text
stringlengths
24
612k
The physician assistant profession and military veterans. The physician assistant (PA) profession originated to train former medics and corpsmen for a new civilian health care career. However, baccalaureate degree prerequisites to training present barriers to discharged personnel seeking to enter this profession. A survey was administered (2006-2007) to all MEDEX Northwest PA program graduates who had entered with military experience. The survey addressed attitudes toward the profession, PA education, and practice and how military experience influenced their education and careers. The response rate was 46.4%, spanning all branches of the military. Respondents reported military experience positively impacting ability to handle stress and work in health care teams and that patients and colleagues viewed their military background positively. Most (75.5%) respondents did not hold a bachelor's degree at matriculation. Veterans bring substantial health care training to the PA profession. However, program prerequisites increasingly present barriers to entry. Veterans' contributions to health care and the consequences of losing this resource are discussed.
Donald Trump’s victory over Clinton isn’t just impressive because it showcased a skeletal campaign outfit defeating a team that outsized it in terms of experience and infrastructure. What is truly jaw-dropping is how a campaign operation such as Trump’s overcame the odds against a rival organization that out-fundraised it by shocking proportions. How much did Hillary Clinton actually raise during this campaign? Her campaign raked in just shy of 498 million dollars. However, other outside outfits such as her Super PAC (Priorities USA ACTION) and other aligned groups raised a little over $189 million. A huge sum when put together. Priorities USA raised more money than any Super PAC ever – the vast majority of the cash raised came from seven figure donations. Donald Trump was not only up against an operation that executed impeccable fundraising prowess. He also lacked the resources to fundraise within the same ballpark. Trump’s team only raised $247 million. He took in $380 million less than the Democratic nominee. His 2016 war chest came nowhere close to Romney’s $450 million haul – a candidate who ran for president four years ago. This disparity in fundraising trickled down to campaign expenditures. Altogether, Trump spent about five dollars for each vote. Clinton spent about $10. The point being is that Trump did more with less. Clinton paid twice as much for her voters and still came short in the Electoral College. Trump lost the money war but still ended Election Day victorious. Why did liberal mega-donors get such a terrible return on investment with their candidate? They are meeting to understand why and how to not repeat their same mistakes. Rich liberals across the country (George Soros included) are meeting for a three-day, private conference in Washington to discuss strategy moving forward. Union leaders, liberal billionaires, Nancy Pelosi, Elizabeth Warren, and Keith Ellison are some of the bigwigs attending. The event is hosted by the Democracy Alliance donor club. An outline of their schedule was obtained by POLITICO. The topic of discussion will be how best to utilize their political donations moving forward. The focus will not just be on the next national election, but how to be more successful in races at the local and state level – an area Democrats have performed terribly in. George Soros and others in the group believe the best way to halt Trump’s agenda and protect Obamacare is to win more state legislatures and gubernatorial seats. Rep. Keith Ellison (D) is a part of the talks and is pushing the group to engage working class voters – the voting block that went in droves for Trump. Ellison, Congress’ first Muslim representative, is also being positioned as the strongest in line to become the DNC chairman. If he succeeds Donna Brazile, it will be a sharp left turn for an already far-left Democratic Party. He's been in talks with Party leaders and their wealthy donors. Despite their losses, be prepared for the liberal elite to keep spending millions to promote their progressive agenda on the country. They should keep in mind, however, that Trump has proven himself knowledgeable on how to use his own resources much more efficiently.
**Core tip:** In this study, we summarized and analyzed the mRNA expression data of TCGA-COAD and obtained the expression features of AMPD2 in cancer tissues and adjacent tissues in patients with colorectal cancer. We constructed cell samples that were not subjected to high-throughput sequencing of RNA-seq, and although the results were closer to clinical reality, in the case of verification experiments, the probability of false negatives was increased. In addition, our cytology validation experiments need to be carried out in more detail, and our colorectal cancer cohort sample was only 201 cases. We expect to add cytological evidence and a large sample of prospective prognostic cohorts in subsequent studies. INTRODUCTION ============ Colorectal cancer (CRC) is the third most common cancer and the fourth leading cause of cancer-related deaths worldwide, and remains a major health threat in China\[[@B1],[@B2]\]. CRC patients at an advanced stage often have a poor prognosis due to abnormal tumor metabolism and recurrence. Therefore, it is of clinical significance to identify novel biomarkers that control the severity of CRC as well as biomarkers for the prediction of prognosis\[[@B3]\]. Recently, there has been increased interest in studying the metabolic reprogramming in cancer in the hope of developing metabolism-based anticancer therapy\[[@B4]\]. Accordingly, various studies aimed at identifying the metabolic index in blood, body fluids, carcinoma tissue, and gut microbiota have been performed to establish a complete metabolic atlas and explain the possible mechanisms by which these abnormalities are present in gastrocolorectal tumors\[[@B5]\]. In several studies, it has been shown that in addition to primary metabolism, many specific secondary metabolites have an important impact on the development and progression of CRC, thereby suggesting that specific metabolic markers can be used as biomarkers for metabolic abnormalities\[[@B6]\]. These findings suggested that AMPD2 may act as a metabolic tissue enzyme, which is closely related to the type of CRC, and may play an important role in CRC. AMPD2 is an important enzyme involved in adenosine monophosphate metabolism and plays an important biological function in adenylate metabolism in smooth muscle tissue\[[@B7]\]. In previous studies, it was shown that AMPD2 affected the nephrotic syndrome and hypercholesterolemia\[[@B8]\]. In addition, it has been demonstrated that AMPD2 dramatically affected physiological and pathological processes\[[@B9]\]. Despite recent efforts to understand the activities of AMPD2 in the biological mechanism of cancer, little is known about the role of AMPD2 in CRC and it remains to be elucidated whether AMPD2 expression correlates with any of the clinicopathological features of CRC\[[@B10]\]. In this study, we combined TCGA-COAD data set analyses of both tumor and normal samples to investigate the significance of AMPD2 in CRC. Therefore, *in vitro* studies were performed to investigate how AMPD2 may affect the CRC-associated regulatory pathway. A total of 201 samples were collected using tissue microarray validation cohort studies to investigate whether AMPD2 could be used as a biomarker for poor CRC prognosis. MATERIALS AND METHODS ===================== Data collection and preprocessing analysis ------------------------------------------ In this study, the TCGA dataset was used for analysis of gene expression in CRC tissues and normal tissues. TCGA-COAD RNA-seq data and related clinical data of cancer tissues (478), and normal tissues (41) were downloaded from <https://>[xenabrowser.net/](xenabrowser.net/)\[[@B11]\]. We continued to match and screen the organization label, and obtained 40 pairs of cancer tissues and paired adjacent normal tissues. The data were updated to November 2018. To assess the prospective functions of the genes influenced by AMPD2, we selected a total of 50 TCGA-COAD specimens with the highest expression of AMPD2 and 50 TCGA-COAD specimens with the lowest expression of AMPD2, and follow-up biologic function prediction analysis was performed in the abnormally high expression and low expression groups. Gene Ontology (GO)\[[@B12]\] and Kyoto Encyclopedia of Genes and Genomes (KEGG)\[[@B13]\] analyses were employed using R software (version 3.6) Bioconductor module. The datasets GSE97023 were downloaded from the Gene Expression Omnibus (GEO) (<https://www.ncbi.nlm.nih.gov/geo/>)\[[@B14]\], to analyze RNA-seq baseline data for CRC cell lines. Cell lines and cell culture, and AMPD2 overexpression and knockdown ------------------------------------------------------------------- Human CRC cell lines SW480 and Co115 were purchased from the Cell Bank of the Chinese Academy of Sciences (Shanghai, China). The cells were cultured in Dulbecco's Modified Eagle's Medium (Biowest, France) with 10% fetal bovine serum (Gibco, United States) and 1% penicillin-streptomycin antibiotics (Gibco, United States). Cells were cultured in an incubator at 37°C with 5% CO~2~. For AMPD2 overexpression, cells were transfected with AMPD2 overexpression plasmid or blank plasmid purchased from Gene Pharma (Shanghai, China). For AMPD2 knockdown, an AMPD2 specific siRNA (siAMPD2) and a negative control siRNA (siNEG) were chemically synthesized by Gene Pharma (Shanghai, China). Transfection of cells with siRNA was performed using Lipofectamine 2000 (Invitrogen, ThermoFisher Scientific, United States) according to the manufacturer's guidelines. Western blot analysis --------------------- Cells were harvested and lysed in RIPA buffer, containing proteinase and phosphatase inhibitors. The concentration of proteins in cell lysates was determined by a BCA kit (Applygen Technologies, China) following the manufacturer's instructions. Equal amounts of cell lysates (20 μg protein/lane) were electrophoresed on SDS-polyacrylamide gels and transferred to nitrocellulose membranes. Membranes were blocked, and then probed overnight with appropriate primary antibodies (AMPD2, 1:1000; Notch3, 1:500; GAPDH, 1:8000) in blocking buffer at 4°C. Bound antibodies were detected with Beyotime horseradish (HRP)-conjugated goat anti-rabbit IgG or anti-mouse IgG (at 1:10000 dilution; Genetech, China) and visualized using a Bio-Rad ChemiDoc XRS imaging system. Tissue microarray ----------------- A total of 201 CRC patients who underwent CRC surgery between January and August 2014 in the Oncology Department, Affiliated Hospital of Jiangnan University, Wuxi, China, were enrolled in the present study. The patients were followed-up until December 2018. Based on the patient\'s medical records, formalin-fixed paraffin-embedded (FFPE) tissue specimens from these patients were collected. Clinical and pathological parameters, including patient age, gender, tumor size, histological grade, primary tumor (pT), lymph node (pN) metastasis, pathological staging, neurological invasion, lymphatic invasion, and vascular invasion were analyzed. Patient data and tissue samples collected during our study were approved by the Ethics Committee of Affiliated Hospital of the Jiangnan University (Jiangnan, China). After collecting the paraffin blocks, we fabricated tissue microarrays (TMA) using a Tissue microarray sampler (Quick-Ray; UNITMA, Korea). From each colorectal adenocarcinoma tissue, two representative tumor cores with a diameter of 1.5 mm were obtained. Hematoxylin and eosin (H&E) staining was performed on each tissue to confirm tumor tissue integrity and cell morphology. Cases with insufficient cancer tissue or cases with no adenocarcinoma in the core were not included in the study. To ensure the stability of subsequent TMA studies, two areas were sampled in each tumor tissue and normal epithelial tissue. Immunohistochemical staining ---------------------------- Immunohistochemistry was performed using 4 µm sections from FFPE tissue specimens of CRC patients. After incubation in xylene three times for five minutes each time, and subsequent passages in gradient alcohol, the sections were immersed in distilled water for 5 min. Next, an antigen retrieval procedure was performed using a sodium citrate solution for 20 min in boiling water. Sections were incubated with 3% hydrogen peroxide for 5 min to block endogenous peroxidase. Subsequently, the sections were incubated overnight at 4°C with a primary polyclonal antibody directed against AMPD2 (1:200, ProteinTech, China) and Notch3 (1:200, ProteinTech, China). The sections were washed, incubated with the amplification agent and polymerase (reagent A, GTVisionTM III Kit supply, China), then stained with 3,3'-diaminobenzidine (reagent B and C, GTVisionTM III Kit supply, Shanghai, China). Sections were counterstained using hematoxylin. In each section, the staining was scored according to the percentage of positively-stained cells in the entire section (no positive staining or ≤ 5% = 0; 6%-25% positive = 1; 26%-50% positive = 2; 51%-75% positive = 3; and 76%-100% positive = 4). The scoring intensity was determined as previously described: no staining = 0, weak staining = 1, moderate staining = 2, strong staining = 3\[[@B15]\]. Statistical analysis -------------------- Cut-off values for AMPD2 and Notch3 were obtained from the receiver operating characteristic curve (ROC) and the area under curve (AUC). Pearson's Chi-square tests or Fisher's exact tests were employed to analyze the association between AMPD2 expression, clinicopathological parameters, and Notch3. Moreover, Kaplan-Meier survival analysis was used to determine the probability of overall survival (OS). Data were analyzed using log-rank tests. Univariate and multivariate survival analyses were performed using the Cox proportional hazard model and OS. Statistical analyses were performed using SPSS for Windows 22.0 software (IBM). *P* \< 0.05 was considered statistically significant. RESULTS ======= AMPD2 is commonly overexpressed in TCGA CRC tissues --------------------------------------------------- In this study, we evaluated AMPD2 expression in CRC and normal colorectal tissues, and changes in transcriptional levels of AMPD2 were first validated using microarray values in all tumor tissue and normal tissue from the TCGA-COAD data sets. The results showed that AMPD2 mRNA was significantly increased in CRC tissues in the TCGA-COAD data set (*P* = 0.0238; Figure [1A](#F1){ref-type="fig"}). Moreover, we demonstrated that an increase in AMPD2 mRNA abundance was observed in paired cancerous tissue when compared with paired adjacent normal tissue from the TCGA data set (Figure [1B](#F1){ref-type="fig"}). In addition, we used the TCGA-COAD data set to correlate mRNA expression with AMPD2. A total of 50 specimens with abnormally-high expression of AMPD2 and 50 specimens of abnormally-low expression of AMPD2 were selected, and differential gene expression was analyzed. According to the high and low expression of AMPD2, a heat map was drawn as shown in Figure [1C](#F1){ref-type="fig"}. ![The expression level of AMPD2 in the TCGA-COAD data set. A: The expression level of AMPD2 in cancer tissues and paracancerous tissues was determined by two independent samples *t* test, *P* \< 0.05 was considered significant; B: In paired samples of cancer tissue and adjacent normal tissues, the AMPD2 expression level was determined by paired t-test, and *P* \< 0.05 was considered significant; C: AMPD2-based high expression subgroup (50 cases) and low expression subgroup (50 cases) in cancer tissues. A heat map of the difference in gene expression was produced.](WJCC-8-3197-g001){#F1} Functional implication of AMPD2 associated with the Notch pathway in CRC in vitro --------------------------------------------------------------------------------- To further investigate the biological function of the differential expression of transcription levels caused by high expression of AMPD2, we performed GO and KEGG enrichment analysis of the genes that were up-regulated in the AMPD2 overexpression group (Figure [2A and B](#F2){ref-type="fig"}). When compared to the AMPD2 low expression group, the AMPD2 overexpression group showed a positive regulation of neural precursor cell proliferation. In addition, KEGG analysis showed that the Notch pathway was strongly correlated with AMPD2 expression, and the expression of Notch3 and JAG2 mRNA was positively associated with AMPD2 in CRC tissues. These results suggested that high expression of the Notch signaling pathway in CRC patients with AMPD2 up-regulation affected the progression of CRC. ![Functional enrichment analysis and western blot. A and B: Based on AMPD2, a high expression subgroup (50 cases) and a low expression subgroup (50 cases) in cancer tissues were identified, and functional enrichment analysis of gene expression differences was performed using GO and KEGG maps; C: The expression of AMPD2 in various colorectal cancer cell lines was analyzed according to the GEO-GSE97023 data set; D and E: The Western blot results of up-regulation and down-regulation of AMPD2 in SW480 and Co115 cell lines, immunoblotting (D) and histogram (E).](WJCC-8-3197-g002){#F2} Figure [2C](#F2){ref-type="fig"} shows AMPD2 (gene probe: TC01000950.hg.1) baseline mRNA expression values in various CRC cell lines. We selected SW480 and Co115 cell lines for subsequent up-regulation and silencing studies of cell biology. Protein expression levels were determined. In brief, AMPD2 and Notch3 protein expression was evaluated in SW480 and Co115 cells. Both AMPD2 and Notch3 were up-regulated at the protein level (Figure [2D and E](#F2){ref-type="fig"}) in SW480 and Co115 cells with AMPD2-Lent when SW480 and Co115 cells were compared with the AMPD2 negative control. Similarly, both AMPD2 and Notch3 were down-regulated at the protein level (Figure [2D and E](#F2){ref-type="fig"}) in SW480 and Co115 cells treated with siAMPD2 when compared to SW480 and Co115 cells that were transfected with the negative control. Correlation between AMPD2 expression and clinicopathological features in CRC ---------------------------------------------------------------------------- We analyzed the correlation between high expression of AMPD2 and Notch3 and clinicopathological parameters in CRC patients. Clinicopathological and demographic characteristics are presented in Table [1](#T1){ref-type="table"}. Immunohistochemical analysis of AMPD2 and Notch3 expression in 201 CRC patients revealed that AMPD2 and Notch3 were predominantly expressed in the cytoplasm of carcinoma cells (Figure [3A](#F3){ref-type="fig"}). To assess the classification of AMPD2 and Notch3 protein expression, we used the immunohistochemical semi-quantitative score and predicted the ROC curve for survival by AMPD2 and Notch3 expression levels, and calculated the cut-off value in conjunction with the results of the Youden index. Thus, patients were categorized as high expression of AMPD2 if their immunohistochemical scores were \> 0.50. As shown in Table [1](#T1){ref-type="table"}, overexpression of AMPD2 significantly correlated with advanced depth of the tumor (*P* = 0.022) and poor differentiation (*P* = 0.037). As shown in Table [2](#T2){ref-type="table"}, univariate Cox analysis for OS indicated a correlation with higher TNM stage (HR = 3.198, 95%CI: 1.915-5.343, *P* \< 0.001) and increased expression of AMPD2 (HR = 1.769, 95%CI: 1.094-2.862, *P* = 0.020). Furthermore, multivariate regression analysis indicated that a higher TNM stage was associated with a relative risk of death of 3.727 (95%CI: 2.206-6.296, *P* \< 0.001) when compared with that of Stage I-II. In addition, overexpression of AMPD2 was associated with a relative risk of death of 2.133 (95%CI: 1.295-3.513, *P* = 0.003). Patients with colorectal adenocarcinomas who belonged to the AMPD2 high expression group (*n* = 61) had a significantly lower cumulative survival rate when compared to patients in the AMPD2 low expression group (*n* = 140) (log-rank *P* = 0.0181). Patients with CRC who had high expression of Notch3 (*n* = 70) had a significantly lower cumulative survival rate when compared to those with low expression of Notch3 (*n* = 131) (log-rank *P* = 0.465). Subgroup survival analysis revealed that patients who showed high expression of both AMPD2 and Notch3 had the worst prognosis when compared with the other three subgroups. Patients with low expression of AMPD2 and low expression of Notch3 showed the highest survival when compared to the other subgroups (*P* \< 0.001, Figure [3B](#F3){ref-type="fig"}). ###### Correlations between clinicopathological characteristics and both AMPD2 and Notch3 expression in 201 colorectal cancer patients **Parameters** **Total (*n* = 201)** **AMPD2 expression** **Chi-square value** ***P* value** ------------------- ----------------------- --------------------------------------- ---------------------- --------------- -- Gender 0.664 0.415 Male 114 32 82 Female 87 20 67 Age (yr) 0.004 0.953 \< 60 78 20 58 ≥ 60 123 32 91 Location 3.045 0.081 Colon 80 26 54 Rectum 121 26 95 Vascular invasion 0.502 0.479 Negative 165 41 124 Positive 36 11 25 Neural invasion 0.780 0.337 Negative 170 42 128 Positive 31 10 21 Depth of tumor 5.270 0.022[a](#T1FN1){ref-type="table-fn"} T1/T2 60 9 51 T3/T4 141 43 98 Lymph metastasis 0.048 0.826 N0 94 25 69 N1/N2 107 27 80 Differentiation 3.887 0.037[a](#T1FN1){ref-type="table-fn"} Well/mod 184 44 140 Poor 17 8 9 TNM stage 0.487 0.485 I-II 96 27 69 III-IV 105 25 80 Notch3 0.389 0.553 High 140 38 102 Low 61 14 47 *P* \< 0.05 was considered statistically significant. ###### Cox proportional model predicts the relationship between AMPD2, Notch3 and clinicopathological parameters and survival **Clinicopathological** **Parameters** **Univariate** **Multivariate** ---------------------------------------- --------------------- ------------------------------------------ --------------------- ----------------------------------------- Gender (female/male) 1.004 (0.636-1.585) 0.986 0.973 (0.610-1.552) 0.909 Age (≥ 60/\< 60) 1.060 (0.664-1.693) 0.806 1.066 (0.661-1.721) 0.793 Location (rectum/colon) 0.889 (0.561-1.409) 0.616 0.888 (0.553-1.428) 0.625 Differentiation (poor, moderate/well) 0.496 (0.249-0.988) 0.041 0.727 (0.450-1.173) 0.191 TNM stage (III-IV/I-II) 3.198 (1.915-5.343) \< 0.001[a](#T2FN1){ref-type="table-fn"} 3.727 (2.206-6.296) \<0.001[a](#T2FN1){ref-type="table-fn"} AMPD2 (high/low) 1.769 (1.094-2.862) 0.020[a](#T2FN1){ref-type="table-fn"} 2.133 (1.295-3.513) 0.003[a](#T2FN1){ref-type="table-fn"} Notch3 (high/low) 1.237 (0.747-2.048) 0.408 1.119 (0.668-1.874) 0.669 *P* \< 0.05 was considered statistically significant. HR: Hazard ratio; CI: Confidence interval. ![Immunohistochemical and Kaplan-Meier curves. A: Tissue microarrays of hematoxylin and eosin stained sections. Representative immunohistochemical analysis of AMPD2 levels in colorectal tumor tissue specimens from cancer patients and in adjacent cancer-associated fibroblasts. Immunohistochemical results of Notch3 levels in the same tissues/cells. Photomicrographs of the sections (50 × and 200 × magnification); B: Kaplan-Meier curves showing the impact of AMPD2 expression on overall survival (OS) of 201 colorectal cancer patients (*P* = 0.0181). Kaplan-Meier curves showing the impact of Notch3 expression on the OS of 201 colorectal cancer patients (*P* = 0.465). Kaplan-Meier curves showing the impact of AMPD2 and Notch3 subgroup expression on the OS of 201 colorectal cancer patients (*P* \< 0.001).](WJCC-8-3197-g003){#F3} DISCUSSION ========== Metabolic intermediate and related metabolites are widely present in cells of myometrial and glandular tissues\[[@B16]\]. Their associated metabolic pathways have been reported to be central to cancer growth and metastasis\[[@B17]\]. Thus, upregulation of AMPD2 in the tumor may explain the metabolic shift in adenosine phosphate synthesis in cancer. This evidence from different studies robustly supports that AMPD2 might be the fundamental gene in tumor transformation, resulting in metabolic adaptation in cancer cells\[[@B18]\]. Based on these findings, we suggested that AMPD2 may be a tumor metabolic marker that can be used for the analysis of tumor progression and the prediction of patient prognosis. In this study, we summarized and analyzed the mRNA expression data of TCGA-COAD, and obtained the expression characteristics of AMPD2 in cancer tissues and adjacent tissues in patients with CRC. A gene function prediction analysis of the differences between high and low AMPD2 expression groups was performed, and the results were enriched in the Notch signaling pathway. Based on these findings, cytological mechanism validation and clinical prognosis-related survival analysis were employed. Our data showed that AMPD2 resulted in CRC progression and poor prognosis in colorectal and CRC tissues. However, our analysis based on gene function enrichment was based on TCGA public database analysis. We constructed cell samples that were not subjected to high-throughput sequencing of RNA-seq. The results were closer to clinical reality; however, when verifying the data, the probability of false negatives was increased. In addition, our cytology validation experiments needed to be carried out in detail, and our CRC cohort sample only included 201 cases. We expect to add cytological evidence and increase the sample size of prospective prognostic cohorts in subsequent studies. In the present work, we revealed for the first time that overexpression of AMPD2 can promote CRC progression by augmenting tumor proliferation and halting apoptosis, and may serve as a poor prognostic marker for CRC patients. In addition, our data provided evidence that the Notch signaling pathway can affect proline metabolism *via* AMPD2 in CRC. Taken together, these findings, and our previous report, highlight the potential therapeutic value of targeting AMPD2 as a modulator of proline metabolism in CRC. ARTICLE HIGHLIGHTS ================== Research background ------------------- As an important gastrointestinal tumor, colorectal cancer (CRC) is often accompanied by abnormal energy metabolism in the case of malignant progression and poor prognosis. Research motivation ------------------- As the abnormal energy metabolism in tumor cells has received considerable attention, we have combined the tissue type and biological characteristics of CRC. With AMPD2 as the entry point for research, a variety of scientific methods can be integrated for research. Research objectives ------------------- Clarify the role of AMPD2 in CRC and study the pathway and prognostic value of its role. Research methods ---------------- RNAseq data analysis of the TCGA-COAD data set, GO and KEGG analysis. Western blot was used to detect the expression of Notch3-related pathway proteins, as well as clinical pathological samples combined with patient prognosis analysis. Research results ---------------- AMPD2 is commonly overexpressed in TCGA CRC tissues, and the function of AMPD2 is associated with the Notch signaling pathway in CRC *in vitro*. In the CRC cohort, as indicated by tissue microarray analysis, high expression of AMPD2 protein was correlated with advanced depth of tumor and poor differentiation. Research conclusions -------------------- The mRNA and protein levels of AMPD2 are significantly highly expressed in CRC tissues. The high expression of AMPD2 has a positive relationship with activation of the Notch3 signaling pathway. In patients with CRC, those with high expression of AMPD2 have a poor prognosis. Research perspectives --------------------- In the future, we plan to further study the biological mechanism of AMPD2 stimulation of abnormal lipid metabolism in CRC cells. ACKNOWLEDGEMENTS ================ The authors thank Yin ZG and Wang ZW of the Department of Pathology, Affiliated Hospital of Jiangnan University for their help in this study. Institutional review board statement: This study was approved by the Ethics Committee of Affiliated Hospital of Jiangnan University and was performed in accordance with the ethical standards of the Declaration of Helsinki and its later amendments. Clinical trial registration statement: This registration policy applies to prospective, randomized, controlled trials only. Informed consent statement: All study participants, or their legal guardian, provided informed written consent prior to study enrollment. Conflict-of-interest statement: The authors declare that they have no competing interests. Manuscript source: Unsolicited manuscript Peer-review started: March 24, 2020 First decision: April 24, 2020 Article in press: July 15, 2020 Specialty type: Medicine, research and experimental Country/Territory of origin: China Peer-review report's scientific quality classification Grade A (Excellent): 0 Grade B (Very good): B Grade C (Good): C, C Grade D (Fair): 0 Grade E (Poor): 0 P-Reviewer: Mattioli AV, Kopljar M, Sipos F S-Editor: Yan JP L-Editor: Webster JR E-Editor: Xing YX [^1]: Author contributions: Gao QZ and Qin Y designed the research; Gao QZ performed the research. Qin Y and Jin JQ reviewed the surgical pathology; Fei BJ and Han WF analyzed the data; Gao QZ and Gao X wrote the paper; all authors read and approved the final manuscript. Supported by the Wuxi Young Medical Talents, Jiangsu Province, China, No. QNRC063. Corresponding author: Xiang Gao, MD, Academic Research, Department of Oncology, Affiliated Hospital of Jiangnan University, No. 200 Huihe Road, Wuxi 214062, Jiangsu Province, China. <[email protected]>
Review – Dublin’s Cathedrals Ireland — the “Land of Saints and Scholars” on many a tourist brochure — has no shortage of religious attractions for churchy types and Sunday-morning snoozers alike. With 1600 years of Christian tradition, and who knows how many years of pre-Christian religious practice before that, it’s difficult to throw a rock from the top of one of Ireland’s many green hills without knocking a holy well, a grave dolmen, a ruined abbey, or a lady with a big hat walking out of Sunday service. Dublin has a number of churches worth a visit — consider a church-inside-a-church at St. Audeon’s or a visit to St. Valentine’s remains at Whitefriar Street — but the holy hits of the capital are the two no-longer-Catholic cathedrals of Christ Church and Saint Patrick’s. Due to some complicated and painful history, these two massive cathedrals sit no more than a few hundred yards from one another, and both are of the Church of Ireland — a not-English-thank-you-very-much cousin of the Church of England. Every year, thousands of hopeful Irish-American Catholics plan to attend Mass at one of these cathedrals — especially St. Paddy’s — and are confused by the raised pulpit, the stodgy old hymns, and those comically massive ladies’ hats. Christ Church Cathedral Closest to Dublin’s city centre, and probably the first one you’ll see, the blocky steeple of Christ Church stands tall in the heart of the city’s medieval quarter. The first church here would have stood within Dublin’s original stone city walls (sections of which are still on display in the surrounding neighborhood), but today, it’s surrounded by the ugly 1980s-era Wood Quay Civic Offices and busy streets. Christ Church Cathedral In the courtyard, take a look at the church from different angles, checking out the ruins of the old chapter house. The sharp corners and square towers are quite photogenic — especially in the early morning and at sunset. Inside, explore the large main sanctuary (technically free if you are really going in just to pray and not to sightsee) and try to find the notable graves, particularly the stone sarcophagus of Strongbow — the English lord who brought the Normans to Ireland and a tasty brand of hard apple cider to the rest of the world. The real star of the Christ Church show is downstairs in the crypt. Most of the burial chambers have been converted to museum showpieces for permanent and temporary displays about the history of the cathedral and Viking-Age Dublin. The most famous posthumous residents of the crypt — maybe even more than ol’ Strongbow himself — are the mummified cat and rat found in an old organ pipe, naturally preserved by the dry conditions underground. Saint Patrick’s Cathedral Reportedly built on the site of a holy well in which Saint Patrick is said to have baptized the local Pagan king (accidentally stabbing the hapless king through the foot with his staff in the proceedings…ouch). Lending credence — but not really any hard evidence — to the legend is the fact that the River Poddle, which has long since gone underground, flows near where the church stands today. Saint Patrick’s Cathedral Nothing remains of the earliest structures of the church, and most of what you can see today is a smattering of bits, bobs, patches, and restorations going back a thousand years or so. After the church was seized by the Anglicans during the Reformation — well, at least Henry VIII got his divorces — it suffered a period of decline and it was the Guinness family, yes, that Guinness family, who stepped in to help fix the place up. On your visit today, you’ll see a well-presented church with a wealth of details to be enjoyed by the sharp-eyed tourist. Look on the floor for the grave of Jonathan Swift, author of Gulliver’s Travels and once the dean of the cathedral; find the dedication to one Mr. Wallop, who took a bad military defeat and from whom we get the term “walloped.” Those who have been paying attention to Irish history will notice the chair once occupied by one William of Orange to celebrate his victory of the Irish Catholics at the pivotal Battle of the Boyne. If you can swing it, time your visit with one of the daily guided tours given by knowledgeable guides — especially if you don’t know off-hand who William of Orange was. The guided tour visits the most interesting corners of the massive cathedral, and the guides clarify many confusing points: indicating which chairs are reserved for the President of Ireland and which are reserved for the Prime Minister, and what the heck is the difference between the two; and pointing out the flags of notable wealthy, landed families whose flags still hang over the central choir, and what the heck the obscure heraldry means. If you can’t make the guided tour and are still determined to visit, maximize your admission fee by grabbing one of the audio tours and take your time with it. Without some kind of interpretive material, you’ll find yourself a bit overwhelmed in the dimly lit cavern that is the St. Patrick’s sanctuary.
Meningitis limb loss boy told to prove disability Published duration 19 February 2016 image caption Edward Bright lost all his limbs when he contracted meningitis as a young boy The family of a teenager who lost his arms and legs from meningitis were shocked when told he had to prove he still needed a disability payment. Edward Bright, from Ripley, Derbyshire, lost his limbs when he was seven and needs help with much of his life. When he turned 16 and reapplied for a benefit he was told he had to attend a meeting to be assessed. The Department for Work and Pensions has now said a face-to-face meeting is not necessary. image copyright Bright family image caption Edward Bright as a young boy in hospital with meningitis Edward's family claimed disability living allowance (DLA) on his behalf to help towards the added cost of life as a quad-amputee but when he turned 16 he had to reapply for a personal independence payment (PIP). The family were horrified to receive a letter calling him to a meeting with an assessor in Derby and threatening to withdraw the money if he did not attend. His dad Steve said: "He has already been through all the assessments. Nothing has changed [in his situation] in the last seven years; nothing will change, so being called in to interviews every year is pointless. image caption Edward Bright was sent a letter saying he needed to meet assessors face-to-face "People with disabilities have enough appointments anyway. You should reach a level when it's flagged up on the system: no more interviews needed." Since the family's case featured in the Daily Mirror , the Department of Work and Pensions has admitted the assessment is unnecessary. "All DLA claimants are invited to apply for the working-age benefit Personal Independence Payment when they turn 16. In this instance a paper-based assessment has been completed and there is no need for a face-to-face assessment. "We've tried to call the Brights numerous times to make clear there's no need to attend a meeting on Monday. A letter has been sent through the post."
Q: How to read a large file line by line? I want to read a file line by line, but without completely loading it in memory. My file is too large to open in memory, and if try to do so I always get out of memory errors. The file size is 1 GB. A: You can use the fgets() function to read the file line by line: $handle = fopen("inputfile.txt", "r"); if ($handle) { while (($line = fgets($handle)) !== false) { // process the line read. } fclose($handle); } else { // error opening the file. } A: if ($file = fopen("file.txt", "r")) { while(!feof($file)) { $line = fgets($file); # do same stuff with the $line } fclose($file); } A: You can use an object oriented interface class for a file - SplFileObject http://php.net/manual/en/splfileobject.fgets.php (PHP 5 >= 5.1.0) <?php $file = new SplFileObject("file.txt"); // Loop until we reach the end of the file. while (!$file->eof()) { // Echo one line from the file. echo $file->fgets(); } // Unset the file to call __destruct(), closing the file handle. $file = null;
Q: Операторы Lua в C# операторы (необычное сравнение) Никак не могу понять как перевести этот оператор из Lua в C# оператор? --Это некая карта из массива байт --0x0 используется как ничего, а 0x1 как стена local map = { { 0x1, 0x1, 0x1, 0x1 }, { 0x1, nil, nil, 0x1 }, { 0x1, nil, 0x1, 0x1 }, { 0x1, 0x1, 0x1, 0x1 }, } local yMap, xMap = math.floor(player.y / 32), math.floor(player.x / 32) if map[yMap] and map[yMap][xMap] then return map[yMap][xMap] end Ну к сути - Я никак не понимаю как это вообще работает в Lua? Я про строчку с сравнением: if map[yMap] and map[yMap][xMap] then Я пытался понять и написать это на C# if ((map[yMap] != 0x0) & (map[yMap][xMap] != 0x0)) Но все тщетно, компилятор конечно же ругается что я сравниваю byte[] и byte. Никак не пойму почему на Lua это работает?! Может он берет байт от начала массива? И да, как я правильно понял: if map[0] then и if map[0] not nil then это одно и тоже? То есть Если НЕ nil вернет true? - В Lua почти ничего не знаю, просто нужно Lua скрипт в C# перенести, пожалуйста, объясните глупцу, как это работает? A: if map[yMap] - да это тоже самое что спросить map[yMap] существует? В строго типизированных языках двумерный массив определен заранее, как у вас. И эту проверку можно опустить. public struct Coord { public int x, y; } Coord player; player.y = 3992; player.x = 62; int[,] map = { { 0x1, 0x1, 0x1, 0x1 }, { 0x1, 0x0 , 0x0, 0x1 }, { 0x1, 0x0 , 0x1, 0x1 }, { 0x1, 0x1, 0x1, 0x1 }, { 0x1, 0x1, 0x1, 0x1 }, } ; int xMap = (int)Math.Floor( (double) player.x / 32); int yMap = (int)Math.Floor( (double) player.y / 32); Console.WriteLine( ); if (xMap<=map.GetLength(1) & yMap<=map.GetLength(0)) if (map[yMap,xMap] == 0x0) { Console.WriteLine("Ok"); } else Console.WriteLine("None"); else Console.WriteLine("Bad index"); } Но если есть необходимость делать проверку, то как-то так: (map.GetType().IsArray) && (map.Rank==2)
ose -4*r + 47 = 4*i + 19, 5*i + b = 4*r. Let u = -6 + r. Solve -3*g = u*g - 20 for g. 4 Let a = -74 + 74. Solve -2*v = -a + 2 for v. -1 Suppose 60 = 4*u + 4*h, 0*h = 4*h + 20. Solve -u = -c - 3*c for c. 5 Let p(x) = 39*x + 7 - 41*x + 1. Let o be p(4). Solve 0 = -o*d - d for d. 0 Suppose -6*o + 2*o = -32. Suppose 4*r + o = -3*g, 2*r - 3 = 3*g - 25. Suppose -g*z + 9 = y + z, 0 = 5*z - 5. Solve n - y*n = 0 for n. 0 Suppose 0 = 3*n - 6*n + 15. Let a = 7 - n. Solve 0 = -a*q - 0*q - 8 for q. -4 Suppose 3*x = y - 6, -4*y = 4*x - 4 - 4. Solve -15 = y*i - 0*i for i. -5 Let x = 36 - 34. Solve x = -w - 0 for w. -2 Let y = 14 + -8. Suppose -k - 3 = 0, 5*p + 10 = -2*k - y. Let m be (-1 - -3) + p - 0. Solve 2*n + n = m for n. 0 Let u be 12/18*(-63)/(-6). Solve -9 = 4*z - u*z for z. 3 Let x(y) be the second derivative of y**5/20 + y**4/4 + y**3/3 + y**2 - 2*y. Let s be x(-2). Let o be s/4 - 9/(-2). Solve -4*v + o = -5*v for v. -5 Let v = 19 + -17. Solve -u = -v*u - 5 for u. -5 Let p(c) = c**3 - 5*c**2 + 2*c + 9. Let a be p(4). Let q be (2 - a)*(0 + 4). Solve 2 - 14 = q*s for s. -3 Let z be ((-1)/((-6)/(-10)))/(9/(-27)). Solve 4 = z*i + 14 for i. -2 Let z be (-24)/(-9)*9/6 + 3. Solve -2*x + 3 = -z for x. 5 Let m = 10 - 4. Let i(f) = 8*f - 3. Let u be i(m). Suppose -4*t = -7*t + u. Solve -3*g - t = 2*g for g. -3 Let u(b) = 2*b**2 + 2*b - 2. Let j be u(2). Suppose 0*q = -5*q + j. Suppose -p = -q*p. Solve p = -0*k + 2*k + 6 for k. -3 Let n be -12*(-2)/(-8)*2. Let f be (n/(-4))/(1/2). Let r be (-1)/5 - f/(-15). Solve m = -r*m for m. 0 Let y be 9/12 - 27/(-12). Suppose 5*v = y*v + 22. Solve v = -4*j + 3 for j. -2 Let q(g) = g + 3. Let z be q(-3). Suppose z = -2*r + r. Solve -3 = -f - r*f for f. 3 Suppose -4*a - 5*z + 45 = 0, -a = a + 4*z - 30. Solve 3*u - 14 + a = 0 for u. 3 Let j(f) = f**2 - f + 4. Let g be j(0). Let s be g - 4*(-1)/(-2). Solve n = s*n for n. 0 Suppose -4*w = 4*l + 4, 0 = 3*w - 3*l - 6 - 21. Suppose -2*c - w = 2, 2*v - 5*c - 15 = 0. Solve v = 2*z + 2*z - 12 for z. 3 Suppose -3*b = 5*s - 16, 4*b + 0*s - 12 = -2*s. Solve -b*u = u for u. 0 Suppose 0 = -5*j + 5*s + 35, 4*s = 2*j - s - 20. Suppose 0 = -3*l + j*c + 29, 0 = -l - 2*l + 4*c + 25. Solve -r = l*r for r. 0 Let n(u) = -2*u**3 + 19*u**2 - 17*u - 3. Let x(r) = -r**3 + 10*r**2 - 9*r - 1. Let t(s) = -4*n(s) + 7*x(s). Let p be t(5). Solve 0*h - p = h for h. -5 Let s be 1*(1 - (-2)/(-1)). Let g = s - -3. Suppose 270*q = 275*q - 20. Solve -10 - g = -q*l for l. 3 Let v be 3*(-1)/(-3) - 12. Let u = 17 + v. Solve 6*l = 4*l - u for l. -3 Suppose 2*u = -u + 12. Suppose 4*n + h = 9, -4 = -5*n - u*h - 1. Solve -4 = -n*t - t for t. 1 Let r = -107 + 111. Suppose -15 = -5*o - 3*u, 2*u - 1 = o + 9. Solve o = -r*v + 2 + 10 for v. 3 Let y be ((-7)/(-2))/((-12)/(-24)). Let j(a) = a**3 - 7*a**2 + 2*a - 9. Let l be j(y). Solve -2*g + 12 = -l*g for g. -4 Let j be 3*(-3 + 44/12). Solve -5*u = -j - 3 for u. 1 Suppose 0*a + 5*a = 0. Solve -2*z + 2 + 4 = a for z. 3 Suppose -5*r + 4*i = -3 - 13, r = -5*i - 20. Suppose -n + 1 + 2 = r. Solve -3*p - n = -0 for p. -1 Let c(o) be the third derivative of -o**6/120 + o**5/15 + o**3/3 + o**2. Let v be c(4). Solve -2*j - 2 - v = 0 for j. -2 Let n be 2/3*(-39)/(-2). Suppose -5*j - 5*d + d = 83, d = j + n. Let f be ((-9)/j)/((-1)/(-5)). Solve 0 = -f*s - 8 - 7 for s. -5 Suppose -3*p + 0 + 12 = 0. Solve p = -b - 3*b for b. -1 Let u be 1 + -1 + 6/2. Suppose u*g = -q + 18, -5*q = -g - 4*g - 70. Solve 0 = -2*l - 3*l + q for l. 3 Let r = -10 + 9. Let f be (r - -1)*(2 - 3). Suppose 3*l - l - 10 = f. Solve 0 = -l*c + 8 + 2 for c. 2 Let h = -6 + 11. Let v be 4*(0 + 3 + -1). Solve -33 = h*k - v for k. -5 Let n be 2 + 1 + -1 + 2. Suppose -1 + 17 = n*y. Suppose -y*a + 9 = -3. Solve -a*m = -m + 6 for m. -3 Let c = 15 + -13. Solve 2 = -c*w + 8 for w. 3 Suppose 33 = 6*u - 15. Solve -4*r + u = -2*r for r. 4 Suppose 5*n + 9 + 11 = 0. Let r be (-3)/12 - 49/n. Let p = -10 + r. Solve 3 = l + p*l for l. 1 Suppose l - 5*l + 52 = 0. Suppose 4*h = l - 1. Solve h*r + 1 + 2 = 0 for r. -1 Let n = 5 + 1. Suppose -v - 3*b = b + n, 33 = 3*v - 5*b. Solve 0 = 5*d - 3*d - v for d. 3 Let t(v) = v**2 - 7*v + 2. Let q be t(7). Solve q*o = -0*o - 4 for o. -2 Suppose t - 8 = -3*t. Solve 7*z - 20 = t*z for z. 4 Let n(k) = -k**2 + 6*k + 8. Let x be n(6). Suppose -5*z + 17 = -3*b - 3, 0 = 2*z - 2*b - x. Solve 4*g - 4 = z for g. 2 Let f(r) = r**3 - 3*r**2 + r - 1. Let o be f(3). Suppose 3*p = 2*p + 5*z + 28, -4*p = -z - 17. Solve p*q - o = 2*q for q. 2 Let o be -2 - (2*-1 - 10). Suppose -2 = 4*t - 2*g, 0*t - t + 2*g - 8 = 0. Suppose -3*x - 5 = -n, t*n + 4*x + x + 1 = 0. Solve n*j + o = 2 for j. -4 Let p = -10 - -14. Suppose 4*v - 8 = 0, 0*v = -3*k + p*v - 5. Suppose -a - 18 = 4*i, -a + 2*a + 8 = -2*i. Solve 3*m + a + k = 0 for m. -1 Suppose 17 = 5*v + 2. Let o be -10*(12/(-10))/v. Solve -2*g + o - 12 = 0 for g. -4 Suppose 0 = 2*m - 1 - 33. Let q = 17 - m. Let v = 15 - 9. Solve q = w - v*w for w. 0 Let g = 9 + -7. Suppose g*n = -0*n + 64. Suppose 2*t = 4*k - 18, 0 = 3*k + 3*t + 5 - n. Solve -4*m = -k*m + 2 for m. 1 Suppose 0 = -3*q + 5 + 1. Let n be (q*-5)/(-2) - 2. Let c be 2/(-11) + (-1027)/(-143). Solve -1 = -n*v - c for v. -2 Let y = 51 - 50. Solve o + 6 = y for o. -5 Suppose 3 + 2 = -t, o + 5*t = -18. Let p(u) = -u + 8. Let x be p(o). Solve 5*s - x = 9 for s. 2 Let m(z) = 4*z + 1. Let w be m(0). Solve -5 = -2*r + w for r. 3 Let n(j) = j**3 + 9*j**2 - 11*j - 2. Let y be n(-10). Solve y = -3*f - f for f. -2 Let u(z) = -z**3 - z**2 - 1. Let b be u(-2). Suppose 0 = -5*d + a + 3*a + 22, 3*d + 9 = -5*a. Suppose h = 4*i, 5*i = b*h - d*h + 1. Solve -4*o + h = -3*o for o. 4 Let k(i) = 14*i**2 - 3*i - 3. Let f be k(-1). Solve -f = 3*s + 1 for s. -5 Let o be (-4)/((-24)/9)*6. Let l = 9 - o. Solve -3*z + 9 = -l for z. 3 Suppose -q + 5*r = -6*q + 95, -4*r = -3*q + 29. Solve 4*n = 7*n + q for n. -5 Suppose -3*k + 37 = -5*r, 5*k - 5*r - 33 = 3*k. Solve -k*c = -14 - 6 for c. 5 Let k = -14 - -25. Solve 2*a + k = 1 for a. -5 Let o = -3 - 0. Let b be -4*(9/4)/o. Solve -m - b*m = -4 for m. 1 Let g = 4 + -2. Suppose -4*s + 2 = -g*s. Suppose -4*c - s + 17 = 0. Solve -w + 0 = -c for w. 4 Let s be (12/(-8) - -1)*-22. Solve 2*b + s = 3 for b. -4 Let p be -15 - (-2 - 2/(-1)). Let h be (0 + (-18)/p)*5. Let s(j) = -j**2 - 5*j - 4. Let l be s(-4). Solve 5*w - 3*w - h = l for w. 3 Let c(b) = -b - 14. Let a be c(6). Let o = -20 - a. Solve -1 = -l - o*l for l. 1 Suppose 3*z = -4*v + 15, 4*v - 27 = 2*z - z. Let x = v + -3. Let u = -4 + 16. Solve -x*r + 6*r = u for r. 4 Suppose 60 = -0*x + 5*x. Suppose 0 = -3*i + 3*r + x, i + 5*r = 2*i. Solve -20 - i = 5*v for v. -5 Let w(y) = -y + 2. Let k(m) = m**2 + 2*m - 3. Let q be k(-3). Let b be w(q). Suppose -2*a = 2*a - 2*s - 10, 3 = b*a - 3*s. Solve -2*g = -1 - a for g. 2 Let x = -119 + 119. Let i(c) = -c**3 - 2*c**2 - c + 1. Let s be i(-2). Solve -2*o - s - 1 = x for o. -2 Suppose -13 = -a - 2*l + 12, 0 = -3*l + 9. Solve 5*u = -a + 44 for u. 5 Suppose 5*w = -0*w - 70. Let v be w/(-8) + (-4)/(-16). Solve v*z = 7*z + 5 for z. -1 Let a = -108 - -108. Solve a = 5*n - n for n. 0 Let w = 28 - 24. Suppose -4*r + 6 = -2*r + w*j, -3*r = -2*j - 9. Solve 2*z + r*z + 10 = 0 for z. -2 Suppose 3*a = -5*c + 26, 0*a + 4*c = -a + 18. Solve r + a*r + 6 = 0 for r. -2 Suppose -35 = -5*v - 10. Solve n - 20 = v*n for n. -5 Suppose 0 = -s + 4, 5*s - s - 112 = -2*w. Suppose 3*n + 4*m - w = 0, 2*m = -2*n + 4*n - 18. Let k = n + -7. Solve 0 = 3*t - 2*t - k for t. 5 Suppose -4*r + 6 = 3*q, -4*r - 2*q + 4 = r. Let z be 0 - 1/(1/(-5)). Suppose -33 - 27 = -z*i. Solve r*j = -3*j - i for j. -4 Let q(x) = 3*x**2 - x + 2. Let w be q(2). Solve 0*p = 4*p + w for p. -3 Let a be 2/5*(2 - -8). Suppose 2*l = -0*l + 5*g - 14, a*l + 28 = 2*g. Let m be l/(-2) + 2/(-4). Solve 6 = m*f - 3 for f. 3 Let z(w) = -w**2 + 7*w + 2. Let r be z(7). Solve -u = -r*u for u. 0 Let w(z) = -z**3 + 3*z**2 - 3*z + 3. Let f be w(3). Let p be (-22)/f - 2/(-6). Solve -p = -m - 0 for m. 4 Suppose -y = 3*n - 5, -4*y + 8 = -n + 1. Solve 0*u = u + y for u. -2 Suppose 0 = -l - 0 + 25. Let u(x) = -x + 10. Let j be u(8). Suppose -5*i = -3*c + l, -j*c + 2*i = c - 10. Solve -3*g + g = c for g. 0 Let c(r) = -3*r + 2. Let n be c(-3). Suppose 2*x = 3 + n. Solve -5*p = 8 + x for
and 12/(-18) - (-1 - 118/36). 90 Suppose -36 = -3*j + 3*k, 0*j + j - 5*k - 12 = 0. Suppose -4*g - 1 + 65 = 0. Calculate the smallest common multiple of g and j. 48 Suppose 2*d - d - 9 = z, 81 = 5*d + 4*z. Suppose 6*v - 18 = 3*v. What is the smallest common multiple of v and d? 78 Find the common denominator of 84*(-1)/(16/(-6)) and -29/18. 18 Let y be (-195)/(-12) + (-2)/(-8). Suppose 3*b - 1 + 4 = 0. Let t = y + b. Find the common denominator of t and 35/16. 16 Suppose 2*y - 11 = 3. Suppose d + d - 6 = 0. Suppose 0 = c - 2*c + d. What is the least common multiple of y and c? 21 Calculate the common denominator of 4/18 + 6377/(-630) and -11/18. 90 Suppose -4*w = 9 - 1, -w + 18 = 2*v. What is the least common multiple of 4 and v? 20 Let q(j) = j**2 + 2*j - 4. Let x = 16 - 13. Suppose k = -0 + x. Calculate the least common multiple of q(-5) and k. 33 Let j be 3/4 + 1092/(-48). Let d = j + 24. Suppose -4*p - 1 = -b + 4, 0 = 4*b - 4*p - 8. Calculate the smallest common multiple of d and b. 2 Suppose -83*z = -84*z + 14. Calculate the least common multiple of z and 12. 84 Suppose -2*u = -h - 319, -68 - 88 = -u + 4*h. Calculate the common denominator of -17/14 and u/(-6) - 4/(-24). 14 Let l = 18 + 10. What is the lowest common multiple of 2 and l? 28 Let z = 100 + -76. What is the lowest common multiple of 36 and z? 72 Find the common denominator of 5/90*357 - 4 and ((-40)/6)/(3/2). 18 Let m(h) = -h**2 + 6*h + 6. Let f be (1 - -1) + -3 + 24. Suppose 2*w = f + 15. Find the common denominator of w and m(7). 1 Let h(v) = 4*v - 1. Let c be h(1). Suppose -c*k = 3, -d + 20 = d - 4*k. Calculate the least common multiple of d and 10. 40 Let c be -2*1/3*3. Let p(m) = -m - 2. Let r be p(4). What is the lowest common multiple of 3 and (r/(-1) - c) + 0? 24 Let a be (0 + 1)/((-1)/3613). Let y be (2 - -5)*a + 0. Let z = 556299/22 + y. Find the common denominator of z and 91/20. 220 Let o be 2/1 - (1 + -7). Let f(m) = 11*m - 4*m**3 - 2*m + 5*m**3 - 9*m**2 - 2. Calculate the least common multiple of f(o) and 1. 6 Suppose -9*c + 260 = -100. What is the smallest common multiple of 8 and c? 40 Calculate the lowest common multiple of 2 and 1/(-2 - 0 - (-55)/22). 2 Suppose 0 = -5*h + 15 + 140. Suppose 5*j - 14 - h = 0. What is the common denominator of (146/j + 0)/(-4) and 95/8? 72 Let o = -91/22 - -46/11. Let v = -2264/21 - -320/3. Let t = 15/14 + v. What is the common denominator of o and t? 154 Calculate the common denominator of 18/11 and (4 - 1) + 850/(-51). 33 Suppose 3*j - 6 = 3*r, -5*j - 5*r = -2*r - 10. Suppose -4 = 5*i + 1. Let o = 3 + i. What is the least common multiple of o and j? 2 Let d = -4/1741 - 231529/10446. Suppose 2*f + 20 = 4*g, 3*f = 8*f - 5*g + 25. What is the common denominator of d and -4 - 350/(-12) - f? 6 Let w = 42012831 - 51255651039/1220. Let i = w - -5/244. What is the common denominator of i and 103/14? 70 Let j = 2159/4 - 561. Let c be (-600666)/164000 + 4/(-10). Let t = -1/10250 - c. Calculate the common denominator of t and j. 16 Suppose 0 = -3*h + 6*h + 3*m + 3, -4*h = -2*m - 20. Suppose -h*w - 6 = -6*w. Calculate the common denominator of (w/(-70))/((-6)/1455) and -71/16. 112 Suppose -5*o + 3*i = -0*o - 29, 0 = 5*i + 15. What is the smallest common multiple of 12 and o? 12 Suppose 4*z - 20 = -0*z. What is the least common multiple of z and 4? 20 Let k = 1/142 + -3841/994. Calculate the common denominator of 65/4 and k. 28 Let w(p) = -p**3 - 6*p**2 - 6*p - 5. Let s be w(-5). Suppose -3*m + 15 = -s*m. Let q = 6 - 1. Calculate the lowest common multiple of m and q. 5 Suppose -6*d = -4*d + 52. Calculate the common denominator of d and 13/4. 4 Let t = 10 + -5. Suppose -t*c = -48 - 52. Calculate the least common multiple of ((-9)/(-3) + 1)/1 and c. 20 Let m = 31 + -12. Suppose 0 = 2*h - 6 - 0. Let d = h + m. What is the least common multiple of d and 6? 66 Let r be 2/(-5) + 60/25. Suppose 0 = -l - 2*b + 8, r*b = 4*l - 0*b - 12. Let p(n) = -9*n + 1. What is the least common multiple of p(-1) and l? 20 Let q be 2*(-1 - (-34)/2). Suppose 2*p - 6*p = -q. What is the least common multiple of p and 3? 24 Let a = -4 + 5. Calculate the lowest common multiple of 22 and 3*a + (14 - -3). 220 Let l be (-213)/(-6)*(-26 - 1). Let t = l - -990. Calculate the common denominator of (-65)/16 + 2 + 1 and t. 16 Suppose -3*k = -3 - 9. Calculate the common denominator of 111/(-108) + k/16 and 45/2. 18 Let l = 8180/11 - 741. Let p be -2 - -1498*(-23)/11. Let g = 3130 + p. Find the common denominator of g and l. 11 Let l = -34 + 44. Calculate the least common multiple of 16 and l. 80 Let j = -474604827852440507/68342094980908326 - 1/385891153013. Let h = 67042933/127907 + -6814/13. Let r = j - h. Find the common denominator of r and -85/12. 36 Calculate the common denominator of (-18)/72 + (-26)/8*2 and -81/26. 52 Suppose 3*b + 2*j = 20, -2*b + 8 = 3*b - 3*j. Suppose 3*w + 22 = b*w. What is the smallest common multiple of w and 8? 88 Suppose -l = -2*w - 82, 0 = -2*l - w + 6*w + 161. Calculate the smallest common multiple of l and 20. 440 Let l = 11 + 0. Suppose -3*s + 13 + l = 0. Calculate the least common multiple of 4 and s. 8 Let n = -1 - -4. Let u = -8 + n. Find the common denominator of -46/11 and (1/22)/(u/(-230)). 11 Let g be (-2)/(-8) - 2479/(-68). Let m = g - 2843/102. Let h = -1530/59 - -24523/1180. What is the common denominator of h and m? 60 Suppose 3*z + z = -2*h + 38, -32 = -3*z - 5*h. What is the lowest common multiple of 9 and z? 9 Suppose i = 5*o - 2 - 14, -5*i = -4*o + 17. Find the common denominator of 81/10 and o - (2 - (-297)/24). 40 Let a = 15 - 9. Let c be (-4)/(-3)*a/(-4). Let g = c - -10. What is the least common multiple of 10 and g? 40 Let v = 16 - 10. What is the smallest common multiple of v and (-276)/(-27) + 2/(-9)? 30 Let g = 2231/2035 + -1/185. Let k = -17495/7 + 2491. Find the common denominator of g and k. 77 Calculate the common denominator of 23/10 and (-1 - -1) + 236/16. 20 Let s(u) = u**3 - 5*u**2 - 2*u + 7. Let h be s(5). What is the common denominator of 59/3 and -47 + 3*(-2 - h)? 3 Let a = -581 - -6386/11. Let w = -23057/10 + 2308. Find the common denominator of w and a. 110 Let r be (-4754)/574 + 6/2. Let l = r - 6/41. What is the common denominator of l and 1*1/6 - 2? 42 Let z = 3 + 3. Let l = 34 + -24. Calculate the smallest common multiple of l and z. 30 Let y = -2185 + 21811/10. Suppose -12 = -3*w, 5*w = 3*q - 12 - 10. Calculate the common denominator of -10*(-10)/q + -2 and y. 70 Let t = -297349639/22993652 + -2/522583. Let b = t + 288/11. What is the common denominator of b and -4/3? 12 Find the common denominator of 95/22 and 5/3*(-702)/(-144). 88 Let p = 46 + -22. Calculate the common denominator of (1 - 28/p)*-101 and -43/6. 6 Let j(t) = -3*t**3 + t**2. Let i be j(-1). Suppose 2*z + 47 = d, -5 - 1 = z - i*d. What is the common denominator of 2/8 + z/(-56) and 39/4? 28 Suppose 0 = 2*w - 3 - 19. Suppose 5*u - m - 20 = 0, -2*m - 2*m + 25 = u. Calculate the smallest common multiple of w and u. 55 Suppose 0 = 4*q - 3*y + 10107, -5*q - y - 12384 = 245. Let t be ((-34)/18)/(q/10845). Let f = t + 24/421. What is the common denominator of -40 and f? 6 Let r be (-1)/1 + 0 + 9. Find the common denominator of 4/3*(-189)/r and 27/8. 8 Let n(v) = v**3 + v**2. Let g(w) = -w + 5. Let l be g(3). Calculate the least common multiple of n(l) and 8. 24 Suppose 0 = -4*t + 3 + 1. Calculate the common denominator of (t - 4) + (-385)/84 and 43/10. 60 Let w = 5823/4 - 40611/28. What is the common denominator of 51/8 and w? 56 Let z(f) = f**3 - 4*f**2 - 5*f + 2. Suppose 4*n + 0*n - 5*t - 40 = 0, -17 = -n + 3*t. What is the smallest common multiple of 6 and z(n)? 6 Calculate the common denominator of 7/16 and (-8)/44 - (-5045)/1430. 208 Suppose -12*h + 182 = 38. Calculate the lowest common multiple of 44 and h. 132 Let r(f) = -f**2 - 16*f - 1. What is the lowest common multiple of 16 and r(-15)? 112 Let h = -3523 - -21077/6. What is the common denominator of h and 357/(-36) - 5/(-15)? 12 Let t(b) = -b**2 - 11*b - 9. What is the lowest common multiple of t(-10) and 2? 2 Let y = 55847/20 + -2795. What is the common denominator of 83/10 and y? 20 Let s = -3776 + 34024/9. Find the common denominator of s and ((-24)/(-3))/((-14)/11). 63 L
Hi, Still struggling to get my Soekris to boot. Here is the full boot sequence: http://paste.pocoo.org/show/509089/ Can't see anything obvious, is there any way to have logs more verbose? Thanks -- Jean-Marc
Effects of various saccharides on the masking of epitope sites and uptake in the gut of cedar allergen Cry j 1-saccharide conjugates by a naturally occurring Maillard reaction. A major allergen of Japanese cedar, Cry j 1, was conjugated with galactomannan (M(w) of 15 kDa), dextran (M(w) of 12 kDa), xyloglucan (M(w) of 1.4 kDa), and various monosaccharides through the Maillard reaction by dry-heating in 65% relative humidity. The Cry j 1-galactomannan conjugate completely masked the epitopes of the allergen in Cry j 1. The Cry j 1-dextran conjugate also masked the epitopes of Cry j 1. The small size of oligosaccharide (xyloglucan) and various monosaccharides cannot mask the epitopes of allergen Cry j 1. This suggests that the higher molecular size of attached saccharides is important to mask sterically the epitope sites. The Cry j 1-galactomannan and Cry j 1-mannose conjugates were effectively trafficked in the gut and co-localized with immune cells, such as dendritic cells in the gut, suggesting that Cry j 1-saccharide conjugates are phagocytosed via the mannose receptor in immune cells. These results suggest that the Cry j 1-galactomannan conjugate is suitable for masking the epitope sites of Cry j 1 and trafficking to immune cells in gut lumen.
