to account for the losses until Greece actually declares default. Hence, they don't have to raise capital yet, even though they may already be bankrupt. The dance around Greece's debt crisis by other European countries is really about this accounting fiction. Greece is in a vicious cycle. As it cuts spending to decrease fiscal deficit, the economy shrinks, and the tax revenue falls even more. Hence, it cannot meet the deficit target spelled out in the second EU assistance package. The EU has postponed its decision on the next installment of €8 billion from the second aid package to next month. The money is necessary for Greece to avoid default. It is unlikely that Greece will be able to meet that. If not, the EU has to decide if to go easier on Greece or let it go. The market is expecting default. Greece's default is inevitable. The debt hole is just too deep for Greece to climb out. I'm not sure that it would be next month. The European banks may not be ready for it yet. French and German governments have to take actions to strengthen their banks first. Otherwise, the resulting chaos would be too damaging for Europe. If you hear actions to increase the capital base for French and German banks, expect Greek default soon. The lesson on debt trap -------------------------------- A financial crisis results from a mistake by the financial markets before. In the case of Europe the bond market gave Germany's interest rate to Southern European economies in anticipation of and after the establishment of euro. It led to excessive demand fueled by credit in the later and supercharged Germany's exports. The circle was completed by recycling Germany's trade surpluses into the cash-short Southern European economies through London-centered financial markets. It is one more piece of evidence that today's financial markets, despite ample liquidity and 24 hour trading cycle, are highly inefficient and can cause calamity on a global scale and frequently. The same markets are demanding clarity on how the Southern European economies could repay their mountains of debts. As they haven't responded fast enough to satisfy the markets, the interest rates on their bonds have surged. At a high enough interest rate, any debtor is bankrupt. The Southern European economies have been travelling down this path of self fulfilling bankruptcy. For example, Italy's national debt is 120% of GDP. When interest rate is 3%, it seems bearable, and the market is not worried and willing to roll over the principal. When the interest rate is 6%, the interest burden becomes unbearable, and the market isn't willing to roll over the principal anymore. The vicious cycle could lead to bankruptcy quickly. This is a lesson for any country that depends too much on financial markets. The money may come easy. But, when you need it most, they turn on you. The cost could be catastrophic. The persistent high interest rate could decapitalize an economy like Italy's and turn it into a developing country. Chinese local governments have been travelling down the same path in the past few years. They have borrowed heavily on the expectation that ever rising land price would allow them to pay off the debts. Such expectation is alive despite the collapsing property markets around the world. Most local governments in China may have trouble paying off their debts. Urbanization has economies of scale. Only a small number of cities are in a virtuous cycle of growing population, rising employment, and more financing for infrastructure investment. Many cities that are investing heavily and hoping to attract population and employment will be disappointed. Structural headwinds ---------------------------- The mistake by the financial markets fueled the debt bubble in the developed world. It was tolerated because the developed economies were losing competitiveness against the developing world. The bubble conveniently filled an employment shortfall due to globalization. In a crisis our attention is focused on the past like the accumulated debt load. A more challenging issue is how the underlying structural problems could be resolved. Otherwise, the crisis will never end. Europe and the United State face the same problem. Globalization is equalizing wages for similar jobs. In the past, where one was born would mostly decide his or her living standard. Information revolution and globalization now allow global companies to hire people from everywhere to do work for everywhere too. For the world as a whole this increases efficiency, i.e., the whole pie becomes bigger. The biggest fallout is how it affects the workers in the developed world who compete against their counterparts in the emerging world. Southern European economies depended on labor intensive industries in the division of labor within Europe. It was all fine until globalization came along. The debt bubble allowed them to maintain living standard through debt financed bubble activities to turn debt into income. Greece's bubble was in government generated employment financed by government issued bonds. Spain's property bubble turned foreign liquidity into its labor income. The uncertainty due to Europe's debt crisis has been with us for a year and a half and seems destined to last for a long time to come. When France and Germany decide to recapitalize their banks, the uncertainty will diminish for the time being. But, the need for lasting fiscal austerity will trigger political uncertainties for years to come, negatively affecting the global economy and financial markets. Rising productivity in emerging economies and an aging population at home have sapped Europe's growth potential. It needs to be frugal to balance its books, i.e., Europeans must accept a significant reduction in living standard. The reduction needs to come from less welfare benefits, higher taxes, or rising retirement age. Germany has done that in the past decade. Other countries must follow. This seems extremely difficult to achieve. The populaces in many eurzone countries refuse to accept cutbacks and put pressure on their governments to find another way out. The alternative is more debt, if the market agrees. Otherwise, more crises. The United States is similar to Europe. Part of its economy is like Southern Europe's. Its high unemployment rate reflects more the globalization reality than insufficient demand at home. The stimulus attempt by the Obama Administration won't solve the problem. Sluggish growth and high unemployment rate are the twin phenomena to accompany the developed economies in this decade. Even Germany may not escape this fate. Austerity rather than stimulus is likely the policy direction for the developed economies. The economic difficulties that the developed economies face in this decade may lead to social instability. What occurred in London could spread to other major western cities in this decade. It will make their policy response to fiscal deficits difficult. This is why the current crisis will last for a long time to come. The world is still expecting the global economy to recover like before. It won't happen. If the global economy is to have another up cycle, it must be led by emerging economies. But, they have been growing on exports before. Unless they change their growth model, the global economy will remain sluggish. The developed economies account for 70% of the global economy and the emerging economies 30% in current exchange rates. In purchasing power parity the two are about the same size. The export model for the emerging economies doesn't work like before because the emerging economies are so much bigger than before. Emerging economies must shift from export to consumption-led for the global economy to regain momentum. But, the income level in the emerging economies is still too low to shift to the consumption model. One shortcut is to lift the income level quickly through attracting multinationals to invest massively. Multinational corporations have become unsettled in Europe and the US by the rising political risk and sluggish demand. They are incentivized to find a new home. East Asia, China in particular, is in a position to become the new home for multinationals. Germany, East Asia, and oil exporters run large trade surpluses. I suspect that Germany's surplus will dwindle, as the European debt crisis saps the demand from its major trading partners. Oil export countries don't have the sophisticated economies to make multinationals root there. Only East Asia has the labor force, growth potential, and capital surplus to attract multinationals. When multinationals call East Asia home, they will invest enough to treat East Asian consumers like their western counterparts. The investment process will lift the salaries of the Asian workers to the western level. They then have the consumption power to make the investment pay off. This would be a gigantic project to build a new global economy. China must play a leading role in this process. As the second largest economy and the largest trading nation in the world, it has the ability and responsibility to do so. As I wrote in this page before, China must recycle its trade surplus into the global economy in the right way for it to function well. Attracting MNCs to China's capital market is a first and necessary step for the global economy to recover. It is in China's interest to take this critical step towards a new global economy. 1 comments: I would like to tell you that you have given much knowledge about it.also would recommend to choose residential Apartments in Mystic Greens for best deals,also recommends to invest in New Project Aranya Homes Noidafor best return on investment.this is my personnel opinion and experience.
A playoff berth is more an expectation than a hope for the Maple Leafs this season, and more than anybody, it's coach Ron Wilson who is under the gun to produce. Head coach Ron Wilson, pictured at practice on Wednesday, thinks the current group of Leaf players is the best he's had since arriving in Toronto. "This is the clearly the deepest team and most skilled team we’ve had,” he says. “It’s an entirely different feeling." By:Kevin McGranSports Reporter, Published on Wed Oct 05 2011 Tyler Bozak was asked on Twitter the other day just how excited he was, on a scale of 1 to 10, to start the season. His answer was simple and honest: “Those numbers aren’t high enough.” It’s off the scale how much this team can’t wait to play Montreal on Thursday night to open the season. “We’ve been waiting for this moment for a long time,” Bozak said after practice Wednesday. “It’s been too long since we’ve had a real game. Winning like we did at the end of the year, we kind of got the feel of what it’s like to win a lot of games.” There hasn’t been a Maple Leafs season with this much anticipation in quite some time. Coach Ron Wilson, when asked to compare this group of Leafs to the previous three teams he coached coming out of camp, believes it’s the best one yet. “This is the clearly the deepest team and most skilled team we’ve had,” said Wilson. “It’s an entirely different feeling. “We started well last year, the first four games. What makes us feel really good this year is we believe in our goaltending, probably more than we ever have. Our back end is much more mobile than it’s been since I got here. “Those two factors right there, keeping pucks out of your net and getting the puck out of the zone as quickly as possible, are huge.” That said, Wilson declined to offer a guarantee of making the playoffs. Paul Maurice did in 2007. He was fired in 2008. “I never make any guarantees,” said Wilson. Nonetheless, in Year 2.5 of GM Brian Burke’s rebuild, a playoff berth is more an expectation than a hope. And more than anybody, it’s Wilson who is on the hot seat. He’s in the final year of his contract and Burke — quite on purpose — did not offer him an extension. In Burke’s mind, he’s been loyal to his coach, friend and fellow Providence College alum. Burke has stuck with Wilson through losing streaks and bad times and repeated seasons of missing the playoffs. Burke fired a warning shot across Wilson’s bow in the summer, forcing the coach to fire two of his assistants, Tim Hunter and Keith Acton. Wilson replaced them with Greg Cronin and Scott Gordon, himself a former NHL coach. The team is likely to start the season with both Tim Connolly and Nazem Kadri on the injured reserve list. Either can come off at any time, but both were listed as IR on the team’s website Wednesday. And a roster move would be required to open up a spot. The arrival of centre David Steckel forced the team to assign Joey Crabb to the Marlies. A bad start for this team — say through the first 20 games —and the calls for Wilson’s ouster will begin. “That’s the last thing on our mind,” said defenceman Luke Schenn. “If things were to go wrong, the guys in the room and on the ice are a lot more accountable than the coach.” His players don’t want a coaching change. “He’s done a good job here,” Bozak said of Wilson. Schenn, who’s been a Leaf for as long as Wilson has been the team’s coach, disagrees that Wilson is under the gun. “Maybe if we had a bad finish to the end of the year, maybe there’d be a lot more heat on him,” said Schenn. “But we finished off good and part of that is because of the coach. “They’ve been teaching us lots. There has been a lot of turnover. Burke and the management have stressed to us and to the fans and the media that they’re loyal to the coach.” All that turnover is another reason the heat is on. Burke has added the kind of players Wilson wants. Steckel, the best faceoff man in the league, is in to help the penalty kill. John-Michael Liles is in to help the power play. Special teams — the coach’s forte with his former clubs — have been a perennial Leaf weakness under Wilson. It’s time for that to stop. “We’re going to work on (special teams) all the time, every day, and try to make ourselves better,” said Wilson. “Your power play and your penalty kill have to be adjusting all the time. Other teams are seeing what you’re doing on the special teams all the time and you have to add a different wrinkle to negate their advanced scouting.” A good start, say the players, will be beneficial to all. “We owe it to the fans, and everyone, and to ourselves to get off to a good start,” said Schenn. “That’s one of the bonuses — he (Wilson) would get rewarded because of it. We’re all one big family, one big group and we all want to do well.” More on thestar.com We value respectful and thoughtful discussion. Readers are encouraged to flag comments that fail to meet the standards outlined in our Community Code of Conduct. For further information, including our legal guidelines, please see our full website Terms and Conditions.
Hamburg Harbour Pilots, Elbe River Pilots and the Pilots of NOK I already pratice their manoevres here at MTC in Hamburg successfully since 2009. We are now offering the training course "S007 - Shiphandling for Pilots" for pilots all around the globe. We are providing training for officers and engineers serving on ships, using state of the art equipment and simulators. DP Induction and Simulator Training Courses VTS Simulator Training for Global Tech I More and more wind farms uprise in the Baltic and North sea. It is one of the official stipulations by the authorities for the offshore operating companies to permanently monitor and observe these offshore wind farms and the traffic around it ...
Q: Face Recognition in Videos with OpenCV3 gives Unhandled exception (opencv_core310.dll) Below code used to recognize face which i got from the below link http://docs.opencv.org/3.0-beta/modules/face/doc/facerec/tutorial/facerec_video_recognition.html. The only modification I've done is: Instead of using command line arguments to provide CSV and Cascade classifier paths, I have given them directly in the code. Problem Exception thrown at 0x00007FFDD0C0E09B (opencv_core310.dll) in facerecognization.exe: 0xC0000005: Access violation reading location 0xFFFFFFFFFFFFFFFF. i am getting access violation problem as shown . To solve problem i tried to 1)to debug step by step i get the exception when code reaches this line CascadeClassifier haar_cascade; after model->train 2)i reinstalled twice everything ie opencv_contru but again i same problem 3) i initially used at&t database as at.txt and since it use .pgm file (windows doesnt recognize and when i ran same problem),so i created my own data base with .jpg ie facecsv.txt(my database with 10 sets) but same problem persist 4) i changed haarcascade_frontalface_default.xml to other .xml files but still the same problem 5)dll is not a problem as configured it twice code #include "opencv2/core.hpp" #include "opencv2/face.hpp" #include "opencv2/highgui.hpp" #include "opencv2/imgproc.hpp" #include "opencv2/objdetect.hpp" #include <iostream> #include <fstream> #include <sstream> using namespace cv; using namespace cv::face; using namespace std; int abc; static void read_csv(const string& filename, vector<Mat>& images, vector<int>& labels, char separator = ';') { std::ifstream file(filename.c_str(), ifstream::in); if (!file) { string error_message = "No valid input file was given, please check the given filename."; CV_Error(CV_StsBadArg, error_message); } string line, path, classlabel; while (getline(file, line)) { stringstream liness(line); getline(liness, path, separator); getline(liness, classlabel); if (!path.empty() && !classlabel.empty()) { images.push_back(imread(path, 0)); labels.push_back(atoi(classlabel.c_str())); } } } int main(int argc, const char *argv[]) { // Get the path to your CSV: string fn_haar = "C:\\OpenCV-3.1.0\\opencv\\build2\\install\\etc\\haarcascades\\haarcascade_frontalface_default.xml"; string fn_csv = "C:\\OpenCV-3.1.0\\facedata\\facecsv.txt"; int deviceId = 0; // These vectors hold the images and corresponding labels: vector<Mat> images; vector<int> labels; // Read in the data (fails if no valid input filename is given, but you'll get an error message): try { read_csv(fn_csv, images, labels); } catch (cv::Exception& e) { cerr << "Error opening file \"" << fn_csv << "\". Reason: " << e.msg << endl; // nothing more we can do cin >> abc; exit(1); } // Get the height from the first image. We'll need this // later in code to reshape the images to their original // size AND we need to reshape incoming faces to this size: int im_width = images[0].cols; int im_height = images[0].rows; // Create a FaceRecognizer and train it on the given images: Ptr<FaceRecognizer> model = createFisherFaceRecognizer(); model->train(images, labels); // That's it for learning the Face Recognition model. You now // need to create the classifier for the task of Face Detection. // We are going to use the haar cascade you have specified in the // command line arguments: // CascadeClassifier haar_cascade; haar_cascade.load(fn_haar); // Get a handle to the Video device: VideoCapture cap(deviceId); // Check if we can use this device at all: if (!cap.isOpened()) { cerr << "Capture Device ID " << deviceId << "cannot be opened." << endl; return -1; } // Holds the current frame from the Video device: Mat frame; for (;;) { cap >> frame; // Clone the current frame: Mat original = frame.clone(); // Convert the current frame to grayscale: Mat gray; cvtColor(original, gray, CV_BGR2GRAY); // Find the faces in the frame: vector< Rect_<int> > faces; haar_cascade.detectMultiScale(gray, faces); // At this point you have the position of the faces in // faces. Now we'll get the faces, make a prediction and // annotate it in the video. Cool or what? for (int i = 0; i < faces.size(); i++) { // Process face by face: Rect face_i = faces[i]; // Crop the face from the image. So simple with OpenCV C++: Mat face = gray(face_i); // Resizing the face is necessary for Eigenfaces and Fisherfaces. You can easily // verify this, by reading through the face recognition tutorial coming with OpenCV. // Resizing IS NOT NEEDED for Local Binary Patterns Histograms, so preparing the // input data really depends on the algorithm used. // // I strongly encourage you to play around with the algorithms. See which work best // in your scenario, LBPH should always be a contender for robust face recognition. // // Since I am showing the Fisherfaces algorithm here, I also show how to resize the // face you have just found: Mat face_resized; cv::resize(face, face_resized, Size(im_width, im_height), 1.0, 1.0, INTER_CUBIC); // Now perform the prediction, see how easy that is: int prediction = model->predict(face_resized); // And finally write all we've found out to the original image! // First of all draw a green rectangle around the detected face: rectangle(original, face_i, CV_RGB(0, 255, 0), 1); // Create the text we will annotate the box with: string box_text = format("Prediction = %d", prediction); // Calculate the position for annotated text (make sure we don't // put illegal values in there): int pos_x = std::max(face_i.tl().x - 10, 0); int pos_y = std::max(face_i.tl().y - 10, 0); // And now put it into the image: putText(original, box_text, Point(pos_x, pos_y), FONT_HERSHEY_PLAIN, 1.0, CV_RGB(0, 255, 0), 2.0); } // Show the result: imshow("face_recognizer", original); // And display it: char key = (char)waitKey(20); // Exit this loop on escape: if (key == 27) break; } return 0; } my database looks like facecsv.txt C:\OpenCV-3.1.0\facedata\Angelina Jolie/Angelina_1.jpg;0 C:\OpenCV-3.1.0\facedata\Angelina Jolie/Angelina_2.jpg;0 C:\OpenCV-3.1.0\facedata\Angelina Jolie/angelina_3.jpg;0 C:\OpenCV-3.1.0\facedata\Arnold Schwarzenegger/Arnold_1.jpg;1 C:\OpenCV-3.1.0\facedata\Arnold Schwarzenegger/Arnold_2.jpg;1 C:\OpenCV-3.1.0\facedata\Arnold Schwarzenegger/Arnold_3.jpg;1 C:\OpenCV-3.1.0\facedata\Brad Pitt/Brad_1.jpg;2 C:\OpenCV-3.1.0\facedata\Brad Pitt/Brad_2.jpg;2 C:\OpenCV-3.1.0\facedata\Brad Pitt/Brad_3.jpg;2 C:\OpenCV-3.1.0\facedata\Emma Watson/Emma_1.jpg;3 C:\OpenCV-3.1.0\facedata\Emma Watson/Emma_2.jpg;3 C:\OpenCV-3.1.0\facedata\Emma Watson/Emma_3.jpg;3 C:\OpenCV-3.1.0\facedata\Justin Timberlake/Justin_1.jpg;4 C:\OpenCV-3.1.0\facedata\Justin Timberlake/Justin_2.jpg;4 C:\OpenCV-3.1.0\facedata\Justin Timberlake/Justin_3.jpg;4 C:\OpenCV-3.1.0\facedata\Katy Perry/Katy_1.jpg;5 C:\OpenCV-3.1.0\facedata\Katy Perry/Katy_2.jpg;5 C:\OpenCV-3.1.0\facedata\Katy Perry/Katy_3.jpg;5 C:\OpenCV-3.1.0\facedata\Keanu Reeves/Keanu_1.jpg;6 C:\OpenCV-3.1.0\facedata\Keanu Reeves/Keanu_2.jpg;6 C:\OpenCV-3.1.0\facedata\Keanu Reeves/Keanu_3.jpg;6 C:\OpenCV-3.1.0\facedata\Nisarg/Nisarg_1.jpg;7 C:\OpenCV-3.1.0\facedata\Nisarg/Nisarg_2.jpg;7 C:\OpenCV-3.1.0\facedata\Nisarg/Nisarg_3.jpg;7 C:\OpenCV-3.1.0\facedata\Nisarg/Nisarg_4.jpg;7 C:\OpenCV-3.1.0\facedata\Nisarg/Nisarg_5.jpg;7 C:\OpenCV-3.1.0\facedata\Tom Cruise/Tom_1.jpg;8 C:\OpenCV-3.1.0\facedata\Tom Cruise/Tom_2.jpg;8 C:\OpenCV-3.1.0\facedata\Tom Cruise/Tom_3.jpg;8 and at&t database C:\OpenCV-3.1.0\att_faces (1)\database\s1/1.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s1/10.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s1/2.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s1/3.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s1/4.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s1/5.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s1/6.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s1/7.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s1/8.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s1/9.pgm;0 C:\OpenCV-3.1.0\att_faces (1)\database\s10/1.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s10/10.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s10/2.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s10/3.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s10/4.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s10/5.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s10/6.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s10/7.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s10/8.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s10/9.pgm;1 C:\OpenCV-3.1.0\att_faces (1)\database\s11/1.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s11/10.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s11/2.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s11/3.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s11/4.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s11/5.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s11/6.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s11/7.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s11/8.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s11/9.pgm;2 C:\OpenCV-3.1.0\att_faces (1)\database\s12/1.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s12/10.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s12/2.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s12/3.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s12/4.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s12/5.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s12/6.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s12/7.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s12/8.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s12/9.pgm;3 C:\OpenCV-3.1.0\att_faces (1)\database\s13/1.pgm;4 C:\OpenCV-3.1.0\att_faces (1)\database\s13/10.pgm;4 C:\OpenCV-3.1.0\att_faces (1)\database\s13/2.pgm;4 C:\OpenCV-3.1.0\att_faces (1)\database\s13/3.pgm;4 C:\OpenCV-3.1.0\att_faces (1)\database\s13/4.pgm;4 C:\OpenCV-3.1.0\att_faces (1)\database\s13/5.pgm;4 C:\OpenCV-3.1.0\att_faces (1)\database\s13/6.pgm;4 C:\OpenCV-3.1.0\att_faces (1)\database\s13/7.pgm;4 C:\OpenCV-3.1.0\att_faces (1)\database\s13/8.pgm;4 C:\OpenCV-3.1.0\att_faces (1)\database\s13/9.pgm;4 and it goes upto 40 test sample s1 to s40 Problem Exception thrown at 0x00007FFDD0C0E09B (opencv_core310.dll) in facerecognization.exe: 0xC0000005: Access violation reading location 0xFFFFFFFFFFFFFFFF. I am using Windows 10 64-bit with Visual Studio 2015 and OpenCV 3.1.0 and opencv_contrib-master (Build Configuration: x64-Debug) Their is similar question here Face Recognition in Video using OpenCV gives unhandled exception but he used only one 1 label but i use more than 8 that didn't solved my problem A: I am using Windows 10 64-bit with Visual Studio 2015 and OpenCV 3.1.0 and opencv_contrib-master (Build Configuration: x64-Debug) You're linking to release libraries, but you're in debug mode. In debug you need to link to OpenCV libraries with the trailing "d": opencv_<module><version>d.lib. So in your case to: opencv_core310d.lib, etc...
Mycobacteria: the global disease burden {#S001} ======================================= Mycobacteria belong to the genus *Mycobacterium*, which is the only genus representing the *Mycobacteriaceae* family (order: *Actinomycetales*; class: *Actinobacteria*). The genus was proposed in 1896, to include two species namely tubercle bacillus (now known as *Mycobacterium tuberculosis*) and leprosy bacillus (*Mycobacterium leprae*) \[[@CIT0001]\]. Currently, there are \>190 distinct species of *Mycobacterium* genus, some of which are economically and clinically important pathogens of humans or animals \[[@CIT0002]\]. Among the human mycobacterial infections, those caused by *M. tuberculosis* (tuberculosis), *M. leprae* (leprosy) and *Mycobacterium abscessus* (chronic pulmonary infections) pose a public health concern. Mycobacterial infections affect ∼11--14 million people each year globally and tuberculosis (TB) alone is responsible for ∼1.3 million deaths each year, of which 374,000 were people living with HIV/AIDS. In 2016, 10.4 million people living with HIV/AIDS, were diagnosed with TB \[[@CIT0003]\]. In case of *M. leprae* infections, the World Health Organization (WHO) reported ∼200,000 new cases of leprosy each year (<http://www.who.int/wer/2017/wer9235/en/>). In 2016, 214,783 new cases of leprosy were reported globally. India reported the highest number (135,485) and Brazil 25,218 cases. Lack of effective early diagnostic tool(s), vaccines and limited understanding of the patterns of transmission contribute to the ongoing incidence. In addition to TB and leprosy, Non-Tuberculous Mycobacteria (NTM), such as *M. abscessus complex,* are emerging worldwide as the cause of chronic pulmonary infections \[[@CIT0004],[@CIT0005]\]. Incidence rates of pulmonary infections due to NTM, vary greatly with geographical regions. The global incidence remained 1.0--1.8 in a population of 100,000, however, these rates are much higher in the US, Western Pacific and Canada \[[@CIT0005]\]. The prevalence of NTMs has increased from 1.3% \[[@CIT0006]\] to 32.7% in Colorado, in cystic fibrosis patients \[[@CIT0007]\]. The growing challenge of antimicrobial resistance {#S001-S2001} ------------------------------------------------- The past few decades have seen a "discovery void" pertaining to antibacterial drug development, where very few new molecules have been patented or approved for clinical use \[[@CIT0008]\]. This is particularly true for drug discovery against mycobacteria, where no new drugs that were specifically developed for this purpose reached the clinic after the early 1960s until recently \[[@CIT0009]\]. Importantly, the emergence of resistance towards first-line and second-line drugs poses additional challenges to the development of suitable drugs in each of *M. tuberculosis*, *M. leprae* and *M. abscessus*. The approval of drugs and causes of resistance have been systematically reviewed for *M. tuberculosis* \[[@CIT0010],[@CIT0011]\], *M. abscessus* \[[@CIT0012]\] and *M. leprae* \[[@CIT0013]\]. Antibiotic resistance can arise due to physiological, intrinsic or acquired factors \[[@CIT0010],[@CIT0014]\]. The intrinsic resistance is attributed to cell-wall permeability, drug efflux systems, drug targets with low affinity and enzymes that neutralize drugs in the cytoplasm. The acquired resistance is conferred by chromosomal mutations. Although the TB mortality rate is falling at ∼3% per year globally, drug-resistant TB remains a continuing threat \[[@CIT0003]\]. The spread of drug-resistant strains of TB (mono-resistant, multidrug-resistant, extensively drug-resistant and totally drug-resistant) is alarmingly high and accounted for 490,000 cases of multidrug-resistant TB (MDR-TB) in 2016. Around 47% of the MDR-TB cases are reported in Southeast Asia \[[@CIT0015]\]. Increase in isoniazid-susceptible rifampin resistance was also noted in 2016, with 110,000 cases globally. The global burden of MDR-TB has recently increased by \>20% annually \[[@CIT0016]\] and the treatment is successful in only 50% of the MDR-TB cases. With the ongoing transmission of the drug-resistant strains of *M. tuberculosis* in communities, it is increasingly important to research novel drug targets and identify potential leads that can be expanded to new drugs. Drug resistance in leprosy is diagnosed by the mouse footpad method, which is time and labour-intensive. Alternatively, mutations can be detected in drug-resistance-determining regions of *M. leprae* drug targets such as dihydropteroate synthase (for the drug: dapsone), β subunit of RNA polymerase (rifampin) and subunit A of DNA gyrase (ofloxacin). As drug resistance has been suspected only in cases that self-report at the hospital as a result of reactivation or relapse in leprosy, the numbers are currently low; however, these may increase if a field-based surveillance system is implemented. *M. abscessus* is naturally resistant to many first-line antimicrobials, including all the current TB drugs. The acquired resistance to aminoglycosides is known to be due to mutations in genes such as *rrs* \[[@CIT0012]\]. Likewise, mutations in 23S rRNA and genes such as *erm(41)* and *rrl* are known to cause macrolide resistance in *M. abscessus* \[[@CIT0017]\]. Thus, emergence of antibiotic-resistant strains and rapid spread due to globalization poses a serious challenge to the global health \[[@CIT0018]\]. Genomics has served as an important milestone in bacterial drug discovery \[[@CIT0019],[@CIT0020]\]. It is now possible to understand causes of emergence of antibiotic-resistant strains and to identify potential drug targets through combinatorial approaches involving comparative genomics, metabolomics, phylogenomics, evolutionary and structural biology/bioinformatics ([Figure 1](#F0001){ref-type="fig"}). Here we discuss the current status of drug discovery research in each area, focusing on the scope and applicability of computational approaches. Figure 1.From mycobacterial genomes to drug discovery. Post-genomic application areas in mycobacterial drug discovery such as comparative genomics and structural biology/bioinformatics are shown. Availability of genome sequences and annotation data: applications of comparative genomic approaches to drug discovery research {#S002} =============================================================================================================================== Comprehensive understanding of the organization of mycobacterial genomes began in 1998 with the elucidation of the complete genome sequence of *M. tuberculosis* \[[@CIT0021],[@CIT0022]\]. The *M. tuberculosis* reference genome (H37Rv strain) is 4.41 Mbp in length and comprises 4081 protein genes, 13 pseudogenes, 45 tRNA genes, 30 ncRNA, 3 rRNA genes and 2 miscRNA genes (<http://svitsrv8.epfl.ch/tuberculist/>). The genome of *M. leprae* was first sequenced in 2001 \[[@CIT0023]\]. This 3.2 Mbp genome has significant sequence similarity with that of *M. tuberculosis*; however, *M. leprae* reductively evolved to survive with 1614 protein genes, 1310 pseudogenes, 45 tRNA genes, 3 rRNA genes and 2 stable RNA genes (<http://svitsrv8.epfl.ch/mycobrowser/leprosy.html>). The complete genome of *M. abscessus* strain ATCC 19977 was first sequenced in 2008 \[[@CIT0024]\]. The 5.06 Mbp genome consists of 4941 genes encoding 2886 proteins with functional assignments and 2055 hypothetical proteins (<https://www.patricbrc.org/view/Genome/36809.5>). Rapid annotation of genomic data, leading to the development of general purpose as well as specialized resources, described in Supplementary Table 1, is providing important information pertinent to sequence, structure, function, metabolic pathway, taxonomy and drug resistance mutations. Comparative genomics: understanding strain diversity and emergence of drug-resistant strains {#S002-S2001} -------------------------------------------------------------------------------------------- Most pathogenic mycobacterium species including *M. tuberculosis* and *M. leprae* are slow growers taking \>7 days to form visible colonies on solid media. Comparative pan-genomic analyses indicate that the evolution of rapid and slow growers is attributed to a series of gene gain and gene loss events leading to adaptation to different environments \[[@CIT0025]\]. Classical methods for genotyping of mycobacterial strains include IS6110DNA fingerprinting, spoligotyping and 24 locus-MIRU (mycobacterial-interspersed repetitive units)-VNTR (variable number of tandem repeats) typing \[[@CIT0026]\]. With the availability of genome sequencing data, complete genome-based phylogenies are being used for genotyping and classification of mycobacteria \[[@CIT0027],[@CIT0028]\]. The classical *M. tuberculosis* complex is subdivided into seven distinct lineages with characteristic geographic distribution \[[@CIT0029]\]. Genomic analyses revealed three subspecies of *M. abscessus*, namely *M*. *abscessus*, *M. massiliense* and *M. bolleti* \[[@CIT0030]\]. Likewise, lineage diversity within distinct subtypes of *M. leprae* has been recently studied based on phylogenomic analyses of 154 genomes \[[@CIT0031]\]. Molecular phylogenetics and evolutionary dynamics methods allow study of epidemiology and links between genetic diversity and emergence of drug resistance in mycobacterial strains \[[@CIT0032]\]. Antibiotic-resistant genes are important markers for delineation of evolution and spread of drug resistance \[[@CIT0010],[@CIT0014],[@CIT0033]\]. Such computational studies have helped to answer specific questions such as: Whether a particular phylogenetic lineage is associated with drug resistance in an outbreak/epidemic? When and how the drug-resistant strains have emerged? What are the evolutionary factors that cause antimicrobial drug resistance in mycobacterium? Computational studies on mycobacterium addressing each of these questions are described below. Recently, genomic studies focusing on population structure, origin and spread of MDR-TB have been undertaken across various parts of the world \[[@CIT0029],[@CIT0034]\]. A study \[[@CIT0034]\] on strain diversity and phylogeography using genomes of 340 *M. tuberculosis* strains (isolated during 2008--2013) from KwaZulu-Natal, helped to elucidate the timing of acquisitions of drug resistance mutations that confer XDR-TB, indicating that isoniazid-resistance evolved earlier than rifampicin-resistance^.^ Similarly, molecular epidemiology of MDR-TB in Ireland has been systematically examined using genomes of *M. tuberculosis* strains isolated during 2001--2014 from MDR-TB cases \[[@CIT0035]\]. Among seven lineages of MTB complex, Beijing lineage was observed to be associated with MDR \[[@CIT0035]\]. MDR-TB in Ireland was found to be introduced from other localities, as known for several European countries \[[@CIT0037]\]. In the case of *M. abscessus*, phylogenomic studies revealed the major role of recombination in causing lineage diversity \[[@CIT0030],[@CIT0038],[@CIT0039]\]. Population structure and recombination analyses provided significant evidence of gene flow and admixture among three lineages (*M. abscessus*, *M. massiliense*, and *M. bolleti*), and a correlation with pathogenicity and macrolide resistance in cystic fibrosis patients was found \[[@CIT0039]\]. Phylogenomic and genetic polymorphism analyses have also been carried out using *M. abscessus* isolates from US \[[@CIT0040]\]. A population genomic study \[[@CIT0041]\], based on the worldwide collection of clinical isolates of *M. abscessus,* has shown that the majority of *M. abscessus* infections are acquired through transmission (potentially via aerosols and fomites) of recently emerged circulating clones that have spread across the world. These clones are observed to be associated with increased virulence and worse clinical outcomes. This is a wake-up alarm! We are facing a pressing international infection challenge \[[@CIT0041]\]. In the case of *M. leprae*, a comprehensive study on phylogenomics and antibiotic resistance has been recently published \[[@CIT0031]\], which focuses on sequence and selection pressure analysis of wildtype as well as antibiotic-resistant genes. Several attempts have also been made to analyse the origin and spread of leprosy across various parts of the world \[[@CIT0042]\]. Thus, comparative genomics and phylogeographic studies are important in understanding the global spread and transmission dynamics of the mycobacterial infections. Strain diversity is shown to be one of the contributing factors to antibiotic resistance, linking transmission dynamics to medicine, across various geographic areas which are endemic for diseases such as TB \[[@CIT0043]\]. Furthermore, all these developments point to an increasing need for new and effective drugs to combat antibiotic resistance. Ideally, new drugs must have a novel mode of action to reduce events of cross-resistance, optimal dose-response, pharmacokinetic and toxicity profiles allowing safe and short duration of therapy either solely or in combination with other drugs. Comparative genomics of metabolic pathways provide a means to rapidly identify potential gene targets and thus could aid in drug discovery research (detailed in next section). Comparative pathway analyses and identification of essential genes {#S002-S2002} ------------------------------------------------------------------ *M. tuberculosis*, *M. abscessus* and *M. leprae* survive in distinct ecological niches with distinct evolving features that enable them to adapt to their specific environments. Malhotra et al. \[[@CIT0044]\] describe a 90% overlap of known and proposed drug targets against all mycobacterial species. The study identified the major pathways such as chorismate, purine/pyrimidine and amino acid biosynthetic pathways, essential for the survival of mycobacteria, as conserved in all these three species with minor differences in the carbon metabolism pathways. *M. tuberculosis* is known for its peculiar ability to survive in the human macrophage despite varying stress conditions (redox, acidic, and nitrosamine) within the host. This has contributed to a very elaborate DNA repair and recombination system. The most up-to-date metabolic reconstruction for *M. tuberculosis* describes 1228 metabolic reactions, 1011 genes and 998 metabolites \[[@CIT0045]\], where 250 protein-coding genes present in the lipid biosynthetic pathways are responsible for the thick cell wall. Mutations in these pathways give rise to further changes in their metabolic pathways. Draft metabolic reconstruction for *M. abscessus* exists in BioCyc \[[@CIT0046]\] and KEGG \[[@CIT0047]\] databases, with 110 pathways including biosynthesis, metabolism, biodegradation and information processing pathways. Evolutionary analyses showed that *M. abscessus* is more closely related to other NTMs such as *M. avium* complex and has a well-supported membrane transport system with a large number of efflux pumps, resulting in multidrug-resistant features \[[@CIT0048]\]. As an opportunistic bacterium, *M. abscessus* is able to survive outside its host and also contains metabolic pathways not associated with pathogenesis, which contribute to its larger genome size as compared to obligate pathogens. In case of *M. leprae*, reductive evolution has led to the loss of common catabolic pathways such as lipolysis and impairment of the energy metabolism pathways \[[@CIT0023]\]. Moreover, the production of cognate and prosthetic groups from transport, biosynthetic and electron transfer pathways is also affected \[[@CIT0049]\]. With the loss of several functions, and the presence of a large number of conserved but unknown functions of pseudogenes, further studies to characterize the metabolic pathways in *M. leprae* are required. Approaches to identify essential genes and prioritization of drug targets {#S002-S2003} ------------------------------------------------------------------------- The availability of genome sequences of mycobacteria, and annotations in sequence, structure and pathway databases facilitate systems-level analysis wherein comparative genomics and evolutionary bioinformatics approaches can be integrated to identify the minimal set of essential genes, leading to faster identification of putative drug targets. Essential genes that are necessary for the survival of the bacterium, and are critical components of metabolic and physico-chemical pathways, can be identified by gene knockouts, saturation transposon mutagenesis, RNA interference, etc. Essential genes have been characterized experimentally in the case of *M. tuberculosis* \[[@CIT0050]\]. However, limited studies have been carried out in *M. abscessus* and *M. leprae*. Specifically, *M. leprae* cannot be cultured *in vitro* and thus demands computational identification of essential genes. Computational approaches for identification of essential genes, including machine learning, flux balance analyses and comparative genomics \[[@CIT0053]\], are faster and cheaper than experimental methods \[[@CIT0053]\]. Machine learning methods utilize unique genomic features of essential genes such as length of proteins, codon usage, GC content, sub-cellular localization, higher rate of evolutionary conservation, etc. Dedicated resources such as Database of Essential Genes \[[@CIT0054]\] and the database of Online Gene Essentiality \[[@CIT0055]\] have been developed, which serve as a platform for identification and prioritization of essential drug targets in various species including *M. leprae* \[[@CIT0056]\]. Advent of next-generation sequencing has enabled design of comparative genomics workflows to identify essential genes in case of *M. tuberculosis* \[[@CIT0057]\]. Upon identification of a set of essential genes, prioritization of drug targets can be achieved by further screening of essential genes based on computational predictions of ADMET (absorption, distribution, metabolism, excretion and toxicity) properties, sub-cellular localization, etc. In view of growing concern about drug resistance, attempts have been made to prioritize drug targets based on various analyses such as identification of uniqueness in metabolome and similarities to known druggable proteins, analysis of the protein-protein interactome, flux balance analysis of reactome and sequence-structural analysis of targetability of genes using integrative strategies \[[@CIT0058],[@CIT0059]\]. As most critical targets in a pathogenic organism are expected to be evolutionarily conserved, this has been applied to filter essential genes in *M. tuberculosis* \[[@CIT0058]\]. Likewise, convergent positive selection analyses were used to identify genes that possibly cause drug resistance in *M. tuberculosis* \[[@CIT0059]\]. Evolutionary rate has been proposed as a useful parameter for ranking and prioritizing antibacterial drug targets \[[@CIT0060]\]. Thus, understanding evolution of drug targets is one of the important aspects of the drug discovery, especially to tackle the problem of drug resistance. Structural biology and bioinformatics to combat mycobacterial infections {#S003} ======================================================================== Early approaches to the discovery of new antibiotics relied almost entirely on whole-cell phenotypic screening of natural products, microbial extracts and fermentation broths. This approach has helped in the discovery of most antibiotics in use to date and recently led to the approval of two new drugs, bedaquiline and delamanid, for the treatment of drug-resistant strains of TB \[[@CIT0061]\]. Structure-guided drug discovery, pioneered in academia and some companies in the 1970s became central to the discovery of antihypertensives that targeted renin and AIDS antivirals that targeted HIV protease in the 1980s and 1990s \[[@CIT0062]\]. Opportunities for structure-guided drug discovery of mycobacterial targets became real only later when genome sequences became available. Understanding the structure and mechanism of the target allowed progress and optimization of hit-to-lead molecules, as well as a better understanding of resistance mechanisms, identifying causes of potential side effects and drug-drug interactions. This understanding led many research groups to perform high-throughput screening (HTS) and fragment-based screening campaigns of chemical libraries \[[@CIT0065]\] directly against carefully selected targets of interest. The applications of structure-guided drug discovery to mycobacteria have been reviewed earlier \[[@CIT0066]\]. Structural features can also be used to further refine target selection and validation including lack of structural homology to human host to avoid mechanism-based toxicity and ligandability leading to modulation of target activity. Where the target protein has not been structurally or functionally characterized, it's structural model can be built based on homologous proteins using programs like MODELLER \[[@CIT0069]\]. Important information regarding target protein function and properties can be obtained from databases such as TubercuList (<http://svitsrv8.epfl.ch/tuberculist/>) or CHOPIN \[[@CIT0070]\]. Further, druggability of targets can be predicted by analysing properties and depths of various pockets/hotspots (capable of small-molecule binding interactions), using several databases and programs \[[@CIT0071]\]. Fragment-based drug discovery (FBDD): a promising alternative to HTS approach {#S003-S2001} ----------------------------------------------------------------------------- The principal advantage of the FBDD approach compared to HTS methods is that very small libraries (\<10^3^ fragments) of low molecular weight (\<300 Da) compounds can be used to obtain good starting points for lead discovery \[[@CIT0065]\]. Initial fragment hits usually exhibit lower potency than the more complex molecules found in typical HTS compound libraries, but can be chemically optimized into lead candidates, thereby more effectively exploring the chemical space available for binding to the target protein \[[@CIT0068]\]. [Figure 2](#F0002){ref-type="fig"} illustrates a typical fragment screening cascade employed in our lab. The details of these steps are summarized in Supplementary File 1. Figure 2.FBDD cascade. Various techniques involved in each of the four stages are shown. FBDD approaches have been successfully applied to design inhibitors targeting various key *M. tuberculosis* enzymes such as pantothenate synthetase \[[@CIT0072]\], transcriptional repressor \[[@CIT0073]\], cytochrome P450 \[[@CIT0074]\], thymidylate kinase \[[@CIT0075]\] and malate synthase \[[@CIT0076]\]. Some of the lead molecules developed from such fragment-based campaigns showed promising inhibitory response against *M. tuberculosis*, as shown in the example in Supplementary Figure 1. Virtual screening, hotspot mapping and pharmacophore modelling to aid structure-guided drug discovery {#S003-S2002} ----------------------------------------------------------------------------------------------------- *In-silico* screening and docking of compound libraries often help to reduce the time and cost involved in experimental testing of large sets of compounds to identify potential hits. The effectiveness of such virtual screening exercises can be improved by complementing the analysis with fragment hotspot-mapping programs \[[@CIT0071]\], which identify regions within the protein that provide relatively large contribution towards ligand binding in addition to information on interactions governing the predicted regions. Several studies \[[@CIT0077],[@CIT0078]\] have used an energy-based pharmacophore modelling approach to complement virtual screening, followed by chemical optimization to identify inhibitors. We have collaborated with Maria Paola Costi at the University of Modena in a similar study involving a combination of virtual screening and molecular dynamics simulation methods to identify novel chemical scaffolds targeting *M. tuberculosis* thymidylate synthase X \[[@CIT0079]\]. Phenotypic screening along with advances in chemical genetics and bioinformatics has allowed target-guided compound identification and optimization \[[@CIT0080]\], by utilizing target mechanism-based whole-cell screening or by genetic manipulation of the target phenotype, or by finding targets directly from phenotypic hits \[[@CIT0081]\]. The latter approach can employ various techniques such as whole genome sequencing to identify resistant mutants \[[@CIT0082],[@CIT0083]\], transcriptional profiling \[[@CIT0084]\], chemical biology and metabolomics \[[@CIT0085]\] or in-silico methods \[[@CIT0086]\]. These advances in the field discussed above, coupled with a comprehensive understanding of the chemical space of mycobacterial drugs, hold promise of accelerating the process of mycobacterial drug discovery. From genomes to proteomes: automated modelling of proteomes through structural genomics and bioinformatics {#S003-S2003} ---------------------------------------------------------------------------------------------------------- Methods to identify structures that are potentially similar to the protein in question (*templates*) have been developed in our laboratory \[[@CIT0087]\] and elsewhere (reviewed in \[[@CIT0088]\]), as well as methods such as MODELLER \[[@CIT0069]\] and Rosetta \[[@CIT0089]\] to leverage this similarity to build theoretical, comparative models based on target-template alignments. Community-wide efforts, such as Critical Assessment Structure Prediction \[[@CIT0090]\] have led to substantial improvements in the accuracy of these approaches, both in terms of template identification and alignment, as well as model building and refinement. However, most of these methods focus on producing a single, most likely structure of each protein. Our group has developed a structural genomics resource for *M. tuberculosis* (H37Rv strain) called CHOPIN \[[@CIT0070]\] which provides an ensemble of predicted models in different conformational states. These models are generated through a homology modelling pipeline. Development of such structural resources is important to identify potential therapeutic targets \[[@CIT0091]\]. Moving beyond proteomes: understanding the impact of drug-resistant mutations in drug targets {#S003-S2004} --------------------------------------------------------------------------------------------- Mutations are likely to confer drug resistance by altering the energy landscape of the target protein, affecting the protein-protein interactions or affecting the drug/ligand binding with the target protein. Computational approaches to predict the effects of mutations on the structure and function of proteins can prove helpful in understanding the mechanism of drug resistance. Our lab has developed two well-established methods, SDM (Site Directed Mutator), based on a statistical approach using Environment Specific Substitution Tables \[[@CIT0092]\] and mCSM (mutation Cutoff Scanning Matrix), a machine learning approach \[[@CIT0093]\] to predict the structural and functional effects of mutations on the target proteins. mCSM is available in different flavours to predict the effects of mutations on protein stability (mCSM-stability), protein-protein interactions (mCSM-PPI) and protein-ligand interactions (mCSM-lig) \[[@CIT0094]\]. Additionally, in order to determine the impact of mutations on flexible protein conformations, tools like EnCOM \[[@CIT0095]\] and FoldX \[[@CIT0096]\] have been developed. Such methods have been used by our group and others to gain insights into the mechanism of mutations in various genetic and mycobacterial diseases including leprosy \[[@CIT0097]\]. Such analyses of the structural and functional mechanism of drug resistance causing mutations using computational approaches are very helpful in the rapid assessment of many mutations not easily achieved using experimental methods. Challenges and future perspectives {#S004} ================================== This review has focused on the importance of advances in sequence and structure determination of genomes and their protein products in efforts to develop structure-guided drug discovery against three mycobacteria: *M. tuberculosis*, *M. abscessus* and *M. leprae*. Although *M. tuberculosis* is the most studied mycobacterium, 3D structures of only ∼16% of gene products have been determined experimentally. Sequence-structure homology recognition and comparative modelling have proved useful in providing clues about druggability. Furthermore, the more accurate models, based on structures of close homologues, can provide a basis for virtual screening and ligand design. Metabolic reconstructions are providing insights into how *M*. *tuberculosis* has adapted within the host, and similar studies in *M. abscessus* and *M. leprae* are needed to provide better understanding of pathogenesis and design of new treatment regimes. The current focus in many laboratories is on providing user-friendly databases for the structural proteomes, and extending these not only to structures of homo- and hetero-oligomers, and complexes with natural and synthetic ligands, but also to incorporate data on metabolic pathways and epistasis, which are important in target selection. The target-guided approach for antibiotic drug development has generally led to a low rate of translation of *in-vitro* inhibitory response to bactericidal/bacteriostatic activity. This challenge requires further study not only of physico-chemical properties of compounds affecting permeability of the thick waxy cell envelopes of mycobacteria, but also of drug efflux pumps and metabolic inactivation of compounds by bacterial/host cell enzymes that affect compound bioavailability. The emergence of drug resistance through mutations in the target is also a growing challenge. We have developed systematic mutagenesis studies using our software with a view to identify regions where drug design might be directed with a minimal chance of resistance. This is likely to be a key component in drug discovery in future, especially through structure-guided fragment-based approaches, where choices of fragment elaboration or cross-linking can be made in the light of such analyses of mutability. Disclosure statement {#S005} ==================== No potential conflict of interest was reported by the authors.
Sarpa The term Sarpa may refer to any of the following: Sarpa salpa—a species of bream (fish) SARPA—a charter airline Sarpa—the Sanskrit term for snake/serpent, from which is derived: Sarpa Kavu—a Hindu sacred place in South India Sarpa Samskara or Sarpa Dosha—a sacred Hindu rite (pooja) practiced in the Kukke Subramanya Temple Sarpa Satra—an attempt by Janamejaya to eliminate the Naga race Sarpa Satra—an English language poem written by the Hindu poet Arun Kolatkar Sarpa Lake—a lake in southwestern Russia Sarpa River—a river which flows into the Volga River and after which Old Sarepta is named Sarpa de Tigre—Mexican luchador who was defeated by Rey Cometa in 2003
The social economy has declined. Online users’ patterns are changing: they no longer use social networks to broadcast, connect and share their lives. Consumers now seek deeper online and offline experiences for fulfillment. “People want better experiences from devices, applications, websites and the offline services they enable,” said Chris Dixon, CEO of Hunch. They are looking for something less superficial than what they currently find on social media sites. They want meaning and understanding. They want to be challenged.
