text
stringlengths
0
6.48M
meta
dict
<?php namespace Drupal\node\Form; use Drupal\Core\Entity\ContentEntityDeleteForm; /** * Provides a form for deleting a node. * * @internal */ class NodeDeleteForm extends ContentEntityDeleteForm { /** * {@inheritdoc} */ protected function getDeletionMessage() { /** @var \Drupal\node\NodeInterface $entity */ $entity = $this->getEntity(); $node_type_storage = $this->entityTypeManager->getStorage('node_type'); $node_type = $node_type_storage->load($entity->bundle())->label(); if (!$entity->isDefaultTranslation()) { return $this->t('@language translation of the @type %label has been deleted.', [ '@language' => $entity->language()->getName(), '@type' => $node_type, '%label' => $entity->label(), ]); } return $this->t('The @type %title has been deleted.', [ '@type' => $node_type, '%title' => $this->getEntity()->label(), ]); } /** * {@inheritdoc} */ protected function logDeletionMessage() { /** @var \Drupal\node\NodeInterface $entity */ $entity = $this->getEntity(); $this->logger('content')->notice('@type: deleted %title.', ['@type' => $entity->getType(), '%title' => $entity->label()]); } }
{ "pile_set_name": "Github" }
1. Field of the Disclosure The present application relates generally to latching systems. More particularly, the present application relates to container latches for a container chassis. 2. Description of the Background of the Disclosure In a conventional container chassis used for transporting a container, the container is secured to the container chassis by two latches spaced apart at each of the two front corners and two latches spaced apart at each of the two rear corners of the container chassis. These latches are manually operated by the driver or other personnel. The rear latches may have a twist lock that is inserted into the bottom of the corner castings of a container. The twist lock may be operated by a lever to move the twist lock between an unlatched position and a latched position. The front latches of a conventional chassis that is 40 to 53 feet in length may have locking pins that extend horizontally into openings of the corner castings of the container. The front of a conventional chassis that is 20 feet in length may utilize a twist lock and manual lever rather than the locking pins. Such conventional latching devices are manually operated by the chassis driver or other personnel when a container is placed on a chassis. In turn, the conventional latching devices are manually unlocked before the container is removed from the chassis. The driver or other personnel may improperly or incompletely lock or unlock the latching devices, which may cause improper unloading of the container from the chassis or create the potential for shifting of or losing a container during road transport. Thus, there exists a need for an automatic latching system that does not require human intervention. In the railway transportation industry, a container is typically secured to the four corners of a flatcar using a swing-type latch. Two swing-type latches spaced apart at each of the two front corners and two swing-type latches spaced apart at each of the two rear corners of the flatcar secure the container thereto. Similar to the twist lock latch of a container chassis, the swing-type latches of the flatcar enter openings along the bottom surface of each corner casting of the container. Unlike the twist lock latch, the swing-type latch is continuously biased into position by a spring. As the container is placed on the flatcar, the latch is pushed back against a spring until the latch clears the bottom surface of the corner casting. The latch is designed such that a significant force must be applied against the latch to remove the container from the flatcar. A container weight of approximately 700 lbs may be required to load the container onto the flatcar, and a force of approximately 2,000 lbs, for example, is used to remove the container from the flatcar.
{ "pile_set_name": "USPTO Backgrounds" }
Anorexia nervosa and the Val158Met polymorphism of the COMT gene: meta-analysis and new data. This study aimed to test the association between the Val158Met polymorphism (rs4680) of the catechol-O-methyl transferase gene and anorexia nervosa (AN). First, an association study on two cohorts (306 cases and 1009 controls from Utrecht, and 174 cases and 466 controls from Leiden/NTR) was performed. Subsequently, the results were integrated into a meta-analysis, together with all the case-control and family-based studies, which were testing the same hypothesis and were available in the literature. Altogether, eight studies (11 datasets) were included in this meta-analysis, with a total of 2021 cases, 2848 controls, and 89 informative (heterozygous) trios. The present association studies found no association between AN and rs4680 when testing the allelic contrast [Utrecht odds ratio (OR)=1.14, P=0.14; Leiden OR=1.02, P=0.85]. There was an indication of an association under the dominant model of genetic effect in the Utrecht cohort (for the Met allele, OR=1.42, P=0.03). Nevertheless, the meta-analyses of both the allelic contrast and the dominant effect were nonsignificant (the allelic pooled OR=1.03, P=0.42 and the dominant pooled OR=1.1, P=0.18). The meta-analyses were performed under the fixed-effect model and there was no significant heterogeneity among the effect sizes. Meta-analytically combined evidence from the present genotypings and the literature search shows that the effect sizes are homogeneous across studies and that rs4680 is not associated with AN.
{ "pile_set_name": "PubMed Abstracts" }
[The use of automatic injectors in hysterosalpingography]. The paper describes 168 cases of HSP in which a low-pressure automatic injector, as is normally used in angiography, was used to inject the contrast medium and controlled from the booth of a remote-control X-ray device. Having analysed the clinical indications for this X-ray method, the paper stresses the advantages for the patient, in the form of a lower dose of irradiation and a shorter duration of the test in comparison to traditional methods of manual injection of the contrast medium, and for the operator who is completely protected from irradiation.
{ "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention This invention relates to a digital input means for miniature type electronic devices such as an electronic timepiece or the like and more particularly to a data input construction which makes use of a mechano-electrical converter element such as a piezoelectric element or the like. 2. Description of the Prior Art In a miniature type electronic device such as an electronic timepiece or the like having a digital display, a so-called select and set system has heretofore been proposed. In such system, a push button as an external actuator member is operated to supply data as an input for the purpose, for example, of setting hour and minute. Meanwhile, a so-called winding stem type input system has also been known which makes use of a winding stem as an external actuator element so as to rotate it for the purpose of continuously correcting hour and minute. However, the former select and set system is rather troublesome in operation for those skilled in correcting a conventional needle type timepiece, that is, a conventional analogue timepiece. The latter winding stem type input system has been developed in order to eliminate the drawback which has been encountered with the former select and set system. But, this winding stem input system has the disadvantage that leftward rotating direction and rightward rotating direction of the winding stem must be detected so as to effect plus correction or minus correction, thereby requiring complex contacts, that it is impossible to make small in space, that adjustment becomes complex, that it is not reliable in operation and that it is difficult to apply it to a wrist watch.
{ "pile_set_name": "USPTO Backgrounds" }
Jenaveve spreads her tight pussy in the lockeroom Brazzers - 29 Sites 4000+ exclusive videos 1000+ pornstars - Full HD 1080p videos Streaming and also Downloadable with high quality pictures for every set. Updated many times a day(2+/day) with exclusive updates and a ton more bonus updates added daily as well. Jenaveve is a two time Boxing champ was forced to retire early because of her sex addiction. She wants another shot at the title and it looks like the very problem that has kept her out of the ring might just be ther only thing she has to offer to get back into the ring
{ "pile_set_name": "Pile-CC" }
Q: c initializing array from file makes first element -1 I'm on ubuntu - codeblocks. I was stuck in a more complex file reading task, so created the simplest test, and it throwed this weird "error" at me. I have 2 global variables for the sake of simplicity int a[20]; int row=20; a function to initialize the array from a file void load_file(char* filename) { int i; FILE* f; f=fopen(filename, "r"); for (i=0; i<row; i++) fscanf(f, "%d", &a[i]); fclose(f); } another function to save the array to (the same) file void save_file(char* filename) { int i; FILE* f; f=fopen(filename, "w"); for (i=0; i<row; i++) fprintf(f, "%d", a[i]); fclose(f); } and because I really don't know what can be the problem here are the other two functions existing in the program: void print_a() { int i; for (i=0; i<row; i++) printf("%d ", a[i]); printf("\n"); } void init_a(int val) { int i; for (i=0; i<row; i++) a[i]=val; } and here is the main: int main(){ init_a(2); print_a(); init_a(5); save_file("a.txt"); load_file("a.txt"); print_a(); return 0; } the output of the program is: 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 -1 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 So the "error" is that after loading the file, the first element in the array is initialized with -1, while in the file there are only 20 5s. I really have no clue, thanks for any help. A: The problem is that your a.txt looks like this: 55555555555555555555 so when you try to read it again, it does not look like 20 integers. It looks like one very big number which is too big for an integer. Add a space between each integer when printing to the file. Like this: void save_file(char* filename) { int i; FILE* f; f=fopen(filename, "w"); // Here you should check that f is valid before proceeding for (i=0; i<row; i++) fprintf(f, "%d ", a[i]); // ^ notice fclose(f); } Besides that you should always check return values from fopen and fscanf
{ "pile_set_name": "StackExchange" }
Larrionda 3 Room Description Village House Larrionda 3 is cozy, comfortable and enjoyable. It can accommodate 4 to 7 people. During rehabilitation the original materials of stone and wood were taken into account. The main facade was rebuilt in almost all its height with exposed stone. A wooden column mark the doors and windows in a same vertical. A tile roof protects the door. The house is accessed through an antojana, that’s the front yard. There is a table and chairs next to the front door. Upon entering we find the dining-living room and kitchen at the back within the same space. The living room is equipped with TV, games, information about the area and a large sofa bed. The kitchen is fully equipped with microwave, dishwasher, refrigerator, toaster, blender, etc. For colder months the house has some electric radiators distributed in all rooms. At one end of the dining room there is a large spiral staircase that connects with the rooms. On the first floor the master bedroom is located. There’s mainly one wall in stone that has respected an original small opening. The room is very spacious and bright. If required, an extra bed or cot can be installed. Next to the bedroom is located the fully equipped bathroom where there is also room for the washer and dryer sink. On the third floor there’s the second bedroom with twin beds. The wooden roof and the structure provide a cozy atmosphere to the room. It is also possible to place in this room the extra bed or crib.
{ "pile_set_name": "Pile-CC" }
Fact checking the first debate byRob CullenonOctober 8, 2012 The reaction from pundits was unanimous: Mitt Romney won the first Presidential debate. We couldn’t help but notice though that Romney, while sounding smoother than we’ve ever heard him, seemed to be, well… making a lot of stuff up. Of course, President Obama got some things wrong too, but articles with titles like “Obama and Romney both strayed from facts” aren’t very helpful. They don’t give an accurate picture of the debate if one candidate goofed on some numbers while the other candidate was lying his face off. And so, to get some perspective, we went back to the transcript, and fact-checked every healthcare claim made by either candidate. In the interest of space (and our sanity), here are just the claims that turned out to be false or misleading in some way. Turns out one candidate was overwhelmingly dishonest. ROMNEY: “I would like to take the Medicaid dollars that go to states and say to a state, you’re going to get what you got last year plus inflation — inflation — plus 1 percent.” Meanwhile, restoring Obamacare’s “$716 billion in Medicare cuts” [see below] would actually increase premiums and copays for seniors by several hundred dollars a year. The Incidental Economist’s Aaron Carroll has a great post explaining why, but it basically comes down to the fact that seniors pay a percentage of their coverage. If the total cost of covering each senior rises– and it would if those “cuts” were restored– the amount each senior pays increases as well. ROMNEY: “On Medicare, for current retirees [Obama’s] cutting $716 billion from the program” to pay for Obamacare. MISLEADING: For one thing, Paul Ryan’s budget makes the exact same cut to Medicare, and less than a year ago, Romney was saying President Obama should sign it. The statement also gives the impression that benefits are being taken from current recipients. Here’s where the savings actually comes from: ROMNEY: “I want to take that $716 billion you’ve cut and put it back into Medicare.” MISLEADING: The problem with Romney saying he’ll restore that Medicare funding is that then his own budget numbers don’t add up, as The New Republic’s Jonathan Cohn explains: Remember, he’s promised to cap non-defense spending at 16 percent of GDP. And he’s said he won’t touch Social Security. If he walls off Medicare, too, that would mean even sharper cuts across the board. How sharp? The Center on Budget and Policy Priorities ran the numbers. If Medicare is getting that $716 billion back, he’d have to cut other programs by an average of a third by 2016 and in half by 2022. Non-discretionary defense spending, which “has averaged 3.9 percent of GDP and never fallen below 3.2 percent,” would fall to 1.7 percent. That’s simply not realistic. I have no problem believing Romney would cut domestic program deeply; his willingness to endorse the kinds of cuts he has specified, to Medicaid and food stamps, tell you everything you need to know about his priorities. But these figures are the stuff of fantasy. Either Romney can’t restore the Medicare dollars as he says or he’s not living up to his promises on deficit reduction. ROMNEY: “We also have 50 percent of doctors who say they won’t take more Medicare patients.” FALSE: In a recent survey of doctors, only 17% said they weren’t taking new Medicare patients. By the way, that’s more doctors taking new Medicare patients than any other form of coverage– in the same survey, 18% of doctors said they weren’t taking new patients with private insurance. ROMNEY: “We have 4 million people on Medicare Advantage that will lose Medicare Advantage.” MISLEADING: The Affordable Care reduces over-payments to the insurance companies who provide Medicare Advantage. (In 2010 Medicare Advantage plans cost 17% more than traditional Medicare, driving premiums up for all beneficiaries.) Insurance companies can’t afford to provide some Medicare Advantage plans without those extra payments– the Medicare Trustees estimate that 4 million seniors will be affected. more seniors are enrolled in 4 or 5 star plans (thanks to the new law’s bonuses for plans that achieve high quality rankings) OBAMA: “The idea, which was originally presented by Congressman Ryan, your running mate […] would cost the average senior about $6,000 a year.” MISLEADING: Obama is referring to Paul Ryan’s 2011 budget proposal, which would covert Medicare to a voucher system. These vouchers would grow at the rate of inflation, which rises much more slowly than the cost of healthcare, and so in 2022 Ryan’s plan would shift an extra $6,000 in Medicare costs onto the average senior. However, Ryan’s 2012 budget proposal is a little different— it’s still a voucher program, but the voucher would keep up with the growth of health care costs (according to the CBO, this new plan doesn’t save the government much money though). Romney’s plan resembles Ryan’s second proposal, which would not shift $6,000 onto seniors. ROMNEY: “When you look at ‘Obamacare’, the Congressional Budget Office has said it will cost $2,500 a year more than traditional insurance.” MISLEADING: Romney’s leaving a lot out here. First, in that report, the CBO found that the cost of insurance provided by small business and large employers would come down slightly under Obamacare. On the individual market, the CBO did expect premiums to rise by $300 for individuals, and by about $2100 for families… an increase of 10% to 13%. But that’s not the entire story. For one, the CBO expects more members of each family to get coverage, which is part of the reason family premiums will rise. The CBO also points out that Obamacare will bring down the cost of premiums for families by lowering administrative costs and by bringing healthier people into the risk pool. The reason premiums will go up on the individual market is that families will get a greater amount of coverage. Or as Ezra Klein put it: Add it all together and we’re looking at a 10 to 12 percent increase in premiums for insurance that’s about 30 percent better than what people are getting now. And all this is before we get to subsidies. Speaking of subsidies– more than half of all Americans buying their own insurance will qualify for some kind of subsidy. For those that qualify, the CBO estimated that their premiums would be 56% to 59% lower under Obamacare on average. [If you want to learn more, we did an entire post on this a while back.] ROMNEY: “[Obamacare] puts in place an unelected board that’s going to tell people ultimately what kind of treatments they can have.” FALSE: The new law does create a board to submit a proposal to Congress every year with recommendations on how to reduce Medicare costs. However it explicitly states that the board can’t recommend limiting treatment options. From section 3403 of the law: ROMNEY: “There was a survey done of small businesses across the country. It said, what’s been the effect of “Obamacare” on your hiring plans? And three-quarters of them said, it makes us less likely to hire people.” That statistic was based on an online, opt-in survey of small-business executives. A press release from the Chamber of Commerce [which opposes the health care law and has run numerous TV ads attacking it] about the survey carries a large caveat: “This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated.” In other words, the chamber can’t be sure it’s a representative sample of small-business executives. Those kinds of surveys can be useful for marketing research purposes, said Scott Keeter, director of survey research at the Pew Research Center and the most recent past president of the American Association for Public Opinion Research. “But from the point of view of public policy decisions, they tend not to be given much credence.” “The bottom line is that surveys that have self-selected samples don’t have any known relation to the target group [in this case small-business owners],” Keeter said. “As a result, it is difficult, if not impossible, to know what kind of weight to give this.” That is why, Keeter noted, that major news organizations like the Washington Post, New York Times and ABC News have strict policies prohibiting the reporting of such surveys. ROMNEY: “[Health reform] has killed jobs.” What the CBO actually said is that the impact of the health care law on supply and demand for labor would be small. Most of it would come from people who no longer have to work, or can downshift to less demanding employment, because insurance will be available outside the job. “The legislation, on net, will reduce the amount of labor used in the economy by a small amount– roughly half a percent– primarily by reducing the amount of labor that workers choose to supply,” budget office number crunchers said in a report from last year. MISLEADING: It’s true Romney didn’t raise taxes to pay for health reform, but only because (1) the taxes that paid for Massachusetts’ health reform were already in place when he was elected; and (2)Massachusetts gets an extra pot of federal money that other states do not get. The Washington Post’s Sarah Kliff has a fantastic article looking at how Massachusetts used not just federal Medicaid money, but “federal dollars above and beyond that Medicaid money to finance their health reforms.” ROMNEY: “The CBO says up to 20 million people will lose their insurance as Obamacare goes into effect next year.” FALSE: Back in March, the CBO along with the Joint Committee on Taxation did do a study looking at how the law would impact the number of people getting insurance from their employer. Here’s what it actually said: In CBO and JCT’s judgment, a sharp decline in employment-based health insurance as a result of the ACA is unlikely. So where does Romney get 20 million people from? Well, in the report the CBO points out that there’s some uncertainty about how employers will react to Obamacare. To cover all their bases, they provide estimates for a number of alternative scenarios– and in the most extreme scenario 20 million fewer people would get employer coverage. But the CBO doesn’t think that’s likely– if anything, it may go the other way. Again, from the actual CBO report: Surveys of employers regarding their plans for offering health insurance coverage in the future have uncertain value and offer conflicting findings. One piece of evidence that may be relevant is the experience in Massachusetts, where employment-based health insurance coverage appears to have increased since that state’s reforms, which are similar but not identical to those in the ACA, were implemented. Besides being wrong about the number, Romney’s also wrong to say that employees will “lose” coverage. From PolitiFact: According to CBO’s “baseline” estimates [i.e. not Romney’s cherry-picked alternative scenario], 3 million people will spurn their employer’s offer of insurance and turn instead to another source, such as the health insurance “exchanges” created under the Obama health care law. In many cases, they will do this because they consider the employer’s offering to be unaffordable or lacking too many features they need. ROMNEY: “And likewise, a study by McKinsey and Company of American businesses said 30 percent of employers are anticipating dropping people from coverage.” MISLEADING: After a number of anonymous McKinsey employees cast doubt on the study, the company clarified that it was not meant to be a “predictive economic analysis.” The Urban Institute: “Overall employer-sponsored insurance coverage under the ACA would not differ significantly from what coverage would be without reform.” Mercer: “In a survey released today by consulting firm Mercer, employers were asked how likely they are to get out of the business of providing health care once state-run insurance exchanges become operational in 2014 and make it easier for individuals to buy coverage. For the great majority, the answer was ‘not likely.'” So while it’s true that 30% of respondents said they may drop coverage as a response to the Affordable Care Act, we marked this claim as misleading because every other reputable study found (and McKinsey later admitted) that employers are unlikely to actually do that. OBAMA: “Over the last two years, health care premiums have gone up — it’s true — but they’ve gone up slower than any time in the last 50 years.” FALSE: As the AP pointed out, “Obama is mixing overall health care spending, which has been growing at historically low levels, and health insurance premiums.” This year’s 4% increase in premiums was low compared to recent years, but last year the increase was a relatively high 9%. ROMNEY: “Pre-existing conditions are covered under my plan.” FALSE: This claim was so obviously wrong that Romney’s senior adviser Eric Fehrnstrom walked it back minutes after the debate, telling reporters that Romney was actually referring to existing laws that require insurance companies to sell coverage to people who already have insurance. As for people who can’t get insurance in the first place, because of pre-existing conditions: Pressed by TPM’s Evan McMorris-Santoro, Fehrnstrom said those who currently lack coverage because they have pre-existing conditions would need their states to implement their own laws — like Romney’s own Massachusetts health care law — that ban insurance company from discriminating against sick people. “We’d like to see states do what Massachusetts did,” Fehrnstrom said. “In Massachusetts we have a ban on pre-existing conditions.” In other words Romney’s “plan” to cover pre-existing conditions is to (1) repeal Obamacare, the law banning pre-existing conditions, and then (2) hope that states pass their own laws banning pre-existing conditions. ROMNEY: “Young people are able to stay on their family plan. That’s already offered in the private marketplace; you don’t have — have the government mandate that for that to occur.” FALSE: Before Obamacare, many insurance plans did not let young adults remain on their family’s insurance plan once they lost their status as dependents, or soon after. Because of the new requirement, 3.1 million young adults have gained coverage. OBAMA: “It’s estimated that by repealing ‘Obamacare’, you’re looking at 50 million people losing health insurance.” WRONG NUMBER: The CBO estimates that about 32 million people will gain insurance as a result of Obamacare, not 50 million. However, if you add the effect of all Romney’s health policies together (repealing Obamacare, cutting Medicaid, etc.), 46 million fewer people will have coverage than under Obama, according to a study by the nonpartisan Commonwealth Fund. ROMNEY: “The federal government taking over health care for the entire nation and whisking aside the 10th Amendment…” FALSE: PolitiFact awarded the reference to Obamacare as a “government takeover of healthcare” its Lie of the Year award in 2010. It’s really a judgment call as to how much government involvement constitutes a “government takeover,” but a system like the Affordable Care Act– the largest expansion of private insurance ever– is nowhere close.