Chronic pulmonary artery balloon counterpulsation in sheep via percutaneous route. In clinical practice pulmonary artery balloon counterpulsation (PABC) has been utilized only in the operative setting with the balloon housed in a graft attached to the pulmonary artery. Clearly, percutaneous insertion of a dedicated pulmonary artery balloon is a desirable goal for patients requiring temporary assist for right ventricular failure. To address the question of right sided cardiopulmonary tolerance for a chronic indwelling pulmonary artery balloon, six adult ewes underwent percutaneous placement of an 11 ml pulmonary artery balloon, via the femoral vein. Effective pumping and timing were monitored for 48 hours at which time the animals were sacrificed. At autopsy gross and microscopic study of all right heart structures, the pulmonary arteries and the lungs were studied for adverse effects. There were inconsequential minor abrasions to right heart structures in most animals. The pulmonary artery in five of six animals revealed ecchymoses and some transmural hemorrhage, but no necrosis or perforation. There was no pulmonary injury that could not be ascribed to postoperative atelectasis. This study demonstrates that chronic pulmonary artery balloon counterpulsation can be carried out for a period of 48 hours without significant injury to right heart and pulmonary structures in the ovine model
Phenotypic comparison of multiple monocyte-related populations in murine peripheral blood and bone marrow. Monocyte subsets are not well defined in murine peripheral blood (PB). Monocyte-related populations could also be located in bone marrow (BM), but studies correlating monocyte populations found in these two tissues are lacking. This study simultaneously analyzed PB and BM to phenotypically define multiple monocyte-related subsets in each location. Murine PB and BM cells were simultaneously stained for monocyte-related populations, using five-color flow cytometry. Relevant subsets were defined on the basis of Ly-6C, CD11b, and wheat germ agglutinin phenotype in addition to light-scatter characteristics. These populations were extensively characterized for the expression of other myeloid and dendritic cell markers, adhesion molecules, chemokine receptors, and growth factor receptors. Six monocyte-related populations were defined, three each in BM and PB. No identical populations were found between the two tissues. Two BM populations and one PB population have heterogeneous expression of many markers, suggesting additional complexity among monocyte-related subsets. The murine monocytic series comprises multiple subsets, differing between PB and BM. This study defines and extensively phenotypes six of these populations, providing preliminary information about possible developmental relationships and migratory capacities of these cells.
Introduction ============ One of the salient features of eukaryotic genomes is the pervasive presence of introns, comprising up to 95% of transcribed primary protein-coding sequences in mammals \[[@B1]\]. The functions, origins and evolutionary trajectory of introns have long been of great interest in genomics and genome evolution. Although some theories of the spread of introns postulate that they can accumulate passively as a consequence of insufficient purifying selection to remove them in organisms with relatively low effective population sizes \[[@B2],[@B3]\], introns have been shown to play a number of functional roles \[[@B4]\]. They give rise to the possibility of alternative splicing, contributing to the diversity of biomolecules, and they can also have a substantial impact on levels of gene expression \[[@B5]-[@B7]\]. Introns contain most of the sequence features required for splicing (5' and 3' splice sites, branch point sites (BPS), poly-pyrimidine tracts and various intronic splicing elements). Many introns also contain functional non-coding RNAs \[[@B4]\], which can play critical roles in fine-tuning gene expression \[[@B8]\]. Lastly, introns have been proposed to control the timing of gene expression by delaying transcription \[[@B9]\]. Negative feedback loops with a time delay can result in oscillating patterns of gene expression, which can be exploited by living organisms as biological time-keeping devices. This appears to be particularly important in development \[[@B9]\]. The hairy and enhancer of split 7 (*Hes7*) gene is involved in the control of somite formation through oscillatory patterns of gene expression \[[@B10]\]. Recently, Takashima *et al.*\[[@B11]\] investigated *in vivo* the impact of removing the introns from the mouse *Hes7* gene. They found that expression of the mutant *Hes7* gene occurred approximately 19 minutes earlier than for the wild-type and that this reduction in gene expression delay resulted in abolition of oscillations and segmentation defects. Given that the delay associated with transcribing introns appears to play a crucial role in the functioning of this gene, the length of the introns may be evolving under purifying selective pressure. Moreover, further examples of genes with highly conserved intron content across species may reveal more genes for which transcriptional delay is an important aspect of gene regulation. We investigated the conservation of the intron content of *Hes7* across a diverse set of nineteen mammals and carried out a search for other genes for which total intron length shows evidence of evolutionary conservation. In such cases introns are likely to play an important functional role and, in a subset, time delays associated with transcribing introns may be a significant aspect of gene regulation. Results and discussion ====================== Delayed expression of *Hes7* resulting, at least in part, from intron transcription has been proposed to play a key role in somite formation in animal embryos by establishing an oscillating pattern of gene expression \[[@B11]-[@B14]\]. Given the important role played by the length of the introns rather than their specific sequence content in this gene, we compared the combined length of *Hes7* introns across a diverse set of mammalian species (Fig. [1](#F1){ref-type="fig"}) to determine the extent to which the intron content of this gene is conserved over evolutionary time. For each orthologue, the sum of the distances between successive exons in the canonical transcript (according to Ensembl) was calculated. Despite the fact that there may be differences in gene annotation across species the intron content of most of the orthologues was similar. Nine out of the twelve of the available orthologues of *Hes7* among the mammalian species in our dataset differed in combined intron length from the human gene by less than 10% (Table [1](#T1){ref-type="table"}). ![**Phylogeny** Phylogenetic tree illustrating relationships of the 19 mammals included in this study.](1471-2105-12-S9-S16-1){#F1} ###### **Conservation of Hes7 intronlength** Intron content of orthologues of human *Hes7* (OrthoDB ID EOG45TDC4). The tarsier orthologue was omitted. This gene had no annotated introns but the annotation appeared to be incomplete. Species Common name Gene \#introns CIL^1^ ---------------------------- --------------------------- -------------------- ----------- -------- *Homo sapiens* Human ENSG00000179111 3 1839 *Mus musculus* Mouse ENSMUSG00000023781 3 1846 *Oryctolagus cuniculus* Rabbit ENSOCUG00000002606 3 1696 *Canis familiaris* Dog ENSCAFG00000016957 3 1823 *Felis catus* Cat ENSFCAG00000015190 3 1958 *Equus caballus* Horse ENSECAG00000013278 3 1804 *Myotis lucifugus* Little brown bat ENSMLUG00000008014 3 1810 *Erinaceus europaeus* Hedgehog ENSEEUG00000006336 3 2774 *Sus scrofa* Pig ENSSSCG00000017982 4 1550 *Tursiops truncatus* Bottlenose dolphin ENSTTRG00000010312 3 1827 *Loxodonta africana* African elephant ENSLAFG00000002331 3 1870 *Monodelphis domestica* Grey short-tailed opossum ENSMODG00000007704 3 2364 *Ornithorhynchus anatinus* Platypus ENSOANG00000022456 2 2018 *Bos taurus* Cow ENSBTAG00000012436 3 2364 *Gorilla gorilla* Gorilla ENSGGOG00000005760 3 1840 ^1^Cumulative intron **length** To determine whether intron content, and thus potentially transcription time, of *Hes7* was exceptionally conserved compared to other genes and to discover additional examples of genes for which there is evidence of intron content conservation we compared intron content (defined as the sum of the lengths of all introns in the canonical transcript) between human gene models from Ensembl and sets of orthologous genes, obtained from OrthoDB \[[@B15]\]. Because the pattern of insertion and deletion may differ between very large and smaller introns we restricted to genes with introns of similar lengths to *Hes7* (specifically we considered genes for which the sum of the intron lengths in the canonical transcript was between one and five kilobases). Restricting also to orthologous groups represented in at least half of the species, only 11 other orthologous groups (from a total of 1875 satisfying these criteria) had intron content within 10% of the human gene in as high a proportion of the orthologues as the *Hes7* group. Remarkably, of the corresponding 12 human genes (including *Hes7*), five are annotated with the gene ontology (GO) term GO:0007389 (pattern specification process) from the biological process component of GO, defined as "any developmental process that results in the creation of defined areas or spaces within an organism to which cells respond and eventually are instructed to differentiate". Using the DAVID functional annotation tool \[[@B16],[@B17]\], this is the most statistically enriched GO term (p = 9.4 × 10^--5^) and remains significant following correction for multiplicity of testing using the Benjamini-Hochberg method (FDR = 0.03). Six of the genes were annotated with the Swissprot and Protein Information Resource (SP-PIR) keywords term 'developmental protein' (FDR = 0.003). We also used a more relaxed conservation threshold and identified a larger set of 144 genes with relatively conserved intron content among the genes with between one and five kilobases of intron. Genes for which more than 50% of the orthologues have intron content within 10% of the intron content of the human member of the group were included in this group, again restricting to orthologue groups represented in at least half of the species. We again found evidence for a set of genes with conserved intron content which was very highly enriched for genes involved in development, identified using DAVID (Table [2](#T2){ref-type="table"}). Only the top 20 enriched terms are shown in Table [2](#T2){ref-type="table"}. These include terms corresponding to the presence of homeobox DNA-binding domains, frequently involved in developmental gene regulation. To look for examples of conserved intron content among genes with higher intron content, we separated the human genes into four intron content size classes (1 -- 5 kb, 5 -- 20 kb, 20 -- 50 kb and 50 -- 100 kb), to account, to some extent, for the fact that patterns of intron length evolution may differ between genes with larger versus smaller introns. The proportion of genes from the other size classes (other than size class one, discussed above) that showed evidence of conserved intron content was smaller and we found no evidence for enrichment for the default DAVID gene sets (after multiplicity correction). ###### **Gene set enrichment analysis** Gene set enrichment analysis of genes in size class 1 showing evidence of intron content conservation in mammals. Top twenty most significantly enriched terms are shown. Category Term Count ***P*****-value** FDR (BH)^1^ ----------------- ---------------------------------------------------------------------- -------- ------------------- ------------- UP_SEQ_FEATURE DNA-binding region:Homeobox **20** 2 × 10^--10^ 8 x 10^--8^ INTERPRO Homeobox, conserved site **20** 9 × 10^--10^ 2 x 10^--7^ SP_PIR_KEYWORDS Homeobox **20** 2 × 10^--9^ 4 x 10^--7^ INTERPRO Homeobox **19** 5 x 10^--9^ 6 x 10^--7^ GOTERM_BP_FAT Regulation of transcription, DNA-dependent **41** 7 x 10^--9^ 1 x 10^--5^ INTERPRO Homeodomain-related **19** 1 x 10^--8^ 8 x 10^--7^ GOTERM_BP_FAT Regulation of RNA metabolic process **41** 1 x 10^--8^ 8 x 10^--6^ GOTERM_BP_FAT Positive regulation of transcription from RNA polymerase II promoter **19** 1 x 10^--8^ 6 x 10^--6^ GOTERM_BP_FAT Positive regulation of biosynthetic process **27** 3 x 10^--8^ 1 x 10^--5^ GOTERM_BP_FAT Positive regulation of cellular biosynthetic process **27** 3 x 10^--8^ 1 x 10^--5^ GOTERM_MF_FAT Transcription regulator activity **38** 7 x 10^--8^ 2 x 10^--5^ GOTERM_BP_FAT Positive regulation of gene expression **24** 8 x 10^--8^ 2 x 10^--5^ GOTERM_BP_FAT Positive regulation of transcription, DNA-dependent **21** 8 x 10^--8^ 2 x 10^--5^ GOTERM_BP_FAT Positive regulation of RNA metabolic process **21** 8 x 10^--8^ 2 x 10^--5^ GOTERM_BP_FAT Positive regulation of macromolecule biosynthetic process **25** 9 x 10^--8^ 2 x 10^--5^ GOTERM_BP_FAT Positive regulation of macromolecule metabolic process **27** 1 x 10^--7^ 2 x 10^--5^ GOTERM_BP_FAT Positive regulation of nitrogen compound metabolic process **25** 1 x 10^--7^ 2 x 10^--5^ GOTERM_MF_FAT Sequence-specific DNA binding **25** 1 x 10^--7^ 2 x 10^--5^ SMART HOX **19** 2 x 10^--7^ 8 x 10^--6^ GOTERM_BP_FAT Positive regulation of transcription **23** 2 x 10^--7^ 3 x 10^--5^ ^1^Benjamini-Hochberg FDR corrected *P*-values Intronic insertions and deletions along lineages leading to human and mouse --------------------------------------------------------------------------- To investigate evolution of intron length through insertion and deletion in greater detail we considered changes in intron length along the human and mouse lineages following divergence from their last common ancestor. Genomic sequences at ancestral nodes of the mammalian phylogeny were obtained from Ensembl. These sequences were inferred using a probabilistic method that has been shown to have high accuracy for the inference of insertion and deletion events. We mapped insertion and deletion events to introns. Conservation of intron content could result from the absence of insertion and deletion events or from balance between insertion and deletion. For the 11 genes that showed as much conservation as *Hes7* across the mammalian panel, we found qualitative support for both effects. The total amount of insertion and deletion was lower in these genes but there were also some genes with substantial insertion and deletions in balance (Fig. [2](#F2){ref-type="fig"}). This was particularly evident in the case of indels along the lineage leading to mouse, however, as these genes were selected on the basis of their conservation in a panel that included humans and mouse this result should be considered to be illustrative only. ![**Comparison of insertions and deletions** The sum of the insertions and deletions that have taken place in genes in size class 1 along the human (a) and mouse (b) lineages since divergence from their common ancestor. Blue points, corresponding to the genes that showed as much or more intron content conservation than *Hes7* are shown against a background of grey points, corresponding to all genes in the size class. All axes are truncated, but the truncated axes include all of the blue points. Grey points lying with cumulative insertions or deletions greater than **200** bp for human or **2000** bp for mouse are not shown.](1471-2105-12-S9-S16-2){#F2} We also identified the complete set of genes in size class one that were annotated with a homeobox domain by Interpro \[[@B18]\]. To investigate whether the change in intron content since the common ancestor of human and mouse was less than expected, given the inferred numbers of indels we used a randomization procedure (*described in* Data and methods). We applied this procedure to the set of homeobox domain proteins and found that the change in intron content of these genes along both the human and mouse lineages was far less than expected, given the number of indels inferred to have occurred in each lineage and under the null assumption that the ratio of insertions and deletions and size distribution of these events did not differ for these genes compared to the rest of genes in the size class. In the case of human, the mean absolute change in intron content was 450 bp per gene, whereas the median of this value in the randomized data was 846 bp per gene. The randomized values were less than or equal to the observed value in 87 of 10,000 randomizations (one-tailed p = 0.009). In mouse the mean absolute change in intron length was just 9 bp per gene. The median of this quantity across randomizations was 398 bp per gene. The values in the random data were lower than or equal to the observed data in 33 of 10,000 randomizations (one-tailed p = 0.003). Contribution of conserved sequence elements to intron length conservation ------------------------------------------------------------------------- From our results it appears that there is selection to prevent large changes in intron content in specific sets of genes, notably in genes involved in development and especially in early embryonic patterning. This selection could result from the presence of *cis* or *trans* (e.g. non-coding RNAs) regulatory elements within introns of these genes, which would be disrupted by insertions and even more so by deletions. However, the presence of regulatory elements would tend to increase the intron length \[[@B19]\], yet we found good evidence for classes of genes with well conserved intron content only among the genes with lower intron content. To test the contribution of conserved functional elements within intronic sequences on the conservation of intron content we obtained conservaton scores, calculated using phastCons, from the UCSC genome database. phastCons scores for the intronic regions of *Hes7* are shown as figure [3](#F3){ref-type="fig"}. While there is evidence of functional elements, these are relatively few and short and seem unlikely to prevent changes in intron length over evolutionary time. More quantitatively, we compared phastCons scores (averaged across all intronic positions) between the 144 genes with evidence of conserved intron content and the remainder of the genes in the smallest intron size class. The difference in mean phastCons scores was not significant (p = 0.33, Wilcoxon rank sum test). The difference in the proportion of conserved sites (phastCons scores \> 0.95) was also non-significant (p = 0.69), suggesting that a greater proportion of conserved intronic functional elements is not the cause of the intron length conservation in these genes. ![phastCons scores across introns of the Hes7 gene](1471-2105-12-S9-S16-3){#F3} To explain our observations, conservation acting on functional elements would, perhaps, have to be balanced with selection for rapid induction, as rapidly induced genes have been shown to have short introns \[[@B20]\]. If the conservation of intron content is a consequence of balance between conservation of intronic functional elements and selection either for efficiency \[[@B21]\] or for rapid induction, this balance appears to be particularly significant for development-associated genes. For these genes, expression precision at the critical developmental junctures in which patterns are established in the developing embryo may be particularly crucial. An intriguing role for introns that has recently gained experimental support is in the establishment of oscillating patterns of gene expression through the control of time delays in expression \[[@B11]\]. These authors attributed a 19 minute delay to the presence of introns. However, the introns of *Hes7* are relatively short (\< 2 kb) and RNA polymerase II processes nucleotides at a rate in the order of 2 kb per minute \[[@B22],[@B23]\]. This may suggest either the existence of other functional elements within the intron that caused the delay in transcription or specific properties of the intron that result in an exceptionally slow transcription rate. Conclusion ========== Some theories of intron evolution have focussed on the energy cost associated with introns. Reduced intron lengths in highly expressed genes were proposed to result from selection for efficiency \[[@B21]\]. In support of this model, greater selective efficiency associated with larger effective population sizes of unicellular versus multicellular organisms, is associated with shorter introns \[[@B2],[@B3]\]. Alternatively longer introns in highly and ubiquitously expressed genes may be associated with greater regulatory complexity and the preservation of regulatory elements in introns \[[@B19]\]. Selection to reduce energetic costs of transcription and for rapid induction of some genes as well as selection to preserve regulatory elements in highly regulated genes may all be important factors for intron evolution. However, comparison of genes with very conserved intron contents carried out here, suggests that there may be a substantial number of genes for which the size of the primary transcript is an important and conserved feature. These genes are enriched for key developmental processes, particularly the establishment of early embryonic patterns. Since time delays in gene induction have been shown to be important for some such genes, we propose that selection to conserve transcription time is an important factor in the evolution of intron lengths, particularly in development-associated genes. Our analysis involved a combination of a heuristic examination of intron content across a panel of mammalian species and a statistical randomization approach, which does not take into account all of the factors that may affect the fixation probabilities of insertions and deletions in introns. A better understanding of the evolution of intron sizes through insertion and deletion requires the development of evolutionary models of intron length evolution, though this is challenging because of the diversity of insertion and deletion events and the difficulty in modelling the constraints imposed by functional elements within the introns on the occurrence and size distribution of these events. If an appropriate model of neutral evolution by insertion and deletion can be derived, such a model could be used to identify and quantify purifying selection acting on intron lengths and, perhaps, to discover examples of positive selection acting on changes in intron length over a phylogeny or specific branches of a phylogenetic tree. Data and methods ================ Complete sets of gene models were downloaded from Ensembl release 62 \[[@B24]\] via BioMart for 19 mammalian species. These were *Homo sapiens*, *Bos taurus*, *Canis familiaris*, *Ornithorhynchus anatinus*, *Equus caballus*, *Erinaceus europaeus*, *Gorilla gorilla*, *Loxodonta africana*, *Monodelphis domestica*, *Myotis lucifugus*, *Microcebus murinus*, *Mus musculus*, *Oryctolagus cuniculus*, *Sus scrofa*, *Spermophilus tridecemlineatus*, *Tarsius syrichta*, *Tursiops truncatus*, *Vicugna pacos* and *Felis catus.* Species were selected to sample a broad range of mammalian evolutionary history. A phylogenetic tree of these taxa, obtained from the interactive tree of life \[[@B25],[@B26]\] is provided for illustrative purposes (Fig. [1](#F1){ref-type="fig"}). For each Ensembl gene in each species we considered all annotated exons and calculated the total intronic content of the gene as the sum of the gaps between non-overlapping successive exons in the canonical transcript associated with the gene. Genes were divided into four classes, depending on the total intron content of the gene (1 -- 5 kb, 5 -- 20 kb, 20 -- 50 kb and 50 -- 100 kb). Orthologous groups of mammalian proteins were downloaded from OrthoDB \[[@B15]\]. We extracted the protein identifiers from OrthoDB corresponding to each of the mammalian species included in the study. Where more than one protein from a species was included in the same orthologous group, we selected one paralogue at random. For each orthologous group, with a representative in at least half of the mammalian species considered we determined the number of species in which the intron content, as defined above, was within 10% of the length of the intron content of the human gene. This was done separately for genes in different intron content classes. Functional analysis of genes with conserved intron content was carried out using DAVID \[[@B16],[@B17]\]. For each size class, the genes for which the intron content showed evidence of conservation was used as the foreground set and the complete set of genes in the size class was used as the background set. Genomic multiple sequence ancestor alignments, inferred using the Ensembl Enredo-Pecan-Ortheus pipeline \[[@B27]\], were downloaded from the comparative genomics section of the Ensembl FTP site. Insertions and deletions were inferred for ancestral sequences included in these alignments using a branch transducer method that has been shown to achieve high accuracy \[[@B28]\]. This allowed insertions and deletions to be placed on branches of the mammalian phylogeny. For reconstructed insertion and deletion events we focussed on the branches leading from the common ancestor of the euarchontoglires (which includes rodents and primates) to humans and mouse. All insertion and deletion events occurring within introns (at least 20 bp from exon-intron) boundaries were identified, based on Ensembl gene models. In this case, intronic indels were defined as indels that occur within the boundaries of the gene but not within 20 bp of any annotated exon associated with the gene. Randomization study of intron length evolution along the human lineage ---------------------------------------------------------------------- For each intron size class we used the complete set of insertion and deletion events within the introns to define the null expectation of events in that intron size class. To test for evidence of purifying selection acting on the intron content of a gene or a set of genes we considered all of the insertion and deletion events in the gene(s) under consideration and for each event sampled an insertion or deletion from the total set of events in the introns of genes in that class. Given a set of insertions and deletions randomly sampled in this way we calculated the change in intron content implied by this set of insertions and deletions (sum of insertion lengths minus the sum of the lengths of the deletions), separately along the human and mouse lineages. This was repeated 10,000 times and in each case the implied change in intron content in the randomized data was compared to the change in intron content, given the actual insertions and deletions inferred to have occurred. The number of times the absolute value of the change in intron content in the randomized data was less than or equal to the absolute value of the change in intron content in the observed data was used to calculate a p-value, with a separate p-value calculated for the human and mouse lineages. These p-values indicate the probability of observing as little or less variation in the intron content of a gene or set of genes, given the number of insertion and deletion events that have occurred and under the assumption that these indel events have the same distribution as events in other genes in the same intron size class. Authors\' contributions ======================= CS conceived the project. CS and PK performed the analysis and co-wrote the manuscript. Competing interests =================== The authors declare that they have no competing interests. Acknowledgements ================ CS is funded by Science Foundation Ireland (grant number 07/SK/M1211b). PK is funded by the National University of Ireland Galway. This article has been published as part of *BMC Bioinformatics* Volume 12 Supplement 9, 2011: Proceedings of the Ninth Annual Research in Computational Molecular Biology (RECOMB) Satellite Workshop on Comparative Genomics. The full contents of the supplement are available online at <http://www.biomedcentral.com/1471-2105/12?issue=S9>.
How to perform a re-scan of the blockchain Performing a re-scan of the blockchain This guide is a walktrough on how to perform a re-scan of the blockchain (this guide can be used for both XFUEL and XBY). This should be done when you've imported a private key and your balance doesn't match that of what the block explorer is showing. You can check your wallet address on the block explorer (XBY or XFUEL) to see if there is a mismatch in balances.
On this episode of the show Mark and Stuart run through some of the games they’ve been playing and cover a fair bit of recent news and controversies that have been swirling around the gaming interwebs. On this show we talk about Vampyr, God Of War, The Last Guardian, The Last Day of June, Dark Echo, Nex Machina and a few others. You can find additional content by us over on the LGR website at www.lapsedgamer.com and you can get in touch with us via Twitter @lapsedgamer
vs.1.1 # DYNAMIC: "DOWATERFOG" "0..1" # DYNAMIC: "SKINNING" "0..1" #include "macros.vsh" local( $worldPos, $worldNormal, $projPos ); alloc $worldPos alloc $projPos &SkinPosition( $worldPos ); ;------------------------------------------------------------------------------ ; Transform the position from world to view space ;------------------------------------------------------------------------------ dp4 $projPos.x, $worldPos, $cViewProj0 dp4 $projPos.y, $worldPos, $cViewProj1 dp4 $projPos.z, $worldPos, $cViewProj2 dp4 $projPos.w, $worldPos, $cViewProj3 ;------------------------------------------------------------------------------ ; Normal is based on vertex position ;------------------------------------------------------------------------------ &AllocateRegister( \$worldNormal ); &AllocateRegister( \$normalDotUp ); sub $worldNormal, $worldPos, $SHADER_SPECIFIC_CONST_6 ; Normal = (Pos - Eye origin) dp3 $normalDotUp, $worldNormal, $SHADER_SPECIFIC_CONST_7 ; Normal -= 0.5f * (Normal dot Eye Up) * Eye Up mul $normalDotUp, $normalDotUp, $cHalf mad $worldNormal, -$normalDotUp, $SHADER_SPECIFIC_CONST_7, $worldNormal &FreeRegister( \$normalDotUp ); ; normalize the normal &Normalize( $worldNormal ); mov oPos, $projPos ;------------------------------------------------------------------------------ ; Fog ;------------------------------------------------------------------------------ &CalcFog( $worldPos, $projPos ); ; base tex coords mov oT1.xy, $vTexCoord0 ; spotlight texcoords dp4 oT0.x, $worldPos, $SHADER_SPECIFIC_CONST_1 dp4 oT0.y, $worldPos, $SHADER_SPECIFIC_CONST_2 dp4 oT0.z, $worldPos, $SHADER_SPECIFIC_CONST_3 dp4 oT0.w, $worldPos, $SHADER_SPECIFIC_CONST_4 local( $worldPosToLightVector, $distFactors ); alloc $worldPosToLightVector sub $worldPosToLightVector, $SHADER_SPECIFIC_CONST_0.xyz, $worldPos local( $distatten ); alloc $distatten ; $distatten = [ 1, 1/dist, 1/distsquared ] ; dist squared dp3 $distatten.z, $worldPosToLightVector, $worldPosToLightVector ; oodist rsq $distatten.y, $distatten.z mov $distatten.x, $cOne local( $dist ); alloc $dist mul $dist.x, $distatten.z, $distatten.y rcp $distatten.z, $distatten.z ; 1/distsquared local( $endFalloffFactor ); alloc $endFalloffFactor ; ( dist - farZ ) sub $endFalloffFactor.x, $dist.x, $SHADER_SPECIFIC_CONST_5.w ; 1 / ( (0.6f * farZ) - farZ) mul $endFalloffFactor, $endFalloffFactor.x, $SHADER_SPECIFIC_CONST_0.w max $endFalloffFactor, $endFalloffFactor, $cZero min $endFalloffFactor, $endFalloffFactor, $cOne local( $vertAtten ); alloc $vertAtten dp3 $vertAtten, $distatten, $SHADER_SPECIFIC_CONST_5 mul $vertAtten, $vertAtten, $endFalloffFactor ; Normalize L &Normalize( $worldPosToLightVector ); ; N.L dp3 $worldNormal, $worldNormal, $worldPosToLightVector ; Modulate distance attenuation with N.L mul oD0, $vertAtten, $worldNormal ; iris dp4 oT3.x, $SHADER_SPECIFIC_CONST_8, $worldPos dp4 oT3.y, $SHADER_SPECIFIC_CONST_9, $worldPos free $dist free $endFalloffFactor free $worldPos free $worldNormal free $projPos free $worldPosToLightVector free $distatten free $vertAtten
1. Field of the Invention The present invention relates to sonar sound sources and more particularly to a surface deployed buoy that generates underwater sonic impulses by releasing acoustic charges. 2. Description of the Prior Art Use of underwater explosive charges to provide sonic impulses is well known in the art. Echo location, sensor testing and signalling are some of the applications requiring underwater deployment of such sonic charges. In echo location the sonic charge is used in the vicinity of hydrophones to provide an impulse for echo location of submerged geologic structures or vessels. In sensor testing applications sonic charges are released at a fixed depth and distance to determine the performance characteristics of underwater sensors. Underwater charges can also be timed to explode in a coded pattern to communicate between a subsurface craft and a hydrophone. Submarine launched acoustic charge release devices are often deployed for covertly signalling surface craft. The device used in covert signalling must be launched from a torpedo tube and provide coded release of signal charges. The device should not be visible from the surface. In one prior art device exploding bolts are used to separate the charge containing portion of the device from the control portion of the device. Charges are ejected in a coded sequence by explosive bolts in the charge containing portion of the device. A drogue is deployed from the control portion of the device to control the release of charges and prevent the ejected charge from damaging the control portion. Aircraft deployed acoustic charge release devices are typically used in echo location applications. In this use, the explosion of a charge provides a sound source, and a sonobuoy dropped from the airplane act as pickup devices for echo location of submarines and underwater objects. Aircraft deployed devices are designed to release an underwater charge from a device containing a plurality of charges in response to a radio signal. The aircraft deployed device releases charges arrayed on a streamer to allow detonation when the buoy is signalled. The device has no provisions for recovery or reloading. In test applications, charges are often deployed in the vicinity of an array of submarine acoustic sensors. Acoustic charges must be pressure sensitive to explode at a pre-set depth and the charges must be deployed within a standard distance from the array. The United States Navy has standard acoustic charges, known as signal underwater sound (SUS) charges, available for use in this application. If a surface vessel is used to deploy the charges, after deployment of a charge the vessel must be moved away from the charge deployment site to avoid interference with the acoustic signal because of echo from the hull or engine noise. Each of the above methods of underwater acoustic charge deployment is deficient when deploying acoustic charges for test purposes. When testing acoustic sensors, charges must be released near the sensor with consistency. Neither aircraft nor submarines can release an acoustic source with sufficient accuracy for test purposes. Existing submarine and aircraft acoustic source devices do not allow for depth sensitive charges. Furthermore, aircraft and submarine deployment is too expensive to be practical for test purposes. Releasing acoustic charges from surface vessels is unavailable because of echo caused by the presence of the vessel and engine noise. One prior art device correcting these deficiencies is Vaccaro et al., U.S. Pat. No. 5,175,712. The device of Vaccaro '712 provides for launch of acoustic charges at preselected time intervals from an autonomous craft but does not provide for acoustic charge launch on command from a platform nor any means of informing a recovery platform that all charges have been launched. Because of these deficiencies, the crew retrieving the '712 buoy does not know whether a charge remains in the buoy. Furthermore, the electrical door latch system of the '712 patent is unreliable and requires an excessive amount of power.
#include <swap.h> #include <swapfs.h> #include <mmu.h> #include <fs.h> #include <ide.h> #include <pmm.h> #include <assert.h> void swapfs_init(void) { static_assert((PGSIZE % SECTSIZE) == 0); if (!ide_device_valid(SWAP_DEV_NO)) { panic("swap fs isn't available.\n"); } max_swap_offset = ide_device_size(SWAP_DEV_NO) / (PGSIZE / SECTSIZE); } int swapfs_read(swap_entry_t entry, struct Page *page) { return ide_read_secs(SWAP_DEV_NO, swap_offset(entry) * PAGE_NSECT, page2kva(page), PAGE_NSECT); } int swapfs_write(swap_entry_t entry, struct Page *page) { return ide_write_secs(SWAP_DEV_NO, swap_offset(entry) * PAGE_NSECT, page2kva(page), PAGE_NSECT); }
Tricia Severns, ANP-BC, OCN® Tricia (Sheehy) Severns has been an oncology nurse for more than 20 years. She graduated from the University of Pennsylvania School of Nursing in 1995. She returned to Boston in 1999 where she joined the Dana-Farber Inpatient Hospital at Brigham and Women’s Hospital. She joined the Dana-Farber Outpatient staff in 2001, starting in the infusion room. She returned to graduate school for a Masters’ in Nursing at MGH-Institute of Health Professions, and graduated with a 4.0 GPA. She served as a Waldenstrom’s Macroglobulinemia Nurse Practitioner from 2008-2103 under the direct supervision of Dr. Steven Treon. She had the opportunity to present at IWMF meetings, as well as WM Summits. She took a brief hiatus and rejoined Dana-Farber in 2015 where she became a Bone Marrow Biopsy Proceduralist. She was invited back to the WM team in February 2016, where she now works part-time in addition to her role in the Procedure Suite. She provides direct patient care to patients with Waldenstrom’s Macroglobulinemia and related diseases.
Gold stocks are set to boom thanks to the commodity's price and merger activity, with UBS slapping a buy on its entire gold coverage list with the exception of Newcrest and Independence Group. UBS put out the note as the sector enjoys a boost from a wave of mergers and acquisitions this year, with 26 deals worth in total $1.7 billion. Gold has recovered from its March lows of $US1150 an ounce and is now trading near $US1188. Credit:Eddie Jim Gold has recovered from its March lows of $US1150 an ounce and is now trading near $US1188 ($1533). "With the exception of Newcrest and Independence Group, we have buy ratings on our entire gold coverage list," said UBS.
GOP strategy: Come up with ideas not good enough to persuade the Democrats; anything else is good That’s the lesson to learn from Mitt Romney, who Jonathan Chait notices was endorsed by the National Review until the Democrats decided he made good policy ideas. Once Obama, Reid, and Pelosi adopted Romney’s health care plan, it was considered anathema and pretty much killed Romney’s chances of winning the Republican primary in 2012. Maybe that’s why the Republicans seem to be bereft of ideas. If they somehow persuade the Democrats to adopt them, they will be dirty. Or something.
Are we there yet? Statistical approaches to Artificial Intelligence are behind most success stories of the field in the past decade. The idea of generating non-trivial behaviour by analysing vast amounts of data has enabled recommendation systems, search engines, spam filters, optical character recognition, machine translation and speech recognition, among other things. As we celebrate the spectacular achievements of this line of research, we need to assess its full potential and its limitations. What are the next steps to take towards machine intelligence?
BILLIONAIRE wealth in the UAE surged to $132 billion this year from $45 billion in 2013, marking a worldwide record increase of 193 per cent, a report said. The number of billionaires in the UAE also increased to 46 from 37 in 2013, added the Wealth-X and UBS Billionaire Census 2014 released by Wealth-X, the definitive source of intelligence on the ultra-wealthy. Meanwhile, Saudi Arabia saw a decline of 18.6 per cent in its billionaire wealth, down to $166 billion in 2014, as against $204 billion last year, according to the report, which noted that the kingdom claimed the 10th spot globally for its count of 57 billionaires. The Middle East experienced a decline in its billionaire population over the past year. Africa is the only other region that saw a decrease in its number of billionaires. Nonetheless, the remaining billionaires, as well as some of the region’s new billionaires, have seen their total wealth increase. Only 6 per cent of the Middle East’s billionaires are female, the smallest share of any other region. Only 10 per cent of the region’s billionaires fully inherited their wealth. Work, entrepreneurialism and family businesses are the most significant factors behind the growth of the region’s billionaire wealth, the report said. Asia, however, boasted the largest billionaire wealth increase, with the region’s billionaires’ fortunes growing by 18.7 per cent over the past year. The region is responsible for 30 per cent of the net increase in global billionaire wealth in 2014. Asia’s billionaire population grew by 10 per cent in 2014, with 52 new entrants into the billionaire club – 33 are from China. The US maintains its position as the world’s top billionaire country with a population of 571 billionaires in 2014, followed by China (190) and the UK (130), which took the third spot from Germany (123) on the Top 40 Billionaire Countries/Territories list. Europe is home to more than a third of the world’s billionaire population. The billionaire population in the Middle East shrank by 1.9 per cent, but total billionaire wealth in the region rose by 16.7 per cent. There are 2,039 male billionaires in 2014, accounting for 87.7 per cent of the world’s total billionaire wealth of $7.3 trillion. There are 286 female billionaires in 2014, accounting for a 12.3 per cent share of global billionaire wealth. Gulf banks show solid growth GULF banks have shown healthy earnings growth over the last year and a half despite historically low interest rates, according to a new Standard & Poor’s (S&P) Ratings Services report. The declining credit losses will continue to support GCC banks’ earnings throughout 2014, although this effect is expected to be less visible than in the last year, it said. Timucin Engin, S&P’s analyst, said: “Prospects for economic growth in the Gulf region remain healthy for the next few years. We expect most Gulf banks to continue to benefit from robust corporate activity and consumer consumption over the next 18 to 24 months. The many infrastructure projects planned in the Gulf should translate into sustained streams of corporate lending.” Over the past three years, strong liquidity flows into the Gulf’s deposit markets have supported the region’s banks, which traditionally rely on local deposits for the bulk of their funding, said the report. Petchem firms boost corporate earnings THE combined net profits of Saudi Arabia’s leading companies are expected to rise 17 per cent this year and a further 11 per cent in 2015, largely on the back of petrochemical producers and banks, although a number of companies in other sectors also promise strong growth. The figures are based on average forecasts from analysts surveyed by Reuters for 81 companies which accounted for 99 per cent of the total profits of constituent companies in Saudi Arabia’s main equities index last year. The outlook puts Saudi Arabia roughly on a par with Qatar, where profit growth is set to average 13 per cent this year and next, and Abu Dhabi, which is expected to average 17 per cent. It’s a big improvement from Saudi Arabia’s zero profit growth in 2012 and a six per cent increase last year. That poor performance was almost entirely due to weak profits at petrochemical firms, which saw product prices sag because of the economic slump in Europe. Strong earnings will not necessarily translate into further fast rises for Saudi stock prices, which are already up 28 per cent year-to-date, having surged since the market opening plan was announced in July; many fund managers think the market is no longer cheaply valued. But the earnings picture does ensure that the market opening is likely to attract heavy investor activity. UAE residents ‘save outside the country’ NEARLY half of UAE residents choose to save their money in bank accounts outside their country of residence, a report said. More than 48 per cent of respondents of an annual survey conducted by compareit4me.com, a UAE-based finance comparison website, said they are more confident with banking systems in their home countries. Jon Richards, CEO of compareit4me.com, said the results indicate that UAE financial institutions may be missing out on an opportunity and need to do more to keep residents’ savings onshore. “When you look at the results, a significant number or 65.5 per cent of the survey respondents claimed to be saving between 10 per cent and over 50 per cent of their salary every month. With millions of dirhams leaving the country every year, there appears to be huge potential for UAE banks to attract regular savers,” Richards added. The banks need to work with the UAE Central Bank to look at initiatives that will incentivise expat workers to keep money earned here in the country. At present, many expats feel more comfortable saving with banks in their home country as they understand the system and feel comfortable with banking regulations. Accounts in the Isle of Man are protected by the Compensation of Depositor Regulations. Despite the large number of residents sending money abroad, renewed economic confidence in recent years has seen UAE banks flush with liquidity. According to the UAE Central Bank, total bank deposits of UAE banks climbed by 1.4 per cent year-on-year in June to Dh1.4 trillion ($381 billion). Gulf Industry, published by Al Hilal Group has now established itself as a "must-read" publication for anyone with an involvement in the region's industrial sector whether as manufacturers, distributors or related service organisations.The publication represents a "window" into the Gulf's manufacturing trading and export sectors providing news, views analysis and information across virtually every industry related sector.
UNPUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT UNITED STATES OF AMERICA,  Plaintiff-Appellee, v.  No. 02-4966 ANTHONY TERRELL GARNER, Defendant-Appellant.  Appeal from the United States District Court for the District of South Carolina, at Orangeburg. Cameron M. Currie, District Judge. (CR-01-945) Submitted: May 12, 2003 Decided: June 2, 2003 Before NIEMEYER and LUTTIG, Circuit Judges, and HAMILTON, Senior Circuit Judge. Affirmed by unpublished per curiam opinion. COUNSEL Allen B. Burnside, Assistant Federal Public Defender, Columbia, South Carolina, for Appellant. J. Strom Thurmond, Jr., United States Attorney, Stacey D. Haynes, Assistant United States Attorney, Columbia, South Carolina, for Appellee. 2 UNITED STATES v. GARNER Unpublished opinions are not binding precedent in this circuit. See Local Rule 36(c). OPINION PER CURIAM: Anthony Terrell Garner pled guilty to two counts of possession of a firearm by a convicted felon, 18 U.S.C. § 922(g)(1) (2000) (Counts 1 and 2), and one count of possession with intent to distribute mari- juana, 21 U.S.C. § 841(b)(1)(D) (2000) (Count 4). He received con- current sentences of 120 months for the firearms offenses and sixty months for the marijuana offense. Garner appeals his sentence, argu- ing that the district court erred in making a four-level enhancement pursuant to U.S. Sentencing Guidelines Manual § 2K2.1(b)(5) (2001), after finding that he possessed a firearm in connection with another felony offense. We affirm. On January 1, 2001, Garner was arrested on a number of state charges, including unlawful possession of two firearms, one of them a stolen pistol. On April 3, 2002, a federal search warrant was exe- cuted at the mobile home where Garner lived with his girlfriend. Law enforcement officers seized 31.4 grams of marijuana packaged for sale and stored in a zip-lock plastic bag, another 54.95 grams of mari- juana packaged for sale and stored in a Crown Royal bag, and a small amount of cocaine that Garner had in his pants pocket. They also found an unloaded .380 caliber pistol under the mattress of Garner’s bed. Garner admitted that the gun and the marijuana were his and pled guilty to the instant offenses. At sentencing, the district court determined that Garner possessed the gun seized from his residence on April 3 in connection with his marijuana dealing, despite Garner’s testimony that he bought the gun for the sole purpose of selling it and did not sell drugs from his home. A factor in the court’s decision was Garner’s statement at the sentenc- ing hearing that he had in the past carried a gun for protection while selling marijuana and later sold that gun. Because Garner admitted that the gun seized on April 3 belonged to him, the only issue on appeal is whether the district court correctly UNITED STATES v. GARNER 3 determined that he possessed it in connection with his marijuana offense. The parties agree that the phrase "in connection with," as used in § 2K2.1(b)(5), has been held by this Court to have the same meaning as it does in § 2K2.1(c)(1), and that both phrases are analo- gous to the "in relation to" language in 18 U.S.C. § 924(c) (2000). See United States v. Garnett, 243 F.3d 824, 828 & n.6 (4th Cir. 2001). The district court’s factual findings with respect to applicability of the enhancement are reviewed for clear error. Id. at 828. To prove that a firearm was possessed "in relation to" another felony, the government must show that the gun had "some purpose or effect with respect to" the other felony, and facilitated or had the potential to facilitate the other offense. United States v. Lipford, 203 F.3d 259, 266 (4th Cir. 2000) (quoting Smith v. United States, 508 U.S. 223, 237 (1993)). The presence of the firearm may not be simply accidental or coincidental, but it is sufficient "if the firearm was present for protection or to embolden the actor." Id. (citing United States v. Mitchell, 104 F.3d 649, 654 (4th Cir. 1997)). Garner argues that no reliable evidence established a connection between his drug sales and the pistol found in his home. He suggests that his case is like United States v. Wilson, 115 F.3d 1185, 1191-92 (4th Cir. 1997) (reversing § 924(c) conviction where informant who approached the defendant to buy marijuana bought rifle instead, because there was no evidence that the rifle facilitated or had the potential to facilitate a drug offense). Wilson is distinguishable from Garner’s case, however, because Garner admitted that he had used a gun to protect himself while selling drugs. The gun seized from Gar- ner’s house had the potential to facilitate his drug dealing. Garner could easily have obtained ammunition for the gun and, even unloaded, the gun could have been used to intimidate. Therefore, the district court did not clearly err in finding that Garner possessed the gun in connection with his drug business. We therefore affirm the sentence imposed by the district court. We dispense with oral argument because the facts and legal contentions are adequately presented in the materials before the court and argu- ment would not aid the decisional process. AFFIRMED
1943 St. Louis Browns season The 1943 St. Louis Browns season involved the Browns finishing 6th in the American League with a record of 72 wins and 80 losses. Offseason November 7, 1942: Hal Epps was drafted by the Browns from the St. Louis Cardinals in the 1942 minor league draft. February 1, 1943: Paul Dean, brother of Browns broadcaster Dizzy Dean, was purchased by the Browns from the Washington Senators. Regular season Season standings Record vs. opponents Roster Player stats Batting Starters by position Note: Pos = Position; G = Games played; AB = At bats; H = Hits; Avg. = Batting average; HR = Home runs; RBI = Runs batted in Other batters Note: G = Games played; AB = At bats; H = Hits; Avg. = Batting average; HR = Home runs; RBI = Runs batted in Pitching Starting pitchers Note: G = Games pitched; IP = Innings pitched; W = Wins; L = Losses; ERA = Earned run average; SO = Strikeouts Other pitchers Note: G = Games pitched; IP = Innings pitched; W = Wins; L = Losses; ERA = Earned run average; SO = Strikeouts Relief pitchers Note: G = Games pitched; W = Wins; L = Losses; SV = Saves; ERA = Earned run average; SO = Strikeouts Farm system Awards and honors Vern Stephens, American League All-Star References External links 1943 St. Louis Browns team page at Baseball Reference 1943 St. Louis Browns season at baseball-almanac.com Category:St. Louis Browns seasons Saint Louis Browns season St Louis Browns
The Big 3 August 16, 2018 Have you ever felt that some things are just too impossible to change? That they’ll never change, that they’ll never heal or that relationship will never be the same? We all have these impossible mountains around us that we’ve learned to accept as immovable. But then again, what if they’re not? The gospels record three miracles of Jesus literally raising someone from the dead… What if he can still do the impossible? Join us as we discuss The Big 3 miracles of life change in the Bible and explore how God still brings dead things back to life.
Receive the latest local updates in your inbox Police say a 69-year-old man has been taken into custody after he allegedly stabbed his 59-year-old girlfriend to death during an argument in their Greenwich Village apartment Thursday. Checkey Beckford reports. (Published Friday, May 2, 2014) A 69-year-old man is accused of killing his 59-year-old girlfriend with an ax and a knife during an argument in their Greenwich Village apartment Thursday, police say. Dennis Guglielmo has been charged with second-degree murder and criminal possession of a weapon after the death of Alice Birnbaum. Police say the suspect and victim were arguing in their third-floor apartment on Downing Street when the man allegedly attacked her with both an ax and knife, police say. Birnbaum had multiple stab wounds to her chest and body, according to police. She was pronounced dead at the scene, and Guglielmo was taken into custody. Guglielmo is a former co-owner of Carmine Street Guitars, a music store where musicians pay $1,500 for custom guitars made from wood salvaged from landmarks around the city, the New York Times reports. He lost his stake in the store after unsuccessfully suing his partner, a fellow business owner told the Times. Stunned neighbors said the suspect is well-known and liked in the area Attorney information for Guglielmo wasn't immediately available. -- Checkey Beckford contributed to this report. Published at 9:29 PM EDT on May 1, 2014 | Updated at 7:42 AM EDT on May 2, 2014
Dallas Cowboys can clinch NFC East with win over Giants The Cowboys’ Dak Prescott (4), Ezekiel Elliott (21) run on to the field before a recent game. The Cowboys’ Dak Prescott (4), Ezekiel Elliott (21) run on to the field before a recent game. Photo: The Associated Press File Photo: The Associated Press File Image 1of/1 Caption Close Image 1 of 1 The Cowboys’ Dak Prescott (4), Ezekiel Elliott (21) run on to the field before a recent game. The Cowboys’ Dak Prescott (4), Ezekiel Elliott (21) run on to the field before a recent game. Photo: The Associated Press File Dallas Cowboys can clinch NFC East with win over Giants 1 / 1 Back to Gallery EAST RUTHERFORD, N.J. >> The Dallas Cowboys have everything in front of them, and one little nagging thing behind them: the New York Giants. The winners of 11 straight games, the Cowboys (11-1) can clinch the NFC East and move a step closer to nailing down home-field advantage for the conference playoffs if they can beat the Giants (8-4) at MetLife Stadium on Sunday night. While the Cowboys insist this is just another game, you know there has to be some churning inside them in facing their division rivals. After all, the Giants are the reason Dak Prescott, Ezekiel Elliott and company aren’t perfect. New York posted a 20-19 win in Dallas in the season opener, and one has to believe Jason Garrett’s crew wants payback. And if not that, the Cowboys certainly don’t want to go into the playoffs wondering if they can beat the Giants. “I’m looking forward to it a lot personally, and then I know this team,” Prescott said. “They’re the only blemish on our record right now, and just to be able to go up there at their place and be able to do what they did to us the first game, we’re excited for the opportunity.” The Giants know the Cowboys will be motivated. “They’re on a roll right now and I’m sure they don’t want to lose,” Giants receiver Odell Beckham Jr. said. “We’re the only team that has beaten them. I’m sure that that’s on their mind, too. They feel that they could be 12-0. They’re going to try and come out and prove that they should be undefeated. It’s going to be a big challenge.” The challenge got bigger for the Giants on Wednesday when defensive end Jason Pierre-Paul was lost for at least the rest of the regular season after having surgery to repair a sports hernia. Not only did the team lose one of its playmakers on defense, it came in a week when the Giants are facing new questions after a poor performance in Pittsburgh ended their six-game winning streak. They still hold the top spot in the wild-card playoff chase, but their schedule is tough with Detroit, Philadelphia and Washington in the final three weeks. “We believe we are a really good team, even though we haven’t played our best ball yet,” Giants linebacker Jonathan Casillas said. “If we can put the game together this week, I think it will be a statement game, but we have to do it. We have to be able to win, and that’s easier said than done.” Here are some things to watch in the nationally televised game: REPLACING JPP: Free-agent rookie Romeo Okwara probably will start at left defensive end, with Kerry Wynn and Owa Odighizuwa backing him up. Don’t be surprised if the Giants occasionally flip Olivier Vernon to the left side just to give the Cowboys something to think about. Linebacker Devon Kennard might see time as a stand-up speed rusher. Wynn is the best run stopper of the group, so he may need to get more time if the Giants want to limit Elliott, who leads the league in rushing. RESPECT FROM ODB: Beckham knows a thing or two about starring right away after winning the 2014 Offensive Rookie of the Year award. So he’s highly complimentary of Prescott and Elliott. “Absolutely, on the Giants or not on the Giants, you have to respect that,” Beckham said. Beckham, a former LSU star, remembers facing Mississippi State’s Prescott when they were in the SEC, and he offered Elliott advice on life in the NFL before the season. “I love to see Zeke out there celebrating,” Beckham said. “I love to see Dak out there with a smile. You just want to minimize that this Sunday.” GIANTS OFFENSE: The offense has been inconsistent. It has yet to score 30 points. The running game is among the worst in the league and Beckham has been the only playmaker for Eli Manning. Against the Steelers, Victor Cruz was not targeted once. The week before, Sterling Shepard wasn’t targeted against Cleveland. “We need to score more points and be more productive. Just have to overall execute better,” Beckham said. LEADING 88?: Dez Bryant’s next receiving touchdown will push him past Michael Irvin for second on Dallas’ career list. Both have 65. Irvin is the “Hall of Famer 88,” who followed the “Original 88” in Drew Pearson, who had 48 touchdowns. The franchise leader is another Hall of Famer, Bob Hayes, with 71. “He gets that confidence going and I have all the confidence in him,” Prescott said. “He feels no one can guard him and I feel the same way.” STOPPING ELLIOTT: The Giants held Elliott to a season-low 51 yards on 20 carries in his first game. The key is in the middle with tackles Damon Harrison and Johnathan Hankins. “From the very first time we played against him, we all said that that guy is going to be a player in this league, and that seems to be true up until this point,” Harrison said.