Beretta Model 38 The MAB 38 (Moschetto Automatico Beretta Modello 1938), Modello 38, or Model 38 and its variants were a series of official submachine guns of the Royal Italian Army introduced in 1938 and used during World War II. The guns were also used by the German, Romanian, and Argentine armies of the time. History Originally designed by Beretta's chief engineer Tullio Marengoni in 1935, the Moschetto Automatico Beretta (Beretta Automatic Musket) 38, or MAB 38, was developed from the Beretta Modello 18 and 18/30, derived from the Villar Perosa light machine gun of World War I. It is widely acknowledged as the most successful and effective Italian small arm of World War II and was produced in large numbers in several variants. Italy's limited industrial base in World War II was no real barrier toward the development of advanced and effective small arms, since most weapons did require large amounts of artisan and semi-artisan man-hours to be fine-tuned and made reliable by default. Italian specialized workers excelled and the initial slow rate of production meant that the MAB 38 became available in large numbers only in 1943, when the fascist regime was toppled and Italy split between the Allied-aligned co-belligerent forces in the south and German collaborationists of the Italian Social Republic in the north. The MAB 38 was developed by Beretta to compete in the rich market of machine and sub-machine guns; it was a well-made and sturdy weapon, introducing several advanced features and was suitable for police and special army units. Presented to Italian authorities in 1939, its first customer was the Italian Ministry of Colonies, which purchased several thousands MABs to be issued as standard firearm of the Polizia dell'Africa Italiana (Italian Africa Constabulary), the government colonial police force. Army orders were slow to come; although impressed by excellent qualities and firepower of the weapon, the Italian military did not feel the MAB was suitable for standard infantry combat. It was judged ideal for police and assault units and in the beginning of 1941 small orders were placed for Carabinieri (military and civilian police), Guardie di Pubblica Sicurezza (national state police), and paratroopers. The Italian Army requested minor changes to reduce production costs, notably the changed shape of the recoil compensator and the removal of the bayonet and catch as the MAB 38A. This was the standard army variant, used throughout the war and issued to elite Italian units, paratroopers, Alpini "Monte Cervino" assault battalion, 10th Arditi Regiment, "M" Battalions of Milizia Volontaria per la Sicurezza Nazionale (MVSN, Blackshirts) and military police. The Italian Royal Navy also purchased the type and MAB 38A were given to the "San Marco" Marine Regiment and naval security troops; The Regia Aeronautica (Italian Royal Air Force) issued the MAB 38A to its crack A.D.R.A. Regiment. Orders were still small and the Carcano M1891 rifle remained the standard weapon even in elite units. Until 1943, MAB 38A (and since 1942, the MAB 38/42) was available almost exclusively to paratroopers, Blackshirts, tank crews and Carabinieri military police, given the need of all of the former to express high volumes of firepower in prolonged actions or to keep close-quarters combat superiority. The paratroopers of the 185th Airborne Division Folgore was armed exclusively with the weapon. Blackshirt legions (one per infantry division) were regarded and used as elite assault units both for their fanaticism and their Beretta 38s. After the Italian armistice of September 8, 1943, the Italian armed forces melted away and an Italian army was reconstructed in northern Italy under German sponsorship, the Beretta MAB equipped many units. The Italian Social Republic (R.S.I.) army fought a guerrilla war against partisans from the start, as well as against the Allies. For assault and counterinsurgency units, where firepower at close range was a vital asset, it was the ideal weapon. Production of the MAB became priority and it was supplied in great numbers to R.S.I. formations, especially elite units and it became an iconic weapon, symbolizing the Italian soldier in popular culture. Later in the war, a simplified variant known as the MAB 38/44 was introduced. Regardless of the tables of organization and equipment of a unit, the Beretta 38 was a popular weapon that could eventually find its way into the hands of virtually any soldier, especially amongst officers and higher non-commissioned officers, in any type of unit. A magazine-holding vest was designed for elite troops (Blackshirts, paratroopers) armed with the Beretta 38; these were dubbed "Samurai" due to the similarity of the stacked magazines with traditional Japanese armour. A special canvas holster was issued with the MAB with two magazine-carrier pouches sewn on, to be worn as a belt but only came into use during the brief life of the R.S.I. and by then could be seen in the employ of many different units whose "elite" status could have been reasonably questioned (such as Black Brigades and other militias). The Beretta MAB was highly praised by Italian resistance movement fighters as well, being far more accurate and powerful than the British Sten which was common issue in partisan units, although the smaller Sten was more suited for clandestine operations. German soldiers also liked the Beretta MAB, judging it large and heavy, but reliable and well made. The 1938 series was extremely robust and proved very popular with Axis forces as well as Allied troops, who used captured examples. Many German soldiers, including elite forces such as the Waffen-SS and Fallschirmjäger forces, preferred the Beretta 38.Quarrie, Bruce, Fallschirmjäger: German Paratrooper, 1935-45, Osprey Publishing (2001), , , p. 59 Germany manufactured 231,193 Beretta M38s in 1944 and 1945. Firing a powerfully loaded Italian version of the widely distributed 9×19mm Parabellum cartridge, the Cartuccia 9 mm M38, the Beretta was accurate at longer ranges than most other submachine guns. The MAB could deliver an impressive firepower at close range and at longer distances its size and weight was an advantage, making the weapon stable and easy to control. In expert hands, the Beretta MAB allowed accurate short-bursts shooting up to and its effective range with Italian M38 ammunition, was s, an impressive result for a 9 mm submachine gun. Specifications MAB 38, in its first variants, was a fine weapon by any standard, crafted with high quality materials, flawlessly finished and with carefully machined parts. Models 38/42 and 38/44 were easier and faster to build, the finish was sacrificed for speed of production but the quality remained high. The mechanism was a traditional simple blowback recoil but with a novel floating firing pin, an automatic safety on open bolt (both later removed to save production costs), a recoil compensator on the muzzle, a bolt cocking handle with sliding dust cover and a striking trigger gear with no fire selector but with two triggers instead; the fore trigger was for semi-automatic fire and rear trigger for full-auto. The user could shift quickly between methods without switching levers or safety catches, which proved useful in combat. The full-auto trigger had a safety catch on left side, which was eliminated from 1942 and the rear sight was adjustable up to in the MAB 38 and 38A, the 38/42 and 38/44 variants had fixed rear sights. The MAB 38 had a wooden stock, was about long and weighed about when loaded, with an effective range of about . Variants The Model 1938 can be recognized by its machined steel receiver, fine craftsmanship and finish and by the perforated cooling jacket over the barrel. It was produced from 1938 to 1950 and fired 9×19mm Parabellum ammunition at 600 rounds per minute. It used 10, 20, 30 or 40-round magazines; the short 10-round magazine, when used in conjunction with the fixed bayonet, was popular with Allied and Axis forces for guarding prisoners or internal security.Smith, Joseph E., Small Arms of the World, 11th ed., Harrisburg, PA: The Stackpole Company (1969), pp. 481-482 In combat, the 30 round magazine was the most common. The original MAB 38, first issued to Italian police in 1939, had a bayonet mount and stock rest for the Carcano M91/38 folding bayonet. In compliance with Italian army requirements, bayonet mount and rest were eliminated and the recoil compensator was redesigned, the two horizontal muzzle slots substituted by 4 transversal cuttings, judged more effective. This standard army variant was renamed MAB 38A and issued in 1941. Despite its undeniable effectiveness, the Beretta Model 38 proved too time-consuming and expensive to produce during wartime. Marengoni designed a simplified model made from sheet steel, in which the cooling jacket and bayonet mount were eliminated and the separate firing pin mechanism replaced by a fixed firing pin machined on the face of the bolt. The barrel and wooden stock were also shortened to save weight and cost.Small Arms of the World, pp. 482-483 This new model the Model 38/42 had a fluted barrel to aid cooling and save weight. It also had a slower rate of fire (550 rpm). The Model 38/43, was an intermediate production stage between the 42 and 44 patterns. The 38/42 and 38/43 were adopted by the Wehrmacht as the Maschinenpistole 738(i), abbreviated as MP.738. Models produced for the German Army received German acceptance marks. The Model 38/44 was a minor revision of the 38/43, in which the bolt was simplified and a large-diameter recoil spring used in place of the operating spring guide. It also eliminated the fluting to save time and increase production. The 38/44 was also adopted by the German army as the MP.739. A variant of the Model 38/44 was fitted with an MP40-style under-folding stock as the Model 1. After World War II, the 38/44 continued in production in slightly revised form as the 38/49 series: the Model 2 or MP 38/44 Special with an MP40-style under-folding stock and extended magazine well, the Model 3 with an extended magazine well and telescoping steel-wire buttstock and the Model 4 with a standard wooden rifle stock. All of these models have a push-button cross-bolt safety catch at the middle of the stock After Marengoni's death, Beretta engineer Domenico Salza revised the safety system of the Model 38/49 series as the Model 5, identified by a large rectangular grip-safety button located in the stock's finger groove. The Model 5 was produced for the Italian Army, police and the armed forces of several other nations until 1961, when production ceased in favor of the compact, modern Beretta M12. Unusually, it ejectes to the left, because of the non'reciprocating cocking/charging handle, slot cover, on the right, side, being in the way. Users : captured by the Albanian Partisans in vast quantities during the war : Used by Armée de Libération Nationale :Used by Mukti Bahini. : Models 38/44 and 38/49 : Model 38/49 : 350 ordered and 50 delivered in 1943. : Models 38/42 and 38/49 : Italian surplus MP38s bought in 1958. : MP38/49 (Model 4) and Model 5, identified as the MP1. Used by Bundeswehr (until 1959) and Bundesgrenzschutz (replaced at the end of the 1960s) : MP1938/49 variant. Deployed during the United Nations Operation in the Congo. : Model 38/44 Italian Social Republic Italian Resistance : Used by Western Somali Liberation Front rebels during Ogaden War. Model 38/44 : 5,000 ordered in 1941 and delivered during 1942. Received both Model 38A and Model 38/42. : Model 38/49 : Model 38/49 : Model 38/49 : Captured in vast quantities. See also List of Italian submachine guns References Further reading Dunlap, Roy F., Ordnance Went Up Front, Samworth Press, (1948) Hogg, Ian V. and Weeks, John, Military Small Arms of the 20th Century, 6th ed. DBI Books, Inc. (1991), Smith, Joseph E., Small Arms of the World, 11th ed., Harrisburg, PA: The Stackpole Company (1969), G. Rosignoli, RSI: uniformi, equipaggiamento ed armi, Albertelli Ed., 1985 Category:World War II submachine guns Category:World War II infantry weapons of Italy Model 38 Category:9mm Parabellum submachine guns Category:Submachine guns of Italy
DIY for Homeowners I was assigned the project of making my daughter-in-law a pouf for her living room. I’d previously made one for my living room which she liked & she requested one for her home. Materials/Tools 2 yards of home decor weight fabric. I used “Make Waves” by Waverly 16” zipper, thread Two 20 ounce bags of polyfil The contents of a small bean bag chair Sewing machine/iron, etc The pouf is an 18” cube. I cut 5 pieces of fabric 19” square (allowing for a 1/2” seam allowance on for each seam) & one 21” square for the bottom piece allowing a 1” seam allowance in which I inserted a zipper. Step 1: Cut out the fabric pieces matching the pattern if there is one. The fabric I used had a definite pattern which required using more fabric than if I had used a solid in order to match the pattern. There was a lot of waste. Be sure to label each piece to keep all the parts going in the same direction. I used a small arrow in the lower left hand corner of each piece & labeled the top with the word ‘top’ in the same corner. I labeled the bottom with 19” so I knew which was the longer side. Step 2: Fold the bottom piece in half (the 22” side), press, pin. Draw a chalk line 1” from the folded edge to mark the stitching line. Using a basting (or long stitch) sew the seam. Cut on the fold. Press open. Insert zipper using either the lapped or centered method. I used the lapped method. ​ Step 3: Match up side seam pieces, pin, mark 1/2” from the top & bottom of the seam, & stitch the sides together, starting & stopping 1/2” from the edge. Press. Step 4: Sew the top & bottom pieces to the sides. Even through I worked to match the pattern, I was successful matching only one side of the top with one of the sides. Oh, well. ​ Attaching the bottom & the top is a little tricky. Hold the pouf so you are able to see the side seam stitching. This is where stopping & starting 1/2” from the edge pays off in helping to make perfect corners. Match the top edges of the side piece & top piece making sure to keep the other side of the seam allowance out of the line of stitching. Stitch, using a 1/2” starting & stopping at the side seam stitching. Do not stitch all the way to the edge. Do the same for the remaining top & bottom edges. it takes a bit of time, but it does produce great corners. ​ When finished, turn the pouf inside out (this is made much easier if you have remembered to leave the zipper open before sewing on the top & bottom—oops). Press the top & bottom seams towards the middle & the side seams all going in the same direction. Don’t press the seams open. Step 5: Go outside with the bean bag chair, hope that it has a liner inside that bag keeping all the styrofoam pellets contained, but don’t be surprised if it doesn’t! Well, my bean bag did NOT have a liner so I carefully transferred the pellets into old pillowcases. (Be sure to clean up throughly as these pellets are not good for the environment or wildlife.) I stitched up the pillowcases to keep the pellets contained. Step 6: Stuff. I added two of the three bags of pellets to the pouf & then added handfuls of polyfil to the corners & up the sides. I added the last bag & filled in with more polyfil to fill in any holes. Zip it up & you’re done. Once I’m sure it doesn’t need any more filling I will stitch the zipper closed so that little toddler hands don’t unzip & un-stuff the whole thing!
Nearby Cities Distance from UNION CITY NJ to WEST NEW YORK NJ: 0.8 miles NE Distance from UNION CITY NJ to GUTTENBERG NJ: 1.4 miles NE Distance from UNION CITY NJ to NORTH BERGEN NJ: 1.8 miles NE Distance from UNION CITY NJ to SECAUCUS NJ: 1.8 miles W Distance from UNION CITY NJ to HOBOKEN NJ: 2.5 miles S Distance from UNION CITY NJ to CLIFFSIDE PARK NJ: 3.5 miles NE Distance from UNION CITY NJ to RIDGEFIELD NJ: 3.9 miles N Distance from UNION CITY NJ to BRIGHTWATERS NY: 4.1 miles S Distance from UNION CITY NJ to EDGEWATER NJ: 4.1 miles NE Distance from UNION CITY NJ to JERSEY CITY NJ: 4.5 miles SW
Giving in to more candies, cookies and other refined sugars are the direct indication of sweets craving. It so hard to control to the extent that the more sweets you have the more you are looking forward to. At this point, you have to take action to manage your sugar intake given that it remains the main factor that works against healthy eating which would be the major contributory factor to overweight and other sugar related conditions. About Us Your Schedule We all have busy schedules, our goal is to assist you to maximize your day and give you information and tips on how you can improve yourself by just taking a few minutes of you day to care for your health and body.
CT findings of leukemic pulmonary infiltration with pathologic correlation. The aim of this study was to demonstrate the characteristic CT findings of leukemic pulmonary infiltration based on the pathologic findings. The CT findings of 11 leukemic patients with leukemic pulmonary infiltration were compared with those of 22 leukemic patients with other diseases as a control group. Evaluated pulmonary parenchymal CT findings included thickening of bronchovascular bundles and interlobular septa, prominence of peripheral pulmonary arteries, ground-glass opacities, air-space consolidation, and nodules. The CT-pathologic correlations for leukemic infiltration were evaluated in 7 patients. Frequent parenchymal CT findings were thickening of bronchovascular bundles (81.8%), prominence of peripheral pulmonary arteries (81.8%), and non-lobular and non-segmental ground-glass opacities (90.9%). The first two findings were significantly more frequently observed in leukemic infiltration than in the control group, had good interobserver agreement, and corresponded pathologically to leukemic cell infiltration around the pulmonary arteries, bronchi, or bronchioles. Non-lobular and non-segmental ground-glass opacity corresponded to leukemic cell infiltration within alveolar spaces and septa adjacent to the pulmonary arteries or bronchi and also corresponded to hemorrhage, edema, or diffuse alveolar damage. Thickening of bronchovascular bundles and prominence of peripheral pulmonary arteries are CT findings suggestive for leukemic infiltration and correspond to peribronchovascular tumor extension.
{ "commentStamp" : "<historical>", "super" : "WAServerAdaptor", "category" : "Zinc-Seaside", "classinstvars" : [ ], "pools" : [ ], "classvars" : [ ], "instvars" : [ "server" ], "name" : "ZnZincServerAdaptor", "type" : "normal" }
Living Without a Label: Parenting an Undiagnosed Child Try as I might to avoid them, situations often crop up when I have to explain my 4-year-old, nearly 5, has a medical condition. Usually it’s to cancel a playdate or explain why I’ve forgotten to do something. Sometimes it’s when we’re meeting people who will need to know, like babysitters or teachers. The conversation goes something like this: “My son has a periodic fever syndrome. That’s an autoinflammatory disease.” “Autoimmune?” “No, autoinflammatory. It deals with the innate immune system rather than the acquired immune system.” “Maybe, but autoinflammatory diseases are quite rare — like one in a million people might have his condition.” “Have you tried eliminating gluten/dairy/everything from his diet?” “No.” “I’m sure they’ll figure it out.” “I really hope so.” “But he’ll get better, right?” “We don’t know yet.” And sometimes, silence. Sometimes questions: “What does that look like for him?” Sometimes a great empathetic remark: “I’m sorry. That must be difficult.” I don’t really mind any of the responses. Except maybe for the one about viruses. And diet. Those get old pretty quickly. In fact, I usually like it when someone asks thoughtful questions — it tells me they’re trying to understand our situation. After all, it’s hard to deal with the unknown and therefore completely normal to want to label and categorize things. That’s how we make sense of life: we have a framework and we organize our worldview within it. Unfortunately, sometimes things don’t fit within the existing paradigm, and people — including doctors, by the way — really struggle with things that don’t fit our preconceived ideas. Believe me, I’d love to fit my life into the framework I envisioned for our family — parenting a child with a rare disease was not part of the plan. But like so many aspects of parenting, the unexpected has taken my life by storm and shattered the delicate shape I imagined. We know my son has a rare disease, but we don’t know exactly which one it is. We’ve ruled out a bunch of things, everything from Lyme disease and leukemia to strep throat and cat scratch fever. That left us with autoinflammatory as a category, and initially we thought it might be periodic fever adenitis pharyngitis aphthous ulcer (PFAPA) syndrome…but then his symptoms changed. A rash here, some eye swelling there, throw in random flares triggered by everything from illness to excitement, and now we don’t know what’s going on. In the early months, I didn’t talk much about my son’s health issues. I didn’t know what to say; his symptoms didn’t fit in the catalogue of illnesses my friends and family members knew about — and my mom is a retired nurse. Heck, they barely fit in the catalogue our pediatrician knew about. I didn’t respond to comments like the ones above because I didn’t know how to articulate what was happening, both in terms of his medical symptoms and the impact his condition was having on our lives. Everything felt overwhelming and upside down, and I clung to the idea that once we had a diagnosis, our lives might return to normal and fit inside the nice, neat plan I’d had for all of us. For a while, I pinned all my hopes on genetic testing — this would definitely give us an answer. I believed it would! I battled with the insurance company, and when we lost, I persuaded our son’s specialist to work with a genetics company we could afford to pay for out of pocket. Surely this would give us an answer, right? We sent off the blood sample and I counted down the days until the results were due in. The other mothers in our online support group tried to warn me: be prepared for uncertainty. But I wasn’t prepared. I’d hardly cried at all during the diagnostic process for my son — not when he was admitted to the hospital in respiratory distress, not when his temperature repeatedly hit 106F and kept climbing, not when I had to carry him because he couldn’t walk. When the genetics came back negative, though, I cried. I cried big, fat, salty tears of misery and frustration and grief. If we didn’t know what was wrong with him, how could we help him? If his illness didn’t have a name, could I convince other people it existed? What was the point of all the tests and trips to the doctor’s office if it ended with me at home, comforting my aching child, clutching a useless bottle of ibuprofen and a thermometer the nurses kept telling me must be broken? In my mind, I stood at the edge of the Grand Canyon, the wind whipping past me as I stared into the abyss. Without a diagnosis, I couldn’t see a way forward. For months, I felt lost and powerless, but over time, I built a new framework for our lives that incorporates our new reality. Now, I speak more openly about my son’s medical condition; acknowledging his illness with family and friends validates our experience. We’ve tried two common treatments for autoinflammatory diseases and while neither one fully controls his symptoms, one does help from time to time. Some doctors try to dismiss my son’s symptoms as “just a virus,” since it doesn’t have a label. I don’t allow that. Other doctors feel the need to label it something, so they choose the mildest of the autoinflammatory bunch and stick that on his medical notes. Regardless, I’ve rebuilt my courage and learned to advocate for my son. I read and ask questions and I won’t stop doing either of those things until we get some answers — even if I may never get the answer. I’d love to end on a positive note and tell you I’ve found a way to accept the unknown, to move beyond the need for a diagnosis, but I haven’t. I still want a label and a solution to my son’s condition. Sometimes I stay up late into the night when everyone else is asleep and read complex medical articles I only partially understand. In the blue light from my laptop screen, I sift through his symptoms, looking for a clue I might have missed. My inability to quit searching is the opposite from my husband, he’s much more of a take-life-as-it-comes kind of person. But maybe this human need to pin things down is part of what drives my ability to advocate for him. On another level, perhaps the thirst for knowledge and understanding also drives medical research and innovation. Maybe one day we’ll be able to pick up the shattered pieces of our framework for categorizing illness, the scraps of our ramshackle understanding of the human body, and put together a better paradigm that includes patients like my son.
Nvidia CEO Jen-Hsun Huang says that Nvidia is in the midst of a transition from being a graphics chip company to an artificial-intelligence platform maker. The company still powers graphics chips in laptops and gaming PCs with virtual reality headsets. But it is also supplying the computing horsepower for deep learning neural networks, self-driving cars, and upcoming devices, such as the Nintendo Switch game console. I caught up with Huang after Nvidia reported impressive numbers for its third fiscal quarter results on Thursday. But I decided to use my short time with him talking about the important stuff. We didn’t dwell on the financials. Instead, I asked five questions about the risks of A.I., the blurring of science fiction and tech reality, Nvidia’s role in developing the Nintendo Switch, competition with Intel in artificial intelligence, and his views regarding Donald Trump. Here’s an edited transcript of our interview. Above: SoftBank CEO Masayoshi Son sees the singularity coming. Image Credit: Dean Takahashi VentureBeat: I was talking to Masayoshi Son of SoftBank a little while ago. He said he wants to invest for the Singularity (when AI is smarter than collective human intelligence). He seems to think it’s coming up soon. What’s your view like? We want better A.I. for self-driving cars, but we don’t want to build Skynet, do we? Jen-Hsun Huang: I believe that the future is about having a whole bunch of A.I., not one A.I. We’re all going to have our own personal A.I. We’ll have A.I. for many fields of medicine, for many fields of manufacturing. We’ll have different A.I. for different parts of our business. We’ll have marketing A.I., supply chain A.I., forecasting A.I., human resources A.I. We’ll have a lot of different A.I. in the future. They’re going to be infused into the software packages of today. A.I. will make it possible for the Internet to directly engage people in the real world, through robotics and drones and little machines that will do smart things by themselves. Cars — of course — golf carts, bicycles. There will be all kinds of A.I.s making machines safer, easier to use, and more available. For the next 10 years, we’ll see a ton of that stuff. A.I. is going to increase in capability faster than Moore’s Law. I believe it’s a kind of [a] hyper Moore’s Law phenomenon because it has the benefit of continuous learning. It has the benefit of large-scale networked continuous learning. Today, we roll out a new software package, fix bugs, update it once a year. That rhythm is going to change. Software will learn from experience much more quickly. Once one smart piece of software on one device learns something, then you can over-the-air (OTA) it across the board. All of a sudden, everything gets smarter. Hyper Moore’s Law innovation is upon us. I think A.I. is going to be a big part of the reasons why that happens. Above: A concept rendering of Nvidia’s headquarters. Image Credit: Dean Takahashi VB: Do you feel like you have to follow a lot of science fiction to figure out where A.I. is going to go? Huang: I don’t really have to watch science fiction because I’m in science fiction today. This is a company that’s close to the leading edge of what science fiction can be. Virtual reality, all the A.I. work we do, all the robotics work we do — we’re as close to realizing science fiction as it gets. VB: There was a day when it seemed like you were happy with just serving the PC gaming market. The console was a less attractive market. I wonder why you guys went after the Nintendo Switch and how you accomplished that. Huang: We’re dedicated to the gaming market and always have been. Some parts of the market, we just weren’t prepared to serve them. I was fairly open about how, when this current generation of consoles was being considered, we didn’t have x86 CPUs. We weren’t in contention for any of those. However, the other factor is whether we could really make a contribution or not. If a particular game console doesn’t require our special skills, what we can uniquely bring, then it’s a commodity business that may not be suited for us. In the case of Switch, it was such a ground-breaking design. Performance matters because games are built on great performance, but form factor and energy efficiency matter incredibly because they want to build something that’s portable and transformable. The type of gameplay they want to enable is like nothing the world has so far. It’s a scenario where two great engineering teams, working with their creative teams, needed to hunker down. Several hundred engineering years went into building this new console. It’s the type of project that really inspires us, gets us excited. It’s a classic win-win. Above: Nvidia’s custom Tegra chip powers the Nintendo Switch. Image Credit: Nvidia VB: What’s your reaction to Intel in the space, buying Nervana and Movidius and building the Xeon Phi as well? It seems like that’s a rival platform. Huang: One of our big themes is our transformation from a chip company to a computing-platform company. Our computing-platform architecture — what we call GPU computing — is about combining instruction throughput processing from a CPU with data throughput processing from the GPU. It’s taken us 10 years to create the architecture, all the algorithms, all the libraries, and all the tools — working with developers all over the world to understand how to use it. It’s been a long journey. Computing platforms that are used by developers all over the world don’t come along very often. There aren’t that many broad-based computing platforms. Our strategy is to be a computing-platform company. One of the applications we’ve dedicated ourselves to pioneering is deep learning. We’ve invested billions of dollars into it now. We’re coming up on seven years of investment in this area. We offer an end-to-end deep learning platform. The breadth of our solution, the capability of our solution, and the reach of our solution — whether it’s in every single cloud, every single server company — it’s a great investment, something that took a long time. A computing platform needs to be capable of being backwards compatible on the one hand, supporting a whole bunch of industry applications. It has to have the ability to support both computational approaches, numerical approaches, what we used to do, as well as data science approaches. I believe in computational science, partial differential equations, linear algebra and so on, as well as data science, deep learning approaches. Those two are going to combine. It won’t just be one or the other. We created an architecture that’s mindful of all these things. As a result, you can run more applications on our platform. As you know, the math works simply. The more applications you can run on a computing platform, the more cost-effective that platform becomes — to a point where even if you give away the hardware, it’s more expensive than a computing architecture that has more applications on it. We’ve seen this movie before. The singular idea is having apps matter. We have just about every app on the planet that requires data throughput computing running on our platform. That’s our approach. Above: President-elect Donald Trump. VB: Do you have any reaction to Donald Trump’s election? Huang: I guess my reaction is that we have to be mindful of bringing everybody along in this society. This is the voice of the people. I’m optimistic that the institution of the United States will continue to support diversity, be mindful of tolerance, and hopefully help us to not forget that there are people in every part of our country that we need to bring along. I’m optimistic about the outcome, irrespective of how on balance I prefer a more liberal government. I have confidence in the resilience of the institutions. We’ll find a way through and find a way forward.
Briefing to be Nov. 26 on Route 8 bridge work The Missouri Department of Transportation (MoDOT) will hold a public briefing later this month to discuss plans to replace the State Route 8 bridge over Dry Fork Creek south of St. James. Staff Reports The Missouri Department of Transportation (MoDOT) will hold a public briefing later this month to discuss plans to replace the State Route 8 bridge over Dry Fork Creek south of St. James.The public briefing will be held Tuesday, Nov. 26, from 4-6 p.m. at the St. James Elementary School cafeteria at 314 S. Jefferson St. in St. James.No formal presentation will be made. The public may attend the meeting at any time between the designated meeting hours to speak with staff from MoDOT. Various project displays will be available at the meeting, and the public is encouraged to ask questions and provide input. All comments will be taken into consideration and made a part of the project file. Construction is expected to begin in the summer of 2014 on replacing the Route 8 bridge.The project was approved in the 2014-18 Statewide Transportation Improvement Program (STIP) by the Missouri Highways and Transportation Commission in July during its meeting in Rolla.The total estimated cost of the Route 8 bridge project is $1,597,000 and a contract for this work is expected to be awarded in the spring of 2014, according to the STIP.As part of an agreement between the Phelps County Commission and the state highways commission, a section of Zion Hill Road (County Road 3410) south of St. James will get a new surface since it’s expected to be used as a detour around the bridge closure.In August, the Phelps County Commission signed off on the agreement, which calls for MoDOT to temporarily take over and put a new surface, likely using hot-mix asphalt, on the county road between State Routes BB and F, a section totaling less than 3 miles, during the bridge closure.The agreement states that the county must be notified two weeks before work begins on Zion Hill Road.After the Route 8 project is complete, the county will take back over maintenance of the improved Zion Hill Road.Displays and project information presented at the public meeting will be available at www.modot.org/central the day after the meeting. For more information, call toll free 1-888-275-6636.
Q: Search by criteria VS SEO I need to implement a "search by criteria" (I don't know if there is a more accurate word in english) for my website. I have products that have attributes such as color, price, type, etc... and I need to allow the user to browse them selecting those criteria. But for each produced result, I need : a unique URL the selection to be directly accessible to web crawlers I need a strong SEO. So for now, to follow these rules, it seems that my best option is to propose a link for each criteria. This is a basic example : <a href="http://www.mywebsite.com/search.php?color=red">color : red</a> This solution is pretty good in my opinion but : page must be reloaded I can't mix criteria : color + price for instance. It's color OR price. It's red OR blue. So my question is : is there a best way to do it ? Keep the SEO aspect but offer a more user-friendly experience ? I would like to use checkboxes with Ajax requests (I already have the component ready) but web crawlers won't play with it, won't they ? Thanks in advance for helping me with this :) A: <a href="http://www.mywebsite.com/search.php?color=red" onClick=”navigate('search.php#color=red'); return false”>color : red</a> This is an idea for a solution, so you can have both a navigable link (for bots) and an ajax link (for users) I like best when urls become www.mywebsite.com/red/ and you keep on composing urls by adding "criterias" (or parameters)
Q: In C, what is an unconditional jump? I have to fill out some documentation regarding a C project i worked on. One topic is whether I used "unconditional jumps". As far as I know, a "break" statement counts as a jump. And I have a few of those that fire when a condition in a loop is met. Does that make it a "conditional jump"? Another example is when there are standard "break" statements in a switch case, are those conditional or unconditional? Basically, what constitutes an "unconditional jump" in C? A: It is a matter of terminology. IMHO, any break, continue, goto, return which is not in the body of an if or else or case is an inconditional jump. So obviously if (foobar) goto somelabel; is a conditional jump. In if (foobar) { x = something(); y = other(x); return; } I would believe that the return is conditional. Some people might object that because of the previous statements it is not (and only the entire block is conditional) BTW, I heard of "unconditional jump" more when speaking of machine code than everything else. Read also about basic blocks I believe that your bureaucracy is just asking you if you used goto; you could ask your management or client about what is really meant. I feel sorry for you that you have to lose your time on such (IMHO stupid or useless) questions.
Fiocchi Extrema Ammunition is loaded with premium bullets from popular component manufacturers, a broad spectrum of cartridges are offered for competition shooters, hunters and law enforcement. Produced with precision cases and reliable Fiocchi primers, this ammunition is new production, non-corrosive, in boxer-primed, reloadable brass cases. Hornady's V-Max Bullets feature a polymer tip which enhances accuracy and promotes devastating expansion. The tip raises the ballistic coefficient for faster velocity and helps to stabilize the bullet in flight. It also acts as a wedge, initiating bullet expansion. The copper jacket provides the necessary bearing surface for maximum stability out of the barrel, and the jacket is built to withstand the fast twist rates of the most advanced varmint rifles. Specifications: - Caliber: 223 Remington - Bullet Weight: 50 - Bullet Type: Hornady V-MAX Polymer Tip BT - Muzzle Velocity: 3300 FPS - Quantity: 200 Note: Quantity of 200 comes in polymer ammo can with 4 boxes of 50 inside
Q: Tor-amplitude [0, 1] in the setting of intersection theory on a regular surface? The question is coming from Definition 1.5 in Deligne's Expose X in SGA 7 on intersection theory. Let $X$ be a connected regular scheme of dimension $2$ and $Y \subset X$ a reduced divisor that admits a proper morphism $Y \rightarrow \mathrm{Spec}(k)$ for some field $k$. Suppose also that $D$ and $E$ are two effective divisors on $X$ with the reduced closed scheme associated to $D$ being a subscheme of $Y$. The definition mentioned above defines the intersection number of $D$ and $E$ (with respect to $k$), and the definition involves $\mathcal{O}_D \otimes^{\mathbb{L}} \mathcal{O}_E$ (in the derived category of $\mathcal{O}_X$-modules). The claim is that this complex has vanishing cohomology in degrees other than $0$ and $1$, i.e., that $\mathrm{Tor}^n_{\mathcal{O}_X}(\mathcal{O}_D, \mathcal{O}_E) = 0$ for $n \ge 2$. Why is this so? Do we somehow know that $\mathcal{O}_D$ is of tor-amplitude $[0, 1]$ because it is supported on a $1$-dimensional closed subscheme? Is there some relation of this sort between tor-amplitude and the dimension of the support? A: You did not explicitly ask the following, but it is related to your second question, and it comes up in practice quite often. So I would like to state this at any rate. Let $X$ be a locally Noetherian scheme. Let $D\subset X$ be a closed subscheme such that there exists a complex $E^\bullet$ of (finite rank) locally free $\mathcal{O}_X$-modules concentrated in degrees $[-c,0]$, and there exists a chain homomorphism, $$\phi:E^\bullet \to \mathcal{O}_D[0],$$ such that the induced map $$h^0(\phi):h^0(E^\bullet) \to \mathcal{O}_D$$ is an isomorphism. Moreover, assume that the restriction of $E^\bullet$ to $X\setminus D$ is acyclic. Then every irreducible component of $D$ has "codimension $\leq c$ in $X$". Precisely, let $\eta$ be any generic point of $D$. Form the Noetherian local ring $R=\mathcal{O}_{X,\eta}$. Then the stalk $E^\bullet_\eta$ satisfies the hypotheses of the New Intersection Theorem. Therefore, the New Intersection Theorem says that the Krull dimension of $R$ is $\leq c$. How does this come up? Here is a typical application. Let $Y$ be a regular locally Noetherian scheme, and let $C\subset Y$ be a closed subscheme that is Cohen-Macaulay and everywhere has codimension $c$. Then (at least locally), there exists a locally free resolution $$\psi:F^\bullet \xrightarrow{\text{qism}} \mathcal{O}_C[0],$$ with $F^\bullet$ concentrated in degrees $[-c,0]$. Now let $f:X\to Y$ be a morphism, let $D$ be $X\times_Y C$, let $E^\bullet$ be $f^*F^\bullet$, and let $\phi$ be $f^*\psi$. Then $E^\bullet$ and $\phi$ satisfy the hypotheses from above. Therefore every irreducible component of $D$ has codimension $\leq c$ in $X$. Note that this setup is more general than local complete intersection morphisms, the class of morphisms that arises most often in intersection theory.
Futuristic Bookstore - in the Ancient Capital of China The shopping space combines a bookstore with a large library and cultural center. In the Chinese city of Xi'an, one of the most significant historical and cultural centers of the country, the futuristic bookstore was opened under the project of Gonverge Interior Design studio. E Pang's shopping space combines a large-format bookstore with a vast city library and cultural center, where you can meet friends for a cup of tea, or spend a slow flow of time reading your favorite book. The total area of the shop is unprecedented for the city 3500 sq.m. The E Pang space is divided into three zones. The first is a children's literature hall, stylized as an intergalactic liner. The designers used unusual shapes, lighting, and materials, inviting the youngest readers into their favorite world of fiction. A giant window emphasizes the particular height of the hall with natural light passing through and spreading through the rooms. The second and third zones are the shopping and reading rooms, which are designed in a more traditional style. The spaces are made in warm colors and equipped with classic furniture using natural wood and brass, as well as interior elements for leisurely reading. The interior is thought out to the smallest detail and reflects the actual values in the world of adult book-readers. In one of the halls of E Pang part of the space is used for meeting with writers and holding various cultural events. In the center between the children's and adult halls, there is a spacious atrium filled with natural light. Designed by the designers, it represents a timeless space.
Q: Rails Devise send mail I am a newbie to sending mails through rails. I have implemented devise in my project and now I want to send a welcome email and/or a password-reset email. What changes do I need to make in Devise views?? No errors are displayed, but still I don't receive any email. I have followed these links and finally my devise.rb, development.rb and production.rb files are as follows: === devise.rb === config.mailer_sender = "[email protected]" ===development.rb== config.action_mailer.raise_delivery_errors = false config.action_dispatch.best_standards_support = :builtin config.active_support.deprecation = :notify config.action_mailer.delivery_method = :smtp config.action_mailer.perform_deliveries = false config.action_mailer.raise_delivery_errors = true config.action_mailer.default :charset => "utf-8" config.action_mailer.default_url_options = { :host => 'localhost:3000' } config.active_support.deprecation = :log config.action_mailer.smtp_settings ={ :enable_starttls_auto => true, :address => 'smtp.gmail.com', :port => 587, :tls => true, :domain => 'gmail.com', :authentication => :plain, :user_name => '[email protected]', :password => 'xxxxxx' } =====production.rb=== config.action_mailer.default_url_options = { :host => 'gmail.com' } config.active_support.deprecation = :notify config.action_mailer.delivery_method = :smtp config.action_mailer.perform_deliveries = true config.action_mailer.raise_delivery_errors =false config.action_mailer.default :charset => "utf-8" config.action_mailer.smtp_settings = { :enable_starttls_auto => true, :address => 'smtp.gmail.com', :port => 587, :tls => true, :domain => 'gmail.com', :authentication => :plain, :user_name => '[email protected]', :password => 'xxxxxx' } A: Try setting raise_delivery_errors = true like this: config.action_mailer.perform_deliveries = true # Set it to false to disable the email in dev mode config.action_mailer.raise_delivery_errors = true config.action_mailer.delivery_method = :smtp config.action_mailer.default_url_options = { :host => "localhost:3000" } ActionMailer::Base.smtp_settings = { :address => "smtp.gmail.com", :port => 587, :authentication => :plain, :user_name => "[email protected]", :password => "password" }
**Core tip:** Aplasia cutis congenita (ACC) is a rare disease in China and abroad. There is not yet a well-developed treatment for this disease. Combination of ionic silver dressing and moist exposed burn ointment in treating ACC is an useful and effective method. This treatment is worthy of being promoted in clinical practice. INTRODUCTION ============ Aplasia cutis congenita (ACC) is a rare disease in China and abroad. Patients with this disease often have other abnormalities or malformations. According to the literature, the incidence of ACC is approximately 1 in 100000, but the mortality rate is as high as 18%. Currently, there is not yet a well-developed treatment for this disease. A critical step in treating ACC is a prompt skin grafting to cover the wound\[[@B1]\]. Although skin grafting is important for patients with large areas of skin defect, this surgical process can aggravate the patient's pain and suffering. Recently, with more in-depth studies on the treatment of ACC in newborns, methods employed in treating burn wounds have yielded beneficial therapeutic effects for treating ACC\[[@B2]\]. Amongst the non-surgical methods, wound protection, infection prevention and nutrient supplemen-tation are key to ensure treatment outcomes\[[@B2]\]. Herein, a case of ACC treated in our hospital is reported along with a retrospective analysis of the clinical data and discussion on lessons learned. CASE PRESENTATION ================= Chief complaints ---------------- In August 2018, a female infant presented to our hospital with the skin defects on the external genitals and areas from the left foot to 3/4 of the upper left side. History of present illness -------------------------- Patient's symptoms were observed after birth History of past illness ----------------------- The patient was a female infant born at 37^+6^ wk *via* C-section. Intrauterine distress was not observed. However, premature rupture of foetal membranes and bloody amniotic fluid were present. The baby was found with the umbilical cord around her neck. There was no abnormality in the placenta, and no asphyxia was observed. The Apgar scores were 10 at 1-10 min after birth. The birth weight was 2800 g. Personal and family history --------------------------- The 28-year-old mother was in her second pregnancy but first birth. A miscarriage had previously occurred at age 25. The mother performed a urine pregnancy test 35 d after menstruation and received a colour ultrasound 54 d after menstruation. The results suggested intrauterine pregnancy, and the foetal size was consistent with the gestational age. Foetal movement was sensed at week 16 and remained active until delivery. The thyroid function test at week 18 displayed no abnormalities. Foetal chromosome (T21, T18, T13) screening at week 22 indicated that the baby was at low risk of aneuploidy. A four-dimensional colour ultrasound examination at week 26 found no abnormalities. After admission for delivery, no abnormalities were observed by various examinations on the mother including a routine blood test, routine urine test, coagulation test, infectious disease tests, hepatitis B, liver and kidney functions and electrocardiogram. The family did not have a history of congenital conditions. Physical examination upon admission ----------------------------------- The results of the physical examination of the infant after birth are described next. The infant appeared to be born full term with normal appearance and responded well to stimulation. Skin defects were observed on the external genitals and on areas from the left foot to 3/4 of the upper left side. Subcutaneous tissue and blood vessels were observed in the regions with skin defects (Figure [1](#F1){ref-type="fig"}). ![Aplasia cutis congenita in our patient.](WJCC-7-2611-g001){#F1} Laboratory examinations ----------------------- Laboratory blood tests were normal. Imaging examinations -------------------- The ultrasound, lower limbs computed tomography (CT) scan, high-resolution chest CT scan, and head magnetic resonance imaging were normal. FINAL DIAGNOSIS =============== The baby was diagnosed with ACC and was transferred to the Division of Neonatology for further treatment. TREATMENT ========= The following treatments were provided: (1) Wound treatment: The wound was rinsed with 0.9% sodium chloride solution followed by disinfection with povidone-iodine twice. Moist exposed burn ointment (MEBO) was applied to the wound at a thickness of approximately 1 mm. The surface covered by MEBO was extended beyond the edges of the wound. After applying ionic silver dressing, the wound was covered with sterile gauze. The wound dressing was replaced every 2-3 d; (2) Infection prevention: Intravenous injections of second-generation cephalosporin were provided for 7 d; and (3) Nutrition support: An intravenous infusion of 10% glucose was given along with premium powdered formulas. The condition of the infant was complicated by hypoproteinaemia, which was corrected by the infusion of albumin. With the above-described treatment, the skin on the lower limbs of the patient recovered after 26 d (Figure [2](#F2){ref-type="fig"}), and the patient was discharged. The patient was prescribed multi-sulfonic acid mucopolysaccharide cream to prevent scar tissue formation and soften existing scar tissue. ![The same patient after 26 d.](WJCC-7-2611-g002){#F2} OUTCOME AND FOLLOW-UP ===================== During treatment, the functions of the limbs were preserved; limb shortening was not observed. No blisters were observed on the skin. A histopathological examination was not performed. At the 4-mo follow-up, the treatment outcome was satisfactory. There was minimal scar tissue formation, and limb function was not impaired. DISCUSSION ========== ACC is a rare neonatal disease with a low incidence rate. The incidences are typically sporadic. However, the condition may be genetic. The cause of ACC is not known. According to the literature, the most common factors of ACC include foetal chromosomal or genetic abnormalities (particularly *BMS1* and *UBA2* genetic abnormalities)\[[@B3]\], trauma\[[@B4]\], amniotic fluid or amniotic membrane abnormalities (*e.g*., foetal skin and amniotic membrane adhesion)\[[@B5]\], intrauterine complications (*e.g*., infection)\[[@B6]\], vascular lesions (*e.g*., thrombus and vascular diseases)\[[@B7]\] and the use of teratogenic drugs during pregnancy (*e.g*., cocaine, methotrexate, angiotensin inhibitor)\[[@B8]\]. ACC is diagnosed mainly based on clinical manifestations: Clear skin defects are observed on regions of the body at birth; the defects can be accompanied by defects or hypoplasia of subcutaneous tissues (including muscle and bones); the shape of the defected skin is irregular, which can be sheet-like, in patches, or irregular shapes; and the size and depth of the skin defects also vary. Pathophysiological examination often suggests defects in the epidermis and dermis. Total or partial defects can also be found in the lipids of the subcutaneous tissue. ACC can be accompanied by other diseases or complications such as epidermolysis bullosa (EB), cheilopalatognathus and polycystic kidney disease. In 1986, Frieden\[[@B9]\] classified ACC in newborns into 9 groups based on the location and features of the lesions and the accompanying conditions: Scalp ACC without multiple anomalies, scalp ACC with associated limb abnormalities, scalp ACC with associated epidermal and organoid nevi, ACC overlying embryologic malformations, ACC with associated foetus papyraceus or placental infarcts, ACC associated with EB, ACC localized to extremities without blistering, ACC caused by specific teratogens and ACC associated with malformation syndromes. Scalp lesions are the most common and comprise 70% of defects, followed by defects in limbs and the trunk. Some cases can be accompanied by defects in the oral mucosal membrane or perineal mucosal membrane and skeletal malformation in limbs\[[@B10]\]. Conservative and surgical methods can be employed as treatment for ACC. Conservative treatment includes the application of topical ointments such as silver sulfadiazine dressing, antibiotics, *etc*. Surgical treatments include split-thickness or full-thickness skin grafts, acellular dermal matrices, autologous epithelial transplantation, tissue expansion, cranioplasty, *etc*. The selection of the treatment method depends on the width, depth, location and involved subcutaneous tissues of the defects. Conservative treatments are recommended if the defect is only at the skin level without damage to the bones and if the area of the defect is less than 3 cm^2^. Conversely, skin grafts are necessary when the defected area is large and involves critical organs or tissues such as the scalp while also accompanied by the exposure of large blood vessels or sagittal sinus. The skin defects in limbs often display clearly defined boundaries and typically involve the epidermis and dermis. Approximately 85% of ACC cases are simple defects without complications. However, the indications for selecting between conservative versus surgical treatment remain controversial. Bigliardi et al\[[@B11]\] reported a case of ACC in the right lower limb. The defect involved the thigh, knee and lower leg to the first and second toes. Ulcer-like defects were observed, and the blood vessels were clearly visible. The wounds recovered after 3 mo of silver sulfadiazine topical cream application. In a case reported by Pająk et al\[[@B12]\], a skin defect in the right lower limb was 4.0 cm × 1.5 cm in size. In addition to antibiotic ointment and ionic silver dressing, suturing was performed. Although the patient recovered after one month of treatment, a linear scar formed. These case reports suggest that for ACC that does not affect bone tissues, conservative treatment might provide a better outcome. However, surgical treatment is necessary when a large area of defect is present. The major ingredients of MEBO include sesame oil, beeswax, berberine, phellodendron and baicalin. MEBO provides a moist environment to the wound tissue. An appropriate level of humidity is beneficial for tissue recovery. Linoleic acid, multiple amino acids, vitamins and trace elements are essential for the survival of cells. These ingredients can effectively activate the transformation of residual skin tissue to stem cells and allows in situ cultivation. The newly formed skin tissues can then adhere to the adjacent hyperplasia tissues to promote natural recovery. Additionally, MEBO can relieve mild local and systemic inflammation, promote wound recovery and improve recovery quality. Ionic silver dressing is a 3D foaming structure that allows the effective absorption of exudate and water vapor. This absorption can minimize impregnation of the wound, which then inhibits the growth of bacteria and lowers the risk of infection. Ionic silver dressing is a natural broad spectrum antimicrobicide that contains silver compound, which provides high bacterial inhibition with its slow-release abilities. In the process of treating the case reported herein, a high amount of exudate and the bleeding of the newly formed blood vessel were observed on days 4-7. The exudate and bleeding were greatly reduced with the application of ionic silver dressing. CONCLUSION ========== The treatment of our case demonstrated that the combination of MEBO and ionic silver dressing can effectively promote skin growth and prevent infection. This treatment method does not involve surgical operation; thus, it reduces the pain and suffering of the patient while simultaneously reducing the financial burden. This treatment is worthy of being promoted in clinical practice. Informed consent statement: Written informed consent was obtained from each patient's parent for the publication of this report and ac-companying images Conflict-of-interest statement: The authors declare that they have no competing interests. CARE Checklist (2016) statement: The authors have read the CARE Checklist (2016), and the manuscript was prepared and revised according to the CARE Checklist (2016). Manuscript source: Unsolicited manuscript Peer-review started: March 15, 2019 First decision: July 30, 2019 Article in press: August 20, 2019 Specialty type: Medicine, Research and Experimental Country of origin: China Peer-review report classification Grade A (Excellent): 0 Grade B (Very good): B Grade C (Good): 0 Grade D (Fair): 0 Grade E (Poor): 0 P-Reviewer: Karaman A S-Editor: Dou Y L-Editor: Wang TQ E-Editor: Qi LL [^1]: Author contributions: Lei GF made the manuscript preparation, literature review, contributed to the diagnosis and provided clinical assistance; Zhang JP, Wang XB, You XL, Gao JY, Li XM, Chen ML, Ning XQ and Sun JL made the study design, manuscript correction, contributed to the diagnosis and provided clinical assistance. All authors approved the final version of the manuscript. Corresponding author: Guo-Feng Lei, MD, Attending Doctor, Department of Neonatal Intensive Care Unit, Sanmenxia Central Hospital, Xiaoshan Road, Sanmenxia 472000, Henan Province, China. <[email protected]> Telephone: +86-15036469906Fax: +86-398-2933151
When I think of the word “Jealous” it always has a negative aspect to it. Well a number of years ago I heard a well known talk show host say she didn’t want any part of a God that said He was jealous. To be in such an influential position, you had better do your homework before you start spouting off things you didn’t take the time to look into or the context in which it was written. I found myself getting more and more frustrated listening to her warped version on what she believed God and spiritualism was all about. She and I do not serve the same God. Here are the verses in which she likely only glanced at or heard about without truly grasping. Exodus 34:14 Do not worship any other god, for the Lord, whose name is Jealous, is a jealous God. Moses wrote the book of Exodus and the Jewish people had hundreds of laws to follow, this being law number 613. It went beyond just the 10 commandments we are all familiar with in chapter 20. The kind of idol worship going on in those days was unimaginable to us today. Torturous human sacrifices including babies, orgies, etc. You get the idea, and it made God very angry. This heathenism was not the kind of worship He would want Himself or His people a part of. So for the greater good of His people He created the law to protect them from this very dangerous lifestyle. God didn’t want the Jewish people even eating the animals that were sacrificed to these god’s, because it was unclean in His eyes due to what part it played in the idol worship. 2 Corinthians 11:2 I am jealous for you with a godly jealousy. I promised you to one husband, to Christ, so that I might present you as a pure virgin to him. In the New Testament Paul writes so much about the “Church” being a bride to Christ. It’s a picture to help show the close relationship we are to have with Him. A lot of liberal-minded women are offended at the book of Ephesians Paul penned, primarily chapter 5 (vs 22 on) on roles on wives and husbands. I think because most believe Paul never married he shouldn’t be writing about marriages. All of the Bible is God inspired and chapter 5 reveals God as the head of the church and we are the body. You have to have a leader for the relationship to work. We have a living breathing God that has adopted us into His family, and we are His children. He loves us passionately unlike worthless idolatry that is self serving. 2 Corinthians 6:18 “I will be a Father to you, and you will be my sons and daughters, says the Lord Almighty.” 2 Corinthians 11:2 I am jealous for you with a godly jealousy. I promised you to one husband, to Christ, so that I might present you as a pure virgin to him.
