text
stringlengths
8
5.77M
Ad Space Article Tags Author Details Amazon buys video game streaming firm Twitch Amazon.com has acquired all of live video game streaming firm Twitch’s shares for approximately US$970 million. According to a release by Twitch in July, it had more than 55 million unique visitors who viewed more than 15 billion minutes of content on the site. “Broadcasting and watching gameplay is a global phenomenon and Twitch has built a platform that brings together tens of millions of people who watch billions of minutes of games each month – from The International, to breaking the world record for Mario, to gaming conferences like E3. And, amazingly, Twitch is only three years old,” said Jeff Bezos, founder and CEO of Amazon.com. “Like Twitch, we obsess over customers and like to think differently, and we look forward to learning from them and helping them move even faster to build new services for the gaming community,” he said. Twitch launched in June 2011 to focus exclusively on live video for gamers. The acquisition is expected to close in the second half of 2014. “Being part of Amazon will let us do even more for our community. We will be able to create tools and services faster than we could have independently. This change will mean great things for our community, and will let us bring Twitch to even more people around the world,” said Twitch CEO Emmett Shear.
<?php /* Prototype : array array_combine(array $keys, array $values) * Description: Creates an array by using the elements of the first parameter as keys * and the elements of the second as the corresponding values * Source code: ext/standard/array.c */ echo "*** Testing array_combine() : error conditions ***\n"; // Zero arguments echo "\n-- Testing array_combine() function with Zero arguments --\n"; var_dump( array_combine() ); //Test array_combine with one more than the expected number of arguments echo "\n-- Testing array_combine() function with more than expected no. of arguments --\n"; $keys = array(1, 2); $values = array(1, 2); $extra_arg = 10; var_dump( array_combine($keys,$values, $extra_arg) ); // Testing array_combine with one less than the expected number of arguments echo "\n-- Testing array_combine() function with less than expected no. of arguments --\n"; $keys = array(1, 2); var_dump( array_combine($keys) ); echo "Done"; ?>
Q: Simple programmatic generation and compilation of grammar in ANTLR? I want to programmatically take a grammar in the form a String and generate the Java for it as a String or Strings. I want to do this all in memory, no files involved. I took a look at org.antlr.Tool source but I was hoping there would be some simpler way to do what I want rather than rewrite Tool without files. Does something already exist? A: Does something already exist? No, not AFAIK. Not in ANTLR's public API, nor some existing 3rd party tool that can do this.
The Alberta Films Ratings board has officially classified and approved the trailers for 20th Century Fox's upcoming films: X-Men: Apocalypse and Independence Day: Resurgence. First X-Men: Apocalypse trailer is clocking in at two-minutes and twenty-four seconds and is rated PG. A sizzle reel was shown during Comic Con this year, which leaked online, but this first official trailer should include lots of never-before-seen footage. There is a possible description of it floating around which you can read by clicking here. Independence Day: Resurgence's first trailer clocks in at two-minutes and six-seconds and is also rated PG. This first trailer will have a lot to live up to as the original teaser trailer for 1996's Independence Day is considered one of the best of all-time. As a reminder, it showed shadows of enormous alien spaceships with everyday citizens looking up in awe. Keep in mind, these classifications usually comes just weeks, if not days, before a trailer releases. Thanks to a heads up from The Cardist. X-Men: Apocalypse hits theaters May 27, 2016. Independence Day: Resurgence lands in theaters June 24, 2016.
Notes:A heavy modification of the BTR-80, the BTR-94 is for use as a combination armored personnel carrier and scout vehicle, as well as providing some antiaircraft capability.The chief modification on the BTR-94 is the turret, the BAU-23x2.In addition to Ukraine, the Jordanians ordered the BTR-94; however, when the BTR-3U became available (see International Wheeled APCs), Jordan gave its 50 BTR-94s to the new Iraqi Army. These vehicles were acquired by Jordan in 1997 and then by Iraq in 2004.Though KMDB sells the turret as being applicable to other armored vehicles, no such modifications of other vehicles have been yet made; tests of these additional mountings include the BTR-70 and Ratel (for demonstration only). The basic hull is virtually identical to that of the BTR-80, with the driver in the front right and the commander to his right side.The windshield and window layout is largely the same, as is that of the driverís and commanderís controls and vision blocks.The rear troop area is likewise largely the same, with the troops having three firing ports in each side of the vehicle and the driver and commander having a firing port in the sides of their compartment. The driver and commander have night vision blocks to their front.The troops. Like on an BTR-80, enter and exit through roof hatches or through enlarged side clamshell hatches.The BTR-94 has air conditioning. The new turret is a one-man turret with enhanced night vision and normal vision devices, as well as a ground and air surveillance radar set with a short range of 20 kilometers against ground targets and 30 kilometers against air targets.Unlike the BTR-80, the gun elevation of the BAU-23x2 turret is manual, while deflection and turret rotation are electrical.Elevation is wide, from -4 to +55 degrees.The turret is a semi-overhead weapon system, with only the gunnerís head, shoulders, and very upper body being inside the turret.The gunner therefore has limited vulnerability and is mostly protected by the armor envelope of the hull, despite the size of the turret. The gunner does have a hatch atop his turret.On each side of the turret are six smoke grenade launchers.The turret also carries an additional long-range data-capable radio, both to transmit findings from the radar and to transmit a video picture from a video camera in the sighting system.The datalink can also transmit data from the radar to friendly AAA guns and missiles to assist in targeting enemy aircraft and vehicles. The guns have a laser rangefinder that doubles as a laser designator. As said above, the body is basically a BTR-80s body, but the vehicle has a new 300-horsepower multifuel engine, along with an automatic transmission.The suspension is raised somewhat, making it marginally more resistant to mines and IEDs.The standard BTR-80 armor has been supplemented with a Kevlar antispalling liner.Suspension is 8x8 and of the off-road-type, with run-flat tires. The BTR-94 is amphibious with preparation; when floating, a waterjet at the rear is turned on. The BTR-94 has an NBC overpressure system with collective NBC backup, and radiological shielding. The BTR-94 has a winch in the front with a capacity of 4.5 tons and 60 meters of cable. Twilight 2000 Notes: This vehicle is very rare in the Twilight 2000 timeline; perhaps 40 were produced before the war, and they were issued only certain to Category 1 units. Price Fuel Type Load Veh Wt Crew Mnt Night Vision Radiological $206,603 D, G, AvG, A 1.7 tons 15 tons 3+10 7 Passive IR (G, D, C), Image Intensification (G), Radar (G) Shielded Tr Mov Com Mov Fuel Cap Fuel Cons Config Susp Armor 144/72 34/17/4 300 161 CiH W(6) TF4TS4TR4HF6SpHS4HR3* Fire Control Stabilization Armament Ammunition +2 Fair 2x23mm 2A7M Autocannons, KT-7.62 400x23mm, 2000x7.62mm *This vehicle has a floor AV of 5Sp and a roof AV of 3. KMDB DOZOR-B Notes: This light APC is basically an armored version of the DOZOR-A (see Ukrainian Light Unarmored Vehicles).It is thus a light truck-based APC rather like the various up-armored versions of the US HMMWV, but has more versions, including a basic APC version, VIP transport version, NBC reconnaissance version, armored ambulance, scout vehicle, etc.The DOZOR-B is so far used only by Ukraine.It is designed as a modular vehicle able to take on a variety of roles. The DOZOR-B flows the lines of the DOZOR-A, though it has a new armored body and floor.Armor is of aluminum and the body is rather boxy, with large bullet-resistant windows to the front and sides of the cab and another large bullet-resistant window in the rear door.There are two doors on the sides of the cab and a large door in the rear.Firing ports in the sides and rear of the vehicle are an option; up to three can be fitted per side and two in the rear door.There is also a hatch on the rear deck along with the gunnerís cupola.The driver and commander are in the front cab; the bullet-resistant double windshield in front has a moderate slope, while the hood and front itself has a sharply-raked slope.The sides and rear are square, except near the bottom of the sides.A large bullet-resistant window is found in the rear door.The commander has a simple hatch arrangement, though the weapon is controlled from the gunnerís position in the hull or directly by standing up in the hatch.The gunner can aim and fire (but not load) his weapon from inside the cab.The commander and driver have access to a GLONASS receiver for navigation.There are no built-in night vision features, but the driver and commander normally wear night vision glasses at night.The DOZOR-B has air conditioning and heating. There are three choices of engine: 122 horsepower turbocharged diesel with a manual transmission, 136 horsepower turbocharged diesel with a manual transmission, or 197 horsepower turbocharged diesel with a choice of automatic or manual transmission. The front bumper has a winch with a capacity of 4.18 tons.The suspension is 4x4, but the vehicle is more suited for on-road rather than off-road use. Though several possible variants have been suggested, only the basic APC and an unarmed police variant have been produced. Twilight 2000 Notes: This vehicle does not exist in the Twilight 2000 timeline.
1. Introduction {#sec1-materials-13-02521} =============== Sulfamethoxazole (SMZ) is one of the numerous antibiotics belonging to the sulfonamide family. SMZ is used widely as an antibacterial agent in drugs for infectious diseases, animal-derived food, and aquatic environments \[[@B1-materials-13-02521],[@B2-materials-13-02521]\]. As SMZ cannot be eliminated effectively through common water or food treatment processes, there is a probability of an excess amount of SMZ entering the human body. After prolonged exposure to low concentrations of antibiotics, the human body is bound to suffer from a resistance reaction \[[@B3-materials-13-02521],[@B4-materials-13-02521]\]. This risk renders it necessary to determine the SMZ content in pharmaceutical formulations as well as to test residues of SMZ, which should not exceed the regulatory limit in drinking water or in food originating from animals, such as eggs, milk, and meat \[[@B5-materials-13-02521]\]. Therefore, various SMZ detection methods including spectrophotometry \[[@B6-materials-13-02521]\], electrochemical methods \[[@B7-materials-13-02521],[@B8-materials-13-02521]\], LC/MS \[[@B9-materials-13-02521]\], HPLC \[[@B10-materials-13-02521],[@B11-materials-13-02521]\], solid-phase extraction \[[@B12-materials-13-02521]\], and voltammetry \[[@B13-materials-13-02521]\] have been developed. Recently, fluorescence sensing has attracted the interest of researchers for chemical and biological applications, because they both overcome some of the drawbacks of the other detection methods and are also rapid, convenient, simple, non-polluting, and highly sensitive \[[@B14-materials-13-02521],[@B15-materials-13-02521]\]. Various fluorescence sensors have been prepared based on GQDs, which are optical materials possessing outstanding characteristics such as stable photoluminescence, good water dispersity, chemical stability, good biocompatibility, and low toxicity \[[@B16-materials-13-02521],[@B17-materials-13-02521]\]. Nevertheless, these GQD-based fluorescence sensors have a significant drawback of low selectivity \[[@B18-materials-13-02521]\]. With our experience in developing fluorescence methods, we addressed this limitation by combining GQDs and a highly selective molecularly imprinted polymer (MIP) \[[@B19-materials-13-02521],[@B20-materials-13-02521],[@B21-materials-13-02521]\]. Recognition using MIP is a technology that is used to analyze samples based on a mechanism that is similar to enzyme--substrate action \[[@B22-materials-13-02521],[@B23-materials-13-02521]\]. Therefore, with combined MIP technology, the selectivity of a GQDs-based sensor would be improved significantly. In recent years, SMZ fluorescence sensors replied on MIP have been reported \[[@B2-materials-13-02521],[@B24-materials-13-02521],[@B25-materials-13-02521]\]. They have emerged as powerful techniques not only because of their strong selectivity but also due to their simplicity, easy-preparation and inexpensive cost, when compared with other SMZ sensing methods which require expensive instruments and complex operating processes \[[@B26-materials-13-02521],[@B27-materials-13-02521],[@B28-materials-13-02521],[@B29-materials-13-02521]\]. In particular, we synthesized GQDs coated with a silica MIP (denoted as GQDs\@SMIP). First, GQDs were prepared from citric acid monohydrate by a thermal process. Subsequently, the GQD surface was modified with APTES, a precursor for silica layer growth, to form GQD-APTES. Next, GQDs\@SMIP was fabricated via the sol-gel polymerization of the GQD-APTES complex (as the fluorescent material), SMZ (as the template), APTES (as the functional monomer), TEOS (as the crosslinker), and ammoniacal solution (as the catalyst). SMZ was imprinted on GQDs\@SMIP through a non-covalent attachment and could be easily removed by a washing process. After the removal of SMZ, cavities with a shape similar to that of the SMZ structure were left in the polymer, which could recognize and rebind SMZ molecules. Thus, the obtained GQDs\@SMIP could serve as a novel material for SMZ detection. [Scheme 1](#materials-13-02521-sch001){ref-type="scheme"} clearly demonstrates the preparation method and application in SMZ sensing of GQDs\@SMIP. In this work, we introduced the SMZ analysis in phosphate buffer saline (PBS) by employing GQDs\@SMIP. Presently, we are continuing to develop this method for analyzing the various real samples such as human serum, blood sample, drinking water, and food originated from animals. 2. Experimental Details {#sec2-materials-13-02521} ======================= 2.1. Materials {#sec2dot1-materials-13-02521} -------------- All chemical substances were obtained from Sigma--Aldrich (St. Louis, MO, USA) and used without further purification. The chemicals include citric acid monohydrate (CA) (CAS: 5949-29-1), NaOH (CAS: 1310-73-2), ethanol (CAS: 64-17-5), APTES (CAS: 919-30-2), TEOS (CAS: 78-10-4), NH~4~F (CAS: 12125-01-8), NH~4~OH (CAS: 1336-21-6), SMZ (CAS: 723-46-6), sulfadiazine (CAS: 63-35-9), sulfamerazine (CAS: 127-79-7), sulfamethazine (CAS: 57-68-1), sulfasalazine (CAS: 599-79-1), sulfapyridine (CAS: 144-83-2), and phosphate buffer saline (PBS) (pH = 9). Deionized (DI) water (pH = 7) (CAS: 7732-18-5) was utilized in all the experiments. 2.2. Instruments and Measurements {#sec2dot2-materials-13-02521} --------------------------------- Photoluminescence (PL) spectra were recorded using a QuantaMaster TM 50 PTI spectrofluorometer from Photon Technology International (Kyoto, Japan). Transmission and Scanning electron microscopy (TEM and SEM) images were collected using FEI microscope (Tecnai, F30S-Twin, Hillsboro, OR, USA) and a field-emission scanning electron microscope (Hitachi S-4700, Hitachinaka, Ibaraki Prefecture, Japan), respectively. Fourier-transform infrared (FTIR) spectra were recorded using a Nicolet 6700 spectrometer from Thermo Scientific (Waltham, MA, USA). Powder X-ray diffraction (XRD) patterns of GQDs\@SMIP were recorded on an automated Rigaku D/max 2200 X-ray diffractometer with monochromatic Cu *Kα* radiation (Tokyo, Japan). X-ray photoelectron spectroscopy (XPS) was measured by an X-ray photoelectron spectrometer (PHI 5000, Chigasaki, Kanagawa Prefecture, Japan). The zeta potential was performed on electrophoretic light scattering (Photal Otsuka Electronics, ELS 8000, Osaka, Japan). 2.3. Synthesis of GQDs and APTES-Modified GQDs {#sec2dot3-materials-13-02521} ---------------------------------------------- First, 2 g of CA was taken in a small beaker and heated to 200 °C in an oven. The CA melted, yielding an orange liquid after 30 min. Next, the resulting liquid was dropped into a solution of NaOH (10 mg/mL; 100 mL) and stirred vigorously for 3 h. Finally, the obtained GQD sample was dialyzed using a dialysis bag (MCWO: 1000 Da) for 72 h to obtain pure GQDs. To synthesize APTES-modified GQDs, 1.5 mL of APTES was dropped to 20 mL of pure GQDs solution (6.85 mg/mL in water solvent). The solution was stirred at 40 °C for 30 min and then cooled to room temperature. The prepared APTES-modified GQDs were purified using petroleum ether, then dispersed in ethanol. 2.4. Synthesis of GQDs\@SMIP and silica non-molecularly imprinted polymer (GQDs\@SNIP) {#sec2dot4-materials-13-02521} -------------------------------------------------------------------------------------- GQDs\@SMIP was formed through a sol--gel polymerization method. First, adding 25 mg of SMZ to 5 mL of ethanol under stirring. Subsequently, 12 mL of the suspension of APTES-modified GQDs in ethanol (volume ratio is 1:1), 2.4 mL of TEOS, and 3.6 mL of APTES were added to the mixture. Next, adding 0.6 mL of a catalytic solution prepared from 2 g of NH~4~F, 23 mL of NH~4~OH, and 100 mL of H~2~O. The mixture was stirred at 25 °C for 30 min. Then, the mixture was centrifuged to recover the product, which was washed with anhydrous ethanol. The SMZ template in the composites was eliminated by washing with methanol until no absorbance peak of SMZ in the washing solvent was obtained. Next, the composites were dried in an oven at 50 °C. GQDs\@SNIP was synthesized in the same manner without adding the SMZ template. 2.5. SMZ detection {#sec2dot5-materials-13-02521} ------------------ First, adding 0.1 g of GQDs\@SMIP to 100 mL of PBS (pH = 9) under vigorously stirring to prepare a stock solution. Next, a series of 5 mL volume of the stock solution and variety amounts of an SMZ solution were serially dropped into cuvettes. Various mixtures with a final concentration of SMZ of 0, 1, 3, 5, 10, 20, 30, 40, 50, 60, 80, 100, 120, and 140 µM were obtained. The solutions were shaken and then incubated at room temperature for 90 min before fluorescence measurements. 2.6. Selectivity {#sec2dot6-materials-13-02521} ---------------- To determine the selectivity of GQDs\@SMIP to SMZ, the effect and interferences of other substances belonging to the sulfonamide family such as sulfadiazine, sulfamerazine, sulfamethazine, sulfasalazine and sulfapyridine were investigated. 3. Results and Discussion {#sec3-materials-13-02521} ========================= 3.1. Characterization of GQDs\@SMIP {#sec3dot1-materials-13-02521} ----------------------------------- Fluorescence spectroscopy was applied for characterizing the optical properties of GQDs\@SMIP. The fluorescence spectra ([Figure 1](#materials-13-02521-f001){ref-type="fig"}) shows the maximum emission peak of GQDs is placed at 455 nm, whereas the fluorescence emission maxima of the GQDs\@SNIP and GQDs\@SMIP red-shifted to 462 and 464 nm, respectively, under the excitation wavelength of 370 nm. This can be explained based on charged Si‒O groups on the surfaces of GQDs\@SNIP and GQDs\@SMIP. These groups might produce an electric field, which causes the recombination of trapped charged carriers and dangling bonds at the particle surfaces. This led to a change in the position of the emission peak \[[@B30-materials-13-02521],[@B31-materials-13-02521],[@B32-materials-13-02521]\]. Moreover, [Figure 1](#materials-13-02521-f001){ref-type="fig"} shows that GQDs\@SMIP can be a good material for SMZ sensing. After the SMZ elimination, the fluorescence intensity of GQDs\@SMIP increased sharply and when it was recombined with SMZ, the intensity decreased significantly. This is a fundamental characteristic for selective and effective SMZ detection. The TEM and SEM images in [Figure 2](#materials-13-02521-f002){ref-type="fig"} show the morphologies and size of the GQDs and GQDs\@SMIP. [Figure 2](#materials-13-02521-f002){ref-type="fig"}A reveals that GQDs were mono-dispersedly synthesized with a narrow size distribution of 2.7 to 5 nm and an average size of 4.1 nm. In the high-resolution (HR) TEM image (inset of [Figure 2](#materials-13-02521-f002){ref-type="fig"}B), the crystal structure of the GQDs is apparent, with a lattice parameter of 0.152 nm, which is associated with the graphitic diffraction planes \[[@B33-materials-13-02521],[@B34-materials-13-02521]\]. The TEM image of GQDs\@SMIP ([Figure 2](#materials-13-02521-f002){ref-type="fig"}C) displays that the average diameter of GQDs\@SMIP is 459 nm, whereas the SEM image ([Figure 2](#materials-13-02521-f002){ref-type="fig"}D) indicates the average diameter to be 522 nm. Therefore, there is quite good agreement between the TEM and SEM outcomes. Moreover, these results indicate that SMIP might contain many small particles of GQDs. We further characterized GQDs\@SNIP and GQDs\@SMIP by FTIR spectroscopy. In [Figure 3](#materials-13-02521-f003){ref-type="fig"}A, the spectrum of GQDs\@SMIP (before washing) presents main characteristic peak in the range of 3050--2800 cm^−1^, which may be assigned to the C‒H, O‒H stretching of the carboxylic acid and hydroxyl groups, or N‒H stretching belonging to amine groups. Further, a peak positioned at 1560 cm^−1^, which occurs owing to the HN‒CO bonding vibrations; a peak located at 1297 cm^−1^ results from the vibration of the O=S=O group, which is a part of the SMZ molecule, and a peak at 1017 cm^-1^ occurs due to the stretching vibrations of the Si‒O group. The FTIR spectrum of GQDs\@SMIP (after washing) contains all the peaks belonging to GQDs\@SMIP (before washing) except for the peak of the O=S=O group, which confirms that SMZ molecules were completely extracted out of the GQDs\@SMIP composite. Therefore, after the removal of SMZ, the spectrum of GQDs\@SMIP (washed) is extremely similar to that of GQDs\@SNIP. The XRD patterns ([Figure 3](#materials-13-02521-f003){ref-type="fig"}B) of both GQDs\@SNIP and GQDs\@SMIP only show a broad peak at \~21°, which could be attributed to the amorphous silica phase (JCPDS No. 29-0085). This result indicates the presence of silica polymer layer in the nanocomposites. Although the TEM image shows a crystalline structure of GQDs ([Figure 2](#materials-13-02521-f002){ref-type="fig"}B), their size is significantly small as compared to the size of the silica layer; therefore, no specific peak of GQDs was observed in the XRD pattern. The XPS profile of GQDs\@SMIP ([Figure 4](#materials-13-02521-f004){ref-type="fig"}A) presents five typical peaks at 529, 397, 282, 150, and 106 eV, correlating with O1s, N1s, C1s, Si2s, and Si2p, respectively. The weight percentages of C, N, O, and Si were analyzed to be 37.16%, 7.05%, 36.62%, and 19.17%, respectively. In [Figure 4](#materials-13-02521-f004){ref-type="fig"}B, the C1s peak can be de-convoluted into three peaks located at 284.4, 285.6, and 287.8, corresponding to C‒C/C=C, C‒O/C‒N/C‒Si, and C=O bonds, respectively, which originate from the sp^2^ graphitic structure \[[@B35-materials-13-02521]\] and several carboxyl, hydroxyl, amine, and Si-containing groups belonging to GQDs\@SMIP which were further confirmed by O1s, N1p, and Si2p spectra. The O1s spectrum ([Figure 4](#materials-13-02521-f004){ref-type="fig"}C) was de-convoluted into three characteristic peaks including those of O‒C at 532.4 eV, O‒Si at 532 eV, and O=C at 531.5 eV. The N1s spectrum ([Figure 4](#materials-13-02521-f004){ref-type="fig"}D) was de-convoluted into two specific peaks corresponding to N‒H at 400.2 eV and N‒Si at 398.8 eV. The Si2p spectrum ([Figure 4](#materials-13-02521-f004){ref-type="fig"}E) was de-convoluted into a peak at 102.2 eV assigned to the Si‒N bond, and peaks located at 102.7 eV were ascribed to Si‒O and Si‒C bonds. 3.2. SMZ Sensing {#sec3dot2-materials-13-02521} ---------------- We investigated the effect of pH, which is a vital parameter which influences the fluorescence stability of GQDs\@SMIP and the fluorescence response of GQDs\@SMIP to SMZ. [Figure 5](#materials-13-02521-f005){ref-type="fig"}A indicates that the fluorescence intensity of GQDs\@SMIP is low in strongly acidic or basic solutions. In the pH range of 6 to 9, the intensity reached the maximum value and remained stable. In the presence of SMZ ([Figure 5](#materials-13-02521-f005){ref-type="fig"}B), the intensity of GQDs\@SMIP was strongly quenched at pH values between 7 and 9. It is well-established that if the pH is excessively low or high, the imprinted silica shell can hydrolyze and the template cavities can be destroyed \[[@B2-materials-13-02521],[@B36-materials-13-02521],[@B37-materials-13-02521]\]; this affects the stability as well as the ability of the GQDs\@SMIP template to recognize the target analyze. Based on these results, we realized that a pH in the range of 7 to 9 is suitable for SMZ detection. In particular, the pH of 9 is optimum for the investigation of SMZ sensing. The fluorescence intensities of GQDs\@SNIP and GQDs\@SMIP were quenched in the presence of SMZ ([Figure 6](#materials-13-02521-f006){ref-type="fig"}). This occurred because of hydrogen bonding interaction between SMZ molecules and the amine groups acting as binding sites on the surfaces of GQDs\@SNIP and GQDs\@SMIP \[[@B18-materials-13-02521],[@B30-materials-13-02521]\]. However, there was a key difference in the quenching responses of GQDs\@SNIP and GQDs\@SMIP to SMZ. Clearly, the quenching degree of GQDs\@SMIP was more pronounced than that of GQDs\@SNIP. Particularly, [Figure 6](#materials-13-02521-f006){ref-type="fig"}A,B (insets) shows that the GQDs\@SMIP fluorescence intensity quenched sharply corresponding to increasing in SMZ amount from 0 to 140 µM, whereas that of GQDs\@SNIP decreased insignificantly. More precisely, in the existence of 140 µM SMZ, the intensities of GQDs\@SMIP and GQDs\@SNIP at the same concentration of 5 mg/mL were quenched by 53% and 33%, respectively. The presence of specific imprinted cavities in GQDs\@SMIP to recognize SMZ led to stronger adsorption of the SMZ template to it. Therefore, SMZ molecules were observed to bind to GQDs\@SMIP more strongly, which caused a strong fluorescence quenching effect. In addition, SMZ is known to be a good hole or electron acceptor \[[@B38-materials-13-02521]\], and an electron transfer process might occur after the entry of SMZ into the imprinted cavities; this is confirmed by a change in the zeta potential of the GQDs\@SMIP suspension from −14.75 to −9.08 mV after the addition of SMZ (140 µM). This process also contributes to the quenching phenomenon. The calibration curve in [Figure 6](#materials-13-02521-f006){ref-type="fig"}A (inset) clearly demonstrates the quenching effect of SMZ on the GQDs\@SMIP fluorescence intensity. The intensity decreased steadily and significantly corresponding to the increase in SMZ concentration up to 100 µM. No notable change occurred with further increase because all imprinted cavities might have been filled with SMZ molecules. In the range of SMZ concentration (C~M~) 1 to 100 µM, a good linear relationship was found with the equation, *I*/*I*~0~ = 1 − 0.00555 C~M~ and a correlation coefficient (R^2^) of 0.99537. The experiment was repeated thrice and the result is expressed as the average ± standard deviation. Moreover, the limit of detection (LOD) was determined to be approximately 1 µM. [Table 1](#materials-13-02521-t001){ref-type="table"} shows the result comparison of our fluorescence method with other currently presented methods. It is clear to see that our simple fluorescence approach gives the similar results to that of the others which require expensive instruments and complicated operating process. This is a remarkable advantage of our fluorescence technique using GQDs\@SMIP for SMZ detection. 3.3. Selectivity {#sec3dot3-materials-13-02521} ---------------- To verify the specificity of GQDs\@SMIP to SMZ, the fluorescent responses of the composite in the presence of five potentially interfering structural analogs belonging to the sulfonamide group were investigated. The chemical structures of sulfadiazine, sulfamerazine, sulfamethazine, sulfasalazine, and sulfapyridine are shown in [Figure 7](#materials-13-02521-f007){ref-type="fig"}A. GQDs\@SMIP contains imprinted cavities, which are specific in shape and size to absorb the SMZ used as the template for imprinting; as other analogues could not be embedded in these cavities, they did not produce remarkable variations in the fluorescence intensity of GQDs\@SMIP. However, further adding of SMZ makes the fluorescence of the system decreased significantly ([Figure 7](#materials-13-02521-f007){ref-type="fig"}B). It may be inferred that the GQDs\@SMIP exhibits excellent selectivity in SMZ detection. The experiment was repeated thrice and the result is expressed as the average ± standard deviation. 4. Conclusions {#sec4-materials-13-02521} ============== We produced GQDs\@SMIP via a sol-gel polymerization method. Characterization using fluorometry, TEM, SEM, FTIR, XRD and XPS confirmed that the synthesis approach was successful. Moreover, applying SMZ as a template for the imprinting process resulted in specific absorption cavities for SMZ in the polymeric layer. This imprinting technique combined with fluorescence detection aided us in developing a sensor that is not only effective in SMZ detection, but also has enhanced sensitivity and selectivity. Particularly, the obtained results show that the fluorescence of GQDs\@SMIP was quenched with an increase in SMZ concentration over a wide range with a low LOD. This quenching response was not clearly observed with other analogs belonging to the sulfonamide group. With these remarkable features, the GQDs\@SMIP sensor can potentially be applied in biomedical systems and environments. Investigation, T.H.L.; Methodology, H.J.L.; Formal analysis, J.H.K.; Writing---review & editing, S.J.P. All authors have read and agreed to the published version of the manuscript This research was supported by Basic Science Research Capacity Enhancement Project through Korea Basic Science Institute (National research Facilities and Equipment Center) grant funded by the Ministry of Education (Grant No. 2019R1A6C1010016). The authors declare no conflict of interest. Figures, Scheme and Table ========================= ![Demonstration of the synthesis and application of GQDs coated with silica molecularly imprinted polymer in sulfamethoxazole detection.](materials-13-02521-sch001){#materials-13-02521-sch001} ![Fluorescence spectra of a GQD suspension (6.85 mg/mL in water solvent), GQDs\@SNIP, GQDs\@SMIP (unwashed), GQDs\@SMIP (washed), washed GQDs\@SMIP in the presence of SMZ at 50 µM concentration under the excitation wavelength of 370 nm. The concentrations of GQDs\@SNIP and GQDs\@SMIP were the same at 5 mg/mL in water solvent.](materials-13-02521-g001){#materials-13-02521-f001} ![(**A**,**B**) TEM images of GQDs (inset: HRTEM image of GQDs), (**C**) TEM images and (**D**) SEM image of GQDs\@SMIP.](materials-13-02521-g002){#materials-13-02521-f002} ![FTIR spectra of GQDs\@SNIP, GQDs\@SMIP (after washing), and GQDs\@SMIP (before washing) (**A**). XRD spectra of GQDs\@SNIP and GQDs\@SMIP (**B**).](materials-13-02521-g003){#materials-13-02521-f003} ![XPS profiles of GQDs\@SMIP: survey spectrum (**A**) and high-resolution spectra of C1s (**B**), O1s (**C**), N1s (**D**), and Si2p (**E**).](materials-13-02521-g004){#materials-13-02521-f004} ![Fluorescence intensity of a GQDs\@SMIP suspension (5 mg/mL in water) (**A**) and the quenching effect of SMZ on the fluorescence of GQDs\@SMIP (**B**) at various pH values.](materials-13-02521-g005){#materials-13-02521-f005} ![Fluorescence spectra of GQDs\@SMIP (**A**) and GQDs\@SNIP (**B**) in the presence of different concentrations of SMZ. The concentration of GQDs\@SMIP and GQDs\@SNIP is 5 mg/mL. Inset: calibration curve for the relationship between *I*/*I*~0~ and the concentration of SMZ.](materials-13-02521-g006){#materials-13-02521-f006} ![Chemical structures of other analogs belonging to the sulfonamide family (**A**). Responses of GQDs\@SMIP to different analogs at the same concentration of 140 µM (**B**).](materials-13-02521-g007){#materials-13-02521-f007} materials-13-02521-t001_Table 1 ###### Comparison of SMZ detection for different methods. Method Linear Range LOD Reference --------------------- ---------------- ---------- ------------------------------- **Electrochemical** 0.2--1.4 µM 0.05 µM \[[@B39-materials-13-02521]\] **Electrochemical** 0.8--170 µM 0.8 µM \[[@B40-materials-13-02521]\] **Electrochemical** 2.4--23.6 µM 0.81 µM \[[@B26-materials-13-02521]\] **Electrochemical** 10--100 µM 0.144 µM \[[@B27-materials-13-02521]\] **Ultrasound** 0.78--19.74 µM 0.23 µM \[[@B41-materials-13-02521]\] **Voltammetry** 0.05--70 µM 0.01 µM \[[@B42-materials-13-02521]\] **Our method** 1--100 µM 1 µM
1. Technical Field This document relates to methods and materials involved in terminating transcription. For example, this document provides transcription terminators that can be used to terminate transcription of exogenous nucleic acids inserted into plant cells. 2. Background Information One of the goals of modern agriculture is to produce plants with advantageous phenotypes, such as disease resistance, pest resistance, cold and drought resistance, increased yields, and improved nutrition. Generating plants with these enhanced characteristics can be done using modern genetic engineering techniques, including transforming plants with transgenes involved in these processes. Developing engineered plants with enhanced characteristics can lead to increased crop yields as well as yield stability under various environmental conditions.
#!/bin/sh -xe plugin=`find . -name 'ipcrypt.so' | head -n 1` if [ -z "$plugin" ]; then echo "Unable to find the ipcrypt plugin" exit 1 fi ln -fs "$srcdir/../../src/test/dns.pcap" dns.pcap-dist ln -fs "$srcdir/../../src/test/dns6.pcap" dns6.pcap-dist ../../src/dnscap -w test3.pcap -r dns.pcap-dist -P "$plugin" -k "some 16-byte key" 2>test3.out ../../src/dnscap -w test3.pcap -r dns6.pcap-dist -6 -P "$plugin" -k "some 16-byte key" -6 2>>test3.out ../../src/dnscap -r test3.pcap.20161020.152301.075993 -g -P "$plugin" -k "some 16-byte key" -D 2>>test3.out ../../src/dnscap -r test3.pcap.20181127.155200.414188 -6 -g -P "$plugin" -k "some 16-byte key" -6 -D 2>>test3.out osrel=`uname -s` if [ "$osrel" = "OpenBSD" ]; then mv test3.out test3.out.old grep -v "^dnscap.*WARNING.*symbol.*relink" test3.out.old > test3.out rm test3.out.old fi # TODO: Remove when #133 is fixed cat test3.out | \ sed 's%,CLASS4096,OPT,%,4096,4096,%' | \ sed 's%,CLASS512,OPT,%,512,512,%' | \ sed 's%,41,41,0,edns0\[len=0,UDP=4096,%,4096,4096,0,edns0[len=0,UDP=4096,%' | \ sed 's%,41,41,0,edns0\[len=0,UDP=512,%,512,512,0,edns0[len=0,UDP=512,%' >test3.new mv test3.new test3.out diff test3.out "$srcdir/test3.gold"
Livedo reticularis. A wide variety of internal diseases may be associated with livedo reticularis. In adults, the most frequently encountered associated diseases are characterized by vessel wall disease or intravascular obstruction. In the former group, lupus erythematosus is particularly important, since LR along with anticardiolipin antibodies appears to be a marker of serious cerebrovascular and renal disease. Appropriate evaluation of patients presenting with LR includes a careful history and physical examination. Laboratory studies, including a complete blood count, platelets, coagulation profile, cryoproteins, antinuclear antibodies, and anticardiolipin antibodies, are useful screening tools for the important associated diseases. Table 1 summarizes the spectrum of entities associated with LR and points up the challenge of evaluating this distinctive cutaneous finding.
Conjunctival squamous cell carcinoma in the anophthalmic socket. To describe 2 patients in whom squamous cell carcinoma of the conjunctiva developed in the anophthalmic socket more than 44 years after enucleation and chronic use of an ocular prosthesis. Retrospective case reports. These 2 patients did not have known risk factors for squamous cell carcinoma, including solar ultraviolet radiation or exposure (since they wore their prosthesis full-time), HIV infection, chronic orbital inflammatory disease, or immune-compromising systemic disease. Both patients had an orbital exenteration and underwent a full work-up including evaluation of the regional lymph nodes and systemic work-up to rule out distant metastasis. Squamous cell carcinoma of the anophthalmic socket can develop many years after enucleation. Regular inspection of the anophthalmic socket containing a prosthesis to rule out conjunctival squamous cell carcinoma is prudent.
Title: Add missing variable SERVICEDOWNTIME to alert handlers Level: 1 Edition: cee Component: cmc Class: fix Compatible: compat State: unknown Version: 1.4.0i1 Date: 1458662292
Q: Putting children inside include tag So according to this - http://developer.android.com/training/improving-layouts/reusing-layouts.html, I can use the include tag to reuse layouts. <LinearLayout xmlns:android="http://schemas.android.com/apk/res/android" android:orientation="vertical" android:layout_width=”match_parent” android:layout_height=”match_parent” android:background="@color/app_bg" android:gravity="center_horizontal"> <include layout="@layout/titlebar"/> <TextView android:layout_width=”match_parent” android:layout_height="wrap_content" android:text="@string/hello" android:padding="10dp" /> ... </LinearLayout> Is it possible to put elements inside an include tag. For example: <include layout="@layout/titlebar"> <Button/> </include> If not, how can I get a similar effect. My goal is to be able to make the include tag the root element. A: To put elements from xml, you must add them in titlebar.xml not in <include> </include>. otherwise you can add your elements from code : ViewGroup layout = (ViewGroup) findViewById(R.id.your_title_bar_id); Button btn = new Button(this); btn.setLayoutParams(new LayoutParams(LayoutParams.WRAP_CONTENT, LayoutParams.WRAP_CONTENT)); layout.addView(btn );
Q: PHP trim() issue Lets say I have $url="../folder/file" and I want to find and remove the ../ part. I'm using trim() … $url = trim($url,"../"); … but it gives me a warning: Warning: trim() [function.trim]: Invalid '..'-range, no character to the left of '..' on line above What I did wrong? A: what you did wrong was fail to read the manual: With .. you can specify a range of characters. <?php $url="../folder/file"; $url = trim($url,"\.\./"); echo $url; ?>
Why oom-pah-pah is life-affirming -- AIDS Walk participant Robert Doerrvowed to walk all 6.2 miles of it Sunday while playing the accordion. He was going to play waltzes, he said in a YouTube video in which he pledged to do this feat, because the three-quarter-time beat of the music is like that of the human heart: boom-boom rest; boom-boom rest; and so on. Vice versa, the human heart is a living squeezebox. -- As to the Conservatory of Flowers and its efforts to pollinate a vanilla orchid, George McRaeof El Cerrito has had an orchid growing in his bathroom for about seven years, since his wife bought an 18-inch-long vine at the Pacific Orchid Exposition. McRae has that old pollinating knack. ("Don't tell my wife," he cracked.) One year, he harvested 16 beans; this year, he has so far harvested nine and has six beans that are growing. It takes about a year for the pods to ripen. Once his harvest is complete, McRae has made vanilla extract, ground it into powder and used it in baking, cooking and home-made ice cream. "I've tried to out-Martha Martha." -- John Leydeckeradopted an 8-year-old dog, Lucy, from Muttville ( www.muttville.org), and was told that he should attend to her toilette with Buddy Wash, a "natural" shampoo. The label, he said, is marked, "Buddy Wash is not tested on animals, but is safe for humans." -- The Judah L. Magnes Museum took 53 guests to Steve Oliver's sculpture ranch in Geyserville to hear a performance of Shahrokh Yadegari's "Tower Sounds: Ancient Voices and Electronics," which combines ancient Hebrew and Persian elements with electronic technology. The performance was in Ann Hamilton's tower, designed for acoustics, but the work's tech element mandated power. Since the tower (like all sculptures on the ranch) stands apart from other structures, Berkeley's Meyer Sound strung almost a mile of electric cable - hidden so as to be nearly invisible amid all that nature - for the music-making. In a new series of PSAs, Tomlin, as the beloved communicator Ernestine, answers the phone in the claims department for "Controlled Healthcare Insurance Corp." ("You must think HMO stands for Help Me Out. Remember, your health is our business, not our concern.") Eleven San Francisco "gentlemen's clubs" (strippers, pole dancers; not backgammon in the parlor) took to Facebook to announce that they are holding a job fair this afternoon at the Holiday Inn at Fisherman's Wharf. "The focus is always on the entertainers," said Axel Sang of BSC Management, but people are needed to make and serve the drinks, and "to greet and take care of the customers." The clubs say that more than a quarter of their customers are women. In the going: -- Returning to SFO from a visit to New York, Elaine Molinariwas waiting for her son to pick her up outside the luggage claim area. Limos aren't supposed to be trolling for passengers in that area, and when two of them pulled up, about 15 cabbies beeped their horns at them for three or four minutes, causing at least one of them to leave. "Cabs are doing their own policing ..." said Molinari. "Just loved it! God, it's good to be home." -- And Lourdes Livingston, headed downtown on the 1AX California on Wednesday morning, heard the bus operator announce the bus was out of gas. He parked at Bush near Divisadero, in front of the King-American Ambulance Co., to wait for rescue. Meanwhile, a busload of passengers stood around outside. The bus was in front of a King exit driveway, blocking one of two exits for ambulances called to emergencies. A Muni emergency vehicle arrived to push the bus away, and a substitute bus finally arrived for the stranded passengers. As the operator brought that bus downtown, she pointed out to passengers an earlier 1AX California bus being towed. Public Eavesdropping "We should probably get off here and get used to it, since we're going to Rome in October." Woman to man, as the 30-Stockton passed through North Beach, overheard by Ann Elliott
India train travels 160km in 'wrong direction' Published duration 23 November 2017 image copyright Getty Images image caption India runs 11,000 trains every day, of which 7,000 are passenger trains A group of Indian farmers say they woke up shocked to find that the train they were travelling on had sped 160km (99 miles) in the "wrong direction". About 1,500 farmers were travelling overnight to the western state of Maharashtra after taking part in a protest rally in Delhi. But several hours into their journey, the group realised that the chartered train was not following the agreed route. The railway firm denies the allegation. The farmers said that the train was due to reach Maharashtra via Uttar Pradesh, Rajasthan and Gujarat states, but the route had been changed without their knowledge. "We started the journey at 10pm on Tuesday and reached Mathura in Uttar Pradesh state past midnight. At around 4am, we realised that the train had reached the central state of Madhya Pradesh, which wasn't on our agreed route," Sagar Shambhushete, who was on the train, told the BBC. Mr Shambhushete said they stopped the train and started protesting at a small station called Banmore in Madhya Pradesh. "Our lives were at risk. The train was on a wrong route, an accident could have happened. We agreed to get back on the train after the railway authorities promised us that we were safe," he said. But railway officials say the farmers' safety was never at risk. "Special trains are run through a route which is conveniently available to the railway operation. The passengers might have felt confused because of the different route used in their return journey. There was no negligence and diversion," the railways said in a statement. But this is not the only time Indian trains have ended up at unexpected destinations. Here are a few more instances. The engine that ran away One railway engine made a break for it in the southern Indian state of Karnataka last week and managed to make it 13km (eight miles) before its panicked driver, who had been chasing it on a motorcycle, finally caught up with it. Newspaper reports said that the "dramatic chase" ended when the train, which had been moving at a speed of about 30km/h finally slowed down. It is unclear how the train started moving on its own, but reports said it had been uncoupled from a passenger train and had been stationary on the tracks when the driver got off. Fortunately an accident was averted thanks to quick thinking officials who notified stations ahead to stop trains coming in the opposite direction. An inquiry has been ordered into the incident. Holy shock A group of about 1,000 furious pilgrims, who were travelling to the northern Indian city of Varanasi from the southern city of Tirupati in 2011, suddenly found themselves at a station 260km away from where they were supposed to be. Railway officials were only alerted to the error when the passengers stormed the station master's office in Kazipet in the southern state of Andhra Pradesh, demanding an explanation. The train was routed back to Vijayawada, where the mistake had taken place, so that it could be rerouted to its original path.
Thursday, October 7, 2010 It is the end of Syawal of the Muslim's month in the lunar calendar. It is also the changing of season, opening the door to winter.Here at the place where I lived in Taif, the seasons starts off with the picking of grapes and pomegranates.Everyday the locals picks up the fruits and sell them to the Capital city.The small green grapes are dried under the sun to become raisin, which later on becomes filling of local breads. While the bigger shining excellent condition arepacked and deliver to the customer around Saudi.While pomegranate fruits are ruby red with small sizes sparkling ruby color sweet inside. In my home country we use to call it "buah delima". Pomegranates are Iran and Himalayan origin brought by the traders along the silk trade route to Saudi. It is a good source of vitamin C and the Sauds loves it. The pomegranate fruit is usually eaten as salad along with grapes and mayonnaise.
/* * Copyright (C) 2017 Google Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifndef INTERCEPTOR_INTERCEPTOR_H_ #define INTERCEPTOR_INTERCEPTOR_H_ // ----------------------------------------------------------------------------- // extern "C" interface designed for users who dlopen the interceptor-lib // instead of linking against it. The API for these functions using C structures // only to support users compiled with different STL library and to support // usesrs who want to use dlopen/dlsym for loading the library. // ----------------------------------------------------------------------------- extern "C" { // Initializes the internal state of the interceptor library and returns a baton // what have to be passed in to every other function. If called multiple times // then multiple independent copies of the interceptor will be created. void *InitializeInterceptor(); // Terminate an instance of the interceptor, deletes the trampolines set up by // the instance and frees up all resources allocated by it. After this call the // baton is a dangling pointer and passing it to any of the API function is // undefined behaviour. void TerminateInterceptor(void *interceptor); // Find a function in the application by it's mangled symbol name by searching // both the public symbol table and the internal symbol table if available. The // returned pointer can be used to call the function after casted to the // approptiate type or can be passed to other functions provided by the // interceptor. If failes to find a symbol with the given name or more then 1 // symbol found then nullptr is returned. void *FindFunctionByName(void *interceptor, const char *symbol_name); // Intercepts a function specified by "old_function" with the one specified by // "new_function". If "callback_function" is not nullptr then a callback stub // is generated and returned in the pointer specified by "callback_function" // what can be used to call the original (not intercepted) function after // casting it to the correct function signature. If an "error_callback" is // specifed then it will be called for every error encountered during // interception with the baton specified in "error_callback_baton" and the error // message itself. The return value of the function will specify if the // interception was successfull (return true) or not (return false). In case // of an interception failure the error_callback (if specified) called at least // once and the original function isn't modified. bool InterceptFunction(void *interceptor, void *old_function, void *new_function, void **callback_function = nullptr, void (*error_callback)(void *, const char *) = nullptr, void *error_callback_baton = nullptr); // Intercepts a function specifyind by "symbol_name" if exactly 1 symbol matches // the specified name. The function has the same semantics as InterceptFunction // regarding all other argument. bool InterceptSymbol(void *interceptor, const char *symbol_name, void *new_function, void **callback_function, void (*error_callback)(void *, const char *) = nullptr, void *error_callback_baton = nullptr); } // extern "C" #endif // INTERCEPTOR_INTERCEPTOR_H_
Asbestos Exposure and Mesothelioma in Hawaii Prolonged exposure to asbestos can lead to serious health problems including pleural mesothelioma and asbestos-related lung cancer. If you have lived and worked in Hawaii for significant amount of time, there is a chance that you were exposed to asbestos at home or in the workplace. For your convenience, we have compiled information about asbestos and mesothelioma in the state of Hawaii. Below you will find recent statistics about mesothelioma and asbestos exposure in Hawaii. We have also included descriptions of industries and lists of cities, towns and specific job sites in Hawaii where asbestos exposure has occurred. Local Hawaii mesothelioma doctors and treatment centers are also listed. Finally we include recent news articles about asbestos and mesothelioma in Hawaii. Hawaii Mesothelioma and Asbestos Statistics From 1999-2015, 117 Hawaiian residents died from mesothelioma There are no known asbestos deposits on the islands of Hawaii (Source: USGS) Overall mesothelioma incidence in Hawaii is very low, with only a slightly higher incidence on the Big Island than the other islands (Source: Journal of the American Medical Association) Asbestos Exposure in Hawaii Workplaces With no naturally occurring deposits of asbestos on the Hawaiian Islands, all asbestos exposure in the state comes from commercial activity. Shipping: As a state made up of islands, shipping understandably is a very important part of Hawaii’s economy. This is especially true in the late 19th century and early 20th century with the growth of the whaling and fishing industries, and then even more so leading into World War II, when shipping was controlled by the military government. Today, more than 80% of the state’s goods are imported through Honolulu Harbor, which also sees the arrival of nearly 260,000 cruise ship passengers each year. Given the amount of asbestos used in ships, this makes for a lot of potential exposure over the years. Agriculture: Asbestos has often been employed in agricultural machinery used during planting, harvesting, and processing crops. The sugar industry is particularly well known as an agricultural concern that has exposed a lot of workers to asbestos, and firms like the Hilo Sugar Company, Hutchinson Sugar Plantation Company, and Paauhau Sugar Plantation Company are all confirmed jobsites that have led to mesothelioma diagnoses. Other agricultural companies with known exposure to asbestos include the Hawaiian Pineapple Company, Dole Company, and Lahaina Plantation. Military: The U.S. Navy base at Pearl Harbor is certainly the most well-known military base in Hawaii, but the state’s islands also house a number of U.S. Army facilities, including a medical center and an airfield. Given the state’s position far from the mainland, the U.S. Coast Guard also operates two significant bases in Honolulu and Wailuku. Military use of asbestos is high, especially in naval ships, and each of these installations exposed military personnel, civilian workers, families, and others to the dangers of asbestos during the course of operation. Power Plants: Like many other places, Hawaii’s power plants have led to a lot of asbestos exposure for the individuals who keep the electricity flowing. Some of the worst offenders include Bechtel Power in Honolulu, the Hawaii Electric Light Company in Hilo, and the Maui Electric Company in Maui. Asbestos was often used to insulate power generating apparatus from the heat and electricity created during the process. Asbestos Shipyards in Hawaii Since the first Polynesian travelers found the Hawaiian Islands by boat, those who lived there have maintained a rigorous shipping industry, eventually creating large shipyards and harbors for ocean-going vessels to be constructed, maintained, and repaired. Pearl Harbor Naval Base Pearl Harbor was an important base of operations long before the attack that drew the U.S. into World War II, with commercial shipping ties going back as far as the 1820s. Growth of the whaling industry and trade with Asia in the late 19th century led to a constant naval presence in Hawaii waters, but a permanent base was not established in the harbor until the island kingdom was annexed in 1899. After the 1941 attack, the naval base became the front line of defense in the Pacific War, and from 1943 until the end of the war in 1945, more than 5,500 ships spent time at Pearl Harbor’s facilities, causing an unfathomable amount of asbestos exposure for those who worked and lived there. Honolulu Shipyard (Pacific Marine & Supply) A private company providing shipbuilding and repair services to the U.S. Navy, Pacific Shipyards launched its first shipyard in Honolulu in 1944, during the last year or so of World War II. After the war, the shipyard continued providing services for military and commercial vessels, including constructing the free-floating platform used as the setting of the film Waterworld. Throughout the company’s history, workers at the shipyard have been exposed to asbestos in many different forms, as the material was used in many different applications aboard both marine vessels. Hawaii Cities with Known Asbestos Exposure Provided below is a list of cities in the state of Hawaii where asbestos use in the workplace is known to have occurred. Click on a city below to see more detailed information about the specific job sites where asbestos exposure occurred. Asbestos Exposure at Smaller Hawaii Sites Asbestos exposure is also a problem if you look beyond the major cities and towns in Hawaii. Select a town to see the list of its job sites where asbestos exposure occurred. Asbestos exposure at any one of the work sites revealed could put a worker at risk to develop mesothelioma cancer. Notice: This website and its content are sponsored by JAMES F. EARLY, LLC, a law firm specializing in asbestos injury litigation. Attorney Advertising. Prior results do not predict a similar outcome. Please read our disclaimer for more information.