Infant race affects application of clinical guidelines when screening for drugs of abuse in newborns. Screening for illicit drugs in newborns has privacy, social, and legal risks for families of the infants. Established drug-screening criteria may be applied in a manner that considers nonproven risk factors such as race in addition to evidence-based factors. The goal of this study was to determine if race was used as a criterion for screening infants for intrauterine cocaine exposure. We hypothesized that infants of black mothers would be more likely to be screened regardless of whether they met the standard criteria for screening of our institution's NICU. We used the electronic medical records of newborn infants and their mothers to determine which mother-infant pairs had documented evidence of meeting the criteria for screening infants for prenatal exposure to illicit drugs set forth in the guidelines of our NICU. We then assessed the rates of drug screening to determine the strongest predictors of whether an infant would be screened. We assessed 2121 mother-infant pairs. Infants born to black mothers were more likely than those born to white mothers to have screening performed whether they met screening criteria (35.1% vs 12.9%; P < .001) or did not (5.3% vs 1.2%; P < .001). In a logistic regression analysis, black race remained independently associated (odds ratio: 2.17 [95% confidence interval: 1.25-3.79]) with drug screening even when we controlled for our standard screening criteria and income, insurance status, and maternal education. Providers seemed to have used race, in addition to recognized risk criteria, as a factor in deciding whether to screen an infant for maternal illicit drug use.
The K-2 submarine, designed as the Soviet Union’s next generation heavy submarine, would have combined many of these technologies into a weapon worthy of a James Bond villain. From V-2 rockets to tank-carrying midget submarines, the super sub could have done it all. Although the K-2 class was never built, it remains a window into the triumphant visions of the Soviet Union and Stalin itself in the aftermath of the most destructive war in history. In the aftermath of World War II, both the U.S. and the Soviet Union raced to recover Germany technology in a variety of military fields, including submarines and rocketry. The American effort, known as Project Paperclip, followed the Allied forces on the Western Front as they swept into France, the Low Countries, and eventually Germany itself, capturing technical documents, working equipment, and even the scientists and engineers that worked on these secret projects. In an article on his Covert Shores website, submarine expert HI Sutton explains the Soviet effort to use many of these captured technologies to build a super submarine. P-2 submarine. HI Sutton/Covert Shores In 1949, Soviet designers proposed a submarine that incorporated a number of these technologies. The sub, known as K-2, would be 367 feet long, 41 feet wide, and displace approximately 5,360 tons, making it easily ten times larger than wartime submarines constructed just four years before. K-2 had a crew of 100, a maximum operating depth of 656 feet, and a maximum speed of 17 knots underwater. The K-2 itself, Sutton explained to Popular Mechanics, was heavily influenced by the revolutionary German Type-XXI U-boat of World War II. The Type XXI was the most advanced submarine fielded by any country during the war, and details of the submarine had fallen into Soviet hands. K-2 was also armed to the teeth, almost comically so. “The submarine was massive for the time,” Sutton says, “with sixteen torpedo tubes in three separate torpedo rooms (two forward, one aft), all with reloads. This compared to ten on U.S. Navy fleet submarines of this time, and just four on later U.S. nuclear-powered attack submarines.” Each fired ET-46 torpedoes. It also featured two pairs of anti-aircraft guns, both 57-millimeter and 25-millimeter, for fending off sub-hunting aircraft. All of this was pretty standard for submarines of the late 1940s. German V-2 rocket preparing for launch. Fox Photos Getty Images Amazingly, the torpedoes and guns were actually K-2’s secondary armament. Primary armament consisted of no less than 12 R-1 (NATO code name: SS-1 “SCUNNER”) ballistic rockets, copies of the German V-2 rocket , in a large payload bay. Alternately, the payload bay could accommodate up to 41 10X (“SWALLOW”) cruise missiles, copies of the German V-1 cruise missile . Alternately, for a completely different role it could nine midget submarines, each carrying tanks for amphibious invasions. “P2 was the height of ambition of Stalin's navy,” Sutton explained. “It combined the latest submarine design learnings from World War II with the latest missiles. Until the Soviets captured Nazi German technologies at the end of World War Two, they did not have access to such advanced missile concepts.” V-2 buzz bomb, known as SWALLOW in Soviet service. Keystone-France Getty Images Why would Russia build a submarine suitable for wildly different goals as bombarding countries with rockets and cruise missiles versus landing amphibious forces? “The ability to depot tank-carrying midget submarines shows the confused state of Soviet requirements," says Sutton. "Transport submarines and use of submarines firing amphibious operations was seriously considered on both sides of the iron curtain, but mixing amphibious transport and missile strike capabilities in a single submarine is difficult to explain.” One possible explanation for the do it all super sub: Stalin himself. The Soviet leader, like Adolf Hitler, had a tendency to meddle in military decision making, and his megalomania could have persuaded him to pursue such an idea. Alternately, the Soviet Navy could have pitched the submarine as a wonder weapon to help ensure it was funded. The more useful a weapon is in a variety of roles the more likely it will stand out as worthy of state funding. The German Type XXI submarine, which formed the technical basis for the K-2. DEA PICTURE LIBRARY Getty Images But for whatever the reason, the K-2 was never built. “Russia later built separate ballistic missile submarines and cruise missile submarines," Sutton told PM. "No amphibious transport submarines were ever built.” Soviet progress in missile submarines wisely went a more incremental route, leading to monsters such as the Typhoon and Oscar classes in the 1980s—submarines that were several times bigger than K-2. Source: Covert Shores This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses. You may be able to find more information about this and similar content at piano.io
Q: incomplete download of file from url in java - using java NIO I used the code provided in accepted solution of below thread to download a 500kb zip file How to download and save a file from Internet using Java? public static File downloadFile(String fileURL, String saveDir) throws IOException { File downloadFolder = null; String saveFilePath = null; URL url = new URL(fileURL); ReadableByteChannel rbc = Channels.newChannel(url.openStream()); String fileName = fileURL.substring(fileURL.lastIndexOf("/") + 1, fileURL.length()); FileOutputStream fos = new FileOutputStream(fileName); saveFilePath = saveDir + File.separator + fileName; downloadFolder = new File(saveDir); downloadFolder.deleteOnExit(); downloadFolder.mkdirs(); FileOutputStream outputStream = new FileOutputStream(saveFilePath); outputStream.getChannel().transferFrom(rbc, 0, Long.MAX_VALUE); outputStream.close(); rbc.close(); return new File(saveFilePath); } The code is able to identify the file but the the problem is , the download is incomplete. It always downloads 5KB and stops there after. I dont want to use apache commons file untils. A: The problem was that I didn't set authentication. I set the authentication and it worked. code below public static File downloadFile(String fileURL, String saveDir) throws IOException { File downloadFolder = null; String saveFilePath = null; String username = "guest"; String password = "guest"; String usepass = username + ":" + password; String basicAuth = "Basic "+ javax.xml.bind.DatatypeConverter.printBase64Binary(usepass.getBytes()); URL url = new URL(fileURL); HttpURLConnection httpConn = (HttpURLConnection) website.openConnection(); httpConn.setRequestProperty("Authorization", basicAuth); ReadableByteChannel rbc = Channels.newChannel(httpConn.getInputStream()); String fileName = fileURL.substring(fileURL.lastIndexOf("/") + 1,fileURL.length()); FileOutputStream fos = new FileOutputStream(fileName); saveFilePath = saveDir + File.separator + fileName; downloadFolder = new File(saveDir); downloadFolder.deleteOnExit(); downloadFolder.mkdirs(); FileOutputStream outputStream = new FileOutputStream(saveFilePath); outputStream.getChannel().transferFrom(rbc, 0, Long.MAX_VALUE); outputStream.close(); rbc.close(); return new File(saveFilePath); }
Fuel pressure regulators have been disposed in various portions of vehicle fuel delivery systems to regulate the pressure of fuel delivered to an operating engine. In return type fuel systems, a fuel pressure regulator is typically disposed downstream of the engine fuel injectors and often on the engine fuel rail and fuel delivered in excess of the engine's fuel demand is returned by the fuel pressure regulator to the fuel tank through a return fuel line. In "return less" or no return type fuel systems, a fuel pressure regulator is disposed upstream of the engine and usually within the fuel tank immediately downstream of the fuel pump to bypass excess fuel delivered from the fuel pump into the fuel tank. Fuel filters may be disposed downstream of the fuel pump as well to remove contaminants from the fuel delivered to the engine. Generally, fuel flow through the filter results in a pressure loss the magnitude of which increases as the fuel filter becomes increasingly clogged during use. Thus, it is preferable to regulate the pressure of the fuel downstream of any in-line fuel filter to remove the affects of the fuel filter on the pressure of fuel supplied to the engine. One fuel system, as disclosed in U.S. Pat. No. 5,520,156, disposes an annular fuel filter in a depending skirt of a body attached to the fuel tank such that the fuel filter is immediately downstream of the fuel pump and the fuel delivered from the fuel pump flows through the fuel filter before being discharged from the fuel tank to an engine through a fuel line. In this fuel system, a fuel line connector and filter housing cap is removably received in the body and releasably retained by a ring threadably received on the body. U.S. Pat. No. 5,433,241 discloses a module mounted on a fuel tank with an outer body receiving a fuel pressure regulator downstream of a fuel pump in the fuel tank. An inner body having an outlet through which fuel flows to a fuel line for delivery to the engine is disposed within the outer body to enclose a fuel filter therein. The inner body is press fit into the outer body with an O-ring between them to provide a seal. Despite disposing one or more O-rings between the various members of these multiple piece assemblies, fuel vapors permeate the seals and escape from the fuel tank through the assemblies. The leaking hydrocarbon fuel vapors are hazardous to the environment and unacceptable under increasingly strict governmental regulations. Further, the multiple piece assemblies have a reduced strength and are subject to leaking liquid fuel as well as fuel vapors upon impact, such a during a vehicle accident.
I[NTRODUCTION]{.smallcaps} {#sec1-1} ========================== Cholecystitis can occur suddenly, with symptoms such as fever along with intense pain in the right upper quadrant.\[[@ref1]\] Laparoscopic cholecystectomy (LC) has now become the gold standard for the treatment of symptomatic gallstones.\[[@ref2][@ref3]\] LC may be rendered difficult by various challenges encountered during surgery such as difficulties in accessing the peritoneal cavity, creating a pneumoperitoneum, dissecting the gallbladder, or extracting the excised gallbladder.\[[@ref4]\] Various parameters have been studied extensively to analyze their effects on LC, starting from a single variable to up to 34 parameters which include age, sex, acute attack requiring hospitalization, previous abdominal surgeries, presence of palpable gallbladder mass, presence of an abdominal scar, and BMI of the patient. Age is recognized as a risk factor for conversion, perhaps due to a long history of gallstone and increased number of cholecystitis attacks.\[[@ref5]\] It has been observed that surgeons encountered difficulties while performing LC when there are dense adhesions at Calot\'s triangle, fibrotic and contracted gallbladder, acutely inflamed or gangrenous gallbladder and cholycystoenteric fistula, etc.\[[@ref6]\] Various available literature suggest that male gender is a high-risk factor for difficult LC. Previous upper abdominal surgery has been listed as a poor predictor for safe LC because of adhesion formations. It may also pose a problem in creating pneumoperitoneum, thus making LC difficult.\[[@ref7][@ref8][@ref9]\] Abdominal ultrasound has become a reliable, quick, and noninvasive tool to diagnose gallstone disease.\[[@ref10]\] Apart from its value in diagnosis, its findings may also predict the degree of difficulty involved in the procedure. One of the important ultrasonographic findings is maximum gallbladder wall thickness of \>4 mm which indicates a contracted fibrotic gallbladder which is difficult to grasp. Apart from this, ultrasound also demonstrates a porcelain gall bladder, gallbladder-containing large impacted stone, especially in Hartmann\'s pouch. Pericholecystic collection implies inflammation around the gallbladder which makes LC difficult.\[[@ref11]\] History of previous attacks, nonvisualization of the gallbladder, pericholecystic, and peripancreatic fluid are associated with a significant inflammatory process that causes difficulty in the dissection of Calot\'s triangle and adhesiolysis.\[[@ref12]\] Abnormal liver function tests and elevated amylase may signify ongoing hepatitis, cholangitis, and pancreatitis that pose difficulty in dissection due to edema.\[[@ref13]\] This study was designed to know the preoperative safe predictors for LC based on various parameters which include age, sex, acute attack requiring hospitalization, deranged liver functions, and ultrasonographic findings. The level of difficulty predicted preoperatively based on these parameters was compared with the actual challenges encountered during the laparoscopic procedure. During the procedure, the level of difficulty encountered was categorized by developing a scoring system \[[Table 1](#T1){ref-type="table"}\], which is expected to help surgeons in making unbiased standard predictions. ###### Local grading Grading Parameters --------------------------------- --------------------- Easy Time taken \<60 min No injury to duct or artery No conversion to open Reasonably easy Time taken \>60 min No Injury to duct or artery No conversion to open Moderately difficult Time taken \<60 min Injury to duct or artery No conversion to open Difficult Time taken \>60 min Injury to duct or artery No conversion to open Very difficult Time taken \>60 min No Injury to duct or artery Conversion to an open procedure Severely difficult Time taken \>60 min Injury to duct or artery Conversion to an open procedure M[ATERIALS AND]{.smallcaps} M[ETHODS]{.smallcaps} {#sec1-2} ================================================= This prospective study was conducted on 100 patients of either sex and of all age groups with a diagnosis of cholecystitis, over a 2-year period from January 1, 2017, to December 31, 2018. Preoperatively, a thorough history and physical examination were done in all patients. All required investigations, including Complete Blood Count (CBC), liver function tests, renal function tests, coagulation profile, serum amylase, serum lipase, and ultrasonography (USG), were carried out. LC was carried out, and intra-operative details were observed. Scores were given \[[Table 1](#T1){ref-type="table"}\], based on various parameters, which included time taken for the procedure, biliary or stone spilling, injury to the duct or artery, and conversion to open cholecystectomy, were recorded on a predesigned pro forma. Inclusion criteria {#sec2-1} ------------------ Patients with cholecystitis confirmed by USG for the presence of gallstones. Exclusion criteria {#sec2-2} ------------------ Patients with mass formation after an attack of acute cholecystitisPatients having coagulation disordersPregnant patientsPatients not giving consent or unfit for general anesthesia. Various parameters {#sec2-3} ------------------ Various parameters such as age, sex, previous attacks, previous surgery, deranged liver function tests, contracted or distended gallbladder, pericholecystic fluid, multiple stones, and gangrenous gallbladder were analyzed for predicting safe LC. Chi-square test and *P* value were used to determine the statistical significance. R[ESULTS]{.smallcaps} {#sec1-3} ===================== Age {#sec2-4} --- Minimum age of the patient undergoing LC was 22 years, and the maximum was 70 years. In the present study, 75% were in the age group of 31--60 years and the mean age was 43.44 ± 1.13 years \[[Table 2](#T2){ref-type="table"}\]. On analyzing the age data statistically \[[Table 3](#T3){ref-type="table"}\], it was observed that the preoperative prediction was correct in 100.0% of cases predicted as easy in the age group of ≤65 years, whereas 25.0% of the cases were correctly predicted as difficult in the age group of \>65 years. ###### Age-wise distribution of patients Age groups (years) Number of patients (%) -------------------- ------------------------ 21-30 18 (18.0) 31-40 31 (31.0) 41-50 27 (27.0) 51-60 15 (15.0) 61-70 9 (9.0) \>70 0 (0.0) Total 100 (100.0) Mean age 43.44±1.13 Range 22-70 ###### Correlation of age with peroperative outcome Age group (years) Outcome, *n* (%) Total, *n* (%) ------------------- ------------------ ------------------ ---------- ---------- --------- --------- ----------- ≤65 71 (100) 11 (78.6) 5 (83.3) 3 (75.0) 3 (100) 2 (100) 95 (95.0) \>65 0 (0.0) 3 (21.4) 1 (16.7) 1 (25.0) 0 (0.0) 0 (0.0) 5 (5.0) Total 71 (100) 14 (100) 6 (100) 4 (100) 3 (100) 2 (100) 100 (100) ***χ*^2^** ***P*** **Significance** 17.043 0.004 HS HS: Highly significant Sex {#sec2-5} --- In the present study, 79.0% were female \[[Table 4](#T4){ref-type="table"}\]. It was observed that of 79 females, 4 cases were found to be moderately difficult, 2 cases were found to be difficult, and 1 case was found to be very difficult as per the criteria in this study. While in males, of 21 cases, 2 were found to be moderately difficult, 2 were found to be difficult, and 2 were found to be very difficult. ###### Sex distribution of patients Sex distribution Number of patients (%) ------------------ ------------------------ Male 21 (21.0) Female 79 (79.0) Total 100 (100) Previous attacks of cholecystitis {#sec2-6} --------------------------------- Twenty-four cases had a history of previous attacks of cholecystitis ranging from mild-to-moderate intensity lasting for 1--2 days. Eight patients were hospitalized and treated with parenteral medications for 2--3 days. On analyzing the data statistically \[[Table 5](#T5){ref-type="table"}\], of 24 cases who had previous attacks, 5 came out to be moderately difficult; whereas of 76 cases that never had any previous attack, one came out to be moderately difficult. ###### Previous attacks of cholecystitis Previous attacks Outcome, *n* (%) Total, *n* (%) ------------------ ------------------ ------------------ ---------- ---------- ---------- ---------- ----------- Yes 4 (5.6) 11 (78.6) 5 (83.3) 2 (50.0) 1 (33.3) 1 (50.0) 24 (24.0) No 67 (88.2) 3 (21.4) 1 (16.7) 2 (50.0) 2 (66.7) 1 (50.0) 76 (76.0) Total 71 (100) 14 (100) 6 (100) 4 (100) 3 (100) 2 (100) 100 (100) ***χ*^2^** ***P*** **Significance** 49.935 \<0.001 HS HS: Highly significant Deranged liver function tests {#sec2-7} ----------------------------- About 83.3% of the patients predicted as moderately difficult and 66.7% of the patients predicted as very difficult peroperatively had deranged liver function tests \[[Table 6](#T6){ref-type="table"}\]. ###### Deranged liver function tests Deranged LFT Outcome, *n* (%) Total, *n* (%) -------------- ------------------ ------------------ ---------- --------- ---------- --------- ----------- Yes 2 (2.8) 12 (85.7) 5 (83.3) 4 (100) 2 (66.7) 2 (100) 27 (27.0) No 69 (97.2) 2 (14.3) 1 (16.7) 0 (0.0) 1 (33.3) 0 (0.0) 73 (73.0) Total 71 (100) 14 (100) 6 (100) 4 (100) 3 (100) 2 (100) 100 (100) ***χ*^2^** ***P*** **Significance** 73.831 \<0.001 HS LFT: Liver function test, HS: Highly significant Ultrasonographic findings {#sec2-8} ------------------------- On analyzing the data statistically \[[Table 7](#T7){ref-type="table"}\], 25.0% of the patients predicted as difficult peroperatively and 66.7% of the patients predicted as very difficult peroperatively had contracted gallbladder on ultrasound and 25.0% of the patients predicted as difficult peroperatively and 33.3% of the patients predicted as very difficult peroperatively had distended gallbladder on ultrasound, whereas 85.9% of the patients predicted as easy preoperatively had normal gallbladder distension. On analyzing the data statistically \[[Table 8](#T8){ref-type="table"}\], 33.3% of the patients predicted as moderately difficult peroperatively had pericholecystic fluid on ultrasound and 66.7% of the patients predicted as moderately difficult peroperatively had no pericholecystic fluid on ultrasound. ###### Ultrasonographic findings Ultrasonographic findings Outcome, *n* (%) Total, *n* (%) --------------------------- ------------------ ------------------ ---------- ---------- ---------- ---------- ----------- Contracted 4 (5.6) 6 (42.9) 1 (16.7) 1 (25.0) 2 (66.7) 1 (50.0) 15 (15.0) Distended 6 (8.5) 7 (50.0) 4 (66.7) 1 (25.0) 1 (33.3) 0 (0.0) 19 (19.0) No 61 (85.9) 1 (7.1) 1 (16.7) 2 (50.0) 0 (0.0) 1 (50.0) 66 (66.0) Total 71 (100) 14 (100) 6 (100) 4 (100) 3 (100) 2 (100) 100 (100) ***χ*^2^** ***P*** **Significance** 53.880 \<0.001 HS HS: Highly significant ###### Pericholecystic fluid Pericholecystic fluid Outcome, *n* (%) Total, *n* (%) ----------------------- ------------------ ------------------ ---------- ---------- --------- --------- ----------- Yes 4 (5.6) 11 (78.6) 2 (33.3) 2 (50.0) 3 (100) 2 (100) 24 (24.0) No 67 (94.4) 3 (21.4) 4 (66.7) 2 (50.0) 0 (0.0) 0 (0.0) 76 (76.0) Total 71 (100) 14 (100) 6 (100) 4 (100) 3 (100) 2 (100) 100 (100) ***χ*^2^** ***P*** **Significance** 53.590 \<0.001 HS HS: Highly significant D[ISCUSSION]{.smallcaps} {#sec1-4} ======================== In the present study, 75% of patients were in the age group of 31--60 years and the mean age was 43.44 ± 1.13 years. This can be explained by the fact that the study was conducted on patients of symptomatic cholelithiasis undergoing LC, which is a disease of the middle age. On analyzing the age data statistically \[[Table 3](#T3){ref-type="table"}\], it was observed that the preoperative prediction was correct in 100.0% of cases predicted as easy in the age group of ≤65 years, whereas 25.0% of the cases were correctly predicted as difficult in the age group of \>65 years. It was observed that older age (\>65 years) was a significant risk factor for difficult LC (*P* = 0.004). The increase in difficulty with age has been reported by many authors. Kanaan *et al.*\[[@ref14]\] gave older male as one of the main factors of conversion of LC to open cholecystectomy. Our results were similar in comparison to the other studies by Kanaan *et al.*\[[@ref14]\] and Gabriel *et al.*\[[@ref15]\] with age \> 65 years being a significant risk factor. However, Gupta *et al.*\[[@ref16]\] and Fried *et al.*\[[@ref17]\] in their study had found that age was not a significant factor. In our study, 79.0% of the patients were female. This higher incidence in females can be attributed to the fact that cholelithiasis is more common in females. In analyzing the data, it was found that the preoperative prediction in females was correct in 88.7% of the cases predicted as easy, whereas in males, preoperative prediction for difficulty was correct for 50.0% of cases and for a very difficult challenge was correct for 66.7% of cases. Although cholelithiasis is more common in females, males had higher risks of having difficult LC due to more intense inflammation or fibrosis to result into a difficult dissection in the Calot\'s triangle and the gallbladder bed as was reported by Lein and Huang.\[[@ref7]\] We found that of 24 cases who had previous attacks, 5 came out to be moderately difficult. A significant correlation was seen between previous attacks of cholecystitis and some difficulties encountered during LC. Like the present study, many researchers such as Gabriel *et al.*,\[[@ref17]\] Gupta *et al.*\[[@ref16]\] and Nachnani and Supe\[[@ref18]\] had found that the history of the previous hospitalization was a predictor for difficult cholecystectomy and higher conversion rate due to dense fibrotic adhesions, bleeding, and ductal injuries. The deranged liver function tests and elevated serum amylase (ongoing cholangitis, hepatitis, and pancreatitis) were significant predictors for difficult LC (Chi-square = 73.831) and (*P* \< 0.001), due to difficult dissection because of edema, and this finding was in accordance with the study of Alponat *et al.*\[[@ref13]\] The USG findings such as contracted gallbladder, distended gallbladder, multiple stones, and pericholecystic collection were observed significant risk factors (Chi-square = 53.880), (*P* \< 0.001), because these factors caused significant difficulty in grasping of gallbladder, adhesiolysis as well as dissection of Calot\'s triangle and dissection of gallbladder from liver bed. These findings are consistent with observations of Singh and Ohri.\[[@ref19]\] C[ONCLUSIONS]{.smallcaps} {#sec1-5} ========================= LC has become the gold standard in the treatment of symptomatic gallstone disease. Elderly patients are more likely to have a difficult LC. Cholecystitis is more common in females, but difficulties are encountered more frequently while performing LC in males. Patients with recurrent cholecystitis tend to have more difficulties during surgery. Abnormal serum hepatic and pancreatic enzyme profiles are associated with difficulty in surgery. The preoperative USG can well predict difficulties during LC. Features like distended or contracted gallbladder are associated with subsequent difficulties during the surgery. LC though mostly safe and uneventful can be difficult at times. What an inexperienced laparoscopic surgeon may consider difficult, the experienced laparoscopic surgeon may consider that to be very simple. With increasing experience selection criteria for LC has become more liberal, it is being used in more and more earlier contraindicated situations. In these circumstances, a lot of problems can be avoided by correct preoperative prediction of difficult cholecystectomy. Financial support and sponsorship {#sec2-9} --------------------------------- Nil. Conflicts of interest {#sec2-10} --------------------- There are no conflicts of interest.
-7/2 ((-5)/10)/(3375/(-900)) 2/15 (932/(-4893))/(4*4/12) -1/7 What is 34/(((-2516)/(-518))/17)? 119 What is the value of 9/(-15)*(10/22)/(402/737)*-46? 23 What is ((1*(-1)/(-3))/((-1104)/(-2484)))/(168/(-288))? -9/7 (166/(-3))/((-98)/42*110/77)*5 83 Evaluate (5904/(-1312))/((-6)/172)*(-6)/(-18). 43 Evaluate (-32)/16*(-540)/(-324)*(-27)/10. 9 What is the value of (54/(10692/(-3069)))/(1/(-2))? 31 ((-1)/((-13)/22))/(222372/481806) 11/3 Calculate (((-5)/6)/(-5))/((-21890)/(-998184)). 38/5 What is (((-56)/224)/(1/36))/(3/2)*-9? 54 Evaluate (-402)/268*4*-3*(-2)/(-102). 6/17 What is 164/(-21402)*-58*(-297)/(-42)? 22/7 (-7)/(693/132)*((-4)/74)/(220/33) 2/185 (-108*70/(-14175))/(((-117)/(-90))/((-2)/(-8))) 4/39 What is the value of ((-1)/2)/(((-1)/2)/((-77)/7))? -11 ((1128/(-1034))/(2/(-77)))/(((-63)/12)/7) -56 What is the value of ((-820)/(-574))/((-385)/(-735))? 30/11 Evaluate (1/(-6))/(29*(-54)/(-98658)*7/(-10)). 15 Evaluate (-638)/(-44)*2/(-3)*3*-1. 29 Evaluate (-73)/(143664/128)*(-90)/120. 2/41 Evaluate -1*5/2*28/(-2940)*-63. -3/2 What is the value of ((-795)/(-689))/((144/(-12))/156)? -15 Calculate 7*5/(-15)*(-63)/105. 7/5 (70/7)/(116/(-290))*2/2 -25 (-265)/530*6/37 -3/37 (((-3485)/2788)/((-30)/(-32)))/(3/((-441)/4)) 49 (-10)/14*80360/(-3357900) 2/117 3/(((-42315)/4420)/(-217)) 68 ((-1)/(-26))/((-894)/10728) -6/13 What is (-45)/(-378)*(18/21)/((-71)/(-994))? 10/7 (((48/(-15))/(-16))/((-4)/10))/((-13)/1274) 49 What is 27/675*(-4)/((-20)/125)*(-10)/(-72)? 5/36 What is the value of (15/(-18)*60/(-25))/((12/(-33))/(-4))? 22 (-8404)/573*3078/(-627) 72 Calculate 16296/(-19012)*-14*(-22)/4. -66 Calculate ((-3250)/520)/((-10)/(-4))*30/(-3). 25 What is the value of ((-104)/((-14976)/216))/((40/28)/((-20)/(-385)))? 3/55 Evaluate ((-370)/(-1776))/(14/2744*-35). -7/6 Evaluate 1029/882*(-1890)/(-245). 9 Calculate (16/(-196))/(((-540)/(-54))/140). -8/7 Evaluate ((-13)/117*9)/(14/224). -16 Calculate (-11*8/40)/(931/60515). -143 What is the value of (-17)/((-357)/(-280))*(-2388)/398? 80 What is (27*(-945)/(-14580))/(1/(-4)*-14)? 1/2 Evaluate (((-88)/40)/(-11))/(161/34615). 43 (0*38/1748)/17 0 Evaluate ((-68)/(-5))/(1333/(-6665)). -68 What is (3/69)/((-8)/264*-11)? 3/23 Evaluate (((-281010)/(-456))/493)/((75/(-12))/5). -1 What is (3321/(-54))/(((-270)/(-84))/15*7)? -41 Evaluate (248/25575)/((-181)/(-4525)). 8/33 Evaluate 6740/3707*(-3)/(-4). 15/11 Calculate (3675/(-750)*3/((-126)/15))/((-6)/3). -7/8 What is (-15)/(-1105)*(-91)/7? -3/17 What is the value of (4655/11970)/((-84)/(-81))*20/(-18)? -5/12 What is the value of 1*((-160)/416)/(-5)*-1*3? -3/13 Evaluate ((-6)/2*((-234)/22923)/(-13))/((-90)/(-270)). -2/283 What is (-2)/(-26)*9*611/(-846)*2/25? -1/25 Calculate (-27)/(-72)*-10*416/(-240). 13/2 Evaluate (-183)/(193248/(-192))*418. 76 Evaluate ((28/(-35))/(2/5))/((-1661)/6644). 8 What is the value of (-12)/(55/((-8525)/30))*9/(-6)? -93 Evaluate 5/(-520)*13767/706. -3/16 What is the value of 10*6/4*97/(4365/228)? 76 What is (-41101)/493212*2*2*2? -2/3 Evaluate 58/((-2436)/315)*(-14)/(-12). -35/4 14*(-76)/1938*34*((-351)/(-24))/3 -91 Evaluate 24075/(-30)*(-112)/140*4/(-72)*3. -107 Evaluate (6/(144/(-88)))/((-29)/(-261)). -33 (-53703)/9477*63/51 -7 Calculate (((-162)/5)/3)/(64980/541500). -90 (((-528)/11)/12)/1*136/17 -32 Evaluate ((240/18)/4)/(((-8)/(-78))/((-760)/190)). -130 What is (-11*24/(-550))/(12/(-135))? -27/5 What is 16/(-2)*((-15)/4*(-76)/190)/(-75)? 4/25 Evaluate (-37*11502/(-39405))/((4/(-30))/(-1)). 81 Evaluate 51*-3*(-4)/12*(-11)/(-11). 51 Evaluate ((-289)/5780*2*-12)/((-6)/200). -40 What is the value of (-3582)/(-199)*-2*(-2)/(-64)? -9/8 Evaluate (152/(34352/(-1017)))/(4/(2368/(-36))). 74 What is the value of (3/7)/(180/5670)*-2? -27 What is 2295/918*(-16)/(-40)*-24? -24 What is the value of -46*(-134)/562465*2*15/(-12)? -2/73 What is (-25)/(150/4)*(-2736)/(-128)*-4? 57 -41*(-938)/(-19229)*2/(-4)*-97 -97 8/((-32)/30)*3600/(-1000) 27 (4/(4/(-1)))/(430/13416*8/10) -39 What is the value of ((-525)/84)/(-1*4/16)? 25 What is (-690)/23*352/(-264)? 40 Evaluate ((-16)/(-2))/(-88)*561/(-51). 1 What is ((-15)/27)/((-2*22/88)/((-9)/(-30)))? 1/3 (((-1220)/480)/(-61))/(174/(-1856)) -4/9 Evaluate 14/(-16)*(-60636)/601307. 3/34 Calculate 15275/(-130)*19/190*-2. 47/2 What is the value of 23/(-3)*31806/(-6417)? 38 Evaluate 15144/(-251769)*2/16*-14. 2/19 (-1668)/(-7367)*1/(-6) -2/53 Evaluate (856/18)/(28944/65124). 107 6/(-705)*((-12555)/(-54))/(-31) 3/47 Evaluate (-135)/(-9720)*-90*(-8)/(2/(-2)). -10 What is ((-6230)/3738)/((-20)/(-564))? -47 Evaluate 8338/1516*16/308. 2/7 Calculate ((-13)/4)/((-1079)/166)*-16*4. -32 What is (-6)/8*11/66*6*272172/(-1839)? 111 (3204/587400)/(6/25) 1/44 Evaluate ((-4)/(-3)*(-48)/32)/((-17934)/(-854)). -2/21 Evaluate (-176)/(-264)*((-3)/7)/((-14)/(1568/1328)). 2/83 What is the value of (32422/(-203))/43*168/16? -39 What is the value of ((3/(-8))/(2/(72/(-9))))/(114/(-1292))? -17 Calculate 4/(-5*136/340). -2 ((-6)/(96/40))/(-54*(-40)/11880) -55/4 Calculate 6/2*-3*84*25/53550. -6/17 Calculate ((-46)/(-115))/((-4)/(-6)*324/30). 1/18 Evaluate (-71)/(-213)*270/(-12)*2. -15 Calculate -1*(1368/135)/76*-690. 92 Evaluate 2691/(-966)*7*8/(-26). 6 Evaluate ((1/2)/(-1))/((-10)/(-240))*357/102. -42 14801/722*(-5)/(100/8) -41/5 What is the value of 5/(-3)*(-5937)/19790? 1/2 What is 198/(-49665)*-5*91/(-39)? -2/43 Calculate (26/12)/13*(-1)/(2/28*-14). 1/6 Evaluate (12/24)/(15/(-3))*576/16. -18/5 What is the value of 136/(-2448)*9*(-1)/((-1)/44)? -22 What is the value of 6/(((28*5/15)/2)/((-4)/12))? -3/7 (-5*20/(-25))/((-164)/24)*(-5)/(-20) -6/41 (((-60)/(-10))/(-42))/((-3496)/(-2576)) -2/19 What is the value of (6/(-200))/(68/(-43860)*-129)? -3/20 17*440/(-15)*918/(-6936) 66 Calculate (((-6)/5)/(88/110))/(25/750). -45 1/2*-2*244/(-244)*30/(-3) -10 What is (-3)/(-135)*30*9/132*-6? -3/11 Calculate 7/((-665)/1520)*15/4. -60 What is ((-829)/(-32331))/((-3)/26)? -2/9 Evaluate (-180)/(-35)*(-2723)/(-3501). 4 Calculate (-10*1)/(((-1185)/12087)/(4/12)). 34 (4/4)/(2/(-10))*(-2)/(-12) -5/6 What is (((-180)/2241)/(-20))/((-8)/(-12))*-4? -2/83 Evaluate (-50)/(-70)*(-889)/(-16510). 1/26 What is the value of (80/(-130))/((-2156)/15288)? 48/11 What is the value of ((-28535)/(-210))/(-439)*8/(-52)? 1/21 What is the value of (420/20)/126*((-448)/12)/(-4)? 14/9 What is 127/9906*-195*(-296)/(-10)? -74 What is ((-1)/(-9))/(97/((-2720268)/38))? -82 5*(-15)/((-165)/33)*-5 -75 Evaluate -17*(-85)/(99705/1656). 24 What is the value of (8/(-30)*5/1)/(45*(-136)/(-110160))? -24 Calculate (12/1)/6*-119*8/(-56). 34 (392/840)/(406/464) 8/15 Calculate (((-405)/1050)/(-3)*7)/(4/(-24)). -27/5 Evaluate 6885/1360*(2/24*2)/(352/(-1408)). -27/8 Evaluate (3/162*3)/(-10*7/(-420)). 1/3 What is (16/4)/((-18)/210*448/384)? -40 (2067/(-3445))/(((-256)/(-60))/8) -9/8 Calculate -18*(-6)/(-195)*860/258*1. -24/13 Evaluate (-30)/5*126/18. -42 What is the value of ((-14)/(-34))/(42770/(-1090635))? -21/2 Evaluate 16*(6*9/12)/8. 9 What is the value of (-182)/((-168)/(-12))*15/((-33150)/20)? 2/17 What is ((-1)/50)/(312/780*(-5)/(-24))? -6/25 Calculate (-6180)/(-139050)*45/(-8). -1/4 8/(-10)*(-9)/414*-46 -4/5 Evaluate (-21)/(84/(-8))*(-41)/14*938/(-134). 41 Evaluate (-2)/((-96)/(-225))*20/(-25). 15/4 Calculate (27/3)/(-3)*53*(-128)/172992. 2/17 What is the value of (-14)/((-1512)/(-81))*20? -15 (3/(-6)*-1)/(((-55)/65)/((-252)/(-1092))) -3/22 15861/232628*(-220)/(-195) 1/13 Evaluate -72*(-16)/320*135/(-18). -27 What is 4/((250/175)/(-8*(-4)/(-56)))? -8/5 ((-8721)/(-58140))/((-6)/32) -4/5 Evaluate (6*(-1364)/8928)/((-1)/((-8)/2)). -11/3 Evaluate 8/(-3920)*5*(3/(12/16))/(-1). 2/49 What is (-2016)/(-720)*(-750)/(-350)? 6 What is (-13)/975*-10*15*(700/110)/(-14)? -10/11 What is the value of (((-225)/20)/(-9))/(-7*37/1036)? -5 What is the value of ((-19)/(-57))/((-2)/20*-3*403/1116)? 40/13 5460/(-455)*6/8 -9 Evaluate 67/((-758574)/370)*12/(-10). 2/51 What is the value of (6/(-41))/2*(-77)/(-44)*(-24)/63? 2/41 What is the value of ((-6)/(-63))/(45/(-420))*666/(-37)? 16 What is 15/((-27)/(-48)*(1840/60)/(-23))? -20 Calculate (27*42/(-315))/((220/(-25))/2). 9/11 What is 3/(-75*(-56)/40600)? 29 Evaluate (((-13804)/(-102))/(-29))/((-3)/(27/1)). 42 Evaluate ((-574002)/(-1115))/(-66)*(-25)/3. 65 Evaluate ((-3
After Donald Trump's shocking meltdown on Tuesday afternoon, it's even clearer that progressives need effective strategies to blunt the effect of having a conspiracy-theory-driven, racist authoritarian in the Oval Office, backed by a congressional majority that is still too afraid to offer meaningful checks on his worst behavior. The good news is that some of the nation's biggest cities and states remain controlled by Democrats. Activists and politicians in those states are looking for meaningful ways to throw wrenches in the Trump agenda. At the top of that list is California, which not only has the largest population of any state but is controlled by progressive Democrats (relatively speaking) who seem ready and eager to fight Trump, especially on the issues of climate change and immigration. (New York is the next biggest state controlled by Democrats, but intra-party warfare has crippled the ability of progressives to get much done.) Advertisement: California fired a significant shot across the bow at Trump on Monday, when state Attorney General Xavier Becerra declared that the state would sue the Trump administration over threats to withdraw law enforcement grants if the local and state police refuse to cooperate with federal efforts to deport immigrants. The lawsuit will be joined with an earlier one filed by the city of San Francisco. "It’s a low blow to our men and women who wear the badge, for the federal government to threaten their crime-fighting resources in order to force them to do the work of the federal government when it comes to immigration enforcement," Becerra said during a press conference announcing the suit. California received $28 million in law enforcement grants from the federal government this year, money it could lose if the police prioritize actual crime-fighting over federal demands that they focus their resources on deporting people. “The government’s plan for deporting millions of people in this country is to coerce local law enforcement to be their force-multipliers," explained Jennie Pasquarella, director of immigrants' rights for the ACLU of California. Advertisement: Pasquarella noted that most deportations currently occur because of an encounter with local law enforcement. By resisting pressure to step up efforts to persecute undocumented immigrants, she said, California can make it safe for people to "access basic services that are vital to our state and communities without fear of deportation, like schools and hospitals and libraries and health clinics.” Some Democrats in the state are trying to take this idea even further, backing SB 54, titled the California Values Act. According to The Los Angeles Times, the bill would prohibit "state and local law enforcement agencies, including school police and security departments, from using resources to investigate, interrogate, detain, detect or arrest people for immigration enforcement purposes." While SB 54 is still being worked over in the legislature, California has already made progress in resisting the Trump administration's efforts to repeal Obama-era actions to fight climate change. In July, Gov. Jerry Brown signed a bill extending a cap-and-trade program to reduce carbon emissions until 2030. The bill passed by a two-thirds majority in both the State Assembly and Senate. Advertisement: Many environmentalist groups have come out against the bill, arguing that it doesn't go far enough. Still, compared to the federal government's evident retreat, it's progress in the right direction. California has the largest state economy in the country, and demonstrating that climate action does not have to undermine economic growth could go a long way towards convincing other states to take similar action. This, in turn, could help the country meet the goals set by the Paris Accords, defying Trump's efforts to pull the United States out of the historic climate change agreement. This strategy to resist right-wing policies and protect California residents predates Trump, to be clear. While much of the country was experiencing an unprecedented rollback of reproductive rights — with numerous red states passing alarming new abortion restrictions while anti-choice activists fought insurance coverage of contraception in the courts — California moved to make birth control and abortion easier and safer to get. Advertisement: In 2013, responding to research showing that abortions provided by nurse practitioners and midwives are safe, Brown signed a law giving those groups authority to offer abortion services. Brown has also signed off on three provisions to make it easier for women to get birth control: Letting pharmacists dispense it without a doctor's prescription, requiring that health care plans cover contraception without a co-pay, and allowing women to get a full year's worth of birth-control pills at a time. These policies were already in place before Trump's election, but they are all the more necessary now that the president is backing conservative efforts to make contraception more expensive and harder to get. It has also helped create a model for progressive cities and states to resist reactionary policies pushed by the federal government, which is already inspiring Democrats in other states. Chicago, for instance, is also suing the federal government over the threat to sanctuary cities. There's a deep philosophical irony here, because for decades now conservatives have claimed they wanted to reduce the power of the federal government and hand more decision-making authority to the states. That was always a disingenuous pose, of course. This conservative "principle" was largely invented to justify state resistance to Supreme Court decisions and federal legislation legalizing abortion, desegregating schools and protecting voting rights. Advertisement: Still, it's nice to see states like California calling the Republican bluff and showing that their supposed devotion to "small government" dries up the second states and cities move to protect human rights, instead of to attack them. Trump's attorney general, Jeff Sessions, has always held himself out to be a small-government conservative, for instance. But his reaction to state and local officials who claim the power to set law enforcement priorities for themselves has been to accuse those officials of being law-breakers. This hypocrisy is already obvious, and it may soon be exposed in court.
g 1 y, 1 t, and 1 r when three letters picked without replacement from {b: 1, r: 2, y: 1, p: 2, t: 2}. 1/14 Two letters picked without replacement from {l: 3, c: 1, k: 2, s: 3, g: 1, h: 2}. Give prob of picking 2 s. 1/22 Calculate prob of picking 1 d and 3 e when four letters picked without replacement from {j: 3, e: 6, g: 7, d: 1, y: 2}. 5/969 Two letters picked without replacement from {u: 1, q: 1, m: 1, z: 2, g: 1, l: 2}. What is prob of picking 2 z? 1/28 What is prob of picking 1 c and 3 t when four letters picked without replacement from {t: 2, c: 2, b: 1}? 0 What is prob of picking 1 v and 1 m when two letters picked without replacement from vmvmmv? 3/5 Four letters picked without replacement from yoyyvoyoyvyyoy. What is prob of picking 1 v and 3 y? 16/143 What is prob of picking 1 c and 1 e when two letters picked without replacement from leelceeejllee? 7/78 Two letters picked without replacement from rneenrmreeeneferm. Give prob of picking 1 n and 1 r. 3/34 Calculate prob of picking 4 h when four letters picked without replacement from {d: 1, z: 8, h: 4}. 1/715 What is prob of picking 2 o, 1 h, and 1 f when four letters picked without replacement from hhohohooohhhhohhfhh? 15/323 Two letters picked without replacement from {q: 2, o: 1, h: 1, d: 1, p: 2, y: 1}. Give prob of picking 1 d and 1 q. 1/14 What is prob of picking 1 j and 1 x when two letters picked without replacement from {j: 9, x: 4, f: 2, k: 2, v: 2, e: 1}? 18/95 What is prob of picking 1 d, 1 y, and 1 f when three letters picked without replacement from {f: 4, b: 5, d: 5, y: 6}? 2/19 Two letters picked without replacement from {a: 1, x: 1, c: 1, s: 2, m: 1, n: 1}. What is prob of picking 1 s and 1 x? 2/21 What is prob of picking 2 e when two letters picked without replacement from {x: 2, u: 1, m: 6, e: 2}? 1/55 Calculate prob of picking 3 m and 1 q when four letters picked without replacement from {q: 2, f: 3, m: 3, i: 1, b: 1}. 1/105 Three letters picked without replacement from cqgccqgqccqcc. What is prob of picking 3 q? 2/143 Four letters picked without replacement from {b: 4, p: 3, l: 4, k: 1, e: 2, m: 1}. Give prob of picking 2 p, 1 e, and 1 m. 2/455 What is prob of picking 2 z when two letters picked without replacement from ugzegiggzzgg? 1/22 Calculate prob of picking 1 z and 1 s when two letters picked without replacement from ooozoosssssoos. 6/91 Four letters picked without replacement from {l: 8, c: 5}. Give prob of picking 3 l and 1 c. 56/143 What is prob of picking 3 c when three letters picked without replacement from cccpcccpc? 5/12 Three letters picked without replacement from {o: 2, n: 4, t: 2, l: 8}. What is prob of picking 1 o, 1 l, and 1 t? 2/35 What is prob of picking 2 h when two letters picked without replacement from {h: 9, k: 3}? 6/11 Calculate prob of picking 2 x when two letters picked without replacement from xxhdhxxxhdxdhhh. 1/7 Three letters picked without replacement from {v: 5, w: 1, k: 1, l: 4}. What is prob of picking 1 l and 2 v? 8/33 Calculate prob of picking 1 o and 1 n when two letters picked without replacement from nnnnnnonnnon. 10/33 Calculate prob of picking 1 z and 2 n when three letters picked without replacement from {n: 3, z: 12}. 36/455 Calculate prob of picking 3 t and 1 y when four letters picked without replacement from {t: 5, y: 2}. 4/7 Two letters picked without replacement from {a: 1, h: 2, q: 1, y: 2}. Give prob of picking 1 h and 1 y. 4/15 Two letters picked without replacement from {q: 1, i: 2, d: 1, t: 1}. What is prob of picking 1 d and 1 i? 1/5 Four letters picked without replacement from {e: 10, d: 2, v: 5, n: 3}. Give prob of picking 1 e and 3 v. 20/969 Four letters picked without replacement from myymmjyytytt. What is prob of picking 1 m, 1 j, 1 t, and 1 y? 1/11 What is prob of picking 3 k and 1 r when four letters picked without replacement from kvlrlkkvwkvq? 4/495 Two letters picked without replacement from xlmxxxllxxxxxxx. What is prob of picking 2 l? 1/35 What is prob of picking 3 b when three letters picked without replacement from bvbvvbbyvybybvbbv? 7/85 Calculate prob of picking 1 y and 1 g when two letters picked without replacement from {g: 7, y: 1}. 1/4 Calculate prob of picking 1 y and 1 x when two letters picked without replacement from yudux. 1/10 Three letters picked without replacement from {u: 1, d: 3, a: 5, p: 3, l: 1, x: 1}. Give prob of picking 1 d, 1 p, and 1 x. 9/364 Two letters picked without replacement from {e: 3, q: 2, d: 5, j: 7}. What is prob of picking 1 d and 1 e? 15/136 Calculate prob of picking 2 t and 1 i when three letters picked without replacement from {i: 3, t: 13, p: 2}. 39/136 Calculate prob of picking 3 c when three letters picked without replacement from cdcdccdcdccdcccccccc. 91/228 Two letters picked without replacement from lllllrxlxlllllrlllrl. What is prob of picking 2 x? 1/190 Three letters picked without replacement from bsqsohqoobhsqhqo. What is prob of picking 2 b and 1 q? 1/140 What is prob of picking 1 e and 1 j when two letters picked without replacement from mewjmja? 2/21 Four letters picked without replacement from lllnsssnnsslllslsn. What is prob of picking 2 n and 2 l? 7/170 Calculate prob of picking 2 e and 1 c when three letters picked without replacement from qqceeeqe. 3/28 Three letters picked without replacement from {w: 1, l: 1, n: 8, v: 1, x: 9}. What is prob of picking 3 n? 14/285 Three letters picked without replacement from wnqwoxi. What is prob of picking 1 n, 1 q, and 1 w? 2/35 Two letters picked without replacement from {d: 1, w: 2, a: 1, l: 1, c: 2}. Give prob of picking 2 c. 1/21 What is prob of picking 2 q and 1 s when three letters picked without replacement from awaqqwiiiqqiqwiqsa? 5/272 Four letters picked without replacement from {q: 5, k: 4, f: 1}. What is prob of picking 4 f? 0 What is prob of picking 2 v when two letters picked without replacement from {t: 4, u: 3, m: 3, v: 3}? 1/26 What is prob of picking 2 r and 1 s when three letters picked without replacement from {s: 1, t: 2, r: 1}? 0 What is prob of picking 1 t, 1 q, and 1 o when three letters picked without replacement from {s: 7, a: 5, j: 2, o: 1, q: 1, t: 1}? 1/680 What is prob of picking 2 v and 1 c when three letters picked without replacement from cupvuvmuvmv? 2/55 Three letters picked without replacement from {y: 1, q: 2, b: 11, t: 1, u: 5}. What is prob of picking 2 q and 1 b? 11/1140 Three letters picked without replacement from ccpppppppcppppp. What is prob of picking 1 p and 2 c? 36/455 Calculate prob of picking 2 b when two letters picked without replacement from {b: 3}. 1 Four letters picked without replacement from {m: 2, h: 18}. What is prob of picking 1 m and 3 h? 32/95 Four letters picked without replacement from {h: 14, p: 4}. What is prob of picking 4 p? 1/3060 What is prob of picking 3 r when three letters picked without replacement from rqqqrqqrqqqq? 1/220 What is prob of picking 1 n, 2 b, and 1 m when four letters picked without replacement from bgbnbggbnbmbbbgjnb? 3/85 What is prob of picking 1 c and 1 d when two letters picked without replacement from {d: 1, c: 3, j: 2, v: 1}? 1/7 Three letters picked without replacement from {a: 1, q: 2, x: 2}. What is prob of picking 2 x and 1 a? 1/10 Calculate prob of picking 1 f, 1 u, and 1 v when three letters picked without replacement from {v: 6, h: 3, u: 3, f: 1, j: 2}. 18/455 Calculate prob of picking 2 e when two letters picked without replacement from {z: 3, e: 5}. 5/14 Calculate prob of picking 3 c when three letters picked without replacement from cobfoeocfhc. 1/165 Calculate prob of picking 1 w and 1 h when two letters picked without replacement from wwha. 1/3 Calculate prob of picking 3 n when three letters picked without replacement from {b: 4, n: 6}. 1/6 What is prob of picking 2 z when two letters picked without replacement from {n: 10, z: 1, f: 1, b: 2}? 0 What is prob of picking 3 i and 1 z when four letters picked without replacement from izizzii? 12/35 Two letters picked without replacement from mwmwwwwwxfwwwfww. Give prob of picking 1 x and 1 w. 11/120 Calculate prob of picking 1 r and 2 w when three letters picked without replacement from wwkrwrkrrrrkr. 21/286 Two letters picked without replaceme
Accelerated clearance of intravenously administered theophylline and phenobarbital by oral doses of activated charcoal in rats. A possibility of the intestinal dialysis. The effect of oral administration of activated charcoal on the clearance of theophylline and phenobarbital following their intravenous administration was studied in rats. Oral administration of multiple doses of activated charcoal significantly decreased the serum half-life and AUC (area under the curve) and increased the total body clearance of both theophylline and phenobarbital as compared with their respective controls. The volume of distribution was not significantly different between treatments. A single dose of activated charcoal showed only a slight enhancement of clearance of theophylline. Accelerated clearance of both drugs by oral activated charcoal was rationalized in terms of adsorption of exsorbed drugs and inhibition of their reabsorption by activated charcoal in the gastrointestinal tract.
Is it too late to make fanart based on this crossover episode?Uuh whatever, there is allways a good reason to draw Lady Legasus.For the crossover itself, I actually quiet enjoyed it. Yes the story was quiet generic and certainly waaaaaayyy to short, but damn the nostalgia train hit hart on that one and certainly had some fun moments ^^Still I think if they had a bit more time, Legasus probably would have made a cameo, but hey, at least they acknowledged her strong legs.