Pazopanib (Votrient, GlaxoSmithKline, Philadelphia, PA, USA) is an oral angiogenesis inhibitor targeting vascular endothelial growth factor receptors (VEGFR)-1, -2, and -3, platelet-derived growth factor receptors-*α*/-*β*, and c-Kit ([@bib21]; [@bib30]). Pazopanib is approved in the United States ([@bib34]), European Union ([@bib8]), and other countries ([@bib1]; [@bib17]; [@bib19]) for the treatment of renal cell carcinoma (RCC). The efficacy and safety of pazopanib in treatment-naive and cytokine-pretreated patients with advanced/metastatic RCC was demonstrated in an open-label, single-arm Phase II trial ([@bib16]) and in a randomized, double-blind, placebo-controlled Phase III trial ([@bib31]). In the Phase II study, patients treated with single-agent pazopanib experienced an overall response rate of 35% and median progression-free survival (PFS) of 12 months ([@bib16]). In the Phase III study, pazopanib significantly improved PFS compared with placebo in the overall study population (9.2 *vs* 4.2 months; hazard ratio 0.46; 95% CI, 0.34--0.62; *P*\<0.0001; [@bib31]). A number of factors affect the efficacy of a drug or treatment regimen in patients with cancer; these include patient and tumour characteristics, tumour biology, and systemic exposure to the drug. Among these, parameters of drug exposure are most amenable to regular monitoring, and may potentially provide insight towards dose optimisation. Emerging evidence corroborates the association of clinical and biologic effects of small-molecule tyrosine kinase inhibitors with the level of systemic exposure. For example, tumour response rates, time to progression, and overall survival were significantly better in patients with RCC who achieved a target threshold exposure to sunitinib plus its primary active metabolites ([@bib13]). Similarly, clinical benefit is reduced when plasma concentrations of imatinib decrease to below ∼1000 ng ml^−1^ in patients with gastrointestinal stromal tumours or patients with chronic myeloid leukaemia ([@bib6]). In addition to the correlation with efficacy, systemic exposure of a drug may also correlate with biomarkers indicative of target inhibition. Administration of sunitinib results in changes in levels of circulating proteins associated with angiogenesis, including soluble VEGFR2 (sVEGFR2; [@bib9]; [@bib25]; [@bib5]). The decrease in sVEGFR2 observed after administration of sunitinib in patients with RCC demonstrated a weak relationship with the steady-state trough plasma sunitinib concentrations ([@bib5]). VEGFR2 is the predominant receptor that mediates production of nitric oxide and prostacyclin by endothelial cells, leading to vasodilation. Administration of VEGF in animals and humans causes vasodilation and decreases in blood pressure. In contrast, inhibition of VEGFR signalling increases blood pressure ([@bib22]; [@bib18]; [@bib28]). Hypertension has been noted as a possible pharmacodynamic marker of anti-VEGF therapy, although its prognostic and predictive roles in the treatment of cancer are controversial ([@bib29]; [@bib14]; [@bib27]). Thus, biomarkers of target inhibition such as sVEGFR2 and blood pressure may confirm inhibition of the targeted receptor and provide insight into the optimal dose of a therapeutic agent. Preclinical studies have demonstrated that the inhibitory activity of pazopanib towards VEGFR2 phosphorylation, angiogenesis, and tumour growth is concentration dependent ([@bib21]; [@bib11]). In these models, the *in vivo* activity of pazopanib required steady-state concentrations of at least 40 *μ*[M]{.smallcaps} (17.5 *μ*g ml^−1^) during the entire dosing interval rather than transient maximal concentrations ([@bib21]). These results suggest that constant target inhibition during treatment is required to maximise the therapeutic effect of pazopanib in preclinical models of *in vivo* activity. Accordingly, the present analyses were conducted to determine the pharmacokinetic and pharmacodynamic relationship between pazopanib and markers of clinical efficacy and safety. Markers of target engagement, blood pressure and sVEGFR2, and end points of safety and efficacy were examined to investigate the range of plasma pazopanib concentrations that could optimise benefit to patients with RCC. Materials and Methods ===================== The initial analysis of the relationship between plasma pazopanib concentrations and increased blood pressure was conducted with data from patients with advanced solid tumours enroled in a first-in-human Phase I study ([@bib15]). That dose-escalation study provided individual hypertension data over a wide range of pazopanib concentrations; patients received pazopanib doses of 50 and 100 mg three times weekly, 50--2000 mg once daily, and 300 and 400 mg twice daily. Blood pressure and pharmacokinetic data were available for 54 of the 63 enroled patients. Serial blood samples (4 ml) were collected for determination of plasma pazopanib concentrations on days 1 and 22 in the Phase I study as described previously ([@bib15]). Plasma pazopanib area under the curve (AUC), maximum concentration (*C*~max~), and trough concentrations (*C*τ) observed on study day 22 were included to investigate the pharmacokinetic and pharmacodynamic relationships between systemic exposure and increased blood pressure. *C*τ was defined as the plasma pazopanib concentration at 24 h after the first dose on day 22 in the once-daily and twice-daily cohorts and as the predose concentration on day 22 in the three-times-weekly cohorts. AUC from 0 to 24 h after dosing was measured in the three-times-weekly and once-daily cohorts. AUC from 0 to 12 h after dosing was measured in the twice-daily dosing cohorts. Blood pressure was measured in the Phase I study during clinic visits at baseline, on study days 8, 15, and 22, and every 3 weeks thereafter until the patient was withdrawn from the study. Patients also recorded blood pressure with a digital monitor at least twice daily at home between clinic visits, and all blood pressure data were included in the analysis. A significant increase in blood pressure was defined as a 15 mm Hg or greater increase from baseline in the mean arterial blood pressure (MAP; calculated as (2 × diastolic pressure+systolic pressure)/3) on at least three separate occasions, initiation or escalation of antihypertensive medications, or both. The occurrence of a significant increase in blood pressure in a patient was described as a binomial response (yes or no). Only elevations in MAP or escalation of antihypertensive regimens that occurred while the patients remained on their initial starting dose of pazopanib were included in this analysis. Patients were grouped according to the quintiles of each pharmacokinetic parameter (AUC, *C*~max~, *C*τ). Quintiles of pharmacokinetic parameters were chosen to examine trends that may be obscured by the variability in the data. The proportion of patients who experienced a significant increase in blood pressure was determined within each quintile. A simple linear model was fit to the proportion of patients with increased blood pressure *vs* the midpoint of the parameter quintile to investigate the correlation between each pharmacokinetic parameter and an increase in blood pressure. The correlation between AUC and *C*τ was also investigated. Pharmacokinetics/pharmacodynamics in patients with RCC ------------------------------------------------------ The analysis of the relationship between plasma pazopanib concentrations and sVEGFR2, clinical efficacy, and safety in patients with RCC used data from 225 patients with locally advanced or metastatic RCC treated with pazopanib monotherapy in a single-arm Phase II trial ([@bib16]). The primary efficacy end point was overall response rate, and PFS was a secondary end point. Response was assessed by RECIST version 1.0 ([@bib33]) at week 12 and every 8 weeks thereafter. Serial blood samples (2 ml) were collected at week 4 at the following times: predose (within 60 min before study drug administration; *C*τ) and 1--2 h, 3--4 h, and 6--8 h post dose. sVEGFR2 ------- Plasma concentrations of sVEGFR2 were measured by enzyme-linked immunosorbent assay before initiation of treatment with pazopanib (baseline) and at 4, 8, and 12 weeks of pazopanib treatment. The post-baseline nadir (lowest concentration measured during the first 12 weeks) in plasma sVEGFR2 was identified for each patient, and the percent change from baseline in the sVEGFR2 concentration (%ΔsVEGFR2) was calculated as: %ΔsVEGFR2=(baseline−nadir)/baseline × 100. Linear and nonlinear (*E*~max~) models were used to describe the relationship between %ΔsVEGFR2 and plasma pazopanib concentrations: where *C*τ is the predose plasma pazopanib concentration at the week 4 visit, SL is the slope of the linear relationship between *C*τ and the decrease in sVEGFR2, INT is the intercept for the relationship, *E*~max~ is the maximum percent decrease from baseline for the sVEGFR2 nadir, and EC~50~ is the *C*τ at which the percent change from baseline for the sVEGFR2 nadir is 50% of the maximum decrease. Models were fit to the data with R version 2.14.0 using the linear models or nonlinear least squares\' packages. Model fits were compared by the Akaike information criteria. Safety ------ Adverse events (AEs) from the Phase II study that occurred during the first 12 weeks of pazopanib treatment were used to explore concentration--effect relationships to allow sufficient time for the AEs to emerge and to minimise the confounding effects of factors that tend to increase over time on study, such as dose modifications, addition of concomitant medications, and disease progression. AEs were graded according to National Cancer Institute Common Terminology Criteria for Adverse Events (CTCAE) version 3.0. The incidence of all AEs was summarised according to the week 4 pazopanib *C*τ quartiles to allow for a sufficient number of events within each group to reveal concentration-related trends in the frequency. Statistical analyses of clinical efficacy data were conducted using SAS version 9.2 (SAS Institute, Inc., Cary, NC, USA). Efficacy -------- Disease assessments were performed at week 12 of pazopanib treatment and every 8 weeks thereafter. The response rate was defined as the percentage of patients who achieved either a confirmed complete or partial response. A best response of stable disease required stable disease for at least 12 weeks after the first dose of pazopanib. Progression-free survival was defined as the interval between the first day of treatment and the earliest date of disease progression or death due to any cause, whichever occurred first. The Phase II study originally was designed using randomized discontinuation design. All patients initially received pazopanib 800 mg once daily for 12 weeks. After the week 12 disease assessment, patients with stable disease were randomized to receive pazopanib or placebo. After a planned interim analysis of safety and efficacy data, the design was amended to an open-label treatment where all patients received pazopanib 800 mg once daily based on the recommendations of an independent data monitoring committee. Patients who were randomized to receive placebo (*n*=28) were excluded from the pharmacokinetic/pharmacodynamic analysis; therefore, a total of 177 patients were included in the analysis of efficacy end points. Statistical analyses of clinical efficacy data were conducted with R version 2.14.0. A PFS result was available for all patients included in the analysis, and sufficient data were available to group the results by pazopanib *C*τ at week 4. After identifying the deciles of pazopanib *C*τ at week 4, patients were split into two groups at each decile: those with a *C*τ concentration less than or equal to the decile boundary and those with a *C*τ concentration greater than the decile boundary. In the first analysis, the groups defined by the *C*τ deciles were used to determine a threshold value for *C*τ such that patients with *C*τ below this threshold had statistically significant worse PFS compared with patients with *C*τ above the threshold. In all, nine different values of *C*τ were examined. At each *C*τ decile tested, the PFS of patients in the two groups were compared using a log-rank test. The results were displayed graphically by plotting the log-rank *P*-value on the *y* axis *vs* each *C*τ decile border on the *x* axis. The *C*τ that produced the lowest *P*-value for the comparison of PFS between groups was considered to be a threshold value for further analysis. Responses (complete response, partial response, stable disease, progressive disease, and not evaluable or unknown response) in the two groups defined by the *C*τ threshold were tested for independence using Fisher\'s exact test. A similar analysis was conducted to identify a threshold value for *C*τ such that mean tumour reduction in patients with *C*τ below the threshold was significantly less than mean tumour shrinkage in patients with *C*τ above the threshold. The maximum tumour shrinkage based on the sum of the longest diameters of target lesions after the start of treatment was identified for each patient. The mean maximum post-baseline tumour shrinkage in patients with *C*τ above and below the deciles tested was compared using a *t*-test. No corrections for multiple testing were done in any analysis. All *P*-values reported are two sided with a significance level of 0.05. Once the *C*τ that yielded the most significant difference in PFS was identified, a Kaplan--Meier plot of the PFS for patients with *C*τ above and below the threshold was generated. An empirical cumulative distribution function of the maximum tumour shrinkage relative to baseline for patients with *C*τ values above and below the selected threshold value was constructed. For each group, these maximum tumour shrinkage values were ordered from largest to smallest tumour shrinkage post baseline, then plotted with the percentage of tumour shrinkage on the *x* axis and the percentage of patients with at least that amount of tumour shrinkage on the *y* axis. Analyses were conducted to determine whether additional clinical benefit was observed at pazopanib *C*τ values greater than the week 4 *C*τ decile threshold that resulted in the most significant difference in PFS and mean maximum post-dose tumour shrinkage. Data from patients with week 4 *C*τ values below the threshold selected based on differences in PFS or mean maximum tumour reduction were removed. The analyses of PFS and tumour reduction described above were repeated at each remaining *C*τ decile boundary. Results ======= Blood pressure in patients with solid tumours --------------------------------------------- Plots of the occurrences of a significant increase in blood pressure *vs* AUC, *C*~max~, and *C*τ are displayed in [Figure 1A--C](#fig1){ref-type="fig"}, respectively, for patients with solid tumours enroled in the Phase I study. The relationship between the occurrence of a significant increase in blood pressure and *C*τ yielded the largest *r*^2^ value (0.91) and the lowest *P*-value (0.0075) of the pharmacokinetic parameters. A significant relationship between AUC and *C*τ was observed (*r*^2^=0.63, *P*\<0.001; [Figure 1D](#fig1){ref-type="fig"}). Pharmacokinetics/pharmacodynamics in patients with advanced/metastatic RCC -------------------------------------------------------------------------- Predose plasma pazopanib concentrations at 4 weeks and AE data were available for 205 of the 225 patients (91%) in the Phase II study. Longitudinal tumour size measurements sufficient to assess tumour shrinkage, and response rates were available from 197 patients (88%). Plasma concentrations of sVEGFR2 and PFS data were available from 178 and 177 patients (79%), respectively. Efficacy -------- A summary of the PFS comparison at each week 4 pazopanib *C*τ decile is presented in [Table 1](#tbl1){ref-type="table"} (see also [Supplementary Figure S1](#sup1){ref-type="supplementary-material"}). The week 4 plasma pazopanib *C*τ that yielded the most significant separation in median PFS was 17.4 *μ*g ml^−1^. However, the greatest week 4 *C*τ that yielded a significant separation in the median PFS was 20.5 *μ*g ml^−1^. The week 4 *C*τ boundaries of the 40th percentile (25.1 *μ*g ml^−1^) and greater did not result in a significant separation of the median PFS. In the comparison of the median PFS of patients grouped by week 4 *C*τ values, excluding patients with *C*τ ⩽20.5 *μ*g ml^−1^ resulted in no statistically significant difference in median PFS at any *C*τ boundary. The comparisons of mean maximum tumour reduction in patients with *C*τ above and below each decile concentration at week 4 are presented in [Table 2](#tbl2){ref-type="table"}. The greatest difference in the mean maximum tumour reduction was observed at the week 4 plasma pazopanib *C*τ of 20.5 *μ*g ml^−1^. Unlike PFS results, the difference in mean maximum tumour reduction was statistically significant for all *C*τ decile boundaries, except the 80th and 90th percentiles (38.5 and 47.6 *μ*g ml^−1^, respectively). This was the result of including patients with *C*τ ⩽20.5 *μ*g ml^−1^ because there were no statistically significant differences in the maximum tumour reduction between patients grouped by *C*τ decile values after exclusion of patients with week 4 *C*τ ⩽20.5 *μ*g ml^−1^ ([Table 2](#tbl2){ref-type="table"}). The week 4 *C*τ of 20.5 *μ*g ml^−1^ was the greatest value that significantly discriminated median PFS and mean maximum tumour reduction. Therefore, the week 4 *C*τ of 20.5 *μ*g ml^−1^ was used as the threshold for further analyses. The Kaplan--Meier curves of PFS and the empirical distribution function of the change in tumour size for patients with a week 4 *C*τ ⩽20.5 *μ*g ml^−1^ and *C*τ above 20.5 *μ*g ml^−1^ are displayed in [Figure 2](#fig2){ref-type="fig"}. The median PFS for patients with a week 4 *C*τ ⩽20.5 *μ*g ml^−1^ was 19.6 weeks. In contrast, the median PFS for patients with a week 4 *C*τ above 20.5 *μ*g ml^−1^ was 52.0 weeks. Median observed tumour shrinkage in patients with a week 4 *C*τ above 20.5 *μ*g ml^−1^ (37.9%) was more than five-fold greater than the median observed tumour shrinkage in patients with a week 4 *C*τ ⩽20.5 *μ*g ml^−1^ (6.9%). The percentage of patients who experienced stable disease as their best response was 40% for those with a week 4 *C*τ ⩽20.5 *μ*g ml^−1^ and those with a week 4 *C*τ above 20.5 *μ*g ml^−1^. However, the percentage of patients with a week 4 *C*τ above 20.5 *μ*g ml^−1^ who had a best response of partial or complete response was more than double that of patients with a week 4 *C*τ ⩽20.5 *μ*g ml^−1^ (45 and 19%, respectively). Likewise, the percentage of patients with progressive disease was more than double when week 4 *C*τ was ⩽20.5 *μ*g ml^−1^ (38%) compared with patients with a week 4 *C*τ above 20.5 *μ*g ml^−1^ (11%). sVEGFR2 ------- Plasma sVEGFR2 concentrations decreased at least 10% from the baseline value to the nadir in 167 of 178 patients (94%) from whom data were available. The fit of the linear and *E*~max~ models to the percent change from baseline in sVEGFR2 nadir *vs* plasma pazopanib concentration is displayed in [Supplementary Figure S2](#sup1){ref-type="supplementary-material"}. The correlation between plasma pazopanib concentrations and the maximum decrease in sVEGFR2 was weak using the linear model (*r*^2^=0.27). However, the linear model produced a slightly lower Akaike information criterion relative to the fit of the *E*~max~ model to the data (1415 *vs* 1417) suggesting a slightly better fit of the data. Adverse events -------------- A summary of the most common (total incidence ⩾5%) treatment-emergent AEs by plasma pazopanib concentration quartile is presented in [Table 3](#tbl3){ref-type="table"}. The incidence of increased MAP, diarrhoea, hair colour change, alanine aminotransferase increase, stomatitis, and hand--foot syndrome increased as the plasma pazopanib concentrations increased, with the highest incidence occurring in the fourth *C*τ quartile. The highest incidence of CTCAE grade 3/4 hypertension occurred in the third and fourth quartiles of *C*τ. The increases in the incidences of hand--foot syndrome and MAP in the fourth quartile of *C*τ were the most marked. In contrast, the incidence of nausea, fatigue, vomiting, dysgeusia, and rash displayed no obvious relationship with pazopanib *C*τ. Pharmacokinetics ---------------- The mean and median *C*τ values on week 4 in the Phase II study were 28.8 and 28.1 *μ*g ml^−1^, respectively ([Figure 3](#fig3){ref-type="fig"}). Dose reductions were allowed in this study. In all, 184 of the 205 patients with week 4 *C*τ data received pazopanib 800 mg once daily for at least 2 weeks; the mean week 4 *C*τ value in those patients was 29.3 *μ*g ml^−1^. For patients who experienced dose reductions or dose interruptions within 2 weeks of collection of the week 4 plasma sample, the mean week 4 *C*τ value was 24.8 *μ*g ml^−1^. Discussion ========== Results of the current analysis identified a threshold for pazopanib *C*τ, which must be achieved for optimal efficacy in patients with RCC. This target pazopanib *C*τ is similar to the threshold steady-state concentration of at least 40 *μ*[M]{.smallcaps} (17.5 *μ*g ml^−1^) that was required for the inhibition of VEGF-induced VEGFR2 phosphorylation in mouse lungs. *C*τ measured immediately before pazopanib administration is assumed to be the lowest plasma concentration over the dosing interval. Therefore, these results suggest that maintenance of plasma pazopanib concentrations above 20.5 *μ*g ml^−1^ for the entire dosing interval was associated with the most significant increases in PFS and tumour shrinkage. This hypothesis is supported by the observation that pazopanib *C*τ was better than *C*~max~ as a predictor of the occurrence of an increase in blood pressure in patients with solid tumours. Furthermore, [@bib23] observed rapid vascular regrowth in a tumour cell line on interruption of VEGF inhibition, and [@bib3] observed rapid regrowth of tumours in patients with metastatic colorectal cancer after interruption of bevacizumab therapy. In a study reported by Burstein ([@bib2]), levels of biomarkers of VEGFR inhibition (VEGF, sVEGFR2, sVEGFR3) were cyclical and coincident with the schedule of sunitinib used in the study (4 weeks on, 2 weeks off). Moreover, tumour growth of superficial cutaneous or nodal lesions was observed in several patients during the 2-week period when no sunitinib was administered. Together, these results suggest that maintaining persistent suppression of the targeted signalling pathway may lead to better efficacy of these agents. However, administration of sunitinib at the standard intermittent regimen of 50 mg daily for 4 weeks followed by 2 weeks without treatment produced a numerically greater median PFS *vs* 37.5 mg daily administered on a continuous basis (8.5 *vs* 7.0 months; hazard ratio 0.77; *P*=0.070) in a randomized study in patients with advanced RCC ([@bib24]). The incidence and severity of AEs were similar between the continuous and intermittent regimens. These results suggest that the level of suppression of the target receptor achieved by administration of lower daily doses of sunitinib did not provide an advantage in clinical outcomes *vs* intermittent administration of higher doses. Although alternative dosing regimens of pazopanib were not investigated in the present study, results suggest that the clinical benefit of pazopanib in RCC could be improved by increasing the proportion of patients with trough plasma pazopanib concentrations above a target threshold. A concentration-dependent increase in the incidence of several AEs was also observed during the Phase II trial ([Table 3](#tbl3){ref-type="table"}; [Supplementary Figure S3](#sup1){ref-type="supplementary-material"}). Some toxicities such as hypertension and alanine aminotransferase elevations appeared to reach a plateau at higher concentrations. In contrast to hypertension, alanine aminotransferase elevations, and the results for measures of clinical efficacy, the incidence of diarrhoea, hand--foot syndrome, hair colour change, and stomatitis continued to increase as the trough plasma pazopanib concentration increased. There was no evidence of additional increases in PFS or tumour shrinkage if trough plasma pazopanib concentrations were maintained above threshold values \>20.5 *μ*g ml^−1^. In addition to suggesting that escalation to a maximally tolerated dose of targeted agents such as pazopanib may not be necessary, these results reinforce the previous inference that increasing the dose of a targeted agent to a maximally tolerated level may only serve to affect the risk-to-benefit ratio negatively. Dose reductions to 400 mg pazopanib occurred in ∼30% of patients with RCC in the Phase II study. The most common AEs that led to dose interruptions or dose reductions were diarrhoea, hypertension, and increased ALT/AST ([@bib16]). All of those AEs demonstrated a concentration-dependent increase in frequency in the current analysis. Results suggest that the frequency of these common AEs could be reduced by decreasing systemic exposure to pazopanib through dose reductions or interruptions while maintaining plasma pazopanib concentrations above the threshold for optimal clinical effect in many patients. The pazopanib dose of 800 mg once daily was selected for Phase II and Phase III clinical trials based on target trough plasma concentrations that were associated with clinical and biologic effects in preclinical models and in patients with solid tumours ([@bib21]; [@bib15]). However, inter-patient heterogeneity in the metabolism and/or absorption of pazopanib can lead to differences in systemic exposure. Pazopanib is a Biopharmaceutics Classification System Class II drug, with high permeability and low solubility. The majority of an oral pazopanib dose is eliminated in the faeces, primarily as an unabsorbed drug, which is consistent with solubility-limited oral absorption. Pazopanib is a substrate of human p-glycoprotein (Pgp) and breast cancer resistance protein (BCRP; [@bib4]). Differences in the expression of Pgp and BCRP may contribute to the intra-patient variability in systemic exposure to pazopanib after oral administration. Administration of esomeprazole in the evening and pazopanib in the morning resulted in 42 and 40% decreases in *C*~max~ and AUC, respectively ([@bib32]). Administration of pazopanib with food increased *C*~max~ and AUC by approximately two-fold ([@bib12]). Use of medications that alter gastric pH or administration in a partially fasted state also may contribute to the inter- and intra-patient variability of pazopanib pharmacokinetics. In light of that variability and the relationship between systemic exposure and clinical benefit and toxicities, dose adjustments based on trough plasma concentrations may provide a method to optimise therapy with pazopanib by maintaining therapeutically effective blood levels, while minimising AEs whenever possible. Dose adjustment concurrent with therapeutic drug monitoring is widely used for compounds with a narrow therapeutic index, such as digoxin, antiepileptic agents, aminoglycosides, and immunosuppressants; this approach also has been recommended in certain situations for antiretroviral medications, where consistent target suppression is necessary ([@bib26]). Use of a trough concentration may provide a convenient method of monitoring systemic exposure to pazopanib in a clinical setting, thereby allowing optimisation of the dosing regimen to gain maximum efficacy. Algorithms for therapeutic drug monitoring of tyrosine kinase inhibitors have been proposed ([@bib10]; [@bib35]; [@bib20]). Results from the present analysis indicate that plasma pazopanib concentrations obtained early (week 4) in the treatment period were predictors of effects consistent with VEGFR inhibition (increased blood pressure and decreases in sVEGFR2), clinical benefit, and the incidence of AEs. Recent improvements in bioanalytical detection have allowed the analysis of drug concentrations from small volumes (\<20 *μ*l) of dried blood, making therapeutic monitoring of pazopanib concentrations in blood more feasible ([@bib7]). Further clinical studies are necessary to confirm the target threshold for pazopanib *C*τ and assess the effects of pharmacokinetics-guided dosing *vs* standard pazopanib treatment. Strategies to optimise systemic exposure of pazopanib, such as dose escalation above 800 mg once daily or administration of pazopanib with food in patients with concentrations below the target threshold, must be investigated in a prospective fashion in order for pharmacokinetics-guided dosing to be feasible. Finally, the safety and efficacy of pharmacokinetics-guided dosing relative to the standard dosing regimen for pazopanib should be determined in a randomized clinical trial. We thank Jerome F Sah, PhD, ProEd Communications, Inc., for his medical editorial assistance with this manuscript. Financial support for this study (Study VEG105192; clinicaltrials.gov identifier NCT00334282) and medical editorial assistance was provided by GlaxoSmithKline Pharmaceuticals, Philadelphia, Pennsylvania. [Supplementary Information](#sup1){ref-type="supplementary-material"} accompanies this paper on British Journal of Cancer website (http://www.nature.com/bjc) This work is published under the standard license to publish agreement. After 12 months the work will become freely available and the license terms will switch to a Creative Commons Attribution-NonCommercial-Share Alike 3.0 Unported License. Previous Publication: Portions of the data were presented at the 2010 ASCO Annual Meeting (J Clin Oncol 28:15s, 2010, abstract 3048). CC, SS, RA, and LP are employees and stockholders of GlaxoSmithKline. ABS, HAB, YL, and DR are former employees of GlaxoSmithKline and hold company stock. MM has been a consultant or advisory board consultant for AstraZeneca, Bristol-Myers Squibb, GlaxoSmithKline, Mundipharma, Novartis, Stallergenes, and Pfizer. TEH has been a consultant, paid researcher, and participant in advisory boards or speaker\'s bureaus for Pfizer, GlaxoSmithKline, Novartis, AVEO, Johnson & Johnson, and Dendreon. Supplementary Material {#sup1} ====================== ###### Click here for additional data file. ![**Pazopanib exposure and blood pressure.** Relationship, in patients with solid tumours, between the occurrence of a significant increase in blood pressure (BP) and steady-state plasma pazopanib AUC (**A**), *C*~max~ (**B**), and *C*τ (**C**); relationship between steady-state AUC and *C*τ (**D**). Open circles represent individual observations (0=no significant increase; 1=significant increase) and closed circles represent the proportion of patients with a significant increase in blood pressure within each plasma pazopanib *C*τ quintile range. The thick line represents the plasma pazopanib *C*τ quintile range.](bjc2014503f1){#fig1} ![**Steady-state plasma pazopanib concentration and clinical response.** The Kaplan--Meier curves showing PFS (**A**) and empirical cumulative distribution function (CDF) of maximum decrease from baseline in tumour size (**B**) for patients with week 4 predose steady-state plasma pazopanib concentration (*C*τ) ⩽20.5 *μ*g ml^−1^ (black) and \>20.5 *μ*g ml^−1^ (red).](bjc2014503f2){#fig2} ![**Distribution of predose steady-state plasma pazopanib concentrations (*C*τ).**](bjc2014503f3){#fig3} ###### Comparison of progression-free survival at each week 4 plasma pazopanib *C*τ decile in the overall study population and in the subset of patients with *C*τ above 20.5 *μ*g ml^−1^   **Median PFS, weeks (*****n***)   -------------------------------------------------------------- --------------------------------- ------------ --------- **Overall study population (*N*=177)** 12.5 43.7 (159) 20.3 (18) 0.035 17.4 49.4 (141) 13.9 (36) 0.00235 20.5 52.0 (124) 19.6 (53) 0.00378 25.1 52.0 (106) 29.6 (71) 0.0529 28.1 52.1 (88) 29.6 (89) 0.146 31.15 53.0 (71) 35.3 (106) 0.252 34.2 59.9 (53) 31.7 (124) 0.115 38.5 53.0 (36) 38.4 (141) 0.391 47.6 49.4 (18) 39.3 (159) 0.609 **Excluding patients with *C*τ ⩽20.5 *μ*g ml^−1^ (*n*=124)** 25.1 52.0 (106) 51.7 (18) 0.760 28.1 52.1 (88) 43.7 (36) 0.799 31.1 53.0 (71) 43.7 (53) 0.779 34.2 59.9 (53) 39.3 (71) 0.519 38.5 53.0 (36) 52.0 (88) 0.962 47.6 49.4 (18) 52.0 (106) 0.940 Abbreviations: PFS=progression-free survival. *C*τ represents predose plasma pazopanib concentration at week 4. ###### Mean tumour shrinkage in patients at each week 4 plasma pazopanib *C*τ decile in the overall study population and in the subset of patients with *C*τ above 20.5 *μ*g ml^−1^   **Mean tumour shrinkage, %**   -------------------------------------------------------------- ------------------------------ ------- ------ --------- **Overall study population (*N*=177)** 12.5 −31.7 −2.96 28.7 \<0.001 17.4 −34.5 −4.85 29.7 \<0.001 20.5 −37.9 −6.86 31.0 \<0.001 25.1 −37.5 −16.0 21.5 \<0.001 28.1 −39.0 −18.6 14.9 \<0.001 31.15 −39.8 −21.3 18.5 \<0.001 34.2 −40.2 −24.0 16.2 0.0020 38.5 −36.0 −27.1 8.9 0.136 47.6 −31.0 −28.7 2.3 0.693 **Excluding patients with *C*τ ⩽20.5 *μ*g ml^−1^ (*n*=124)** 25.4 −37.5 −40.5 −3 0.581 28.1 −39.0 −35.2 3.8 0.460 30.5 −39.7 −35.4 4.3 0.381 33.7 −40.2 −36.2 4.0 0.457 37.9 −36.0 −38.7 −2.7 0.654 47.3 −31.2 −39.2 −8.0 0.181 *C*τ represents predose plasma pazopanib concentration at week 4. ###### Frequency of adverse events by week 4 pazopanib *C*τ quartile (*n*=205)   **Pazopanib concentration range,** ***μ*g ml**^**−1**^ ------------------------------------------ -------------------------------------------------------- -------- --------- --------- Hypertension[a](#t3-fn2){ref-type="fn"} 27 (2) 33 (8) 38 (10) 35 (10) Increased MAP[b](#t3-fn3){ref-type="fn"} 38 65 67 78 Diarrhoea 24 (0) 49 (0) 65 (0) 67 (2) Hair colour change 18 (0) 37 (0) 37 (0) 51 (0) Alanine aminotransferase increase 8 (4) 14 (6) 15 (12) 16 (4) Hand--foot syndrome 0 4 (2) 6 (0) 24 (6) Stomatitis 0 4 (0) 2 (0) 10 (0) Nausea 35 (2) 37 (0) 31 (2) 41 (0) Fatigue 25 (2) 41 (4) 35 (4) 31 (2) Vomiting 14 (0) 14 (0) 13 (2) 18 (0) Dysgeusia 10 (0) 27 (0) 17 (0) 25 (0) Rash 10 (2) 10 (0) 15 (0) 8 (2) Abbreviation: MAP=mean arterial blood pressure. Graded according to Common Terminology Criteria for Adverse Events (CTCAE; MAP was not graded by CTCAE). MAP increase ⩾15 mm Hg on ⩾3 separate occasions, initiation or escalation of antihypertensive medications, or both.
America’s carbon-dioxide emissions are actually falling. In fact, they have not been this low since 1992. And while no single factor can account for the entire shift, much of the credit goes to something environmentalists often detest: hydraulic fracturing, or fracking. Among power sources, the worst source of CO2 emissions by far is coal. Natural gas generates half the CO2 per kilowatt-hour, and in the past few years natural gas has displaced coal to a remarkable degree. This year gas-fired electricity generation equaled coal-fired generation for the first time. According to the Energy Information Administration, that trend will continue as shale gas production rises from 5 trillion cubic feet in 2010 to more than 13 trillion cubic feet in 2035. Fracking made this possible—by opening up the Marcellus shale deposit in Pennsylvania and many others. Twelve years ago, shale gas made up 2 percent of the U.S. supply. It now makes up 37 percent. All of that was achieved without government direction—and in the face of considerable environmental resistance. America’s carbon-dioxide emissions are actually falling. In fact, they have not been this low since 1992 This is great news! Somebody go tell the left that it worked. We got our global warming under control. Their efforts paid off and we have seen no warming in the past 10 years. We can stop pushing for carbon taxes and such and die in peace. The planet will survive after all. Another contributing factor to the dropping of the earth’s CO2 content is the fact that Moslems are killing each other and Christians and Jews in ever greater numbers than before, thus reducing carbon footprints. Other places with major killings include the Congo, So. Africa (the top murder country per capital in the world other than Pakistan);Red China (lots of people being killed that you never hear of); No. Korea;Venezuela (another rising crime capital of the world); Colombia; Mexico; El Salvador; Guatemala. Chicago; Philadelphia; Wash. D.C., Baltimore, Detriot, Houston, LA, etc. Here Obama’s sons are doing the carbon footprint reduction program. Just read the police crime reports in the paper every day and you will see what I mean. This is a semi-sarcastic/satiric post but there is a lot of truth behind it. That is the tragedy for America, and for the world. To cash in on the carbon sequestration "market" is perhaps the principal reason the owners of the oil companies have been using their tax-exempt "charities" to make fat donations to the NGOs behind this "global warming" scam. Moreover, because big companies can more easily afford the processing plants for producing and delivering mass quantities of CO2 and the overhead with which to track and speculate in credits, it would put them at a financial advantage over independent drillers. Why certain people and organizations think it is a problem is a mystery to me. Using government to subsidize a product and/or eliminate competition by regulation has been a way to profit for a very long time. Hence, the major stockholders of the companies who stand to profit from this racket have been making fat donations to green groups for over fifty years. The NGOs and foundations launder the money and support the "scientific" justification they seek. It wouldn’t be worth the effort vs the personal health hazard. The hydrocarbon content of the air in the Bayou Corne area is making residents ill. A salt dome containing 1.5 million barrels of liquid butane will be liberated to the open air fairly soon. Asphyxiation or explosion is the anticipated consequence. Among power sources, the worst source of CO2 emissions by far is coal. Natural gas generates half the CO2 per kilowatt-hour, Statement based on a eia/epa government published table. The source for the statistics are not provided. It is hard for me to understand how the oxidation of coal based carbon is different than oxidation of natural gas carbon. But then biochemistry was something I didn't study. Interesting that you are willing to rely on NBC citing something called the “Food & Environment Reporting Network”. I don’t know about the latter but I’m very well acquainted with the horses—t coming out of NBC. Maybe you are an expert at this, which I am not. But I have lived most of my life in the Bakken area and I’ve seen reports of disastrous claim after claim which even Obama’s own EPA cannot manage to substantiate...and believe me, they are trying. The Bakken zone is a couple miles below the acquifers tapped for water wells. Does that mean there isn’t sometimes surface damage or spills caused by careless workers? Hardly. Bayou Corne is a collapsed Salt Dome Storage Facility and has ZERO to do with hydraulic fracturing in a production well. The storage facility was created by leaching out the salt and there is NO WAY anyone would consider fracturing a hole designed to KEEP the oil/gas in. Fracturing is done to let the oil/gas/water out. There are fracking operations going on all over the area surrounding Bayou Corne. Apparently they didn't get the message that fracking isn't a good idea. Too late. Seismic activity initiated by the fracking and methane pressure from under the salt domes is breaking them apart. Fresh water incursion is dissolving the domes. It's just a matter of time. Check this link for current videos of the situation and pictures prior to the sink hole opening. > It is hard for me to understand how the oxidation of coal based carbon is different than oxidation of natural gas carbon 1) Natural gas is 25% hydrogen by weight (Coal is around 3 percent hydrogen). Much of the energy released by burning NG is from the oxidation of hydrogen. 2) Modern natural gas electric plants use the highly efficient “Combined cycle” design, which converts about 60% of the chemical energy in the NG into electricity. Coal plants do not use combined cycle, and typically get about 40% conversion. Add those factors together, and it’s not hard to see that per mole of carbon, methane can yield about twice as many watt/hours as coal. Just imagine, you could rig a small dome over the methane leak, power a small generator and hook it to a line sync inverter and get paid for free electricity. One ladys fear is another mans treasure. Exactamento. Gas and electricity generated on-site back out utility power and gas, and you can actually go negative-balance and get paid retail for the gas and electricity you produce. This does happen in some locations, such as southern Ohio, where people sometimes have old, capped-off wellheads in their basements or yards that have just enough residual natural-gas pressure on the casing that they'll flow to a stove or furnace. Item, if you must sequester CO2 in volume, the best place to do it is in a partially- or mostly-depleted conventional oil reservoir or a high-carbon shale (like the Eagleford in central and south Texas or the Bakken in Montana and North Dakota) that is known to produce liquid hydrocarbons. The CO2 mobilizes kerogen and bitumen in the shale or sand reservoirs enough that it can be migrated, captured and produced. CO2 flooding is a secondary-production technique practiced for generations now in older oil fields like those being rejuvenated by massive-frac technology in the old Paleozoic trends of the Ohio Valley. There are fracking operations going on all over the area surrounding Bayou Corne. Apparently they didn’t get the message that fracking isn’t a good idea. Too late. Seismic activity initiated by the fracking and methane pressure from under the salt domes is breaking them apart. = = = = = = BS Hydraulic Fracturing is not related in any way. There is not any substantial claim of such. very interesting! Thanks. Somehow there seems to be an amazing deposit of hydrogen in the earths crust. I wonder if there is some sort of nuclear reaction in the hot core of the planet that produces hydrogen somehow. It is leaking out everywhere, and if the planet is elventy billion year old, it would have leaked out long ago. Don't you just wish to get a glimpse into an organic chemistry book from the 24th century... 30 posted on 12/12/2012 3:18:34 PM PST by American in Israel (A wise man's heart directs him to the right, but the foolish mans heart directs him toward the left.) Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.
Determination of the etiological organism during acute exacerbations of COPD and efficacy of azithromycin, ampicillin-sulbactam, ciprofloxacin and cefaclor. Turkish Thoracic Society COPD Working Group. Acute exacerbations, most of which are due to lower respiratory tract infections, cause great morbidity and mortality in patients with chronic obstructive pulmonary disease (COPD) and most of these are due to lower respiratory tract infections. The aim of this study was to determine the causative organism and the effects of azithromycin, ampicillin sulbactam (sultamicillin), ciprofloxacin and cefaclor monohydrate therapy in COPD. One hundred and six patients with COPD in acute exacerbation were randomized into four groups for empiric antibiotic treatment following lung function tests and sputum examination. The most common strains isolated from sputum were Haemophilus influenzae (30.8%), Streptoccocus pneumoniae (12%) and Moraxella catarrhalis (7.7%). Azithromycin, sultamicillin, ciprofloxacin and cefaclor monohydrate were found to be effective in treating COPD exacerbations.
Q: Find, cut, and insert row to match the value of debit and credit in VBA Excel I have the following set data in Sheet1 and start from row 4 column A where the header in row 3: No Date Code Name Remarks D e b i t Cr e d i t 1 4/30/2015 004/AB/01/04/15 Anna YES 40239.66 0.00 2 2/16/2015 028/AA/01/02/15 Andy NO 0.00 2205.49 3 1/31/2015 021/DR/04/01/15 Jim YES 167.60 0.00 4 7/14/2015 083/RF/01/07/15 Anna YES 3822.60 0.00 5 8/6/2015 030/AB/01/08/15 Anna NO 0.00 11267.96 6 1/15/2015 020/TY/01/01/15 Barry 0.00 5237.84 7 7/14/2015 024/HU/01/07/15 Anna NO 0.00 3822.60 8 1/31/2015 039/JK/01/01/15 YES 0.00 1780.84 9 1/27/2015 007/ER/01/01/15 Jim NO 5237.84 0.00 10 4/29/2015 077/FX/01/04/15 Barry NO 0.00 40239.66 11 1/3/2015 001/OX/10/01/15 Andy NO 33074.03 0.00 12 8/10/2015 001/PR/01/08/15 Nicholas 11267.96 0.00 13 10/31/2015 007/TX/09/10/15 Jim 1780.84 0.00 14 2/28/2015 071/QR/01/02/15 Andy YES 2205.49 0.00 15 1/7/2015 007/OM/02/01/15 Nicholas 8873.25 0.00 And I need to arrange the data above in the same sheet based on the value of debit and credit in no particular order as long as the values of debit and credit: x and y are followed by the values of debit and credit: y and x (preferably x > y) where the unmatched data will be put in the bottom of arranged table. For example something like this : No Date Code Name Remarks D e b i t Cr e d i t 14 2/28/2015 071/QR/01/02/15 Andy YES 2205.49 0.00 2 2/16/2015 028/AA/01/02/15 Andy NO 0.00 2205.49 4 7/14/2015 083/RF/01/07/15 Anna YES 3822.60 0.00 7 7/14/2015 024/HU/01/07/15 Anna NO 0.00 3822.60 12 8/10/2015 001/PR/01/08/15 Nicholas 11267.96 0.00 5 8/6/2015 030/AB/01/08/15 Anna NO 0.00 11267.96 9 1/27/2015 007/ER/01/01/15 Jim NO 5237.84 0.00 6 1/15/2015 020/TY/01/01/15 Barry 0.00 5237.84 13 10/31/2015 007/TX/09/10/15 Jim 1780.84 0.00 8 1/31/2015 039/JK/01/01/15 YES 0.00 1780.84 1 4/30/2015 004/AB/01/04/15 Anna YES 40239.66 0.00 10 4/29/2015 077/FX/01/04/15 Barry NO 0.00 40239.66 11 1/3/2015 001/OX/10/01/15 Andy NO 33074.03 0.00 15 1/7/2015 007/OM/02/01/15 Nicholas 8873.25 0.00 3 1/31/2015 021/DR/04/01/15 Jim YES 167.60 0.00 Honestly, I couldn't come up with the right code to do this and it's really driving me crazy. This is one of my failed attempts, I've tried something like this Sub MatchingDebitAndCredit() Dim i As Long, j As Long, Last_Row As Long Last_Row = Cells(Rows.Count, "F").End(xlUp).Row For i = 4 To Last_Row For j = 4 To Last_Row If Cells(i, "F").Value = Cells(j, "G").Value And Cells(i, "G").Value = Cells(j, "F").Value Then Rows(i).EntireRow.Copy Destination:=Worksheets("Sheet2").Range("A" & Rows.Count).End(xlUp).Offset(1) Rows(j).EntireRow.Copy Destination:=Worksheets("Sheet2").Range("A" & Rows.Count).End(xlUp).Offset(1) Exit For End If Next j Next i End Sub I copied the matched data in Sheet2 since I was not able to do it the same sheet but it was failed, nothing returned in Sheet2 after the program completed. I intend to do this using arrays and the Find function since the size of data set is very large but how come I could do that if using worksheet can't? Could someone here help me out, please? A: Improvement OK, finally I found my own way to solve this problem. Sorry if it takes time too long. I also want to thank Clyde and Slai for the answers they gave me. I really appreciate it. Instead of cutting the entire row of matched data and then inserting it below the row of its pair which is considered time-consuming, I assign the same values to the matched pair (I called these numbers as ID Match) based on the order of matching, then delete (assign vbNullString) the matched pair so that they won't be processed again via looping through array. I also set the starting point of the inner loop from i = 1 to j = i+1 because the next order to be processed is located below the data since its next candidate matched won't be found above it. After all the data have been labelled the consecutive numbers, I sort all data in ascending order based on the column ID Match (Column I). To improve the code performance, I copy the data in column F & G to an array and I use .Value2 rather than Excel's default setting because it only takes the values of the range without its format (Debit and Credit are in Accounting number format). Here is the code I use to implement this task: Sub Quick_Match() Dim i As Long, j As Long, k As Long, Last_Row As Long Dim DC, Row_Data, ID_Match Last_Row = Cells(Rows.Count, "A").End(xlUp).Row ReDim DC(1 To Last_Row - 1, 1 To 2) ReDim Row_Data(1 To Last_Row - 1, 1 To 1) ReDim ID_Match(1 To Last_Row - 1, 1 To 1) DC = Range("A2:B" & Last_Row).Value2 For i = 1 To Last_Row - 2 If DC(i, 1) <> vbNullString Then k = k + 1 For j = i + 1 To Last_Row - 1 If DC(j, 2) <> vbNullString Then If DC(i, 1) = DC(j, 2) And DC(i, 2) = DC(j, 1) Then Row_Data(i, 1) = j + 1: ID_Match(i, 1) = k Row_Data(j, 1) = i + 1: ID_Match(j, 1) = k DC(i, 1) = vbNullString: DC(i, 2) = vbNullString DC(j, 1) = vbNullString: DC(j, 2) = vbNullString Exit For End If End If Next j End If If Row_Data(i, 1) = vbNullString Then Row_Data(i, 1) = "No Match": k = k - 1 End If Next i Range("C2:C" & Last_Row) = Row_Data Range("D2:D" & Last_Row) = ID_Match Columns("A:D").Sort key1:=Range("D2"), order1:=xlAscending, Header:=xlYes End Sub It completes the task less than 2.75 seconds on average (twice faster and much shorter than before edited version) for processing roughly 11,000 rows on my machine. See the following post for the detail.
GalliumOS GalliumOS is a Linux distribution for Chrome OS devices, developed by the community-supported GalliumOS project. The distribution is made for Chrome hardware including Chromebook, Chromebox, Chromebit and Chromebase. GalliumOS beta1 was released on 10 November 2015. Features Gallium is based on Xubuntu and maintains compatibility with the Ubuntu repositories. Multiple sources indicate that Galliums' boot time is faster than Linux distributions made for Chrome OS. It is optimized to limit stalls and has integrated touchpad drivers. Gallium is compatible with some Chrome devices. It is necessary to prepare the device in different ways based on the hardware chipset. References External Links Official website GalliumOS wiki Category:Ubuntu derivatives
When Patrick Kane had surgery, putting him out of the lineup for 12 weeks, one optimistic theory stated that it could be a rallying point for the Chicago Blackhawks. Which would be a good thing, because apparently they want to tear each others’ throats out behind the scenes ... Two sports analysts with Chicago roots have reported, independently, that the Blackhawks dressing room is a cesspool of personal conflict. First came this cryptic proclamation from Dan Bernstein, a WSCR afternoon host and columnist for CBS Sports who has a kick-ass ROBOTRON arcade game as his Twitter header: Per sources, #Blackhawks' locker room complicated by some untidy personal lives right now. Q's job: keep things from distracting/dividing. — Dan Bernstein (@dan_bernstein) February 25, 2015 “Untidy personal lives” … well, if “The Odd Couple” taught us anything it’s that slovenly behavior leads to personal strife. Oh, but then David Diehl, the former NFL lineman turned NFL game analyst for FOX Sports, really turned up the heat: First Kane out 12 weeks and now a divided team after fist fight in the #Blackhawks locker room. There are locker room codes you do not cross — David Diehl (@davediehl66) February 26, 2015 A fist fight!? ON A TEAM THAT ONLY HAS 13 MAJOR PENALTIES THIS SEASON!? Before you dismiss Diehl, please keep in mind he’s a Chicago native who’s been around the Blackhawks a bit. It’s entirely plausible that he’s got a source inside the room … … and it’s entirely possible this is an old rumor being spun around the mill again. Particularly because it’s hard to have a locker room fist fight after the Kane injury when there’s no locker room to fight in, and the Blackhawks had an off-day yesterday. Plus, there have been rumors about problems inside the Hawks room, and a teammate-vs.-teammate fight, since last summer. The Committed Indian, the Blackhawks fan-zine, wrote the following in its “exit interview” of Patrick Sharp (and obviously this is grounded in rumor): In my position, pretty regularly I get emails from people claiming to be in the know (and some genuinely are) letting me know about what they’ve heard about this guy or what’s going on with this injury and so on. I appreciate it of course, as I don’t really have any “insiders.” Most of it I dismiss out of hand. But when they start to pile up about the same things or incidents, you start to take notice. When you tap on some people who may be in the know and they say the same things, you take notice more. So I present the following not as truth but just as what I’ve heard repeatedly from a wide variety of people. There are off-ice issues with Sharp. There may have been a physical altercation with a teammate (and a very important one). Let’s just say the image of Sharp as a wholesome family man with his two daughters is not an accurate picture. There may be other problems. Completely unrelated to any of this we’re sure, Sharp is having his worst offensive season since 2007. Was there a fight? Are there locker room issues? If so, can the Blackhawks overcome them? The only question that matters is the last one. Locker room drama is nothing new in the NHL. Teams with “untidy” personal lives can still win Stanley Cups. It’s how you compartmentalize that stuff, and any ill feelings towards teammates, that’s the challenge many teams can’t meet. MORE FROM YAHOO HOCKEY
Q: how to display version only of Visual Studio Code On a VM running Ubuntu 18.04 Visual Studio Code is installed. When code --version is executed on the command line, the follow info is outputted in the terminal: knot22@juniper:~/Desktop/pile$ code --version 1.40.2 f359dd69833dd8800b54d458f6d37ab7c78df520 x64 Is there a command that will limit the output only to the version so just 1.40.2 is outputted? I want just the version number, not all of the data outputted by --version for the code package. A: You can simply use head command like that code --version | head -1 You would get : knot22@juniper:~/Desktop/pile$ code --version | head -1 1.40.2 knot22@juniper:~/Desktop/pile$ Little explanation : head -number_lines would display the first number_lines, so in your case, it would display just the 1rst line due to -1 option (e.g -3 would display 3 lines)
A longitudinal study of the etiology of separation anxiety. A longitudinal examination of the relation between separation experiences and the development of separation anxiety at age 3, 11 and 18 years was conducted. Three associative pathways were assessed. Conditioning events were not related to separation anxiety at age 3. Vicarious learning (modelling) in middle childhood (age 9 years) was the conditioning variable most strongly related to separation anxiety at age 11, accounting for 1.8% of the variance in symptoms. Separation experiences (hospitalisations) before the age of 9 were inversely correlated with separation anxiety at age 18. That is, more overnight hospital stays in childhood were related to less separation anxiety in late adolescence. However, none of these conditioning correlates remained significant predictors of separation anxiety in adjusted regression models. In contrast, certain "planned" separations in early-mid childhood were associated with lower levels of separation anxiety at later ages. Generally, the findings were consistent with predictions from the non-associative theory of fear acquisition. That vicarious learning processes appeared to modulate, albeit to a minor degree, the expression of separation anxiety during mid-late childhood suggests that there may be critical periods during which some individuals are susceptible to the interactive effects of both associative and non-associative processes. These findings serve to illustrate the complexity of fear acquisition, the relevance of developmental factors and the likely interplay between associative and non-associative processes in the etiology of fear and anxiety.
MDT LSS 700SA BLACK 4495:- 3995:-spara: 11% rabatt Our LSS chassis system was designed to be as compact as possible. The V-shaped bedding and free floated fore-end improve accuracy and ergonomics. The fore-end allows for barrel contours up to 1" in diameter. The graphic on the right shows the 2 flat spots (V-block) where the action sits. The area below the action remains rounded for ultimate strength. The chassis system is manufactured out of billet 6061-T6 aluminum, and has been finished with Cerakote™ in Black or Flat Dark Earth (FDE). To keep this chassis system compact, it was designed for collapsible AR-15 buttstocks, however fixed buttstocks can mounted with the use of a fixed stock adapter. Alternatively, our LSS-XL chassis has a 3" longer fore-end has was designed to accept fixed buttstocks without the use of the adapter.
Q: Display text inside loop in C# windows application I have a loop in my windows form inside the loop i should display the customer number that been processed inside the loop but the textbox that shoud have the customer number freezes during the loop and none got displayed untill loop finishes. any ides how to resolve this? A: Try this: Full reference is System.Threading.Tasks.Task, or for a using, System.Threading.Tasks Task.Factory.StartNew(() => { for (int i = 0; i < 10; i++) { // Any GUI control which you want to use within thread, // you need Invoke using GUI thread. I have declare a method below for this //Now use this method as ExecuteSecure(() => textBox1.Text = "Customer Id " + i); //... other code etc. Thread.Sleep(1000); } }); //--- private void ExecuteSecure(Action action) { if (InvokeRequired) { Invoke(new MethodInvoker(() => action())); } else { action(); } } or Use a BackgroundWorker if you want your UI to be updated in real time
// // MWPreprocessor.h // MWPhotoBrowser // // Created by Michael Waterfall on 01/10/2013. // #define SYSTEM_VERSION_EQUAL_TO(v) ([[[UIDevice currentDevice] systemVersion] compare:v options:NSNumericSearch] == NSOrderedSame) #define SYSTEM_VERSION_GREATER_THAN(v) ([[[UIDevice currentDevice] systemVersion] compare:v options:NSNumericSearch] == NSOrderedDescending) #define SYSTEM_VERSION_GREATER_THAN_OR_EQUAL_TO(v) ([[[UIDevice currentDevice] systemVersion] compare:v options:NSNumericSearch] != NSOrderedAscending) #define SYSTEM_VERSION_LESS_THAN(v) ([[[UIDevice currentDevice] systemVersion] compare:v options:NSNumericSearch] == NSOrderedAscending) #define SYSTEM_VERSION_LESS_THAN_OR_EQUAL_TO(v) ([[[UIDevice currentDevice] systemVersion] compare:v options:NSNumericSearch] != NSOrderedDescending)
There’s no doubt that decentralized finance (DeFi) has been central to the Ethereum ecosystem over the past year. But unfortunately, this use for the second-largest blockchain by its underlying crypto’s market capitalization doesn’t come without its own set of flaws. Reports indicate that on April 18th, a leading protocol was just hacked for a large sum of Ether and tokenized Bitcoin. $300,000 in Ethereum & Bitcoin Swiped According to blockchain developer and DeFi specialist Julien Bouteloup, an attacker managed to drain a Uniswap-based pool (a market), and gained more than $300,000 worth of ETH and an Ethereum-based tokenized version of Bitcoin, imBTC, in the process: “imBTC TokenIon pool on Uniswap has been attacked and drained. Simple attack vector on Uniswap [allowed them] to steal more than $300,000 in ETH + BTC,” they wrote. imBTC @tokenlon pool on @Uniswap has been attacked & drained🔥 Simple attack vector on ERC777 (with arbitrary code execution during transfer fct) on Uniswap to steal >$300k (#ETH+#BTC) The vulnerability was described 16mths ago: https://t.co/a3AiJyY969 https://t.co/MKC2jNP1Y4 pic.twitter.com/cXOVu6le3P — Julien Bouteloup (@bneiluj) April 18, 2020 Although a post-mortem of the event has not yet been released, Bouteloup claimed that the exploit that allowed the user to make away with such a large sum of crypto was explained by in an audit of the Ethereum-based Uniswap’s protocol 16 months ago. According to a GitHub post revealing the details of the audit, the exploit involves an attacker creating a “fake exchange (pool)” that resembles the original exchange. From there, the attacker can manipulate Uniswap to make the price of an asset very cheap in the original pool, allowing them to make awake with coins at a price much lower than their actual market value. In this case, the coin stolen was a tokenized Bitcoin, imBTC. Not the First DeFi Hack This is far from the first time a user has turned a large profit by leveraging bugs in Ethereum-based DeFi protocols over the past few months. In February, protocol bZx suffered two attacks just days apart from each other. The two attacks weren’t exactly the same, but the gist of both of them are as follows: A user took out a “flash loan” of a large sum of ETH from bZx. A flash loan is where a user borrows and returns the loaned capital in the same transaction. The ETH was used to purchase another Ethereum-based asset. The user deployed manipulation to change how other protocols see the price of said Ethereum-based asset, allowing for profits to be made due to price oracles registering the false values. The attacks saw bZx users lose $300,000 and around $650,000, for a total of nearly $1 million. Photo by Markus Spiske on Unsplash
1. Field of the Invention The invention relates to a device for cutting and transferring strips (streaks) which functions with a machine for producing a continuous material web, in particular a paper or cardboard web, and further relates to a method for cutting and transferring a threading strip inside a machine for producing a continuous material web, in particular a paper or cardboard web. 2. Description of Background and Relevant Information Devices and methods of the type claimed here are known. They are used to introduce the web into the machine when starting the machine for producing, a continuous material web. Because the material web can be up to 8 to 10 meters wide, it is practically impossible to thread it simultaneously across its entire width. Therefore, a so-called insertion or threading strip, which is also called a belt, is cut from the material web. The threading strip is significantly narrower than the entire material web, for example, it is approximately 30 cm wide. This threading strip is threaded into the machine and, in the end, draws the entire width of the material web along with it. The threading process takes place, for example, when starting the paper machine or after a web tear. At the beginning of a threading process, the threading strip, together with the rest of the material web, runs freely, i.e., it is conveyed away from the first drying cylinder. for example, of a drying section of the machine for producing a material web into the basement of the machine and is supplied to an additional treatment. In order to be able to guide the threading strip through the machine, it must first be severed, i.e., cut. At the beginning of the threading process, since the material web or its threading strip is traveling at the full machine running speed or at least is traveling at a speed that is only reduced by an insignificant amount, a back-up occurs during the cutting process due to which a further transfer of the threading strip is frequently problematic. Therefore, the object of the invention is to produce a device for cutting and transferring strips as well as a method for cutting and transferring a threading strip which do not have this disadvantage and assure an optimal cutting and transfer of the threading strip. This object is attained with the aid of a device for cutting and transferring strips which has the features that will be herein described. The device is distinguished by means of at least one guide roll which is brought into engagement with the free-running threading strip and conveys it to the cutting point. It is therefore possible to prevent a paper backup when cutting the material web and to assure a trouble-free transfer of the threading strip. A preferable exemplary embodiment of the strip cutting and transferring device is distinguished by the fact that the guide roll cooperates with a clamping device which preferably includes at least one clamping roll. This cooperation of the two rolls improves the guidance of the threading strip so that this makes a further contribution to the clean cutting and transfer of the threading strip. Another preferable embodiment of the strip cutting and transferring device is distinguished by the fact that the rotation speed of the guide roll and/or of the clamping roll can be adjusted so that their circumferential speed is at least as high as the traveling speed of the threading strip. Since the two rolls engage each other, they basically rotate at the same speed. It is therefore sufficient to drive one of the two rolls and to choose to have the circumferential speed of one of the two rolls be adjustable. Because of the adjustable rotation speed, the tension of the threading strip can be adjusted to a desired value so that a definite cutting process and a clean transfer of the threading strip are assured. A particularly preferable embodiment of the strip cutting and transferring device is distinguished by the fact that the knife used for the cutting process is moveable. It is therefore possible to select the knife movement so that it travels in the transfer direction of the threading strip. As a result, the flee front end of the threading strip produced by the cutting process is deflected into the direction in which the threading strip is to be transferred. In order to attain the object, a method for cutting and transferring a threading strip inside a machine for producing a continuous material web is proposed, which has the features mentioned herein. It is distinguished by the fact that the threading strip is supplied to the cutting point before the cutting. As a result of the defined position of the threading strip during the cutting, a paper back-up as well as transfer problems can be prevented. A preferable embodiment of the method is distinguished by the fact that the threading strip is subjected to a definite initial tension before the cutting. This leads to a further improvement of the behavior of the threading strip when cutting. A back-up can be reliably prevented so that problems in the transfer of the cut strip end are practically eliminated. Finally, another preferable embodiment of the method is distinguished in that the threading strip is cut by a knife which, for the cutting, is moved in the same direction as the free end of the strip end being cut. The free end of the threading strip produced in the cutting process thus receives an impetus in the direction of the subsequent travel of the threading strip. The method is therefore distinguished by a very high degree of operational safety.