Switching stem cell state through programmed germ cell reprogramming. Depending on their origin, embryo-derived stem cells have distinct properties that largely correspond to their counterpart in vivo. Mouse epiblast stem cells derived from post-implantation embryos differ from embryonic stem cells derived from blastocysts in their transcriptional and epigenetic profile, their morphology and culture requirements. When maintained in appropriate conditions, the cells keep self-renewing and do not adopt a different state. Recent studies, however, show that it is possible to convert between stem cell states. Here we review recent advances to induce stem cell state changes and we consider the potential of germ cell-mediated reprogramming for the conversion. Since the properties of mouse epiblast stem cells are similar to human embryonic stem cells, we discuss the significance of stem cell conversion and germ cell-mediated reprogramming in humans.
--- abstract: | Exact ground-state properties are presented by combining the diagonalization in the Fock space (and taking [*all*]{} hopping integrals and [*all*]{} two-site interactions) with the [*ab initio*]{} optimization of the Wannier functions. Electrons are essentially localized for the interatomic distance $R \sim 2.0$ Å  for $s$-like states, when the quasiparticle mass is divergent. The momentum distribution [*dispersion*]{} is proposed to define the localization [*order parameter*]{}. Dimerization and zero-point energies are also discussed. The method provides convergent results for $N\geq 8$ atoms.\ \ PACS Nos. 71.10.Fd, 71.15.Fv, 31.25.Nj address: | Marian Smoluchowski Institute of Physics, Jagiellonian University, ulica Reymonta 4,\ 30-059 Kraków, Poland\ author: - Jozef Spałek and Adam Rycerz date: 'June 4, 2001' --- [2]{} One dimensional systems range from organic metals [@jero] to quantum rings and wires [@jaca], and to nanotubes [@mint]. In their description the role of the long-range Coulomb interaction is crucial because of reduced dimensionality, for which the charge screening becomes less effective [@ovch]. The existing exact solutions of the parametrized models with inclusion of intersite interactions [@ovch; @stra] prove the existence of the metal-insulator transition for the half-filled-band case, in contradistinction to the corresponding Hubbard-model solution [@lieb], for which the system is insulating even for an arbitrarily small Coulomb repulsion. The existence of such metal-insulator the transition has been also discussed [@daul] within the density-matrix renormalization group (DMRG) method when the second-neighbor hopping is included. A separate question concerns the appearance of the Tomonaga-Luttinger behavior [@emer] in the metallic state, for which some evidence has been gathered [@dard]. In brief, the search for a proper description of those systems as quantum liquids (and their instabilities) is one of the basic problems in the physics of low-dimensional systems. In the above theoretical analysis \[1-8\] the solutions have been disscussed as a function of the microscopic parameters, which are not easy to measure. Therefore, one assumes that they should be determined first from a separate single-particle approach. In following this route one must avoid counting twice the interaction, as discussed carefully in the papers implementing the LDA+U [@anis] and SIC [@temm] methods. We have proposed [@spapo] a new method in which the single-particle (Wannier) wave functions are allowed to relax in the correlated state and thus are determined by optimizing the exact ground state energy obtained from the diagonalization in the Fock space. In other words, we treat properly the interactions first due to their strongly nonperturbative nature and then readjust the single-particle functions $\{w_i({\bf r})\}$ by setting Euler equation for them, which plays the role of the renormalized wave equation for a particle in the correlated ground state. In such approach the problem of double counting the interaction does not arise [*at all*]{}. Additionally, we include [*all*]{} the hopping integrals and [*all*]{} two-site interactions to make the solution more complete. The method is executable on a desktop server for the number of atoms $N\leq 12$. What is probably the most remarkable formal feature of these calculations is that the electronic correlations make the wave function more tightly bound to the atoms and thus limiting the interaction range. In effect, the results are converging very fast for $N\geq 8$ atoms meaning that the [*optimized*]{} Wannier functions and the interaction parameters are relevant at most up to the [*third*]{} neighbors. The results are detailed below and to the best of our knowledge they represent the first analysis of the strong correlation effects as a function of the lattice parameter within the exact acount of both the interaction and the wave function [*without limiting the range of either the hopping processes or the two-site interactions*]{}. The obtained results show that the method is particularly useful for accurate studies of electronic correlations in quantum dots and rings. The nature of the electron momentum distribution [@carmelo] $n_{k\sigma}\,\equiv\,<a_{k \sigma}^{\dagger}\,a_{k \sigma}>$ is shown in Fig. 1 for $N=10$ atoms (we use the periodic boundary conditions). For the interatomic distance $R=3a_0$, where $a_0$ is the $1s$ Bohr radius (setting the length scale), this is essentially the Fermi-Dirac function with a tail extending to the Brillouin zone boundary. The smearing out of the distribution with increasing $R$ suggests that the electronic states transform from itinerant to localized states, as exemplified for $R=R_c\approx 3.929$. The continuous line represents the parabolic fit of the same type for both $k\leq k_F$ and $k\geq k_F$. A natural question to be dealt with is whether the Fermi ridge disappearance at $R=R_c$ is reflected in any singularity in other properties. To distinguish quantitatively between those states we plot in Fig. 2, the following basic quantities (as a function of $R$) defined in both itinerant and localized states: (i) the site spin magnitude $\theta_M\equiv (4/3)\left<{\bf S}^2_i\right>$, where ${\bf S}_i\,=\,(S_{i}^{+},\,S_{i}^{-},\,S_{i}^{z})\, =\,(a_{i \uparrow}^{\dagger}\,a_{i \downarrow},\, a_{i \downarrow}^{\dagger}\,a_{i \uparrow},\, (n_{i \uparrow}\,-\, n_{i \downarrow})/\,2)$ is the electron spin on site $i$, (ii) the spin correlation function $\theta_{AF}=-\left<{\bf S}_i\cdot{\bf S}_{i+1}\right>$, and (iii) $\theta_{MI}=4{\sigma}^2\left\{n_{k\sigma}\right\}$, where ${\sigma}^2\left\{n_{k\sigma}\right\}$ is the dispersion of the statistical distribution defined as: $${\sigma}^2\left\{n_{k\sigma}\right\}= \frac{1}{2N}\sum_{k\sigma}n_{k\sigma}^2- \left(\frac{1}{2N}\sum_{k\sigma}n_{k\sigma}\right)^2.$$ The averages are for the ground state, which is determined via an exact diagonalization in the Fock space. The quantity ($\theta_M\,=\,1\,-\,2\,<n_{i \uparrow}\, n_{i \downarrow}>$) takes the value ($1/2$) in the ideal gas limit and approaches unity in the atomic limit, where we have a Pauli spin on each atom. $\Theta_{AF}$ approaches the value ($3/4$) for the singlet configuration of atomic spins, whereas $\sigma^2\left\{n_{k\sigma}\right\}$ acquires the value $1$ in the gas limit ($n_{k \sigma}\,=\,\Theta\,(\mu\,-\,\epsilon_{k})$) and vanishes for an even momentum distribution ($n_{k \sigma}\,=\,1/2$), when the particle position is sharply defined on atom, i.e. for the localized electron states characterized by atomic states. Thus, the quantity $\theta_{MI}$ plays the role of [*the order parameter*]{} for this [*crossover behavior*]{}, since it clearly distinguishes between the complementary momentum and position representations of the system quantum states. From Fig. 2 it follows that for $R/a_0=5$ all three parameters acquire (within $5\%$) their asymptotic values for purely atomic states. The analysis of metal-insulator transition induced by electron-electron interaction started with the works of Mott [@mott] and Hubbard [@hubb]. The first of them introduced the critical carrier concentration for the transition to take place in a discontinuous manner, whereas the second introduced the critical bandwidth to interaction ratio (of the order of unity). Our method of approach can be used to relate the above criteria, as we discuss next. Namely, to relate our method to the original ideas of Mott and Hubbard, we have plotted in Fig. 3 the ratio of bandwidth $W \equiv 2 |\sum_{j(i)} t_{ij}|$, where $t_{ij}$ is the hopping integral between the neighbors $\left<ij\right>$ (calculated through the relation $t_{ij}=\left<w_i\right|H_1\left|w_j\right>$ for the basis $\left\{w_i\right\}$ optimized in the correlated state and for full single-particle potential in $H_1$), to the effective short range Coulomb interaction $U-K$, where $U=\left<w_iw_i\right|V_{12}\left|w_iw_i\right>$ and $K=\left<w_iw_{i+1}\right|V_{12}\left|w_iw_{i+1}\right>$. The value $W/\left(U-K\right)=1$ marked in this figure represents roughly the dividing line between metallic and Mott insulating states for three-dimensional systems [@hubb]. This point, achieved for $R\approx 2.7a_0$, does not reflect any characteristic point for our system. Instead, the localization is practically achieved for the distance about twice as large, as is the size of the atomic states composing the Wannier function [@spapo] (characterized by the quantity ${\alpha}^{-1}$, see the inset), which nears its atomic value for the $s$-like state. Again, the results for $N=8$ and $N=10$ are very close to each other; this is the reason why we have shadowed the areas between the corresponding curves in both Figs. 2 and 3. On the basis of Figs. 2 and 3 we can estimate the localization threshold for our system. The corresponding Mott criterion [@mott], generalized to $d$ dimensions takes the form $n_c^{1/d}a_H\approx 0.2$, where $n_c$ is the carrier concentration, and $a_H$ is the size of the states at the localization threshold. In our situation of neutral chain: $n_c=1/R$, and $a_H={\alpha}^{-1}$ so that for $R\approx 5a_0$ this criterion takes the form $\left(a_0/R\right)\left({\alpha}^{-1}/a_0\right)\approx 0.95/5\approx 0.2$, a suprisingly close value to that of Mott (which reflects the long-range nature of the Coulomb interaction). Thus, our results provide a support for the Mott criterion rather than for the Hubbard one [@hubb]. In other words, the [*metallicity*]{} extends well beyond the $W=U$ limit and this must be caused by the inclusion of more distant hopping processes. One may also say that the Mott-criterion universality originates from the long-range nature of the interaction, which imitates the higher-lattice dimensionality. Hence, the conclusion [@lieb] about the universality of the insulating state for the Hubbard chain does not extend to the $1d$ models with a realistic account of the electronic structure. This conclusion is very important also because it removes one of the main objections against using the itinerant (or even effective mass) states for quantum dots [@jaca]. We can determine directly the effective mass at the Fermi level. Namely, the calculated band mass $m_{F}$ is about $40\%$ enhanced near the localization threshold. The quasiparticle mass $m^{\star}_{F}$ is found from the relation $m^{\star}_{F} = (\Delta n_{k_{F}})^{-1} m_{F}$, where the first factor is the usual Fermi-liquid $Z^{-1}$ enhancement (the discontinuity at the Fermi level marked in Fig.1). The results are shown in Fig. 4. A clear critical behavior is detected: $m^{\star}_{F} = A |R - R_{c}| ^{-\gamma}$, with $A = 10.2, R_{c} = 3.92$, and $\gamma = 4/3$. This quantum critical behavior is obtained, since we emulate the discrete distribution $n_{k}$ with a continuous parabolic interpolation when determining $\Delta n_{k_F}$. The localization threshold $R_{c}$ is about $10\%$ higher for $N=8$. It is tempting to speculate that with the increasing $N\rightarrow\infty$ the Mott and the Hubbard criteria for $R_{c}$ may coalesce. The masses near $R = R_{c}$ are huge and reach those known only for heavy-fermion compounds. The one-dimensional systems are unstable with respect to the dimerization [@jero]. We have determined the ground state energy of such a state on the same level of precision as above and have additionally minimized it with respect to the amplitude of the lattice distortion. In Fig. 5 (bottom) we have compared the energy contribution $\Delta E$ due to the dimerization with that due to the zero-point motion (top). Both the dimerization amplitude and $\Delta E$ are strongly reduced for $R/a_0 >5$, a feature inevitably connected with the long-range nature of Coulomb interactions, which drives the system towards spatially periodic state (the Mott insulating state on the lattice replaces the Wigner-crystal state [@emer] for the electron gas). Therefore, our results and conclusions above should remain intact for longer chains. Additionally, the zero-point energy overcomes the dimerization energy for a light (hydrogen) chain and has been estimated in the following manner. In the harmonic approximation, the phonons have energy $\omega_k=2\left(C/M\right)^{1/2}\sin\left(\pi k/N\right)$, where $M$ is ionic mass, and the elastic constant is calculated by a numerical differentiation $C=N^{-1}{\partial}^2E_G/\partial R^2$. Formally, these formulae are valid only if the energy has an absolute minimum. Here we assume that the system is closed in a box of length $NR$ and thus the global repulsive interaction between the atoms (the situation with $\partial E_G/\partial R < 0$ for given $R$) is balanced out by the environment. Also, as the k=0 mode is a Goldstone mode, we include only the modes with $k \neq 0$. The phononic contribution to the ground state energy (in the atomic units) is then $$\Delta E_G^{\rm ph}=\left(\frac{2m}{M}\right)^{{\frac{\scriptstyle 1}{\scriptstyle 2}}} \left(\frac{1}{N}\frac{{\partial}^2 E_G}{\partial R^2}\right)^{{\frac{\scriptstyle 1}{\scriptstyle 2}}} \sum^{N-1}_{k=1}\sin\left(\frac{\pi k}{N}\right),$$ where $m$ is the bare electron mass. On the basis of the relation for the $k$-th mode $\left(1/2\right)M\omega_k\left(\Delta R_k\right)^2=\hbar\omega_k/2$, where $\left(\Delta R_k\right)^2$ is the mode contribution to the zero-point vibrations, we can easily estimate the total amplitude $\left(\Delta R\right)^2$, which in the atomic units has the form $$\left(\Delta R\right)^2= \frac{1}{N}\left(\frac{m}{2M}\right)^{{\frac{\scriptstyle 1}{\scriptstyle 2}}} \left(\frac{1}{N}\frac{{\partial}^2E_G}{\partial R^2}\right)^{-{\frac{\scriptstyle 1}{\scriptstyle 2}}} \sum_{k=1}^{N-1}\frac{1}{\sin\left(\pi k/N\right)}.$$ In the $N\rightarrow\infty$ this result give $\left(\Delta R\right)^2\sim\log N$, providing the dynamical lattice instability in one dimension. At the localization threshold (i.e. for $R/a_0\approx 5$) and for $N=8$, we have that $\Delta R\approx 0.12$, a substantial. By comparison, the shift due to the dimerization is $\approx 0.06$ . Also, the [*Peierls distorted state*]{} extends to the localized state (up to $R\,\approx\,6.5\,a_{0}$). In summary, we have determined the microscopic criteria for the [*transition*]{} from the itinerant to the localized states in a one-dimensional system of a finite size and have illustrated those findings on the example of a correlated quantum ring. The new method of optimizing the single-particle wave functions in the correlated state [@spapo] proves thus valuable in the exact treatment of nanoscopic systems. We have calculated all the properties as a function of the lattice parameter. The work was supported by KBN Grant No. 2PO3B 092 18. [99]{} D. Jerome and H. J. Schulz, Adv. Phys. [**31**]{}, 299 (1982); cf. also [*Correlated Electron Systems*]{}, edited by V. Emery (World Scientific, Singapore, 1993). L. Jacak, P. Hawrylak and A. Wójs, [*Quantum Dots*]{} (Springer Vg., Berlin 1998); F. Ge, et al., Ann. Phys. (Leipzig) [**9**]{}, 1 (2000); A. Sekiyama et al., Phys. Rev. B [**51**]{}, R13899 (1995); A. Goni et al., Phys. Rev. Lett. [**70**]{}, 1151 (1993). J. W. Mintmire, B. I. Dunlap, and C. T. White, Phys. Rev. Lett. [**68**]{}, 631 (1992). A. A. Ovchinnikov, Zh. Eksp. Teor. Fiz. [**64**]{}, 342 (1973) \[Sov. Phys. - JETP [**37**]{}, 176 (1973)\]; J. Kondo and K. Yamaji, J. Phys. Soc. Jpn. [**43**]{}, 424 (1977); J. Hubbard, Phys. Rev. B [**17**]{}, 494 (1978); S. Caponi, D. Poiblanc and T. Giamarchi, Phys. Rev. B [**61**]{}, 13410 (2000). R. Strack and D. Vollhardt, Phys. Rev. Lett. [**70**]{}, 2637 (1993); L. Arachea and A. A. Aligia, Phys. Rev. Lett. [**73**]{}, 2240 (1994); A. A. Ovchinnikov, Mod. Phys. Lett. B [**7**]{}, 1397 (1993); K. Michielsen, H. De Raedt and T. Schneider, Phys. Rev. Lett. [**68**]{}, 1410 (1992); D. Poiblanc et al., Phys. Rev. B [**56**]{}, R1645 (1997). E. H. Lieb and F. Y. Wu, Phys. Rev. Lett. [**20**]{}, 1445 (1968). S. Daul and R. M. Noack, Phys. Rev. B [**61**]{}, 1646 (2000). H. J. Schulz, Phys. Rev. Lett. [**71**]{}, 1864 (1993); J. Voit, Rep. Prog. Phys. [**57**]{}, 977 (1995). B. Dardel et. al. Europhys. Lett. [**24**]{}, 687 (1993); A. Sekiyama et. al., Ref. [@jero]. V. I. Anisimov, J. Zaanen and O. K. Andersen, Phys. Rev. B [**44**]{} 943 (1991); V. I. Anisimov, E. Aryasetiawan, and A. I. Lichtenstein, J. Phys: Condens. Matter [**9**]{}, 767 (1997). W. M. Temmerman et. al., in [*Electronic Density Functional Theory Recent Progress and New Directions*]{}, edited by J. F. Dobson et. al., (Plenum, New York, 1998); A. Svane et. al., Int. J. Quantum Chem. [**77**]{}, 799 (2000). J. Spalek et. al., Phys. Rev. B [**61**]{}, 15676 (2000); A. Rycerz and J. Spalek, Phys. Rev. B [**63**]{}, 073101 (2001). The statistical distribution within the Hubbard model (for $d=1$) was analysed in: J. Carmelo and D. Baeriswyl, Phys. Rev. B [**37**]{}, 7541 (1988); M. Ogata and H. Shiba, [*ibid.*]{}, B [**41**]{}, 2326 (1990). For $d=2$: J. Bonča et al. Solid State Commun. [**78**]{}, 109 (1991); W. Stephan and P. Horsh, Phys. Rev. Lett. [**66**]{}, 2258 (1991). N. F. Mott, Proc. Phys. Soc. A [**62**]{}, 416 (1949); N. F. Mott, [*Metal-Insulator Transitions*]{} (Taylor & Francis, London, 1990). J. Hubbard, Proc. Roy. Soc. (London) A [**281**]{}, 401 (1964). W. F. Brinkman and T. M. Rice, Phys. Rev. B [**1**]{}, 4302 (1970); J. Spałek, A. Datta, and J. M. Honig, Phys. Rev. Lett., [**59**]{}, 728 (1987).
Dirt Bike Graphics and Decals Looking for a way to make your dirt bike stand out from the crowd? Applying dirt bike graphics to your plastics is a great way to make your bike unique. It’s a quick and easy method of making your bike look new and giving it a custom look. Is your bike new? Add new graphics to give it a special look and make it stand out from the crowd. Is your bike old? Use new graphics to update its look and reinvigorate its style. Even if your plastics as worn and used, a bit of cleaning will allow your graphics to stick as good as new! (Use rubbing alcohol if you need to remove any stubborn stickers or decals. A razor can help you smooth out scratches or notches.) At Rocky Mountain ATV/MC, we have plenty of options to choose from, and we’ve split them into multiple sections to make things easy for you. Just choose a category from this page. Universal decals are a great option if you’re looking for something that is quick, easy and low cost. There’s no need to match things up correctly with your exact bike. All you need to decide is what logos you want and where they’ll go. And with so many options, there’s a lot you can do to customize your bike and make it look different from others, even if they have the same decal set as you. Machine-specific graphics are a bit different. But even then, we make the process as painless as possible by matching up your bike with the graphics kits that are designed for it. We have a number of great, professional-looking kits that will really make your bike stand out. There’s also the option to create a custom set of graphics – whether they’re the number plates or trim pieces. Attack Graphics kits are available on many different dirt bikes, and they give you the benefit of making your motorcycle truly one-of-a-kind with your own choice of colors and accents. You can even have your name and race number printed right onto the number plate graphics. Check out our custom graphics page for more. When you want to enliven your motorcycle’s appearance, you can’t go wrong with new graphics or decals. And when you want graphic kits or decal sheets, Rocky Mountain ATV/MC is your one-stop shop. As with all of our dirt bike parts, we carry an impressive selection, and we always provide excellent prices. Take a moment to browse our selection today! Latest Graphics and Decals Reviews – You could win up to $500 for reviewing products! Attack Graphics are great! I have had the Attack Graphics radiator shrouds on my 2008 KLR for a little over a year and they still look great. I recently did a lot of off-road in Moab and they are definitely durable! They definitely improve the looks of my KLR. A good deal/buy Great value I order 2 sets for my wife's and daughters CRF230s. I'm very impressed with the quality of the stickers and the fit. The girls were very excited to have their name on their number plates. Definitely buying these next time I change numbers on my bikes. good fit, great value bought this kit for a new bike to get thru qualifiers cant bring myself to pay the hundreds of dollars the big graphic companies charge and don't get much in return. the number style wasn't exactly how i like it, but it does the job. the numbers could be a little bigger, maybe add that in the custom notes when you order, maybe they can make it bigger. other than that good quality stuff.
// @GENERATOR:play-routes-compiler // @SOURCE:D:/git/trask/glowroot/agent-parent/plugins/play-plugin/tmp-router-files/conf/routes // @DATE:Sat Apr 09 15:55:55 PDT 2016 package router import play.core.routing._ import play.core.routing.HandlerInvokerFactory._ import play.core.j._ import play.api.mvc._ import _root_.controllers.Assets.Asset import _root_.play.libs.F class Routes( override val errorHandler: play.api.http.HttpErrorHandler, // @LINE:5 HomeController_0: controllers.HomeController, // @LINE:6 AsyncController_1: controllers.AsyncController, // @LINE:7 StreamController_3: controllers.StreamController, // @LINE:8 Assets_4: controllers.Assets, // @LINE:9 BadController_2: controllers.BadController, val prefix: String ) extends GeneratedRouter { @javax.inject.Inject() def this(errorHandler: play.api.http.HttpErrorHandler, // @LINE:5 HomeController_0: controllers.HomeController, // @LINE:6 AsyncController_1: controllers.AsyncController, // @LINE:7 StreamController_3: controllers.StreamController, // @LINE:8 Assets_4: controllers.Assets, // @LINE:9 BadController_2: controllers.BadController ) = this(errorHandler, HomeController_0, AsyncController_1, StreamController_3, Assets_4, BadController_2, "/") import ReverseRouteContext.empty def withPrefix(prefix: String): Routes = { router.RoutesPrefix.setPrefix(prefix) new Routes(errorHandler, HomeController_0, AsyncController_1, StreamController_3, Assets_4, BadController_2, prefix) } private[this] val defaultPrefix: String = { if (this.prefix.endsWith("/")) "" else "/" } def documentation = List( ("""GET""", this.prefix, """controllers.HomeController.index"""), ("""GET""", this.prefix + (if(this.prefix.endsWith("/")) "" else "/") + """message""", """controllers.AsyncController.message"""), ("""GET""", this.prefix + (if(this.prefix.endsWith("/")) "" else "/") + """stream""", """controllers.StreamController.stream"""), ("""GET""", this.prefix + (if(this.prefix.endsWith("/")) "" else "/") + """assets/""" + "$" + """file<.+>""", """controllers.Assets.versioned(path:String = "/public", file:Asset)"""), ("""GET""", this.prefix + (if(this.prefix.endsWith("/")) "" else "/") + """bad""", """controllers.BadController.bad"""), Nil ).foldLeft(List.empty[(String,String,String)]) { (s,e) => e.asInstanceOf[Any] match { case r @ (_,_,_) => s :+ r.asInstanceOf[(String,String,String)] case l => s ++ l.asInstanceOf[List[(String,String,String)]] }} // @LINE:5 private[this] lazy val controllers_HomeController_index0_route = Route("GET", PathPattern(List(StaticPart(this.prefix))) ) private[this] lazy val controllers_HomeController_index0_invoker = createInvoker( HomeController_0.index, HandlerDef(this.getClass.getClassLoader, "router", "controllers.HomeController", "index", Nil, "GET", """""", this.prefix + """""" ) ) // @LINE:6 private[this] lazy val controllers_AsyncController_message1_route = Route("GET", PathPattern(List(StaticPart(this.prefix), StaticPart(this.defaultPrefix), StaticPart("message"))) ) private[this] lazy val controllers_AsyncController_message1_invoker = createInvoker( AsyncController_1.message, HandlerDef(this.getClass.getClassLoader, "router", "controllers.AsyncController", "message", Nil, "GET", """""", this.prefix + """message""" ) ) // @LINE:7 private[this] lazy val controllers_StreamController_stream2_route = Route("GET", PathPattern(List(StaticPart(this.prefix), StaticPart(this.defaultPrefix), StaticPart("stream"))) ) private[this] lazy val controllers_StreamController_stream2_invoker = createInvoker( StreamController_3.stream, HandlerDef(this.getClass.getClassLoader, "router", "controllers.StreamController", "stream", Nil, "GET", """""", this.prefix + """stream""" ) ) // @LINE:8 private[this] lazy val controllers_Assets_versioned3_route = Route("GET", PathPattern(List(StaticPart(this.prefix), StaticPart(this.defaultPrefix), StaticPart("assets/"), DynamicPart("file", """.+""",false))) ) private[this] lazy val controllers_Assets_versioned3_invoker = createInvoker( Assets_4.versioned(fakeValue[String], fakeValue[Asset]), HandlerDef(this.getClass.getClassLoader, "router", "controllers.Assets", "versioned", Seq(classOf[String], classOf[Asset]), "GET", """""", this.prefix + """assets/""" + "$" + """file<.+>""" ) ) // @LINE:9 private[this] lazy val controllers_BadController_bad4_route = Route("GET", PathPattern(List(StaticPart(this.prefix), StaticPart(this.defaultPrefix), StaticPart("bad"))) ) private[this] lazy val controllers_BadController_bad4_invoker = createInvoker( BadController_2.bad, HandlerDef(this.getClass.getClassLoader, "router", "controllers.BadController", "bad", Nil, "GET", """""", this.prefix + """bad""" ) ) def routes: PartialFunction[RequestHeader, Handler] = { // @LINE:5 case controllers_HomeController_index0_route(params) => call { controllers_HomeController_index0_invoker.call(HomeController_0.index) } // @LINE:6 case controllers_AsyncController_message1_route(params) => call { controllers_AsyncController_message1_invoker.call(AsyncController_1.message) } // @LINE:7 case controllers_StreamController_stream2_route(params) => call { controllers_StreamController_stream2_invoker.call(StreamController_3.stream) } // @LINE:8 case controllers_Assets_versioned3_route(params) => call(Param[String]("path", Right("/public")), params.fromPath[Asset]("file", None)) { (path, file) => controllers_Assets_versioned3_invoker.call(Assets_4.versioned(path, file)) } // @LINE:9 case controllers_BadController_bad4_route(params) => call { controllers_BadController_bad4_invoker.call(BadController_2.bad) } } }
They say that not only is life cyclical, but history repeats itself. Both of those are true in Fairfield where the eighth grade girls’ basketball team is being coached by Angie Lamb, Trojan alum and former player under Hall of Fame Coach Dan Breen, who currently has twin daughters on Lamb’s team. About Breen, Lamb said, “I learned everything I know about basketball from him.” She continued, “He was great at not only teaching us how to do the fundamentals, but also explained why we we were doing them and how they fit into the offensive and defensive principles. I have those principles ingrained into my memory - forever! He sees basketball like no other person sees it; he sees the intricate details from the very beginning, the point of attack, to the end, going in hard for the lay up, jumping and rotating your hips.” Lamb had nothing but praise for her team and Breens’ young ballers. “This 8th grade team, with his two twin daughters, showed all the traits you would expect from a “Dan Breen” coached team. He has worked with them since 3rd grade, so it’s no surprise they are fundamentally sound. They were intense and competitive in both games and practice. They have been conditioned to play hard, value each possession of the ball and they expect to win. Having them come into middle school ball with this respect of the game from Dan, and having Jerrod Belzer and Josh Allison do a great job with them as 7th graders, made my job a whole lot easier this year. They know they can’t be satisfied with their accomplishments yet, they have a high school career ahead of them, and I have all the faith in the world these girl will put in the work they need to be true champions. The teams themselves were excellent, with the “A” team finishing 12-0 this year and 24-0 for their junior high careers. The “B” squad finished 11-3, including eight straight to end the season. The final game was a 45-14 victory for the “A” teamers. The effort was led by Anna Dunlap and Hannah Simpson with 13 points and nine rebounds and eight points and eight rebounds, respectively. The Breen twins combined for 14 points and eight steals, while Brynley Allison had six points, four steals and three boards. The “B” ballers won as well, 27-8, led by Jenna Norris with eight points, six steals and two rebounds. Hannah Bergren added seven points, three steals and two boards. Emma Clubb and Hailey Triska each had four points and combined for 10 rebounds, and Sarah McAvan and Jayden Burke each tallied two points and combined for six rebounds.
When speech becomes suspicious: the FBI's "communities against terrorism" Submitted by sosadmin on Mon, 02/13/2012 - 12:30 The FBI wants you to know that paying with cash, being concerned about your privacy (or as the FBI calls it, your "privacy"), and taking an "unusual" interest in surveillance or security procedures are all suspicious activities that could be linked to terrorism. Last week, Public Intelligence posted a file containing a number of FBI "Communities Against Terrorism" cheat sheets, which contain information about supposed terrorism risk indicators, directed at various groups of people or private entities. Among the categories are: construction sites electronics stores hobby shops hotels and malls internet cafés entertainment facilities martial arts and paintball activities mass transportation and "sleepers" -- or "otherwise persons who camouflage their involvement in terrorist activity or planning by attempting to fit in with others in our society." (That last bit is awfully strange, isn't it? You'd assume that anyone bent on committing acts of terrorism would want to camouflage their involvement with that activity, no?) You might think: great! The FBI is reaching out to communities and businesses, doing due diligence to ensure that many different communities in the United States have the information they need to protect themselves and their surroundings from those who would do them harm. And indeed, some of the FBI's advice to businesses and the public make sense. For example, when advising farm store suppliers about things to watch out for, the FBI lists a number of chemicals that might be used to manufacture a bomb, and advises that shop owners ask for identification whenever people purchase those materials. But the cheat sheets go well beyond commonsense advice, and encroach directly on our rights to freedom of speech and freedom from government intrusion into our private lives. We've talked for a long time about the FBI's classification of commonplace activities like taking notes or photography as "suspicious activities," and these sheets repeat those mistakes. But there are three other trends in these documents that warrant particular concern. First is the notion that Muslims are a dangerous enemy within; second is the conflation of unpopular speech or dissent with terrorism; and third is the notion that if we are concerned with privacy, we are somehow suspicious. How to spot a "sleeper" There is ample evidence to suggest that the FBI has made Muslims its enemy number one in the agency's anti-terrorism work. A cursory glance at its dedicated resources, investigations, surveillance, and personnel training reveals an obsession with Muslims and Islam that does not match reality. As a recent terrorism study showed, the threat from radical Muslims to the United States is "minuscule" and shrinking every year, but you wouldn't know it by listening to the FBI. Here are some choice segments from the document. Judge for yourself whether or not you think the FBI is specifically targeting Muslims, absent any evidence that Muslims are more dangerous to the US than any other group of people. Equating unpopular speech with propensity for criminal activity As you can see in the example cited above, the FBI not only inappropriately targets Muslims and Islam, but also suggests that expressing "fury at the West," "excusing violence against Americans on the grounds that American actions provoked the problem," or harboring "conspiracy theories about Westerners" are "attitude indicators" that should raise red flags. But if that's true, many of us are in for an FBI investigation into our unpopular speech. Here are a series of quotes from high profile public people, including a GOP presidential candidate, that raise alarm given the FBI's above cited criteria. Do these comments warrant the FBI digging into the speakers' personal lives in order to find out if they are dangerous terrorists? If you hear someone say things like this on television, should you immediately pick up the phone and call the FBI tips line? 1. On US actions and the notion that violence against Americans can be provoked by American actions: We're under great threat because we occupy so many countries. We're in 130 countries. We have 900 bases around the world. We're going broke. The purpose of al-Qaeda was to attack us, invite us over there, where they can target us. And they have been doing it. They have more attacks against us and the American interests per month than occurred in all the years before 9/11. But we're there, occupying their land. And if we think that we can do that and not have retaliation, we're kidding ourselves. That was GOP presidential candidate and Congressperson Ron Paul. I wonder how large his FBI file is. 2. On "fury at the West": This was just simple murder…America is the big evil. We are just a small mouthful in front of America. That was a Senator from Pakistan, a close ally of the United States and one of the top recipients of US State Department and military aid, speaking after suspected CIA agent Raymond Davis killed two Pakistanis in broad daylight in that country. 3. On "conspiracy theories about Westerners": [9/11] couldn’t possibly have been done the way the government told us.” That was Judge Andrew Napolitano, a libertarian who until last week had a very popular FOX Business television program. Don't hold your breath for the FBI to initiate terrorism prosecutions of any of the above people. Perhaps advocating "extreme" ideology is only really a problem when you are Muslim. Don't cover your computer screen or use encryption: that's suspicious The FBI is concerned about unpopular, "anti-US" speech, but it is also concerned about how speech is protected. Or rather, the agency thinks it is suspicious if you try to protect your communications or data from its -- or hackers' -- prying eyes. Do you care about your privacy online? Are you concerned about the fact that the government can now routinely, warrantlessly subpoena access to your most intimate information, including your real-time credit card and travel information, your cell phone data, and your IP address? Do you encrypt any of your internet data, like your email or your instant messaging? Do you use Tor, or another service that helps prevent the tracking of your physical location online? Are you a journalist? A lawyer? A businessperson? Does your line of work require that you keep confidential sources, or that you ensure that your client's information is not disclosed to anyone, including hackers or government spies? Or maybe you are just an ordinary person who doesn't want your credit card information to be scooped up by hackers at an internet cafe. Maybe you don't want your ex-partner, who is a computer expert, to be able to snoop into your unencrypted email. In short: there are literally thousands of legitimate reasons for us to want to maintain some privacy online. But to the FBI, all of that is so much nonsense. Your interest in online privacy is suspect, says its "Communities Against Terrorism" documents. And if you own an internet cafe or an electronics shop, the FBI wants your help in ratting out those among us who take some precautionary measures to protect ourselves online and in the digital world. The "Communities Against Terrorism" documents repeatedly reference paying with cash, being "overly concerned about privacy," and expression of so-called "anti-US" sentiments as grounds for suspicion. But the documents particular to electronics stores and internet cafes are especially interesting, because they directly assault the notion that privacy has intrinsic value. In other words, if you are interested in trying to protect yourself from the government's all-seeing digital surveillance eye, you are suspicious. Given the woefully inadequate statutory protections against improper government spying that allow for serious violations of our privacy, taking precautionary measures like those listed above may be your only hope of escaping the digital surveillance matrix. But if you try to escape, beware: ironically enough, doing so may make you a target.
Q: Overlapping times issue with 'findmeetingtimes' call in Microsoft Graph API When attempting to complete a findmeetingtimes call with the Microsoft Graph API (as seen here: https://developer.microsoft.com/en-us/graph/docs/api-reference/beta/api/user_findmeetingtimes), I am experiencing an issue where asynchronously looping and completing the call is returning a 500 error only when two meetings are scheduled in the exact same time slot (i.e. two meetings are scheduled at exactly 4:30PM - 5:00PM. The exact error message in the error object that is returned is: "Invalid value for arg:Overlaps are not supported within TimeSlots, value:{"start":2017-05-10T20:00:00Z,"min":30} ↵Parameter name: Overlaps are not supported within TimeSlots" Does anyone have any suggestions for a fix/work around for this? Thanks A: This was a bug in our API. We've deployed a fix that should clear this up.
Q: Why DTFT coefficients are periodic and why continuous Fourier transform coefficients are not periodic? As I understand, when the input signal is discrete in time and we want to find the coefficients of Fourier transform, DTFT is used and the coefficients in frequency domain are periodic, but I can't understand why? If DTFT coefficients are periodic, why the coefficients of a continuous signal in frequency domain are not periodic? A: The explanation by @Maximilian Matthé is a standard and formal approach for this question. But I think it is not intuitive and easy to understand the reason. In the following, I will try to explain from another aspect. First of all, periodicity means infinity. For a signal in the temporal/spatial domain, the periodicity is somewhat easy for realization, such as extending it periodically and infinitely. But for the frequency domain, it is quite different. Different position means different component with different changing speed. Therefore, if periodicity is expected in the frequency domain, infinitely rapid changing is expected in the temporal/spatial domain. In the real world of our life, most signals changes smoothly, thus periodicity is impossible in the frequency domain. While for discrete-time signals, the model is based on the $\delta(t)$ function, for which the changing is infinitely sharp and rapid, thus periodicity becomes possible in this case. A: The result of a DTFT is periodic, because any discrete-time signal has a continuous spectrum. This can be e.g. explained by the following: Let $x(t)$ be a time-continuous signal. Now, making it discrete corresponds to multiplying it with a Dirac-Train: $$ x[n] = x(t)\sum_{n\in\mathbb{Z}} \delta(t-nT) $$ Considering the Convolution theorem of the (continuous) Fourier transform and noting that $$ F\{\sum_{n\in\mathbb{Z}}\delta(t-nT)\} = \sum_{n\in\mathbb{Z}}\delta(f-n/T) $$ we have $$ X_d(f)=F\{x(t)\sum_{n\in\mathbb{Z}}\delta(t-nT)\}=X(f)*\sum_{n\in\mathbb{Z}}\delta(f-n/T) $$ Now, we can directly express the convolution as: $$ X_d(f)=\sum_{n\in\mathbb{Z}}X(f-n/T) $$ Hence, the spectrum of the discrete signal is periodic with the period 1/T (i.e. the sampling frequency).
Allie Lewis of Martha Stewart's Everyday Food asked for your holiday cooking questions. Here's the second of five questions Allie is answering for us - welcome to The Kitchn, Allie! Q:My boyfriend and I have had lots of surprise guests dropping by our new house during the holiday season, and I'd like to have something tasty to offer them. Do you have any suggestions for quick, but impressive meals and desserts I can whip up for our unexpected visitors? Read on for Allie's extremely helpful answer - she has tips for whipping up last-second drinks, appetizers, dinner, and dessert. A: There's absolutely no question that feeding and entertaining last-minute guests can be overwhelming! With a little preparation, a well-stocked pantry and freezer (and bar!), it can be very easy... and a lot of fun. Here are a few of my tips for making sure you're always ready to welcome and pamper your guests with delicious food and drink. Drinks• Keep a mixed case of "house" wine (6 red, 6 white) on-hand. I like to stock Pinot Noir and Sauvignon Blanc, since they seem to be crowd-pleasers and go with most everything - unless you're dealing with serious wine folks. Don't spend too much - $10-$15 a bottle is plenty. The key thing here is having enough quantity that you don't have to run to the wine store. • For the red and the white, be sure you have 6 of the same bottle - one of the most important duties of a good host/hostess is keeping your guests' glasses full (and not waiting for them to finish their glass before pouring them another... which you'll have to do if you keep switching wines). It sounds like a lot of wine, but keep in mind that even if you don't have last-minute holiday guests, you'll probably make your way through the case over time. • Keep a dozen bottles of good-quality beer on-hand. This is an opportunity for variety - buy different, fun beers (and a few light ones). If kept in the fridge, beer basically never goes bad. • Keep a bottle of the basic liquors (vodka, gin, and scotch) on-hand. Some folks just have to have their cocktails! Liquors never go bad. • Keep a 6-pack of each tonic and club soda on-hand. The liter bottles are cost-effective, but only if you're expecting a big crowd – they go flat very quickly once they're opened. If left unopened, cans of tonic and soda last a long time. • Keep a couple of lemons and limes on-hand. A cocktail is often meaningless without the fruit! These will last a few weeks in the fridge. Appetizers• Keep mixed olives on-hand. They last for months in the fridge. Just bring to room-temperature before serving. • Keep a few good quality cheeses on-hand. Make sure you have 3 nice, pretty pieces in the fridge - and a good variety of soft/hard, cow/goat/sheep. • Keep cheese accompaniments on-hand. I like to keep an assortment of crackers and crisps (make sure to have a variety of shapes, sizes, and flavors). To step it up a notch, keep some fig jam and dried fruits around to put out with your cheese. • Keep a nice dry sausage on-hand. All you'll have to do is slice it up and put it out with a Dijon or grainy mustard. Dinner• Risotto. Risotto is a super-comfort food, and really simple to make with ingredients you probably have (or can easily keep) around - Arborio rice, onions, chicken broth, white wine, olive oil, butter, and Parmesan cheese. Our Basic Risotto is a great place to start, and then you can mix in whatever you may have on hand (frozen shrimp, frozen spinach, frozen peas...). A couple of my other favorite risotto recipes (which require picking up just one or two more ingredients) are Tomato and Sausage Risotto and Butternut Squash Risotto . • Chili. This is an all-time crowd-pleaser. Make a big batch tonight, and store the rest in your freezer for unexpected guests - all you'll need to pick up is fresh sour cream and cheddar cheese. I love our Turkey and Bean Chili and our Chunky Beef Chili, both of which make a big batch and freeze well. Serve chili with some store-bought cornbread, or take a few extra minutes to whip up some Cheddar Cornbread or these Mini Cornbread Puddings with ingredients you may have around. • Beef Stew. Everybody loves a bowl of rich, yummy stew. It just takes a couple hours to simmer up nice and tender, and it freezes perfectly! When guests are coming, just boil up some egg noodles (and toss with plenty of butter) for a perfect winter meal. I just did a "How-To with Allie" column on beef stew in our December '07 issue of Everyday Food (on stands now). • Macaroni and Cheese. A rich mac and cheese with a buttery, crispy topping always gets raves (and freezes well, too)! This is one of my favorite recipes - make it through Step 5 and keep in the freezer. When making, cover with foil and bake until bubbling, then remove the foil and bake until golden (about 1 1/2 hours, total). Desserts• Apple Crisp. Keep the crumble topping in the freezer (make through Step 2), then all you have to do is pick up some apples, toss with flour, sugar, and cinnamon, and bake it up; serve with some vanilla ice cream, and you've got the perfect winter dessert! • Sundae Bar. I've never heard any complaints when I put out a few pints of premium ice cream with toppings. Keep some best-quality hot fudge (and/or toffee sauce) on hand and you're golden! Better yet, make your own hot fudge in about 5 minutes: boil 1 cup cream, then remove from heat and stir in 8 ounces chopped chocolate (off the heat). • Brownies. Make a batch of these Super Fudgy Brownies and keep them in the freezer - they'll thaw in about 15 minutes. • Chocolate-Chip Cookies. Make the dough, form into balls, and keep in the freezer - you can bake them up in about 20 minutes, for a gooey, delicious, straight-from-the-oven treat. Just use a small ice cream scoop to portion dough; place on a baking sheet lined with wax paper, and freeze. When they're firm, transfer to a plastic bag and store in the freezer. When you're ready to wow your guests with delicious smells and gooey chocolate chips, just bake them off from frozen (they'll need a few more minutes than if they weren't frozen). These Giant Chocolate Chip Cookies are on the thinner side, but I love them. If you have a favorite recipe, use that - the principle of making the dough and freezing it is the same. I hope this information was helpful and inspiring! Cooking for others is the greatest pleasure - for everyone - and it doesn't have to be scary! Have a wonderful holiday -
At issue is whether New Jersey’s three Hudson River crossings — the George Washington Bridge and the Lincoln and Holland tunnels — will be treated the same way when New York’s new congestion pricing program goes into effect in several years. | AP Photo Murphy insists he has ‘understanding’ with Cuomo on Manhattan tolls New Jersey Gov. Phil Murphy insisted Thursday he had a “conceptual understanding” with New York Gov. Andrew Cuomo about how Hudson River crossings will be treated under a new plan to toll drivers in the busiest parts of Manhattan. After Pat Foye, Cuomo’s hand-picked chairman of the Metropolitan Transportation Authority, said Wednesday evening that he had “no idea” what Murphy was talking about, the New Jersey governor doubled down on his claims. Story Continued Below “My comments are based explicitly on principle-to-principle discussion with Governor Cuomo,” Murphy said at a press conference Thursday afternoon in Trenton. “As I said, it’s a conceptual understanding.” At issue is whether New Jersey’s three Hudson River crossings — the George Washington Bridge and the Lincoln and Holland tunnels — will be treated the same way when New York’s new congestion pricing program goes into effect in several years. Murphy told reporters on Wednesday he has an understanding with Cuomo that New Jersey commuters will be treated equally at all three crossings. Transit advocates interpreted the deal to mean drivers who use those crossings will receive credit for the tolls they paid, offsetting the new charges to enter Manhattan’s new congestion pricing zone, which will cover the area south of 60th Street. The legislation authorizing congestion pricing did not explicitly mention any credits for the Holland and Lincoln tunnels, but both tubes feed directly into the congestion pricing zone, and many assumed they'd get such a carve-out. The George Washington Bridge, however, empties into Manhattan far north of the congestion pricing zone, and there's been uncertainty about whether commuters using the bridge would be credited. Two people who were involved in the discussions with Cuomo were explicit on Wednesday, when POLITICO was the first to report on the issue, saying Murphy and his staff had reached an agreement with Cuomo on the issue. In exchange, Murphy agreed to allow the Port Authority of New York and New Jersey — which he jointly controls with Cuomo — to move forward with cashless tolling. Without the technology, the MTA will not be able to give credit to drivers who enter the congestion pricing zone after using those bridges and tunnels. But Foye, who is also CEO of the MTA and a long-time Cuomo loyalist, denied there was any sort of deal between the states, noting all decisions are to be made by a panel within the MTA called the Traffic Mobility Review Board. “No agreement has been reached with New Jersey or anyone else on credits, exemptions or carveouts because the MTA will determine the Central Business District tolls and other terms once the Traffic Mobility Review Board has made its recommendations and traffic and congestion analyses are completed,” Foye said in a statement distributed late Wednesday. Murphy said his chief of staff, George Helmy, had since spoken to Foye about the issue. “We will stand strong and make sure that New Jersey commuters are protected, period, full-stop, and not be asked to pay twice and not be discriminated against,” Murphy said. Asked explicitly if there was really a deal, Murphy said, “Conceptual understanding is the words I’ve used and I’ll continue to use.”
Prime Minister Scott Morrison’s pledge to crack down hard on climate change protests has been slammed as “undemocratic” and labelled a move that may have unintended consequences for the Government and the coal industry. In a show of solidarity with the coal industry, Morrison outlined his plan to crack down on climate protestors and campaigns that encourage ‘secondary boycotts’ on companies providing services to the fossil fuel industry, in a speech to the Queensland Resources Council’s ‘State of the Sector’ forum in Brisbane. “[There is an] even more worrying development. An escalating trend towards a new form of secondary boycotts, Morrison said. “This is a trend with potentially serious consequences for our economy. Environmental groups are targeting businesses and firms who provide goods or services to firms they don’t like, especially in the resources sector. “They are targeting businesses of all sizes, including small businesses, like contracting businesses in regional Queensland. It is a potentially more insidious threat to the Queensland economy and jobs and living standards than a street protest.” “It is a potentially more insidious threat to the Queensland economy and jobs and living standards than a street protest,” the prime minister added. Successful campaigns have targeted companies that may be providing services to new fossil fuel projects, pressuring them to disassociate from fossil fuel projects. The Adani Carmichael coal mine serves as the most prominent example, with Stop Adani campaigners targeting firms like engineering companies GHD, Aurecon and Downer Group and each of the Big Four banks, calling for the companies to refuse to deal with the Adani project. The move to outlaw certain climate change protests was slammed by the Human Rights Law Centre, labelling the move as part of an “undemocratic trend” from governments to stamp out protest, adding that protest laws should be strengthened and secondary boycotts had played a pivotal role in human rights campaigns. “From ending slavery to stopping apartheid, boycott campaigns have played a critical role in achieving many social advances that we now take for granted,” executive director of the Human Rights Law Centre Hugh de Kretser said. “The Morrison Government’s announcement that it is looking to ban certain boycott campaigns is deeply concerning.” “Protest is an essential part of our democracy. To protect our democracy and help ensure a better future for all Australians, governments should be strengthening our rights to come together and protest, not weakening them.” But Morrison claimed that the protests were a threat to the Queensland economy, and will seek to outlaw the campaign strategy of ‘secondary boycotts’. “Let me assure you this is not something my Government intends to allow to go unchecked,” Morrison said in his speech “Together with the Attorney-General, we are working to identify mechanisms that can successfully outlaw these indulgent and selfish practices that threaten the livelihoods of fellow Australians, especially in rural and regional areas, and especially here in Queensland.” The Queensland Resources Council is headed by former federal resources and industry minister Ian Macfarlane. The crackdown on fossil fuel boycotts is a bizarre demand that may have perverse, unexpected, outcomes for the Prime Minister. Many forms of ‘secondary boycotts’ have been rendered unlawful under the Competition and Consumer Act, as they have been a historical tactic of unions against antagonistic companies. However, the Competition and Consumer Act includes an explicit exemption that allows for secondary boycotts for campaigns related to ‘environmental protection’. The flight from businesses with high exposure to the fossil fuel industry hasn’t just been driven by protestors concerned for the environment, but also from large portions of the Australian business and finance sectors that see climate change as an emerging physical and financial risk. These risks aren’t solely related to fossil fuel producers, but also to those companies that are reliant on the fossil fuel sector for business. Investors see the need to act on climate change as a risk to these companies and are beginning to respond by likewise pressuring these companies to adapt. This has often been lead superannuation funds and wealth managers, such as the Climate Action 100+ initiative, who Morrison risks alienating with a strong crackdown on boycott campaigns. The abandonment of the fossil fuel industry has followed advice from Australian financial regulators; ASIC, APRA and the Reserve Bank, who have all said that it is prudent for the Australian economy to reduce its exposure to climate change related risks. Instead, Morrison urged companies to embrace their ‘quiet shareholders’, who presumably are not those who challenge companies and their boards to do more on climate change. “I think some of our largest corporations should listen to, and engage, their ‘quiet shareholders’, not just their noisy ones,” Morrison said. This was a point made by the Australian Conservation Foundation, which highlighted the fact that it is not just environmental groups leading the charge away from the fossil fuel sector, but also the major banks and institutional investors. “The wider business world is moving away from coal because they can see it is damaging our climate and damaging the economy,” ACF’s CEO Kelly O’Shanassy said. “Big institutional investors are turning their backs on coal because they can see the damage climate change is doing to their portfolios and because the financial returns are better from clean technology.” “To paint this broad community concern as being about ‘fringe-dwelling extremists’ is an insult to all Australians who want to better future for themselves and their children.” Campaigning group GetUp! was also quick to slam the proposal from Morrison, saying it was an attempt to those criticising the government for its lack of action on climate change. “The government doesn’t have a plan for the climate crisis, so it’s cracking down on activists who want nothing more than the government to take the issue seriously,” GetUp’s head of campaigns Emily Mulligan said “It’s ludicrous that the Prime Minister’s priority is to crack down on everyday people speaking up on issues they care about when we do not have a plan to address the real and immediate threat of climate change. However, Morrison’s proposed anti-boycott laws may win the support of the Labor party, with deputy federal leader Richard Marles telling the Today Show that he thought protestors have been “absolutely indulgent”. “[I] completely agree with the Prime Minister’s assessment of that… these are people who are not actually about a cause, they’re about engaging in a personal experience at the expense of Australians, in this case Victorians, trying to get on with their lives,” Marles said. “We’ll have a look at whatever the Government is putting forward.” The move has however been slammed by the Greens, with Greens Federal MP Adam Bandt accusing the prime minister of “dismantling democracy” in his push to outlaw the climate campaigns. The moved by the Federal government to introduce anti-protest laws follows laws introduced in Queensland to crackdown on civil disobedience campaigns. Similar legislation is also being considered in New South Wales and South Australia.