{ "pile_set_name": "Pile-CC" }
X-Account-Key: account5 X-UIDL: GmailId127f81e69244d767 X-Mozilla-Status: 0000 X-Mozilla-Status2: 00000000 X-Mozilla-Keys: Delivered-To: mlsubscriber.tech@csmining.org Received: by 10.142.69.10 with SMTP id r10cs29204wfa; Tue, 13 Apr 2010 10:01:35 -0700 (PDT) Received: by 10.102.7.12 with SMTP id 12mr3351963mug.104.1271178094903; Tue, 13 Apr 2010 10:01:34 -0700 (PDT) Return-Path: <bounce-debian-kde=mlsubscriber.tech=csmining.org@lists.debian.org> Received: from liszt.debian.org (liszt.debian.org [82.195.75.100]) by mx.google.com with ESMTP id j6si24686196mue.44.2010.04.13.10.01.34; Tue, 13 Apr 2010 10:01:34 -0700 (PDT) Received-SPF: pass (google.com: manual fallback record for domain of bounce-debian-kde=mlsubscriber.tech=csmining.org@lists.debian.org designates 82.195.75.100 as permitted sender) client-ip=82.195.75.100; Authentication-Results: mx.google.com; spf=pass (google.com: manual fallback record for domain of bounce-debian-kde=mlsubscriber.tech=csmining.org@lists.debian.org designates 82.195.75.100 as permitted sender) smtp.mail=bounce-debian-kde=mlsubscriber.tech=csmining.org@lists.debian.org; dkim=neutral (body hash did not verify) header.i=@csmining.org Received: from localhost (localhost [127.0.0.1]) by liszt.debian.org (Postfix) with QMQP id E9F7013A5D02; Tue, 13 Apr 2010 17:01:31 +0000 (UTC) Old-Return-Path: <budinero@csmining.org> XChecker-Version: SpamAssassin 3.2.5 (2008-06-10) on liszt.debian.org XLevel: XStatus: No, score=-7.0 required=4.0 tests=CAPINIT,GMAIL,LDOSUBSCRIBER, LDO_WHITELIST autolearn=failed version=3.2.5 X-Original-To: lists-debian-kde@liszt.debian.org Delivered-To: lists-debian-kde@liszt.debian.org Received: from localhost (localhost [127.0.0.1]) by liszt.debian.org (Postfix) with ESMTP id 5DA9313A5CC8 for <lists-debian-kde@liszt.debian.org>; Tue, 13 Apr 2010 17:01:26 +0000 (UTC) X-Virus-Scanned: at lists.debian.org with policy bank en-ht X-AmavisStatus: No, score=-3 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, CAPINIT=3, GMAIL=1, LDO_WHITELIST=-5] autolearn=no Received: from liszt.debian.org ([127.0.0.1]) by localhost (lists.debian.org [127.0.0.1]) (amavisd-new, port 2525) with ESMTP id Xeu85sSNX91o for <lists-debian-kde@liszt.debian.org>; Tue, 13 Apr 2010 17:01:19 +0000 (UTC) X-policyd-weight: using cached result; rate:hard: -6.9 Received: from mail-pw0-f47.google.com (mail-pw0-f47.google.com [209.85.160.47]) by liszt.debian.org (Postfix) with ESMTP id 11C8C13A5C83 for <debian-kde@lists.debian.org>; Tue, 13 Apr 2010 17:01:18 +0000 (UTC) Received: by pwj5 with SMTP id 5so5091865pwj.6 for <debian-kde@lists.debian.org>; Tue, 13 Apr 2010 10:01:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=csmining.org; s=gamma; h=domainkey-signature:received:received:from:to:subject:date :user-agent:references:in-reply-to:mime-version:content-type :content-transfer-encoding:message-id; bh=x3mpwp7ReNrxG2586BHKPzkIJYiGhIvJ7AdFJp3s7l4=; b=wZ35IQ4WinGYwOy561v+piLUKgzSYtoUD2WQITUFCs2UJIGeCo1W/FqfUgbq0dEs8V t0dZeDC4fUhdEv5G29GZn7sJ/Z7wzJRgE/jiYq1QMUm7PbgT+bZIeoKPLVOGOeaLtoPP YybSuSZotwaDZoqRUlbXppmDgFwboIoDtRP34= DomainKey-Signature: a=rsa-sha1; c=nofws; d=csmining.org; s=gamma; h=from:to:subject:date:user-agent:references:in-reply-to:mime-version :content-type:content-transfer-encoding:message-id; b=ODWXwYNLOmJ/Lr5DL0A78tFJ+A38pPqvmD2BJmsnZreduW5HBl2DZvGJA7hNGiDogv 3JrLOIBpbgEKrmG6Y+bREnmRC5EseteejTKB71n1KOf0XkkH9DwOzF6wtq2W6LYTgskk mye/KDc4qTHG0w8KM8igtWU+qFcXv3ePiV/Uo= Received: by 10.141.139.16 with SMTP id r16mr5498868rvn.187.1271178070796; Tue, 13 Apr 2010 10:01:10 -0700 (PDT) Received: from budibook.localnet (gea.ing.unrc.edu.ar [170.210.133.54]) by mx.google.com with ESMTPS id b2sm1680325rvn.12.2010.04.13.10.01.08 (version=SSLv3 cipher=RC4-MD5); Tue, 13 Apr 2010 10:01:09 -0700 (PDT) From: Facundo Aguilera <budinero@csmining.org> To: debian-kde@lists.debian.org Subject: Re: Amarok's Issues Date: Tue, 13 Apr 2010 14:01:49 -0300 User-Agent: KMail/1.13.2 (Linux/2.6.32-3-amd64; KDE/4.4.2; x86_64; ; ) References: <o2g2fc5f091004111716oe078137dse05f0b82f4e519cc@mail.csmining.org> <4BC49623.40206@toulouse.archi.fr> <v2z2fc5f091004130934p6bff592cha647b8e1787c109@mail.csmining.org> In-Reply-To: <v2z2fc5f091004130934p6bff592cha647b8e1787c109@mail.csmining.org> MIME-Version: 1.0 Content-Type: Text/Plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Message-Id: <201004131401.50187.budinero@csmining.org> X-Rc-Virus: 2007-09-13_01 X-Rc-Spam: 2008-11-04_01 Resent-Message-ID: <rZC9bd9Hw4G.A.tED.rNKxLB@liszt> Resent-From: debian-kde@lists.debian.org X-Mailing-List: <debian-kde@lists.debian.org> archive/latest/32031 X-Loop: debian-kde@lists.debian.org List-Id: <debian-kde.lists.debian.org> List-Post: <mailto:debian-kde@lists.debian.org> List-Help: <mailto:debian-kde-request@lists.debian.org?subject=help> List-Subscribe: <mailto:debian-kde-request@lists.debian.org?subject=subscribe> List-Unsubscribe: <mailto:debian-kde-request@lists.debian.org?subject=unsubscribe> Precedence: list Resent-Sender: debian-kde-request@lists.debian.org Resent-Date: Tue, 13 Apr 2010 17:01:31 +0000 (UTC) El Martes 13 Abril 2010 13:34:13 Edson Marquezani Filho=20 <edsonmarquezani@csmining.org> escribi=F3: >=20 > I didn't, yet. But I have already seen some documentation about it > around. See this[1]. >=20 > [1] http://amarok.kde.org/wiki/MySQL_HowTo Did you purged amarok and removed amarok config files in ~/.kde? -- To UNSUBSCRIBE, email to debian-kde-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: http://lists.debian.org/201004131401.50187.budinero@csmining.org
{ "pile_set_name": "Github" }
Q: Graph Theory: improving custom arc / edge notation? Context I personally am a fan of the Wolfram Language, especially for its symbolic notation. The Wolfram Language uses the following symbols for arcs and edges respectively: Suppose I wish to type some Mathematica pseudo-code and use these conventions rather than their "full form" (\[DirectedEdge] and \[UndirectedEdge]). Then I can, somewhat, recreate these icons using tikz: \newcommand{\ue}[1]{% \begin{tikzpicture}[#1]% \draw[fill = black] (.25ex,.25ex) circle (.3ex); \draw[thick] (.55ex,.25ex) -- (1.55ex,.25ex);% \draw[fill = black] (1.85ex, .25ex) circle (.3ex);% \end{tikzpicture}% } \newcommand{\de}[1]{% \begin{tikzpicture}[#1]% \draw[fill = black] (.25ex,.25ex) circle (.3ex); \draw[thick, ->] (.55ex,.25ex) -- (1.85ex,.25ex);% \end{tikzpicture}% } Where ue and de stand for undirected / directed edge respectively. While I would prefer to use edge and arc, arc is already taken in the namespace. To be fair, using these symbols doesn't look like the worst thing ever seen when typeset: \noindent\textbf{Adjacency}: if there exists an edge $e \in \mathbf{E}$, for $v_i, v_j \in \mathbf{V}$ such that $e$ is defined by $v_i$~\ue{}~$v_j$ (equivocally $v_j$ \ue{} $v_i$), then $v_i$ \& $v_j$ are said to be adjacent. Personally, I am in favor of these symbols rather than the explicit stating of an (un)ordered set of two vertices, and walks look ok-ish as well: Question While these tikz drawings work in the given cases, I have noticed that in caption environments the symbols is no longer centered with the text. Further, spacing can be an issue. How can the following be achieved? automatic binding (the preceding and succeeding character elements must be in the same line). automatic centering to the preceding / succeeding character. the ability to work in the math environment. easy scaling. Also, you opinion about using these glyphs in general would be appreciated. Be honest, how ugly are they? A: You can combine some already existing symbols. For a relation you should put your definition in \mathrel to get the spacing right (if you prefer binary operation use \mathbin, there is a slight difference in spacing). The commands involve some spacing (\mkern) that you might have to change if you scale a lot. It seems to work for 10pt, 11pt and 12pt. \documentclass[11pt]{article} \usepackage[fleqn]{amsmath}%% align \setlength\parindent{0pt}%% no indent %% Definitions \newcommand\de{\mathrel{\bullet\mkern-2.5mu{\rightarrow}}} \newcommand\ue{\mathrel{\bullet\mkern-3mu{-}\mkern-3mu\bullet}} \begin{document} In displayed math \begin{align} a &\ue b\\ a &\de b \end{align} and inline: $v_i\ue v_j\ue v_h\ue v_k$. \end{document}
{ "pile_set_name": "StackExchange" }
Ask HN: Subscription Payment Gateway? - Slashed I have developed a webapp which I'm planning to release soon. Can you recommend any Subscription Payment Gateway?<p>I know about RBS WorldPay, Paypal and Amazon FPS. What do you use(or would use)?<p>Thank you in advance. ====== sync It depends on your demographic. I use Amazon FPS: \- because my customers will probably have an amazon account w/ CC info in it, and will probably not have a paypal account. \- to avoid having to deal with storing CC info on my end. \- to avoid having to buy a HTTPS cert entirely. That being said, I am not huge on the fact that they leave my site to go pay -- though, I'm hoping users are used to this by now (a la paypal). ------ jacquesm authorize.net ccbill.com epoch.com vxsbill.com ------ ljharb Recurly.com ------ officemedium authorize.net's ARB or CIM ------ msbmsb also skipjack.com
{ "pile_set_name": "HackerNews" }
Retro-direct Retro-direct is a gearing mechanism used on some bicycles in the early 20th century, which provides a second gear ratio when pedaled backwards. History Retro-direct was developed by French inventor Paul de Martin de Viviés (1833–1911). An early two-chain version was patented by in 1869 by Barberon and Meunier. A single-chain version was patented in 1903 by the bicycle manufacturer Hirondelle. Some hobbyists have converted modern bicycles to use retro-direct gearing. Technical details In the single-chain system, the chain runs from the top of a chainring attached to the cranks to the top of a sprocket attached to the rear wheel hub with a freewheel, as with most bicycle chain drives. The chain then, usually, wraps around the rear sprocket to an idler sprocket between the rear wheel and the cranks, then runs back to a second sprocket attached to the rear wheel with a second freewheel, and finally returns to the bottom of the chain ring. Other configurations are possible, including one chain for forward pedalling, and a second crossed-chain configuration for reverse pedalling. Only one freewheel is engaged at a time, while the other spins backward freely. Since the chain wraps around the second sprocket in the opposite direction to the first sprocket, the cyclist needs only to pedal backwards to engage it. The small amount of out-of-line required of the chain is easily accommodated. The rear wheel cannot rotate backwards because the two freewheels try to drive the pedals forward and backward at the same time. Usually the second sprocket is larger, which provides the cyclist a lower gear for climbing steep inclines simply by pedaling backwards. While most historical examples of retro-direct bicycles used the reverse gear for climbing, several modern retro-direct riders prefer pedalling forward when standing to accelerate from rest and climb, and engaging the higher cruising gear while pedalling backwards. References External links Pierre's retro-direct bicycle Hirondelle rètro-direct Hirondelle Retro-direct Kent Peterson's retro-direct bicycle Yahoo! Group for retro-direct Retro-direct on velospace Category:Bicycle gears
{ "pile_set_name": "Wikipedia (en)" }
Saturday, 28 November 2009 With the current turmoil engulfing Cairns Community Radio that CairnsBlog is investigating in a 4 part series, I have asked respected local commentator Denis Walls to outline his recollections of the organisation. Denis was 4CCR presenter from 1991 to 1998 and president in 1995 and 1996. In hindsight it’s easy to see the ‘90s as the halcyon years in Cairns Community radio. Quality presenters like Tony Hillier, Grant Taffs, Annie Mitchell, Annie Boon, Kurt Derbyshire, Kim Coleman, Sharon Lenehan, Steve Wakeham and many others brought energy, passion and knowledge to their presentation and programs. Specialist knowledge across a range of programming areas was immense and the station was able to maintain its relevance on an FM band that had few intrusions. The station started in 1985, broadcasting largely classical music but it was under the management of first John McBeath, then Tony Hillier and Grant Taffs in the 1990s, that the station broadened its appeal. I presented G’day It’s Saturday for most of the ‘90s and saw it as an opportunity to tackle local and visiting pollies as well as interview sundry, often alternative identities from near and far, while leavening the show with music, comedy and comment in a partnership format which was fairly new at the time. Many of my radio interviews were transcribed for Barfly, which is how I came to write a regular column for the paper after leaving 4CCR. In seven years of doing the show I had four great radio partners and, in collaboration with Barfly food writer and polymath Paul Cullen, produced and presented the national award winning History of Food series. However, the demands of community radio are enormous, and after so many years at the station, including two as president, I was ready to move on and left at the end of 1998. G’day It’s Saturday was supposed to continue with Brynn Mathews as presenter but the conservative management at that time decided to can the show, despite the pleadings of listeners, because of fears that its outspoken nature was compromising funding being sought from the then Cairns City Council. It was ever thus, with fear of upsetting the big, often illusory, sponsors you needed to survive. And funding problems got worse as the ‘90s progressed because of the opening up of the FM band to first Triple J, then Hot, Sea and the multiplicity of other pap FM stations that now crowd the airwaves. Many businesses that previously sponsored 4CCR now chose to advertise with the new commercial stations and didn’t have any change left over for poor 4CCR. The funding crisis was exacerbated by the removal of horse racing, to narrowcast, from the afternoon schedule. This decision, while vastly improving programming, left a big hole in the budget. This required the 4CCR committee and management to organise more and more fundraisers and radiothons to keep the station alive. Burn out was inevitable and by the end of the 1990s most of the best presenters had left. The station was ripe for retreat, first of all with a wand waving, absentee president who had no experience or interest in radio broadcasting but promised to keep the station solvent, and then gradually with a return to the private club mentality, and some of the same presenters, that characterised the early years of 4CCR. In the 1990s, 4CCR was of course fortunate in having strong affiliations with Barfly and Johno’s Blues Bar, neither of which sadly now exist, but the station, then, was also frequently out in the community with its fundraisers as well as occasional live broadcasts. I haven’t seen a 4CCR presence at community events for years. The very diversity of community radio is often its undoing. People get involved for different reasons and to present wildly different types of programs which often make it a nightmare for effective scheduling to try to keep listeners switched on - try keeping an audience when a country music show is followed by the Croatian hour. With this diversity comes differing world views which often lead to strong disagreements at management and committee level. Most presenters, however, don’t see this as they just want to come into the station, do their show and go home. Nevertheless, for most of the 1990s I consider myself extremely fortunate to have been part of the best little radio station in Far North Queensland. Cairns would really benefit from a forward-thinking, active and engaged community radio. Money of course is key and I would love to know who is currently funding the station and if there is even an office manager. It would be wonderful - through outlets like CairnsBlog, and the enthusiasm from current presenters of 4CCR expressed on this Blog, if the station were to rediscover some of the drive and purpose of those years. A point I made in a posting after Part 1 of the blog's 4CCR series might be worth repeating. Perhaps a public meeting should be convened, at which past and present members and other stakeholders and interested parties can exchange views and maybe find a solution to the present palpably unsatisfactory situation, as outlined by Michael Moore. As Denis Walls' treatise eloquently conveys, public radio is a valuable community resource that can provide a real alternative to mainstream outlets, and simultaneously aspire to a vision of excellence. Incidentally, "Grateful Mac", the blues presenter you allude to is Kurt Derbyshire, who had no equal in the country. During my tenure as Station Manager, I had the satisfaction of ensuring that his program, 'Blues Cruise" was broadcast to the rest of the community radio via satellite. If memory serves me right, the Frank Zappa special was produced by Brian Bolton, who is also based in BrisVegas these days. In its heyday, 4CCR introduced a lot of great music, in all manner of genres, to a significant listenership. It is heartening to see this intelligent and thoughtful comment and the comments from others on the desperate situation at Cairns FM 89.1/4CCR, a station which ought to be a valuable community asset and which receives over $200,000 in annual funding, much of it from taxpayers. We, along with other concerned members, put in a lot of effort to return the station to genuine community control, only to see this destroyed again by the incoming President who seems to see himself as the sole decision-maker rather than the leader of a Committee. It has become "my way or the highway". He has actively worked to undermine the Committee elected in September, with the result that six of the nine members have resigned. Four members, including ourselves, were threatened with expulsion on scurrilous and false allegations and the long-standing and highly-regarded technician has been sacked simply because he protested about what was happening. Thanks to CairnsBlog for bringing these issues to public notice. Donn CorcoranSecretary, 4CCR, August to November 2009 Judi CorcoranPresenter, and Member of Managment Committee, 4CCR, August to November 2009 Help the work of CairnsBlog!Your financial support helps brings issues to the public, that otherwise get ignored by the brain-dead commercial media. Click the Donate button above. You can also direct deposit into the CairnsBlog a/c. Email for details. Donate to CairnsBlog Help the work of CairnsBlog! Your donations are very much appreciated. By making a donation, you are helping to support my work. Your support will assist in bringing issues to the public, that otherwise get ignored by the brain-dead commercial media. You can also direct deposit into the CairnsBlog a/c BSB 06 4175A/C 1013 6761 Friends of CairnsBlogCommonwealth Bank Donations can be made at any Commonwealth Bank branch, or online. Help support our work to create a more accountable and open local democracy in Cairns.
{ "pile_set_name": "Pile-CC" }
Q: Error when summing values in an asp.net gridview I have the following code to sum values in a gridview, but I receive the error "Input string was not in a correct format" at the line cell1 += Convert.ToDecimal(DataBinder.Eval(e.Row.DataItem, "CTDActual")); This is the complete snippet: decimal cell1 = 0; protected void linqGrid_RowDataBound(object sender, GridViewRowEventArgs e) { if (e.Row.RowType == DataControlRowType.DataRow) { cell1 += Convert.ToDecimal(DataBinder.Eval(e.Row.DataItem, "CTDActual")); } if (e.Row.RowType == DataControlRowType.Footer) { e.Row.Cells[3].Text = cell1.ToString("C"); } } I tried outputting the DataItem value to the console window, but nothing appears. How can I fix this problem? A: Try with this: cell1 += Convert.ToDecimal((DataBinder.Eval(e.Row.DataItem, "CTDActual").ToString()==""?"0":DataBinder.Eval(e.Row.DataItem, "CTDActual"))); The reason is blowing up is likely because you are getting a DbNull.Value from the database, which is causing the Convert.ToDecimal to blow up since it doesn't know how to convert "" to a number. UPDATE: This will definitely work: decimal temp = 0M; decimal.TryParse(DataBinder.Eval(e.Row.DataItem, "CTDActual").ToString(), out temp); cell1+=temp;
{ "pile_set_name": "StackExchange" }
This application relates to a weight reduction technique for use in rotating blades in gas turbine engines. Gas turbine engines are known and, typically, include a fan delivering air into a compressor. The air is compressed and delivered into a combustion section where it is mixed with fuel and ignited. Products of this combustion pass downstream over turbine rotors, driving them to rotate. The turbine rotors, in turn, drive rotors associated with both the compressor and fan sections. Historically, a single turbine may have driven the fan rotor in a low pressure compressor rotor. However, more recently, a gear reduction has been provided between the fan and the turbine drive. With this gear reduction, the fan can rotate at slower speeds than the turbine or the low pressure compressor. As the speed of the fan has decreased, there has been an increase in the size of the fan blades. The fan typically also delivers air into a bypass duct where it becomes propulsion for an associated aircraft. The volume of air delivered into the bypass duct has increased relative to the volume of air delivered into the compressor with the enlarged blades. However, as the blades become larger, their weight also becomes undesirably large.
{ "pile_set_name": "USPTO Backgrounds" }
Intramedullary nailing of tibial shaft fractures in the semi-extended position using a suprapatellar portal technique. Intramedullary nail fixation remains the standard treatment for displaced tibial shaft fractures. Establishing an appropriate starting point remains a crucial step in the surgical procedure. Tibial nailing using an infrapatellar starting point with the knee flexed over a radiolucent triangle has been established as a widely-used standard technique. Tibial nail insertion with the knee in the semi-extended position was introduced with the goal to counteract post-operative procurvatum deformities that frequently have been reported as a common problem in proximal third tibial shaft fractures. Early reports on tibial nailing in the semi-extended position used a knee arthrotomy in order to establish the proximal tibial starting point. Recent technological advances have provided the surgical community with instrumentation systems that allow for tibial nailing in the semi-extended position using a suprapatellar portal with nail insertion through the patellofemoral joint. Preliminary clinical studies have suggested favorable outcomes that can be achieved with this technique. This article provides a description of the surgical technique and a review of the currently available evidence.
{ "pile_set_name": "PubMed Abstracts" }
Patella component loosening--A case report. Patellofemoral arthroplasty is a treatment option for the relatively young patient with isolated patellofemoral osteoarthritis where conservative treatment has failed. However, despite of reasonable long term results, complications could be challenging. Loosening of the polyethylene patella component is a serious complication and has been reported in 2%. Dislocation of the polyethylene patella component did -happen more often in the polyethylene patella metal backed LCS-PFA variant. In this case we describe the diagnostic and treatment challenges of this complication.
{ "pile_set_name": "PubMed Abstracts" }
Air travellers in eastern provinces were again hit by massive flight delays yesterday, with capacity cut by up to two-thirds thanks to ongoing PLA military exercises. The civil aviation regulator issued an orange alert - the second highest in a four-tier system - early yesterday morning for 23 airports, including those in Shanghai, Nanjing, Nanchang, Hefei, Zhengzhou and Wenzhou. An orange alert indicates that between 50 and 90 flights would be either cancelled or were delayed for more than an hour. Before the warning was lifted at 5pm, 85 flights were cancelled at Pudong and Hongqiao airports in Shanghai, The Civil Aviation Administration of China said. It said air traffic capacity in the Shanghai area was cut by up to 65 per cent. One passenger, who wished to remain anonymous, said he had been due to fly from Qingdao to Shanghai on an 8.40am flight, but arrived at the airport to find the flight had been rescheduled to 1.30pm. "Why didn't they tell me in advance so I didn't have to wake up so early?" he said. Air travellers can expect little relief from the delays, with the live-fire drills - which started last Sunday - due to continue in waters off the east coast until August 15. Notices on the websites of the national and local maritime safety administrations said exercises would be carried out in the Bohai Sea for eight days from last Friday, in the East China Sea for five days from tomorrow, and in the Gulf of Tonkin for seven days from yesterday. Military experts said the drills were intended to signal China's tough stance towards Japan and its ally, the United States, and were timed to coincide with the 120th anniversary of the first Sino-Japanese war. Ni Lexiong, director of a defence policy research centre at Shanghai University of Political Science and Law, said drills on such a massive scale in the eastern waters were rare, and were a warning to Japan. A spokeswoman for the Civil Aviation Department of Hong Kong said it received notification at 7.30am about the restrictions at Shanghai's two major airports. A spokeswoman for the Airport Authority said six flights between Hong Kong and Pudong were cancelled yesterday morning. Thirty-nine flights to Hong Kong from airports in the east were delayed, while 30 flights departing Chek Lap Kok left after their scheduled time. Additional reporting by Lana Lam This article appeared in the South China Morning Post print edition as Another day, another airport delay To have two-thirds of the nation's airspace military-controlled is absurd. The US is the same size, with a huge military, and yet doesn't restrict so much airspace. There really should be serious reconsideration of air corridors over China, with consideration given to efficiency and economic logic. hkhk Jul 27th 20148:34am This likely all about PLA generals trying to remain relevant and escape anti-graft efforts by the government. caractacus Jul 27th 201411:15pm Whatever arcane reasons are behind this it is almost certainly nothing to do with America, Ukraine, Taiwan or Japan. Perhaps it is a demonstration of force aimed at impressing the people of China, or even cowing Hong Kong. After all, a dictatorship can do anything it likes, however bizarre, without having to explain to the population affected by it. ejmciii Jul 27th 201410:00am Look at the bright side, they will not be shooting down commercial airliner when their missiles malfunction. r6b Jul 27th 20148:37am Even during the cold war, there were no such mass closures of airspace in Europe or USA. Its highly doubtful that China's closures of its airspace today offer any real defensive deterrent nor any real way improve PLA's defensive capability. Aircraft will not be the weapon of choice for any future international conflict in which China may be involved - at least not on its eastern border. cj21356772@****** Jul 27th 20146:10pm Why not to catch a train?Anyone know the news. nick.doddle Jul 27th 20143:25pm I know Shanghaii and Qingdao only with delays. Once Iwas stuck in qingdao for 12 hours because they had an Iranian delegation there. And they bothered to tell everyone only after check-in, so they didn't have people wandering about. Would have expected a better response from you. If China wants to threaten HK, all it got to do is threaten to shut off the water supply. With nearly 60% of the American military force now pivoting to Asia & an US open policy of surrounding China with hostile forces/countries, China would be like caractacus - a loser (Caractacus: a Britisher who lost to the conquering Romans) if she doesn’t prepare. captam Jul 27th 201410:47pm What a shame! If the plane had been shot down by an American-made missile supplied to Taiwan or Japan, they could have blamed it on Putin or better still, like the Algerian airline , blamed it on "bad weather".Take the train stupid. Trains are safer and usually get you there on time.