Built in 1999, by Thoma-Sea Boatbuilders of Houma, Louisiana (hull #116) as the Nutmeg State. The hull was later renamed as the C. Angelo . The unfinished hull was acquired by Gateway Towing of New Haven, Connecticut. (Whether Nutmeg State was the original name for the tug under Gateway's order or not is unclear). She is a model bow, twin screw (with kort nozzles) ABS loadline certified tug, she is rated at 4,000 horsepower.
Traumatic herniation of the buccal fat pad: report of case. Traumatic herniation of buccal fat pad in a case of twenty-month-old girl is presented. The lesion has been caused by the fall on the tooth brush in the mouth, and treated with excision and wound sutures.
Q: Customize Default WiX Bootstrap GUI I want to create an additional button in default GUI of Bootstrapper set-up project. This button should be added when the set-up complete GUI is presented. I want to start an application when this button is clicked. Please see the attached screenshot as the current implementation, I want to modify it like, Lauch My app button should shown in testbootstrap completed UI, Is it possible?, if possible, please guide me for solving this soultion. , Please help. A: Added the following item in bundle.wxs <Variable Name="LaunchTarget" Value="[ProgramFilesFolder]\test.exe "/> Then changed the string SuccessLaunchButton in .wxl file to the Launch my App. Thank you, George
Will A Belgian Gunpowder Plant Explosion Affect The U.S. Ammo Market? PB Clermont, the Belgian subsidiary of EURENCO which claims to have “one of the largest spherical powder production capacities in the world for small and medium calibre ammunition” experienced a significant explosion this past Friday afternoon after most employees had gone home for the day. [English-language news outlets have completely ignored the story, and so Bearing Arms is attempting to report on the story via articles written in French and Dutch and translated via Google Translate, the search giant’s machine translation tool. Please bear with us if the translated text sounds stilted or just plain bizarre.] There was an explosion, about seventeen hours, blowing snow Engis, the company PB Clermont. This firm huttoise the suburb is classified Seveso. The balance sheet, according to preliminary information, is limited to two minor injuries. But as a precaution, the “white plane” communal mobilization phase of the emergency services had been triggered. the plane was lifted in the early evening, around 19:30. The home is now under control. The explosion apparently blew a grinding unit. Early indications for the emergency services, a building was seriously damaged, but only minor injuries to two workers are reported. This is blowing for nearly two centuries. It belongs to the French multinational Giat, the former owner of the FN. It employs a hundred persones. She works gunpowder, ammunition for small and medium size, and loads of explosives for civil use. Translated from Google Gibberish French into English, the article tells us that after most employees left for the day at around 5:00 PM local time, a building used to grind gunpowder components exploded, injuring two employees still on site. As the photo above shows, the building (top left) was destroyed in the blast and fire, with only the frame apparently remaining. On-site company fire crews were able to quickly contain the blast. Local firefighters showed up, stood around, and looked bored. The activity of blowing Engis, PB Clermont Society, is still at a standstill Tuesday. Several days will still certainly necessary external experts sent there since Monday to determine the exact cause of the explosion last Friday destroyed a building on the site, fortunately causing two minor injuries. What is it exactly happened last Friday on the website of PB Clermont?What caused the explosion that destroyed 107 buildings on the site? Investigations are underway since Monday in collaboration with several external experts. Identifying the causes should still take several days. The site classified “Seveso” is, since the accident, fully secure. Translate is obviously having some issues, as there is no way 107 buildings were “destroyed” by a blast and fire that was contained before local firefighters could respond. I think it more likely that 107 buildings were damaged by the blast, which did shatter many windows. It doesn’t sound like that big of a deal on the surface. A company in Europe has an explosion that barely makes the news, even there. But when you start looking at who partners with PB Clermont , and who the company supplies with gunpowder, and things start getting much more interesting. PB Clermont supplies powder under their own name, and also apparently supplies powder for Barnual, Bofors, and Vihtavuori (Bofors and Vihtavuori are both part of EURENCO). How soon the company will be able to replace the lost production capability, and what this may mean to the already stretched-thin U.S. ammo market, is unknown at this time. Bearing Arms attempted to contact ATK Sporting Group (maker of Federal Premium, CCI, Fusion, Speer Ammo, Estate Catridge, and Blazer lines of ammunition, as well as supplier of Alliant Powder) for comment via both telephone and email earlier, and have received no response. 3/12 Update: ATK’s Tim Brandt confirms that ATK does not purchase powder from PB Clermont. Bearing Arms is attempting to contact other manufacturers to discuss who uses PB Clermont propellants. Barnual (marketed in the U.S. under Golden Bear, Silver Bear, and Brown Bear lines) does use PB Clermont powders for two loads, but took shipment of an order shortly before the blast. We’ll report back once we discover which loads this might affect. Bob Owens is the Editor of BearingArms.com. Bob is a graduate of roughly 400 hours of professional firearms training classes, including square range and force-on force work with handguns and carbines. He is a past volunteer instructor with Project Appleseed. He most recently received his Vehicle Close Quarters Combat Instructor certification from Centrifuge Training, and is the author of the short e-book, So You Want to Own a Gun. He can be found on Twitter at bob_owens. https://bearingarms.com/author/bobowens-bearingarms/
Movie Search Rat Race Rat Race is a zany comedy that pits contestants against each other on a quest to find a two million dollar jackpot stashed somewhere in New Mexico. A sleezy casino owner (Cleese) cooks up the scheme so that some of his high rollers can place multiple bets on the contestants and track them while they race against time and each other for the prize. En route each contestant finds creative ways to beat the clock: Owen (Gooding Jr.) commandeers a busload of Lucille Ball impersonators on their way to a Lucy Convention, a mother and daughter duo (Goldberg and Chapman) have a run-in with "Squirrel Lady" (Baker), Enrico (Atkinson) hitches a ride with an organ donor delivery truck, Nick (Meyer) has an airborne cow encounter while dangling from a balloon, the Cody brothers (Vieluf and Green) have their own cow encounter and Randy (Lovitz) steals Adolph Hitler's limo. And the winner is...? Featured Animal Action Animals somehow manage to foil the contestants along the way. The critter cast includes squirrels, cows, horses, a dog and several animals that ended up on the cutting room floor including a rabbit and some snakes. There are also some fake stunt doubles filling in for the live featured creatures. Squirrel Lady: Greedy Vera and her daughter Merrill decide to take a route through the desert but stop along the way for directions. Squirrel Lady's roadside abode is home to crowded cages that contain squirrels she hopes to adopt out to random travelers. She coos at her little wards and obviously feels passionately about them, some of which are dressed in fancy little skirts and collars. Although Squirrel Lady offers a route back to the highway, the anxious contenders refuse to buy one of her furry little darlings. However, they soon find that Hell proves to have no fury as that of a Squirrel Lady scorned. Ten squirrels were used in the scene: Isaac, Peter, Jaime, Samantha, Carrie, KC, Billy, Chatter, Chester and Hazel. All the animals were placed by trainers into the cages just before filming began and removed immediately once the scene was over. The animals had treats in the cages such as peanut butter, jelly and and nuts to keep them busy. The costumes were put on some of the squirrels just before cameras rolled and were very loose fitting and fastened with velcro. A taxidermy squirrel was also used for longer sequences and to wear one of the costumes. Cow Encounter: Nick, having been a reluctant contestant, finally gets into the thrill of things and manages to find an air balloon to transport him. The trouble is he actually doesn't get into the basket but finds himself dangling from it. As the balloon careens over a cow field, Nick is uncontrollably flung against the cows. As if this isn't enough, Nick is pursued by the Cody brothers who also look to cash in themselves. They chase Nick and the balloon in a convertible on the ground and maneuver through the cows until one cow is snagged and lifted into the air. The cow later drops into the convertible and takes the wheel giving new meaning to the term "cattle drive." Although the cows in the field appear to take a hard bump from the flying contestant, they were merely eating and were mildly startled. For the scene, ten cows were staked in the field and supplied with lots of hay and grain with loose cows in the background also enjoying the feed-for-all. When the cow appears to be hit by the actor it was a controlled stunt, from a construction crane. Furniture pads and foam barriers were used between the cow and the actor to buffer the blow. When the convertible makes its way through the herd, a stunt driver was controlling the vehicle at a slow speed and at a safe distance from the animals. Pick up riders were in place to direct any cows away from the path of the car in the event one decided to wander near the moving auto. The bovine lifted into the air and later deposited into the convertible was an animatronic double for the real cow. The flying double was fiber-filled like a stuffed animal so that if it accidentally made contact with a live cow it would not hurt it. The wranglers had several weeks to prep the live cows for the filming of this sequence and the cows were more interested in the feed than the flying prop. For any of the scenes involving the live cows, trainers and wranglers were always present to tend to their needs. A Dog with A Heart: Enrico is a narcoleptic contestant who loses a lot of time dozing off, occasionally in mid-stride. When he awakens he realizes he needs to make up the lost time and manages to hitch a ride in a delivery truck that is carrying a heart for an immediate transplant. Enrico and the driver become curious about the contents of the "cooler" and their curiosity proves to be a fatal error. Through clumsy circumstances the heart is flung from the truck and into the roadside bushes. It is discovered by a wandering canine that dashes off carrying the heart in his mouth only to have a tragic mishap with an electrified fence. The dog was trained to run carrying the prop heart in its mouth. Trainers cued the dog and rewarded him after filming. The dog who encounters the fence was a fake stuffie that was engineered to match the live animal. Arrival in Silver City: As the contest starts careening to a climax, all the contestants converge down the road into Silver City. Owen rides in on a horse that he found along the way after ditching the bus of Lucy's, while the cow drives in steering the convertible. For this scene the traffic was controlled and trainers close at hand. When Owen jumps off the horse to make a final run for the gold, trainers were on hand to immediately take the reins.
//========= Copyright Valve Corporation, All rights reserved. ============// // // Purpose: AI Utility classes for building the initial AI Networks // // $Workfile: $ // $Date: $ // //----------------------------------------------------------------------------- // $Log: $ // // $NoKeywords: $ //=============================================================================// #include "cbase.h" #include "ai_node.h" #include "ai_hull.h" #include "ai_hint.h" #include "ai_initutils.h" #include "ai_networkmanager.h" // to help eliminate node clutter by level designers, this is used to cap how many other nodes // any given node is allowed to 'see' in the first stage of graph creation "LinkVisibleNodes()". #include "ai_network.h" // memdbgon must be the last include file in a .cpp file!!! #include "tier0/memdbgon.h" LINK_ENTITY_TO_CLASS( info_hint, CNodeEnt ); LINK_ENTITY_TO_CLASS( info_node, CNodeEnt ); LINK_ENTITY_TO_CLASS( info_node_hint, CNodeEnt ); LINK_ENTITY_TO_CLASS( info_node_air, CNodeEnt ); LINK_ENTITY_TO_CLASS( info_node_air_hint, CNodeEnt ); LINK_ENTITY_TO_CLASS( info_node_climb, CNodeEnt ); LINK_ENTITY_TO_CLASS( aitesthull, CAI_TestHull ); //----------------------------------------------------------------------------- // Init static variables //----------------------------------------------------------------------------- CAI_TestHull* CAI_TestHull::pTestHull = NULL; #ifdef CSTRIKE_DLL #define PLAYER_MODEL "models/player/ct_urban.mdl" #else #define PLAYER_MODEL "models/player.mdl" #endif //----------------------------------------------------------------------------- // Purpose: Make sure we have a "player.mdl" hull to test with //----------------------------------------------------------------------------- void CAI_TestHull::Precache() { BaseClass::Precache(); PrecacheModel( PLAYER_MODEL ); } //========================================================= // CAI_TestHull::Spawn //========================================================= void CAI_TestHull::Spawn(void) { Precache(); SetModel( PLAYER_MODEL ); // Set an initial hull size (this will change later) SetHullType(HULL_HUMAN); SetHullSizeNormal(); SetSolid( SOLID_BBOX ); AddSolidFlags( FSOLID_NOT_SOLID ); SetMoveType( MOVETYPE_STEP ); m_iHealth = 50; bInUse = false; // Make this invisible AddEffects( EF_NODRAW ); } //----------------------------------------------------------------------------- // Purpose: Get the test hull (create if none) // Input : // Output : //----------------------------------------------------------------------------- CAI_TestHull* CAI_TestHull::GetTestHull(void) { if (!CAI_TestHull::pTestHull) { CAI_TestHull::pTestHull = CREATE_ENTITY( CAI_TestHull, "aitesthull" ); CAI_TestHull::pTestHull->Spawn(); CAI_TestHull::pTestHull->AddFlag( FL_NPC ); } if (CAI_TestHull::pTestHull->bInUse == true) { DevMsg("WARNING: TestHull used and never returned!\n"); Assert( 0 ); } CAI_TestHull::pTestHull->RemoveSolidFlags( FSOLID_NOT_SOLID ); CAI_TestHull::pTestHull->bInUse = true; return CAI_TestHull::pTestHull; } //----------------------------------------------------------------------------- // Purpose: Get the test hull (create if none) // Input : // Output : //----------------------------------------------------------------------------- void CAI_TestHull::ReturnTestHull(void) { CAI_TestHull::pTestHull->bInUse = false; CAI_TestHull::pTestHull->AddSolidFlags( FSOLID_NOT_SOLID ); UTIL_SetSize(CAI_TestHull::pTestHull, vec3_origin, vec3_origin); UTIL_RemoveImmediate( pTestHull ); pTestHull = NULL; } //----------------------------------------------------------------------------- // Purpose: // Input : &startPos - // &endPos - // Output : Returns true on success, false on failure. //----------------------------------------------------------------------------- bool CAI_TestHull::IsJumpLegal(const Vector &startPos, const Vector &apex, const Vector &endPos) const { const float MAX_JUMP_RISE = 1024.0f; const float MAX_JUMP_DISTANCE = 1024.0f; const float MAX_JUMP_DROP = 1024.0f; return BaseClass::IsJumpLegal( startPos, apex, endPos, MAX_JUMP_RISE, MAX_JUMP_DISTANCE, MAX_JUMP_DROP ); } //----------------------------------------------------------------------------- // Purpose: // Input : // Output : //----------------------------------------------------------------------------- CAI_TestHull::~CAI_TestHull(void) { CAI_TestHull::pTestHull = NULL; } //########################################################### // > CNodeEnt // // nodes start out as ents in the world. As they are spawned, // the node info is recorded then the ents are discarded. //########################################################### //---------------------------------------------------- // Static vars //---------------------------------------------------- int CNodeEnt::m_nNodeCount = 0; // ------------- // Data table // ------------- BEGIN_SIMPLE_DATADESC( HintNodeData ) DEFINE_FIELD( strEntityName, FIELD_STRING ), // DEFINE_FIELD( vecPosition, FIELD_VECTOR ), // Don't save DEFINE_KEYFIELD( nHintType, FIELD_SHORT, "hinttype" ), DEFINE_KEYFIELD( strGroup, FIELD_STRING, "Group" ), DEFINE_KEYFIELD( iDisabled, FIELD_INTEGER, "StartHintDisabled" ), DEFINE_FIELD( nNodeID, FIELD_INTEGER ), DEFINE_KEYFIELD( iszActivityName, FIELD_STRING, "hintactivity" ), DEFINE_KEYFIELD( nTargetWCNodeID, FIELD_INTEGER, "TargetNode" ), DEFINE_KEYFIELD( nWCNodeID, FIELD_INTEGER, "nodeid" ), DEFINE_KEYFIELD( fIgnoreFacing, FIELD_INTEGER, "IgnoreFacing" ), DEFINE_KEYFIELD( minState, FIELD_INTEGER, "MinimumState" ), DEFINE_KEYFIELD( maxState, FIELD_INTEGER, "MaximumState" ), END_DATADESC() // ------------- // Data table // ------------- BEGIN_DATADESC( CNodeEnt ) DEFINE_EMBEDDED( m_NodeData ), END_DATADESC() //========================================================= //========================================================= void CNodeEnt::Spawn( void ) { Spawn( NULL ); } //----------------------------------------------------------------------------- // Purpose: // Input : *pMapData - //----------------------------------------------------------------------------- int CNodeEnt::Spawn( const char *pMapData ) { m_NodeData.strEntityName = GetEntityName(); m_NodeData.vecPosition = GetAbsOrigin(); m_NodeData.nNodeID = NO_NODE; if ( m_NodeData.minState == NPC_STATE_NONE ) m_NodeData.minState = NPC_STATE_IDLE; if ( m_NodeData.maxState == NPC_STATE_NONE ) m_NodeData.maxState = NPC_STATE_COMBAT; // --------------------------------------------------------------------------------- // If just a hint node (not used for navigation) just create a hint and bail // --------------------------------------------------------------------------------- if (FClassnameIs( this, "info_hint" )) { if (m_NodeData.nHintType) { CAI_HintManager::CreateHint( &m_NodeData, pMapData ); } else { Warning("info_hint (HammerID: %d, position (%.2f, %.2f, %.2f)) with no hint type.\n", m_NodeData.nWCNodeID, m_NodeData.vecPosition.x, m_NodeData.vecPosition.y, m_NodeData.vecPosition.z ); } UTIL_RemoveImmediate( this ); return -1; } // --------------------------------------------------------------------------------- // First check if this node has a hint. If so create a hint entity // --------------------------------------------------------------------------------- CAI_Hint *pHint = NULL; if ( ClassMatches( "info_node_hint" ) || ClassMatches( "info_node_air_hint" ) ) { if ( m_NodeData.nHintType || m_NodeData.strGroup != NULL_STRING || m_NodeData.strEntityName != NULL_STRING ) { m_NodeData.nNodeID = m_nNodeCount; pHint = CAI_HintManager::CreateHint( &m_NodeData, pMapData ); pHint->AddSpawnFlags( GetSpawnFlags() ); } } // --------------------------------------------------------------------------------- // If we loaded from disk, we can discard all these node ents as soon as they spawn // unless we are in WC edited mode // --------------------------------------------------------------------------------- if ( g_pAINetworkManager->NetworksLoaded() && !engine->IsInEditMode()) { // If hint exists for this node, set it if (pHint) { CAI_Node *pNode = g_pBigAINet->GetNode(m_nNodeCount); if (pNode) pNode->SetHint( pHint ); else { DevMsg("AI node graph corrupt\n"); } } m_nNodeCount++; UTIL_RemoveImmediate( this ); return -1; } else { m_nNodeCount++; } // --------------------------------------------------------------------------------- // Add a new node to the network // --------------------------------------------------------------------------------- // For now just using one big AI network CAI_Node *new_node = g_pBigAINet->AddNode( GetAbsOrigin(), GetAbsAngles().y ); new_node->SetHint( pHint ); // ------------------------------------------------------------------------- // Update table of how each WC id relates to each engine ID // ------------------------------------------------------------------------- if (g_pAINetworkManager->GetEditOps()->m_pNodeIndexTable) { g_pAINetworkManager->GetEditOps()->m_pNodeIndexTable[new_node->GetId()] = m_NodeData.nWCNodeID; } // Keep track of largest index used by WC if (g_pAINetworkManager->GetEditOps()->m_nNextWCIndex <= m_NodeData.nWCNodeID) { g_pAINetworkManager->GetEditOps()->m_nNextWCIndex = m_NodeData.nWCNodeID+1; } // ------------------------------------------------------------------------- // If in WC edit mode: // Remember the original positions of the nodes before // they drop so we can send the undropped positions to wc. // ------------------------------------------------------------------------- if (engine->IsInEditMode()) { if (g_pAINetworkManager->GetEditOps()->m_pWCPosition) { g_pAINetworkManager->GetEditOps()->m_pWCPosition[new_node->GetId()] = new_node->GetOrigin(); } } if (FClassnameIs( this, "info_node_air" ) || FClassnameIs( this, "info_node_air_hint" )) { new_node->SetType( NODE_AIR ); } else if (FClassnameIs( this, "info_node_climb" )) { new_node->SetType( NODE_CLIMB ); } else { new_node->SetType( NODE_GROUND ); } new_node->m_eNodeInfo = ( m_spawnflags << NODE_ENT_FLAGS_SHIFT ); // If changed as part of WC editing process note that network must be rebuilt if (m_debugOverlays & OVERLAY_WC_CHANGE_ENTITY) { g_pAINetworkManager->GetEditOps()->SetRebuildFlags(); new_node->m_eNodeInfo |= bits_NODE_WC_CHANGED; // Initialize the new nodes position. The graph may not be rebuild // right away but the node should at least be positioned correctly g_AINetworkBuilder.InitNodePosition( g_pBigAINet, new_node ); } UTIL_RemoveImmediate( this ); return -1; } //----------------------------------------------------------------------------- // Purpose: // Input : // Output : //----------------------------------------------------------------------------- CNodeEnt::CNodeEnt( void ) { m_debugOverlays = 0; }
Is silence about trauma harmful for children? Transgenerational communication in Palestinian families. Style of family communication is considered important in the transgenerational transmission of trauma. This study had three aims: first, to identify the contents of family communication about past national trauma; second, to examine how parents' current war trauma is associated with transgenerational communication; and third, to analyze the associations between transgenerational communication and children's mental health, measured as posttraumatic stress disorder (PTSD), depression and psychological distress. The study sample consisted of 170 Palestinian families in Gaza Strip, in which both mothers (n = 170) and fathers (n = 170) participated, each with their 11-13-year-old child. Mothers and fathers responded separately to three questions: 1) what did their own parents tell them about the War of 1948, Nakba?; 2) what did they tell their own children about the Nakba?; and 3) What did they tell their own children about the 1967 Arab-Israeli War and military occupation? Current war trauma, as reported separately by mothers, fathers and their children, refers to the Gaza War 2008/09. Children reported their symptoms of PTSD, depression, and psychological distress. Results revealed seven communication content categories and one category indicating maintaining silence about the traumas. Fathers' high exposure to current war trauma was associated with a higher level of communicating facts, reasons, and meanings regarding the1948 and 1967 wars, and mothers' high exposure to current war trauma was associated with a lower level of maintaining silence. Family communication about facts, reasons, and meanings was significantly associated with children not showing PTSD and marginally with not showing psychological distress, while maintaining silence was not associated with children's mental health.
--- a/nl80211.h +++ b/nl80211.h @@ -118,8 +118,9 @@ * to get a list of all present wiphys. * @NL80211_CMD_SET_WIPHY: set wiphy parameters, needs %NL80211_ATTR_WIPHY or * %NL80211_ATTR_IFINDEX; can be used to set %NL80211_ATTR_WIPHY_NAME, - * %NL80211_ATTR_WIPHY_TXQ_PARAMS, %NL80211_ATTR_WIPHY_FREQ, - * %NL80211_ATTR_WIPHY_CHANNEL_TYPE, %NL80211_ATTR_WIPHY_RETRY_SHORT, + * %NL80211_ATTR_WIPHY_TXQ_PARAMS, %NL80211_ATTR_WIPHY_FREQ (and the + * attributes determining the channel width; this is used for setting + * monitor mode channel), %NL80211_ATTR_WIPHY_RETRY_SHORT, * %NL80211_ATTR_WIPHY_RETRY_LONG, %NL80211_ATTR_WIPHY_FRAG_THRESHOLD, * and/or %NL80211_ATTR_WIPHY_RTS_THRESHOLD. * However, for setting the channel, see %NL80211_CMD_SET_CHANNEL @@ -169,9 +170,10 @@ * %NL80211_ATTR_HIDDEN_SSID, %NL80211_ATTR_CIPHERS_PAIRWISE, * %NL80211_ATTR_CIPHER_GROUP, %NL80211_ATTR_WPA_VERSIONS, * %NL80211_ATTR_AKM_SUITES, %NL80211_ATTR_PRIVACY, - * %NL80211_ATTR_AUTH_TYPE and %NL80211_ATTR_INACTIVITY_TIMEOUT. + * %NL80211_ATTR_AUTH_TYPE, %NL80211_ATTR_INACTIVITY_TIMEOUT, + * %NL80211_ATTR_ACL_POLICY and %NL80211_ATTR_MAC_ADDRS. * The channel to use can be set on the interface or be given using the - * %NL80211_ATTR_WIPHY_FREQ and %NL80211_ATTR_WIPHY_CHANNEL_TYPE attrs. + * %NL80211_ATTR_WIPHY_FREQ and the attributes determining channel width. * @NL80211_CMD_NEW_BEACON: old alias for %NL80211_CMD_START_AP * @NL80211_CMD_STOP_AP: Stop AP operation on the given interface * @NL80211_CMD_DEL_BEACON: old alias for %NL80211_CMD_STOP_AP @@ -373,8 +375,8 @@ * requests to connect to a specified network but without separating * auth and assoc steps. For this, you need to specify the SSID in a * %NL80211_ATTR_SSID attribute, and can optionally specify the association - * IEs in %NL80211_ATTR_IE, %NL80211_ATTR_AUTH_TYPE, %NL80211_ATTR_MAC, - * %NL80211_ATTR_WIPHY_FREQ, %NL80211_ATTR_CONTROL_PORT, + * IEs in %NL80211_ATTR_IE, %NL80211_ATTR_AUTH_TYPE, %NL80211_ATTR_USE_MFP, + * %NL80211_ATTR_MAC, %NL80211_ATTR_WIPHY_FREQ, %NL80211_ATTR_CONTROL_PORT, * %NL80211_ATTR_CONTROL_PORT_ETHERTYPE and * %NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT. * Background scan period can optionally be @@ -401,8 +403,7 @@ * a response while being associated to an AP on another channel. * %NL80211_ATTR_IFINDEX is used to specify which interface (and thus * radio) is used. %NL80211_ATTR_WIPHY_FREQ is used to specify the - * frequency for the operation and %NL80211_ATTR_WIPHY_CHANNEL_TYPE may be - * optionally used to specify additional channel parameters. + * frequency for the operation. * %NL80211_ATTR_DURATION is used to specify the duration in milliseconds * to remain on the channel. This command is also used as an event to * notify when the requested duration starts (it may take a while for the @@ -440,12 +441,11 @@ * as an event indicating reception of a frame that was not processed in * kernel code, but is for us (i.e., which may need to be processed in a * user space application). %NL80211_ATTR_FRAME is used to specify the - * frame contents (including header). %NL80211_ATTR_WIPHY_FREQ (and - * optionally %NL80211_ATTR_WIPHY_CHANNEL_TYPE) is used to indicate on - * which channel the frame is to be transmitted or was received. If this - * channel is not the current channel (remain-on-channel or the - * operational channel) the device will switch to the given channel and - * transmit the frame, optionally waiting for a response for the time + * frame contents (including header). %NL80211_ATTR_WIPHY_FREQ is used + * to indicate on which channel the frame is to be transmitted or was + * received. If this channel is not the current channel (remain-on-channel + * or the operational channel) the device will switch to the given channel + * and transmit the frame, optionally waiting for a response for the time * specified using %NL80211_ATTR_DURATION. When called, this operation * returns a cookie (%NL80211_ATTR_COOKIE) that will be included with the * TX status event pertaining to the TX request. @@ -473,8 +473,8 @@ * command is used as an event to indicate the that a trigger level was * reached. * @NL80211_CMD_SET_CHANNEL: Set the channel (using %NL80211_ATTR_WIPHY_FREQ - * and %NL80211_ATTR_WIPHY_CHANNEL_TYPE) the given interface (identifed - * by %NL80211_ATTR_IFINDEX) shall operate on. + * and the attributes determining channel width) the given interface + * (identifed by %NL80211_ATTR_IFINDEX) shall operate on. * In case multiple channels are supported by the device, the mechanism * with which it switches channels is implementation-defined. * When a monitor interface is given, it can only switch channel while @@ -513,6 +513,12 @@ * command with the %NL80211_ATTR_WOWLAN_TRIGGERS attribute. For * more background information, see * http://wireless.kernel.org/en/users/Documentation/WoWLAN. + * The @NL80211_CMD_SET_WOWLAN command can also be used as a notification + * from the driver reporting the wakeup reason. In this case, the + * @NL80211_ATTR_WOWLAN_TRIGGERS attribute will contain the reason + * for the wakeup, if it was caused by wireless. If it is not present + * in the wakeup notification, the wireless device didn't cause the + * wakeup but reports that it was woken up. * * @NL80211_CMD_SET_REKEY_OFFLOAD: This command is used give the driver * the necessary information for supporting GTK rekey offload. This @@ -526,6 +532,12 @@ * of PMKSA caching dandidates. * * @NL80211_CMD_TDLS_OPER: Perform a high-level TDLS command (e.g. link setup). + * In addition, this can be used as an event to request userspace to take + * actions on TDLS links (set up a new link or tear down an existing one). + * In such events, %NL80211_ATTR_TDLS_OPERATION indicates the requested + * operation, %NL80211_ATTR_MAC contains the peer MAC address, and + * %NL80211_ATTR_REASON_CODE the reason code to be used (only with + * %NL80211_TDLS_TEARDOWN). * @NL80211_CMD_TDLS_MGMT: Send a TDLS management frame. * * @NL80211_CMD_UNEXPECTED_FRAME: Used by an application controlling an AP @@ -562,8 +574,42 @@ * * @NL80211_CMD_CH_SWITCH_NOTIFY: An AP or GO may decide to switch channels * independently of the userspace SME, send this event indicating - * %NL80211_ATTR_IFINDEX is now on %NL80211_ATTR_WIPHY_FREQ with - * %NL80211_ATTR_WIPHY_CHANNEL_TYPE. + * %NL80211_ATTR_IFINDEX is now on %NL80211_ATTR_WIPHY_FREQ and the + * attributes determining channel width. + * + * @NL80211_CMD_START_P2P_DEVICE: Start the given P2P Device, identified by + * its %NL80211_ATTR_WDEV identifier. It must have been created with + * %NL80211_CMD_NEW_INTERFACE previously. After it has been started, the + * P2P Device can be used for P2P operations, e.g. remain-on-channel and + * public action frame TX. + * @NL80211_CMD_STOP_P2P_DEVICE: Stop the given P2P Device, identified by + * its %NL80211_ATTR_WDEV identifier. + * + * @NL80211_CMD_CONN_FAILED: connection request to an AP failed; used to + * notify userspace that AP has rejected the connection request from a + * station, due to particular reason. %NL80211_ATTR_CONN_FAILED_REASON + * is used for this. + * + * @NL80211_CMD_SET_MCAST_RATE: Change the rate used to send multicast frames + * for IBSS or MESH vif. + * + * @NL80211_CMD_SET_MAC_ACL: sets ACL for MAC address based access control. + * This is to be used with the drivers advertising the support of MAC + * address based access control. List of MAC addresses is passed in + * %NL80211_ATTR_MAC_ADDRS and ACL policy is passed in + * %NL80211_ATTR_ACL_POLICY. Driver will enable ACL with this list, if it + * is not already done. The new list will replace any existing list. Driver + * will clear its ACL when the list of MAC addresses passed is empty. This + * command is used in AP/P2P GO mode. Driver has to make sure to clear its + * ACL list during %NL80211_CMD_STOP_AP. + * + * @NL80211_CMD_RADAR_DETECT: Start a Channel availability check (CAC). Once + * a radar is detected or the channel availability scan (CAC) has finished + * or was aborted, or a radar was detected, usermode will be notified with + * this event. This command is also used to notify userspace about radars + * while operating on this channel. + * %NL80211_ATTR_RADAR_EVENT is used to inform about the type of the + * event. * * @NL80211_CMD_MAX: highest used command number * @__NL80211_CMD_AFTER_LAST: internal use @@ -708,6 +754,17 @@ enum nl80211_commands { NL80211_CMD_CH_SWITCH_NOTIFY, + NL80211_CMD_START_P2P_DEVICE, + NL80211_CMD_STOP_P2P_DEVICE, + + NL80211_CMD_CONN_FAILED, + + NL80211_CMD_SET_MCAST_RATE, + + NL80211_CMD_SET_MAC_ACL, + + NL80211_CMD_RADAR_DETECT, + /* add new commands above here */ /* used to define NL80211_CMD_MAX below */ @@ -744,14 +801,26 @@ enum nl80211_commands { * /sys/class/ieee80211/<phyname>/index * @NL80211_ATTR_WIPHY_NAME: wiphy name (used for renaming) * @NL80211_ATTR_WIPHY_TXQ_PARAMS: a nested array of TX queue parameters - * @NL80211_ATTR_WIPHY_FREQ: frequency of the selected channel in MHz + * @NL80211_ATTR_WIPHY_FREQ: frequency of the selected channel in MHz, + * defines the channel together with the (deprecated) + * %NL80211_ATTR_WIPHY_CHANNEL_TYPE attribute or the attributes + * %NL80211_ATTR_CHANNEL_WIDTH and if needed %NL80211_ATTR_CENTER_FREQ1 + * and %NL80211_ATTR_CENTER_FREQ2 + * @NL80211_ATTR_CHANNEL_WIDTH: u32 attribute containing one of the values + * of &enum nl80211_chan_width, describing the channel width. See the + * documentation of the enum for more information. + * @NL80211_ATTR_CENTER_FREQ1: Center frequency of the first part of the + * channel, used for anything but 20 MHz bandwidth + * @NL80211_ATTR_CENTER_FREQ2: Center frequency of the second part of the + * channel, used only for 80+80 MHz bandwidth * @NL80211_ATTR_WIPHY_CHANNEL_TYPE: included with NL80211_ATTR_WIPHY_FREQ - * if HT20 or HT40 are allowed (i.e., 802.11n disabled if not included): + * if HT20 or HT40 are to be used (i.e., HT disabled if not included): * NL80211_CHAN_NO_HT = HT not allowed (i.e., same as not including * this attribute) * NL80211_CHAN_HT20 = HT20 only * NL80211_CHAN_HT40MINUS = secondary channel is below the primary channel * NL80211_CHAN_HT40PLUS = secondary channel is above the primary channel + * This attribute is now deprecated. * @NL80211_ATTR_WIPHY_RETRY_SHORT: TX retry limit for frames whose length is * less than or equal to the RTS threshold; allowed range: 1..255; * dot11ShortRetryLimit; u8 @@ -918,7 +987,7 @@ enum nl80211_commands { * @NL80211_ATTR_USE_MFP: Whether management frame protection (IEEE 802.11w) is * used for the association (&enum nl80211_mfp, represented as a u32); * this attribute can be used - * with %NL80211_CMD_ASSOCIATE request + * with %NL80211_CMD_ASSOCIATE and %NL80211_CMD_CONNECT requests * * @NL80211_ATTR_STA_FLAGS2: Attribute containing a * &struct nl80211_sta_flag_update. @@ -1251,6 +1320,54 @@ enum nl80211_commands { * was used to provide the hint. For the different types of * allowed user regulatory hints see nl80211_user_reg_hint_type. * + * @NL80211_ATTR_CONN_FAILED_REASON: The reason for which AP has rejected + * the connection request from a station. nl80211_connect_failed_reason + * enum has different reasons of connection failure. + * + * @NL80211_ATTR_SAE_DATA: SAE elements in Authentication frames. This starts + * with the Authentication transaction sequence number field. + * + * @NL80211_ATTR_VHT_CAPABILITY: VHT Capability information element (from + * association request when used with NL80211_CMD_NEW_STATION) + * + * @NL80211_ATTR_SCAN_FLAGS: scan request control flags (u32) + * + * @NL80211_ATTR_P2P_CTWINDOW: P2P GO Client Traffic Window (u8), used with + * the START_AP and SET_BSS commands + * @NL80211_ATTR_P2P_OPPPS: P2P GO opportunistic PS (u8), used with the + * START_AP and SET_BSS commands. This can have the values 0 or 1; + * if not given in START_AP 0 is assumed, if not given in SET_BSS + * no change is made. + * + * @NL80211_ATTR_LOCAL_MESH_POWER_MODE: local mesh STA link-specific power mode + * defined in &enum nl80211_mesh_power_mode. + * + * @NL80211_ATTR_ACL_POLICY: ACL policy, see &enum nl80211_acl_policy, + * carried in a u32 attribute + * + * @NL80211_ATTR_MAC_ADDRS: Array of nested MAC addresses, used for + * MAC ACL. + * + * @NL80211_ATTR_MAC_ACL_MAX: u32 attribute to advertise the maximum + * number of MAC addresses that a device can support for MAC + * ACL. + * + * @NL80211_ATTR_RADAR_EVENT: Type of radar event for notification to userspace, + * contains a value of enum nl80211_radar_event (u32). + * + * @NL80211_ATTR_EXT_CAPA: 802.11 extended capabilities that the kernel driver + * has and handles. The format is the same as the IE contents. See + * 802.11-2012 8.4.2.29 for more information. + * @NL80211_ATTR_EXT_CAPA_MASK: Extended capabilities that the kernel driver + * has set in the %NL80211_ATTR_EXT_CAPA value, for multibit fields. + * + * @NL80211_ATTR_STA_CAPABILITY: Station capabilities (u16) are advertised to + * the driver, e.g., to enable TDLS power save (PU-APSD). + * + * @NL80211_ATTR_STA_EXT_CAPABILITY: Station extended capabilities are + * advertised to the driver, e.g., to enable TDLS off channel operations + * and PU-APSD. + * * @NL80211_ATTR_MAX: highest attribute number currently defined * @__NL80211_ATTR_AFTER_LAST: internal use */ @@ -1506,6 +1623,39 @@ enum nl80211_attrs { NL80211_ATTR_USER_REG_HINT_TYPE, + NL80211_ATTR_CONN_FAILED_REASON, + + NL80211_ATTR_SAE_DATA, + + NL80211_ATTR_VHT_CAPABILITY, + + NL80211_ATTR_SCAN_FLAGS, + + NL80211_ATTR_CHANNEL_WIDTH, + NL80211_ATTR_CENTER_FREQ1, + NL80211_ATTR_CENTER_FREQ2, + + NL80211_ATTR_P2P_CTWINDOW, + NL80211_ATTR_P2P_OPPPS, + + NL80211_ATTR_LOCAL_MESH_POWER_MODE, + + NL80211_ATTR_ACL_POLICY, + + NL80211_ATTR_MAC_ADDRS, + + NL80211_ATTR_MAC_ACL_MAX, + + NL80211_ATTR_RADAR_EVENT, + + NL80211_ATTR_EXT_CAPA, + NL80211_ATTR_EXT_CAPA_MASK, + + NL80211_ATTR_STA_CAPABILITY, + NL80211_ATTR_STA_EXT_CAPABILITY, + + NL80211_ATTR_WIPHY_ANTENNA_GAIN, + /* add attributes here, update the policy in nl80211.c */ __NL80211_ATTR_AFTER_LAST, @@ -1549,6 +1699,7 @@ enum nl80211_attrs { #define NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY 16 #define NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY 24 #define NL80211_HT_CAPABILITY_LEN 26 +#define NL80211_VHT_CAPABILITY_LEN 12 #define NL80211_MAX_NR_CIPHER_SUITES 5 #define NL80211_MAX_NR_AKM_SUITES 2 @@ -1575,6 +1726,10 @@ enum nl80211_attrs { * @NL80211_IFTYPE_MESH_POINT: mesh point * @NL80211_IFTYPE_P2P_CLIENT: P2P client * @NL80211_IFTYPE_P2P_GO: P2P group owner + * @NL80211_IFTYPE_P2P_DEVICE: P2P device interface type, this is not a netdev + * and therefore can't be created in the normal ways, use the + * %NL80211_CMD_START_P2P_DEVICE and %NL80211_CMD_STOP_P2P_DEVICE + * commands to create and destroy one * @NL80211_IFTYPE_MAX: highest interface type number currently defined * @NUM_NL80211_IFTYPES: number of defined interface types * @@ -1593,6 +1748,7 @@ enum nl80211_iftype { NL80211_IFTYPE_MESH_POINT, NL80211_IFTYPE_P2P_CLIENT, NL80211_IFTYPE_P2P_GO, + NL80211_IFTYPE_P2P_DEVICE, /* keep last */ NUM_NL80211_IFTYPES, @@ -1617,6 +1773,9 @@ enum nl80211_iftype { * flag can't be changed, it is only valid while adding a station, and * attempts to change it will silently be ignored (rather than rejected * as errors.) + * @NL80211_STA_FLAG_ASSOCIATED: station is associated; used with drivers + * that support %NL80211_FEATURE_FULL_AP_CLIENT_STATE to transition a + * previously added station into associated state * @NL80211_STA_FLAG_MAX: highest station flag number currently defined * @__NL80211_STA_FLAG_AFTER_LAST: internal use */ @@ -1628,6 +1787,7 @@ enum nl80211_sta_flags { NL80211_STA_FLAG_MFP, NL80211_STA_FLAG_AUTHENTICATED, NL80211_STA_FLAG_TDLS_PEER, + NL80211_STA_FLAG_ASSOCIATED, /* keep last */ __NL80211_STA_FLAG_AFTER_LAST, @@ -1664,10 +1824,15 @@ struct nl80211_sta_flag_update { * @__NL80211_RATE_INFO_INVALID: attribute number 0 is reserved * @NL80211_RATE_INFO_BITRATE: total bitrate (u16, 100kbit/s) * @NL80211_RATE_INFO_MCS: mcs index for 802.11n (u8) - * @NL80211_RATE_INFO_40_MHZ_WIDTH: 40 Mhz dualchannel bitrate + * @NL80211_RATE_INFO_40_MHZ_WIDTH: 40 MHz dualchannel bitrate * @NL80211_RATE_INFO_SHORT_GI: 400ns guard interval * @NL80211_RATE_INFO_BITRATE32: total bitrate (u32, 100kbit/s) * @NL80211_RATE_INFO_MAX: highest rate_info number currently defined + * @NL80211_RATE_INFO_VHT_MCS: MCS index for VHT (u8) + * @NL80211_RATE_INFO_VHT_NSS: number of streams in VHT (u8) + * @NL80211_RATE_INFO_80_MHZ_WIDTH: 80 MHz VHT rate + * @NL80211_RATE_INFO_80P80_MHZ_WIDTH: 80+80 MHz VHT rate + * @NL80211_RATE_INFO_160_MHZ_WIDTH: 160 MHz VHT rate * @__NL80211_RATE_INFO_AFTER_LAST: internal use */ enum nl80211_rate_info { @@ -1677,6 +1842,11 @@ enum nl80211_rate_info { NL80211_RATE_INFO_40_MHZ_WIDTH, NL80211_RATE_INFO_SHORT_GI, NL80211_RATE_INFO_BITRATE32, + NL80211_RATE_INFO_VHT_MCS, + NL80211_RATE_INFO_VHT_NSS, + NL80211_RATE_INFO_80_MHZ_WIDTH, + NL80211_RATE_INFO_80P80_MHZ_WIDTH, + NL80211_RATE_INFO_160_MHZ_WIDTH, /* keep last */ __NL80211_RATE_INFO_AFTER_LAST, @@ -1723,6 +1893,8 @@ enum nl80211_sta_bss_param { * @NL80211_STA_INFO_INACTIVE_TIME: time since last activity (u32, msecs) * @NL80211_STA_INFO_RX_BYTES: total received bytes (u32, from this station) * @NL80211_STA_INFO_TX_BYTES: total transmitted bytes (u32, to this station) + * @NL80211_STA_INFO_RX_BYTES64: total received bytes (u64, from this station) + * @NL80211_STA_INFO_TX_BYTES64: total transmitted bytes (u64, to this station) * @NL80211_STA_INFO_SIGNAL: signal strength of last received PPDU (u8, dBm) * @NL80211_STA_INFO_TX_BITRATE: current unicast tx rate, nested attribute * containing info as possible, see &enum nl80211_rate_info @@ -1744,6 +1916,12 @@ enum nl80211_sta_bss_param { * @NL80211_STA_INFO_STA_FLAGS: Contains a struct nl80211_sta_flag_update. * @NL80211_STA_INFO_BEACON_LOSS: count of times beacon loss was detected (u32) * @NL80211_STA_INFO_T_OFFSET: timing offset with respect to this STA (s64) + * @NL80211_STA_INFO_LOCAL_PM: local mesh STA link-specific power mode + * @NL80211_STA_INFO_PEER_PM: peer mesh STA link-specific power mode + * @NL80211_STA_INFO_NONPEER_PM: neighbor mesh STA power save mode towards + * non-peer STA + * @NL80211_STA_INFO_CHAIN_SIGNAL: per-chain signal strength of last PPDU + * @NL80211_STA_INFO_CHAIN_SIGNAL_AVG: per-chain signal strength average * @__NL80211_STA_INFO_AFTER_LAST: internal * @NL80211_STA_INFO_MAX: highest possible station info attribute */ @@ -1768,6 +1946,13 @@ enum nl80211_sta_info { NL80211_STA_INFO_STA_FLAGS, NL80211_STA_INFO_BEACON_LOSS, NL80211_STA_INFO_T_OFFSET, + NL80211_STA_INFO_LOCAL_PM, + NL80211_STA_INFO_PEER_PM, + NL80211_STA_INFO_NONPEER_PM, + NL80211_STA_INFO_RX_BYTES64, + NL80211_STA_INFO_TX_BYTES64, + NL80211_STA_INFO_CHAIN_SIGNAL, + NL80211_STA_INFO_CHAIN_SIGNAL_AVG, /* keep last */ __NL80211_STA_INFO_AFTER_LAST, @@ -1877,6 +2062,20 @@ enum nl80211_band_attr { * on this channel in current regulatory domain. * @NL80211_FREQUENCY_ATTR_MAX_TX_POWER: Maximum transmission power in mBm * (100 * dBm). + * @NL80211_FREQUENCY_ATTR_DFS_STATE: current state for DFS + * (enum nl80211_dfs_state) + * @NL80211_FREQUENCY_ATTR_DFS_TIME: time in miliseconds for how long + * this channel is in this DFS state. + * @NL80211_FREQUENCY_ATTR_NO_HT40_MINUS: HT40- isn't possible with this + * channel as the control channel + * @NL80211_FREQUENCY_ATTR_NO_HT40_PLUS: HT40+ isn't possible with this + * channel as the control channel + * @NL80211_FREQUENCY_ATTR_NO_80MHZ: any 80 MHz channel using this channel + * as the primary or any of the secondary channels isn't possible, + * this includes 80+80 channels + * @NL80211_FREQUENCY_ATTR_NO_160MHZ: any 160 MHz (but not 80+80) channel + * using this channel as the primary or any of the secondary channels + * isn't possible * @NL80211_FREQUENCY_ATTR_MAX: highest frequency attribute number * currently defined * @__NL80211_FREQUENCY_ATTR_AFTER_LAST: internal use @@ -1889,6 +2088,12 @@ enum nl80211_frequency_attr { NL80211_FREQUENCY_ATTR_NO_IBSS, NL80211_FREQUENCY_ATTR_RADAR, NL80211_FREQUENCY_ATTR_MAX_TX_POWER, + NL80211_FREQUENCY_ATTR_DFS_STATE, + NL80211_FREQUENCY_ATTR_DFS_TIME, + NL80211_FREQUENCY_ATTR_NO_HT40_MINUS, + NL80211_FREQUENCY_ATTR_NO_HT40_PLUS, + NL80211_FREQUENCY_ATTR_NO_80MHZ, + NL80211_FREQUENCY_ATTR_NO_160MHZ, /* keep last */ __NL80211_FREQUENCY_ATTR_AFTER_LAST, @@ -2159,6 +2364,34 @@ enum nl80211_mntr_flags { }; /** + * enum nl80211_mesh_power_mode - mesh power save modes + * + * @NL80211_MESH_POWER_UNKNOWN: The mesh power mode of the mesh STA is + * not known or has not been set yet. + * @NL80211_MESH_POWER_ACTIVE: Active mesh power mode. The mesh STA is + * in Awake state all the time. + * @NL80211_MESH_POWER_LIGHT_SLEEP: Light sleep mode. The mesh STA will + * alternate between Active and Doze states, but will wake up for + * neighbor's beacons. + * @NL80211_MESH_POWER_DEEP_SLEEP: Deep sleep mode. The mesh STA will + * alternate between Active and Doze states, but may not wake up + * for neighbor's beacons. + * + * @__NL80211_MESH_POWER_AFTER_LAST - internal use + * @NL80211_MESH_POWER_MAX - highest possible power save level + */ + +enum nl80211_mesh_power_mode { + NL80211_MESH_POWER_UNKNOWN, + NL80211_MESH_POWER_ACTIVE, + NL80211_MESH_POWER_LIGHT_SLEEP, + NL80211_MESH_POWER_DEEP_SLEEP, + + __NL80211_MESH_POWER_AFTER_LAST, + NL80211_MESH_POWER_MAX = __NL80211_MESH_POWER_AFTER_LAST - 1 +}; + +/** * enum nl80211_meshconf_params - mesh configuration parameters * * Mesh configuration parameters. These can be changed while the mesh is @@ -2252,6 +2485,11 @@ enum nl80211_mntr_flags { * (in TUs) during which a mesh STA can send only one Action frame * containing a PREQ element for root path confirmation. * + * @NL80211_MESHCONF_POWER_MODE: Default mesh power mode for new peer links. + * type &enum nl80211_mesh_power_mode (u32) + * + * @NL80211_MESHCONF_AWAKE_WINDOW: awake window duration (in TUs) + * * @__NL80211_MESHCONF_ATTR_AFTER_LAST: internal use */ enum nl80211_meshconf_params { @@ -2281,6 +2519,8 @@ enum nl80211_meshconf_params { NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT, NL80211_MESHCONF_HWMP_ROOT_INTERVAL, NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL, + NL80211_MESHCONF_POWER_MODE, + NL80211_MESHCONF_AWAKE_WINDOW, /* keep last */ __NL80211_MESHCONF_ATTR_AFTER_LAST, @@ -2385,6 +2625,15 @@ enum nl80211_ac { #define NL80211_TXQ_Q_BE NL80211_AC_BE #define NL80211_TXQ_Q_BK NL80211_AC_BK +/** + * enum nl80211_channel_type - channel type + * @NL80211_CHAN_NO_HT: 20 MHz, non-HT channel + * @NL80211_CHAN_HT20: 20 MHz HT channel + * @NL80211_CHAN_HT40MINUS: HT40 channel, secondary channel + * below the control channel + * @NL80211_CHAN_HT40PLUS: HT40 channel, secondary channel + * above the control channel + */ enum nl80211_channel_type { NL80211_CHAN_NO_HT, NL80211_CHAN_HT20, @@ -2393,6 +2642,32 @@ enum nl80211_channel_type { }; /** + * enum nl80211_chan_width - channel width definitions + * + * These values are used with the %NL80211_ATTR_CHANNEL_WIDTH + * attribute. + * + * @NL80211_CHAN_WIDTH_20_NOHT: 20 MHz, non-HT channel + * @NL80211_CHAN_WIDTH_20: 20 MHz HT channel + * @NL80211_CHAN_WIDTH_40: 40 MHz channel, the %NL80211_ATTR_CENTER_FREQ1 + * attribute must be provided as well + * @NL80211_CHAN_WIDTH_80: 80 MHz channel, the %NL80211_ATTR_CENTER_FREQ1 + * attribute must be provided as well + * @NL80211_CHAN_WIDTH_80P80: 80+80 MHz channel, the %NL80211_ATTR_CENTER_FREQ1 + * and %NL80211_ATTR_CENTER_FREQ2 attributes must be provided as well + * @NL80211_CHAN_WIDTH_160: 160 MHz channel, the %NL80211_ATTR_CENTER_FREQ1 + * attribute must be provided as well + */ +enum nl80211_chan_width { + NL80211_CHAN_WIDTH_20_NOHT, + NL80211_CHAN_WIDTH_20, + NL80211_CHAN_WIDTH_40, + NL80211_CHAN_WIDTH_80, + NL80211_CHAN_WIDTH_80P80, + NL80211_CHAN_WIDTH_160, +}; + +/** * enum nl80211_bss - netlink attributes for a BSS * * @__NL80211_BSS_INVALID: invalid @@ -2460,6 +2735,7 @@ enum nl80211_bss_status { * @NL80211_AUTHTYPE_SHARED_KEY: Shared Key authentication (WEP only) * @NL80211_AUTHTYPE_FT: Fast BSS Transition (IEEE 802.11r) * @NL80211_AUTHTYPE_NETWORK_EAP: Network EAP (some Cisco APs and mainly LEAP) + * @NL80211_AUTHTYPE_SAE: Simultaneous authentication of equals * @__NL80211_AUTHTYPE_NUM: internal * @NL80211_AUTHTYPE_MAX: maximum valid auth algorithm * @NL80211_AUTHTYPE_AUTOMATIC: determine automatically (if necessary by @@ -2471,6 +2747,7 @@ enum nl80211_auth_type { NL80211_AUTHTYPE_SHARED_KEY, NL80211_AUTHTYPE_FT, NL80211_AUTHTYPE_NETWORK_EAP, + NL80211_AUTHTYPE_SAE, /* keep last */ __NL80211_AUTHTYPE_NUM, @@ -2689,10 +2966,12 @@ enum nl80211_tx_power_setting { * corresponds to the lowest-order bit in the second byte of the mask. * For example: The match 00:xx:00:00:xx:00:00:00:00:xx:xx:xx (where * xx indicates "don't care") would be represented by a pattern of - * twelve zero bytes, and a mask of "0xed,0x07". + * twelve zero bytes, and a mask of "0xed,0x01". * Note that the pattern matching is done as though frames were not * 802.11 frames but 802.3 frames, i.e. the frame is fully unpacked * first (including SNAP header unpacking) and then matched. + * @NL80211_WOWLAN_PKTPAT_OFFSET: packet offset, pattern is matched after + * these fixed number of bytes of