We use cookies to enhance your experience on our website. This website uses cookies that provide targeted advertising and which track your use of this website. By clicking ‘continue’ or by continuing to use our website, you are agreeing to our use of cookies. You can change your cookie settings at any time.ContinueFind out more Definition of photocatalytic in English: photocatalytic adjective ‘The result of several years' research, the product incorporates a proprietary dual-action coating, using hydrophilic and photocatalytic properties to eliminate water and organic and inorganic deposits from the surface of the glass.’ ‘This layer functions in two ways: having both photocatalytic and hydrophilic effects.’ ‘The coating is hydrophilic and photocatalytic; i.e., it causes rainwater to sheet on the surface and it oxidizes dirt and organic deposits, breaking their adherence to the glass.’ ‘The new Pilkington Activ glass is photocatalytic which means UV rays react chemically with dirt and organic deposits such as bird lime, breaking them down and loosening them from the surface of the glass.’
RCT Homes A case study looking at the regeneration work which SERS did in the RCT area on both privately and socially owned homes, as well as the impact it had one the local community. Working for both RCT homes and private homeowners, SERS designed and installed EWI systems to four different archetypes in the Rhondda Cynon Taf area. SERS worked in partnership with RCT Homes and the Regeneration and Charity arm of their business – Meadow Prospect to develop a strategic community benefit action plan. Whilst working on the schemes, SERS actively employed local labour on site. Whilst in Penywaun SERS employed a local labourer who was not only a member of the community but also a tenant. A great example of our commitment to RCT Homes and the community is the support we gave on the Rydyfelin AFC project. This derelict pavilion which had been leased by the football club from the local authority for 25 years was brought back to life, with the help of a group of local companies, to be used for not only football but also other community events. SERS carried out pro-bono work worth over £3,500 to the front façade of the building. Client RCT Homes Location Rhondda Cynon Taf Start Date Value Length Work Type External Wall Insulation Number of Properties Type of Properties Insulation Type U Value Finish Applied We use cookies to deliver you the best experience. By browsing our website you agree to our use of cookies. Learn More
20 Roll & Bread Recipes for the Thanksgiving Table As you get ready to finalize your Thanksgiving menu, I urge you not to forget the bread. Despite an already packed table, there's always room for a bread basket. From classic, pillowy soft dinner rolls to a gluten-free version everyone will enjoy, here are 20 easy bread recipes that deserve a place on your Thanksgiving table. Rolls From no-knead rolls you can make in an hour to incredibly tender, potato-enriched morsels that melt in your mouth, homemade rolls are the quietly beloved staples of the Thanksgiving table. Here are a few recipes to choose from. If a classic dinner is what you're after for Thanksgiving, these are the rolls to round out your spread. These are the classic rolls you know and love — soft and tender, yet weighty enough that they don't collapse under the bread knife. Two things make these famous rolls special: first, each one is dipped in melted butter before going on the baking sheet, and second, they are folded in half to give them their signature pocketed appearance. This rich and tender dinner roll recipe is one that everyone will enjoy, whether they're avoiding gluten or not. Biscuits Great for a last-minute addition, we think biscuits deserve a spot on the table regardless of your geography. Whether you want your biscuits tall and flaky or quick and tangy, there's a recipe to suit your needs. These simple cream biscuits are a take on the ever-delicious and classic buttermilk biscuits. What you'll love more than the slightly crisp tops and pillow-soft insides is that these biscuits come together from start to finish in about 20 minutes. This recipe, based on the recipe from a package of White Lily Flour, delivers the tender-yet-flaky biscuits the South is known for. As Meghan says, "If it takes longer than 20 minutes to whip these up, you're doing too much." Breads Here's where you'll find items for the Thanksgiving bread basket outside of the traditional rolls and biscuit category. For some, a skillet cornbread is a must. For others, a quick bread is enough for the table. Perhaps even a savory muffin is more your speed? Add a few wild cards this year, and see how quickly whatever you add to the table gets used to mop up all that gravy.
How to Choose and Store Fruit for Maximum Freshness and Flavor Do you stand in the produce section poking and prodding your fruit before making your picks? That's OK in some instances, since many fruits continue ripening after they've been picked. But not all fruits are created equal. For some, the ripening process stops once they're plucked from the plant from which they came. How do you know which fruits continue ripening and which don't? Take a look at our list of fruits that get better with age and those that come as they are. (See also: Produce Worker's Guide to Choosing Fruits and Veggies) Fruits That Ripen After Picking These fruits, called climacteric fruits, continue to ripen after picking because of the natural chemicals they contain — primarily ethylene gas — that are produced from within the fruit. These chemicals release enzymes called amylases, which turn stored starch into sugar making the fruits sweeter. Other enzymes — hydrolases — break down the fruit's chlorophyll, resulting in richer color. The fruit also becomes softer, which can lead to "over-ripening," as the amount of pectin is lessened by enzymes called pectinases. Once you bring them home, here's how to store climacteric fruits to ensure that they ripen properly, courtesy of The Fruitguys Almanac: Melons Store at room temperature until ripe, then refrigerate for up to 10 days. Peaches and Nectarines You can speed up the ripening process of peaches and other stone fruits by placing them in a paper bag. Otherwise, they should be stored at room temperature and away from direct sunlight and heat. Apples Store in a cool, dry place away from sunlight and heat. Apples can last up to six weeks in the fridge. (See also: 23 Great Ways to Use Apples) Avocados Store at room temperature until ripe. A ripe avocado will yield to firm gentle pressure, and the color will be almost black. To speed up the ripening process if you've bought under-ripe avocados, place them in a paper bag for a couple of days. Mangoes Store at room temperature until ripe, then store in a plastic bag in the refrigerator for up to seven days. Pears Pears are normally picked before peak ripeness to avoid bruising during transit. Store at room temperature away from sunlight and heat. When a pear gives to touch, it's ready to eat. Tomatoes Do not refrigerate tomatoes until they're fully ripe; allowing to ripen at room temperature with the stem side down will result in more flavorful tomatoes. Bananas Store bananas at room temperature away from direct sunlight and heat. Bananas should not be placed in the fridge as this will turn the skin black. To speed up the ripening process for not-quite-ripe bananas, place them in a paper bag with an apple overnight. Once they're ripe though, keep them longer by wrapping the stems in plastic. Plums Like peaches and pears, plums are sweet and delicious when they give softly to gentle touch. Store away from direct sunlight and heat. Guava Store at room temperature until ripe, then in the fridge for up to four days. Cantaloupes Store at room temperature until ripe, then store in the refrigerator for up to 10 days. Kiwis Store at room temperature until ripe. A ripe kiwi will stay fresh in the fridge for a few days, while a very firm unripe kiwi will keep in the fridge for up to two months. Fruits That Don't Ripen After Picking These fruits, called non-climacteric fruits, ripen only while they're still attached to the plant. Once they're picked, the ripening process stops. Unlike climacteric fruits that you can allow to ripen at home if they're under-ripe when you buy them (giving you an increased amount of time to consume them), when non-climacteric are picked at the peak of ripeness, the rapid-rot potential is hastened. On the flip side, if these fruits are picked when they're not quite ripe yet, the result could be a harder, tarter fruit than you'd like. Wrap cut up melon tightly in plastic or foil or store in an air-tight container in the fridge for up to four days. Cherries Do not wash cherries until you're ready to eat. Excess can be stored in the fridge in a plastic bag for up to a week. Figs Another non-climacteric fruit, figs are picked ripe. Enjoy them right away or store them in the fridge until you're ready to eat them. Grapes Do not wash grapes until you're ready to eat. Excess can be stored in the fridge in a perforated plastic bag (what they usually come in from the supermarket) for up to a week. Grapefruit Grapefruits will stay fresh at room temperature for a week and up to several weeks in the fridge. Oranges and Tangerines Store at room temperature for a couple weeks or in the fridge for up to several weeks. Lemons and Limes Store at room temperature for a couple weeks or in the fridge for up to several weeks. Pineapple Wrap cut up pineapple tightly in plastic or foil or store in an air-tight container in the fridge for up to four days. How to Pick the Best Fruit at the Supermarket I found this handy guide to picking fruit (from wikiHow) that may help you take home the best produce available the next time you're shopping. Three tips include: 1. Buy in Season Out-of-season fruit has a longer distance to travel because it comes from further away, so it's always best to buy in-season produce to ensure a higher quality of freshness and flavor. (See also: Fresh Fruits and Veggies By the Month) 2. Use Your Senses Employ your senses of touch, smell, and sight to pick the best produce. Instituting a little common sense doesn't hurt either. If there are a lot of bruises or (eek!) mold, steer clear. 3. Check the Stem If your fruit has a stem on it, use it as a guide to determine freshness. A green stem on ripe fruit is a winner; a green stem on hard fruit permits caution. Do you have other tips for choosing the best fruits and how to store them properly? Let me know in the comments below.
"Previously on Justified..." "This is supreme bullshit." "You do know that we're not allowed to shoot people on sight anymore?" "I'm gonna reassign you." "Eastern District of Kentucky." "I don't wanna go back there." " Still got family here in Kentucky?" " Ex-wife here." "Next time I see you, I'm gonna..." "Fire in the hole!" "How well did you know Boyd Crowder?" "Boyd and I dug coal together when we were 19." "Did you know Boyd's brother?" "The girl he married, Ava." "She ended the union last night with a.30-06." "I had a crush on you from the time I was 12 years old." "...that you get out of Harlan County by tomorrow noon" " or I'm gonna come looking for you." " Now you're talking." "I guess I just never thought of myself as an angry man." "Honestly, you're the angriest man I have ever known." "Looks like it hurts." "Why, yes, Raylan." "Thank you for noticing." "Somebody shot me in the chest the other day." "You getting something for the pain?" "Well, I can goose it as needed, but I've been holding off." "I was hoping that you'd stop by." "I wanted my mind clear and my mouth not all full of rubber when I saw you." "Let's hear it." " What do you think I'm gonna say, Raylan?" " I wouldn't know." "You know, if Ava hadn't come in that room and distracted me with that rifle, you think I could have got you first?" " I don't know." " Well, it don't matter." "The real question is, why didn't you kill me?" "Did you miss my heart on purpose?" "No." "I was aiming to kill." "That's the way I was taught." "Sometimes you don't hit the bull's-eye." "No, I suppose not." "But, you see, I have this belief, this conviction that it wasn't just an accident and that, I was wondering if the fact that we were friends, if that played any part." "Then last night I woke up, and I knew why you didn't kill me." "I was laying here in pain, in awful pain." "But I didn't hit the pump because I knew it wasn't just pain from a gunshot wound." "It was something deeper." "It was a pain from my very soul." "And I realized that, well, I couldn't any more blame you for my situation here than a farmer could blame his neighbor for a hailstorm." "A hailstorm being an act of God." "That's right, Raylan." "Me shooting you was an act of God?" "Well, God was acting through you, Raylan, through your gun, to get my attention, to set me on a new course." "Now, I know not yet what his will for me is, but I have faith." "I have faith that the path will be illuminated before me as I need it to be." "For even through this searing pain, I am at peace." "For I am born again in the eyes of the Lord, Raylan." "And I wanted to thank you for playing your part." "Now, if you will excuse me," "I must tend to the needs of the flesh." "You understand?" "Raylan?" "Did you come all the way out here just to see me?" "What do you think?" "Initial here, here, and here." "Stand up." "How come?" "We're gonna play pin-the-tail-on-the-donkey." "Just stand up." "Come through and stand on the feet." "You got your feet on backwards?" "Turn around." "Just checking you for visible injury." " All's I see is the nose." " Which I got when he hit me with a shotgun barrel for no good reason." " Is that how you remember it?" " You should thank him." "That nose's the only reason you got to spend two days here instead of going straight to Big Sandy." "Hey, careful with the teeth." "You got any more Marshals in the car?" " Task force is undermanned, just me." " Want to put him in leg irons?" "I think I can handle Mr. Crowe." "Marshals drive Lincolns now?" "Or is this confiscated?" "Yeah, I had a Town Car myself one time when I was down visiting Cousin Dale in Florida, till I sold it for parts and went to work at Disney's." "You know what I tried out for?" "To play Goofy..." "Mickey Mouse's friend." "Only, you had to water-ski." "I couldn't get the hang of that, so they put me selling ice cream." "But Disney's got a lot of Negroes and homosexuals working there," " so I came back home." " If you're gonna talk," "I'm gonna put you in the trunk, and I'll drive myself." "You grew up in Harlan, huh?" "I grew up in Corbin." "You ready for this?" "My dad has never been outside of Kentucky." "Whole life, never been closer to the border than Parisville, where he is now." "You know, we're gonna be going by there." "If we was to get off on Route 9, we could stop by and see him." "It wouldn't be more than a few miles out of our way." "What do you say to that?" "Not much, huh?" "Your old dad's never crossed the state lines, but he's been up to Manchester, hasn't he?" "He's seen the inside of the Kentucky State Prison." "You got an uncle who came out of there, and another did his time in McCreary." "I think we'll skip seeing any of your kin this trip." " My uncles are both dead." " By gunshot, huh?" "You understand how I see your people?" "Put one on your left wrist." "Now snap the other one to the wheel." "To the wheel, Chinatown." "Let's go." "I can't drive handcuffed to the damn steering wheel." "You'll get the hang of it." "Now drive." "You gonna report what I did?" "I don't take what you did personally, you understand?" "Want to lean on you." "Or wish you get any more time than you deserve." "But what you'll have to do now is ride the rap, as they say." "It's all anybody has to do." "Let's go." "Come on down, fellas." "All right." "Next." "Where the hell did they get these stupid costumes, anyway?" "Shit." "Well, this is an embarrassment." "Piss and moan all you please, Cooper." "This is what they want to see." ""Hey, Martha, look." "They're making fun of themselves."" "They eat that shit up." "All a part of what sells the CDs." "Of which we don't get one red cent." "Now, you want out, buddy, you just say the word." "We'll be out here, playing parties, eating good food, looking at pretty women." "You can be back at the tiers, making yourself another chess set out of cardboard, huh, Henry?" "I heard that." "And if they wanted suit and ties, we'd be wearing suit and ties." "All right." "Let's head on out." "Free Bird!" "Hell, these horses live better than most people I know." "Hey, Price, you're not eating?" "No, Henry." "You have at it." "Hey, Henry, I got to take a leak." "Coop's already in the Porta-Potty." "Use a tree." "Hell, Henry, now, that ain't civilized." "You're back on." "We're gonna start with the cake and Happy Birthday." "Price, let's go." "We got to get back out there." "Come on, Henry." "I really got to drain it." "Come on, Cooper!" "Let's go!" " Hey, Henry." "What do you want to do?" " You walk them out." " I'll bring these two." " All right." "Come on, Coop." "They want to do Happy Birthday now." "Coop!" "Stand over there." "Coop, open this door." " Open this door!" "Come on, Coop!" " Hey, Henry, watch this." " Hello, Art." " Where are you?" " Just heading back." " How far are you from the prison?" "Not far." "Just passed through Parisville." "Well, I want you to go back." "They had a breakout." " No shit." " There was a bluegrass convict band that was playing a birthday up near Parisville, and the bass player and the drummer decided to make a run for it, so I need you to go back up to Big Sandy and," "you know, check their cells, see what you can find." "I sent a couple of deputies up to Parisville." "And get this, the bass player was about to be released in 3 months after a 15-year stretch." "You got some names?" "They couldn't have gotten very far." "See what you can find out." " Evening." " Evening." "You..." "You need help with something?" "No, I'm just looking for some road food." "There's no way in hell you're gonna be able to draw and fire before your head comes off." " I could get him." " Fine with me." " What?" " Set your weapon down on the ground, please, sir." "And your backup." "Kick them back this way." "On your belly." "Hands on your neck." "See, I told you." "Turn the light on, we'll get us a car." " Got us some more guns, too." "Give me one." " Oh, no." " You're gonna run." " What?" "As far and as fast as you can, 'cause I swear to you, if I ever see you again, I'll kill you." "But we just busted out of the damn joint together." "You got five seconds." "What is this, a joke?" "Shit!" "All right." "You can sit up." "Wallet, ID, keys, hand them over." " What are you, state police?" " US Marshal." "Marshal?" "Like in Gunsmoke?" "More like The Fugitive." ""Deputy US Marshal Raylan..." ""Givens."" "I knew a fella up in Manchester named Givens, Arlo Givens." "Any relation?" "I suppose there's still some." "He's my father." "No shit." "And here you've become a US Marshal." " How'd that go down with him?" " I wouldn't know." "Now take your handcuffs out and cuff your hands behind your back." "So, you Cooper or Price?" "I'm one of them." "Fine." "I'll wait and find out tomorrow when your picture's in the paper." "My name is Douglas Cooper." "Glad to meet you." " You didn't care so much for Price, huh?" " Get on your feet." "What was he in for?" "His real crime?" "Being a lousy drummer." "He's not incompetent." "The man could play a paradiddle, but he's showy, has no sense of time." "How can you tell there's a bad drummer at your door?" " I don't know." "How?" " The knock speeds up." "Nice." "You a musician?" "No, just someone who likes music." "Yeah, and shitty jokes." "Come on." "Let's go." " And what were you in for, Mr. Cooper?" " I expect you know that already." "Fifteen years is a long time for one bank job." "Well, the thing is, a fella died as a direct result." "Foreseeable circumstances." "But, honestly, if you hire a moron for a driver, it's foreseeable." "You taking my badge and my car to get past any roadblocks, huh?" "And your hat." "Good night, deputy." "Good night, Mr. Cooper." "Well..." "Shit." "Come in." "Come in." "Now, let me get this straight." "He took your gun..." "Sorry, two guns." "Your badge, your car, and your hat." " He take anything else?" " Not that I can remember." "He didn't rape you, did he?" "We found your car at the airport, which means that Cooper either left town or he wants us to think that he left town." "We found this in the trunk." "That look familiar?" " You didn't find any guns, did you?" " No." "Sorry." "The dogs chased Price into a culvert, and then Rachel talked to him." "She and Tim can bring you up to speed." "All right." "Raylan, just a second." "Shut that door." "I got a call this morning from AUSA David Vasquez." "Wants to talk to you about your shooting Boyd Crowder." "Well, what's there to talk about?" "He pulled first." "There was a witness." "But, you see, 10 days ago, you shot a man in Miami." "Put it like this." "If you was in the first grade and you bit somebody every week, they'd start to think of you as a biter." "He also wants Ava to come up to Lexington to talk about it." " Well, fine with me." " Which part?" "The part about her talking to Vasquez or the part about her coming up to Lexington?" " Raylan, you can't sleep with her." " I know." " Raylan..." " I won't." "You starting to regret me coming here?" "Not yet." "Price says the only reason why he helped Cooper escape is because Cooper promised him a lot of money." "Which could be from his last job." "He got away with $180,000." "Never recovered." "Tell me about the dead driver." "He was a Mensa candidate named Drew Baxter." "A few hours after the robbery, Cooper and Baxter headed out of town." "Baxter's driving." "They get pulled over for a traffic violation." "Baxter decides to floor it." "Hilarious hijinks ensue." "Baxter drives head-on into a tree, goes through the windshield, and into the afterlife." "And it all fell under commission, so Cooper got charged with his murder." "So, why is he breaking out with only three months left on his bit?" "I mean, has he got a daughter getting married or a granddaughter graduating school?" "No kids, and his mother and father passed." "He was married when he went inside." "Younger woman, one-time exotic dancer, named Shirley Kelso." "Didn't divorce until five years ago." "Still lives in town." "I thought I'd go have a word." "I'm gonna take a team and check acquaintances." "I'm gonna go with him." "Nothing against acquaintances, but one-time-exotic-dancer Shirley sounds a little more fun." "What the hell did you say to him?" "I'll catch up with you at the car." " Hello, Winona." " What did you say to Gary?" "I believe I said, "Hi, Gary."" " Why?" "Why did he say I said?" " He didn't." "Just he didn't sleep the rest of that night, and the next morning, he was still shaking." "And every night since then, he checks the windows, and he checks the doors, and then he checks them again." "I don't know." "Winona, does Gary spook easy?" "What are you implying?" "You wouldn't be startled if somebody broke into your home in the middle of the night?" "I'm not implying anything." "I heard you got jumped by an old convict." "Does 55 still seem old to you?" "Are you gonna shoot him if you catch him?" "All right, look, I won't show up unannounced anymore." "You won't show up at all anymore." "Art tells me you were a sniper with the Rangers." "Yeah, I was." "What's the longest you ever had to watch a target?" "Three days." "Shitty little village outside Kandahar." "You watch a man that long, you can get to know him better than his wife does." "How he reads the paper, picks his nose, what glass he likes for tea, what one for milk..." "If he jerks off, what he looks at when he does." "If he's nice to the dog when no one's around." "What's the trick to something like that?" "Keeping your focus?" "Well, they told us to come up with stories about ourselves and the target." " What do you mean, "stories"?" " Well, nothing elaborate." "Imagine taking Shirley to the movies, watching Price is Right, eating takeout Chinese." "They eventually stopped that, the business with the stories." "Why is that?" "They found some folks get so involved in the tales they're telling themselves, they grow to like the target." "And when they got the green light, they couldn't pull." "That ever happen to you?" " Is that her?" " Looks like it." "US Marshals." "Shirley Kelso?" "You think he's here?" "You're welcome to look around." "Who's this?" "They're with the Marshals." "I'm guessing they're looking for my ex." "My cousin Dupree." "He's staying with me till he gets on his feet in construction." " Y'all want a beer or something?" " Yeah, love one." " Pabst, Schlitz, Mickey's..." " It was a joke." " We can't have a beer." " Well, I don't want your job, then, do I?" "Either of you seen or heard from Douglas Cooper?" "You mean since he broke out or since ever?" "Since last night." "No, and I swear to you, you give me a card or a number and he turns up, you'll be the first person I call." "Marrying him was the biggest mistake of my life." "You stayed married to him till five years ago." "There were tax advantages." "Any idea why he'd bust out with just a few months left on his bit?" "None at all." "I mean, you ask me, he's long gone." "I mean, there is nothing for him here." "When's the last time you saw him?" "Before the divorce, yeah." "What do you think?" "Sure made a big deal about running down her ex-husband." "Of course, that might have been for Dupree's benefit." "You don't think they're cousins?" "Maybe, maybe not." "Either way, she's banging him." "That's got to suck." "To break out of prison, expecting a blissful marital reunion." "I got to think, no matter how long you've been divorced, seeing your old lady shack up with someone else is gonna annoy the shit out of you." "If Cooper does show up, you sure as hell won't call the number on that Marshal's card." "Oh, yeah?" "Well, Coop might not be so happy to see us, you know?" "Who gives a shit?" "He's the only one who knows which house to go into." "It doesn't matter." "I hope he shows up." "I'm glad you feel that way." "Sit down." "Take a seat right there." "How'd you pick the houses?" "I saw reports on the TV in prison about somebody breaking into houses in Riverbrook, tearing up the floors." "Now, I know you haven't found the money yet." "I knew that the minute I saw this shit hole." "How did you pick the houses?" "You told me you hid the money in a house under construction in a development, and I just figured out it had to be Riverbrook." "Picked the houses at random?" "Well, you always said your lucky number was 3-2-3, so we went for houses with 3-2-3 in the address." "Y'all sleeping together?" "We're cousins!" "Well, from all the lotions, condoms, and devices I saw sitting on your nightstand, it's clear you're sleeping with somebody." "Well, it ain't like we're first cousins or anything." "There's no need to hide it from him." "He already knows." "There was one device, kind of a vibrating thing with ball bearings going all around, making it wobble all over." "That's Randy Rabbit." "It's our best seller." "If I'd known you wanted something like that, I'd have got it for you back in the day." "I was 22 when you went in." "You were the first man I ever slept with." "I didn't know what I wanted." "Hey, we can all have a real interesting conversation later about the merits of various sex toys, but right now, maybe we ought to focus on how we're gonna get you out from under the eyes of that Marshal." "And what's all this "we" shit?" "I'm just here to make sure you hadn't already found the money." "Yeah, but we can help." "We got tools." "We got pry bar, a Sawzall." "Fine." "I'll take 'em." "How you gonna get out?" "You know they got Marshals watching." "I'll wait till after dark, and I'll sneak out back." "You're gonna walk to Riverbrook?" "I got a car." "I'll steal one." "You know, you just leave us, what's gonna stop us from just calling the Marshal?" "Good point." "Maybe I'll just kill you." "I'm not gonna kill you." "And you aren't gonna call that Marshal and get sent away for all them burglaries you've done." " You know how to bypass burglar alarms?" " I do." "Burglar alarms that have come along in the last 15 years?" "Fiber optics, net-based?" "I was an alarm installer before." "How do you think we got in and out of all those houses without getting caught?" "All right." "You're in." " All right." " 10%." " Shirley, too." "We're a team." " Fine." "But you share the 10%." "Now, why don't you run out on the porch and sit down for a spell and keep an eye on that Marshal." "Cousin Dupree?" "Yeah, I'll do that." "I know you must be angry, but I swear I kept my knees together for 10 years after you went in." "Finally, I realized I had to live." "Baby, I understand that." "Frankly, I'm surprised you hadn't gone after my money before now." "Well, we only went after it now 'cause we had to." "Folks in Riverbrook, they've been remodeling instead of selling 'cause of the downturn, and we just didn't want someone to stumble on it." "That's all." " That was the reason, huh?" " Yeah." "Nothing to do with me getting out in three months." "I told Dupree about it a couple months ago, and he knows alarms and all, and he just thought we should try it." "You know, Dupree has ambitions, plans." " For what, a chain of dildo stores?" " Not just dildos." "Ava." "I told the manager I was your girlfriend." "I'm not being presumptuous and saying that I am." "I just wanted to surprise you." "And you did." "I can't sleep with you, Ava." "Now look who's being presumptuous." "I know about the assistant attorney who wants to talk to you." "I can't be getting amorous with a witness in a shooting I was involved in." " Couldn't we just make out a little?" " No." "You want me to drive back to Harlan?" "You can stay." "I could always sleep on the floor." "Well, it's your bed." "I'll take the floor." "Can we just put on a little music and dance?" "Do you know why the Pentecostals don't have sex standing up?" "It could lead to dancing." "People talk about cars having a new-car smell." "This car has an "old car somebody died in" smell." " You had a car somebody died in." " You mean Baxter?" "Technically, he died outside the car, when he hit the tree." "No, I'm not talking about Baxter." "I'm talking about the red car." "My Lord." "That '71 Valiant." "I called it the Rocket." "The Rocket." "That's right." "He told me he got it cheap 'cause the old guy who owned it died in it and no one wants to buy a dead man's car." "And I kept joking maybe it was haunted." "And then we went for a drive in the country, you know, windows down, breathing in the night air." "And all of a sudden I hear this moaning sound, this..." "You know, like a ghost." "And I about shit a brick." "And this one can't stop laughing." "And then he shows me a tape recorder under the seat playing him sounding like a ghost." "Can you believe that?" "Y'all want to keep jawing about the old days, or y'all want stay on the money train?" "What address are you looking for?" "I'm not." "When I stashed the money, these houses were still being built." "They didn't have addresses." "Then what are you looking for?" "You were onto something with my lucky number, 3-2-3." "But it's not in the address." "Are you gonna tell us or not?" "All right." "The first thing they built out here was that school we passed back yonder." "Now, that was my starting point." "I took the third right and the second left, and the third house on the right, 3-2-3." "Which puts it right here." "No burglar alarm." "Apparently, I didn't need your help after all." "About as much as we needed your car-stealing skills." "Well, I stole one." "Could have rented one faster, and it wouldn't have smelled like a grave." " Keep it up, and your 10% is gonna be 5%." " Whatever you say, old man." "You guys want to argue, or you want to find some money?" "Come on, Martha Stewart." "Just drop that." " Here we go." "Right here." " I'm coming." "Maybe you counted wrong." "I counted right." "Maybe you counted wrong 15 years ago." "I didn't count wrong, not then, not now." "The only possibilities are some other folks found the money and are long gone or that school got up and moved somehow." " Now, which do you think is more likely?" " Let me get this straight." "After all this time, you don't have any idea where that money is?" " No, I guess I don't." " Well," "I guess we don't really need you then, after all, do we?" "Come on." "Let's go." "I'm sorry." "You were gone so long, I just couldn't wait." "I'm sorry." "You look good, Coop." "Come on!" "We've got some shit to do." " Do you know where the money is?" " Well, I do now." "Where are you going?" "I ain't getting in that shit heap again." "We get the money, we'll take ourselves another car." "Ain't nobody gonna stop us." "Now, come on." " Raylan?" " I think I know where Cooper's money is." "Come on, baby." "We're gonna get that money, I'm gonna buy you anything you want." "Shit." "Got to ask." "Why the hat?" "Honestly," "I tried it on one time, and it fit." "Oh, shit!" "You don't do exactly as I say, you're gonna get two in the chest and one in the head!" "You boosted a Gremlin?" "Oh, hell, with all the alarms and stuff they got on cars these days, that's all I could get." "I tried to get a Mustang." "So, what happened?" "They take the money and run?" "No." "There wasn't any." "Well, why'd they shoot you?" "I don't know." "I don't care." "I thought I broke out 'cause of the money, but then I saw Shirley." "Well, maybe Dupree figured out where the money is." "Well, I don't see how." "I told him either the money was here and somebody found it and took off or that school up and moved." "Yeah, I knew where the money was in relation to the school." "Which one?" "We passed two driving around." "Oh, shit." "Fifteen years is a long time." "I told you we shouldn't have taken the money." " You enjoyed it just as much as I did." " Shut up!" " How'd you find it?" " Well," "Mr. "I'm too cheap to hire a plumber" tried to put in a new dishwasher and flooded the entire place, and then we had to replace the floor." "Oh, yeah, I'm an idiot." "But if it wasn't for me, we never would have found the money." "And we wouldn't be sitting here now!" "Where was all your second-guessing when you got your new boobs?" "You enjoyed them a hell of a lot more than I ever did!" "They're very nice." " Thank you." " Shut up!" "Now, I want what's left of the money right now, or I start shooting." " There is none." " I'll start with you." "No!" "No!" "He's telling the truth." "After the boat and the car and my boobs and the TVs, it's all gone." "Man." "He's got them tied to chairs." "We take the back." "Rachel and Raylan, you take the front." " You got a story for Cousin Dupree?" " Yeah." "But it's pretty simple." "If he does anything out of line, I get to shoot him." "That's a good story." " How much those shoes run you?" " Seven hundred." "$700 for a pair of shoes?" "They're alligator." "Got your alligator's attention?" "We'll get you every last cent we have!" "Just please don't shoot anymore!" "My foot!" "Shirley, untie the woman." "She might could take us to the bank." "Okay." "No." "Shit." "Stop." "The banks ain't open this hour." "Shit!" "Let me think." "US Marshals." "I was wondering if I could come inside." "No, you can't come inside!" "Dupree, this isn't your home." "Mr. Lonner, may I come inside?" "God, yes!" "Come inside!" "Hey, you ain't calling the shots here." "Just coming inside to explain things to you." " There ain't nothing to explain." " Ten seconds." "Huh?" "Dupree, can you just keep your gun down for 10 seconds?" "I can tell you both what's what." "You can see my hands." "All right?" " All right." " All right." "You mind standing where I can see you?" "Now I'm gonna give you a choice." "You won't like it, but it's real simple." "If you raise your gun again, you're dead." "Aim at the family, you're dead." "If you move too fast from where you're standing, dead." "In fact, I'd say dropping your weapons and putting your hands behind your head's the only viable option, but that's your choice." " Well, we got guns and hostages here." " I see that." "Do you really think you can draw and fire before one of us pulls the trigger?" "This ain't about me." "This is about Deputy Tim Gutterson, sniper in the Afghan War." "Well, I don't see him." "You got a little sniper in your pocket?" "Well, he's out back, across the street there." "He bullshitting?" "Well," "I see cars and people." "I don't see a sniper." "No, no, no, no." "He's there, or I wouldn't be here." "Where's the light switch for this room?" "Now, Dupree, I know that wasn't on the list, but..." "Where's the goddamn light switch?" " On the wall, by your friend." " Shirley, find that switch." " Shirley..." " On the count of three, flip the switch." " Shirley, don't do it." " One, two, three!" "Why'd you turn the light back on?" "He had no need to shoot my husband." "Initial here, here, and here." "Going solo again?" "Another deputy in the car." " Learned your lesson?" " Until I forget." "Stand up, walk through." "Put your feet on the feet." "You know the drill." " How's the gut?" " Well, they tell me my plumbing's okay, but every which way I move hurts." "I think we're good." "Did you find the money?" "The couple in the house found it." "They enjoy it?" "They bought a lot of stuff." " Have you seen Shirley?" " I'm sorry, I haven't." "I know she's in custody." "But she helped you guys nail Dupree, right?" "That ought to count for something." "She's still gonna pull some time." "Maybe we'll get out about the same time." "Maybe." "Maybe." "Man." "She looked good."
Biologically active metabolite of vitamin D3 from bone, liver, and blood serum. Radioactive metabolites present in bone, blood, liver, and feces of rats given (3)H vitamin D(3) have been isolated. Of these the aqueous soluble metabolite(s) from tissue and all those isolated from feces did not cure rickets in rats, while all the others were at least partially active in this regard. One of the metabolites proved to be as active as the parent vitamin in curing rickets and was found in large amounts in liver, blood, and bone. As much as 50-80% of the radioactivity in bone was found in this metabolite after a 500 IU oral dose of (3)H vitamin D(3). With 10 IU doses of 1,2-(3)H vitamin D(3), most of the radioactivity of the organs examined was found in this metabolite fraction. This metabolite appears to be more polar than vitamin D and is not an esterified form of the vitamin nor a complex of the vitamin with tissue lipids. Its possible role as the metabolically active form of the vitamin is discussed.
Brian Mieres Brian Luis Mieres (born 28 July 1995) is an Argentine professional footballer who plays as a defender for Chacarita Juniors. Career Mieres played for various youth clubs, having spells with Pumitas, Pamperito, AFIL and Panificaciones before joining San Lorenzo in 2008. In 2016, he was moved into the club's senior squad for an Argentine Primera División match with Arsenal de Sarandí on 12 March but was an unused sub. He made his debut on 19 April during a home draw against L.D.U. Quito in the Copa Libertadores, playing seventy-five minutes before being substituted for Facundo Quignon. On 6 August 2017, Primera B Nacional's Almagro loaned Mieres. In his fourteenth appearance he scored his first career goal versus Los Andes on 11 February 2018. In July 2018, Mitre became Mieres' third career club. Career statistics . References External links Category:1995 births Category:Living people Category:People from Paso de los Libres Category:Argentine footballers Category:Association football defenders Category:Argentine Primera División players Category:Primera B Nacional players Category:San Lorenzo footballers Category:Almagro footballers Category:Club Atlético Mitre footballers Category:Chacarita Juniors footballers
Zanzibar Stone Town Heritage Society (ZSTHS) Posted on November 26, 2018 Zanzibar Stone Town Heritage Society (ZSTHS) is a non-governmental Organization registered in Zanzibar in July, 2002. The main activity of the Organization is to preserve and conserve the Zanzibar Stone Town, which is a world heritage site, approved by UNESCO. The Organization has over 200 members, gaining both recognition and respect locally with government institutions and by International Organization with whom we are partnering. Since 2014 ZSTHS has been partnering with Fondazione ACRA, an Italian non-government organization. We together are working in preserving Stone Town heritages for future generations, aiming at contributing to the economic growth through the preservation and promotion of the Cultural Heritage in Zanzibar, by disseminating the understanding of preservation issues by using the remarkable traditional craft skills, fostering the knowledge of history, culture and promoting tourism sector on awareness about Stone Town as a World Heritage Site. That is where, we, as ZSTHS and ACRA, join efforts, in implementing an integrated approach for the preservation and promotion of the Stone Town Heritage. Therefore, we are mainly working in 4 areas: 1. Enhance skills and competences of workers and specialized operators on restoration and conservation; 2. Advocacy with local authorities and construction sector; 3. Improve skills of tourism operators and tourist guides on the promotion of Stone Town as a World Heritage Site; 4. Increase awareness among local population. Among different activities; every year, we organize the commemoration of World Heritage Day, which is celebrated globally on 18th April, with the support and participation of Zanzibar Government and Local Authorities. In this regard, when the tourists arrive for the first time in Stone Town, they can easily immerse themselves in a fantasy trip where princesses, slaves, spices, ivory, missionaries, explorers and sultans originated from Oman Empire were present in Zanzibar as taking efforts to build Zanzibar since 18th Century, as a historic Island in the Indian Ocean and so forth. “Zanzibar Built Heritage Job Creation” is a project funded by the European Union (EU), implemented by Fondazione ACRA and Zanzibar Stone Town Heritage Society (ZSTHS) in association with Stone Town Conservation, Development Authority (STCDA) and Karume Institute of Science and Technology (KIST) since July 2014. Among different activities, this project has trained more than 400 carpenters and masons in conservation. In addition more than 90 students have been trained at the Karume Institute of Science and Technology in carpentry and masonry in Conservation. In order to guarantee the long term sustainability of the Action, trained masons and carpenters will be supported in the access to the labour market, through the constitution of the “Conservation Youth Brigade”. Conservation Youth Brigade is a professional association that will provide service to the trained craftsmen and students with additional skill in conservation. This association will act as a training and job placement agency linking and exposing the group of trained youth who are currently facing difficulties to access jobs in the market to construction companies and building owners who play a very big role in the industry.
Diffuse fatal pulmonary microembolism of retroperitoneal extravascular origin. A 34-year-old woman who had type I diabetes mellitus for 22 years and chronic renal failure for 2 years underwent a combined kidney and pancreas transplantation. Her uremia and insulin-dependence disappeared thereafter. However, she suddenly developed acute respiratory distress and died 22 days after the surgery. Diffuse pulmonary microemboli composed of necrotic tissue debris, fat cells, and muscle fragments were found. The source of the emboli was apparently a localized liquefying hematoma with necrotic muscle and fat in the left retroperitoneal space. Although such an occurrence seems to be extremely rare, the present case demonstrates that a liquefying hematoma with necrotic tissue in a confined space may indeed give rise to fatal pulmonary microembolism.
/* Fraise version 3.7 - Based on Smultron by Peter Borg Written by Jean-François Moy - jeanfrancois.moy@gmail.com Find the latest version at http://github.com/jfmoy/Fraise Copyright 2010 Jean-François Moy Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ #import "FRAStandardHeader.h" #import "FRATextView.h" #import "FRALayoutManager.h" #import "FRATextMenuController.h" #import "FRAProjectsController.h" #import "FRABasicPerformer.h" #import "FRAToolsMenuController.h" #import "FRAFileMenuController.h" #import "FRALineNumbers.h" @implementation FRATextView @synthesize colouredIBeamCursor, inCompleteMethod; - (id)initWithFrame:(NSRect)frame { if (self = [super initWithFrame:frame]) { FRALayoutManager *layoutManager = [[FRALayoutManager alloc] init]; [[self textContainer] replaceLayoutManager:layoutManager]; [self setDefaults]; } return self; } - (void)setDefaults { inCompleteMethod = NO; [self setTabWidth]; [self setVerticallyResizable:YES]; [self setMaxSize:NSMakeSize(CGFLOAT_MAX, CGFLOAT_MAX)]; [self setAutoresizingMask:NSViewWidthSizable]; [self setAllowsUndo:YES]; [self setUsesFindPanel:YES]; [self setAllowsDocumentBackgroundColorChange:NO]; [self setRichText:NO]; [self setImportsGraphics:NO]; [self setUsesFontPanel:NO]; [self setContinuousSpellCheckingEnabled:[[FRADefaults valueForKey:@"AutoSpellCheck"] boolValue]]; [self setGrammarCheckingEnabled:[[FRADefaults valueForKey:@"AutoGrammarCheck"] boolValue]]; [self setSmartInsertDeleteEnabled:[[FRADefaults valueForKey:@"SmartInsertDelete"] boolValue]]; [self setAutomaticLinkDetectionEnabled:[[FRADefaults valueForKey:@"AutomaticLinkDetection"] boolValue]]; [self setAutomaticQuoteSubstitutionEnabled:[[FRADefaults valueForKey:@"AutomaticQuoteSubstitution"] boolValue]]; [self setFont:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextFont"]]]; [self setTextColor:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextColourWell"]]]; [self setInsertionPointColor:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextColourWell"]]]; [self setBackgroundColor:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"BackgroundColourWell"]]]; [self setAutomaticDataDetectionEnabled:YES]; [self setAutomaticTextReplacementEnabled:YES]; [self setPageGuideValues]; [self updateIBeamCursor]; NSTrackingArea *trackingArea = [[NSTrackingArea alloc] initWithRect:[self frame] options:(NSTrackingMouseEnteredAndExited | NSTrackingActiveWhenFirstResponder) owner:self userInfo:nil]; [self addTrackingArea:trackingArea]; NSUserDefaultsController *defaultsController = [NSUserDefaultsController sharedUserDefaultsController]; [defaultsController addObserver:self forKeyPath:@"values.TextFont" options:NSKeyValueObservingOptionNew context:@"TextFontChanged"]; [defaultsController addObserver:self forKeyPath:@"values.TextColourWell" options:NSKeyValueObservingOptionNew context:@"TextColourChanged"]; [defaultsController addObserver:self forKeyPath:@"values.BackgroundColourWell" options:NSKeyValueObservingOptionNew context:@"BackgroundColourChanged"]; [defaultsController addObserver:self forKeyPath:@"values.SmartInsertDelete" options:NSKeyValueObservingOptionNew context:@"SmartInsertDeleteChanged"]; [defaultsController addObserver:self forKeyPath:@"values.TabWidth" options:NSKeyValueObservingOptionNew context:@"TabWidthChanged"]; [defaultsController addObserver:self forKeyPath:@"values.ShowPageGuide" options:NSKeyValueObservingOptionNew context:@"PageGuideChanged"]; [defaultsController addObserver:self forKeyPath:@"values.ShowPageGuideAtColumn" options:NSKeyValueObservingOptionNew context:@"PageGuideChanged"]; [defaultsController addObserver:self forKeyPath:@"values.SmartInsertDelete" options:NSKeyValueObservingOptionNew context:@"SmartInsertDeleteChanged"]; lineHeight = [[[self textContainer] layoutManager] defaultLineHeightForFont:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextFont"]]]; } - (void)observeValueForKeyPath:(NSString *)keyPath ofObject:(id)object change:(NSDictionary *)change context:(void *)context { if ([(NSString *)context isEqualToString:@"TextFontChanged"]) { [self setFont:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextFont"]]]; lineHeight = [[[self textContainer] layoutManager] defaultLineHeightForFont:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextFont"]]]; [[FRACurrentDocument valueForKey:@"lineNumbers"] updateLineNumbersForClipView:[[self enclosingScrollView] contentView] checkWidth:NO recolour:YES]; [self setPageGuideValues]; } else if ([(NSString *)context isEqualToString:@"TextColourChanged"]) { [self setTextColor:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextColourWell"]]]; [self setInsertionPointColor:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextColourWell"]]]; [self setPageGuideValues]; [self updateIBeamCursor]; } else if ([(NSString *)context isEqualToString:@"BackgroundColourChanged"]) { [self setBackgroundColor:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"BackgroundColourWell"]]]; } else if ([(NSString *)context isEqualToString:@"SmartInsertDeleteChanged"]) { [self setSmartInsertDeleteEnabled:[[FRADefaults valueForKey:@"SmartInsertDelete"] boolValue]]; } else if ([(NSString *)context isEqualToString:@"TabWidthChanged"]) { [self setTabWidth]; } else if ([(NSString *)context isEqualToString:@"PageGuideChanged"]) { [self setPageGuideValues]; } else if ([(NSString *)context isEqualToString:@"SmartInsertDeleteChanged"]) { [self setSmartInsertDeleteEnabled:[[FRADefaults valueForKey:@"SmartInsertDelete"] boolValue]]; } else { [super observeValueForKeyPath:keyPath ofObject:object change:change context:context]; } } - (void)insertNewline:(id)sender { [super insertNewline:sender]; // If we should indent automatically, check the previous line and scan all the whitespace at the beginning of the line into a string and insert that string into the new line NSString *lastLineString = [[self string] substringWithRange:[[self string] lineRangeForRange:NSMakeRange([self selectedRange].location - 1, 0)]]; if ([[FRADefaults valueForKey:@"IndentNewLinesAutomatically"] boolValue] == YES) { NSString *previousLineWhitespaceString; NSScanner *previousLineScanner = [[NSScanner alloc] initWithString:[[self string] substringWithRange:[[self string] lineRangeForRange:NSMakeRange([self selectedRange].location - 1, 0)]]]; [previousLineScanner setCharactersToBeSkipped:nil]; if ([previousLineScanner scanCharactersFromSet:[NSCharacterSet whitespaceCharacterSet] intoString:&previousLineWhitespaceString]) { [self insertText:previousLineWhitespaceString]; } if ([[FRADefaults valueForKey:@"AutomaticallyIndentBraces"] boolValue] == YES) { NSCharacterSet *characterSet = [NSCharacterSet whitespaceAndNewlineCharacterSet]; NSInteger index = [lastLineString length]; while (index--) { if ([characterSet characterIsMember:[lastLineString characterAtIndex:index]]) { continue; } if ([lastLineString characterAtIndex:index] == '{') { [self insertTab:nil]; } break; } } } } - (NSRange)selectionRangeForProposedRange:(NSRange)proposedSelRange granularity:(NSSelectionGranularity)granularity { if (granularity != NSSelectByWord || [[self string] length] == proposedSelRange.location || [[NSApp currentEvent] clickCount] != 2) { // If it's not a double-click return unchanged return [super selectionRangeForProposedRange:proposedSelRange granularity:granularity]; } NSInteger location = [super selectionRangeForProposedRange:proposedSelRange granularity:NSSelectByCharacter].location; NSInteger originalLocation = location; NSString *completeString = [self string]; unichar characterToCheck = [completeString characterAtIndex:location]; NSInteger skipMatchingBrace = 0; NSInteger lengthOfString = [completeString length]; if (lengthOfString == proposedSelRange.location) { // To avoid crash if a double-click occurs after any text return [super selectionRangeForProposedRange:proposedSelRange granularity:granularity]; } BOOL triedToMatchBrace = NO; if (characterToCheck == ')') { triedToMatchBrace = YES; while (location--) { characterToCheck = [completeString characterAtIndex:location]; if (characterToCheck == '(') { if (!skipMatchingBrace) { return NSMakeRange(location, originalLocation - location + 1); } else { skipMatchingBrace--; } } else if (characterToCheck == ')') { skipMatchingBrace++; } } NSBeep(); } else if (characterToCheck == '}') { triedToMatchBrace = YES; while (location--) { characterToCheck = [completeString characterAtIndex:location]; if (characterToCheck == '{') { if (!skipMatchingBrace) { return NSMakeRange(location, originalLocation - location + 1); } else { skipMatchingBrace--; } } else if (characterToCheck == '}') { skipMatchingBrace++; } } NSBeep(); } else if (characterToCheck == ']') { triedToMatchBrace = YES; while (location--) { characterToCheck = [completeString characterAtIndex:location]; if (characterToCheck == '[') { if (!skipMatchingBrace) { return NSMakeRange(location, originalLocation - location + 1); } else { skipMatchingBrace--; } } else if (characterToCheck == ']') { skipMatchingBrace++; } } NSBeep(); } else if (characterToCheck == '>') { triedToMatchBrace = YES; while (location--) { characterToCheck = [completeString characterAtIndex:location]; if (characterToCheck == '<') { if (!skipMatchingBrace) { return NSMakeRange(location, originalLocation - location + 1); } else { skipMatchingBrace--; } } else if (characterToCheck == '>') { skipMatchingBrace++; } } NSBeep(); } else if (characterToCheck == '(') { triedToMatchBrace = YES; while (++location < lengthOfString) { characterToCheck = [completeString characterAtIndex:location]; if (characterToCheck == ')') { if (!skipMatchingBrace) { return NSMakeRange(originalLocation, location - originalLocation + 1); } else { skipMatchingBrace--; } } else if (characterToCheck == '(') { skipMatchingBrace++; } } NSBeep(); } else if (characterToCheck == '{') { triedToMatchBrace = YES; while (++location < lengthOfString) { characterToCheck = [completeString characterAtIndex:location]; if (characterToCheck == '}') { if (!skipMatchingBrace) { return NSMakeRange(originalLocation, location - originalLocation + 1); } else { skipMatchingBrace--; } } else if (characterToCheck == '{') { skipMatchingBrace++; } } NSBeep(); } else if (characterToCheck == '[') { triedToMatchBrace = YES; while (++location < lengthOfString) { characterToCheck = [completeString characterAtIndex:location]; if (characterToCheck == ']') { if (!skipMatchingBrace) { return NSMakeRange(originalLocation, location - originalLocation + 1); } else { skipMatchingBrace--; } } else if (characterToCheck == '[') { skipMatchingBrace++; } } NSBeep(); } else if (characterToCheck == '<') { triedToMatchBrace = YES; while (++location < lengthOfString) { characterToCheck = [completeString characterAtIndex:location]; if (characterToCheck == '>') { if (!skipMatchingBrace) { return NSMakeRange(originalLocation, location - originalLocation + 1); } else { skipMatchingBrace--; } } else if (characterToCheck == '<') { skipMatchingBrace++; } } NSBeep(); } // If it has a found a "starting" brace but not found a match, a double-click should only select the "starting" brace and not what it usually would select at a double-click if (triedToMatchBrace) { return [super selectionRangeForProposedRange:NSMakeRange(proposedSelRange.location, 1) granularity:NSSelectByCharacter]; } else { NSInteger startLocation = originalLocation; NSInteger stopLocation = originalLocation; NSInteger minLocation = [super selectionRangeForProposedRange:proposedSelRange granularity:NSSelectByWord].location; NSInteger maxLocation = NSMaxRange([super selectionRangeForProposedRange:proposedSelRange granularity:NSSelectByWord]); BOOL hasFoundSomething = NO; while (--startLocation >= minLocation) { if ([completeString characterAtIndex:startLocation] == '.' || [completeString characterAtIndex:startLocation] == ':') { hasFoundSomething = YES; break; } } while (++stopLocation < maxLocation) { if ([completeString characterAtIndex:stopLocation] == '.' || [completeString characterAtIndex:stopLocation] == ':') { hasFoundSomething = YES; break; } } if (hasFoundSomething == YES) { return NSMakeRange(startLocation + 1, stopLocation - startLocation - 1); } else { return [super selectionRangeForProposedRange:proposedSelRange granularity:granularity]; } } } -(BOOL)isOpaque { return YES; } - (void)insertTab:(id)sender { BOOL shouldShiftText = NO; if ([self selectedRange].length > 0) { // Check to see if the selection is in the text or if it's at the beginning of a line or in whitespace; if one doesn't do this one shifts the line if there's only one suggestion in the auto-complete NSRange rangeOfFirstLine = [[self string] lineRangeForRange:NSMakeRange([self selectedRange].location, 0)]; NSInteger firstCharacterOfFirstLine = rangeOfFirstLine.location; while ([[self string] characterAtIndex:firstCharacterOfFirstLine] == ' ' || [[self string] characterAtIndex:firstCharacterOfFirstLine] == '\t') { firstCharacterOfFirstLine++; } if ([self selectedRange].location <= firstCharacterOfFirstLine) { shouldShiftText = YES; } } if (shouldShiftText) { [[FRATextMenuController sharedInstance] shiftRightAction:nil]; } else if ([[FRADefaults valueForKey:@"IndentWithSpaces"] boolValue] == YES) { NSMutableString *spacesString = [NSMutableString string]; NSInteger numberOfSpacesPerTab = [[FRADefaults valueForKey:@"TabWidth"] integerValue]; if ([[FRADefaults valueForKey:@"UseTabStops"] boolValue] == YES) { NSInteger locationOnLine = [self selectedRange].location - [[self string] lineRangeForRange:[self selectedRange]].location; if (numberOfSpacesPerTab != 0) { NSInteger numberOfSpacesLess = locationOnLine % numberOfSpacesPerTab; numberOfSpacesPerTab = numberOfSpacesPerTab - numberOfSpacesLess; } } while (numberOfSpacesPerTab--) { [spacesString appendString:@" "]; } [self insertText:spacesString]; } else if ([self selectedRange].length > 0) { // If there's only one word matching in auto-complete there's no list but just the rest of the word inserted and selected; and if you do a normal tab then the text is removed so this will put the cursor at the end of that word [self setSelectedRange:NSMakeRange(NSMaxRange([self selectedRange]), 0)]; } else { [super insertTab:sender]; } } - (void)mouseDown:(NSEvent *)theEvent { if (([theEvent modifierFlags] & NSAlternateKeyMask) && ([theEvent modifierFlags] & NSCommandKeyMask)) { // If the option and command keys are pressed, change the cursor to grab-cursor startPoint = [theEvent locationInWindow]; startOrigin = [[[self enclosingScrollView] contentView] documentVisibleRect].origin; [[self enclosingScrollView] setDocumentCursor:[NSCursor openHandCursor]]; } else { [super mouseDown:theEvent]; } } - (void)mouseDragged:(NSEvent *)theEvent { if ([[NSCursor currentCursor] isEqual:[NSCursor openHandCursor]]) { [self scrollPoint:NSMakePoint(startOrigin.x - ([theEvent locationInWindow].x - startPoint.x) * 3, startOrigin.y + ([theEvent locationInWindow].y - startPoint.y) * 3)]; } else { [super mouseDragged:theEvent]; } } - (void)mouseUp:(NSEvent *)theEvent { [[self enclosingScrollView] setDocumentCursor:[NSCursor IBeamCursor]]; } - (NSInteger)lineHeight { return lineHeight; } - (void)setTabWidth { // Set the width of every tab by first checking the size of the tab in spaces in the current font and then remove all tabs that sets automatically and then set the default tab stop distance NSMutableString *sizeString = [NSMutableString string]; NSInteger numberOfSpaces = [[FRADefaults valueForKey:@"TabWidth"] integerValue]; while (numberOfSpaces--) { [sizeString appendString:@" "]; } NSDictionary *sizeAttribute = [[NSDictionary alloc] initWithObjectsAndKeys:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextFont"]], NSFontAttributeName, nil]; CGFloat sizeOfTab = [sizeString sizeWithAttributes:sizeAttribute].width; NSMutableParagraphStyle *style = [[NSParagraphStyle defaultParagraphStyle] mutableCopy]; NSArray *array = [style tabStops]; for (id item in array) { [style removeTabStop:item]; } [style setDefaultTabInterval:sizeOfTab]; NSDictionary *attributes = [[NSDictionary alloc] initWithObjectsAndKeys:style, NSParagraphStyleAttributeName, nil]; [self setTypingAttributes:attributes]; } - (void)drawRect:(NSRect)rect { [super drawRect:rect]; if (showPageGuide == YES) { NSRect bounds = [self bounds]; if ([self needsToDrawRect:NSMakeRect(pageGuideX, 0, 1, bounds.size.height)] == YES) { // So that it doesn't draw the line if only e.g. the cursor updates [pageGuideColour set]; [NSBezierPath strokeRect:NSMakeRect(pageGuideX, 0, 0, bounds.size.height)]; } } } - (void)setPageGuideValues { NSDictionary *sizeAttribute = [[NSDictionary alloc] initWithObjectsAndKeys:[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextFont"]], NSFontAttributeName, nil]; NSString *sizeString = [NSString stringWithString:@" "]; CGFloat sizeOfCharacter = [sizeString sizeWithAttributes:sizeAttribute].width; pageGuideX = (sizeOfCharacter * ([[FRADefaults valueForKey:@"ShowPageGuideAtColumn"] integerValue] + 1)) - 1.5; // -1.5 to put it between the two characters and draw only on one pixel and not two (as the system draws it in a special way), and that's also why the width above is set to zero NSColor *color = [NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextColourWell"]]; pageGuideColour = [color colorWithAlphaComponent:([color alphaComponent] / 4)]; // Use the same colour as the text but with more transparency showPageGuide = [[FRADefaults valueForKey:@"ShowPageGuide"] boolValue]; [self display]; // To reflect the new values in the view } - (void)insertText:(NSString *)aString { if ([aString isEqualToString:@"}"] && [[FRADefaults valueForKey:@"IndentNewLinesAutomatically"] boolValue] == YES && [[FRADefaults valueForKey:@"AutomaticallyIndentBraces"] boolValue] == YES) { unichar characterToCheck; NSInteger location = [self selectedRange].location; NSString *completeString = [self string]; NSCharacterSet *whitespaceCharacterSet = [NSCharacterSet whitespaceCharacterSet]; NSRange currentLineRange = [completeString lineRangeForRange:NSMakeRange([self selectedRange].location, 0)]; NSInteger lineLocation = location; NSInteger lineStart = currentLineRange.location; while (--lineLocation >= lineStart) { // If there are any characters before } on the line skip indenting if ([whitespaceCharacterSet characterIsMember:[completeString characterAtIndex:lineLocation]]) { continue; } [super insertText:aString]; return; } BOOL hasInsertedBrace = NO; NSUInteger skipMatchingBrace = 0; while (location--) { characterToCheck = [completeString characterAtIndex:location]; if (characterToCheck == '{') { if (skipMatchingBrace == 0) { // If we have found the opening brace check first how much space is in front of that line so the same amount can be inserted in front of the new line NSString *openingBraceLineWhitespaceString; NSScanner *openingLineScanner = [[NSScanner alloc] initWithString:[completeString substringWithRange:[completeString lineRangeForRange:NSMakeRange(location, 0)]]]; [openingLineScanner setCharactersToBeSkipped:nil]; BOOL foundOpeningBraceWhitespace = [openingLineScanner scanCharactersFromSet:whitespaceCharacterSet intoString:&openingBraceLineWhitespaceString]; if (foundOpeningBraceWhitespace == YES) { NSMutableString *newLineString = [NSMutableString stringWithString:openingBraceLineWhitespaceString]; [newLineString appendString:@"}"]; [newLineString appendString:[completeString substringWithRange:NSMakeRange([self selectedRange].location, NSMaxRange(currentLineRange) - [self selectedRange].location)]]; if ([self shouldChangeTextInRange:currentLineRange replacementString:newLineString]) { [self replaceCharactersInRange:currentLineRange withString:newLineString]; [self didChangeText]; } hasInsertedBrace = YES; [self setSelectedRange:NSMakeRange(currentLineRange.location + [openingBraceLineWhitespaceString length] + 1, 0)]; // +1 because we have inserted a character } else { NSString *restOfLineString = [completeString substringWithRange:NSMakeRange([self selectedRange].location, NSMaxRange(currentLineRange) - [self selectedRange].location)]; if ([restOfLineString length] != 0) { // To fix a bug where text after the } can be deleted NSMutableString *replaceString = [NSMutableString stringWithString:@"}"]; [replaceString appendString:restOfLineString]; hasInsertedBrace = YES; NSInteger lengthOfWhiteSpace = 0; if (foundOpeningBraceWhitespace == YES) { lengthOfWhiteSpace = [openingBraceLineWhitespaceString length]; } if ([self shouldChangeTextInRange:currentLineRange replacementString:replaceString]) { [self replaceCharactersInRange:[completeString lineRangeForRange:currentLineRange] withString:replaceString]; [self didChangeText]; } [self setSelectedRange:NSMakeRange(currentLineRange.location + lengthOfWhiteSpace + 1, 0)]; // +1 because we have inserted a character } else { [self replaceCharactersInRange:[completeString lineRangeForRange:currentLineRange] withString:@""]; // Remove whitespace before } } } break; } else { skipMatchingBrace--; } } else if (characterToCheck == '}') { skipMatchingBrace++; } } if (hasInsertedBrace == NO) { [super insertText:aString]; } } else if ([aString isEqualToString:@"("] && [[FRADefaults valueForKey:@"AutoInsertAClosingParenthesis"] boolValue] == YES) { [super insertText:aString]; NSRange selectedRange = [self selectedRange]; if ([self shouldChangeTextInRange:selectedRange replacementString:@")"]) { [self replaceCharactersInRange:selectedRange withString:@")"]; [self didChangeText]; [self setSelectedRange:NSMakeRange(selectedRange.location - 0, 0)]; } } else if ([aString isEqualToString:@"{"] && [[FRADefaults valueForKey:@"AutoInsertAClosingBrace"] boolValue] == YES) { [super insertText:aString]; NSRange selectedRange = [self selectedRange]; if ([self shouldChangeTextInRange:selectedRange replacementString:@"}"]) { [self replaceCharactersInRange:selectedRange withString:@"}"]; [self didChangeText]; [self setSelectedRange:NSMakeRange(selectedRange.location - 0, 0)]; } } else { [super insertText:aString]; } } - (NSMenu *)menuForEvent:(NSEvent *)theEvent { NSMenu *menu = [super menuForEvent:theEvent]; NSArray *array = [menu itemArray]; for (id oldMenuItem in array) { if ([oldMenuItem tag] == -123457) { [menu removeItem:oldMenuItem]; } } [menu insertItem:[NSMenuItem separatorItem] atIndex:0]; NSEnumerator *collectionEnumerator = [[FRABasic fetchAll:@"SnippetCollectionSortKeyName"] reverseObjectEnumerator]; for (id collection in collectionEnumerator) { if ([collection valueForKey:@"name"] == nil) { continue; } NSMenuItem *menuItem = [[NSMenuItem alloc] initWithTitle:[collection valueForKey:@"name"] action:nil keyEquivalent:@""]; [menuItem setTag:-123457]; NSMenu *subMenu = [[NSMenu alloc] init]; NSMutableArray *array = [NSMutableArray arrayWithArray:[[collection mutableSetValueForKey:@"snippets"] allObjects]]; [array sortUsingSelector:@selector(localizedCaseInsensitiveCompare:)]; for (id snippet in array) { if ([snippet valueForKey:@"name"] == nil) { continue; } NSString *keyString; if ([snippet valueForKey:@"shortcutMenuItemKeyString"] != nil) { keyString = [snippet valueForKey:@"shortcutMenuItemKeyString"]; } else { keyString = @""; } NSMenuItem *subMenuItem = [[NSMenuItem alloc] initWithTitle:[snippet valueForKey:@"name"] action:@selector(snippetShortcutFired:) keyEquivalent:@""]; [subMenuItem setTarget:[FRAToolsMenuController sharedInstance]]; [subMenuItem setRepresentedObject:snippet]; [subMenu insertItem:subMenuItem atIndex:0]; } [menuItem setSubmenu:subMenu]; [menu insertItem:menuItem atIndex:0]; } return menu; } - (IBAction)save:(id)sender { [[FRAFileMenuController sharedInstance] saveAction:nil]; } - (void)updateIBeamCursor { NSColor *textColour = [[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextColourWell"]] colorUsingColorSpaceName:NSCalibratedWhiteColorSpace]; if (textColour != nil && [textColour whiteComponent] == 0.0 && [textColour alphaComponent] == 1.0) { // Keep the original cursor if it's black [self setColouredIBeamCursor:[NSCursor IBeamCursor]]; } else { NSImage *cursorImage = [[NSCursor IBeamCursor] image]; [cursorImage lockFocus]; [[NSUnarchiver unarchiveObjectWithData:[FRADefaults valueForKey:@"TextColourWell"]] set]; NSRectFillUsingOperation(NSMakeRect(0, 0, [cursorImage size].width, [cursorImage size].height), NSCompositeSourceAtop); [cursorImage unlockFocus]; [self setColouredIBeamCursor:[[NSCursor alloc] initWithImage:cursorImage hotSpot:[[NSCursor IBeamCursor] hotSpot]]]; } } - (void)cursorUpdate:(NSEvent *)event { [colouredIBeamCursor set]; } - (void)mouseMoved:(NSEvent *)theEvent { if ([NSCursor currentCursor] == [NSCursor IBeamCursor]) { [colouredIBeamCursor set]; } } - (void)performFindPanelAction:(id)sender { [super performFindPanelAction:sender]; } // A workaround for Radar ID 5663445 (the complete menu disappears too soon) //- (void)complete:(id)sender //{ // inCompleteMethod = YES; // [super complete:sender]; // inCompleteMethod = NO; //} @end
Yeah, the president will meet with Pope Francis at the White House in September. The two will meet for about an hour or so, and then the Pope will spend the rest of the day hearing confessions from Secret Service agents. Jimmy Fallon Yesterday, the White House confirmed that President Obama will meet with Pope Francis during his visit in September. Some experts are wondering if they'll discuss their disagreement over contraception. Then Joe Biden said, “I didn't even know ... Judge to the court, at the start of a case: "I have to declare an interest in this case. Last week, the plaintiff sent me a check for $10,000 to find in his favor. Two days later, I received $20,000 from the defendant to find in his favor. I have ... The after-dinner speaker just didn't have a Stop button. He burbled on and on and on, oblivious to his increasingly restless audience. Finally one of the more drunken diners hurled an empty wine bottle at him. It missed, and hit the Chairman ...