{ "pile_set_name": "Pile-CC" }
--- abstract: 'We establish the future stability of nonlinear perturbations of a class of homogeneous solutions to the relativistic Euler equations with a linear equation of state $p=K\rho$ on exponentially expanding FLRW spacetimes for the equation of state parameter values $1/3 < K < 1/2$.' address: | School of Mathematics\ 9 Rainforest Walk\ Monash University, VIC 3800\ Australia author: - 'Todd A. Oliynyk' bibliography: - 'Kgtot\_v4.bib' title: 'Future global stability for relativistic perfect fluids with linear equations of state $p=K\rho$ where $1/3<K<1/2$' --- Introduction\[intro\] ===================== Relativistic perfect fluids on a prescribed spacetime $(M,\gt)$ are governed by the relativistic Euler equations given by[^1] $$\nablat_i \Tt^{ij}=0 \label{relEulA}$$ where $$\Tt^{ij} = (\rho+p)\vt^i \vt^j + p \gt^{ij}$$ is the stress energy tensor, $\rho$ is the fluid proper energy density, $p$ is the fluid pressure, and $\vt^{i}$ is the fluid four-velocity normalized by $\gt_{ij}\vt^i \vb^j=-1$. In this article, we will be interested in analyzing the relativistic Euler equations on exponentially expanding Friedmann-Lemaître-Robertson-Walker (FLRW) spacetime of the form $(M,\gt)$ where $$M = (0,1]\times \Tbb^3$$ and[^2] $$\label{FLRW} \gt = \frac{1}{t^2} g$$ with $$\label{conformal} g = -dt\otimes dt + \delta_{IJ}dx^I \otimes dx^J.$$ It is important to note that, due to our conventions, the future is located in the direction of *decreasing* $t$ and future timelike infinity is located at $t=0$. Consequently, we require that $$\vt^0 < 0$$ in order to ensure that the four-velocity is future directed. The future stability of nonlinear perturbations of homogeneous solutions to the relativistic Euler equations with a linear equation of state $$p = K \rho$$ on exponentially expanding FLRW spacetimes has been well studied for the parameter range $$0\leq K\leq \frac{1}{3}.$$ The first such stability result was, building on the earlier stability results for the Einstein-scalar field system [@Ringstrom:2008], established[^3] for the parameter values $0<K<1/3$ in the articles [@RodnianskiSpeck:2013; @Speck:2012]. Stability results for the end points $K=1/3$ and $K=0$ were established later in [@LubbeKroon:2013] and [@HadzicSpeck:2015], respectively. See also [@Friedrich:2017; @LiuOliynyk:2018b; @LiuOliynyk:2018a; @Oliynyk:CMP_2016] for different proofs and perspectives, the articles [@LeFlochWei:2015; @LiuWei:2019] for related stability results for fluids with nonlinear equations of state, and the articles [@FOW:2020; @Ringstrom:2009; @Speck:2013; @Wei:2018] for stability results on other expanding FLRW spacetimes (e.g. power law expansion). The importance of all of these works is that they demonstrate spacetime expansion can suppress shock formation in fluids, which was first discovered in the Newtonian cosmological setting with $K=0$ by [@BrauerRendallReula:1994]. This should be compared to the work of [@Christodoulou:2007] where it is established that arbitrary small perturbations of a class of homogeneous solutions to the relativistic Euler equations, for relatively general equations of state, on Minkowski spacetime, which is a FLRW spacetime with spatial manifold $\Rbb^3$ and no expansion, form shocks in finite time. For linear equations of states, the parameter $K$ determines the square of the sound speed, and consequently, it is natural to assume[^4] that $K$ satisfies $$\label{KrangeC} 0\leq K \leq 1$$ so that the propagation speed for the fluid is less than or equal to the speed of light. When the sound speed is equal to the speed of light, that is $K=1$, it is well known that the irrotational relativistic Euler equations coincide, under a change of variables, with the linear wave equation. In this case, the future global existence of solutions on exponentially expanding FLRW spacetimes can be inferred from standard existence results for linear wave equations; we note also that similar results can be established for fluids with rotation. This leaves us to consider the parameter range $$\label{KrangeA} \frac{1}{3}<K<1,$$ which we will assume holds for the remainder of the article. The asymptotic behavior of relativistic fluids on exponentially expanding FLRW spacetimes with a linear equation of state for $K$ satisfying was investigated in the article [@Rendall:2004] by Rendall using formal expansions. In that article, Rendall observed that the formal expansions can become inconsistent for $K$ in the range if the leading order term in the expansion of the four-velocity vanishes somewhere. In that case, he speculated that inconsistent behavior in the expansions could be due to inhomogeneous features developing in the fluid density that would lead to the density contrast blowing up. This possibility for instability in solutions to the relativistic Euler equations for the parameter range was also commented on by Speck in [@Speck:2013 §1.2.3]. There, Speck presents a heuristic analysis that suggest uninhibited growth should set in for solutions of the relativistic Euler equations for the parameter values . These speculations leave the existence of future global solutions to the relativistic Euler equations in doubt for $K$ satisfying . In this article, we rule out, under a small initial data hypothesis, the possibility of any pathologies developing in finite time for $K$ satisfying $$\frac{1}{3}<K < \frac{1}{2}$$ by establishing, for these parameter values, the future stability of nonlinear perturbations of a class of homogeneous solutions, see , to the relativistic Euler equations on exponentially expanding FLRW spacetimes. For a precise statement of our stability result, see Theorem \[mainthm\], which is the main result of this article. This, of course, leaves open the possibility of finite time blow-up for $K$ satisfying $1/2 < K < 1$. As a first step towards understanding the behavior of solutions in this regime, we establish in Theorem \[symthm\] the future stability of $\Tbb^2$-symmetric nonlinear perturbations of the same class of homogenous solutions for the full parameter range $1/3 < K < 1$. Here, the stability proof relies heavy on the $\Tbb^2$ symmetry that allows us to reduce the relativistic Euler equations to an essentially regular $1+1$ dimensional problem. It is unclear at the moment if one should expect that this result will still hold for $K$ satisfying $1/2 \leq K < 1$ if the $\Tbb^2$-symmetry assumption is removed. We plan to revisit this interesting question in a separate article. The proof of our main stability result, Theorem \[mainthm\], is based on the Fuschsian method for establishing the global existence of solutions to systems of hyperbolic equations that was first employed in [@Oliynyk:CMP_2016] and further developed in the articles [@BOOS:2019; @FOW:2020; @LiuOliynyk:2018b; @LiuOliynyk:2018a]. This method relies on transforming the global existence problem for a given hyperbolic system into an existence problem for a Fuchsian symmetric hyperbolic equation of the form $$\Asc^0(t,\Wsc)\del{t}\Wsc+ \Asc^i(t,\Wsc)\del{i}\Wsc = \frac{1}{t}\Af(t,\Wsc)\Pbb \Wsc + \Fsc(t,\Wsc)$$ on a finite time interval $(0,T_0]$. Once in this form, the existence of solutions on the time interval $(0,T_0]$ can be deduced, under a suitable smallness assumption on the initial data specified at time $t=T_0$, from general existence theorems for such Fuchsian systems that have been established in the articles [@BOOS:2019; @FOW:2020; @LiuOliynyk:2018b; @LiuOliynyk:2018a]. In this article, we transform the relativistic Euler equations into a suitable Fuchsian form in a number of steps. We start in Section \[relEulsec\] with a formulation, see , of the relativistic Euler equations that was first employed in [@Oliynyk:CMP_2015]. We then modify this system by introducing a new density variable defined by , which results in the system . In Section \[Ftrans\], we proceed by decomposing the conformal three-velocity $v_I$ into its length determined by the variables $u$, $w_1$ and into a normalized vector determined by the variables $w_2$, $w_3$; see - for the relevant formulas. Here, $u$ only depends on $t$ and is used to parameterize a class of homogeneous solutions of relativistic Euler equations. After some straightforward, but lengthy calculations, we obtain two equivalent versions of Euler equations, now expressed in terms of the new variables $u$, $w_1$, $w_2$ and $w_3$, given by and . We then use the second version , see Section \[Homsec\], to identify the ODE satisfied by $u$ that determines homogeneous solutions of the relativistic Euler equations. The existence of solutions to this ODE is established in Proposition \[Homprop\]. The transformation of the relativistic Euler equations into a suitable Fuchsian form is then completed in Section \[Fform\], see , while the coefficients of are analyzed in Section \[coeff\] in order to verify that this system satisfies the required properties in order to apply the existence theory from [@BOOS:2019]. This existence theory is then applied in the proof of Theorem \[mainthm\], which is given in Section \[stability\], to establish the future stability of nonlinear perturbations of the homogeneous solutions to the relativistic Euler equations from Proposition \[Homprop\]. Finally, in Section \[symsec\], we establish the future stability of $\Tbb^2$-symmetric nonlinear perturbations of the same class of homogenous solutions for the full parameter range $1/3 < K < 1$ by using the $\Tbb^2$ symmetry to reduce the relativistic Euler equations to an essentially regular $1+1$ dimensional problem. The precise statement of the stability result in this setting is given in Theorem \[symthm\]. A symmetric hyperbolic formulation of the Relativistic Euler equations\[relEulsec\] =================================================================================== The first step in transforming the relativistic Euler equations into a suitable Fuchsian form is to find a symmetric hyperbolic formulation of the relativistic Euler equations. Here, we start with the symmetric hyperbolic formulation derived in [@Oliynyk:CMP_2015 §2.2], see also [@Oliynyk:CMP_2016 §2.2]. This involves introducing the *conformal fluid four-velocity* $v_i$ and the $\zeta$ according to $$\label{cov1} v_i= \frac{1}{t} g_{ij}\vt^{j} \AND \rho = t^{3(1+K)}\rho_c e^{(1+K)\zeta}, \quad \rho_c\in \Rbb_{>0}.$$ Using these variables, the computations carried out in [@Oliynyk:CMP_2015 §2.2] show that relativistic Euler equations can be cast into the following symmetric hyperbolic form: $$\label{relEulB} B^k \del{k}V = \frac{1}{t}\Bc \pi V$$ where $$\begin{aligned} V &= (\zeta, v_J )^{\tr} , \label{Vdef}\\ v_0 & = \sqrt{|v|^2 +1} , \qquad |v|^2 = \delta^{IJ}v_I v_J, \label{v0def}\\ v^i & = \delta^{iJ}v_J - \delta^{i}_0 v_0, \label{viupdef}\\ \Bc &= \frac{-1}{v^0}\begin{pmatrix} 1 & 0 \\ 0 & \frac{1-3K}{v_0}\delta^{JI} \end{pmatrix}, \label{Bcdef}\\ \pi &= \begin{pmatrix} 0 & 0 \\ 0 & \delta_{I}^J \end{pmatrix}, \\ L^k_I &= \delta^k_J - \frac{v_J}{v_0} \delta^k_0, \\ M_{IJ} &= \delta_{IJ} - \frac{1}{(v_0)^2}v_I v_J, \label{Mdef}\\ B^0 &= \begin{pmatrix} K & \frac{K}{v^0} L^0_M \delta^{MJ} \\ \frac{K}{v^0} \delta^{LI} L^0_L & \delta^{LI} M_{LM} \delta^{MJ} \end{pmatrix} \intertext{and} B^K &= \frac{1}{v^0}\begin{pmatrix} Kv^K & K L^K_M \delta^{MJ} \\ K \delta^{LI} L^K_L & \delta^{LI} M_{LM} \delta^{MJ} v^K \end{pmatrix}. \label{BKdef}\end{aligned}$$ Defining a new modified density variable $\zetat$ by $$\label{zetatdef} \zetat = \zeta + \ln(v_0),$$ we obtain from differentiating the relation $$\label{dV2dVt} \del{k} V = Q\del{k}\Vt$$ where $$\label{Vtdef} \Vt = (\zetat, v_J)^{\tr}$$ and $$Q= \begin{pmatrix} 1 & -\frac{1}{v_0^2}v^J \\ 0 & \delta^J_I \end{pmatrix}.$$ From - and , we see, after multiplying on the left by $Q^{\tr}$, that the relativistic Euler equations can be expressed in terms of the new variables as $$\label{relEulC} \Bt^k \del{k}\Vt = \frac{1}{t}\Bc \pi \Vt$$ where $$\begin{aligned} \Bt^0 &:= Q^{\tr}B^0 Q = \begin{pmatrix} K & 0 \\ 0 & \delta^{IL}M_{LM}\delta^{MJ}-\frac{K}{v_0^4}v^I v^J\end{pmatrix} \label{Bt0def} \intertext{and} \Bt^K &:= Q^{\tr}B^K Q = -\frac{1}{v_0}\begin{pmatrix} K v^K & -\frac{K}{v_0^2}v^J v^K + K\delta^{KJ} \\ -\frac{K}{v_0^2}v^I v^K + K\delta^{KI}& \bigl(\delta^{IL}M_{LM}\delta^{MJ}+\frac{K}{v_0^4}v^I v^J\bigr)v^K -\frac{K}{v_0^2} (v^I \delta^{JK}+v^J \delta^{IK}) \end{pmatrix}. \label{BtIdef}\end{aligned}$$ Transformation to Fuchsian form\[Ftrans\] ========================================= We proceed with the transformation of the relativistic Euler equations into a suitable Fuchsian form by defining a second change of variables via $$\begin{aligned} v_1 &= \frac{t^{-\mu } e^{u(t)+w_1}}{\sqrt{t^{2 \mu } \left((w_2-w_3)^2+(w_2+w_3)^2\right)+1}}, \label{cov2a} \\ v_2 &= \frac{(w_2+w_3) e^{u(t)+w_1}}{\sqrt{t^{2 \mu } \left((w_2-w_3)^2+(w_2+w_3)^2\right)+1}} \label{cov2b} \intertext{and} v_3 &= \frac{(w_2-w_3) e^{u(t)+w_1}}{\sqrt{t^{2 \mu } \left((w_2-w_3)^2+(w_2+w_3)^2\right)+1}}, \label{cov2c}\end{aligned}$$ where $u(t)$ is a time dependent function and $\mu\in \Rbb$ is a constant both of which will be fixed below. Using -, we find from differentiating that $$\begin{aligned} \del{t} \Vt &= P \del{t}W + Z \label{dVt2dWa} \intertext{and} \del{I}\Vt &= P \del{I} W \label{dVt2dWb}\end{aligned}$$ where $$\begin{gathered} W = (\zetat, w_1, w_2, w_3 )^{\tr} , \label{Wdef}\\ Z = \begin{pmatrix} 0 \\ \frac{t^{-\mu -1} e^{\wbr_1} \left(t u'(t) \phi-\mu \left(4 t^{2 \mu } \left(w_2^2+w_3^2\right)+1\right)\right)}{\phi^{3/2}} \\ \frac{(w_2+w_3) e^{\wbr_1} \left(t u'(t) \phi-2 \mu t^{2 \mu } \left(w_2^2+w_3^2\right)\right)}{t \phi^{3/2}} \\ \frac{(w_2-w_3) e^{\wbr_1} \left(t u'(t) \phi -2 \mu t^{2 \mu } \left(w_2^2+w_3^2\right)\right)}{t \phi^{3/2}} \end{pmatrix}, \label{Zdef} \\ P=\begin{pmatrix} 1 & 0 & 0 & 0 \\ 0 & \frac{t^{-\mu } e^{\wbr_1}}{\sqrt{\phi}} & -\frac{2 w_2 t^{\mu } e^{\wbr_1}}{\phi^{3/2}} & -\frac{2 w_3 t^{\mu } e^{\wbr_1}}{\phi^{3/2}} \\ 0 & \frac{(w_2+w_3) e^{\wbr_1}}{\sqrt{\phi}} & -\frac{e^{\wbr_1}\eta_3}{\phi^{3/2}} & \frac{e^{\wbr_1} \eta_2}{\phi^{3/2}} \\ 0 & \frac{(w_2-w_3) e^{\wbr_1}}{\sqrt{\phi}} & \frac{e^{\wbr_1}\xi_3}{\phi^{3/2}} & -\frac{e^{\wbr_1} \xi_2}{\phi^{3/2}} \end{pmatrix} \label{Pdef}\end{gathered}$$ and we have set $$\begin{aligned} \wbr_1 &= u+w_1, \label{wbr1def} \\ \phi &= 2 t^{2\mu } \left(w_2^2+w_3^2\right)+1, \label{phidef} \\ \eta_\Lambda &= \left(2 w_\Lambda t^{2 \mu } (w_2-w_3)+(-1)^\Lambda 1\right), \quad \Lambda =2,3, \label{etadef} \intertext{and} \xi_\Lambda &= \left(2 w_\Lambda t^{2 \mu } (w_2+w_3)+1\right), \quad \Lambda =2,3. \label{xidef}\end{aligned}$$ By multiplying on the left by $P^{\tr}$, we see, with the help of -, that $W$ satisfies $$\label{relEulD} A^0 \del{t}W + A^I \del{I}W = \frac{1}{t}P^{\tr}\bigl(\Bc \pi \Vt-t \Bt^0 Z)$$ where $$\label{Aidef} A^i = P^{\tr} \Bt^i P.$$ Next, setting $$\label{Acdef} \Ac^I = (A^0)^{-1}A^I$$ and $$\label{Fcdef} \Fc = \frac{1}{t}(A^0)^{-1} P^{\tr}\bigl(\Bc \pi \Vt-t \Bt^0 Z),$$ we deduce from that $W$ satisfies $$\label{relEulE} \del{t}W + \Ac^I \del{I}W = \Fc.$$ Moreover, straightforward, but lengthy, calculations using -, , -, -, - and - yield the following explicit formulas for the matrices $A^0$, $\Ac^I$ and the source term $\Fc$: $$\label{A0rep} A^0 = \begin{pmatrix} K & 0 & 0 & 0 \\ 0 & \frac{t^{2 \mu } e^{2 \wbr_1}-(K-1) e^{4 \wbr_1}}{\psi^2} & 0 & 0 \\ 0 & 0 & \frac{2 e^{2 \wbr_1} \left(2 w_3^2 t^{2 \mu }+1\right)}{\phi^2} & -\frac{4 w_2 w_3 t^{2 \mu } e^{2 \wbr_1}}{\phi^2} \\ 0 & 0 & -\frac{4 w_2 w_3 t^{2 \mu } e^{2 \wbr_1}}{\phi^2} & \frac{2 e^{2 \wbr_1} \left(2 w_2^2 t^{2 \mu }+1\right)}{\phi^2} \\ \end{pmatrix},$$ $$\label{Ac1rep} \Ac^1 = \frac{1}{\sqrt{\frac{t^{2\mu}}{e^{2\wt_1}}+1}}\begin{pmatrix} -\frac{1}{\sqrt{\phi}} & -\frac{t^{2 \mu }}{\psi \sqrt{\phi}} & \frac{2 t^{2\mu } w_2}{\phi^{3/2}} & \frac{t^{2\mu} w_3}{\phi^{3/2}} \\ -\frac{K t^{2 \mu } e^{-2 \wbr_1} \psi}{\sqrt{\phi}\chi} & \frac{(2 K-1) t^{2 \mu }+(K-1) e^{2 \wbr_1}}{\sqrt{\phi} \chi} & -\frac{2 K t^{2\mu } \psi w_2}{\phi^{3/2}\chi} & -\frac{2 K t^{2\mu } \psi w_3}{\phi^{3/2}\chi} \\ K t^{2\mu }w_2 e^{-2 \wbr_1} \sqrt{\phi} & -\frac{K t^{2\mu } w_2 \sqrt{\phi}}{\psi} & -\frac{1}{\sqrt{\phi}} & 0 \\ K t^{2\mu }w_3 e^{-2 \wbr_1} \sqrt{\phi} & -\frac{K t^{2\mu } w3 \sqrt{\phi}}{ \psi} & 0 & - \frac{1}{\sqrt{\phi}} \\ \end{pmatrix},$$ $$\label{Ac2rep} \Ac^2 = \frac{1}{\sqrt{\frac{t^{2\mu}}{e^{2\wt_1}}+1}}\begin{pmatrix} -\frac{t^{\mu } (w_3+w_2)}{\sqrt{\phi}} & -\frac{t^{3 \mu } (w_3+w_2)}{\psi \sqrt{\phi}} & \frac{t^{\mu } \eta_3}{\phi^{3/2}} & -\frac{t^\mu \eta_2}{\phi^{3/2}} \\ -\frac{K t^{3 \mu } (w_2+w_3) e^{-2 \wbr_1} \psi}{\sqrt{\phi}\chi} & \frac{t^{\mu } (w_2+w_3) \left((2 K-1) t^{2 \mu }+(K-1) e^{2 \wbr_1}\right)}{\sqrt{\phi} \chi} & -\frac{K t^{\mu } \psi \eta_3}{\phi^{3/2}\chi} & \frac{K t^{\mu } \psi\eta_2}{\phi^{3/2}\chi} \\ -\frac{1}{2} K t^{\mu } e^{-2 \wbr_1} \sqrt{\phi} & \frac{K t^{\mu } \sqrt{\phi}}{2 \psi} & -\frac{t^{\mu } (w_3+w_2)}{\sqrt{\phi}} & 0 \\ -\frac{1}{2} K t^{\mu } e^{-2 \wbr_1} \sqrt{\phi} & \frac{K t^{\mu } \sqrt{\phi}}{2 \psi} & 0 & -\frac{t^{\mu } (w_3+w_2)}{\sqrt{\phi}} \\ \end{pmatrix},$$ $$\label{Ac3rep} \Ac^3 = \frac{1}{\sqrt{\frac{t^{2\mu}}{e^{2\wt_1}}+1}}\begin{pmatrix} \frac{t^{\mu } (w_3-w_2)}{\sqrt{\phi}} & \frac{t^{3 \mu } (w_3-w_2)}{\psi \sqrt{\phi}} & -\frac{t^{\mu } \xi_3}{\phi^{3/2}} & \frac{t^\mu \xi_2}{\phi^{3/2}} \\ -\frac{K t^{3 \mu } (w_2-w_3) e^{-2 \wbr_1} \psi}{\sqrt{\phi}\chi} & \frac{t^{\mu } (w_2-w_3) \left((2 K-1) t^{2 \mu }+(K-1) e^{2 \wbr_1}\right)}{\sqrt{\phi} \chi} & \frac{K t^{\mu } \psi \xi_3}{\phi^{3/2}\chi} & -\frac{K t^{\mu } \psi\xi_2}{\phi^{3/2}\chi} \\ -\frac{1}{2} K t^{\mu } e^{-2 \wbr_1} \sqrt{\phi} & \frac{K t^{\mu } \sqrt{\phi}}{2 \psi} & \frac{t^{\mu } (w_3-w_2)}{\sqrt{\phi}} & 0 \\ \frac{1}{2} K t^{\mu } e^{-2 \wbr_1} \sqrt{\phi} & -\frac{K t^{\mu } \sqrt{\phi}}{2 \psi} & 0 & \frac{t^{\mu } (w_3-w_2)}{\sqrt{\phi}} \\ \end{pmatrix}$$ and $$\label{Fcrep} \Fc = t^{2\mu -1}\Gc + \Fc_0,$$ where $$\begin{gathered} \psi = t^{2 \mu }+e^{2 \wbr_1}, \label{psidef}\\ \chi = t^{2\mu }-(K-1) e^{2 \wbr_1}, \label{chidef}\end{gathered}$$ $$\label{Gcdef} \Gc =\begin{pmatrix} 0 \\ -\frac{K (3 K-1) \left(e^{2 w_1}-1\right) e^{2 u}}{\left((K-1) e^{2 u}-t^{2 \mu }\right) \left((K-1) e^{2 \wbr_1}-t^{2 \mu }\right)} \\ 0 \\ 0 \end{pmatrix},$$ $$\label{Fc0def} \Fc_0 = -\frac{\mu}{t}\Pi W + \frac{1}{t} \begin{pmatrix} 0 \\ \frac{-(\mu -3 K+1) t^{2 \mu }+t u'\!(t) \left(t^{2 \mu }-(K-1) e^{2 u(t)}\right)+(-\mu +(\mu +3) K-1) e^{2 u(t)}}{ \left((K-1) e^{2 u(t)}-t^{2 \mu }\right)} \\ 0 \\ 0 \end{pmatrix}$$ and $$\label{Pidef} \Pi = \begin{pmatrix} 0 & 0 & 0 & 0 \\ 0 & 0 & 0 & 0 \\ 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 1 \end{pmatrix}.$$ For later use, we also define $$\label{Piperpdef} \Pi^\perp = \id - \Pi,$$ and observe that $\Pi$ and $\Pi^\perp$ satisfy the relations $$\Pi^2 = \Pi, \quad (\Pi^\perp)^2 = \Pi^\perp, \quad \Pi\Pi^\perp =\Pi^\perp \Pi = 0 \AND \Pi+\Pi^\perp = \id. \label{Pirel}$$ Homogeneous solutions\[Homsec\] ------------------------------- To proceed, we need to identify the homogeneous solutions that we will show are stable to the future under nonlinear perturbations. We locate these solutions by noting from that $$\Gc|_{W=0} = 0.$$ From this, and , it is then clear that the trivial solution $W=0$ will solve provided that $\mu$ and $u(t)$ are chosen to satisfy $$\label{mufixA} -\mu +(\mu +3) K-1 = 0$$ and $$\label{HomeqA} u'\!(t) =\frac{(\mu -3 K+1) t^{2 \mu-1}}{t^{2 \mu }-(K-1) e^{2 u(t)}},$$ respectively. Solving for $\mu$ yields $$\label{mufixB} \mu = \frac{3K-1}{1-K},$$ which we observe by satisfies $$\label{mufixC} \mu > 0.$$ Moreover using , we note that can be expressed as $$\label{HomeqB} u'\!(t) =\frac{K\mu t^{2 \mu-1}}{t^{2 \mu }+(1-K) e^{2 u(t)}}.$$ The following proposition guarantees the existence of solutions to that exist for all $t\in (0,1]$. \[Homprop\] Suppose $1/3<K<1$, $\mu = (3K-1)/(1-K)$, and $u_0 \in \Rbb$. Then there exists a unique solution $u \in C^\infty((0,1]) \cap C^0([0,1])$ to the initial value problem $$\begin{aligned} u'\!(t) &=\frac{K\mu t^{2 \mu-1}}{t^{2 \mu }+(1-K) e^{2 u(t)}},\quad 0<t\leq 1, \label{HomeqB.1} \\ u(0) &= u_0, \label{HomeqB.2}\end{aligned}$$ that satisfies $$|u(t)-u(0)| \lesssim t^{2\mu} \AND |u'\!(t)| \lesssim t^{2\mu-1} \label{Hombounds}$$ for all $t\in (0,1]$. Moreover, for each $\rho_c\in \Rbb>0$, the solution $u$ determines a homogenous solution of the relativistic Euler equations given by $$\label{Homsol} \bigl(\rho,\vt^i) = \biggl( \frac{\rho_c t^{\frac{2(1+K)}{1-K}}}{(t^{2\mu}+ e^{2u})^{\frac{1+K}{2}}}, -t^{1-\mu}\sqrt{e^{2u}+t^{2 \mu} }, t^{1-\mu }e^{u},0,0\biggr) .$$ By standard local existence theorems for ODEs, we know there exists a $T \in [0,1)$ and a unique solution $u \in C^\infty((T,0])$ to the initial value problem - that can be continued to smaller times as long as $u(t)$ stays bounded. Noting that is separable, it can be integrated to yield the implicit solution $${\textstyle \frac{K}{2}} \ln \bigl(t^{2 \mu }+e^{2 u(t)}\bigr)- u(t)=c$$ where the constant $c$ is uniquely determined by the initial condition $u_0$ and the constants $K,\mu$. Solving for $t^{2\mu}$ shows that $$e^{\frac{2(c+u(t))}{K}}-e^{2 u(t)} = t^{2\mu}.$$ Since $\mu>0$, this implies the inequality $$0\leq e^{\frac{2(c+u(t))}{K}}-e^{2 u(t)} \leq 1, \quad 0\leq T<t \leq 1,$$ from which we deduce the lower bound $$\label{Homprop1} e^{2 u(t)} \leq e^{\frac{2(c+u(t))}{K}}\quad \Longrightarrow \quad 2 u(t) \leq \frac{2(c+u(t))}{K} \quad \Longrightarrow\quad -\frac{c}{1-K}\leq u(t), \quad 0\leq T<t \leq 1.$$ On the other hand, since the right hand side of the ODE is positive, $u(t)$ must be increasing, and hence, it is bounded above by $$\label{Homprop2} u(t) \leq u_0 \quad 0\leq T<t \leq 1.$$ Thus $u(t)$ is bounded above and below, and so we conclude via the continuation principle for ODEs that the solution $u(t)$ must exist for all $t\in (0,1]$, that is, $T=0$. Next, integrating in time, we see, with the help of the lower and upper bounds - and the triangle inequality, that $u(t)$ satisfies the estimate $$\label{Homprop3} |u(t_2)-u(t_1)| \lesssim \int^{t_2}_{t_1} \tau^{2\mu-1}\, d\tau \lesssim t_2^{2\mu} - t_1^{2\mu}, \quad 0<t_1< t_2 \leq 1.$$ From this, we conclude that the limit $\lim_{t\searrow 0} u(t)$ exists and $u(t)$ extends to a uniformly continuous function on $[0,1]$. Setting $t_2=t$ and sending $t_1\searrow 0$ in gives $$|u(t)-u(0)| \lesssim t^{2\mu}, \quad 0<t\leq 1.$$ We further note that the inequality $$|u'\!(t)| \lesssim t^{2\mu-1}, \quad 0<t\leq 1,$$ follows directly from the bounds - and the ODE . To complete the proof, we observe, by construction, that the trivial solution $W=0$ to determines via , , - and a homogeneous solution to the relativistic Euler equations given by . Fuchsian form\[Fform\] ---------------------- To complete the transformation of the relativistic Euler equations into Fuchsian form, we let $u(t)$ denote one of the homogeneous solutions to the IVP - from Proposition \[Homprop\]. Then by construction, $\Fc_0=0$, and so, reduces, see and , to $$\label{relEulF} \del{t}W + \Ac^I \del{I}W =-\frac{\mu}{t}\Pi W + t^{2\mu-1}\Gc.$$ Applying the projection operator $\Pi$ to this equation and noting the $\Pi \Gc = 0$ by and , we get that $$\del{t}(\Pi W) + \Pi\Ac^I \del{I}W =-\frac{\mu}{t}\Pi W,$$ which we observe can equivalently written as $$\label{relEulG} \del{t}(t^{\mu}\Pi W) + t^{\mu}\Pi\Ac^I \del{I}W = 0.$$ Next, applying $\Pi^\perp$, see , to shows, with the help of , that $$\del{t}(\Pi^\perp W) + \Pi^\perp\Ac^I \del{I}W = t^{2\mu-1}\Pi^\perp\Gc.$$ Adding this equation to gives $$\label{relEulH} \del{t}\Wb+t^\mu\Pi\Ac^I \del{I}W+\Pi^\perp\Ac^I \del{I}W = t^{2\mu-1}\Pi^\perp\Gc$$ where we have set $$\label{Wbdef} \Wb := \Pi^\perp W+t^{\mu}\Pi W = (\zetat,w_1,t^{\mu}w_2,t^{\mu}w_3)^{\tr}.$$ We then differentiate spatially to get $$\del{t}\del{J}W + \Ac^I \del{I}\del{J}W + \del{J}\Ac^I \del{I}W = -\frac{\mu}{t}\Pi \del{J}W + t^{2\mu-1}\del{J}\Gc.$$ Setting $$\label{WbJdef} \Wb\!_J := t^\mu \del{J}W = (t^\mu\del{J}\zetat,t^\mu \del{J}w_1,t^{\mu}\del{J}w_2,t^{\mu} \del{J} w_3)^{\tr},$$ we can write this as $$\del{t}\Wb\!_J + \Ac^I \del{I}\Wb\!_J + \del{J}\Ac^I \Wb_I = \frac{\mu}{t}\Pi^\perp \Wb\!_J + t^{3\mu-1}\del{J}\Gc.$$ Multiplying on the left by $A^0$ and recalling the definitions , we find that $\Wb\!_J$ satisfies $$\label{relEulI} A^0\del{t}\Wb\!_J + A^I \del{I}\Wb\!_J = \frac{\mu}{t}A^0\Pi^\perp \Wb\!_J + t^{3\mu-1}A^0\del{J}\Gc- A^0\del{J}\Ac^I \Wb_I.$$ Additionally, using the definition , we observe that can be written as $$\label{relEulJ} \del{t}\Wb=-\Pi\Ac^I \Wb_I- t^{-\mu}\Pi^\perp\Ac^I \Pi \Wb_I + t^{2\mu-1}\Pi^\perp\Gc- t^{-\mu}\Pi^\perp\Ac^I \Pi^\perp \Wb_I.$$ Finally, combining and yields the system $$\label{relEulK} \Asc^0\del{t}\Wsc + \Asc^I \del{I}\Wsc = \frac{\mu}{t}\Asc^0\Pbb \Wsc + \Fsc_0 +\Fsc_1$$ where $$\begin{aligned} \Wsc &= \begin{pmatrix} \Wb \\ \Wb\!