received packet * @NUM_NL80211_WOWLAN_PKTPAT: number of attributes * @MAX_NL80211_WOWLAN_PKTPAT: max attribute number */ @@ -2700,6 +2979,7 @@ enum nl80211_wowlan_packet_pattern_attr __NL80211_WOWLAN_PKTPAT_INVALID, NL80211_WOWLAN_PKTPAT_MASK, NL80211_WOWLAN_PKTPAT_PATTERN, + NL80211_WOWLAN_PKTPAT_OFFSET, NUM_NL80211_WOWLAN_PKTPAT, MAX_NL80211_WOWLAN_PKTPAT = NUM_NL80211_WOWLAN_PKTPAT - 1, @@ -2710,6 +2990,7 @@ enum nl80211_wowlan_packet_pattern_attr * @max_patterns: maximum number of patterns supported * @min_pattern_len: minimum length of each pattern * @max_pattern_len: maximum length of each pattern + * @max_pkt_offset: maximum Rx packet offset * * This struct is carried in %NL80211_WOWLAN_TRIG_PKT_PATTERN when * that is part of %NL80211_ATTR_WOWLAN_TRIGGERS_SUPPORTED in the @@ -2719,6 +3000,7 @@ struct nl80211_wowlan_pattern_support { __u32 max_patterns; __u32 min_pattern_len; __u32 max_pattern_len; + __u32 max_pkt_offset; } __attribute__((packed)); /** @@ -2734,12 +3016,17 @@ struct nl80211_wowlan_pattern_support { * @NL80211_WOWLAN_TRIG_PKT_PATTERN: wake up on the specified packet patterns * which are passed in an array of nested attributes, each nested attribute * defining a with attributes from &struct nl80211_wowlan_trig_pkt_pattern. - * Each pattern defines a wakeup packet. The matching is done on the MSDU, - * i.e. as though the packet was an 802.3 packet, so the pattern matching - * is done after the packet is converted to the MSDU. + * Each pattern defines a wakeup packet. Packet offset is associated with + * each pattern which is used while matching the pattern. The matching is + * done on the MSDU, i.e. as though the packet was an 802.3 packet, so the + * pattern matching is done after the packet is converted to the MSDU. * * In %NL80211_ATTR_WOWLAN_TRIGGERS_SUPPORTED, it is a binary attribute * carrying a &struct nl80211_wowlan_pattern_support. + * + * When reporting wakeup. it is a u32 attribute containing the 0-based + * index of the pattern that caused the wakeup, in the patterns passed + * to the kernel when configuring. * @NL80211_WOWLAN_TRIG_GTK_REKEY_SUPPORTED: Not a real trigger, and cannot be * used when setting, used only to indicate that GTK rekeying is supported * by the device (flag) @@ -2750,8 +3037,36 @@ struct nl80211_wowlan_pattern_support { * @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE: wake up on 4-way handshake (flag) * @NL80211_WOWLAN_TRIG_RFKILL_RELEASE: wake up when rfkill is released * (on devices that have rfkill in the device) (flag) + * @NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211: For wakeup reporting only, contains + * the 802.11 packet that caused the wakeup, e.g. a deauth frame. The frame + * may be truncated, the @NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211_LEN + * attribute contains the original length. + * @NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211_LEN: Original length of the 802.11 + * packet, may be bigger than the @NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211 + * attribute if the packet was truncated somewhere. + * @NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023: For wakeup reporting only, contains the + * 802.11 packet that caused the wakeup, e.g. a magic packet. The frame may + * be truncated, the @NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023_LEN attribute + * contains the original length. + * @NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023_LEN: Original length of the 802.3 + * packet, may be bigger than the @NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023 + * attribute if the packet was truncated somewhere. + * @NL80211_WOWLAN_TRIG_TCP_CONNECTION: TCP connection wake, see DOC section + * "TCP connection wakeup" for more details. This is a nested attribute + * containing the exact information for establishing and keeping alive + * the TCP connection. + * @NL80211_WOWLAN_TRIG_TCP_WAKEUP_MATCH: For wakeup reporting only, the + * wakeup packet was received on the TCP connection + * @NL80211_WOWLAN_TRIG_WAKEUP_TCP_CONNLOST: For wakeup reporting only, the + * TCP connection was lost or failed to be established + * @NL80211_WOWLAN_TRIG_WAKEUP_TCP_NOMORETOKENS: For wakeup reporting only, + * the TCP connection ran out of tokens to use for data to send to the + * service * @NUM_NL80211_WOWLAN_TRIG: number of wake on wireless triggers * @MAX_NL80211_WOWLAN_TRIG: highest wowlan trigger attribute number + * + * These nested attributes are used to configure the wakeup triggers and + * to report the wakeup reason(s). */ enum nl80211_wowlan_triggers { __NL80211_WOWLAN_TRIG_INVALID, @@ -2764,6 +3079,14 @@ enum nl80211_wowlan_triggers { NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST, NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE, NL80211_WOWLAN_TRIG_RFKILL_RELEASE, + NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211, + NL80211_WOWLAN_TRIG_WAKEUP_PKT_80211_LEN, + NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023, + NL80211_WOWLAN_TRIG_WAKEUP_PKT_8023_LEN, + NL80211_WOWLAN_TRIG_TCP_CONNECTION, + NL80211_WOWLAN_TRIG_WAKEUP_TCP_MATCH, + NL80211_WOWLAN_TRIG_WAKEUP_TCP_CONNLOST, + NL80211_WOWLAN_TRIG_WAKEUP_TCP_NOMORETOKENS, /* keep last */ NUM_NL80211_WOWLAN_TRIG, @@ -2771,6 +3094,116 @@ enum nl80211_wowlan_triggers { }; /** + * DOC: TCP connection wakeup + * + * Some devices can establish a TCP connection in order to be woken up by a + * packet coming in from outside their network segment, or behind NAT. If + * configured, the device will establish a TCP connection to the given + * service, and periodically send data to that service. The first data + * packet is usually transmitted after SYN/ACK, also ACKing the SYN/ACK. + * The data packets can optionally include a (little endian) sequence + * number (in the TCP payload!) that is generated by the device, and, also + * optionally, a token from a list of tokens. This serves as a keep-alive + * with the service, and for NATed connections, etc. + * + * During this keep-alive period, the server doesn't send any data to the + * client. When receiving data, it is compared against the wakeup pattern + * (and mask) and if it matches, the host is woken up. Similarly, if the + * connection breaks or cannot be established to start with, the host is + * also woken up. + * + * Developer's note: ARP offload is required for this, otherwise TCP + * response packets might not go through correctly. + */ + +/** + * struct nl80211_wowlan_tcp_data_seq - WoWLAN TCP data sequence + * @start: starting value + * @offset: offset of sequence number in packet + * @len: length of the sequence value to write, 1 through 4 + * + * Note: don't confuse with the TCP sequence number(s), this is for the + * keepalive packet payload. The actual value is written into the packet + * in little endian. + */ +struct nl80211_wowlan_tcp_data_seq { + __u32 start, offset, len; +}; + +/** + * struct nl80211_wowlan_tcp_data_token - WoWLAN TCP data token config + * @offset: offset of token in packet + * @len: length of each token + * @token_stream: stream of data to be used for the tokens, the length must + * be a multiple of @len for this to make sense + */ +struct nl80211_wowlan_tcp_data_token { + __u32 offset, len; + __u8 token_stream[]; +}; + +/** + * struct nl80211_wowlan_tcp_data_token_feature - data token features + * @min_len: minimum token length + * @max_len: maximum token length + * @bufsize: total available token buffer size (max size of @token_stream) + */ +struct nl80211_wowlan_tcp_data_token_feature { + __u32 min_len, max_len, bufsize; +}; + +/** + * enum nl80211_wowlan_tcp_attrs - WoWLAN TCP connection parameters + * @__NL80211_WOWLAN_TCP_INVALID: invalid number for nested attributes + * @NL80211_WOWLAN_TCP_SRC_IPV4: source IPv4 address (in network byte order) + * @NL80211_WOWLAN_TCP_DST_IPV4: destination IPv4 address + * (in network byte order) + * @NL80211_WOWLAN_TCP_DST_MAC: destination MAC address, this is given because + * route lookup when configured might be invalid by the time we suspend, + * and doing a route lookup when suspending is no longer possible as it + * might require ARP querying. + * @NL80211_WOWLAN_TCP_SRC_PORT: source port (u16); optional, if not given a + * socket and port will be allocated + * @NL80211_WOWLAN_TCP_DST_PORT: destination port (u16) + * @NL80211_WOWLAN_TCP_DATA_PAYLOAD: data packet payload, at least one byte. + * For feature advertising, a u32 attribute holding the maximum length + * of the data payload. + * @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ: data packet sequence configuration + * (if desired), a &struct nl80211_wowlan_tcp_data_seq. For feature + * advertising it is just a flag + * @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN: data packet token configuration, + * see &struct nl80211_wowlan_tcp_data_token and for advertising see + * &struct nl80211_wowlan_tcp_data_token_feature. + * @NL80211_WOWLAN_TCP_DATA_INTERVAL: data interval in seconds, maximum + * interval in feature advertising (u32) + * @NL80211_WOWLAN_TCP_WAKE_PAYLOAD: wake packet payload, for advertising a + * u32 attribute holding the maximum length + * @NL80211_WOWLAN_TCP_WAKE_MASK: Wake packet payload mask, not used for + * feature advertising. The mask works like @NL80211_WOWLAN_PKTPAT_MASK + * but on the TCP payload only. + * @NUM_NL80211_WOWLAN_TCP: number of TCP attributes + * @MAX_NL80211_WOWLAN_TCP: highest attribute number + */ +enum nl80211_wowlan_tcp_attrs { + __NL80211_WOWLAN_TCP_INVALID, + NL80211_WOWLAN_TCP_SRC_IPV4, + NL80211_WOWLAN_TCP_DST_IPV4, + NL80211_WOWLAN_TCP_DST_MAC, + NL80211_WOWLAN_TCP_SRC_PORT, + NL80211_WOWLAN_TCP_DST_PORT, + NL80211_WOWLAN_TCP_DATA_PAYLOAD, + NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ, + NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN, + NL80211_WOWLAN_TCP_DATA_INTERVAL, + NL80211_WOWLAN_TCP_WAKE_PAYLOAD, + NL80211_WOWLAN_TCP_WAKE_MASK, + + /* keep last */ + NUM_NL80211_WOWLAN_TCP, + MAX_NL80211_WOWLAN_TCP = NUM_NL80211_WOWLAN_TCP - 1 +}; + +/** * enum nl80211_iface_limit_attrs - limit attributes * @NL80211_IFACE_LIMIT_UNSPEC: (reserved) * @NL80211_IFACE_LIMIT_MAX: maximum number of interfaces that @@ -2806,6 +3239,8 @@ enum nl80211_iface_limit_attrs { * the infrastructure network's beacon interval. * @NL80211_IFACE_COMB_NUM_CHANNELS: u32 attribute specifying how many * different channels may be used within this group. + * @NL80211_IFACE_COMB_RADAR_DETECT_WIDTHS: u32 attribute containing the bitmap + * of supported channel widths for radar detection. * @NUM_NL80211_IFACE_COMB: number of attributes * @MAX_NL80211_IFACE_COMB: highest attribute number * @@ -2838,6 +3273,7 @@ enum nl80211_if_combination_attrs { NL80211_IFACE_COMB_MAXNUM, NL80211_IFACE_COMB_STA_AP_BI_MATCH, NL80211_IFACE_COMB_NUM_CHANNELS, + NL80211_IFACE_COMB_RADAR_DETECT_WIDTHS, /* keep last */ NUM_NL80211_IFACE_COMB, @@ -2994,12 +3430,56 @@ enum nl80211_ap_sme_features { * @NL80211_FEATURE_CELL_BASE_REG_HINTS: This driver has been tested * to work properly to suppport receiving regulatory hints from * cellular base stations. + * @NL80211_FEATURE_P2P_DEVICE_NEEDS_CHANNEL: If this is set, an active + * P2P Device (%NL80211_IFTYPE_P2P_DEVICE) requires its own channel + * in the interface combinations, even when it's only used for scan + * and remain-on-channel. This could be due to, for example, the + * remain-on-channel implementation requiring a channel context. + * @NL80211_FEATURE_SAE: This driver supports simultaneous authentication of + * equals (SAE) with user space SME (NL80211_CMD_AUTHENTICATE) in station + * mode + * @NL80211_FEATURE_LOW_PRIORITY_SCAN: This driver supports low priority scan + * @NL80211_FEATURE_SCAN_FLUSH: Scan flush is supported + * @NL80211_FEATURE_AP_SCAN: Support scanning using an AP vif + * @NL80211_FEATURE_VIF_TXPOWER: The driver supports per-vif TX power setting + * @NL80211_FEATURE_NEED_OBSS_SCAN: The driver expects userspace to perform + * OBSS scans and generate 20/40 BSS coex reports. This flag is used only + * for drivers implementing the CONNECT API, for AUTH/ASSOC it is implied. + * @NL80211_FEATURE_P2P_GO_CTWIN: P2P GO implementation supports CT Window + * setting + * @NL80211_FEATURE_P2P_GO_OPPPS: P2P GO implementation supports opportunistic + * powersave + * @NL80211_FEATURE_FULL_AP_CLIENT_STATE: The driver supports full state + * transitions for AP clients. Without this flag (and if the driver + * doesn't have the AP SME in the device) the driver supports adding + * stations only when they're associated and adds them in associated + * state (to later be transitioned into authorized), with this flag + * they should be added before even sending the authentication reply + * and then transitioned into authenticated, associated and authorized + * states using station flags. + * Note that even for drivers that support this, the default is to add + * stations in authenticated/associated state, so to add unauthenticated + * stations the authenticated/associated bits have to be set in the mask. + * @NL80211_FEATURE_ADVERTISE_CHAN_LIMITS: cfg80211 advertises channel limits + * (HT40, VHT 80/160 MHz) if this flag is set */ enum nl80211_feature_flags { - NL80211_FEATURE_SK_TX_STATUS = 1 << 0, - NL80211_FEATURE_HT_IBSS = 1 << 1, - NL80211_FEATURE_INACTIVITY_TIMER = 1 << 2, - NL80211_FEATURE_CELL_BASE_REG_HINTS = 1 << 3, + NL80211_FEATURE_SK_TX_STATUS = 1 << 0, + NL80211_FEATURE_HT_IBSS = 1 << 1, + NL80211_FEATURE_INACTIVITY_TIMER = 1 << 2, + NL80211_FEATURE_CELL_BASE_REG_HINTS = 1 << 3, + NL80211_FEATURE_P2P_DEVICE_NEEDS_CHANNEL = 1 << 4, + NL80211_FEATURE_SAE = 1 << 5, + NL80211_FEATURE_LOW_PRIORITY_SCAN = 1 << 6, + NL80211_FEATURE_SCAN_FLUSH = 1 << 7, + NL80211_FEATURE_AP_SCAN = 1 << 8, + NL80211_FEATURE_VIF_TXPOWER = 1 << 9, + NL80211_FEATURE_NEED_OBSS_SCAN = 1 << 10, + NL80211_FEATURE_P2P_GO_CTWIN = 1 << 11, + NL80211_FEATURE_P2P_GO_OPPPS = 1 << 12, + /* bit 13 is reserved */ + NL80211_FEATURE_ADVERTISE_CHAN_LIMITS = 1 << 14, + NL80211_FEATURE_FULL_AP_CLIENT_STATE = 1 << 15, }; /** @@ -3023,4 +3503,94 @@ enum nl80211_probe_resp_offload_support_ NL80211_PROBE_RESP_OFFLOAD_SUPPORT_80211U = 1<<3, }; +/** + * enum nl80211_connect_failed_reason - connection request failed reasons + * @NL80211_CONN_FAIL_MAX_CLIENTS: Maximum number of clients that can be + * handled by the AP is reached. + * @NL80211_CONN_FAIL_BLOCKED_CLIENT: Connection request is rejected due to ACL. + */ +enum nl80211_connect_failed_reason { + NL80211_CONN_FAIL_MAX_CLIENTS, + NL80211_CONN_FAIL_BLOCKED_CLIENT, +}; + +/** + * enum nl80211_scan_flags - scan request control flags + * + * Scan request control flags are used to control the handling + * of NL80211_CMD_TRIGGER_SCAN and NL80211_CMD_START_SCHED_SCAN + * requests. + * + * @NL80211_SCAN_FLAG_LOW_PRIORITY: scan request has low priority + * @NL80211_SCAN_FLAG_FLUSH: flush cache before scanning + * @NL80211_SCAN_FLAG_AP: force a scan even if the interface is configured + * as AP and the beaconing has already been configured. This attribute is + * dangerous because will destroy stations performance as a lot of frames + * will be lost while scanning off-channel, therefore it must be used only + * when really needed + */ +enum nl80211_scan_flags { + NL80211_SCAN_FLAG_LOW_PRIORITY = 1<<0, + NL80211_SCAN_FLAG_FLUSH = 1<<1, + NL80211_SCAN_FLAG_AP = 1<<2, +}; + +/** + * enum nl80211_acl_policy - access control policy + * + * Access control policy is applied on a MAC list set by + * %NL80211_CMD_START_AP and %NL80211_CMD_SET_MAC_ACL, to + * be used with %NL80211_ATTR_ACL_POLICY. + * + * @NL80211_ACL_POLICY_ACCEPT_UNLESS_LISTED: Deny stations which are + * listed in ACL, i.e. allow all the stations which are not listed + * in ACL to authenticate. + * @NL80211_ACL_POLICY_DENY_UNLESS_LISTED: Allow the stations which are listed + * in ACL, i.e. deny all the stations which are not listed in ACL. + */ +enum nl80211_acl_policy { + NL80211_ACL_POLICY_ACCEPT_UNLESS_LISTED, + NL80211_ACL_POLICY_DENY_UNLESS_LISTED, +}; + +/** + * enum nl80211_radar_event - type of radar event for DFS operation + * + * Type of event to be used with NL80211_ATTR_RADAR_EVENT to inform userspace + * about detected radars or success of the channel available check (CAC) + * + * @NL80211_RADAR_DETECTED: A radar pattern has been detected. The channel is + * now unusable. + * @NL80211_RADAR_CAC_FINISHED: Channel Availability Check has been finished, + * the channel is now available. + * @NL80211_RADAR_CAC_ABORTED: Channel Availability Check has been aborted, no + * change to the channel status. + * @NL80211_RADAR_NOP_FINISHED: The Non-Occupancy Period for this channel is + * over, channel becomes usable. + */ +enum nl80211_radar_event { + NL80211_RADAR_DETECTED, + NL80211_RADAR_CAC_FINISHED, + NL80211_RADAR_CAC_ABORTED, + NL80211_RADAR_NOP_FINISHED, +}; + +/** + * enum nl80211_dfs_state - DFS states for channels + * + * Channel states used by the DFS code. + * + * @IEEE80211_DFS_USABLE: The channel can be used, but channel availability + * check (CAC) must be performed before using it for AP or IBSS. + * @IEEE80211_DFS_UNAVAILABLE: A radar has been detected on this channel, it + * is therefore marked as not available. + * @IEEE80211_DFS_AVAILABLE: The channel has been CAC checked and is available. + */ + +enum nl80211_dfs_state { + NL80211_DFS_USABLE, + NL80211_DFS_UNAVAILABLE, + NL80211_DFS_AVAILABLE, +}; + #endif /* __LINUX_NL80211_H */
The role of computed tomography with contrast and small bowel follow-through in management of small bowel obstruction. In a significant percentage of patients, radiologic evaluation other than plain abdominal films are required to confirm or exclude the presence of small bowel obstruction. Over a 1-year period, 55 patients had both computed tomography and small bowel follow-through studies. Patients were classified as having (1) paralytic ileus, (2) low-grade obstruction, (3) high-grade obstruction, or (4) complete mechanical obstruction. The gold standard for diagnosis was celiotomy in 42 patients and clinical follow-up in 13 patients. Thirty-six out of 42 patients had proven intestinal obstruction at the time of celiotomy. Computed tomography identified 32 out of the 36 high-grade and complete mechanical obstructions. Computed tomography was superior to small bowel follow-through in identifying masses, malignancies, and features of strangulation. Small bowel follow-through correctly identified "insignificant obstructions" when contrast reached the cecum within 4 hours in 18 of 19 patients. In patients with equivocal findings of small bowel obstruction, computed tomography should be used initially and then small bowel follow-through if computed tomography is not diagnostic. Computed tomography was superior in this study for detecting the cause of the intestinal obstruction and presence of strangulation.
Re: Arizona to be the first state to require a principal, or at least one employee, to be armed at every school. There should be several people, if it is ALWAYS the principal then that just ensures a smart shooter will target that person first. I feel like the principal, VP and school social worker should be at least, but social workers are almost always invariably liberals so I dunno if that'd even be an option.
application { mainClassName = "com.github.ajalt.clikt.samples.repo.MainKt" }
The enhancement of hydration of fluidized bed combustion ash by sonication. The use of limestone to control SO2 emissions in fluidized bed combustors (FBC) results in high CaO content in the ashes. This presents challenges for their disposal including significant exothermic behavior and uncontrolled expansion in the landfill. Hydration of the ashes is required to convert the CaO, but the current two-step hydration process is not very effective. In the present work a new technique using ultrasound to promote the hydration was examined. Initial work was done using an ultrasonic bath and subsequently an ultrasonic probe. Hydration levels greater than 80% in 20-40 min with amplitudes of 40% or more were achieved with residues containing high levels of CaO. This is about twice what can be achieved using conventional hydration technique. Similar results were obtained using FBC ashes from four utility/industrial scale and one pilot plant scale FBC units. The mechanism for the promotion of hydration bythe ultrasound is also explored.
Share Share Systemic incompetence and a complete lack of will by state and federal authorities in Mexico to properly search for and investigate the disappearance of thousands of people is fuelling a human rights crisis of epidemic proportions, said Amnesty International in a new report. “Treated with Indolence:” The State’s Response to Disappearances in Mexico reveals how the deep failings in the investigation into the enforced disappearance of 43 students in the southern state of Guerrero in September 2014 are mirrored in the northern state of Chihuahua and across the country. According to official figures, the whereabouts of more than 27,000 people remain unknown, many of them have been forcibly disappeared. “The relentless wave of disappearances that is taking over Chihuahua and the utterly reckless way in which the investigation into the enforced disappearance of the 43 Ayotzinapa students is being handled show the Mexican authorities’ total disregard for human rights and human dignity,” said Erika Guevara-Rosas, Americas Director at Amnesty International. “Tragically, disappearances have become such a common occurrence across Mexico that they have almost become part of ordinary life. In the rare occasions when investigations actually take place, theyare little more than a mere formality to pretend something is being done.” Incompetence In many cases the individuals who are reported missing were last seen being arrested by the police or detained by the military. Yet, Mexico lacks a detailed register of arrests allowing the authorities to deny responsibility and wash their hands of the commission of enforced disappearances. When relatives go to the police to report a disappearance, authorities tend to accuse the victims of being members of drug cartels and say the disappearances are a result of turf wars between rival gangs. The initial search for those reported to have been disappeared are routinely delayed – or not initiated at all. The rare investigations that do take place are usually so flawed they rarely lead to any results. In the case of the enforced disappearance of the 43 Ayotzinapa students, the government’s failure to carry out a serious and impartial investigation has been well documented. It consistently focused on a single line of inquiry that the students were arrested by municipal police, handed over to a criminal gang and their bodies burned in a local dumpster. The theory that the students were incinerated was categorically rejected by an international body of experts assigned by the Inter-American Commission on Human Rights, who deemed it to be impossible under the circumstances described by the Mexican authorities and not supported by evidence. The poor investigation carried out to date has utterly failed to clarify any chain-of-command responsibility. The crime scenes were not protected nor properly filmed or photographed. Ballistic evidence was gathered but was not examined for traces of blood or fingerprints and crucial evidence was incorrectly processed. Amnesty International’s researchers found similar examples of incompetence in the investigations into disappearances in the northern state of Chihuahua, and at least one case of cover-up by authorities in the state. Since 2007, nearly 1,700 people have been disappeared across Chihuahua. In most cases, authorities frequently failed to carry out essential actions in the investigation, including checking telephone, banking and financial records of victims or suspects, searching for the geolocation signal of mobile phones or reviewing data from security camera footage in the area where the person disappeared. These deep failures force relatives of the disappeared to take it upon themselves to search for their loved ones. Some travel the country to look for their relatives, others hire private detectives and gather evidence themselves. Usually the information provided by families serves only to increase the size of the case file, but it is rarely carefully studied by the authorities in order to determine new lines of inquiry or follow up on all the available leads. José Rosario Hernández was forcibly disappeared on the afternoon of October 23, 2011, when a municipal police patrol arrested him as he was driving with two friends through Ciudad Cuauhtémoc, Chihuahua state. His whereabouts remain unknown. In the days following his disappearance the authorities refused to give any information to his family. Officials in the highway patrol and municipal police offices even denied that he had been detained, despite the fact that José Rosario’s car had been removed by a crane on the orders of the authorities and there had been witnesses to his arrest. The family was able to identify the officer who had arrested José Rosario and challenged him to say what had happened, but he refused. The officer was eventually arrested, thanks to the efforts and repeated requests of the family and their legal representatives. His trial is due to start in January 2016. However, the investigation has not been thorough and information that could help reveal the whereabouts of José Rosario has not been pursued. The mother of 22-year-old Brenda Karina Ramírez, who was disappeared on July 19, 2011 after she was taken away by armed men from the home of relatives in Ciudad Cuauhtémoc, has taken upon herself to look for her daughter, after authorities failed to properly investigate the tragic incident. When she finally got hold of the official file of the case, she found it was nearly empty. She told Amnesty International: “What is in my daughter’s file is what I have handed in, nothing else.” The power and influence of the drug cartels also plays a powerful role in deterring investigations. Lack of resources Deep failures in the investigations are also caused by a lack of financial investment in the offices of the prosecutors in charge of the inquiries. Public officials are overloaded with an unmanageable number of case files and high staff turnover. “The Mexican government’s inability to carry out any kind of proper investigation into disappearances is putting thousands of people at great risk,” said Guevara-Rosas. “In order to prevent more people from being disappeared, the Mexican authorities must develop a public policy to prevent these tragedies. They must carry out effective investigations and effectively search for the disappeared, bring those responsible to justice and ensure adequate reparations for the victims.” On December 10, 2015, President Enrique Peña Nieto sent a bill to Congress to address the disappearances crisis. Nevertheless, this draft legislation falls short of international standards in essential aspects. The Mexican Congress must substantially improve the document if it is to be an effective tool to ensure truth, justice and reparations to the victims and to prevent further disappearances.
KYODO NEWS - Sep 2, 2018 - 03:06 | Sports, All The Olympic flame lighting ceremony for the 2020 Summer Games in Tokyo will take place on March 11 of that year, the ninth anniversary of the earthquake and tsunami that devastated a large part of northeastern Japan, International Olympic Committee President Thomas Bach said Saturday. "I think this is a wonderful idea," Bach said in an interview with Kyodo News in Jakarta. "The IOC has already accepted this idea, because from the very beginning the IOC has made a commitment that wherever possible we want to contribute to the reconstruction of the area." The Tokyo Olympic organizing committee had proposed the date, but Bach's statement was the first public announcement of the IOC's support to hold the ceremony on the disaster's anniversary. The Olympic flame has been lit in Olympia, western Greece, since Nazi Germany introduced the idea of a torch relay for the 1936 Berlin Summer Games. Following the relay in Greece, the flame will be transported to Japan, where it will be displayed in Fukushima, Iwate and Miyagi prefectures, the three most affected by the 2011 catastrophe, which triggered a nuclear crisis and left more than 18,000 people dead or missing. The Japan leg of the relay will begin in Fukushima on March 26 and it will travel across the country for a period of 121 days. On the eve of attending the closing ceremony of the Asian Games, the largest multisport event in the world behind the Olympics, Bach said he plans to visit northeastern Japan in November to "show our solidarity with the people and to encourage the people in the region." Referring to Japan's record-high temperatures this summer, Bach said he is confident that the IOC working together with the Tokyo organizing committee will be able to come up with the "right mixture of measures" to protect athletes and spectators during the Tokyo Olympics. He said introducing daylight saving time in Japan during the summer may be an effective way to address potential health risks but at the same time stressed it will be important to craft a "good package" and advised not to just focus too much on one measure. He also said the IOC, along with North and South Korea, has been exploring the possibility of "some joint actions during the Olympic Games in Tokyo" and to achieve this goal adequate preparations with other national Olympic committees should begin at an early date. "We have not only opened the door for political talks but also we have also kicked off developments in sports," he said. "We are ready to continue to support this rapprochement on the Korean Peninsula." North and South Korea formed a joint team in women's ice hockey in the Winter Olympics in Pyeongchang in February. It was the first time that inter-Korean athletes to have competed together in Olympics history. Then the two divided Koreas fielded unified teams in women's basketball, rowing and canoeing at the Asian Games, which opened on Aug. 18. Their dragon boat racing team celebrated the first-ever gold medal by a combined team of the two countries at an international multisport event on Aug. 26, together with the popular Korean folk song "Arirang" being played at a ceremony as its national anthem. On the Japanese city of Sapporo's interest in hosting the Winter Olympics in 2026 or 2030, Bach expressed his appreciation, saying that it is in line with the IOC's policy of taking the advantage of existing facilities and bringing back the games to a "traditional winter sports destination." While stressing it is "too early" to talk about which city may host those Winter Olympics, he said Sapporo has a good chance to succeed in its bid for the 2030 Games even if it does not get selected for the event four years before. "I think this is fair to say the candidates for '26 who are following up on the whole procedures will of course have a certain advantage for 2030," he said. The 64-year-old IOC president said, for obvious reasons, they will have "all the knowledge" as well as "more expertise and more time" to work out their projects according to their needs and cooperation with the IOC. "I think they would be in the kind of pole position" as they would also be able to gain "confidence" of the IOC in advance, he said. While he spoke in favor of those issues, when it came to the likelihood of esports, or competitive video gaming, becoming one of the Olympic events in the near future, he was not necessarily so. He said substantive discussions are needed, for example, to determine whether esports should be regarded as sports in the first place or if it would not be contradictory to the Olympic values. "This will be for my successor," he said. "There are at this moment too many open questions...it will take time."
PROJECT SUMMARY/ ABSTRACT Diffuse large B-cell lymphoma (DLBCL) is the most common subtype of non-Hodgkin lymphoma (NHL), with ~25,000 new cases yearly. Despite marked improvement in therapy, about half of these patients succumb to their disease. Therefore, there is a strong need for new therapeutic approaches to improve DLBCL patients' survival. Here we show that in DLBCL cells the LIM domain-only 2 (LMO2) protein inhibits DNA double-strand break (DSB) repair via homologous recombination (HR), resulting in HR-dysfunction. This HR-dysfunction phenocopies BRCA1/2 mutations in breast, ovarian and castration-resistant prostate cancers. Accordingly, we show that LMO2 predisposes DLBCL cells to synthetic lethality upon treatment with Poly(adenosine diphosphate ribose) polymerase 1 and 2 (PARP1/2) inhibitors. The long-term goal is to demonstrate that PARPi activity may improve outcome of patients with LMO2 expressing DLBCL. The overall objectives of this proposal are to determine the mechanisms by which LMO2 inhibits the repair of DNA breaks via HR and whether LMO2 expression levels can be exploited as a biomarker for sensitivity of DLBCL to PARP1/2 inhibitors. The central hypothesis is that inhibition of DNA repair via HR induced by LMO2 will sensitize DLBCL tumors to PARP1/2 inhibitors. The rationale for this project is that deficiency in HR and failure to repair DSBs produced cause solid during replication Indeed, PARP1/2 inhibitors that the accumulation of toxic DSBs during replication, had been exploited for the treatment of HR-deficient tumors. can lead to genomic instability and/or cell death. Our preliminary data showed that in DLBCL cells LMO2 inhibits the HR pathway. Thus, we propose that inhibition of HR by LMO2 will sensitize DLBCL tumors to PARP1/2 inhibitors. In order to test the central aims : hypotesis and determine the mechanims by which LMO2 controls DNA repair we propose three specific 1)Identify mechanism(s) of LMO2-mediated inhibition of HR in DLBCL; 2) Determine how LMO2 affects immunoglobulin class switch recombination in normal B-cells; and 3) Demonstrate that DLBCL expressing LMO2 are sensitive to PARP1/2 inhibition. The proposed research is innovative because it represents a substantive departure from the current status quo by demonstrating that expression of LMO2 protein predicts therapeutic activity of PARP1/2 inhibitors in DLBCL and represents an effective new therapeutic strategy that will broaden the existing arsenal against this lymphoma. The research proposed is significant because it is expected to provide strong scientific justification for the development of a novel therapeutic approach for DLBCL based in PARP1/2 inhibitors that could potentially change the current treatment of DLBCL patients and improve their outcome.
*n**3 - 4*n**2 + n**2 = 0. -1, 1 Let o(p) = 5*p + p + 12 - 5*p. Let t be o(-8). Find v such that -18*v**t + 4*v**3 - 8*v + 8*v**2 + v**2 + 2*v**3 + 7*v**2 = 0. -1, 0, 2/3 Let -5*d**2 + 0*d**2 + 136*d - 116*d = 0. What is d? 0, 4 Suppose -2*j = -6*j + 8. Let a(p) be the third derivative of 1/30*p**5 + 0 + 0*p**3 + 0*p + 1/60*p**6 + 0*p**4 - 3*p**j. Find f, given that a(f) = 0. -1, 0 Let a(m) be the third derivative of -m**5/20 + m**4/8 - 4*m**2. Factor a(g). -3*g*(g - 1) Let o(r) be the first derivative of r**8/168 + 2*r**7/105 - r**6/60 - r**5/15 - 3*r**2/2 + 4. Let i(q) be the second derivative of o(q). Factor i(n). 2*n**2*(n - 1)*(n + 1)*(n + 2) Let q(r) be the first derivative of r**5 + 3*r**4 + 3*r**3 + r**2 + 4. Factor q(u). u*(u + 1)**2*(5*u + 2) Suppose 9*l - 13*l = 0. Let n(j) be the third derivative of 1/6*j**4 + l + 1/60*j**5 + j**2 + 0*j + 2/3*j**3. Suppose n(c) = 0. Calculate c. -2 Let c(n) = -2*n - 3. Let f be c(-3). Let h(a) be the first derivative of 0*a + 1 + 2/3*a**f + a**2. Find s such that h(s) = 0. -1, 0 Let z(j) be the first derivative of j**3/18 - j**2/3 + 2*j/3 - 6. Factor z(g). (g - 2)**2/6 Let w(l) be the second derivative of l**7/14 - 2*l**6/5 + 9*l**5/10 - l**4 + l**3/2 - 6*l. Suppose w(t) = 0. Calculate t. 0, 1 Let r be ((-4)/(-4))/(1/2). Let -u + 3*u**2 - 2*u**r + 0*u**2 = 0. What is u? 0, 1 Let w(m) be the first derivative of m**5/45 - 5*m**4/36 - 7*m**3/27 + 5*m**2/18 + 2*m/3 - 19. Factor w(y). (y - 6)*(y - 1)*(y + 1)**2/9 Let z(h) be the second derivative of 0*h**3 + 1/2*h**2 - 1/60*h**4 - 1/150*h**5 + 0 - h. Let i(v) be the first derivative of z(v). Factor i(y). -2*y*(y + 1)/5 Let y(t) be the third derivative of 0*t**3 + 2/945*t**7 + 0*t**4 + 0 - 1/180*t**6 + 0*t + 4*t**2 + 1/270*t**5. Factor y(l). 2*l**2*(l - 1)*(2*l - 1)/9 Factor -1/3*i**2 - 1/6*i**3 + 0*i + 0. -i**2*(i + 2)/6 Suppose 3*t = 2*d - 12, 2*t + 17 = 3*d - 1. Factor d*n**2 + 8*n**5 + 12*n**3 - 6 - 10*n + n - 11*n**5. -3*(n - 2)*(n - 1)*(n + 1)**3 Let u be (9/18)/(1/450). Let s be 0 + 4 - u/60. Factor -1/2*p**4 - s*p**5 + 1/2*p**2 + 0 + 0*p**3 + 1/4*p. -p*(p - 1)*(p + 1)**3/4 Suppose -10*j - 7 = -7. Let c(a) be the second derivative of 0*a**3 + j - 9/20*a**5 + 0*a**2 + 1/2*a**4 + 2*a + 1/10*a**6. Factor c(f). 3*f**2*(f - 2)*(f - 1) What is i in 3*i**3 + 6 - 2*i**2 + 14*i + i + 9*i**2 + 5*i**2 = 0? -2, -1 Factor -29*q**2 + 13*q**2 + 17*q**2. q**2 Let z = -135/8 - -723/40. Find n such that -6/5*n**4 + 2/5 + 2/5*n**5 - z*n + 4/5*n**2 + 4/5*n**3 = 0. -1, 1 Let s = 46 + -227/5. What is b in 3/5 - 6/5*b - s*b**4 + 0*b**2 + 6/5*b**3 = 0? -1, 1 Let n = -14 - -22. Let c = n - 5. Suppose -2 - 32*o + 10*o**2 + 10*o**3 + 10 + 4*o**c = 0. What is o? -2, 2/7, 1 Let i(n) be the second derivative of n + 1/120*n**6 - 1/48*n**4 - 1/80*n**5 + 1/168*n**7 + 0 + 0*n**2 + 0*n**3. Let i(u) = 0. What is u? -1, 0, 1 Factor -1/6*n**4 + 0 + 1/3*n + 2/3*n**3 - 5/6*n**2. -n*(n - 2)*(n - 1)**2/6 Determine f so that 0*f - 2/5 + 1/5*f**4 + 11/10*f**2 - 9/10*f**3 = 0. -1/2, 1, 2 Factor -3*f**3 + 5*f**2 + 1 + 2*f**3 - 7*f + 2 + 0*f**3. -(f - 3)*(f - 1)**2 Let g(t) be the third derivative of -5*t**6/96 + 19*t**5/48 - 2*t**4/3 + t**3/2 - 19*t**2. Factor g(u). -(u - 3)*(5*u - 2)**2/4 Let x(g) = 5*g + 6*g - g**2 - 3 - 2*g. Let t be x(8). Factor 0*k**2 + 0*k + 1/4*k**t + 0 - 1/4*k**3 + 0*k**4. k**3*(k - 1)*(k + 1)/4 Let d(m) be the third derivative of m**6/120 + m**5/10 + m**4/2 + 4*m**3/3 + 40*m**2. Find l such that d(l) = 0. -2 Let a = -11/19 - -41/38. Let -1/2*g**3 + 3/2*g**2 + a*g - 1 - 1/2*g**4 = 0. Calculate g. -2, -1, 1 Solve -u**4 - 4*u + 4*u**3 - 5*u**3 + 7*u**3 - 6*u**2 - u**3 + 8 = 0. -1, 2 Let f(i) be the first derivative of 5*i**4/4 + 5*i**3/3 - 15*i**2 + 18. What is y in f(y) = 0? -3, 0, 2 Let y(w) be the first derivative of -w + 3/4*w**5 - w**3 + 3/4*w**4 + 5 + 0*w**2. Let z(b) be the first derivative of y(b). Factor z(x). 3*x*(x + 1)*(5*x - 2) Let z(p) = -3*p**2 + 2*p - 23*p**3 + 22*p**3 - 4*p. Let w be z(-2). Solve 1/4*s**2 + w*s + 0 = 0. 0 Let q(v) be the second derivative of 2/35*v**5 + 1/105*v**6 + 1/7*v**4 - 6*v + 1/7*v**2 + 0 + 4/21*v**3. Factor q(f). 2*(f + 1)**4/7 Let j(w) = -w**3 - 3*w - 1. Let r(t) = -t**2. Let v = 3 + -6. Let q(h) = v*r(h) - j(h). Suppose q(z) = 0. Calculate z. -1 Let d(w) = -2*w**2 + 4*w - 6. Let t(f) = 4*f**2 - 8*f + 13. Let b(k) = 9*d(k) + 4*t(k). Solve b(y) = 0. 1 Suppose 3*n + 2*n**2 - 3*n**2 - 2*n - 2*n = 0. What is n? -1, 0 Let o(n) = -3*n**2 - n**3 - n + 3*n + 4*n**2. Let m(a) = 4*a - 7*a**3 + 4*a**2 + 3*a + 3*a**3 - a**2. Let j(w) = 4*m(w) - 14*o(w). Solve j(t) = 0. -1, 0 Let g(a) be the third derivative of a**7/210 - a**6/48 + a**5/120 + a**4/24 - 9*a**2. What is h in g(h) = 0? -1/2, 0, 1, 2 Let u(w) be the first derivative of -4*w**5/5 - 2*w**4 - 4*w**3/3 - 4. Factor u(a). -4*a**2*(a + 1)**2 Suppose 2*d + 0*d = 0. Let k(m) be the second derivative of 0*m**2 + 2/105*m**7 - 1/15*m**6 + 0 + 2/25*m**5 - 4*m - 1/30*m**4 + d*m**3. What is j in k(j) = 0? 0, 1/2, 1 Let d(u) be the second derivative of u**7/315 - u**6/60 + u**5/30 - u**4/36 + 3*u**2/2 - 4*u. Let k(y) be the first derivative of d(y). Factor k(h). 2*h*(h - 1)**3/3 Let c(z) be the third derivative of -z**9/60480 - z**8/16128 - z**7/20160 + z**5/60 + z**2. Let i(a) be the third derivative of c(a). Factor i(f). -f*(f + 1)*(4*f + 1)/4 Let l be (-56)/(-36) + -1 - 4/18. Let f(v) be the second derivative of -2*v**2 + 2*v - l*v**3 + 0 + 1/6*v**4. Factor f(s). 2*(s - 2)*(s + 1) Let l = 31 + -31. Let d(v) be the first derivative of 1 + 1/9*v**3 - 1/3*v + l*v**2. Factor d(h). (h - 1)*(h + 1)/3 Let r = 65 - 129/2. Suppose 2*o - 2 - r*o**2 = 0. What is o? 2 Suppose 5*s = -62 + 87. Determine y, given that 0*y + 2/7*y**s + 4/7*y**4 + 0 + 2/7*y**3 + 0*y**2 = 0. -1, 0 Let l(b) = 4*b**3 - b**2 + 2*b - 5. Let s(p) = p**3 - p**2 + p - 1. Let g = 5 - -4. Suppose -3*j + 0*j = g. Let r(v) = j*s(v) + l(v). Factor r(w). (w - 1)*(w + 1)*(w + 2) Factor 4/7 - 5/7*r**2 + 1/7*r. -(r - 1)*(5*r + 4)/7 Let -38*u - 8 + 6*u + 12*u - 10*u**3 + 3 - 25*u**2 = 0. What is u? -1, -1/2 Let z(v) be the third derivative of -v**5/180 + 2*v**3/9 + 7*v**2. Find p such that z(p) = 0. -2, 2 Let x(r) be the third derivative of -r**8/3696 - r**7/2310 + r**6/440 + r**5/132 + r**4/132 - 11*r**2. Let x(d) = 0. What is d? -1, 0, 2 Let i(t) = 16*t**2 - 6*t. Let a(u) = -81*u**2 + 30*u. Suppose -2*w + 3*b = -4*w - 4, -1 = -w - 3*b. Let r(d) = w*a(d) - 24*i(d). Factor r(f). 3*f*(7*f - 2) Let x(r) = 25*r**4 - 25*r**2 - 11*r. Let k(d) = 5*d**4 - 5*d**2 - 2*d. Let v(f) = -11*k(f) + 2*x(f). What is i in v(i) = 0? -1, 0, 1 Let j(p) be the third derivative of -343*p**6/30 + 98*p**5/5 - 14*p**4 + 16*p**3/3 - 7*p**2. Factor j(u). -4*(7*u - 2)**3 Let m(j) be the second derivative of j**7/70 + 3*j**6/50 + 9*j**5/100 + j**4/20 - 23*j. Factor m(d). 3*d**2*(d + 1)**3/5 Let b(v) be the first derivative of v**4/4 + v**3/2 + v + 2. Let c(i) be the first derivative of b(i). Determine x so that c(x) = 0. -1, 0 Let q be (-16)/(-5) + 5/(-25). Determine v so that -3/2 + q*v**2 + 3/2*v = 0. -1, 1/2 Let s(u) be the second derivative of 3*u**5/140 + u**4/14 + u**3/14 - 6*u. Factor s(d). 3*d*(d + 1)**2/7 Let a(d) be the first derivative of -2*d**3/39 - 3*d**2/13 - 4*d/13 - 8. Find y such that a(y) = 0. -2, -1 Suppose 0 = -2*f - 7 + 11. Suppose -4*d - f*q + q + 9 = 0, 13 = 4*d + 5*q. Factor -1/2*p - 1/4 - 1/4*p**d. -(p + 1)**2/4 Let y(x) be the first derivative of -3*x**5/25 + 3*x**4/10 - x**3/5 - 15. Factor y(w). -3*w**2*(w - 1)**2/5 Let s(k) be the third derivative of 0*k + 0 - 1/150*k**5 - 1/20*k**4 - 2/15*k**3 - k**2. Solve s(q) = 0. -2, -1 Let x = -6 + 1. Let t(y) = -50*y**3 - 85*y**2 - 48*y - 13. Let w(u) = 150*u**3 + 254*u**2 + 144*u + 40. Let c(m) = x*w(m) - 16*t(m). Factor c(l). 2*(l + 1)*(5*l + 2)**2 Let 3/5*d**5 - 3/5*d**4 - 18/5*d**3 - 6/5*d**2 + 3*d + 9/5 = 0. Calculate d. -1, 1, 3 Let d(j) be the third derivative of 5*j**8/48 + 20*j**7/21 + 3*j**6 + 8*j**5/3 - 10*j**4/3 - 5*j**2. Determine w, given that d(w) = 0. -2, 0, 2/7 Let u(c) be the third derivative of c**5/6 - c**4/4 - 2*c**3/3 + 6*c**2. Factor u(p). 2*(p - 1)*(5*p + 2) Let p(n) be the second derivative of -n**6/15 + n**4/6 - 24*n. Suppose p(g) = 0. What is g? -1, 0, 1 Let g(q) be the
As voice-activation technology from Amazon, Google and Apple goes mainstream, labels are looking to adapt to -- and capitalize on -- the latest frontier. Recently, Sony Music Entertainment assembled a six-person squad to crack what is shaping up to be one of the biggest ­challenges and ­opportunities for the music industry in decades. The task: ­getting voice-activated speakers to play certain tunes when living-room listeners call out anything from the name of their favorite band, to more nebulous requests that Amazon has fielded recently from its Echo users, such as "dog music," ­"drinking music," "pop music for yoga" or "Bruce." "You've got to think about the way people would be requesting things," a Sony executive says, ­adding that a command to "play Bruce" raises the ­question of whether the speaker will ­produce the more popular Bruce (Springsteen), or ­perhaps Bruce Hornsby, who, Amazon reps say, could ­potentially elbow Springsteen out of the way if he dropped a hot new track. The Sony executive says the musical asks now emanating from Amazon's estimated 11 million Echo speaker owners include a lot of "curveballs and things none of us could have anticipated." The Echo, along with Google Home and Apple's just-announced HomePod, are promising to ­supercharge the music industry's nascent growth, which until now has been fueled by such fast-expanding streaming services as Spotify and Apple Music. While Amazon Music Unlimited, Amazon's paid ­subscription service tied to its Echo speakers, has likely racked up only a few million paying subscribers since it launched in October, ­according to MusicWatch ­analyst Russ Crupnick, label executives say the voice-­activated speaker explosion is radically changing ­consumption behavior. Fans are listening to music in their homes again with speakers as opposed to using headphones or ­earbuds, while older listeners are firing up streaming services without having to fumble for their reading glasses to search their phones. Amazon Music Unlimited, which is less than half the price of Spotify and Apple Music when ­bundled with an Echo, serves an older ­generation that the ­industry is keen on ­converting to paid ­streaming, given its ­comfort with paying for music. And voice-activated speakers in cars will make it easier to use on-demand music ­services on the road, potentially ­revving up further subscriptions. But even the simplest of requests for the Echo's robotic assistant Alexa, such as "Play Taylor Swift," represents a complicated riddle for the record business. Which Swift song will Alexa play? How can Swift's distributor, Universal Music Group (UMG), make sure Alexa plays Swift's new single, or even a song from her latest album? To cope, labels have been ­rearranging their marketing and tech staffs while improving ­metadata, the invisible ­information embedded in digital tracks ­containing details like artist, song title and genre. Because they're not typing or texting, users can be imprecise in requesting songs, artists or fragments of barely ­remembered lyrics, and labels are grappling with how they can exploit these half-baked commands. "You have an opportunity to ­summon music based on ­fragments of a situation: 'Play the song about how it never rains in California,' and Alexa's going to find that Albert Hammond song," says Michael Nash, ­executive vp digital ­strategy at UMG, which is ­reorganizing its catalog to respond to Amazon's user data. If people request songs based on moods or the name of a lead ­guitarist, UMG wants to be at the top of those results, says Nash. "When someone has a query like, 'I'm looking for rock songs from the '80s with a female ­vocalist for a ­running playlist,' that is six or seven bits of metadata," says Miles Galliford, founder/CEO of Beetroot, a U.K. startup that ­compiles metadata for music ­companies. He notes that the voice boom has boosted his ­business considerably during the past 12-18 months. "The challenge for the industry is to go into that back ­catalog and add that metadata, which is a big job. Without it, [the song] won't get found." Warner Music Group has also beefed up its team to deal with the task, hiring longtime UMG digital exec Vinnie Freda as its chief data officer last December. Like most of the top ­streaming ­services, Amazon has a staff of ­curators who specialize in every genre, led by Alex Luke, a ­former EMI and Apple digital music specialist. Amazon Music vice president Steve Boom won't give away Alexa-Echo voice-command secrets, like which song plays when a customer requests "songs from the '80s," but he says the results revolve around "popularity and relevance to the consumer." The service emphasizes new music, so the album ÷ is likely to come up before catalog in a "play Ed Sheeran" request, although Music Unlimited gradually adapts to those who primarily listen to older music. "You can see velocity in terms of plays and songs," says Boom. Ben Shepherd, Amazon's head of music services for Alexa, adds that the ­system is designed to study ­customers' requests based on certain criteria, such as artist, song title, date, genre and region. "We'll see patterns," he says. "It'll be ­different per customer as the system gets more personalized." Label reps have been regularly meeting with Amazon officials, particularly Boom, to figure out how to promote and market music in the voice-activated world. John Mayer, Lady Gaga and Elton John have participated in Music Unlimited's Song of the Day ­promotions, in which artists play their own songs as well as influences and new ­favorites. One major-label source says Amazon ­promotions are highly desirable because they efficiently reach CD, ­streaming, download and voice ­customers: "That's a great ­opportunity to get exposure to all the different types of consumer bases." It's too early to say how much voice-activated speakers will ­contribute compared to overall streaming, which created $2.5 billion in U.S. revenue in 2016, ­according to the RIAA. But it's beginning to register: In January, Ford rolled out Fusions and F-150s with Echos, and Sonos announced a streaming ­partnership with Amazon last August and plans to integrate voice this year. "The industry should get ready for streaming services to go even more mainstream -- voice is such an intuitive interaction model, and that's what the industry needs to realize," says Google hardware head of business development Shanna Prevé. "Everybody's ­trying to tackle [voice]," adds Sonos partnerships director Ryan Taylor. "We're not caught up in some ­argument about file formats and legacy technology -- it's about how you are making sure you're ­prepared for all these ­amazing things that are going to happen in the next three years." This article originally appeared in the June 24 issue of Billboard.