A federal judge says the former president of the truck stop chain Pilot Flying J disparaged black people, women and the city of Cleveland in secret recordings that have been kept under seal in his fraud trial. The Knoxville News Sentinel reports U.S. District Judge Curtis Collier said Thursday that Mark Hazelwood used "vile, despicable, inflammatory racial epithets," and disparaged Cleveland and its football team. Pilot Flying J is controlled by the family of Cleveland Browns owner Jimmy Haslam and Tennessee Gov. Bill Haslam. The company issued a statement calling the behavior in the recordings "not acceptable, tolerated or reflective" of its values. Collier has recessed the trial of the chain's former executives and sales representatives until January. Pilot Flying J CEO Jimmy Haslam has not been charged with any wrongdoing. Update: Dec. 6, 2017 A federal judge is setting a monthlong break in the fraud trial of former executives and sales representatives at the truck stop chain controlled by the family of Cleveland Browns owner Jimmy Haslam and Tennessee Gov. Bill Haslam. The Knoxville News Sentinel reports U.S. District Judge Curtis Collier announced that after Thursday's proceedings, the trial will be put on hold until Jan. 8. Jimmy Haslam, the CEO of Pilot Flying J, has not been charged with any wrongdoing and has said he had no prior knowledge of the fraud scheme before federal agents raided on the company's headquarters in 2013. Fourteen members of the Pilot sales department have pleaded guilty, and the company has paid an $85 million settlement to scammed customers and a $92 million penalty to the government. Update: Nov. 15, 2017 A former truck stop company executive boasted in a secretly recorded conversation that Cleveland Browns owner Jimmy Haslam "loved it" when the sales team ripped off customers. The Knoxville News Sentinel reports the jury in the federal fraud trial of former Pilot Flying J executives and sales representatives heard a recording of former vice president John "Stick" Freeman saying Haslam was aware of the scheme to deprive trucking customers of the diesel discounts they had negotiated. In Freeman's words: "He knew - absolutely." Pilot, which is controlled by the Haslam family, issued a statement reiterating that "Jimmy Haslam was not aware of any wrongdoing." Haslam hasn't been charged in the investigation that has resulted in 14 guilty pleas among former Pilot employees. Four others are on trial in Chattanooga. The trial was in session Monday and Tuesday, but is on hold until next week. Testimony will resume Monday. Update: Nov. 10, 2017 The fraud trial of former executives and sales representatives at the truck stop chain run by Cleveland Browns owner Jimmy Haslam is wrapping up its first week. The attorney for the company's onetime president has signaled the relationship between Haslam and one of the chief conspirators will become a focus of the defense. The Knoxville News Sentinel reports that the lawyer for former Pilot Flying J President Mark Hazelwood raised the issue Thursday in the cross-examination of a former director. The ex-director is one of 14 executives and sales representatives who have pleaded guilty in the case. Haslam has denied any prior knowledge about the scheme to defraud unsophisticated trucking company customers and has not been charged in the case. Hazelwood and three others are on trial in Chattanooga, Tennessee. Update: Nov. 7, 2017 Attorneys for two former executives at the Pilot Flying J truck stop chain say their clients shouldn't be found guilty by association with 14 members of the company's sales team who pleaded guilty in a scheme to defraud customers through diesel fuel rebates. Former Pilot President Mark Hazelwood, former vice president Scott "Scooter" Wombold and two former saleswomen, Heather Jones and Karen Mann, entered their second day of trial Tuesday. Federal prosecutors say some of their colleagues will testify against them. The rebate scam caused Pilot to pay an $85 million settlement and a $92 million penalty. The company is controlled by the family of Cleveland Browns owner Jimmy Haslam and Tennessee Gov. Bill Haslam, who have denied any prior knowledge of the scheme and have not been charged. Original story: Nov. 6, 2017 Federal prosecutors have outlined their case against former executives at Pilot Flying J as the result of an "infection of fraud" within the sales department of the truck stop chain controlled by the family of Cleveland Browns owner Jimmy Haslam and Tennessee Gov. Bill Haslam. Assistant U.S. Attorney David Lewen told jurors on Monday that the four defendants participated in a widespread scheme to undercut competitors, boost company profits and reap the rewards in terms of personal compensation. Lewen said several of 14 former Pilot colleagues who have already pleaded guilty in the investigation will be called to testify, though he warned jurors that their role in the scheme to rip off unsuspecting trucking company customers may give them pause. In Lewen's words: "There are no swans in the sewer." The trial comes after a 2013 raid by federal agents on the Knoxville headquarters of privately held Pilot Flying J. Fourteen former members of the sales team pleaded guilty to participating in a scheme to rip off trucking company customers they deemed too unsophisticated to realize they weren't receiving the rebates they had negotiated. The company's former president is among those facing trial Monday.
Q: Height of water layer on flat surface Let's consider some flat surface which extends to infinity in all directions. Suppose we slowly spill some water near some point of the surface. Due to surface tension, the water doesn't spread out indefinitely. If done properly, the water will spread essentially uniformly over a section of the surface, and within this section there won't be any "holes" where the surface isn't covered by water. If we add some more water, the water will redistrubte itself to maintain a nearly constant height $h$. Furthermore experimentally it seems that $h$ doesn't depend on the amount of water spilled. Is this true, and how might we calculate the height of the water layer? A: I believe this is a standard question in undergraduate physics. The height of the puddle on a flat smooth hydrophobic surface will be given by the following equation: $h= \sqrt{\frac{2 \gamma (1- cos( \theta)}{g \rho}}$, where $\rho$ is the density of the liquid, $\gamma$ is the surface tension of the liquid, and $\theta$ is the contact angle, that ranges from $\frac{\pi}{2}$ to $\pi$. For a formal derivation see : Pierre-Gilles de Gennes; Françoise Brochard-Wyart; David Quéré (2002). Capillarity and Wetting Phenomena—Drops, Bubbles, Pearls, Waves. Alex Reisinger. Springer. ISBN 978-0-387-00592-8. EDIT: As I defined above, $\theta$ is within that range for hydrophobic surface. If the surface is hydrophillic, $\theta$ will be less than $\frac{\pi}{2}$. You can take these angles as the definition of hydrophobic/hydrophillic surfaces.
Manea Senior College Year 12 student Chloe Barber is kicking some major goals in life at the moment, having been reserved a place at UWA and being selected into the Department of Human Service’s Indigenous Apprenticeship Program. Her place at UWA was reserved via the school of Indigenous Studies after attending the UWA Year 12 Leadership Seminar for Aboriginal students earlier this year. In May this year she applied for the Indigenous Apprenticeship program with the Department of Human Services and was selected as one of the 250 successful applicants out of more than 2400. Not only is Barber studying Year 12, but she is also completing two VET qualifications on top her school studies as well as working two casual jobs. The secret is organisation. “I’m quite an organised person and committed to everything I do,” she said. “I just find time each day to get every single thing done while of course keeping an eye on my wellbeing — there is always time in the day. “I’m passionate about what I do and that definitely makes things a lot easier.” All of this commitment and passion will be put to good use in 2019 when Barber will be both studying and working full time, with her sights firmly set on a career in advanced medicine. “I really want to get into something like neurosurgery or cardiothoracic surgery — something that effects a lot of people and to be the person to make a big medical breakthrough.”
346 So.2d 816 (1977) Rose J. HENDERSON v. TRAVELERS INSURANCE COMPANY et al. No. 11284. Court of Appeal of Louisiana, First Circuit. May 9, 1977. Rehearing Denied June 13, 1977. John G. Fontenot, Eunice, for plaintiff Rose J. Henderson, appellant. Don L. Broussard, Lafayette, for defendant Travelers Ins. Co., et al., appellee. Before SARTAIN, COVINGTON and LOTTINGER, JJ. LOTTINGER, Judge. Plaintiff-appellant, Rose J. Henderson, has filed this appeal from the judgment of *817 the Trial Court dismissing her suit for workmen's compensation benefits, and judgment against her on defendant's reconventional demand to return certain workmen's compensation benefits paid in the amount of $9,655.85. George E. Henderson, decedent, was employed by Fred A. Settoon, doing business as Settoon Oil Field Contracting Company, as a heavy equipment operator. On November 30, 1971, while in the course and scope of his employment, he received injuries to his skull and as a result thereof died on December 7, 1971. Decedent was making approximately $450.00 per week at the time of the accident, and plaintiff sued for workmen's compensation benefits of $49.00 per week for 400 weeks under LSA-R.S. 23:1232, Section 1 and alternatively under Section 8, subject to a credit for benefits previously paid to her. At the time of decedent's injury and death, plaintiff was not legally married to him but they had lived together as though man and wife in excess of eleven years. Plaintiff had raised her children by a legal marriage in decedent's home; decedent had supported plaintiff and her children; plaintiff was totally dependent on decedent for support. LSA-R.S. 23:1232, in part provides: "Payment to dependents shall be computed and divided among them on the following basis: (1) If the widow or widower alone, thirty-two and one-half per centum of wages. * * * * * * (8) If there are neither widow, widower, nor child, nor dependent parent entitled to compensation, then to one brother or sister, thirty-two and one-half per centum of wages with eleven per centum additional for each brother or sister in excess of one. If other dependents than those enumerated, thirty-two and one-half per centum of wages for one, and eleven per centum additional for each such dependent in excess of one, subject to a maximum of sixty-five per centum of wages for all, regardless of the number of dependents." Plaintiff's first argument is that she should be decedent's "widow" under LSA-R.S. 23:1232(1) and allowed to recover just as though she were legally married to the decedent at the time of his injury and death. As a basis for her argument, plaintiff cites Levy v. Louisiana, 391 U.S. 68, 88 S.Ct. 1509, 20 L.Ed.2d 436 (1968) and Glona v. American Guaranty & Liability Insurance Co., 391 U.S. 73, 88 S.Ct. 1515, 20 L.Ed.2d 441 (1968). The Levy case held that under LSA-C.C. art. 2315, illegitimate children could recover for the loss of their mother. The Glona case held that under Louisiana law a mother could recover for the death of her illegitimate son. We note that in the case of Labine v. Vincent, 401 U.S. 532, 91 S.Ct. 1017, 28 L.Ed.2d 288 (1971), the U.S. Supreme Court declined to extend the holdings in Levy and Glona to Louisiana's statutory scheme for intestate succession. It is also important to note that Levy and Glona both dealt with illegitimate children, who even though illegitimate were still biological children of the person killed or the plaintiff in the case. Since Louisiana does not recognize common law marriage, there is no way plaintiff herein can be anything but a concubine. Since she is not a wife, likewise she is not a widow under LSA-R.S. 23:1232(1). We now turn to plaintiff's alternative argument that LSA-R.S. 23:1232(8) is authority for allowing plaintiff recovery. The evidence is clear that plaintiff was dependent on decedent for the entirety of her support, and that no one else was a dependent of decedent. Since decedent left neither widow, widower, child, dependent parent, and dependent brother or sister, we now consider whether plaintiff can come under the category of "other dependents" of LSA-R.S. 23:1232(8). In connection with this it is necessary to consider the second sentence of LSA-R.S. 23:1253 which reads: "No person shall be considered a dependent, unless he is a member of the family of the deceased employee, or bearing to him the relation of husband or widow, or a lineal descendant or ascendant, or brother or sister, or child." *818 The Louisiana Supreme Court has given a broad interpretation to the requirement that the claimant be "a member of the family of the deceased employee" in the factual situations it has considered except for the situation presently before us. In Archibald v. Employers' Liability Assurance Corp., 202 La. 89, 11 So.2d 492 (1942), the court allowed a father-in-law, mother-in-law, and two sisters-in-law of the decedent to recover. The court, in Archibald, said that the Legislature never intended that family be given a restrictive meaning. In Thompson v. Vestal Lumber & Manufacturing Co., 208 La. 83, 22 So.2d 842 (1944) the court in allowing workmen's compensation benefits to the children, said that a woman and a deceased employee who had never married but had lived together with their children constituted his family. Nevertheless, this Court in Moore v. Capitol Glass & Supply Co., 25 So.2d 248 (La.App. 1st Cir. 1946) refused to hold that a man and woman who lived alone in open concubinage constituted a "family" within the context we have before us. Then in Patin v. T. L. James & Co., 218 La. 949, 51 So.2d 586 (1951) the Court held that a deceased employee's concubine's minor nephew who lived with decedent to be a member of his family citing the Archibald and Thompson cases. In Humphreys v. Marquette Casualty Co., 235 La. 355, 103 So.2d 895 (1958) the court did not allow a concubine to recover under LSA-R.S. 23:1232(8) saying that it was never within the contemplation of the Legislature to include under the provisions of LSA-R.S. 23:1232 a dependent who had lived in open concubinage with a deceased during his lifetime. Finally, in the case of McDermott v. Funel, 258 La. 657, 247 So.2d 567 (1971) Justice Tate writing for the court said: "It is now settled that a member of the family household (as the present plaintiff mother is), if dependent, is entitled to recover compensation benefits when a contributing wage earner dies as a result of work-caused injuries. The dependent member of the family 1 is entitled to compensation regardless of blood relationship or the technicalities of inheritance law or of acknowledgment or not of illegitimate children. This is in view of the socio-economic purposes of the statute to provide compensation for dependents deprived of support through the work-caused death of a wage earner." Footnote 1 to the above quotation says: "The sole jurisprudential exception is made in the case of a dependent concubine herself, Humphreys v. Marquette Casualty Co., 235 La. 355, 103 So.2d 895 (1958), an exception still recognized, although the concubine's children and other relatives may receive compensation, see decisions cited in text, if dependent members of the household." The above quotation is the latest expression which we were able to find by the Louisiana Supreme Court. This result seems contrary to our best interpretation of LSA-R.S. 23:1232(8) for plaintiff herein was a dependent of decedent and under the Archibald and Thompson cases, supra, she could be considered a member of his family. Professor Wex Malone in his treatise, Louisiana Workmen's Compensation, Section 304, at page 399, commenting on this issue says: "The writer suggests that this pronouncement is more moralistic than it is sound. No other claimant need prove his moral worthiness so long as he or she is dependent. It would seem that the fault of a dependent concubine should no more exclude her from compensation than should the fault of the employee himself. Furthermore, the position of the court ignores the well-known fact that many negro couples live in concubinage through ignorance or because of the prohibitive cost of divorce proceedings, rather than because of moral delinquency. The social need for compensation here is as great as though the dictates of convention had been met. It does not seem fair that the employer or his insurer should profit by the windfall. The only justification of the court's position is the fact that concubinage is likely to be a transitory relationship, and there is little assurance that the bereaved concubine will long remain *819 in need of compensation. This, however, is not an insuperable objection, because the Act provides an adequate means for terminating the claim when dependency ceases." Though we feel that plaintiff herein should be allowed recovery, as an intermediate appellate court we feel ourselves bound by the latest expression of the Supreme Court in McDermott v. Funel, supra, and therefore affirm the Trial Court in denying plaintiff recovery. We now come to plaintiff's argument that the Trial Court's allowance of defendant's reconventional demand for compensation paid in error in the amount of $9,655.85 was incorrect. Of the total figure, $3,265.85 was paid as medical expenses to the provider of services. Furthermore, $1,000.00 was paid to Ardoin's Funeral Home for funeral expenses. Defendant's obligation to pay funeral and medical expenses was in no way dependent on plaintiff's right to collect compensation. Accordingly the judgment of the Trial Court is amended so as to reduce same to $5,390.00. For the above and foregoing reasons, the judgment of the Trial Court is amended and as amended it is affirmed. Defendant is to pay costs of this appeal. AMENDED AND AFFIRMED.
He's our top scorer, hardly constitutes a "disaster". His performances of late have been sub-par, but there was a period of the season where he was our best performer. Utd made it look like they were being "nice to us"? I think this is just your own strange perception that you've created. Everyone knew his time was up over there, it wasn't dressed up as anything other.
Healthy Food Archive Different nutrients like vitamins and minerals which we consume along with our food, enhance our energy, brain functioning, and memory. Since the human body is composed of various systems, these nutrients work together to stimulate the growth process and ensure the proper functioning of ...Read More The trend of using plant-based treatment or herbal medicines has changed over the past few decades. These herbal medicines contain various active ingredients such as phenolic compounds, alkaloids, and terpenoids. These ingredients are well known for enhancing the muscle strength and body mass. Recently, ...Read More Vegan diet is great for the human body and this planet also. It helps in making you feel full for the longer time and saves your body from the fad diets and starvation. To get the healthy fit body and the sound mind the ...Read More We all look for the glowing flawless skin. It’s really important to feel good and confidant. That is why the beauty industry is one of the most profitable industries in the world. But the fact is if you are not clear and healthy from ...Read More Uric acid is a waste product that produces in the body during the breakdown of purines. Purine gets out of the body through urine. But its presence in the body causes the higher uric acid level in the body. Purine is present in many ...Read More Here are all the foods that can help you reduce weight and maintain an ever camera ready figure which is a dream for every man and woman. 20 Weight Loss Friendly Foods 1. Eggs Eggs which are considered to be a source of bad ...Read More We live in a World full of diseases, which are becoming more and more rampant with every passing day. And this is not a surprise to know because the environment we lie in is tremendously toxic. The air we breathe in, the water we ...Read More Latest research has enabled the scientist to remark that today the human brain health and its work ability is quite under the control of the person himself irrespective of the age or gender. This is basically related to the two phenomena of neuroplasticity and ...Read More Peaches are very beneficial fruit with a great taste and aroma. It is a summer fruit and mostly grows in China. It has great nutritional value. Peaches has the wide variety of minerals and anti-oxidants in it which improves the overall health of an ...Read More
# 使用 Vaadin 创建 CRUD UI > 原文:[Creating CRUD UI with Vaadin](https://spring.io/guides/gs/crud-with-vaadin/) > > 译者:[chenzhijun](http://github.com/chenzhijun) > > 校对: 本指南会教你如何在Spring Data JPA的基础上使用基于[Vaadin](https://vaadin.com/)来构建应用的UI: ## 你会构建什么? 你会编写一个使用JPA的Vaadin UI。得到一个完整的具有CRUD(Create,Read,Update,Delete)功能的应用和一个使用自定义的仓储方法实现的过滤实例。 你可以从两种方式开始,可以从已有的"initial"项目开始,或者从一个新的实例开始。他们之间的不同点在下面会讨论。 ## 开始之前你需要准备 大约15分钟时间 一个喜欢的文本编辑器或者IDE [JDK 1.8](http://www.oracle.com/technetwork/java/javase/downloads/index.html) 或 更高版本 [Gradle 2.3+](http://www.gradle.org/downloads) 或 [Maven 3.0+](https://maven.apache.org/download.cgi) 你也可以直接导入代码到IDE: [Spring Tool Suite (STS)](https://spring.io/guides/gs/sts) [IntelliJ IDEA](https://spring.io/guides/gs/intellij-idea/) ## 如何完成指南? 像大多数 `Spring` [入门指南](https://spring.io/guides)一样, 你可以从头开始,完成每一步, 或者你也可以绕过你熟悉的基本步骤再开始。 不管通过哪种方式,你最后都会得到一份可执行的代码。 **如果从基础开始**,你可以往下查看[怎样使用 Gradle 构建项目](#miaodian)。 **如果已经熟悉跳过一些基本步骤**,你可以: * [下载](https://github.com/spring-guides/gs-crud-with-vaadin/archive/master.zip)并解压源码库,或者通过 [Git](https://spring.io/understanding/Git)克隆: `git clone https://github.com/spring-guides/gs-accessing-mongodb-data-rest.git` * 进入 `gs-accessing-mongodb-data-rest/initial`目录 * 跳过前面的部分[创建后台服务](#https://spring.io/guides/gs/crud-with-vaadin/#initial) **当你完成之后**,你可以在`gs-crud-with-vaadin/complete`根据代码检查下结果。 <h2 id="miaodian"> 使用Gradle构建 </h2> 首先你需要编写基础构建脚本。在构建 Spring 应用的时候,你可以使用任何你喜欢的系统来构建, 这里提供一份你可能需要用 [Gradle](http://gradle.org/) 或者 [Maven](https://maven.apache.org/) 构建的代码。 如果你两者都不是很熟悉, 你可以先去参考[如何使用 Gradle 构建 Java 项目](https://spring.io/guides/gs/gradle)或者[如何使用 Maven 构建 Java 项目](https://spring.io/guides/gs/maven)。 ### 创建以下目录结构 在你的项目根目录,创建如下的子目录结构; 例如,如果你使用的是\*nix系统,你可以使用`mkdir -p src/main/java/hello`: ``` └── src └── main └── java └── hello ``` ### 创建Gradle构建文件 下面是一份[初始化Gradle构建文件](https://github.com/spring-guides/gs-crud-with-vaadin/blob/master/initial/build.gradle). `build.gradle` ```gradle buildscript { repositories { mavenCentral() } dependencies { classpath("org.springframework.boot:spring-boot-gradle-plugin:1.5.9.RELEASE") } } apply plugin: 'java' apply plugin: 'eclipse' apply plugin: 'idea' apply plugin: 'org.springframework.boot' jar { baseName = 'gs-accessing-data-jpa' version = '0.1.0' } repositories { mavenCentral() maven { url "https://repository.jboss.org/nexus/content/repositories/releases" } } sourceCompatibility = 1.8 targetCompatibility = 1.8 dependencies { compile("org.springframework.boot:spring-boot-starter-data-jpa") compile("com.h2database:h2") testCompile("junit:junit") } ``` [Spring Boot gradle 插件](https://github.com/spring-projects/spring-boot/tree/master/spring-boot-tools/spring-boot-gradle-plugin) 提供了很多非常方便的功能: * 将 classpath 里面所有用到的 jar 包构建成一个可执行的 JAR 文件,使得运行和发布你的服务变得更加便捷。 * 搜索 `public static void main()` 方法并且将它标记为可执行类。 * 提供了将内部依赖的版本都去匹配 [Spring Boot 依赖](https://github.com/spring-projects/spring-boot/blob/master/spring-boot-dependencies/pom.xml) 的版本。你可以根据你的需要来重写版本,但是它默认提供给了 Spring Boot 依赖的版本。 ## 使用Maven构建 首先,你需要设置一个基本的构建脚本。当使用 Spring 构建应用程序时,你可以使用任何你喜欢的构建系统,但是使用 [Maven](https://maven.apache.org/) 构建的代码如下所示。如果您不熟悉Maven,请参阅[使用Maven构建Java项目](https://spring.io/guides/gs/maven)。 ### 创建目录结构 在你选择的项目目录中,创建以下子目录结构;例如, 在Linux/Unix系统中使用如下命令: `mkdir -p src/main/java/hello` ``` └── src └── main └── java └── hello ``` `pom.xml` ```xml <?xml version="1.0" encoding="UTF-8"?> <project xmlns="http://maven.apache.org/POM/4.0.0" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> <modelVersion>4.0.0</modelVersion> <groupId>org.springframework</groupId> <artifactId>gs-crud-with-vaadin</artifactId> <version>0.1.0</version> <parent> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-parent</artifactId> <version>1.5.9.RELEASE</version> </parent> <properties> <java.version>1.8</java.version> </properties> <dependencies> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-data-jpa</artifactId> </dependency> <dependency> <groupId>com.h2database</groupId> <artifactId>h2</artifactId> </dependency> </dependencies> <build> <plugins> <plugin> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-maven-plugin</artifactId> </plugin> </plugins> </build> </project> ``` [Spring Boot Maven 插件](https://github.com/spring-projects/spring-boot/tree/master/spring-boot-tools/spring-boot-maven-plugin) 提供了很多便捷的特性: - 它收集类路径上的所有jar包,并构建一个可运行的jar包,这样可以更方便地执行和发布你的服务。 - 它寻找`public static void main()` 方法来将其标记为一个可执行的类。 - 它提供了一个内置的依赖解析器将应用与Spring Boot依赖的版本号进行匹配。你可以修改成任意的版本,但它将默认为 Boot所选择了一组版本。 ## 使用你的IDE构建 - 阅读如何将本指南直接导入 [Spring Tool Suite](https://spring.io/guides/gs/sts/)。 - 阅读如何使用 [IntelliJ IDEA](https://spring.io/guides/gs/intellij-idea) 来构建。 ## 创建后台服务 本示例是 [Accessing Data with JPA](https://spring.io/gs/accessing-data-jpa)的扩展部分。唯一的不同是entity类有get/set方法,并且对于终端用户来说,可以更加优雅的在repository中自定义搜索方法。你并不需要先去阅读Access Data with JPA就可以完成本示例。 如果你是用一个全新的项目开始本示例,请将下面的entity和repository类加入到项目中。这样的目的是为了方便你接下来更好的完成。如果你的项目是从"初始化"开始的,这些类就都已经在项目中了。 `src/main/java/hello/Customer.java` ```java package hello; import javax.persistence.Entity; import javax.persistence.GeneratedValue; import javax.persistence.Id; @Entity public class Customer { @Id @GeneratedValue private Long id; private String firstName; private String lastName; protected Customer() { } public Customer(String firstName, String lastName) { this.firstName = firstName; this.lastName = lastName; } public Long getId() { return id; } public String getFirstName() { return firstName; } public void setFirstName(String firstName) { this.firstName = firstName; } public String getLastName() { return lastName; } public void setLastName(String lastName) { this.lastName = lastName; } @Override public String toString() { return String.format("Customer[id=%d, firstName='%s', lastName='%s']", id, firstName, lastName); } } ``` `src/main/java/hello/CustomerRepository.java` ```java package hello; import org.springframework.data.jpa.repository.JpaRepository; import java.util.List; public interface CustomerRepository extends JpaRepository<Customer, Long> { List<Customer> findByLastNameStartsWithIgnoreCase(String lastName); } ``` 你可以保留整个Spring Boot应用,然后使用一些初始数据来填充数据库。 `src/main/java/hello/Application.java` ```java package hello; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.springframework.boot.CommandLineRunner; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; import org.springframework.context.annotation.Bean; @SpringBootApplication public class Application { private static final Logger log = LoggerFactory.getLogger(Application.class); public static void main(String[] args) { SpringApplication.run(Application.class); } @Bean public CommandLineRunner loadData(CustomerRepository repository) { return (args) -> { // save a couple of customers repository.save(new Customer("Jack", "Bauer")); repository.save(new Customer("Chloe", "O'Brian")); repository.save(new Customer("Kim", "Bauer")); repository.save(new Customer("David", "Palmer")); repository.save(new Customer("Michelle", "Dessler")); // fetch all customers log.info("Customers found with findAll():"); log.info("-------------------------------"); for (Customer customer : repository.findAll()) { log.info(customer.toString()); } log.info(""); // fetch an individual customer by ID Customer customer = repository.findOne(1L); log.info("Customer found with findOne(1L):"); log.info("--------------------------------"); log.info(customer.toString()); log.info(""); // fetch customers by last name log.info("Customer found with findByLastNameStartsWithIgnoreCase('Bauer'):"); log.info("--------------------------------------------"); for (Customer bauer : repository .findByLastNameStartsWithIgnoreCase("Bauer")) { log.info(bauer.toString()); } log.info(""); }; } } ``` ## Vaadin 依赖 如果你是从“initial”创建的项目,你已经将需要的依赖添加到项目里了。但如果你从一个全新的Spring项目中,你需要添加Vasdin依赖。Vaadin的Spring集成包中有Spring boot starter,你所需要做的,就是将它加入到Maven的pom文件中,或者在Gradle中做类似的配置: ```xml <dependency> <groupId>com.vaadin</groupId> <artifactId>vaadin-spring-boot-starter</artifactId> </dependency> ``` 本示例使用的是较新版本的Vaadin,比starter默认模块中的版本要新一些。如果要使用新的版本,你可以定义Vaadin的一些参数,像下面这样: ```xml <dependencyManagement> <dependencies> <dependency> <groupId>com.vaadin</groupId> <artifactId>vaadin-bom</artifactId> <version>8.0.0</version> <type>pom</type> <scope>import</scope> </dependency> </dependencies> </dependencyManagement> ``` Gradle 默认不支持"BOMs",但是这里有一个非常遍历的[插件](https://plugins.gradle.org/plugin/io.spring.dependency-management)。下载完整的[build.gradle](https://github.com/spring-guides/gs-crud-with-vaadin/blob/master/complete/build.gradle)。 ## 定义 UI 类 UI 类是 Vaadin UI逻辑入口点。在 Spring Boot应用中,你仅仅需要使用`@SpringUI`注解,然后Spring就会自动注入它。一个简单的"hello world"示例就像下面这样: ```java package hello; import com.vaadin.annotations.Theme; import com.vaadin.server.VaadinRequest; import com.vaadin.spring.annotation.SpringUI; import com.vaadin.ui.Button; import com.vaadin.ui.Notification; import com.vaadin.ui.UI; @SpringUI @Theme("valo") public class VaadinUI extends UI { @Override protected void init(VaadinRequest request) { setContent(new Button("Click me", e -> Notification.show("Hello Spring+Vaadin user!"))); } } ``` ## 数据展示 使用一个好的布局,如使用`Grid`组件。下面的实体`CustomerRepository`是从构造函数注入的,它是用[BeanItemContainer](https://vaadin.com/book/-/page/datamodel.container.html)包装起来,[BeanItemContainer](https://vaadin.com/book/-/page/datamodel.container.html)为Grid组建提供数据。`VaadinUI`的主体部分展开就像下面这样: ```java CustomerRepository repo; Grid<Customer> grid; @Autowired public VaadinUI(CustomerRepository repo) { this.repo = repo; this.grid = new Grid<>(Customer.class); } @Override protected void init(VaadinRequest request) { setContent(grid); listCustomers(); } private void listCustomers() { grid.setItems(repo.findAll()); } ``` > 如果你有大量的表或者大量的同步用户,你不应该绑定整个数据集到你的UI组件。 尽管许多Vaadin组件从服务器到浏览器的过程是懒加载的,上面的方案是将整个数据列表存储在服务器内存中。为了节省一些内存,你应该仅仅展示最重要的数据,然后使用分页或者提供懒加载数据来展示其它数据。你可以使用`setDataProvider(FetchItemsCallback<T>, SerializableSupplier<Integer>)`方法。 ## 数据过滤 在大量的数据集成为你服务器的一个问题前,它造成了一个对想编辑相应数据的人头疼的问题。使用`TextField`组件来创建一个过滤入口。首先,修改`listCustomer()`方法让它支持过滤: ```java void listCustomers(String filterText) { if (StringUtils.isEmpty(filterText)) { grid.setItems(repo.findAll()); } else { grid.setItems(repo.findByLastNameStartsWithIgnoreCase(filterText)); } } ``` > 这是Spring Data的声明查询的便利方法。在`CustomerRepository`定义一个新方法`findByLastNameStartsWithIgnoringCase` 给`TextField`组建添加一个钩子,并且将它的值插入到该过滤器方法中。当文本被改变时,`TextChangeListener`会被延迟调用: ```java TextField filter = new TextField(); filter.setPlaceholder("Filter by last name"); filter.setValueChangeMode(ValueChangeMode.LAZY); filter.addValueChangeListener(e -> listCustomers(e.getValue())); VerticalLayout mainLayout = new VerticalLayout(filter, grid); setContent(mainLayout); ``` ## 定义编辑组建 因为Vaadin UI都是一些平常的Java代码,没有理由不从一开始就写一些可重复使用的代码。为你的Customer实体定一个编辑组件。你需要将它定义成一个让Spring能够管理的Bean,然后你可以直接将`CustomerRepostiry`注入到编辑器中,构成C,U和D的部分,或者我们的CRUD功能设计。 `src/main/java/hello/CustomerEditor.java` ```java package hello; import org.springframework.beans.factory.annotation.Autowired; import com.vaadin.data.Binder; import com.vaadin.event.ShortcutAction; import com.vaadin.server.FontAwesome; import com.vaadin.spring.annotation.SpringComponent; import com.vaadin.spring.annotation.UIScope; import com.vaadin.ui.Button; import com.vaadin.ui.CssLayout; import com.vaadin.ui.TextField; import com.vaadin.ui.VerticalLayout; import com.vaadin.ui.themes.ValoTheme; /** * A simple example to introduce building forms. As your real application is probably much * more complicated than this example, you could re-use this form in multiple places. This * example component is only used in VaadinUI. * <p> * In a real world application you'll most likely using a common super class for all your * forms - less code, better UX. See e.g. AbstractForm in Viritin * (https://vaadin.com/addon/viritin). */ @SpringComponent @UIScope public class CustomerEditor extends VerticalLayout { private final CustomerRepository repository; /** * The currently edited customer */ private Customer customer; /* Fields to edit properties in Customer entity */ TextField firstName = new TextField("First name"); TextField lastName = new TextField("Last name"); /* Action buttons */ Button save = new Button("Save", FontAwesome.SAVE); Button cancel = new Button("Cancel"); Button delete = new Button("Delete", FontAwesome.TRASH_O); CssLayout actions = new CssLayout(save, cancel, delete); Binder<Customer> binder = new Binder<>(Customer.class); @Autowired public CustomerEditor(CustomerRepository repository) { this.repository = repository; addComponents(firstName, lastName, actions); // bind using naming convention binder.bindInstanceFields(this); // Configure and style components setSpacing(true); actions.setStyleName(ValoTheme.LAYOUT_COMPONENT_GROUP); save.setStyleName(ValoTheme.BUTTON_PRIMARY); save.setClickShortcut(ShortcutAction.KeyCode.ENTER); // wire action buttons to save, delete and reset save.addClickListener(e -> repository.save(customer)); delete.addClickListener(e -> repository.delete(customer)); cancel.addClickListener(e -> editCustomer(customer)); setVisible(false); } public interface ChangeHandler { void onChange(); } public final void editCustomer(Customer c) { if (c == null) { setVisible(false); return; } final boolean persisted = c.getId() != null; if (persisted) { // Find fresh entity for editing customer = repository.findOne(c.getId()); } else { customer = c; } cancel.setVisible(persisted); // Bind customer properties to similarly named fields // Could also use annotation or "manual binding" or programmatically // moving values from fields to entities before saving binder.setBean(customer); setVisible(true); // A hack to ensure the whole form is visible save.focus(); // Select all text in firstName field automatically firstName.selectAll(); } public void setChangeHandler(ChangeHandler h) { // ChangeHandler is notified when either save or delete // is clicked save.addClickListener(e -> h.onChange()); delete.addClickListener(e -> h.onChange()); } } ``` 在一个大应用中你可以在多个地方使用这个编辑器组件。当然主要提出的是,在一些大的应用中,你应该提供一些通用的格式比如MVP来使你的UI代码具有结构性(当然这已经超出本教程的范围了)。 ## 完整示例 在先前的步骤中,你已经知道了一些基础的组建该如果编写代码。使用`Button`并且监听`Grid`,你可以完全的集成我们的编辑器到主UI中,最终版本的`VaadinUi`类像下面这样: `src/main/java/hello/VaadinUI.java` ```java package hello; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.util.StringUtils; import com.vaadin.server.FontAwesome; import com.vaadin.server.VaadinRequest; import com.vaadin.shared.ui.ValueChangeMode; import com.vaadin.spring.annotation.SpringUI; import com.vaadin.ui.Button; import com.vaadin.ui.Grid; import com.vaadin.ui.HorizontalLayout; import com.vaadin.ui.TextField; import com.vaadin.ui.UI; import com.vaadin.ui.VerticalLayout; @SpringUI public class VaadinUI extends UI { private final CustomerRepository repo; private final CustomerEditor editor; final Grid<Customer> grid; final TextField filter; private final Button addNewBtn; @Autowired public VaadinUI(CustomerRepository repo, CustomerEditor editor) { this.repo = repo; this.editor = editor; this.grid = new Grid<>(Customer.class); this.filter = new TextField(); this.addNewBtn = new Button("New customer", FontAwesome.PLUS); } @Override protected void init(VaadinRequest request) { // build layout HorizontalLayout actions = new HorizontalLayout(filter, addNewBtn); VerticalLayout mainLayout = new VerticalLayout(actions, grid, editor); setContent(mainLayout); grid.setHeight(300, Unit.PIXELS); grid.setColumns("id", "firstName", "lastName"); filter.setPlaceholder("Filter by last name"); // Hook logic to components // Replace listing with filtered content when user changes filter filter.setValueChangeMode(ValueChangeMode.LAZY); filter.addValueChangeListener(e -> listCustomers(e.getValue())); // Connect selected Customer to editor or hide if none is selected grid.asSingleSelect().addValueChangeListener(e -> { editor.editCustomer(e.getValue()); }); // Instantiate and edit new Customer the new button is clicked addNewBtn.addClickListener(e -> editor.editCustomer(new Customer("", ""))); // Listen changes made by the editor, refresh data from backend editor.setChangeHandler(() -> { editor.setVisible(false); listCustomers(filter.getValue()); }); // Initialize listing listCustomers(null); } // tag::listCustomers[] void listCustomers(String filterText) { if (StringUtils.isEmpty(filterText)) { grid.setItems(repo.findAll()); } else { grid.setItems(repo.findByLastNameStartsWithIgnoreCase(filterText)); } } // end::listCustomers[] } ``` ## 总结 恭喜,你已经编写了一个完整的具有CURD功能的UI应用并且它使用Spring Data来持久化。你完成了它并且不需要暴露任何REST服务,也不需要编写一行JavaScript或者HTML代码。 ## 了解更多 下面的指南可能对你有用: - [Building an Application with Spring Boot](https://spring.io/guides/gs/spring-boot/) - [Accessing Data with JPA](https://spring.io/guides/gs/accessing-data-jpa/) - [Accessing Data with MongoDB](https://spring.io/guides/gs/accessing-data-mongodb/) - [Accessing Data with GemFire](https://spring.io/guides/gs/accessing-data-gemfire/) - [Accessing Data with Neo4j](https://spring.io/guides/gs/accessing-data-neo4j/) - [Accessing data with MySQL](https://spring.io/guides/gs/accessing-data-mysql/) > 本文由spring4all.com翻译小分队创作,采用[知识共享-署名-非商业性使用-相同方式共享 4.0 国际 许可](http://creativecommons.org/licenses/by-nc-sa/4.0/) 协议进行许可。
DecorationManager = require '../src/decoration-manager' describe "DecorationManager", -> [decorationManager, buffer, displayLayer, markerLayer1, markerLayer2] = [] beforeEach -> buffer = atom.project.bufferForPathSync('sample.js') displayLayer = buffer.addDisplayLayer() markerLayer1 = displayLayer.addMarkerLayer() markerLayer2 = displayLayer.addMarkerLayer() decorationManager = new DecorationManager(displayLayer) waitsForPromise -> atom.packages.activatePackage('language-javascript') afterEach -> decorationManager.destroy() buffer.release() describe "decorations", -> [layer1Marker, layer2Marker, layer1MarkerDecoration, layer2MarkerDecoration, decorationProperties] = [] beforeEach -> layer1Marker = markerLayer1.markBufferRange([[2, 13], [3, 15]]) decorationProperties = {type: 'line-number', class: 'one'} layer1MarkerDecoration = decorationManager.decorateMarker(layer1Marker, decorationProperties) layer2Marker = markerLayer2.markBufferRange([[2, 13], [3, 15]]) layer2MarkerDecoration = decorationManager.decorateMarker(layer2Marker, decorationProperties) it "can add decorations associated with markers and remove them", -> expect(layer1MarkerDecoration).toBeDefined() expect(layer1MarkerDecoration.getProperties()).toBe decorationProperties expect(decorationManager.decorationForId(layer1MarkerDecoration.id)).toBe layer1MarkerDecoration expect(decorationManager.decorationsForScreenRowRange(2, 3)).toEqual { "#{layer1Marker.id}": [layer1MarkerDecoration], "#{layer2Marker.id}": [layer2MarkerDecoration] } layer1MarkerDecoration.destroy() expect(decorationManager.decorationsForScreenRowRange(2, 3)[layer1Marker.id]).not.toBeDefined() expect(decorationManager.decorationForId(layer1MarkerDecoration.id)).not.toBeDefined() layer2MarkerDecoration.destroy() expect(decorationManager.decorationsForScreenRowRange(2, 3)[layer2Marker.id]).not.toBeDefined() expect(decorationManager.decorationForId(layer2MarkerDecoration.id)).not.toBeDefined() it "will not fail if the decoration is removed twice", -> layer1MarkerDecoration.destroy() layer1MarkerDecoration.destroy() expect(decorationManager.decorationForId(layer1MarkerDecoration.id)).not.toBeDefined() it "does not allow destroyed markers to be decorated", -> layer1Marker.destroy() expect(-> decorationManager.decorateMarker(layer1Marker, {type: 'overlay', item: document.createElement('div')}) ).toThrow("Cannot decorate a destroyed marker") expect(decorationManager.getOverlayDecorations()).toEqual [] it "does not allow destroyed marker layers to be decorated", -> layer = displayLayer.addMarkerLayer() layer.destroy() expect(-> decorationManager.decorateMarkerLayer(layer, {type: 'highlight'}) ).toThrow("Cannot decorate a destroyed marker layer") describe "when a decoration is updated via Decoration::update()", -> it "emits an 'updated' event containing the new and old params", -> layer1MarkerDecoration.onDidChangeProperties updatedSpy = jasmine.createSpy() layer1MarkerDecoration.setProperties type: 'line-number', class: 'two' {oldProperties, newProperties} = updatedSpy.mostRecentCall.args[0] expect(oldProperties).toEqual decorationProperties expect(newProperties).toEqual {type: 'line-number', gutterName: 'line-number', class: 'two'} describe "::getDecorations(properties)", -> it "returns decorations matching the given optional properties", -> expect(decorationManager.getDecorations()).toEqual [layer1MarkerDecoration, layer2MarkerDecoration] expect(decorationManager.getDecorations(class: 'two').length).toEqual 0 expect(decorationManager.getDecorations(class: 'one').length).toEqual 2 describe "::decorateMarker", -> describe "when decorating gutters", -> [layer1Marker] = [] beforeEach -> layer1Marker = markerLayer1.markBufferRange([[1, 0], [1, 0]]) it "creates a decoration that is both of 'line-number' and 'gutter' type when called with the 'line-number' type", -> decorationProperties = {type: 'line-number', class: 'one'} layer1MarkerDecoration = decorationManager.decorateMarker(layer1Marker, decorationProperties) expect(layer1MarkerDecoration.isType('line-number')).toBe true expect(layer1MarkerDecoration.isType('gutter')).toBe true expect(layer1MarkerDecoration.getProperties().gutterName).toBe 'line-number' expect(layer1MarkerDecoration.getProperties().class).toBe 'one' it "creates a decoration that is only of 'gutter' type if called with the 'gutter' type and a 'gutterName'", -> decorationProperties = {type: 'gutter', gutterName: 'test-gutter', class: 'one'} layer1MarkerDecoration = decorationManager.decorateMarker(layer1Marker, decorationProperties) expect(layer1MarkerDecoration.isType('gutter')).toBe true expect(layer1MarkerDecoration.isType('line-number')).toBe false expect(layer1MarkerDecoration.getProperties().gutterName).toBe 'test-gutter' expect(layer1MarkerDecoration.getProperties().class).toBe 'one'
Using a licensed Toronto plumber? This is an absolute MUST when it comes to the function of your plumbing system and the protection of your home. It’s up to you to avoid non-certified plumbers and those who claim to be certified but have no proof. Don’t end up with more problems than you already have. Do your research, choose wisely and confirm the necessary certifications before you hire a Toronto plumbing team. Drain Rescue plumbers are licensed, bonded and insured – and we’ve got the paperwork to prove it! Read more. Read more Although plumbers, pipefitters, and steamfitters perform three distinct and specialized roles, their duties are often similar. For example, they all install pipes and fittings that carry water, steam, air, or other liquids or gases. They determine the necessary materials for a job, connect pipes, and perform pressure tests to ensure that a pipe system is airtight and watertight. Their tools include drills, saws, welding torches, and wrenches. When water doesn’t stay where it’s supposed to, our Lakewood water damage restoration experts are at-the-ready to handle flooded basements, broken pipes, overflowing tubs and toilets, heavy rains, sewer line backups and other water issues. Roto-Rooter’s IICRC certified water cleanup professionals are available 24 hours a day, 365 days a year and will respond quickly to minimize damage to your property. At Oliver, our expert plumbing staff is ready to handle all of your plumbing needs. Whether you have a leaky faucet or water heater, a toilet repair, or want to replace your entire bath or shower, our plumbing and water heater services are fast, reliable, and available 24 hours a day. The following are just some of the areas in which we specialize: Big or small, BEST Plumbing Service of Cincinnati handles it all! We strive to handle every project with the highest level of excellence. Our Cincinnati plumbing company has eliminated thousands of plumbing headaches from the residential and commercial property owners we serve. When you’re in need of a plumbing repair, replacement, a new installation or routine maintenance, we’re the plumbers to call. We stand behind the excellent work we do for our customers. Watch this video to learn more about our services. late 14c. (from c.1100 as a surname), "a worker in any sort of lead" (roofs, gutters, pipes), from Old French plomier "lead-smelter" (Modern French plombier) and directly from Latin plumbarius "worker in lead," noun use of adjective meaning "pertaining to lead," from plumbum "lead" (see plumb (n.)). Meaning focused 19c. on "workman who installs pipes and fittings" as lead water pipes became the principal concern of the trade. In U.S. Nixon administration (1969-74), the name of a special unit for investigation of "leaks" of government secrets. If it’s a toilet issue you’ve got, you’re sure to find the right toilet parts and replacement pieces – including shutoff valves and supply lines – to get your toilet in tip-top shape. We’ve also got shower parts and shower valves, sink parts and faucet parts, as well as everything for bathtub repair – all to get your bathroom up and running in top-top shape. We had a Saturday evening before Easter emergency when our water heater began leaking. We got the water turned off and contacted Atomic Plumbing. Their friendly appointment person told us they would have someone here the next morning, Easter! Jim came at 11 am and told us it would be best to replace it. We told him to go ahead. They went out and got a high quality one as we requested and installed it in a few hours. Very professional and kept us informed along the way. We appreciate Atomic Plumbing. Whether you're unclogging drains with your handy drain snake, installing a sprinkler system or solving drainage problems, Lowe's has everything you need to make your plumbing project a success. From toilets, toilet repair, water heaters and filtration systems to faucets, metal pipes and fittings or plastic pipes and fittings, we're here to help. We’ll help make sure that pipe dreams aren’t as impossible as they seem with the right PVC pipe, PVC pipe fittings, PEX pipe and fittings and pipe connectors. We’ve got everything you need to get your water where you need it with our selection of septic tanks, water pumps, submersible pumps and irrigation pumps. And we also carry sump pump check valves to make sure that discharge water doesn’t flow back into your sump system. Check out our how-to articles and videos for step-by-step guides on do-it-yourself tasks. Get started on transforming your home into a safe, energy-efficient spot for the whole family. Clear the trap: If the above methods do not work, the next step would be to remove the P-trap under the sink. Place a bucket underneath the area to catch water then unscrew the two threaded caps that hold the curved section of the pipe in place. Nowadays, most kitchen drains are made of white PVC pipe with connections that can be unscrewed by hand. Sump pumps are used to re-route water away from the lowest point of your home's foundation and protect your basement and easily damaged areas from flooding. In most cases, your sump pump is hardwired to your electrical system or possibly plugged into a wall outlet. Because these power sources can often fail in a storm when water damage occurs, sump pumps are typically equipped with battery backup power. Hi Kenneth, We would be happy to get you connected with a pro for your project. You can submit a service request on our website: http://www.homeadvisor.com/, or browse reviews for local water heater pros here: http://www.homeadvisor.com/c.html. We can also have a project advisor reach out to assist you if you send your contact information to [email protected] –HASupport Not all plumbing companies can guarantee up-front pricing, superior workmanship and parts, licensed and insured plumbing contractors, and courteous support from uniformed professionals. Whether you are in need of drain cleaning or would like to schedule a plumbing inspection for your home, Mr. Rooter's plumbing services can handle it all! Our skilled plumbers are knowledgeable and equipped with the latest tools needed to achieve optimal results. Give us a call at (855) 982-2028, or request a job estimate online. In the United Kingdom the professional body is the Chartered Institute of Plumbing and Heating Engineering (educational charity status) and it is true that the trade still remains virtually ungoverned;[40] there are no systems in place to monitor or control the activities of unqualified plumbers or those home owners who choose to undertake installation and maintenance works themselves, despite the health and safety issues which arise from such works when they are undertaken incorrectly; see Health Aspects of Plumbing (HAP) published jointly by the World Health Organization (WHO) and the World Plumbing Council (WPC).[41][42] WPC has subsequently appointed a representative to the World Health Organization to take forward various projects related to Health Aspects of Plumbing.[43] I have used atomic a couple of times and have received nothing but great service! When we first bought our house, we hadn't moved to the area yet and weren't moving for another month. We drove down for a weekend to get the A.C. replaced, and found the sink in the master bath (that the previous owner just had installed) had flooded the whole bedroom. I believe it was Eric who helped us, and he was wonderful. Despite it being July, and no A.C, he took care of us without complaint. And because we were going back home in the next couple days he made sure to get it done quickly!Recently we decided to replace our water heater and didn't hesitate to call Atomic. Ryan and Zach helped us this time and provided the same level of service I expected! They were polite, clean and made sure everything went smoothly. Atomic is definitely a little pricer than some smaller companies, but you get what you pay for and I'd rather pay to get it done correctly the first time than later when your water line snaps in the master bathroom and you're out of town. Plumbing is one of your home's main infrastructures - yet water can also be your home's nemesis. So count on True Value Hardware Stores to help you tackle any size plumbing job. From basic projects like installing a new faucet or water filter or opening a clogged drain; to a bit more complex like replacing a water heater, toilet or sump pump, we can help. We are the plumber Jacksonville, FL residents continue to rely on. We provide plumbing repair & septic tank services for commercial, residential and industrial entities. Our plumbing services include: back flow, drain field and grease trap installation and repair; all lift station operations including installation & repair; pipeline video inspection, pipe jetting; septic tank installation, inspection, cleaning & pumping; sludge removal and many other plumbing works. In 2016, Metro-Rooter became a part of the Wind River Environmental group of companies, joining the nation’s largest non-hazardous liquid waste service providers! Try a plunger: If it's a double sink, use a wet rag or rubber stopper to block the other drain. Place the plunger directly over the drain until it forms an air-tight seal. If you have trouble forming an air-tight seal with the plunger, run it under some hot water to make it more flexible. Move the plunger up and down to dislodge the clog from the drain. When you’re searching for a dependable Dallas plumber or Dallas plumbing company “near me” which offers licensed and trained plumbers for any plumbing repair or plumbing installation like water heaters, tankless heaters, garbage disposals, drain or sewer lines, water filtration, water softening or other plumbing needs, call 214-892-2225214-892-2225. Plumbing problems always seem to catch us off guard. There just never is a right time to deal with burst pipes, clogged drains, flooded basements or overflowing toilets. To minimize the risk of potential plumbing disasters, you must make sure your residential or commercial plumbing system is handled by professional plumbers. With the hands-on knowledge of experienced plumbers, every plumbing job is carried out with utmost skill and expertise. Installations, repairs, and replacements of leaking pipes, malfunctioning plumbing fixtures or broken sump pumps are only some of the high quality services offered by licensed and qualified plumbing contractors, both in standard residential plumbing systems or large-scale commercial ones. When it comes to emergency plumbing problems, 24-7 plumbing experts are equipped with the tools and know-how required to promptly restore your plumbing system to proper working order. For top-notch plumbing services at affordable prices, always opt for a professional plumber. A conventional water heater is recognized as a cylindrical storage tank ranging in size from 20 to 80 gallons in capacity. This tank is typically insulated with one or two elements that heat the water to the temperature set on the thermostat. Conventional water heaters have been used for decades in residential and commercial buildings. However, this method of constantly heating or keeping the tank of water hot is not very energy efficient, especially if you don’t have a need for hot water 24 hours a day. Alphabet City, Battery Park City, Bowery, Carnegie Hill, Chelsea, Chinatown, Cooperative Village, East Village, Greenwich Village, Harlem, Hell's Kitchen, Inwood, Kips Bay, Koreatown, Lenox Hill, Lincoln Square, Little Germany, Little Italy, Lower East Side, Madison Square, Manhattan Valley, Marble Hill, Morningside Heights, NoHo, NoLita, NoMad, Peter Cooper Village, Rose Hill, SoHo, TriBeCa, Tudor City, Two Bridges, Upper East Side, Upper West Side, Washington Heights Try a plunger: If it's a double sink, use a wet rag or rubber stopper to block the other drain. Place the plunger directly over the drain until it forms an air-tight seal. If you have trouble forming an air-tight seal with the plunger, run it under some hot water to make it more flexible. Move the plunger up and down to dislodge the clog from the drain. When you need a plumber who can supply the knowledge, the skill, and the necessary equipment, you need Roto-Rooter. Homeowners trust Roto-Rooter to provide water heater installation. We can also install faucets, sinks, toilets, showers, and more. Schedule your appointment with your neighborhood plumber today. Our plumberswill always stand by their work and provide a customer satisfaction guarantee.