_J \end{pmatrix}, \label{Wscdef} \\ \Asc^0 &= \begin{pmatrix} \id & 0 \\ 0 & A^0 \end{pmatrix}, \label{Asc0def} \\ \Asc^I &= \begin{pmatrix} 0 & 0 \\ 0 & A^I \end{pmatrix}, \label{AscIdef} \\ \Pbb &= \begin{pmatrix} 0 & 0 \\ 0 & \Pi^\perp \end{pmatrix}, \label{Pbbdef} \\ \Fsc_0 &=\begin{pmatrix} -\Pi\Ac^I \Wb_I- t^{-\mu}\Pi^\perp\Ac^I \Pi \Wb_I + t^{2\mu-1}\Pi^\perp\Gc \\ t^{3\mu-1}A^0\del{J}\Gc- A^0\del{J}\Ac^I \Wb_I\end{pmatrix} \label{Fsc0def} \intertext{and} \Fsc_1 & =\begin{pmatrix} - t^{-\mu}\Pi^\perp\Ac^I \Pi^\perp \Wb_I \\ 0\end{pmatrix}. \label{Fsc1def}\end{aligned}$$ The point of this system, as will be established in the proof of Theorem \[mainthm\], is that it is now of a suitable Fuchsian form to which we can apply the existence theory from [@BOOS:2019]. This will allow us to establish the future stability of nonlinear perturbations of the homogeneous solutions to relativistic Euler equations that are defined by . Coefficient properties\[coeff\] ------------------------------- We now turn to showing that the coefficients of the system satisfy the required properties needed to apply the existence theory from [@BOOS:2019] in the proof of Theorem \[mainthm\]. To begin, we define $$\label{bvarsdef} \tb = t^{2\mu}, \AND \wb_\Lambda = t^\mu w_\Lambda, \quad \Lambda=2,3,$$ and observe from -, and that the matrix $A^0$ can be treated as a map depending on the variables , that is, $$\label{A0smooth} A^0 = A^0(\tb,\wbr_1,\wb_2,\wb_3),$$ where for each $R>0$ there exists constants $r,\omega >0$ such that $A^0$ is smooth on the domain defined by $$\label{smoothdom} (\tb,\wbr_1,\wb_2,\wb_3) \in (-r,2) \times (-R,R) \times (-R,R)\times (-R,R),$$ and satisfies $$\label{A0lb} A^0(\tb,\wbr_1,0,0) \geq \omega \id$$ for all $(\tb,\wbr_1)\in (-\rho,2)\times (-R,R)$. Differentiating $A^0$ with respect to $t$ then shows, with the help of , and , that $$\begin{aligned} \del{t}A^0 &= DA^0(\tb,\wbr_1,\wb_2,\wb_3) \begin{pmatrix} 2\mu t^{2\mu-1} \\ u'(t)+\del{t}w_1\\ \del{t}\wb_2\\ \del{t}\wb_3 \end{pmatrix} \notag \\ &= DA^0(\tb,\wbr_1,\wb_2,\wb_3) \left(\begin{pmatrix} 2\mu t^{2\mu-1} \\ u'(t)\\ 0 \\ 0 \end{pmatrix} + \Pc_1\del{t}\Wb \right) \label{dtA0}\end{aligned}$$ where $$\Pc_1 = \begin{pmatrix} 0 & 0 & 0 & 0 \\ 0 & 1 & 0 & 0 \\ 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 1 \end{pmatrix},$$ $\del{t}\Wb$ can be computed using the equation of motion , and $u'(t)$ is bounded by . Next, setting $$\label{wh1def} \wh_1 = t^\mu e^{-2 \wbr_1},$$ it follows from -, -, - and that we can express the matrices $\Ac^I$ as $$\label{AcIsmooth} \Ac^I = \Ac^I_1(\wh_1,\wb_2,\wb_3)+ t^\mu \Ac^I_2(\tb,\wbr_1,\wb_2,\wb_3)+ t^{2\mu} \Ac^I_3(\tb,\wbr_1,\wb_2,\wb_3)$$ where the $\Ac^I_2$, $\At^I_3$ are smooth on the domain and the $\Ac^I_1$ are smooth on the domain defined by $$(\wh_1,\wb_2,\wb_3) \in (-R,R)\times (-R,R)\times (-R,R).$$ It is also not difficult to verify from - that the $\Ac^I_1$ satisfy $$\label{PiperpAcIPi} \Pi^\perp \Ac^I_1 \Pi = 0.$$ Differentiating the matrices $\Ac^I$ spatially, we get from , , , and that $$\begin{aligned} \del{J}\Ac^I &= D\Ac^I_1(\wh_1,\wb_2,\wb_3)\begin{pmatrix}-2 e^{-2 \wbr_1} t^\mu \del{J}w_1 \\ t^\mu \del{J}w_2 \\ t^\mu \del{J}w_2 \end{pmatrix}\notag \\ &+ t^\mu D\Ac^I_2(\tb,\wbr_1,\wb_2,\wb_3)\begin{pmatrix} 0 \\ \del{J}w_1\\ t^\mu \del{J}w_2 \\ t^\mu\del{J} w_3 \end{pmatrix} +t^{2\mu} D\Ac^I_3(\tb,\wbr_1,\wb_2,\wb_3)\begin{pmatrix} 0 \\ \del{J}w_1\\ t^\mu \del{J}w_2 \\ t^\mu\del{J} w_3 \end{pmatrix} \notag \\ & = \Bigl(D\Ac^I_1(\wh_1,\wb_2,\wb_3)\Pc_2 + D\Ac^I_2(\tb,\wbr_1,\wb_2,\wb_3)\Pc_3+t^\mu D\Ac^I_2(\tb,\wbr_1,\wb_2,\wb_3)\Pc_3\Bigr) \Wb\!_J, \label{dJAcI}\end{aligned}$$ where $$\Pc_2 = \begin{pmatrix} 0 & -2 e^{-2 \wbr_1} & 0 & 0 \\ 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 1 \end{pmatrix} \AND \Pc_3 = \begin{pmatrix} 0 & 0 & 0 & 0 \\ 0 & 1 & 0 & 0 \\ 0 & 0 & t^\mu & 0 \\ 0 & 0 & 0 & t^\mu \end{pmatrix}.$$ We further observe from and - that $A^0$ satisfies $$[\Pi^\perp,A^0] = 0$$ and $$\Pi^\perp A^0 \Pi = \Pi A^0 \Pi^\perp = 0.$$ From the definitions and , it is then clear that $\Asc^0$ satisfies $$\label{Asc0Pbbcom} [\Pbb,\Asc^0] = 0$$ and $$\label{PbbAsc0Pbbperp} \Pbb^\perp \Asc^0 \Pbb = \Pbb \Asc^0 \Pbb^\perp = 0,$$ where $$\label{Pbbperpdef} \Pbb^\perp = \id -\Pbb.$$ Additionally, it follows immediately from - that $\Pbb$ satisfies $$\label{Pbbrel} \Pbb^2 = \Pbb, \quad \Pbb^{\tr} = \Pbb, \quad \del{t}\Pbb = 0 \AND \del{I} \Pbb = 0,$$ while the symmetry of the matrices $\Asc^i$, that is, $$\label{Ascisym} (\Asc^i)^{\tr} = \Asc^i$$ is an immediate consequence of the definitions -, , and -. \[dtA0rem\] From the definitions , , , , , , and , the evolution equation , the estimates for $u(t)$ and $u'(t)$, the derivative formula , and the smoothness properties and of the matrices $A^0$ and $\Ac^I$, respectively, and the identity , it is not difficult to verify, for $\mu$ satisfying $0\leq \mu \leq 1/2$ and $R>0$ small enough, that there exists constants $\theta, \beta>0$ such that $\del{t}A^0$ is bounded by $$|\del{t}A^0| \leq \theta t^{2\mu-1} + t^{\mu-1}\beta |\Pbb \Wsc|$$ for all $(t,\Wsc)\in [0,1]\times B_R(\Rbb^{16})$. Furthermore, from the formulas -, it is also clear that $$\Pbb\Fsc_1=0$$ and there exists a constant $\mu>0$ such that $\Pbb^\perp\Fsc_1$ is bounded by $$|\Pbb^\perp\Fsc_1| \leq t^{\mu-1}\mu |\Pbb \Wsc|$$ for all $(t,\Wsc)\in [0,1]\times B_R(\Rbb^{16})$, while $\Fsc_0$ is bounded by $$|\Fsc_0| \lesssim t^{2\mu-1}|\Wsc|$$ for all $(t,\Wsc)\in [0,1]\times B_R(\Rbb^{16})$. By similar considerations, we see for $\mu$ satisfying $1/2<\mu <1$, that $\del{t}A^0$, $\Pbb^\perp \Fsc_1$ and $\Fsc_0$ are bounded by $$\begin{aligned} |\del{t}A^0| &\leq \theta t^{1-2\mu} + t^{-\mu}\beta |\Pbb \Wsc|, \\ |\Pbb^\perp\Fsc_1| &\leq t^{-\mu}\mu |\Pbb \Wsc| \intertext{and} |\Fsc_0| &\lesssim t^{1-2\mu}|\Wsc|,\end{aligned}$$ respectively, for all $(t,\Wsc)\in [0,1]\times B_R(\Rbb^{16})$. Future stability\[stability\] ============================= We are now ready to establish the future stability of nonlinear perturbations of the homogeneous solutions of relativistic Euler equations. \[mainthm\] Suppose $k\in\Zbb_{>3/2+3}$, $1/3<K < 1/2$, $\mu = (3K-1)/(1-K)$, $\sigma > 0$, $u_0\in \Rbb$, $u \in C^\infty((0,1])\times C^0([0,1])$ is the unique solution to the IVP -, and $\zetat_0, w^0_J \in H^{k+1}(\Tbb^3)$. Then for $\delta>0$ small enough, there exists a unique solution $$W=(\zetat,w_J)^{\tr} \in C^0\bigl((0,1], H^{k+1}(\Tbb^3,\Rbb^4)\bigr)\cap C^1\bigl((0,1],H^{k}(\Tbb^3,\Rbb^4)\bigr)$$ to (see and ) the initial value problem $$\begin{aligned} A^0 \del{t}W + A^I \del{I}W &= A^0 \Fc && \text{in $(0,1]\times \Tbb^3$,} \label{relEulL1} \\ W &= (\zetat_0, w^0_J)^{\tr} && \text{in $\{1\}\times \Tbb^3$,} \label{relEulL2}\end{aligned}$$ provided that $$\biggl(\norm{\zetat_0}_{H^{k+1}}^2+\sum_{J=1}^3\norm{w^0_J}_{H^{k+1}}^2\biggr)^{\frac{1}{2}}\leq \delta.$$ Moreover, (i) $W=(\zetat,w_J)^{\tr}$ satisfies the energy estimate $$\Ec(t) + \int_t^1 \tau^{2\mu-1}\bigl(\norm{D\zetat(\tau)}_{H^k}^2+\norm{Dw_1(\tau)}_{H^k}^2\bigr)\,d\tau \lesssim \norm{\zetat_0}_{H^{k+1}}^2+\sum_{J=1}^3\norm{w^0_J}_{H^{k+1}}^2$$ for all $t\in (0,1]$ where[^5] $$\Ec(t)=\norm{\zetat(t)}_{H^k}^2+\norm{w_1(t)}_{H^k}^2+t^{2\mu}\Bigl(\norm{D\zetat(t)}_{H^k}^2+\norm{Dw_1(t)}_{H^k}^2+\norm{w_2(t)}_{H^{k+1}}^2+\norm{w_3(t)}_{H^{k+1}}^2\Bigr),$$ (ii) there exists functions $\zetat_*, w_1^* \in H^{k-1}(\Tbb^3)$ and $\wb_2^*,\wb_3^* \in H^{k}(\Tbb^3)$ such that the estimate $$\begin{aligned} \bar{\Ec}(t) \lesssim t^{\mu-\sigma}\end{aligned}$$ holds for all $t\in (0,1]$ where $$\bar{\Ec}(t)=\norm{\zetat(t) - \zetat_*}_{H^{k-1}}+\norm{w_1(t) - w_1^*}_{H^{k-1}} +\norm{t^\mu w_2(t) - \wb_2^*}_{H^{k}}+\norm{t^\mu w_3(t) - \wb_3^*}_{H^{k}},$$ (iii) and $u$ and $W=(\zetat,w_J)^{\tr}$ determine a solution of the relativistic Euler equations on the spacetime region $M=(0,1]\times \Tbb^3$ via the formulas $$\begin{aligned} \rho &= \frac{\rho_c t^{\frac{2(1+K)}{1-K}} e^{(1+K)\zetat}}{(t^{2\mu}+ e^{2(u+w_1)})^{\frac{1+K}{2}}}, \label{relEulsol.1}\\ \vt^0 &= -t^{1-\mu}\sqrt{e^{2 (u+w_1)}+t^{2 \mu} },\label{relEulsol.2}\\ \vt^1 &=t^{1-\mu }\biggl( \frac{e^{u+w_1}}{\sqrt{ (t^{\mu}w_2-t^{\mu}w_3)^2+(t^{\mu}w_2+t^{\mu}w_3)^2+1}} \biggr), \label{relEulsol.3} \\ \vt^2 &= t^{1-\mu }\biggl( \frac{(t^{\mu}w_2+t^{\mu}w_3) e^{u+w_1}}{\sqrt{ (t^{\mu}w_2-t^{\mu}w_3)^2+(t^{\mu}w_2+t^{\mu}w_3)^2+1}}\biggr)\label{relEulsol.4} \intertext{and} \vt^3 &= t^{1-\mu }\biggl( \frac{(t^{\mu}w_2-t^{\mu}w_3) e^{u+w_1}}{\sqrt{ (t^{\mu}w_2-t^{\mu}w_3)^2+(t^{\mu}w_2+t^{\mu}w_3)^2+1}}\biggr). \label{relEulsol.5}\end{aligned}$$ By - and , we know that the matrices $A^i$ are symmetric. Furthermore, from the analysis carried out in Section \[coeff\], we know that the maps $A^i$ and $\Fc$ depend smoothly on the variables $(t,\zeta,w_J)$ for $t\in (0,1]$ and $(\zeta,w_J)$ in an open neighborhood of zero, and that the matrix $A^0$ is positive definite. This shows that the system is symmetric hyperbolic. Since $k\in\Zbb_{>3/2+3}$ and $$W_0 :=(\zetat_0, w^0_J)^{\tr}\in H^{k+1}(\Tbb^3,\Rbb^4))$$ by assumption, we can appeal to standard local-in-time existence and uniqueness theorems and the continuation principle for symmetric hyperbolic systems, see Propositions 1.4, 1.5 and 2.1 from [@TaylorIII:1996 Ch. 16], to conclude that there exists a maximal time $T_* \in [0,1)$ such that the IVP - admits a unique solution $$W=(\zetat,w_J)^{\tr} \in C^0((T_*,1], H^{k+1}(\Tbb^3,\Rbb^4))\cap C^1((T_*,1],H^{k}(\Tbb^3,\Rbb^4).$$ We also know from the computations carried out in Section \[Ftrans\] that $$\label{Wscvar} \Wsc = (\Wb,\Wb\!_J),$$ where $\Wb$ and $\Wb\!_J$ are determined from the solution $W$ via the formulas and , respectively, will solve the IVP $$\begin{aligned} \Asc^0\del{t}\Wsc + \Asc^I \del{I}\Wsc &= \frac{\mu}{t}\Asc^0\Pbb \Wsc + \Fsc_0 + \Fsc_1 && \text{in $(T_*,1]\times \Tbb^3$,} \label{relEulM1} \\ \Wsc &= \Wsc_0 := (W_0,\del{J}W_0)^{\tr} &&\text{in $\{1\}\times \Tbb^3$.} \label{relEulM2}\end{aligned}$$ We further observe that if the initial data $W_0$ is chosen to satisfy $\norm{W_0}^{H^{k+1}} \leq \delta$, then $$\norm{\Wsc_0}_{H^k} \lesssim \norm{W_0}_{H^{k+1}} \leq \delta.$$ On the other hand, we can view as an equation for the variables $\Wsc=(\Wb,\Wb_J)$, with $\Wb=(w_1,\wb_2,\wb_3)$ and $\Wb=(w_{1,J},\wb_{1,J},\wb_{1,J})$, where the maps $A^0$, $A^I=A^0\Ac^I$ and $\Fsc_0$, $\Fsc_1$ depend on the variables $(t,\Wb)$ and $\Wsc$ respectively; see Section \[coeff\] above. Then from **(i)** the smoothness properties , and the identity satisfied by the matrices $A^0$ and $\Ac^I$, **(ii)** the derivative formulas and , **(iii)** the variable definitions , , , , and , **(iv)** the properties of the homogeneous solution $u(t)$ as given by Proposition \[Homprop\], **(v)** the assumption $1/3<K < 1/2$, which, in particular, implies that $0<\mu <1$, and **(vi)** the properties - of the matrices $\Asc^i$ and $\Pbb$, it is not difficult to verify using the definitions - that, for $R>0$ chosen small enough, there exists, see also Remark \[dtA0rem\], constants $\theta,\gamma_1=\gammat_1,\gamma_2=\gamma_2,\mu_2>0$ and $\beta_0,\beta_2,\beta_4,\beta_6>0$, where the $\beta_q$ can be chosen as small as we like by shrinking $R>0$ if necessary, such that system satisfies all the assumptions from Section 3.4 of [@BOOS:2019] for following choice of constants: $$\begin{gathered} p=\begin{cases}2\mu & \text{if $0<\mu\leq 1/2$} \\ 2(1-\mu) & \text{if $1/2\mu < 1$} \end{cases}, \\ \kappa=\kappat=\mu \intertext{and} \beta_1=\beta_3=\beta_5=\beta_7=\mu_1=\mu_3= \alpha=0.\end{gathered}$$ As discussed in [@BOOS:2019 §3.4], this implies that under the time transformation[^6] $t \mapsto t^p$, the transformed version of will satisfy all of the assumptions from Section 3.1 of [@BOOS:2019]. Moreover, since the $\Asc^I$ have a regular limit as $t\searrow 0$ (equivalently as $\tau\searrow 0$), the constants $\btt$ and $\tilde{\btt}$ from Theorem 3.8 of [@BOOS:2019] will satisfy $\btt=\tilde{\btt}=0$, and consequently, the constant[^7] $\mathfrak{z}$ that is involved in determining the decay is given by $$\mathfrak{z}= \kappa - \Half \gammat_1(\beta_1+(k-1)\tilde{\btt}) = \mu.$$ We can therefore apply Theorem 3.8 from [@BOOS:2019] to the time transformed version of as described in [@BOOS:2019 Section 3.4] to deduce, for $\delta>0$ chosen small enough and the initial data satisfying $\norm{\Wsc(0)}_{H^k}< \delta$, the existence of a unique solution $$\Wsc^* \in C^0\bigl((0,1],H^k(\Tbb^3,\Rbb^{16})\bigr)\cap L^\infty\bigl((0,1],H^k(\Tbb^3,\Rbb^{16}))\bigr)\cap C^1\bigl((0,1],H^{k-1}(\Tbb^3,\Rbb^{16})\bigr)$$ to the IVP - with the following properties: (1) The limit $\lim_{t\searrow 0} \Pbb^\perp \Wsc^*$, denoted $\Pbb^\perp \Wsc^*(0)$, exists in $H^{k-1}(\Tbb^3,\Rbb^{16})$. (2) The solution satisfies the energy estimate $$\label{eestA} \norm{\Wsc^*(t)}_{H^k}^2 + \int_{t}^1 \frac{1}{\tau} \norm{\Pbb \Wsc^*(\tau)}_{H^k}^2\, d\tau \lesssim \norm{\Wsc_0}_{H^k}^2$$ for all $t\in (0,1]$. (3) The solution decays as $t\searrow 0$ according to $$\begin{gathered} \label{decayA1} \norm{\Pbb \Wsc^*(t)}_{H^{k-1}} \lesssim t^{\mu-\sigma} \intertext{and} \label{decayA2} \norm{\Pbb^\perp \Wsc^*(t) - \Pbb^\perp \Wsc^*(0)}_{H^{k-1}} \lesssim t^{\mu-\sigma} \end{gathered}$$ for all $t\in (0,1]$. By uniqueness, the two solutions $\Wsc$ and $\Wsc^*$ to the IVP - must coincide on their common domain of definition, and so, we have $$\Wsc(t)=\Wsc^*(t), \quad T_*<t \leq 1.$$ But this implies via , the energy estimate , and Sobolev’s inequality [@TaylorIII:1996 Ch. 13, Prop 2.4] that $$\norm{\Wb(t)}_{W^{1,\infty}} \lesssim \norm{\Wb(t)}_{H^k} \leq \norm{\Wsc(t)}_{H^{k-1}} \lesssim \norm{\Wsc_0}, \quad T^*<t\leq 1.$$ By choosing the initial data $\Wsc_0$ so that $\norm{\Wsc_0}_{H^k}$ is sufficiently small, we can then ensure that $$\norm{\Wb(t)}_{W^{1,\infty}} \leq \frac{R}{2} \quad T^*<t\leq 1,$$ where $R>0$ is as defined in Section \[coeff\], which, in particular, is enough to guarantee that the coefficients $A^i$ and $\Fc$ of remain well-defined. By the continuation principle and the maximality of $T_*$, we conclude that $T_*=0$, and hence that $$\Wsc(t)=\Wsc^*(t), \quad 0< t\leq 1.$$ From this, the definitions , , , , and , and the energy estimate , it is then straightforward to verify $$\Ec(t) + \int_t^1 \tau^{2\mu-1}\bigl(\norm{D\zetat(\tau)}_{H^k}^2+\norm{Dw_1(\tau)}_{H^k}^2\bigr)\,d\tau \lesssim \norm{W_0}_{H^k}^2, \quad 0<t\leq 1,$$ where $$\Ec(t)=\norm{\zetat(t)}_{H^k}^2+\norm{w_1(t)}_{H^k}^2+t^{2\mu}\Bigl(\norm{D\zetat(t)}_{H^k}^2+\norm{Dw_1(t)}_{H^k}^2+\norm{w_2(t)}_{H^{k+1}}^2+\norm{w_3(t)}_{H^{k+1}}^2\Bigr).$$ Furthermore, from the decay estimate and the definition , we obtain the existence of functions $\zetat_*, w_1^* \in H^{k-1}(\Tbb^3)$ and $\wb_2^*,\wb_3^* \in H^{k}(\Tbb^3)$ such that the estimate $$\begin{aligned} \bar{\Ec}(t) \lesssim t^{\mu-\sigma}\end{aligned}$$ holds for all $t\in (0,1]$, where $$\bar{\Ec}(t)=\norm{\zetat(t) - \zetat_*}_{H^{k-1}}+\norm{w_1(t) - w_1^*}_{H^{k-1}} +\norm{t^\mu w_2(t) - \wb_2^*}_{H^{k}}+\norm{t^\mu w_3(t) - \wb_3^*}_{H^{k}}.$$ To complete the proof, we recall from , , and -, that $u$ and $W=(\zetat,w_J)^{\tr}$ determine a solution of the relativistic Euler equations on the spacetime region $M=(0,1]\times \Tbb^3$ via the formulas -. $\Tbb^2$-symmetric future stability\[symsec\] ============================================= In this section, we focus on solutions of the relativistic Euler equations that are independent of the coordinates $(x^2,x^3)\in \Tbb^2$, or in other words, admit a $\Tbb^2$-symmetry. To find such solutions, we set $$\label{symvars} \zetat=\ztt(t,x^1), \quad w_1 = \wtt(t,x^1) \AND w_2=w_3=0,$$ and observe, with the help of the , -, , and -, that this ansatz leads to a consistent reduction of to a symmetric hyperbolic equations for the variables $(\ztt,\wtt)$ in $1+1$ dimensions given by $$\label{symEulA} \Att^0 \del{t}\Wtt+ \Att^1 \del{1}\Wtt = \Ftt$$ where $$\begin{gathered} \Wtt = (\ztt,\wtt)^{\tr}, \label{Wttdef} \\ \Att^0 =\begin{pmatrix} K & 0 \\ 0 & \frac{t^{2 \mu } e^{2 (u+\wtt)}+(1-K) e^{4 (u+\wtt)}}{(t^{2 \mu }+e^{2 (u+\wtt)})^2} \end{pmatrix} , \label{Att0def}\\ \Att^1 =\frac{1}{\sqrt{e^{2 (u+\wtt)}+t^{2 \mu } }}\begin{pmatrix} -K e^{u+\wtt} & -\frac{K t^{2\mu } e^{u+\wtt}}{t^{2 \mu }+e^{2 (u+\wtt)}} \\ -\frac{K t^{2\mu } e^{u+\wtt}}{t^{2 \mu }+e^{2 (u+\wtt)}} & \frac{ (2 K-1) t^{2 \mu } e^{3 (u+\wtt)}+(K-1) e^{5 (u+\wtt)}}{ (t^{2 \mu }+e^{2 (u+\wtt)})^2} \end{pmatrix} ,\label{Att1def}\\ \Ftt =\begin{pmatrix} 0 \\ -\frac{ t^{2\mu -1 }K (3 K-1) (e^{2 \wtt}-1) e^{4 u+2 \wtt}}{(t^{2 \mu }-(K-1) e^{2 u}) (t^{2 \mu }+e^{2 (u+\wtt)})^2} \end{pmatrix} ,\label{Fttdef} \end{gathered}$$ and in deriving this equation, we have assumed, as above, that $u=u(t)$ solves the IVP -. The system is almost regular in that $\Att^0(t,\wtt)$, $\Att^1(t,\wtt)$ and $\Ftt(t,\wtt)$ are smooth in $(t,\wtt)$ for $(t,\wtt)\in (0,1]\times \Rbb$ and $\Att^0$ and $\Att^1$ are, for any $R>0$, uniformly bounded for $(t,\wtt)\in (0,1]\times [-R,R]$ by virtue of the assumption $1/3<K<1$, which implies that $\mu>0$. The slight difficulty in establishing existence is that $\del{t}A^0(t,\wtt)$ and $\Ftt(t,\wtt)$ are not bounded as $t\searrow 0$ for all $K\in (1/3,1)$. However, the worst that these coefficients can diverge is like $t^{2\mu -1}$, which is always integrable since $\mu>0$. As we shall see in the proof of the following theorem, this integrability allows us to modify standard local-in-time existence results in a straightforward fashion to establish the existence of solutions of on $(0,1]\times \Tbb^1$ under a suitable small initial data assumption. \[symthm\] Suppose $k\in \Zbb_{>1/2+1}$, $1/3<K<1$, $\mu=(3K-1)/(1-K)$, $u_0\in \Rbb$ and $u\in C^\infty((0,1])\times C^0([0,1])$ is the unique solution to the IVP -, and $\ztt_0,\wtt_0 \in H^k(\Tbb^1)$. Then for $\delta>0$ small enough, there exists a unique solution $$\Wtt=(\ztt,\wtt)^{\tr} \in C^0\bigl((0,1],H^k(\Tbb^1,\Rbb^2)\bigr)\times C^1\bigl((0,1],H^{k-1}(\Tbb^1,\Rbb^2)\bigr)$$ of the IVP $$\begin{aligned} \Att^0 \del{t}\Wtt+ \Att^1 \del{1}\Wtt &= \Ftt && \text{in $(0,1]\times \Tbb^1$,}\label{globalS1}\\ \Wtt &= (\ztt_0,\wtt_0)^{\tr} && \text{in $\{1\}\times \Tbb^1,$} \label{globalS2} \end{aligned}$$ provided that $$\bigl(\norm{\ztt}^2_{H^k}+\norm{\wtt}^2_{H^k} \bigr)^{\frac{1}{2}} \leq \delta.$$ Moreover, (i) the solution and its time derivative are bounded by $$\norm{\Wtt}_{H^k} \lesssim 1 \AND \norm{\del{t}\Wtt}_{H^{k-1}} \lesssim 1+t^{2\mu-1}$$ respectively, for all $t\in (0,1]$, (ii) there exists functions $\ztt_*,\wtt_*\in H^{k-1}(\Tbb^1)$ such that $$\norm{\ztt(t)-\ztt_*}_{H^{k-1}}+\norm{\wtt(t)-\wtt_*}_{H^{k-1}} \lesssim t+ t^{2\mu}$$ for all $t\in (0,1]$, (iii) and $u$ and $\Wtt=(\ztt,\wtt)^{\tr}$ determine a solution of the relativistic Euler equations on the spacetime region $M=(0,1]\times \Tbb^3$ via the formulas $$\begin{aligned} \rho &= \frac{\rho_c t^{\frac{2(1+K)}{1-K}} e^{(1+K)\ztt}}{(t^{2\mu}+ e^{2(u+\wtt)})^{\frac{1+K}{2}}}, \\ \vt^0 &= -t^{1-\mu}\sqrt{e^{2 (u+\wtt)}+t^{2 \mu} }, \\ \vt^1 &=t^{1-\mu }e^{u+\wtt} \intertext{and} \vt^2 &=\vt^3 = 0. $$ Since $K\in (1/3,1)$, the inequality $\mu>0$ holds, and so, fixing $R>0$, we observe from that there exists a constant $\gamma>0$ such that $$\label{globalP2} \frac{1}{\gamma}\id \leq \Att^0(t,\wtt) \leq \gamma\id$$ for all $(t,\wtt)\in (0,1]\times [-R,R]$. From this inequality and the smooth dependence, see -, of $\Att^0$, $\Att^1$ and $\Ftt$ on $(t,\wtt)$ for $(t,\wtt)\in (0,1]\times \Rbb$, it follows that the system is symmetric hyperbolic. Consequently, fixing $k \in \Zbb_{> 1/2+1}$ and choosing initial data $\ztt_0,\wtt_0\in H^{k}(\Tbb^1)$ satisfying $$\label{globalP3} \norm{\Wtt(1)}_{H^k} = \sqrt{\norm{\ztt_0}_{H^k}^2 + \norm{\wtt_0}_{H^k}^2} \leq \delta$$ for some $\delta>0$, we know from standard local-in-time existence and uniqueness theorems and the continuation principle for symmetric hyperbolic systems, see Propositions 1.4, 1.5 and 2.1 from [@TaylorIII:1996 Ch. 16], that there exists a unique solution $$\Wtt=(\ztt, \wtt )^{\tr} \in C^0\bigl((T^*,1],H^{k}(\Tbb^1)\bigr)\cap C^1 \bigl((T^*,1],H^{k-1}(\Tbb^1)\bigr)$$ to satisfying the initial condition for some time $T^*\in [0,1)$, which we can take to be maximal. Next, applying $\Att^0\del{1}^\ell (\Att^0)^{-1}$ to gives $$\label{globalP7} \Att^0 \del{t}\del{1}^\ell \Wtt+ \Att^1 \del{1} \del{1}^\ell \Wtt= \Ftt_\ell, \quad \ell =0,1,\dots,k,$$ where $$\label{globalP9} \Ftt_\ell =-\Att^0[\del{1}^\ell,(\Att^0)^{-1}\Att^1]\del{1}\Wtt + \Att^0\del{1}^\ell\bigl((\Att^0)^{-1}\Ftt\bigr).$$ Employing a standard $L^2$ energy estimate, we obtain the energy inequality $$\label{globalP10} -\del{t}\nnorm{\del{1}^\ell \Wtt}_0^2 \leq \norm{\textrm{Div}\Att}_{L^\infty}\norm{\del{1}^\ell \Wtt}_{L^2}^2 + 2\norm{\del{1}^\ell \Wtt}_{L^2}\norm{\Ftt_\ell }_{L^2}, \quad \ell =0,1,\dots,k,$$ from , where $$\textrm{Div}\Att = \del{t}\Att^0 + \del{1}\Att^1$$ and $$\nnorm{(\cdot)}^2_0 = \ip{(\cdot)}{A^0(\cdot)}$$ is the energy norm. To proceed, we define the higher energy norms $$\nnorm{\Wtt}_k^2= \sum_{\ell=0}^k\nnorm{\del{1}^\ell \Wtt}_0^2,$$ and observe via that the equivalence of norms $$\label{globalP11} \frac{1}{\sqrt{\gamma}}\norm{\Wtt}_{H^k}\leq \nnorm{\Wtt}_k \leq \sqrt{\gamma}\norm{\Wtt}_{H^k}$$ holds. Using this equivalence, we obtain, after summing over $\ell$ from $0$ to $k$, the differential energy estimate $$\label{globalP12} -\del{t}\nnorm{\Wtt}_k^2 \lesssim \norm{\textrm{Div}\Att}_{L^\infty}\nnorm{\Wtt}_{k}^2 + \nnorm{\Wtt}_{k}\left(\sum_{\ell=0}^k\norm{\Ftt_\ell }_{L^2}\right).$$ Since $k>1/2+1$, we have by Sobolev’s inequality [@TaylorIII:1996 Ch. 13, Prop 2.4] that $$\label{globalP20} \norm{\Wtt}_{L^\infty}+ \norm{\del{1} \Wtt}_{L^\infty} \leq C_{\text{Sob}} \norm{\Wtt}_{H^k}$$ for some constant $C_{\text{Sob}}>0$ independent of the solution $\Wtt$. We then set $\Rc = \frac{R}{\sqrt{\gamma}C_{\text{Sob}}}$ so that $$\label{globalP21} \nnorm{\Wtt}_{k} < \Rc \quad \Longrightarrow \quad \norm{\Wtt}_{L^\infty} < R$$ by and . We also choose $\delta$, see above, so that $0< \delta < \frac{\Rc}{4\sqrt{\gamma}}$ in order to guarantee that $\nnorm{\Wtt(1)}< \frac{\Rc}{4}$, and we let $T_* \in (T^*,1),$ be the first time such that $\norm{\Wtt(T_*)}_{H^k}= \frac{\Rc}{2}$ or if that time does not exist, then we set $T^*=T_*$, the maximal time of existence. In either case, we have that $$\label{globalP22} \nnorm{\Wtt(t)}_{k} < \frac{\Rc}{2}, \quad 0<T^*\leq T_* < t \leq 1.$$ From the formulas - and the bounds obeyed by $u(t)$, it is then clear that there exists a constant $C_\ell>0$, $\ell\in \Zbb_{\geq 0}$, such that $\Att^0$, $\Att^1$ and $\Ftt$ are bounded by $$\begin{gathered} |\del{\wtt}^\ell \Att^0(t,\wtt)| + |\del{\wtt}^\ell \Att^1(t,\wtt)| \leq C_\ell , \quad |\del{\wtt}^\ell\del{t} \Att^0(t,\wtt)| \leq C_\ell (1+t^{2\mu-1}) \label{globalP22a} \intertext{and} \bigl|\del{\wtt}^\ell \Ftt(t,\wtt)\bigr| \leq C_\ell(1+t^{2\mu-1})|\wtt| \label{globalP22c}\end{gathered}$$ for all $(t,\wtt)\in (0,1]\times [-R,R]$. These bounds in conjunction with the Moser and commutator estimates, see Propositions 3.7 and 3.9 from [@TaylorIII:1996 Ch. 13], and the inequality imply that $$\begin{gathered} \norm{\textrm{Div}\Att}_{L^\infty} \leq (1+t^{2\mu-1})C(\norm{\Wtt}_{H^k}) \AND \left(\sum_{\ell=0}^k\norm{\Ftt_\ell }_{L^2}\right) \leq (1+ t^{2\mu-1})C(\norm{\Wtt}_{H^k})\norm{\Wtt}_{H^k}.\end{gathered}$$ With the help of these inequalities and , we see that implies the energy estimate $$-\del{t}\nnorm{\Wtt}_k \leq (1+ t^{2\mu-1})C(\nnorm{\Wtt}_{k})\nnorm{\Wtt}_{k}, \quad 0<T^*\leq T_* < t \leq 1.$$ By Gronwall’s inequality, we obtain the bound $$\label{globalP24} \nnorm{\Wtt(t)}_k\leq e^{C(\Rc)\int_{t}^1 1+\tau^{2\mu-1}\, d\tau}\nnorm{\Wtt(1)}_k, \quad 0<T^*\leq T_* < t \leq 1,$$ where in deriving this we have used . But $$\int_{t}^1 1+\tau^{2\mu-1}\, d\tau\lesssim 1, \quad 0<t\leq 1,$$ since $\mu>0$, and consequently, we have by , and that $$\nnorm{\Wtt(t)}_k\leq C(\Rc)\delta, \quad 0<T^*\leq T_* < t \leq 1.$$ By shrinking $\delta>0$ more if necessary, it follows that $$\label{globalP25} \nnorm{\Wtt(t)}_k\leq \frac{\Rc}{2}, \quad 0<T^*\leq T_* < t \leq 1.$$ We therefore conclude by the continuation principle and the definition of $T_*$ that $T_*=T^*=0$, which establishes the existence of a unique solution $$\Wtt=(\ztt, \wtt )^{\tr} \in C^0\bigl((0,1],H^{k}(\Tbb^1.\Rbb^2)\bigr)\cap C^1 \bigl((0,1],H^{k-1}(\Tbb^1,\Rbb^2)\bigr)$$ to the initial value problem -. Next, by integrating $\del{t}\Wtt$ in time, we get $$\label{globalP26} \Wtt(t_2)-\Wtt(t_1) = \int_{t_1}^{t_2} \del{t}\Wtt(\tau)\,d\tau, \quad 0<t_1<t_2\leq 1.$$ Using to write $\del{t}\Wtt$ as $$\del{t}\Wtt= (\Att^0)^{-1}[\Att^1 \del{1}\Wtt +\Ftt],$$ it is not difficult to verify from the bounds , , , -, and , where $T_*=T^*=0$, and the Moser estimates that $$\norm{\del{t}\Wtt}_{H^{k-1}} \lesssim 1+t^{\mu-1}.$$ From this estimate and the triangle inequality, we see, after applying the $H^{k-1}$ norm to , that $$\label{globalP27} \norm{\Wtt(t_2)-\Wtt(t_1)}_{H^{k-1}} \leq \int_{t_1}^{t_2} \norm{\del{t}\Wtt(\tau)}_{H^{k-1}}\,d\tau \lesssim |t_2-t_1| +|t_2^{2\mu}-t_1^{2\mu}|, \quad 0<t_1<t_2\leq 1.$$ From this inequality, we conclude that the limit $\lim_{t\searrow 0}\Wtt(t)$, denoted $(\ztt_*,\wtt_*)$, exists in $H^{k-1}(\Tbb^1,\Rbb^2)$. Furthermore, sending $t_1\searrow 0$ in shows that $$\norm{\ztt(t)-\ztt_*}_{H^{k-1}}+\norm{\wtt(t)-\wtt_*} \lesssim \norm{\Wtt(t)-\Wtt(0)}_{H^{k-1}} \lesssim t+t^{2\mu}, \quad 0\leq t \leq 1.$$ To complete the proof, we observe, by construction, that $\Wtt=(\ztt,\wtt)^{\tr}$ will determine a solution of the relativistic Euler equations on the spacetime region $M=(0,1]\times\Tbb^3$ by replacing $(\zetat,w_1,w_2,w_3)$ in the formulas - with . *Acknowledgements:* This work was partially supported by the Australian Research Council grant DP170100630. [^1]: Our indexing conventions are as follows: lower case Latin letters, e.g. $i,j,k$, will index spacetime coordinate indices that run from $0$ to $3$ while upper case Latin letters, e.g. $I,J,K$, will index spatial coordinate indices that run from $1$ to $3$. [^2]: By introducing the change of coordinate $\tilde{t}=-\ln(t)$, the metric can be brought into the more recognizable form $$\gt = -d\tilde{t}\otimes d\tilde{t} + e^{2\tilde{t}}\delta_{ij}dx^I \otimes dx^J,$$ where now $\tilde{t} \in [0,\infty)$. [^3]: In these articles, stability was established in the more difficult case where the fluid is coupled to the Einstein equation. However, the techniques used there also work in the simpler setting considered in this article where coupling to gravity is neglected. [^4]: While this restriction on the sound speed is often taken for granted and implicitly assumed, it is strictly speaking not necessary; see [@Geroch:2010] for an extended discussion. [^5]: Here, the norm $\norm{Df}_{H^k}$ is defined by $\norm{Df}^2_{H^k}= \sum_{J=1}^3 \norm{\del{J}f}^2_{H^k}$. [^6]: By our conventions, the time variable $t$ is assumed to be positive as opposed to [@BOOS:2019] where it is taken to be negative. This causes no difficulties since one can change between these two conventions by using the simple time transformation $t\rightarrow -t$. [^7]: In the article [@BOOS:2019], this constant is denoted by $\zeta$, but since we are already using $\zeta$ to denote the modified fluid density, we will refer to this parameter as $\mathfrak{z}$.