This proposal covers a broad range of studies of model and real systems and of molecular structures and properties, all of potential or actual biomedical interest. Major reliance is placed on a wide variety of NMR methods, but with considerable input from other physical and chemical techniques. The systems employed include red blood cells and ghosts, several lyotropic liquid crystals and living tissues. Some typical experimental studies are directed toward: cell membrane permeabilities and their activation energies; kinetics and mechanisms of binding to membrane sites; the effects of pH, osmolality, drugs, etc., on the above; the characterization of partially ordered systems (liquid crystals) through quadrupolar splittings (2H) and shift anisotropies (13C); 31P and 13C NMR of living tissues; structural characterizations by NMR; etc. There is extensive collaboration with active investigators in the medical area.
1. Field of the Invention The present invention relates generally to a method and apparatus for transmitting preambles in a wireless communication system, and in particular, to a method and apparatus for transmitting/receiving preambles of a reverse access channel (or random access channel) in a broadband wireless communication system. 2. Description of the Related Art With the rapid progress of communication technology, mobile communication systems have reached the stage of providing high-speed data services in which not only normal voice call services but also multimedia services are available. A packet data system supporting the high-speed data services can be roughly classified into a synchronous system mainly adopted, for example, in the United States, and an asynchronous system mainly adopted, for example, in Europe and Japan, and different standardization studies are being conducted by standard groups according to a use/nonuse of the synchronous system and the asynchronous system. The synchronous packet data system proposed by Third Generation Partnership Project 2 (3GPP2), one of the standards groups, is evolving into Code Division Multiple Access (CDMA) 2000 1x currently in service, 1x EVolution Data Only (EV-DO) in which high-speed packet transmission is available, and EVolution of Data and Voice (EV-DV) capable of supporting both voice and packet services. In addition, the asynchronous packet data system proposed by Third Generation Partnership Project (3GPP), is also called Universal Mobile Telecommunication Systems (UMTS), and the Wideband Code Division Multiple Access (W-CDMA) system can be a typical example of the asynchronous packet data system. Of the channels used in the W-CDMA system, a reverse common channel uses a Random Access CHannel (RACH), as is well known, and a description of the RACH will be made below. FIG. 1 is a diagram illustrating a communication signal transmission/reception relationship of a reverse common channel in the conventional W-CDMA system. In FIG. 1, reference numeral 151 indicates a reverse channel, and the reverse channel can be the RACH. Reference numeral 101 indicates a forward channel, and the forward channel can be an Access Preamble Acquisition Indication CHannel (AICH), also known as AP-AICH. In the case of FIG. 1, a mobile terminal has succeeded in preamble transmission by transmitting an Access Preamble (AP) to a base station over an RACH twice. Referring to FIG. 1, after transmitting a preamble AP0 152 with a predetermined length over the RACH, a mobile terminal waits for a response from a base station over an AICH. If there is no response from the base station for a predetermined time ‘tp-p’ 156, the mobile terminal retransmits a preamble AP1 154, whose transmission power has increased by ΔP 155, to the base station. Upon detecting a preamble transmitted over the RACH, the base station transmits a signature 102 of the detected preamble to the mobile terminal over an AICH of a forward link in response to the preamble. The mobile terminal determines whether there is a signature signal received over an AICH in response to the transmitted preamble. Upon receipt of a signature signal over the AICH, the mobile terminal demodulates the received signature signal. If the signature responsive to the preamble over the AICH is detected as an ACKnowledgement signal (ACK), the mobile terminal sends a message over the RACH, determining that the base station has detected the preamble. However, even though the mobile terminal has received the AICH signal 102 transmitted by the base station within a time ‘tp-ai’ 103 set in FIG. 1 after transmitting the preamble 152, if the mobile terminal fails to detect its transmitted signature from the AICH signal 102, the mobile terminal retransmits the preamble after the predetermined time ‘tp-p’ 156, determining that the base station has failed to receive the preamble. In this case, the mobile terminal, as described above, increases power of the preamble transmitted in the previous state by about ΔP(dB), retransmits the preamble with the increased power as shown by reference numeral 154, receives an AICH signal transmitted by the base station within a predetermined time, and detects a signal that uses its transmitted signature. Upon failure to receive an AICH signal using its transmitted signature from the base station after transmitting the preamble, the mobile terminal delays the set time and then repeatedly performs the above operation while increasing transmission power of the preamble. Upon receipt of the signal using its transmitted signature in the process of transmitting a preamble and receiving an AICH signal as stated above, the mobile terminal delays a set time ‘tp-msg’ 158, and then transmits a message 157 of a reverse common channel with the power corresponding to the preamble. FIG. 2 is a diagram briefly illustrating a reverse access probe. In FIG. 2, reference numeral 201 indicates a preamble, which is the reverse access probe. A mobile terminal transmits a randomly selected signature as a preamble, and control information other than this is not transmitted. All messages can be transmitted after the mobile terminal receives, over an AICH, an ACK signal indicating that a base station has detected the preamble (or signature), i.e. reverse access probe, transmitted by the mobile terminal. FIG. 3 is a diagram illustrating a signal transmission/reception relationship of a reverse/forward common channel proposed in 3GPP Long-Term Evolution (LTE), and FIG. 4 is a diagram illustrating exemplary reverse RACH allocation, which is taken into consideration in 3GPP LTE. The LTE system recently proposed in 3GPP, which is the standard group for the asynchronous mobile communication system, uses, as a transmission scheme, Orthogonal Frequency Division Multiplexing (OFDM) in a forward link and Single Carrier-Frequency Division Multiple Access (SC-FDMA) in a reverse link. In the exemplary reverse RACH allocation of FIG. 4, the horizontal axis represents the time domain and the vertical axis represents the frequency domain. In FIG. 4, one SC-FDMA slot is the one reverse RACH slot 401. It is shown in FIG. 4 that in the defined RACH slot 401, an RACH burst 402 is allocated in a predetermined frequency domain before being transmitted. Even for the RACH of the LTE system, like that of the W-CDMA system, if a base station detects a preamble after a mobile terminal transmits the preamble, the base station sends a response to the preamble to the mobile terminal so that the mobile terminal can transmit a data message. Upon receipt of the response transmitted by the base station, the mobile terminal can perform a series of processes for transmitting the data message. However, in the LTE system, because a transmission scheme of its physical channel is not a CDMA scheme, there is a need for design of an appropriate transmission scheme. Returning to the description of FIG. 3, in the RACH transmission scheme currently discussed in the LTE system, after transmitting a preamble 352 with a predetermined length over a reverse RACH 351, the mobile terminal waits for a response from the base station. If there is no response from the base station for a predetermined time ‘tp-p’ 356, the mobile terminal retransmits a preamble 353, transmission power of which has increased by ΔP(dB) 354, to the base station. Thereafter, upon detecting a preamble over the RACH, the base station transmits, as a response message to the preamble, a forward AICH 301 such as reference numeral 302 of FIG. 3 within a predetermined time ‘tp-ai’ 303. Upon receipt of the response message, the mobile terminal can transmit its desired transmission data using a message shown by reference numeral 353 after a predetermined time ‘tp-msg’ 357. The response message that the base station sends in response to the preamble is called an access grant message. In FIG. 3, the mobile terminal determines whether the access grant message responsive to the preamble is received from the base station. Receipt/non-receipt of the access grant message can be determined using a signature corresponding to the preamble of the mobile terminal and/or IDentifier (ID) information of the corresponding mobile terminal. Upon detecting the access grant message, the mobile terminal sends a reverse message in, for example, an SC-FDMA scheme, determining that the base station has detected its transmitted preamble. The mobile terminal can adjust a transmission time of the message transmitted in an SC-FDMA scheme, depending on time correction information from control information received over the access grant message. However, if the mobile terminal fails to detect a signal using a signature responsive to the preamble as the mobile terminal fails to receive the access grant message from the base station within a predetermined time ‘tp-ai’ after transmitting the preamble 352, the mobile terminal retransmits the preamble after a predetermined time, determining that the base station has failed to detect the preamble. In this case, the mobile terminal increases power of the preamble transmitted in the previous state by ΔP(dB) 354, and retransmits the preamble with the increased power. Thereafter, if the base station transmits an access grant message as the base station normally receives the preamble, the mobile terminal receives the access grant message transmitted by the base station within a predetermined time, and detects from the received access grant message a signal that uses a signature responsive to the preamble and/or mobile terminal's ID information. After transmitting the preamble, if the mobile terminal fails to receive an access grant message using its transmitted signature from the base station, the mobile terminal delays a predetermined time and then repeatedly performs the above operation while increasing the transmission power of the preamble. If the mobile terminal receives a signal using its transmitted signature in the process of receiving an access grant message from the base station after transmitting the preamble, mobile terminal delays a predetermined time ‘tp-msg’ 357 as shown in FIG. 3 and then transmits a message on a reverse RACH with the power corresponding to the preamble. In the LTE system, the access grant message that the base station receiving the preamble transmits to the mobile terminal can use a coded message transmitted over a particular frequency/time interval of the OFDM system. In addition, the access grant message can include therein time correction information of RACH, ID of RACH, channel allocation information for the reverse channel over which the mobile terminal transmits data, and the like. A structure of the RACH preamble now under discussion in the LTE system is shown in FIG. 5. A basic unit of reverse transmission is a sub-frame 501 and has a 0.5-ms length. A preamble 510 is transmitted in one sub-frame 501, and time margins are provided before and after the preamble taking into account the initial timing synchronization of an uplink, round-trip delay time, and maximum delay spread time of the channel, i.e., the preamble 510, to prevent interference to/from the previous symbol, is transmitted for a TP time 530 after a lapse of the maximum delay spread time Tds 520 of the channel beginning from a start point of the sub-frame. In addition, to prevent uncertainty of the timing synchronization of the uplink and prevent interference to/from the next symbol, the transmission of the preamble terminates in advance of an end point of the sub-frame 501 by a sum of the round-trip delay time TGP and the maximum delay spread time Tds of the channel as shown by reference numeral 540. The round-trip delay time TGP is a delay time required when the mobile station receives a signal transmitted by the base station and the base station receives a signal that the mobile terminal has transmitted after acquiring synchronization, and the round-trip delay time TGP is about 6.7 μsec/km. However, there is a limitation in extending the maximum supportable cell radius with the preamble structure of FIG. 5. This is because even though the maximum transmission power of the mobile terminal is limited, the maximum cell radius supportable by the preamble is limited to the maximum transmission energy used for the preamble. In addition, though the maximum transmission energy of the preamble is proportional to the length of the preamble, the round-trip delay time 540 increases with the cell radius, causing a decrease in the length of the preamble i.e., because there is a trade-off relationship between the cell radius and the preamble length, there is a limitation in extending the maximum cell radius with the preamble structure of FIG. 5. As described above, because the round-trip delay time is about 6.7 μsec/km, an increase in the cell radius by 1 km causes a decrease in the preamble length by 6.7 μsec, thereby reducing the preamble energy. The reduction in the preamble energy may reduce the preamble detection capability at the base station. Therefore, because there is a limitation in extending the cell radius with the preamble structure of FIG. 5, there is a demand for a preamble transmission scheme capable of preventing a reduction in the preamble detection performance while increasing the cell radius.
Q: Raphael JavaScript displays a blank page I am new to graphics programming in JavaScript and am trying the Raphael Library. I am trying to display a simple circle but getting only a blank page. Here is the source code: <!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"/> <title> Raphael JS Test </title> <script src="raphael.js"></script> <script> window.onload = function() { var p = Raphael(10, 10, 400, 400); p.circle(100, 100, 45); } </script> </head> <body> </body> </html> All help is greatly appreciated! Thanks! A: I think that the circle is present on the page, but it is white, with white stroke on white background. Have you try to set a color // Sets the fill attribute of the circle to red (#f00) circle.attr("fill", "#f00"); or // Sets the stroke attribute of the circle to white circle.attr("stroke", "#fff");
Acute and late toxicity in a randomized trial of conventional versus hypofractionated three-dimensional conformal radiotherapy for prostate cancer. To compare the toxicity between hypofractionation vs. conventional fractionation schedules in patients with high-risk prostate cancer. Between January 2003 and December 2007, 168 patients were randomized to receive either hypofractionated (62 Gy in 20 fractions within 5 weeks, 4 fractions/wk) or conventionally fractionated (80 Gy in 40 fractions within 8 weeks) three-dimensional conformal radiotherapy to the prostate and seminal vesicles. All patients had undergone a 9-month course of total androgen deprivation, with radiotherapy starting 2 months after initiation of the total androgen deprivation. The median follow-up was 32 and 35 months in the hypofractionation and conventional fractionation arms, respectively. For the patients developing acute toxicity, no difference between the two fractionation groups was found in either severity or duration of gastrointestinal or genitourinary toxicity. Also, no difference was found in the incidence and severity of late gastrointestinal and genitourinary toxicity between the two treatment schedules, with a 3-year rate of Grade 2 or greater toxicity of 17% and 16% for the hypofractionation arm and 14% and 11% for the conventional fractionation arm, respectively. A statistically significant correlation between acute and late gastrointestinal toxicity was found only in the conventional fractionation group. Our findings suggest that the hypofractionation regimen used in our study is safe, with only a slight, nonsignificant increase in tolerable and temporary acute toxicity compared with the conventional fractionation schedule. The severity and frequency of late complications was equivalent between the two treatment groups.
Skeleton Cop trailer promises all indie film goodness Buddy cop films are dime a dozen. Some click and some don’t. The best one I ever saw was, of course, Lethal Weapon – they even made a successful series as a spin-off. But sometimes, you do get bored of the overly produced, guns blazing cleanly series and films and want to get down and dirty in the indie circuit. The indie film circuit has almost all genre of films. We can now add one more to that – the buddy cop film Skeleton Cop. As the name suggests, the film is about a cop who’s dead but his skeleton is still working for the police organization. The trailer shows all the inherent goodness of an indie flick. The production has invested heavily in what’s the most important in a film – the blood splatter! Along with that, Skeleton Cop boasts of a skeleton shooting guns, using a shotgun and an evil looking woman with her own set of uniform-clad minions. This one is a must-see for indie-crazy fans. Most of the camera angles are at a triangle, so I just hope the director didn’t get a crickety neck or back pain thrusting and turning for the camera angles. Here’s the trailer, give it a look:
Q: PowerShell directly vs. SQL Agent PowerShell Job Steps If I run this 3 line script in Powershell (Run As Administrator, and my domain account is a local administrator on MyRemoteServer), it works as expected (note that there is a dollar sign in the service name that I had to escape with a back tick): Invoke-Command -ComputerName "MyRemoteServer" -ScriptBlock{Get-Service -Name "AOS60`$01" | Stop-Service -Force} get-service -Name "AOS60`$01" -ComputerName "MyRemoteServer" | Format-Table -Property MachineName, Status, Name, DisplayName -auto Invoke-Command -ComputerName "MyRemoteServer" -ScriptBlock{Get-Service -Name "AOS60`$01" | Start-Service} [Step 2 is to provide proof that the service actually has a status of "Stopped" after step 1. Once successfully converted to an Agent Job, step 2 will actually invoke a stored procedure that does a series of database restores.] If I put these statements into SQL Agent (SQL Server 2012 SP2) as job steps and start the job, the job crashes (it doesn't merely fail, it wants to invoke the debugger) at the first step. The domain service account that runs the SQL Agent Service was allegedly granted the necessary permissions on MyRemoteServer by our Operations group. The job script encountered the following errors. These errors did not stop the script: Unhandled Exception: System.FormatException: Index (zero based) must be greater than or equal to zero and less than the size of the argument list. at System.Text.StringBuilder.AppendFormat(IFormatProvider provider, String format, Object[] args) at System.String.Format(IFormatProvider provider, String format, Object[] args) at Microsoft.SqlServer.Management.PowerShell.Res.GetString(String key, Object arg0) at Microsoft.SqlServer.Management.PowerShell.SqlPowerShell.GetErrorRecordMessage(ErrorRecord errorRecord) at Microsoft.SqlServer.Management.PowerShell.SqlPowerShell.HandleAgentJob(RunspaceConfiguration config) at Microsoft.SqlServer.Management.PowerShell.SqlPowerShell.Main(String[] args) I scripted out the job below for reference. Note that it fails even if I leave out the @output_file_name, so the problem isn't writing to the output file but in executing the step itself. USE [msdb] GO /****** Object: Job [Test stopping and restarting AX] Script Date: 6/21/2017 1:49:30 PM ******/ BEGIN TRANSACTION DECLARE @ReturnCode INT SELECT @ReturnCode = 0 /****** Object: JobCategory [[Uncategorized (Local)]] Script Date: 6/21/2017 1:49:30 PM ******/ IF NOT EXISTS (SELECT name FROM msdb.dbo.syscategories WHERE name=N'[Uncategorized (Local)]' AND category_class=1) BEGIN EXEC @ReturnCode = msdb.dbo.sp_add_category @class=N'JOB', @type=N'LOCAL', @name=N'[Uncategorized (Local)]' IF (@@ERROR <> 0 OR @ReturnCode <> 0) GOTO QuitWithRollback END DECLARE @jobId BINARY(16) EXEC @ReturnCode = msdb.dbo.sp_add_job @job_name=N'Test stopping and restarting AX', @enabled=1, @notify_level_eventlog=0, @notify_level_email=0, @notify_level_netsend=0, @notify_level_page=0, @delete_level=0, @description=N'No description available.', @category_name=N'[Uncategorized (Local)]', @owner_login_name=N'ROGUE\amfreeman', @job_id = @jobId OUTPUT IF (@@ERROR <> 0 OR @ReturnCode <> 0) GOTO QuitWithRollback /****** Object: Step [Synchronously Stop AX Service on DEVAOS2] Script Date: 6/21/2017 1:49:30 PM ******/ EXEC @ReturnCode = msdb.dbo.sp_add_jobstep @job_id=@jobId, @step_name=N'Synchronously Stop AX Service on DEVAOS2', @step_id=1, @cmdexec_success_code=0, @on_success_action=3, @on_success_step_id=0, @on_fail_action=2, @on_fail_step_id=0, @retry_attempts=0, @retry_interval=0, @os_run_priority=0, @subsystem=N'PowerShell', @command=N'Invoke-Command -ComputerName "MyRemoteServer" -ScriptBlock{Get-Service -Name "AOS60`$01" | Stop-Service -Force}', @database_name=N'master', @output_file_name=N'E:\Microsoft SQL Server\MSSQL11.RELEASE\MSSQL\Log\Test_stopping_and_restarting_AX_$(ESCAPE_SQUOTE(STEPID))_Synchronously_Stop_AX_Service_on_DEVAOS2.txt', @flags=0 IF (@@ERROR <> 0 OR @ReturnCode <> 0) GOTO QuitWithRollback /****** Object: Step [Get status of AX Service on DEVAOS2] Script Date: 6/21/2017 1:49:30 PM ******/ EXEC @ReturnCode = msdb.dbo.sp_add_jobstep @job_id=@jobId, @step_name=N'Get status of AX Service on DEVAOS2', @step_id=2, @cmdexec_success_code=0, @on_success_action=3, @on_success_step_id=0, @on_fail_action=2, @on_fail_step_id=0, @retry_attempts=0, @retry_interval=0, @os_run_priority=0, @subsystem=N'PowerShell', @command=N'get-service -Name "AOS60`$01" -ComputerName "MyRemoteServer" | Format-Table -Property MachineName, Status, Name, DisplayName -auto', @database_name=N'master', @output_file_name=N'E:\Microsoft SQL Server\MSSQL11.RELEASE\MSSQL\Log\Test_stopping_and_restarting_AX_$(ESCAPE_SQUOTE(STEPID))_Get_status_of__AX_Service_on_DEVAOS2.txt', @flags=0 IF (@@ERROR <> 0 OR @ReturnCode <> 0) GOTO QuitWithRollback /****** Object: Step [Synchronously Start AX Service on MyRemoteServer] Script Date: 6/21/2017 1:49:30 PM ******/ EXEC @ReturnCode = msdb.dbo.sp_add_jobstep @job_id=@jobId, @step_name=N'Synchronously Start AX Service on MyRemoteServer', @step_id=3, @cmdexec_success_code=0, @on_success_action=1, @on_success_step_id=0, @on_fail_action=2, @on_fail_step_id=0, @retry_attempts=0, @retry_interval=0, @os_run_priority=0, @subsystem=N'PowerShell', @command=N'Invoke-Command -ComputerName "MyRemoteServer" -ScriptBlock{Get-Service -Name "AOS60`$01" | Start-Service}', @database_name=N'master', @output_file_name=N'E:\Microsoft SQL Server\MSSQL11.RELEASE\MSSQL\Log\Test_stopping_and_restarting_AX_$(ESCAPE_SQUOTE(STEPID))_Synchronously_Start_AX_Service_on_MyRemoteServer.txt', @flags=0 IF (@@ERROR <> 0 OR @ReturnCode <> 0) GOTO QuitWithRollback EXEC @ReturnCode = msdb.dbo.sp_update_job @job_id = @jobId, @start_step_id = 1 IF (@@ERROR <> 0 OR @ReturnCode <> 0) GOTO QuitWithRollback EXEC @ReturnCode = msdb.dbo.sp_add_jobserver @job_id = @jobId, @server_name = N'(local)' IF (@@ERROR <> 0 OR @ReturnCode <> 0) GOTO QuitWithRollback COMMIT TRANSACTION GOTO EndSave QuitWithRollback: IF (@@TRANCOUNT > 0) ROLLBACK TRANSACTION EndSave: How I can get the SQL Agent Job to run properly? A: There were two issues: 1) Note the word "allegedly" in this sentence in my original post: "The domain service account that runs the SQL Agent Service was allegedly granted the necessary permissions on MyRemoteServer by our Operations group." As it turns out, all of the required permissions had not been granted to the domain account that runs the SQL Server Agent service. 2) I took the advice of @NedOtter (and from various other blogs and Stack posts) and converted to using PowerShell through CmdExec. I don't know that this was necessary, but it sure seems to be the consensus on the way to go. I used two job steps, with the following in the @command parameters: C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe "Invoke-Command -ComputerName ''MyRemoteServer'' -ScriptBlock{Get-Service -Name ''AOS60$01'' | Stop-Service -Force}" C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe "Invoke-Command -ComputerName ''MyRemoteServer'' -ScriptBlock{Get-Service -Name ''AOS60$01'' | Start-Service}" These combine to synchronously stop and then start the service. I then inserted a job step in between that restores the databases in this test instance from my production backups.
Kinetic analysis of cytosolic pH regulation in alveolar macrophages: V-ATPase-mediated responses to a weak acid. Three different mechanisms interact to control the cytosolic pH (pHi) of alveolar macrophages (M phi), namely, plasmalemmal vacuolar-type H(+)-ATPase (V-ATPase), Na+/H+ exchange, and Na(+)-independent HCO3-/Cl- exchange. To investigate the activity of plasmalemmal V-ATPase in alveolar M phi, we developed a nonlinear mathematical model of pHi regulation that incorporates the biophysical determinants of pHi and the fluxes of individual acid-base equivalents. The model was used to analyze the acid-base responses of rabbit alveolar M phi to a weak acid (propionic acid) under conditions that favored V-ATPase-mediated effects (presence of 1 mM amiloride and nominal absence of CO2). The pHi was measured using the fluorescent probe, 2',7'-biscarboxethyl-5,6-carboxyfluorescein. M phi exposure to propionic acid caused a rapid fall in pHi. Recovery of pHi after acid loading varied directly with the magnitude of the acid load. Mathematical analyses showed that pHi recovery was hindered by persistent influx of propionic acid driven, in turn, by transporter-mediated H+ extrusion and propionate efflux. Eventually, a new steady state was established in which propionate and H+ were cycled out of the M phi and propionic acid was recycled into the cell. As a consequence, model predictions of the rate of V-ATPase-mediated H+ efflux were almost twice that estimated from experimental determinations of the initial rate of pHi recovery.
SHOP SUPPORT navigator v1 partsavailable in limited colours only Limited colours! Fabric parts for the navigator stroller are available in limited colours only. Unfortunately if we don't have the colour you are looking for, we are no longer manufacturing this colour - we're sorry!
Italian: benvenuto in questo video, vado sulla procedura di backup a Raspberry pi che esegue Raspbian desktop su una scheda SD, quindi se trovi questo video utile inserirò un link in descrizione dei prodotti che sto utilizzando Amazon e se ti piace mi aiuta fuori un po 'e non ti costa qualsiasi cosa in più inserirò anche un link la mia playlist di Raspberry Pi dove puoi trova così i miei altri progetti Raspberry Pi la configurazione che sto usando in questo momento è a Raspberry Pi 4 e in esso ho un 64 Gigabyte Sandisk micro SD card, quindi sono con una nuova istanza di Raspbian desktop Full Buster Edition ma questo potrebbe essere altrettanto facilmente il tuo desktop stai usando da 4 mesi, quindi lo sono andando a fare clic con il tasto destro sullo sfondo e Dirò un nuovo file e chiamerò semplicemente questo test questo è un test lo salverò quindi, dopo aver eseguito il backup, possiamo controlla la nuova immagine per assicurarti che abbia questo file, quindi ho intenzione di fare il backup French: bienvenue dans cette vidéo, je vais y aller sur la procédure de sauvegarde d'un Raspberry pi exécutant le bureau Raspbian sur une carte SD donc si vous trouvez cette vidéo utile, je vais mettre un lien dans le description des produits que j'utilise Amazon et si vous aimez ça m'aide un peu et ne vous coûte pas quelque chose de plus, je vais également mettre un lien vers ma liste de lecture Raspberry Pi où vous pouvez trouver mes autres projets Raspberry Pi afin la configuration que j'utilise en ce moment est un Raspberry Pi 4 et en elle j'ai un 64 gigaoctet Sandisk carte micro SD, donc je suis exécuter une toute nouvelle instance de Raspbian bureau le Full Edition Buster mais ce pourrait tout aussi bien être votre bureau vous utilisez depuis 4 mois donc je suis va faire un clic droit sur la toile de fond et Je dirai un nouveau fichier et j'appellerai ce test c'est un test que je vais sauver donc après avoir soutenu cela, nous pouvons vérifiez la nouvelle image pour vous assurer qu'elle a ce fichier, donc je vais soutenir English: welcome in this video I'm going to go over the procedure to back up a Raspberry pi running Raspbian desktop to an SD card so if you find this video helpful I'll put a link in the description to the products I'm using on Amazon and if you that like it helps me out a little bit and doesn't cost you anything extra I'll also put a link to my Raspberry Pi playlist where you can find my other Raspberry Pi projects so the setup I'm using right now is a Raspberry Pi 4 and in it I have a 64 gigabyte Sandisk micro SD card so I'm running a brand new instance of Raspbian desktop the Full Edition Buster but this could just as easily be your desktop you've been using for 4 months so I'm going to right click on the backdrop and I'll say new file and I'll just call this test this is a test I'll save that out so after we back this up we can check the new image to make sure it has this file so I'm going to be backing German: Willkommen in diesem Video, ich werde gehen über das Verfahren zum Sichern a Raspberry pi läuft Raspbian Desktop zu eine SD-Karte also, wenn Sie dieses Video finden hilfreich werde ich einen link in die setzen Beschreibung der Produkte, die ich verwende Amazon und wenn es dir gefällt, hilft es mir ein bisschen raus und kostet dich nicht Alles andere werde ich auch einen Link setzen meine Raspberry Pi Playlist wo du kannst finde meine anderen Raspberry Pi Projekte so Das Setup, das ich gerade verwende, ist a Raspberry Pi 4 und darin habe ich eine 64 Gigabyte Sandisk Micro SD Karte also bin ich Ausführen einer brandneuen Instanz von Raspbian Desktop der Full Edition Buster aber dies könnte genauso gut Ihr Desktop sein Sie verwenden seit 4 Monaten, also bin ich Klicken Sie mit der rechten Maustaste auf den Hintergrund und Ich sage neue Datei und rufe einfach an Dieser Test ist ein Test, den ich speichern werde raus, nachdem wir dies gesichert haben, können wir Überprüfen Sie das neue Bild, um sicherzustellen, dass es hat Diese Datei werde ich also unterstützen Spanish: bienvenido en este video voy a ir sobre el procedimiento para hacer una copia de seguridad de un Raspberry pi ejecutando el escritorio Raspbian para una tarjeta SD así que si encuentras este video útil voy a poner un enlace en el descripción de los productos que estoy usando en Amazon y si te gusta eso me ayuda un poco y no te cuesta cualquier cosa extra también pondré un enlace a mi lista de reproducción Raspberry Pi donde puedes encontrar mis otros proyectos de Raspberry Pi la configuración que estoy usando ahora es una Raspberry Pi 4 y en él tengo un 64 tarjeta Gigabyte Sandisk micro SD, así que estoy ejecutando una nueva instancia de Raspbian escritorio el Full Edition Buster pero esto podría ser fácilmente tu escritorio has estado usando durante 4 meses, así que estoy va a hacer clic derecho en el fondo y Diré nuevo archivo y simplemente llamaré esta prueba esta es una prueba voy a guardar eso así que después de respaldar esto podemos verifique la nueva imagen para asegurarse de que tenga este archivo, así que voy a estar respaldando French: jusqu'à un microSD Samsung de 32 gigaoctets carte de sorte que le système fonctionne actuellement sur une carte de 64 gigaoctets et je sauvegarde à une carte de 32 gigaoctets tant que vous avoir de la place sur votre carte SD, vous pouvez sauvegarde sur une carte plus petite tant que ça va tenir sur une carte de 32 gig donc je vais pour brancher mon lecteur de carte, j'utilise un transcender le lecteur de carte USB 3.0 et je suis va brancher cela dans l'USB Slot 3.0 et vous pouvez le faire sur les anciens Raspberry PI vous allez utiliser un Interface 2.0 si ce sera donc un peu plus lent donc il est dit amovible le média est inséré, je vais juste frapper annuler ici je clique dans la framboise icône de tarte en haut à gauche et je vais aux accessoires puis copieur de carte SD Je choisirai la copie de l'appareil et je choisissez le mmcblk0 c'est donc le carte micro SD interne puis la copie vers l'appareil est ce TS-RDF5-SD c'est le Transcender le lecteur maintenant nous avons cette option ici qui dit nouvelle partition UUIDs si vous voulez faire un absolu sauvegarde de sorte que vous allez prendre ce SD carte dire le coller dans un endroit sûr et alors si votre SD principal tombe en panne, vous irez German: Dies bis zu einer Samsung 32 Gigabyte microSD Karte, damit das System gerade läuft auf einer 64-Gigabyte-Karte und ich sichere auf eine 32-Gigabyte-Karte, solange Sie Haben Sie freien Platz auf Ihrer SD-Karte, die Sie können Backup auf eine kleinere Karte solange Es passt auf eine 32-Gig-Karte, also gehe ich Zum Anschließen meines Kartenlesers verwende ich a transzendieren USB 3.0 Kartenleser und ich bin Ich werde dies an den USB anschließen 3.0 Slot und Sie können dies auf älteren tun Himbeer-PIs, die Sie verwenden werden 2.0 Schnittstelle aber so wird es ein etwas langsamer, so heißt es abnehmbar Medien eingelegt Ich drücke einfach auf Abbrechen hier als nächstes klicke ich in die Himbeere Tortensymbol oben links und ich gehe zu Zubehör und dann SD-Kartenkopierer Ich werde Kopie vom Gerät auswählen und ich werde Wählen Sie das mmcblk0, damit dies das ist interne Micro-SD-Karte dann die Kopie auf Gerät ist dieses TS-RDF5-SD das ist das Transcend Reader, jetzt haben wir das Option hier unten, die neue Partition sagt UUIDs, wenn Sie eine absolute machen wollen Backup, damit Sie diese SD nehmen Karte sagen, kleben Sie es an einem sicheren Ort und Wenn dann Ihre Haupt-SD ausfällt, werden Sie gehen English: this up to a Samsung 32 gigabyte microSD card so the system currently is running on a 64 gigabyte card and I'm backing up to a 32 gigabyte card so long as you have spare room on your SD card you can backup to a smaller card as long as it'll fit on a 32 gig card so I'm going to plug in my card reader I'm using a transcend USB 3.0 card reader and I'm going to be plugging this into the USB 3.0 slot and you can do this on older Raspberry PI's you're gonna be using a 2.0 interface though so it'll be a little bit slower so it says removable media is inserted I'll just hit cancel here next I'll click up in the Raspberry pie icon in the upper left and I'll go to accessories and then SD card copier I'll choose copy from device and I'll choose the mmcblk0 so this is the internal micro SD card then the copy to device is this TS-RDF5-SD this is the Transcend reader so now we have this option down here that says new partition UUIDs if you want to make an absolute backup so you're going to take this SD card say stick it in a safe place and then if your main SD goes down you'll go Italian: fino a un microSD Samsung da 32 gigabyte scheda in modo che il sistema sia attualmente in esecuzione su una scheda da 64 gigabyte e sto eseguendo il backup a una carta da 32 gigabyte purché tu avere spazio libero sulla scheda SD che puoi eseguire il backup su una scheda più piccola purché si adatterà su una carta da 32 gig quindi sto andando per collegare il mio lettore di schede sto usando un trascendo il lettore di schede USB 3.0 e sono lo collegherà all'USB Slot 3.0 e puoi farlo su vecchi Raspberry PI stai usando un Interfaccia 2.0 però, quindi sarà un un po 'più lento, quindi dice rimovibile il supporto è inserito, premerò semplicemente Annulla qui dopo farò clic su nel Raspberry icona della torta in alto a sinistra e vado agli accessori e quindi alla copiatrice della scheda SD Sceglierò copia dal dispositivo e lo farò scegli mmcblk0 quindi questo è il scheda micro SD interna quindi copia dispositivo è questo TS-RDF5-SD questo è il Trascendi il lettore, quindi ora abbiamo questo opzione qui sotto che dice nuova partizione UUID se vuoi fare un assoluto backup in modo da prendere questa SD carta dire incollarlo in un luogo sicuro e quindi se la tua SD principale si abbassa andrai Spanish: esto hasta una microSD Samsung 32 gigabytes tarjeta por lo que el sistema se está ejecutando actualmente en una tarjeta de 64 gigabytes y estoy haciendo una copia de seguridad a una tarjeta de 32 gigabytes siempre que tener espacio libre en su tarjeta SD que pueda copia de seguridad en una tarjeta más pequeña siempre que cabe en una tarjeta de 32 conciertos, así que voy para conectar mi lector de tarjetas estoy usando un trascender el lector de tarjetas USB 3.0 y estoy va a enchufar esto al USB Ranura 3.0 y puede hacer esto en versiones anteriores Raspberry PI's vas a usar un Interfaz 2.0, así que será un un poco más lento, por lo que dice extraíble los medios están insertados, solo presionaré cancelar aquí a continuación haré clic en la Frambuesa icono de pastel en la esquina superior izquierda y voy a ir a accesorios y luego copiadora de tarjeta SD Elegiré copiar del dispositivo y voy a elija el mmcblk0 así que este es el tarjeta micro SD interna y luego la copia a dispositivo es este TS-RDF5-SD este es el Transcend lector así que ahora tenemos esto opción aquí abajo que dice nueva partición UUID si quieres hacer un absoluto copia de seguridad por lo que vas a tomar esta SD tarjeta de decir pegarlo en un lugar seguro y entonces si tu SD principal cae, irás German: Holen Sie es ab und legen Sie es in Sie können gehen Ihre UUIDs sind die gleichen, wenn Sie möglicherweise werden dieses Bild nehmen und bleiben es in einen zweiten Raspberry Pi und booten Von dort aus möchten Sie vielleicht eine neue UUID also werde ich es für diesen Fall verlassen deaktiviert und ich werde Start drücken Es heißt, alle Inhalte auf dem Gerät löschen TS-RDF5-SD Transcend sind Sie sicher, dass ich werde sag ja jetzt bereitet es es so na ja vor das wird tun, wird es tun Formatieren Sie es, damit die Partitionen alle kopieren die Dateien vorbei und dann haben Sie Ihre Backup Okay, es heißt, Kopie fertig, ich werde treffen Okay, ich werde das schließen und ich werde schließen runter den Raspberry Pi und ich werde den setzen SD-Karte, die wir gerade gemacht haben Okay, jetzt Wir werden auf dem Backup-Laufwerk gebootet, wenn Sie möchten wissen, wie viel Platz Sie haben Auf Ihrem Laufwerk können Sie ein Terminal öffnen und Sie können df -h eingeben und drücken Italian: recuperalo e mettilo dentro puoi andartene i tuoi UUID sono gli stessi se potenzialmente prendiamo questa immagine e restiamo fedeli in un secondo Raspberry Pi e avvio da lì, allora potresti volerne uno nuovo UUID quindi per questo caso lo lascerò deselezionato e premerò start dice cancellare tutti i contenuti sul dispositivo TS-RDF5-SD Trascendere sei sicuro che lo farò dì si ora lo sta preparando e allora questo sta per fare è formattalo per fare in modo che le partizioni copino tutto i file finiti e poi avrai il tuo di riserva va bene quindi dice che copia completa colpirò okay lo chiuderò e chiuderò giù il Raspberry Pi e metterò il Scheda SD che abbiamo appena realizzato all'interno ok adesso siamo avviati sull'unità di backup, quindi se vuoi sapere quanto spazio hai sul tuo disco puoi aprire un terminale e puoi digitare df -h e premere French: récupérer et le mettre, vous pouvez laisser vos UUID sont les mêmes si vous vont prendre cette image et coller dans un deuxième Raspberry Pi et démarrer à partir de là, alors vous voudrez peut-être un nouveau UUID donc pour ce cas, je vais le laisser décochée et je vais commencer il dit effacer tout le contenu de l'appareil TS-RDF5-SD Transcend êtes-vous sûr que je vais dire oui maintenant il se prépare donc ce cela va faire est que ça va formater les partitions copient tout les fichiers et puis vous aurez votre sauvegarde ok donc il dit copie complète, je vais frapper ok je vais fermer ça et je vais fermer sur le Raspberry Pi et je vais mettre le Carte SD que nous venons de créer à l'intérieur ok maintenant nous sommes démarrés sur le lecteur de sauvegarde, donc si vous voulez savoir combien d'espace vous avez sur votre lecteur, vous pouvez ouvrir un terminal et vous pouvez taper df -h et frapper Spanish: recuperarlo y ponerlo en usted puede salir sus UUID son iguales si potencialmente vamos a tomar esta imagen y pegarnos en un segundo Raspberry Pi y arrancar a partir de ahí, entonces es posible que desee un nuevo UUID así que para esta instancia lo dejaré desmarcado y presionaré inicio dice borrar todo el contenido en el dispositivo TS-RDF5-SD Transcend, ¿estás seguro de que voy a di que sí, ahora lo está preparando y qué esto va a hacer es que va a formatearlo hace que las particiones copien todo los archivos y luego tendrás tu apoyo bien, así que dice copia completa voy a golpear bien, cerraré esto y cerraré por la Raspberry Pi y pondré el Tarjeta SD que acabamos de hacer adentro ok asi que ahora estamos arrancados en la unidad de copia de seguridad así que si quieres saber cuánto espacio tienes en tu disco puedes abrir una terminal y puedes escribir df -h y presionar English: retrieve it and put it in you can leave your UUIDs the same if you potentially are going to take this image and stick it into a second Raspberry Pi and boot it from there then you might want a new UUID so for this instance I'll leave it unchecked and I'll hit start it says erase all contents on the device TS-RDF5-SD Transcend are you sure I'll say yes now it's preparing it so what this is going to do is it's going to format it make the partitions copy all the files over and then you'll have your backup okay so it says copy complete I'll hit okay I'll close this down and I'll shut down the Raspberry Pi and I'll put the SD card we just made inside okay so now we're booted on the backup drive so if you want to know how much space you have on your drive you can open up a terminal and you can type df -h and hit Spanish: entrar y aquí vemos que tenemos raíz de desarrollo dice que el tamaño es de 29 gigabytes y hemos Usamos 5.8 gigabytes y tenemos 22 disponible, por lo que es posible que desee hacer esto en su gran disco para asegurarse de que tiene suficiente espacio libre para que pueda copiarlo en un disco más pequeño si eso es lo que estás haciendo por supuesto, la forma más segura es conseguir un Tarjeta microSD más grande como unidad de respaldo entonces definitivamente podrás encajar su disco más pequeño, así que este es un técnica que puede usar para respaldar su toda la tarjeta microSD pero hay muchas otras formas de hacer una copia de seguridad puede usar rsync puedes usar compresión de alquitrán algoritmos cosas por el estilo, pero esto es solo una forma de hacerlo si tienes preguntas sobre esto por favor déjenlos en los comentarios si te gusta este video por favor haga clic como si no lo ha hecho suscrito a mi canal y aprecio si haces eso y gracias por mirar hasta la proxima despedida French: entrez et nous voyons ici que nous avons racine dev il dit que la taille est de 29 gigaoctets et nous avons utilisé 5,8 gigaoctets et nous avons 22 disponible, vous voudrez peut-être le faire sur votre grand lecteur pour vous assurer que vous avez assez d'espace libre pour pouvoir le copier sur un lecteur plus petit si c'est ce que tu fais bien sûr, le moyen le plus sûr est d'obtenir un carte microSD plus grande comme disque de sauvegarde alors vous pourrez certainement vous adapter votre petit lecteur sur c'est donc un technique que vous pouvez utiliser pour sauvegarder votre carte microSD entière mais il y en a beaucoup d'autres façons de sauvegarder, vous pouvez utiliser rsync vous pouvez utiliser la compression tar des algorithmes des choses comme ça, mais c'est juste une façon de le faire si vous en avez des questions à ce sujet s'il vous plaît laissez-les dans les commentaires si vous aimez cette vidéo veuillez cliquer comme si vous ne l'avez pas fait abonné à ma chaîne et apprécier si vous faites ça et merci d'avoir regardé jusqu'à la prochaine fois au revoir English: enter and here we see we have dev root it says size is 29 gigabytes and we've used 5.8 gigabytes and we have 22 available so you may want to do this on your large drive to make sure you have enough space free so you can copy it onto a smaller drive if that's what you're doing of course the safest way is to get a larger microSD card as your backup drive then you definitely will be able to fit your smaller drive on it so this is a technique you can use to back up your entire microSD card but there are many other ways to backup you can use rsync you can use tar compression algorithms things like that but this is just one way to do it if you have any questions about this please leave them in the comments if you like this video please click like if you haven't subscribed to my channel and appreciate if you do that and thanks for watching until next time goodbye German: Geben Sie ein und hier sehen wir, dass wir Dev Root haben Es heißt, die Größe beträgt 29 Gigabyte und wir haben verwendet 5,8 Gigabyte und wir haben 22 verfügbar, also möchten Sie dies möglicherweise am tun Ihr großes Laufwerk, um sicherzustellen, dass Sie haben genug Speicherplatz frei, damit Sie es kopieren können auf ein kleineres Laufwerk, wenn das was ist Sie gehen Natürlich ist der sicherste Weg, eine zu bekommen größere microSD-Karte als Backup-Laufwerk dann wirst du definitiv passen können Ihr kleineres Laufwerk darauf, also ist dies ein Technik, mit der Sie Ihre sichern können ganze microSD-Karte, aber es gibt viele Andere Möglichkeiten zum Sichern können Sie mit rsync verwenden Sie können die Teerkomprimierung verwenden Algorithmen solche Dinge, aber das ist Nur eine Möglichkeit, dies zu tun, wenn Sie welche haben Fragen dazu bitte hinterlassen in den Kommentaren, wenn Ihnen dieses Video gefällt Bitte klicken Sie auf "Gefällt mir", wenn Sie dies nicht getan haben habe meinen Kanal abonniert und schätze wenn du das tust und danke fürs zuschauen bis zum nächsten mal auf wiedersehen Italian: entra e qui vediamo che abbiamo root root dice che la dimensione è di 29 gigabyte e abbiamo usato 5,8 gigabyte e ne abbiamo 22 disponibile quindi ti consigliamo di farlo il tuo grande disco per assicurarti di averlo abbastanza spazio libero in modo da poterlo copiare su un'unità più piccola, se è questo stai facendo ovviamente il modo più sicuro è quello di ottenere un scheda microSD più grande come unità di backup allora sarai sicuramente in grado di adattarti il tuo disco più piccolo, quindi questo è un tecnica che puoi usare per eseguire il backup di intera scheda microSD ma ce ne sono molte altri modi per eseguire il backup è possibile utilizzare rsync puoi usare la compressione tar algoritmi cose del genere ma questo è solo un modo per farlo se ne hai domande su questo per favore lasciateli nei commenti se ti piace questo video per favore clicca come se non l'hai fatto si è iscritto al mio canale e lo apprezzo se lo fai e grazie per aver guardato alla prossima arrivederci
INTRODUCTION ============ Since the first clinical study in 1995, the clinical implications of ultrasound (US)-guided percutaneous radiofrequency (RF) ablation for the treatment of hepatocellular carcinoma (HCC) and liver metastasis have expanded ([@B1][@B2][@B3]). Currently, RF ablation is recognized as a curative modality for early-stage HCC, the outcomes of which are comparable with those of surgical resection, as evidenced by many studies ([@B1][@B2][@B3][@B4][@B5]). RF ablation for liver tumors is widely performed because of its ease of use, relatively low cost, short hospitalization time, and minimal invasiveness ([@B6]). Furthermore, major complications of hepatic RF ablation have been reported as occurring rarely, ranging between 2% and 3%, and complications were less observed in cases of HCC (1.8%) as opposed to metastasis (5.8%) ([@B7][@B8][@B9]). Although the treatment algorithms differ slightly among nations, RF ablation is basically recommended for patients with three or fewer HCCs that are 3 cm in diameter or smaller who are contraindicated for surgery ([@B10]). The local recurrence rate after RF ablation for HCCs ranged from 1.7% to 41% ([@B11]). Local recurrence appears to arise from incompletely treated viable tumors, satellite tumor nests, and microscopic vascular invasion ([@B12][@B13]). Although local tumor progression can occur even after successful RF ablation, local recurrence rates differ significantly between patients with and without an adequate safety margins ([@B14][@B15]). Therefore, when performing RF ablation, it should be the ultimate goal of the procedure to ensure a sufficient ablative margin in all directions that surround the index tumor in order to reduce the local recurrence rate. Further, it is also important for the operator to complete the procedure with no complications even in challenging settings. In this article, we discuss and illustrate technical strategies to minimize complications and treatment failures of RF ablation on the basis of a review of the literature and our experience. Technical Strategies for Safe RF Ablation ========================================= Although RF ablation is widely performed to treat liver tumors, most if not all radiologists who are asked to perform percutaneous US-guided RF ablation have a single major concern: how to successfully perform RF ablation with no complications. There are a number of strategies that might be helpful for preventing complications during the procedure ([Table 1](#T1){ref-type="table"}). Thermal Injury to Non-Targeted Organs ------------------------------------- When a tumor is located near heat-vulnerable organs, such as the gastrointestinal tract or the diaphragm, it is not straightforward to successfully perform RF ablation because of the risk of collateral thermal damage to the adjacent organs. Further, if an index tumor is situated in the hepatic dome, the visualization of the tumor with US is obscured by the lung ([@B16]). To overcome these difficulties, artificial ascites (AA) can be effectively used. Indeed, the AA method is safe and practical when performing RF ablation for tumors adjacent to heat-vulnerable organs because it can separate the RF ablation zone from the adjacent organs and improve the visibility of an index tumor ([@B17][@B18]). If AA is difficult in cases with peritoneal adhesion because of prior surgery, artificial pleural effusion may be an alternative to improve the sonic window when performing RF ablation for an index tumor in the hepatic dome ([@B19][@B20]). However, in contrast with AA, artificial pleural effusion cannot protect the diaphragm from collateral thermal injury ([@B21]). ### Steps to Make Artificial Ascites In order to obtain safe access to the peritoneal space, the Seldinger technique is used. First, a relevant route for AA should be selected according to the tumor location. After the optimal route is chosen, the peritoneal cavity is punctured with an 18-gauge sheathed needle under US guidance. After a stylet is removed, a round-tipped guidewire is advanced through the lumen of the hollow needle while the patient breathes shallowly. Finally, a 4- to 6-French angiosheath is inserted along the guidewire into the peritoneal space for the infusion of 500-1000 mL of 5% dextrose solution ([@B17]). ### Infusion Routes of Artificial Ascites One of four different infusion routes may be selected according to the location of hepatic tumors ([Fig. 1](#F1){ref-type="fig"}). If a tumor is located in the right lobe and segment 4, a perihepatic route through the right 7-8 intercostal space or a sub-hepatic route below the hepatic angle along the anterior axillary line is recommended ([Fig. 2](#F2){ref-type="fig"}). If a tumor is found within segments 2, 3, and 4 abutting the diaphragm, a sub-xiphoid (sub-phrenic) route is appropriate for AA. If a tumor is located in segments 2 and 3 abutting the stomach, a gastrohepatic (lesser sac) route may be chosen ([Fig. 3](#F3){ref-type="fig"}). Based on our experience, the infused fluid via a gastrohepatic route tends to flow into another peritoneal space, such as the sub-hepatic space, without fluid retention in the lesser sac. Therefore, in cases when a gastrohepatic route is used, an angiosheath needs to be inserted around the tumor, and fluid should be continuously infused during RF ablation. ### Tips to Enhance the Role of Artificial Ascites Even when AA infusion is performed successfully, hydro-dissection may not be sufficient to prevent potential thermal injury. In such cases, leverage (lifting) can be helpful for widening the distance between the target tumor and the surrounding organs. If the handle of the needle is tilted in the caudal direction after an electrode is placed in the tumor, the liver moves toward the cranial direction ([Fig. 4](#F4){ref-type="fig"}). This leverage effect, in turn, may allow for a wider gap between the ablation zone and the heat-vulnerable organs and can lead to a successful procedure ([Fig. 5](#F5){ref-type="fig"}). Although AA plays a role as an effective thermal barrier, it is also important to adjust the ablation time by stopping the procedure when microbubbles generated around the needle tip abut on the extrahepatic organs in order to minimize collateral damage ([@B22]). Vascular Complications ---------------------- Bleeding usually results from mechanical damage to the vessels during electrode placement, especially in patients with coagulopathy ([@B9][@B23]). A serum platelet count of 50000/µL and an international normalized ratio of 1.5 are often used as threshold values for performing RF ablation ([@B24]). Therefore, at our institution, common coagulation tests, including prothrombin time, activated partial thromboplastin time and platelet count, are routinely performed before the procedure. To minimize the risk of bleeding, the procedure needs to be postponed until corrective measures including platelet and fresh frozen plasma transfusions are taken ([@B9]). In addition, there are a number of tips for reducing vascular complications, which include avoiding vascular transgression, minimizing the number of electrodes that are repositioned, traversing sufficient normal hepatic parenchyma before reaching the tumor, and ablating the needle tract after the procedure ([@B7][@B24]). Given that the liver is much more movable in the craniocaudal direction during deep breathing than shallow breathing, the risk of a tear of the hepatic parenchyma could be increased during needle placement if patients breathe deeply. Thus, we recommend performing RF ablation when patients breathe shallowly. In any case, deep breathing should be avoided during electrode placement, especially if the trajectory of the electrode is not perpendicular to the liver parenchyma. Occasionally, vascular insults to the intercostal vessels may occur ([@B9]). The intercostal vessels only run along the inferior margin in the posterior arc of the rib, whereas the vessels run along both the superior and inferior margins in the anterior arc of the rib. Therefore, when using an intercostal approach, an electrode should cautiously penetrate through the middle portion of the intercostal space to avoid penetrating the vessels. Biliary Complications --------------------- Bile duct injury can result from direct mechanical trauma during needle placement or thermal damage, which may lead to bile leakage, bile peritonitis, hemobilia, cholangitis, biliary stricture, biloma, or biliary fistula ([@B9]). RF ablation for tumors that are close to the hepatic hilum may be at risk of injuring adjacent bile ducts ([@B25]). This is because the risk of injury to the central bile ducts is directly proportional to efforts to overcome the heat-sink effect of the larger vessel around the central mass ([@B7]). Thus, the operator should strike a balance between the potential risk of bile duct injury and the extent of the RF ablation zone. A minimum distance of 5 mm or more between the electrode tip and the bile ducts is usually required for preventing severe and irreversible bile duct injury ([@B26]). Ogawa et al. ([@B27]) described that cooling the bile ducts with an endoscopic nasobiliary drainage tube was an effective way to prevent biliary complications during RF ablation. Tumor Seeding ------------- Tumor seeding is a rare but feared complication of RF ablation ([@B9][@B23]). According to previous reports, the overall risk of needle tract seeding ranged between 0.2% and 2.8% ([@B7][@B8][@B28][@B29]). The risk factors for neoplastic seeding include use of a large-gauge electrode, multiple punctures, poor tumor differentiation, subcapsular tumors, and a high alpha-fetoprotein level ([@B9][@B29][@B30][@B31]). Potential strategies to reduce the risk of tumor seeding include minimizing the number of punctures and repositioning the electrode and traversing the normal hepatic parenchyma as much as possible before accessing the tumor ([@B9]). Cauterizing the needle tract upon completion of the procedure may be an option for preventing needle tract seeding ([@B29]). In addition, to prevent transportal spread by sudden rupture (popping) of an exophytic tumor during the procedure, gradually increasing the RF energy is needed ([@B23]). Technical Strategies for Complete RF Ablation ============================================= There are many causes for incomplete RF thermal ablation, including both technical factors related to the procedure and biological aspects of the index tumor ([@B9]). Given that ablation zones with ablative margins less than 5 mm from the tumor border are significantly associated with local tumor progression ([@B15]), it is crucial to obtain a sufficient ablative margin in order to minimize local tumor progression. A number of investigators have suggested that the location and shape of the tumors are closely related to treatment outcomes ([@B6][@B22][@B23][@B32][@B33][@B34][@B35]). For example, RF ablation for tumors in close proximity to large vessels might often lead to insufficient ablation owing to a heat-sink effect ([@B22]). It has been considered technically challenging to perform the procedure for central tumors adjacent to the hepatic hilum because of the risk of traversing large vessels and central bile ducts ([@B9]). Thus, in these difficult settings, various technical strategies should be used to overcome the possibility of treatment failure, by which RF ablation can be performed successfully, even for index tumors in high-risk locations ([Table 1](#T1){ref-type="table"}). Tumors with Poor Conspicuity under Conventional US -------------------------------------------------- Although among the various imaging modalities including US, CT, MR imaging and fluoroscopy, US is most widely used for guiding RF ablation because of its numerous strengths, the procedure may not be feasible when the index tumor is too inconspicuous to be localized with conventional gray-scale US. In this situation, fusion imaging guidance and contrast-enhanced US can be used to enhance the conspicuity of the index tumor ([@B21]). Fusion imaging guidance makes use of real-time US coupled with CT or MR images. This technique is especially useful for targeting small index tumors that are not clearly seen under conventional US. Indeed, a fusion imaging technique allows the operator to perform the procedure with higher confidence because the anatomic information from CT or MR imaging is simultaneously displayed on real-time US images ([Fig. 6](#F6){ref-type="fig"}) ([@B21][@B36][@B37]). Contrast-enhanced US is also effective for guiding RF ablation in cases that are not highly visible with conventional US. Using this technique, the operator can detect the index tumor by imaging findings such as hyper-enhancement in the arterial phase or defects in the background of enhanced liver in the post-vascular phase ([@B21][@B38][@B39]). Tumors Abutting the Large Vessel -------------------------------- Local tumor progression after RF ablation is closely related to the presence of vessels that are at least 3 mm in size and contiguous to the tumor because of the heat-sink effect from blood flow ([@B34][@B40]). In addition, during RF ablation for perivascular tumors, there may be increased risk of vascular complications ([@B41]) because vessels could be damaged directly by the electrode and indirectly by the heat induced inside the tumor. Thus, a number of strategies to increase the ablation zone by minimizing the heat-sink effect have been developed for when the tumor is near large vessels. These include RF ablation combined with transcatheter arterial chemoembolization, RF ablation using multiple overlapping, using large electrodes and a more powerful generator, dual switching monopolar RF ablation using separable clustered electrodes, and \"parallel\" targeting ([@B6][@B12][@B41][@B42][@B43][@B44][@B45][@B46]). ### \"Parallel\" Targeting \"Parallel\" targeting is a method in which a needle electrode is inserted near a large vessel\'s lumen parallel to the vessel wall in order to enlarge the contact surface between the ablation zone and the vessel, which may lead to a wider ablation zone ([Fig. 7](#F7){ref-type="fig"}) ([@B6]). Parallel targeting along the large vessel may reduce the heat-sink effect and, in turn, produce the confluent shape of the ablation zone. Indeed, in order to overcome the heat-sink effect, an electrode needs to be positioned as close as possible to the large vessels that are in contact with the tumor ([@B33]). However, it might be impractical in cases when the tumor encases a large vessel or is adjacent to multiple large vessels. Tumors That Have a Fusiform Shape --------------------------------- If the shape of an index tumor is ovoid, the straight cooled-tip electrode should be placed along the long axis of the mass rather than its short axis because the electrode frequently makes an ablation zone elliptical ([@B32]). Thereby, the number of punctures during the procedure can be decreased while securing a sufficient ablation zone. Tumors That Show Exophytic Growth --------------------------------- With subcapsular tumors that grow exophytically from the liver, it may be difficult to obtain complete ablation. A useful strategy for successful ablation of an exophytic tumor is to ablate the intrahepatic portion first, thus obstructing the blood supply to the exophytic portion, which should be ablated second ([@B32]). Tumors in the Caudate Lobe -------------------------- Radiofrequency ablation of liver tumors located in the caudate lobe is technically feasible, despite the deep location and proximity to the major vessels and central bile ducts ([@B33]). However, it is still a heavy burden for operators to perform the procedure for index tumors in the caudate lobe for the following reasons: Firstly, given the anatomically deep-seated position of the caudate lobe, it is challenging to maneuver an electrode with a long trajectory. Secondly, there are major vessels surrounding the caudate lobe, such as the inferior vena cava and the central right portal vein, that make it difficult to plan the needle tract in order not to injure central vessels. In this regard, \"bypass\" targeting may be useful for successful treatment without puncturing vessels. ### \"Bypass\" Targeting Large vessels and central bile ducts that are located in front of a liver tumor become obstacles for targeting the index tumor using a needle electrode. In such cases, RF ablation can be considered technically impossible to perform from an operator\'s viewpoint. However, \"bypass\" targeting may be a solution. Bypass targeting is a method that helps in placing a needle electrode without puncturing any large vessels or intrahepatic bile ducts that are adjacent to an index tumor. This technique takes advantage of the structural flexibility of the liver and can be accomplished by bending the trajectory of the straight electrode into a gentle curved shape. Indeed, this method could make it possible to insert a needle into target lesions nearly anywhere in the liver without traversing large vessels ([Fig. 8](#F8){ref-type="fig"}). However, it may still be limited in cases with severe cirrhotic changes or a narrow gap between the index tumor and obstacles. CONCLUSION ========== Ultrasound-guided percutaneous RF ablation has been widely used for HCCs and metastases in the liver, and it can achieve overall and disease-free survival rates that are comparable with those of surgery for patients with early-stage HCC. In order to reduce local recurrence rates after RF ablation, it is of utmost importance to ensure a sufficient ablative margin. However, when index tumors are in high-risk locations within the liver, the procedure may result in undesirable complications followed by insufficient treatment. To overcome these challenges, operators should be familiar with multiple technical strategies, such as AA, needle track ablation, fusion imaging guidance, parallel targeting, and bypass targeting. These methods may be quite helpful for overcoming technical difficulties related to the location and shape of the tumors as well as for safely completing the procedure. Thereby, RF ablation can be successfully performed with curative intent. We thank Shin Il Kim, PhD and Joon Yeon Kim, PhD of Chonnam National University (Hwasun) Hospital for their support in performing RF ablation. This study was supported by a grant (HCRE13057-7) from Dongkook Pharmaceutical. ![Schematic illustration shows four different routes for artificial ascites (AA) infusion.\ Perihepatic, sub-hepatic, sub-xiphoid (sub-phrenic), and gastrohepatic (lesser sac) routes can be selectively used for AA infusion based on location of hepatic tumors (T).](kjr-16-1226-g001){#F1} ![RF ablation using AA via sub-hepatic route in 44-year-old man.\ **A.** Longitudinal US image shows hypoechoic HCC (arrows) in segment 6 near ascending colon (arrowhead). **B.** Longitudinal US image demonstrates inserted angiosheath (arrowhead) and AA (asterisk) in sub-hepatic space. **C.** Longitudinal US image during RF ablation depicts transient hyperechoic ablation zone (asterisk), needle electrode (arrow), and angiosheath (arrowhead). **D.** Immediate follow-up contrast-enhanced CT image reveals low-attenuated RF ablation zone (asterisk) that sufficiently covers index tumor as well as intact adjacent colon (arrowhead). AA = artificial ascites, HCC = hepatocellular carcinoma, RF = radiofrequency, US = ultrasound](kjr-16-1226-g002){#F2} ![RF ablation using AA method via gastrohepatic (lesser sac) route in 63-year-old woman.\ **A.** Sagittal US image depicts hypoechoic HCC (arrows) in segment 3 near stomach (S). **B.** Photograph shows inserted angiosheath (arrowhead) through gastrohepatic route and needle electrode into target tumor. **C.** Sagittal US image during procedure demonstrates transient hyperechoic cloud (asterisk) and AA (arrow) in lesser sac between liver and stomach (S). **D.** Immediate follow-up contrast-enhanced CT image reveals low-attenuated RF ablation zone (asterisk) that sufficiently covers index tumor as well as intact adjacent gastric wall (arrow). AA = artificial ascites, HCC = hepatocellular carcinoma, RF = radiofrequency, US = ultrasound](kjr-16-1226-g003){#F3} ![Schematic illustrations show mechanism of leverage (lifting) method.\ **A.** Schematic illustration depicts insufficient hydrodissection between target tumor (T) and adjacent colon (C) after artificial ascites infusion. **B.** Schematic illustration demonstrates caudal tilting of distal end (handle) of needle electrode by which gap between index tumor (T) and abutting colon (C) is widened.](kjr-16-1226-g004){#F4} ![RF ablation using leverage (lifting) method in 73-year-old man.\ **A.** Longitudinal US image depicts index tumor with mixed echogenecity (arrows) in segment 6. There is still narrow gap (arrowhead) between tumor and colon (C) even after AA (asterisk) infusion. **B.** Longitudinal US image during procedure shows that gap (arrowhead) between RF ablation zone (asterisk) and colon (C) is not wide enough to prevent possible thermal damage to colon. Arrow indicates electrode. **C.** Photograph demonstrates caudal tilting of distal end of electrode by hand (arrow) (leverage method). **D.** Longitudinal US image during RF ablation shows wider gap (arrowhead) between RF ablation zone (asterisk) and colon (C) that is generated by leverage method. Note less steep slope of electrode (arrow) compared with that shown in **B**. **E.** Immediate follow-up contrast-enhanced CT image shows low-attenuated RF ablation zone (asterisk) that sufficiently covers tumor and intact adjacent colon (arrowhead) that is surrounded by infused AA. AA = artificial ascites, RF = radiofrequency, US = ultrasound](kjr-16-1226-g005){#F5} ![RF ablation under fusion imaging guidance in 67-year-old man with 2.1 cm HCC.\ **A.** Gadoxetic acid-enhanced axial arterial-phase T1-weighted image shows enhancing mass (arrow) in segment 7 of liver. **B.** Index tumor is not clearly seen on conventional gray-scale US image. HCC = hepatocellular carcinoma, RF = radiofrequency, US = ultrasound **C.** RF ablation was performed using fusion imaging technique (volume navigation, GE Healthcare). Fused image (left) and its corresponding MR image (right) during procedure show index tumor (T) and transient hyperechoic microbubbles (asterisk). **D.** Immediate follow-up contrast-enhanced CT image depicts low-attenuated RF ablation zone (asterisk), which sufficiently covers index tumor (arrowhead). HCC = hepatocellular carcinoma, RF = radiofrequency](kjr-16-1226-g006){#F6} ![RF ablation using parallel targeting along large vessel in 50-year-old man.\ **A.** Gadoxetic acid-enhanced axial hepatobiliary-phase T1-weighted image shows metastasis (arrow) from rectal cancer in segment 7 abutting right hepatic vein (arrowhead). **B.** Intercostal US image depicts hypoechoic metastasis (arrowhead) abutting right hepatic vein (arrow), which can potentially cause heat-sink effect during RF ablation. **C.** Intercostal US image during procedure demonstrates needle (arrow) in parallel to right hepatic vein (arrowhead) in order to enlarge contact surface between ablation zone and vessel. **D.** Immediate follow-up contrast-enhanced CT image shows elongated low-attenuated RF ablation zone (asterisk) along right hepatic vein (arrowhead), which sufficiently covers index tumor, as well as intact right hepatic vein. RF = radiofrequency, US = ultrasound](kjr-16-1226-g007){#F7} ![RF ablation using bypass targeting technique in 66-year-old man.\ **A.** Pre-RF ablation contrast-enhanced CT image shows HCC (curved arrow) in segment 1 near main portal vein and inferior vena cava (IVC) and right portal vein (arrowhead) on expected approach path (dotted arrow) of electrode. **B.** Intercostal US image demonstrates hypoechoic HCC (curved arrow) between main portal vein and IVC in segment 1. Note that right portal vein (arrowhead) blocks approach path for needle insertion into index tumor. **C.** Contrast-enhanced CT image obtained from 5 mm below level of **A** depicts safe approach path (dotted arrow) without traversing right portal vein. **D.** Serial schematic illustrations show process of placing electrode while bypassing large vessel in front of target tumor using structural flexibility of liver. HCC = hepatocellular carcinoma, RF = radiofrequency, US = ultrasound **E.** Intercostal US image during procedure shows that electrode (arrowhead) is safely placed within index tumor (arrow) using bypass targeting without puncturing right portal vein. **F.** Immediate follow-up contrast-enhanced CT image reveals low-attenuated RF ablation zone (asterisk) and intact right portal vein (arrowhead) with no signs of penetration by electrode. RF = radiofrequency, US = ultrasound](kjr-16-1226-g008){#F8} ###### Technical Tips for Safe and Complete RF Ablation ![](kjr-16-1226-i001) Technical Tips Desired Effects ----------------------------------------------------------- --------------------------------------------------------- Tips for safe RF ablation  Artificial ascites technique To prevent thermal injury to heat-vulnerable organs  To perform procedure when patients breathe shallowly To decrease risk of tear of hepatic parenchyma  Cooling of bile ducts with nasobiliary drainage tube To minimize biliary complications  Needle track ablation technique To reduce tumoral seeding along needle tract  Gradual increase of RF energy To avoid transportal spread by popping of index tumors Tips for complete RF ablation  Fusion imaging of US with CT/MR imaging Correct targeting of index tumors with poor conspicuity  Parallel targeting Wider ablation zone in tumors abutting large vessel  Placement of needle along long axis of tumor Complete ablation of fusiform tumors  To ablate intrahepatic portion first for exophytic tumor Successful ablation of exophytic tumors  Bypass targeting Complete ablation of index tumors in caudate lobe RF = radiofrequency, US = ultrasound