Saint George S.C. Saint George Sports Club (Amharic: ቅዱስ ጊዮርጊስ ስፖርት ክለብ, Kidus Giorgis Sport Club) is an Ethiopian football club based in Addis Ababa, Ethiopia. They are members of the Ethiopian Football Federation and play in the top division of Ethiopian football, the Ethiopian Premier League. Founded in 1935, the club was the first in Ethiopia and was established as a symbol of Ethiopian nationalism and resistance against the occupying forces of fascist Italy. History Establishment The club was founded on 1935 at Doro Manekia in George Dukas's family house by Ethiopian Ayele Atnash and Greek George Ducas. Established in the Arada (Arada Giorgis) neighborhood of Addis Ababa during Fascist Italy's invasion of Ethiopia, the club quickly became the symbol of Ethiopian nationalism in the midst of Italian occupation. The patriotic struggle of the 1930s left an indelible mark on the club and the Arada neighborhood, defining both for centuries to come. The history of the club is often thought to be heavily influenced by this neighborhood. St George was said to have started with only 2 Tegera Birr, 1 ball, goal posts and a stamp. Often finding it hard to play football on local pitches due to restrictions placed on them by the Arada police, the club had to constantly move from place to place. In one instance the club members tried carrying goal posts to 'Filwehameda' ( presently located next to Custom Authorities Head Office), but were ultimately chased away by authorities. Attempts to play at 'Aroge Kera' on the 'Etege Menen' field were also unsuccessful as unhappy local villagers chased them away. Then they went to 'Belay Zeleke' 'Zebegna Sefer' village, but Arada police came and chased them away once again. Matches were organized against other local teams or groups in the area such as those of the Armenian community of Addis Ababa. However, because the club was short handed in the number of players they had they ended up recruiting others to play. This is how Yidnekachew Tessema came to be a part of the team, he was found on the streets of Addis and was asked to join them for the match. It was said that he was spotted while crossing Berad Mekonnen bridge and since he went to Teferi Mekonnen School where all club members went to school, they were familiar with him. After agreeing to join them, St. George was able to beat the Armenian team 2-0 thanks to two goals by Yidnekachew himself. The club's first jerseys were brown and white, affordable cloth for the cash strapped club at the time. One of the founders, George Ducas, used scrap together money from his parents to support the club. Others in the club would go around knocking at doors singing traditional songs like "Hoya Hoye" in order to earn money for the club. The customary reward for their singing efforts was bread, not money, but they were able collect this bread in a sacks to sell it in laborers' villages to earn the money. Once the club was able to find some funds they were able to get a New Jersey that implies their unity with the Ethiopian flag colors. They gave the first jersey to the second team and started wearing the new ones until pressure from the occupying police force made them have to hide this New Jersey underneath their clothing. After buying jersey with the money, the club bought food for the players with the rest of the money. The members and players of the club would to eat bread and tea after matches and training sessions. Connection to the Ethiopian Struggle When Italian efforts to directly destroy St. George didn't work, they forced the club to change its name and play matches against a club the Italians had created called '6 kilo'. This club was purposely created by Italians to weaken and demoralize St. George. Sponsored by the nearby factory 'Cugnac Alovo', 6 Kilo (also called 'Cenco Maje' to mean July 5), had more money and supplies than St. George. They beat St. George on multiple occasions and St. George also did the same however those matches nearly always ended with beatings by the Arada (Italian) police. The ongoing Guerrilla warfare during this time was of the utmost importance to the club and its members. Knowing this the Italians trying using the club as a propaganda tool for their own administration in order to confuse and entrap the guerilla fighters. The Italians sent a messages to resistance leaders like Ras. Abebe Aregay to "come and see the people is in peace" inviting him to watch a football match at JanMeda, a popular field in Addis Ababa. Hearing this the guerilla fighters took an Italian General as leverage not trusting the Italians and Ras. Abebe Aregay sent Demissie W/Michael to investigate the situation. Having been warned before hand to peacefully play the match, St. George was picked to play against "6 Kilo". The game quickly turned into a physical fight after kickoff with spectators often cheering and whistling to encourage the fight rather than the game. Then the game was interrupted and the Italians' plan foiled. In 1941 when Ethiopia was liberated from fascist Italian control and Haile Selassie I had returned, it was us the club supporters along with fellow Addis Ababians that sang the national anthem "Ethiopia hoy des Yebelesh"(to mean, Rejoice Ethiopia) to welcome him back. An anthem that was written by a huge St. George supporters Yoftahe Nigussie and produced by Captain Nalbadin. Ethiopian League Football The first officially recognized version of an Ethiopian football league was established in 1944. Originally five teams representing the various communities of Addis Ababa including St. George (Ethiopian), Fortitudo (Italian), Ararat (Armenian), Olympiakos (Greek) and the British Military Mission in Ethiopia (BMME) contested for the title which was won by the BMME. In 1947, the country's formal national league kicked off with three teams; St. George, Mechale and Ke'ay Bahir. The club remained within the league for twenty-five years before the Derg reorganized the football leagues, and forced all existing clubs to shut down. In this process the club had its name changed to Addis Ababa Brewery in 1972 only to change it back four years later. The club switched its name back an forth for 19 years until the fall of the Derg in 1991 when the club officially changed its name back to St. George. St. George enjoyed some dominance in the late 60's after which the league went through a period of relative parity in the 70's and 80's. However, during the premier league era no club has been more dominant than St. George S.C., amassing an impressive 14 titles since the start of the era in the 1997-98 season. As of 2017, the club has a combined 29 top division titles which is by far the most in Ethiopian football. Ownership The club is owned by the St. George Football Association. It is also financially supported by prominent Saudi Businessman Mohammed Hussein Al Amoudi and Ethiopian businessman Abenet Gebremeskel, who is also chairman of the club. In June 2018 it was announced that the club would sell most of its shares to fans. Supporters Saint George have one of the largest fan bases in all of Ethiopian football and are known for their fervent displays during home matches. Often singing the club's anthem and waving yellow and orange checkered flags, the supporters of Saint George provide some of the most festive atmospheres in Ethiopian football. The ultras of the club are known to be involved in hooliganism, which is a very prevalent phenomenon in the Ethiopian football. Clashes with rival support groups are common, especially during derby matches such as in the "Sheger Derby". In the early days chants supporters of the club used to repeat went as follows: In reference to their early rivals "6 kilo": «ይጫወቱ ነበር በቴስታ በጋንባ፣ መገን 6 ኪሎ ተሸንፎ ገባ።» meaning "6 kilo, although playing with their legs and kicking players with headers, they always lose" In reference to founder Ayele Atnash. «ግጥም አይነቃነቅም የብረት ዲጂኖ፣ እንዴት ነህ አየለ የአራዳ ተርሲኖ?» meaning "firm as a metal steal, how are you Ayele Atnash, Arada's Tersino?" In reference to outstanding players Elias (who later became a pilot) and Yidnekachew. «በሰማይ ኤልያስ በምድር ይድነቃቸው፣ ለመታሰቢያነት እግዜር ፈጠራቸው።»meaning "Elias on the sky, Yidnekackew on land, God created them in tribute." Academy In 2017, Saint George finished construction on Yidnekahew Tessema Sport Academy, the club's first youth academy, in the city of Bishoftu (Debre Zeyit). The academy is named after Yidnekahew Tessema, a former Saint George and Ethiopian national team player who rose to prominence in African football as CAF president (1972 -1987). The academy, built at a cost of over 60 million ETB, lies on 24,000 hectares of land and is expected to accommodate over 100 youth players at one time. The facilities at the academy include: two football pitches, a cafeteria, a conference center, a game room, dressing rooms,a modern medical center, a gym, and dormitories. Grounds Saint George plays its home matches at Addis Ababa Stadium, also known as Yidnekachew Tessema Stadium. Due to it being the largest international standard stadium in the area, the ground is shared with many other Addis Ababa-based clubs including Ethiopian Coffee, Defense, Addis Ababa City, EEPCO, and formerly CBE SA. Since 1999, fee-paying supporters have owned St. George. In November 2007, the club had finished raising funds and would begin construction of a new stadium. Budgeted at 312 million Birr, 80% of the cost would be covered by Sheik Mohammed Al Amoudi with the balance to be contributed by the club's supporters. Honors Domestic Titles Ethiopian Premier League: 29 1950, 1966, 1967, 1968, 1971, 1975, 1985, 1986, 1987, 1990, 1991, 1992, 1994, 1995, 1996, 1999, 2000, 2002, 2003, 2005, 2006, 2008, 2009, 2010, 2012, 2014, 2015, 2016, 2017 Ethiopian Cup: 12 1952, 1953, 1957, 1973, 1974, 1975, 1977, 1993, 1999, 2009, 2011, 2016 Ethiopian Super Cup: 16 1985, 1986, 1987,1994, 1995, 1996, 1999, 2001, 2002, 2003, 2005, 2006, 2009, 2010, 2015, 2017 Regional Titles Addis Ababa City Cup: 6 2009, 2010, 2011, 2013, 2017, 2019 Performance in CAF competitions CAF Champions League: 9 appearances 1997 – First Round 2000 – First Round 2001 – First Round 2003 – Preliminary Round 2004 – First Round 2006 – First Round 2007 – First Round 2010 – Preliminary Round 2011 – Preliminary Round 2013 – Preliminary Round 2015 – Preliminary Round 2016 – First Round 2017 - Group Stage African Cup of Champions Clubs: 10 appearances 1967 – Semi-Final 1968 – First Round 1969 – First Round 1972 – Second Round 1976 – First Round 1986 – Second Round 1991 – withdrew in First Round 1992 – Preliminary Round 1993 – Preliminary Round 1996 – Second Round CAF Confederation Cup: 1 appearance 2012 – First Round CAF Cup: 1 appearance 2002 – Second Round CAF Cup Winners' Cup: 3 appearances 1975 – First Round 1978 – Preliminary Round 1994 – Second Round Players First-team squad As of 12 January 2020 Club Officials President: Ato Abinet Gebremeskel Secretary: Neway Beyene Director of Sport: Kasshun Gezaw Team Leader: Tafess Bekele Coaching and Medical Staff Head Coach: Srdan Zivojhov Assistant Coach: Zerihun Shengeta Medical Staff: Bekele Zenebe References External links Latest Ethiopian Football News Official Web Site Category:Football clubs in Ethiopia Category:Football clubs in Addis Ababa Category:Association football clubs established in 1935 Category:1935 establishments in Ethiopia
Confession Bear i don't think consumerism is the problem... people are just flipping idiots these captions aren't guaranteed to be correct
WELCOME TO MY WEBSITE; B-) THE GREATEST BLOG SITE. B-) My Name is Akanmu Kehinde Adeolu. [ Also Known As 'No Condition Is Permanent]. This website is dedicated in sharing, The Tips words of God, Word of Knowledge and Wisdom from God and to teach the people the purpose of being on earth, also on Educational, Inspirational, Emotional, Encourangement, Comfort, Blessing and Quotes of past Heroes. Hear this quotes, Do you know "It is possible for one not to know what he believe, but very impossible for one not to believe what he knows." "Believe in yourself, those who doubt themselves cannot succeed." FOUNDATION (BUILDING CONSTRUCTION). A foundation is that part of a building which is in direct contact with the ground and its primary aim is to transmit and spread the loads (dead and live) from the building over a sufficient area of soil to avoid undue settlement because of the failure of the underlying soil. A good foundation should satisfy the following requirements: a) It shall safely sustain and transmit to the ground the loads (dead, live and wind) in such a way as not to cause any settlement or other movement which would impair stability or cause damage to the whole or any part of the buildings or both. b) It shall be taken down to such a depth or be so constructed as safeguard the building from swelling, shrinking of freezing of the subsoil. c) The materials used must be capable of adequately resisting any attack by sulphates of any other deleterious matter and chemicals present in the subsoil. FACTORS AFFECTING THE CHOICE OF FOUNDTION The following are the factors affecting the choice of foundation: ^ Soil type ^ Site condition (topography/slope, water content/flood plain) ^ Type of construction ^ Magnitude of the load and intensity ^ Economic and other constructionak considerations ^ Type of building ^ The possible effect of weather element e.g. rain. TYPES OF FOUNDATION The major types of foundation are: ^ STRIP FOUNDATION: This is the commonest type of foundation used or adopted in building one or two storey building and at most four storeys on firm non-shrinkable sub-soils such as gravel or laterite. It consists of continuous strip of concrete either in ratio 1:3:6 or 1:2:4. Strip foundation can be normal, Deep or Wide. ~NORMAL STRIP FOUNDATION: is when the width of the foundation footing is not more than three times the wall thickness ~DEEP STRIP FOUNDATION: is when the depth of the foundation is up to 900mm. It is used especially in shrinkable clayey soil to counteract the variations of soil conditions at different seasons. ~WIDE STRIP FOUNDATION: is used to spread the load over a larger area of soil; it is used in soil with low bearing capasity such as clayey, marshy ground, silt and build-up soils. The concrete is usually reinforced in both the transverse and longitudinal direction. ^ PAD FOUNDATION These are isolated foundations constructed of reinforced concrete to support columns and mostly used in framed building construction. They can be used to carry point loads or can be designed so that the loads of the walls and the buildings are transferred through ground beams that rest on pad foundations. The pad foundation transfers the loads to a lower level where soil of sufficient load bearing strata exists. Pad foundation can be inform of isolated column foundation, continuous column foundation or combined column foundation. ^ RAFT FOUNDATION A raft foundation is one which covers the entire area of the buildings may extend beyond it. It consits of concrete that is suitably reinforced and up to 300mm thick. It is best suited for use on soft natural ground, soft clay, alluvial deposits. Compressible fill or on ground that is liable to subsidence as in mining areas. Their advantage over strip foundation is in the ability to act as a single unit thus eliminating differential settlement. Major forms of raft foundation SOLID RAFT FOUNDATION: This consists primarily of reainforced concrete slab up to 300mm thick which is often thickend under load bearing walls. BEAM AND SLAB RAFT FOUNDATION: This is like inverted reinforced concrete floor with upstand beams between the bases of columns. The beams collected the beams and slab spreading the loads over the whole area. However, if the surface of the slab is to serve as a floor, then the raft with downstand beams is used. CELLULAR RAFT FOUNDATION: This is mostly used in basement construction and can be constructed either as bouyancy, basement or box raft foundation. ^PILE FOUNDATION This is frequently used where the subsoil is poor or uncertain bearing capacity of where there is likely to be appreciable ground movement as with firm or where it is necessary to transmit the building load through a weak and unstable soil conditions to a lower stratum of sufficient bearing capacity. The choice of the type to be used depends on the soil and advice of foundation experts while the distribution of the piles is influencfd by the design of the building, the loads to be carried and the load bearing capacity or the strenght of the piles. Pile may be constructed of reinforced concrete, timber, steel or combination of any two.
Q: jQuery KeyUp causes page to refresh So working with an area with enter should add a result, it works but it also refreshes the page afterwards. var targetX, targetY; var tagCount = 0; $(function(){ $('#tag').live('click', function(){ var iid = $(this).attr('p'); var img = $('#img-'+iid); $(img).wrap('<div id="tag-wrapper"></div>'); $('#tag-wrapper').css({width: $(img).outerWidth(), height: $(img).outerHeight()}); $('#tag-wrapper').append('<div id="tag-target"></div><div id="tag-input">Name<input type="text" id="tag-name"><span id="savetag">Save</span> <span id="canceltag">Cancel</span></div>'); $(img).click(function(e){ mouseX = e.pageX - $('#tag-wrapper').offset().left; mouseY = e.pageY - $('#tag-wrapper').offset().top; targetWidth = $('#tag-target').outerWidth(); targetHeight = $('#tag-target').outerHeight(); targetX = mouseX - targetWidth/2; targetY = mouseY - targetHeight/2; inputX = mouseX + targetWidth/2; inputY = mouseY + targetHeight/2; if($('#tag-target').css('display')=='block'){ $("#tag-target").animate({left: targetX, top: targetY}, 500); $("#tag-input").animate({left: inputX, top: inputY}, 500); }else{ $("#tag-target").css({left: targetX, top: targetY}).fadeIn(); $("#tag-input").css({left: inputX, top: inputY}).fadeIn(); } $('#tag-name').focus(); $('#canceltag').click(function(){ closeTagInput(); }); $('#savetag').click(function(){ alert($('#tag-name').val()); }); $('#tag-name').live('keyup', function(e){ if (e.keyCode == 13){ $('#savetag').click(); return false; } }); }); }); }); A: As we don't see your HTML markup, I can only guess, but most probably you've got your <input> element wrapped in a <form>. Even if you don't specify any attributes on it, it defaults to a GET request to the current URL, and it WILL submit as soon as you press the Enter key. The solution would be to bind a handler to the form's submit event and call preventDefault(). $('form').submit(function(e){ e.preventDefault(); });
M+N Architecture proudly announces the completion of the new Flash Entertainment Offices at twofour54 in Abu Dhabi. The space consists of a big open office area, where the main feature is the two big white tables which replace traditional work stations and can accommodate more than 50 employees. Thanks to their special design, the tables rise and bend, allowing people to pass through special “bridges” and move freely around the space. We congratulate with the design team and we thank all involved parties (in particular our client, Flash Entertainment, and the fitout contractor, Life Space interiors) for such a successful project and outstanding result.
I fail to see how extending the royalty 'freeness' through 2016 helps Mozilla, or any of the h.264 detractors. It's more likely a devious way to entrench the standard, then hold the world hostage six years from now. The Mozilla VP is exactly right. I see maybe two options: 1. A white knight (Google) buys the license and open-source's it. Unfortunately, probably extremely unlikely. 2. The open-source world bands together and improves the Ogg codec (or invents something new) to the point it can compete with h.264 in terms of quality and compression.
import { Scalar, CustomScalar } from '@nestjs/graphql'; import { ApolloError } from 'apollo-server-express'; import { StringValueNode } from 'graphql/language/ast'; @Scalar('Mac') export class MacScaler implements CustomScalar<string, string> { description = 'Mac properly validates numbers to be valid mac number or not'; parseValue(value: string): string { if (!value.match('[0-9a-f]{2}([-:]?)[0-9a-f]{2}(\\1[0-9a-f]{2}){4}$')) { throw new ApolloError('invalid mac number'); } return value; } serialize(value: string): string { if (!value.match('[0-9a-f]{2}([-:]?)[0-9a-f]{2}(\\1[0-9a-f]{2}){4}$')) { throw new ApolloError('invalid mac number'); } return value; } parseLiteral(ast: StringValueNode): string { return ast.value; } }
Epidermal growth factor is a potent inhibitor of renin secretion. Epidermal growth factor (EGF) is not only a cell mitogen but a potent vasoconstrictor that shares many properties with angiotensin II. Because EGF is localized in the kidney, we have studied the direct effects of EGF on renin secretion using both static incubations and perifusions of rat renal cortical slices. EGF at 5 x 10(-9) M significantly inhibited renin secretion in static incubations (control, 100 +/- 3%; EGF, 72 +/- 3%; p < 0.001). When added to perifusions, EGF acted rapidly, reducing renin secretion at the earliest time period (10 minutes). Similarly, transforming growth factor-alpha, which can bind to the EGF receptor, also inhibited renin secretion (control, 92 +/- 8%; transforming growth factor-alpha [2 x 10(-9) M], 63 +/- 4%; p < 0.02). Because both prostaglandins and lipoxygenase products of arachidonic acid have been shown to play a role in some EGF-mediated actions, we examined these possible mechanisms of EGF action. Meclofenamate, a cyclooxygenase blocker, and BW755c and baicalein, both lipoxygenase blockers, were studied. None of these agents altered EGF-mediated renin inhibition. EGF action has also been coupled to the stimulation of tyrosine kinase activity; therefore, we examined the effects of the tyrosine kinase inhibitors genistein and quercetin. Both genistein (10(-5) M) and quercetin (10(-5) M) abolished the inhibition of renin by EGF (control, 100 +/- 3%; EGF, 82 +/- 4%; EGF plus genistein, 110 +/- 7%; p < 0.01; EGF, 75 +/- 4%; EGF plus quercetin, 92 +/- 4%; p < 0.01).(ABSTRACT TRUNCATED AT 250 WORDS)
The Sevilla 16-17 third kit introduces a stunning design, officially launched today. It is inspired by the sands of Sevilla’s La Maestranza de Caballería bullring, bringing the city’s competitive heritage to the European stage. Sevilla defender Coke said: “We’re very excited for the new challenges we face in Europe next season and we think this kit is great. We think the fans will really like the design. We all can’t wait to wear this on Europe’s biggest football stage.” Sevilla 16-17 Third Kit This is the new New Balance Sevilla 2016-17 third shirt. The New Balance Sevilla 2016-17 third shirt combines a citrus base with red, used for all logos as well as the stunning collar. The Sevilla crest on the front of the yellow Sevilla 16-17 third shirt is colored in monochromatic red. Richard Wright, General Manager of New Balance Football said: “Sevilla FC has had incredible success in Europe and we’ve developed this kit in conjunction with the club to ensure they are ready for the next European challenge. It’s heavily influenced by the city and it completes a really strong kit collection for Sevilla for the 16/17 season.” The Sevilla 16-17 third kit shorts and socks wil feature the same color as the shirt. Do you like the new Sevilla 2016-2017 third jersey? Let us know in the comments below.
The present invention relates in general to the reclosable bag art, wherein bags made from sheet material and more particularly plastic film are equipped with reclosable extruded zipper means wherein one bag wall has adjacent to the bag opening a zipper strip which has profile means interlockable with complementary profile means on the opposite bag wall. More particularly, the invention relates to the zipper means and new and improved profile structure therefor. The present invention is particularly directed to extruded zippers of the kind wherein a single generally hook-shaped profile rib on one zipper strip is releasably interlockable within a single generally channel shaped or grooved complementary profile having confronting spaced generally hook-shaped lip means releasably interlockable with the hook-shaped rib profile. A prior art example of such zipper structure is seen in U.S. Pat. No. 4,101,355. The foregoing zipper structure is distinguishable from zipper structures of the multi-hook and groove type as exemplified in U.S. Pat. No. 4,430,070, wherein both of the releasably interlockable profile strips have similar profile rib hooks and complementary grooves shaped for mating with the profile hooks of the companion strip. A problem encountered with the single rib and groove profile zipper strips that is not encountered with the multicomplementary rib and groove zipper strip resides in that whereas the multi groove profile presents a fairly stable, generally square or rectangular shape resisting deformation in handling, the single hooked rib profile has heretofor generally lacked such stability, though some attempts have been made to correct this problem, as in copending application U.S. Ser. No. 866,917 filed May 27, 1986.
Q: Searching for the last instance of data in a list I have an assignment to write a function that searches for the last instance of data (integer in this case) in a list. The function breaks with access violation on the line with if statement. Node* List::SearchLast (int val) { Node* pLast=NULL; Node* pNode=pHead; while (pHead!=NULL) { if (pNode->data==val) pLast=pNode; pNode=pNode->next; } return pLast; } I tried watching what happens with pNode.Here it becomes zero as it should.But then just passes the while statement. What am i doing wrong? A: Your while is an infinite loop, change to: Node* List::SearchLast(int val) { Node *pLast = NULL; Node *pNode = pHead; while (pNode != 0) { if (pNode->data == val) pLast = pNode; pNode = pNode->next; } return pLast; }
Q: Taking signs out of columns of matrix My textbook presents the following matrix and asks to find its determinant: $$d=\left|\begin{array} --1&1&-2\\-1&-1&-4\\-1&1&-7\end{array}\right|$$ And then says that it takes the negative sign from the first column and the negative sign from the third column so that the matrix becomes: $$d=\left|\begin{array}11&1&2\\1&-1&4\\1&1&7\end{array}\right|$$ I understand that it is possible to multiply any row by -$1$, but if I were to multiply every row by $-1$ then the second column would have the signs inverted. Any hints on how this is possible to take the negative signs out of the matrix? A: Rather than premultiplying the matrix, try post multiplying the matrix by $diag(-1, 1, -1)$ to achieve that result. $$\begin{bmatrix}-1 & 1&-2\\-1&-1&-4\\-1&1&-7\end{bmatrix}\begin{bmatrix}-1 & 0&0 \\ 0&1&0\\0&0& - 1\end{bmatrix}= \begin{bmatrix}1&1&2\\1&-1&4\\1&1&7\end{bmatrix}$$ In terms of determinant, we can perform elementary column operations. You can view it as taking transpose (transpose doesn't change the determiant), perform row operations, then taking transpose back again.
Q: Questions of 'Designing for Performance' document at Android Developer site In the Avoid Creating Objects section of the page Designing for Performance in the Android Developer documentation I read some paragraphs for which I am not able to visualize a code representation: An array of ints is a much better than an array of Integers, but this also generalizes to the fact that two parallel arrays of ints are also a lot more efficient than an array of (int,int) objects. The same goes for any combination of primitive types. How would these 'parallel arrays of ints' look like? Would it be something like instead of having a method with a signature such as getData():int[][] returning [a][b] [c][d] [e][f] ... it would be better to have two methods, each returning one of the 'columns' of data? as in: getFirstDimensionData():int[] [a] [c] [e] and a second one getSecondDimensionData():int[] [b] [d] [f] What is an 'array of (int,int) objects? ... something like an array of objects of a-type-not-yet-defined that has two int member instances defining its state? The immediate next paragraph: If you need to implement a container that stores tuples of (Foo,Bar) objects, try to remember that two parallel Foo[] and Bar[] arrays are generally much better than a single array of custom (Foo,Bar) objects. ... makes me think that the author is making up some sort of notation. I guess my key question is: is the author of the page using this (somethingX, somethingY) notation to refer to an arbitrary class that 'wraps' the elements inside the parentheses? Finally, is this a standard notation or just something the author of the page created by himself and omitted to explain? Can anyone, please, shed some light? :) Thanks in advance, Y A: What they're saying is that class foo { int a; int b; } foo[] bar; Is slower than int[] foo; With foo[row*2] being a and foo[row*2+1] being b. The notation (foo, bar) is trying to symbolize a class that contains foo and bar (like (a,b) in my above example). I don't believe it's a standard notation, but it wouldn't be the first time I've been proven wrong.
A common ancestor for Candida tropicalis and dehydrogenases that synthesize antibiotics and steroids. Candida tropicalis peroxisomes contain a 905-residue trifunctional enzyme with hydratase-dehydrogenase-epimerase activity that is important in fatty acid beta-oxidation. At its amino terminus are two tandem copies of an approximately 280 residue domain of unknown function. We provide evidence that this domain is homologous to oxidoreductases used for metabolizing sugars and synthesizing antibiotics and steroids such as estradiol, androstenedione, corticosterone, and hydrocortisone. The trifunctional enzyme shows no sequence similarity to the bifunctional hydratase-dehydrogenase found in animal peroxisomes and plant glyoxysomes, which are homologs of each other. We suggest that the C. tropicalis trifunctional enzyme and the animal and plant bifunctional enzymes have different ancestors.
Protect yourself from the elements from chin to finger tips, proving that you can be styling and cozy at the same time. An elegant cable panel and flattering shaping complement the generous cowl neck and extra-long sleeves. Julie’s Sweater is worked in the round from the bottom up. Set-in sleeves are picked up from the armholes and worked down to the cuff, using short rows to form a sleeve cap. A cowl collar is picked up from the top edge and optional thumbholes are worked in the extra long sleeves.
Subscribe to our weekly newsletter and be kept up to date on the latest Linux releases. Your email address will only be used for this newsletter, and you can unsubscribe at any time with a single click. GhostBSD is a simple, user-friendly operating system, based on the legendary security and stability of FreeBSD operating system. Within the BSD community, FreeBSD itself is renowned for being exceptionally stable, robust, and lightweight operating system that provides an excellent base for Desktop. However, FreeBSD is aiming at servers, router, storage appliance, and it is also considered to be beyond the reach of those who lack the technical expertise required to use it. GhostBSD provides all the benefits of the FreeBSD operating system combined with a focus on simplicity for newcomers. GhostBSD is ship with a simple installer, including MATE or XFCE desktop environments, pre-installed, with a graphical application to easily install software and update your system, codecs to play multimedia files is also pre-installed. GhostBSD is suitable for newcomers to BSD as well as *nix experienced users. With modest hardware requirements, GhostBSD is ideal for modern workstations, and single board computers 64-bit hardware.
The Television Critics Association gave out its annual TCA Awards Saturday night, and 'Mad Men,' 'Game of Thrones' and 'Modern Family' were among the winners. 'Friday Night Lights' was named Program of the Year, and several of the show's actors stood on the stage with executive producer Jason Katims as he gave a heartfelt speech about how hard it was to let the show go after five seasons. 'Game of Thrones' was named Outstanding New Program, 'Mad Men' won as Outstanding Drama and for the second year in a row, 'Modern Family' won as Outstanding Comedy. The full list of winners, plus five awesome things that happened during the ceremony, is below. 'Mad Men' cast members John Slattery, Jon Hamm, Christina Hendricks and Elisabeth Moss turned up at the TCA Awards, as did creator Matthew Weiner and other writers and producers from the show. After the awards, Slattery happened to mention that he's directing the fifth episode of the season. He directed two episodes last season, and of course it was announced some time ago that Jon Hamm will be directing an episode of the show for the first time when it goes into production on Monday. (It'll be a while until we see those episodes. AMC hasn't given an exact date for 'Mad Men's' return -- the network has only said it would be back in "early 2012." Weiner said after the ceremony that he was told the show could return in March -- but that date wasn't certain.) Much of the cast of 'Modern Family' turned up as well, but 'Game of Thrones' producer Carolyn Strauss picked up the award for the HBO show. She said that executive producers David Benioff and D.B. Weiss and the show's cast had wanted to be at the ceremony at the Beverly Hilton, but they were were in Belfast working on the second season of 'Thrones.' which went into production July 25. It was a most enjoyable night, and here is a very subjective list of Five Awesome Things That Happened at the TCA Awards: • Comedy legend Carl Reiner came to the ceremony, and he got a standing ovation when 'The Dick Van Dyke Show,' which he created, got the Heritage Award. In his acceptance speech, he told the story of how he came to write a comedy about his own life (he was a writer for a variety show who lived in New Rochelle, N.Y., and had a wife and two kids), and how the pilot he shot with himself as the star wasn't that great. His agent wanted to revive the project, but Reiner said he didn't want to fail twice with the same material. His agent's response, according to Reiner: "You won't fail, because we'll get a better actor to play you." That line got one of the biggest laughs of the night. • Rose Marie, who also came to the ceremony, got a standing ovation when Reiner talked about her contributions to the show. When Rose Marie spoke, she said she was proud of having been the one to suggest Morey Amsterdam for the role of Buddy. (And yes, if you're wondering, the actress was sporting that famous black bow in her hair.) • Oprah mocked herself! She couldn't be at the ceremony to receive her Career Achievement award, so she sent a pre-taped acceptance speech, in which she threatened to talk for 19 minutes -- one minute longer than the 18-minute Oprah filibuster that was delivered in response to a question at the January TCA press tour. Oh, Oprah, you jokester. Of course, she didn't speak that long -- her speech was short and sweet and gracious. (Yet by not coming, she denied me the chance to say, as drug-addled Liz Lemon once did, "I'm snitting next to Borpo!") • Host Nick Offerman was a hoot and a half. He showed a short film about what it took for him to get into character -- it began with a boy who looked about 10 (allegedly that is who he is before he's been fully Offermanized). The boy ate mountains of bacon, drank a bacon shake and then worked on his car, all of which helped his burgeoning mustache grow. Finally he engaged in bare-knuckle boxing, which was the final step of the transformation in to the Full Offerman. Later, to show his range as an actor, he recited famous lines from movies ("You had me at hello.") in a very Ron Swanson-esque monotone. (After every recitation, which included Yoda's "Judge me by my size, do you?" speech, Offerman paused and deadpanned, "Powerful stuff.") He sang a funny song set to the tune 'Walk the Line' about reading mean commenters on the Internet (because he has a delicate ego, "he should stay offline"). And that was great, but Offerman doing Yoda lines had to be the high point of his hosting gig. It doesn't get much better than that. (Offerman needs to take that show on the road -- preferably to Comic-Con). • Jason Katims took the stage with many of the writers and several cast members (including Connie Britton and Kyle Chandler) from 'Friday Night Lights' to accept the Program of the Year award (and they got a standing ovation as well). He spoke about how much critics had done to help the show survive, and he said he had run into people in recent months who said they hadn't watched the 'FNL' finale because they didn't want to say goodbye to that world. He said he'd walk away from those conversations thinking that those people should just go ahead and watch the finale and give themselves closure, but then he said he'd actually been afflicted by the same problem, in slightly different form. He said he spent so many weeks editing the show's series finale that movers actually came and started taking furniture and equipment and away from the editing room he was in. Eventually that development forced him to come up with the final cut of the finale. Just the 'FNL' theme music playing as the cast and crew walked up to the stage had gotten many of the critics in the room misty, and by the time Katims ended his speech with "Texas forever," eyes were being dabbed all over the place. Update: Critic Alan Sepinwall has even more highlights from the evening here. Friday Night Lights is the best family show which we followed every week. Great acting by the cast and story by the writers. It was a welcome break from all the reality shows and cops & robbers. If another channel would pick up this show they would gain not only us and many more viewers. And that translate into more sponser's. I think this is the wrong way to look at it. Given its ratings, any fan of FNL should be *extremely* grateful that we managed to get five* seasons of the show. (*Four, if we pretend that Season 2 never happened...which we should.) NBC initially tried airing the show on Tuesdays and Wednesdays before moving it to Friday. People just didn't watch. A lot of blame can often be laid at the feet of networks when it comes to how they handle quality programming, and maybe NBC more than any other. But this is one example where it should be applauded for keeping a quality show on the air despite all odds.
Quote From now on, we expect trading relationships to be fair and to be reciprocal. YEARS OF UNFAIR TRADE PRACTICES: China has consistently taken advantage of the American economy with practices that undermine fair and reciprocal trade. For many years, China has pursued industrial policies and unfair trade practices—including dumping, discriminatory non-tariff barriers, forced technology transfer, over capacity, and industrial subsidies—that champion Chinese firms and make it impossible for many United States firms to compete on a level playing field. China’s industrial policies, such as its “Made in China 2025” plan, harm companies in the United States and around the world. China imposes much higher tariffs on United States exports than the United States imposes on China. China’s average tariff rate is nearly three times higher than the average United States rate. Certain products are even more imbalanced, for instance the United States charges a 2.5 percent tariff on Chinese cars, while China currently maintains a 25 percent tariff on cars from the United States. China has banned imports of United States agricultural products such as poultry, cutting off America’s ranchers and farmers from a major market for their goods. China has dumped and unfairly subsidized a range of goods for the United States market, undermining America’s domestic industry. In 2018 alone, the Trump Administration has found dumping or unfair subsidies on 13 different products, including steel wheels, cold-drawn mechanical tubing, tool chests and cabinets, forged steel fittings, aluminum foil, rubber bands, cast iron soil pipe and fittings, and large diameter welded pipe. In January 2018, the Trump Administration found that China’s overproduction of steel and aluminum, and the resulting impact on global markets, is a circumstance that threatens to impair America’s national security. The United States has run a trade in goods deficit with China for years, including a $375 billion deficit in 2017 alone. UNDERMINING AMERICAN INNOVATION AND JOBS: China has aggressively sought to obtain technology from American companies and undermine American innovation and creativity. The cost of China’s intellectual property theft costs United States innovators billions of dollars a year, and China accounts for 87 percent of counterfeit goods seized coming into the United States. United States Trade Representative’s (USTR) Section 301 investigation identified four of China’s aggressive technology policies that put 44 million American technology jobs at risk: Forced technology transfer; Requiring licensing at less than economic value; Chinese state-directed acquisition of sensitive United States technology for strategic purposes; and Outright cyber theft. China uses foreign ownership restrictions, administrative review, and licensing processes to force or pressure technology transfers from American companies. China requires foreign companies that access their New Energy Vehicles market to transfer core technologies and disclose development and manufacturing technology. China imposes contractual restrictions on the licensing of intellectual property and technology by foreign firms into China, but does not put the same restrictions on contracts between two Chinese enterprises. China directs and facilitates investments in and acquisitions of United States companies to generate large-scale technology transfer. China conducts and supports cyber intrusions into United States computer networks to gain access to valuable business information so Chinese companies can copy products. STANDING UP TO CHINA’S UNFAIR TRADE PRACTICES: President Trump has taken long overdue action to finally address the source of the problem, China’s unfair trade practices that hurt America’s workers and our innovative industries. In January 2018, the President announced his decision to provide safeguard relief to United States manufacturers injured by surging imports of washing machines and solar products. This was the first use of Section 201 of the Trade Act of 1974 to impose tariffs in 16 years. These actions responded to injurious trade practices by China and other countries, including attempts to avoid legally imposed antidumping and countervailing duties. Following the decision, Whirlpool announced 200 new jobs in Ohio. USTR and the Department of Commerce are working together to defend the right of the United States to continue treating China as a non-market economy in antidumping investigations until China makes the reforms it agreed to when it joined the World Trade Organization (WTO). President Trump’s Administration has successfully litigated WTO disputes targeting unfair trade practices and upholding our right to enforce United States trade laws. In February 2018, USTR won a WTO compliance challenge against China’s unfair antidumping and countervailing duties on United States poultry exports and China announced the termination of those duties. PROTECTING AMERICAN INNOVATION AND CREATIVITY: President Trump has worked to defend America’s intellectual property and proprietary technology from theft and other threats.
Q: How do I implement matrix.Transpose() for my non-static Transpose function? I have been given the following code in a test.cpp file to implement: cout << "Case 2: the non-static Transpose function" << endl; { double column[4] = {2, 1, 0, -1}; double row[3] = {2, 0, -1}; Matrix matrix = Matrix::Toeplitz(column, 4, row, 3); cout << "The original Matrix = " << endl; cout << matrix << endl; //This part of the code works matrix.Transpose(); //How do I implement this? cout << "The transposed version = " << endl; cout << matrix << endl; cout << "Press any key to continue ..." << flush; system("read"); cout << endl; } The way Matrix::Toeplitz(column, 4, row, 3) works is as follows: Matrix Matrix::Toeplitz(const double* column, const int noOfRows, const double* row, const int noOfColumns){ Matrix outT(column, noOfRows, row, noOfColumns); return outT; } So how would I implement matrix.Transpose()? My code so far is as follows: Matrix& Matrix::Transpose () { double newrow[noOfRows]; for(int i=0; i<noOfRows; i++){ int index = GetIndex(i,0); newrow[i] = data[index]; } double newcol[noOfColumns]; for(int i=0; i<noOfColumns; i++){ int index = GetIndex(0,i); newcol[i] = data[index]; } Matrix outT(newcol, noOfColumns, newrow, noOfRows); } This has no effect on cout<<matrix<<endl; I was thinking that Matrix outT(newcol, noOfColumns, newrow, noOfRows); should give new information (i.e. switching the column and row arrays) to the matrix object when implementing matrix.Transpose but it hasn't been working. Is this the correct format Matrix& Matrix::Transpose () for implementing matrix.Transpose()? A: Matrix::Transpose can't return a reference to a locally declared object. This will lead to many problems. See C++ Returning reference to local variable. It must return by copy (then, function can be const, as current object is not being modified): Matrix Matrix::Transpose() const { double newrow[noOfRows]; for(int i=0; i<noOfRows; i++){ int index = GetIndex(i,0); newrow[i] = data[index]; } double newcol[noOfColumns]; for(int i=0; i<noOfColumns; i++){ int index = GetIndex(0,i); newcol[i] = data[index]; } return Matrix(newcol, noOfColumns, newrow, noOfRows); } Then, you use it this way: Matrix transposed = matrix.Transpose(); // does not modify matrix object cout << "The transposed version = " << endl; cout << transposed << endl; If returning Matrix&, you need to have your method transpose the current object and return it (return *this), only useful to help caller to chain many operators (like doing m.Transpose().Transpose() for instance). Then, it could be (not tested): Matrix& Matrix::Transpose() { // backup old content double* backupData = new double[noOfRows*noOfColumns]; memcpy( backupData, data, sizeof(double)*noOfRows*noOfColumns ); // change matrix geometry int oldRowCount = noOfRows; noOfRows = noOfColumns; noOfColumns = oldRowCount ; // transpose matrix by copying from backup content for ( unsigned int line = 0; line < noOfRows ; ++line ) { for ( unsigned int col = line; col < noOfColumns; ++col ) { data[line * noOfColumns + col] = backupData[col * noOfRows + line]; } } delete [] backupData; return *this; } Then, you use it this way: matrix.Transpose(); // modifies matrix object cout << "The transposed version = " << endl; cout << transposed << endl;
INTRODUCTION ============ Heart failure (HF) is increasingly prevalent worldwide and is associated with significant morbidity and mortality. The lifetime risk of developing HF is one in five at the age of 40 years \[[@R1]\]. Over 5 million individuals in the United States have HF, and more than 550, 000 are diagnosed annually \[[@R2]\]. It is becoming a burden in health care, which results in greater \$39 billion annual cost in North American and £716 million (1.8% of the total NHS budget) in the United Kingdom \[[@R3]\]. HF is a global epidemic, but clinical characteristics and treatment may vary for patients with HF across geographic regions \[[@R4]\]. In China, 4.2 million individuals have HF, and cardiovascular disease is the leading cause of death \[[@R5]-[@R6]\]. In Japan, 1.0 million individuals were estimated to have HF in 2005, and this figure is expected to rise to 1.3 million by 2035 \[[@R7]\]. During the last 20 years, changes in society and economy in East Asia countries, such as the aging of the population and medical progress, have led to changes in the epidemiology of HF \[[@R8]\]. Some region-specific, epidemiological studies have been conducted in East Asia, especially in China and Japan \[[@R9]-[@R26]\]. These research studies included the populations in both urban and rural areas, and investigated the epidemiology of different age-groups of patients. The present review based on recent evidence, aims to update the epidemiology and management of HF in East Asian countries, including the prevalence/incidence, aetiology/comorbidities, treatment, prognosis, HF with preserved ejection fraction (HFPEF), and HF in older patients in East Asia. SEARCH STRATEGY =============== We searched PUBMED between 1 January 1990 and 30 June 2012 for articles concerned with the epidemiology of HF, risk factors for HF, drug treatment and prognosis of HF in populations in East Asia. The search terms were: HF, PEF, prevalence, incidence, aetiology, risk factor, drug management, prognosis, outcome, mortality, rehospitalization, China, Chinese, Japan, Japanese, Taiwan, Hong Kong, Korea, Mongolia, Malaysia, Singapore, Thailand, East Asia or the combination of these key words. We included epidemiological studies and clinical trials. Study populations of fewer than 720 people and duplicates were excluded. The articles meeting the eligibility criteria with full text were selected for data extraction. A total of 324 articles were retrieved by literature searches for reports on the epidemiology and treatment of HF in East Asia. Of these, 42 articles qualified for inclusion. PREVALENCE AND INCIDENCE OF HF ============================== The prevalence of HF was 6.7% in Malaysia, 4.5% in Singapore, and 1.3% in China respectively \[[@R16],[@R19],[@R20]\]. The reported incidence of HF in the Chinese population is 0.7 to 0.9 per 1000 \[[@R13],[@R15]\]. There are 1.8 million individuals with congenital cardiac abnormalities in China and 500, 000 new cases of HF every year \[[@R27]\]. A hospital-based study showed that the prevalence of Chinese patients with HF by age \< 40, 40 -- 49, 50 - 59, 60 -- 69, and 70 - 79 years was 6.7%, 10.7%, 18.8%, 23.5%, and 30.8% respectively (p\<0.01), while community-based studies demonstrated approximately doubling prevalence with each decade of age with 0.3% at age 35- 44 years, 0.6% at age 45-54 years, 1.3% at age 55-64 years, 2.6% at age 65-74 years, and 4.1% at age ≥75 years \[[@R11],[@R13]\]. On the other hand, the age of Chinese patients admitted for HF has significant reduced in recent years: 66.4 ± 14.1 years between 2000 and 2003, 64.9 ± 14.4 years between 2004 and 2006, and 64.2 ± 14.8 years between 2007 and 2010 (P \< 0.01) \[[@R11]\]. Age-adjusted hospital admission rates for HF increased by 38% in 1990s in Singapore \[[@R19]\], and hospital admissions for HF were about 35% higher in Malaysians than in Chinese in this study \[[@R19]\]. AETIOLOGY AND COMORBIDITIES OF HF ================================= In recent decades, the ischemic aetiology for HF has increased in East Asia populations but not as greatly as in Western populations. In a USA national registry, out-patients with HF had a relatively higher proportion of ischaemic aetiology (52.6%, 71.1% and 72.9% for those aged \<65, 65-76 and \>76 years, respectively) and prior myocardial infarction (MI) (34.3%, 42.8% and 41.5% for the respective ages) \[[@R28]\]. Asian Americans were reported to have higher prevalence of HF after acute MI \[[@R29]\]. Aetiology and comorbidities of HF in East Asia are given in Figure [1](#F1){ref-type="fig"}. The proportion of coronary artery disease (CAD) ranged from 25% to 47% in HF populations in mainland China, Taiwan, Hong Kong, Malaysia, and Japan \[[@R9]-[@R26]\]. Hypertension was the most likely comorbidity in Japanese patients with HF, with the highest rate of 74% \[[@R25]\], however, the lowest rate of hypertension (19%) was in Malaysia \[[@R15]\]. The prevalence of hypertension in HF was 23%-47% in mainland China \[[@R9]-[@R11],[@R14]\], 38.3%-41.3% in Taiwan \[[@R15]\], and 37% in Hong Kong \[[@R10]\]. Moreover, valvular disease appears to be a less common aetiology of HF in East Asia, reported in 15% - 35% of patients with HF in most of countries, but only 4% in Malaysia \[[@R18]\]. Diabetes and atrial fibrillation (AF) are also common comorbidities, with 12%-36% and 21%-42% prevalence respectively among HF patients \[[@R9]-[@R26]\]. Furthermore, renal dysfunction and anaemia are risk factors of HF. A hospital-based study of patients with HF in Canada indicated that Chinese patients had the highest rates of renal disease compared to white populations \[[@R30]\]. Data about comorbidities of HF were consistent in one community-based study and three hospital-based studies in China \[[@R9]-[@R11],[@R14]\]. The most common comorbidities were CAD, hypertension, and diabetes mellitus. Dilated cardiomyopathy, valvular heart disease, and AF were common comorbidities in these Chinese populations with HF. A 10-year survey of hospital in-patients with HF showed rheumatic valvular heart disease was the most frequent cause in patients aged less than 40 years old and dilated cardiomyopathy was most likely in patients aged 40-59 years \[[@R11]\]. Renal dysfunction was also common in Chinese patients with CHF, and the China Heart Survey showed that 34.3% patients with CHF had chronic kidney disease \[[@R12]\]. AF was another main cause of Chinese HF patients in 1990s and early 2000s, with the rate of 20.6%-23.2%9. Two Japanese studies (CHART-1, CHART-2) showed that an increasing trend towards ischemic aetiology (26.4%-47.1%) and comorbidities with diabetes (19.5-23.3%) and hypertension (47.4%-74.3%) in Japanese HF patients \[[@R20],[@R24],[@R25],[@R31]\], confirmed by the JCARE-CARD which revealed a prevalence of CAD in 32% of patients \[[@R22]\]. In the CHART-1 study between 2000 and 2005, CAD accounted for only 26.4% and the proportion of patients older than 65 years was 66% \[[@R20]\], but in the CHART-2 study between 2006 and 2010, CAD as a comorbidity increased to 47.1%, hypertension was 74.3%, and diabetes was 23.3% \[[@R22]\]. Additionally, JCARE-CARD showed that 57% patients with HF had anaemia \[[@R23]\], and the prevalence of AF was common (40%) in hospital-HF patients \[[@R21]\]. DRUG TREATMENT FOR HF IN EAST ASIA ================================== In East Asian countries, diuretics were the most common treatment, used in between 50.9% and 96.9% of patients, followed by renin-angiotensin system (RAS) inhibitors (59.2-76.5%). Prevalence of angiotensin-converting enzyme inhibitor (ACEI) and angiotensin-2 receptor blocker (ARB) use was 31.5-52.2% and 30.9-44.4% respectively. Nitrate use was variable (23.3-80.0%), and β-blocker use varied from 19.5-49.0% in China, Taiwan, and Japan, to only 9.3% in Malaysia. Aspirin was used in 41.2% of HF patients in Taiwan, 47.2% in Japan, and 55.7% in Malaysia. Warfarin was reported to be used in 40.8% Japanese patients with HF \[[@R9]-[@R26]\] (Fig. **[2](#F2){ref-type="fig"}**). The relatively high rates of aspirin and warfarin usage may reflect the underlying high prevalence of CAD and AF in these populations, but population-based data are lacking. Nitrates, diuretics, digitalis, ACEI, and β-blocker were the most commonly used agents in Chinese patients with chronic HF. Nearly half of patients with NYHA (New York Heart Association) Class III-IV were treated with the combination of ACEI and β-blocker, or diuretic, digitalis, ACEI and β-blocker. β-blocker therapy was most likely used in patients with NYHA Class II-III \[[@R14]\]. Although the administration of ACEI and β-blockers increased in recent years, their application in clinical practice did not achieve the level proposed by recent guidelines for HF management \[[@R32],[@R33]\]. Diuretics were the most commonly used drugs, in both younger (74·4%) and older (76·9%) patients in Taiwan, followed by ACEI and/or ARB and aspirin15. β-blocker use increased in the last decade, whilst diuretics and digitalis decreased in Japanese cohorts with HF. The usage of RAS inhibitors and β-blockers for overt HF patients in the CHART-1 and CHART-2 studies increased from 69.1% to 72.3% and from 27.9% to 49.0%, respectively. In contrast, the usage rate of loop diuretics and digitalis decreased from 76.3% to 50.9% and from 48.1% to 23.5%, respectively. New pharmacological therapies proposed by recent consensus guidelines for the management of HF \[[@R33]\], such as eplerenone and ivabradine, are less likely to be used in clinical practice in East Asia. There is very limited research data on these drugs in East Asian patients, who are under-represented in recent clinical trials in HF, e.g. only 8% of Asian patients in the SHIFT trial \[[@R34]-[@R35]\]. ANTITHROMBOTIC TREATMENT IN HF IN EAST ASIA =========================================== The comorbidities related to HF (such as CAD, AF) lead to a high risk of thromboembolic events, including stroke, pulmonary embolism and peripheral arterial embolism, whilst coronary ischaemic events also contribute to the progression of heart failure. CAD as a major aetiology of HF has increased with the societal and epidemiologic transition in East Asian countries and the prevalence of AF among patients with HF was 21-42% in those countries \[[@R9]-[@R26]\]. In a Japanese cohort study, 15% of HF patients were reported to suffer stroke \[[@R23]\]. The rate of aspirin use was consistent across Japan, Malaysia, and Taiwan (41.2-55.7%) \[[@R15],[@R18],[@R23]\]. Warfarin was used in 40.8% patients with HF in Japan, while 35% patients had AF and 15% patients suffered the stroke in this cohort \[[@R23]\]. However, only 5.1-5.2% patients with HF used warfarin in Malaysia and Taiwan \[[@R15],[@R18]\]. There were limited epidemiologic data from East Asia to evaluate the prevalence of comorbidities related to HF which may increase risk of thrombosis. Further research is required to provide such data in order to inform use of antithrombotic treatment for stroke prevention in HF patients. To date, four major randomized controlled trials of antithrombotic therapy in HF have been performed \[[@R36]-[@R39]\]. There was no significant overall difference in the composite end point of ischemic stroke, intracerebral hemorrhage, or death between warfarin and aspirin in WARCEF and there is no evidence to support routine anticoagulant therapy in HF patients without AF. As in other clinical trials, Asian patients are greatly under-represented. DEVICE THERAPY ============== Cardiac resynchronization therapy (CRT) and implantable cardioverter-defibrillator (ICD) therapies have not been widely used in treatment of HF in East Asia. CRT with defibrillator (CRT-D) became available in Japan in 2006 \[[@R40]\]. Large-scale epidemiological data regarding CRT-D, CRT-P and ICD are lacking in East Asian countries, and prospective data are required. CARDIAC REHABILITATION AND TELEMONITORING IN HF =============================================== There are scarce data on cardiac rehabilitation and telemonitoring or telemedicine in the management of HF in East Asia. A nationwide survey on the implementation of cardiac rehabilitation following acute myocardial infarction (AMI) showed that 0-9% of Japanese hospitals provided outpatient cardiac rehabilitation programs \[[@R41]\]. A Japanese study including 442 patients with AMI or coronary artery bypass graft surgery (CABG) suggested less favourable physiological and psychosocial outcomes in women than men \[[@R42]\]. Small studies suggest that short educational programmes in the outpatient setting can improve long-term outcomes in HF \[[@R43]-[@R44]\], but other studies show mixed results, and that cardiac rehabilitation may increase patient anxiety \[[@R45]-[@R47]\]. There may be a role for Chinese qigong exercise in cardiac rehabilitation \[[@R48]\]. PROGNOSIS AND OUTCOME OF HF =========================== Total mortality from HF was 2.2-8.8% in China, Taiwan, Singapore, Thailand, and Japan \[[@R19],[@R22],[@R23],[@R49]\]. 30-day mortality was similar in mainland China and Taiwan at 5.3% and 3.9% respectively \[[@R15]\]. In a 15-year trend analysis (from 1993 to 2007) in China, mortality of young patients with HF reduced \[[@R9]\], however, 30-day mortality in those individuals aged over 80 years increased from 9.8% to 20.0%. In this Chinese population, the 30-day hospital mortality showed a downward trend in HF patients with CAD, decreasing significantly from 9.3% in 1993-1997 to 3.8% in 2003-2007 (P\<0.001) \[[@R50]\]. In another Chinese cohort with chronic HF, including 6453 patients with mean follow-up of 3 years, HF mortality was 30.1% in CAD, 44.9% in dilated cardiomyopathy (DCM), 36.2% in hypertensive heart disease (HHD), and 13.1% in rheumatic heart disease (RHD). Chronic systolic HF due to CAD, DCM and HHD carried a worse prognosis than that of RHD \[[@R51]\]. A higher hospital mortality rate was associated with an increased number of comorbidities10. Mortality from HF decreased from 7.3 per 10 000 in 1991 to 6.1 per 10 000 in 1998 in Singapore, and the decline was greater in women19. But, Indians and Malays had a worse outcome compared to the Chinese, probably due to higher mortality and HF readmission rates. A possible explanation for the worse outcomes in Indians could be due to the higher prevalence of diabetes mellitus and atherosclerotic vascular disease \[[@R52]\]. The rehospitalisation rate was 23.4% to 40% in three Japanese HF cohorts. In Thailand, the rehospitalisation rate within 30 days after discharge was 14.1% \[[@R50]\]. The length of hospital stay (LOS) \> 5 days was the predictor of early readmission. Prognosis of HF in East Asia is shown in Table **[1](#T1){ref-type="table"}**. The prognosis and risk factors of HF in East Asia may be comparable with Western populations \[[@R53]\], although prospective data are lacking. Although survival after HF diagnosis has improved over time in North America, the death rate remains high, with nearly 50% of people diagnosed with HF dying within 5 years1. The reported 30-day in-hospital mortality of patients with HF ranged from 1.7-7.2% in North America \[[@R54]\]. The 30-day, 1-year, and 5-year case fatality rates after hospitalization for HF were 10.4%, 22%, and 42.3%, respectively \[[@R55]\]. Three-fourths of all HF hospitalizations are due to exacerbation of symptoms in patients with known HF. One-half of hospitalized HF patients experience readmission within 6 months \[[@R56],[@R57]\]. Consistent with the data from North America, diabetes was a significant prognostic risk factor in Japanese population. Age was also associated with higher risks of adverse outcomes. In one study, 70% patients were over 65 years, and women were mostly over 70 years \[[@R21]\]. Anaemia and lower haemoglobin were independently associated with long-term adverse outcomes, including all-cause death, cardiac death, and rehospitalisation \[[@R22]\]. Japanese HF patients with reduced eGFR had a higher incidence of all-cause death and re-admission because of worsening CHF \[[@R24],[@R26]\], whilst renal dysfunction was independently associated with advanced NYHA classes in a Chinese population \[[@R12]\]. Ventricular tachycardia or atrial fibrillation could impact the prognosis of patients with HF \[[@R58]\]. Advanced HF has an extremely high mortality and morbidity and is associated with poor quality of life. Future research is needed to identify high-risk individuals in order to improve patient outcomes. HFPEF IN EAST ASIA ================== The majority of data from East Asia regarding HFPEF is from Japanese studies. Several multicentre-studies demonstrated the prevalence of HFPEF from 26% to 45% in Japan \[[@R24],[@R59]\]. Patients with PEF (EF ≥50%) were more likely to be older and female. Hypertension and hypertrophic cardiomyopathy were more common in HFPEF, whilst MI or CAD were less common (JCARE-CARD data) \[[@R20]-[@R22]\]. Patients with HFPEF had higher prevalence of AF, and anaemia was also common (20-30%) and associated with higher mortality in HF patients. Renal failure and diabetes mellitus were the common comorbidities in patients with HFPEF. Calcium channel blockers (CCB) were used commonly in patients with HFPEF, whilst ACEI and β-blocker were less likely to be administered in those patients \[[@R60]\]. In-hospital mortality of HFPEF patients was 4.6% in Thailand and 2.2% in Singapore \[[@R50],[@R50]\]. CHART studies showed that all-cause mortality of Japanese patients with HFPEF at 1, 2, and 3 years was 7%, 16%, and 22%, respectively \[[@R24]\]. HFPEF patients had in-hospital mortality of 6.5%, which was not different from patients with reduced EF (\<40%) after multivariable adjustment (JCARE-CARD data) \[[@R22]\]. There was no significant difference in survival analysis for all-cause mortality or cardiac mortality between patients with reduced and preserved EF. Rehospitalization rates were 23.7% and 25.7% in reduced and preserved EF patients respectively, with no difference between groups (p=0.47). ELDERLY HF IN EAST ASIA ======================= The prevalence of HF increased in proportion with aging. Hospital-based studies showed that the prevalence of HF in patients aged 60 years was 23.5-30.8% in China. The annual incidence of HF was 14 per 1000 in men and 20 per 1000 in women older than 85 years in Hong Kong \[[@R16]\], and 22 per 1000 population in elderly people in Taiwan \[[@R15]\]. Hypertension was the most common cause of patients aged 60 years in a Chinese HF cohort, and multiple comorbidities were predominant in the elderly compared to the younger patients \[[@R8]\]. Therapy with nitrates, ACEI and ARB was most common in patients aged over 60 years compared to the patients aged less than 60 years. Combination therapy with diuretic, digitalis, ACEI, and β-blockers was common in the elderly with CHF. β- blocker use was used with equal frequency in elderly and young Chinese patients with HF. Patients greater than 85 years have a 25-fold higher risk of heart failure hospitalization, longer length of in-hospital stay, higher total medical expenditure and higher in-hospital mortality \[[@R15]\]. The 1-year mortality rate increased with age, reaching 40% for patients older than 85 years in Hong Kong \[[@R16]\]. The mortality of young patients with HF reduced during recent years in mainland China, but the mortality of very elderly patients (aged over 80 years) did not significantly decrease (Fig. **[3](#F3){ref-type="fig"}**). The proportion of elderly population is high in Japan. The prevalence of HFPEF patients older than 65 years was 66% (CHART-1 study) \[[@R24]\]. 70% of patients with HF were over 65 years, and women with HF were mostly over 70 years in Japan \[[@R21]\]. Among patients aged over 70 years with HFPEF, valvular heart disease was the most frequent aetiology in CHART-1 study in the early 2000s. However, subsequent Japanese studies, including CHART-2, JCARE-GENERAL and JCARE-CARD, showed that hypertension in patients with HF increased in prevalence and became the most common comorbidity. Older age was also associated with the adverse outcome and 1-year mortality rate was 9.1% in HF patients with mean age of 74 years \[[@R21]\]. Further detailed data from individual studies regarding the epidemiology and management of HF in East Asia are shown in the Appendix. CONCLUSION ========== The prevalence of HF ranged from 1.3 to 6.7% in East Asian countries, with increasing prevalence with age. In terms of aetiology of HF, ischemic heart disease has increased and valvular disease decreased in this region during the last 20 years. Patients with HF and preserved EF were more likely to be older, female, and to have hypertensive heart disease. The mortality of HF remains high, and increasing age, diabetes, anaemia, renal dysfunction, and AF are associated with adverse outcome. Although the usage of ACEI, ARB, and β-blocker therapy has increased in recent years, diuretics, nitrates, and digitalis are the most commonly used drugs. The increased usage of ACEI, ARB, and β-blocker may reflect the increasing role of coronary artery disease as the aetiology of HF and increasing adherence to international guidelines. However, more evidence is needed in East Asian settings for novel drugs such as eplerenone and ivabradine. Antithrombotic treatment for prevention of thromboembolism in patients with HF in East Asia requires further research. Declared none. CONFLICT OF INTEREST ==================== The authors confirm that this article content has no conflict of interest. Appendix ======== Table 1.Epidemiology and management of HF in East AsiaStudyCountry and SettingPopulation (n) Age, Mean (SD) Male, %Study Design and DatePrevalence/Incidence,% Mortality,% Rehospitalizaiton,%Aetiology/comorbidities, %DrugPei *et al*. 2011 \[6\]China7,319 CHF patients Age:59.6(16.9) Male:62.1%Retrospective 1993-200730-day mortalities: 5.3% Male: 5.4% Female: 5.2%1993-1998: Coronary heart disease: 37.2%\ Hypertension: 23.3%\ Diabetes mellitus: 12.3% Rheumatic vulvar disease:35.2%\ 2003-2007: Coronary heart disease : 46.8%\ Hypertension: 46.7%\ Diabetes mellitus: 21.1%\ Rheumatic vulvar disease: 16.6%Yin *et al*. 2011\[7\]China Beijing (Urban)6,949 patients with HF Male:4344 Female: 2605Retrospective 1993-2007Coronary artery disease: 45.0%\ Hypertension: 38.7%\ Valvular disease:27.5%\ Rheumatic valvular disease:21.8%\ Nonrheumatic valvular disease: 5.7%\ Diabetes mellitus: 18.3%Yu *et al*. 2011\[8\]China Hubei (Urban, rural)12,450 patients Age: 62 (15) Male: 7166, 57.6%Retrospective 2000-2010 12 hospitals\<40 years: 6.67% (830/12 450)\ 40-49 years: 10.7% (1336/12 450)\ 50-59 years: 18.8% (2342/12 450)\ 60-69 years: 23.5% (2920/12 450)\ 70-79 years: 30.80% (3835/12 450)\ ≥80 years: 9.53% (1187/12 450)\ NYHA class I: 0.60%,II: 23.20%,III:50.31%,IV: 26.50%Hypertension: 31.5%\ Coronary heart disease:28.2%\ Dilated cardiomyopathy: 26.6% Rheumatic valvular heart disease: 17.5% Aetiology: Age\<40: rheumatic valvular heart disease Age40-59 : dilated cardiomyopathy Age≥60 years: hypertensionDigitalis :47.5% Diuretics:68.8% ACEI:50.7% β-blocker:44.1% aldosterone antagonist :53.1%Liu, *et al*. 2011 \[9\]China1006 patients with CHF Age: 71.3(9.9) Male: 63.7%Retrospective 2005Chronic kidney disease: 34.3%Yang, *et al*. 2010 \[10\]China Xinjiang (6 localities, random sampling)8459 adults Age: 35 years overRetrospective Communities-basedHF: 1.26% Male: 1.61%; Female: 0.93% (p\<0.05) Age35- 44:0.29% Age45-54:0.60% Age55-64:1.32% Age65-74:2.55% Age≥75 years:4.10%Ma, *et al*. 2007 \[11\]China5189 patients with CHF Age: 62.9(13.4) Male: 49.5%Retrospective 1973-2002Aetiology Coronary heart disease:44.2% Rheumatic heart disease: 24.1% Pulmonary heart disease :19.0% Cardiomyopathy:4.8%Nitriate:80.0% Diuretics:71.8% Digitalis:68.1% ACEI:52.2% β-blockers:19.5%Tseng, *et al*. 2011 \[12\]Taiwan2692 patients with HF Age: 73(13) Male: 55%Retrospective Random sample of insurant 2005HF incidence: Age 20-60 years:88/100,000 Age≥65 years:21.8/100,000 In-hospital mortality: Total:3.9% Age 20-60 years: 2.7% Age≥65 years:4.2%Comorbidities: Age≥65 years: Hypertension:38.3% Infection:32.0% Ischemic heart disease:31.9% Age 20-60 years: Hypertension:41.3% Diabetes:35.5% Ischemic heart disease:29.8%Diuretics:76.3% ACEI:50.8% Aspirin:41.2% Digoxin:32.4% CCB:29.3% β-blockers:25.4% Clopidogrel:13.2% Warfarin:5.1%Hung, *et al*. 2000 \[13\]Hong Kong6203 patients with HF Male age: 72.4 Female age: 77.5 Male: 44%Retrospective 11 hospitals 1997Total incidence: 0.7 per 1000 Age\> 85: 20 per 1000(women); 14 per 1000 (men) Mortality:32%Sanderson, *et al*.1995 \[14\]Hong Kong730 patients with HF Male: 44%ProspectiveIncidence Women: 3.8/1000 Men: 3.0/1000Hypertension:37% Ischemic heart disease:31% Valvular heart disease:15%Chong, *et al*. 2003 \[15\]Malaysia1435 acute medical admissions Male: 62.9% Mean age: 63.6 yearsRetrospective Single-center6.7%(97/1435)Ischaemic heart disease: 49.5%(48) Hypertension: 18.6%(18) Dilated cardiomypathy: 4.1%(4) Valve disease: 4.1%(4) Anaemia:3.1%(3)Aspirin: 55.7%(54) Warfarin:5.2%(5) Diuretics:96.9%(94) β-blocker:9.3%(9) Digoxin:13.4%(13) Nitrate:54.6%(53) ACEI: 43.3%(42) Statin:2.2%(2)Ng, *et al*. 2003 \[16\]Singapore15774 admissions\ Age≥65 years\ Male: 46.6%\ Female: 53.4%Retrospective\ 1991-1998HF:4.5%\ HF 1991: 1436\ HF 1997: 2457\ Mortality:2.5%Koseki, *et al*. 2003 \[17\]Japan721 patients with HFPEF (EF≥50%)\ Age≥20years\ Male: 67.1%Prospective multicenter1-year mortality:8%Tsutsui, *et al*. 2007 \[18\]Japan2685 HF patients Age: 74(12)\ Male: 46%Prospective multicenter 2004-2005Mortality: 6.3%\ All-cause death:\ Hospital-HF:6.7%\ GP-HF:5.9%\ Cardiac death:\ Hospital-HF:2.9%\ GP-HF:1.7%Aetiology:\ Ischemic: 30%\ Hypertension:35% Valvular:26% Cardiomyopathic:15%\ Comorbidities:\ AF: 40%\ Prior history of HF:83%ACEI:31.5%\ ARB:30.9%\ ACEI or ARB:59.2%\ ACEI and ARB:3.3%\ β-blocker:27.4% Diuretics:62.0% Digitalis:43.0%\ CCB: 37.1%Hamaguchi, *et al*. 2009 \[20\]Japan\ 164 hospitals2675 patients with HF\ Age: 71.5(13)\ Male: 58.1%Prospective\ 2004-2007\ Average follow-up:2.4 years57% patients with HF had AnemiaTsuchihashi-Makaya, *et al*. 2009 \[19\]Japan1692 patients with HF\ Age ≥65: 69.3%\ Male: 59.7%Prospective\ 2004-2007\ Average follow-up: 2.4 yearsAetiology:\ Reduced EF:\ Ischemic:39.8%\ Hypertensive:21.6%\ Cardiomyopathic, dilated:36.3%\ Preserved EF:\ Ischemic:25.4%\ Hypertensive:44.3%\ Cardiomyopathic, dilated:5.1%\ (p\<0.001)\ Comorbidities:\ Reduced EF:\ Hypertension:50.4%\ Hyperlipudemia:28.8%\ Atrial fibrillation:24.5%\ Preserved EF:\ Hypertension:68.3%\ Hyperlipudemia:22.8%\ Atrial fibrillation:38.3%\ (p\<0.005)Shiba, *et al*. 2008 \[21\]Japan1,278 HF patients Age: 68.3(13.4) Male: 66%Prospective 2000-2005 Mean follow-up:3.5 yearsAetiology: Coronary artery disease:25.4% Valvular heart disease: 26.4% Non-ischemic cardiomyopathy:28.6% Comorbidities: Hypertension:47.4% Diabetes:18.9% Dyslipidemia:16.7% AF:41.8%Shiba, *et al*. 2008 \[21\]Japan1,278 HF patients Age: 68.3(13.4) Male: 66%Prospective 2000-2005 Mean follow-up:3.5 yearsAetiology: Coronary artery disease:25.4% Valvular heart disease: 26.4% Non-ischemic cardiomyopathy:28.6% Comorbidities: Hypertension:47.4% Diabetes:18.9% Dyslipidemia:16.7% AF:41.8%Shiba, *et al*. 2011 \[22\]Japan10,219 HF patients Age: 68.2(12.3) Male: 69.8%Prospective Multicenter 2006-2010Aetiology: Coronary artery disease: 47.1% Comorbidities: Hypertension:74.3% diabetes:23.3%RAS inhibitors: 72.3% Diuretics :50.9% β-blockers:49.0% Digitalis23.5%Hamaguchi, *et al*. 2011 \[23\]Japan2,675 patients with AF Age: 71(13) Male: 59.7%Prospective 2004-2005 Average follow-up:2.1 yearsNYHA class I:35.2%, II:55.2%, III:6.0%, IV: 3.6% All-cause death 14.7%(247) Cardiac death 8.8%(148) Rehospitalization 33.1%(557)Aetiology: Ischemic:32% Valvular:27.7% Hypertensive:24.6% Dilated cardiomyopathy:18.2% Comorbidities: Hypertension:52.9% Hyperuricemia:46.8% Diabetes mellitus:29.9% Dyslipidemia:24.8% Prior stroke:15.0% COPD:6.7% Smoking:37.7% Prior MI:26.9% AF:35.2%Aspirin: 47.2% Warfarin:40.8% Diuretics:88.2% β-blocker:48.6% Digitalis:30.9% Nitrate:23.3% ACEI: 37.4% ARB:44.4% ACEI/ARB:76.5% CCB:25.2% Statin:19.9%[^1] ![Aetiology and comorbidities in studies of HF in East Asia. CAD: coronary artery disease. AF: atrial fibrillation.](CCR-9-112_F1){#F1} ![Drug treatment or HF in East Asia. CCB: calcium channel blocker; ACEI: angiotensin-converting enzyme inhibitor; ARB: angiotensin- converting enzyme receptor inhibitor; RAS: renin-angiotensin system.](CCR-9-112_F2){#F2} ![Prevalence and mortality of HF in Chinese population with age.](CCR-9-112_F3){#F3} ###### Prognosis of HF in East Asia Author Country Patients (n) Year 30-day Mortality 1-year Mortality Mortality Rehospitalization ------------------------------- ----------- -------------- ----------- ------------------ ------------------ ----------- ------------------- Pei *et al*. \[[@R5]\] China 7319 1993-2007 5.30% \* \* \* Tseng *et al*. \[[@R11]\] Taiwan 2692 2005 3.90% \* \* \* Ng *et al*. \[[@R15]\] Singapore 15774 1991-1998 \* \* 2.50% \* West *et al*. \[[@R39]\] Singapore 1029(HFPEF) 2005-2009 \* \* 2.20% \* West *et al*. \[[@R39]\] Thailand 989(HFPEF) 2005-2009 \* \* 4.60% \* Koseki *et al*. \[[@R16]\] Japan 721(HFPEF) 2003 \* 8% \* 23.4% Tsutsui *et al*. \[[@R17]\] Japan 2685 2004-2005 \* \* 6.30% 40% Hamaguchi *et al*. \[[@R19]\] Japan 2675 2004-2005 \* \* 8.8% 33.1% HFPEF: Heart failure with preserved ejection fraction. \*: Non-available data. [^1]: GP: general practice; COPD: chronic obstructive pulmonary disease; CHF: chronic heart failure; HFPEF: heart failure with preserved ejection fraction; CCB: calcium channel blocker; ACEI: angiotensin-converting enzyme inhibitor; ARB: angiotensin-converting enzyme receptor inhibitor; RAS: renin-angiotensin system
Q: Finding Galois group of a separable polynomial The question asks the following: Let $E$ be the splitting field of $x^4-10x^2-20$ over $\mathbb{Q}$. Find $Gal(E/\mathbb{Q})$. Since this polynomial is irreducible by Eisenstein's criterion, we know that the Galois group acts transitively on the set of four distinct roots of this polynomial. However, after that, I am very lost as to how should I proceed. One approach which I thought of is to check the transitive subgroups of $S_4$, but that seems to make things more complicated. I would appreciate hints on this problem. A: Let $\alpha_1=\sqrt{5+3\sqrt{5}},\alpha_2=\sqrt{5-3\sqrt{5}}$, then the splitting field of $f$ is $E=\mathbf{Q}(\alpha_1,\alpha_2)$. As $f$ is irreducible, we know that $\alpha_1$ has degree $4$ over $\mathbf{Q}$. In particular, $\mathbf{Q}(\alpha_1)$ and $\mathbf{Q}(\alpha_2)$ are quadratic extensions of $\mathbf{Q}(\sqrt{5})$. They are equal if and only if $\alpha_1\alpha_2=\sqrt{-20}\in \mathbf{Q}(\sqrt{5})$, which is not the case (see comment in this answer). Now, $\alpha_2$ is a zero of $X^2+\alpha_1^2-10\in \mathbf{Q}(\alpha_1)[X]$, so $$|\operatorname{Gal}(E/\mathbf Q)|=[E:\mathbf{Q}]=[\Omega:\mathbf{Q}(\alpha_1)][\mathbf{Q}(\alpha_1):\mathbf{Q}]=2\cdot 4=8.$$ As $D_8$ is the only transitive subgroup of order 8 of $S_4$, we conclude $\operatorname{Gal}(E/\mathbf{Q})\cong D_8$.