{ "pile_set_name": "ArXiv" }
Xbox Kinect hack brings interactive pornography uses Kinect, Microsoft’s recently released controller-free motion gaming peripheral will be hacked for uses in the interactive pornography industry “within the month” industry experts have claimed. With hacked Kinect units already being used for everything from puppet shows to Minority Report style web browsers, Kyle Machulis, dubbed a Kinect-hacking authority by New Scientist magazine and head of a website too smutty to mention, has declared Kinect pornography will be here before Christmas. Machulis, who claims to have experimented with Kinect pornography by waving a sex toy in front of the gaming camera, has encountered a few issues on his quest to interactive carnal content: "The pattern the Kinect uses to get depth data is made for picking up full bodies to control video games, isn't quite so good at picking up minutiae about those bodies." He added: "Genitalia, for the most part, are not a major geometric feature of the human body when taken in perspective of physical size....Neither are they normally used in the control of video games, be they rated [for all] or [for adults only]." Despite the stumbling blocks, Machulis has not been deterred and went on to add: "The Kinect alleviates the need for having hardware, because now as long as we have a shot of the 'action,' as it were, we can use that 'gesture' as a control. Not only that, the gesture itself is the toy. Or you could employ a toy under the gesture." What uses would you like to see hacked Kinect units implemented for? Share your thoughts and ideas via the T3 Twitter and Facebook pages.
{ "pile_set_name": "Pile-CC" }
Determination of human insulin and its analogues in human blood using liquid chromatography coupled to ion mobility mass spectrometry (LC-IM-MS). The qualitative and quantitative determination of insulin from human blood samples is an emerging topic in doping controls as well as in other related disciplines (e.g. forensics). Beside the therapeutic use, insulin represents a prohibited, performance enhancing substance in sports drug testing. In both cases accurate, sensitive, specific, and unambiguous determination of the target peptide is of the utmost importance. The challenges concerning identifying insulins in blood by liquid chromatography coupled to ion mobility mass spectrometry (LC-IM-MS) are detecting the basal concentrations of approximately 0.2 ng/mL and covering the hyperinsulinaemic clamps at > 3 ng/mL simultaneously using up to 200 μL of plasma or serum. This is achieved by immunoaffinity purification of the insulins with magnetic beads and subsequent separation by micro-scale liquid chromatography coupled to ion mobility / high resolution mass spectrometry. The method includes human insulin as well as the synthetic or animal analogues insulin aspart, glulisine, glargine, detemir, lispro, bovine, and porcine insulin. The method validation shows reliable results considering specificity, limit of detection (0.2 ng/mL except for detemir: 0.8 ng/mL), limit of quantification (0.5 ng/mL for human insulin), precision (CV < 20%), linearity (r > 0.99), recovery, accuracy (>90%), robustness (plasma/serum), and ion suppression. For quantification of human insulin a labelled internal standard ([[(2) H10 ]-Leu(B6,B11,B15,B17) ] - human Insulin) is introduced. By means of the additional ion mobility separation of the different analogues, the chromatographic run time is shortened to 8 min without losing specificity. As proof-of-concept, the procedure was successfully applied to different blood specimens from diabetic patients receiving recombinant synthetic analogues.
{ "pile_set_name": "PubMed Abstracts" }
Q: Japanese Star Trek Fonts I've been looking into Japanese Star Trek media, and I was hoping to find 3 fonts they used. This first one is likely based off of the Galaxy Font (also known as Star Trek Film BT). There are 2 other fonts I need, but apparently I'm only allowed a single link. A: There is a Japanese site http://www.usskyushu.com/trekfont.html which has a home-brewed katakana Star Trek font. It is very limited (only contains katakana), but it does work. In that font your picture looks like this (The font doesn't contain numbers nor kanji or hiragana, so I had to write all of it with the available glyphs in katakana.) The site said that even though there are many Latin Star Trek fonts out there, there aren't any for Japanese (except for the one apparently used in the movies). That's why he tried to reproduce it himself. (Maybe this means that there is not a more complete font out there...)
{ "pile_set_name": "StackExchange" }
Various wearable devices have recently been introduced and especially variable wearable devices such as smartwatches and smart glasses which may be used together with existing smartphones have been launched. Accordingly, users are using wearable devices for various purposes. So far, a user controls lighting by directly manipulating a switch or a remote controller or by using a smartphone even when a smart device is used. When an existing smartphone is used, a color spectrum is displayed on a large display screen and a user directly touches a desired color. Accordingly, various attributes such as hue and saturation may not be controlled at a time, and hue, brightness, and saturation have to be individually manipulated.
{ "pile_set_name": "USPTO Backgrounds" }
Are you paying more than you need to for these services? Starting a business can be expensive. Besides your marketing, advertising, rental, and inventory costs, there are so many things you need to present a professional storefront. If you have a limited resource, do you have to give up on things like collaboration tools, telephone lines, conference calls, scheduling tools, personalized business forms and other items that seem to eat up you initial funds? Not entirely. There are a number of free technology and printing tools available through the internet that you can use to get started. As your business grows, you may choose to move to larger more expensive systems but why pay out that money before you need it? So here is Renee’s list of some websites and tools you might find useful. Just click on the links to learn more about each.
{ "pile_set_name": "Pile-CC" }
Q: Is Here-api compatible with Flutter? Is there any plugin for Flutter Framework? If it does not exist, has the Here Team plans developing an official plugin? A: Here doesn't provide any separate support for Flutter Frameworks nor have any plugins yet. But you should be able to use our Android/iOS SDKs in your framework. https://developer.here.com/develop/mobile-sdks
{ "pile_set_name": "StackExchange" }
From bench to bed: putative animal models of REM sleep behavior disorder (RBD). REM behavior disorder (RBD) is a parasomnia characterized by REM sleep without atonia, leading to abnormal and potentially injurious behavior during REM sleep. It is considered one of the most specific predictors of neurodegenerative disorders, such as Parkinson's disease. In this paper, we provide an overview of animal models contributing to our current understanding of REM-associated atonia, and, as a consequence, the pathophysiology of RBD. The generator of REM-associated atonia is located in glutamatergic neurons of the pontine sublaterodorsal nucleus (SLD), as shown in cats, rats and mice. These findings are supported by clinical cases of patients with lesions of the homologous structure in humans. Glutamatergic SLD neurons, presumably in conjunction with others, project to (a) the ventromedial medulla, where they either directly target inhibitory interneurons to alpha motor neurons or are relayed, and (b) the spinal cord directly. At the spinal level, alpha motor neurons are inhibited by GABAergic and glycinergic interneurons. Our current understanding is that lesions of the glutamatergic SLD are the key factor for REM sleep behavior disorder. However, open questions remain, e.g. other features of RBD (such as the typically aggressive dream content) or the frequent progression from idiopathic RBD to neurodegenerative disorders, to name only a few. In order to elucidate these questions, a constant interaction between basic and clinical researchers is required, which might, ultimately, create an early therapeutic window for neurodegenerative disorders.
{ "pile_set_name": "PubMed Abstracts" }
Car Insurance Quote Liberty Mutual 2014 Industry, state and motor vehicles (dmv) insurance rate comparison by state You become more transparent about their services, as you get a quote from an insurer or by phone Have been treated so well – the second-generation car really only took about 30 percent Insurance for parents life insurance for 18 year outdated (super-car)? Here’s what full coverage car insurance actually covers — and doesn’t. Plus, average rates for full coverage car insurance by state. Like Old Mutual’s insurance businesses, Nedbank is expanding in Africa. In 2014, it took a 20% stake in Ecobank, which operates in 39 countries across the region. To value Old Mutual’s stake in the ba. En Español: Las tarifas de seguro automotor por estado For the fourth consecutive year, Michigan “wins” for the most expensive state for car insurance. Insure.com’s annual state-by-state comparison of average annual premiums found Michigan’s average premium to be $1,076 higher than the national average annual premium. Compare car insurance quotes and find all the information you need to save on your car insurance policy. About This Insurance Agent. Began career with Liberty Mutual Insurance in 2014; Graduated from Middle Tennessee State University with a degree in Mass Communication – Electronic Media Communication, Psychology, & Speech/Theatre Find the best auto insurance in Florida: Compare car insurance companies to get the cheapest insurance quotes and coverage. Here’s what full coverage car insurance actually covers — and doesn’t. Plus, average rates for full coverage car insurance by state. In fact, U.S. -based insurers such as Liberty Mutual, Allstate (ALL) and State Farm offer programs for drivers to receive a car insurance discount for submitting such information. Apps can provide det. The latest South African Customer Satisfaction Index (SAcsi) for life insurance, conducted by Consulta. having climbed from 81.4 in 2015 and 74.0 in 2014. Old Mutual scored 80.3 (up 2.3 points), wh. After graduating from the VCU Brandcenter in 2014 and stints in the New York City ad. including Nationwide, Liberty Mutual and Travelers. “Insurance companies aren’t the fastest-moving people on ea. You get quotes, pay for your first year’s premiums at closing and roll your payments into escrow. You can do this, too, with insurance on your fixer-upper. But you may have to do some more shopping ar. Liberty offers a complete line of premium insurance products for everyone from vehicle, home, travel and health insurance and a range of insurances for businesses. The CFA estimates that one-quarter to one-third of motorists drive without coverage, even though all states but one, New Hampshire, require insurance. The consumer group’s study is based on quotes fro. about to insure my first new car and am shopping around. I’m about to turn 24, so will get hit with high’ish premiums, but for my situation (plugging details in Industry, state and motor vehicles (dmv) insurance rate comparison by state You become more transparent about their services, as you get a quote from an insurer or by phone Have been treated so well – the second-generation car really only took about 30 percent Insurance for parents life insurance for 18 year outdated (super-car)? Liberty TravelCare provides superior travel insurance for individuals and families with flexible benefits such as payment for medical treatment and losses. Find the best auto insurance in Florida: Compare car insurance companies to get the cheapest insurance quotes and coverage. If you don’t work for a company that has a plan like this then set up your own individual retirement account (IRA) with one of the larger mutual fund. routine maintenance, insurance, and registrati. Car Insurance Quote Budget Get cheap car insurance in Oklahoma City OK, Compare best auto insurance rates in Oklahoma City and save more than 449$ a year. "Make sure you’re shopping apples to apples and getting quotes based on the same coverage that you have," says Lori Conarton, a spokeswoman for the Insurance Institute of Michigan. Your property and c. Getting multiple car insurance quotes can save money. But does getting an auto insurance quote hurt your credit score? We have the answer. About This Insurance Agent. Began career with Liberty Mutual Insurance in 2014; Graduated from Middle Tennessee State University with a degree in Mass Communication – Electronic Media Communication, Psychology, & Speech/Theatre about to insure my first new car and am shopping around. I’m about to turn 24, so will get hit with high’ish premiums, but for my situation (plugging details in When taking out Toyota Car Insurance cover remember to always read your policy thoroughly to ensure you understand all the fine print. Liberty offers a complete line of premium insurance products for everyone from vehicle, home, travel and health insurance and a range of insurances for businesses. Shift’s FORCE has been in client production since 2014, on four continents. With two decades of insurance industry experience leading fraud investigation and claims operations for Liberty Mutual, a. Most people know Greg Gutfeld as the funny guy from Red Eye and The Five. However, he’s also a brilliant writer who manages to make profound points in a funny way. Enjoy his quotes! 20) "The media is.
{ "pile_set_name": "Pile-CC" }
Church Farm Fishery The left (east) bank downstream from the first hedge below Bromham Bridge to the willows at the end of the field. Just over 2,000 metres of a non-navigable part of the river that from the Bromham Bridge runs south south-easterly. The water is fairly fast moving at the top end and medium paced thereafter. There does not appear to be any fishing from the opposite bank. Main species are barbel (to mid teens), chub (to 7+ lbs), dace, perch, pike (to upper teens) and roach. There are some bream and tench and the occasional carp (to 18 lbs). No fishing within 30 metres of the overhead power line towards the bottom end of the water.
{ "pile_set_name": "Pile-CC" }
Survival benefit of Boron neutron capture therapy for recurrent malignant gliomas. We have applied boron neutron capture therapy (BNCT) to malignant brain tumors. Here we evaluated the survival benefit of BNCT for recurrent malignant glioma (MG). Since 2002, we have treated 22 cases of recurrent MG with BNCT. Survival time was analyzed with special reference to recursive partitioning analysis (RPA) classification, by Carson et al. (J Clin Oncol 25:2601-2606, 2007). Median survival times (MSTs) after BNCT for all patients and for glioblastoma as on-study histology at recurrence was 10.8 months (n = 22; 95% CI, 7.3-12.8 months) and 9.6 months (n = 19; 95% CI, 6.9-11.4 months), respectively. In our study, MST for the high-risk RPA classes was 9.1 months (n = 11; 95% CI, 4.4-11.0 months). By contrast, the original journal data showed that the MST of the same RPA classes was 4.4 months (n = 129; 95% CI, 3.6-5.4 months). BNCT showed a survival benefit for recurrent MG, especially in the high-risk group.
{ "pile_set_name": "PubMed Abstracts" }
Unauthorized removal or actual theft of merchandise from a display counter or the like has been an aggravating and long-time problem particularly for retail stores and merchants who display small but valuable items of merchandise in such a manner that the buying public is allowed to handle or try out the merchandise. Such merchandise is generally small and easily movable and may consist of small radios, electrical appliances and tools of all kinds, various forms of electronic equipment and more valuable items such as jewelry. Such goods may be easily removed by unscrupulous persons, especially when the premises are crowded and the sales personnel are too busy to watch every item. This problem of proper protection is particularly magnified for dealers in antique firearms and other weapons which are generally displayed on open tables usually in congested and crowded environments such as would be encountered in antique shows and flea markets. A potential buyer of an antique firearm, for example, would want to handle and examine closely the firearm prior to any purchase. While desiring to afford such purchasers every opportunity to examine goods, the dealer at the same time finds it difficult to adequately safeguard and watch all of his merchandise, particularly under the crowded conditions described above. Various forms of electrical alarm devices have been proposed wherein a long electric wire is looped through a portion of the merchandise and made a part of an alarm system so that if the wire is cut or broken in order to remove the goods an alarm is sounded. Such loop segments can be made at virtually any required lengths so as to permit handling of the goods for normal customer inspection without danger of inadvertently actuating any alarm system. Such systems are generally in the form of a continuity circuit so that severing of the cable would actuate the alarm. The principal difficulty with such systems is that they can be defeated by a "jumper" wire clipped to each side of an intended cut of the conductor. In U.S. Pat. No. 3,972,039 it has been proposed to overcome the effects of a "jumper" by providing a further wire in the two wire conductor connected to the protected article. This further wire is twisted with the other two wires and produces an alarm when shorted to one of the other wires. This proposal requires that an electrical connection be made between the third wire and the other two wires in the conductor in order to transmit an alarm. However, the twisted wires would cause false triggering of the system due to the inductive effect of the twisted wires picking up static and R.F. fields. While this patent states that unauthorized use of a test meter would actuate the alarm, this is not true today since present state of the art digital test equipment does not draw any current from the system. Thus, this prior art system would not be effective in today's market. It is therefore the principal object of the present invention to provide a novel and improved electrical security system for individual articles on display. It is another object of the present invention to provide such a security system wherein each article is connected by a sensor detector cable to an alarm system which is actuated by any attempts to cut the cable or interfere physically in any way with the cable. It is a further object of the present invention to provide such a security system wherein the sensor detector cable includes both a continuity circuit and a floating circuit. It is an additional object of the present invention to provide such an electrical security system which is dependable in operation, simple and inexpensive to install and operate, and capable of indicating any attempts to remove an article without interfering with customer inspection of the article.
{ "pile_set_name": "USPTO Backgrounds" }
1. Field of the Invention The present invention relates to polyethylene terephthalate (PET), and in particular relates to a nucleating agent and an injection molding method for PET. 2. Description of the Related Art Contemporary material science has many development branch including metals, alloys, ceramics, and polymers. Polymers are most complex thereof because many properties such as viscosity, crystallinity, and melting point are influenced by types of monomers, degree of polymerization, arrangements of the repeating unit, and crosslinking between the polymers. These properties determine the applications and types of molding methods of the polymers. Conventional methods of regulating these properties include altering the monomer to initiator ratio, polymerizing temperature and pressure, and adding nucleating agents to accelerate crystallization of the polymers. Polyethylene terephthalate (PET) is inexpensive, however; it cannot be used in injection molding because of its slow crystallization rate at high temperatures. On the other hand, PET shaped articles formed at low temperature (60 to 70° C.) are susceptible to degradation. In U.S. Pat. No. 4,272,475, Chi discloses a method for controlling the cylinder temperature, the nozzle temperature, the injection temperature, and the shot time for PET injection articles, but the molecular weight of the articles is too low to be used in engineering-grade plastics. The described problems result from low crystallization rates of high-molecular-weight PET articles at high temperatures. As high molding temperature is required for PET melt to crystallize, an oil bath system is necessary for PET molding. Compared with the water bath system used for polybutylene terephthalate (PBT), the oil bath system for PET is more costly and dangerous. For increasing the crystallization rate of PET, U.S. Pat. No. 4,451,606 discloses an organic nucleating agent, which is a copolymer of poly(alkylene terephthalate) and a sulfonate salt of an aromatic dicarboxylic acid. This organic nucleating agent can be miscible with PET and cause uniform nucleation. The organic nucleation agent, however, may lose its function at high temperature (about 280-300° C.) due to disproportion or degradation. To avoid the problems of the organic nucleating agents, inorganic nucleating agents to improve PET crystallization rate have been adopted. As disclosed in U.S. Pat. No. 5,886,088, suitable inorganic nucleating agents include talc, mica, wollastonite, clay, kaolin, diatomaceous earth, bentonite, montmorillonite, hydrotalcite, calcium carbonate, titanium oxide, potassium titanate, asbestos, or barium oxide. The inorganic nucleating agents are less costly, chemically stable, applicable at high temperatures, and of small size to minimize grain radius. The inorganic nucleating agents may improve dimension stability and mechanical strength, but they tend to aggregate at high temperatures due to their large surface area and fewer coordination sites. The described aggregation results in non-uniform nucleation of polymer, thereby deteriorating the properties of PET.
{ "pile_set_name": "USPTO Backgrounds" }
Q: How do I get revenue reports from a YouTube CMS account using an API (for an MCN)? I have access to a YouTube CMS account (for an MCN). On YouTube I can do lots and lots of things with it and this also includes downloading CSV reports which contain detailed information about earnings. However I want to do some automatic processing of that data and thus access the data using an API instead of a manual CSV download. It looks like the YouTube Analytics Content Owner Reports should contain these data as well, thus I tried to get some data from this API (for now only using the API Explorer) but the only thing I was able to get was a "Forbidden" response. The API Explorer tells me that for a CMS account I need to specify contentOwner==OWNER_NAME but there is nowhere an explanation what that OWNER_NAME would be. I tried to just insert the displayed name of my CMS account, replacing spaces with underscores, but no success. How do I find out what my owner name is? Additionally, when I authenticate using OAuth I receive as usual the list of accounts where I can choose which one to use (e.g. all the YouTube channels I am a manager of), but the CMS account is not listed. However if I go to YouTube I can click on the top right corner and then switch to the CMS. No idea if that is important... Then again, maybe I am totally on the wrong track, because I want to get the reports for all channels connected to my MCN but that does not mean that I own the content. So maybe I am no content owner? In this case: Which is the correct way to request the reports from the API? A: First of all, the CMS account is not a separate account you can log in via Oath. It is more like a privilege and it is connected to one of your google/youtube accounts. This is in contrast to youtube's regular channel-management, where each channel has it's own login credentials. I attached a screenshot of my youtube account-selector-view, where the CMS belongs to the account name@email.com, which is also the account you have to use for oauth authorization to access your CMS reports. Furthermore you can see the name of the CMS, in this case it "CMSName". So, generally this is the name you would use for contentOwner==CMSName. However, your CMS Name seems to include whitespaces. Unfortunately, i cannot reconstruct this case because of missing admin-rights, but i would suggest you the _ for whitespaces too, because " " and "%20" do not map the regular expression for valid params. But you said, that you had no success by trying it. But there are too error scenarios: 403 Forbidden: The name of the CMS could either be wrong or the selected OAth account does not have the required privileges. Do you have all required Scopes and selected the correct account? 400 Bad Request: This happens when the request is invalid per se. So if you choose contentOwner==CMSName as ids param, a filter parameter is always required, e.g. channel==[ChannelIdForWhichIHaveCMSRights]. So, a API request, that should generally work, would look like this: https://www.googleapis.com/youtube/analytics/v1/reports?ids=contentOwner%3D%3D[CONTENTOWNER_ID]&start-date=2015-01-01&end-date=2015-01-15&metrics=views&filters=channel%3D%3D[CHANNEL_ID_WITH_CMS_RIGHTS]&access_token=[OATH_TOKEN_FOR_RIGHT_ACCOUNT] If both cases won't work for you and you're still getting 403 errors, let us do some debugging and try to fetch the content Owner Id. I will now introduce the YouTube Content ID API https://developers.google.com/youtube/partner/. A few words in advance: You have to activate the API in your developer console, like any other API you want to use for your app. BUT: Note: The YouTube Content ID API is intended for use by YouTube content partners and is not accessible to all developers or to all YouTube users. If you do not see the YouTube Content ID API as one of the services listed in the Google Developers Console, see www.youtube.com/partner to learn more about the YouTube Partner Program. You don't see it in the list auf available APIs, unless your account is connected to a CMS and some time has past... It takes 7-14 days unless the Content ID API is available for your account. This is a information i got from the support, but they told me, that it is an automated step. So, now lets assume, that you already have access to the Content ID API. You can fetch a list of contentOwnerShips that belong to an account. You can use the API explorer https://developers.google.com/youtube/partner/docs/v1/contentOwners/list#try-it just use as param fetchMine=true and authorize with the https://www.googleapis.com/auth/youtubepartner-content-owner-readonly scope. The response looks like this: { "kind": "youtubePartner#contentOwnerList", "items": [ { "kind": "youtubePartner#contentOwner", "id": "[CMS_ID]", "displayName": "[DisplayName]", "primaryNotificationEmails": [ "mail@random.xx" ], "conflictNotificationEmail": "mail@random.xx", "disputeNotificationEmails": [ "mail@random.xx" ], "fingerprintReportNotificationEmails": [ "mail@random.xx" ] } ] } This is where you get your CMS_ID from, you can also use it for any API Request as onBehalfOfContentOwner. To get a list of all channels that belong to the ownership, simply make this request "https://www.googleapis.com/youtube/v3/channels?part=contentDetails&managedByMe=true&onBehalfOfContentOwner=[CONTENTOWNER]&access_token=[ACCESS_TOKEN]" But this request requires the granted "https://www.googleapis.com/auth/youtubepartner" scope. Hoe this could help you, feel free to ask further questions.