/* generated by Svelte vX.Y.Z */ import { SvelteComponent, append, detach, init, insert, noop, safe_not_equal, svg_element, text } from "svelte/internal"; function create_fragment(ctx) { let svg; let title; let t; return { c() { svg = svg_element("svg"); title = svg_element("title"); t = text("a title"); }, m(target, anchor) { insert(target, svg, anchor); append(svg, title); append(title, t); }, p: noop, i: noop, o: noop, d(detaching) { if (detaching) detach(svg); } }; } class Component extends SvelteComponent { constructor(options) { super(); init(this, options, null, create_fragment, safe_not_equal, {}); } } export default Component;
/*! \page License * Copyright (C) 2009, H&D Wireless AB All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * * 3. The name of H&D Wireless AB may not be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY H&D WIRELESS AB ``AS IS'' AND ANY EXPRESS OR IMPLIED * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE EXPRESSLY AND * SPECIFICALLY DISCLAIMED. IN NO EVENT SHALL ATMEL BE LIABLE FOR ANY DIRECT, * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /*! * \file lwIP setup code * * \brief Collects the lwIP setup code that an application has to * execute in a standalone environment. * * \author H&D Wireless AB \n * */ #include <lwip/init.h> #include <lwip/dhcp.h> #include <lwip/tcp.h> #include <ipv4/lwip/ip_frag.h> #include <netif/etharp.h> #include <netif/wlif.h> #include <timer.h> #include "lwip_setup.h" #include "lwip/dns.h" /** * */ static void tcp_tmr_cb(void *ctx) { tcp_tmr(); } /** * */ static void ip_tmr_cb(void *ctx) { ip_reass_tmr(); } /** * */ static void dns_tmr_cb(void *ctx) { dns_tmr(); } /** * */ static void etharp_tmr_cb(void *ctx) { etharp_tmr(); } /** * */ static void dhcp_fine_tmr_cb(void *ctx) { dhcp_fine_tmr(); } /** * */ static void dhcp_coarse_tmr_cb(void *ctx) { dhcp_coarse_tmr(); } int start_ip_stack(struct net_cfg *cfg, struct ip_addr ipaddr, struct ip_addr netmask, struct ip_addr gw) { if (cfg->dhcp_enabled) { IP4_ADDR(&gw, 0,0,0,0); IP4_ADDR(&ipaddr, 0,0,0,0); IP4_ADDR(&netmask, 0,0,0,0); } /* add wl to lwip interface list and set as default */ cfg->netif = netif_add(cfg->netif, &ipaddr, &netmask, &gw, NULL, wlif_init, /* init */ ethernet_input /* handles ARP and IP packets */); if (cfg->netif == NULL) return -1; netif_set_default(cfg->netif); /* register lwip timer callbacks for tcp, arp and dhcp protocols */ timer_sched_timeout_cb(5000, TIMEOUT_PERIODIC, etharp_tmr_cb, NULL); timer_sched_timeout_cb(TCP_TMR_INTERVAL, TIMEOUT_PERIODIC, tcp_tmr_cb, NULL); timer_sched_timeout_cb(DHCP_FINE_TIMER_MSECS, TIMEOUT_PERIODIC, dhcp_fine_tmr_cb, NULL); timer_sched_timeout_cb(DHCP_COARSE_TIMER_MSECS, TIMEOUT_PERIODIC, dhcp_coarse_tmr_cb, NULL); timer_sched_timeout_cb(IP_TMR_INTERVAL, TIMEOUT_PERIODIC, ip_tmr_cb, NULL); timer_sched_timeout_cb(DNS_TMR_INTERVAL, TIMEOUT_PERIODIC, dns_tmr_cb, NULL); return 1; }
Aberrant GRK6 promoter methylation is associated with poor prognosis in hypopharyngeal squamous cell carcinoma. Hypopharyngeal squamous cell carcinoma (HSCC) is one of the most common head and neck cancers with high invasiveness and poor prognosis. To identify targeted therapeutics against metastasis, a better understanding of the regulation of HSCC cell invasion is needed. In recent years, G protein-coupled receptor kinases (GRKs) have been implicated in cancer metastasis through phosphorylation of the activated form of G protein coupled receptors (GPCRs). However, there is little information regarding GRKs expression in HSCC. In the present study, we examined GRK6 expression in HSCC and also assessed the possible cause of its aberrant expression, as well as its clinical significance. Real-time quantitative PCR (qPCR) and western blotting were performed to analyze the expression of GRK6 in HSCC tissues and corresponding non-malignant tissues. Subsequently, paired HSCC and corresponding non-malignant tissues were evaluated for the methylation status of GRK6 gene promoter using methylation-specific PCR (MSP). Furthermore, we investigated the methylation status and the clinicopathological significance of GRK6 in 45 paired HSCC and corresponding non-malignant tissues. The suppression of GRK6 in hypopharyngeal cell line FaDu by GRK6-shRNA lentivirus transfection was utilized to detect the role of GRK6 in hypopharyngeal cancer progression. Our results showed that the expression of GRK6 mRNA and protein was significantly lower in HSCC than in corresponding adjacent non-tumor tissues, and this downregulation was found to be in accordance with aberrant methylation of the gene. Hypermethylation of the gene was observed in 77.8% (35/45) of the HSCC tissues, while it was found in only 42.2% (19/45) of the corresponding non-malignant tissues. GRK6 methylation was related to depth of tumor invasion and TNM stage. Upon treatment with 5-aza-2'-deoxycytidine, GRK6 expression was upregulated in FaDu cells, and cell invasion was signinficantly inhibited. Furthermore, the suppression of GRK6 by shRNA transfection enhanced FaDu cells invasion. Our results indicate that the aberrant methylation of GRK6 gene promoter may underlie its downregulation in HSCC, and may play an important role in the metastasis of HSCC.
You are here Pages of the Past 120 Years Ago Jan. 12, 1894 Monday was the day that taxes became due and payable, and the quickness to which people responded is remarkable. More taxes were paid into the treasury the first three days than occurs in prosperous times. Usually the people wait until the last day of grace before settling taxes, but this does not seem to be the idea this year. The first day, twenty-six receipts were made out by the treasurer. The total collections the first three days were as follows: Monday, $500; Tuesday, $747; Wednesday, $989.69. • • • Last Monday, the county treasurer remitted to O.A. Bowen, state treasurer, the state taxes collected in this county during the third quarter ending Dec. 31, 1893: State general fund, $68.96; military fund, $6.05; interest fund, $2.67 — total $77.68. 100 Years Ago Jan. 9, 1914 DAMAGE BY FLOODS Five Days of Rainfall puts Rivers on Rampage Not since the big flood the last week in November, 1909, has the Chehalis River at this city reached such a high mark as it did Wednesday, when at high tide the water lacked but two feet of being on the level with the Northern Pacific depot platform. The rainfall, which began Saturday evening and continued with scarcely a minute’s pause for five days, yesterday morning totaled 9 ½ inches and has been general all over the North Pacific coast. The rainstorm was accompanied by a wind storm that at a number of points, and particularly along the beach, has worked great havoc. The chief sufferers from the storm have been ranchers of the lowlands and the railroads. All of the residents of the Chehalis bottoms have been forced to move out their stock and families, and railroad companies have been busy trying to keep uninterrupted train service to the Harbor. The Oregon-Washington line from Centralia to Aberdeen has suffered the greatest damage and their trains on Wednesday were detoured over the Northern Pacific. Slides at Preachers Slough and Balch and a washout near Independence caused the trouble. The Northern Pacific has had trouble at Sherlock with slides and the fore part of the week was routing the Harbor trains from the Sound via Centralia. Wednesday noon two hundred feet of their track near the Chehalis boom was washed out and no trains came up or went down to Aberdeen until about 8 p.m., when the break was repaired. The railroad bridges on the Satsop and Wynooche were threatened for a time but prompt work saved them from going out. The severe storm on the coast has wrecked the old Moclips Hotel and done some other damages to the summer resort. The waves ran mountain high and swept over the beach with destructive force. All was cut off the first of the week and not until Tuesday evening did a train attempt to go down over the beach line. Early rumors reported Moclips entirely destroyed, but the storm was not so severe as the one of last November. 75 Years Ago Jan. 12, 1939 Dr. Kent W. Berry, Olympia and former Montesano physician; William K. McAloon, former Montesano night marshal; James Reddick, Olympia taxi driver, and Robert H. Smith, Brady farmer, were sentenced by Superior Judge John M. Wilson of Olympia on Monday to serve life terms in the state penitentiary for kidnapping Irving Baker August 19 last. In addition, Berry, McAloon and Reddick were sentence to 20 years and Smith to 10 years for second degree assault in connection with the same crime. The four were convicted of abducting Baker, then an Olympia automobile dealer, from his home. Berry beat him and tortured him with pliers. He asserted in justification that Baker had attacked Mrs. Elizabeth Berry, 27 year old wife of the more than 50-year-old physician. Judge Wilson denied requests for suspended sentence in the assault case for Smith. He also refused requests to have Smith and McAloon removed to the county jail here; Smith so that he might be separated from Berry, with whom, it was stated his relations are strained, and McAloon to be near his home. Smith and Reddick protested their convictions and urged the calling of a grand jury to investigate alleged official activity in the case. • • • More Butter Use Urged An appeal to housewives for the use of more butter in the family diet during the week of January 12 to 18 was issued this week by E.W. Van Tassell, chairman of the state dairymen association’s committee on marketing. “If every family would use an extra pound of butter during the coming week, a substantial decrease in surplus butter stocks would result.” Van Tassell declared. “Since butter prices control the price of whole milk, and the farmer is dependent on this price for his profit, increased consumption of butter will remove the threatening surplus and increase the income of the Washington dairyman.” The dairymen’s committee has called on all hotels, soda fountains and restaurants to feature butter-using recipes this week. Van Tassell pointed out that the cooperation of bakeries in featuring cakes and other bakery products using butter was solicited. Bakeries use over 13,000,000 pounds of butter a year,” he stated. 50 Years Ago Jan. 9, 1964 Mike Svinth, driving a small truck, slid off Sylvia Lake Road Saturday evening, rolled over several times down the bank of a ravine, and walked away virtually unhurt. It took a wrecker several hours to haul the badly damaged truck back to the road. • • • A bull calf was born to Suzan, the $10,000 Jersey owned by Ernest Mock of Satsop, last weekend. The new arrival was delivered by Dr. Duby of Centralia. Both mother and son are doing fine. 25 Years Ago Jan. 12, 1989 As was expected and predicted early last month, total log exports from Grays Harbor in 1988 reached a record year, as a total of 787,319,730 board feet wound up being shipped from all five terminals. In a report to port commissioners Tuesday, Karl Wallin, operations director, told the board, “Of that total, 276.9 million board feet went over Port-owned docks. That was 36 percent more than the 203.6 million feet of 1987.” As has been the case five of the past eight years, the majority of logs exported, 43.3 percent, went to the peoples Republic of China last year, followed by Japan with 31 percent and Korea with 24 percent. The remaining 1.7 percent was shipped to Taiwan and Turkey, according to Wallin. 10 Years Ago Jan. 8, 2004 SAN DIEGO — Kyle Basler, former Elma Eagle football player and now Washington State University’s sophomore punter, did something Dec. 30 that no one in history has ever done. In front of the seventh-largest crowd in Holiday Bowl history — 61,102 — Basler became the first punter to win Defensive Player of the Game award. Basler’s punts pinned the University of Texas Longhorns inside their own five-yard line on four of his first five punts and the fifth punt rolled out of bounds on the 13-yard line. Texas had trouble getting its offense going after beginning so deep in their own territory. Texas coach Mack Brown was impressed: “This guy is so good. He just kept pinning us inside the five and we couldn’t go 95 yards. Basler came to WSU as a walk-on, then he earned a scholarship and the punting job at the end of the 2002-03 fall camp. He averaged 43.9 yards per punt this season, which was tops in the Pac-10. The Cougars went 10-3 for the school’s third 10-win season in a row. WSU finished the season ranked No. 9 in the country, moving up six spots, finishing in the top 10 for the third consecutive year.
Q: FAIL Logarithms $$\log_11^x=x$$ $$\log_11^y=y$$ $$1^x=1^y\implies\log_11^x=\log_11^y$$ $$\therefore x=y$$ But $$1^7=1^8\implies7=8$$ Where is my error? And why? A: The logarithm function $\log_a$ is typically defined to be the inverse function of the exponential $a^x$. This makes sense for $a > 0$ and $a \ne 1$ since the exponential function is strictly increasing. But $1^x$ is constant, and so doesn't have an inverse. Therefore, $\log_1$ doesn't really make sense, and it certainly can't be expected to have the same rule as usual logarithms.
The present invention pertains to the reduction of the viscosity of epoxy resins and phenoxy resins by reaction with a trichloroacetophenone. Perry, et al in U.S. Pat. No. 3,804,795 disclosed a method for reducing the viscosity of epoxy resins by reacting them with an ethylenically unsaturated ether such as methyl isopropenyl ether. The present invention provides a novel method for reducing the viscosity of epoxy and phenoxy resins by reacting the epoxy or phenoxy resin with a trihalomethyl acyl aromatic compound.
Filed: May 4, 2005 UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT No. 04-1535 (CA-05-309-MJG) CARMEN THOMPSON; RHONDA HARRIS; JOANN BOYD; DORIS TINSLEY; LORRAINE JOHNSON; ISAAC J. NEAL, on behalf of themselves and all others similarly situated, Plaintiffs - Appellees, versus U.S. DEPARTMENT OF HOUSING & URBAN DEVELOPMENT; ALPHONSO JACKSON, in his official capacity as United States Acting Secretary of Housing and Urban Development, Defendants - Appellants, and HOUSING AUTHORITY OF BALTIMORE CITY; DANIEL P. HENSON, III, in his official capacity as Executive Director of the Housing Authority of Baltimore City and the Commissioner of the Baltimore City Department of Housing and Community Development; MAYOR AND CITY COUNCIL OF BALTIMORE CITY, Defendants. -------------------------------------------- JONESTOWN PLANNING COUNCIL, INCORPORATED, Movant. O R D E R The court amends its opinion filed April 15, 2005, as follows: On page 3, last paragraph, line 4 -- “HUD’S” is corrected to read “HUD’s.” On page 13, first paragraph, line 30 -- an apostrophe is added after the word “Defendants.” For the Court - By Direction /s/ Patricia S. Connor Clerk PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT CARMEN THOMPSON; RHONDA HARRIS;  JOANN BOYD; DORIS TINSLEY; LORRAINE JOHNSON; ISAAC J. NEAL, on behalf of themselves and all others similarly situated, Plaintiffs-Appellees, v. U.S. DEPARTMENT OF HOUSING & URBAN DEVELOPMENT; ALPHONSO JACKSON, in his official capacity as United States Acting Secretary of Housing and Urban Development, Defendants-Appellants, and HOUSING AUTHORITY OF BALTIMORE  No. 04-1535 CITY; DANIEL P. HENSON, III, in his official capacity as Executive Director of the Housing Authority of Baltimore City and the Commissioner of the Baltimore City Department of Housing and Community Development; MAYOR AND CITY COUNCIL OF BALTIMORE CITY, Defendants. JONESTOWN PLANNING COUNCIL, INCORPORATED, Movant.  2 THOMPSON v. HUD Appeal from the United States District Court for the District of Maryland, at Baltimore. Marvin J. Garbis, Senior District Judge. (CA-05-309-MJG) Argued: December 2, 2004 Decided: April 15, 2005 Before WILKINS, Chief Judge, and MICHAEL and TRAXLER, Circuit Judges. Affirmed by published opinion. Judge Traxler wrote the opinion, in which Chief Judge Wilkins and Judge Michael concurred. COUNSEL ARGUED: Thomas Mark Bondy, UNITED STATES DEPART- MENT OF JUSTICE, Civil Division, Appellate Section, Washington, D.C., for Appellants. Wilma A. Lewis, CROWELL & MORING, Washington, D.C., for Appellees. ON BRIEF: Howard M. Schmeltzer, Assistant General Counsel for Litigation, David M. Reizes, Trial Attorney, UNITED STATES DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT, Office of General Counsel, Washington, D.C.; Peter D. Keisler, Assistant Attorney Gen- eral, Thomas M. DiBiagio, United States Attorney, Mark B. Stern, Appellate Staff, Civil Division, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellants. Andrew D. Free- man, BROWN, GOLDSTEIN & LEVY, L.L.P., Baltimore, Mary- land; David L. Haga, CROWELL & MORING, L.L.P., Washington, D.C., for Appellees. THOMPSON v. HUD 3 OPINION TRAXLER, Circuit Judge: In 1995, African-American public housing residents (the "Plain- tiffs") filed a class action against the United States Department of Housing and Urban Development and its then-Secretary Henry Cisne- ros (referred to together as "HUD"), along with the Housing Authority of Baltimore City and various Baltimore officials (together, the "Local Defendants"), seeking to eliminate racial segregation and dis- crimination in Baltimore’s public housing system. In 1996, the parties entered into a Partial Consent Decree (the "Consent Decree") resolv- ing some of the issues raised in the complaint. The Consent Decree stated that the district court would exercise jurisdiction for only a lim- ited period of time. With the end of the court’s jurisdiction over HUD looming, the Plaintiffs filed a motion requesting that the district court modify the Consent Decree to extend the period during which it would exercise jurisdiction over HUD. The district court granted the motion, and HUD appeals. For the reasons set forth below, we affirm. I. Baltimore’s public housing system began in the 1930s as an offi- cially segregated program. The city abandoned its official segregation policies shortly after the Supreme Court’s decision in Brown v. Board of Education, 347 U.S. 483 (1954). In their class action complaint, the Plaintiffs alleged, inter alia, that while the formal policy of segrega- tion was no longer in place, the Local Defendants were perpetuating the former de jure segregation through their racially based assign- ments of public housing applicants and through their decisions regarding the placement of new housing projects. The parties ultimately agreed to settle some of the claims asserted in the class action, an agreement that was formalized in the Consent Decree. The Consent Decree imposes numerous obligations on the Local Defendants and HUD. Many of HUD’s obligations under the Decree are related to the obligations imposed on the Local Defen- 4 THOMPSON v. HUD dants, in that most (if not all) of the steps that the Local Defendants are required to take under the Consent Decree require HUD’S cooper- ation and approval. The Consent Decree provides that the district court will have jurisdiction over the Local Defendants until their obli- gations under the decree have been satisfied, and that the court will have jurisdiction over HUD for seven years after the approval of the Decree. The Consent Decree was approved on June 25, 1996; under the terms of the Consent Decree, the district court’s jurisdiction over HUD was to expire on June 25, 2003. HUD acknowledges, however, that it has obligations under the Consent Decree that extend well beyond June 2003. Although the Consent Decree has been in effect since 1996, the Local Defendants have fallen jaw-droppingly short of fulfilling their obligations. The Local Defendants are woefully behind schedule with regard to many provisions of the Consent Decree, but one failing is of primary importance to this case. Among other things, the Consent Decree requires that the Local Defendants make available 911 "hard" housing units—that is, actual housing units, as opposed to rent vouchers—in areas of Baltimore referred to in the Decree as "Non- impacted areas."1 The 911 hard units of housing were to be made available within six and a half years after the approval of the Decree —i.e., December 2002. By that date, however, the Local Defendants had managed to supply only eight of the required units. Faced with the utter failure of the Local Defendants to comply with the terms of the Consent Decree and the impending termination of the district court’s jurisdiction over HUD, the Plaintiffs in May 2003 filed a motion asking the district court to modify the Consent Decree to extend the term of its jurisdiction over HUD. The Plaintiffs argued that the failure of the Local Defendants to comply with the Decree was a significant change of circumstance warranting a modification of the Decree. The Plaintiffs contended that since HUD must approve the plans and actions required of the Local Defendants under the Con- sent Decree, the district court should retain jurisdiction over HUD. Under the original terms of the Consent Decree, the district court’s 1 Generally speaking, non-impacted areas are those without high con- centrations of minority residents or public housing. See Thompson v. HUD, 220 F.3d 241, 244 (4th Cir. 2000). THOMPSON v. HUD 5 jurisdiction over HUD terminated six months after the date that the Local Defendants were to have provided the 911 hard units of public housing. The Plaintiffs therefore requested that the district court extend its jurisdiction over HUD for an additional three years, which would give the court jurisdiction for six months after the date by which the Local Defendants projected they would be able to provide the required 911 housing units. The district court granted the Plaintiffs’ motion to modify the Decree. The court held that the Local Defendants’ "level of compli- ance fell so far short of complete as to be beyond any reasonable degree of expectations or acceptability." J.A. 509. The district court concluded that the magnitude of the Local Defendants’ non- compliance amounted to a change of circumstance sufficient to war- rant modification of the Consent Decree, notwithstanding the fact that HUD was not responsible for the delays of the Local Defendants. The district court, however, declined to extend its jurisdiction over HUD by the three years requested by the Plaintiffs. Instead, the district court extended its jurisdiction "until such time as HUD shows that its obligations have been fulfilled approximately to the same extent as the parties and the Court originally and reasonably contemplated would have been fulfilled by June 25, 2003." J.A. 516-17. This appeal followed. II. It has long been recognized that courts are vested with the inherent power to modify injunctions they have issued. That same authority also exists with regard to a court’s consent decrees, which regulate future conduct and thus operate as injunctions: We are not doubtful of the power of a court of equity to modify an injunction in adaptation to changed conditions though it was entered by consent. . . . Power to modify the decree was reserved by its very terms, and so from the beginning went hand in hand with its restraints. If the reser- vation had been omitted, power there still would be by force of principles inherent in the jurisdiction of the chancery. A continuing decree of injunction directed to events to come is subject always to adaptation as events may shape the 6 THOMPSON v. HUD need. The distinction is between restraints that give protec- tion to rights fully accrued upon facts so nearly permanent as to be substantially impervious to change, and those that involve the supervision of changing conduct or conditions and are thus provisional and tentative. The result is all one whether the decree has been entered after litigation or by consent. In either event, a court does not abdicate its power to revoke or modify its mandate if satisfied that what it has been doing has been turned through changing circumstances into an instrument of wrong. We reject the argument for the interveners that a decree entered upon consent is to be treated as a contract and not as a judicial act. United States v. Swift & Co., 286 U.S. 106, 114-15 (1932) (citations omitted); see Benjamin v. Jacobson, 172 F.3d 144, 161 (2d Cir. 1999) (en banc) ("The proposition that a court has the authority to alter the prospective effect of an injunction in light of changes in the law or the circumstances is, of course, well established."); Sweeton v. Brown, 27 F.3d 1162, 1166 (6th Cir. 1994) ("Anglo-American courts have always had the inherent equitable power to modify consent decrees imposing ongoing injunctive relief."). The court’s inherent authority to modify a consent decree or other injunction is now encompassed in Rule 60(b)(5) of the Federal Rules of Civil Procedure. See Plyler v. Evatt, 924 F.2d 1321, 1324 (4th Cir. 1991); Money Store, Inc. v. Harriscorp Fin., Inc., 885 F.2d 369, 372 (7th Cir. 1989). Under Rule 60(b)(5), a court may relieve a party from an order if "it is no longer equitable that the judgment should have prospective application." Fed. R. Civ. P. 60(b)(5). In Rufo v. Inmates of Suffolk County, 502 U.S. 367 (1992), the Supreme Court considered the application of Rule 60(b)(5) to consent decrees, like this one, springing from institutional reform litigation. The Court noted that, traditionally, the standard for modifying con- sent decrees was quite flexible, see id. at 379, and that the need for a flexible approach was particularly great as to consent decrees aris- ing out of institutional reform litigation: The upsurge in institutional reform litigation since Brown v. Board of Education . . . has made the ability of a district THOMPSON v. HUD 7 court to modify a decree in response to changed circum- stances all the more important. Because such decrees often remain in place for extended periods of time, the likelihood of significant changes occurring during the life of the decree is increased. . . . The experience of the District Courts and Courts of Appeals in implementing and modifying such decrees has demonstrated that a flexible approach is often essential to achieving the goals of reform litigation. The Courts of Appeals have also observed that the public interest is a par- ticularly significant reason for applying a flexible modifica- tion standard in institutional reform litigation because such decrees reach beyond the parties involved directly in the suit and impact on the public’s right to the sound and efficient operation of its institutions. Id. at 380-81 (citations and internal quotation marks omitted). The Court emphasized, however, that while "a district court should exer- cise flexibility in considering requests for modification of an institu- tional reform consent decree, it does not follow that a modification will be warranted in all circumstances." Id. at 383. The Court articulated the standard by which requests for modifica- tions to consent decrees should be judged: [A] party seeking modification of a consent decree bears the burden of establishing that a significant change in circum- stances warrants revision of the decree. If the moving party meets this standard, the court should consider whether the proposed modification is suitably tailored to the changed circumstance. Id. A "significant change either in factual conditions or in law" can support a requested modification. Id. at 384. A significant change in the factual conditions can support a modification if the changed con- ditions "make compliance with the decree substantially more oner- ous," if the decree "proves to be unworkable because of unforeseen obstacles," or if "enforcement of the decree without the modification would be detrimental to the public interest." Id.; see Thompson v. 8 THOMPSON v. HUD HUD, 220 F.3d 241, 247 (4th Cir. 2000) ("Thompson I"). "Ordinarily, however, modification should not be granted where a party relies upon events that actually were anticipated at the time it entered into a decree." Rufo, 502 U.S. at 385. III. As noted above, the district court concluded that the Local Defen- dants’ nearly complete failure to comply with their obligations was a sufficient change of circumstance to warrant modification of the Con- sent Decree. On appeal, HUD challenges the district court’s decision on several grounds. HUD contends that the parties anticipated that, at the time the court’s jurisdiction over HUD was to expire, the Local Defendants might not have fulfilled their obligations under the Decree. HUD thus contends that because the Local Defendants’ lack of compliance was anticipated, it cannot be a basis for modifying the Consent Decree. HUD also contends that because it was not responsi- ble for the Local Defendants’ failings, it was error for the district court to use those failings as a reason to modify HUD’s obligations under the Decree. Finally, HUD contends that the modification was not suitably tailored to the problems identified by the district court. We review the district court’s decision to modify the Consent Decree for abuse of discretion, see Thompson I, 220 F.3d at 246, and "we accept the factual findings on which the district court’s decision is based unless they are clearly erroneous," Small v. Hunt, 98 F.3d 789, 796 (4th Cir. 1996). Such a deferential standard of review is war- ranted in view of the nature and purpose institutional-reform consent decrees: The rule of broad discretion in public interest cases is designed to give the district court flexibility in deciding exactly how the numerous conditions of a complex consent decree are to be implemented in practice. In overseeing broad institutional reform litigation, the district court becomes in many ways more like a manager or policy plan- ner than a judge. Over time, the district court gains an inti- mate understanding of the workings of an institution and learns what specific changes are needed within that institu- tion in order to achieve the goals of the consent decree. THOMPSON v. HUD 9 Navarro-Ayala v. Hernandez-Colon, 951 F.2d 1325, 1338 (1st Cir. 1991); see also Ruiz v. Lynaugh, 811 F.2d 856, 861 (5th Cir. 1987) ("We note that a district court’s decision to modify a consent decree in an ongoing institutional reform case is committed to that court’s discretion because it is intimately involved in the often complex pro- cess of institutional reformation. It has the personal knowledge, expe- rience, and insight necessary to evaluate the parties’ intentions, performances, and capabilities."). A. HUD contends that the district court’s decision to modify the Con- sent Decree was in error because the circumstance upon which the court based the modification—the lack of compliance by the Local Defendants—was anticipated by the parties at they time they entered into the Decree. HUD points out that the Consent Decree calls for the district court to exercise jurisdiction over the Local Defendants until they fulfilled their obligations under the Decree, but for the court to exercise jurisdiction over HUD until June 2003—seven years after the Decree was approved. HUD thus argues that the parties fully antici- pated that HUD might be out of the picture before the Local Defen- dants fulfilled their obligations under the Decree, and that the district court therefore erred by modifying the Decree based on an anticipated event. See Thompson I, 220 F.3d at 248-49 (reversing modification of Consent Decree because modification was based on circumstances that were anticipated at the time the Decree was entered into). We agree that the parties when executing the Consent Decree must have anticipated the likelihood that HUD would be released from the district court’s jurisdiction before the Local Defendants had com- pleted their obligations under the Decree. The structure of the Decree itself leaves no room for doubt on that score. But the district court did not modify the Consent Decree because the Local Defendants had not quite completed all of their obligations; the court modified the Decree because the Local Defendants had done almost nothing that they were required to do under the Decree.2 2 On this point it is worth restating the most salient fact: Of the 911 hard units of housing that were to have been provided by December 2002, the Local Defendants had managed to provide only eight. 10 THOMPSON v. HUD HUD argues, however, that the magnitude of the Local Defen- dants’ failure is irrelevant. Since the parties anticipated the possibility that HUD would be released from the court’s jurisdiction at a time when the Local Defendants were still performing under the Decree, HUD contends that the modification was impermissible under Rufo and Thompson I, even if the Local Defendants were farther behind than anticipated. We disagree. Preliminarily, we note that the issue is whether the parties actually anticipated the events giving rise to the modification request; that the events were theoretically foreseeable does not foreclose a modifica- tion. See Rufo, 507 U.S. at 385 (rejecting the argument that "modifi- cation should be allowed only when a change in facts is both ‘unforeseen and unforeseeable,’" noting that "[l]itigants are not required to anticipate every exigency that could conceivably arise during the life of a consent decree"). In this case, there is nothing in the Consent Decree or the record to suggest that Plaintiffs anticipated the exceptional magnitude of the Local Defendants’ non-compliance. J.A. 508 ("Certainly, the absence of complete compliance with a con- sent decree is not necessarily extraordinary or unforeseeable. How- ever, failed compliance of the magnitude confronted in the instant case is nothing short of exceptional." (citation omitted)). If the parties had actually anticipated that the Local Defendants would be so far behind on their obligations at this stage in the proceedings, the Con- sent Decree would never have been executed. The Plaintiffs would not have given up their claims in exchange for an agreement that they anticipated would not be followed, and the Local Defendants would not have subjected themselves to the district court’s contempt powers by agreeing to do something they knew they would not be able to do. Cf. Rufo, 502 U.S. at 386 (expressing doubt about the argument that rapid increase in prison population was anticipated when the consent decree was executed: "It strikes us as somewhat strange, if a rapidly increasing jail population had been contemplated, that respondents would have settled for a new jail that would not have been adequate to house pretrial detainees."). Under these circumstances, we cannot conclude that the district court abused its discretion by determining that the Plaintiffs did not anticipate the degree of the Local Defen- dants’ non-compliance.3 See David C. v. Leavitt, 242 F.3d 1206, 1213 3 Because the degree of the Local Defendants’ non-compliance was not anticipated, this case is not controlled by our prior decision in Thompson THOMPSON v. HUD 11 (10th Cir. 2001) (affirming district court’s decision to modify consent decree by extending its enforcement period because of defendant’s significant non-compliance with the terms of the decree: "[I]t would defy logic for Appellees to agree to include the four-year Termination Provision in the Agreement if they actually foresaw that Utah would not be in substantial compliance with the terms of the Agreement at the end of the four-year period."); see also Small, 98 F.3d at 796-97 (affirming decision to modify consent decree based on changed cir- cumstance where defendant anticipated small increase in prison popu- lation during life of decree but did not foresee the extent of actual increases). Nor can we conclude that the district court abused its dis- cretion by concluding that the change of circumstance was significant enough to warrant a modification of the Consent Decree. See Holland v. New Jersey Dep’t of Corr., 246 F.3d 267, 284 (3d Cir. 2001) ("Courts have extended a decree or parts of a decree when . . . one party was in substantial non-compliance with the decree."). B. HUD contends, however, that even if the degree of the Local Defendants’ failure to comply was not anticipated, the only failings specifically identified by the district court were those of the Local Defendants. HUD argues that since it was not at fault for the Local Defendants’ delay in compliance, the delay should not have been the basis for a modification of HUD’s obligations under the Decree. We disagree. We first note that this argument seems to proceed on an assumption that a consent decree may be modified only upon a showing of fault. Quite the opposite is true. Consent decrees are frequently modified when the change of circumstance was not brought about by the fault I. In Thompson I, we reversed the district court’s modification of the Consent Decree because the events the district court viewed as a signifi- cant change of circumstance had been specifically anticipated by the par- ties when they entered into the Decree, and important provisions of the Decree were directed to the very set of circumstances that the district court relied upon to support the modification. See Thompson I, 220 F.3d at 248-49. 12 THOMPSON v. HUD of a party to the agreement. For example, we have held that modifica- tions should be made to consent decrees entered in prison-condition litigation where there was an unanticipated increase in the prison pop- ulation. See Small, 98 F.3d at 796-97; Plyler v. Evatt, 846 F.2d 208, 215-16 (4th Cir. 1988). While the cases involved requests by the defendants to modify the consent decree, there is nothing in Rufo or our cases involving the modification of consent decrees suggesting that plaintiffs are entitled to modification only if the relevant change of circumstance was brought about by fault on the part of the defen- dant. And just as the absence of fault does not preclude a modification of a consent decree involving a single defendant, it does not preclude a modification of the obligations of one party to a consent decree as a result of the fault of another party to the decree. A court’s ability to modify a consent decree or other injunction springs from the court’s inherent equitable power over its own judg- ments. See United States v. City of Miami, 2 F.3d 1497, 1509 (11th Cir. 1993) ("[A] district court’s decision on a request to terminate or modify a consent decree is an exercise of that court’s equitable power . . . ."); SEC v. Worthen, 98 F.3d 480, 482 (9th Cir. 1996) ("With respect to permanent injunctions, we have held that Rule 60(b)(5) rep- resents a codification of preexisting law, recognizing the inherent power of a court sitting in equity to modify its decrees prospectively to achieve equity." (internal quotation marks omitted)); Fed. R. Civ. P. 60(b)(5) (explaining that a court may relieve a party from an order if "it is no longer equitable that the judgment should have prospective application"). The hallmark of equity, of course, is its flexibility: The essence of a court’s equity power lies in its inherent capacity to adjust remedies in a feasible and practical way to eliminate the conditions or redress the injuries caused by unlawful action. Equitable remedies must be flexible if these underlying principles are to be enforced with fairness and precision. Freeman v. Pitts, 503 U.S. 467, 487 (1992); accord Brown v. Board of Educ., 349 U.S. 294, 300 (1955) ("[E]quity has been characterized by a practical flexibility in shaping its remedies and by a facility for adjusting and reconciling public and private needs."). THOMPSON v. HUD 13 HUD’s view is that the modification of its responsibilities under the Consent Decree is inappropriate because it has done nothing wrong and bears no responsibility for the lack of compliance upon which the district court based its decision to modify the decree. We believe that such a position would improperly tie the district court’s hands and severely limit the ability to fashion the necessary relief. Institutional reform litigation frequently involves multiple parties with interrelated obligations, such that a breach of duty by one party can require an adjustment to the duties of another party. The district court must be free to exercise its equitable powers as necessary to remedy the problem. See Rufo, 502 U.S. at 382 (noting that "rigidity [in applying Rule 60(b)(5)] is neither required . . . nor appropriate in the context of institutional reform litigation"); Waste Mgmt. of Ohio, Inc. v. City of Dayton, 132 F.3d 1142, 1145 (6th Cir. 1997) ("Equitable considerations are clearly factors a district court can address when they are related to a court’s power and duty to modify, interpret, and oversee a consent decree."); Berger v. Heckler, 771 F.2d 1556, 1568 (2d Cir. 1985) ("[B]readth and flexibility are inher- ent in equitable remedies." (internal quotation marks omitted)). This power must include the right, in appropriate cases, to modify the obli- gations of a party who was without fault in creating the change of cir- cumstance that gave rise to the need for modification. See New York State Ass’n for Retarded Children, Inc. v. Carey, 706 F.2d 956, 969 (2d Cir. 1983) ("It is well recognized that in institutional reform liti- gation such as this judicially-imposed remedies must be open to adap- tation when unforeseen obstacles present themselves, to improvement when a better understanding of the problem emerges, and to accom- modation of a wider constellation of interests than is represented in the adversarial setting of the courtroom."). Thus, the fact that HUD bears no responsibility for the Local Defendants' failure to comply with their obligations does not preclude a modification of HUD’s obligations under the Consent Decree. Accordingly, we conclude that the district court did not abuse its discretion when concluding that the Local Defendants’ lack of com- pliance with their obligations under the Consent Decree was an unan- ticipated and substantial change of circumstance. We likewise conclude that the absence of fault on the part of HUD does not pre- clude a modification of HUD’s duties under the Consent Decree. The 14 THOMPSON v. HUD question thus becomes whether the modification imposed by the dis- trict court was proper. C. "Once a court has determined that changed circumstances warrant a modification in a consent decree, the focus should be on whether the proposed modification is tailored to resolve the problems created by the change in circumstances." Rufo, 502 U.S. at 391. "A court should do no more, for a consent decree is a final judgment that may be reopened only to the extent that equity requires." Id. The district court concluded that enforcement of the Consent Decree would be substantially more difficult if it did not extend the period of jurisdiction over HUD. The court thus concluded that extending the period of its jurisdiction over HUD would serve the public interest, by ensuring the most efficient means of enforcing the decree. The court determined that its jurisdiction over HUD should be "extended only to the extent necessary to meet the original reasonable expectations of the parties and the Court." J.A. at 516. Noting that the Consent Decree called for the court’s jurisdiction over HUD to end on June 25, 2003, six months after the date that the Local Defendants were to have provided the 911 hard units of public housing, the dis- trict court extended its period of jurisdiction over HUD "until such time as HUD shows that its obligations have been fulfilled approxi- mately to the same extent as the parties and the Court originally and reasonably contemplated would have been fulfilled by June 25, 2003." J.A. 516-17. In our view, the modification implemented by the district court nicely meets Rufo’s requirement that any modification be "suitably tailored to the changed circumstance." Rufo, 502 U.S. at 391. Although the Local Defendants bear most of the substantive obliga- tions under the Consent Decree, the Decree also imposes various obli- gations on HUD, many of which are related to the obligations of the Local Defendants.4 Given that the Local Defendants are so far behind 4 For example, section 3.2.15 of the Consent Decree requires HUD to make available to the Local Defendants certain FHA single- and multi- THOMPSON v. HUD 15 in fulfilling their obligations under the Consent Decree and that many of the obligations of the parties are inter-related, the district court properly recognized the utility of retaining jurisdiction over HUD, so as to ensure that the Decree can be efficiently enforced. And by extending the period of jurisdiction only until the Local Defendants reach the milestones that should already have been reached when jurisdiction over HUD originally was to expire, the district court mod- ified the decree no more than was necessary to approximate the posi- tions the parties would have occupied had the Local Defendants lived up to their obligations under the Consent Decree.5 See Pigford v. Veneman, 292 F.3d 918, 927 (D.C. Cir. 2002) ("[A] ‘suitably tailored’ order would return both parties as nearly as possible to where they would have been absent [the changed circumstance giving rise to the modification request]."); Vanguards of Cleveland v. City of Cleveland, 23 F.3d 1013, 1020 (6th Cir. 1994) (finding district court’s modification of consent decree to be suitably tailored to the changed circumstance because, among other things, "the modification operates family properties, properties that the Local Defendants are to develop as part of the hard housing units required under the Decree. Section 3.2 of the Decree requires the Local Defendants and HUD to work together to create a plan for a home ownership program. Implementation of many aspects of the plan is dependent on HUD approval. The Consent Decree also imposes on HUD and the Local Defendants numerous continuing obligations with regard to the Mobility Counseling Services program cre- ated by the Decree. 5 HUD contends that the Consent Decree’s provision retaining jurisdic- tion over it for seven years was in no way linked to the other provisions of the Decree requiring the Local Defendants to comply with various obligations within six and a half years. Thus, HUD argues that it was improper to structure the modification to reflect a similar time frame. We disagree. To be sure, the Consent Decree does not contain language link- ing the two time frames—that is, the Decree does not state that the court will retain jurisdiction over HUD for six months past the date that the Local Defendants provide the required hard units of housing. Nonethe- less, the Consent Decree as a factual matter did just that —provided for the retention of jurisdiction over HUD for a period that happened to be six months after the date that the Local Defendants were to have deliv- ered the housing units. It was thus entirely proper for the district court to modify the Decree in a way that reflected a similar time frame. 16 THOMPSON v. HUD along the lines of the consent decree" and "the modification merely allows additional time in which to promote the minority firefighters as would have occurred under the consent decree, if the minority pass rates on the 1984 and 1985 promotional examinations had not been lower than expected"). HUD, however, argues that the relief fashioned by the district court was not suitably tailored to remedy the problem at hand. According to HUD, the Consent Decree’s retention-of-jurisdiction provision was "the heart" of its bargain, Brief of Appellants at 18, and the district court’s re-writing of that clause can hardly be considered a suitably tailored remedy.6 6 This argument, as well as others made by HUD, seems to teeter on the edge of asserting that the modification was improper because it was inconsistent with the terms of the Consent Decree. Such an argument, of course, would be doomed to fail. Issues of interpretation and enforce- ment of a consent decree typically are subject to traditional rules of con- tract interpretation, and the district court’s authority is thus constrained by the language of the decree. See Johnson v. Robinson, 987 F.2d 1043, 1046 (4th Cir. 1993) ("A federal district court may not use its power of enforcing consent decrees to enlarge or diminish the duties on which the parties have agreed and which the court has approved." (emphasis added)). A court’s inherent power to modify a consent decree, however, is not circumscribed by the language of the decree. See System Fed’n No. 91 v. Wright, 364 U.S. 642, 651 (1961) (noting that the Court "has never departed from th[e] general rule" that a court always retains the authority to modify a consent decree; "[t]he parties cannot, by giving each other consideration, purchase from a court of equity a continuing injunction"); David C., 242 F.3d at 1210-11 ("[A] court’s equitable power to modify its own order in the face of changed circumstances is an inherent judicial power that cannot be limited simply because an agreement by the parties purports to do so. . . . To hold otherwise would allow the parties, by the terms of their agreement, to divest a court of its equitable power or sig- nificantly constrain that power by dictating its parameters."); Johnson, 987 F.2d at 1050 (explaining that "a district court may, of course, modify a consent decree to impose new duties upon a party"); South v. Rowe, 759 F.2d 610, 613 (7th Cir. 1985) ("[T]he parties could not agree to restrict the court’s equitable powers to modify its judgment enforcing the consent decree, including the two-year limitation period, in light of ‘changed circumstances.’"). THOMPSON v. HUD 17 We recognize that, generally speaking, a district court modifying a consent decree should strive to "preserve the essence of the parties’ bargain." Pigford, 292 F.3d at 927. The retention-of-jurisdiction clause, however, is but one part of a more than 80-page agreement, an agreement that imposes numerous obligations on HUD. While we do not doubt the importance of the clause to HUD, that importance simply does not place the clause beyond the reach of the district court’s inherent modification powers. See Rufo, 502 U.S. at 387 ("If modification of one term of a consent decree defeats the purpose of the decree, obviously modification would be all but impossible. That cannot be the rule."); see also Holland, 246 F.3d at 282 ("[T]he broad remedial power contained within the modification and compliance enforcement powers can be used to extend a consent decree."); David C., 242 F.3d at 1210 (rejecting argument that "courts have no equita- ble power to modify material provisions" of a consent decree). Finally, HUD suggests that the district court’s modification went beyond what was necessary to address the changed circumstances, because the modification imposes substantial new obligations on HUD and has provided an opening for the Plaintiffs to seek to hold HUD in contempt for violating the terms of the Consent Decree. Again we disagree. As HUD concedes, it has obligations under the Consent Decree that extend well beyond the date that the court’s jurisdiction over HUD originally was to expire. Therefore, even if the district court had declined to modify the retention-of-jurisdiction clause, the court’s inherent authority over its own judgment would have provided it with the continuing authority to enforce the Consent Decree against HUD. See Frew v. Hawkins, 540 U.S. 431, 440 (2004) ("Federal courts are not reduced to approving consent decrees and hoping for compliance. Once entered, a consent decree may be enforced."); System Fed’n No. 91 v. Wright, 364 U.S. 642, 647 (1961) (explaining that injunctions "often require[ ] continuing supervision by the issuing court and always a continuing willingness to apply its powers and processes on behalf of the party who obtained that equitable relief"); Brewster v. Dukakis, 3 F.3d 488, 491 (1st Cir. 1993) ("[S]o long as the injunction endures, the district court’s enforcement authority can always be ‘reawakened.’"); In re Pearson, 990 F.2d 653, 657 (1st Cir. 1993) ("[W]hen . . . an injunction entered pursuant to a consent decree has 18 THOMPSON v. HUD ongoing effects, the issuing court retains authority to enforce it."); Hook v. Arizona Dep’t of Corr., 972 F.2d 1012, 1014 (9th Cir. 1992) (concluding that district court had jurisdiction over motion to seeking to hold defendants in contempt for violating consent decree in case that had been closed for 16 years: "A district court retains jurisdiction to enforce its judgments, including consent decrees. Because the inmates allege a violation of the consent decree, the district court had jurisdiction." (citation omitted)); United States v. Fisher, 864 F.2d 434, 436 (7th Cir. 1988) ("[W]hen a court issues an injunction, it automatically retains jurisdiction to enforce it."); Waffenschmidt v. Mackay, 763 F.2d 711, 716 (5th Cir. 1985) ("Courts possess the inherent authority to enforce their own injunctive decrees. . . . Courts do not sit for the idle ceremony of making orders and pronouncing judgments, the enforcement of which may be flouted, obstructed, and violated with impunity, with no power in the tribunal to punish the offender." (internal citations omitted)). Thus, the modification of the Consent Decree exposes HUD to no greater risk of contempt than if the modification had not been granted.7 7 The district court in its order suggested that if it did not extend its jurisdiction over HUD, enforcement of HUD’s continuing obligations under the Decree would be relegated to the independent actions under the Administrative Procedure Act with its strict arbitrary and capricious stan- dard of review. See J.A. at 511-12. Given a court’s inherent power to enforce a consent decree, we question whether the district court’s predic- tion about future enforcement mechanisms was accurate. Nonetheless, the court’s extension of its jurisdiction over HUD significantly improved the court’s ability to monitor and enforce the Consent Decree. For exam- ple, by virtue of the extension of jurisdiction, HUD remains an active party to the litigation, and its presence and participation at hearings can be required by the court. The district court has been intimately involved with this case from the very beginning and is thus in the best position to determine what actions might be necessary to enforce the Consent Decree, and, ultimately, to bring this litigation to a close. Given the inter- relatedness of the obligations of HUD and the Local Defendants, we can- not say that the district court abused its discretion by concluding that HUD’s active presence and participation in the litigation was necessary to effectively monitor and enforce the Consent Decree. See Langton v. Johnston, 928 F.2d 1206, 1221 (1st Cir. 1991) ("[T]he due administra- tion of [an institutional reform consent] decree calls for a certain deftness of touch."). THOMPSON v. HUD 19 IV. To summarize, we conclude that the district court properly found that the Local Defendants’ near total failure to comply with the terms of the Consent Decree was an unanticipated change of circumstance that warranted modifying the Consent Decree. Because many of the obligations of HUD and the Local Defendants under the Decree are inter-related, the district court did not abuse its discretion by conclud- ing that the Decree should be modified to extend the period of the court’s retention of jurisdiction over HUD. The district court’s modi- fication of the Decree was suitably tailored to the problems created by the change of circumstance, as required by Rufo. Accordingly, the district court’s order modifying the Consent Decree is hereby affirmed. AFFIRMED
Event details Find out why the Mongolians built Beijing’s first hutongs, see for yourself what traditional Beijingers get up to when they think nobody is looking, and discover how a warlord managed to return to Beijing in a coffin alive. All this plus table tennis with the locals, a rickshaw ride, water calligraphy, and much more besides. Highlights: Walk around Beijing’s historic hutongs, and learn how to identify their age and how to Feng Shui, and who’s copying it. Find out how ancient Beijing moved a million people into the city and how long it took for them to leave. Visit a traditional home and discover why its famous resident was so contradictory. Learn about the extraordinary technical achievement that is Beijing’s 500-year-old bell tower. Notice Once booked we will contact you to confirm the date & time or you can email us on [email protected]
The role of outcome inhibition in interference between outcomes: a contingency-learning analogue of retrieval-induced forgetting. Current associative theories of contingency learning assume that inhibitory learning plays a part in the interference between outcomes. However, it is unclear whether this inhibitory learning results in the inhibition of the outcome representation or whether it simply counteracts previous excitatory learning so that the outcome representation is neither activated nor inhibited. Additionally, these models tend to conceptualize inhibition as a relatively transient and cue-dependent state. However, research on retrieval-induced forgetting suggests that the inhibition of representations is a real process that can be relatively independent of the retrieval cue used to access the inhibited information. Consistent with this alternative view, we found that interference between outcomes reduces the retrievability of the target outcome even when the outcome is associated with a novel (non-inhibitory) cue. This result has important theoretical implications for associative models of interference and shows that the empirical facts and theories developed in studies of retrieval-induced forgetting might be relevant in contingency learning and vice versa.