Our privacy policy In short: Ixquick does not collect or share any personal information!Nada. Zilch. Nothing. The longer version: Ixquick is strongly committed to protecting the privacy of its user community. This privacy policy details the - very limited and non-personal - information Ixquick.com ("Ixquick") may gather and our disclosure policy. IP Addresses The IP address that is associated with your search will NOT be recorded.The only exception is for “abusive” (automated) queriers that rapidly submit many queries to Ixquick in a very short time. Data Collection We don't collect any personal information on our visitors. Nada. Zilch. Zero.When you use Ixquick, we do not record your IP address, we do not record which browser you are using (Internet Explorer, Safari, Firefox, Chrome etc.), we do not record your computer platform (Windows, Mac, Linux, etc.), and we do not record your search words or phrases. In fact, the only information we do record is an aggregate total of how many searches are performed on our website each day (a measure of overall traffic), and those overall traffic numbers broken down by language, and statistics on a purely aggregate level. Zero data collection policy. IP BROWSER OS SEARCHES This zero data collection policy protects your privacy, since your IP address, browser, and platform information can be combined with other data to uniquely identify your computer, your location, or you. It is also important not to record search terms, since they can convey personal information as well. (Think of someone entering their own name and/or social security number.) Cookies Ixquick does not use identifying cookies. Preferences Cookies are small pieces of data that are sent and saved to your computer's hard drive when visiting sites. Ixquick uses only one anonymous cookie called "preferences". This cookie is to remember the search preferences you saved for your next visit. It expires after 90 days. You can choose to accept or refuse cookies by changing the settings of your browser. It should be noted, however, that your Ixquick.com preferences will not work properly if your cookies are turned off. It is possible to accept cookies from selected sites only. You can periodically delete cookies from your computer's hard drive, clearing out all historical data that may have been saved from your previous web surfing. If you delete cookies, you will not be recognized as a repeat visitor or viewer when returning to a site. To promote a cookie-free internet, Ixquick has a URL generator which eradicates the need for setting a cookie. It remembers your settings in a privacy friendly manner. It can be found at the bottom of the SETTINGS page. External Links Ixquick offers a proxy function that allows the users to see the information on external sites without disclosing their IP address to these sites.As a search engine, and as an advertising publisher, you will find various links on our site, including but not limited to search results and sponsored results. These sites are owned and maintained by independent companies, over which Ixquick has no control, and who are not covered by this privacy policy. Ixquick is not liable or responsible for the content of these sites, or their collection of information and its use. Please note that this privacy policy applies only to the Ixquick.com website. Ixquick offers a proxy function that allows the users to see the information on external sites without disclosing their IP address to these sites. Further information on this great privacy tool can be found here. Email addresses Ixquick will not sell or disclose your contact information to any third parties.When you send comments, questions, suggestions, or feedback to Ixquick via email or through our support center, and include an email address and/or contact information, Ixquick may use this information to respond to you. By submitting feedback you also allow us to detect which browser and operating system you are using, information that will exclusively be used for helping to better understand and solve any reported issues better. Ixquick will not sell or disclose your contact information to any third parties. We may, however, very occasionally send emails to our users regarding Ixquick company information. This service is opt-in and includes the option to unsubscribe. Children Under 13 Years of Age Note that we do not collect any personal data at all.As a consequence Ixquick does not knowingly request, collect, or share personally identifiable information from users under the age of 13 either. We feel protecting children's privacy online is very important. Information Sharing Ixquick has no personal information to share.Ixquick does not share personal information with any third party search engine or the provider of its sponsored results. Click here for details. Governmental requests Ixquick is headquartered in The Netherlands, Europe. Any request or demand from any government (including the US) to deliver user data, will be thoroughly checked by our lawyers, and we will not comply unless the law which actually applies to us would undeniably require it from us. And even in that hypothetical situation, we would refer to the fact we have no personal user data to share. In the fourteen years we've been in business, we have never received such a request. The only legitimate way that we see to make us start collecting personal information, is if there is a valid warrant or court order, obliging us to do so in relation to a specific user because that person is suspected to have committed a crime which is serious enough to warrant such a restriction of privacy. Your privacy, our future We strongly believe that we have the legal right to safeguard the privacy of our users by encrypting and not collecting their personal information, and to keep doing so. Given the strong protection of the right to privacy in Europe, European governments cannot just start forcing service providers like us to implement a blanket spying program on their users. If that ever changed, we would fight this to the end. PrivacyIt's not just our Policy - it's our Mission! Operator Ixquick.com is owned and operated by Surfboard Holding BV, Postbus 1079, 3700 BB Zeist The Netherlands. Representative for the Privacy Policy is Robert E.G. Beens. ()
Tom Nook Tom Nook, known in Japan as , is a fictional character in the Animal Crossing series who operates the village store. He first appeared in the Nintendo 64 game Dōbutsu no Mori, released in Europe and North America on the Nintendo GameCube as Animal Crossing. Nook sells a house to the player at the beginning of each title in the series, giving a set mortgage for them to pay and offering to upgrade it after the mortgage is paid off. He has made several appearances in the Super Smash Bros. series as well. Nintendo's Treehouse localization members Rich Amtower and Reiko Ninomiya have argued that, in spite of his perceived greed, he is a nice person due to taking the risk of hiring someone who was new to the town. Concept and characteristics Tom Nook is based on the tanuki, the raccoon dog. Although he is considered to be greedy by 1UP.com, Rich Amtower and Reiko Ninomiya, members of Nintendo's Treehouse localization team, disagreed; describing him as a nice person. Amtower described him as "that first boss you ever had", adding that, "despite him being all business and not always having the time for pleasantries, Nook isn't a bad person; because he hired someone new to town. Due to that involving risk, it shows generosity". Ninomiya agreed, and both felt that Nook's greed is diminished by the city's price index compared to that of his shop. Amtower jokingly alludes to an "anti-Nook bias" several times throughout the interview with 1UP.com. Appearances Dōbutsu no Mori (2001, Nintendo 64) Animal Crossing 2001, GameCube) Animal Crossing: Wild World (2005, Nintendo DS) Dōbutsu no Mori (film) (2006) Animal Crossing: City Folk (2008, Wii) Animal Crossing: New Leaf (2012, Nintendo 3DS) Animal Crossing: Happy Home Designer (2015, Nintendo 3DS) Animal Crossing: Amiibo Festival (2015, Wii U) Animal Crossing: Pocket Camp (2017, mobile) Animal Crossing: New Horizons (2020, Nintendo Switch) Role in the series Tom Nook first appears in the Nintendo 64 title Dōbutsu no Mori (ported to the Nintendo GameCube as Animal Crossing in non-Japanese regions) as the town's main shop owner and continues his job in the next two installments. Nook's role in the series remained virtually unchanged from 2001 until 2012 with the release of Animal Crossing: New Leaf. In addition to being the main shop owner, Nook will also sell the player a house at the beginning of the game for around 19,800 bells (in game currency). Because the player will only have 1000 bells in his or her pocket, Nook will request that the player work in his shop for a bit to pay off some of the debt. The chores Nook assigns you to do are meant for the player to get used to the controls of the game. After planting flowers, writing letters, and talking to villagers the player is sent off to do whatever they want, but have to pay the remaining amount of their mortgage on their own. Each time a mortgage payment is completed Nook will upgrade or add on to the players house, each time putting the player more and more into debt to Nook, with the last addition being the most costly. Nook's store also goes through three upgrades and changes throughout the game. The time of the upgrade depends on how many bells are spent in the store. Eventually his humble "Nook's Cranny" shack-like store with basic tools and very little objects to buy will become "Nookington's Department Store" - a large, two story building with a wide variety of items for purchase. It is in this expansion that the player meets his two nephews, Tommy and Timmy, who run the second floor of the store. In every game, no matter what upgrade the store is on, the items in the store will be changed everyday. This means that no two days will ever have the exact combination of items for sale. In Animal Crossing, at the end of the month Nook will host a raffle with rare items to win. This was not continued in any sequel. In Wild World, with the Nookington's expansion the player meets Harriet, a poodle who will do the player's hair for 3000 bells. In City Folk, Harriet has moved her shop to the city. With the Nookington's expansion, Nook will randomly ask the player a series of questions. How the player answers could change the store to a former appearance. Nook returns in Animal Crossing: New Leaf. Instead of being the local shop owner, Nook is now in charge of "Nook's Homes" and instead sells things to upgrade the exterior of the players house. He also will expand the player's house for a price, which increases with each expansion. His nephews now run the town shop by themselves. Nook makes a minor appearance in Animal Crossing: Pocket Camp with the player being able to purchase him to put in their camp for 250 Leaf Tickets (Only available for purchase 45 days after starting the game). In other media Tom Nook has made several minor appearances in the Super Smash Bros. series of video games; appearing as various collectibles in Super Smash Bros. Melee and Super Smash Bros. Brawl. as well as a background character on the Smashville stage, which is based on the Animal Crossing series. Tom Nook's shop music also features in Super Smash Bros. Brawl as part of "Town Hall and Tom Nook's Store". Tom Nook has also been featured in several promotional items, including plush toys. Reception Tom Nook has received mixed reception since his appearance in Animal Crossing. IGN listed him as the ninth most-wanted character to appear in Super Smash Bros. Brawl. They describe him as devious, diabolical, and sinister, commenting that while he may not be a good fighter due to being from a video game without any fighting, they would enjoy seeing him get beaten up. Another article by IGN compares a talking baton given to the protagonist of Major Minor's Majestic March to Nook, calling it the second only to Nook in annoyance. GameSpy listed Tom Nook as one of their favourite bosses; editor Brian Altano specified that he passionately loves to hate Nook, stating that while he provides appreciated services to the small village, he keeps his reality grounded in that he lives in Nook's town, not his own. UGO.com ranked him the fifth best Animal Crossing character, stating that while Mr. Resetti was an irritant, Tom Nook was a jerk. They added that they love to hate him, jokingly suggesting that he was a "kingpin". In spite of the negative reception, Tom Nook has received some positive reception. In author Katherine Isbister's book, "Better game characters by design: a psychological approach", she cites Tom Nook as an example of a mentor character, one who indirectly helps players. GamesRadar also listed him as one of the 25 best new characters of the decade, stating that he has earned his place amongst the hearts of gamers and people on the Internet as both a viral meme and a deceptively devious character. In 2012, GamesRadar ranked Tom Nook as the 80th best villain in video games in their 2013 "Top 100", saying despite raccoons are "stripy, furry and cute", "Tom Nook can go to Hell." That same year, Complex placed him as the 49th coolest video game villain of all time. Game-studies scholar Ian Bogost described Nook as central to Animal Crossing's effective depiction of the economics of consumption and debt: None of the townsfolk ever appear in Tom Nook's shop... In contrast, the player participates in a full consumer regimen; he pays off debt, buys goods, and sells goods. Tom Nook buys goods, which he converts to wealth. ... While the player spends more, Nook makes more. By condensing all of the environment's financial transactions into one flow between the player and Tom Nook, the game proceduralizes the redistribution of wealth in a manner even young children can understand. Tom Nook is a kind of condensation of the corporate bourgeoise. Parody and analysis Tom Nook has been satirized in several articles, often compared to a mob boss or kingpin or otherwise a bad person. IGN listed him among the top 100 video game villains, suggesting that Tom Nook has a nice face, but the "cold, dead heart of a megalomaniac whose sole desire is to make a quick bell". Fellow IGN editor Patrick Kolan described Nook as the Animal Crossing equivalent of Al Swearengen, a pimp from the 1800s, due to his business sense, as well as both the character's position and disposition. Tom Nook has also been personified as a devious character, as well as a gangster, including an issue of the web comic VG Cats, which depicts him roughing up the player's character for his rent money. He has also appeared in the web comic PvP, in which Tom and Rowan threaten to destroy the player's home for owing 500,000 bells. In a satirical article written by GamesRadar, they suggest that the cast of Animal Crossing, most importantly Tom Nook, were setting the player up into a "furry cult". GameSpy listed Tom Nook as a video game character who would be disliked in real life, stating that he is annoying in the video games, and would be terrifying if he was a landlord in real life. 1UP.com editor Jeremy Parish, in his review of Animal Crossing: Wild World, he makes a parody documentary of the in-game world. In it, he suggests that Tom Nook's keen business sense allows him to effectively control the village. References Category:Animal Crossing characters Category:Animal characters in video games Category:Anthropomorphic characters in video games Category:Fictional businesspeople Category:Fictional raccoons Category:Japanese mythology in popular culture Category:Male characters in video games Category:Nintendo protagonists Category:Video game characters introduced in 2001
Years ago when I was working in Ireland I developed a habit of marking anything not yet configured in a configuration file and in code with the string "here be dragons". [mail servers] pop="pop.mycompany.com" smtp="here be dragons" This had the simple advantage that one could search all config files for "dragons" to find items not yet configured (maybe the SMTP server wasn't known yet but now is). After a while I and later others started referring to a status where an application was installed but not yet configured as having dragons, as in "Module X is installed but some dragons remain". Now in Switzerland another interesting term developed, more or less by accident. The German equivalent of the English term "text book" (as in "ideal") is "picture book". Our test environment installation people have a habit of taking screenshots of anything that didn't work or confused them during installation of our application. (That was very useful.) They then sent us the screenshots so we could resolve those issues or explain them away. And now an installation routine that is particularly buggy is referred to as a "picture book installation" (again, think "text book installation"). Stack Overflow – like most online communities I've studied – naturally trends toward increased strictness over time. It's primarily a defense mechanism, an immune system of the sort a child develops after first entering school or daycare and being exposed to the wide, wide world of everyday sne... All activities that make one think help with other activities that require thinking. Some people study languages for fun, just to keep their brains busy. Others paint or learn to play a musical instrument. Learning to code is not only a fun hobby (for those who like it) but it also trains the brain and can be useful. Not everyone who learns French needs to become an interpreter. Not everyone who attends pottery class will try a career in the tableware industry. So why shouldn't people learn to code without it being part of a career as a programmer? The whole "everyone should learn programming" meme has gotten so out of control that the mayor of New York City actually vowed to learn to code in 2012. A noble gesture to garner the NYC tech community vote, for sure, but if the mayor of New York City actually needs to sling JavaScript co... Amazon simply decided not to display footnotes correctly. I have complained about that several times, but Amazon ignore complaints. The Kindle is basically useless for scientific books or any books that rely on footnotes. I don't know why Amazon are trying to destroy the eBook format. I stopped buying eBooks from Amazon and now use the Kindle for my existing books and for non-Amazon eBooks. I don't see what Amazon have to gain from destroying the reading experience like that. It's not like making the footnotes difficult to reach makes "piracy" more difficult or anything like that. I adore words, but let's face it: books suck. More specifically, so many beautiful ideas have been helplessly trapped in physical made-of-atoms books for the last few centuries. How do books suck? Let me count the ways: They are heavy. They take up too much space. They have to be printed. ... "Jakob Nielsen wrote about 300 DPI displays back in 1997: http://www.useit.com/alertbox/9703b.html" This is off-topic, but just too interesting. From the article: "Use hypertext to split up long information into multiple pages" That is bad. That is really really bad. He got it so terribly wrong even though he wrote the article at a time when PCs were as badly connected to the net as mobile devices are now. I absolutely hate loading a Web page for a minute or two (depending on location) and then find that after a minute of reading I have to load _another_ page (and another, and another). The ridiculous habit of pretending that a Web page is like a page in a book or magazine is, imho, one of the worst features of the Web today. Good thing Jeff's blog is not like that. What was Microsoft's original mission? In 1975, Gates and Allen form a partnership called Microsoft. Like most startups, Microsoft begins small, but has a huge vision – a computer on every desktop and in every home. The existential crisis facing Microsoft is that they achieved their missi... I don't see a move from the PC to a "Post PC Era". To me it looks as if the computing world constantly tries to figure out what the ration between computers and users should be. Every ten years or so somebody notices that it is inefficient or somehow not good enough if [only one user uses a given computer|a given computer is used by more than one user] and advocates that instead [many users should use one computer|every user should get his own computer]. In the 60s and 70s we called it mainframe, now we call it cloud. The clients are more sophisticated (the iPads and phones and the like, not the users) and the cloud consists of many networked computers rather than one big one, but the effect is the same: many users use one computer (system) again. (In the 90s the expected shift from many computers to one computer system failed because of a mismatch between user expectations and available connectivity technology. But we did get the Web.) I think that perhaps the entire history of computers can be explained as the constant struggle to make one computer system support more than one user whenever every user had his own computer and to give every user his own computer whenever one computer system was used by many users. This resulted in more computers and more users because we always added but never subtracted. What was Microsoft's original mission? In 1975, Gates and Allen form a partnership called Microsoft. Like most startups, Microsoft begins small, but has a huge vision – a computer on every desktop and in every home. The existential crisis facing Microsoft is that they achieved their missi...
Introduction {#Sec1} ============ AMPARs mediate fast excitatory signaling in the brain, and a change in their number or function underlies lasting forms of synaptic plasticity^[@CR1],[@CR2]^. At many central synapses the time course of the excitatory postsynaptic current reflects the rapid deactivation of AMPARs following fast neurotransmitter clearance from the cleft^[@CR3]--[@CR5]^. AMPAR desensitization, where the channel closes while glutamate remains bound, is also important in shaping transmission, especially during periods of high-frequency synaptic input^[@CR6]^ or when glutamate clearance is slow^[@CR7],[@CR8]^. In this situation, AMPAR-mediated responses are depressed and AMPARs must recover from desensitization before they can be re-activated^[@CR8]--[@CR10]^. Thus, the balance between AMPAR desensitization and recovery influences the amplitude, duration, and frequency of neuronal responses^[@CR11]^. AMPARs are homo- or heterotetrameric assemblies of the pore-forming subunits GluA1--4. The activation, deactivation, and desensitization of the receptor is controlled by ligand-binding domains (LBDs) which form a self-contained clamshell-like structure within each of the four subunits^[@CR12],[@CR13]^. Glutamate binds between the upper (D1) and lower (D2) lobes of these structures. Within the resting receptor, LBDs of adjacent subunits form dimers that are linked back-to-back between their D1 domains^[@CR12],[@CR14]^. Following glutamate binding, closure of the LBD clamshell around the agonist causes separation of the D2 domains, applying tension to linkers between the LBDs and the ion channel which opens the gate^[@CR12],[@CR15]--[@CR17]^. This can be followed by desensitization, which is initiated by rupturing of the D1--D1 interfaces, relieving the tension on the pore linkers imposed by glutamate binding, allowing the channel to close^[@CR14],[@CR16],[@CR18],[@CR19]^. In neurons, AMPARs are intimately associated with numerous classes of auxiliary subunits, which include the transmembrane AMPAR regulatory proteins (TARPs)^[@CR20]^ and germ cell-specific gene 1-like protein (GSG1L)^[@CR21],[@CR22]^. These auxiliary proteins determine many biophysical and pharmacological properties of AMPARs and influence their desensitization^[@CR23],[@CR24]^. The prototypical TARP γ-2 markedly slows the rate of AMPAR desensitization and accelerates recovery from desensitization^[@CR25],[@CR26]^, while TARP γ-8 and GSG1L slow both the entry into and the recovery from desensitization^[@CR21],[@CR22],[@CR27]^. The structures of desensitized complexes, composed of homomeric GluA2 AMPARs with either the prototypical TARP γ-2 or GSG1L, have recently been determined at \~8 Å resolution by cryo-electron microscopy (cryo-EM)^[@CR16],[@CR19]^. The desensitized structures displayed a closed pore, a ruptured D1 interface, and a modest rearrangement (relaxation) of the LBD dimer with closely apposed D2 lobes^[@CR18]^. This contrasts with the more variable LBD structures of GluA2 seen in the absence of auxiliary subunits^[@CR28],[@CR29]^. Native GluA2 is subject to RNA editing which causes a switch from the genetically encoded glutamine (Q) to an arginine (R) in the selectivity filter; this Q/R editing reduces channel conductance and Ca^2+^ permeability^[@CR30]--[@CR32]^. Structural details of the closed, desensitized, and activated states of auxiliary subunit-associated homomeric GluA2(R) and GluA2(Q) have been well characterized^[@CR16],[@CR17],[@CR19],[@CR33]^. Here we describe striking differences in the functional properties of homomeric GluA2(Q) and GluA2(R) receptors. The edited (R) form displays unusual desensitization and gating behavior when compared with the unedited (Q) form, or indeed any other AMPAR assembly that we have examined^[@CR34]--[@CR38]^. Specifically, we find that GluA2(R) displays a particularly large fractional steady-state current and an anomalous current--variance relationship. When GluA2(R) is expressed with TARPs (γ-2 or γ-8) or with GSG1L we observe similarly anomalous behavior. We suggest that this behavior can be attributed to pore loop arginines preventing desensitization-mediated channel closure of the GluA2(R) assemblies, giving rise to conducting desensitized receptors. Using functional cysteine cross-linking we exploited this phenomenon to gain insight into the structure of desensitized AMPARs in the plasma membrane. Results {#Sec2} ======= Atypical channel behavior of Q/R-edited GluA2 {#Sec3} --------------------------------------------- When recording glutamate-evoked currents (10 mM,100 ms, --60 mV) in outside-out patches excised from HEK293 cells expressing homomeric GluA2 with and without γ-2, γ-8, or GSG1L, we observed unexpected differences in the behavior of the unedited (Q) and edited (R) forms (Fig. [1](#Fig1){ref-type="fig"}). Compared with that of the Q-forms, GluA2(R) desensitization was slower (Fig. [1a--c](#Fig1){ref-type="fig"}). The mean differences in the weighed time constants of desensitization (*τ*~w,\ des~) between the R- and Q-forms were 4.53 ms (95% confidence interval, 3.71--5.35) for GluA2 alone, 2.13 ms (95% confidence interval, 0.49--3.90) for GluA2/γ-2, 6.36 ms (95% confidence interval, 2.91--9.65) for GluA2/γ-8, and 2.83 ms (95% confidence interval, 1.28--4.56) for GluA2/GSG1L. This slowing of desensitization by Q/R site editing was accompanied by a striking increase in fractional steady-state current for GluA2, GluA2/γ-2, and GluA2/γ-8 (Fig. [1a, b, d](#Fig1){ref-type="fig"}). The mean differences in *I*~SS~ (% peak) between the R- and Q-forms were 9.2 (95% confidence interval, 6.6--11.1) for GluA2 alone, 33.9 (95% confidence interval, 29.2--38.4) for GluA2/γ-2, and 24.2 (95% confidence interval, 18.5--30.1) for GluA2/γ-8. By contrast, *I*~SS~ was not increased in the case of GluA2/GSG1L (1.43; 95% confidence interval, --0.35; 3.25) (Fig. [1d](#Fig1){ref-type="fig"}). Of note (except for GluA2/GSG1L) Q/R site editing had a much more pronounced effect on the steady-state currents (\~400--600% increase) than on the desensitization time course (\~30--90% slowing).Fig. 1Q/R editing affects the kinetics and variance of GluA2 currents. **a** Representative outside-out patch response (10 mM glutamate, 100 ms, --60 mV; gray bar) from a HEK293 cell transfected with GluA2(Q)/γ-2 (average current, black; five individual responses, grays). Inset: current--variance relationship (dotted line indicates background variance and red circle indicates expected origin). **b** As **a**, but for GluA2(R)/γ-2. Note that the data cannot be fitted with a parabolic relationship passing through the origin. **c** Pooled *τ*~w,des~ data for GluA2 alone (*n* *=* 12 Q-form and 9 R-form), GluA2/γ-2 (*n* *=* 21 and 27), GluA2/γ-8 (*n* *=* 7 and 10), and GluA2/GSG1L (*n* *=* 6 and 13). Box-and-whisker plots indicate the median (black line), the 25--75th percentiles (box), and the 10--90th percentiles (whiskers); filled circles are data from individual patches and open circles indicate means. Two-way ANOVA revealed an effect of Q/R editing (*F*~1,97~ = 111.34, *P* \< 0.0001), an effect of auxiliary subunit type (*F*~3,97~ = 32.3, *P* \< 0.0001) and an interaction (*F*~3,97~ = 2.84, *P* = 0.041). **d** Pooled data for *I*~ss~. Box-and-whisker plots and *n* numbers as in **c**. Two-way ANOVA indicated an effect of Q/R editing (*F*~1,97~ = 129.98, *P* \< 0.0001), an effect of auxiliary subunit type (*F*~3,97~ = 58.30, *P* \< 0.0001), and an interaction (*F*~3,97~ = 58.67, *P* \< 0.0001). **e** Doubly normalized and averaged current--variance relationships (desensitizing current phase only) from GluA2(Q) and GluA2(R) expressed alone (*n* = 12 and 9), with γ-2 (*n* = 19 and 23), with γ-8 (*n* = 7 and 10), or with GSG1L (*n* = 6 and 13). Error bars are s.e.m.s. All Q-forms can be fitted with parabolic relationships passing through the origin, while R-forms cannot. **f** Pooled NSFA conductance estimates for GluA2(Q) alone, GluA2(Q)/γ-2, GluA2(Q)/γ-8, and GluA2(Q)/GSG1L (*n* = 12, 18, 7, and 6, respectively). Box-and-whisker plots as in **c**. Indicated *P* values are from Wilcoxon rank sum tests. Source data are provided as a Source Data file In order to determine the underlying weighted mean single-channel conductance for the Q- and R-forms of the receptors we used non-stationary fluctuation analysis (NSFA) (Fig. [1a, b, e](#Fig1){ref-type="fig"}). Such analysis typically produces current--variance relationships that can be fitted by a parabolic function which extrapolates to the origin^[@CR36],[@CR37]^. All GluA2(Q) combinations yielded plots with these features. Consistent with previous reports^[@CR37],[@CR38]^, the estimated weighted mean single-channel conductance of GluA2(Q) (16.5 ± 1.3 pS, *n* = 12) (mean ± s.e.m. from *n* patches) was increased by co-expression with γ-2 or γ-8 (to 32.8 ± 2.0  and 34.6 ± 4.8 pS; *n* = 18 and 7, respectively) but reduced by co-expression with GSG1L (to 11.7 ± 1.0 pS, *n* = 6) (Fig. [1f](#Fig1){ref-type="fig"}). The mean differences were 16.3 pS (95% confidence interval, 11.9--20.8), 18.1 pS (95% confidence interval, 10.8--29), and --4.8 pS (95% confidence interval, --7.93 to --2.06). By contrast, NSFA of GluA2(R) receptor combinations produced anomalous current--variance relationships that were right-shifted (Fig. [1b,e](#Fig1){ref-type="fig"}), precluding conventional interpretation. This shift, which was apparent for GluA2(R) alone, was accentuated by expression with TARPs γ-2 or γ-8, but was reduced by co-expression of GSG1L (Fig. [1e](#Fig1){ref-type="fig"}). Such current--variance relationships have not been reported for other AMPAR complexes^[@CR34]--[@CR38]^. To determine the basis of the anomalous results from NSFA, we focused on GluA2(R)/γ-2, which displayed the most robust expression, the greatest increase in steady-state current, and the most right-shifted current--variance relationship. First, we observed a near identical current--variance relationship for the tandem construct GluA2(R)\_γ-2 (Supplementary Fig. [1a](#MOESM1){ref-type="media"}). This suggests that the anomalous behavior of co-expressed GluA2(R) and γ-2 did not simply reflect the presence of AMPARs with different TARP stoichiometries, and thus heterogeneous channel properties^[@CR39]^. Second, shifted relationships were also seen with GluA2(R)/γ-2 at +60 mV (Supplementary Fig. [1b, c](#MOESM1){ref-type="media"}). As channels would be passing Cs^+^ rather than Na^+^ in this condition, this argues that the phenomenon is independent of both voltage and permeating ion. Third, we obtained anomalous current--variance relationships with the edited form of GluA4 (GluA4(R)/γ-2) (Supplementary Fig. [1d](#MOESM1){ref-type="media"}), indicating that the behavior is not confined to GluA2(R) receptors. Fourth, current--variance relationships derived from deactivation of GluA2(R)/γ-2 (following 1 or 100 ms glutamate exposure; Supplementary Fig. [2a--e](#MOESM1){ref-type="media"}) and from GluA2(R)\_γ-2 or GluA4(R)/γ-2 (following 1 ms glutamate exposure; Supplementary Fig. [2f, g](#MOESM1){ref-type="media"}) also displayed non-parabolic features. Taken together, our results reveal that the behavior of homomeric Q/R-edited AMPARs deviates substantially from that expected. GluA2(R)/γ-2 receptors display two types of channel opening {#Sec4} ----------------------------------------------------------- Stationary fluctuation analysis of GluA2(R) currents in the absence of TARPs has previously yielded an estimated conductance of \~300 fS^[@CR32]^. While single-channel openings of this magnitude would be too small to resolve directly, in some of our GluA2(R)/γ-2 patches containing small numbers of channels, we were able to observe discrete single-channel openings that were in the picosiemens range (Fig. [2a, b](#Fig2){ref-type="fig"}). A histogram of channel amplitudes (pooled from six patches) revealed that openings to a conductance level of 3.5 pS were the most prevalent (Fig. [2c](#Fig2){ref-type="fig"}). The additional peaks above 3.5 pS could reflect either the presence of multiple conductance states, as reported for unedited AMPAR combinations^[@CR26],[@CR32],[@CR40]--[@CR42]^, or multiple concurrent events.Fig. 2GluA2(R)/γ-2 single-channel recordings. **a** GluA2(R)/γ-2 currents from an outside-out patch containing few channels (--60 mV). Forty consecutive applications of 10 mM glutamate (gray bar) are overlaid. **b** Individual responses exhibiting discrete channel openings superimposed on a persistent steady-state current (upper sweeps) or exhibiting only a persistent steady-state component (lower sweeps). Note the decay of the steady-state currents on glutamate removal (gray arrows) is much slower than the closure of resolved channels (black arrow). **c** Histogram of channel conductance for 392 discernible openings from six patches. The histogram is fit with the sum of four Gaussian curves (dashed lines) with a common standard deviation (1.2 pS), revealing four peaks (3.5, 6.9, 10.3, and 14.1 pS) The resolved openings showed several unusual features. First, despite the steady-state macroscopic current being relatively large (\~40% of the peak current; Fig. [1d](#Fig1){ref-type="fig"}), the majority of resolvable individual openings were present at the onset of the glutamate application (Fig. [2a, b](#Fig2){ref-type="fig"}). Second, while the amplitudes of resolved openings were equivalent to (or larger than) the steady-state current, the recordings contained no sojourns to the baseline; the resolvable openings thus appeared to ride on a low-noise background current (Fig. [2a, b](#Fig2){ref-type="fig"}). Third, throughout the recordings, occasional responses were observed in which the current onset showed no discernible picosiemens openings. Nonetheless, these responses still exhibited the low-noise steady-state current (Fig. [2b](#Fig2){ref-type="fig"}). Fourth, unlike the rapid closure of the resolved picosiemens channel openings, the steady-state current decay that followed agonist removal was slow (and roughly exponential), as might be expected if it reflected the closure of a large number of lower conductance openings (Fig. [2b](#Fig2){ref-type="fig"}). These results suggest that GluA2(R)/γ-2 receptors are capable of generating two distinct types of channel opening---conventional AMPAR openings (with conductances in the picosiemens range) which form the initial phase of the macroscopic response, along with openings of much lower conductance that form the steady-state current. The pattern of channel behavior we observed---predominantly large openings occurring at the onset of the response and predominantly small openings at steady-state---would give rise to a steady-state current with relatively low variance, consistent with the right-shifted current--variance relationships (Fig. [1e](#Fig1){ref-type="fig"}). GluA2(R) receptors in the absence of auxiliary subunits exhibit detectable chloride permeability (*P*~Cl~/*P*~Cs~ estimated as 0.14, ref. ^[@CR43]^). We asked whether the different classes of channel openings seen with GluA2(R)/γ-2 could have different relative chloride permeabilities. To address this, we applied 100 ms pulses of glutamate and measured the reversal potential of the peak and steady-state currents (comprising mostly large and small openings, respectively) in external solutions containing high (145 mM) or low (35 mM) CsCl^[@CR43]^ (Supplementary Fig. [3](#MOESM1){ref-type="media"}). The expected shift in reversal potential following a switch between these conditions is --30.4 mV for a Cs^+^-selective (Cl^--^ impermeable) channel and +30.1 mV for a purely Cl^--^-selective channel (see Methods). We recorded shifts in reversal potential of --36.0 ± 1.4 and --33.7 ± 2.1 mV for the peak and steady-state currents, respectively (*n* = 7, *P* = 0.100; Supplementary Fig. [3](#MOESM1){ref-type="media"}), suggesting that the different classes of channel opening do not differ in their relative chloride permeability. Indeed, this result suggests that in the presence of γ-2, GluA2(R) receptors mediate negligible Cl^--^ flux. Low conductance steady-state openings follow desensitization {#Sec5} ------------------------------------------------------------ NSFA for both desensitization and deactivation gave current--variance relationships that were not amenable to conventional interpretation. We thus sought to determine whether NSFA of the rising phase of the current (AMPAR activation) could accurately report weighted mean single-channel conductance and, if so, whether this approach might be applicable to GluA2(R)/γ-2. We first confirmed that NSFA of the fast-rising AMPAR activation phase would allow us to estimate accurately the single-channel conductance of unedited GluA2(Q)/γ-2. This yielded a weighted mean conductance of 24.7 ± 4.3 pS, not different from that obtained from the analysis of deactivating current (26.4 ± 3.1 pS; *P* *=* 0.64, paired *t-*test, *n* = 5; Fig. [3a, b](#Fig3){ref-type="fig"}). For GluA2(R)/γ-2 activation (unlike the deactivation phase of the same records) we obtained conventional parabolic current--variance relationships yielding a weighted mean conductance of 3.8 ± 0.5 pS (*n* = 10; Fig. [3c, d](#Fig3){ref-type="fig"}), similar to the most prevalent conductance seen in our single-channel analysis (Fig. [2c](#Fig2){ref-type="fig"}).Fig. 3Estimated weighted mean conductance from NSFA of GluA2(R)/γ-2 activation. **a** Representative GluA2(Q)/γ-2 responses to 1 ms (gray bar) glutamate application (gray traces) with superimposed average (black trace). NSFA was performed on the activation phase (blue highlight; filled blue circles) and deactivation phase (light blue highlight; open blue circles) of the same records, yielding similar estimates of weighted mean conductance. **b** Pooled current--variance plots for the activation and deactivation of GluA2(Q)/γ-2 currents (*n* = 5). Error bars indicate s.e.m. **c** Representative GluA2(R)/γ-2 response to 1 ms glutamate application (as in **a**). NSFA was performed on the activation phase (pink highlight; filled pink circles) and deactivation phase (light pink highlight; open pink circles) of the same records. Current--variance relationship is non-parabolic for deactivation but parabolic for activation. **d** Pooled current--variance plots for the activation and deactivation of GluA2(R)/γ-2 currents (*n* = 8). Error bars indicate s.e.m. As conventional current--variance relationships could be produced only from GluA2(R)/γ-2 activation and not desensitization (nor indeed from deactivation, during which there is a degree of desensitization) we speculated that desensitization itself may provide the key to our unexpected results. We hypothesized that the conformational rearrangements of the LBDs which normally trigger desensitization might not fully close the ion channel, such that the GluA2(R)/γ-2 receptors could adopt a conducting desensitized state, giving rise to the large fractional steady-state current and the anomalous current--variance relationships. If this were the case, and the shift from large resolvable channel openings to smaller openings was linked to the process of desensitization, a decline in GluA2(R)/γ-2 single-channel conductance (and therefore macroscopic current) would not be expected if desensitization was blocked. In the presence of cyclothiazide, which inhibits desensitization by stabilizing the upper LBD dimer interface^[@CR14]^, we found that GluA2(R)/γ-2 macroscopic currents (10 mM glutamate, 1 s) did not decay (Fig. [4a](#Fig4){ref-type="fig"}). Likewise, if the low-noise steady-state current of GluA2(R)/γ-2 arose from conducting desensitized channels, then we would expect the steady-state current to remain when desensitization was enhanced. To test this idea, we used the point mutation S754D. This weakens the upper LBD dimer interface, accelerating desensitization and reducing steady-state currents of GluA2(Q)^[@CR14]^. For both GluA2(Q)/γ-2 and GluA2(R)/γ-2 the S754D mutation produced a near 20-fold acceleration of desensitization (Fig. [4b, c](#Fig4){ref-type="fig"}) and a greater than twofold slowing of recovery from desensitization (Fig. [4d](#Fig4){ref-type="fig"}). As anticipated, GluA2(Q) S754D/γ-2 produced a negligible steady-state current (Fig. [4b, e](#Fig4){ref-type="fig"}). In marked contrast, GluA2(R) S754D/γ-2 exhibited an appreciable steady-state current (Fig. [4b, e](#Fig4){ref-type="fig"}). The presence of a large steady-state current with GluA2(R)/γ-2 under conditions strongly favoring desensitization is consistent with the view that desensitized channels can conduct.Fig. 4Large steady-state GluA2(R)/γ-2 currents are observed even in conditions favoring desensitization. **a** Representative GluA2(R)/γ-2 current (--60 mV) evoked by 10 mM glutamate (gray bar) in the presence of 50 µM cyclothiazide (green bar). Note the minimal current decay when desensitization is inhibited (for pooled data *I*~SS~/*I*~peak~ = 93.4 ± 1.6%, *n* = 6) (mean ± s.e.m. from *n* patches). **b** Representative glutamate-evoked currents from Q- and R-forms of GluA2 S754D/γ-2. Both forms exhibit very fast desensitization, but the R-form has an appreciable steady-state current. **c** Pooled data showing desensitization kinetics (*τ*~w,des~) for wild-type (wt; *n* = 6 and 5) and mutant (S754D; *n* = 5 and 5) forms of GluA2(Q)/γ-2 and GluA2(R)/γ-2. Box-and-whisker plots as in Fig. [1c](#Fig1){ref-type="fig"}. Two-way ANOVA indicated an effect of Q/R editing (*F*~1,\ 17~ = 10.56, *P* *=* 0.0047), an effect of the mutation (*F*~1,\ 17~ = 43.19, *P* *\<* 0.0001) but no interaction (*F*~1,\ 17~ = 2.63, *P* *=* 0.12). The mean difference between S754D and wild type was --8.1 ms (95% confidence interval, --10.9 to --6.0) for Q and --14.1 ms (95% confidence interval, --20.0 to --9.3) for R. **d** Pooled data (as in **c**) for recovery kinetics (*τ*~w,recov~). Two-way ANOVA indicated no effect of Q/R editing (*F*~1,\ 17~ = 0.13, *P* *=* 0.72), an effect of the mutation (*F*~1,\ 17~ = 31.67, *P* *\<* 0.0001) but no interaction (*F*~1,\ 17~ = 1.65, *P* *=* 0.22). The mean difference between S754D and wild type was 24.1 ms (95% confidence interval, 15.3 to 33.2) for Q and 38.7 ms (95% confidence interval, 23.7 to 53.9) for R. **e** Pooled data (as in **c**) for the fractional steady-state current (*I*~SS~). Two-way ANOVA indicated an effect of Q/R editing (*F*~1,\ 17~ = 65.37, *P* *\<* 0.0001), an effect of the mutation (*F*~1,\ 17~ = 28.37, *P* *\<* 0.0001), and an interaction (*F*~1,\ 17~ = 14.93, *P* *=* 0.0012). The mean difference in *I*~SS~ (% of peak) between S754D and wild type was --7.7 (95% confidence interval, --11.2 to --5.2) for Q and --37.9 (95% confidence interval, --49.2 to --25.8) for R. Indicated *P* values are from Welch *t*-tests. Source data are provided as a Source Data file A model incorporating conducting desensitized receptors {#Sec6} ------------------------------------------------------- We next considered whether the presence of desensitized receptors able to conduct ions could account quantitatively for our observations. To examine this, we incorporated such states into a modified version of a kinetic scheme we used previously to describe AMPAR/TARP concentration-dependent behaviors^[@CR25],[@CR44]^ (Scheme 1; Fig. [5a](#Fig5){ref-type="fig"}), and attempted to mimic the macroscopic kinetics and NSFA of GluA2(R)/γ-2 by varying the rate constants and conductances. From six patches in which activation, deactivation, and desensitization were all examined, we generated global average waveforms and current--variance plots for each condition (Fig. [5b--d](#Fig5){ref-type="fig"}). The inclusion in our scheme of conducting desensitized states allowed simultaneous modeling of all kinetic and current--variance data.Fig. 5A kinetic scheme including conducting desensitized states can mimic GluA2(R)/γ-2 behavior. **a** Scheme 1 is a modified form of a previously proposed kinetic model^[@CR25],[@CR44]^. States which can conduct are red. Open states (O1--O4) and occupied desensitized states (D1\*--D4\*, D~2~2\*--D~2~4\*) have independent conductances that are occupancy-dependent. **b**--**d** Global averaged GluA2(R)/γ-2 records (top) and variance data (bottom) for desensitization, deactivation, and activation (10 mM glutamate---gray bars). Using a single set of rate constants and conductances, the model closely mimics all six measures (dashed red lines): *k*~1~ = 1.3 ×  10^6^ M^--1 ^s^--1^, *k*~−1~ = 350 s^--1^, *α* = 3100 s^--1^, *β* = 1000 s^--1^, *γ*~1~ = 88 s^--1^, *δ*~1~ = 110 s^--1^, *γ*~2~ = 36 s^--1^, *δ*~2~ = 39 s^--1^, *γ*~0~ = 8 s^--1^, *δ*~0~ = 0.48 s^--1^, *k*~−2~ = 870 s^--1^, conductance of fully occupied open state (O4) = 3.9 pS, conductance of fully occupied desensitized state (D4\* and D~2~4\*) = 670 fS. Conductances of partially occupied states were proportional to their occupancy (e.g. O3 = 0.75 × O4, O2 = 0.5 × O4, O1 = 0.25 × O4) The model yielded estimated conductances of 3.9 pS for the fully open state and 670 fS for the fully occupied desensitized state of GluA2(R)/γ-2. As the steady-state occupancy of desensitized receptors (D1\*--D4\*, D~2~2\*--D~2~4\* combined: 90%) was much higher than that of the open receptors (O1--O4 combined: 6%), the latter contributed just 27% of the steady-state current. The low conductance and high steady-state occupancy of desensitized channels predicted by the model can fully explain the unusually low variance of the large steady-state current and, therefore, the right-shifted current--variance relationship produced from the macroscopic desensitizing current (Fig. [1](#Fig1){ref-type="fig"}). The model indicated that the proportion of current carried by desensitized and non-saturated receptors increased during deactivation (from 11% and 6%, respectively, at the peak, to 25% and 77% at mid-decay). The combination of these factors could explain the rapid fall-off in deactivation variance (Supplementary Fig. [2](#MOESM1){ref-type="media"}). While alternative kinetic schemes remain possible (see Supplementary Discussion), we favor Scheme 1 as the simplest that can account for our experimental findings with homomeric GluA2(R) complexes. Functional cross-linking of desensitized receptors {#Sec7} -------------------------------------------------- Recent work on the structural basis of desensitization has shown that the variety of conformations adopted by the desensitized LBD layer is greatly diminished when the full-length AMPAR is co-assembled with auxiliary subunits^[@CR16],[@CR19],[@CR28],[@CR29]^. In the presence of γ-2 the LBD dimers of desensitized GluA2 favor a relaxed dimer conformation, with the upper D1--D1 interfaces ruptured and the lower D2 domains more closely apposed, allowing channel closure^[@CR16]^. We reasoned that conducting desensitized receptors could enable us to determine whether this conformation (previously revealed through crystallography and cryo-EM) can indeed be adopted by AMPARs in the plasma membrane. Specifically, we predicted that if the steady-state current of GluA2(R) reflected ion flow through desensitized receptors in the relaxed dimer conformation, then if trapped in this conformation the receptors should maintain their conductance. To test this, we introduced cysteines at sites on the central axis of the D2--D2 dimer interface, cross-linking of which has previously been shown to inhibit channel opening by trapping the receptor in desensitized-like states. Thus we compared S729C, cross-linking of which permits the relaxed dimer conformation^[@CR16],[@CR18],[@CR45]^, with G724C^[@CR46]^ which we predicted would not accommodate the relaxed dimer conformation when cross-linked (Supplementary Fig. [4](#MOESM1){ref-type="media"}). In each case, we examined the effect of cross-linking on GluA2 currents. We first simulated currents from wild-type GluA2(R)/γ-2 receptors (Scheme 1), and compared these with simulated currents expected from receptors occupying only desensitized states (Scheme 2; Fig. [6a, b](#Fig6){ref-type="fig"}). These simulations predicted that if cross-linking trapped receptors in the native conducting desensitized state, it would change the glutamate response to a purely non-decaying steady-state current of reduced size.Fig. 6A model with access to only desensitized states predicts behavior of cross-linked GluA2(R) S729C/γ-2. **a** Scheme 2 is modified from Scheme 1 (Fig. [5a](#Fig5){ref-type="fig"}) and assumes that, following cross-linking, the receptor can occupy only desensitized states (excluded states are shown in gray). **b** Simulated responses to 10 mM glutamate (gray bar) using Scheme 1 to mimic the non-cross-linked condition and Scheme 2 to mimic the effect of cross-linking. **c** Representative currents at --60 mV activated by 10 mM glutamate (gray bar) from GluA2(Q) G724C/γ-2 and GluA2(R) G724C/γ-2 in DTT (black) or CuPhen (red). Note that, for both forms, currents are fully inhibited following cross-linking by 10 µM CuPhen. **d** Representative responses from individual patches demonstrate that following cross-linking by 10 µM CuPhen, GluA2(Q) S729C/γ-2 currents are inhibited, while GluA2(R) S729C/γ-2 currents show minimal desensitization and continue to display a large steady-state current, as predicted in **a**. Gray boxes (**b** and **d**) highlight the similarity of modeled currents and recorded GluA2(R) S729C/γ-2 currents To investigate the functional effects of cysteine cross-linking, and test these predictions, we examined the sensitivity of both unedited and edited GluA2 G724C/γ-2 and S729C/γ-2 receptors to the oxidizing agent CuPhen^[@CR45]^. Application of CuPhen to both editing forms of GluA2 G724C/γ-2 receptors caused rapid inhibition of glutamate-evoked currents, resembling the reported effects of cross-linking on TARP-free receptors^[@CR46]^ (Fig. [6c](#Fig6){ref-type="fig"}; Supplementary Fig. [5a](#MOESM1){ref-type="media"}). The peak and steady-state currents generated by GluA2(Q) S729C/γ-2 were also inhibited by CuPhen (Fig. [6d](#Fig6){ref-type="fig"}; Supplementary Fig. [5b](#MOESM1){ref-type="media"}). By contrast, cross-linking of edited GluA2(R) S729C/γ-2 abolished the peak current, but not the steady-state current (Fig. [6d](#Fig6){ref-type="fig"}; Supplementary Fig. [5b](#MOESM1){ref-type="media"})---a result consistent with the predictions of Scheme 2. Similar results were also seen when GluA2(R) S729C was expressed with γ-8 or GSG1L (Supplementary Fig. [5c](#MOESM1){ref-type="media"}). Overall, these results demonstrate that ion permeation through desensitized channels allows possible LBD conformations of the desensitized wild-type receptor to be probed using functional cross-linking. Of the two LBD conformations we examined, only S729C, which can accommodate the relaxed dimer state when cross-linked, behaved in a manner resembling that of the wild-type desensitized channel. Antagonist-bound cross-linked GluA2 LBD structures {#Sec8} -------------------------------------------------- Our functional data demonstrate that cross-linked GluA2(R) S729C/γ-2 receptors retain sensitivity to glutamate, implying that upon agonist binding they can undergo structural change which affects the channel gate. To understand the molecular basis of this, we determined the crystal structure of cross-linked S729C ligand binding cores in apo-like conformations bound to the competitive antagonists NBQX (diffracted to 1.8 Å resolution) or ZK200775 (diffracted to 2.0 Å) (Fig. [7a](#Fig7){ref-type="fig"}; Supplementary Fig. [6](#MOESM1){ref-type="media"}). AMPAR gating is driven by the separation of the D2-M3 linker regions following agonist binding^[@CR12],[@CR16],[@CR17]^. Thus, binding of glutamate is known to increase the distance between the α-carbons of Proline 632 pairs at the base of the D2 lobe of the GluA2 LBD (Fig. [7a](#Fig7){ref-type="fig"})^[@CR12],[@CR15],[@CR47]^. For the cross-linked S729C mutant LBD bound with NBQX (S729C~NBQX~) the Proline 632 separation was 22.8 Å (similar to that seen with S729C~ZK~, 22.6 Å). This is less than the separation we calculate for the glutamate-bound mutant LBD (S729C~glu~, 26.4 Å)^[@CR18]^. The relative separation of Pro632 residues suggests that, despite being constrained by the cross-link, glutamate binding to GluA2(R) S729C can trigger relative movements of the lower LBDs which, in the intact receptor, may induce tension in the M3-D2 linkers sufficient to allow ion flow (Fig. [7b](#Fig7){ref-type="fig"}).Fig. 7Cross-linked S729C LBD structures suggest a model of gating for desensitized GluA2(R). **a** Left, crystal structure of the dimeric GluA2 S729C ligand-binding core in the presence of NBQX, with the upper (D1, pale) and lower (D2, dark) lobes of each monomer (red and blue) distinguished by shading. The structure is viewed perpendicular to the axis between the Cα atoms of Pro632 (magenta spheres). Right, crystal structure of the GluA2 S729C ligand-binding core in the presence of glutamate (S729C~glu~; PDB: 2I3W)^[@CR18]^. The Pro632 separation seen in the presence of glutamate (right) is \>3 Å greater than that seen with NBQX (left). **b** Cartoon representing possible conformations of the GluA2(R) LBD dimer and pore in our functional cross-linking recordings. Non-cross-linked GluA2(R) channels bind glutamate (gray spheres), closing the clamshell LBDs and opening the pore to the full open channel conductance. Desensitization does not fully close the pore. As determined in the presence of γ-2, cross-linking of the G724C mutant (yellow) does not allow the action of agonist binding to be communicated to the pore in any state, and disrupts the normal dimeric conformation of desensitized receptors. Cross-linking of the S729C mutant (yellow) is not compatible with the full open state, but the channel can adopt the normal desensitized conformation, meaning that (as with the non-cross-linked receptor) the pore is not closed We also crystallized isolated cross-linked G724C LBDs in both the apo-like ZK200775-bound form (G724C~ZK~) and desensitized-like glutamate-bound forms in two different space groups (G724C~glu~ Forms A and B; Supplementary Fig. [7](#MOESM1){ref-type="media"}**)**. As we anticipated, G724C~ZK~ demonstrated reduced Pro632 separation (19.2 Å) compared to the antagonist-bound S729C forms, in keeping with the greater constraints on LBD separation imposed by G724C. However, unlike glutamate-bound S729C^[@CR18],[@CR45]^, neither form of G724C~glu~ adopted a relaxed dimer conformation (Fig. [7b](#Fig7){ref-type="fig"}). Instead they displayed a non-biological conformation, with a large rotation and total loss of the dimer interface which cannot be accommodated within the intact receptor (Supplementary Fig. [7](#MOESM1){ref-type="media"}). Thus, the