Ball Cylinder Organic Eco Baby Rattle Toy - Natural Wooden Toy - Classic Rolling Baby Rattle Wood Toy Ball Cylinder - Montessori Infant Toy by WoodStoreGifts at Nicky's Blog. Hurry! Limited time offer. Offer valid only while supplies last. Educational wooden toys - it is an ideal toy for young children. They are happy to take on, as soon as they are able to withstand the tests which Product Description Educational wooden toys - it is an ideal toy for young children. They are happy to take on, as soon as they are able to withstand the tests which they are subjected to little pranksters. In this case you can be sure that the toy does not bring them any harm. Quality toys for children are covered by health safe for colors, so even if the baby will try them "to the tooth", nothing will happen to him. Large wooden toy expressive, whose main goal - prompting the baby to make their first "steps". It is great to push forward on any surface and it does not matter whether it is a smooth floor or carpet. Inside rattle plates, gently tapping the side of each other . And to reach the cherished goal can be great to make a noise, try to touch the ball inside and rolled on itself. You can play with your mother, "Who faster", can be used katalochku and for older children in the game of words, when meeting with the guests - just let your imagination run wild! Toy wonderful polished, very robust and reliable. Size: Length: 11 cm Diameter 7 cm Have questions about this item, or would like to inquire about a custom or bulk order? If you have any questions about this product by WoodStoreGifts, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message. First Name: Last Last: Email Address: Your Message: Related Best Sellers This colorful children's rosary is very sturdy. The Our Father Beads, and the cross are secured in place with white cord that is very strongly knotted. The wooden Our Father and Hail Mary Beads are each 12 mm in diameter and the cross is approximatel... Our wooden play gym is a must have for new parents because it is great for babies to play and stimulate development of their visual and motor skills. Our play gym:♥ WOODEN, ORGANIC: Made of unfinished alder wood and sanded to be silky smooth. ♥... Show your state pride with our original Alaska State RattleTM. This rattle is made from solid hardwood Cherry. This baby rattle is 100% organic, made from responsibly harvested woods, and is sure to last long enough to be passed down through several ... This beautiful building blocks set will inspire your child to have fun with numbers, helping your child learn to count! Made from cherry, maple, and walnut hardwoods, this set of 10 blocks are laser etched with a number on one side and the correspond... This cute toy will be great gift for any mom. You can buy it as pregnancy or baby shower gift, gift for Mother's day. The height of the soft toys - 6 inches (15 cm). Soft toy is safe & eco-friendly, made of cotton. and stuffed hypoallergenic filling... This listing is for a wooden baby gym frame and 6 crochet rattling mobiles: the bumble bee, plum, pear, slice of watermelon, apple, peach. Each fruit is hand crocheted from high quality 100% cotton yarn, stuffed with polyester filling and has a rattl... How nice to give your baby toys that have a soul. This is one of those toys. In this rattle - teether invested a lot of heart and work: completely hand made, perfect quality grinding. Rattle uncolored, covered with linseed oil of the highest quality,... Sign Up For Our Newsletter Sign up to be the first to know about our Exclusive Sales, Special Offers, & Member's Only Discounts!
Q: Is there a free component to convert arabic html to pdf? I need to take an HTML page in Arabic and convert it to a PDF. itextsharp doesn't work. Here is some example HTML with Arabic in it. <div> <table border="1" width="500px"> <tr> <td colspan="2"> aspdotnetcodebook اللغة العربية</td> </tr> <tr> <td> cell1 </td> <td> cell2 </td> </tr> <tr> <td colspan="2"> <asp:Label ID="lblLabel" runat="server" Text=""></asp:Label> <img alt="" src="logo.gif" style="width: 174px; height: 40px" /></td> </tr> <tr> <td colspan="2" dir="rtl"> <h1> <img alt="" height="168" src="http://a.cksource.com/c/1/inc/img/demo-little-red.jpg" style="margin-left: 10px; margin-right: 10px; float: left;" width="120" />تحويل محتوى الى ملف بي دي اف</h1> <p> مجموعة المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية. <a href="http://en.wikipedia.org/wiki/Brothers_Grimm"> الاخوان جريم/a> مجموعة المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية. <a href="http://en.wikipedia.org/wiki/Hood_(headgear%2529" title="Hood (headgear)">ا</a><a href="http://en.wikipedia.org/wiki/Hood_(headgear%2529">لهودد</a> <a href="http://en.wikipedia.org/wiki/Cape" title="Cape">ك</a><a href="http://en.wikipedia.org/wiki/Cape">يب</a> أو <a href="http://en.wikipedia.org/wiki/Cloak" title="ويكيبيديا">ويكيبيديا</a> مجموعة المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية. .</p> <p> مجموعة المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية.</p> <p> مجموعة المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية.</p> <p> مجموعة المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية. <a href="http://en.wikipedia.org/wiki/Hunter">الصياد</a>, مجموعة المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية. المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية.</p> <p> مجموعة المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية. <a href="http://en.wikipedia.org/wiki/Enchanted_forest">الغابة</a>, مجموعة المحتوى العربي، تعنى بتطوير مهارة الكتابة وتتبنى فكرة التعلم بالبحث والتعلم بالكتابة. المجموعة تضم الأعضاء الجادين الذين يكتبون ويريدون أن يتعلموا كيف يكتبون كتابة علمية وفكرية رصينه ويساهمون في انتاج محتوى عربي معاصر في الفكر والعلم والفنون والأداب بعيدا الكتابة الإبداعية. </p> </td> </tr> </table> </div> i use itextsharp to convert this content which is stored in DB to pdf file to be downloaded to the user A: do you have the c# code in hand? there is this online resource discussing how to use itextsharp to create PDF. is it a problem of characterset, font or right to left problem? http://www.devshed.com/c/a/Java/Creating-Simple-PDF-Files-With-iTextSharp/ http://www.codeproject.com/KB/graphics/ITextSharpHelperClass.aspx I hope it can help
Q: Jump div to bottom with out scrolling the page I have an inner div that contains a list with the most recent list item being at the bottom. The div is part of a larger page. Essentially i want the div to default to the end of the list item and the user will then scroll upwards within the div to see the older content. I do not want the page to be scrolled to the bottom of the div which would occur if i used the following function //Slide chat down to bottom $("#div").scrollTop(function(){ return $(this).height(); }); The outer div would be the page at large. therefore the user would need to scroll down to the inner div and then see the last list item. If they want they can then use the inner scroll bar to look up older items thanks A: You can do that in plain JavaScript: var inner = document.querySelector('.inner'); inner.scrollTop = inner.scrollHeight; DEMO
namespace NamespaceSample.Pages { public partial class Null : System.Windows.Controls.Page { public Null() { InitializeComponent(); } } }
UPDATED: Hashd and Iraqi Army advance into first neighborhood inside Tal Afar The Iraqi army's 11th Brigade and Shiite Hashd al-Shaabi paramilitaries have cordoned off al-Askari neighborhood in eastern Tal Afar and are ready to launch an incursion into the neighborhood, stated the Hashd. In the meantime, the Iraqi Defense Ministry's War Media Cell declared that the 11th Brigade and Hashd al-Shaabi forces have approached within 300 meters of Tal Afar’s center from the southeastern front. ....... 01:05pm ERBIL, Kurdistan Region - In the early hours of Tuesday, the Iraqi Army, together with Shiite Hashd al-Shaabi paramilitaries broke into the first neighborhood of the predominantly Turkmen town of Tal Afar west Mosul. Hashd al-Shaabi media announced that their forces together with the Iraqi Army entered al-Kifah neighborhood in the northwestern part of the city. "The Popular Forces and the Federal Police continue to advance according to the security plans in Al-Kifah neighborhood, the first neighborhoods of Tal Afar from the northwest," read a statement from the Hashd. The statement added that the Hashd forces were able to shatter the first defensive line of ISIS in al-Jazira area from the southern front towards Tal Afar’s center, adding that axis of advance was only 400 meters away from Tal Afar center. The Hashd forces also announced their troops have beseiged the industrial zone west of Tal Afar mid-Tuesday. The advancing Iraqi troops have also entered al-Khadra neighborhood engaging in fierce fighting with ISIS militants, killing 10, and detonating a car bomb, according to the Hashd. They said they progressed with the help of heavy air cover. A Rudaw reporter covering developments on the ground near Tal Afar on Tuesday said the bulk of the villages retaken by the Iraqi army in the areas were already empty of residents and militants. He added that the Iraqi Army's 9th Division in a morning operation is moving towards the villages of Ashiq and Abu Haya east of Tal Afar. On Day 2 of the ‘We are Coming Tal Afar’ offensive, its commander Lt. Gen. Abdul Amir Rashid Yarallah, had declared the villages of Tal Rahal, Jabbara, Hussein Idris, Mullah and Majeed as being reclaimed from ISIS. Monday evening, the Hashd al-Shaabi announced that Iraqi forces have come within 900 metres of western Tal Afar. Also on Monday, the US-led coalition spokesperson Col. Ryan Dillon tweeted that Iraqi security forces had taken about 230 square kilometres of ground from ISIS in the past 24 hours. In the early hours of Sunday morning, Iraqi Prime Minister Haider al-Abadi announced the commencement of operations by security forces to retake the Tal Afar, which has a large Turkmen population as well as Arabs and Kurds. The US-trained Counter Terrorism Service (CTS), Federal Police, the Rapid Response Force, Iraqi Army, and Hashd al-Shaabi are taking part in the operation with the backing of the coalition. UNAMI stated more than 30,000 civilians have fled the area as of Sunday. An estimated 10,000 to 50,000 civilians are believed to still be living under ISIS control in Tal Afar and the surrounding areas, according to coalition figures. It has served as a key ISIS route between Iraq and Syria since 2014 and is the last major centre in northwestern Iraq still controlled by the terrorist group.
Q: How to build gRPC++ with OpenSSL instead of BoringSSL My project uses MySQL connector, which use OpenSSL as its dependency. I've integrate gRPC with my project using FetchContent, with OpenSSL installed in my system. But it still use BoringSSL. A: Add these to your CMakeList.txt set(gRPC_SSL_PROVIDER package)
Interim report on treatment of osteoporotic patients with 1 alpha-hydroxyvitamin D3 and calcium. Fifteen patients, 13 women and 2 men (mean age 60 years) with osteoporosis of different types have been under treatment with 1 alpha-hydroxyvitamin D3 and calcium. The responses were observed clinically and by the use of roentgen morphometry, photon absorptiometry and by blood and urine chemical analyses. The treatment had beneficial clinical effect in all but 3 patients. The intestinal calcium absorption rate increased significantly. Slight hypercalcemia and a significant hypercalciuria occurred during treatment. Serum and urine phosphate levels, alkaline phosphatase and parathyroid hormone values were within normal ranges. The bone mineral content increased significantly during treatment. 1 alpha-hydroxyvitamin D3 and calcium was well tolerated by the patients. Three patients had coincidental acute attacks of spinal pain and 2 had further vertebral crush fractures. A period of time longer than one year is necessary to further evaluate the effects of 1 alpha-hydroxyvitamin D3 therapy on the clinical course of severe osteoporosis.
Mahmud al Kashgari Mahmud ibn Hussayn ibn Muhammed al-Kashgari was an 11th-century Uyghur scholar and lexicographer of the Turkic languages from Kashgar. His father, Hussayn, was the mayor of Barsgan, a town in the southeastern part of the lake of Issyk-Kul and related to the ruling dynasty of Kara-Khanid Khanate. Al-Kashgari studied the Turkic languages of his time and in Baghdad he composed the first comprehensive dictionary of Turkic languages, the k">Dīwān Lughāt al-Turk in 1072-74. It was intended for use by the Abbasid Caliphate, the new, Arab allies of the Turks. Mahmud Kashgari's comprehensive dictionary, later edited by the Turkish historian, Ali Amiri, contains specimens of old Turkic poetry in the typical form of quatrains , representing all the principal genres: epic, pastoral, didactic, lyr
punjab Updated: Jun 03, 2016 18:05 IST Embarrassed to go door-to-door with condoms that now carry their name, the accredited social health activists or Asha workers have declined to help the government cover the state. Running a family-planning campaign Under National Health Mission, the Ministry of Health and Family Welfare is giving away free contraceptives such as condoms, besides regular and emergency pills, through these ground-level woman motivators. When the fresh stock arrived in May, the product name had changed from Deluxe. “First they exploit us as employees and now they malign our image,” said an Asha worker, adding: “People now call us and say: ‘Ek Asha dena (Give me one Asha)’. They have even started making jokes on us. It is awkward and undignified.” Also read I Roundabout: Counting condoms and that ‘condom bar’! The new, “more attractive” package (in the government’s views) carries the image of a gorgeous couple to seduce men. Asha Workers and Facilitator Union state president Kirandeep Panchola confirmed that all Asha workers in Punjab had boycotted the distribution of these condoms “until the government changes its name and we get a fresh supply”. Don’t Miss : 251 HIV-positive in Faridkot jail, HC seeks Punjab reply Panchola said the Asha workers would take the issue to National Health Mission managing director Hussan Lal on Friday. Hussan Lal was unavailable for comments in spite of repeated attempts to reach him. An Asha worker is a woman in the age group of 25 to 45 who is qualified up to Class 10 preferably. Provided with knowledge and a medical kit to deliver first-contact healthcare, every Asha (which in Hindi means hope) is expected to be a fountainhead of community participation in public health programmes in her village. Also read I Women’s jail, schools to get sanitary napkin-vending machines
// Licensed to Elasticsearch B.V. under one or more contributor // license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright // ownership. Elasticsearch B.V. licenses this file to you under // the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. package mage import ( "testing" "github.com/stretchr/testify/assert" ) func TestParseVersion(t *testing.T) { var tests = []struct { Version string Major, Minor, Patch int }{ {"v1.2.3", 1, 2, 3}, {"1.2.3", 1, 2, 3}, {"1.2.3-SNAPSHOT", 1, 2, 3}, {"1.2.3rc1", 1, 2, 3}, {"1.2", 1, 2, 0}, } for _, tc := range tests { major, minor, patch, err := ParseVersion(tc.Version) if err != nil { t.Fatal(err) } assert.Equal(t, tc.Major, major) assert.Equal(t, tc.Minor, minor) assert.Equal(t, tc.Patch, patch) } }
Complement component profiles in urticaria, dermatitis herpetiformis, and alopecia areata. Insignificant variation was noted in the mean levels of the complement components CIQ, C4, C2, C3, C5 and C3PA between various groups of sera from patients with urticaria, angio-oedema, dermatitis herpetiformis, alopecia areata, or hay fever. No deficiencies were found. Elevated C9 levels in chronic urticaria and angio-oedema reflected its nature as an acute phase protein. The assessment of C components in single or sequential serum samples revealed only marginal variations. Similar results were recorded for plasminogen the immunoglobulins, G, A and M. Some evidence is provided for the primary involvement of the kallikrein-kinin system in urticaria.
Q: How to re-publish a repository that was previously deleted from github? A couple months back I deleted a repo from github using "danger zone -> delete this repo" from the project control panel on github.com. Now I would like to put the code back up on github. I am using the github desktop application to push my code to github. In the github desktop application, github still thinks the old deleted repo is alive on my account ... so I can't push the code a second time. How can I completely remove the project from github so that I can push my code again? A: I have done this by removing the [remote "origin"] section from the .git/config file for the project and republishing the repository to github.
Joe Pannunzio was a standup guy off the field for the student-athletes of Alabama football; however, its running back position missed an important ingredient when Burton Burns took an off-field role last season. While balance was still obtained amongst players, the trust factor to lean on its rushing attack was not there for the Crimson Tide as it has been in recent years. Could it have been Pannunzio’s lack of experience with running backs prior to 2018? Maybe, nevertheless, the latest name to work with Alabama is someone that is seasoned at the position and has already produced a generational talent. Charles Huff, former assistant at Mississippi State University, sees Najee Harris as his second project for the next level. From 2015 to 2017, Huff transformed Barkley from a three-star to a record-setting household name at Penn State. The 6-foot, 233-pounder posted 3,843 career rushing yards with 43 touchdowns on 671 attempts – including 1,271 yards with 18 scores on 217 carries in 2017. As good as he was carrying the ball, Barkley was more dynamic at receiver. He brought in 102 career receptions for 1,195 yards with eight touchdowns, including an output of 54 catches for 632 yards and three scores in 2017. Behind Huff, Barkley was recognized as a consensus All-American, first-team All-Big Ten and Big Ten Offensive Player of the Year. Despite the New York Giants having a rough season, he was the franchise’s bright spot, tallying 1,307 yards rushing with 11 scores as a rookie. The No. 2 overall pick of the 2018 NFL Draft was awarded the league’s Offensive Rookie of the Year for his efforts, finishing second in the NFL in yards and fifth in touchdowns. After one season with the Bulldogs, Huff is prepared to pour all of him into Harris. A former five-star from California, he led Alabama in yards per carry average (6.7) and totaled 783 rushing yards with four touchdowns on 117 carries in 2018. Listed at 6-foot-2 and 230 pounds, Harris can hurdle, stiff arm and spin away from defenders with ease. He has to become more direct with his feet in attacking the hole, but consisted help from the offensive line should lead to Harris’ improvement. Harris has the skills to also become an efficient receiver; it will just come down to Tua Tagovailoa giving him an opportunity. When he first arrived in Tuscaloosa, Ala., everyone felt like Harris will be the next marquee rusher from the Tide for the National Football League. Pairing him with Huff allows for the program to work toward pursuing that vision. Harris is definitely ready for spring practice. *Get the BEST Alabama football insider information, message board access, and recruiting coverage today! SIGN UP HERE to unlock our subscriber only content!*
--- abstract: 'In the spectral density of Cr(001) surfaces a sharp resonance close to the Fermi level is observed in both experiment and theory. For the physical origin of this peak two mechanisms were proposed. A single particle *$d_{z^{2}}$* surface state renormalised by electron-phonon coupling and an orbital Kondo effect due to the degenerate *$d_{xz}$*/*$d_{yz}$* states. Despite several experimental and theoretical investigations, the origin is still under debate. In this work we address this problem by two different approaches of the dynamical mean-field theory. First, by the spin-polarized T-matrix fluctuation exchange approximation suitable for weakly and moderately correlated systems. Second, by the non-crossing approximation derived in the limit of weak hybridization (i.e. for strongly correlated systems) capturing Kondo-like processes. By using recent continuous-time quantum Monte Carlo calculations as a benchmark, we find that the high-energy features, everything except the resonance, of the spectrum is captured within the spin-polarized T-matrix fluctuation exchange approximation. More precisely the particle-particle processes provide the main contribution. For the non-crossing approximation it appears that spin-polarized calculations suffer from spurious behavior at the Fermi level. Then, we turned to non spin-polarized calculations to avoid this unphysical behavior. By employing two plausible starting hybridization functions, it is observed that the characteristics of the resonance are crucially dependent on the starting point. It appears that only one of these starting hybridizations could result in an orbital Kondo resonance in the presence of a strong magnetic field like in the Cr(001) surface. It is for a future investigation to first resolve the unphysical behavior within the spin-polarized non-crossing approximation and then check for an orbital Kondo resonance.' author: - 'L. Peters' - 'D. Jacob' - 'M. Karolak' - 'A. I. Lichtenstein' - 'M. I. Katsnelson' title: 'On the origin of the quasi-particle peak in Cr(001) surfaces' --- Introduction ============ In the growing field of spintronics the spin of the electrons is used to processes information. One popular possibility to achieve this is based on the different tunneling probabilities of spin-up and spin-down electrons in magnetic materials. Naturally these currents can be manipulated by a magnetic field. In order to apply this principle in practice for novel devices, it is crucial to understand the details behind the tunneling process [@tun1; @tun2; @tun3]. For example, an understanding of the surface density of states of the electrodes is important. Chromium magnetic multilayers is an example where complicated many-body effects at the surface determine the tunneling [@tun4]. Besides from a technological point of view, surface science is also fundamentally interesting. New and unexpected features may occur at surfaces. An interesting example is that of the topological insulators [@topin]. Another example, at the Cr(001) surface a sharp resonance close to the Fermi level is observed in angular resolved photoemission and scanning tunneling experiments [@arpes1; @arpes2; @arpes3; @dzsur1]. After this discovery many experimental and theoretical investigations were performed in order to understand the physical origin of this phenomenon. The first theoretical explanation was that of a single particle *$d_{z^{2}}$* surface state [@dzsur1; @okon6]. However, in order to predict the correct resonance position within this picture an unrealistic reduction of the magnetic polarization was required. Based on scanning tunneling spectroscopy on very clean Cr(001) surfaces a many-body picture in terms of an orbital Kondo effect due to the degenerate *$d_{xz}$* and *$d_{yz}$* states was proposed [@okon1; @okon2]. Additional temperature dependent scanning tunneling scpectroscopy experiments followed in order to clarify the situation [@okon3]. However, it appeared that both models were in agreement with the experimental data. Although for the *$d_{z^{2}}$* single particle picture an electron-phonon coupling strength 5-10 times larger than in the bulk was required. By combining scanning tunneling microscopy, photoemission spectroscopy and inverse photoemission spectroscopy one was able to show that the resonance above the Fermi level was mainly of *$d_{z^{2}}$* character [@okon4]. This contradicts the orbital Kondo interpretation. Although, one should realise that the resolution of inverse photoemission spectroscopy is too low to properly investigate the sharp resonance at low temperatures. On the other hand for the *$d_{z^{2}}$* single particle picture the large electron-phonon enhancement compared to the bulk remains questionable. The newest photoemission experiments show a pseudogap below roughly 200 K and the emergence of a sharp resonance below 75 K [@okon5]. Note that this type of behavior was not observed in earlier experiments. These newest experiments hint in the direction of a many-body interpretation of the resonance. Also recent dynamical mean-field theory (DMFT) calculations within the continuous-time quantum Monte Carlo (CTQMC) solver hint in this direction [@schuler]. Namely it was observed that the resonance was very robust against artificial shifts in the one-particle energies of the *$d_{xz}$*, *$d_{yz}$* and *$d_{z^{2}}$* states, which points towards a dominant many-body contribution. There are several disadvantages involved with employing the CTQMC solver. For example, it is very difficult to access temperatures at which the resonance is observed experimentally. Further, the consideration of the full Coulomb matrix becomes prohibitively expensive within CTQMC at low temperatures. Therefore, in Ref.  the lowest temperature that could be considered was still too high to observe the sharp resonance and only the density-density terms of the Coulomb matrix were taken into account. It is known that such an approximation to the Coulomb matrix can lead to qualitatively wrong results. [@fullcoul1; @fullcoul2] Apart from the approximation in the Coulomb matrix, the CTQMC method is essentially exact, i.e. all Feynmann diagrams are taken into account. Therefore, it is very hard to obtain a detailed understanding of the physical processes responsible for the observed spectral features. In order to avoid these disadvantages of the CTQMC method, we employed two approximate methods derived in two opposite limits and able to consider the full Coulomb matrix for temperatures far below where the sharp resonance is observed. The spin-polarized T-matrix fluctuation exchange (SPTF) approximation is derived in the limit of weak and moderate correlations in which the interaction can be treated perturbatively. [@sptf1; @sptf2] Although SPTF is known not to capture Kondo-like physics properly, it can be used to test whether the resonance has some other many-body origin. The non-crossing approximation (NCA) is derived in the limit of strong correlations, where the hybridization is treated as a perturbation. [@nca1; @nca2] Note that the NCA is basically designed to capture (orbital and spin) Kondo-like processes and is therefore the ideal candidate to test for the orbital Kondo effect [@davidprl]. From the limits in which SPTF and NCA are derived, it is clear that both methods consider totally different physical processes. By using the recent CTQMC results as a benchmark, we are able to trace down the physical processes responsible for the high-energy spectral features, everything except the resonance. These are the particle-particle processes within SPTF. For the NCA it appeared that spin-polarized calculations suffer from spurious behavior at the Fermi level. Then, we turned to non spin-polarized calculations to avoid this unphysical behavior. By employing two plausible starting hybridization functions, it is observed that the characteristics of the resonance are crucially dependent on the starting point. It appears that only one of these starting hybridizations could result in an orbital Kondo resonance in the presence of a strong magnetic field like in the Cr(001) surface. However, to unambiguously establish this, first a thorough investigation is required in order to resolve the unphysical behavior at the Fermi level within the spin-polarized NCA. Such an investigation is out of the scope of this work. In the following we first give a description of the SPTF and NCA methods. Then, we discuss the results of these methods and finally we make a conclusion. Theory ====== Dynamical mean-field theory --------------------------- Density functional theory (DFT) in its conventional local density approximation (LDA) or generalized gradient approximation (GGA) is known to be quite successful in predicting properties of real materials, i.e. structural properties, magnetic moments and band structures [@dft1; @dft2; @lda1; @lda2; @gga]. Since DFT is essentially a single particle approximation, and LDA and GGA are derived in the limit of a (nearly) uniform electron gas, this usually only holds for weakly correlated systems. For moderately and strongly correlated systems a proper treatment of correlation effects is missing. However, even for weakly correlated systems DFT will never be able to capture pure many-body effects like quasi-particle life-times or resonances. At that time it was also realized that Hubbard-like models perform well in describing (strong) correlation effects, i.e. Mott-insulator transition and quasi-particle peaks. Therefore, the idea came to describe the delocalized weakly correlated electrons of a system within DFT and for the strongly correlated electrons add by hand the most important missing part. From experience with Hubbard-like models this missing part is the onsite Coulomb interaction. Thus, this leads to a generalized Hubbard model. The main problem is to accurately solve this generalized Hubbard model for all interaction strengths. A huge breakthrough came with the discovery of the dynamical mean-field theory [@dmft1; @dmft2]. It was shown that in the limit of infinite dimensions or equivalently infinite nearest neighbors the self-energy becomes purely local. In other words in this limit only local diagrams survive leading to a k-independent self-energy. Since the topology of these diagrams are the same as those of an Anderson impurity model, the generalized Hubbard model can be mapped onto this model. The great advantage of this is that for the Anderson impurity model solvers exist. Thus, by peforming a mapping to the Anderson impurity model and then using one of the solvers, the local self-energy of the lattice problem (generalized Hubbard model) is obtained. This is a good approximation when the self-energy is purely local, i.e. in the limit of infinite nearest neighbors. However, from experience it is known that this limit is reached rather fast, already for two or three dimensions. By using quantum Monte Carlo methods, for example continuous-time quantum Monte Carlo (CTQMC), the Anderson impurity model can be solved numerically exactly, i.e. all Feynmann diagrams are taken into account [@qmc1; @qmc2]. However, the quantum Monte Carlo methods also have several disadvantages. One of them is that low temperatures are very hard to access. Another, the consideration of the full Coulomb matrix becomes prohibitively expensive at low temperatures. Further, since all diagrams are considered, it becomes very hard to obtain a detailed understanding of which physical processes are responsible for the observed spectral features. To avoid these disadvantages, numerically efficient perturbative solvers have been developed that are able to consider the full Coulomb matrix at low temperatures. In the limit of weak or moderate correlations the iterative perturbation theory and spin-polarized T-matrix fluctuation exchange approach have been derived [@ipt; @sptf1; @sptf2]. For the limit of strong correlations, where the hybridization can be treated perturbatively, the non-crossing and one-crossing approximation have been formulated [@nca1; @nca2; @oca]. SPTF ---- The idea of SPTF is to find a numerically efficient approach for the Anderson impurity model in the limit of weak (and moderate) correlations. In order to achieve this, the interaction is treated perturbatively. More precisely, diagrams known to be dominant for systems with low electron densities (and short-range repulsive potential) and high electron densities are considered. Since SPTF is exact in these two limits, it is also thought to provide an accurate description for systems with intermediate densities. From a large variety of SPTF calculations, it has appeared that a qualitatively satisfactory description of weak and moderate correlated systems can be obtained. [@sptfig1; @sptfig2]. The dominant diagrammatic contribution for a low density electron system with short-ranged repulsive interaction comes from the ladder diagrams in the particle-particle channel. The particle-particle channel consists of electron-electron and hole-hole contributions. It can be shown that in the regime of low densities the former dominates the latter. The particle-particle contribution to the self-energy within SPTF is given by $$\begin{gathered} \Sigma_{m_{1},m_{2}}^{TH}(i\omega_{n})=\\ \frac{1}{\beta}\sum_{i\Omega_{m}}\sum_{m_{3},m_{4}}T_{m_{1},m_{3},m_{2},m_{4}}(i\Omega_{m})G_{m_{4},m_{3}}(i\Omega_{m}-i\omega_{n})\\ \Sigma_{m_{1},m_{2}}^{TF}(i\omega_{n})=\\ \frac{1}{\beta}\sum_{i\Omega_{m}}\sum_{m_{3},m_{4}}T_{m_{1},m_{4},m_{3},m_{2}}(i\Omega_{m})G_{m_{3},m_{4}}(i\Omega_{m}-i\omega_{n}). \end{gathered} \label{eqsptfpp}$$ Here $\beta$ is the inverse temperature, $G$ is the single particle Green’s function, the $m_{x}$ labels refer to the strongly correlated orbitals, $\Omega$ and $\omega$ are respectively bosonic and fermionic Matsubara frequencies. Further, $\Sigma_{m_{1},m_{2}}^{TH}$ and $\Sigma_{m_{1},m_{2}}^{TF}$ correspond to the Hartree and Fock contributions with an effective interaction defined in terms of the T-matrix $$T(i\Omega_{m})=U-U\star \chi^{PP}(i\Omega_{m})\star T(i\Omega_{m}). \label{Tmatrix}$$ This equation is in terms of 4 index matrices, where $\star$ represents the according matrix multiplication. The $U$ represents here the bare onsite Coulomb interaction and $\chi^{PP}$ has a convenient representation in imaginary time $$\chi^{PP}_{m_{1},m_{2},m_{3},m_{4}}(\tau)=G_{m_{1},m_{3}}(\tau)G_{m_{2},m_{4}}(\tau). \label{chipp}$$ Note that the contributions of Eq. \[eqsptfpp\] include all first and second order contributions in the bare interaction exactly. In the high density electron limit the electron-hole bubble contributions become dominant, the random phase approximation. Besides this contribution there is another term known to be important for the description of magnetic fluctuations, the particle-hole ladder contribution. Both particle-hole contributions can be conveniently taken into account by introducing the following anti-symmetrized vertex $$U^{AS}_{m_{1},m_{2},m_{3},m_{4}}=T_{m_{1},m_{2},m_{3},m_{4}}(0)-T_{m_{1},m_{2},m_{4},m_{3}}(0). \label{asv}$$ Here the bare interaction has been replaced by the static value of the T-matrix of Eq. \[Tmatrix\], because these ladder particle-particle processes are known to be important for the renormalization of the interaction [@sptf1]. Then, the particle-hole contribution to the self-energy within SPTF can be written as $$\Sigma_{m_{1},m_{2}}^{PH}(\tau)=\sum_{m_{3},m_{4}}W_{m_{1},m_{3},m_{4},m_{2}}(\tau)G_{m_{4},m_{3}}(\tau). \label{eqsptfph}$$ Here the particle-hole fluctuation potential is given by $$W(\Omega)=U^{AS} \star \chi^{PH}(i\Omega)\star \big[I-U^{AS} \star \chi^{PH}(i\Omega)\big]^{-1} \star U^{AS} - W_{2}(i\Omega), \label{wph}$$ where the particle-hole susceptibility is $$\chi^{PH}_{m_{1},m_{2},m_{3},m_{4}}(\tau)=-G_{m_{4},m_{1}}(-\tau)G_{m_{2},m_{3}}(\tau). \label{chiph}$$ The term $W_{2}$ in Eq. \[wph\] is required to remove the second order contribution, which is already contained in Eq. \[eqsptfpp\]. NCA --- The NCA is a numerically efficient solver for the Anderson impurity model derived in the limit of strong correlations. In this limit the hybridization can be treated perturbatively. However, the machinery of quantum field theory (Wick’s theorem) cannot be applied straightforwardly, because the zeroth order term contains the many-body onsite interaction term explicitly. The zeroth order term is given by $H_{imp}$ in the (multiple orbital) Anderson impurity model $$\begin{gathered} H=H_{imp}+H_{bath}+V_{hyb}\\ H_{imp}=\sum_{\alpha,\sigma}\epsilon_{\alpha\sigma}d_{\alpha\sigma}^{\dagger}d_{\alpha\sigma}+\\ \frac{1}{2}\sum_{\alpha,\beta,\alpha',\beta',\sigma,\sigma'}U_{\alpha\alpha'\beta\beta'}d_{\alpha\sigma}^{\dagger}d_{\alpha'\sigma'}^{\dagger}d_{\beta'\sigma'}d_{\beta\sigma}\\ H_{bath}=\sum_{k,\nu,\sigma}\epsilon_{k\nu\sigma}c_{k\nu\sigma}^{\dagger}c_{k\nu\sigma}\\ V_{hyb}=\sum_{k,\nu,\sigma}V_{k\nu,\alpha}\Big(d_{\alpha\sigma}^{\dagger}c_{k\nu\sigma}+c_{k\nu\sigma}^{\dagger}d_{\alpha\sigma}\Big). \label{eqAIM} \end{gathered}$$ Here $\epsilon_{\alpha\sigma}$ are the single-particle impurity energy levels and $U_{\alpha\alpha'\beta\beta'}$ is the onsite Coulomb repulsion between the impurity states. Further, $H_{bath}$ resprents the bath of non-interacting electrons whose dispersion is given by $\epsilon_{k\nu\sigma}$. The last term $V_{hyb}$ describes the coupling between the impurity and bath states. By rewriting Eq. \[eqAIM\] in terms of pseudo-particles, the standard field theoretical perturbation theory can be employed again. Each pseudo-particle corresponds to a many-body eigenstate $|m\rangle$ and eigenenergy $E_{m}$ of the isolated impurity $$H_{imp}=\sum_{m}E_{m}|m\rangle\langle m|. \label{eqisimp}$$ Based on these eigenstates $|m\rangle$, pseudo-particle creation $a_{n}^{\dagger}$ and annihilation $a_{m}$ operators can be introduced with the following relation to the physical electron operators $$d_{\alpha\sigma}=\sum_{n,m}F_{nm}^{\alpha\sigma}a_{n}^{\dagger}a_{m}. \label{relphpp}$$ Here $F_{nm}^{\alpha\sigma}=\langle n|d_{\alpha\sigma}|m\rangle$ is the matrix element of the physical impurity electron operator. In terms of the pseudo-particle operators the Anderson impurity model is written as $$\begin{gathered} H=\sum_{m}E_{m}a_{m}^{\dagger}a_{m}+\sum_{k\nu\sigma}\epsilon_{k\nu}c_{k\nu\sigma}^{\dagger}c_{k\nu\sigma}\\ +\sum_{m,n,k,\nu,\alpha,\sigma}\big(V_{k\nu,\alpha}F_{nm}^{\alpha\sigma}c_{k\nu\sigma}^{\dagger}a_{m}^{\dagger}a_{n}+h.c.\big). \label{eqAIMpp} \end{gathered}$$ From this expression it is clear that the field theoretical perturbative techniques can be employed again, where the hybridization is now the interaction term. It describes the interaction among the pseudo-particles induced by the coupling to the bath electrons. Thus, the problem is to find a good approximation for the pseudo-particle self-energy $\Sigma_{m}(\omega)$ of the pseudo-particle propagator $$G_{m}(\omega)=\big(\omega-\lambda-E_{m}-\Sigma_{m}(\omega)\big)^{-1}. \label{greenpp}$$ Here $\lambda$ is the Lagrange multiplier of the Lagrangian constraint $\lambda(Q-1)$, which is required to ensure the completeness of the impurity eigenstates $$Q=\sum_{m}a_{m}^{\dagger}a_{m}=1. \label{constr}$$ Within NCA the pseudo-particle self-energy is approximated by an infinite resummation of diagrams with non-crossing conduction electron lines, which is exact to first order in the hybridization function $$\Delta_{\alpha}(\omega)=\sum_{k,\nu}V_{k\nu,\alpha}^{\ast}g_{k\nu}V_{k\nu,\alpha}. \label{ncahybfun}$$ Here $g_{k\nu}(\omega)=(\omega^{+}+\mu-\epsilon_{k\nu})^{-1}$ is the bare bath electron propagator. The diagrams included in NCA describe the processes where a single impurity electron (hole) hops to the bath and back. Hereby a pseudo-particle with $N+1$ ($N-1$) electrons is temporarily created. Notice that these processes are known to be responsible for the appearance of the Kondo peak at low enough temperatures. For completeness the expression for the pseudo-particle self-energy in NCA is given by $$\begin{gathered} \Sigma_{m}^{NCA}(\omega)=-\sum_{m',\alpha,\sigma}\Big[|F_{mm'}^{\alpha\sigma}|^{2}\int\frac{dv}{\pi}f(\nu)\Delta_{\alpha}^{"}(\nu)G_{m'}(\omega+\nu)\\ +|F_{m'm}^{\alpha\sigma}|^{2}\int\frac{dv}{\pi}f(-\nu)\Delta_{\alpha}^{"}(\nu)G_{m'}(\omega-\nu)\Big]. \label{selfnca} \end{gathered}$$ Here $\Delta_{\alpha}^{"}(\nu)$ is the imaginary part of the hybridization function in Eq. \[ncahybfun\] and $f(\nu)$ is the Fermi function. After the pseudo-particle self-energies are obtained self-consistently, they need to be translated in order to obtain real physical quantities. NCA is known to provide a good qualitative description of the Kondo resonance and Hubbard subbands [@nca1; @nca2]. Shortcommings are an underestimation of the Kondo temperature, an overestimation of the asymmetry and height of the Kondo resonance, and for temperatures much smaller than the Kondo temperature a spurious peak emerges at the Fermi level due to missing vertex corrections [@costi; @kura]. Computational details --------------------- The DFT(+SPTF) calculations reported here were carried out using a full potential linear muffin-tin orbital (FP-LMTO) method [@RSPt_book]. The GGA parametrization of Perdew, Burke, and Ernzerhof was used [@gga]. The Brillouin zone was sampled through a conventional Monkhorst-Pack mesh of 20 x 20 x 1 [**[k]{}**]{}-points, leading to a total of 102 vectors in the irreducible wedge. The basis setup was the same for all calculations. For the definition of the muffin-tin sphere of Cr a radius of 2.23 a.u. is used. The main valence basis functions were chosen as 3d, 4s and 4p states, while 3s and 3p electrons were treated as core states [@RSPt_book]. Three kinetic energy tails were used for 4s and 4p states, corresponding to the default values 0.3, -2.3 and -0.6 Ry. Only the first tail is used for the 3d states. The use of a single tail is due to the choice of the construction of the correlated orbitals of the Anderson impurity model. These correlated orbitals are constructed from LMTOs, that have a representation involving structure constants, spherical harmonics, and a numerical radial representation inside the muffin-tin spheres. These functions are matched continuously and differentiably at the border of the muffin-tin spheres to Hankel or Neumann functions in the interstitial. The “ORT” basis originates from these native LMTOs after a Löwdin orthonormalization. The MT orbitals, instead, are atomic-like orbitals where the radial part comes from the solution of the radial Schrödinger equation inside the muffin-tin sphere at an energy corresponding to the ’center of gravity’ of the relevant energy band. For a more detailed description of the correlated orbital bases we refer to Ref. . There, it is also shown that they generally lead to very similar results. In this work the ORT basis is used. As for the double counting within DFT+SPTF the orbitally averaged static part of the self-energy is used. For the parameterization of the onsite Coulomb interaction the constrained random phase approximation results of Ref.  are used. In their work a slab of 10 layers is considered for which they found the following onsite Coulomb interactions $U_{1/10}=3.44$ eV, $U_{2/9}=4.64$ eV, $U_{3/8}=4.73$ eV, $U_{4/7}=4.94$ eV and $U_{5/6}=4.95$ eV. Here the numbers indicate the layer of the slab, i.e. 1 and 10 are respectively the top and bottom layer. The Hund exchange interaction is constant $J=0.65$ eV. In order to use the CTQMC results as a benchmark the Cr(001) surface is modelled in exactly the same way as in Ref. . This is a slab of 10 atomic layers with a vacuum of approximately 16 Å$ $ stacked in the z-direction and perdiodically continued in the x and y direction. This structure is optimized by allowing the atomic coordinates to relax in the z-direction. Further, we also break the symmetry in an anti-ferromagnetic way in the first iteration of the DMFT loop. Note that we also started the spin-polarized DMFT calculation on top of a converged non spin-polarized DFT (GGA) calculation. Just as the CTQMC calculations our calculations are not charge self-consistent. Also in accordance with the CTQMC calculations, is the application of a multi-site version of the DMFT method to model the slab of 10 atomic layers. On the Matsubara axis the lattice Green’s function within the multi-site version of DMFT is given by $$\begin{gathered} G_{\alpha \beta}^{ij}(i\omega_{n},{\bf k})^{-1}=\\ [ (i\omega_{n}+\mu)\delta_{\alpha \beta}- \Sigma_{\alpha \beta}^{i}(i\omega_{n}) ]\delta_{ij} - H({\bf k})_{\alpha \beta}^{ij}. \label{muldmft} \end{gathered}$$ Here $i$ and $\alpha$ refer to the local basis functions $|i,\alpha \rangle$ with $i$ and $\alpha$ respectively corresponding to the site and correlated orbital. The chemical potential is represented by $\mu$ and for completeness $ H({\bf k})_{\alpha \beta}^{ij}=\langle i,\alpha|H({\bf k})|j,\beta \rangle$. Further, $\Sigma_{\alpha \beta}^{i}(i\omega_{n})$ is the local self-energy, i.e. it is ${\bf k}$-independent and $i\neq j$ terms are zero. The double-counting correction is absorbed in the self-energy. In order to obtain the rest of the self-energy, an effective impurity model is solved for each Cr atom in the slab until self-consistency within the DMFT loop is reached. For this purpose at each DMFT iteration the following site dependent Weiss fields are computed $$\mathcal{G}_{0,\alpha \beta}^{i}(i\omega_{n})^{-1}= G_{\alpha \beta}^{i}(i\omega_{n})^{-1} + \Sigma_{\alpha \beta}^{i}(i\omega_{n}). \label{muldmft2}$$ Here $G(i\omega_{n})$ is the local lattice Green’s function, which is obtained by taking a ${\bf k}$-average of $G(i\omega_{n},{\bf k})$. For the NCA calculations we did not use the multi-site DMFT version, since we performed only one-shot DMFT calculations. Then, the standard single-site version can be employed. For a one-shot NCA calculation we obtain the hybridization function and projected 3d-eigenvalues from a converged non spin-polarized GGA calculation. This GGA calculation is performed for the same geometry as described above. The double counting is about 13.5 eV in order to have a total of approximately 4.75 3d-electrons. Results ======= GGA --- Before we study the many-body effects within DMFT on the spectral properties, we first consider the single-particle GGA approach. In Fig. \[ggafig\] the projected density of states of the 3d-states are plotted for a non spin-polarized and spin-polarized GGA calculation. These spectra are in very good agreement with what is reported in literature [@okon2; @okon6; @schuler]. For example the results of Ref. , for convenience presented here in Fig. \[CTQMCfig\]a and b, are very similar to our results in Fig. \[ggafig\]. The non spin-polarized calculation is convenient to make a rough estimate of the bandwidth. From the top figure of Fig. \[ggafig\] it can be observed that the bandwidth is about 7 eV. As mentioned above from constrained RPA calculations it is known that for the top surface layer the screened onsite correlations within these 3d-states is 3.44 eV. This suggests that the 3d-states of the Cr(001) surface are weakly/moderately correlated. From the bottom figure of Fig. \[ggafig\] it is clear that inclusion of spin polarization has a huge effect on the spectral density. Further, the exchange induced spin splitting can be observed. By comparing Fig. \[ggafig\] (both non spin-polarized and spin-polarized) with experiment [@arpes1; @arpes2; @arpes3; @okon1; @okon2; @okon3; @okon4], it can be concluded that GGA is not able to account for the resonance. For the non spin-polarized case the peaks at the Fermi level are too high and broad, and the orbital character is not in accordance with experiment [@okon4]. On the other hand for the spin-polarized case there is no peak at the Fermi level. ![The 3d projected partial density of states is plotted for a non spin-polarized (top) and a spin-polarized GGA calculation (bottom). Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*. []{data-label="ggafig"}](GGA_NSP.eps "fig:"){width="9cm"} ![The 3d projected partial density of states is plotted for a non spin-polarized (top) and a spin-polarized GGA calculation (bottom). Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*. []{data-label="ggafig"}](GGA_SP.eps "fig:"){width="9cm"} SPTF ---- Since CTQMC is in principle exact we use it as a benchmark for our approximate solvers. More precisely, we compare our results with those of Ref.  presented here in Figs. \[CTQMCfig2\] and \[CTQMCfig\]. In the former the local spin averaged 3d partial density of states is shown for non spin-polarized and spin-polarized GGA, and DMFT. For DMFT also the temperature dependence of the feature at the Fermi level (zero energy) is depicted. Here $\beta$ refers to the inverse temperature. The latter contains the local 3d projected, *$d_{z^{2}}$*, *$d_{x^{2}-y^{2}}$*, *$d_{xz}$*/*$d_{yz}$* and *$d_{xy}$*, partial density of states for non spin-polarized and spin-polarized GGA, and DMFT at two different inverse temperatures. ![The CTQMC local spin averaged 3d partial density of states for different methods and inverse temperatures, $\beta=20$ eV$^{-1}$ (dashed red), $\beta=40$ eV$^{-1}$ (solid black) and $\beta=60$ eV$^{-1}$ (solid magenta) of Ref. . []{data-label="CTQMCfig2"}](CTQMC2.eps){width="9cm"} In order to compare SPTF with CTQMC, the local spin averaged 3d partial density of states is calculated within SPTF for different double countings (see Fig. \[SPTF\_dc\]) at $\beta=20$ eV$^{-1}$. From a comparison with Fig. \[CTQMCfig2\]a (solid black line) it can be observed that for the double countings $13.8$ and $13.5$ eV the height of the feature at the Fermi level is underestimated with respect to the main peak at about $1$ eV. On the other hand for the $12.7$ eV double counting the agreement is very good. There is only a slight mismatch in the position of the feature at the Fermi level. This mismatch will be addressed below in more details. ![The CTQMC 3d projected partial density of states of Ref. . Here the top two figures are for non spin-polarized and spin-polarized GGA and the bottom figures for CTQMC at two different inverse temperatures, $\beta=20$ eV$^{-1}$ (c), $\beta=40$ eV$^{-1}$ (d). Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*. []{data-label="CTQMCfig"}](CTQMC.eps){width="9cm"} It becomes even more clear that SPTF for $12.7$ eV double counting is in good agreement with CTQMC, while that of $13.8$ eV is not, from an inspection of the local 3d projected density of states. In Fig. \[SPTF\_proj\] the local 3d partial density of states projected on *$d_{z^{2}}$*, *$d_{x^{2}-y^{2}}$*, *$d_{xz}$*/*$d_{yz}$* and *$d_{xy}$* is shown for $13.8$ (top) and $12.7$ eV (bottom) double counting within SPTF for $\beta=20$ eV$^{-1}$. From a comparison with the CTQMC results in Fig. \[CTQMCfig\]c (for the same inverse temperature) it is clear that SPTF with $12.7$ double counting is in very good agreement, while that of $13.8$ is not. For example, the calculation for $13.8$ double counting wrongly predicts the main contribution of the feature at the Fermi level to be of majority *$d_{z^{2}}$* type. For the $12.7$ double counting the main contribution is correctly predicted to originate from the minority *$d_{z^{2}}$* channel. However, it should be noted that its contribution is a bit underestimated with respect to CTQMC. Also the majority *$d_{z^{2}}$* state seems to be a bit too close to the Fermi level. Furthermore, the broad features around $-1$ and $+1$ eV are in good agreement with CTQMC. ![The local spin averaged 3d partial density of states within SPTF for different double countings at $\beta=20$ eV$^{-1}$. []{data-label="SPTF_dc"}](SPTF_dc.eps){width="9cm"} As mentioned earlier in CTQMC the treatment of the full Coulomb matrix becomes prohibitively expensive at low temperatures. Therefore, in Ref.  only density-density terms of the local Coulomb interaction are considered. It is interesting to see what the influence of this approximation is on the spectrum. For this purpose a SPTF calculation is performed with full and density-density only local Coulomb interaction. In Fig. \[SPTF\_full\_dd\] the local spin averaged 3d partial density of states is depicted for these two calculations, where a $12.7$ eV double counting and $\beta=20$ eV$^{-1}$ was used. From this figure it can be observed that the consideration of the full Coulomb matrix and density-density terms only leads to very similar results. Only the peaks around $-1$ and $+1$ eV are slightly different. ![The local 3d projected density of states within SPTF for $13.8$ eV (top) and $12.7$ eV (bottom) double counting at $\beta=20$ eV$^{-1}$. Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*. []{data-label="SPTF_proj"}](SPTF_proj_dc1.eps "fig:"){width="9cm"} ![The local 3d projected density of states within SPTF for $13.8$ eV (top) and $12.7$ eV (bottom) double counting at $\beta=20$ eV$^{-1}$. Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*. []{data-label="SPTF_proj"}](SPTF_proj_dc090.eps "fig:"){width="9cm"} It also interesting to investigate the temperature dependence of the spectral feature close to the Fermi level. For the CTQMC calculations this is presented in Fig. \[CTQMCfig2\]. Here the feature shifts towards the Fermi level for increasing temperature (decreasing $\beta$). For SPTF the temperature dependent results are shown in Fig. \[SPTF\_T\], where for $12.7$ eV double counting the local spin averaged 3d partial density of states is presented for two different inverse temperatures $\beta=14.7$ eV$^{-1}$ (black) and $\beta=62.5$ eV$^{-1}$ (red). From this figure it can be observed that in contrast to the CTQMC results the position of this spectral feature shifts closer to the Fermi level for decreasing temperature. Thus, part of the mismatch in the position of the spectral feature at the Fermi level (between CTQMC and SPTF) is due to the different temperature dependence. Probably the rest of the mismatch is caused by the difference in double counting. ![The local spin averaged 3d partial density of states within SPTF with full (black) and density-density only Coulomb interaction (red) at $\beta=20$ eV$^{-1}$ for $12.7$ eV double counting. []{data-label="SPTF_full_dd"}](SPTF_dc090_full_dd.eps){width="9cm"} ![The local spin averaged 3d partial density of states within SPTF at two different inverse temperatures $\beta=14.7$ eV$^{-1}$ (black) and $\beta=62.5$ eV$^{-1}$ (red) for $12.7$ eV double counting and full Coulomb interaction. []{data-label="SPTF_T"}](SPTF_dc090_T.eps){width="9cm"} The next step is to perform SPTF calculations for temperatures at which the sharp resonance at the Fermi level is observed experimentally, roughly below 100 K. Therefore, we performed calculations for temperatures as low as 15 K. The results are not shown here, because they are essentially the same as for $\beta=62.5$ eV$^{-1}$ ($T=185.7$ K) shown in Fig. \[SPTF\_T\]. Thus, the occurence of a sharp resonance at low temperatures is not observed within SPTF. From this result and the good agreement between SPTF and CTQMC at higher temperatures, it can be concluded that the high-energy spectral features, everything except the resonance, are mainly due to the physical processes captured within SPTF. In order to obtain an even more detailed understanding of which physical processes are dominant for the high-energy spectral features, we performed additional SPTF calculations with particle-hole processes excluded. This means that the contribution of Eq. \[eqsptfph\] is not included anymore and only particle-particle processes are considered. In Fig. \[SPTF\_pponly\] the local spin averaged 3d partial density of states is shown (top figure) of a SPTF calculation with both particle-particle and particle-hole processes included (black) and one with only particle-particle processes considered (red). The bottom figure of Fig. \[SPTF\_pponly\] contains the local 3d projected density of states for SPTF with only particle-particle processes considered. All these calculations are for $\beta=20$ eV$^{-1}$, $12.7$ eV double counting and full Coulomb interaction. Thus, from a comparison of Figs. \[CTQMCfig2\]a and \[CTQMCfig\]c with Figs. \[SPTF\_dc\], \[SPTF\_proj\] and \[SPTF\_pponly\] it appears that the particle-particle processes provide the main contribution to the high-energy spectral features. ![In the top figure the local spin averaged 3d partial density of states is presented for full SPTF (black) and SPTF with only particle-particle processes (red). The bottom figure contains the local 3d projected density of states for the SPTF with only particle-particle processes. Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*. All these calculations are for $\beta=20$ eV$^{-1}$ and $12.7$ eV double counting. []{data-label="SPTF_pponly"}](SPTF_dc090_pponly.eps "fig:"){width="9cm"} ![In the top figure the local spin averaged 3d partial density of states is presented for full SPTF (black) and SPTF with only particle-particle processes (red). The bottom figure contains the local 3d projected density of states for the SPTF with only particle-particle processes. Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*. All these calculations are for $\beta=20$ eV$^{-1}$ and $12.7$ eV double counting. []{data-label="SPTF_pponly"}](SPTF_dc090_proj_pponly.eps "fig:"){width="9cm"} Finally, it is also interesting to have a more detailed understanding of how the peaks of the non spin-polarized GGA spectrum (Fig. \[ggafig\]) are renormalized due to the inclusion of the many-body processes on the level of SPTF. For this purpose the real and imaginary part of the local 3d projected self-energy is presented in Fig. \[sigfig\]. This figure is for a full SPTF calculation with $12.7$ eV double counting, $\beta=20$ eV$^{-1}$ and full Coulomb interaction. From this figure it can be observed for example that the minority *$d_{z^{2}}$* peak at the Fermi level (see the bottom figure of Fig. \[SPTF\_proj\]) is a renormalization of the *$d_{z^{2}}$* peak at about $-3$ eV of the non spin-polarized GGA spectrum. On the other hand the majority *$d_{z^{2}}$* peak at about $0.3$ eV is due to a renormalization of the broad peak at about $1$ eV of the non spin-polarized GGA spectrum. ![The local 3d projected real (top) and imaginary (bottom) part of the self-energy is depicted for a full SPTF calculation with $\beta=20$ eV$^{-1}$, $12.7$ eV double counting and full Coulomb interaction. Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*. []{data-label="sigfig"}](SPTF_dc090_ReSig_proj.eps "fig:"){width="9cm"} ![The local 3d projected real (top) and imaginary (bottom) part of the self-energy is depicted for a full SPTF calculation with $\beta=20$ eV$^{-1}$, $12.7$ eV double counting and full Coulomb interaction. Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*. []{data-label="sigfig"}](SPTF_dc090_ImSig_proj.eps "fig:"){width="9cm"} NCA --- We use the NCA scheme to investigate the formation of orbital Kondo-like resonances in the Cr(001) surface at very low temperature. From ferromagnetic NCA calculations with a large spin-splitting of the order of 6 eV (see Fig. \[NCAfer\]) we observed a spurious sharp resonance at the Fermi level. In Fig. \[NCAfer\] this spurious behaviour can be observed for a one-shot spin-polarized NCA calculation, i.e. the hybridization function and projected 3d-eigenvalues are obtained from a spin-polarized GGA calculation. The behaviour is spurious, since there is a resonance in the orbitally (and spin) non-degenerate $d_{x^{2}-y^{2}}$ state. Note that the (orbital) Kondo effect is based on a degenerate state. Moreover the self-energy becomes positive, i.e. non-causal. The reason for the occurence of this unphysical behaviour in magnetic NCA calculations is explained in Ref.  in terms of missing vertex corrections. Or equivalently, in the presence of a magnetic field, the accidental cancellation at the Kondo temperature of the diverging potential and spin scattering contributions is lifted. Since for non-magnetic NCA this cancellation is complete, there is no unphysical behavior at the Fermi level. Therefore, we restrict ourself in the rest of this work to the non-magnetic Cr(001) case. ![The 3d projected partial density of states within NCA for $\beta=100$ eV$^{-1}$. Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*.[]{data-label="NCAfer"}](NCA_T001.eps){width="9cm"} From the non-magnetic NCA calculations it appears that the results crucially depend on the behavior of the hybridization function near the Fermi level. In order to demonstrate this, we used two versions of the non self-consistent calculations, which give drastically different spectral functions near the Fermi level. The first one consists of the hybridization function $\Delta$ calculated from the standard non-interacting impurity problem [@dmft1; @dmft2] $$G_{imp}^{-1}(i\omega_{n})=i\omega_{n}-\mu - \Delta(i\omega_{n}). \label{imp}$$ The second approach is based on the Bethe-lattice approximation [@dmft1] with some adjustable Bethe-hopping $t_B$ $$\Delta(i\omega_{n})=t^{2}_B G_{imp}(i\omega_{n}). \label{bethe}$$ In this case we used $t_B$ as a scaling parameter in order to have a similar magnitude for the hybridization function as the ones obtained directly from the impurity GGA calculations. The main reason to check these models is related to the very different behavior of the hybridization function near the Fermi level in these two cases: while in the impurity-model we get mainly the $d_{z^{2}}$ and $d_{x^{2}-y^{2}}$ orbitals at $E_F$, in the Bethe-lattice model the main peaks are related with the [$d_{xz}$]{}/[$d_{yz}$]{} and $d_{xy}$ orbitals, which is clearly seen from the non-magnetic projected partial density of states (Fig. \[ggafig\]). Results for the NCA calculations of the non-magnetic Cr(001) surface for both models are presented in Fig. \[NCAM\]. It is quite unusual that results are crucially dependent on the models for the hybridization function: while for the impurity model we have two Kondo-like resonances in the [$d_{z^{2}}$ and $d_{x^{2}-y^{2}}$ orbitals at $E_F$, for the Bethe-lattice model there is a single broader Kondo resonance in the degenerate [$d_{xz}$]{}/[$d_{yz}$]{} orbitals. The latter corresponds to a strong SU(4) spin-orbit resonance and will reduce to a weaker SU(2) orbital Kondo resonance in the strong magnetic field from the ferromagnetic Cr(001) surface. The former two SU(2) spin resonances in the $d_{z^{2}}$ and $d_{x^{2}-y^{2}}$ orbitals will be killed by a strong magnetic field. Thus, only for the Bethe-lattice model an orbital Kondo resonance could occur in the presence of a strong magnetic field. However, self-consistent spin-polarized NCA calculations for the ferromagnetic state of the Cr(001) surface are needed to unambiguously verify this. Since the present spin-polarized NCA approach suffers from spurious behavior at the Fermi level (Fig. \[NCAfer\]), first a thorough investigation of the missing vertex corrections is required to resolve this issue. Such an investigation is out of the scope of this work. It is therefore for future investigations to show a possibility of a self-consistent solution of orbital $d_{xz}$]{}/[$d_{yz}$]{} Kondo states in realistic DMFT calculations. We expect that the final hybridization function will be crucially dependent on the starting point which will explain the CTQMC results that used the standard impurity model [@schuler]. ![The 3d projected partial density of states within NCA for different hybridization functions in non-magnetic Cr(001) for $\beta=100$ eV$^{-1}$. The top figure is for the impurity model and the bottom is for the Bethe-lattice model. Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*.[]{data-label="NCAM"}](NCA_para_PARhyb1.eps "fig:"){width="9cm"} ![The 3d projected partial density of states within NCA for different hybridization functions in non-magnetic Cr(001) for $\beta=100$ eV$^{-1}$. The top figure is for the impurity model and the bottom is for the Bethe-lattice model. Here blue corresponds to *$d_{z^{2}}$*, magenta to *$d_{x^{2}-y^{2}}$*, black to *$d_{xz}$*/*$d_{yz}$* and red to *$d_{xy}$*.[]{data-label="NCAM"}](NCA_para_pdoshyb1.eps "fig:"){width="9cm"} Discussion and conclusion ========================= In this work we addressed the spectral properties of a Cr(001) surface and in particular the physical origin of the experimentally observed resonance close to the Fermi level at low temperatures. In the literature a single particle $d_{z_{2}}$ surface state renormalized by electron-phonon coupling and the orbital Kondo effect due to the degenerate *$d_{xz}$* and *$d_{yz}$* states are proposed as two possible origins of this resonance. Recent continuous time quantum Monte Carlo calculations within the dynamical mean-field theory already indicated the many body nature of the feature at the Fermi level. However, the precise physical origin of the feature remained unknown. Further, temperatures at which the resonance is experimentally observed could not be reached and only the density-density terms of the Coulomb matrix were considered. Therefore, we employed two approximate methods within the dynamical mean-field theory in order to access low temperatures for the full Coulomb matrix and to consider specific physical processes only. First, the spin-polarized T-matrix fluctuation exchange approximation is used, which considers specific scattering processes by treating the onsite Coulomb interaction perturbatively. This method is known to be good for weakly and moderately correlated systems. Second, the non-crossing approximation which is derived in the limit of weak hybridization (strongly correlated systems) and considers Kondo-like processes. By using the recent continuous-time quantum Monte Carlo calculations as a benchmark, we found that the high-energy features, everything except the experimentally observed resonance at the Fermi level, of the spectrum is captured within the spin-polarized T-matrix fluctuation exchange approximation. More precisely the particle-particle processes provide the main contribution. The occurence of a resonance even at temperatures as low as 15 K was not observed within this approximation. For the non-crossing approximation we found that magnetic calculations lead to a spurious resonance at the Fermi level. Therefore, in order to avoid this unphysical behavior we performed additional non-magnetic calculations. By using two plausible starting hybridization functions, it is shown that the characteristics of the resonance at the Fermi level are crucially dependent on the starting point. For example, in one case a Kondo-like resonance was obtained in the spin degenerate [$d_{z^{2}}$ and $d_{x^{2}-y^{2}}$ orbitals, while in the other case in the spin and orbital degenerate $d_{xz}$/[$d_{yz}$]{} orbitals. The latter corresponds to a strong SU(4) spin-orbit resonance and will reduce to a weaker SU(2) orbital Kondo resonance in the strong magnetic field from the ferromagnetic Cr(001) surface. The former two SU(2) spin resonances in the $d_{z^{2}}$ and $d_{x^{2}-y^{2}}$ orbitals will be killed by a strong magnetic field. Since we cannot do self-consistent calculations within the present NCA approach for the ferromagnetic state of the Cr(001) surface, it will be very interesting for future investigations to show a possibility of a self-consistent solution of orbital $d_{xz}$]{}/[$d_{yz}$]{} Kondo states in realistic DMFT calculations. Before such an investigation can be conducted, a thorough inspection of the missing vertex corrections within the spin-polarized non-crossing approximation is required in order to resolve the spurious behavior at the Fermi level. Acknowledgements {#acknowledgements .unnumbered} ---------------- We acknowledge support from the Swedish Research Council (VR), eSSENCE, STANDUPP, and the Swedish National Allocations Committee (SNIC/SNAC). The Nederlandse Organisatie voor Wetenschappelijk Onderzoek (NWO) and SURFsara are acknowledged for the usage of the LISA supercomputer and their support. The calculations were also performed on resources provided by the Swedish National Infrastructure for Computing (SNIC) at the National Supercomputer Center (NSC) and the Uppsala Multidisciplinary Center for Advanced Computational Science (UPPMAX). M.I.K. acknowledges a support by European ResearchCouncil (ERC) Grant No. 338957. A.I.L. acknowledges a support from DFG-SFB668. M.K. acknowledges financial support from the Deutsche Forschungsgemeinschaft (DFG) via FOR Grant No. 1162. [49]{} J. Sólyom and A. Zawadowski, Phys. Kondens. Mater. [**7**]{}, 325 (1968), https://doi.org/10.1007/BF02422778. A. Zawadowski, Phys. Rev. [**163**]{}, 341 (1967). J. A. Appelbaum and W. F. Brinkman, Phys. Rev. B [**2**]{}, 907 (1970). P. LeClair, J. T. Kohlhepp, H. J. M. Swagten, and W. J. M. de Jonge, Phys. Rev. Lett. [**86**]{}, 1066 (2001). X. Qi and S. Zhang, Rev. Mod. Phys. [**83**]{}, 1057 (2011). L. E. Klebanoff, S. W. Robey, G. Liu, and D. A. Shirley, Phys. Rev. B [**30**]{}, 1048 (1984). L. E. Klebanoff, S. W. Robey, G. Liu, and D. A. Shirley, Phys. Rev. B [**31**]{}, 6379 (1985). L. E. Klebanoff, R. H. Victora, L. M. Falicov, and D. A. Shirley, Phys. Rev. B [**32**]{}, 1997 (1985). J. A. Stroscio, D. T. Pierce, A. Davies, R. J. Celotta, and M. Weinert, Phys. Rev. Lett. [**75**]{}, 2960 (1995). P. Habibi, C. Barreteau, and A. Smogunov, J. Phys.: Condens. Matter [**25**]{}, 146002 (2013). O. Y. Kolesnychenko, R. de Kort, M. I. Katsnelson, A. I. Lichtenstein, and H. van Kempen, Nature [**415**]{}, 507 (2002). O. Y. Kolesnychenko, G. M. M. Heijnen, A. K. Zhuravlev, R. de Kort, M. I. Katsnelson, A. I. Lichtenstein, and H. van Kempen, Phys. Rev. B [**72**]{}, 085456 (2005). T. Hänke, M. Bode, S. Krause, L. Berbil-Bautista, and R. Wiesendanger, Phys. Rev. B [**72**]{}, 085453 (2005). M. Budke, T. Allmers, M. Donath, and M. Bode, Phys. Rev. B [**77**]{}, 233409 (2008). G. Adhikary, R. Bindu, S. Patil, and K. Maiti, Appl. Phys. Lett. [**100**]{}, 042401 (2012). M. Schüler, S. Barthel, M. Karolak, A. I. Poteryaev, A. I. Lichtenstein, M. I. Katsnelson, G. Sangiovanni, and T. O. Wehling, Phys. Rev. B [**93**]{}, 195115 (2016). E. Gorelov, T. O. Wehling, A. N. Rubtsov, M. I. Katsnelson, and A. I. Lichtenstein Phys. Rev. B [**80**]{}, 155132 (2009). E. Gorelov, J. Kolorenč, T. Wehling, H. Hafermann, A. B. Shick, A. N. Rubtsov, A. Landa, A. K. McMahan, V. I. Anisimov, M. I. Katsnelson, and A. I. Lichtenstein, Phys. Rev. B [**82**]{}, 085117 (2010). M. I. Katsnelson and A. I. Lichtenstein, Eur. Phys. J. B [**30**]{}, 9 (2002). L. V. Pourovskii, M. I. Katsnelson, and A. I. Lichtenstein, Phys. Rev. B [**72**]{}, 115106 (2005). P. Coleman, Phys. Rev. B [**29**]{}, 3035 (1984). T. Pruschke, D. L. Cox, and M. Jarrell, Phys. Rev. B [**47**]{}, 3553 (1993). M. Karolak, D. Jacob, and A. I. Lichtenstein, Phys. Rev. Lett. [**107**]{}, 146604 (2011). P. Hohenberg and W. Kohn, Phys. Rev. **136**, B864 (1964). W. Kohn and L. J. Sham, Phys. Rev. **140**, A1133 (1965) J. P. Perdew, *Electronic Structure of Solids* (Akademie, 1991). J. P. Perdew and Y. Wang, Phys. Rev. B **45**, 13244 (1992). J. P. Perdew, K. Burke and M. Ernzerhof, Phys. Rev. Lett. **77**, 3865-3868 (1996). A. Georges, G. Kotliar, W. Krauth and M. J. Rozenberg, Rev. Mod. Phys. **68**, 13 (1996). G. Kotliar, S. Y. Savrasov, K. Haule, V. S. Oudovenko, O. Parcollet, and C. A. Marianetti, Rev. Mod. Phys. **78**, 865 (2006). P. Werner and A. J. Millis, Phys. Rev. B [**74**]{}, 155107 (2006). P. Werner, A. Comanac, L. de Medici, M. Troyer, and A. J. Millis, Phys. Rev. Lett. [**97**]{}, 076405 (2006). X. Y. Zhang, M. J. Rozenberg, and G. Kotliar, Phys. Rev. Lett. [**70**]{}, 1666 (1993). K. Haule, S. Kirchner, J. Kroha, and P. Wölfle, Phys. Rev. B [**64**]{}, 155111 (2001). A. Grechnev, I. Di Marco, M. I. Katsnelson, A. I. Lichtenstein, J. Wills, and O. Eriksson, Phys. Rev. B [**76**]{}, 035107 (2007). I. Di Marco, J. Minár, S. Chadov, M. I. Katsnelson, H. Ebert, and A. I. Lichtenstein, Phys. Rev. B [**79**]{}, 115111 (2009). T. A. Costi, J. Kroha, and P. Wölfle, Phys. Rev. B [**53**]{}, 1850 (1996). Y. Kuramoto and H. Z. Kojima, Z. Phys. B. [**57**]{}, 95 (1984). J. M. Wills, M. Alouani, P. Andersson, A. Delin, O.Eriksson, and O. Grechnyev, *Full-Potential Electronic Structure Method* (Springer, 2010). E. Şaş[i]{}oğlu , C. Friedrich, and S. Blügel, Phys. Rev. Lett. [**109**]{}, 146401 (2012). J. Kroha and P. Wölfle, J. Phys. Soc. Jpn. [**74**]{}, 16 (2005).
Accelerate your career in conservation or ecology Welcome to the #1 careers advice centre for successful conservationists and ecologists. Do you want to spend your career helping wildlife to flourish, but are feeling a little lost, disillusioned or stuck? Start your membership today to get hired quicker, and: Our Latest Careers Advice Mark Thomas works as Senior Field Staff for Crees Manu – teaching and training the next generation of conservation enthusiasts, dedicated to protecting the Amazon and its people. Mark is from Brighton, London in the UK and after working in a bank for nine years, he decided he wanted something different out of life. He explained Before I met Georgina, I’d heard a lot about her. People were always talking about how determined she was to make a difference to the lives of animals around the world. I spoke with her a lot before I met her too. She talked me through three gruelling months of practical welfare work in Vietnam. With over 800 species of birds in South Africa and over 100 of them threatened, where do you start with trying to conserve them? Growing up in South Africa, Mark Anderson was taken out into the bush for days on end by his grandfather and from an early age he knew that he wanted to Lion SUITABLE FOR: For people who want jobs, promotion, a more detailed understanding all their career options, training and support. JOB SEEKER PACKAGE Access all Job Vacancies Create Personal Job Alerts Bookmark Jobs & add notes Use Internet Jobs Search Portal CV PROMOTION PACKAGE Add CV to Talent Pool Twitter Broadcast Option CAREER ACADEMY PACKAGE Access the support forum 12-week Career Bootcamp Download Career eBook Mine 5k+ Job Archive Frequently Asked Questions Can you help me to switch my career into conservation? Yes! We can help you to understand your career options, the training needed (if any), and to make a plan to turn your dreams into action. We’re also here to help you every step of the way. If you have a question you can just ask. How long will my membership last? There is no minimum or maximum term for your membership. You can easily cancel at any time. If you cancel within your first month (the free trial period) you will not be charged. What is the payment cycle? Membership payments are either monthly or six-monthly – depending upon which one you choose. They can be easily cancelled at any time, and you can get a refund if you’re not 100% happy within the first seven days of taking out a membership. No questions asked. We are the biggest conservation job portal on the internet, and list around 6,000 vacancies from around the globe each year. The most frequent countries are USA, UK, Canada, South Africa, New Zealand and Australia. Why are you charging for access to your website? Conservation Careers has been built on the good will of a global group of dedicated and passionate volunteers, and a wider community of conservationists who believe in what we’re doing. Collectively we have spent over 1,500 hours developing the site, speaking to conservationists, and collating the best careers advice around. In order to produce a sustainable, high-quality service we now need to invest in staff time and web development. How is the membership revenue used? All revenue from memberships is reinvested in staff time and website development work – continually making Conservation Careers the best it can be for you. What can I get for free? You can access all our careers advice and featured job vacancies for free, without any logins required. Looking for conservation training courses? Check out our free membership level which gives you access to the biggest collection of career-boosting training courses for conservationists. This includes nearly, 2,000 Degrees, Masters, Online Courses and much more, from around the globe. Find out more here. Who do I contact if I want to find out more? If you’ve got something to ask, or just want to say hello, please email us at [email protected]. FREE guide for conservation job-hunters and career-switchers! Download your free your free guide jam-packed with honest, accurate and useful advice for those seeking to conserve the environment through their work. It includes top career tips based on interviews with 342 professional conservationists from around the world with over 1,734 combined years of experience. If you're hunting for a job, or looking to switch careers into conservation, it's a must read. Free Guide | How to apply for a conservation job What are the 10 key steps to the application process? From deciding to apply through to submitting your application. How do I create stand-out applications? With real-life examples of before and after applications. Which CV or Resume style is right for me? Using a series of templates and examples to help you choose. Throughout the eBook, you’ll find exercises, tips and links to extra resources. You can work through the guide from beginning to end, or jump to the sections you need most. Download your free copy below! Email Address First Name I have read the T&Cs and Privacy Policy Yes This website uses cookies to store information on your computer. Details of the cookies we use and what you can do to switch them off are are in our Privacy Policy. By using our website you accept the terms of our Privacy Policy. Click here to view our Privacy Policy
package io.funcqrs.backend import java.util.NoSuchElementException import io.funcqrs._ import io.funcqrs.config.{ AggregateConfig, ProjectionConfig } import scala.language.higherKinds import scala.reflect.ClassTag trait Backend[F[_]] extends AggregateFactory[F] { /** Configure a Aggregate */ def configure[A: ClassTag, C, E, I <: AggregateId](config: AggregateConfig[A, C, E, I]): Backend[F] def configure[O, E](config: ProjectionConfig[O, E]): Backend[F] protected def configLookup[A: ClassTag, C, E, I](lookup: => AggregateConfig[A, C, E, I]) = { try { lookup } catch { case _: NoSuchElementException => val cls = ClassTagImplicits[A] throw new MissingAggregateConfigurationException(s"No configuration found for ${cls.runtimeClass.getSimpleName}") } } }
--- abstract: 'We study the baryon asymmetry of the universe in the supersymmetric standard model (SSM). At the electroweak phase transition, the fermionic partners of the charged SU(2) gauge bosons and Higgs bosons are reflected from or transmitted to the bubble wall of the broken phase. Owing to a physical complex phase in their mass matrix, these reflections and transmissions have asymmetries between CP conjugate processes. Equilibrium conditions in the symmetric phase are then shifted to favor a non-vanishing value for the baryon number density, which is realized through electroweak anomaly. We show that the resultant ratio of baryon number to entropy is consistent with its present observed value within reasonable ranges of SSM parameters, provided that the CP-violating phase intrinsic in the SSM is not much suppressed. The compatibility with the constraints on the parameters from the electric dipole moment of the neutron is also discussed.' address: | Department of Physics, Ochanomizu University\ Otsuka 2-1-1, Bunkyo-ku, Tokyo 112, Japan\ author: - 'Mayumi Aoki, Noriyuki Oshimo, and Akio Sugamoto' title: Electroweak baryogenesis from chargino transport in the supersymmetric model --- 2[2]{} v\#1[v\_\#1]{} \#1[\_\#1]{} PS. \#1[\_\#1]{} \#1[[m]{}\_\#1]{} \_i \#1[[m]{}\_[\#1]{}]{} \#1[p\_\#1]{} 2[v\_W\^2]{} Introduction {#sec1} ============ The astronomical observations indicate that there exist more baryons than antibaryons in our universe. This baryon asymmetry of the universe may be understood within the framework of physics at the electroweak scale [@kuzmin], since all the necessary ingredients for baryogenesis could be available there [@ewbrev]. Although the standard model (SM) does not account for the asymmetry quantitatively, certain extensions of the SM would be able to overcome those difficulties which the SM encounters. This possibility could give some hints for physics beyond the SM. In particular, it turned out that CP violation in the SM arising from the Kobayashi-Maskawa phase does not lead to an enough amount of asymmetry between the numbers of baryons and antibaryons. The baryon asymmetry could be a unique phenomenon ever found, other than the  system, which enables us to study CP violation. In this paper, we discuss the possibility of baryogenesis at the electroweak phase transition in the supersymmetric standard model (SSM). This model [@ssmrev], which is one of the most plausible extensions of the SM from the viewpoint of physics at the electroweak scale, contains new sources of CP violation [@cp] wanted for the baryogenesis. In addition, the electroweak phase transition may be strongly first order in the SSM, which is also necessary for the baryogenesis though not compatible with the Higgs boson mass in the SM. Indeed, the constraints on the Higgs boson masses from this requirement could be relaxed [@ewpt] compared to the SM, owing to the richness of Higgs fields, especially by adding a gauge singlet field. It would be thus of great importance to study whether the electroweak baryogenesis is viable in the SSM. The baryogenesis at the electroweak phase transition could occur within or outside the bubble wall of the broken phase, where baryon number violation by electroweak anomaly is not suppressed. We consider the baryon number generation outside the wall, which has been suggested to give an enough amount of asymmetry in the SSM [@nelson1; @nelson2]. For this process the baryon number is well estimated through the charge transport mechanism [@nelson1; @ctm]. The mediators on which our study is focused are charginos, which consist of the fermionic partners of the charged SU(2) gauge bosons and Higgs bosons and have a mass matrix with a physical complex phase. Since these particles couple to the Higgs bosons by the SU(2) gauge interaction, their scatterings at the wall are not so weak as the leptons, while their asymmetries in the symmetric phase are maintained longer than the quarks. It will be shown that the baryon asymmetry of the universe can be explained in the SSM within the reasonable values for its model parameters. However, the allowed range for the new CP-violating phase is not so wide as estimated before [@nelson1; @nelson2], so that the baryogenesis could give nontrivial constraints on the SSM. Although the baryogenesis within the wall might also be possible in the SSM [@spon], it has been generally shown that an enough amount of baryon asymmetry cannot be produced within the wall only [@dine]. In Sec. \[sec2\] we briefly review the source of CP violation in the chargino sector. In Sec. \[sec3\] we discuss CP asymmetries in the reflection and transmission rates for the charginos at the bubble wall. The procedure for computing these rates, which gives accurate results, is presented explicitly. In Sec. \[sec4\] we calculate the ratio of baryon number to entropy following the charge transport mechanism. The dependences of the ratio on various parameters are also analyzed. Summary is given in Sec. \[sec5\]. Supersymmetric model {#sec2} ==================== A new source of CP violation in the SSM comes from the mass matrices of the SU(2)$\times$U(1) gauginos and Higgsinos. The mass terms for the charged gauginos $\lam$ and Higgsinos $\psm$, $\psp$ are given by $$\begin{aligned} {\cal L}&=&-(\overline{\lam} \quad \overline{\psp})M^-\PL \left(\matrix{\lam \cr \psm } \right) +{\rm h.c.}, \\ \label{1} M^- &=& \left(\matrix{\m2 & -g\v1^*/\r2 \cr -g\v2^*/\r2 & \mH} \right), \label{2} \end{aligned}$$ where $\m2$ denotes the mass parameter for the SU(2) gauginos arising from the supersymmetry soft-breaking term; $\mH$ denotes the mass parameter for the Higgsinos from the bilinear term of Higgs superfields in superpotential; and $\v1$ and $\v2$ are respectively the vacuum expectation values of the Higgs bosons with U(1) hypercharges $-1/2$ and $1/2$. The mass matrix (\[2\]) is diagonalized by unitary matrices $C_R$ and $C_L$ as $$C_R^\dagger M^-C_L = {\rm diag}(\mw1, \mw2) \quad (\mw1 <\mw2 ), \label{3}$$ giving the mass eigenstates for the charginos $\c$. In general, the parameters $\v1$, $\v2$, $\m2$, and $\mH$ in the mass matrix (\[2\]) have complex values. Although there is some freedom of defining phases for the particle fields, if the SU(2)$\times$U(1) gauge symmetry is spontaneously broken and thus $\v1$ and $\v2$ have non-vanishing values, all the complex phases cannot be rotated away. The redefinitions of the fields make it possible without loss of generality to take $\m2$, $\v1$, and $\v2$ for real and positive. Then $\mH$ cannot be made real. Therefore, there is one physical complex phase in the mass matrix for the charginos, which we express as $$\mH=|\mH|\exp(i\theta). \label{4}$$ Owing to this complex phase, CP invariance is broken in the interactions for the charginos. Similarly the mass matrix for the neutral gauginos and Higgsinos contains the CP-violating phase. CP asymmetry {#sec3} ============ At the electroweak phase transition of the universe, if it is first order, bubbles of the broken phase nucleate in the SU(2)$\times$U(1) symmetric phase. In the symmetric phase the gauginos and the Higgsinos are in mass eigenstates themselves. On the other hand, they are mixed to form mass eigenstates in the wall and in the broken phase, owing to non-vanishing vacuum expectation values of the Higgs bosons. Consequently, the gauginos incident on the wall from the symmetric phase can be reflected to become Higgsinos, and vice versa. The charginos from the broken phase can be transmitted to the symmetric phase and become gauginos or Higgsinos. In these processes CP violation makes a difference in reflection or transmission probability between a particle state with a definite helicity and its CP-conjugate state. The induced CP asymmetries shift equilibrium conditions in the symmetric phase for non-vanishing baryon number. The reflection and transmission rates at the wall are obtained by solving the Dirac equations for the charginos. In the rest frame of the wall the Dirac equations are given by $$\left(\matrix{-i\delt & \m2 & 0 & -g\v1^*/\r2 \cr -\m2^* & i\delt & g\v2/\r2 & 0 \cr 0 & -g\v2^*/\r2 & -i\delt & \mH \cr g\v1/\r2 & 0 & -\mH^* & i\delt} \right) \left(\matrix{\la1 \cr \la3 \cr \ps1 \cr \ps3 \cr} \right) =i\frac{\partial}{\partial z} \left(\matrix{\la1 \cr \la3 \cr \ps1 \cr \ps3 \cr} \right), \label{5}$$ $$\left(\matrix{-i\delt & \m2^* & 0 & -g\v2/\r2 \cr -\m2 & i\delt & g\v1^*/\r2 & 0 \cr 0 & -g\v1/\r2 & -i\delt & \mH^* \cr g\v2^*/\r2 & 0 & -\mH & i\delt} \right) \left(\matrix{\la4 \cr \la2 \cr \ps4 \cr \ps2 \cr} \right) =i\frac{\partial}{\partial z} \left(\matrix{\la4 \cr \la2 \cr \ps4 \cr \ps2 \cr} \right), \label{6}$$ where the wall is taken to be parallel to the $xy$-plane and perpendicular to the velocity of the particles. The components of the Dirac fields are expressed as $$\lam\equiv\left(\matrix{\la1 \cr \la2 \cr \la3 \cr \la4 \cr} \right), \quad \PL\psm+\PR\psp\equiv\left(\matrix{\ps1 \cr \ps2 \cr \ps3 \cr \ps4 \cr} \right). \label{7}$$ We have adopted the chiral representation for the Dirac $\gamma$ matrices. In the symmetric phase the vacuum expectation values $\v1$ and $\v2$ vanish, while in the broken phase they are related to the $W$-boson mass as $M_W=(g/2)\sqrt{|\v1|^2+|\v2|^2}$. The vacuum expectation values vary along the $z$-axis in the wall. For simplicity, we assume that the wall is situated from $z=0$ to $z=2\dW$ and the $z$-dependences of $\v1$ and $\v2$ are given by $$\begin{aligned} \sqrt{|\v1|^2+|\v2|^2}&=& \frac{M_W}{g}\{1+\tanh(\frac{z}{\dW}-1)\pi\}, \nonumber \\ \frac{\v2}{\v1}&=&\tb, \label{8}\end{aligned}$$ where the ratio $\v2/\v1$ is taken to be constant and equal to its value $\tb$ in the broken phase. The symmetric phase is in the region $z<0$. As a prototype for the calculation of the reflection and transmission rates, we consider the case that a gaugino with a positive helicity and energy $E$ enters from the symmetric phase. Then the reflected particle (gaugino, Higgsino) has a negative helicity and the transmitted particle (charginos) has a positive helicity by angular momentum conservation. The boundary condition at $z=0$ becomes $$\left(\matrix{\la1 \cr \la3 \cr \ps1 \cr \ps3 \cr} \right)= \{X_1(0)+AX_2(0)+BX_3(0)\}\exp(-iEt), \label{9}$$ $$\begin{aligned} X_1(0)&=&\sqrt{\frac{E+\plam}{2\plam}} \left(\matrix{1 \cr \m2/(E+\plam) \cr 0 \cr 0 \cr} \right), \quad X_2(0)=\sqrt{\frac{E+\plam}{2\plam}} \left(\matrix{ \m2/(E+\plam) \cr 1 \cr 0 \cr 0 \cr} \right), \nonumber \\ X_3(0)&=&\exp(-i\theta)\sqrt{\frac{E+\ppsi}{2\ppsi}} \left(\matrix{0 \cr 0 \cr \mH/(E+\ppsi) \cr 1 \cr} \right), \label{10}\end{aligned}$$ where $\plam$ and $\ppsi$ stand for the absolute values of the momenta for the gaugino and the Higgsino. The incident gaugino, the reflected gaugino, and the reflected Higgsino correspond to $X_1$, $X_2$, and $X_3$ , respectively. The boundary condition at $z=2\dW$ becomes $$\left(\matrix{\la1 \cr \la3 \cr \ps1 \cr \ps3 \cr} \right) =\{CY_1(2\dW)+DY_2(2\dW)\}\exp(-iEt), \label{11}$$ $$\begin{aligned} Y_1(2\dW)&=&\sqrt{\frac{E+\p1}{2\p1}} \left(\matrix{C_{R11} \cr C_{L11}\mw1/(E+\p1) \cr C_{R21} \cr C_{L21}\mw1/(E+\p1) \cr} \right)\exp(i2\p1\dW), \nonumber \\ Y_2(2\dW)&=&\sqrt{\frac{E+\p2}{2\p2}} \left(\matrix{C_{R12} \cr C_{L12}\mw2/(E+\p2) \cr C_{R22} \cr C_{L22}\mw2/(E+\p2) \cr} \right)\exp(i2\p2\dW), \label{12}\end{aligned}$$ where $\p1$ and $\p2$ stand for the absolute values of the momenta for the two charginos. The lighter and heavier charginos correspond to $Y_1$ and $Y_2$, respectively. For the wave functions $X_1$, $X_2$, and $X_3$ given at $z=0$, those at $z=2\dW$ are obtained by numerically solving the differential equation (\[5\]). The reflection and transmission amplitudes $A$, $B$, $C$, and $D$ then satisfy the simultaneous equation $$X_1(2\dW)+AX_2(2\dW)+BX_3(2\dW)=CY_1(2\dW)+DY_2(2\dW), \label{13}$$ which is solved algebraically. The reliability of these numerical calculations may be checked by the sum $|A|^2+|B|^2+|C|^2+|D|^2$, which is in excellent agreement with unity in our results. We calculate the asymmetries of the transition rates between CP conjugate processes $$\begin{aligned} A_\g&=&R(\gp\rightarrow\hm)+R(\gm\rightarrow\hp) -R(\agm\rightarrow\ahp)-R(\agp\rightarrow\ahm), \nonumber \\ A_{\c}&=&R(\cp\rightarrow\hp)+R(\cm\rightarrow\hm) -R(\acm\rightarrow\ahm)-R(\acp\rightarrow\ahp), \label{14}\end{aligned}$$ where $\g$ and $\h$ denote the gaugino and the Higgsino in the symmetric phase, respectively, and $\c$ the chargino in the broken phase. The subscripts $(+)$ and $(-)$ refer to a positive and a negative helicities, respectively. If CP is not violated, $A_\g$ and $A_{\c}$ vanish. In Fig. \[fig1\] the absolute values of these CP asymmetries are shown for (a) $A_\g$, (b) $A_{\omega_1}$, and (c) $A_{\omega_2}$ as functions of the particle energy $E$, taking $\theta=\pi/4$, $\tb=2$, $\m2=|\mH|=200$ GeV, and $\dW=1/200$ (GeV)$^{-1}$. The sign of $A_\g$ is negative for $E<\mw2$ and positive for $E>\mw2$, and those of $A_{\omega_1}$ and $A_{\omega_2}$ are positive and negative, respectively. The sum of $A_\g$, $A_{\omega_1}$, and $A_{\omega_2}$ vanishes by CPT invariance. The CP asymmetry $A_\g$ has values of order of 0.1 for the energy range in slightly excess of the particle mass and has much smaller values in the other energy range. Since the mass of the lighter chargino becomes smaller than that of the gaugino, the gaugino is transmitted to the broken phase at a large rate. This makes the magnitude of $A_\g$ rather small in spite of an unsuppressed value for the CP-violating phase. Baryon asymmetry {#sec4} ================ The CP asymmetries of the reflection and transmission rates for the charginos lead to a bias on equilibrium conditions favoring baryon asymmetry in the symmetric phase. The free energy is then minimized at a non-vanishing baryon number, to which the initial equilibrium state with no baryon asymmetry approaches through electroweak anomaly. A simple procedure for relating the CP asymmetries with the bias [@nelson1] is to introduce chemical potentials for conserved and approximately conserved quantum numbers and set these quantum numbers for zero. This makes the chemical potential of baryon number given by a hypercharge density, which is induced by the CP asymmetries. Although this procedure may not be completely correct, it would be able to provide a rough estimate for the bias. Since the hypercharges of the gauginos and the Higgsinos are $0$ and $-1/2$, respectively, the bubble wall emits a net flux of hypercharge by CP violation. The transitions which cause a change of hypercharge in the symmetric phase are (i) $\g\rightarrow\h$, (ii) $\h\rightarrow\g$, $\h\rightarrow\c$, (iii) $\c\rightarrow\h$, and their CP-conjugate transitions. The sum of the probabilities for the transitions in the reaction (ii) is however the same as that for their CP conjugate transitions by CPT invariance, so that a net hypercharge flux can be induced through the reactions (i) and (iii). The hypercharge flux is calculated by convoluting the transition rates with the thermal flux of incoming particles. In the thermal frame at temperature $T$, the incoming flux from the symmetric phase and that from the broken phase, $f_s$ and $f_b$, are given by $$\begin{aligned} f_s&=&\int\int\int_{D_s}\frac{d^3{\bf p}}{(2\pi)^3} (\frac{p_z}{E_T}+v_W)[\exp(\frac{E_T}{T}+1)]^{-1} \quad (D_s: \frac{p_z}{E_T}+v_W>0), \nonumber \\ f_b&=&-\int\int\int_{D_b}\frac{d^3{\bf p}}{(2\pi)^3} (\frac{p_z}{E_T}+v_W)[\exp(\frac{E_T}{T}+1)]^{-1} \quad (D_b: \frac{p_z}{E_T}+v_W<0), \label{15}\end{aligned}$$ where $E_T$ and $p_z$ represent the total energy and the $z$-component of the momentum for the particle. The wall is taken to be perpendicular to the $z$-axis and moving with the velocity $-v_W (v_W>0)$. The net hypercharge flux therefore becomes $$\begin{aligned} F_Y&=&F_\g+\sum_{i=1}^2F_{\c}, \label{16} \\ F_\g&=&-\frac{1}{2}\frac{(1-\vW2)T}{(2\pi)^2} \int_{\m2}^\infty dE E\log[1+\exp\left( -\frac{E-v_W\sqrt{E^2-\m2^2}}{T\sqrt{1-\vW2}} \right)] A_\g, \nonumber \\ F_{\c}&=&-\frac{1}{2}\frac{(1-\vW2)T}{(2\pi)^2} \int_{\mwi}^\infty dE E\log[1+\exp\left( -\frac{E+v_W\sqrt{E^2-\mwi^2}}{T\sqrt{1-\vW2}} \right)] A_{\c}, \nonumber \end{aligned}$$ where $E$ represents $\sqrt{p_\perp^2+m^2}$, $p_\perp$ and $m$ denoting the component of the momentum perpendicular to the wall in the wall rest frame and the mass, respectively, for the relevant particle. Assuming detailed balance for the transitions among the states of different baryon numbers, the rate equation of the baryon number density $\rho_B$ is given by [@dine2] $$\frac{d\rho_B}{dt}=-\frac{\Gamma}{T}\mu_B, \label{17}$$ where $\Gamma$ denotes the rate per unit time and unit volume for the transition between the neighboring states different by unity in baryon number, and $\mu_B$ stands for the chemical potential of baryon number which represents a bias on the fluctuation of baryon number. In the symmetric phase the rate $\Gamma$ is estimated as $$\Gamma=3\kappa(\alpha_WT)^4 , \label{18}$$ where $\kappa$ is of order of unity [@ambjorn]. The chemical potential $\mu_B$ may be related to the hypercharge density through equilibrium conditions [@ewbrev; @nelson1]. In the symmetric phase the gauge interactions and the $t$-quark Yukawa interactions are considered to be in chemical equilibrium. We also take that the self interactions of the Higgs bosons, the Higgsinos, and the gauginos are in equilibrium, respectively. Among the supersymmetric particles, the squarks, sleptons, and gluinos are assumed to be heavy enough. Before the net hypercharge flux is emitted from the wall, the baryon number and the lepton number vanish. We thus impose for equilibrium conditions vanishing values on the baryon and the lepton number densities in each generation, and on the number densities of the right-handed quarks and leptons except the $t$-quark. These constraints lead to the chemical potential for baryon number given by $$\mu_B=-\frac{2\rho_Y}{7T^2}, \label{19}$$ where $\rho_Y$ stands for the hypercharge density. The net hypercharge flux into the symmetric phase induces a net hypercharge density, which makes $\mu_B$ non-vanishing. We now estimate the baryon number density $\rho_B$ from Eqs. (\[17\]), (\[18\]), and (\[19\]) as $$\begin{aligned} \rho_B&=&\frac{2\Gamma}{7T^3} \int_{-\infty}^{z/v_W}dt\rho_Y(z-v_Wt) =\frac{2\Gamma}{7T^3v_W}\int_0^\infty dz\rho_Y(z) \nonumber \\ &\approx&\frac{2\Gamma F_Y\tau_T}{7T^3v_W}, \end{aligned}$$ where $\tau_T$ is the time which carriers of the hypercharge flux spend in the symmetric phase. This transport time $\tau_T$ may be approximated by the mean free time of the carriers. The rough estimate for $\tau_T$ gives a value of order of $10^2/T-10^3/T$ for the leptons [@joyce], which would also be applicable to the gauginos and the Higgsinos. The ratio of the baryon number to entropy is given by $$\frac{\rho_B}{s}=\frac{135\kappa\alpha_W^4F_Y\tau_T} {7\pi^2g_*v_WT^2},$$ where $g_*$ represents the relativistic degrees of freedom for the particles. For definiteness, we take $g_*=124.75$, where SU(2)$\times$U(1) gauginos and Higgsinos are taken into account as well as gauge bosons, Higgs bosons, quarks, and leptons. We show the ratio of baryon number to entropy in Fig. \[fig2\] as a function of the mass parameter $\m2 (=|\mH|)$ for $\tb=2$ and (a) $\theta=\pi/4$ and (b) $\theta=0.1$. For simplicity, we have taken the same value for $\m2$ and $|\mH|$. In the mass range where curves are not drawn, the lighter chargino has a mass smaller than 45 GeV, which is ruled out by experiments [@pdg]. The temperature is taken for $T=200$ GeV. The wall velocity $v_W$ and the wall width $\dW$ have been estimated in the SM as $v_W=0.1-1$ and $\dW\sim 10/T$ [@turok], although there are large uncertainties and model dependences. If the phase transition is strongly first order, the wall width generally becomes thinner. We take four sets of values for $v_W$ and $\dW$ listed in Table \[tab1\], which correspond to four curves (i.a)-(ii.b). For definiteness we set the transport time for $\tau_T=100/T$. The resultant ratio is around $10^{-10}$ for $\theta=\pi/4$ and $10^{-11}$ for $\theta=0.1$, which are consistent with the present observed value $\rho_B/s=(2-9)\times 10^{-11}$ [@pdg]. Except the CP-violating phase $\theta$, the ratio does not vary much with the SSM parameters $\m2$, $|\mH|$, and $\tb$. In Fig. \[fig3\] the ratio of baryon number to entropy is shown as a function of $\theta$ for (i) $T=100$ GeV and (ii) $T=200$ GeV, taking $\tb=2$, $\m2=|\mH|=200$ GeV, $v_W=0.6$, and $\dW=1/T$. If the CP-violating phase is of order of $0.01$, only a large value for $\tau_T$ of order of $10^{3}/T$ barely gives a compatible value. In the SSM the CP-violating phase $\theta$ gives large contributions to the electric dipole moments (EDMs) of the neutron and the electron at one-loop level through the diagrams mediated by the charginos [@edm]. In Fig. \[fig4\] the neutron EDM is shown as a function of $\m2 (=|\mH|)$ for $\tb=2$. Four curves correspond to four sets of values for $\theta$ and the mass for the $u$- and $d$-squarks, which are listed in Table \[tab2\]. The experimental upper bound on the magnitude of the neutron EDM is about $10^{-25} e$cm [@pdg]. In order to satisfy this bound, the squark mass should be around or larger than 1 TeV for $\theta\sim 0.1$ and 3 TeV for $\theta\sim 1$. Similar constraints are obtained from the EDM of the electron. Summary {#sec5} ======= We studied the electroweak baryogenesis mediated by the charginos in the SSM following the charge transport mechanism. The observed baryon asymmetry is explained in reasonable ranges of the SSM parameters. However, the CP-violating phase cannot be so small as estimated in the literature. This is mainly because the gauginos or the Higgsinos incident on the wall from the symmetric phase can be transmitted to the broken phase, thus reducing the overall reflection rates in the wide region of the parameter space. Assuming a moderate value for the transport time, the phase should be at least of order of $0.1$. If this is the case, the squark masses are predicted to be around or larger than 1 TeV from the analysis of the EDM of the neutron. The SSM has some ambiguities in the Higgs sector. The minimal version of the SSM contains two Higgs doublets and no singlet. However, having a singlet field may well be motivated from various standpoints in particle physics, which could make the electroweak phase transition strongly first order. It should be noted that the chargino sector relevant to our discussions does not depend much on whether the SSM has a singlet or not, so that our analyses are mostly applicable to both cases. The baryon asymmetry could also be generated by the neutralinos which consist of neutral SU(2)$\times$U(1) gauginos and Higgsinos. This neutralino contribution would be at most the same order of magnitude as the chargino contribution. One of the authors (N.O.) thanks A.E. Nelson for informing him of their work [@nelson1]. We thank T. Uesugi and K. Yamamoto for helpful discussions. This work is supported in part by the Grant-in-Aid for Scientific Research for the Ministry of Education, Science and Culture (No. 08640357). V.A. Kuzmin, V.A. Rubakov, and M.E. Shaposhnikov, Phys. Lett. 155B, 36 (1985). For reviews, see e.g. A.G. Cohen, D.B. Kaplan, and A.E. Nelson, Annu. Rev. Nucl. Part. Sci. 43, 27 (1993);\ K. Funakubo, Prog. Theor. Phys. 96, 475 (1996). For reviews, see e.g. H.P. Nilles, Phys. Rep. 110, 1 (1984);\ P. Nath, R. Arnowitt, and A.H. Chamseddine, [*Applied N=1 Supergravity*]{} (World Scientific, Singapore, 1984);\ H.E. Haber and G.L. Kane, Phys. Rep. 117, 75 (1985). J. Ellis, S. Ferrara, and D.V. Nanopoulos, Phys. Lett. 114B, 231 (1982);\ W. Buchmüller and D. Wyler, Phys. Lett. 121B, 321 (1983);\ J. Polchinski and M.B. Wise, Phys. Lett. 125B, 393 (1983);\ F. del Águila, M.B. Gavela, J.A. Grifols, and A. Méndez, Phys. Lett. 126B, 71 (1983). G.F. Giudice, Phys. Rev. D45, 3177 (1992);\ S. Myint, Phys. Lett. B287, 325 (1992);\ J.R. Espinosa, M. Quirós, and F. Zwirner, Phys. Lett. B307, 106 (1993);\ A.T. Davies, C.D. Froggatt, and R.G. Moorhouse, Phys. Lett. B372, 88 (1996). A.E. Nelson, D.B. Kaplan, and A.G. Cohen, Nucl. Phys. B373, 453 (1992). P. Huet and A.E. Nelson, Phys. Rev. D53, 4578 (1996). A.G. Cohen, D.B. Kaplan, and A.E. Nelson, Phys. Lett. B245, 561 (1990); Nucl. Phys. B349, 727 (1991). M. Dine, P. Huet, R. Singleton Jr., and L. Susskind, Phys. Lett. B257, 351 (1991);\ A.G. Cohen, D.B. Kaplan, and A.E. Nelson, Phys. Lett. B263, 86 (1991);\ A.G. Cohen and A.E. Nelson, Phys. Lett. B297, 111 (1992);\ S.A. Abel, W.N. Cottingham, and I.B. Whittingham, Nucl. Phys. B410, 173 (1993). M. Dine and S. Thomas, Phys. Lett. B328, 73 (1994);\ M. Joyce, T. Prokopec, and N. Turok, Phys. Lett. B339, 312 (1994). M. Dine, O. Lechtenfeld, B. Sakita, W. Fischler, and J. Polchinski, Nucl. Phys. B342, 381 (1990). J. Ambjorn, T. Askgaard, H. Porter, and M.E. Shaposhnikov, Phys. Lett. B244, 479 (1990); Nucl. Phys. B353, 346 (1991);\ J. Ambjorn and A. Krasnitz, Phys. Lett. B362, 97 (1995). M. Joyce, T. Prokopec, and N. Turok, Phys. Lett. B338, 269 (1994); Phys. Rev. D53, 2930 (1996). Particle Data Group, Phys. Rev. D54, 1 (1996). N. Turok, Phys. Rev. Lett. 68, 1803 (1992);\ M. Dine, R.G. Leigh, P. Huet, A. Linde, and D. Linde, Phys. Rev. D46, 550 (1992);\ B.H. Liu, L. McLerran, and N. Turok, Phys. Rev. D46, 2668 (1992);\ P. Huet, K. Kajantie, R. G. Leigh, B.-H. Liu, and L. McLerran, Phys. Rev. D48, 2477 (1993). Y. Kizukuri and N. Oshimo, Phys. Rev. D45, 1806 (1992); Phys. Rev. D46, 3025 (1992). ------- ------- ------- -------- -------- (i.a) (i.b) (ii.a) (ii.b) $v_W$ 0.1 0.1 0.6 0.6 $\dW$ 1/T 5/T 1/T 5/T ------- ------- ------- -------- -------- : The values of $v_W$ and $\dW$ for curves (i.a)–(ii.b) in Fig. \[fig2\].[]{data-label="tab1"} ------------------- --------- --------- ------- ------ (i) (ii) (iii) (iv) $\theta$ $\pi/4$ $\pi/4$ 0.1 0.1 Squark mass (TeV) 1 5 1 5 ------------------- --------- --------- ------- ------ : The values of $\theta$ and the squark mass for curves (i)–(iv) in Fig. \[fig4\]. []{data-label="tab2"}
CHARLOTTESVILLE, Va. — A white supremacist rally planned for noon on Saturday, and billed as the largest in decades, was declared an “unlawful assembly” and was cleared by law enforcement. The gathering turned violent before noon, as waves of arriving white nationalist marchers armed with cudgels and carrying shields met with heckles and projectiles from counterprotesters who sought to block their route. Governor Terry McAuliffe (D-VA) declared a state of emergency “to aid state response to violence” at the rally. National Guard could be seen, as well as state police. The city of Charlottesville also declared a local emergency, which allows it to access additional resources to respond to the conflict. Late Friday night, a judge granted the white nationalist group permission to rally in protest of the city’s decision to take down a statue of Confederate Gen. Robert E. Lee from Emancipation Park. Police in riot gear have now taken the high ground in Emancipation Park. #Charlottesville pic.twitter.com/PvS0KImPgK — Robert King (@RbtKing) August 12, 2017 As the crowd built up outside the park where the rally was to be held, minor scuffles started breaking out between counter protesters – a mix of silent prayer, Black Lives Matter and anti-fascist – knowns as “antifa” – and the KKK-like group promoting white supremacy. The park entrance where the worst of the violence erupted had earlier in the day been blocked by clergy in religious robes, members of a separate nonviolent resistance protest against the hate rally. Standing two and three deep, shoulder to shoulder, the clergy eventually gave way in the face of a concerted forward march by the white power vanguard with their shields. A tense scene had pervaded for hours Saturday morning, with occasional small scuffles here and there, but it was not until around 11 o’clock that the violence fully broke out. Virginia state troopers shut down two corners of the park where the rally was to be held. This left open two staircase entrances on the other two corners along Market Street, with barriers guiding rallygoers single-file into the park. Fights occasionally break into the open with clubs, shields, pepper spray. The only de-escalation is self-policing by each side. CREDIT: ThinkProgress/Joshua Eaton At one of those two entrances, a group of heavily armed, unidentified militiamen stood by the groups of white nationalists, while a group of antifa counterprotesters sought to rile them up. State police stood above, between metal barriers at the edge of the park, watching. At the other entrance a group of clergy stood two deep at the top of the stairs, seeking to block passage. But after the corner below erupted in clashes, the group was forced to stand aside as white nationalists filed up this staircase and made it into the park. It was unclear if the clergy resisted. From that new vantage point, Unite the Right rallygoers began throwing water bottles back at the antifa group that had begun flinging bottles, balloons, and other objects. ThinkProgress reporter Joshua Eaton also noted that protesters, armed with homemade shields, were using mace and pepper spray on each other. Between these two entrances, a fight began between antifa counterprotesters and white nationalists, focused near the corner where this ThinkProgress Facebook Live video took place, there have been fights as well as bottles and smoking cannisters thrown. Throughout all of this, the Virginia state troopers stayed off to the side, not intervening, as they have almost the entire area cordoned off. Armed militiamen stand in front of riot police after Saturday's white supremacist rally was deemed an unlawful gathering in Charlottesville, VA. CREDIT: ThinkProgress/Joshua Eaton After the Facebook Live video, ThinkProgress reporter Alan Pyke watched a smoking cannister fired from the group of white supremacists in the park into the group of counterprotesters. Then a white nationalist organizer in the park announced through a bullhorn that the rally had been deemed an unlawful assembly and they’ve been ordered to disperse. A Charlottesville police officer then confirmed this through a megaphone and ordered everyone to disperse. Fights continued to spasm through the crowd for another half hour as most filed away through the streets open to them. Arrests are being made following declaration of unlawful assembly at Emancipation Park in Charlottesville. #cvilleaug12 pic.twitter.com/6XAn1hYLAS — VA State Police (@VSPPIO) August 12, 2017 Eaton, standing one block away from the park, said that while riot police used a small amount of tear gas to clear the gathering, they initially allowed protesters to gather in nearby intersections and streets. “Protests have now largely moved to the side streets,” said Eaton who could see hundreds of protesters in the two blocks around the park after the rally was disbursed. Protestors at rally in Emancipation Park charge at VSP troopers. #cvilleaug12 pic.twitter.com/GwheDCi3hL — VA State Police (@VSPPIO) August 12, 2017 The “scores” of riot police started to line up at the 1st Street intersection near the park and started to push protesters out of the streets. Observing the tense scene leading up the march, Eaton and Pyke initially noted the sparse police presence there. The white supremacists also marched through the campus of the University of Virginia on Friday night, seemingly setting the tone for Saturday. Eaton reported: …hundreds of white, mostly male, protesters broke over the steps of the UVA rotunda, flaming torches held aloft. As they spilled into the courtyard below, the protesters surrounded the Jefferson statue and the counter-protesters with a circle of torches as they chanted “you will not replace us” and “white lives matter.” Earlier this week, Sebastian Gorka, a deputy assistant to President Trump, told Breitbart News that people should stop criticizing white supremacists so much. D. Parvaz contributed reporting to this article. Watch below for scenes from the rally:
NEW DELHI: Congress leader P Chidambaram was on Thursday sent to CBI custody till August 26 by a Delhi court which said his custodial interrogation was justified in the INX Media corruption case."Allegations against Chidambaram are serious in nature and in-depth investigation is required," the court said as it rejected the arguments of the Congress leader's lawyers."Considering the facts and circumstances, I am of the view that police custody is justified," special judge Ajay Kumar Kuhar said after listening to the arguments of both sides."Trail of money, if so paid, is to be ascertained. It is a case based on documentary evidence and those documents need to be traced," the court said.The court observed that allegations of payment to Chidambaram in 2007-08 and 2008-09 are specific and categorical."Investigation needs to be brought to a logical end for which custodial interrogation is sometimes found useful and fruitful," it said.Ruling in favour of CBI, the court ordered that during Chidambaram's custody the agency will get him medically examined regularly as per the rules, and allowed his family members and lawyers to meet him for half an hour every day.Chidambaram was produced in the court amidst tight security and senior advocate Kapil Sibal, appearing for him, argued that the first arrest in the case was of Bhaskar Raman, chartered accountant of Karti, who is presently out on bail.The court heard the arguments of the CBI and Chidambaram's counsel for over one-and-half hours during which the agency said there was a need to unearth a larger conspiracy and to go to the root of the case.Chidamabaram's counsel opposed the CBI plea saying that all the other accused, including his son Karti, have already been granted bail in the case.Besides that, Peter and Indrani Mukherjea, also accused in the case, are out on default bail as they are in jail in connection with another matter, Sibal said.He said the FIPB approval was given by senior officials, who were not arrested.He also contended that grant of bail was a rule and the issue before the court was of personal liberty.However, solicitor general Tushar Mehta said CBI has to interrogate Chidambaram in custody as he was non-cooperative and evasive in replies.The solicitor general told the court that the agency was not extorting confession from Chidambaram but it had the right to reach the root of the case."It is a serious case involving intelligent people and we will fail in our duty if we don't get to the root of the case," the solicitor general said, adding that even Karti underwent custodial interrogation in the case.Mehta said Chidambaram has tremendous potential of not cooperating in probe since he is highly intelligent and certain facts about the case cannot be narrated in the open court.Besides Sibal, senior advocate Abhishek M Singhvi also appeared for Chidambaram, and opposed CBI's plea saying that the former Union minister was not a flight risk.Singhvi said the entire CBI case was based on the statement of Indrani Mukherjea, who has turned approver in the case.He said Chidambaram cannot answer what CBI wants to hear and added that the agency cannot seek remand on the ground of evasive replies.He also argued that there was no allegation of tampering of evidence by CBI.Singhvi further contended that police remand can only be granted in special circumstances and this was a case where there was no new development.He said the agency was asking Chidambaram only old questions since his arrest on Wednesday night.Mehta countered the arguments advanced on behalf of Chidambaram, saying that everybody was equal before the court.He also opposed the plea that Chidambaram be allowed to argue for himself, saying he has able lawyers representing him.Mehta said during his initial arguments that Chidambaram entered into a criminal conspiracy with others in the scam.Chidambaram was arrested after issuance of non-bailable warrant against him, he said, adding that it is a serious and monumental case of money laundering."He is not cooperating in the investigation," Mehta said, adding that he has been evasive in replies and grave offence was committed.He also said Chidambaram's custodial interrogation was necessary to unearth the "quid pro quo and larger conspiracy" and he is required to be confronted with documents.Mehta contended that serious, active and informed role of the accused is made out and money trail is made out and has to be probed.Opposing CBI's arguments, Sibal contended that what the agency said be not taken as "gospel truth".He said that Chidambaram was asked 12 questions and he had already answered six of them previously.Sibal said Chidambaram had requested the agency sleuths to take him in custody on Thursday morning as he had not slept for last 24 hours.But they did not listen to him and took him last night itself, he said.Sibal further argued that CBI could have written a letter to Chidambaram for producing the documents alleged to be in his possession and the agency cannot say he was evasive during the investigation.After the pronouncement of the order, 73-year-old Chidambaram was immediately taken out of the court room by the CBI team.Chidambaram, who was Union home minister and also finance minister during the UPA rule from 2004 to 2014, was arrested Wednesday night after he failed to get protection from the Supreme Court, which did not list for an urgent hearing his appeal against the Delhi high court verdict dismissing his anticipatory bail plea on Tuesday.The CBI had registered an FIR on May 15, 2017, alleging irregularities in the Foreign Investment Promotion Board (FIPB) clearance granted to the INX Media group for receiving overseas funds of Rs 305 crore in 2007 during Chidambaram's tenure as the finance minister.Thereafter, the ED lodged a money laundering case in this regard in 2018.