Q: Создание списка на основе JSON jQuery в ответ на запрос получает JSON-строку типа {36:"Австралия",40:"Австрия"} Фрагмент jQuery: $.ajax ({ type: "GET", url: "/ajax/", data: "q=" + query, cache: false, dataType: 'json', success: function(response) { // генерация bar на основе response $("#foo").html(bar); } }); Из полученного JSON хочется собрать фрагмент HTML: <ul> <li id='36'>Австралия</li> <li id='40'>Австрия</li> </ul> И добавить внутрь div'а "foo". Хочется не столько увидеть решение, сколько понять логику работы jQuery с JSON. A: Спасибо всем за варианты решения. Остановился на этом: var items = ''; $.getJSON("/ajax/", "q=" + query, function(response) { $.each(response, function(i,val) { items += '<li id="' + i + '">' + val + '</li>'; }); $('#foo').html(items); }); Проблема решилась изменением положения строк var items = ''; и $('#foo').html(items); Проблема, как я понял, была в видимости переменной items для $('#foo').html(items). Выручил alert(), который я ставил всюду, где только можно, чтобы визуализировать данные на разных этапах. Еще один косяк - невалидный JSON: обернул ID кавычками.
Miley Save Fuzzy Miley Save Fuzzy is a website in which an anonymous Miley Cyrus fan threatened to kill and eat their pet cat unless she returns to Twitter. Miley Cyrus is aware of the campaign, and commented about it in several interviews, in which she stated that she will not come back to Twitter. MileySaveFuzzy.com The website was created on October 24, 2009. On the website, the anonymous fan claimed that if Miley Cyrus did not come back to Twitter by November 16 (a deadline which was later extended to November 22), their cat, Fuzzy, would be killed and eaten. The fan claimed this action is legal in their country. The website includes several pictures of Fuzzy, as well as a cat recipes section. On November 23, 2009, the Miley Cyrus fan posted a new update on the website, named Fuzzy's Demise, claiming that the cat is dead. The fan claimed that the cat was taken to a clinic and was euthanized, and was later eaten. A very detailed explanation of the entire process is described, and pictures of a supposedly dead Fuzzy were posted. Shortly after the update was announced, there were difficulties accessing the website. An error page showed up, presumably due to the large number of hits it received, causing bandwidth issues. Public response and legitimacy The website received media attention throughout the United States and in other countries, such as Spain, Romania and others. The campaign was also mentioned on various radio stations across the globe. People working against the site have contacted organizations such as PETA and The Humane Society, who responded on their official forums and by email, saying that nothing can be done, as 'no' crime is being committed. References External links Miley Save Fuzzy Category:Internet properties established in 2009 Category:Miley Cyrus Category:Twitter controversies
Jack & Bobby Jack & Bobby is an American drama television series that aired on The WB from September 12, 2004 to May 11, 2005. It starred Christine Lahti, Logan Lerman, Matt Long, Jessica Paré, and John Slattery. The series chronicled the present-day teenage years of two brothers, one of whom would become the President of the United States from 2041 to 2049. The series was created by Greg Berlanti, Vanessa Taylor, Steven A. Cohen, and Brad Meltzer. On May 17, 2005, The WB announced it would not renew Jack & Bobby for a second season. The series finale was re-aired as part of a Warner Bros. 50th anniversary celebration on the TV Land cable network on June 11, 2005. Following this airing, the series has never been rebroadcast on American television. Cast and characters Main cast Professor Grace McCallister (Christine Lahti) Jack McCallister (Matt Long) Robert "Bobby" McCallister (Logan Lerman) - Future President 2041-2049 Courtney Benedict (Jessica Paré) - Future First Lady Marcus Ride (Edwin Hodge) Peter Benedict (John Slattery) Missy Belknap (Keri Lynn Pratt) Tom Wexler Graham (Bradley Cooper) Recurring cast Warren (Dean Collins) - Bobby's best friend Nate Edmonds (Mike Erwin) - Courtney's former boyfriend Randy Bongard (Cam Gigandet) - Missy's on-and-off boyfriend BJ Bongaro (Kyle Gallner) - Bobby's "frenemy" Katie (Kate Mara) - Jack's former girlfriend "'Cheerleader'" (J*Smith) - Missy's Posse Dennis Morgenthal (John Heard) Reverend Belknap (Ed Begley, Jr.) - Missy's father Future Marcus Ride (Ron Canada) Future Courtney McCallister (Brenda Wehle) Dex Truggman (Jeanette Brox) - Bobby's former girlfriend Juan Roberto de Alba (Lou Diamond Phillips) - Grace's former lover and the father of Jack and Bobby Emily (Crystal Rivers) - Missy's Bible Group Leader Episodes Awards and nominations Art Directors Guild: 2004: Excellence in Production Design Award - Single-Camera TV Series (for "An Innocent Man", nominated) Casting Society of America: 2004: Best Casting for Television - Dramatic Pilot (nominated) GLAAD Media Awards: 2004: Outstanding Individual Episode - Series Without a Regular Gay Character (for "Lost Boys", won) Golden Globe Awards: 2004: Best Actress - Drama Series (Christine Lahti for playing "Grace McCallister", nominated) Screen Actors Guild: 2004: Outstanding Actress - Drama Series (Christine Lahti for playing "Grace McCallister", nominated) See also List of fictional United States Presidents References External links Category:2000s American teen drama television series Category:2000s American political television series Category:2004 American television series debuts Category:2005 American television series endings Category:English-language television programs Category:Teenage pregnancy in television Category:Television series about brothers Category:Television series by Warner Bros. Television Category:Television series created by Greg Berlanti Category:Television shows set in Missouri Category:The WB original programming
Q: Caption to auto resize with image, any ideas? I am trying to figure out a way to get the image caption to resize with the image and remain pinned to the bottom of the image. The only way I have been able to acheive this is by using position relative but this means everything below it has to be moved up with a position relative meaning the page scrolls down to far. The website is http://bucksarms.co.uk it works great if your browser is bigger than 1400px but as you shrink it down the image and caption don't scale together correctly. This is the HTML <div id="hero"> <img id="heroimage" src="images/contact.jpg" alt="The Bucks beautifull garden" /> <?php include 'includes/header.php'; ?> <div id="feature"> <div id="featuretitlecontainer"> <div id="featuretitle"> Follow Us </div><!-- #featuretitle --> </div><!-- #featuretitlecontainer --> <div id="featurecontainer"> <div id="featuretext"> This 17th century pub is now embracing a 21st century digital age. Follow us on <a href="https://twitter.com/TheBucksArms">Twitter</a> to hear our latest offers first and keep up to date with whats going on at the Bucks. <p /> </div><!-- #featuretext --> </div><!-- #featurecontainer --> </div><!-- #feature --> </div><!-- #hero --> This is the CSS /* header */ #header { width:100%; background-color:#000; -khtml-opacity:.70; -moz-opacity:.70; -ms-filter:"alpha(opacity=70)"; filter:alpha(opacity=70); filter: progid:DXImageTransform.Microsoft.Alpha(opacity=70); opacity:.70; position:absolute; top:0; z-index:3 !important; } #headercontent { width:960px; height:60px; margin:0 auto; } #logo { padding:23px 0 0 0; font-size:30px; width:320px; float:left; text-align:center; color:#FFF; } /* nav */ #nav { padding:36px 0 0 0; width:630px; float:right; margin:0px 0 0 0; text-align:right; color:#666; } /* hero */ #hero { width:100%; max-width:1400px; margin:0 auto; clear:both; position:relative; z-index:1; height:680px; } #heroimage { position:relative; top:0px; margin:0 auto; width:100%; z-index:1 !important; } /* Feature */ #feature { position:absolute; bottom:0; width:100%; margin:0 auto; z-index:2; } #featuretitle { -khtml-opacity:.70; -moz-opacity:.70; -ms-filter:"alpha(opacity=70)"; filter:alpha(opacity=70); filter: progid:DXImageTransform.Microsoft.Alpha(opacity=70); opacity:.70; font-size:25px; padding:5px 10px 5px 10px; color:#FFF; text-align:center; background-color:#000; position:relative; top:0; width:300px; margin:0 0 0 650px; } #featuretitlecontainer { width:960px; margin:0 auto; } #featurecontainer { position:relative; width:100%; background-color:#000; -khtml-opacity:.70; -moz-opacity:.70; -ms-filter:"alpha(opacity=70)"; filter:alpha(opacity=70); filter: progid:DXImageTransform.Microsoft.Alpha(opacity=70); opacity:.70; } #featuretext { padding:20px; margin:auto; width:940px; font-size:17px; color:#FFF; line-height:25px; background-color:#000; } Any ideas on how to use get this to work either using the code above or any ideas how to get the page to not scroll past the gap created by position relative would be most welcome. Cheers Sam A: Try removing the height attribute on #hero: /* height:680px; */ You can hard-crop the image on the backend or put overflow:hidden and specify the max-height for #hero.
Robert, King of Naples Robert of Anjou (), known as Robert the Wise (; 1276 – 20 January 1343), was King of Naples, titular King of Jerusalem and Count of Provence and Forcalquier from 1309 to 1343, the central figure of Italian politics of his time. He was the third son of King Charles II of Naples and Maria of Hungary, and during his father's lifetime he was styled Duke of Calabria (1296–1309). Biography Robert was born around 1276, the third son of the future Charles II of Naples (then heir apparent) and his wife Mary of Hungary. His father was the son of the incumbent King of Naples, Charles of Anjou, who had established an Italian realm a decade earlier in 1266. During the Sicilian Vespers directed against his grandfather Charles, Robert was the hostage of Peter III of Aragon, his grandfather's enemy. In 1285, Robert’s grandfather died at Foggia in Italy, leading to his father (then a hostage) becoming King of Naples as Charles II, with Robert's elder brother, Charles Martel of Anjou as heir apparent. After the death of his elder brother, Charles Martel of Anjou in 1295, Robert, became heir to the crown of Naples, passing over his child-nephew Charles; to obtain the crown of neighbouring Sicily, he married King James of Sicily's sister Yolanda, in exchange for James's renunciation of Sicily. However, the Sicilian barons refused him and elected James' brother, Frederick II. The war continued, and with the Peace of Caltabellotta (1302) Robert and the Angevin dynasty lost Sicily forever, their rule limited to the south of peninsular Italy. Robert inherited the position of papal champion in Italy; his reign being blessed from the papal enclave within Robert's Provence, by the French Pope Clement V, who made him papal vicar in Romagna and Tuscany, where Robert intervened in the war of factions in Florence, accepted the offered signiory of that city, but had to abandon it due to Clement's opposition. The leader of the Guelph party in Italy, Robert opposed the sojourn of Emperor Henry VII in Italy (1311–13) and his occupation of Rome in 1312. After Henry's death, the Guelph reaction against the Ghibelline leaders in northern Italy, Matteo Visconti and Cangrande della Scala, made it seem for a time that Robert would become the arbiter of Italy. Already ruler of wide possessions in Piedmont, Robert's prestige increased further when in 1313 the pope named him Senator of Rome, and when he became Lord of Genoa (1318–34) and Brescia (1319) and from 1314 onwards held the resounding papal title of imperial vicar of all Italy, during the absence in Italy of the Holy Roman Emperor, vacante imperio. In 1328 he fought another emperor who had ventured into Italy, Louis IV of Bavaria, and in 1330 forced John of Bohemia to quit northern Italy. Robert's hegemony in Italy was diminished only by the constant menace of Aragonese Sicily. When the succession to the margraviate of Saluzzo was disputed between Manfred V and his nephew Thomas II in 1336, Robert intervened on behalf of Manfred, for Thomas had married into the Ghibelline Visconti family. Robert advanced on Saluzzo and besieged it. He succeeded in taking it and sacking it, setting the city on fire and imprisoning Thomas, who had to pay a ransom. The whole dramatic incident is recorded by Silvio Pellico. However, when his viceroy Reforza d'Angoult was defeated in the Battle of Gamenario (22 April 1345), Angevin power in Piedmont began to crumble. With his second wife Sancha of Majorca, Robert established the kingdom of Naples as a center of early Renaissance culture and of religious dissent, supporting the Joachimite prophesies of the Spiritual Franciscans. At Robert's death in 1343, he was succeeded by his 16-year-old granddaughter, Joanna I of Naples, his son Charles having predeceased him in 1328. Joanna was already betrothed to her cousin, the 15-year-old Andrew of Hungary, son of the Angevin king of Hungary, Charles Robert. In his last will and testament Robert explicitly excluded the claims of Andrew of Hungary, clearly mandated that he become prince of Salerno and specified that Joanna alone assume the crown in her own right, to be succeeded by her legitimate offspring. If she were to die without heir, her younger sister Maria, newly named the duchess of Calabria, and her legitimate offspring would inherit the throne. There is no mention in the will that Andrew be crowned king; and this historiographical tradition is largely the result of later historians' accepting without examination the assertions of Hungarian royal propaganda following Andrew's murder at Aversa in 1345. This propaganda, the Hungarian assault on Joanna following the murder of Andrew, and the invasion of the Regno by Louis I of Hungary eventually led to the end of Angevin rule in Naples. Legacy King Robert was nicknamed "the peace-maker of Italy" due to the years of significant changes he made to Naples. The city and nation's economy lay in the hands of Tuscan merchants, who erected superb buildings, monuments and statues that drastically changed King Robert's capital from a dirty seaport to a city of elegance and medieval splendor. Robert commissioned Tino di Camaino to produce a tomb for his son, who should have been his heir, and Giotto painted several works for him. The University of Naples flourished under the patronage of the king dismissed by Dante as a re di sermone, "king of words", attracting students from all parts of Italy. There was virtually no middle class in the South to balance the local interests and centripetal power of the entrenched aristocracy, who retained the feudal independence that had been their bargain with the Angevins' Norman predecessors. He was remembered by Petrarch and Boccaccio as a cultured man and a generous patron of the arts, "unique among the kings of our day," Boccaccio claimed after Robert's death, "a friend of knowledge and virtue." Petrarch asked to be examined by Robert before being crowned as poet in the Campidoglio in Rome (1341); his Latin epic Africa is dedicated to Robert, though it was not made available to readers until 1397, long after both Petrarch and Robert were dead. Family By his first wife, Yolanda, daughter of King Peter III of Aragon, Robert had two sons: Charles (1298–1328), Duke of Calabria (1309), Viceroy of Naples (1318), who was the father of Queen Joanna I Louis (1301–10) Robert's second marriage, to Sancia, daughter of King James II of Majorca, was childless. He had the following extramarital children: Charles d'Artois, member of the regency council and grand chamberlain for Queen Joanna I, executed for murder of King Andrew Maria d'Aquino (Boccaccio's Fiammetta) Helene, who fell in love with and married Andrea Thopia, Lord of Matija, without father's consent. Helene was due to marry (possibly) Philip, son of Baldwin II, when this happened. Thopia's emblem contains three lilies separated by a dotted line, indicating an illegitimate child. Andrea and Helene had Charles (named after his famous grand grandparent), Georges and Helena together. King Robert's last descendant through a legitimate line was Queen Joanna II of Naples. Ancestry Other sources Coat of arms of the House of Anjou-Sicily References Sources Category:Roman Catholic monarchs Category:1276 births Category:1343 deaths Category:Capetian House of Anjou Category:Monarchs of Naples Category:Claimant Kings of Jerusalem Category:Dukes of Calabria Category:Princes of Salerno Category:Counts of Provence
Properties Detailed Description Animator types are different from normal Animation types. When using an Animator, the animation can be run in the render thread and the property value will jump to the end when the animation is complete. The value of Item::rotation is updated after the animation has finished. The following snippet shows how to use a RotationAnimator together with a Rectangle item.
Epidemiology The prevalence and annual incidence of ND are not known but more than 400 cases have been described. No ethnic predilection has been found. Affected patients are almost always male, while females are carriers. Clinical description The ocular findings in affected males are usually bilateral and symmetrical. The iris, anterior chamber, and cornea may be normal at birth but greyish-yellow elevated masses, or "pseudogliomas", are often observed behind the lens along with retinal vascular dysgenesis and leukocoria. Partial or complete retinal detachment develops within the first few weeks or months of life. In infancy and childhood, patients may develop cataracts, nystagmus, anterior/ posterior synechiae, band keratopathy, and a shallow anterior chamber with increased intraocular pressure. Phthisis bulbi (shrinking of the globe) is found later on, along with opacified corneas and sunken orbits. Vision varies from light perception to congenital complete blindness. Most affected males develop progressive asymmetrical sensorineural hearing loss starting in childhood (median age of onset is 12 years). Hearing loss may be severe and bilateral by mid-adulthood. Developmental delay and intellectual disability are found in about 20-30% of patients. Some have cognitive and psychosocial behavioral disorders, including psychosis. Other associated manifestations are highly variable and include growth failure, microphthalmia, a chronic seizure disorder (10% of cases), peripheral vascular disease (peripheral ulcers) and erectile dysfunction, Very rare cases of carrier females with retinal findings, such as retinal detachment, abnormal retinal vasculature with associated vision loss or mild sensorineural hearing loss, have been reported. Etiology Norrie disease is caused by mutations in the Norrie disease (pseudoglioma) NDP gene (Xp11.4-p11.3). A large number of disease-causing mutations have been identified. NDP encodes the norrin protein, involved in the vascular development of the eye and ear. Diagnostic methods Diagnosis is based on the characteristic clinical ocular findings and can be confirmed by molecular genetic testing of NDP. No biochemical or functional assays are available. Differential diagnosis Differential diagnosis includes retinoblastoma in cases with unilateral pseudoglioma, and other disorders related to NDP mutations such as retinopathy of prematurity, persistent hyperplastic primary vitreous, and familial exudative vitreoretinopathy (see these terms). Antenatal diagnosis Prenatal testing for at-risk pregnancies is possible if the disease-causing mutation has been identified in the family. Genetic counseling Norrie disease is inherited in an X-linked manner. Rare de novo mutations have been reported. Genetic counseling should be offered to affected families. Management and treatment Many patients have complete retinal detachment at birth making treatment for preservation of sight difficult. Those that do not have complete retinal detachment may benefit from surgery or laser therapy. Enucleation of the eye may be required in rare cases. Hearing aids should be provided to correct hearing loss and cochlear implantation can be considered. Supportive therapy should be provided for behavioral disorders. Prognosis Overall health is generally good in patients with ND. Life expectancy may however be reduced due to general risks associated with the disabling manifestations of the disease. Expert reviewer(s) If you have selected the “Other” category, please specify which type of user you are: * Email address: * Topic of your comment: * Epidemiology data Summary and related texts Related genes Clinical signs Nomenclature and/or coding Attention: Only comments seeking to improve the quality and accuracy of information on the Orphanet website are accepted. For all other comments, please send your remarks via contact us. Only comments written in English can be processed. The documents contained in this web site are presented for information purposes only. The material is in no way intended to replace professional medical care by a qualified specialist and should not be used as a basis for diagnosis or treatment.
A B&W Photo Challenge – Day #1 – My Relationship with Coffee Several people have tagged me to post a black and white photo for seven days on Facebook describing some aspect of my life. While I typically pass on these things, this one does not sound to bad. Since I am going to write a small blurb to go along with the photo, I thought I go ahead and share these on the Preacher’s Pen website as well. Day #1 – My Relationship with Coffee Coffee is in my blood. Several of my first memories involve my family sitting around and drinking a cup of coffee. It didn’t matter if it was a snowy West Virginia morning or if it was a blistering August day, there was always a cup of coffee to drink. When I was younger, the thought of drinking coffee was pretty disgusting. I didn’t like the flavor, I didn’t like the taste; then in my college years I discovered the wonderful taste of coffee. As a student at West Virginia University, I was walking about a mile and a half to campus everyday. During those times I would drink a cup of coffee on the way to class, then after class, make my way to the Student Center for another large cup of coffee. Those days began a habit which would last me for years. Even when I wasn’t drinking a cup of coffee, I still wanted one. When I wasn’t living near campus, I was driving everyday from Bridgeport, WV and I would have a nice steaming cup of coffee along the way. After class, once again I found my way to the student center for another cup of coffee. This continued to my travels at Freed-Hardeman University, where I actually burned out a Mr. Coffee 4 cup coffee maker. I called home one day and my mom asked me what I needed. I mentioned that I would really like a new coffee pot. A few days later, a new coffee pot arrived. This only made the matter worse because the next coffee pot was a 12-cup coffee maker. Hence the relationship still continues. Every morning I get up there’s a cup of coffee fixed by my beautiful wife. I drink more coffee than most things these days. It may be a sign of getting older, but I happen to enjoy it. There is more to coffee than caffeine and the aroma, there is an atmosphere about coffee. The atmosphere is a relaxed time with friends, family, co-workers or someone you want to get to know better. Hearing the words, “Want to grab a cup of coffee?” can take any stressful day and begin to make it better.
Q: How to use HttpWebRequest to download file Trying to download file in code. Current code: Dim uri As New UriBuilder uri.UserName = "xxx" uri.Password = "xxx" uri.Host = "xxx" uri.Path = "xxx.aspx?q=65" Dim request As HttpWebRequest = DirectCast(WebRequest.Create(uri.Uri), HttpWebRequest) request.AllowAutoRedirect = True request = DirectCast(WebRequest.Create(DownloadUrlIn), HttpWebRequest) request.Timeout = 10000 'request.AllowWriteStreamBuffering = True Dim response As HttpWebResponse = Nothing response = DirectCast(request.GetResponse(), HttpWebResponse) Dim s As Stream = response.GetResponseStream() 'Write to disk Dim fs As New FileStream("c:\xxx.pdf", FileMode.Create) Dim read As Byte() = New Byte(255) {} Dim count As Integer = s.Read(read, 0, read.Length) While count > 0 fs.Write(read, 0, count) count = s.Read(read, 0, read.Length) End While 'Close everything fs.Close() s.Close() response.Close() Running this code and checking the response.ResponseUri indicates im being redirected back to the login page and not to the pdf file. For some reason its not authorising access what could I be missing as Im sending the user name and password in the uri? Thanks for your help A: You don't need all of that code to download a file from the net just use the WebClient class and its DownloadFile method
h) = h**2 + 15*h + 16. Let v be b(-15). Solve 5*t = 2*f - 19, f + v = -f - 2*t for f. -3 Let s(k) = k**2 - 4*k + 3. Let q be s(6). Let g = q + -9. Solve 0 = l - 3*y + g*y + 11, -2*y - 6 = 0 for l. -2 Suppose 4*f + r + 2 = 12, r = 2. Solve x - 2 = 4*x + 2*p, f*p = -2*x - 2 for x. 0 Let f be (-1 + 1)/(3 + -2). Let o = 2 - f. Solve -o*d - 16 = 2*b, -3*b + 3*d - 4*d - 14 = 0 for b. -3 Suppose -3*n - n + 20 = 0. Suppose 0 = -n*a + 15 - 0. Solve -r + 4*r = -a*o - 6, 0 = 5*r - 4*o - 26 for r. 2 Let c = -10 - -5. Let s = c - -19. Suppose -5*x + 36 = -s. Solve i + 2*k + x = 2*i, 2*i - 8 = k for i. 2 Let z = -1 - -6. Solve -4*f - 4*i = 4, -z*f - 17 = -3*i + 4*i for f. -4 Suppose 5*c - 16 = 4. Suppose 10 + 14 = 3*n. Suppose -2*d - n = -4*d. Solve 0 = -c*u + 3*m - 4 + 17, -2*u = -d*m - 14 for u. 1 Let i(g) = g**3 - 7*g**2 - 8*g + 1. Let a be i(8). Let s = -5 + 8. Suppose 117 = 5*n + 17. Solve -a = s*p + x + 4, 0 = -4*p + 2*x - n for p. -3 Suppose -13 = 3*m - 4. Let y be -2*(-2)/(-3)*m. Solve 4 = s + 4*c, 0 = y*s - c + 4 - 3 for s. 0 Let i be 1/(2/6)*8/12. Solve 0 = -4*r - 3*m - 8, -2*m + 0 = r + i for r. -2 Let b(h) = -3*h + 32. Let u be b(6). Solve 2*g - c - u = -3*c, -5*c = -2*g for g. 5 Let l(p) = 2*p - 15. Let h(s) = -s + 8. Let u(n) = 5*h(n) + 3*l(n). Let w be u(7). Solve f + 20 = -4*g, 3*g - 7*g - 20 = w*f for f. 0 Let i be (-42)/28*10/(-3). Solve -i*k - 5 = 5*q, 4*q = -6*k + 3*k - 1 for k. -3 Let o = 94 - 90. Solve -m = g - 4, -o*m = -m - 9 for g. 1 Let f = 18 - -3. Let z be 561/f + (-4)/(-14). Suppose -4*x + 3*d + z = 0, 0*x - d + 5 = x. Solve -2*n = -4*s - 18, -3*s = -0*s + 5*n - x for s. -3 Let l = 83 + -81. Solve 3*f = l*a + 3, -2 = f - 2*a - 3 for f. 1 Suppose 2*c = 3*c - 9. Solve -5*h = 3*q - 17, 5*h - 2*h - c = -3*q for h. 4 Suppose 4*y = -27 + 183. Suppose -5*j - 2*v = -13 - 33, 3*j - y = -5*v. Solve 2*l = 2*q + j, -2*q - 4*l = -q - 6 for q. -2 Let k be (2/6)/(3/171). Suppose 3*d + k = 88. Solve w + d + 6 = -5*z, -w - 14 = 2*z for z. -5 Suppose 0*n - 2*m + 14 = n, 5*n - 35 = -3*m. Solve -3*d + 7*d = 5*q + 18, n*q = 5*d - 18 for d. 2 Suppose 4*d + d = s - 31, 2*d = 2*s - 22. Let i be (2/4)/(s/60). Solve 4*x - 28 - 12 = 4*u, 3*u = i*x - 40 for x. 5 Let b = -8 - -15. Solve 0 = -5*u + f - 0*f - 15, -2*u = -3*f - b for u. -4 Suppose 5*o - 17 - 8 = 0. Suppose 2*p + 4*d - 1 = -d, p = -4*d - 7. Solve -o*k + 5 = 0, 3*y + p = 5*k + 2 for y. -2 Let k(s) = s**3 + 3*s**2 - 5*s - 4. Let i be k(-4). Solve 3*a + 2*m = a - 10, a - 2*m + 5 = i for a. -5 Suppose -v = -0*v - 2. Suppose -a - 2 = i, -i - 13 = -v*a - 5. Solve 0 = 5*u - a*o + 2 - 23, -4*u + o = -18 for u. 5 Let w be 2 + -2 - (-11 + 4). Suppose 0 = -3*z - w + 4. Let t(k) = -4*k**3 + k. Let x be t(z). Solve x*s + 2 + 5 = -5*b, -3*s + 7 = -2*b for b. -2 Let f(z) = z**2 + 11*z + 6. Let o be f(-7). Let q be (-1)/(-4) + o/(-8). Solve 5*y = 2*h + 3, 2*h - 4 = h - q*y for h. 1 Let x be 3/(-2)*32/(-3). Let j = -11 + x. Let v = -21 - -42. Solve 2*f + 0*h + 4 = 5*h, -j*f - 3*h + v = 0 for f. 3 Suppose 0 = q - 5*y - 9, 3*q + y - 84 = -25. Solve -16 = -w + 5*w - 4*g, 0 = 3*w + 4*g + q for w. -5 Let r be (-2)/((-3)/1 + 35/15). Solve 0 = r*v + 5*u - 9 + 40, -4*u = -v + 18 for v. -2 Suppose 6*t = t - 20, -3*f + 45 = -3*t. Let h = 2 + f. Solve -2*m - 4*d - 7 = -d, -5*m - 3*d - h = 0 for m. -2 Suppose -l - 2*k + 160 + 31 = 0, -4*k - 161 = -l. Suppose 5*c - l = -61. Solve -3*z = 3*y - 9, 4*y - c = -5*z - 9 for z. 3 Suppose 0 = -0*y - y + 7. Solve 3*s + 2*s - y = -3*p, -s - p = -3 for s. -1 Let c = -43 - -54. Solve -3*v - 5*f + c + 11 = 0, -5*v + 10 = 3*f for v. -1 Let j = 27 + -22. Solve 5*v - j = 0, v + 0*v + 15 = 4*w for w. 4 Suppose 1 = -2*m + 11. Solve -3*i - 5*y + 5 = 0, -64 = m*i - 5*y - 19 for i. -5 Let w be (-1 - (0 - 4)) + 1. Solve r - 4 = w*r + 5*g, -r - 5*g = -2 for r. -3 Suppose 2*g + 3 = 41. Solve 2*i - g = -3*x, -2*x + 6*i - i - 19 = 0 for x. 3 Let f be (2/8)/(2/40). Suppose -6*v = -f*v. Solve 3*a + 3*h + 6 = v, 4*h = h - 6 for a. 0 Suppose -t = 4*t + 5*w, -2*w - 8 = -2*t. Suppose -5*y - 8 = -3*y, 0 = -2*d + t*y + 16. Solve -2*z - 3 = d*h - 7, -3*z + 3 = 5*h for h. 3 Suppose -4*h + 66 = -10. Suppose -3*k = -x + h, x - 3*k = -6*k - 11. Solve 2*j = -x*b, 2 = -5*j - 2*b - 6 for j. -2 Suppose -2*s + 4*s = 10. Suppose -5*d - 7 = -3*c, -6*d + d = -5*c + 15. Let a be 2 + d*(0 + 3). Solve -3*r - 22 = -5*y, -s*r + 40 = a*y + 10 for y. 5 Suppose -3*r = -u - 2*u + 6, -16 = -5*u - r. Solve 0 = 5*n - d - 22, -n + u*n + d = 13 for n. 5 Let l be (5 - ((4 - 3) + 1))/1. Solve -4*h = -l*n - 15, 2*n = -0*h - 4*h + 10 for h. 3 Let r be (2*-1 + 1)*-19. Let i = r - -7. Solve 0 = 5*v + 2*d + i, 0 = -v - 0*v + 4*d + 8 for v. -4 Let u(j) = -j + 4. Let v be u(-3). Let l = 11 - v. Let s = 5 - l. Solve -2*b + s = -3*n, 2*n = 3*n - 4*b - 13 for n. -3 Suppose 6 = 6*l - 12. Solve -z - l = 2*v + 6, 5*z = -5 for v. -4 Suppose -3 = -3*k + 9. Suppose -f + 15 = k*f. Let n = -3 + f. Solve -3*p - 4*r - 7 = n, 2*p - r = r for p. -1 Suppose -4*p = -n - 7, 3*n - 11 = -3*p - 2*n. Suppose -r + 33 = p*r. Solve 3*t - 11 = 2*u, -3*u - t = -0*t + r for u. -4 Suppose -16 = -5*d - 1. Solve -j - 5 = 2*n, 0 = -3*j - d*n + 2*n for j. 1 Let s be ((-3)/6)/(1/(-4)). Let n = -91 - -94. Solve n*h + 1 = -s*f, h - 12 = 5*h for f. 4 Suppose -v - 132 = v. Let x be 4/(-22) + (-144)/v. Suppose 0*g + 20 = x*g. Solve -i - 3*i = 2*m - g, -m = i - 3 for i. 2 Let y be -10*(0 + -1 + (-5)/10). Suppose -4*l + 2*o = 4*o - 16, 4*o - 16 = 0. Solve 4*v = -3*j - 21, -l*j - y = 4*v - j for v. -3 Let z be (3 + 3 + -8)/(2/(-4)). Solve 2*i - 3*c + 2 = -z*c, -4*i - 2 = c for i. 0 Let g = 2 - -1. Suppose 3*o + 2*o + 5*i = 0, 4*i = g*o - 35. Suppose 3*x = -5*k - 2, o*x = -3*k + 2*x - 6. Solve -2*q = -5*y + 30, -2*q - 2*y = k*q + 12 for q. -5 Let l = 54 - 51. Solve 4*q - 2*o = 5 + 15, q - 10 = l*o for q. 4 Let s(i) = 10*i**2 + 2*i. Let c be s(-1). Solve -2*d - 3*g = -3, 3*d - 3*g = -4*g + c for d. 3 Let y = -12 + 21. Suppose y = t + 2*t. Let l = 2 + t. Solve 4*c = 3*q - 5, 13 = -4*c - 0*c - l*q for c. -2 Suppose 4*b - 9 + 1 = 0. Suppose -p - b*n - 2*n = 16, 4*p - n - 21 = 0. Solve -4*h = -2*x + 26, -3*h + 5 = p*x - 3 for x. 5 Let s = 3 - 3. Suppose s = -z + 3*z - 4. Let k be (1 - -14)*(-6 - (-19)/3). Solve -2*c = -n + k*n - z, -c = 4*n - 3 for n. 1 Let u = 413 - 403. Let y(c) = c**3 - 4*c**2 - 4*c + 3. Let g be y(5). Solve n + u = 4*f, g*f - 4*f - 14 = -n for n. 2 Let g be -1*9/(-3) - 4. Let u(b) = b**2 + 1. Let q be u(g). Suppose q*a = -0*a + 56. Solve a = 5*h - 2*p, -4*h - p = -4*p - 28 for h. 4 Suppose k - 2*b + 10 - 1 = 0, 4*k = -2*b - 6. Let u = -1 - k. Solve u*o - 4*g - 20 = -0*g, 4*o + 3*g + 4 = 0 for o. 2 Suppose 0 = 5*g - 2*g - 117. Solve 5*j - 9 = -5*w - g, 3*j = 3*w - 6 for w. -2 Let q(g) = -4*g**3 + g. Let c be q(-1). Solve 2*x - 5*i - 10 = -c*x, 0 = -2*x + 5*i + 13 for x. -1 Suppose 3*h = 4*l - 1, -2*h - 2 = -3*l - 0. Solve 3 = -y + 3*j, 4*y + j = -l*j + 5 for y. 0 Suppose 0 = -3*o - 2*o + 30. Suppose -10 = -3*i + q + o, -2*i + 2*q + 16 = 0. Solve 5*d + 6 = 2*n + 3*d, i*n + d = 12 for n. 3 Suppose 0 = -s + 3*j + 19, 3*s + 0*s + 3*j = -3. Let z(a) = a + 4. Let o be z(-4). Solve o = -2*q + 5*t + 20, -3*q - q + s*t + 28 = 0 for q. 5 Suppose -6 = -2*r - 2. Suppose j + 4*j = 135. Solve -3*p - 17 = r*m, -4 + j = -p - 5*m for p. -3 Let l be 6/4 + 9/6. Solve 4*t + 7 = f - 0, -l*f + 8 = t for t. -1 Let y = 5 + 0. Suppose -2*n = v - 2, -v = n - 1 - 4. Let a = v - y. Solve -10 = b - 2*d, a*b = 3*d - 15 - 3 for b. -2 Suppose -y = -2, 4*q - y - 15 - 15 = 0. Let i = -4 + q. Solve -7 - 8 = -5*o + l, -i*l + 24 = o for o. 4 Suppose 2*u - 6 = -2*i - 2, 5*u - i = 4. Let m be (1/(-2))/(u/(-6)). Solve 0 = -3*h + 4*d + 16, 2*h + m*d - 7 = -19 for h. 0 Let f(g) = 9 + g + 2*g - 15 - g. Let m be f(11). Solve -r + 2*r = t + 3, -4*r + m = -5*t for t. -4 Let p be 2 + (1 - 5) + 5. Let r(z) = z - 1. Let x be r(p). Let n = 16 + 7. Solve 5*m = 2*g - 35, -3*m - 2 - n = -x*g for g. 5 Let s be -1*(6 + -4)*-2. Solve 5*j - 4*b = -0*j - 15, -s*j + 2*b = 12 for j. -3 Let w = -3 - -3. Let q(o) = -3 - 2*o + 0*o + 0*o. Let d be q(-7). Solve 2*z + 4*k - 1 + 19 = w, -2*k - d = -z for z. 1 Let t = -73 - -77. Solve 3*u - t*s - 3 = 2, 4*u - 5*s = 5 for u. -5 Suppose 3*n = 3*l - 3, -2*l + 7 = -3*n + 2*l. Suppose 0
External irradiation with or without long-term androgen suppression for prostate cancer with high metastatic risk: 10-year results of an EORTC randomised study. We did a randomised phase 3 trial assessing the benefit of addition of long-term androgen suppression with a luteinising-hormone-releasing hormone (LHRH) agonist to external irradiation in patients with prostate cancer with high metastatic risk. In this report, we present the 10-year results. For this open-label randomised trial, eligible patients were younger than 80 years and had newly diagnosed histologically proven T1-2 prostatic adenocarcinoma with WHO histological grade 3 or T3-4 prostatic adenocarcinoma of any histological grade, and a WHO performance status of 0-2. Patients were randomly assigned (1:1) to receive radiotherapy alone or radiotherapy plus immediate androgen suppression. Treatment allocation was open label and used a minimisation algorithm with institution, clinical stage of the disease, results of pelvic-lymph-node dissection, and irradiation fields extension as minimisation factors. Patients were irradiated externally, once a day, 5 days a week, for 7 weeks to a total dose of 50 Gy to the whole pelvis, with an additional 20 Gy to the prostate and seminal vesicles. The LHRH agonist, goserelin acetate (3·6 mg subcutaneously every 4 weeks), was started on the first day of irradiation and continued for 3 years; cyproterone acetate (50 mg orally three times a day) was given for 1 month starting a week before the first goserelin injection. The primary endpoint was clinical disease-free survival. Analysis was by intention to treat. The trial is registered at ClinicalTrials.gov, number NCT00849082. Between May 22, 1987, and Oct 31, 1995, 415 patients were randomly assigned to treatment groups and were included in the analysis (208 radiotherapy alone, 207 combined treatment). Median follow-up was 9·1 years (IQR 5·1-12·6). 10-year clinical disease-free survival was 22·7% (95% CI 16·3-29·7) in the radiotherapy-alone group and 47·7% (39·0-56·0) in the combined treatment group (hazard ratio [HR] 0·42, 95% CI 0·33-0·55, p<0·0001). 10-year overall survival was 39·8% (95% CI 31·9-47·5) in patients receiving radiotherapy alone and 58·1% (49·2-66·0) in those allocated combined treatment (HR 0·60, 95% CI 0·45-0·80, p=0·0004), and 10-year prostate-cancer mortality was 30·4% (95% CI 23·2-37·5) and 10·3% (5·1-15·4), respectively (HR 0·38, 95% CI 0·24-0·60, p<0·0001). No significant difference in cardiovascular mortality was noted between treatment groups both in patients who had cardiovascular problems at study entry (eight of 53 patients in the combined treatment group had a cardiovascular-related cause of death vs 11 of 63 in the radiotherapy group; p=0·60) and in those who did not (14 of 154 vs six of 145; p=0·25). Two fractures were reported in patients allocated combined treatment. In patients with prostate cancer with high metastatic risk, immediate androgen suppression with an LHRH agonist given during and for 3 years after external irradiation improves 10-year disease-free and overall survival without increasing late cardiovascular toxicity.
1. Field of the Invention Whereas this invention is defined with respect to motorcycle passenger comfort and convenience, it will be apparent that the invention may be applied to numerous other similar vehicular and non-vehicular adaptations. It is primarily adapted to its adjustable position on the two-seated motorcycle, operationaly adjacent the passenger seat and it is designed to be secured in direct connection with the motorcycle frame elements as will be more apparent from reference to the ensuing description. 2. Prior Art The following prior art patents best represent the known state of development. U.S. Pat. No. 3,565,484--J. A. Gargelo--dated Feb. 23, 1971. U.S. Pat. No. 3,829,159--Dennis F. Leffler--dated Aug. 13, 1974. U.S. Pat. No. 4,205,879--Dennis H. Heling--dated June 3, 1980. U.S. Pat. No. 4,277,102--Arne Aaras et. al.--dated July 7, 1981. U.S. Pat. No. 4,438,975--Ralph J. Williams--dated Mar. 27, 1984. In none of the aforesaid, taken singly or in combination does one find the coactive construction of the present invention, wherein means are provided for fingertip control of the swingable relation of the arm rest to the vehicular seat of the passenger. This control permits both portability and operational modes to be employed without knock down, and also insures accessibility of the passenger before and during vehicular operation.