Pro632 separation in the intact, cross-linked GluA2 G724C receptor could not be meaningfully assessed. Discussion {#Sec9} ========== Our experimental findings have implications for the understanding of AMPAR desensitization. They challenge the idea that the pore of desensitized AMPARs must be fully closed, and provide direct functional evidence concerning the conformation of the LBDs of desensitized receptors. Our NSFA, single-channel measurements and kinetic modeling all support the unexpected conclusion that atypical currents generated by GluA2(R)/γ-2 arise from desensitized receptors that retain around one-sixth of the maximal conductance of open channels. Our data indicate a weak, previously unidentified, coupling between the desensitized LBD and the gate, that is revealed only in Q/R-edited homomers, and is strengthened by TARP association. While a conducting desensitized state has previously been described for a mutant, homomeric, α7 nicotinic acetylcholine receptor^[@CR48]^, to our knowledge such behavior for a ligand-gated ion channel formed from wild-type subunits has not previously been described. The presence of a conducting desensitized state of GluA2(R) provided us with a functional readout to probe the likely arrangement of LBDs within desensitized AMPARs. By comparing currents from GluA2(R)/γ-2, GluA2(R)/γ-8, and GluA2(R)/GSG1L receptors with those from constrained cross-linked cysteine mutants^[@CR18],[@CR46]^, we have established that the relaxed dimer conformation identified in structural studies^[@CR18]^ is indeed representative of desensitized AMPARs within the plasma membrane. What is the evidence that the steady-state current does indeed arise from desensitized AMPARs? The fractional steady-state glutamate-evoked currents we recorded with GluA2(R)/γ-2 were much larger than those of other AMPAR/auxiliary subunit combinations we have examined previously^[@CR34]--[@CR38]^. While one might reasonably suppose that such a large steady-state current could arise simply from a reduced level of receptor desensitization, a number of the GluA2(R)/γ-2 properties we have identified suggest this is not the case. Importantly, the rates of entry into, and recovery from, desensitization for GluA2(R)/γ-2 were similar to those for GluA2(Q)/γ-2, which had a much smaller steady-state current. Moreover, a reduced extent of desensitization would not give rise to the rightward shift in the current--variance relationships that we observed. By contrast, the presence of a substantial steady-state current of unusually low variance would produce such a shift. Thus, the steady-state current could be generated by low-conductance channels with a high open probability. Furthermore, resolvable (picosiemens) openings were common at the onset of the current, but occurred only rarely during steady-state, supporting the view that these contribute little to the large steady-state component. Finally, AMPAR mutations (S754D and S729C) that enhanced desensitization essentially eliminated steady-state currents of GluA2(Q)/γ-2 receptors, but had much less effect on steady-state currents of GluA2(R)/γ-2 receptors. Consequently, our data suggest that a large fraction of the GluA2(R)/γ-2 steady-state current arises from conducting desensitized channels. How do our functional data fit with recently published AMPAR structures? Cryo-EM analysis has indicated that the pore diameter at the M3 gate of agonist-bound desensitized GluA2(R)/γ-2 is less than that of the activated receptor^[@CR16]^ and similar to that of the closed (antagonist-bound) receptor^[@CR33]^. Thus, the occurence of conducting desensitized states could be seen to present something of a paradox. The single closed structure for desensitized GluA2(R)/γ-2 (ref. ^[@CR16]^) indicates that open desensitized states were not present under the conditions used for cryo-EM analysis or, if present, were either too heterogeneous to allow reconstruction, or perhaps too similar in structure to closed desensitized states to be classified distinctly. At the same time, although our kinetic and current--variance data could be adequately mimicked by Scheme 1 without the inclusion of closed desensitized receptors, our data do not preclude their existence. For simplicity, we assigned a conductance to all occupied desensitized states, but models including both closed and conducting desensitized states could also broadly reproduce our functional data. Nonetheless, the magnitude of the steady-state current (relative to the peak current) limits how many closed desensitized channels are likely to be present in our recordings. Of note, rapid transitions between these states would be required to account for the absence of clear channel closures from steady state in our single-channel records. Taken together, it is certainly possible that both closed and open desensitized receptors are present in cryo-EM conditions, in which closed desensitized channels might predominate, as well as in our recordings, in which conducting desensitized channels are clearly prevalent. In our model of GluA2(R)/γ-2 gating, assigning fully occupied desensitized channels a conductance of 670 fS provided a good approximation to both our kinetic and noise data. While currents mediated by GluA2(R), GluA2(R)/γ-8, and GluA2(R)/GSG1L also bore all the hallmarks of conducting desensitized channels, for these combinations the deviations from conventional parabolic current--variance relationships were less dramatic, and the editing-dependent increases in steady-state current were smaller. Furthermore, when co-expressed with γ-8 or GSG1L, cross-linking of the GluA2(R) S729C mutant displayed a smaller residual steady-state current than that seen when it was co-expressed with γ-2. One possible explanation for these differences is that for GluA2(R) receptors the rank-order of desensitized channel conductance is γ-2 \> γ-8 \> no auxiliary \> GSG1L. An alternative possibility is that this reflects the presence of both conducting and non-conducting desensitized states. In this latter scenario, our macroscopic data could be explained by γ-2-associated receptors spending a greater proportion of time than GluA2(R), GluA2(R)/γ-8, or GluA2(R)/GSG1L in conducting desensitized states, relative to closed desensitized states. Recently, a chimeric AMPAR/KAR construct (ATD and LBD of GluK2 with TM and C-tail of GluA2) has been shown to exhibit a large leak current when co-expressed with TARPs^[@CR49]^. Remarkably, when these chimera/TARP combinations were exposed to glutamate the currents decreased, suggesting that, despite conducting in the absence of agonist, desensitization could still cause closure of the channel^[@CR49]^. The existence of a leak current in the presence of a TARP was taken to indicate that TARPs disrupt the ligand-free closed state of the receptor, leading to spontaneous channel opening. Although we found no evidence that edited GluA2 receptors open spontaneously when expressed with a TARP, the existence of receptors that conduct when desensitized---and the fact that the magnitude of the steady-state current is greatest when γ-2 is present---supports the view that TARPs can also disrupt channel closure in the desensitized state, in a manner that is Q/R-editing-dependent. How might Q/R site editing render the desensitized GluA2 receptor ion permeable? Of note, in the case of the homologous Q/R-edited kainate receptor GluK2(R), the homomeric receptors are markedly more sensitive to block by *cis*-unsaturated fatty acids than are GluK2(R)/K1(Q) heteromers^[@CR50]^. Structural modeling of the pore loop arginines of the GluK2(R) homomers suggests their side chains project away from the cytoplasm and towards the gate, and the resultant interaction between the pore loop and the M3 helix proximal to the gate is proposed to influence fatty acid pharmacology^[@CR51]^. While the orientation of the arginine side chains in the desensitized state has yet to be resolved, in the activated structure of the GluA2(R)/γ-2 receptor^[@CR16]^ (and in closed heteromeric GluA1/2(R)\_γ-8; ref. ^[@CR27]^) they too project away from the cytoplasm and towards the gate. If such interactions are present in desensitized GluA2(R)/γ-2, these might modify the rearrangement of the channel gate following desensitization, thereby hampering full channel closure. Alternatively, given structural evidence that the Q/R site may act as an additional gate of the receptor^[@CR17]^, charge--charge repulsion between arginines at this site might specifically compromise the constriction at this gate, which may be sufficient, on its own, to account for the ion flow through desensitized channels. There is general agreement that desensitization-induced AMPAR pore closure is caused by LBD rearrangements which allow the base of the D2 lobes to assume positions similar to those of the apo/inactivated form, thereby releasing the tension exerted by the M3-S2 linkers on the M3 helix caused by glutamate binding^[@CR16],[@CR19]^. In the absence of auxiliary proteins there is considerable heterogeneity in the LBD and ATD layers of desensitized AMPARs^[@CR28],[@CR29]^. However, when associated with γ-2 or GSG1L, AMPAR LBD dimers show increased stability of a single relaxed dimer conformation^[@CR16],[@CR18],[@CR19]^. The fact that GluA2(R) S729C, co-expressed with auxiliary subunits and trapped in the relaxed dimer conformation by cross-linking, exhibited properties consistent with those of wild-type channels, demonstrates that this conformation does indeed mimic the behavior of the native desensitized receptor in the plasma membrane. By contrast, functional cross-linking of a different mutant GluA2(R) G724C/γ-2---which did not assume a relaxed LBD dimer when crystallized---trapped these receptors in a non-conducting state, indicating that this conformation must be distinct from that of native desensitized AMPARs. It is noteworthy that despite the constraint on LBD movement imposed by cross-linking at S729C, the current produced by cross-linked GluA2(R)/γ-2 was glutamate-dependent, suggesting agonist binding produces changes within the constrained LBD layer sufficient to influence the pore. Dimeric Pro632 separation within S729C ligand-binding core crystals in the presence of glutamate^[@CR18]^ is greater than the separation we observed in the presence of competitive antagonists. While this suggests that glutamate binding might exert only a small degree of tension on the LBD-TM linkers within the cross-linked receptors, in the intact receptor (especially in the presence of TARPs that prevent loss of tension due to LBD compression towards the transmembrane domains^[@CR16],[@CR19]^), this might be sufficient to open the gate. However, the Pro632 measure provides only a one-dimensional approximation of a complex three-dimensional process. Future cryo-EM analysis of full-length GluA2 S729C may provide valuable further information on the complex dynamics of desensitized receptors. Do conducting desensitized states of homomeric GluA2(R) contribute to neuronal or glial signaling? Neurons and glia normally express multiple AMPAR subunit isoforms. When GluA2 is co-expressed with other subunits (in the absence of auxiliary proteins) the formation of GluA2 homomers is strongly discriminated against, in favor of GluA2-containing heteromers^[@CR52],[@CR53]^. Nonetheless, trafficking of homomeric GluA2(R) is enhanced if the receptors are unedited at the secondary (R/G) editing site^[@CR54]^, and we (and others^[@CR55],[@CR56]^) have demonstrated that the presence of γ-2 allows robust heterologous expression of functional GluA2(R) homomers. Of note, glutamate-gated channels with femtosiemens conductance have been detected in cerebellar granule cells^[@CR57]^. Moreover, an immunoprecipitation study that suggested hippocampal AMPARs were predominantly GluA1/2 or GluA2/3 heteromers did not expressly rule out the presence of GluA2 homomers^[@CR58],[@CR59]^. Additionally, functional GluA2(R) homomers can be trafficked to hippocampal synapses by endogenous TARPs following the conditional deletion of the alleles for GluA1 and GluA3 (ref. ^[@CR60]^). Whether, in the presence of multiple GluA subtypes, TARPs facilitate the formation of GluA2(R) homomers remains to be determined. Nevertheless, it is clear from recent cryo-EM analysis of native AMPARs that homomeric GluA2 receptors exist in the brain^[@CR61]^, and our findings suggest that they can conduct even when desensitized. Methods {#Sec10} ======= Heterologous expression {#Sec11} ----------------------- We expressed recombinant AMPAR subunits and TARPs (plus EGFP) in HEK293 cells (a gift from Trevor Smart, UCL). These were maintained under standard protocols, as described previously^[@CR25]^. AMPAR subunit cDNAs (rat) were flip splice variants and the GluA2 forms were additionally R/G edited. Point mutations of the GluA2 subunit were produced using standard PCR protocols. Primer sequences are listed in Supplementary Table [1](#MOESM1){ref-type="media"}. AMPAR/TARP combinations were transfected at a cDNA ratio of 1:2. The GluA2_γ-2 tandem consisted of full-length GluA2 and a nine amino-acid linker (GGGGGEFAT) before the start codon of full-length γ-2. Transient transfection was performed using Lipofectamine 2000 (Life Technologies). Cells were split 12--30 h after transfection and plated on glass coverslips in the presence of 50 μM NBQX (2,3-dioxo-6-nitro-1,2,3,4-tetrahydrobenzo\[*f*\]quinoxaline-7-sulfonamide; Tocris-Abcam) to avoid AMPAR-mediated toxicity. Electrophysiological recordings were performed 18--48 h later. Electrophysiology {#Sec12} ----------------- Patch-clamp electrodes were pulled from borosilicate glass (1.5 mm o.d., 0.86 mm i.d.; Harvard Apparatus) and fire polished to a final resistance of 8--12 MΩ. For outside-out patches the external solution contained 145 mM NaCl, 2.5 mM KCl, 1 mM CaCl~2~, 1 mM MgCl~2~, and 10 mM HEPES, pH 7.3. The internal solution contained 145 mM CsCl, 2.5 mM NaCl, 1 mM Cs-EGTA, 4 mM MgATP, and 10 mM HEPES (pH 7.3 with CsOH) supplemented with 100 µM spermine tetrahydrochloride (Tocris Bioscience). Currents with a risetime \>500 µs were rejected. For chloride permeability experiments, two CsCl based solutions were used---one with high CsCl (145 mM CsCl, 10 mM HEPES, 1 mM CaCl~2~; pH 7.3 with CsOH) and one with low CsCl (CsCl reduced to 35 mM and osmolarity adjusted with glucose). For recordings involving cysteine cross-linking, control and agonist solutions were supplemented with 1 mM DTT to reduce disulfide bonds or 10 µM CuCl and 30 µM 1--10-phenanthroline (CuPhen) to promote disulfide formation^[@CR45]^. The effects of CuPhen were fully reversible by 1 mM DTT. Recordings were made from outside-out patches at 22--25 °C using an Axopatch 200A amplifier (Molecular Devices). Currents were recorded at --60 mV, low-pass filtered at 10 kHz, and digitized at 20 kHz, except for recordings to assess activation noise which were digitized at 100 kHz (Digidata 1440A interface with pClamp 10 software; Molecular Devices). Patches with small responses were filtered at 2 kHz to more readily identify single-channel openings, and digitized at 10 kHz. Rapid agonist application to excised patches {#Sec13} -------------------------------------------- Rapid agonist application was achieved by switching between continuously flowing solutions. Solution exchange was achieved by moving an application tool made from theta glass (Hilgenberg; 2 mm outer diameter, pulled to a tip opening of ∼200 μm) mounted on a piezoelectric translator (Physik Instrumente). At the end of each experiment, the adequacy of the solution exchange was tested by destroying the patch and measuring the liquid-junction current at the open pipette (10--90% rise time typically 150--250 μs). Data analysis {#Sec14} ------------- Entry into desensitization (100 ms application of 10 mM glutamate) and current deactivation (1 ms) were fitted with the sum of two exponentials using IGOR Pro 6.35 (Wavemetrics) with NeuroMatic^[@CR62]^ and the weighted time constant (*τ*~w~) calculated. Recovery from steady-state desensitization was measured following a 100 ms equilibrating application of 10 mM glutamate. The recovery of glutamate-activated peak currents was measured following 2--200 ms intervals in control solution. Records used for single-channel analysis were filtered at 0.5 kHz and individual channel events were selected by eye. Channel openings were analyzed using QuB (ver. 2.0.0.7; <https://qub.mandelics.com>). The amplitude of the resolved openings was measured from the closing transition (final current level to steady-state current). Measured openings (at --60 mV) were binned by conductance and fitted using a multi-peak Gaussian function (IGOR Pro). NSFA was performed on the decaying phase of currents evoked by 1 or 100 ms applications of 10 mM glutamate (35--300 successive applications), as previously described^[@CR36]^. The variance for each successive pair of current responses was calculated and the single-channel current (*i*) and total number of channels (*N*) were then determined by plotting the ensemble variance (*σ*^2^) against mean current ($\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\bar I$$\end{document}$) and fitting with a parabolic function:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{\sigma }}_{}^2 = i\bar I - \bar I^2/N + {\mathrm{\sigma }}_{\mathrm{B}}^2,$$\end{document}$$where *σ*~B~^2^ is the background variance^[@CR63]^. For NSFA of current activation, records were digitized at a high sampling rate (100 kHz) to ensure sufficient numbers of data points from the average record could be grouped into each of the ten amplitude bins. As alignment of traces on their rising phases (as used for deactivation and desensitization records) led to a distortion of activation noise, analysis was instead performed on unaligned traces (from sections of recording in which the time of the current onset was stable; Spearman Stability Analysis, NeuroMatic). Experimentally determined shifts in reversal potentials following local exchange from the high to low CsCl solutions were compared to the calculated shifts (for purely Cs^+^-permeable and purely Cl^--^-permeable channels) determined using the equation:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$V_{{\mathrm{rev}}} = \frac{{RT}}{F}{\mathrm{{ln}}}\frac{{a{\mathrm{Cs}}_{\mathrm{o}} + \left( {{\raise0.5ex\hbox{$\scriptstyle {P_{{\mathrm{Cl}}}}$}\kern-0.1em/\kern-0.15em \lower0.25ex\hbox{$\scriptstyle {P_{{\mathrm{Cs}}}}$}}} \right)a{\mathrm{Cl}}_{\mathrm{i}}}}{{a{\mathrm{Cs}}_{\mathrm{i}} + \left( {{\raise0.5ex\hbox{$\scriptstyle {P_{{\mathrm{Cl}}}}$}\kern-0.1em/\kern-0.15em \lower0.25ex\hbox{$\scriptstyle {P_{{\mathrm{Cs}}}}$}}} \right)a{\mathrm{Cl}}_{\mathrm{o}}}},$$\end{document}$$where *V*~rev~ is the reversal potential measured at the peak or steady-state, *P*~Cl~/*P*~Cs~ is the permeability ratio of chloride relative to cesium and *a*Cs and *a*Cl are the activities of the ions in the intracellular (i) and extracellular (o) solutions^[@CR43]^. *F*, *R*, and *T* have their usual meanings. *a*Cs in the high CsCl solution was extrapolated from tabulated values to be 0.714 (<https://web.archive.org/web/20190228144112/http://www.kayelaby.npl.co.uk/chemistry/3_9/3_9_6.html>). *a*Cs in the low CsCl solution was estimated to be 0.824. This value has a small degree of uncertainty, as the effect of glucose---demonstrated to modestly affect *a*Na in NaCl solutions^[@CR64]^---is unknown. Our chosen value assumes a similar effect of glucose on the activities of both NaCl and CsCl. Seals were formed and patches obtained in the standard NaCl external solution. The two experimental CsCl solutions were applied locally (interleaved) while the bath was continuously perfused with standard external. No correction was applied for liquid-junction potentials. Kinetic modeling {#Sec15} ---------------- Kinetic simulations and fits were performed in Scilab 5.5.0. (Scilab Enterprises; [https://www.scilab.org](http://www.scilab.org)) using the *Q*-matrix method^[@CR65]^. Rate constants were adapted from our previous model for GluA1/γ-2 (refs. ^[@CR25],[@CR26]^). For each iteration of the rate constants, currents were calculated from the occupancies of all conducting states at given time points multiplied by their unitary current. Noise was calculated using the following equation:^[@CR66]^$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{\sigma }}^2 = i^2Np\left( {1 - p} \right),$$\end{document}$$where *N* is the number of channels of unitary current *i* of open probability *p*. The ensemble variance for a channel with multiple subconductances was calculated as the sum of the variances for each state:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathrm{\sigma }}^{\mathrm{2}} = N\mathop {\sum }\limits_{{{j}} = 1}^{{k}} \left( {i_{{j}}^2p_{{j}}(1 - p_{{j}})} \right)N,$$\end{document}$$where *k* is the number of conducting states, *j* refers to each conducting state, and *i*~*j*~ and *p*~*j*~ are its unitary current and occupancy respectively. *N* was re-derived from the experimentally measured peak current as well as the peak open probability and conductance of each state for each iteration of the fit. Kinetics and noise of desensitization, deactivation, and activation, across six patches from which all properties could be measured, were normalized, averaged, and fit using Scheme 1 (Fig. [5](#Fig5){ref-type="fig"}). Kinetic data were parsed (to 35 data points) to make computation manageable. While all variables contributed to the model output, certain rates were strongly influenced by particular aspects of the data: *k*~1~---activation kinetics; *k*~−1~---deactivation kinetics; *α*, *β*---activation kinetics, steady-state current, and current--variance relationships; *γ*~1~, *δ*~1~, *γ*~2~, and *δ*~2~---desensitization kinetics and steady-state current; *γ*~0~, *δ*~0~---current--variance relationships and desensitization; open channel conductance---all current--variance relationships; desensitized conductance---current--variance relationship of desensitization. Rate constant *k*~--2~ was constrained by microscopic reversibility. Expression and purification of ligand-binding cores {#Sec16} --------------------------------------------------- Cysteine mutants of the GluA2 flop S1S2-binding core with an N-terminal octahistidine tag in the pET22b vector^[@CR12]^ were produced using standard PCR protocol (see Supplementary Table [1](#MOESM1){ref-type="media"}). Following transformation of Origami B cells (VWR; 71408--3), high levels of protein were expressed by induction with 0.5 mM IPTG when the cells had reached OD~600~ \~1.2. The cells were harvested by centrifugation following overnight incubation at 20 °C. Harvested cells were washed once with PBS and resuspended in HisTrap binding buffer (50 mM Tris, pH 8; 150 mM NaCl; 20 mM imidazole; protease inhibitor cocktail (Roche), and 50 µM NBQX to displace glutamate and promote dimerization). Resuspended cells were treated with lysozyme for 30 min at 4 °C and cell membranes were disrupted by sonication and removed by centrifugation. Samples were filtered (0.45 µm) to remove residual cellular debris and loaded onto a HisTrap Column (GE Healthcare) at 4 °C. Protein was eluted using HisTrap elution buffer (50 mM Tris pH 8; 150 mM NaCl; 300 mM imidazole) and aliquots containing the highest concentrations of dimers were pooled for further purification. Parallel reducing and non-reducing SDS-PAGE and Coomassie blue staining established that ligand-binding cores preferentially formed cross-linked dimers with no need for exogenous oxidization. Protein was concentrated using 10 kDa concentrators before exchanging into column buffer (50 mM Tris, pH 8; 150 mM NaCl). Histidine tags were cleaved using thrombin. A final purification step (in column buffer) was performed with a size exclusion column (Superdex 200; GE Healthcare, Little Chalfont, UK). Final purified AMPAR LBDs were concentrated to 2--7 mg ml^--1^. Protein crystallography {#Sec17} ----------------------- Crystallization was achieved using sitting drop vapor diffusion at 16 °C. All crystals appeared within 72 h, and were harvested after 1--2 weeks. For each crystal, precipitant solutions, and additives for cryoprotection prior to freezing, differed. GluA2 S729C~NBQX~: 0.1 M tri-sodium citrate pH 5.5, 20% PEG 3000. Supplemented with 15% glycerol for cryoprotection. GluA2 S729C~ZK~/GluA2 G724C~ZK~: 0.2 M ammonium chloride, 20% PEG 3350, 10 µM ZK200775. Supplemented with 15% glycerol for cryoprotection. GluA2 G724C~glu~ Form A: 1 M lithium chloride, 0.1 M citric acid pH 4.0, 20% (w/v) PEG 6000, 30 mM glutamate. Supplemented with 20% glycerol for cryoprotection. GluA2 G724C~glu~ Form B: 0.16 M calcium acetate, 0.08 M sodium cacodylate pH 6.5, 14.4% (w/v) PEG 8000, 20% (v/v) glycerol, 1 mM glutamate. No additives necessary for cryoprotection. Diffraction data were collected at Diamond Light Source beamlines I04 and I24, and at ESRF ID30B (see Supplementary Table [2](#MOESM1){ref-type="media"}). Diffraction data were initially processed using Xia2 (ref. ^[@CR67]^) and AIMLESS^[@CR68]^. Initial molecular replacement was performed using Phaser^[@CR69]^ and structures were refined using PHENIX^[@CR70]^ and *Coot*^[@CR71]^. Structures G724C~ZK~, S729C~NBQX~, and S729C~ZK~ were solved using the ZK200775-bound wild-type LBD (PDB 3KGC)^[@CR13]^ as the search model. Both forms of G724C~glu~ were solved using the glutamate-bound wild-type LBD (PDB 1FTJ)^[@CR12]^ as the search model. Cysteines were modeled into cryo-EM structures of GluA2(R)/γ-2 in the activated and desensitized forms using PyMOL (The PyMOL Molecular Graphics System, Version 2.0 Schrödinger, LLC), and the separation of the sulfur atoms was determined. The separation of Cα Pro632 atoms in LBD structures was also measured using PyMOL. Data presentation and statistical analysis {#Sec18} ------------------------------------------ Summary data are presented in the text as mean ± s.e.m. (from *n* patches). Comparisons involving two data sets only were performed using a paired *t-*test or unpaired Welch two-sample *t-*test that does not assume equal variance (normality was not tested statistically, but gauged from quantile--quantile (Q--Q) plots and/or density histograms). Comparisons of multiple conditions were performed using two-sided Welch two-sample *t-*tests with Holm's sequential Bonferroni correction. When comparing Q and R edited forms of AMPARs, analyses were performed using two-way analysis of variance (Welch heteroscedastic *F-*test) followed by pairwise comparisons using two-sided Welch two-sample *t*-tests. Exact *P* values are presented to two significant figures, except when *P* *\<* 0.0001. Statistical tests were performed using R (version 3.3.3, the R Foundation for Statistical Computing, [https://www.r-project.org/](http://www.r-project.org/)) and R Studio (version 1.1.383, RStudio). Independent-samples confidence intervals for the differences between two population means were obtained using a bias-corrected and accelerated (BCa) bootstrap method in R^[@CR72]^. No statistical test was used to predetermine sample sizes; these were based on standards of the field. No randomization was used. A full list of statistical analyses is provided in Supplementary Table [3](#MOESM1){ref-type="media"}. Reporting summary {#Sec19} ----------------- Further information on research design is available in the [Nature Research Reporting Summary](#MOESM2){ref-type="media"} linked to this article. Supplementary information ========================= {#Sec20} Supplementary Information Reporting Summary Source Code Source Code Source Data **Peer review information** *Nature Communications* thanks Lonnie P Wollmuth, Wei Lu, and the other, anonymous, reviewer(s) for their contribution to the peer review of this work. **Publisher's note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Supplementary information ========================= **Supplementary information** accompanies this paper at 10.1038/s41467-019-12280-9. This work was supported by the MRC (MR/J002976/1 to S.G.C.-C. and M.F. and MR/J012998/1 to M.F. and S.G.C-C.), the Wellcome Trust (086185/Z/08/Z to S.G.C.-C. and M.F.) and the BBSRC (BB/N015274/1 to M.G.G.). M.G.G. is a Wellcome Trust and Royal Society Sir Henry Dale fellow (104194/Z/14/Z). We thank Ingo Greger for providing the GluA2 LBD expression vector, and Trevor Smart, Duncan Laverty, and Ambrose Cole for assistance with crystallography. We thank Mark Mayer for discussion and for comments on an earlier version of the manuscript. I.D.C., D.S., T.P.M., M.G.G., M.F. and S.G.C.-C. designed the experiments. I.D.C., D.S. and T.P.M. performed the experiments. I.D.C., D.S., T.P.M., M.G.G., and M.F. analyzed the data. I.D.C., M.G.G., M.F. and S.G.C.-C. interpreted the results. I.D.C. and M.F. prepared the figures. I.D.C., M.F. and S.G.C.-C. wrote the manuscript with input from all authors. Data supporting the findings of this manuscript are available from the corresponding authors upon reasonable request. The data underlying Fig. [1](#MOESM5){ref-type="media"}c, d, f, [4c--e](#MOESM5){ref-type="media"} and Supplementary Figs [1](#MOESM5){ref-type="media"}c and [2b](#MOESM5){ref-type="media"} are provided as a Source Data file. The coordinate and structure factor data for the GluA2 LBD crystals have been deposited in the Protein Data Bank (PDB) with the following accession codes: S729C~NBQX~, 6FQH; S729C~ZK~, 6FQK; G724C~ZK~, 6FQJ; G724C~glu~ Form A, 6FQG; G724C~glu~ Form B, 6FQI. Computer code demonstrating example calculations for the current and non-stationary fluctuation analysis presented in Fig. [5](#Fig5){ref-type="fig"} is available from the UCL Research Data Repository: 10.5522/04/8797892. The authors declare no competing interests.
1. Introduction {#sec1-foods-09-00324} =============== *Saccharomyces cerevisiae* (typically known as baker's yeast) is a single-cell eukaryote that is often utilized in research. *S. cerevisiae* has proven to be an ideal organism for research applications especially after releasing its genome sequence was released to the scientific community \[[@B1-foods-09-00324],[@B2-foods-09-00324]\]. This yeast can be stored, and its genome sequence and translated proteins are similar in action to those of other organisms. Its proteome contains cell cycle and signaling proteins \[[@B3-foods-09-00324]\]. In the past few years, biologically active peptides have been produced in different sources such as food, plants, animals and microorganisms. Many studies have focused on the production, isolation, and purification of the antimicrobial peptides \[[@B4-foods-09-00324]\]. Antimicrobial peptides (AMPs) are small oligopeptides (AMPs) that typically contain 10--100 amino acids, with a net positive charge and an amphipathic structure \[[@B5-foods-09-00324]\]. Antimicrobial peptides have a broad spectrum of inhibition activity against microorganisms such as bacteria, molds, yeasts, parasites, and some viruses. Many living organisms such as microorganisms, invertebrates, and other species belonging to the animal and plant kingdoms produce antimicrobial peptides \[[@B6-foods-09-00324]\]. In addition, bioactive peptides produced during the fermentation process by different microorganisms have been used as antibacterial, antioxidant, antihypertensive, anticancer, and immunomodulatory agents, in addition to containing lipid-reducing properties \[[@B7-foods-09-00324]\]. Several studies have investigated the production of antimicrobial peptides from lactic acid, however, few studies focus on the production of antimicrobial peptides from yeasts in a medium \[[@B7-foods-09-00324],[@B8-foods-09-00324]\]. In previous studies, metabolic compounds of *Saccharomyces boulardii* were separated and examined against 26 bacterial isolates in order to study the compounds' antimicrobial activity. The extracted peptide from *Saccharomyces boulardii* has ben shown to exhibit high inhibition activity toward *Bacillus cereus* \[[@B9-foods-09-00324]\]. It has been reported that some *S. cerevisiae* strains have the ability to produce antimicrobial peptides. Recent studies demonstrated that the isolated *S. cerevisiae* CCMI 885 produced small peptides (\<10 kDa) that exhibit antimicrobial activity against some yeasts such as *Hanseniaspora guilliermondii*, *Torulaspora delbrueckii*, *Kluyveromyces marxianus,* and *Lachancea thermotolerans* \[[@B10-foods-09-00324]\]. The ultrafiltration process with a 10 kDa cut-off was used to extract the antimicrobial peptide from *Candida intermedia* after growth on YPD agar at 28 °C over 7 days. The molecular weight of the peptide was 5 kDa exhibiting an inhibition activity against *Brettanomyces bruxellensis* \[[@B11-foods-09-00324]\]. Several authors have noted alternate strategies for biocontrol, such as the use of peptide-based killer toxins. For example, *Saccharomyces cerevisiae* produces peptide-based killer toxins that are able to inhibit the growth of different species of bacteria \[[@B12-foods-09-00324]\]. Similar results were reported for bioactive peptide production by *S. cerevisiae* CCMI 885 at 30 °C for 48 h. These peptides were used to inhibit the growth of some wine-related yeasts \[[@B8-foods-09-00324]\]. Past research including both in vitro and in vivo studies indicated that *Saccharomyces cerevisiae* inhibited intestinal tract infections from *Bacillus subtilis*, *B. cereus*, *Escherichia. coli*, *Proteus vulgaris*, *Pseudomonas aeruginosa*, *Salmonella typhimurium*, *Salmonella typhi*, *Staphylococcus aureus*, *Yersinia enterocolitica*, and some yeasts such as *Candida albicans* \[[@B13-foods-09-00324]\]. *Saccharomyces cerevisiae* yeast exhibits antibacterial activity against *E. coli*, *Pseudomonas* sp. *Salmonella* sp., *Staphylococcus aureus,* and *Vibrio cholera.* In addition, this yeast strain has antimicrobial activity against other pathogenic bacteria species, yeasts, and molds \[[@B14-foods-09-00324]\]. Many studies have described the effect of these antimicrobial activities on inhibition zones (zones free of growth). To date, however, very limited information is available about bioactive peptides from *Saccharomyces cerevisiae*. Thus, the aim of this study was to investigate the antimicrobial components from a full extract of *Saccharomyces cerevisiae,* isolate antibacterial peptides, and test their thermostability characteristics which are very important aspect in food production including for sterilization and thermal processes. 2. Materials and Methods {#sec2-foods-09-00324} ======================== 2.1. Microbial Strains {#sec2dot1-foods-09-00324} ---------------------- *Saccharomyces cerevisiae* ATCC 36858 was obtained from a local scientific store in Basrah, Iraq. *Bacillus subtilis* ATCC 23857, *E. coli* ATCC 25922, *Klebsiella aerogenes* ATCC 13048, and *Staphylococcus aureus* ATCC 25923 were supplied by the Food Science Department/College of Agriculture/University of Basrah, Iraq and used as indicator strains. 2.2. Antibacterial Peptide Production {#sec2dot2-foods-09-00324} ------------------------------------- First, 1 mL (6 log cfu/mL) of activated yeast (36 h) was added to 250 mL of glucose yeast peptone broth (GTPB) medium (Himedia, Mumbai, India) and incubated at 20, 25, 30, and 35 °C for 24, 48, 72, and 96 h, respectively. After incubation, *S. cerevisiae* cells were removed by centrifugation at 6000 rpm for 20 min at 4 °C, and the cell free yeast supernatant was filtered with 0.45 µm cellulose acetate membranes (Merck company, Watford, UK) \[[@B9-foods-09-00324]\]. In order to isolate the peptides that were released from the yeast in the medium, the filtered metabolic yeast extract was passed through ultrafiltration membranes with pore sizes of 10 kDa (cut-off 10 kDa, Millipore and Amicon, USA) and then concentrated (100-fold) with 2 kDa (cut-off 2 kDa) membranes. The concentrated metabolic yeast extract was lyophilized by freeze-drying (Heto Lab Equipment, Denmark). Next, 100 mg/mL of lyophilized metabolic yeast was tested against four indicator strains (*Bacillus subtilis* ATCC 23857, *E. coli* ATCC 25922, *Klebsiella aerogenes,* and *Staphylococcus aureus* ATCC 25923) using the agar well diffusion agar method, and then 100 µL of lyophilized peptide was added to the wells (6 mm) in Nutrient agar (Himedia, Mumbai, India). After incubation, the clear zones were measured in millimeters \[[@B15-foods-09-00324],[@B16-foods-09-00324]\]. 2.3. Purification of the Antibacterial Peptide from Yeast {#sec2dot3-foods-09-00324} --------------------------------------------------------- An ÄKTA Pure 25 System (GE Healthcare Life Sciences, Germany) was used to purify the antibacterial peptides from lyophilized metabolic extracts of *S. cerevisiae*. The specific column Superdex 200 (10/300GL) was used with a column volume set at 23.562 mL and a column diameter set at 10 mm with a pressure of 1.5 MPa. The column was filled with agarose and dextran. A 0.5 M acetate phosphate buffer (pH 5.0) at 0.5 mL/min was used for elution, and a 280 nm UV detector was used to determine the isolated peaks \[[@B17-foods-09-00324],[@B18-foods-09-00324]\]. Peak fractions were collected, and the antibacterial activity against two indicator strains (*E. coli* ATCC 25922 and *Staphylococcus aureus* ATCC 25923) was determined. 2.4. Characterization of the Antibacterial Peptide {#sec2dot4-foods-09-00324} -------------------------------------------------- ### 2.4.1. Thermal Stability of the Antibacterial Peptide {#sec2dot4dot1-foods-09-00324} To determine the thermal stability of the extracted antibacterial peptide from *S. cerevisiae,* 5 mL (10 mg/mL) of the active peptide was heated at 50, 60, 70, 80, 90, 100, 110, and 120 °C for 30 min. The antibacterial activity was estimated by the agar well diffusion agar activity against *E. coli* ATCC 25922 and *Staphylococcus aureus* ATCC 25923. Next, 100 μL of the extracted bioactive peptide was transferred to three wells in a Petri dish containing a Nutrient agar medium. The non-heated bioactive peptide was used as a control sample. The percentage of antibacterial activity was calculated using the following equation: where Ac is the inhibition zone of control sample, and As is the inhibition zone of test sample. ### 2.4.2. pH Stability of the Antibacterial Peptide {#sec2dot4dot2-foods-09-00324} The lyophilized purified antibacterial peptide from *S. cerevisiae* was dissolved in distilled water at 10 mg/mL and adjusted with 1N NaOH or 1N HCl to different pH values of 2, 3, 4, 5, 6, 7, 8, 9, and 10. After incubation for 24 h at 4 °C and 25 °C, the solutions containing the samples were adjusted to pH 7.0 ± 0.02 with a 0.5 M sodium citrate buffer. The inhibition activity of the peptide was then determined using the agar well diffusion agar method against *E. coli* ATCC 25922 and *Staphylococcus aureus* ATCC 25923. After incubation for 24 h at 37 °C, the percentage of antibacterial activity was calculated \[[@B19-foods-09-00324]\]. ### 2.4.3. Molecular Weight of the Antibacterial Peptide {#sec2dot4dot3-foods-09-00324} The molecular weights of the antibacterial peptide extracted from *S. cerevisiae* were analyzed using sodium dodecyl sulphate with 15% polyacrylamide gel electrophoresis (SDS-PAGE) as described by Judd \[[@B20-foods-09-00324]\]. Then, 1 mg/mL of the antibacterial peptide and standard proteins (α-Lactalbumin 14.4 kDa, Aprotinin 6.5 kDa, Glucagon 3.8 kDa, and Insulin-A 2.5 kDa) (Promega Company, Madison, WI, USA) were dissolved in a phosphate buffer and transferred to a vertical slab chamber (10 cm × 10 cm × 0.6 mm). The gel was run at 50 mA and 50--70V for 3 h. The molecular weight of the extracted antibacterial peptide was determined after the relative mobility (Rm) of the antibacterial peptide and marker proteins were determined per the following equation: Rm = the traveled distance of the peptide or marker proteins/traveled distance of methylene blue dye 2.5. Mode of Action {#sec2dot5-foods-09-00324} ------------------- The modes of action (bacteriostatic) of the extracted antibacterial peptide from *S. cerevisiae* were assayed as described by \[[@B10-foods-09-00324]\]. The 6 log cfu/mL cultures of four indicator strains were cultivated into 100 mL of Nutrient broth (Himedia, Mumbai, India). The lyophilized purified antibacterial peptide was added to the indicator strain cultures at a final concentration of 0.01% (*w:v*). The samples and the control sample (without antibacterial peptide) were incubated at 37 °C. Indicator strain suspensions were taken at 3, 6, 12, 18, and 24 h, and the absorbance was measured by spectrophotometry (Sunny UV.7804C, Tokyo, Japan) at OD~600~. The viable bacteria cells were determined on the nutrient agar at various incubation periods \[[@B12-foods-09-00324],[@B21-foods-09-00324]\]. 2.6. Statistical Analysis {#sec2dot6-foods-09-00324} ------------------------- Statistical analyses of the different treatments cited above were conducted using the SPSS Statistics V22.0 (Statistical Package for Social Sciences, San Antonio, TX, USA). An analysis of the variance (ANOVA table) of the data was conducted and means for treatment values were analyzed (*p* ≤ 0.05) with least significant difference (LSD). Differences were considered significant at *p* ≤ 0.05. 3. Results and Discussion {#sec3-foods-09-00324} ========================= 3.1. Optimum Conditions of for Antibacterial Peptides Production {#sec3dot1-foods-09-00324} ---------------------------------------------------------------- Both gram-negative bacteria tested including *E. coli* and *Klebsiella aerogenes* were inhibited by the presence of the antibacterial peptides produced from *Saccharomyces cerevisiae* in all the conditions tested (at the four time points and four different temperatures). This was not the case when testing the other two gram-positive bacteria including *Bacillus subtilis* and *Staphylococcus aureus,* which better tolerated the presence of the antibacterial peptides produced from *Saccharomyces cerevisiae.* This could be explained in part by the presence of cell walls comprised of thick layers of peptidoglycan in the case of Gram-positive bacteria. However, Gram-negative bacteria are known to have cell walls with a thin layer of peptidoglycan. The optimum conditions for the production of active peptides from yeast were 25--30 °C for 48 h, resulting in the highest inhibition towards *E. coli* and *Klebsiella aerogenes*. At 20 °C and 35 °C, the detected antibacterial activity was negligible with no effect against the four indicator strains (*Bacillus subtilis*, *E. coli*, *Klebsiella aerogenes*, and *Staphylococcus aureus*) especially at 24, 72, and 96 h ([Table 1](#foods-09-00324-t001){ref-type="table"}). 3.2. Purification of the Antibacterial Peptide {#sec3dot2-foods-09-00324} ---------------------------------------------- The extracted yeast peptides were passed through super filtration membranes of 10 kDa and 2 kDa and then freeze-dried. For further purification of the antibacterial peptide fractions, an ÄKTA purifier system was employed. Three peaks appeared after the ÄKTA Pure treatment. Fractions of 21--22 mL (peak 2) and 23--25 mL (peak 3) did not show growth inhibition activity against the two tested bacterial strains, while fractions of 16--20 mL (peak 1) showed the highest growth inhibition ([Figure 1](#foods-09-00324-f001){ref-type="fig"}). The yield of the antibacterial peptide was 155 mg/100 mL of the culture medium. The inhibition zones were 24 and 20 mm for *E. coli* ATCC 25922 and *Staphylococcus aureus* ATCC 25923, respectively. Gram-negative bacteria (*E. coli*) appeared to be more sensitive to antibacterial peptide fractions than gram-positive (*S. aureus*) bacteria. These results were in agreement with Fakruddin et al. \[[@B13-foods-09-00324]\] who reported that Gram-negative bacteria were more sensitive to yeast peptides when compared to gram-positive bacteria. The inhibition activity of peptides increased proportionally with the α-helix of hydrophobic C-terminal peptides. This feature may be related to the composition of the amphipathic amino acids that are necessary for binding the bacterial cell membranes \[[@B19-foods-09-00324],[@B22-foods-09-00324]\]. 3.3. Characterization of the Antibacterial Peptide {#sec3dot3-foods-09-00324} -------------------------------------------------- ### 3.3.1. Thermal Stability of the Antibacterial Peptide {#sec3dot3dot1-foods-09-00324} The effect of temperature on the *S. cerevisiae* antibacterial peptide was determined ([Figure 2](#foods-09-00324-f002){ref-type="fig"}). The results showed that the antibacterial peptide from yeast was stable at different temperatures ranging from 50 to 90 °C during 30 min of treatment. Interestingly, an antibacterial activity of 93% and 95% for *E. coli* and *S. aureus* was sustained even at 100 °C during 30 min of treatment. After 120 °C for 30 min, the antibacterial activity of the peptide was 68% and 77% for *E. coli* and *S. aureus*, respectively. This thermostable property makes this antibacterial peptide suitable for use in sterilization and thermal processes. The thermal stability of this small peptide could be related to the nature and chemical structures of such peptides, including the primary protein's structure and with low molecular weight. Similar reports have shown that antibacterial peptides isolated from different microbial sources are able to persist at high temperatures without any change in the antimicrobial activity \[[@B23-foods-09-00324],[@B24-foods-09-00324]\]. ### 3.3.2. Effect of pH on the Antibacterial Peptide {#sec3dot3dot2-foods-09-00324} In order to address the pH properties including dependent and independent effects, the above fragments were estimated for antibacterial activity inhibition against two indicator strains; *E. coli* ATCC 25922 and *Staphylococcus aureus* ATCC 25923. The effects of the pH values on the stability of the antibacterial peptide from *S. cerevisiae* are shown in [Figure 3](#foods-09-00324-f003){ref-type="fig"}. An evaluation of the pH value stability revealed that the antibacterial peptide remained stable after 24 h at 4 °C and 25 °C at pH values ranging from 4.0 to 7.0. The inhibition activity of the peptide with extreme pH values 2, 3, 8, 9, and 10 against bacterial strains was also tested ([Figure 3](#foods-09-00324-f003){ref-type="fig"}). Similar properties were previously studied for active peptides produced from yeasts, which were easily inactivated by strong acidic and alkaline conditions in different media. These characteristics limit the usage of peptides in food production with acidic and alkaline food. The antibacterial activity of this peptide was evaluated at different pH values at two temperatures (4 °C and 25 °C). The produced peptide was more effective at 4 °C within a pH range from 4 to 7 against the bacterial strains tested when compared to 25 °C. There was no significant difference (p \> 0.05) between samples of *S. aureus* when tested at 4 °C and 25 °C at pH value 2, while there was a significant difference (*p* \< 0.05) between samples of *E. coli* tested under the same conditions. In contrast, a significant difference (*p* \< 0.05) between samples of *S. aureus* and *E. coli* tested at 4 °C and 25 °C at a pH value of 2 was observed. Furthermore, the analysis showed the presence of significant differences (*p* \< 0.05) between samples of *S. aureus* tested at 4 °C and 25 °C at pH value 3. We also observed a significant difference (*p* \< 0.05) between samples of *E. coli* when tested at 4 °C and 25 °C at pH 3. When comparing the two bacterial strains, we observed the absence of any significant difference (*p* \> 0.05) between samples of *S. aureus* and *E. coli* tested at 4°C and pH 3. The presence of significant differences (*p* \< 0.05) between samples of *S. aureus* tested at 4°C at pH 10 were also observed. However, no significant differences (*p* \> 0.05) between samples of *S. aureus* tested at 25 °C and *E. coli* tested at 4 °C at pH value of 10 were observed. Interestingly, the lowest inhibition (%) value was observed in *E. coli* when tested at 25 °C and at pH 10. Overall, the newly discovered produced peptide possessed high thermal stability and a wide range of pH stability when compared to other peptides produced from microorganisms (e.g., bacteriocins) as described in previous studies \[[@B25-foods-09-00324],[@B26-foods-09-00324]\]. Moreover, antibacterial peptides acting in neutral and acidic environments are expected to provide protection from many unacceptable microorganisms that grow in these environments, contaminating food and causing spoilage \[[@B27-foods-09-00324]\]. ### 3.3.3. Molecular Weight of the Peptide {#sec3dot3dot3-foods-09-00324} The purified antibacterial peptide from active fractions (peak1) was analyzed using SDS-PAGE and showed a single band. The molecular weight of the antibacterial peptide, as determined by relative mobility, was approximately 9770 Da ([Figure 4](#foods-09-00324-f004){ref-type="fig"}), which is similar to the small molecular weight of other isolated peptides from *Klebsiella pneumonia,* as described in previous studies \[[@B28-foods-09-00324]\]. Thus, our results strongly suggest that peak 1 (9770Da) correspond to this peptide and might match the antibacterial activity produced by *S. cerevisiae* and thus be responsible for the bioactive activity shown against the different bacterial strains tested. In this sense, to better understand the role of molecular weight distribution in the inhibition of antibacterial activity of brewer's yeast, a fraction analysis using ultrafiltration with 10 kDa cutoff membranes was performed. The results showed that 3--10 kDa fractions were fundamentally comprised of smaller peptides with biological activity, which is in agreement with past studies that indicated that antibacterial peptides are small peptides \[[@B9-foods-09-00324]\]. 3.4. Mode of Action {#sec3dot4-foods-09-00324} ------------------- The antibacterial peptide effect of *S. cerevisiae* on cell viability (kill time) from four indicator strains is shown in [Figure 5](#foods-09-00324-f005){ref-type="fig"}. The antibacterial peptide reduced the viability of target bacteria compared to the control sample. The antibacterial peptide's efficacy depended on both the concentration of added peptide and exposure time. Additionally, the movement of small peptide and their spread during agar well diffusion appeared 3 h following the addition of the antibacterial peptide with 5.8, 5.5, 5.6, and 5.8 log (cfu/mL) reduction of *B. subtilis*, *E. coli*, *K. aerogenes,* and *S. aureus*, respectively. The statistical analysis of log (cfu/mL) reduction for each bacteria strain was estimated at interval times of 3, 6, 12, 18, and 24 h. The result showed that the antibacterial peptide effect on decreasing the viable cell counts was significant (*p* \< 0.05) between the control samples and all four bacterial strains among the five interval times tested. In contrast, there was no significant difference (*p* \> 0.05) between either Gram-positive strains or Gram-negative strains. In addition, the peptide's inhibition effect on Gram-negative strains was highly significant (*p* \> 0.05) when compared with Gram-positive strains. After 24 h of incubation, the peptide's inhibition effect on Gram-negative strains was high compared with that of Gram-positive strains. The antibacterial peptide caused a decrease in the viable cell counts of gram-negative strains ranging from 2 to 2.3 log. units along the evaluated times in comparison to gram-positive strains which ranged from 1.5 to 1.8 log. units. The kill-time of this peptide was in agreement with that from earlier reports \[[@B29-foods-09-00324],[@B30-foods-09-00324]\]. The mode of action of antimicrobial peptides fundamentally depends on the reaction of bioactive peptides with the membrane of bacteria cells and the cells' internal composition \[[@B31-foods-09-00324]\]. Generally, the antimicrobial peptides were effective due to the electrostatic reaction with the cell membranes. In order to understand the mechanism behind antimicrobial peptides, the results of various methods have suggested that adsorption of bioactive peptides will occur on the bacterial cell membrane, leading to complete damage to the membrane. For example, the brave straw model, aggregate model, carpet model, and toroid pore model are critically considered models of bioactive peptides as antibacterial compounds \[[@B27-foods-09-00324],[@B32-foods-09-00324]\]. 4. Conclusions {#sec4-foods-09-00324} ============== *S. cerevisiae* belongs to the eukaryotic kingdom is nonpathogenic, and due to its long history of use in the production of consumable products such as ethanol, many baked products, and pastries, it has been classified as a generally regarded as safe organism (GRAS). In this study, antibacterial peptide was produced and isolated from *Saccharomyces cerevisiae* (Baker's yeast) by an ultrafiltration process (two membranes with cut-offs 2 and 10 kDa) and purified using the ÄKTA Pure 25 system. The antibacterial peptide activity was then characterized and studied against four bacterial strains. The results showed that the peptide produced by *Saccharomyces cerevisiae* had a molecular weight of 9.77 kDa and exerted inhibition activity against both Gram-negative and Gram-positive bacteria. The produced peptide was more effective at 4 °C within a pH range of 4-7 against the bacterial strains tested when compared to 25 °C, while the lowest inhibition (%) was observed in *E. coli* when tested at 25 °C and at a pH value of 10. In addition, the peptide was thermostable and steady with pH values ranging from 4--7, which is a very important aspect in food production for sterilization and thermal processes. The isolated antibacterial peptide demonstrated its potential as a bio-preservative in food manufacturing. Although the current study isolated a peptide containing a novel bioactive compound from *Saccharomyces cerevisiae*, additional research regarding the amino acid sequence and structure of this antibacterial peptide is warranted. Investigation, S.T.G.A.-s.; designing and planning the experiments, A.B.A.; Supervision, A.J.A.A.-M.; Methodology, A.K.N.; Writing-review & editing, N.L.; Writing original draft, S.A.I. All authors have read and agreed to the published version of the manuscript. This research received no external funding. The authors declare no conflicts of interest. ![Chromatogram of gel filtration for antibacterial peptides from *Saccharomyces cerevisiae* by ÄKTA Pure 25 using Superdex 200 10/300 GL. (**A**) Inhibition zones of *E. coli* by peak1, (**B**) non-inhibition zone of *E. coli* by peak2 and peak3.](foods-09-00324-g001){#foods-09-00324-f001} ![The thermal stability of the antibacterial peptide production from *Saccharomyces cerevisiae*.](foods-09-00324-g002){#foods-09-00324-f002} ![Stability of antibacterial peptide production from *Saccharomyces cerevisiae* under different pH and temperature conditions.](foods-09-00324-g003){#foods-09-00324-f003} ###### The molecular weight of antibacterial peptide production from *Saccharomyces cerevisiae* was determined by electrophoresis method. (**A**) Sodium dodecylsulfate polyacrylamide gel electrophoresis of standard proteins and the antibacterial peptide. (**B**) Relative mobility of standard proteins and the antibacterial peptide. ![](foods-09-00324-g004a) ![](foods-09-00324-g004b) ![The mode of action of the antibacterial peptide from *Saccharomyces cerevisiae* against the four indicator bacteria strains.](foods-09-00324-g005){#foods-09-00324-f005} foods-09-00324-t001_Table 1 ###### The optimum conditions for antibacterial peptides produced from Saccharomyces *cerevisiae.* Strains 24 h 48 h 72 h 96 h ------------------------------------ ------ ------ ------ ------ ---- ----- ----- ----- ---- ---- ---- ---- ---- ---- ---- ---- *Bacillus subtilis* ATCC 23857 \- \- \+ \+ \+ \+ ++ ++ \- \- \+ \+ \- \- \+ \- *Escherichia coli* ATCC 25922 \+ \+ ++ \+ ++ +++ +++ ++ \+ \+ ++ \+ \+ \+ \+ \- *Klebsiella aerogenes* ATCC 13048 \+ \+ ++ ++ ++ +++ +++ +++ \+ ++ ++ ++ \+ \+ ++ \+ *Staphylococcus aureus* ATCC 25923 \- \- \+ \+ \+ \+ ++ \+ \- \- \+ \- \- \- \+ \- Diameter of inhibition zone (mm): +++: 16--20; ++: 12--16; +: 8--12; −:no inhibitory activity (including the 6mm diameter of each well).