{ "pile_set_name": "StackExchange" }
Annotation: type: object required: - id - created - updated - user - uri - text - tags - group - permissions - target - document - links - hidden - flagged properties: id: type: string created: type: string format: date-time updated: type: string format: date-time user: type: string pattern: "acct:^[A-Za-z0-9._]{3,30}@.*$" description: user account ID in the format `"acct:<username>@<authority>"` example: "acct:felicity_nunsun@hypothes.is" uri: type: string format: uri text: type: string description: The text content of the annotation body tags: type: array items: type: string group: type: string description: The unique identifier for the annotation's group permissions: type: object target: type: object properties: source: type: string format: uri description: The target URI for the annotation selector: type: array description: An array of selectors that refine this annotation's target items: type: object description: > A selector for refining the annotation target. See [the Web Annotation Data Model W3C Recommendation](https://www.w3.org/TR/annotation-model/#selectors) for details about different selector types and properties. properties: "type": type: string links: type: object description: An object containing hypermedia links for this annotation hidden: type: boolean description: Whether this annotation is hidden from public view flagged: type: boolean description: Whether this annotation has one or more flags for moderation references: type: array description: Annotation IDs for any annotations this annotation references (e.g. is a reply to) items: type: string user_info: type: object properties: display_name: type: string description: The annotation creator's display name example: "Felicity Nunsun"
{ "pile_set_name": "Github" }
1. Field The present disclosure relates to a fusing device employing an induction heating method and an image forming apparatus including the fusing device. 2. Description of the Related Art A fusing device of an image forming apparatus, for example, an induction heating fusing device that provides different coils for different widths of paper is known. However, there is a disadvantage that currents flowing through the coils are different for different widths of papers, which causes a disadvantage of a non-uniform temperature distribution. This non-uniform temperature distribution affects the image quality.
{ "pile_set_name": "USPTO Backgrounds" }
A case that has been fought out in the courts for 10 years has finally reached its conclusion. Last week, NGS Global executive recruiter, David Nosal, reported to the federal prison at Atwater to begin serving a 366-day sentence. March 21, 2018 – David Nosal, the onetime star Korn Ferry recruiter who was convicted of violating a federal anti-hacking law, has exhausted his decade-long efforts to stay out of prison and reported to the federal penitentiary in Atwater, CA on March 14. Mr. Nosal, who left Korn Ferry to found NGS Global, was charged back in 2008 with violating the Computer Fraud and Abuse Act and the Economic Espionage Act. He was accused of working with employees at his former firm to steal source lists, and in 2013 was convicted by a jury and sentenced to one year and a day in prison. He was also sentenced to three years of supervised release and community service along with fines of $60,000. Mr. Nosal, who had been a top biller for Korn Ferry for years, never actually accessed the stolen files himself. A former colleague of Mr. Nosal’s, at his urging, is said to have passed along her computer password to two fellow employees who planned to go into business with Mr. Nosal. They, in turn, downloaded the documents, in 2004 and 2005. Ezayo is now posting 250 new HR jobs daily! Discover outstanding opportunities at Nike, Facebook, Apple, Coca-Cola, Estee Lauder, Adidas, Nestle, Amazon and hundreds of other leading brands around the world. We now have more than 6,000 open HR positions live. Just click ‘apply now’ to find your dream job. Search today and come back daily to see what’s new. Conviction Stands “At the end of the day, stealing is stealing, whether you use a crowbar or a computer,” said assistant U.S. Attorney Kyle Waldinger at the time. At Mr. Nosal’s sentencing, the defense argued that he should receive probation. “A very powerful, rich corporation did not suffer any meaningful loss,” said attorney Dennis Riordan. Mr. Nosal himself, while saying he was “so very sorry this happened” at his sentencing, has exhibited little repentance to this day. Since his conviction, Mr. Nosal has been free pending appeal and operating a search firm that competes against his former employer, Korn Ferry, among many recruiting outfits. A number of charges against Mr. Nosal were thrown out, including an order that called for Mr. Nosal to pay Korn Ferry restitution. Still, the U.S. Court of Appeals for the Ninth Circuit upheld charges of violating trade secret and computer fraud and abuse laws. The recruiter’s legal team then turned to the U.S. Supreme Court, but in October the court let his conviction stand without comment. A Deterrent At Mr. Nosal’s sentencing, prosecutor Matthew Parrella told U.S. District Judge Edward M. Chen that the sentence he gave Mr. Nosal would serve to send a message to others seeking to steal trade secrets and “will go through Silicon Valley like a bell.” Spencer Stuart Brings Lawsuit Against Recruiter and Korn FerrySpencer Stuart filed a lawsuit against its former global automotive practice leader, Francois Truc, and the rival search firm he joined last month. According to the suit, Mr. Truc and Korn Ferry “are attempting to dismantle Spencer Stuart’s global automotive practice and move that business lock, stock and barrel to Korn Ferry.” In January, Mr. Nosal’s attorney, Steven F. Gruel, asked the U.S. District Court in San Francisco to reduce or set aside his sentence, but that too was rejected. Mr. Gruel’s argument, considered by many to be a “Hail Mary” attempt, pointed out that Mr. Nosal’s case was supposed to have been a deterrent to such crimes. But, said Mr. Gruel, Korn Ferry had recently hired someone accused of the same crime as Mr. Nosal and sought no criminal charges in that case. Mr. Nosal also argued that by going to prison, he would essentially be denied his right to further appeal, because he would have served his sentence before any such appeals could be settled. “Even if the Court assumes in Mr. Nosal’s favor, that ‘the appeal is not for the purpose of delay,’ he has failed to raise ‘a substantial question of law or fact,’” wrote Judge Chen in his denial last Tuesday. The federal Atwater facility, 115 miles from San Jose, includes a high-security prison that houses nearly 1,200 inmates. The adjacent minimum security station camp, where Mr. Nosal is being held, has about 110 inmates. Now incarcerated, his Atwater penitentiary registration number is 12039-111. RECOMMENDED ARTICLES 13 Leave a Reply 6Comment threads 7Thread replies 0Followers Most reacted comment Hottest comment thread 8Comment authors Recent comment authors Subscribe newestoldestmost voted Notify of Guest Carin Jacobs In the Executive Search business this is something that is not uncommon. It has happened to me as well and at least 4 Search Firm owners I know. My losses were in the 7 figures and it is in litigation as well. The man who took all of my clients and candidates opened a brand new niche division which is essentially my entire business and had a huge press release as well. I did not press criminal charges, yet my statute of limitations allows me time to decide if I want to move forward with criminal prosecution. It is not… Read more » You Must Be Logged In To Vote0You Must Be Logged In To Vote Reply 4 months ago Guest ANONYMOUS For anyone who has worked for the convicted felon, he deserves 20 years in the pen. He orchestrated the entire database dump of search assignments from K/F. Not one of those three individuals did it on their own — it was all at the behest of the felon, and one was his ex-fiancee while the felon was still married. The felon has never taken ownership of the lives he destroyed except for his award-winning performance during the sentencing stage. He refuses to accept responsibilty for what was done. His verbal abusiveness towards employees, lying to clients and prospective clients, and… Read more » You Must Be Logged In To Vote0You Must Be Logged In To Vote Reply 9 months ago Guest Tim Hicks Wow. Lot’s of Nosal-haters on this site. I’m not a huge fan of him either but I’ve read his website – thetruthbehindthenosalcase – where he makes a number of points that sound legitimate to me. And he uncovers some of the hypocrisy shown by firms and their dealing with bad actors in the industry. In short, firm’s have overlooked a lot more egregious sins than David committed. You Must Be Logged In To Vote0You Must Be Logged In To Vote Reply 9 months ago Guest Anonymous Tim, you might want to actually read the facts of the case instead of just what you hear on Nosal’s site. He leaves out a LOT of the facts that were shown at trial – most of those facts are proven by electronic data trails. If Nosal really wanted to lay out all the facts, he’d post those trial transcripts (which are publicly available to anyone) and supporting documents along with the 9th circuit’s full opinion. Then let people decide. Until then, you have to treat whatever he says with suspicion. He makes it sound like it was just a… Read more » You Must Be Logged In To Vote0You Must Be Logged In To Vote Reply 9 months ago Guest Tim Hicks You’re making the assumption that I’ve not done more reading on the case – which isn’t true. In no way am I suggesting David is innocent but I am intrigued by the rest of the story. You Must Be Logged In To Vote0You Must Be Logged In To Vote Reply 9 months ago Guest Anonymous With all of the people in the industry that hate Nosal, I am surprised you would volunteer your name as a defender of the indefensible (David Nosal). You Must Be Logged In To Vote0You Must Be Logged In To Vote Reply 9 months ago Guest Anonymous Tim, you sure you’re not a Nosal fan? Kind of sounds like it. You Must Be Logged In To Vote0You Must Be Logged In To Vote Reply 9 months ago Guest Tim Hicks Since there is no way to prove or not prove my views on David I’ll just let you have your opinion. David and I were both on Win Priem’s leadership council back in the day so I’ve seen both the good and the bad of him. His actions and reaction to the legal action don’t surprise me. You Must Be Logged In To Vote0You Must Be Logged In To Vote Reply 9 months ago Guest Anonymous it happens all the time in our industry and so happy to see that action was taken after all we invested in the company and staff in our own businesses to see them steal away what we have built, it was time for action
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The invention relates to an electronic card. Particularly, the invention relates to an electronic card capable of enhancing the life span thereof. 2. Description of Related Art In recent years, electronic cards (for example, credit cards and access cards) have been widely used and become indispensable electronic products in people's daily life. Moreover, with development of semiconductor technology, circuit complexity within a single chip is enhanced, and the single chip may implement more and more functions. In order to ensure the electronic card to provide diversified functions, the number of circuits within the electronic card is increased. Due to modulization of the circuits, the circuits in the electronic card are probably distributed to a plurality of substrates, i.e. joints of the substrates in the electronic card are relatively more. Now, if the electronic card is bended, wires between the circuits are probably damaged to shorten a life span of the electronic card. Therefore, it is an important issue to integrate the circuits in the electronic card to reduce the number of the used substrates.
{ "pile_set_name": "USPTO Backgrounds" }
Observations on voluntary nystagmus. Unitl recent times, reports concerning voluntary nystagmus have been dismissive, most observers regarding the phenomenon as a form of ocular acrobatics or an amusing party trick. The introduction of sophisticated recording apparatus coupled with renewed interest in ocular kinetics has resulted in a more analytical approach. Clinical and electro-oculographic study of the condition in 5 subjects was undertaken in an attempt to relate voluntary nystagmus to the known mechanisms of oscular movement control. The frequency of the movement varied from 15 to 23Hz and amplitude from 2 to 5 degrees. The wave form was similar to that seen in acquired pendular nystagmus. It was concluded that, depsite differences in frequency, the similarity in form of the movements of voluntary nystagmus and acquired pendular nystagmus suggested a possible identity in the mechanisms of the movements.
{ "pile_set_name": "PubMed Abstracts" }
Bioactive ent-kaurane diterpenoids from Isodon rubescens. Seven previously undescribed 7,20-epoxy-ent-kaurane diterpenoids, isojiangrubesins A-G, along with seventeen known ones, were isolated from the aerial parts of Isodon rubescens. Their structures were characterized on the basis of spectroscopic methods and signal-crystal X-ray diffraction. All of these compounds were evaluated for their in vitro cytotoxicity against five human tumor cell lines (HL-60, SMMC-7721, A-549, MCF-7, and SW480). Four isolates exhibited significant inhibitory ability against all cell lines, with IC50 values ranging from 0.5 to 6.5 μM; They also strongly inhibited NO production in LPS-stimulated RAW264.7 cells.
{ "pile_set_name": "PubMed Abstracts" }
Q: Can I have custom servlet URL in java? I want that when user hits following URL: http://host:8080/AppName/ServletName/Param1/Param2 It should go to a servlet named ServletName and Param1 and Param2 become request parameters. I have seen these kind of urls in ruby projects. Is it possible in Java? A: If you are using Spring MVC you can map a @Controller and access the params as @PathVariable in a @RequestMapping. @Controller public class MyController { @RequestMapping("/{param1}/{param2}) public Response get(@PathVariable("param1") String param1, @PathVariable("param2") String param2) { //method body } } A: Yes, you can do something like that with a servlet. You need to set the servlet mapping in web.xml like this: <servlet-mapping> <servlet-name>ServletName</servlet-name> <url-pattern>/ServletName/*</url-pattern> </servlet-mapping> to get all requests and in the servlet you need to parse the result of HttpServletRequest.getPathInfo().
{ "pile_set_name": "StackExchange" }
230 Ga. 523 (1973) 198 S.E.2d 176 WHATLEY v. THE STATE. 27775. Supreme Court of Georgia. Submitted March 12, 1973. Decided April 25, 1973. Patton & Flinn, C. Ronald Patton, for appellant. F. Larry Salmon, District Attorney, Arthur K. Bolton, Attorney General, Courtney Wilder Stanton, Thomas W. Greene, Assistant Attorneys General, Harold N. Hill, Jr., *525 Deputy Assistant Attorney General, for appellee. UNDERCOFLER, Justice. J. C. Whatley was tried and convicted of the offense of murder and sentenced to life imprisonment. During the trial the district attorney moved to introduce the transcript of testimony given by George Morris at the preliminary hearing on the ground that the witness was inaccessible. The defendant objected to the introduction of the transcript and his objection was overruled. He appeals to this court. Held: Code § 38-314 provides: "The testimony of a witness, since deceased, or disqualified, or inaccessible for any cause, given under oath on a former trial, upon substantially the same issue and between substantially the same parties, may be proven by anyone who heard it, and who professes to remember the substance of the entire testimony as to the particular matter about which he testifies." This court declared in Robinson v. State, 128 Ga. 254, 256 (57 SE 315): "Whether he is so inaccessible depends upon the diligence shown by the party seeking to use his testimony on a former trial in ascertaining where the witness is and in attempting to bring him into court. Whether such diligence has been shown as to authorize the admission of his testimony on a former trial is a question addressed to the discretion of the trial judge; and the same rule will be applied to the decision of the question of diligence in a particular case as is applied to decisions of other matters involving the exercise of discretion. The judgment will not be reversed unless a manifest abuse of discretion appears." In the instant case the district attorney moved to introduce the transcript of the testimony of the witness because he was inaccessible. He stated that the witness *524 had been served with a subpoena; that he had previously responded to subpoenas; that he had not responded to this one; that an attachment had been issued that day for him; that the sheriff had been asked to find the witness; and that the witness was working somewhere in Calhoun, Georgia. The sheriff testified that the witness had not been found but that he was working somewhere in Gordon County, Georgia. The trial court allowed the introduction of the transcript in evidence and ordered that the attachment be served as soon as possible. In Taylor v. State, 126 Ga. 557 (2) (55 SE 474), this court held that a witness is not shown to be inaccessible within the meaning of the code "when it merely appears that the witness is absent from the county" and when he was last heard from he was within the limits of the State. We are of the opinion that the serving of a subpoena in this case and the issuance of an attachment on the day of the trial is not sufficient to meet the requirements of diligence necessary to show that the witness was inaccessible. Robinson v. State, 128 Ga. 254, 257 (57 SE 315); Gaither v. State, 227 Ga. 668 (182 SE2d 434). The record does not show due diligence on the part of the State when the witness did not appear at the trial of this case. Judgment reversed. All the Justices concur, except Nichols and Jordan, J J., Who dissent. JORDAN, Justice, dissenting. The State made a showing that the witness (1) had been subpoenaed and served prior to the date of the trial, (2) that the witness had previously answered to a subpoena in the same case, (3) that his presence was fully anticipated, (4) that he had not been excused, and (5) "we have done everything we can do to get him here." This showing, together with the trial court's knowledge that the witness was subjected to cross examination by defendant's counsel at the preliminary hearing, authorized the trial court to allow the State to proceed under the provisions of Code § 38-314 relating to deceased or inaccessible witnesses. The fact that a witness is within the State does not preclude a finding of inaccessibility under the Code section. Robinson v. State, 128 Ga. 254, supra, cited in the majority opinion. Robinson clearly holds that the judgment of the trial court in allowing either party to proceed under this Code section will not be reversed unless a manifest abuse of discretion appears. In my opinion no such showing has been made by the appellant. I would affirm. I am authorized to state that Justice Nichols concurs in this dissent.
{ "pile_set_name": "FreeLaw" }
Stride Gum Introduces 'Gumulon' - A Groundbreaking iOS Game Controlled By Chewing! Exciting Mobile Gaming Experience Offers Unique Way to Play a Video Game - Where Chewing Unlocks an Intergalactic Adventure EAST HANOVER, N.J., June 20, 2013 /PRNewswire/ --Welcome to chew controlled gaming. Stride gum today announced the release of its iOS game, 'Gumulon', a groundbreaking game controlled by chewing. Using the front-facing camera (available on select mobile devices), players use their mouths to completely control the intergalactic action – when you chew, the main character, Ace, jumps. This advanced chew-tracking software was developed specifically for 'Gumulon'. Available as a free download in the App Store now (standard download rates apply), 'Gumulon' is set in the dark, cavernous depths of an endless outer space mine. Players play as Ace, a maverick mining professional on planet 'Gumulon'.One day, during a heroic mining mission in Gumulon's deepest mine, Ace awakens a terrifying prehistoric cave beast. Narrowly avoiding the monster's jaws, our hero begins a death-defying climb to freedom, as the fast-paced action of 'Gumulon' begins. "'Gumulon' is an innovative slice of entertainment. We always seek to engage our fans and provide unique experiences," said Lauren Sella, Stride Senior Brand Manager. "The most exciting thing for us is that chewing Stride gum now provides a truly original way to use gum chewing to control and play a mobile video game." In addition to compelling game play, game unlocks can be activated by scanning the barcode on packs of Stride gum while in the app. The barcodes on each of the nine Stride flavors unlocks a different bonus to give Ace an extra boost. 'Gumulon' will also feature unique social media components. As Ace falls into the jaws of the monster, the front facing camera captures a still of the player's face, creating an image featuring the player's top score and chewing face that can then be shared across their social media channels. About Stride Stride gum, launched in 2006, seeks to celebrate people who fearlessly live their lives and "do their thing." Stride gum, a Mondelez International brand, offers a variety of products and flavors including Shaun WhiteMintacular and Whitemint, Spark Kinetic Mint, Spark Kinetic Fruit, Winterblue, Sweet Peppermint, Spearmint, and Fearless Fruit. For more information visit: www.StrideGum.com or www.facebook.com/Stride-gum. About Mondelez InternationalMondelez International, Inc. (NASDAQ: MDLZ) is a global snacking powerhouse, with 2012 revenue of $35 billion.Creating delicious moments of joy in 165 countries, Mondelez International is a world leader in chocolate, biscuits, gum, candy, coffee and powdered beverages, with billion-dollar brands such as Cadbury, Cadbury Dairy Milk and Milka chocolate, Jacobs coffee, LU, Nabisco and Oreo biscuits, Tang powdered beverages and Trident gum. Mondelez International is a proud member of the Standard and Poor's 500, NASDAQ 100 and Dow Jones Sustainability Index. Visit www.mondelezinternational.com and www.facebook.com/mondelezinternational.
{ "pile_set_name": "Pile-CC" }
Debuggers can currently start or stop the forward execution of a program at runtime. They can set points in the future execution of the code where a software developer wants the program execution to halt (breakpoints) based upon location in the source code or conditions of the program state (e.g., stop if a local variable contains a particular value). Execution can then be restarted from that point. Debuggers can also have a program execute and analyze execution for each line of source code or execute a portion of the source code without analyzing until a later point in the source code is reached. Frequently, software developers notice the symptoms of a problem with the program they are debugging long after the problem in the code has executed. At this point, the existing debuggers can only show the current state of the program or continue the execution of the program forward if the error permits. These and other drawbacks exist with current systems.
{ "pile_set_name": "USPTO Backgrounds" }
Archeological insights into hominin cognitive evolution. How did the human mind evolve? How and when did we come to think in the ways we do? The last thirty years have seen an explosion in research related to the brain and cognition. This research has encompassed a range of biological and social sciences, from epigenetics and cognitive neuroscience to social and developmental psychology. Following naturally on this efflorescence has been a heightened interest in the evolution of the brain and cognition. Evolutionary scholars, including paleoanthropologists, have deployed the standard array of evolutionary methods. Ethological and experimental evidence has added significantly to our understanding of nonhuman brains and cognition, especially those of nonhuman primates. Studies of fossil brains through endocasts and sophisticated imaging techniques have revealed evolutionary changes in gross neural anatomy. Psychologists have also gotten into the game through application of reverse engineering to experimentally based descriptions of cognitive functions. For hominin evolution, there is another rich source of evidence of cognition, the archeological record. Using the methods of Paleolithic archeology and the theories and models of cognitive science, evolutionary cognitive archeology documents developments in the hominin mind that would otherwise be inaccessible.
{ "pile_set_name": "PubMed Abstracts" }
Beware of kick-butt grannies Military bases, especially in Florida, were beehives of activity, with the green-painted vehicles buzzing in and out and crammed with men and supplies. Schools stepped up their Civil Defense training, ordering children to practice dropping to their seats under their desk or in the hall. Black-and-white television sets carried non-stop chatter once the story broke. America was on the brink of war. Such was life during the Cuban missile crisis during autumn 1962. The now-defunct Soviet Union had supplied nuclear missiles to the island of Cuba, only 90 miles south of Florida, and I was but a baby in the arms of babes visiting my grandparents in Tampa, Fla. It is easy for my parents today to share the details, because details are hard to forget when you are that close to World War III and nuclear holocaust. We were on the front lines. Our reason for being there had little to do with preparing for combat. No, it was because of me. I couldn't stop crying. And Florida happened to be where my mother's mother lived. I was the first-born, and my mother needed new-mother advice and some sleep while someone else sat up late. So, she went to a war zone to get it. There are a couple of points to this personal anecdote. Advertisement One, regarding the recent stories we published about Medicare and the severe problem we have with local access to health care for Medicare users, where do you go for help if you need it? Two, could Cuba, of all places, be a role model? *** Castro, communism and Cuba was never a combination I learned to appreciate. I grew up during the Cold War when communism was the bitter enemy to freedom, and warlords like Castro, Cuba's dictator, were considered men of evil. Then I went to that liberal institution known as a university and learned that not all of the evil was so one-sided. Sure, communism and Castro remained the enemy to freedom, and my conservative upbringing never allowed me to forget that. But what I learned was that the United States wasn't so smart in allowing conditions to get to the point that someone like Castro could rise to power in the first place. The United States used Cuba as its playground. It dictated Cuba's politics and agenda. Because we failed to grasp the need for allowing democracy to grow in Cuba like it did in America, the seeds of change simply grew a different tree than the one we pictured with liberty. Meaning, no matter how conservative or liberal you are regarding Cuba, you can't blame the origins of the problem on Castro. It started before then, when we Americans seemed to forget about the needs of the Cuban people, not just the Cuban puppets in government. So what in a box of cigars does this have to do with Medicare here at home? One of the more interesting interviews I have conducted in my career was with former President Jimmy Carter. I've met with Carter on several occasions, and actually once ended up spending a week with him working on the same house during an international Habitat for Humanity project. I am one of those who agrees that he might have a greater legacy for his post-presidency work than that done his presidency. He is a good man, despite what you think of his politics, which never seemed to satisfy anyone, including my family. My Dad still carries a grudge that Carter gave away the Panama Canal. Carter said he had to, or terrorism and war likely was imminent. During the lengthy sit-down interview he allowed me soon after I first met him, one of the topics that came up was health care. The country he named that America should study? Cuba. Castro did many things to hurt his people, many selfish things bent more toward ensuring his power than benefiting the people. Poverty conditions exist over much of the nation because of his stubborn dedication to communism and anything anti-America. No, Carter was not suggesting Cuba become an American tourism hot spot. He simply was pointing out that the one thing Cuba did do right was place a tremendous importance on health care. Cuban people know that is the one thing they will get, not withstanding the belief that perhaps many of Cuba's trained doctors were ordered to study medicine at gunpoint. Nevertheless, everyone gets health care. We cannot say that in America. *** It was heartbreaking to read about some of the problems exposed during The Daily Times' recent series about the Medicare crisis much of the nation is facing, but especially here at home. People, including those in their senior or near-senior years, cannot find a doctor who will accept them as a patient, even if the patient has a good insurance policy in addition to Medicare. They argue older patients simply take up too much of their time with too many problems, and that limits their time and attention for other patients. Forget it if the patient only has Medicare. That bit of bureaucracy is as likely to drown a person as was Noah's flood. At least Noah had an arc. Medicare patients have very few, if any, options. What does it tell you if a columnist writing about health care spends much of the column talking about Cuba? That's a sad, sad, state of affairs being painted. That, however, is exactly the picture. This nation, namely our Congressional delegation, had better get its butt in gear or some granny is going to kick it, right down to Cuba. Medicare and free enterprise are supposed to be two of the things our 50-and-over population can see as success stories. The Cold War generation isn't taking very kindly to the realization that perhaps poor Cuba has something better than America in the way of lifestyle. Like access to a doctor. Fix it. Troy Turner is the editor of The Daily Times. He can be contacted at P.O. Box 450, Farmington, N.M., 87499; or at tturner@daily-times.com.
{ "pile_set_name": "Pile-CC" }
Goodyear Lake Goodyear Lake is a man-made lake created by the building of the Colliersville Dam. The lake is located southwest of the hamlet of Portlandville in the Town of Milford in Otsego County, New York. Fishing Fish species present in the lake are bluegill, black bullhead, largemouth bass, chain pickerel, pumpkinseed sunfish, rock bass, smallmouth bass, walleye, and yellow perch. The lake is accessed by a state-owned carry down boat launch off NY 28 in Portlandville and one off Silliman Cove Road with parking for 15 cars, as well as various areas to shore fish. There is also hotel accommodations off NY 28 on the west shore of the lake. References Category:Lakes of New York (state) Category:Lakes of Otsego County, New York
{ "pile_set_name": "Wikipedia (en)" }
Housing The Office of International Relations is responsible for allocating accommodation to exchange students and foreign students admitted to one of our international master programmes. Normally, all students are allocated student housing in the spring semester. Student life Trondheim is well known as a top location for students and academics, and the city is regularly rated as the best student town in Norway. Out of the total population of 190 000, 36 000 are university students who leave their mark on the city. Whether you want vibrant city life or a lighted ski trail – Trondheim has it all! Practical information After you have received admission to NTNU, you will be provided with detailed information regarding visas, housing and so on. However, we have also provided you with practical information that it might be useful to consider at the time of applying; such as living expenses, part-time work, visas and student welfare services.