Q: Why can't the second MAV reach the Hermes? In the beginning of The Martian, the first MAV can reach orbiting Hermes just fine with 5 passengers on board. Yet towards the end of the movie, we are shown that the second MAV needs to lose weight to do the same, even with only one passenger. Why is this? A: As explained in this answer: Shortly after Watney discovers he's stranded he mentions the Ares IV MAV is already on-planet, though it is far away - much further away than the buggy can take him. Needing to reach the Ares IV mission site (where the Ares IV MAV is already) is what prompts him to start retrofitting the buggy for longer journeys. The MAV is an ascent vehicle, only designed to get its occupants into Mars orbit, and not much else. The Hermes should have been in Martian orbit when the Ares IV MAV launched, and the MAV would have no trouble reaching the ship. However to rescue Watney the Hermes' return trajectory involved a slingshot around Mars, intentionally avoiding entering orbit so they'd be able to return home. This meant the Hermes was going significantly faster than the speed the MAV was designed to intercept at. In order for the MAV to gain enough velocity, its weight had to be reduced.
Colney Expansion Original Plans Shocker Some stories you have to dig for. Furiously scratch at the undergrowth to reveal the glowing truth. A truth that had been concealed by desperate people willing to resort to skullduggery and nefarious means to secrete the facts. You may get dirty in the process but the public deserve to know. The lengths you must resort to may weigh upon your conscience – but the truth will out. Other stories literally fall into your lap. I was at my usual spot outside Arsenal’s Colney training complex. The security guard who stood sentry had been made aware of my visage some time ago and had made it his duty to stymie my attempts to gain access to the holy grail of Gooner fandom. As the players luxury automobiles drove past me, some took pity on this devoted, if slightly unhinged fan and stopped to sign autographs. That is until they recognised my face and hurriedly zoomed away. The piece of DNA I needed from Santi Cazorla to create the ultimate Arsenal player would have to wait. I already had all the spit I could ever need from the rest of the squad as they grew to hate my repeated attempts to steal their underwear. I stood in vain hope that a player would stop their car, wind down the window and leave their luxurious head of hair unguarded. Not one even remotely slowed their sojourn into training. I slumped into my foldable chair and supped at my flask of Um Bongo. I would wait out the hours it would take for my heroes to finish honing and sculpting their talents and attempt to curry favour with them as they exited. Maybe try laying in front of the cars as they approached again – although the bruises on my abdomen proved to be an effective reminder of the risk involved. As I sat musing on tactics to obtain the last jigsaw piece to my Gunner-RoboCop, in my field of vision thanks to my powerful binoculars fell a nondescript suited man shaking hands with none other than Ivan Gazidis. They were shaking hands at the exterior door. Gazidis went back inside and the suited man started to walk up the slim road to where I sat. He approached me and asked where the nearest bus stop was. It was strange that such an official looking man would look to use public transport as transit. I informed him of the long distance involved but no emotion nor reaction was displayed. With a curt nod he started the long walk towards the bus stop. I watched him until he could no longer be seen. The encounter struck me as strange, especially seeing as the man had just been involved in a meeting with Arsenal hierarchy. I contemplated on the finer nuances of the interaction until my eyes fell upon the floor and what lay upon it. It is now common knowledge that Arsenal have been granted permission to extend and improve the facilities at their expansive Colney training complex. The plans have been viewed and details that were previously sequestered were now in the public eye. The details I held in my hand at that moment were also of training ground plans but held no parallel with the plans that are currently in place. The object that lay on the floor – upon closer scrutiny – were the original plans for the Colney expansion plans. The details that lay in my palm were vastly different to the ones that everyone know of now. I stuffed the valuable papers into my coat and sped away from the scene. The DNA chase could wait. I went back to my abode so I could pore over the plans. The details that I was privy to and now share with you all are of stark contrast to the ones that have been officially released. The biggest difference would be that all ceilings of all buildings were originally going to be lifted by about seven inches to negate the maintenance costs of continually fixing where Per Mertesacker kept headbutting door frames and lighting. Common sense really. Amongst the other startling revelations was a planned salon for Mikel Arteta. Seeing as Arteta may be at the club post-career, the club were looking to accomodate Mikel’s demands that his hair must always be of immaculate standard. The permanent transfer of Nicky Clark however, was ongoing. Another eyebrow-raiser was a Hall of Mirrors that was exclusively for Olivier Giroud. Our chisel-jawed Gaul had complained of a lack of opportunity to view his wonderful features and thus, the club had looked to give him a room devoted to the pursuit of physical perfection. Seeing as injuries had blighted our start to the season and had continued to dine upon our players, an expansion to the medical centre was in the original plans, but attached to the building was an offshoot of this facility. In this attachment was a massive playroom, filled with ballpits, board games, the finest gaming consoles and other assorted fun activities. It was exclusively for Abou Diaby in his downtime from extensive massages and horse placenta applications. There was ample room for his choice of playmates, be it Jack Wilshere, Aaron Ramsey or Keiran Gibbs – who had regularly frequented the injury centre in the past. A boxing ring had also been lined up amongst the other fitness paraphernalia. This had another use though, other than another novel way to develop strength and core fitness. Steve Bould had requested it, on the grounds that the frustration he had in seeing his defensive suggestions falling on deaf ears in the early part of the season had caused his ulcers to act up. He had needed a safe method of catharsis in order to improve his health and keep the three hairs that sat upon his head. Other improvements that had been included in the first set of plans were a permanently running treadmill so Alexis Sanchez can continue his chase for the zenith of fitness, a stage in the centre of the canteen so Carl Jenkinson and Alex Oxlade-Chamberlain could work on their ‘banter’ and entertain the players and staff, a gymnastics expert for Laurent Koscielny so he could continue to excel in acrobatic clearancesand not forgetting a ban on zips of any kind within the training complex. At the back of the dossier, was a single sheet of paper stamped in red ink with the word ‘CONFIDENTIAL’. This sheet contained the biggest and perhaps the most controversial of all the advancements Arsenal had planned. Dead in the centre of the facilities would be a room filled with high-backed chairs and luxurious comfort. Music that relaxed and enchanted the soul would be piped in to set at ease any who was within its confines. The men who would have access to this sacrosanct room would require a key of which only three would have existed. Only Jack Wilshere, Wojicech Szczesny and Arsene Wenger would have had possession of the keys. They would go there to unwind and relax. They would go there to smoke the finest of cigars from Cuba and cigarettes rolled on the thighs of Robert Pires. It was a smoking room. I recoiled when reading this for the first time. These original plans though, they must be disseminated . The people must know. I’ve kept this to myself and have been forced to live out of my car, moving from place to place as the Club have me in their sights. I live in fear and in the shadows. I know I haven’t much time left. My Arsenal DNA project would never reach fulfillment. You all must know the truth. I must leave. Someone is knocking on my car window and I didn’t order room service…………….
Circular Water Management Used water is not an alternative supply to fresh water - it has always been the supply. Although water is renewable, there is only a fixed amount on earth. The same water that was here billions of years ago still exists today and must be used again and again over centuries to come. This means there is no "new" water available, and much water must be treated in order to be re-used. When wastewater is treated, those discharges become a source of drinking water for downstream users. Most of the world's population drinks from rivers and streams that have received these discharges. The Challenge Water use has tripled globally since 1950 and demand is growing rapidly. It's estimated that 80% of used water is discharged back to the natural environment without any treatment, and this reduces the potential for the water it is polluting to be used effectively. The Business Case Increased water demand from people, agriculture, energy and industry endangers water supply security. However, reusing and recycling water enhances that security by saving large quantities of freshwater – while lowering costs, reducing environmental pollution and improving carbon footprints. Given the increasing demand on limited resources though, focusing solely on efficiency is not sufficient. The Business Solution Our circular water management business solution aims to change the business mindset so that by 2020, water treatment, water efficiency, and recycling and re-use projects are cost-effective options and common practice worldwide. We will explore ways to avoid wasting useful resources (water, energy, heat, nutrients, bioplastics) through more sustainable and circular business models. We will implement actions to increase awareness of the opportunities in cross-sector collaboration (e.g. industry-to-industry, municipal-to-industry, industry-to-agriculture) and their financial viability. We aim to maximize water re-use by developing pilot projects and guidelines, showcasing best practices and sharing smart solutions.
Q: Glimpse.MVC4 1.3.2 tabs are not showing up I'm new to Glimpse. My setup: MVC4, EF5, VS 2012, .NET 4.5. I installed Glimpse using the Package Manager Console. Output: PM> Install-Package Glimpse Successfully installed 'Glimpse 1.5.0'. Successfully added 'Glimpse 1.5.0' to MyProject.Web. PM> Install-Package Glimpse.AspNet Attempting to resolve dependency 'Glimpse (= 1.4.2)'. Successfully installed 'Glimpse.AspNet 1.3.1'. Successfully added 'Glimpse.AspNet 1.3.1' to MyProject.Web. PM> Install-Package Glimpse.Mvc4 Attempting to resolve dependency 'Glimpse.AspNet (= 1.3.0)'. Attempting to resolve dependency 'Glimpse (= 1.4.2)'. Successfully installed 'Glimpse.Mvc4 1.3.2'. Successfully added 'Glimpse.Mvc4 1.3.2' to MyProject.Web. PM> Install-Package Glimpse.Ado Attempting to resolve dependency 'Glimpse (= 1.4.0)'. Successfully installed 'Glimpse.Ado 1.4.1'. Successfully added 'Glimpse.Ado 1.4.1' to MyProject.Web. PM> Install-Package Glimpse.EF5 Attempting to resolve dependency 'Glimpse.Ado (= 1.4.1)'. Attempting to resolve dependency 'Glimpse (= 1.4.0)'. Successfully installed 'Glimpse.EF5 1.3.1'. Successfully added 'Glimpse.EF5 1.3.1' to MyProject.Web. Browsing to: http://localhost/glimpse.axd gives this result: Registered Tabs: Glimpse.Ado (1.4.1) SQL - Glimpse.Ado.Tab.SQL - EndRequest Glimpse.AspNet (1.3.1) Configuration - Glimpse.AspNet.Tab.Configuration - EndRequest Environment - Glimpse.AspNet.Tab.Environment - EndRequest Request - Glimpse.AspNet.Tab.Request - EndRequest Routes - Glimpse.AspNet.Tab.Routes - EndRequest Server - Glimpse.AspNet.Tab.Server - EndRequest Session - Glimpse.AspNet.Tab.Session - EndSessionAccess Glimpse (1.5.0) Timeline - Glimpse.Core.Tab.Timeline - EndRequest Trace - Glimpse.Core.Tab.Trace - EndRequest Runtime Policies: Glimpse.AspNet (1.3.1) Glimpse.AspNet.Policy.LocalPolicy - BeginRequest *This policy means that Glimpse won't run remotely.* Glimpse (1.5.0) Glimpse.Core.Policy.AjaxPolicy - BeginRequest Glimpse.Core.Policy.ContentTypePolicy - EndRequest Glimpse.Core.Policy.ControlCookiePolicy - BeginRequest Glimpse.Core.Policy.GlimpseResourcePolicy - ExecuteResource Glimpse.Core.Policy.StatusCodePolicy - EndRequest Glimpse.Core.Policy.UriPolicy - BeginRequest Detailed Settings: Inspectors: Glimpse.Ado (1.4.1) Glimpse.Ado.Inspector.AdoInspector Glimpse.AspNet (1.3.1) Glimpse.AspNet.Inspector.RoutesInspector Glimpse (1.5.0) Glimpse.Core.Inspector.TraceInspector Glimpse.EF5 (1.3.1) Glimpse.EF.Inspector.EntityFrameworkInspector Resources: Glimpse (1.5.0) glimpse_ajax - Glimpse.Core.Resource.AjaxResource - parentRequestId (True), hash (False), callback (False) glimpse_client - Glimpse.Core.Resource.ClientResource - hash (False) glimpse_config - Glimpse.Core.Resource.ConfigurationResource - glimpse_history - Glimpse.Core.Resource.HistoryResource - top (False), hash (False) glimpse_logo - Glimpse.Core.Resource.LogoResource - hash (False) glimpse_metadata - Glimpse.Core.Resource.MetadataResource - hash (False), callback (False) glimpse_popup - Glimpse.Core.Resource.PopupResource - requestId (True), hash (False) glimpse_request - Glimpse.Core.Resource.RequestResource - requestId (True), hash (False), callback (False) glimpse_sprite - Glimpse.Core.Resource.SpriteResource - hash (False) glimpse_version_check - Glimpse.Core.Resource.VersionCheckResource - hash (False), stamp (True), callback (False) Client Scripts: Glimpse (1.5.0) Glimpse.Core.ClientScript.Client - ClientInterfaceScript Glimpse.Core.ClientScript.Data - RequestDataScript Glimpse.Core.ClientScript.Metadata - RequestMetadataScript Framework Provider: Glimpse.AspNet.AspNetFrameworkProvider Html Encoder: Glimpse.Core.Extensibility.AntiXssEncoder Logger: Glimpse.Core.Extensibility.NLogLogger Persistence Store: Glimpse.Core.Framework.ApplicationPersistenceStore Resource Endpoint: Glimpse.AspNet.HttpHandlerEndpointConfiguration Serializer: Glimpse.Core.Extensibility.JsonNetSerializer Default Resource: Glimpse.Core.Resource.ConfigurationResource - glimpse_config Default Runtime Policy: Glimpse.Core.Extensibility.RuntimePolicy Proxy Factory: Glimpse.Core.Framework.CastleDynamicProxyFactory Message Broker: Glimpse.Core.Extensibility.MessageBroker Endpoint Base Uri: ~/Glimpse.axd Registered Packages: NOTE, doesn't represent all the glimpse dependent Nuget packages you have installed, just the ones that have registered as a Glimpse Nuget package Glimpse.Ado - 1.4.1 Glimpse.EF5 - 1.3.1 Glimpse - 1.5.0 Glimpse.AspNet - 1.3.1 Glimpse.Mvc4 - 1.3.2 <--- was missing earlier, but after clearing temporary asp.net files, this appeared. I can see the Glimpse icon on the browser and I can see the following tabs with data: Configuration Environment Request Routes SQL Server Session Timeline Trace But any tab related to MVC4 is missing. Execution Model Binding Metadata Views Things that I've tried to fix this problem, but failed. Tried using @Html.GlimpseClient() as I was getting not found as seen in the log, but it didn't help. I was able to see Glimpse icon and other tabs even when I was getting this error. I don't have any custom model binders, it is just a regular MVC4 web project. So I don't the fix for the custom model binder will work. I maybe wrong. Cleared "temporary asp.net files" and now on the "Registered Packages:" list above, I see Glimpse.Mvc4 - 1.3.2. Vola! But, I still don't see MVC related tabs. Stuck here now. I'm enjoying data in other tabs very much, but would love to get the MVC tabs as well. Glimpse log: 2013-07-23 02:23:50.2773 | DEBUG | RuntimePolicy set to 'ExecuteResourceOnly' by IRuntimePolicy of type 'Glimpse.Core.Policy.GlimpseResourcePolicy' during RuntimeEvent 'ExecuteResource'. | 2013-07-23 02:23:59.0328 | DEBUG | RuntimePolicy set to 'ExecuteResourceOnly' by IRuntimePolicy of type 'Glimpse.Core.Policy.GlimpseResourcePolicy' during RuntimeEvent 'ExecuteResource'. | 2013-07-23 02:24:07.2382 | DEBUG | RuntimePolicy set to 'ExecuteResourceOnly' by IRuntimePolicy of type 'Glimpse.Core.Policy.GlimpseResourcePolicy' during RuntimeEvent 'ExecuteResource'. | 2013-07-23 02:24:26.9564 | WARN | Unable to locate '</body>' with content encoding 'Unicode (UTF-8)'. Response may be compressed. | 2013-07-23 02:24:27.4934 | DEBUG | RuntimePolicy set to 'ExecuteResourceOnly' by IRuntimePolicy of type 'Glimpse.Core.Policy.GlimpseResourcePolicy' during RuntimeEvent 'ExecuteResource'. | 2013-07-23 02:24:41.8112 | DEBUG | RuntimePolicy set to 'ModifyResponseHeaders' by IRuntimePolicy of type 'Glimpse.Core.Policy.AjaxPolicy' during RuntimeEvent 'BeginRequest'. | 2013-07-23 02:24:42.7413 | DEBUG | RuntimePolicy set to 'ModifyResponseHeaders' by IRuntimePolicy of type 'Glimpse.Core.Policy.AjaxPolicy' during RuntimeEvent 'BeginRequest'. | 2013-07-23 02:24:55.0730 | DEBUG | RuntimePolicy set to 'ModifyResponseHeaders' by IRuntimePolicy of type 'Glimpse.Core.Policy.AjaxPolicy' during RuntimeEvent 'BeginRequest'. | 2013-07-23 02:24:59.2632 | DEBUG | RuntimePolicy set to 'ExecuteResourceOnly' by IRuntimePolicy of type 'Glimpse.Core.Policy.GlimpseResourcePolicy' during RuntimeEvent 'ExecuteResource'. | 2013-07-23 02:25:07.2067 | DEBUG | RuntimePolicy set to 'ExecuteResourceOnly' by IRuntimePolicy of type 'Glimpse.Core.Policy.GlimpseResourcePolicy' during RuntimeEvent 'ExecuteResource'. | 2013-07-23 02:25:12.0079 | DEBUG | RuntimePolicy set to 'ExecuteResourceOnly' by IRuntimePolicy of type 'Glimpse.Core.Policy.GlimpseResourcePolicy' during RuntimeEvent 'ExecuteResource'. | 2013-07-23 02:25:15.0111 | DEBUG | RuntimePolicy set to 'Off' by IRuntimePolicy of type 'Glimpse.Core.Policy.ContentTypePolicy' during RuntimeEvent 'EndRequest'. | 2013-07-23 02:25:15.0111 | DEBUG | RuntimePolicy set to 'Off' by IRuntimePolicy of type 'Glimpse.Core.Policy.ContentTypePolicy' during RuntimeEvent 'EndRequest'. | 2013-07-23 02:25:15.1161 | DEBUG | RuntimePolicy set to 'Off' by IRuntimePolicy of type 'Glimpse.Core.Policy.ContentTypePolicy' during RuntimeEvent 'EndRequest'. | 2013-07-23 02:25:15.3461 | DEBUG | RuntimePolicy set to 'ExecuteResourceOnly' by IRuntimePolicy of type 'Glimpse.Core.Policy.GlimpseResourcePolicy' during RuntimeEvent 'ExecuteResource'. | 2013-07-23 02:25:19.7284 | DEBUG | RuntimePolicy set to 'ExecuteResourceOnly' by IRuntimePolicy of type 'Glimpse.Core.Policy.GlimpseResourcePolicy' during RuntimeEvent 'ExecuteResource'. | A: Apparently it was the same issue as mentioned here So the workaround, until the next version of Glimpse contains the fix, is by adding BuildManager.GetReferencedAssemblies() to the Application_Start method inside the Global.asax
The Budget 2015: Some of the things that were announced We wanted to highlight a few of the main points of interest for us here. However, we can’t say we were too excited by the £250,000 pledged to new research in relation to the difficulties faced by urban seagulls! Of particular interest, we have been tracking the improved press that peer-to-peer lending is getting. These are loans and financial products advanced by individuals mostly online, cutting out financial institutions (find out more about crowd-sourced loans here). Investments on these platforms are now permitted in ISA accounts. This is coupled with new rules that permit savers to withdraw money from an ISA and repay it in the same year; not losing their entitlement. We see this as the start of more reform to come in the alternative finance arena. A few other budget highlights are outlined below: corporation tax was cut to 20% the government has pledged a £1.3bn package of support for the oil and gas industry. It is predicted that this will lead to an increase of £4bn of extra investment by 2020 with an associated increase in production by 15% NS&I’s pensioner bonds will be available until May 2015. The original aim of £10bn allocated will have an uplift of £3.2bn of financing a new personal savings allowance will be implemented from April 2016 which will not tax the first £1,000 of savings income for basic-rate taxpayers, and the first £500 for higher-rate taxpayers after we saw the closure of many drinking establishments in the last few years, the budget set forth the third annual reduction that supports the industry, with 1p off a pint of beer and 2% cut on duty for Scotch and cider the fuel duty increase that was expected to be in September has been delayed we welcomed the doubling of UKTI resources in order to encourage exports to China. This works towards the growth target for the UK of 2.4% by 2019. We also can’t complain about the £600m to increase the speed of internet and phone calls Osborne responded to the fallout from the HSBC scandal by allowing criminal charges for tax evasion the tax free allowance has increased to £10,800 next year and £11,000 the year following. This is set to assist 27m people the 40% rate of tax has increased to £43,300 in 2017-18. The Chancellor has expressed a desire to raise this to £50,000 with a tax free allowance of £12,500 a ‘Help to Buy’ ISA means that the Government will put £50 into every £200 saved, up to £15,000. This comes with a limit on the associated purchase price of the property of £250,000 or less outside London or £450,000 or less in London.
A father accused of murdering his four-year-old didn't call 911 for at least 40 minutes despite his daughter suffering a "catastrophic" spinal injury that left her unconscious and in cardiac arrest, a judge in Calgary was told Monday. Oluwatosin Oluwafemi is charged with second-degree murder in the death of his daughter, Olive Rebekah Oluwafemi. In the hours after her death on Dec. 19, 2014, police took photos of the child's body showing injuries covering her entire body from her ears to her feet. Oluwafemi​​​​​​'s trial got underway Monday morning with prosecutor Melissa Bond outlined the evidence in an opening statement. Prosecutors say Oluwafemi was the only one who had the opportunity to inflict the fatal injuries on Rebekah. Husband calls wife, not 911 On that day in 2014, Oluwatosin Oluwafemi's wife, Itunu Oluwafemi, left for work around 8:30 a.m. Around noon, a furnace repairman showed up at the Oluwafemi's home and is expected to testify that he observed Rebekah in the family room playing quietly. Just after 3 p.m., Oluwatosin called his wife. She left work immediately and arrived home 20 minutes later to see her husband performing CPR on their daughter. Shortly after that, a family friend also arrived at the Oluwafemi home where she "observed Rebekah's lifeless body." Tayo Awotesu told Rebekah's parents to call 911 By 3:40 p.m., paramedics arrived at the house. They found the girl unconscious, not breathing and in cardiac arrest. Rebekah was taken to hospital but was pronounced dead at 4:43 p.m. Medical staff contacted police. A detective took photos of Rebekah's body that showed injuries all over her body including bruises on her head, neck, ear, chest, back, legs, arms, hands, thighs and feet. The fatal injury was a "catastrophic injury" to her cervical spine. Parents uncooperative, investigators say At the time of Oluwafemi's arrest, investigators said the parents were unco-operative and had told police Rebekah was injured when she fell down the stairs. The medical examiner found the child died of several blunt force injuries. Oluwafemi and his family moved to Ontario within weeks of Rebekah's death and were living in Keswick, north of Toronto. Oluwafemi was charged one year after her death. He's currently out on bail. Court of Queen's Bench Justice Suzanne Bensler is presiding over the three-week trial. Oluwafemi is represented by defence lawyer Rebecca Snukal. Melissa Bond and Donna Spaner are prosecuting the case.
Q: How to call another view models constructor in MVVM Light I've got a method that authenticates a users login. If the user correctly logs in I'd like to call two view models contructors just in case the user has logged in. Below is my sample code. What is the best way to acheive this? Sending view model: if (UserName == userName && Password == password) { ProjectManager.Instance.IsAdmin = true; isLoggedIn = true; IsLoggedIn = true; ValidLoginImage(); LoginStatus = "Admin Logged In"; MessengerInstance.Send(true); } Receiving View Model: private void RegisterForMessages() { MessengerInstance.Register<bool>(this, UpdateEnabled); } private void UpdateEnabled(bool b) { IsLoggedIn = b; } The registerformessage method never gets called. A: Since you're already using MvvmLight, I'd just send a message containing a boolean that calls a method in the view model to update it. Register for the messages in the view model that needs updating. Then it will wait for the "ok i'm logged in" boolean, then run some method that updates your IsEnabled property. Put this in the view model that needs to be updated: /// <summary> /// Listen for messages from other ViewModels /// </summary> private void RegisterForMessages() { MessengerInstance.Register<bool>(this, UpdateMyStuff); } private void UpdateMyStuff(bool b) { IsEnabled=b; } Then send the message when the user logs in this with this: //logged in successfully code here... MessengerInstance.Send(true); //or your IsLoggedIn property you can send false if this view has logout or whatever. This will let your view model know the status of whether the user is logged in, and allow you to update accordingly. obviously, you need to make sure you implement INotifyPropertyChanged etc. This is all part of MVVMLight already. If your viewmodel implements MvvmLight's ViewModelBase, it will already be ready for you.
Figure 1 is a duplicate of Figure 8. Please view the correct Figure 1 here: ![](pone.e0842765-3cae-4737-8b5b-96aeb12d7fb5.g001){#pone-e0842765-3cae-4737-8b5b-96aeb12d7fb5-g001} **Competing Interests:**No competing interests declared.
Swat-CUP SWAT-CUP (SWAT Calibration and Uncertainty Procedures) is a program designed to integrate various calibration/uncertainty analysis programs for SWAT (Soil & Water Assessment Tool) using the same interface. Currently the program can run SUFI2 (Abbaspour et al., 2007), GLUE (Beven and Binley, 1992), and ParaSol (van Griensven and Meixner, 2006). To create a project, the program guides the user through the input files necessary for running a calibration program. Each SWAT-CUP project contains one calibration method and allows user to run the procedure many times until convergence is reached. User can save calibration iterations in the iteration history for later use. Also we have made it possible to create charts of observed and simulated data and the predicted uncertainty about them. Targets Integrate various calibration/uncertainty analysis procedures for SWAT in one user interface and visualize the results. Make the calibrating procedure easy to use for students and professional users of SWAT. Make the learning of the programs easier for beginners. Provide a faster way to do the time-consuming calibration operations and standardize calibration steps. Add extra functionalities to calibration operations such as creating graph of calibrated results and data comparison. User Interface SWAT-CUP uses an advanced user-friendly interface, similar to the Microsoft Office 2007, with the same UI features. Everything has the same standard as Microsoft products, so all users can easily learn and use the program. Users As SWAT-CUP is related to SWAT software and has extra functionalities for calibration and uncertainty analysis, SWAT-CUP would be useful for all SWAT users. SWAT-CUP2 was made possible with contributions from: Mahdi Vejdani and Sohail Haghighat of Neprash Company who wrote the SWAT-CUP interface Raghvan Srinivasan of Texas A&M University who provided financial support Jing Yang of Eawag who initially linked the optimization procedure to SWAT and created the MCMC algorithm as part of his PhD thesis with supervision of Peter Reichert and Karim C. Abbaspour. References Abbaspour, K.C., J. Yang, I. Maximov,., R. Siber, K. Bogner, J. Mieleitner, J. Zobrist, R. Srinivasan. 2007. Modelling hydrology and water quality in the pre-alpine/alpine Thur watershed using SWAT. Journal of Hydrology, 333:413-430. Abbaspour, K.C., 2005. Calibration of hydrologic models: when is a model calibrated in Zerger, A. and Argent, R.M. (eds) MODSIM 2005 International Congress on Modelling and Simulation. Modelling and Simulation Society of Australia and New Zealand, December 2005, pp. 2449–12455. . http://www.mssanz.org.au/modsim05/papers/abbaspour.pdf Abbaspour, K.C., Johnson, A., van Genuchten, M.Th., 2004. Estimating uncertain flow and transport parameters using a sequential uncertainty fitting procedure. Vadose Zone Journal 3(4), 1340–1352. Abbaspour, K. C., R. Schulin, M. Th. Van Genuchten, 2001. Estimation of unsaturated soil hydraulic parameters using ant colony optimization. Advances in Water Resources,24: 827–841. Abbaspour, K. C., M. Sonnleitner, and R. Schulin. 1999. Uncertainty in Estimation of Soil Hydraulic Parameters by Inverse Modeling: Example Lysimeter Experiments. Soil Sci. Soc. of Am. J., 63: 501–509. Abbaspour, K. C., M. Th. van Genuchten, R. Schulin, and E. Schläppi. 1997. A sequential uncertainty domain inverse procedure for estimating subsurface flow and transport parameters. Water Resour. Res., v. 33, no. 8., pp. 1879–1892. Arnold, J.G., Srinivasan R., Muttiah R.S., Williams J.R., 1998. Large area hydrologic modeling and assessment - Part 1: Model development. Journal of the American Water Resources Association 34(1), 73–89. Bard, 1974. Non Linear Parameter Estimation. Academic Press, New York N.Y. [George E. P. Box|Box, G.E.P.]; G.C. Tiao (1973) Bayesian Inference in Statistical Analysis, Addison-Wesley- Longman, Reading, Mass Beven, K. and Freer, J., 2001. Equifinality, data assimilation, and uncertainty estimation in mechanistic modelling of complex environmental systems using the GLUE methodology. Journal of Hydrology, 249(1-4): 11–29. Beven, K. and Binley, A., 1992. The Future of Distributed Models - Model Calibration and Uncertainty Prediction. Hydrological Processes, 6(3): 279–298. Duan, Q., Global Optimization for Watershed Model Calibration, in Calibration of Watershed Models, edited by Q. Duan, H. V. Gupta, S. Sorooshian, A. N. Rousseau, and R. Turcotte, pp. 89–104, AGU, Washington, DC, 2003. Duan, Q., V. K. Gupta, and S. Sorooshian, Effective and efficient global optimization for conceptual rainfall-runoff models, Water. Resourc. Res., 28:1015-1031, 1992. Duan, Q., S. Sorooshian, H. V. Gupta, A. N. Rousseau, and R. Turcotte, Advances in Calibration of Watershed Models, AGU, Washington, DC, 2003. Eckhardt K and J.G. Arnold. Automatic calibration of a distributed catchment model., J.Hydrol., 251: 103–109. 2001. Faramarzi, M., K.C. Abbaspour, H. Yang, R. Schulin. 2008. Application of SWAT to quantify internal renewable water resources in Iran. Hydrological Sciences. . Gelman, S., Carlin, J.B., Stren, H.S., Rubin, D.B., 1995. Bayesian Data Analysis, Chapman and Hall, New York, USA. Gupta, H. V., S. Sorooshian, and P. O. Yapo, Toward improved calibration of hydrologic models: multiple and noncommensurable measures of information, Water. Resourc.Res., 34:751-763, 1998. Holland, J.H. Adaptation in Natural and Artificial Systems. The University of Michigan Press, Ann Arbor, MI, 183 p, 975, 1975. Hornberger, G.M. and Spear, R.C., 1981. An Approach to the Preliminary-Analysis of Environmental Systems. Journal of Environmental Management, 12(1): 7–18. Kuczera, G., Parent, E., 1998. Monte Carlo assessment of parameter uncertainty in conceptual catchment models: the Metropolis algorithm. Journal of Hydrology,211(1-4): 69–85. Legates, D. R. and G. J. McCabe, Evaluating the use of "goodness-of-fit" measures in hydrologic and hydroclimatic model validation, Water. Resourc. Res., 35:233-241,1999. Madsen, H., Parameter estimation in distributed hydrological catchment modelling using automatic calibration with multiple objectives. Advances in water resources, 26, 205–216, 2003. Marshall, L., D. Nott, and A. Sharma 2004. A comparative study of Markov chain Monte Carlo methods for conceptual rainfall-runoff modeling. Water Resources Research, 40, W02501, . McKay, M.D., Beckman, R. J., Conover, W.J., 1979. A comparison of three methods for selecting values of input variables in the analysis of output from a computer code. Technometrics. 21, 239–245. Nash, J. E., J. V. Sutcliffe, 1970. River Flow Forecasting through Conceptual Models 1. A Discussion of Principles. Journal of Hydrology 10(3), 282–290. Nelder, J.A., R. A. Mead, simplex method for function minimization, Computer Journal, 7,308-313, 1965. Press, W.H., Flannery, B.P., Teukolsky, S.A., Vetterling, W.T., 1992. Numerical Recipe, The Art of Scientific Computation. 2nd ed. Cambridge University Press, Cambridge, Great Britain. Romanowicz, R. J., Beven K., and Tawn J. 1994. Evaluation of Predictive Uncertainty in Nonlinear Hydrological Models Using a Bayesian Approach. In: Statistics for the Environment 2, Water Related Issues, eds V. Barnett and K. F. Turkman, 297–315, Wiley, Chichester. Schuol, J., K.C. Abbaspour, R. Srinivasan, and H. Yang. 2008a. Modelling Blue and Green Water Availability in Africa at monthly intervals and subbasin level. Water Resources Research. VOL. 44, W07406, . Schuol, J., Abbaspour, KC., Sarinivasan, R., Yang, H. 2008b. Estimation of freshwater availability in the West African Sub-continent using the SWAT hydrologic model. Journal of Hydroloy. 352(1-2):30-49. Van Griensven A. and W. Bauwens. 2003. Multi-objective auto-calibration for semidistributed water quality models, Water. Resourc. Res. 39 (12): Art. No. 16 December 1348. Van Griensven, A., Meixner, T., 2006. Methods to quantify and identify the sources of uncertainty for river basin water quality models. Water Science and Technology, 53(1): 51–59. Vrugt, J. A., H. V. Gupta, W. Bouten, and S. Sorooshian. 2003. A shuffled Complex Evolution Metropolis Algorithm for Estimating Posterior Distribution of Watershed Model Parameters, in Calibration of Watershed Models, ed. Q. Duan, S. Sorooshian, H. V. Gupta, A. N. Rousseau, and R. Turcotte, AGU Washington DC, . Yang, J., Reichert, P., Abbaspour, K.C., Yang, H., 2007. Hydrological Modelling of the Chaohe Basin in China: Statistical Model Formulation and Bayesian Inference. Journal of Hydrology, 340: 167–182. Yang, J., Abbaspour K. C., Reichert P., and Yang H. 2008. Comparing uncertainty analysis techniques for a SWAT application to Chaohe Basin in China. In review. Journal of Hydrology. 358(1-2):1-23. Yapo, P. O., Gupta, H.V., Sorooshian, S., 1998. Multi- External links EAWAG.CH NeprashGostar.com Neprash.com Texas University Category:Hydrology
1. Field of the Invention The present invention relates to a wiring board in which two or more conductive layers and two or more insulation layers are alternately laminated on both sides of a core substrate, and to a method for manufacturing such a wiring board. 2. Discussion of the Background Japanese Laid-Open Patent Publication No. 2001-210952 describes a wiring board, which has a through-hole conductor formed by filling plating in a through hole and a via conductor formed by filling plating in a via hole. Such a through-hole conductor and via conductor are stacked vertically one over another (in a direction Z). The contents of Japanese Laid-Open Patent Application No. 2001-210952 are incorporated herein by reference in their entirety in the present application.
Technical Specs 24" Transitional Double Towel Bar A modern twist on traditional design aesthetics, the blended transitional Clarendon collection complements a full spectrum of bath and powder rooms with both curved and rectangular forms. Complements a variety of Amerock cabinet hardware and coordinates well with Amerock's Mulholland Collection. Amerock is defining cabinet hardware fashion in homes everywhere. Amerock continues to introduce new designs, colors, and finishes, based on constant surveys of decorating trends and consumer preferences. Amerock brings you fresh, lasting looks which appeal to a variety of tastes 2 Questions from the Community The Amerock BH26505 is not designed to be trimmed down. The Amerock BH26505 is made of zinc and brass. What is this bar made of? A. The Amerock BH26505 is made of zinc and brass. Product Reviews Rated 3 out of 5 by Tlady from wash cloth mars finishI bought this bar about 2 years ago and have daily put a wet wash cloth on it to dry. Recently I noticed that the dark bronze finish was hazy white. Thinking that it was mineral scale, I tried to remove it with Barkeepers Friend only to find that it removed the dark finish completely. I suppose I have voided the warranty, so I will be buying another holder to match the other hardware in my bathroom. Just beware of using wet cloths on a consistent basis. Otherwise I love the look and the sturdiness of this item. Date published: 2014-02-25 Rated 5 out of 5 by FloridaRemodelGal from Great style, awkward putting towels on front bar.I wanted to use double towel bars to allow my towels to be folded fewer times, so they would dry better. I decided to put wash cloths on the back, and towels on the front one. I checked the distance between bars in the item specifications, and they seemed far enough apart. I happen to use a very large towel, called bath sheets, and it is very thick. I have to be careful when I put the towel on the front, or I knock off the washcloth on the back bar. (If the bars were farther apart, they probably would protrude so far that they would be in the way.) I really do like the style, as it blends well with my 20-year-old bathrooms, which have modern elements such as vessel sinks. Would I use them again? - I would. I like the function of additinal space for towels, but I have to be very careful when replacing towels. Date published: 2013-05-21 Rated 5 out of 5 by BigSis from Beautiful towel barWe have limited space for towel bars, so this double bar was our best choice. I am able to put two bath towels on the back rod, with hand towels and washcloths on the front rod. It works nicely in our circumstances. The product is well made and of excellent quality, and is exactly as represented. I really like the build.com website for all of the information and specifications it provides. Also, they shipped very quickly and everything arrived in excellent condition. I highly recommend. Date published: 2014-12-06 Rated 5 out of 5 by bddd from Love it!Exactly what we wanted! We are very pleased with the purchase! Date published: 2013-04-06 2015-03-02T19:24CST bvseo_cps, prod_bvrr, vn_cps_3.1.1 cp_1, bvpage1 co_hasreviews, tv_0, tr_4 loc_en_US, sid_cp-434995, PRD, sort_mostHelpful clientName_MoreHome bvseo-2.1.0.0-beta-1 bvseo-true bvseo-j bvseo-CLOUD bvseo-0ms bvseo-REVIEWS bvseo-PRODUCT bvseo-getReviews Amerock Clarendon Collection Warranty Info Guardian Lifetime Guarantee The Amerock® Corporation warrants that all products protected with the Guardian Lifetime Guarantee™ against defects in material and workmanship for as long as the original consumer purchaser owns the product. If the finish of any of the items protected by the Guardian Lifetime Guarantee™ tarnishes or corrodes, Amerock® will send to the original purchaser, without charge, a new replacement product of the same or comparable style and quality. If a replacement is no longer available, Amerock® will refund to the original purchaser the current retail value of the knob or pull. This warranty does not include removal of the defective product or installation of the replacement product, which are the responsibilities of the original purchaser. This warranty does not cover product failure caused by improper installation, product abuse, casualty, or other abnormal conditions. If a defective knob or pull is encountered, please take the following action to receive a replacement:
These last vacation days have been crazy-amazing, I got to say. First off, we had a wonderful family re-union on Thanksgiving since everyone arrived back home from all parts of the US. However, back in the day, when we were very young, we enjoyed Black Friday shopping. We weren’t fans of all the violence and dangers […] Many times before, I have talked about the dynamics within my own family both before the adoption and after the adoption. And although many of you will wonder how can a young child remember dynamics (since adoption took place over 10 years ago), I assure you that children’s memories rarely fade away. So feel free […] I’m not going to make things to complicated with time frames and when exactly did this trip take place. It was somewhere within the first five years of the adoption. Basically we had never at that point taken a family trip-vacation (not even prior to the girls arriving at our home) and we thoughts it […] In older articles posted on Ansa Nest, I have briefly talked about the experience we had as a family during the adoption of 3 African girls. And when reading something like this, or listening to a similar story, it sometimes seems extremely fascinating. Keep in mind that my mother decided to adopt because of an […] In a certain part of this site or even in other posts created, I speak briefly about the initial reason of the adoption. So far, it has been best described in the first few paragraphs of this post. Some extra details though are important to be mentioned. In short: Why did my parents (mostly my […] Very soon in my sister’s journey, everything seemed to be in place: The awkwardness was gone, the first initial “shock” was nowhere to be found and there was a very good sense of family unity. Not everyone fully adapted (even to this day) to this change. My two older brothers had different views on the adoption […] We are at this point of our story, where an introduction has been made by both parties and we are all trying to fit in our minds this very bizarre change in our family format. It isn’t easy (especially for the younger ones) to adapt to something like this that quickly. So during all the time […] Reading through my website and the past blogs I had posted, I realized that I haven’t really given you a geographical location in which everything from the time of the adoption is taking place. Maybe I did this intentionally? Keep you guys in suspense? In any case, everything is taking place in the South. Specifically […] The following events and stories to be talked about, are continuing the logic of the previous posts and are following the time frames in which these events took place. Throughout the first few weeks and especially after some major strange behaviors faded away, everyone was able (including my sisters) to start meeting each other in depth […] In my latest post, I mentioned basically very briefly the events that took place from the day an adoption was decided, until my father and 3 black sisters arrived at our home. I still remember waking up from a very short after-lunch nap (honestly don’t know if I even slept by the anxiety.) I was […]