# This Source Code Form is subject to the terms of the Mozilla Public # License, v. 2.0. If a copy of the MPL was not distributed with this # file, You can obtain one at http://mozilla.org/MPL/2.0/. # Lock column values default=privzeto user=spremenjeno locked=zaklenjeno # Type column values string=niz znakov int=celo število bool=logična vrednost # Preference prompts # %S is replaced by one of the type column values above new_title=Nova vrednost %S new_prompt=Vnesite ime nastavitve modify_title=Vnos vrednosti %S nan_title=Neveljavna vrednost nan_text=Vneseno besedilo ni številka.
Influence of spontaneous or induced labor on delivering the macrosomic fetus. Fetal macrosomia is a known intrapartum risk factor for fetal injury and maternal morbidity. The purpose of this study was to review our experience with macrosomic fetuses in nondiabetic pregnancies and compare perinatal outcomes between those whose labor had been spontaneous or induced. Between January 1989 and December 1991, the 186 pregnancies of infants with birthweights greater than 4000 g (4001 to 5131 g) underwent labor that had been induced (46) or spontaneous (140). Cesarean delivery was more common after induced than spontaneous labor (11 [23.9%] vs 14 [10.0%]; P < 0.03) regardless of parity or gestational age. Frequencies of shoulder dystocia, 1-minute Apgar scores less than 7, and abnormal umbilical blood gas determinations were not different between the two groups. We conclude that spontaneous rather than induced labor is associated with a lower chance of cesarean delivery among those fetuses with birthweights 4000 g or more.
Q: How to access a Joomla 2.5 page without log in I have a website which direct the users to a Joomla 2.5 page, but I would like to keep my content (just an article) private and to be accessed just by authorized users (by IP) without their log in. I have already searched a plugin, but I just found solutions with log in. Can you suggest me a solution? A: I haven't seen any plugins that support such a feature but one method (not the most efficient one) would be to edit the template index.php file like so: <?php $allow = array("IP 1", "IP 2", "IP 3"); //allowed IPs if(in_array($_SERVER['REMOTE_ADDR'], $allow) && in_array($_SERVER["HTTP_X_FORWARDED_FOR"], $allow)) { // all your template code in here } else { //redirect if IP isn't allowed header("Location: http://google.co.uk"); exit(); } ?> I haven't tested the code above so please bare in mind it may not be 100% You may actually be interested in this Joomla Plugin. http://www.yireo.com/software/joomla-extensions/auto-login-ip/packages Just saw it whilst writing this answer. It automatically logs a user in from a specific or range of IP addresses. There is a free version, however it doesn't come with onsite or email support which shouldn't be a problem. Once installed, simply restrict your articles/content to registered users only. Hope this helps
Mixpanel's YC application in 2009 - suhail https://medium.com/@suhaild/mixpanels-y-combinator-application-in-2009-34b5d30dbc12 ====== pilingual “We currently already have a alpha build with a variety of clients saying they will or have integrated including some YCombinator companies: Posterous, TicketStumbler, and HeyZap.” Brilliant.
Likes: The NLMO Project, pancakes, blackberries, authoritative controlDislikes: Maemi bothering her, rude people or people who get in the way More Info: Jiko is a very mysterious fairy that is a part of the NLMO Project. She seems to always be planning things in her mind and is very cunning. She knows everything there is to know about Maemi and the others.
Control AND Autonomy by johanhburger · Published March 24, 2013 · Updated November 20, 2016 Henri Fayol has elevated control within the world of business to the level of one of the functions of management. One can also safely say that control is important with the fields of life in general, be it in business, government, the military, etc. We tend to put in place mechanisms to provide guidelines, rules and regulations for everything. These mechanisms are useful to provide guidance for the what’s, the haves and the whens. The advantage of control is undeniable: There is no argument as to what is required. The output and input is standardized. There is clarity on what should be done by whom and by when, relative to what standards. Accountability is clear. Transparency becomes easier. One can therefore state that control is good and has value. Noel Tichy wrote a very interesting book on the life of Jack Welsch in the early 1990’s, i.e. “Control your destiny or someone else will.” The reality is that one cannot live without it – but we do need to be circumspect about the nature of control we employ. The absence of control is dangerous, i.e. chaos, anarchy, and lawlessness. The absence of control for individuals can create the following negative environment: Stress due to uncertainty as to what is required. Those living an unhealthy lifestyle easily become unfit, unhealthy, fat and miserable. Corruption becomes a very real danger. The absence of control for organizations can create the following negative environment: Chaos. No direction. No synergy. No performance. So, it is fair to say that the real driver of control mechanisms is that it protects the institution and the person driving the control. However, there are always unintended consequences. With the emphasis on control for the sake of controlling people, people can become pedantic and develop a CYA attitude. It also stifles innovation and creativity. My personal philosophy is that we need just enough control to avoid chaos and mayhem. We need to embrace autonomy. We need to embrace and use the absence of detail control. We need to embrace mission control. The German military developed this philosophy more than a century ago. It means that if we understand the purpose or the intent of the commanding officer, we are free to change our orders should we deem it necessary to achieve the commander’s intent. This does require that we trust our people. We should educate and grow them to live and thrive in the absence of control. This is what real empowerment means! Tom Peters wrote a great book in the 1980’s on chaos: “Thriving on Chaos”. We should do ourselves a favour and revisit the central tenets of this book. The absence of control and adopting a culture of autonomy does put a lot of pressure on the organization and on the leaders and the managers of the company. Companies that have succeeded over a period of time to develop an environment in which control was tempered by autonomy, include SABMiller. Should you ask the old dogs as to why they were so successful in taking SABMiller abroad, they will tell you that they had senior managers and people who were able to think for themselves and adapt according to the prevalent situation. Autonomy does not mean the absence of control – it means the ability to adjust strategies and tactics to fit in with the changing conditions in the market and the business. It means the ability to utilise appropriate control! For this, the following needs to be clear: The objectives/outcomes. The broad parameters within which business will be conducted. The purpose of the organization. I have already stated that we should grow and educate our people. More specifically, we should teach our people to think strategically and critically. We should also enhance their systemic thinking skills, their ability to see the big picture. From a culture perspective, Kim Cameron and Robert E. Quinn developed the Competing Values Framework of organizational culture. Two of the quadrants are seen to be diametrically opposed, i.e. the Adhocracy Culture quadrant (innovation driven) and the Hierarchy Culture quadrant (control driven). These 2 quadrants are seen by managers as to be mutually exclusive. We need to change the mindset of our managers so that they will embrace both! There is an old military saying: No plan survives first contact with the enemy. There is also an old principle of war, i.e. Security. Applying the principle of security means that we plan for a situation in which there will be chaos and mayhem. We need to grow the skills of our people to replan according to the present situation, to adapt to the new situation. By not doing this, we transgress the principle of security! With good skills, people do not need to go higher up when conditions have changed and new orders are needed. When they understand the purpose, they can change their actions at ground level. I recently heard that control mechanisms are guidelines for the wise and directives for fools. I could not have stated it better!
THE average car dealership made a profit of £3,800 in July, says ASE. Figures from company show that despite the rise, profits were down £2,600 compared to July 2013. ASE chairman Mike Jones said while these results are small in comparison to the quarter end results, they are likely to mark the end of the end of the significant growth seen in dealership return on sales performance. He said: ‘In financial terms we have now seen the total dealership rolling 12 month profit broadly static for the past five months at around £225,000. This would appear to be the new “norm” for average dealer returns and we are likely to see a continued fall in the return on sales percentage as dealers process increased registrations whilst still making the same profit levels. ‘As expected, whilst used vehicle return on investment has increased slightly during the month, we have seen a rise in used car stand in values. This represents a combination of the disposal of low value vehicles traded in during June, the general rise in used vehicle prices and the increased volume of self registered vehicles. This is a trend we will be watching closely to ensure dealers’ stock profiles aren’t skewed too much towards self registrations.’ In aftersales, ASE says profits are ‘steady’. Jones added: ‘August typically produces the largest loss of any month in the motor trade calendar and we will be watching the results closely to gain an insight into the extent which the current healthy registration levels are being forced with dealers counting the cost at a later date.’
Image : Drew Angerer ( Getty Images ) Whenever Trump is sending out massive amounts of tweets— which usually include retweets of far-right-wing bloggers praising him and calling for him to play Maverick in the reboot of Top Gun—you know that Trump is losing. This is what he’s done his entire presidency. So on the day that a vote is expected to call for his impeachment, Trump has already sent out several nervous tweets although he’s acting like he’s as cool as a polar bear’s toenails. Trump’s crazy tweet spree began last night after he sent Speaker of the House and Slayer of Presidents Nancy Pelosi a six-page letter that read like a fuccboi’s latest diary entry. Of course, Trump praised himself for sending the passive-aggressive, sternly worded letter. If you’re wondering why Trump is bringing up the whole spying thing again, well it isn’t just because he loves to beat a dead horse and then drain its blood and drink it. On Tuesday, in an extremely unusual move under a normal president, the Foreign Intelligence Surveillance Court—a secret federal court that approves surveillance on spies—came out to publicly rebuke the FBI’s handling of Trump associates during his 2016 campaign. Surely this has nothing to do with Trump’s other tactic that he deploys frequently when he realizes that he’s in trouble. Surely this move to say that the FBI spied on Trump’s campaign in 2016 isn’t another ploy by the president of the United States to weaken the argument against his impeachment by strengthening the argument that America is against him? This couldn’t be a low-level deflection tactic, could it? G/O Media may get a commission First Bag Free Let’s continue looking at Trump’s nervous tweets to see if we can find a pattern. Well, that didn’t take long. The first tweet implies that former FBI Director James Comey used illegal tactics (which totally weren’t illegal) to try and take Trump down and in the followup tweet, Trump shows the bridge made from Cheetos dust to connect the phony spygate to impeachment. Sidenote: Whenever Trump uses all caps or exclamation points (I’m not worried!) he’s totally lying. And when all else fails, Trump, whenever he feels his back is up against the wall, always falls back on praise and adoration. It’s the main reason that he still rallies despite having been given the job by Russian diplomats three years ago. Early Wednesday morning, the day House votes to impeach his ass, Trump began his cottonmouth tweeting all over again: Of course, no diarrhea tweetstorm of ineptitude would be complete if the president didn’t send a few “sad guy in the White House” tweets to drum up sympathy. So what can we expect today? More debates. Debates, debates and debates. Then, most likely this evening, Trump will be handed the magical javelin of impeachment as Democrats run the House and have enough votes to impeach his ass. And if you don’t think any of this is bothering Trump, listen to Trump himself talking about a possible impeachment of then-President Obama in 2014 (most likely for being a black man and wearing a tan suit in office). Yeah, ol’ anus mouth is totally about to shit himself.
I would recommend nothing short of this company. HID's, this is what they do, day in and day out, nothing else. Me personally, I use companies that specialize on one thing so I know they are focused on what I need. Tons of cool stuff on the website for complete retrofits to kits. My profession has me working with this type of lamp system on a much larger scale (upwards of 15000 watts) so I understand the entire premise behind it. Components are key here if you want to do it right, and for automotive aftermarket I have found nobody that does it as well as these guys. Either way read about Morimoto on google, you'll see the reviews are tops and they come with a 5 year warranty to boot.....
Chinese workers are taking industrial action. A generational shift and new expectations among workers have changed labour relations. The government looks for a quick fix, to little avail, and as usual, sends in the police. Shanghai (AsiaNews) – Fresh strikes have broken out in mainland China, this time in the affluent Yangtze River Delta, where hundreds of workers clashed with police on Monday morning trying to forcibly stop their sit-in outside a rubber factory near Shanghai. Meanwhile, a strike at a Honda-affiliated plant in the city of Foshan looks set to continue for a third day. The strike, involving more than 250 of the 300 workers at the Foshan Fengfu Autoparts plant, brought in heavy police deployment. Demonstrators said they were inspired by the two-week strike by fellow workers in the manufacturing sector, which yielded a 500-yuan pay raise. Workers, in addition to this raise, want their union representative removed, saying that he is management and thus cannot be a trade union official. In China, trade unions exist but they are under tight party, hence, government control. Geoffrey Crothall, a spokesman for the Hong Kong-based group China Labour Bulletin, said the presence of police and clashes with workers have become part of the ongoing social confrontation. “There has definitely been an upsurge in worker discontent and activism this year," he said. "It isn't just in southern China. We are seeing it in central provinces and now in the Yangtze River Delta. And it is not just the young—middle-aged workers are now beginning to say ‘enough is enough, give us our due’." He explained that worker activism tended to come in waves. There was a big surge in 2008 but things went relatively quiet last year due to the economic downturn. “As things begin to improve and orders are now starting to pick up again, workers are quite rightly wanting their fair share of the profits. As long as workers are being paid ridiculously low wages that can't even provide basic subsistence living costs, then they are going to start standing up for themselves.” The central government, which fears social protests as the only force with the potential to overthrow the Communist Party, has dealt with the problem with half-hearted measures. For instance, for the past four weeks the People’s Daily has published blistering articles against company managers, urging them to respond positively to workers’ just demands. However, the authorities do not allow free trade unions and usually crack down on anyone trying to oppose companies’ excessive power. Following events in Honda and Foxconn (where 13 employees committed suicide), things appear to be getting worse. Under the circumstances, the government has decided to use force. What is more, in addition to police deployment in plants affected by strikes, reports are coming in of violence inside factories. Employees at Taiwan-owned KOK International in Kunshan (Jiangsu) have complained for example about indiscriminate violence against them by so-called “security agents”, involved in trying to stop protests inside the plant (pictured).
Some closure has come at last for the family of an alleged victim of Bruce McArthur, as a chapter ends in the sprawling investigation into the accused serial killer. Almost six months to the day since one of the biggest arrests in Toronto’s history, police announced they have at last found the remains of Majeed Kayhan, 58, who detectives believe was killed by McArthur in 2012 — the third in an alleged string of eight homicides. The remains of Majeed “Hamid” Kayhan, a man believed to have been killed by alleged serial killer Bruce McArthur, were found during a nine-day excavation this month at a Leaside home linked to McArthur. (Photo Supplied) Kayhan was the sole victim whose remains had not been recovered during the exhaustive investigation. The remains of the seven other men were recovered months ago, inside large planters at a Leaside home where McArthur worked for years as a landscaper. Earlier this month, investigators and canine units began a comprehensive excavation of a forested ravine behind the Mallory Cres. home where those planters were seized. They recovered human remains almost every day of the nine-day dig, which ended last week. Forensic testing has since linked some of those remains to Kayhan, acting Insp. Hank Idsinga confirmed at a news conference Friday. While testing continues on all remains recovered to date, there’sno evidence to suggest there are any other remains to be found elsewhere, he said. Article Continued Below “Right now I have nothing to indicate there’s anything more than the eight victims,” the lead homicide detective said. Click to expand “I hope that it remains at just eight victims.” Idsinga said investigators have “some ideas” why Kayhan’s remains were found in the ravine while the others were found in the planters, but he would not reveal them. McArthur was charged with first-degree murder in Kayhan’s death in January, but the discovery of his remains answered key questions for his family. “They are very grateful. They are very thankful for the closure, and they’re very angry,” Idsinga said. “They’re angry, I think, at the right person, which is Mr. McArthur.” McArthur, 66, is charged with first-degree murder in the deaths of Kayhan, Selim Esen, Andrew Kinsman, Dean Lisowick, Soroush Mahmudi, Skandaraj Navaratnam, Abdulbasir Faizi and Kirushnakumar Kanagaratnam. The men all had links to Toronto’s Gay Village, and their deaths are alleged to have occurred between 2010 and 2017. Idsinga’s suggestion there may be no more victims will bring reassurance to Toronto’s LGBTQ community, said Haran Vijayanathan, executive director of the Alliance for South Asian AIDS Prevention (ASAAP). “I certainly am relieved, and I think we’ll find that once the community finds out today that there’s a sense of relief,” Vijayanathan said. In the months since McArthur’s arrest, Toronto police have faced sharp criticism over their handling of prior missing persons investigations, including allegations officers downplayed long-held community fears of a serial killer in Toronto’s Gay Village. Kayhan had been among the three men whose disappearances were probed in an 18-month investigation called Project Houston, which ended with no arrests. Vijayanathan said the independent probe, alongside the ongoing internal Toronto police review of missing persons investigations, will help address outstanding concerns around racism, homophobia, transphobia and classism within policing. “When we look at both (reviews) and sit down and have a conversation, then we can really look at how we build a better system,” Vijayanathan said. The conclusion of the excavation at Mallory Cres. marks the end of the resource- and time-intensive property searches that have taken place at approximately 100 locations linked to McArthur through his landscaping business. That includes an exacting, four-month search of McArthur’s Thorncliffe Park apartment, which helped make the case the largest forensic examination in Toronto police history. While recent media coverage of the latest excavation has generated new tips, they are unlikely to lead to more searches, Idsinga said. Asked if the investigation had come to a turning point, Idsinga said he would describe it as “progressing,” with police turning their focus to preparations for McArthur’s trial. Work also continues on reviews of cold cases and outstanding missing persons investigations dating back to the 1970s and 1980s. To date, police have found no evidence linking McArthur to any of the cases under review. The discovery of Kayhan’s remains has brought closure to investigators, alongside mixed emotions. “You’re happy and content that you’ve found what you’ve found, and brought to a resolution some very difficult questions and gotten some answers for the families,” Idsinga said. “But I think it’s very hard, under the circumstances and the tragedy of it all, to be happy.” McArthur is due in court Monday. With files from Jenna Moon Wendy Gillis is a Toronto-based reporter covering crime and policing. Reach her by email at wgillis@thestar.ca or follow her on Twitter: @wendygillis
Q: Model validation using db value in Range I have two tables, Campaign and Advert with a one to many relationship. During Advert creation, the user selects a pre-defined Campaign to which the Advert will belong. A Campaign has an RRP money field and the Advert has a SalePrice money field. What I'm after is a way to ensure that the submitted Advert.SalePrice is >= the chosen Campaigns RRP. Can this be done in the model? Something along the lines of this in the Advert_Validation? Is it even possible to fill the values of a Range with method calls? [Range(0, getCampaignRRP(), ErrorMessage = "Value must be equal or greater than the Campaign RRP")] public double SalePrice { get; set; } Or do I need to check at the Controller level? All help appreciated! Thanks all, Jay A: You can use the new Remote attribute. Basically it calls an action and returns true or false. Here's a link to an example.
var f = function(){ //定义测试模块 module("animation"); //开始单元测试 test('正常的测试弹性动画', function() { stop(); var _bounce; var _box = document.getElementById('id-bounce0'); var options = { from: { offset: 100, velocity: 100 }, acceleration:100, onupdate: function(offset){ _box.style.left = offset.offset + 'px'; ok(true,"成功调用"+offset.offset); }, onstop: function(){ _bounce = nej.ut._$$AnimBounce._$recycle(_bounce); start(); } } _bounce = nej.ut._$$AnimBounce._$allocate(options); _bounce._$play(); }); test('正常的减速动画', function() { stop(); var _decelerate; var _box = document.getElementById('id-bounce1'); var options = { from:{ offset: 100, velocity: 10 }, onupdate: function(offset){ ok(true,"成功调用"+offset.offset); _box.style.left = offset.offset + 'px'; }, onstop: function(){ _decelerate = nej.ut._$$AnimDecelerate._$recycle(_decelerate); start(); } } _decelerate = nej.ut._$$AnimDecelerate._$allocate(options); _decelerate._$play(); }); test('正常的先快后慢动画', function() { stop(); var _easeout; var _box = document.getElementById('id-bounce2'); var options = { from: { offset: 100, velocity: 10 }, to: { offset:200 }, duration:1000, onupdate: function(offset){ ok(true,"成功调用"+offset.offset); _box.style.left = offset.offset + 'px'; }, onstop: function(){ _easeout = nej.ut._$$AnimEaseOut._$recycle(_easeout); start(); } } _easeout = nej.ut._$$AnimEaseOut._$allocate(options); _easeout._$play(); }); test('正常的线性动画', function() { stop(); var _linear; var _box = document.getElementById('id-bounce3'); var options = { from: { offset: 100, velocity: 10 }, to: { offset:200 }, duration:1000, onupdate: function(offset){ ok(true,"成功调用"+offset.offset); _box.style.left = offset.offset + 'px'; }, onstop: function(){ _linear = nej.ut._$$AnimLinear._$recycle(_linear); start(); } } _linear = nej.ut._$$AnimLinear._$allocate(options); _linear._$play(); }); test('正常的先慢后快动画', function() { stop(); var _easein; var _box = document.getElementById('id-bounce4'); var options = { from:{ offset: 100, velocity: 10 }, to: { offset:200 }, duration:1000, onupdate: function(offset){ ok(true,"成功调用"+offset.offset); _box.style.left = offset.offset + 'px'; }, onstop: function(){ _easein = nej.ut._$$AnimEaseIn._$recycle(_easein); start(); } } _easein = nej.ut._$$AnimEaseIn._$allocate(options); _easein._$play(); }); test('先慢后快再慢动画实现文件', function() { stop(); var _easeinout; var _box = document.getElementById('id-bounce5'); var options = { from:{ offset: 100, velocity: 10 }, to: { offset:200 }, duration:1000, onupdate: function(offset){ ok(true,"成功调用"+offset.offset); _box.style.left = offset.offset + 'px'; }, onstop: function(){ _easeinout = nej.ut._$$AnimEaseInOut._$recycle(_easeinout); start(); } } _easeinout = nej.ut._$$AnimEaseInOut._$allocate(options); _easeinout._$play(); }); } module('依赖模块'); test('define',function(){expect(0); define('{pro}animationTest.js', ['{lib}util/animation/bounce.js','{lib}util/animation/linear.js','{lib}util/animation/decelerate.js', '{lib}util/animation/easeout.js','{lib}util/animation/easein.js','{lib}util/animation/easeinout.js','{pro}log.js'],f); });
/** * Created by 不动的推动者 on 2018/4/30. */ /***** * 获取数据get + 对应路由名称 * 向后台传数据 store + 对应路由名称 * 驼峰命名 * *****/ import { fetch } from "./fetch"; //引用fetch.js import api from './url'; //引用url.js //查看用户 export const lookOption = (username,password,captcha) => fetch({//lookOption是你要调用接口的名字,issuer,userId是传进来的参数 //api.Hallowmas 引用url.js里面的数据 url: api.Hallowmas, method: 'get',//请求方法 params:{ // username,password,captcha//参数 } }); //获取公司 export const getCompany = (date,audit) => fetch({ url:'', method:'', params:{ date, audit } }); //订单应收获取数据 export const getOrderReceivable = ()=>fetch({ url: api.commonLick, method: 'get', params: { } }); //cols title export const getCols = ()=>fetch({ url: api.cols, method: 'get', params: { } }); //审核 批量审核audit export const audit = (data)=>fetch({ url: '', methods: 'get', params: { data: data } }) //获取验证码 export const getcaptchas = () => fetch('', {},'POST'); //简写 //有新接口的时候像上面那样再来一次 // //修改昵称接口 // export function userID(name){ // return fetch({ // url:api.myself_name, // method:"put", // data:{ // nickname:name // } // }) // } // // // //取消转发赞踩接口 // export function cancelForward(articleId,type){ // return fetch({ // url:api.detail_article+articleId+"/forwarded_impress", // method:"delete", // params:{ // type:type // } // }) // } //导入 export const leadingIn = () => fetch('',{},'POST')
NOT RECOMMENDED FOR FULL-TEXT PUBLICATION File Name: 12a0985n.06 No. 11-5902 UNITED STATES COURT OF APPEALS FILED FOR THE SIXTH CIRCUIT Sep 07, 2012 DEBORAH S. HUNT, Clerk NATASHA BROOKS; ETHEL BROOKS, dba ) Full Line Maintenance, dba Plumline Dining, ) Tots and Volunteer Temp, ) ) Plaintiffs, ) ) ISAAC BROOKS, Full Line Maintenance, dba ) Plumline Dining, dba Tots and Volunteer Temp, ) ON APPEAL FROM THE UNITED ) STATES DISTRICT COURT FOR Plaintiff-Appellant, ) THE WESTERN DISTRICT OF ) TENNESSEE v. ) ) WHIRLPOOL CORPORATION; MAYTAG ) CORPORATION; JANICE PAGE ) HOLLINGSWORTH; GARY ) HOLLINGSWORTH, ) ) Defendants-Appellees. ) ) Before: MARTIN and WHITE, Circuit Judges; ECONOMUS, District Judge.* PER CURIAM. Isaac Brooks, a pro se Tennessee resident, appeals a district court judgment dismissing his civil action alleging violations of the Racketeer Influenced and Corrupt Organizations Act (RICO), 18 U.S.C. § 1961, et seq.; negligent supervision; negligent retention; and breach of contract. * The Honorable Peter C. Economus, United States Senior District Judge for the Northern District of Ohio, sitting by designation. No. 11-5902 -2- In December 2004, Brooks, doing business as Temp Owned Temporary Service (TOTS), a Tennessee Corporation doing business in Madison County, Tennessee, entered into a service agreement with Maytag, which was later purchased by Whirlpool Corporation. In 2010, Brooks, doing business as TOTS, filed a civil action against Whirlpool, Gary Hollingsworth, and Janice Hollingsworth (husband and wife). Brooks alleged that from 1993 to 2008, he was forced to pay more than one million dollars to Gary Hollingsworth in kickbacks, which had been demanded by Janice Hollingsworth, who was a Whirlpool Human Resource Manager, in order to protect Brooks’s business relationship. Brooks’s amended complaint alleged conspiracy and RICO violations by the Hollingsworths; negligent supervision and retention by Whirlpool; and breach of contract. The defendants filed a motion to dismiss the complaint on res judicata grounds. In 2008, “T.O.T.S., Inc.” had filed a complaint against Whirlpool and Janice Hollingsworth in the Circuit Court of Madison County, Tennessee, alleging a breach of contract and sought to recover improper payments. The state court dismissed the action finding that T.O.T.S., Inc. had its corporate charter revoked in 1998, prior to entering into the service agreement with Whirlpool in 2004. As a result, T.O.T.S., Inc. could not state a claim for breach of contract because it was conducting business in violation of state law at the time the contract was allegedly formed. The state court also denied a request to substitute Brooks as a “real party in interest.” T.O.T.S., Inc. appealed and the Tennessee Court of Appeals affirmed the trial court’s decision. T.O.T.S. v. Whirlpool Corp., No. W2009- 01855-COA-R3-CV, 2009 WL 4878585, at *4 (Tenn. Ct. App. Dec. 18, 2009). Brooks filed a response to the defendants’ motion to dismiss asserting that res judicata was not applicable to the case. After consideration, the district court concluded that Brooks’s federal complaint was barred by the doctrine of res judicata and dismissed the case. The doctrine of res judicata includes two kinds of preclusion: “issue preclusion” and “claim preclusion.” Migra v. Warren City Sch. Dist. Bd. of Educ., 465 U.S. 75, 77 n.1 (1984). Issue preclusion is when a judgment forecloses “relitigation of a matter that has been litigated and No. 11-5902 -3- decided.” Id. “Claim preclusion refers to the effect of a judgment in foreclosing litigation of a matter that never has been litigated, because of a determination that it should have been advanced in an earlier suit.” Id. Under Tennessee law, a party asserting a res judicata defense “must demonstrate (1) that a court of competent jurisdiction rendered the prior judgment, (2) that the prior judgment was final and on the merits, (3) that both proceedings involved the same parties or their privies, and (4) that both proceedings involved the same cause of action.” Young v. Barrow, 130 S.W.3d 59, 64 (Tenn. Ct. App. 2003). The district court’s judgment is reviewed de novo. Kane v. Magna Mixer Co., 71 F.3d 555, 560 (6th Cir. 1995). On appeal, Brooks challenges the district court’s findings as to the second, third, and fourth prongs of Tennessee’s four-part res judicata test. With respect to prong two, Brooks asserts that his state court suit was dismissed because T.O.T.S., Inc. lacked standing to bring the action. He asserts that a dismissal for lack of standing is a jurisdictional ruling and does not operate as a judgment “on the merits.” Brooks’s argument on this point is unavailing because the state court’s order granting the defendant’s motion to dismiss, and dismissing the case with prejudice, stated that “the Court finds that the Plaintiff cannot state a cause of action for breach of contract,” not that the case was being dismissed for lack of standing. Accordingly, the district court properly concluded that the state court’s dismissal was an adjudication “on the merits” pursuant to state law. See Dyer v. Intera Corp., 870 F.2d 1063, 1067 (6th Cir. 1989). With respect to prong three, Brooks asserts that the state cause of action does not involve the same parties as the federal cause of action and that he is not a privy of T.O.T.S., Inc. “In the context of both res judicata and collateral estoppel, the concept of privity relates to the subject matter of the litigation.” State ex rel. Cihlar v. Crawford, 39 S.W.3d 172, 180 (Tenn. Ct. App. 2000) (citations No. 11-5902 -4- omitted). “Privity connotes an identity of interest, that is, a mutual or successive interest to the same rights.” Id. (citations omitted). The district court did not err in concluding that Brooks was either the same party or a privy to the state cause of action. Brooks’s own affidavit, filed in the state court action, avers that T.O.T.S., Inc. began as a corporation of which he was the original founder and that he continued to do business as the same entity once the corporate charter expired. Brooks’s allegations as a sole proprietor of TOTS in the federal cause of action are the same allegations that he made on behalf of T.O.T.S., Inc. in the state cause of action. Therefore, Brooks is a privy to the subject matter of the state litigation. Finally, with respect to prong four, Brooks asserts that the federal case is not the same cause of action as the state case because the federal case covers a different time frame, names Gary Hollingsworth as a defendant, and alleges a RICO violation. This argument is unavailing. Regarding the time frame, Brooks’s federal action alleged no facts that occurred after February 2008, when he filed the state action. Regarding different claims and defendants, Brooks could have named Gary Hollingsworth as a defendant or asserted a RICO violation in his state court action, but failed to do so. Res judicata prohibits re-litigation of all claims that were actually litigated as well as claims that should have been litigated in a prior action. See Kane, 71 F.3d at 560. The district court’s judgment is affirmed.
Q: Laurent series of $\sin z/(1 - \cos z)$ I have trouble solving this exercise: find the first three terms of the Laurent series of $\sin z/(1 - \cos z)$ centered at $z=0$. I have found the first two. I proved that at $z=0$ we have a first order pole and the first one I calculated the residue. I also thought that the second term is zero because this function is odd. Now I have problems with the third. Someone can help me? A: You know that laurent series of $sin(z) = z - \frac{z^3}{6} + \frac{z^5}{120} + O (z^{7})$. Then, the laurent series of $ 1-cos(z)= \frac{z^2}{2}-\frac{z^4}{24}+O(z^{6})$ Overall you have $\frac{z - \frac{z^3}{6} + \frac{z^5}{120} + O (z^{7})}{\frac{z^2}{2}-\frac{z^4}{24}+O(z^{6})}$. Now look at the denominator: $(\frac{z^2}{2}-\frac{z^4}{24}+\frac{z^6}{720}+O(z^8))^{-1}=(\frac{z^2}{2})^{-1}(1-\frac{z^2}{12}+\frac{z^4}{360}+O(z^{6}))^{-1}=\frac{2}{z^2}(1-(-\frac{z^2}{12}+\frac{z^4}{360})+\frac{z^4}{144}+O(z^6)) =\frac{2}{z^2}(1+\frac{z^2}{12}+\frac{z^4}{240})=\frac{2}{z^2}+\frac{1}{6}+\frac{z^2}{120}$ Multiply everything together to get: $(z - \frac{z^3}{6} + \frac{z^5}{120} + O (z^{7}))$ $(\frac{2}{z^2}+\frac{1}{6}+\frac{z^2}{120} )$ $ =\frac{2}{z}-\frac{z}{6}-\frac{z^3}{360} +O(z^5).$
Q: jquery mobile plugin creation I am trying to create a plugin for JQuery Mobile. Does anyone have a template or examples to help? Currently, I have the following defined in myplugin.js (function ($) { $.fn.myPlugin = function (options) { var defaults = { e: 0 }, settings = $.extend({}, defaults, options); var h= $.myPlugin.getHtml(options.e); alert("here 1"); if ((h != null) && (h != undefined) && (h.length > 0)) { alert("here 2"); this.html(h); } }; $.myPlugin = { getHtml: function (e) { var s = ""; return s; } }; })(jQuery); I am trying to initialize an instance of this plugin like such: $("#pluginInstance", "#myPage").myPlugin({ e: 0 }); Oddly, neither alert dialog appears. There aren't any errors in the console either. What am I doing wrong? A: How about this or this? If you look how JQM is designed, the syntax is pretty similar. I'm also sticking with it, when working on plugins I'm doing.
Lesions of the Edinger-Westphal nucleus alter food and water consumption. The Edinger-Westphal nucleus (EW) produces several neuropeptides, including urocortin 1 and cocaine-amphetamine-regulated transcript, which regulate feeding, energy balance, and anxiety. Additionally, the EW projects to feeding and anxiety-regulatory brain areas. The authors tested the effect of lesions of the EW on the consumption of food, water and flavored solutions, metabolic indices, and exploratory behavior on the elevated plus maze in male C57BL/6J mice. EW lesion significantly reduced basal and deprivation-induced food and fluid consumption compared with sham and placement controls, but it did not alter behavior on the elevated plus maze. EW lesion had no effect on indices of basal metabolic activity, including plasma glucose level and body temperature. These effects suggest that the peptidergic neurons of the EW regulate food consumption.
In malignant cartilagenous tumors, immunohistochemical expression of procollagen PC1CP peptide is higher and that of PC2CP lower than in benign cartilaginous lesions. Few studies on oncogenesis of chondrosarcoma (CS) are available in the literature. Our previously published experimental evidence suggests that while the C-propeptide of procollagen Iα1 (PC1CP), a component of cartilage, favors tumor progression, the C-propeptide of procollagen IIα1 (PC2CP) exerts antitumor properties. In this study, we analyzed expression of PC1CP and PC2CP by immunohistochemistry in a series of enchondromas and CS. Our retrospective series consisted of 88 cases, including 43 CSs, 34 enchondromas and 11 nontumor samples. Immunohistochemical staining for PC1CP and PC2CP was evaluated in the cytoplasm and in the extracellular matrix (ECM). Diffuse staining for PC1CP in ECM was significantly more frequent in tumor than in nontumor samples (32 % vs. 0 %; p = 0.03), and in CSs than in enchondromas (44 vs. 18 %; p = 0.02). ECM semiquantitative score was higher in tumors than in nontumor samples (p < 0.005) and higher in CSs than in enchondromas (p = 0.05). Staining for PC2CP in ECM was more frequently found in enchondromas than in CSs (59 vs. 33 %; p = 0.02). ECM semiquantitative score was higher in enchondromas than in CSs (p = 0.02). Diffuse staining for PC1CP in combination with absence of staining for PC2CP had 94 % specificity for CS but with a sensitivity of only 35 %. Expression of neither PC1CP nor PC2CP correlated with recurrence-free survival or occurrence of metastases. In conclusion, we show that the expression of PC1CP is higher and that of PC2CP lower in malignant cartilaginous tumors. These results support an oncogenic role of PC1CP and anti-oncogenic property of PC2CP in cartilaginous tumors.
Q: CommonsMultipartFile in Grails In my Grails application there is a feature to upload some files. When I don't choose anything to upload, the value of params in the controller's method is: params:[fileupload:org.springframework.web.multipart.commons.CommonsMultipartFile@44c1e51d] The value of request.getMultiFileMap().fileupload.isEmpty() is also false. Why is fileupload filled when I didn't choose anything to upload? Here is my view .gsp code: <g:form url="[resource:adsInstance, action:'save']" enctype='multipart/form-data'> <input class="inputFiles" type="file" name="fileupload" multiple="multiple" accept="image/*" /> </g:form> A: Use request.getFile('fileupload').isEmpty() instead of request.getMultiFileMap().fileupload.isEmpty()
Close to 90% of Small & Medium Enterprises (SMEs) that pursued external financing last year were successful in their requests for debt funding, as per an SME Financing study conducted by Spring Singapore. Around 13% of SMEs looked for external financing in the last year. The remaining 87% of SMEs chose not to go for external financing. This indicates adequate funds to function. On the other hand, around 9% of SMEs preferred not to borrow. Most Small & Medium Enterprises of diverse sizes, at different phases of development, and belonging to various industries opted for bank loans. Over 60% of the SMEs requested external financing specifically to help with cash flow management. The survey also indicated that bigger SMEs will possibly require external funding, taking into consideration a higher rate of growth and a higher approval rate for debt funding, in comparison to smaller SMEs and their growth needs. In contrast, start-ups and smaller companies were confronted with lower approval rates mainly because of lack of financial papers and/or fragile business performance to back their loan application. The study also found that a major difficulty for SMEs was handling delays in customers’ payments, which impacted working capital management and cash flow. For instance, most SMEs do not know the ideal working capital they require to operate in relation to industry peers. Spring’s 2016 SME survey found that 25% of SMEs anticipate delays in customers’ payments between 2016 and 2017. This feeling resonated in Spring’s 2017 study. This led Spring to partner with PwC and extend its working capital study to consider home-grown SMEs, and deliver benchmarks on the performance of working capital of enterprises in other industries. Grab our newsletter! Gain an edge by connecting with us via email. We promise never to spam you. @ Uh-oh! Are you sure this email ID is Correct? AWESOME SAUCE! Request received - loud & clear!Returning you to where you were... Psst... We'll ensure you're the very first to know the moment rates change.