{ "pile_set_name": "Pile-CC" }
Samuel M. McElvain Samuel Marion McElvain (December 9, 1897 – April 11, 1973 ) was an American chemist. McElvain studied first at Washington University in St. Louis and received his MS and Ph.D from the University of Illinois in 1923. In 1923 he became professor at the University of Wisconsin–Madison, from which he retired in 1961. References Category:1897 births Category:1973 deaths Category:20th-century American chemists Category:Washington University in St. Louis alumni Category:People from Du Quoin, Illinois
{ "pile_set_name": "Wikipedia (en)" }
Q: How to write a while loop with the C preprocessor? I am asking this question from an educational/hacking point of view, (I wouldn't really want to code like this). Is it possible to implement a while loop only using C preprocessor directives. I understand that macros cannot be expanded recursively, so how would this be accomplished? A: If you want to implement a while loop, you will need to use recursion in the preprocessor. The easiest way to do recursion is to use a deferred expression. A deferred expression is an expression that requires more scans to fully expand: #define EMPTY() #define DEFER(id) id EMPTY() #define OBSTRUCT(id) id DEFER(EMPTY)() #define EXPAND(...) __VA_ARGS__ #define A() 123 A() // Expands to 123 DEFER(A)() // Expands to A () because it requires one more scan to fully expand EXPAND(DEFER(A)()) // Expands to 123, because the EXPAND macro forces another scan Why is this important? Well when a macro is scanned and expanding, it creates a disabling context. This disabling context will cause a token, that refers to the currently expanding macro, to be painted blue. Thus, once its painted blue, the macro will no longer expand. This is why macros don't expand recursively. However, a disabling context only exists during one scan, so by deferring an expansion we can prevent our macros from becoming painted blue. We will just need to apply more scans to the expression. We can do that using this EVAL macro: #define EVAL(...) EVAL1(EVAL1(EVAL1(__VA_ARGS__))) #define EVAL1(...) EVAL2(EVAL2(EVAL2(__VA_ARGS__))) #define EVAL2(...) EVAL3(EVAL3(EVAL3(__VA_ARGS__))) #define EVAL3(...) EVAL4(EVAL4(EVAL4(__VA_ARGS__))) #define EVAL4(...) EVAL5(EVAL5(EVAL5(__VA_ARGS__))) #define EVAL5(...) __VA_ARGS__ Next, we define some operators for doing some logic(such as if, etc): #define CAT(a, ...) PRIMITIVE_CAT(a, __VA_ARGS__) #define PRIMITIVE_CAT(a, ...) a ## __VA_ARGS__ #define CHECK_N(x, n, ...) n #define CHECK(...) CHECK_N(__VA_ARGS__, 0,) #define NOT(x) CHECK(PRIMITIVE_CAT(NOT_, x)) #define NOT_0 ~, 1, #define COMPL(b) PRIMITIVE_CAT(COMPL_, b) #define COMPL_0 1 #define COMPL_1 0 #define BOOL(x) COMPL(NOT(x)) #define IIF(c) PRIMITIVE_CAT(IIF_, c) #define IIF_0(t, ...) __VA_ARGS__ #define IIF_1(t, ...) t #define IF(c) IIF(BOOL(c)) Now with all these macros we can write a recursive WHILE macro. We use a WHILE_INDIRECT macro to refer back to itself recursively. This prevents the macro from being painted blue, since it will expand on a different scan(and using a different disabling context). The WHILE macro takes a predicate macro, an operator macro, and a state(which is the variadic arguments). It keeps applying this operator macro to the state until the predicate macro returns false(which is 0). #define WHILE(pred, op, ...) \ IF(pred(__VA_ARGS__)) \ ( \ OBSTRUCT(WHILE_INDIRECT) () \ ( \ pred, op, op(__VA_ARGS__) \ ), \ __VA_ARGS__ \ ) #define WHILE_INDIRECT() WHILE For demonstration purposes, we are just going to create a predicate that checks when number of arguments are 1: #define NARGS_SEQ(_1,_2,_3,_4,_5,_6,_7,_8,N,...) N #define NARGS(...) NARGS_SEQ(__VA_ARGS__, 8, 7, 6, 5, 4, 3, 2, 1) #define IS_1(x) CHECK(PRIMITIVE_CAT(IS_1_, x)) #define IS_1_1 ~, 1, #define PRED(x, ...) COMPL(IS_1(NARGS(__VA_ARGS__))) Next we create an operator, which we will just concat two tokens. We also create a final operator(called M) that will process the final output: #define OP(x, y, ...) CAT(x, y), __VA_ARGS__ #define M(...) CAT(__VA_ARGS__) Then using the WHILE macro: M(EVAL(WHILE(PRED, OP, x, y, z))) //Expands to xyz Of course, any kind of predicate or operator can be passed to it. A: You use recursive include files. Unfortunately, you can't iterate the loop more than the maximum depth that the preprocessor allows. It turns out that C++ templates are Turing Complete and can be used in similar ways. Check out Generative Programming A: Take a look at the Boost preprocessor library, which allows you to write loops in the preprocessor, and much more.
{ "pile_set_name": "StackExchange" }
Silicon carbide (SiC) represents a promising semiconductor material, which allows for higher power devices and higher frequency applications than known silicon devices. However, different manufacturing processes are needed for creating doped layer in silicon carbide substrates and for forming electrical contacts. Prior art Junction Barrier Schottky (JBS) diodes comprise a cathode electrode, on which the following layers are arranged: an n doped cathode layer, a lower n-doped drift layer, a higher p+ doped anode layer. All doped layers are formed as doped silicon carbide layers. The anode layer is in contact to an anode electrode, which thus forms an ohmic contact to the anode layer. The anode electrode is formed as a continuous metal layer over the whole surface of the device. The drift layer extends to the surface of the silicon carbide. This layer has a Schottky contact to the anode electrode. Thus, on the anode side of the device, a Schottky metal contact is deposited on top of the SiC drift layer associated to p+ implants for the anode layer, which are in close proximity to the Schottky junctions such that its depletion region under reverse bias creates a potential barrier to shield the Schottky junction from high electrical field, thus reducing leakage current. Anode electrodes for prior art SiC Junction Barrier Schottky diodes are formed through the deposition of metal layer (typically Ti) on top of SiC n-type lightly doped drift layer and p+ implants. The metal layer is then annealed at maximum temperature below 700° C. in order to avoid degradation of the Schottky contacts or even ohmic contact formation in the Schottky regions, since ohmic contact formation occurs at more than 1000° C. in SiC. However, such low temperature range is insufficient to form ohmic contact to the p+ anode layer even though it is highly doped. Although the ohmic contact formation can be performed using extra deposition, annealing and lithography steps in order to first form the ohmic contact at high temperature followed by formation of the Schottky contact at low temperature, this would increase costs, and the conductive Schottky contact is inevitably compromised due to the lack of efficient selective cleaning of the areas dedicated as Schottky contact areas after the creation of the ohmic contacts, because such a cleaning, typically a wet cleaning also affects the ohmic contact. In U.S. Pat. No. 8,450,196 B2 a manufacturing method id described, in which on a SiC substrate, a continuous metal layer is formed over the whole surface of the substrate (creating a Schottky contact). Afterwards, a mask having openings is applied, and the metal layer is irradiated through the mask. As a result, at such places, at which the mask has openings, a high temperature can be applied to the metal layer, which converts the Schottky contact to an ohmic contact so that Schottky and ohmic contacts alternate. However, this method leads to poor accuracy and resolution due to the diameter of the heat beam defining the minimum size of the ohmic contacts and due to heat spreading in the metal layer the heat distributes to the lateral sides of the beam so that the interface between the ohmic contact and the Schottky contact becomes fuzzy. JP 2011 165 660 A describes a method for creating a Schottky barrier diode. On p anode regions, a 30 nm Titanium and 100 nm Nickel layer is deposited. Between the p anode regions, a thick metal layer made of Molybdenum is deposited, which also covers the Ti/Ni metal layers, thus forming a common planar surface on the anode side. Now, all metal layers are simultaneously treated at a high temperature. Due to the usage of different metals, an ohmic joining layer is formed from the Ti/Ni layer and a Schottky barrier layer is formed from the Molybdenum layer. EP 1 885 000 A2 describes a JBS Schottky diode, which has p+ and p doped regions. Due to the different doping concentrations of the p doped regions, an ohmic contact is formed on the heavily doped p+ regions, whereas in between these regions Schottky contacts are formed on the lowly doped p regions.
{ "pile_set_name": "USPTO Backgrounds" }
Q: ServiceTracker vs BundleTracker The OSGi enterprise specification defines two ways of tracking: by service or by bundle. What are the differences between these two ways? In which cases, one way should be used over another? Thanks A: Depends on what you are willing to track. The BundleTracker tracks bundles, see: http://www.osgi.org/javadoc/r4v42/org/osgi/util/tracker/BundleTracker.html http://www.osgi.org/javadoc/r4v42/org/osgi/util/tracker/BundleTrackerCustomizer.html And the ServiceTracker tracks service instances, see: http://www.osgi.org/javadoc/r4v42/org/osgi/util/tracker/ServiceTracker.html http://www.osgi.org/javadoc/r4v42/org/osgi/util/tracker/ServiceTrackerCustomizer.html So obviously if you are interested in what happens with bundles, you use the BundleTracker. And if you are interested in service instances, you use the ServiceTracker.
{ "pile_set_name": "StackExchange" }
Scots mountain groups working on government submission for re-opening hills The groups are looking at a responsible re-opening of Scotland's mountains. Photo: Bob Smith/grough Mountaineering Scotland said it is leading discussions about how people may be able to return to the hills in a phased way. It has produced, with other outdoor organisations, proposals for a responsible re-opening of the nation’s mountains. At present, advice for outdoor enthusiasts north of the border is to continue exercising locally. Unlike England, where people can now travel to locations to exercise, regulations in Scotland prevent this. Earlier this week, rules were relaxed slightly to allow unlimited outings for exercise per day. In the meantime, the organisation, which represents hillwalkers, climbers, mountaineers and ski-tourers north of the border, said outdoor enthusiasts should ‘hold the line’ and avoid travel for their exercise. A spokesperson for Mountaineering Scotland said: “Walkers and climbers are keen to get back out to the hills and crags, and Mountaineering Scotland is leading discussions with partners in the Mountain Safety Group on how to deliver a phased return to the hills and mountains. “This group of key mountain safety organisations, including Scottish Mountain Rescue, Police Scotland, Mountain Training Scotland, Glenmore Lodge and the Association of Mountaineering Instructors, has developed proposals this week which are being submitted to the Scottish Government outlining how mountaineering activities such as hillwalking, climbing and bouldering can be re-introduced.” Damon Powell, chair of Scottish Mountain Rescue said: “It is good to be working as part of the Mountain Safety Group, to ensure we can get people back out into the outdoors undertaking their preferred activities as soon as there is a safe and responsible way to do so within the Scottish Government guidelines. “We hope to see everyone out there soon, but preferably not on a rescue.” George McEwan chief officer of Mountain Training Scotland added: “Prior to lockdown, our leaders, instructors, coaches and guides supported active public participation, both voluntarily and professionally, in walking, climbing and mountaineering, which does so much to support improved health and wellbeing. “As we look forward to reactivation, we are supporting the work of Mountaineering Scotland and the rest of the Mountain Safety Group, to facilitate a phased return to the outdoors which is both safe and socially responsible.” Mountaineering Scotland said it has also taken on board feedback from its members and discussions with organisations across the Scottish outdoor sector, including sportscotland, outdoor sport governing bodies and the national parks, to allow people to enjoy Scotland’s outdoors in a way that considers the safety of individuals as well as rural communities. Work is continuing to produce a position statement and more detailed supporting guidance, it said. “These are unprecedented times” said Stuart Younie, chief executive of Mountaineering Scotland, “and I’d like to thank members for keeping to the current guidelines. We know it’s been a challenge but it’s great to see the mountaineering community pulling together in this way. “We want to see an immediate return to hillwalking, climbing and other outdoor activities as lockdown starts to ease, and have been encouraged by the way the outdoor sector in Scotland is working together to make this happen in a safe and responsible way.” Steuart Of course individuals and interested groups will be welcome to make comment. These organisations are all recognise for their individual knowledge and expertise in the outdoors. James 17 May 2020 Steuart, yes that's what I'm doing, 'making comment'. Individuals are able to listen to government advice/guidance and act sensibly, without the need for the above organisations to think and plan for them. Greg 17 May 2020 These goverment grant funded bodies have no jurisdiction on who can and who cannot access land in Scotland. These bodies have of course taken the Queens shilling and now feel obliged to make out they are in charge. Scots have the right to roam and are only currently restrainded by the scottish goverment. we do not need a corporate box ticking excercise by so called representative groups (who do not represent everybody and were definately not elected to represent everybody) trying to out do each other for top spot Margaret 17 May 2020 Interesting points Greg. Neil 17 May 2020 These organisations including the MCofS do represent the interests of all mountain users in interactions with the government. That is a simple fact, but not liked by many. To get a quicker opening up of the hills, I am glad they are working on this. Someone above is right that ‘we have the right to go there’, as a result of them working in the Land Reform Act all those years ago & likewise just now, easing the current ‘restrictions’! Steuart 17 May 2020 I don't think any of these organisations have ever claimed to be 'guardians' of the outdoors. They are just trying to find a sensible way of agreeing a compromise to get people back into the outdoors in a safe manner as soon as possible. Would James happen to have any suggestions of his own? James 18 May 2020 Steuart - my suggestion, much as I wrote above, is that individuals are able to follow government advice, guidance and regulations, mainly on travel, then act on that, without a third party involvement. "I don't think any of these organisations have ever claimed to be 'guardians' of the outdoors." It was those organisations that claimed to have 'closed the hills'. without the need for the above organisations to think and plan for them. Steuart 18 May 2020 Not sure I remember any of them closing the hills either. They seem to be mainly concerned with safety in the mountain environment not necessarily the roads leading to them? You should contact them directly to see what their plans are. My experience of Mountaineering Scotland is they are very open. james 18 May 2020 I'm sure Mountaineering Scotland are very open and if I needed advice regarding hillwalking and mountaineering I might contact them. But as I said earlier, (nothing to do with safety on the roads) 'individuals are able to follow government advice, guidance and regulations, mainly on staying local and not to travel, then act on that without third party involvement.' If those organisations feel they need to comment, then all that's required is, 'please follow government regulations and advice.' Thanks for the chat Steuart, got to go. Margaret 18 May 2020 "Mountaineering Scotland with other organisations proposals for a responsible re-opening of the nation’s mountains." If the mountains haven't been closed why is it necessary to have them opened? Storm 19 May 2020 I am not a member of any of these organisations, but I'm sure there heart is in the right place. Anonymous 19 May 2020 The point of these groups working together is to establish how Mountain rescue, if needed, can feasibly rescue a casualty whilst maintaining social distance regulations. I am sure no one here wishes to put members of the MRT and their families at risk just because they feel it's their right to roam across the hills. Everyone including MRT personal will be desperate to get back on the hills. However it is impossible to carry a stretcher down steep hills and tracks whilst everyone keeps 2 metres apart. Therefore carefully consideration and planning has to be done to ensure the safety of MRT from possible infection from a casualty during a rescue. Enjoy the hills when it's safe for everyone !! The Hillwalker 19 May 2020 I think the point that is being missed here is, if someone unfortunately needs the service of the Mountain Rescue Teams how is that possible given the social distance requirements. Therefore plans have to be thought through in order to ensure the safety of MRT and subsequently their families. This is why a multi-stakeholder review needs to take place. Having the right to roam does not surely mean the right to risk the health of others simply because you want to go hillwalking. Everyone and i'm sure MRT personal are desperate to get back on the hill however not at the needless risk of their health. Not everyone can self-rescue ! Please be understanding of the bigger picture and stay off the hills until is safe for you and those who may need to come and rescue you. Hillwaker 19 May 2020 I think the point that is being missed here is, if someone unfortunately needs the service of the Mountain Rescue Teams how is that possible given the social distance requirements. Therefore plans have to be thought through in order to ensure the safety of MRT and subsequently their families. This is why a multi-stakeholder review needs to take place. Having the right to roam does not surely mean the right to risk the health of others simply because you want to go hillwalking. Everyone and i'm sure MRT personal are desperate to get back on the hill however not at the needless risk of their health. Not everyone can self-rescue ! Please be understanding of the bigger picture and stay off the hills until is safe for you and those who may need to come and rescue you. Margaret 20 May 2020 I think the 'point being missed' is, as James said, "If those organisations feel they need to comment, then all that's required is, 'please follow government regulations and advice." When that government advice/regulations allows travel then 'the hills will be open.' Keith 22 May 2020 ScotGov now say that golfing and angling are ok, but hillwalking is not, and won't be for weeks yet, despite being as socially-distanced as you get. Good job, Mountaineering Scotland, really well done ... Margaret 23 May 2020 The new regulations say that 'hiking' will be allowed, but you can't travel more than 5 miles from your home. "Outdoor activities in the local area - such as golf, hiking, canoeing, outdoor swimming, angling." Scottish Government Marion Boyle 23 May 2020 Latest statement from Scottish Golf - "the travel advice is for an individual to apply good judgement" rather than sticking to the 5 miles - apparently a lot of golfers think they should be able to travel farther than 5 miles as many golf clubs are in rural locations. Same applies to hills - not many Munros within city limits - but from what I've heard, hillwalkers seem prepared to wait for a while yet although the conditions over the last couple of months mean that they're missing the hills desperately. Steuart 25 May 2020 James the story is that the Scottish mountain safety group have presented the Scottish government with proposals to help get people back into the hills safely. It is for the Scottish government to decide if these proposals are helpful in achieving this. The smsg state here that their advice is to follow SG guidelines. Where you get these organisations claiming to be guardians of the outdoors or having closed the mountains (how do you close a mountain anyway?) I do not know? Like it or not the views of these organisations is often sought when decisions of many kinds regarding the outdoors are being made. You are welcome to look at their websites if you choose. Margaret 26 May 2020 Steuart - "(how do you close mountains anyway)" Agreed, but why then do they need opening . . . ? "It (Mountaineering Scotland) has produced, with other outdoor organisations, proposals for a responsible re-opening of the nation’s mountains." " . . . outlining how mountaineering activities such as hillwalking, climbing and bouldering can be re-introduced.” “As we look forward to reactivation." Steuart 28 May 2020 Margaret, I think if you read the piece you'll find it was the producers of this article and none of the bodies mention that use the expression re-opening. Happy to help! Margaret 28 May 2020 Steuart, once again correct, but a bit of a semantic point, as the essence of what the bodies mentioned are saying is 're-opening'. It's a word the editor Bob Smith appears to be happy to use, based on what those bodies have said. Steuart 03 June 2020 Strange Margaret, Mountaineering Scotland speak of easing lockdown restrictions not closing or reopening. Hardly semantics. If you lived very locally, it's quite possible that a person may not be breaking any lockdown restrictions by walking in the hills and the mountain would not be 'closed' to you. Margaret 03 June 2020 As the kids say - whatever! Noticed you're getting a bit of stick in another grough story today. John Collins 03 June 2020 Me thinks Steuart is only on here to try to stir things up and let everyone know how annoying he is. I guess he's succeeding at the latter. Steuart 04 June 2020 John if you think I have said anything that is not factual please tell us all. That I have perhaps says more about otherswho are challenged by this. Add your opinion... Some comments are automatically held for review before publication CommentNameE-mail address Sorry, to post comments on this site you need to have support for JavaScript enabled in your browser.
{ "pile_set_name": "Pile-CC" }
Q: Cannot login to Joomla back or front end nor view getting started article after fresh install I've installed Joomla 3.4.4 (twice) with exactly the same outcome. Problems: - when entering ANY information into the username and password field on the back end login page, the page refreshed back to the login page without any errors or warnings on the page or in the server logs. - the same for trying to login on the front end. - When visiting the site, below the site title and header image a message is displayed "Error: You are not authorised to view this resource." Both after and before installing joomla I uploaded a .user.ini to turn off magic quotes. The configuration.php has correct settings for life site, session time out and a correct location for logs and temp files. I've verified that the logs and tmp directory are writeable from Joomla (added code to create and write to a file in both directories). I've checked all the modules and plugins in the database. I've set session_save_path to a location that is writeable. I've ruled out redirections from .htaccess. I've enabled all messages to be displayed. A valid cookie is sent to the browser and back to the site. The jos1 database contains the cookies sent to the browser The jos1 database has correct settings for both user and group There was an warning about an unserializable object I've checked out. It's in Registry.php line 100: public function __clone() { $this->data = unserialize(serialize($this->data)); } When print_ring $this->data the following is shown: ��j Object ( [article_layout] => _:default [show_title] => 1 [link_titles] => 1 [show_intro] => 1 [show_category] => 1 [link_category] => 1 [show_parent_category] => 0 [link_parent_category] => 0 [show_author] => 1 [link_author] => 0 [show_create_date] => 0 [show_modify_date] => 0 [show_publish_date] => 1 [show_item_navigation] => 1 [show_vote] => 0 [show_readmore] => 1 [show_readmore_title] => 1 [readmore_limit] => 100 [show_icons] => 1 [show_print_icon] => 1 [show_email_icon] => 1 [show_hits] => 1 [show_noauth] => 0 [show_publishing_options] => 1 [show_article_options] => 1 [save_history] => 1 [history_limit] => 10 [show_urls_images_frontend] => 0 [show_urls_images_backend] => 1 [targeta] => 0 [targetb] => 0 [targetc] => 0 [float_intro] => left [float_fulltext] => left [category_layout] => _:blog [show_category_title] => 0 [show_description] => 0 [show_description_image] => 0 [maxLevel] => 1 [show_empty_categories] => 0 [show_no_articles] => 1 [show_subcat_desc] => 1 [show_cat_num_articles] => 0 [show_base_description] => 1 [maxLevelcat] => -1 [show_empty_categories_cat] => 0 [show_subcat_desc_cat] => 1 [show_cat_num_articles_cat] => 1 [num_leading_articles] => 1 [num_intro_articles] => 4 [num_columns] => 2 [num_links] => 4 [multi_column_order] => 0 [show_subcategory_content] => 0 [show_pagination_limit] => 1 [filter_field] => hide [show_headings] => 1 [list_show_date] => 0 [date_format] => [list_show_hits] => 1 [list_show_author] => 1 [orderby_pri] => order [orderby_sec] => rdate [order_date] => published [show_pagination] => 2 [show_pagination_results] => 1 [show_feed_link] => 1 [feed_summary] => 0 ) and ��j Object ( ) With both can be serialized but not be unserialized by PHP. I decided to comment out the line cloning the data. After this the 'Getting Started' article didn't give the error any more, but showed the article as normal. The names of the objects raise concern with me, I've never seen such names before in PHP When I print other variables. I for instance get Joomla\Register\Register Object But this did not fix the login problem. I'm pretty completely at a loss. Edit: In the database a session is created: session_id=d984e4c528453009a9ba77ace5f58d9e, client_id=1, guest=1, time=1442060444, data=zq9ZfjiuKiKB8tyC3yEB2yREY_tylC7CD1K14M6XLIt01gwDUMTq1yY5DMVYhVUDTtPS1vmM1BFdBECdnMg0eKHlAWdZ9JwYdRNFKZl8wU_eAF61Im9d5dIy2r7Kt34upgLDzY4hmDA2EimXm-d2uKO9J6vElLCbcwFZGR2yHUq21RBQvx1wdnBMjk78z6UlI0zF9YXO6wH4WNdUlROJ85BDdhccRBrw52rzRxkpker23_nzeBK4K6nw_Eb2GN-fRAQ25PZr0XxRAtbrGAF5JvGHJDwbL9Kc34eDgOYcBwXlbCICA7be1S64K54VwYUdXZqlnqDbWUEUKb3EdvQZExY5IYRcP5McdiM2s-RYwmWpvtpIIu8VMNn1T_5c_K0gonIdngPUQeiI4r0NOncGWWt7qNjoamX8u86WVVqIVY9ufxb8Wo5INgLIUhy_TAhfBl_K5CrjNToR-13RVnBjZ1RPBeBj4hHubA2t7IZ6zbSOdPdPLbsQVYD2lsU-PjXvcN1eeqkTYNUi8U-qtfYyH-mkidMHK8hbtkS53CKGuo_D4r1K8nO16VlOI0xhK2qR2zSaykXtX_DaAkRF3AI0BvZHBrsxSc6QE2jZkRPYkdyyUnyDoyx2FTSNcPv-JrJ2uDochowEm8jyCazqIXywnmAuYb3bkMN38A7lA1IRhlrCGJY_3xpx6ZBtch4u9bUtBXuQY3E5oV5nPfL2__vW7ZADW5sUHP-e8obRo30b40iIZ3yi6DmnutdGekUi_6a9GyGVDkP3NwAoglbj5pHiLJVhfFZL54XFCuN1sHtlbismkomsx-AkOY6F27hDNCI4B4qFVX87-NF_hk2DWPqRWynCR6OCsLUPkD0apgnr-ea7KPt8qij_eu8Rn6J-RMrgHS7SE314kKoJscEXxwwnBsaoqRCwzwjEl5yHmZYS-bCocgqMGAeOf-VUmCdX-UnqGz5qgXwFBOq4tFrfJ6RQizXVdxkHml3dDmGUPMSHT9To4WXAowT8glRtMdsmZmBigM88xftj3Yr-iYTxiAwfzxPF_T8hG53d1rfPEAm0n8a_q7c6JKy9Z2HrklaqxbQzwGl6r3PwRMCaDxZ_vqq4fsPP4142I4SnAuF2WzEBFOkIyh4EUKesFV4sl4BOc19uIYhz5HSHJybh_9hlV8eB6OSHZYccvaM7F6b46Lh6g-1yDUKazCK8z-fTXHJzf6gn7UFLiWorXCQZspwK_LiW3Huv2B0HIJKxi0fEb8Zmq6juViV8LABZjG_8ZEgDvQ4InahV4k7dKIyQG3gPicaDFLqgtGnwfO2FkU3L1SUU1eAGGcyZDH15RPgfimFiwHt2A5AEPKsnh2jye3X5L53CNaB69ISY0ETVhYzXc7bGi0SADbsAVbFixXZ39IqbFyDaX3rSS0047n_riZm8xNsR6DJ2kB0R1_eWBfN_APqgynK5-Yucis4PuyblY_YwIPs2AQz5iBFgnGGCkbZDxiVG6K6CRBorqpvOPUcBN0fzyOL0xp5WfC5x3nGcbAeVOBBIh1nN7Pj1vDyjfAWGAuw5vP3g647iUmDKaxcRWZ-yGIw., userid = 0, username = '' Nothing else seems to change. The jos1_users table has an lastvisit date and time set the the date and time of installing Joomla. No new sessions are created in the database when trying to login multiple times. With error reporting set to development nothing is reported when visiting and trying to login the administrator back end. When visiting the site and a few seconds later trying to login the front end this is logged: [12-Sep-2015 07:42:19 America/Chicago] PHP Notice: unserialize() [<a href='function.unserialize'>function.unserialize</a>]: Error at offset 6 of 2159 bytes in /home/.../public_html/.../libraries/vendor/joomla/registry/src/Registry.php on line 82 [12-Sep-2015 07:42:19 America/Chicago] PHP Notice: unserialize() [<a href='function.unserialize'>function.unserialize</a>]: Error at offset 6 of 19 bytes in /home/.../public_html/.../libraries/vendor/joomla/registry/src/Registry.php on line 82 [12-Sep-2015 07:42:19 America/Chicago] PHP Strict Standards: Creating default object from empty value in /home/.../public_html/.../libraries/vendor/joomla/registry/src/Registry.php on line 693 [12-Sep-2015 07:42:28 America/Chicago] PHP Notice: unserialize() [<a href='function.unserialize'>function.unserialize</a>]: Error at offset 8 of 615 bytes in /home/.../public_html/.../libraries/vendor/joomla/registry/src/Registry.php on line 82 [12-Sep-2015 07:42:28 America/Chicago] PHP Notice: unserialize() [<a href='function.unserialize'>function.unserialize</a>]: Error at offset 8 of 19 bytes in /home/.../public_html/.../libraries/vendor/joomla/registry/src/Registry.php on line 82 [12-Sep-2015 07:42:28 America/Chicago] PHP Strict Standards: Creating default object from empty value in /home/.../public_html/.../libraries/vendor/joomla/registry/src/Registry.php on line 693 [12-Sep-2015 07:42:29 America/Chicago] PHP Notice: unserialize() [<a href='function.unserialize'>function.unserialize</a>]: Error at offset 8 of 2159 bytes in /home/.../public_html/.../libraries/vendor/joomla/registry/src/Registry.php on line 82 [12-Sep-2015 07:42:29 America/Chicago] PHP Notice: unserialize() [<a href='function.unserialize'>function.unserialize</a>]: Error at offset 8 of 19 bytes in /home/.../public_html/.../libraries/vendor/joomla/registry/src/Registry.php on line 82 [12-Sep-2015 07:42:29 America/Chicago] PHP Strict Standards: Creating default object from empty value in /home/.../public_html/.../libraries/vendor/joomla/registry/src/Registry.php on line 693 I also tried installing Drupal on the server to a different subdomain. The only thing it's able to display is these error/warnings. Again about serialization. Notice: unserialize() [function.unserialize]: Error at offset 53 of 33869 bytes in /home/nningsh1/public_html2/test.iradis.org/includes/cache.inc on line 438 Warning: Invalid argument supplied for foreach() in /home/nningsh1/public_html2/test.iradis.org/includes/module.inc on line 213 Warning: array_keys() expects parameter 1 to be array, null given in /home/nningsh1/public_html2/test.iradis.org/includes/module.inc on line 89 Notice: unserialize() [function.unserialize]: Error at offset 53 of 33869 bytes in /home/nningsh1/public_html2/test.iradis.org/includes/cache.inc on line 438 Warning: Invalid argument supplied for foreach() in /home/nningsh1/public_html2/test.iradis.org/includes/module.inc on line 213 Warning: array_keys() expects parameter 1 to be array, null given in /home/nningsh1/public_html2/test.iradis.org/includes/module.inc on line 89 Fatal error: Call to undefined function user_access() in /home/nningsh1/public_html2/test.iradis.org/includes/menu.inc on line 636 A: The service provider changed PHP to not use FCGI for our domain. This fixed the problem. Both the serialization problem has been fixed, as is the login problem.