Q: Simple RMI Callback Example Can someone give a simple RMI Callback Example of Hello World? I have been trying to research it but I cant seem to find one that I understand. I don't understand what a callback is/does. This is my current Hello World RMI if it helps... Interface package example.hello; import java.rmi.Remote; import java.rmi.RemoteException; public interface Hello extends Remote { String sayHello() throws RemoteException; } Client package example.hello; import java.rmi.registry.LocateRegistry; import java.rmi.registry.Registry; public class Client { private Client(){} public static void main(String[] args){ String host = (args.length < 1) ? null : args[0]; try{ Registry registry = LocateRegistry.getRegistry(host); Hello stub = (Hello) registry.lookup("Hello"); String response = stub.sayHello(); System.out.println("response: " + response); } catch (Exception e) { System.err.println("Client exception: " + e.toString()); e.printStackTrace(); } } } Server package example.hello; import java.rmi.registry.LocateRegistry; import java.rmi.registry.Registry; import java.rmi.server.UnicastRemoteObject; public class Server implements Hello { public Server(){} @Override public String sayHello() { System.out.println("responded!"); return "Hello, world!"; } public static void main(String[] args) { try{ Server obj = new Server(); Hello stub = (Hello) UnicastRemoteObject.exportObject(obj, 0); // Bind the remote object's stub in the registry Registry registry = LocateRegistry.getRegistry(); registry.bind("Hello", stub); System.err.println("Server ready"); } catch (Exception e) { System.err.println("Server exception: " + e.toString()); e.printStackTrace(); } } } A: I'm no expert in RMI but i can tell you is that you can search for the book "Java Network Programming and Distributed Computing" from "David and Michael Reilley". You will be able to find a great example of RMI CALLBACK implementation that starts in page 278! The author defines a good way to understand it, so i tought it would be better to copy/paste than try to make my own, here it goes: "The simplest way of understanding a callback is to think of a phone call. Suppose you want to know if a stock price hits a certain level, and you ask your broker to call back when it does. When the broker (the source of the event) notices that the stock price reflects your parameters, he or she calls you back, to notify you of the new price. That's a callback." In default implementation, RMI just allows communication between CLIENT to the SERVER, requesting actions of remote services (remote objects) in the server host. You can use the callback method than to make your Server talk to your Client! Thast's great! Imagine if you have ONE server that you wanna to check if it's online (or if didnt drop/shutdown) trought the client! You would have to request continuous use of a remote object that should return you some boolean value (for example) telling that's in fact online. That would be horrible! Because you would loose some network bandwidth, requestin the server again, and again, and again... causing some connection pooling on it! That's wy should be usefull, in these cases to use CALLBACK ;-) I hope you can understand with my answer a little bit about what callback is/does. Best regards,
The present invention is directed to a soil separator for a dishwasher and particularly an arrangement between a soil separator chamber and a soil accumulator chamber which provides an improved apparatus and method for collecting and filtering soil from dishwasher water. A known arrangement for removing soil from dishwasher water is described in U.S. Pat. No. 5,165,433. This apparatus includes a combination motor-pump and soil separator assembly. The motor-pump assembly includes a wash impeller, which operates within a pump cavity located within the soil separator. As the impeller operates in a wash or rinse mode, a swirling motion is created in the wash liquid passing through the pump cavity, thereby creating a centrifugally sampled annular layer of wash liquid on the annular interior wall. A portion of the wash liquid having a high concentration of entrained soil (food particles, etc.) passes over an upper edge of the annular interior wall and into an annular guide chamber. Wash liquid from this guide chamber travels to an annular soil collection chamber at a high flow rate. This high flow rate is achieved by use of a relatively small aperture located in a lower portion of the annular wall separating the guide chamber and the soil collection chamber. Upon entering the soil collection chamber, wash liquid flows outwardly and upwardly through a screen which separates the water from the soil. The wash liquid is prevented from draining out of the soil collection chamber by a ball check valve seated within a drain port. The screen contains an annular arrangement of fine mesh filters, which prevent soil particles entrained in the wash liquid from reentering the dishwasher space. The cleansed wash liquid returns to the dishwasher floor where it is picked up by the motor driven pump for recirculation within the dishwasher. Typically, the apparatus such as described above allows water to pass through the hole between the guide channel and the collector chamber at a rate of about 4 gallons per minute. This flow rate can cause the heavily concentrated mixture of soil and water within the accumulator chamber to be agitated, preventing soils from readily settling. With this flow rate and configuration, there may be a tendency for the mechanical filter to clog even though back wash nozzles for spraying the filter from above are provided. Collecting soil at these flow rates cause filter screens with a 0.0049 inch mesh to have a tendency to clog. It was necessary to increase screen mesh to 0.0079 inch to prevent this clogging. However, the larger mesh screen allowed soils of larger particle size to escape through the screen and may be seen as xe2x80x9cgritxe2x80x9d on the dishes. It is an object of the present invention to provide a dishwasher soil collection system which is compatible with a high flow rate soil removal dishwasher while at the same time allowing for adequate screening of soil in the dish water return to the dish compartment in a recirculating dish water system. It is an object of the invention to provide a more efficient method of soil collection and retention while reducing water and energy usage. The objects are inventively achieved in that an annular soil separator wall is provided around the dish washer pump for accumulating solids by centrifugal action, a soil guide channel is provided surrounding the separator wall, and a shallow soil accumulator channel or xe2x80x9cscreening channelxe2x80x9d, substantially annular, is arranged beneath the filter screen surrounding the soil guide channel. The soil accumulator channel is flow connected to the guide channel by a vertical tube at a first closed end of the channel and the channel surrounds the guide channel to an open channel end which empties, to an accumulator sump having a drain port closed by a ball check valve. Water and soil proceed around the accumulator channel, soil is retained beneath the filter screen and water proceeds through the filter screen. Back wash nozzles are provided to wash the filter screen of soil from a dish compartment side of the filter screen. Thus, by directing inlet water from the guide channel to the shallow accumulator channel, the inside of the filter screen is washed by the water, while the outside of the screen is washed by the backwash nozzles above. Therefore, food particles which are temporarily dislodged from the screen by the backwash nozzles may not immediately return to the screen after the backwash nozzle passes, due to the direction of flow on an inside surface of the filter screen from the water flowing inside the accumulator channel. Inlet water flow into the accumulator channel is directed in a circulatory path and kept in the shallow accumulator channel in close proximity with the screen. As particles are dislodged by the backwash nozzles, they are moved around toward the stagnant soil accumulator sump. The sump is located away from the accumulator channel water inlet and therefore, more isolated and stagnant, allowing soil to settle. This is due to the fact that water and soil lose velocity as they approach the accumulator sump while most of the water escapes through the screen. The accumulator sump can be configured more compact when using the shallow accumulator channel of the present invention. The physical configuration of the system reduces water held in the accumulator by 60% or greater.
A simple and sensitive detection of diquat herbicide using a dental amalgam electrode: a comparison using the chromatographic technique. This paper describes the use of a dental amalgam electrode (DAE) to evaluate the electrochemical behaviour and to develop an electroanalytical procedure for determination of diquat herbicide in natural water and potato samples. The work was based on the square wave voltammetry responses of diquat, which presented two well-defined and reversible reduction peaks, at -0.56 V (peak 1) and -1.00 V (peak 2). The experimental and voltammetric parameters were optimised, and the analytical curves were constructed and compared to similar curves performed by high performance liquid chromatography coupled to ultraviolet-visible spectrophotometric detector (HPLC/UV-vis). The responses were directly proportional to diquat concentration in a large interval of concentration, and the calculated detection limits were very similar, around 10 microg L(-1) (10 ppb) for voltammetric and chromatographic experiments. These values were lower than the maximum residue limit established for natural water by the Brazilian Environmental Agency. The recovery percentages in pure electrolyte, natural water and potato samples showed values from 70% to 130%, demonstrating that the voltammetric methodology proposed is suitable for determining any contamination by diquat in different samples, minimising the toxic residues due to the use of liquid mercury or the adsorptive process relative to use of other solid surfaces.
The Hotline's World Extra is now available at http://www.theatlantic.com/ TOP STORY: Exclusive Polls from Israel! Also in the news: -- Active ground campaign beginning? -- New York Post employee latest anthrax case. ---------------------------- To stop receiving these E-mail Alerts: Reply to this message and include the word "unsubscribe" (without quotes) in the BODY of the message. ---------------------------- The Hotline is published daily by National Journal Group Inc. For more information about National Journal Group's publications, go to http://www.nationaljournal.com.
As the founder and 6 year leader of the NHFCS, I am excited to announce the transition to a new era and new leadership for homeschool football. Effective August 1sr, 2016, Jerome Davis will take the helm and continue the growth and oversight of the national operations. Jerome has been a high school football coach in both private school and homeschool teams. His skills in public relations will make him an ideal leader for the goals of the NHFCS. Mr. Davis has been the #2 guy in the NHFCS since 2012 and has spearheaded some of the most exciting new efforts of the past 4 seasons.Please take a moment to send Mr. Davis a note to welcome him to the new post. 918-928-7550 I will be at Jerome's assistance as he sees fit. And I will be making room to take on new challenges as God has enabled me. Thank you, everyone, for being such great friends and fellow boosters of homeschool football.
This port was done with the Atmel ATmega168 using two tools: 1. The WinAVR compiler avr-gcc (GCC) 4.1.2 (WinAVR 20070525) and tools from <http://winavr.sourceforge.net/>, hints and sample code from <http://www.avrfreaks.net/> and <http://savannah.gnu.org/projects/avr-libc/>. "avr-binutils, avr-gcc, and avr-libc form the heart of the Free Software toolchain for the Atmel AVR microcontrollers." 2. AVR Studio from Atmel <http://atmel.com/> Alternatively, the project also builds using IAR Embedded Workbench AVR. The hardware is expected to utilize the signals as defined in the spreadsheet hardware.ods (OpenOffice.org calc). Attach a DS75176 RS-485 transceiver (or similar) to the USART. DS75176 ATmega168 ------ --------- RO RXD /RE --choice of I/O DE --choice of I/O DI TXD GND GND DO --to RS-485 wire DO --to RS-485 wire +5V From 5V Regulator The makefile allows you to build just the dlmstp or a simple server. dlmstp is the datalink layer for MS/TP over RS-485. I used the makefile from the command line on Windows: C:\code\bacnet-stack\ports\atmega168> make clean all CStack check for GCC is included in the device object as property 512. The compile shows 648 bytes of RAM used, and the ATmega168 has 1024 bytes of RAM, leaving 376 for the CStack. Property 512 index 0 returns 376 from a ReadProperty request. My understanding is that the remaining unallocated RAM is used for the CStack. Keep this in mind when developing. After some ReadProperty and WriteProperty requests, the CStack shows 159 CStack bytes free, meaning that 216 bytes of CStack are used. Note that the value 0xC5 (197) was used to paint the CStack. I also used the bacnet.aps project file in AVR Studio to make the project and simulate it, but have not kept it updated (FIXME). Compiler settings for IAR Embedded Workbench (FIXME: makefile?): General Options --------------- Target Processor configuration: --cpu=m168. ATmega168 Memory Model: Small System configuration: Configure system using dialogs (not in .XCL file) Output Executable Output Directories: Debug\Exe, Debug\Obj, Debug\List Library Configuration Library: CLIB Library Options Printf formatter: Small Scanf formatter: Medium Heap Configuration CLIB heap size: 0x10 System CSTACK: 0x200 RSTACK: 32 Initialize unused interrupt vectors with RETI instructions (enabled) Enable bit defnitions in I/O-Include files. (enabled) MISRA C not enabled C/C++ Compiler -------------- Language Language: C Require prototypes (not enabled) Allow IAR extensions Plain 'char' is Signed Enable multibyte support (not enabled) Code Memory utilization: Place aggregate initializers in flash memory (enabled) Force generation of all global and static variables (not enabled) Register utilization: Number of registers to lock for global variables: 0 Use ICCA90 1.x calling convention (not enabled) Optimizations Size: High (Maximum optimization) Number of cross-call passes: Unlimited Always do cross call optimization (not enabled) Output Module type: Override default (not enabled) Object module name (not enabled) Generate debug information (enabled) No error messages in output files (not enabled) List Output list file (not enabled) Output assembler file (enabled) Preprocessor Ignore standard include paths (not enabled) Include paths: $PROJ_DIR$ $PROJ_DIR$\..\..\include Preinclude file: (none) Defined symbols: BACDL_MSTP MAX_APDU=50 BIG_ENDIAN=0 MAX_TSM_TRANSACTIONS=0 BACAPP_REAL BACAPP_UNSIGNED BACAPP_ENUMERATED BACAPP_CHARACTER_STRING BACAPP_OBJECT_ID WRITE_PROPERTY Diagnostics (not enabled) MISRA C (not enabled) Extra Options Use command line options (not enabled) Note: The BACnet Stack at Sourceforge source code has to be built with lots of different compilers. The IAR compiler has particularly strong (pedantic) source checking and generates several warnings when compiling the source code. Unfortunately not all warnings can be fixed by modifying the source code. Some warnings have therefore been disabled in the project file. Compiler Diagnostics: (Pe550) I initilize all local variables as a best practice. Linker Diagnostics: (w31) The supplied standard libraries expect char parameters to be unsigned (in functions such as strncpy(), etc.). It may be possible to recompile the libraries with signed plain char's. The BACnet Capabilities include WhoIs, I-Am, ReadProperty, and WriteProperty support. The BACnet objects include a Device object, 10 Binary Value objects, and 10 Analog Value objects. An LED is controlled by Binary Value object instance 0. All required object properties can be retrieved using ReadProperty. The Present_Value property of the Analog Value and Binary Value objects can be written using WriteProperty. The Object_Identifier, Object_Name, Max_Info_Frames, Max_Master, and baud rate (property 9600) of the Device object can be written using WriteProperty. With full optimization, the statistics on the demo are: IAR Atmel AVR C/C++ Compiler V5.10A/W32 12 732 bytes of CODE memory (+ 36 range fill ) 955 bytes of DATA memory (+ 24 absolute ) (includes CStack=0×200) avr-gcc (GCC) 4.2.2 (WinAVR 20071221rc1) Program:   15790 bytes (96.4% Full) Data:        414 bytes (40.4% Full) (does not include CStack=0×262) Hopefully you find this code useful! Steve Karg <skarg@users.sourceforge.net>
/** Copyright (c) 2010-2013 hkrn All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: - Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. - Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. - Neither the name of the MMDAI project team nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ import QtQuick 2.2 import "FontAwesome.js" as FontAwesome Item { id: labelSectionDelegate property Component component : labelSectionDelegateComponent property string fontAwesome signal labelSelected(string section, bool collapsed) Component { id: labelSectionDelegateComponent Rectangle { id: rect property bool collapsed : true width: labelSectionDelegate.width height: childrenRect.height color: "black" Text { id: iconLabel anchors { left: parent.left; verticalCenter: nameLabel.verticalCenter; margins: 2 } font { family: fontAwesome; pixelSize: 18 } color: "white" text: collapsed ? FontAwesome.Icon.FolderClose : FontAwesome.Icon.FolderOpen } Text { id: nameLabel anchors { left: iconLabel.right } font { family: applicationPreference.fontFamily; bold: true; pixelSize: 24 } text: section color: "white" } MouseArea { anchors.fill: parent onClicked: { var collapsed = !rect.collapsed rect.collapsed = collapsed labelSectionDelegate.labelSelected(section, collapsed) } } } } }
Q: Is it possible to determine screen orientation in a native Windows 8.1 Desktop App? I need to account for the different orientations a device can be in. Aka landscape, landscape flipped, portrait, or portrait flipped. My app is written in native C++ and is running on Windows 8.1 as a desktop app (cross platform is not a requirement in any way). I know that I can determine if the device is in portrait or landscape using methods outlined by Microsoft here: http://msdn.microsoft.com/en-us/library/ms812142.aspx However, there's no way to discern between landscape and landscape flipped (or portrait and portrait flipped). I could get exactly what I need by checking the DisplayInformation.CurrentOrientation property but it's a WinRT API. Which means if I wanted to use it, my app would have to use CLR, which is a non-starter. Also I'd really like to keep my app as a single executable and I don't think there's a clean way to do that and call managed APIs at the same time. But then again, I'm very inexperienced with native + managed code integration. So, does anyone know of any way of figuring out display orientation using only native code in Windows? A: I figured this out. It's actually a lot easier than I thought. EnumDisplaySettings() doesn't populate the dmDisplayOrientation field in the DEVMODE struct, but EnumDisplaySettingsEx() does. So it's actually really easy :) There's a good example here.
Gamesbrief Advent sale this Friday! Do you want to get How to Publish a Game for just £25? Well then we have an early Christmas present for you. This Friday we’re running a one-day sale from 00.00 EST (that’s 5am GMT). It’s 50% off Gamesbrief Unplugged, 75% off How to Publish a Game in digital form, and the Design Rules eBook will be free for a day! Drop in to the store on Friday to take advantage of our generous little holiday sale and get our shop products at these prices: How To Publish A Game: eBook version – 75% off – £25 Print version – 60% off – £59 GamesBrief Unplugged: Volume 1 Print edition – 50% off – £7.47 GamesBrief Unplugged: Volume 2 Print edition – 50% off – £7.47 Design Rules for Free to Play Games: About Zoya Street I’m responsible for all written content on the site. As a freelance journalist and historian, I write widely on how game design and development have changed in the past, how they will change in the future, and how that relates to society and culture as a whole. I’m working on a crowdfunded book about the Dreamcast, in which I treat three of the game-worlds it hosted as historical places. I also write at Pocketgamer.biz and The Borderhouse. About Gamesbrief is a blog about the business of games. We look behind the headlines to tell you not just what is happening to games, but why it matters to your business. From Activision to Zynga, we analyse the companies who are making waves in the games industry and the new platforms, like Facebook, iPhone and Unity, that are changing the market. Testimonials “Whatever your current business model there are lessons to learn from GAMESbrief’s insight and analysis.”Colin Bell, THQ Digital
1. Field of the Invention The present invention relates to an audio and video multiplexed transmission system, and more particularly, to a multiplexed transmitter and/or receiver for transmitting and/or receiving audio and video information by effectively coding and/or decoding the audio and video information and performing a multiplexing and/or demultiplexing according to the transmission rate of a communication channel which is a limited transmission medium. 2. Background Art Recently, an apparatus for simultaneously transmitting audio and video information for communication, such as a video conference system and a videophone, has been developed. In the multiplexed transmission system, a technique is required for coding/decoding information with high efficiency while maintaining balance of the audio and video information. In detail, coded video information occupies a greater amount of data compared to coded audio information. Thus, when transmitting audio and video information at the same time, the transmission rate at a communication channel is limited, and coding and decoding times become different, so that it is difficult to synchronize the audio and video information. To solve this problem, a method using two transmission channels is used: one for video information, and the other for audio information. However, two transmission channels are required. Also, there is a method using one transmission channel. However, according to the method using one transmission channel, extra logic is required in a transmitter for calculating the delay time of the video information, and logic is required in a receiver for delaying the audio information by as much as the delay time of the video information. Also, there is a method for simultaneously transmitting lip-sync information, based on the MPEG-2 standard for the synchronization of the video and audio information. However, it is difficult to implement hardware for the method for transmitting the lip-sync information, and impossible if the transmission speed of a transmission medium is slow. MPEG is a compressed audio/video signal protocol established by the Moving Pictures Experts Group of the International Standardization Organization. An example of a MPEG coding system is provided in U.S. Pat. No. 5,751,356 to Hiroshi Suzuki entitled Video/Audio Signal Coding System. Additionally, an example of a MPEG decoding system is provided in U.S. Pat. No. 5,621,772 to Greg Maturi et al. entitled Hysteretic Synchronization System ForMPEGAudio Frame Decoder. A further example of the prior art, which is related to the present invention, is U.S. Pat. No. 5,231,492 to Ryoichi Dangi et al. and entitled Video And Audio Multiplex Transmission System. The U.S. Pat. No. 5,231,492 patent discloses a multiplexed transmission system for audio and video information which is capable ofproviding optimum quality video and audio information. However, extra coding/ decoding of the video and audio information is performed under the control of a controller, so that it is difficult to overcome a time delay between the video and audio information. Thus, it is difficult to achieve exact synchronization between the video and audio information. Also, due to the difference in transmission rates between the video and audio information, it is also difficult to achieve an effective transmission while conforming to a channel transmission rate.
MIAMI -- J.T. Realmuto trade talks are once again picking up, as the Marlins are engaged in substantive discussions with six clubs.According to a source, the Braves, Dodgers, Astros, Padres, Rays and Reds are considered the front-runners to acquire Realmuto. As it's been all offseason, the Marlins' asking price remains MIAMI -- J.T. Realmuto trade talks are once again picking up, as the Marlins are engaged in substantive discussions with six clubs. According to a source, the Braves, Dodgers, Astros, Padres, Rays and Reds are considered the front-runners to acquire Realmuto. As it's been all offseason, the Marlins' asking price remains extremely high. In return, Miami seeks a top prospect and more. In some cases, it would like a catcher with some big league experience to work with a young pitching staff. Now that free agent Yasmani Grandal has reportedly reached an agreement with the Brewers on a one-year, $18.25 million deal, Realmuto is the top catcher on the market. Grandal's departure creates a vacancy behind the plate for the Dodgers, who have been in on-and-off discussions for Realmuto for months. Realmuto is entering his second season of arbitration, and the Marlins haven't ruled out retaining their best player if their trade demands aren't met. As Miami explores trade options for Realmuto, the club is also moving forward on trying to sign its arbitration-eligible players for the 2019 season. The arbitration deadline is 1 p.m. ET on Friday, meaning qualifying players must sign for the upcoming season or risk having their salaries set by an arbitration panel at a date before Spring Training begins. The Marlins have five arbitration-eligible players -- Realmuto, right-handers Jose Urena and Dan Straily, left-hander Adam Conley and infielder Miguel Rojas . Realmuto's arbitration situation does not impact whether he will be traded before Spring Training opens, with pitchers and catchers beginning their workouts on Feb. 13 at the Roger Dean Chevrolet Stadium complex in Jupiter. Realmuto is coming off his best season, during which he batted .277 with a .340 on-base percentage and set career highs for home runs (21) and RBIs (74).
Q: Does currentTime fall between 18:00 and 2:00 I have a bar timetable with dynamic open and closing times and I have to calculate if currentTime falls within today's opening hours. The problem is the open and closing times aren't in the same day. How does one calculate if currentTime falls within a range of specific times across multiple days? I'm using jquery on this project. A: if you use new Date().getTime(); this will return the number of miliseconds since a particulular time (this happens to be 1st January 1970). If you do this for both your start and end time as well as your current time, if your current time lies between start and end then it will be greater than the start miliseconds and less than the end miliseconds. Just a note, instead of Date().getTime(); you can actually do it as +new Date; something I learned from looking around the web. Google Wins again :). This is because the + essentially casts the date to an int. A: You can calculate this using javascripts Date Object like : var start = new Date(2012,6,20,13).getTime(); var now = new Date().getTime(); var end = new Date(2012,6,21,2).getTime(); if( (start < now ) && (now < end )) { console.log("opened"); } else { console.log("closed"); } would output opened until tomorrow 2am then it will output closed. you can look at this JSBin Example and change the start time to see how it changes
Q: How do I use the modulo function with this library? I am Using this library for Big Integers in Pascal but I am having trouble using the modulo function. Can anyone help? My code: a = b modulo(c); here is the library location: http://www.delphiforfun.org/programs/library/big_integers.htm { ***************** Modulo ************* } procedure TInteger.Modulo(const I2: TInteger); { Modulo (remainder after division) - by TInteger } var k: int64; imod3: TInteger; begin if high(I2.fDigits) = 0 then begin divmodsmall(I2.Sign * I2.fDigits[0], k); assignsmall(k); end else begin imod3:= GetNextScratchPad; DivideRem(I2, imod3); Assign(imod3); ReleaseScratchPad(imod3); end; end; Why does this not work?: also why doesnt this work?: var P, Q, N, E, D,i: TInteger; Eing, Cout: TInteger; begin E := 3; D := 27; N := 55; writeln(N.Modulo(E)); A: The source code that you downloaded comes with an example of how to use the modulo function. I urge you to take time to read the example code that comes with a library. If you would do so then you'd be able to solve far more problems by yourself. The example code looks like this: procedure Tbigints.ModBtnClick(Sender: TObject); var i1,i2,i3:Tinteger; begin i1:=TInteger.create(0); i2:=TInteger.create(0); Getxy(i1,i2); i1.modulo(i2); memo1.text:=i1.converttoDecimalString(true); i1.free; i2.free; alloclbl.caption:=format('Allocated memory: %d',[allocmemsize]); end; The key point is that the modulo method acts in place. In the code above, the dividend is held in i1 and the divisor in i2. Then you call modulo on i1 passing i2 as the argument. The result of the operation is then placed in i1. So, this method replaces the dividend with the modulus of the division.
DNA gyrase and topoisomerase IV mutations in quinolone-resistant Flavobacterium psychrophilum isolated from diseased salmonids in Norway. Flavobacterium psychrophilum is the causative agent of the recognized diseases 'bacterial coldwater disease' and 'rainbow trout fry syndrome' and is found in many farmed freshwater and marine fish species. In Norway, the bacterium has mainly been isolated from Atlantic salmon (Salmo salar L.) and brown trout (Salmo trutta L.). In the present study, 26 isolates from Norwegian farmed salmonids were examined. All isolates were tested for susceptibility towards various antibacterial drugs by the disk diffusion method, and minimum inhibitory concentration values for oxolinic acid and flumequine were established for selected isolates. All isolates from rainbow trout displayed reduced susceptibility towards quinolones, while brown trout and Atlantic salmon isolates were susceptible. The quinolone resistance determining regions (QRDRs) of the gyrA, gyrB, parC, and parE genes were sequenced. Sequence analysis of the QRDR of gyrA in quinolone resistant isolates revealed a threonine:arginine amino acid substitution at position 82 in all 16 isolates from Norwegian rainbow trout and a single reference strain isolated from rainbow trout in Sweden. No evidence for plasmid-mediated quinolone resistance was found in any of the isolates. Pulsed-field gel electrophoresis and phylogenetic analysis of parC and gyrB sequences indicate a clonal relationship between rainbow trout isolates.
Introduction {#s1} ============ Maize plants attacked by herbivorous insects emit volatile organic compounds (VOCs) that attract natural enemies of herbivores (Dicke et al., [@B21]; Turlings et al., [@B50]; Turlings and Wäckers, [@B51]; Arimura et al., [@B2]). In the case of maize plants, the blend of VOCs emitted by caterpillar-damaged plants is typically composed of green leaf volatiles (GLVs, C-6 aldehydes, alcohols, and their esters), nitrogenous, and aromatic compounds, as well as mono, homo and sesquiterpenes (Paré and Tumlinson, [@B39]; D\'Alessandro and Turlings, [@B15]). Among the VOCs that have been identified in these blends, GLVs have received particular attention. They are emitted upon mechanical damage, immediately after feeding on the maize plant begins (Turlings et al., [@B49]), and have been considered important for the innate attraction of parasitoids, as they are emitted in higher amounts by freshly damaged plants than by plants with only old damage (Whitman and Eller, [@B54]; Hoballah and Turlings, [@B28]). Commonly, insect herbivores are repelled by inducible plant volatiles (Bernasconi et al., [@B3]; De Moraes et al., [@B19]; Rostas and Hilker, [@B44]). This is particularly evident for Lepidoptera (De Moraes et al., [@B19]), but this is not true for all herbivores. In particular coleopterans are known to be attracted to previously infested plants (Bolter et al., [@B4]; Landolt et al., [@B37]) and they may be attracted to GLVs as was found for scarab (Hansson et al., [@B24]) and buprestid beetles (de Groot et al., [@B17]), and flea beetles (Halitschke et al., [@B23]). Interestingly, larval stages of several Lepidoptera are attracted by volatiles emitted by plants that have been damaged by conspecific larvae. This was found for neonates of several Lepidoptera species, including *Ostrinia nubialis* (Hübner) and *Ostrinia furnacalis* (Guenée) (Lepidoptera: Pyralidae) on maize (Huang et al., [@B29]; Piesik et al., [@B40]), *Spodoptera frugiperda* (J. E. Smith) (Lepidoptera: Noctuidae) on maize and cowpea (Carroll et al., [@B7], [@B6]), and *Estigmene acrea* (Drury) (Lepidoptera: Arctiidae) on soybean, tomato, and maize (Castrejon et al., [@B8]). Furthermore, caterpillars adapt their behavior depending on plant VOC emission (Shiojiri et al., [@B45]). This attraction to VOCs emitted by already infested host plants is puzzling, as it will lead to competition and may increase the risk of cannibalism and attack by natural enemies that are attracted to the same volatiles. Cannibalism is common among noctuid larvae, such as *Spodoptera littoralis* (Boisduval) (Abdel Salam and Fokhar. cited in Fox, [@B22]), *S. frugiperda* (Chapman et al., [@B9]), and *Helicoverpa armigera* (Hübner) (Kakimoto et al., [@B30]). The attraction of natural enemies to herbivore-induced volatiles has been shown for numerous tritrophic systems (Dicke et al., [@B21]; Turlings et al., [@B50]; Heil, [@B27]; Dicke and Baldwin, [@B20]; Hare, [@B25]), which makes one wonder why lepidopteran larvae are attracted to the same volatiles. This apparent maladaptive behavior may be explained by a trade-off between risks: in the field harsh weather conditions and attempts to escape parasitoids and predators cause larvae to frequently fall off plants (personal observ.). In order to find back the same plant or new suitable plants the larvae will have to rely on dependable and available VOC signals. Induced VOCs may provide the best cues, as undamaged plants are often virtually odorless (Turlings et al., [@B50]). However, once on a plant, caterpillars may prefer sites with minimal VOC emissions, where it is less likely to encounter competitors and natural enemies. We therefore hypothesized that caterpillars may initially be attracted to induced VOCs, but once they are on the plant they will feed preferentially in places with low GLV emissions. We tested this for larvae of the noctuid moth *Spodoptera littoralis* (Boisduval). First we confirmed attraction to induced plant volatiles in a four-arm olfactometer and then tested their growth rate as a measure of feeding behavior when they were exposed to GLVs. Previous feeding experiences were also taken into consideration, as larval attraction may be higher for volatiles that are emitted by plant species on which the larvae previously fed (Carlsson et al., [@B5]). Materials and methods {#s2} ===================== Plants and insects ------------------ Maize plants (*Zea mays*, cv. Delprim) were grown individually in plastic pots (10 cm high, 4 cm diameter) with commercial potting soil (Ricoter Aussaaterde, Aarberg, Switzerland) and placed in a climate chamber (23°C, 60% r.h., 16:8 h L:D, 50000 lm/m^2^). Maize plants used for the experiments were 10--12 days old and had three fully developed leaves. The evening before the experiments, plants were transferred into glass vessels, as described in Turlings et al. ([@B48]) and kept under laboratory conditions (25 ± 2°C, 40 ± 10% r.h., 16:8 h L:D, and 8000 lm/m^2^). *S. littoralis* larvae were reared from eggs provided by Syngenta (Stein, Switzerland). The eggs were kept in an incubator at 30.0 ± 0.5°C until emergence of the larvae. Subsequently, they were transferred on artificial diet at room temperature (24 ± 4°C). Olfactometer experiments ------------------------ Two olfactometer experiments were performed with fourth-instar *S. littoralis* larvae. In the first experiment, the attraction of larvae to an *S. littoralis*-infested maize plant vs. healthy maize plant was compared. In the second experiment, the attraction of larvae to a maize plant with fresh (mechanically inflicted) damage was tested against a plant with old (mechanically inflicted) damage. In both experiments, the effect of previous feeding experience (either artificial diet or maize) was compared. All the larvae were initially reared on artificial diet as previously described (Turlings et al., [@B48]). Twenty-four hours before each experiment, 90 larvae were transferred on fresh maize leaves (maize feeding experience), and 90 on artificial diet (artificial diet feeding experience). Attraction of fourth-instar *S. littoralis* larvae to infested maize plants --------------------------------------------------------------------------- A four-arm olfactometer (as described in D\'Alessandro and Turlings, [@B14]) was modified to measure the attraction of *S. littoralis* larvae. The olfactometer consisted of a central glass choice arena (Figure [1](#F1){ref-type="fig"}) \[6 cm internal diameter (ID), 5 cm length\] with four arms (15 mm ID, 5 cm length), each with a glass elbow (5 cm length) and an upward connection for a glass bulb (50 ml). To avoid visual distraction of the larvae, a white cardboard cylinder was placed around the central choice arena. ![**Detail of the four-arm olfactometer setup for *S. littoralis* larval behavior. (A)** Odor source. **(B)** Choice arena. Arrows indicate airflows. Four odor sources were compared, attached to each of the four arms of the choice arena. Drawing by Thomas Degen ([www.thomas-degen.ch](http://www.thomas-degen.ch)).](fpls-04-00209-g0001){#F1} The choice arena was connected to four glass bottles. One bottle contained a maize plant (cv Delprim) infested with 15 second-instar *S. littoralis* larvae that had been placed on the plant 16 h before the bioassay. The opposite bottle contained a healthy maize plant. The two remaining bottles remained empty. The position of the odor sources was changed between each experimental day, with the two odor sources always opposite to each other. Thirty fourth-instar larvae were placed in a small plastic box (2 × 2 × 0.8 cm) with an open top, which was introduced in the center of the choice arena. The larvae would crawl out of the box into the central choice arena and a number of them entered one of the four arms. After 60 min, the number of larvae in each arm was counted. The larvae that did not leave the choice arena after 60 min were considered as having made "no choice" and all the larvae were removed from the olfactometer. Six such releases were done on a given day and this was repeated on 6 different days (*n* = 6). Attraction of fourth-instar *S. littoralis* larvae to plants with old vs. plants with fresh damage -------------------------------------------------------------------------------------------------- The same setup as described above was used, with the same experimental procedure, except for the odor sources. Two maize plants were brought to the laboratory 16 h prior to the bioassay. One plant was scratched on the underside of the two oldest leaves, damaging approximately 2 cm^2^, on both sides of the central vein (Hoballah and Turlings, [@B28]). Caterpillar regurgitant, collected as described in Turlings et al. ([@B49]), was applied to the two wounds. Both plants were then placed in a glass bottle and exposed to a carbon-filtered, humidified airflow of 300 ml/min for 15 h. The second plant was then scratched and regurgitant was applied. The two plants were then placed opposite to each other in the olfactometer, leaving two empty bottles between them. The airflow was then increased to 1200 ml/min through each bottle, of which 500 ml/min entered the olfactometer choice chamber. The position of the treatments was changed for each experimental day. GLV dispensers -------------- To expose larvae to green leafy volatiles we made dispensers as described by von Mérey et al. ([@B53]). The GLVs were first mixed together in an Erlenmeyer flask (100 mL) placed in ice. The composition of the mixture was 80% cis-3-hexen-1-al \[92.5% purity, (NEAT), Bedoukian Research Inc., USA\]; 10% cis-3-hexen-1-ol (\>98%, GC, Sigma-Aldrich, CH-9471 Buchs, Switzerland); 8% cis-3-hexenyl acetate (\>98%, SAFC Supply Solutions, 3050 Spruce street, St. Louis, MO 63103, USA); and 2% trans-2-hexenol (99%, ACROS Organics, New Jersey, USA). The mix was stored at -70°C until it was used. For the assays, 0.2 mL of the GLV mix was transferred into a 2 mL amber glass vial (11.6 × 32 mm) (Sigma-Aldrich, CH-9471 Buchs, Switzerland) containing clean fiberglass wool. Each vial was sealed with a PTFE/rubber septum pierced by a Drummond 2 μL micro-pipette in black polypropylene cap. This device allowed the constant release of GLVs, and their release rate was calibrated to the amount of GLVs that was found to be released by infested maize plants (*Zea mays* cv Delprim) (von Mérey et al., [@B53]). Control dispensers consisted of glass vials only containing fiberglass wool. VOC-exposure experiments ------------------------ Three experiments were conducted to measure the effect of VOCs on the growth of *S. littoralis* larvae. In the first experiment, the larvae were exposed to the volatiles of caterpillar-damaged maize plants. In the second experiment, they were exposed to amounts of a blend of synthetic GLVs that fall within the range of what is commonly emitted by a single, caterpillar-infested maize plant (see von Mérey et al., [@B53] for details). In the third experiment, they were exposed to high concentrations of synthetic GLVs. In all three experiments we recorded, besides weight gain, mortality, and pupation of the larvae. Effect of exposure to VOCs emitted by caterpillar-damaged maize plants on feeding rate of *S. littoralis* larvae ---------------------------------------------------------------------------------------------------------------- Second-instar *S. littoralis* were placed individually inside small plastic boxes (2 × 2 × 1.5 cm) that were covered with fine-meshed nylon tissue, fixed with an elastic band. The larvae were provided a 1 cm^3^ cube of wheatgerm-based artificial diet (Turlings et al., [@B48]), which was changed every second day. Twelve such boxes were placed inside a glass bottle lying on its side, connected at its base with a Teflon tube to the top of an odor source bottle (Figure [2](#F2){ref-type="fig"}; see Turlings et al., [@B48] for details on glass bottles and tubing). Odor source bottles contained either a maize plant infested with fifteen second-instar *S. littoralis* larvae (induced plant, VOCi, replaced with a new infested plant every third day) or an uninfested maize plant (control plant, VOCu, also replaced every third day). The odor source bottle was connected to a four-port air-delivery system (Model VCS-HADS-6AF6C6B; ARS Analytical Research Systems, Gainesville, FL, USA), providing a purified and humidified airflow of 300 ml/min. Two such four-port air-delivery systems were used simultaneously to introduce odors into eight exposure chambers, resulting in 48 larvae for each treatment. ![**Design of growth performance experiment. (A)** Odor source bottle, which contained either a healthy maize plant or a caterpillar-damaged maize plant. **(B)** Bottles containing 12 larvae inside small plastic boxes. **(C)** Plastic box enlarged showing a *S. littoralis* larva feeding on a cube of artificial diet. Arrows indicate the direction of the airflow.](fpls-04-00209-g0002){#F2} Before placing the larvae inside the plastic boxes, they were weighed on a microbalance (Model MX5, Mettler Toledo, Greifensee, Switzerland). Weighing was repeated at the following time-points after placing the boxes inside the glass bottle: 5, 24, 48, 96, 144, 192, 240, 288, 312, 336, 360, 408, and 432 h. After this time-point, all larvae had pupated or had died and the experiment was terminated. Effect of exposure to synthetic GLVs on weight gain of *S. littoralis* larvae ----------------------------------------------------------------------------- The same setup as described above was used for this experiment. In this case, the odor source bottles containing a dispenser built up as follows: a 2 ml amber glass vial (11.6 × 32 mm; Sigma-Aldrich, Buchs, Switzerland) containing 100 mg clean fiberglass wool. The vial was sealed with a PTFE/rubber septum (Sigma-Aldrich, Buchs, Switzerland) pierced with a 2 μl micro-pipette (Drummond, Millan SA, Plan-Les-Ouates, Switzerland). The length of the pipette was calibrated to release a controlled amount of GLVs, similar to the amount emitted by maize plants (cv Delprim). The GLV mixture consisted of 80% (*Z*)-3-hexen-1-al \[92.5% purity, (NEAT), Bedoukian Research, Danbury, CT, USA\], 10% (*Z*)-3-hexenyl-acetate (\<98%, SAFC Supply Solutions, St. Louis, MO, USA), 8% (*Z*)-3-hexenyl-Acetate (≥98%, SAFC Supply Solutions, 3050 Spruce Street, St. Louis, MO 63103, USA), and 2% (*E*)-2-hexenol (99%, ACROS Organics, Geel, Belgium). The same GLV dispenser was kept for the duration of the assay. Control bottles contained no dispenser. In this experiment, the weighing of the larvae was repeated at 5, 12, 24, 48, 96, 120, and 144 h after placement in the bottles. The experiment was terminated at 144 h because the tests showed that larval weight was not affected by the volatiles at these concentrations. Effect of exposure to high concentrations of GLVs on weight gain of *S. littoralis* larvae ------------------------------------------------------------------------------------------ In this experiment, larvae were placed individually in a plastic box (7.5 × 6.5 × 5 cm) containing a GLV dispenser (described above), and a piece of diet (2 × 1.5 × 1 cm). The box was closed, in order to increase the concentration of GLVs. As a control, an empty dispenser was placed inside the cage without GLVs inside. There were twelve larvae in each treatment and they were weighed before placing them inside the boxes. They were weighed again after 3, 6, 9, 12, 15, 24, 40, 48, 51, 54, 58, 72, 96, 120, and 168 h. The larger plastic boxes allowed for more mobility, compared to the cages used in the previous experiments. In order to observe whether the high concentrations of GLV affected larval mobility, we recorded whether the larvae were on the diet or off the diet during the first 8 h of exposure. Statistical analysis -------------------- VOC-exposure data were compared using Student\'s *t*-test, provided they met the assumptions of normality (Shapiro-Wilk test) and equal variance (Levene\'s test). Else, a Mann-Whitney test was applied. Both treatments (VOCu and VOCi exposure) were compared at each time-point individually. Data on mortality and pupation of the larvae compared using a one-way analysis of variance (ANOVA). Data was tested with SigmaStat (version 3.5, STATCON, Witzenhausen, Germany). Data on mobility were analyzed in a general linear model (GLM) with binomial distribution (the larvae were observed either on the diet or off the diet) family in R (R Development Core Team, [@B41]). Olfactometer data was analyzed using the software package R (R Development Core Team, [@B41]), in a GLM, allowing to compensate for over-dispersed data, as previously described (D\'Alessandro and Turlings, [@B14]; Tamò et al., [@B46]; Ricard and Davison, [@B42]). This means that any positional biases or effects of the individuals on each other\'s behavior are considered in the model and that calculated statistical differences are solely the result of differential attractiveness of the odor sources. Results {#s3} ======= Attraction of fourth-instar *S. littoralis* larvae to induced maize plants -------------------------------------------------------------------------- The larvae that had fed on maize and the larvae fed on artificial diet were both more attracted toward caterpillar-damaged maize plants than to intact plants (GLM *P* \< 0.001 and *P* \< 0.002, respectively; Figure [3](#F3){ref-type="fig"}). However, the maize-fed larvae were attracted more strongly by the induced plants than the diet-fed larvae (GLM *P* \< 0.005). Maize-fed larvae also displayed an increased responsiveness (80% entering an arm) compared to diet-fed larvae (66%). ![**Effect of feeding experience on the attraction of *S. littoralis* larvae to induced maize plants.** Pie charts indicate overall responsiveness (number of larvae entering the different types of arms). GLMs were performed to test for differences between arms within each group of feeding experience, as well as to compare feeding experiences. ^\*\*^*P* \< 0.01, ^\*\*\*^*P* \< 0.001.](fpls-04-00209-g0003){#F3} Attraction to old vs. fresh damage ---------------------------------- Freshly damaged plants were more attractive to maize-fed larvae (GLM *P* \< 0.003) than plants with older damage (Figure [4](#F4){ref-type="fig"}). Artificial diet-fed larvae did not show a preference between old and fresh damage. This difference in preference between maize-fed and diet-fed larvae was significant (GLM *P* \< 0.001). Also in this case, overall responsiveness of maize-fed larvae (84%) was higher than the responsiveness of artificial diet-fed larvae (62%). ![**Effect of feeding experience on the attraction of *S. littoralis* larvae to old and fresh damaged maize plants.** Pie charts indicate overall responsiveness (number of larvae entering the different types of arms). GLMs were performed to test for differences between arms within each group of feeding experience, as well as to compare feeding experiences. n.s., no significant difference (*P* \> 0.05); ^\*\*^*P* \< 0.01, ^\*\*\*^*P* \< 0.001.](fpls-04-00209-g0004){#F4} Exposure to VOCs from caterpillar-damaged maize plants ------------------------------------------------------ The larvae that were exposed to the VOCs emitted by caterpillar-damaged maize plants grew more slowly in the early stages of development (Figure [5](#F5){ref-type="fig"}). Initial weight of the larvae was equal across treatments. After 5 h, there was still no difference between the two treatment groups (*P* \< 0.356). However, after 24 h, the larvae exposed to VOCs from damaged plants (VOCi) had gained significantly less weight than the larvae exposed to VOCs emitted by healthy plants (VOCu) (*P* \< 0.030). This difference in growth rate persisted throughout the early weighing time points: 48 h (*P* \< 0.030), 96 h (*P* \< 0.012), 144 h (*P* \< 0.033). After this, both treatment groups displayed similar weight gains until pupation. The weight of the pupae did not differ significantly (*P* \< 0.916). There was also no difference in mortality between the larvae of the two treatment groups (*P* \< 0.839). ![**Mean weight gain (mg ± SEM) of *S. littoralis* larvae exposed to VOCs emitted by *S. littoralis*-induced (VOCi) or healthy (VOCu) maize plants.** ^\*^indicates a significant difference at *P* \< 0.05 (Student\'s *t*-test).](fpls-04-00209-g0005){#F5} Effect of exposure to low concentrations of synthetic GLVs on weight gain of *S. littoralis* larvae --------------------------------------------------------------------------------------------------- When larvae were exposed to the synthetic volatile blend we measured no difference either in larval weight gain (5 h: *P* \< 0.759, 12 h: *P* \< 0.286, 24 h: *P* \< 0.267, 48 h: *P* \< 0.502, 72 h: *P* \< 0.506, 96 h: *P* \< 0.833, 120 h: *P* \< 0.833, 144 h: *P* \< 0.646), or mortality (0% in both treatments). Effect of exposure to high concentrations of GLVs on weight gain of *S. littoralis* larvae ------------------------------------------------------------------------------------------ When larvae were exposed to high concentrations of GLVs, such as can be expected to be present in the immediacy of the feeding sites on the maize plants, the larvae were found to gain less weight at the early stages of their development (Figure [6](#F6){ref-type="fig"}). After 3 h (*P* \< 0.514) and 6 h (*P* \< 0.173), there was still no difference between the treatments. After exposure to GLVs for 9 h a strong trend of lower weight gain in GLV-exposed larvae was observed (*P* \< 0.051) and at 12 h the difference between the two treatments was significant (*P* \< 0.025). This difference persisted throughout the early part of the experimental time (15 h: *P* \< 0.036; 24 h: *P* \< 0.027; 40 h: *P* \< 0.031; 48 h: *P* \< 0.030; 51 h: *P* \< 0.033; 54 h: *P* \< 0.039; 58 h: *P* \< 0.038; 72 h: *P* \< 0.047). From 96 h, however, there was no longer a difference in weight gain between the treatments. Interestingly, the mobility of GLV-exposed larvae was slightly increased (*P* \< 0.060), with a significant difference in number of larvae moving in the box after 6 h (*P* \< 0.048). However, at 30 min (*P* \< 0.410), 2 h (*P* \< 0.716), 4 h (*P* \< 0.572), and 8 h (*P* \< 0.423), GLV-exposed and control larvae were equally on the diet and off the diet. ![**Weight gain (mg ± SEM) of *S. littoralis* larvae exposed to GLV dispensers or control dispensers.** An asterisk above the value point indicates significant difference between treatments (*P* \< 0.05 Student\'s *t*-test).](fpls-04-00209-g0006){#F6} Discussion {#s4} ========== We show here that *Spodoptera littoralis* caterpillars are attracted to volatiles from maize plants that are under attack by conspecifics. This confirms the findings by Carroll et al. ([@B7], [@B6]), who obtained similar results for a related species, *S. frugiperda*, which was found to be attracted to inducible volatiles emitted from maize and cowpea seedlings. Similarly, neonate larvae of the codling moth, *Cydia pomonella*, are more attracted to apple fruits with other codling moth larvae than to uninfested fruits (Landolt et al., [@B36]). This is somewhat surprising, as these Lepidoptera are not known to aggregate, unlike many Coleoptera, for which both adults and larvae are often attracted to the volatiles of already infested plants (Crowe, [@B12]; Bolter et al., [@B4]; Müller and Hilker, [@B38]; Kalberer et al., [@B31]; Heil, [@B26]; Yoneya et al., [@B55]). It should be noted that in the case of *S. frugiperda*, Carroll et al. ([@B6]) found linalool to be particularly attractive. This terpene alcohol is in fact also released, be it in lesser amounts, by undamaged maize plants, at least in some varieties (Degen et al., [@B16]), and therefore can be a reliable cue for the presence of maize in general. In adult Lepidoptera, however, increased linalool levels decreased oviposition (De Moraes et al., [@B19]; Kessler and Baldwin, [@B32]). The larval response to herbivore-induced volatiles is in contrast to what is known for adult Lepidoptera, which avoid to oviposit on plants that are already under caterpillar attack (Landolt, [@B35]; De Moraes et al., [@B19]; Kessler and Baldwin, [@B32]; Huang et al., [@B29]). Such avoidance of already infested plants, which is also the case for aphids (Bernasconi et al., [@B3]), is expected, as it reduces the chances of competition and cannibalism, as well as predation and parasitism by natural enemies that are attracted to the same volatiles. Then why are the larvae attracted to volatiles that are indicative of these risks? To answer this it may help to list the potential disadvantages and discuss counter arguments why these may not be as important as potential advantages. The apparent disadvantages are: (1) VOCs emitting plants have mobilized their defenses and should be less suitable for caterpillar development, (2) The VOCs indicate the plants carry other larvae that will compete for the same resource and may even pose a cannibalism risk, (3) The VOCs are attractive to natural enemies of the caterpillars and therefore indicate a higher risk of predation and parasitism. As for the counter argument, the most obvious reason to use herbivore-induced VOCs is the same as has been argued for the natural enemies (Vet and Dicke, [@B52]), the induced VOCs are emitted in large amounts and are therefore easily detectible and reliable cues for the presence of a host plant. Moreover, the alternative, the avoidance of inducible defenses by opting for healthy plants gives only an advantage for a very short period of time, as maize plants respond very rapidly, within hours, to an attack (Turlings et al., [@B49]). This is particularly true for plants that are neighboring already attacked plants and have their defenses primed in response to the volatiles emitted by the neighbor (Ton et al., [@B47]). This then only leaves the risk of competition and possibly cannibalism. This risk may be minor in light of the possibility of not finding a plant at all and unlike *S. frugiperda*, *S. littoralis* is not cannibalistic, at least not the colony that we used in our experiments. We therefore hypothesized that *Spodoptera* and other larvae of herbivorous insects have adapted to use the readily available and reliable herbivore-induced volatile signals to find host plants despite the risks they will face on these plants, because the likely alternative would be starvation. A similar argument formulated by Carroll et al. ([@B7]) emphasizes the limited range at which caterpillars can forage, as compared to the highly mobile adults. The far less mobile caterpillars, when fallen to the ground, have a high risk of predation and are fully exposed to unfavorable environmental conditions. Getting back on a plant should be high priority and in most cases the same plant will be the closest to crawl on. This may also explain why we found that a previous feeding experience has a significant impact on the attractiveness of the induced maize volatiles. Similar preferences for familiar odors in *S. littoralis* larvae were found by Anderson et al. ([@B1]) and Carlsson et al. ([@B5]) when they studied the caterpillar\'s responses to cotton volatiles. This effect of experience even extends to the adult moth, which prefers to oviposit on the same plant species on which it fed as a larva (Anderson et al., [@B1]). It is also known that caterpillars adapt their feeding physiology to plant diet on which they feed as neonates and will perform worse on an alternative diet (el Campo et al., [@B18]; Zalucki et al., [@B56]), the more reason for the larvae to forage for the same plant species. Once on an already infested plant, however, caterpillars could lessen the risks of competition/cannibalism, which can be very severe in certain *Spodoptera* species (Chapman et al., [@B9], [@B10]; Richardson et al., [@B43]), but this is not the case for *S. littoralis*. They will also reduce the risk of predation and parasitism by avoiding the most odorous plant parts (Turlings and Wäckers, [@B51]). This notion is tentatively supported by the effects of maize VOCs on caterpillar feeding behavior. *S. littoralis* larvae that were exposed to the VOCs induced by their conspecifics on maize plants were found to feed and grow less than larvae that were not exposed to the VOCs (Figure [3](#F3){ref-type="fig"}). This is indicative of an avoidance of the VOCs, which was only evident at high concentrations. Hence, the results of the current study support our hypothesis that on a plant the caterpillars prefer to commence feeding away from freshly damaged areas, i.e., sites from which large amounts of GLVs are emitted. Yet, alternative explanations should be considered. For instance, the larvae that were exposed to GLVs volatiles might have been attracted and searched for the source of the volatiles and therefore ate less on the diet that they were offered. We can also not exclude a direct (toxic) effect of the volatiles on the larvae. In summary, we show here that *Spodoptera littoralis* larvae are attracted to the volatiles emitted by plants that are already damaged by conspecific larvae. Although such plants are less suitable for the larvae than undamaged plants, the larvae may simply opt to go for readily detectable signals. The notion that the larvae are attracted to reliable, familiar volatile signals even if it leads them to sub-optimal resources is further supported by the fact that previous experience with the odors enhances their attractiveness. But once they are on the plants they seem to avoid the volatiles and eat less when they detect high concentrations of them. We speculate that by doing so the larvae avoid the parts of the plant with up-regulated defenses, competition/cannibalism, and natural enemies that are attracted to the same volatiles. An understanding of signals that are of importance for host plant foraging by caterpillars can be of use in the development of pest control strategies. In this context, current focus is on foraging of adults and this has found good use in "push-pull" strategies (Khan et al., [@B34], [@B33]; Cook et al., [@B11]). Similarly, with the right combination of repellent and attractive volatiles, it may be possible to manipulate the foraging of caterpillar such that they are guided away from the crop and toward their demise on trap plants. Conflict of interest statement ------------------------------ The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. We thank Matthias Erb for useful comments on the manuscript. Yves Borcard and several students of the University of Neuchâtel reared parasitoids, and Syngenta (Stein, Switzerland) provided *S. littoralis* eggs. This work received support by the Swiss National Science Foundation via the National Center of Competence in Research *Plant Survival*. [^1]: Edited by: Marcel Dicke, Wageningen University, Netherlands [^2]: Reviewed by: Anne M. Cortesero, University of Rennes1, France; James Blande, University of Eastern Finland, Finland
Farewell to Saturn: NASA releases this stunning image International oi-Vicky By Vicky NASA releases stunning image of planet Saturn as Cassini spacecraft bids adieu | Oneindia News NASA has released a stunning farewell image of Saturn. The image of Saturn and its splendid rings and moons was captured by the Cassini spacecraft during the final leg of its 20- year-long epic journey in space. The probe snapped a series of images that has been assembled into a new mosaic. Cassini's wide-angle camera acquired 42 red, green and blue images, covering the planet and its main rings from one end to the other on September 13 this year. Imaging scientists stitched these frames together to make a natural colour view. The scene also includes the moons Prometheus, Pandora, Janus, Epimetheus, Mimas and Enceladus. Cassini's scientific bounty has been truly spectacular - a vast array of new results leading to new insights and surprises, from the tiniest of ring particles to the opening of new landscapes on Titan and Enceladus, to the deep interior of Saturn itself," said Robert West, Cassini's deputy imaging team leader at NASA's Jet Propulsion Laboratory in the US. The Cassini imaging team had been planning this special farewell view of Saturn for years. For some, when the end finally came, it was a difficult goodbye. It was all too easy to get used to receiving new images from the Saturn system on a daily basis, seeing new sights, watching things change," said Elizabeth Turtle, an imaging team associate at the Johns Hopkins University Applied Physics Laboratory in the US. For others, Cassini's farewell to Saturn is reminiscent of another parting from long ago. For 37 years, Voyager 1's last view of Saturn has been, for me, one of the most evocative images ever taken in the exploration of the solar system," said Carolyn Porco, former Voyager imaging team member and Cassini's imaging team leader at the Space Science Institute in the US. In a similar vein, this 'Farewell to Saturn' will forevermore serve as a reminder of the dramatic conclusion to that wondrous time humankind spent in intimate study of our Sun's most iconic planetary system," said Porco. Launched in 1997, the Cassini spacecraft orbited Saturn from 2004 to 2017. The mission made numerous dramatic discoveries, including the surprising geologic activity on Saturn's moon Enceladus and liquid methane seas on Saturn's largest moon, Titan. Cassini ended its journey with a dramatic plunge into Saturn's atmosphere on September 15, this year, returning unique science data until it lost contact with Earth. OneIndia News
An Englishman's Castle An Englishman's Castle is a BBC television serial first broadcast in 1978, written by Philip Mackie and directed by Paul Ciappessoni. The story was set in an alternate history 1970s, in which Nazi Germany won World War II and England is run by a collaborationist fascist government. Peter Ingram (Kenneth More) is a writer for a soap opera (also called An Englishman's Castle), which is set in London in 1940, during the fictional Nazi invasion and subsequent occupation. Plot Peter Ingram is a successful London screenwriter, the creator of one of the most popular television shows in Nazi-occupied Europe, An Englishman's Castle. It is a period soap opera, following an ordinary London family during an imagined German invasion of England in 1940. Ingram is oblivious to Nazi rule, which is hidden behind a façade of seemingly-normal English daily life. The invasion was followed by several years of guerrilla warfare, which ended in a truce with Germany and an amnesty that enabled the resisters to resume normal daily life in return for accepting the reality of German occupation, which they generally did, feeling that further resistance was futile. Ingram's show furthers the feeling among the population in the present (1978) and so is highly valuable to the authorities. A kind of normality was restored, with few Germans to be seen in the streets. German rule is maintained mainly through an extensive system of collaborators, known as "delators". When dissidents are detained it is done by polite, soft-spoken English police, but they are then delivered to horrible torture chambers, kept discreetly out of sight. Ingram gradually becomes aware of the real state of things. Firstly, he encounters his superiors' firm objection to the inclusion of a character with a Jewish name in the series. The series is largely based on his own life, he argues, and the Jewish man was a real friend. However, having such a character would violate the official policy of letting the extermination of the Jews remain forgotten, never discussed openly. Then, Ingram discovers that his mistress, Jill, one of the stars of his show, is secretly Jewish and a member of an underground resistance movement. Eventually, his loyalties are tested, and he sides with the resistance. When the resistance decides to include the code word that will signal a nationwide insurgency in his show, due to its huge audience, he complies, allowing Sally (Jill) to speak the phrase when it is filmed. However, in the closing scene, he locks himself in his office as the episode is broadcast, cuts off the feed just before her scene airs, and speaks the phrase himself instead, live over the air. As the sounds of a rebellion against the collaborationist government begin to come through the windows of his office, Ingram awaits the secret police, when someone breaks down the door and he turns to stare at the unseen intruder. Cast Kenneth More as Peter Ingram Isla Blair as Jill / "Sally" Anthony Bate as Harmer Kathleen Byron as Mrs. Ingram Noel Dyson as Connie / "Mrs. Worth" Rob Edwards as Adrian / "Bert Worth" Fiona Gray as Susan Nigel Havers as Mark Ingram Peter Hughes as John / "Mr. Worth" David Meyer as Henry Ingram Frederick Treves as Lonsdale David Roy Paul as Head waiter Brian Peck as Jimmy Philip Bond as Inspector Anthony Stafford as Arthur / "Frank Worth" DVD According to the DVD cover, the series was released by Simply Media and the BBC in 2015. See also Hypothetical Axis victory in World War II External links Category:Alternate history television series Category:Television series about World War II alternate histories Category:1970s British drama television series Category:1978 British television series debuts Category:1978 British television series endings Category:BBC television dramas Category:English-language television programs
Q: cannot get the value from mysql I have no idea why I could not get the value from mysql via php in HTML, can you please tell me what's wrong with my coding below, thanks! this is very strange that I can get the value 1 when I echo $count2 but I could not get the field value no matter echo $bu2 or $dept2, the result of die("123". $bu2 ." ". $count2 ."123"); is 123 1123 if (isset($_POST['update'])) { include 'db.php'; mysql_query("SET CHARACTER SET utf8", $conn); mysql_query("SET NAMES utf8", $conn); $query2=mysql_query("SELECT bu, SUBSTRING_INDEX(dept, '-',-1) AS Department FROM tb_user WHERE username = '". $sessionusername ."'", $conn); $count2=mysql_num_rows($query2); if ($count2 == 1) { $bu2=$query2['bu']; $dept2=$query2['Department']; die("123". $bu2 ." ". $count2 ."123"); } mysql_close($conn);} A: Use mysql_fetch_assoc() and assign it to variable, e.g. $rec, then use $rec['bu'] Full code would be $rec = mysql_fetch_assoc($query2) $bu2 = $rec['bu']; $dept2 = $rec['Department'];
/* Copyright (C) 2009 Stig Brautaset. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /** @mainpage A strict JSON parser and generator for Objective-C JSON (JavaScript Object Notation) is a lightweight data-interchange format. This framework provides two apis for parsing and generating JSON. One standard object-based and a higher level api consisting of categories added to existing Objective-C classes. Learn more on the http://code.google.com/p/json-framework project site. This framework does its best to be as strict as possible, both in what it accepts and what it generates. For example, it does not support trailing commas in arrays or objects. Nor does it support embedded comments, or anything else not in the JSON specification. This is considered a feature. */ #import "SBJson.h" #import "NSObject+SBJson.h"
I Realized I Now Say “Hungry” Not “Hongry” I never thought such a seemingly innocuous moment would weigh on me so profoundly. The visit to my father’s home, the house I grew up in, in Leland, Mississippi in the middle of the Mississippi Delta region, was uneventful. We played dominoes. We ate. I spent countless hours lazing about on his couch, futilely attempting to distance myself from the work that dominated my consciousness. Then, on one of these regular, slow Mississippi Delta days, my dad walked in and asked about food, just as he had done dozens of times before. Only this time I heard him differently, “Well we need to figure something out because I’m hongry.” Hongry. It would be cliché to say that the word struck me, but it definitely raised my eyebrows, gave me pause. It was the first time that I’d noticed the word. As a part of my regular speaking pattern borne of my immersion in Delta culture, the word had been invisible to me. When we were hongry, we ate. Simple. This time, when we were hongry, I wept. I had become aware of the accents of my hometown. That awareness meant that I was different, that I no longer spoke that way, that I no longer said “hongry;” I was, I am, educated, sophisticated, refined, cultured. I am like the Yankees, like the whites, like the uppity Negros on television; I now say “hungry.” “I’m hungry.” The word has become much more than a code switch for me, a word that I pronounce deliberately in mixed company because I’m hyper-aware of my accent. It’s no longer in the arsenal of words that makes me self-conscious of how I speak. It’s off that list. It just…rolls off the tongue. It comes out as naturally as if I had always said it that way, as if my community says it that way. It wasn’t supposed to be that way. Code switching is supposed to be temporary. You’re supposed to be able to turn it on and off, put on a show for the people in power and be real with the people who aren’t. But when the code doesn’t have to switch as much as it used to, you’re forced to acknowledge that even as you stand next to the lines that demarcate the boundaries between yourself and the powers that be, people who formerly stood next to you may look up to find similar lines separating you from them. Hungry. The word is loaded now. Its meaning stretches far beyond its dictionary definition of “feeling of displaying the need for food.” Hungry represents my growing distance from my home communities. Hungry represents my privilege relative to the people I grew up with. Hungry represents all of the things that I was so sure that I wouldn’t become: isolated, different, smug, slowly drifting away from the things, people, and places I used to know and love. Fucking hungry. But the messages conflict. This is what everyone wanted, right? I was one of the chosen ones, right? The smart one, the ambitious one, the “good” one, to go stand on the national stage and make the community proud. And I certainly haven’t forgotten where I came from, but it appears that ambition, that desire to prove myself and succeed both for myself and them, has its costs. Where I’m from, success means leaving. You’re supposed to “go off and be somebody.” We frown upon staying home. We frown upon coming back. We say, “There’s nothing (t)here,” “Go do something,” and in some ways, with a black poverty rate over 40 percent, it’s accurate. So in a fashion reminiscent of the Great Migration, we send our kids to the city. But this time rather than Chicago and Detroit, we send them to Houston, Atlanta, and Charlotte, where they can get good educations, get good jobs, and learn to say “hungry.” And some of us do learn to say it. We learn that we’re hungry. We learn to close the door. We learn to appreciate hardwood floors. But to what end? How does pouring resources into forms of tokenistic escape improve the prospects of the people in the community? How does alienation from their home communities negatively affect those who have been shipped out into the world to represent the community? The fact is that it doesn’t do anything for the community and losing a sense of home can be a dangerous thing, but that’s what happens when we teach that distance is the way success. For me, my connection to the place where I forged my identity, a connection that I have worked so hard to maintain, a connection that I thought I had found successful ways of maintaining, seems to be dissipating, slowly, innocuously. And as I continue along this path, making my living through the country’s elite academic institutions, I have no idea how to stop the bleeding. Related Post navigation 5 responses to “I Realized I Now Say “Hungry” Not “Hongry”” I literally don’t see the point of this article. All I have to say is, love yourself, love your accent, love the skin that you’re in. I’m a Texan and I’m also an Afro-American. I currently use “hongry” instead of “hungry” and I actually wanted to see who else did it besides my family. I didn’t think I would find such a negative, “race-y” article about it. I would never change my accent for anyone! I love who I am, I’m well educated and I can care less who judges me. I will never change myself because I don’t look or talk a certain way. This article is pointless and again, too “race-y”. Good day. A sensational read that will be passed as a lesson, a message, a guide, a promise to my acknowledgment. What will I learn or choose to acknowledge next. Thank you for words that exist to fuel my quest. Even if I, they, we may never understand acknowledging is enough for now.
A review of documentation requirements for preclinical sections, for marketing submissions in the European Community, Japan and the USA. Standardization of the documentation requirements for preclinical sections, for marketing submissions in the European Community (EC), Japan and the USA is proposed. It is unnecessary to standardize the leading summaries of submissions as their format is predicated by the way in which the regulatory authorities review applications. Harmonization of the technical sections will reduce the duplication of effort expended by pharmaceutical companies to produce documentation specific for each regulatory authority. Elimination of requirements specific to individual authorities will further reduce the resource requirements. The proposals made in this paper are aimed to increase the 'user-friendliness' of the preclinical documentation and therefore expedite the review process.
Senator Thomas Byrne and Cllr Wayne Harding have described recent comments by Deputy Regina Doherty in relation to the Slane bypass as “misinformed and completely unhelpful”. Deputy Doherty stated on LMFM on Friday that “a decision was made to enforce a HGV ban” in Slane and in a subsequent press release that a HGV ban needs to be enforced in Slane. Senator Byrne and Cllr Wayne Harding have since been told by senior officials of Meath County Council (the relevant authority) that they have no knowledge of this. Senator Byrne stated “Deputy Doherty sat at a meeting in Meath County Council with me last winter where we were informed that a HGV ban would bring only marginal benefits to Slane and would cause real and dramatic traffic safety issues as far as way as Kilmoon Cross and Kentstown. However, Deputy Doherty in a rush to attack a political opponent rang in to a live radio show on Friday morning to announce the supposed enforcement of the HGV ban. I was shocked at Deputy Doherty’s announcement on the radio but on live radio I accepted it at face value from a Government TD. I have since been assured by Meath County Council officials that the position has not changed (on the HGV ban) since Deputy Doherty and myself met them last year.” Cllr Wayne Harding stated “I am really at a loss as to why these statements are being made as other elected members within her party are well informed about the issues in Slane and I would not believe they would issue such an ill informed statement. Deputy Doherty’s statement has caused huge confusion in Slane. I am glad that Senator Thomas Byrne raised the issue of the Slane Bypass in the Seanad and like many in Slane, I was very annoyed that Minister Varadkar stated that he had no official responsibility in the matter.” Hey Micheal Martin, whats this rubbish about you defending 180 Garda statements that didn't hold up in Court.. What strokes you trying to pulling in saving this broken institutions face. A) Disband it, its too steeped in civil war politics. B) Establish a new force with a separate investigative wing. C) As the Police are a seperate institution to politics then make the new Commissioner an electable position to ensure public confidence instead of 'political' confidence (other countries do it)
Q: Using __int64 and std::ostringstream in VC6 May I know what is the workaround to make this code passed, in Visual C++ 6? #include <sstream> int main() { std::ostringstream ss; ss << 123; __int64 i; // error C2593: 'operator <<' is ambiguous ss << i; } Upgrade the compiler is not a choice, as I need to use this old compiler, to interface with a legacy system. A: provide custom override for stream insertion operation. sample implementation as below std::ostream& operator<<(std::ostream& stream, __int64 data) { char buf[255] = {0}; _i64tot( data, buf, 10 ); stream << buf; return stream; }
5. Add the URL to your post in the link on Freda's most recent Friday 56 post. Currently reading 56% on my Kindle App: "I remember asking my dad what was wrong with the guy's eyes and my dad explained, "He's sold his soul, son. Whenever you see that look in another persons, you run like hell. You hear me?" In retrospect, I realized it was a strange thing to tell a kid, but in that moment I understood what he'd meant, why he'd warned me. The trafficker smiled at me, but it wasn't all friendly. He was a man who'd answered a call from the devil himself and he'd relished in it." * * * Synopsis: Can be read as a standalone. "Revenge is an euphoric thing. Trust me on this. Nothing compares to the release you get when you ruin someone’s life. When they've stolen important things. Things that didn't belong to them. Things I revel in making them pay for. What? Have I offended you? I’m not here to appeal to your delicate senses. I have no intention of placating your wishes or living within your personal belief system nor do I care if you hate me. And you will hate me. Because I’m a brutal, savage, cold-blooded murderer and I’m here for my revenge. I’m Ethan Moonsong…And this is the story about how I went from the world’s most sacrificing man to the most feared and why I wouldn't trade it for anything in the world." The other books in the series are also really good. They all can be read as a stand alone novels, but, I recommend reading them all. They are books that can make you cry and leave you on the edge of your seat.
rocelle collins A former executive assistant to Detroit Mayor Dave Bing has filed a lawsuit that alleges the mayor had plans to dissolve the Detroit City Council and the Detroit School Board by becoming the emergency manager for both. The plaintiffs in the case are Rochelle Collins, the former executive assistant, and her husband, Oreese Collins. Rochelle Collins and her husband are suing the city of Detroit, Detroit Mayor Dave Bing, and Bing's chief communications officer, Karen Dumas, on four counts:
Full Height Shutters Cover the full height of your window. Full height plantation shutters are our best selling Shutters. With a full height Shutter, your window is completely covered, top to bottom. Whether you are picturing a contemporary or more classic design for your space, full height shutters are made to measure your imagination. As with all shutters, you can opt for a visible tilt rod, providing a classic look, or you can choose to have a hidden tilt rod, giving your shutter a simple, sleeker look.
Comparison of DR. HPV Chip Kit with hybrid capture II assay for the detection of human papillomavirus in clinical samples: a preliminary study. Human papillomavirus (HPV) is well known as an etiological factor for the development of anogenital carcinomas. The aim of our study was to compare the performance of USFDA approved Hybrid II (HCII) Assay and recently introduced DR. HPV Chip Kit for the detection of HPV DNA in clinical cervical scrapings from 40 patients. HPV DNA testing was performed using the automated HCII Assay system and DR. HPV Chip Kit. Taking cytological results as gold standard, it was found that HCII was more sensitive (36.4%) than DR. HPV Chip Kit (18.2%) although specificity was 100% with the latter method. In addition, both these molecular methods had comparable negative and positive predictive values. It was concluded that both HCII and DR. HPV Chip Kit have comparable specificity. However, sensitivity for detection of HPV in clinical samples with HCII is almost double as compared to DR. HPV Chip Kit.
Defaults on Federal Student Loans Decline September 25, 2014 Share This Story The Education Department reported a drop in Americans defaulting on their student loans, a development it attributed to an improving economy and a surge in enrollment in federal debt-forgiveness programs. About one in seven borrowers who left college or graduate school in the fiscal year ended September 2011 had defaulted on their student loans within three years. The official figure—13.7%—was down from the 14.7% rate for those who left school in fiscal 2010. Defaults among recent college grads and dropouts rose steadily since the recession, reflecting high unemployment and growing individual debt burdens. The decline could mean student debt burdens are easing as the economy steadily improves and unemployment falls. Still, the government's default measure vastly underestimates the problem. The government considers people in default if they have made no payments in 360 days. A broader measure by the New York Federal Reserve—which accounts for all Americans with student loans—shows that roughly one in four borrowers are at least 90 days behind on a payment. The government uses the measure to sanction schools with high default rates among former students, and the Education Department said it would strip federal funding for 21 such institutions. But the Obama administration also tweaked the policy this year so that some institutions—including public schools—would avoid sanctions. That drew criticism from for-profit schools and others who said officials were unevenly enforcing federal rules. An Education Department official said the policy change applied to all schools equally and was designed to account for borrowers who owed payments to multiple loan servicers contracted by the government. A small share of borrowers makes payments to one servicer but not others, a possible sign they aren't aware they have more than one. The administration excluded those borrowers from being counted in the default numbers. Historically, the government measured defaults within the first two years of students leaving school, but it moved to a three-year rate in recent years to get a broader picture of borrower outcomes. The Education Department said this year's drop reflected the administration's efforts over the past two years to enroll borrowers in so-called income-based repayment plans, which set borrowers' payments at 10% of their discretionary income. The plans promise to forgive debt after a set period—10 years for those in nonprofit and government jobs, and 20 years for those in the private sector. Enrollment in the plans has surged, thanks in part to a continuing administration publicity campaign. As of June, the number had swelled to 1.91 million Americans holding more than $101 billion in student loans—nearly a 10th of all outstanding federal student debt. The number of borrowers and debt covered roughly has doubled in the past year. The administration says stemming student-loan defaults helps not just individual borrowers but the economy because Americans who default damage their credit and thus impede their ability to spend and borrow. But the programs also carry long-term costs to the government, as any debt forgiven is covered by taxpayers. Some critics say the programs are largely helping graduate students, who have high debt but also high incomes, and thus might not need the aid. Research shows that the typical American who defaults on student loans has a relatively small monthly payment compared to all borrowers, raising questions about whether income-based programs can stem defaults significantly.
Q: Gulp: Passing multiple command line parameters to the same task Goal: Build /src/assets/(theme)/*.scss by passing the parameter in the command line using flag --theme. I solved step one using gulp-utils function sass() { // return gulp.src('/src/assets/scss/**/*.scss') return gulp.src(['src/assets/scss/' + (util.env.theme ? util.env.theme : 'app') + '.scss']) .pipe($.sourcemaps.init()) .pipe($.sass({ includePaths: PATHS.sass }) .on('error', $.sass.logError)) .pipe($.autoprefixer({ browsers: COMPATIBILITY })) // Comment in the pipe below to run UnCSS in production //.pipe($.if(PRODUCTION, $.uncss(UNCSS_OPTIONS))) .pipe($.if(PRODUCTION, $.cleanCss({ compatibility: 'ie9' }))) .pipe($.if(!PRODUCTION, $.sourcemaps.write())) .pipe(gulp.dest(PATHS.dist + '/assets/css')) .pipe(browser.reload({ stream: true })); } Remaining: gulp build --production --theme folderName1, folderName2, folderName* Passing multiple theme values --theme folderName1 folderName2 to the same sass() function/task. This would send folderName to function sass() function sass() { // return gulp.src('/src/assets/scss/**/*.scss') return gulp.src([ 'src/assets/scss/folderName1/*.scss', 'src/assets/scss/folderName2/*.scss', 'src/assets/scss/folderName3/*.scss' ]) ... ... } Would creating an argsList like this SitePoint article discusses work? A: One of my colleagues was able to help resolve this issue. Instead of using gulp.utils he was able to use yargs.argv.theme with slipt(,). This allows for a user to pass the --theme param and pass as many comma-separated items as desired. function sass() { if (yargs.argv.theme) { let collection = yargs.argv.theme.split(','), results = collection.map(item => `./src/assets/scss/${item}/*.scss`); return gulp.src(results) .pipe($.sourcemaps.init()) .pipe($.sass({ includePaths: PATHS.sass }) .on('error', $.sass.logError)) .pipe($.autoprefixer({ browsers: COMPATIBILITY })) // Comment in the pipe below to run UnCSS in production //.pipe($.if(PRODUCTION, $.uncss(UNCSS_OPTIONS))) .pipe($.if(PRODUCTION, $.cleanCss({ compatibility: 'ie9' }))) .pipe($.if(!PRODUCTION, $.sourcemaps.write())) .pipe(gulp.dest(PATHS.dist + '/assets/css')) .pipe(browser.reload({ stream: true })); } }
Physician Profiles Dr. Steven C. Flashner Dr. Steven C. Flashner is a native of Philadelphia. He graduated Phi Beta Kappa from the State Univeristy of New York at Stony Brook. He earned his M.D. degree at Thomas Jefferson University, receiving honors in urology. After a surgical internship at Medical College of Pennsylvania, he served in the Public Health Service in rural Virginia as a primary care physician. During his urology training at Duke University Medical Center, he studied urologic cancer, and earned recognition for excellence in the care of patients with urologic malignancy. Dr. Flashner completed further training at Duke University Medical Center as a fellow in pediatric urology. He served on the faculty at Duke for two years prior to starting his practice in Central Bucks County. Dr. Albert Ruenes, Jr. Dr. Albert Ruenes, Jr. is a native of Long Island, New York. He graduated Phi Beta Kappa from the College of William & Mary in Virginia. Dr. Ruenes earned his M.D. at Columbia University's College of Physicians and Surgeons. He completed his residency in Urologic surgery at Duke University Medical Center. While at Duke, he earned intra-departmental recognition for his excellence in the diagnosis and treatment of patients with urologic cancers. While an expert in the fields of urologic oncology, female urology and impotence, Dr. Ruenes maintains a special interest in the open surgical and robotic management of bladder, kidney, and prostate cancer, kidney stone diseases, and infertility Dr. Kevin B. Fitzgerald Dr. Kevin B. Fitzgerald, a Doylestown resident, graduated from Dartmouth College with high honors in 1989. He earned his M.D., with honors, from Baylor College of Medicine in 1993. He completed his Urologic Surgery residency at Duke University in 1999. Dr. Fitzgerald specializes in minimally invasive surgical techniques, including laparoscopy, robotic surgery, laser surgery, and no-needle, no-scalpel vasectomy. While an expert in the field of Adult Urology, he also maintains special interest in prostate cancer, kidney cancer, bladder cancer, stone disease, and male voiding dysfunction. Dr. Fitzgerald is a regional expert in Robotic Surgery, having performed the most robotic surgeries in Bucks County. Dr. Frank H. Roland, Jr. Dr. Frank H. Roland, Jr. graduated Summa Cum Laude from the University of Pennsylvania. He earned his medical degree at Duke University Medical School where he was named the Hewlett-Packard top medical graduate. He remained at Duke, finishing his general and urologic surgery training in 2000 as a Pfizer Urology Scholar. Dr. Roland now resides in Buckingham, and treats all aspects of urologic disease, with concentrated efforts in minimally-invasive stone therapy, prostate, kidney, and bladder cancer, no-needle no-scalpel vasectomy, and female voiding dysfunction and incontinence.
Full Notification US 101 northbound is now OPEN between Ventura and Santa Barbara. #ThomasFire. Use caution. Details here: US 101 northbound is now open between Ventura and Santa Barbara. However, traffic continues to be impacted due to increased fire activity and evacuations in Santa Barbara County because of the #ThomasFire. The southbound side remains open. Motorists traveling northbound should still avoid the area. Many of the northbound US 101 offramps in the Santa Barbara area are closed because of the fire activity. The latest fire information can be found at www.readyventuracounty.org or www.countyofSB.org
/* * * ***** BEGIN LICENSE BLOCK ***** * Version: MPL 1.1/GPL 2.0 * * The contents of this file are subject to the Mozilla Public License Version * 1.1 (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the * License. * * The Original Code is Rhino code, released * May 6, 1999. * * The Initial Developer of the Original Code is * Netscape Communications Corporation. * Portions created by the Initial Developer are Copyright (C) 1997-1999 * the Initial Developer. All Rights Reserved. * * Contributor(s): * Google Inc. * * Alternatively, the contents of this file may be used under the terms of * the GNU General Public License Version 2 or later (the "GPL"), in which * case the provisions of the GPL are applicable instead of those above. If * you wish to allow use of your version of this file only under the terms of * the GPL and not to allow others to use your version of this file under the * MPL, indicate your decision by deleting the provisions above and replacing * them with the notice and other provisions required by the GPL. If you do * not delete the provisions above, a recipient may use your version of this * file under either the MPL or the GPL. * * ***** END LICENSE BLOCK ***** */ package com.google.javascript.rhino; import static com.google.common.base.Preconditions.checkNotNull; import static com.google.common.base.Preconditions.checkState; import com.google.common.annotations.VisibleForTesting; import com.google.common.base.Function; import com.google.javascript.rhino.PMap.Reconciler; import java.io.Serializable; import java.util.ArrayDeque; import java.util.Arrays; import java.util.Collections; import java.util.Deque; import java.util.Iterator; import java.util.Objects; import java.util.function.BiPredicate; import javax.annotation.Nullable; /** * An immutable sorted map with efficient (persistent) updates. * * <p>Uses a hash array mapped trie: http://en.wikipedia.org/wiki/Hash_array_mapped_trie. * * <p>This implementation stores the bare minimum in each node: a key (with its hash), value, mask, * and children. It is also optimized to take maximum advantage of binary operations on shared * trees. Specifically, {@link #reconcile} avoids recursing into entire subtrees if they are * identical objects. Null keys and values are not allowed. The implementation special-cases away * the EMPTY map as soon as possible, using 'null' instead for all the logic (since EMPTY violates * the invariant that key and value are non-null). Finally, we maintain an invariant that the * entry with the smallest hash code is always at the root of the tree, which avoids almost all * extra tree rebuilding during binary operations. */ // TODO(sdh): Consider using tricks from https://bendyworks.com/blog/leveling-clojures-hash-maps // We need a solid way to profile the results to see if it's actually worth the extra code. public final class HamtPMap<K, V> implements PMap<K, V>, Serializable { /** * Number of bits of fan-out at each level. May be anywhere from 1 (a binary tree) to 5 (for a * fan-out of 32). Anything larger requires using a long for the mask (which is ugly for the * JavaScript-compiled version), and zero is essentially a linked list. The relevant trade-off is * that more fan-out means shallower trees, which should lead to quicker look-up times and more * efficient updates, but less fan-out makes reconcile() and equivalent() more efficient for maps * that are mostly the same, since bigger common trees can be pruned from the operation. * Preliminary profiling suggests that for type-checking purposes, all nonzero values are roughly * comparable. */ private static final int BITS = 4; /** Number of bits to shift off to get the most significant BITS number of bits. */ private static final int BITS_SHIFT = 32 - BITS; /** Non-null key (exception: empty map has a null key). */ private final K key; /** Hash of the key, right-shifted by BITS*depth. */ private final int hash; /** Non-null value (exceptions: (1) empty map, (2) result of pivot, if not found). */ private final V value; /** Bit mask indicating the children that are present (bitCount(mask) == children.length). */ private final int mask; /** Non-null array of children. Elements are never reassigned. */ private final HamtPMap<K, V>[] children; private static final HamtPMap<?, ?>[] EMPTY_CHILDREN = new HamtPMap<?, ?>[0]; private static final HamtPMap<?, ?> EMPTY = new HamtPMap<>(null, 0, null, 0, emptyChildren()); private HamtPMap(K key, int hash, V value, int mask, HamtPMap<K, V>[] children) { this.key = key; this.hash = hash; this.value = value; this.mask = mask; this.children = children; this.checkInvariants(); } private void checkInvariants() { checkState(Integer.bitCount(this.mask) == this.children.length); for (HamtPMap<?, ?> child : this.children) { checkNotNull(child); } } /** Returns an empty map. */ @SuppressWarnings("unchecked") // Empty immutable collection is safe to cast. public static <K, V> HamtPMap<K, V> empty() { return (HamtPMap<K, V>) EMPTY; } /** Returns an empty array of child maps. */ @SuppressWarnings("unchecked") // Empty array is safe to cast. private static <K, V> HamtPMap<K, V>[] emptyChildren() { return (HamtPMap<K, V>[]) EMPTY_CHILDREN; } @Override public String toString() { StringBuilder sb = new StringBuilder().append("{"); if (!isEmpty()) { appendTo(sb); } return sb.append("}").toString(); } /** Appends this map's contents to a string builder. */ private void appendTo(StringBuilder sb) { if (sb.length() > 1) { sb.append(", "); } sb.append(key).append(": ").append(value); for (HamtPMap<K, V> child : children) { child.appendTo(sb); } } /** Returns whether this map is empty. */ @Override public boolean isEmpty() { return key == null; } /** Returns an iterable for a (possibly null) tree. */ @Override public Iterable<V> values() { if (isEmpty()) { return Collections.<V>emptyList(); } return () -> new Iter<>(this, map -> map.value); } /** Returns an iterable for a (possibly null) tree. */ @Override public Iterable<K> keys() { if (isEmpty()) { return Collections.emptyList(); } return () -> new Iter<>(this, map -> map.key); } /** * Retrieves the value associated with the given key from the map, or returns null if it is not * present. */ @Override public V get(K key) { return !isEmpty() ? get(key, hash(key)) : null; } /** Internal recursive implementation of get(K). */ private V get(K key, int hash) { if (hash == this.hash && key.equals(this.key)) { return this.value; } int bucket = bucket(hash); int bucketMask = 1 << bucket; return (mask & bucketMask) != 0 ? children[index(bucketMask)].get(key, shift(hash)) : null; } /** * Returns a new map with the given key-value pair added. If the value is already present, then * this same map will be returned. */ @Override public HamtPMap<K, V> plus(K key, V value) { checkNotNull(value); return !isEmpty() ? plus(key, hash(key), value) : new HamtPMap<>(key, hash(key), value, 0, emptyChildren()); } /** Internal recursive implementation of plus(K, V). */ private HamtPMap<K, V> plus(K key, int hash, V value) { if (hash == this.hash && key.equals(this.key)) { return value.equals(this.value) ? this : new HamtPMap<>(key, hash, value, mask, children); } if (compareUnsigned(hash, this.hash) < 0) { return replaceRoot(key, hash, value); } int bucket = bucket(hash); hash = shift(hash); int bucketMask = 1 << bucket; int index = index(bucketMask); if ((mask & bucketMask) != 0) { // already a child, so overwrite HamtPMap<K, V> child = children[index]; HamtPMap<K, V> newChild = child.plus(key, hash, value); return child == newChild ? this : withChildren(mask, replaceChild(children, index, newChild)); } else { // insert at index HamtPMap<K, V> newChild = new HamtPMap<>(key, hash, value, 0, emptyChildren()); return withChildren(mask | bucketMask, insertChild(children, index, newChild)); } } private HamtPMap<K, V> replaceRoot(K key, int hash, V value) { int bucket = bucket(this.hash); int leafHash = shift(this.hash); int bucketMask = 1 << bucket; int index = index(bucketMask); HamtPMap<K, V>[] newChildren; if ((mask & bucketMask) != 0) { newChildren = replaceChild(children, index, children[index].plus(this.key, leafHash, this.value)); } else { HamtPMap<K, V> newChild = new HamtPMap<>(this.key, leafHash, this.value, 0, emptyChildren()); newChildren = insertChild(children, index, newChild); } return new HamtPMap<>(key, hash, value, mask | bucketMask, newChildren); } /** * Returns a new map with the given key removed. If the key was not present in the first place, * then this same map will be returned. */ @Override public HamtPMap<K, V> minus(K key) { return !isEmpty() ? minus(key, hash(key), null) : this; } /** * Internal recursive implementation of minus(K). The value of the removed node is returned via * the 'value' array, if it is non-null. */ private HamtPMap<K, V> minus(K key, int hash, V[] value) { if (hash == this.hash && key.equals(this.key)) { HamtPMap<K, V> result = deleteRoot(mask, children); if (value != null) { value[0] = this.value; } return result != null ? result : empty(); } int bucket = bucket(hash); int bucketMask = 1 << bucket; if ((mask & bucketMask) == 0) { // not present, stop looking return this; } hash = shift(hash); int index = index(bucketMask); HamtPMap<K, V> child = children[index]; HamtPMap<K, V> newChild = child.minus(key, hash, value); if (newChild == child) { return this; } else if (newChild == EMPTY) { return withChildren(mask & ~bucketMask, deleteChild(children, index)); } else { return withChildren(mask, replaceChild(children, index, newChild)); } } @Override public HamtPMap<K, V> reconcile(PMap<K, V> that, Reconciler<K, V> joiner) { HamtPMap<K, V> result = reconcile( !this.isEmpty() ? this : null, !that.isEmpty() ? (HamtPMap<K, V>) that : null, (k, v1, v2) -> checkNotNull(joiner.merge(k, v1, v2))); return result != null ? result : empty(); } /** Internal recursive implementation of reconcile(HamtPMap, BiFunction), factoring out empies. */ private static <K, V> HamtPMap<K, V> reconcile( @Nullable HamtPMap<K, V> t1, @Nullable HamtPMap<K, V> t2, Reconciler<K, V> joiner) { if (t1 == t2) { return t1; } else if (t1 == null) { V newValue = joiner.merge(t2.key, null, t2.value); HamtPMap<K, V>[] newChildren = Arrays.copyOf(t2.children, t2.children.length); for (int i = 0; i < newChildren.length; i++) { newChildren[i] = reconcile(null, newChildren[i], joiner); } return newValue != null ? new HamtPMap<>(t2.key, t2.hash, newValue, t2.mask, newChildren) : deleteRoot(t2.mask, newChildren); } else if (t2 == null) { V newValue = joiner.merge(t1.key, t1.value, null); HamtPMap<K, V>[] newChildren = Arrays.copyOf(t1.children, t1.children.length); for (int i = 0; i < newChildren.length; i++) { newChildren[i] = reconcile(newChildren[i], null, joiner); } return newValue != null ? new HamtPMap<>(t1.key, t1.hash, newValue, t1.mask, newChildren) : deleteRoot(t1.mask, newChildren); } // Try as hard as possible to return input trees exactly. boolean sameChildrenAs1 = true; boolean sameChildrenAs2 = true; // If the hashes are different, we need to keep the lower one at the top. int hashCmp = compareUnsigned(t1.hash, t2.hash); K key = t1.key; int hash = t1.hash; if (hashCmp < 0) { // t1.key is missing from t2 t2 = t2.vacateRoot(); sameChildrenAs2 = false; } else if (hashCmp > 0) { // t2.key is missing from t1 t1 = t1.vacateRoot(); sameChildrenAs1 = false; key = t2.key; hash = t2.hash; } else if (!t1.key.equals(t2.key)) { // Hash collision: try to rearrange t2 to have the same root as t1 t2 = t2.pivot(t1.key, t1.hash); sameChildrenAs2 = false; } // Note: one or the other (but not both) tree may have a null key at root. V newValue = Objects.equals(t1.value, t2.value) ? t1.value : joiner.merge(t1.key != null ? t1.key : t2.key, t1.value, t2.value); int newMask = t1.mask | t2.mask; sameChildrenAs1 &= (newMask == t1.mask); sameChildrenAs2 &= (newMask == t2.mask); @SuppressWarnings("unchecked") // only used internally. HamtPMap<K, V>[] newChildren = newMask != 0 ? (HamtPMap<K, V>[]) new HamtPMap<?, ?>[Integer.bitCount(newMask)] : emptyChildren(); int mask = newMask; int index = 0; while (mask != 0) { int childBit = Integer.lowestOneBit(mask); mask &= ~childBit; HamtPMap<K, V> child1 = t1.getChild(childBit); HamtPMap<K, V> child2 = t2.getChild(childBit); newChildren[index] = reconcile(child1, child2, joiner); sameChildrenAs1 &= (newChildren[index] == child1); sameChildrenAs2 &= (newChildren[index] == child2); if (newChildren[index] != null) { index++; } else { newMask &= ~childBit; } } if (sameChildrenAs1 && t1.value.equals(newValue)) { return t1; } else if (sameChildrenAs2 && t2.value.equals(newValue)) { return t2; } else if (newValue == null) { return deleteRoot(newMask, newChildren); } return new HamtPMap<>(key, hash, newValue, newMask, newChildren); } /** * Checks equality recursively based on the given equivalence. Short-circuits as soon as a 'false' * result is found. */ @Override public boolean equivalent(PMap<K, V> that, BiPredicate<V, V> equivalence) { return equivalent( !this.isEmpty() ? this : null, !that.isEmpty() ? (HamtPMap<K, V>) that : null, equivalence); } /** Internal recursive implementation of equivalent(HamtPMap, BiPredicate). */ private static <K, V> boolean equivalent( @Nullable HamtPMap<K, V> t1, @Nullable HamtPMap<K, V> t2, BiPredicate<V, V> equivalence) { if (t1 == t2) { return true; } else if (t1 == null || t2 == null) { return false; } if (t1.hash != t2.hash) { // Due to our invariant, we can safely conclude that there's a discrepancy in the // keys without any extra work. return false; } else if (!t1.key.equals(t2.key)) { // Hash collision: try to rearrange t2 to have the same root as t1 t2 = t2.pivot(t1.key, t1.hash); if (t2.key == null) { // t1.key not found in t2 return false; } } if (!equivalence.test(t1.value, t2.value)) { return false; } int mask = t1.mask | t2.mask; while (mask != 0) { int childBit = Integer.lowestOneBit(mask); mask &= ~childBit; if (!equivalent(t1.getChild(childBit), t2.getChild(childBit), equivalence)) { return false; } } return true; } /** * Returns the index into the 'children' array for the given bit, which must have exactly one bit * set in its binary representation (i.e. must be a power of two). */ private int index(int bit) { return Integer.bitCount(mask & (bit - 1)); } /** * Returns the child for the given bit, which must have exactly one bit set. Returns null if there * is no child for that bit. */ private HamtPMap<K, V> getChild(int bit) { return (mask & bit) != 0 ? children[index(bit)] : null; } /** * Perform the hash operation. This is done once per object as it enters the map, then never * again since the result is passed around internally. We reverse the bits since certain types * (such as small integers and short strings) have hash codes that only vary in the least * significant bits, but we use the most significant bits for bucketing in order to maintain * a canonical structure where the key with the smallest hash is always at the root of the * tree. */ private static int hash(Object key) { return Integer.reverse(key.hashCode()); } /** Return the current bucket index from the hash. */ private static int bucket(int hash) { return hash >>> BITS_SHIFT; } /** Return a new hash with the next bucket number shifted off. */ private static int shift(int hash) { return hash << BITS; } /** Unshift the bucket number back onto a hash. */ private static int unshift(int hash, int bucket) { return (hash >>> BITS) | (bucket << BITS_SHIFT); } /** Compare two unsigned integers. */ private static int compareUnsigned(int left, int right) { // NOTE: JDK 7 does not have a built-in operation for this, other than casting to longs. // In JDK 8 it's just Integer.compareUnsigned(left, right). For now we emulate it // by shifting the sign bit away, with a fallback second compare only if needed. int diff = (left >>> 2) - (right >>> 2); return diff != 0 ? diff : (left & 3) - (right & 3); } /** * Returns a new version of this map with the given key at the root, and the root element moved to * some deeper node. If the key is not found, then value will be null. */ @SuppressWarnings("unchecked") private HamtPMap<K, V> pivot(K key, int hash) { return pivot(key, hash, null, (V[]) new Object[1]); } /** * Internal recursive version of pivot. If parent is null then the result is used for the value in * the returned map. The value, if found, is stored in the 'result' array as a secondary return. */ private HamtPMap<K, V> pivot(K key, int hash, HamtPMap<K, V> parent, V[] result) { int newMask = mask; HamtPMap<K, V>[] newChildren = this.children; if (hash == this.hash && key.equals(this.key)) { // Found the key: swap out this key/value with the parent and return the result in the holder. result[0] = this.value; } else { // Otherwise, see if the value might be present in a child. int searchBucket = bucket(hash); int replacementBucket = bucket(this.hash); if (searchBucket == replacementBucket) { int bucketMask = 1 << searchBucket; if ((mask & bucketMask) != 0) { // Found a child, call pivot recursively. int index = index(bucketMask); HamtPMap<K, V> child = newChildren[index]; HamtPMap<K, V> newChild = child.pivot(key, shift(hash), this, result); newChildren = replaceChild(newChildren, index, newChild); } } else { int searchMask = 1 << searchBucket; if ((mask & searchMask) != 0) { int index = index(searchMask); HamtPMap<K, V> child = newChildren[index]; HamtPMap<K, V> newChild = child.minus(key, shift(hash), result); if (!newChild.isEmpty()) { newChildren = replaceChild(newChildren, index, newChild); } else { newChildren = deleteChild(newChildren, index); newMask &= ~searchMask; } } int replacementMask = 1 << replacementBucket; int index = Integer.bitCount(newMask & (replacementMask - 1)); if ((mask & replacementMask) != 0) { HamtPMap<K, V> child = newChildren[index]; HamtPMap<K, V> newChild = child.plus(this.key, shift(this.hash), this.value); newChildren = replaceChild(newChildren, index, newChild); } else { newChildren = insertChild( newChildren, index, new HamtPMap<>(this.key, shift(this.hash), this.value, 0, emptyChildren())); newMask |= replacementMask; } } } return parent != null ? new HamtPMap<>(parent.key, shift(parent.hash), parent.value, newMask, newChildren) : new HamtPMap<>(key, hash, result[0], newMask, newChildren); } /** Moves the root into the appropriate child. */ private HamtPMap<K, V> vacateRoot() { int bucket = bucket(this.hash); int bucketMask = 1 << bucket; int index = index(bucketMask); if ((mask & bucketMask) != 0) { HamtPMap<K, V> newChild = children[index].plus(this.key, shift(this.hash), this.value); return new HamtPMap<>(null, 0, null, mask, replaceChild(children, index, newChild)); } HamtPMap<K, V> newChild = new HamtPMap<>(this.key, shift(this.hash), this.value, 0, emptyChildren()); return new HamtPMap<>(null, 0, null, mask | bucketMask, insertChild(children, index, newChild)); } /** Returns a copy of this node with a different array of children. */ private HamtPMap<K, V> withChildren(int mask, HamtPMap<K, V>[] children) { return mask == this.mask && children == this.children ? this : new HamtPMap<>(key, hash, value, mask, children); } /** * Returns a new map with the elements from children. One element is removed from one of the * children and promoted to a root node. If there are no children, returns null. */ private static <K, V> HamtPMap<K, V> deleteRoot(int mask, HamtPMap<K, V>[] children) { if (mask == 0) { return null; } HamtPMap<K, V> child = children[0]; int hashBits = Integer.numberOfTrailingZeros(mask); int newHash = unshift(child.hash, hashBits); HamtPMap<K, V> newChild = deleteRoot(child.mask, child.children); if (newChild == null) { int newMask = mask & ~Integer.lowestOneBit(mask); return new HamtPMap<>(child.key, newHash, child.value, newMask, deleteChild(children, 0)); } else { return new HamtPMap<>( child.key, newHash, child.value, mask, replaceChild(children, 0, newChild)); } } /** Returns a new array of children with an additional child inserted at the given index. */ private static <K, V> HamtPMap<K, V>[] insertChild( HamtPMap<K, V>[] children, int index, HamtPMap<K, V> child) { @SuppressWarnings("unchecked") // only used internally. HamtPMap<K, V>[] newChildren = (HamtPMap<K, V>[]) new HamtPMap<?, ?>[children.length + 1]; newChildren[index] = child; System.arraycopy(children, 0, newChildren, 0, index); System.arraycopy(children, index, newChildren, index + 1, children.length - index); return newChildren; } /** Returns a new array of children with the child at the given index replaced. */ private static <K, V> HamtPMap<K, V>[] replaceChild( HamtPMap<K, V>[] children, int index, HamtPMap<K, V> child) { HamtPMap<K, V>[] newChildren = Arrays.copyOf(children, children.length); newChildren[index] = child; return newChildren; } /** Returns a new array of children with the child at the given index deleted. */ private static <K, V> HamtPMap<K, V>[] deleteChild( HamtPMap<K, V>[] children, int index) { if (children.length == 1) { // Note: index should always be zero. return emptyChildren(); } @SuppressWarnings("unchecked") // only used internally. HamtPMap<K, V>[] newChildren = (HamtPMap<K, V>[]) new HamtPMap<?, ?>[children.length - 1]; System.arraycopy(children, 0, newChildren, 0, index); System.arraycopy(children, index + 1, newChildren, index, children.length - index - 1); return newChildren; } /** Iterates sequentially over a tree. */ private static class Iter<K, V, O> implements Iterator<O> { final Deque<HamtPMap<K, V>> queue = new ArrayDeque<>(); final Function<HamtPMap<K, V>, O> transformer; Iter(HamtPMap<K, V> map, Function<HamtPMap<K, V>, O> transformer) { this.transformer = transformer; if (!map.isEmpty()) { queue.add(map); } } @Override public boolean hasNext() { return !queue.isEmpty(); } @Override public O next() { HamtPMap<K, V> top = queue.removeFirst(); for (int i = top.children.length - 1; i >= 0; i--) { queue.add(top.children[i]); } return transformer.apply(top); } @Override public void remove() { throw new UnsupportedOperationException(); } } /** Throws an assertion error if the map invariant is violated. */ @VisibleForTesting HamtPMap<K, V> assertCorrectStructure() { if (isEmpty()) { return this; } int hash = hash(key); for (int i = 0; i < children.length; i++) { int childHash = hash(children[i].key); if (compareUnsigned(childHash, hash) < 0) { throw new AssertionError("Invalid map has decreasing hash " + children[i].key + "(" + Integer.toHexString(childHash) + ") beneath " + key + "(" + Integer.toHexString(hash) + ": " + this); } children[i].assertCorrectStructure(); } return this; } }
1. Field of the Invention The present invention relates to clock switching circuitry applicable to, e.g., a bit synchronizing circuit for a high-speed transmission interface for receiving input data timed with one clock and developing the input data in synchronized with another clock different in phase from the one clock. 2. Description of the Background Art Clock switching circuitry is disclosed in, e.g., Japanese patent laid-open publication No. 268201/1993 (Document 1 hereinafter) and Japanese Patent No. 3119793. The circuitry taught in Document 1 includes a plurality of memories. When writing the memories, input data are written into the memories in timed with a write clock while sequentially switching the memories frame by frame of the input data. On the other hand, when reading the memories a read clock is supplied to read out the data from the memories while sequentially switching the memories frame by frame. As a result, the data are transferred from the write clock to the read clock. The circuitry of Document 1 includes a phase monitor and a phase controller. The phase monitor detects a conflict occurring between the write phase and the read phase in the same memory. When the phase monitor detects a conflict, the phase controller varies the read phase and thereby sets up a preselected phase difference between the write phase and the read phase. It is to be noted that a conflict refers to, e.g., an occurrence that data writing and data reading of the same storage location of an address occur at the same time. A conflict causes data, while being written into the storage location, to be read out halfway, resulting in incorrect data. It is therefore necessary to surely detect a conflict and prevent it from repeating. With the above configuration, the circuitry of Document 1 can switch the clock without resorting to a digital-to-analog converter and an analog-to-digital converter heretofore essential for clock switching. However, the circuitry of Document 1 has some problems left unsolved, as will be described hereinafter. The write clock dominating the write phase in an address space and the read clock dominating the read phase out of the address space are not synchronous to each other, i.e., not always coincident in phase with each other. Moreover, to detect a conflict, the phase monitor compares the phase of a write window pulse derived from the asynchronous write phase with the phase of a read pulse, i.e., produces an AND of the two pulses. This kind of scheme fails to surely detect a conflict itself. For example, assume that the phase monitor determines that a conflict has occurred when the high level of the write window pulse and that of the read pulse overlap each other. Then, the duration of the overlap is likely to be extremely short, e.g., shorter than the duration of a single clock pulse because the two pulses are not synchronous to each other. Generally, the above duration may even be shorter than a period of time necessary for a flip-flop or a latch to be set up and hold data. In such a case, correctness of data held in the flip-flop or the latch cannot be guaranteed, resulting in low reliability. On the other hand, a CAD (Computer Aided Design) tool may often be used to design the clock switching circuitry in the same manner as to design electronic circuits in general. In this respect, the write window pulse and read pulse not synchronous to each other prevent a simple software macro-function, which can work sufficiently only by specifying functions of a clock switching circuitry, from being used with the CAD tool. Therefore, to design a clock switching circuit, use must be made of a hardware macro-function for specifying even the layout of the individual circuit devices in detail. It makes design work difficult to perform. It is an object of the present invention to provide clock switching circuitry capable of detecting a conflict with high reliability and facilitating design work using a CAD tool. Clock switching circuitry of the present invention includes a memory having a plurality of storage locations of a particular address each. The memory allows data to be written into and read out from each storage location at the same time. A write pointer causes a write address addressing a storage location to vary in synchronism with a write clock. A read pointer causes a read address addressing a storage location to vary in synchronism with a read clock. A synchronizer selectively executes first synchronization for synchronizing the phase of the write address with the read clock to generate a synchronized write address or second synchronization for synchronizing the phase of the read address with the write clock to generate a synchronized read address. A conflict detector outputs an alarm signal when determining that a phase difference between the write address and the synchronized read address is smaller than a preselected reference value or that a phase difference between the read address and the synchronized write address is smaller than the preselected reference value. A conflict avoiding circuit executes, in response to the alarm signal, a conflict avoiding operation that causes the write address and read address to differ form each other by at least the reference value.
[Obstructive uropathy secondary to recurrent pelvic endometriosis: description of a clinical case]. The typical presentation of endometriosis is pelvic pain. Patients with with endometriosis often have associated fertility disorders even if their relationship with the symptoms and signs of endometriosis is not evident. The first line of treatment for endometriosis must be surgery. In case of infertility the preferred approach is laparoscopic, maybe in association with medical treatment and possibly followed up by a second-look. In cases with relevant pelvic pain and involvement of other organs, laparotomy is necessary, particularly when a deep endometriosis is infiltrating the uterosacral ligaments, the rectovaginal septum and the bladder. Medical treatment of endometriosis is based upon the hormone-dependency of the endometriotic lesions inducing a resting status. Adhesions, endometriomas or fibrous sequelae do not respond to medical treatment. We describe a case of recurrent endometriosis treated with radical surgery for relevant lesions and fibrous adhesions of ureters with consequent bilateral hydronephrosis.