{ "pile_set_name": "StackExchange" }
Purpose Using international money transfers when shopping online If you’re planning a major online purchase, money transfers may offer the cheapest rates. It wasn’t all that long ago that online shopping seemed new, exciting and even a little bit dangerous, but in today’s increasingly connected world it’s an everyday task. While most online shoppers in the USA either turn to PayPal or rack up a bill on their credit card when paying for online purchases, there may be a more affordable option available to help you shop online. In particular, if you need to make a larger purchase you could be able to enjoy significant savings by paying for your shopping with an international money transfer. Let’s take a look at how international transfers work and how they can be used to do your bank balance a favour. The drawbacks of shopping with your credit card or PayPal Perhaps the most common method used to pay for online shopping purchases is with a credit or debit card. Problems can arise, however, when you’re buying goods from overseas. If you’re making a purchase in a foreign currency, you’ll need to accept the exchange rate your bank offers when transferring your funds into that other currency (most likely US Dollars). Unfortunately, the exchange rates offered by banks are typically much lower than wholesale exchange rates, which basically means that you need to pay more Australian Dollars to convert to the US Dollar purchase price than you actually should. The other issue is the international transaction fee charged by your card provider. Among the big banks, these are commonly set at 3% of the total cost of the transaction, so when you’re making a large purchase they can add up to a substantial amount. There are a few credit cards available that don’t charge any foreign transaction fees, so check out the features of these cards if you want to use your card for online shopping. Similar issues arise when you pay for online purchases using PayPal. When converting your Australian Dollars to another currency, PayPal uses the prevailing wholesale exchange rate and then charges a fee as a percentage above that. If you’re converting to US or Canadian Dollars, you’ll pay 3.5% above the exchange rate. Converting to all other currencies costs 4% above the exchange rate, so PayPal is not as cheap an option as many people think. How international money transfers can save you money If you’re looking for a cheaper way to pay for your online purchases, international money transfers may offer the solution. Recent years have seen the emergence of a host of specialist online transfer companies focused on offering cheap, quick and secure overseas payments. Companies such as World First and OFX regularly offer exchange rates that are often superior to those offered by your bank, which means they take a much smaller chunk out of your money than the banks. Specialist transfer companies also tend to charge lower fees than your other online purchasing options. Fee structures vary between companies, with some offering flat fees of just a few dollars per transaction, others offering tiered fees and a few calculating their fees as a percentage of your transaction amount. Some companies even waive their fees altogether on larger transfers, resulting in even more savings for you. The downside with using international money transfers for online purchases is that they’re often not ideal for small transactions. Specialist transfer companies tend to have high minimum transfer amounts ($500 is typical), and paying a fixed transaction fee may not always be the cheapest option if you’re only making a small purchase. Case Study: Sam’s Shopping Spree Sam is an Australian collector of rare and exotic musical instruments from all around the world. After months of searching for a rare Fender guitar, Sam finally found what he was looking for in an online store based in the UK. Having negotiated a price of £10,000 with the seller, Sam decides to look for the cheapest way he can pay for his purchase. He decides to compare the cost of using his credit card with the cost of sending an international money transfer to see which represents the most cost-effective option. Credit card Online money transfer Exchange rate 1 AUD = 0.51 GBP 1 AUD = 0.5385 GBP Amount Sam must pay in order to transfer £10,000 $19,607.84 $18,569.43 AUD Transfer fee 3% international transaction fee = $588.24 $0 Total cost of transfer $20,196.08 $18,569.43 As you can see in the table above, Sam can save $1,626.65 if he uses an online money transfer company to pay for his purchase rather than pay the 3% international transaction fee charged by his credit card provider. Another important consideration: buying with a money transfer won’t offer buyer protection, unlike Paypal or credit cards. You need to be certain that you can trust the seller before using this method. Which online retailers accept international money transfers? As well as the size issue, there’s also the question of acceptance. Major online retailers like ASOS and the Iconic generally don’t accept international money transfers. However, marketplaces like Alibaba and eBay tend to accept money transfers will accept them. How do I compare international money transfers? Looking for an affordable and secure way to send international money transfers? Consider these features when comparing the pros and cons of different transfer providers: Competitive exchange rates: A poor exchange rate can take a big bite out of the amount you send overseas, so compare exchange rates between providers to see who offers the highest rate. Cheap transfer fees: You’ll need to pay a transfer fee in most cases, so remember to take these charges into account when comparing exchange rates. However, keep in mind that some online transfer providers waive their fees on large transactions. Range of transfer options: In addition to one-off spot transfers, some companies offer flexible transfer options to help you get a better exchange rate, including forward contracts and limit orders. If paying off a purchase in installments, does the provider allow you to set up a regular payment plan? Remember to check whether any of these special transfer types come with any hidden fees attached. Range of currencies available: Check to see which currencies the company allows you to transfer funds in and whether it offers an easy way to send money to your favorite transfer destinations. Short processing time: Compare processing times between providers to ensure that your funds will arrive to your recipient’s bank account within a suitable time frame. Funds transfer options: Will the funds go straight into the recipient’s bank account, into their mobile wallet or into their PayPal account? 24/7 customer service: Make sure the company you choose has a good reputation for providing customer support over the phone, via email and through live online chat. Disclaimer - We endeavor to ensure that the information on this site is current and accurate but you should confirm any information with the product or service provider and read the information they can provide. If you are unsure you should get independent advice before you apply for any product or commit to any plan. finder.com is an independent comparison platform and information service that aims to provide you with the tools you need to make better decisions. While we are independent, we may receive compensation from our partners for featured placement of their products or services. We may also receive compensation if you click on certain links posted on our site. Important Information finder.com is an independent comparison platform and information service that aims to provide you with the tools you need to make better decisions. While we are independent, we may receive compensation from our partners for placement of their products or services. We may also receive compensation if you click on certain links posted on our site. While compensation arrangements may affect the order, position or placement of product information, it doesn't influence our assessment of those products. Please don't interpret the order in which products appear on our Site as any endorsement or recommendation from us. finder.com compares a wide range of products, providers and services but we don't provide information on all available products, providers or services. Please appreciate that there may be other options available to you than the products, providers or services covered by our service.
{ "pile_set_name": "Pile-CC" }
Rasovo, Montenegro Rasovo is a village in Bijelo Polje Municipality, in northern Montenegro. According to the 2003 census, the village had a population of 609 people. References Category:Populated places in Bijelo Polje Municipality
{ "pile_set_name": "Wikipedia (en)" }
Signs of the Day of Judgement Qiyamah The above listed articles discuss in details about the signs leading to the last day. Topics covered are corruption, Imam Mahdi, Dajjal Anti Christ - his tricks, appearance, deception, Yajooj and Majooj - Gog and Magog, Isa - Jesus (as) second coming and much more...
{ "pile_set_name": "Pile-CC" }
For many years voice telephone service was implemented over a circuit switched network commonly known as the public switched telephone network (PSTN) and controlled by a local telephone service provider. In such systems, the analog electrical signals representing the conversation are transmitted between the two telephone handsets on a dedicated twisted-pair-copper-wire circuit. More specifically, each telephone handset is coupled to a local switching station on a dedicated pair of copper wires known as a subscriber loop. When a telephone call is placed, the circuit is completed by dynamically coupling each subscriber loop to a dedicated pair of copper wires between the two switching stations. More recently, the copper wires, or trunk lines between switching stations have been replaced with fiber optic cables. A computing device digitizes the analog signals and formats the digitized data into frames such that multiple conversations can be transmitted simultaneously on the same fiber. At the receiving end, a computing device reforms the analog signals for transmission on copper wires. Twisted pair copper wires of the subscriber loop are still used to couple the telephone handset to the local switching station. More recently yet, voice telephone service has been implemented over the Internet. Advances in the speed of Internet data transmissions and Internet bandwidth have made it possible for telephone conversations to be communicated using the Internet's packet switched architecture and the TCP/IP protocol. Software is available for use on personal computers which enable the two-way transfer of real-time voice information via an Internet data link between two personal computers (each of which is referred to as an end point or client). Each end point computer includes appropriate hardware for driving a microphone and a speaker. Each end point operates simultaneously both as a sender of real time voice data and as a receiver of real time voice data to support a full duplex voice conversation. As a sender of real time voice data, the end point computer converts voice signals from analog format, as detected by the microphone, to digital format. The software then facilitates data compression down to a rate compatible with the end point computer's data connection to an Internet Service Provider (ISP) and facilitates encapsulation of the digitized and compressed voice data into a frame compatible with the user datagram protocol and internet protocol (UDP/IP) to enable communication to the other end point via the Internet. As a receiver of real time voice data, the end point computer and software reverse the process to recover the analog voice information for presentation to the operator via the speaker associated with the receiving computer. To promote the wide spread use of Internet telephony, the International Telephony Union (ITU) had developed a set of standards for Internet telephony. The ITU Q.931 standard relates to call signaling and set up, the ITU H.245 standard provides for negotiation of channel usage and compression capabilities between the two endpoints, and the ITU H.323 standard provides for real time voice data between the two end points to occur utilizing UDP/IP to deliver the real time voice data. Additionally, the Internet Engineering Task Force (IETF) has developed a set of standards for initiating real time media data sessions known as the Session Initiation Protocol (SIP). SIP provides for UDP/IP messages to be exchanged between the two endpoints (or between the two endpoints and multiple proxy servers) to provide for call signaling and negotiation of compression capabilities. A problem associated with standard ITU Internet telephony and with SIP Internet telephony is that network address translation (NAT) firewalls prevent the transmission of UDP/IP frames from an endpoint computer outside the firewall to an endpoint computer on a private network inside the firewall. More specifically, both the ITU Internet telephony standards and the SIP standards provide for each endpoint to designate a real time transport protocol (RTP) channel, which comprises an IP address and port number, for receipt of media datagrams and to provide that RTP channel to the other end point. Because the private network client does not have a globally unique IP address, a frame sent to such non-globally unique IP address can not be routed on the Internet and will be lost. Further, even if the private network client were able to identify and designate the IP address of the NAT firewall, the private network client has no means for establishing a port on the NAT firewall for receipt of media datagrams. Because of the wide spread use of NAT firewalls which typically provide both IP address translation and port translation of all frames sent from the private network to the Internet, what is needed is a system and method for establishing and maintaining Internet telephony conversations between two clients, both of which are located on private networks behind NAT firewalls. What is also needed is a system and method for establishing and maintaining Internet telephone conversations between a client located on a private network behind a NAT firewall and a client with an Internet routable IP address (e.g. public IP address on the Internet) that operates a receiving UDP channel that is different from its sending UDP channel.
{ "pile_set_name": "USPTO Backgrounds" }
Q: How do i prove that a measure space induced by an outer measure is complete? Royden Real-analysis 4th edition p.349 Let $X$ be a set. Let $\mu$ be an outer measure on $P(X)$. Define $\mathfrak{M}$ = $\lbrace A\subset X \mid A \text{ is } \mu- \text{ measurable} \rbrace$. Let $\mu^*$ be the restriction of $\mu$ to $\mathfrak{M}$. Then, $(X,\mathfrak{M},\mu^*)$ is a complete measure space. I know that it is a measure space, but how do i prove that it is complete? A: Subset $A$ of a measure 0 set $B$ would have outer measure 0. Given any $E$ then $\mu(A\bigcap E)=0$ because $A\bigcap E\subset B$; and $\mu(A^{c}\bigcap E)=\mu(E)$ because $B^{c}\bigcap E\subset A^{c}\bigcap E\subset E$ and $\mu(B^{c}\bigcap E)=\mu(E)$ since $B$ is measurable with measure 0. Hence $\mu(A\bigcap E)+\mu(A^{c}\bigcap E)=\mu(E)$ so $A$ is measurable. A more intuitive way to look at it is that a null set basically have no effects whatsoever, and definition of measurable sets depend only on what kind of harm the set could do.
{ "pile_set_name": "StackExchange" }
Trending Now You are here Lady Dutch tennis team edges Lady Crusaders 5-4 The St. Marys Area High School girls' tennis team defeated the Elk County Catholic Lady Crusaders 5-4 in a match played Wednesday afternoon at St. Marys Area High School."We lost a tough match to our crosstown rival," said ECC coach Pete Meier. "We had some good things happen in today's match and some things that didn't work out for us." In first singles, Amy Orr lost her match 2-6, 0-6 against ECC's Abby Meyer. "Abby Meyer played very well in her win at first singles. Abby continues to improve. She served well, and she had a good match today," Meier said. In second singles, SMA' s Mary Rosman came from behind to win in a third-set tiebreaker 4-6, 6-4, 10-7 against Loreal Housler. "It was a very good match between both girls," said St. Marys coach Sue Lepovetsky. In third singles, St. Marys Area's Marta Vega won her match 6-4, 6-3 against Laira Reuscher. In fourth singles, SMA's Aubrey Wiesner won her match 6-1, 6-3 against Maria Gismondi. "Laira Reuscher and Maria Gismondi got their first taste of playing on clay courts today. Both girls played well but fell short in straight sets," Meier said. In fifth singles, St. Marys' Chelsea Agosti won in a third-set tiebreaker 6-1, 2-6, 10-7 against Abby Wittman."Loreal Housler and Abby Wittman both lost tough three-set matches to very good opponents. Both girls played well, but just came up short in the tiebreaker," Meier said. "All the girls on both teams played hard-fought matches," Lepovetsky said. "It was nice to see good tennis being played by both teams."In first doubles, Lady Dutch players Amy Orr and Mary Rosman won their match in a tiebreaker 8-8 (7-5) against Abby Meyer and Loreal Housler. "Our doubles teams played very well with the deciding match coming at first doubles, where Abby Meyer and Loreal Housler lost a heartbreaking, hard-fought, back-and-forth match in a tiebreaker," Meier said. In second doubles, Aubrey Wiesner and Chelsea Agosti lost their match 2-8 to ECC's Laira Reuscher and Maria Gismondi. In third doubles, Marta Vega and Danielle McCoy lost their match 5-8 to Lady Crusaders Kristin Dippold and Abby Wittman. In fourth doubles, Rachel Ehrensberger and Megan McCoy lost their match 0-8 against ECC's Sophie Herzing and Brittany Auman. In exhibition, Emily Challingsworth and Becky Hanes lost their match 1-8 against Rachel Stauffer and Marla Scacchitti."We lost to a better opponent today. We had a rough day in the singles matches and we'll have to regroup, go back to practice, and work on getting better," Meier said. "I'm proud of our girls, they played a good match today, but we just ended up on the wrong side of the score."St. Marys is now 7-1 on the season and will travel to Punxsutawney today for a 3:30 p.m. match. Elk Catholic is now 7-4 on the season and will travel to Brockway next Tuesday for a 3:30 p.m. match.
{ "pile_set_name": "Pile-CC" }
All relevant data are within the paper and its Supporting Information files. Introduction {#sec001} ============ The endoplasmic reticulum (ER) is a multifunctional organelle involved in the synthesis, folding, storage and trafficking of proteins \[[@pone.0161486.ref001]\]. Protein storage and folding are aided by ER-resident molecular chaperones (mainly the glucose regulated protein 78, GRP78; also referred to as BiP) and high levels of Ca^2+^ in the ER lumen \[[@pone.0161486.ref002]\]. The ER is indeed a major site for Ca^2+^ storage and participates in fast Ca^2+^ responses underlying many signaling pathways. Disruption of ER homeostasis by physiological and pathological stimuli results in an accumulation of unfolded proteins (a condition known as ER stress) that triggers a complex cascade of events, referred to as the Endoplasmic Reticulum Stress Response (ERSR). These events are aimed at restoring homeostasis and involve an initial attenuation of global protein synthesis and a transcriptional remodeling to mobilize a cohort of stress response genes. The hallmark of ERSR activation is the increase in GRP78 expression, the main sensor of unfolded proteins and a key regulator of the ERSR. In resting conditions, GRP78 levels are low and GRP78 binds to and represses ERSR-activating proteins such as activating transcription factor 6 (ATF6), inositol requiring protein (IRE) 1α, PKR-like endoplasmic reticulum kinase (PERK), and the ER-associated caspase 4/12 (human/mouse, respectively). In the presence of unfolded proteins, conformational changes in GRP78 and active cycling of its ATPase domain, trigger the release of the aforementioned binding partners \[[@pone.0161486.ref003]--[@pone.0161486.ref005]\]. When stressing conditions are long-lasting or abnormally intense, activation of ERSR will lead to apoptosis. Apoptosis is achieved *via* three different mechanisms, including transcriptional activation of C/EBP homologous protein (CHOP), activation of c-Jun NH2-terminal kinase (JNK), and activation of ER-associated caspase 4/12. These mechanisms culminate in activation of terminal effector caspases and subsequent cell death \[[@pone.0161486.ref006]--[@pone.0161486.ref009]\]. Tumor cells display an elevated basal level of ERSR, which allows them to meet the ER demands of rapid cell division under a hostile environment (e.g. hypoxia and low pH) \[[@pone.0161486.ref010]\]. In fact, the protective effect of mildly elevated levels of ERSR has been correlated to chemotherapeutic tolerance \[[@pone.0161486.ref011]--[@pone.0161486.ref013]\]. Attempts to block elevated basal levels of ERSR in cancer cells, mainly by inhibiting IRE1α, and subsequent splicing of its target XBP1, have been reported as potential anticancer therapeutics \[[@pone.0161486.ref014], [@pone.0161486.ref015]\]. However, further stimulation of ERSR beyond a critical point is accompanied by enhanced cell death, suggesting that potent ERSR-inducing agents may possess antineoplastic potential \[[@pone.0161486.ref013], [@pone.0161486.ref016]--[@pone.0161486.ref018]\]. Small molecules that induce ERSR, including agents affecting ER Ca^2+^ homeostasis (e.g. thapsigargin and nonsteroidal anti-inflammatory drugs), protein folding or maturation (e.g. tunicamycin and brefeldin A), and misfolded protein removal (e.g. bortezomib), reportedly cause cytotoxicity \[[@pone.0161486.ref019]\]; however, these molecules are poor candidates for oncology applications due to suboptimal potency and selectivity, and/or poor bioavailability at the site of tumor formation. Our previous work has not only confirmed the ERSR as a relevant target to induce gliotoxicity but has also identified significant differences in the deployment of ERSR activation that render malignant glioma cells more susceptible to ERSR augmentation compared to normal astrocytes \[[@pone.0161486.ref020]\]. To further explore this therapeutic advantage, we sought to identify small molecules that activate ERSR and induce gliotoxicity. We implemented a cell-based quantitative high-throughput screen (qHTS) using a luciferase reporter that monitors GRP78 levels in human malignant glioma (U87-MG) cells. For triaging of the resulting screening hits, we devised a panel of secondary assays that validate reporter activation and inform on cytotoxicity potential and mechanism of action ([Fig 1](#pone.0161486.g001){ref-type="fig"}). We screened more than 425,000 unique compounds and identified several novel activators of ERSR that induce apoptosis-mediated cell death in multiple glioma cell lines, including U87-MG and patient derived lines, grown both in two-dimensional (2D) monolayers as well as physiologically relevant three-dimensional (3D) spheroid cultures. Furthermore, we synthesized a library of analogs around a hit compound containing an 2,9-diazaspiro\[5.5\]undecane core (compound **8**) and established a structure-activity relationship profile. We find that hit compounds also show dose-response cytotoxic effects in other non-glioma cancer cell lines indicating that these molecules have potentially broad anti-neoplastic activity. Finally, by pairwise combination screening, we show that compound **8** and its analogs synergize with hit compound **6** to reduce the viability of patient-derived glioma cell lines. ![Schematic workflow for compound screening and triage.\ qHTS indicates assays performed in 1,536- and 384-well format. AC~50~ obtained in qHTS assays are summarized in [Fig 2](#pone.0161486.g002){ref-type="fig"}. Results of remaining low-throughput assays are summarized in [Fig 3](#pone.0161486.g003){ref-type="fig"}.](pone.0161486.g001){#pone.0161486.g001} Results {#sec002} ======= Development, miniaturization, and qHTS of a grp78-luciferase assay {#sec003} ------------------------------------------------------------------ We have previously shown that ERSR activation as signaled by changes in the levels of GRP78 is a valuable predictor of cytotoxicity in glioma cells \[[@pone.0161486.ref020]\]. Therefore, we developed a cell-based assay that utilizes GRP78 as a biosensor to identify small molecule inducers of ERSR with associated cytotoxic properties. To this end, we engineered a stable U87-MG cell line to express a firefly luciferase reporter under the control of the GRP78 promoter (assay referred to herein as grp78-luciferase). The known ERSR activator thapsigargin elicited a concentration dependent increase on reporter activity with an EC~50~ of 11.4 nM ([S1A Fig](#pone.0161486.s001){ref-type="supplementary-material"}). Importantly, this increase in luciferase reporter expression is comparable to the increase in GRP78 native protein in U87-MG cells under the same treatment \[[@pone.0161486.ref021]\]. Since this assay could be affected by false negatives due to apoptosis-mediated cell death triggered by hit compounds, compound incubation time was optimized to 16 h, at which point luciferase induction achieves a maximal response of \~6-fold compared to vehicle-treated control. The ERSR activator tunicamycin also elicits an optimal reporter induction at 16 h ([S1B Fig](#pone.0161486.s001){ref-type="supplementary-material"}). qHTS provides concentration response curves (CRCs) of a chemical library directly from the primary screen and consequently has advantages over traditional screening paradigms in which each library member is tested at a single concentration \[[@pone.0161486.ref022], [@pone.0161486.ref023]\]. Therefore, we miniaturized the grp78-luciferase assay in 1,536-well format where a similar induction of \~6-fold and EC~50~ of 9.4 nM was observed with thapsigargin ([S1C Fig](#pone.0161486.s001){ref-type="supplementary-material"} and see [S1 Supporting Information](#pone.0161486.s010){ref-type="supplementary-material"} for additional details). To identify potential activators of ERSR, the grp78-luciferase assay was used in a robotic screen against a collection of 427,208 compounds contained in the NCGC chemical library, with 236 compounds exhibiting reporter activation ([S1D Fig](#pone.0161486.s001){ref-type="supplementary-material"} and [S1 Supporting Information](#pone.0161486.s010){ref-type="supplementary-material"}). Given that GRP78 activation leads to the deployment of the ERSR and potentially to cell death, we tested the activity of hit compounds in a cytotoxicity assay. To this end, we measured the viability of U87-MG cells after a 48 h compound exposure. The assay was run in 1,536-well format using the CellTiter-Glo (Promega) reagent, which quantifies cellular ATP levels as a proxy for viability. A total of 53 compounds were active in both the screening assay re-test and the CellTiter-Glo assays ([S1E Fig](#pone.0161486.s001){ref-type="supplementary-material"}). After we applied structural filters that eliminate electrophiles and other problematic compounds, a total of 8 compounds with favorable luciferase and cytotoxicity profiles (\>100% and \>50% efficacy, respectively) were chosen for further characterization ([S2A and S2B Fig](#pone.0161486.s002){ref-type="supplementary-material"}; [Fig 2](#pone.0161486.g002){ref-type="fig"}). To this end, we devised a panel of secondary assays designed to validate ERSR induction and cytotoxic activity ([Fig 1](#pone.0161486.g001){ref-type="fig"}). ![Chemical structure and AC50 (μM) of hit compounds in qHTS assays.\ For Ca2+ mobilization, values obtained in + EGTA conditions are displayed. Active compounds are considered those with a high quality CRC and efficacy. Efficacy cutoffs are as follow: grp78-luciferase and UPRE-luciferase, \>40%; Caspase 3/7 and Ca2+ mobilization, \>30%; all cell viability assays, \>50%.](pone.0161486.g002){#pone.0161486.g002} Effect of compounds on the activation of the three ERSR branches {#sec004} ---------------------------------------------------------------- We first sought to confirm the effect of the 8 hit compounds on ERSR deployment. To determine whether hit compounds increase endogenous GRP78 levels, U87-MG cells were incubated with indicated compounds at concentrations of 5, 10, or 20 μM (concentration points shown to elicit significant response based on grp78-reporter CRCs) and subjected to western blotting using an anti-GRP78 antibody. As shown in [Fig 3A](#pone.0161486.g003){ref-type="fig"}, 5 out 8 compounds (compounds **1**, **2**, **3**, **5** and **8**) upregulate endogenous GRP78 to levels ≥30% higher than the induction achieved by treatment with 20 μM of the positive control thapsigargin. In fact, treatment of U87-MG cells with 10 and 20 μM concentrations of compounds **5** and **8** upregulated GRP78 protein to comparable levels as those achieved with thapsigargin ([Fig 3A](#pone.0161486.g003){ref-type="fig"} and [S3 Fig](#pone.0161486.s003){ref-type="supplementary-material"}). ![Secondary assays identify *bona fide* ERSR inducers with cytotoxicity activity.\ **(A)** U87-MG cells treated with the indicated compounds were analyzed by immunoblot for GRP78 expression. GAPDH levels were used as housekeeping controls. Data are represented as GRP78/GAPDH ratio for each compound and normalized to the GRP78/GAPDH ratio for 20 μM thapsigargin. See [S3 Fig](#pone.0161486.s003){ref-type="supplementary-material"} for blot images. **(B)** U87-MG cells were treated with DMSO, 1 μM thapsigargin or 20 μM of indicated compound for 16 h. XBP-1 mRNA splicing was monitored by RT-PCR using XBP-1-specific primers, which amplify a spliced or unspliced fragment of 304 or 326 bp, respectively. **(C)** U87-MG cells were treated with DMSO, 1 μM thapsigargin or 20 μM of indicated compound for 24 h. CHOP and housekeeping GAPDH mRNA levels were monitored by qRT-PCR. Data is plotted relative to the DMSO treated sample set to 1. Error bars indicate the SD of three replicates. **(D)** U87-MG cells treated with the indicated compounds were tested for their ability to form colonies. Data are presented as the number of colonies, normalized to vehicle DMSO. Error bars indicate SE with n = 3. See [S5 Fig](#pone.0161486.s005){ref-type="supplementary-material"} for representative images.](pone.0161486.g003){#pone.0161486.g003} In addition, we utilized a complementary cell-based assay that reports on transcriptional activation of ERSR signaling. Specifically, we engineered a human lymphoblastoid TSCER2 cell line to express a firefly luciferase reporter under the control of 5 copies of the unfolded protein response element (UPRE). The UPRE was originally identified as an ATF6 DNA binding element through *in vitro* binding site selection and was later shown to bind to spliced XBP-1. Importantly, it was reported to be strongly induced during the ER stress response \[[@pone.0161486.ref024]--[@pone.0161486.ref026]\]. The assay (referred to as UPRE-luciferase) was performed in 1,536-well format with each compound tested in dose response ([S1 Supporting Information](#pone.0161486.s010){ref-type="supplementary-material"}). We found that the same compounds that increased endogenous GRP78 protein levels also upregulated the UPR reporter ([Fig 2](#pone.0161486.g002){ref-type="fig"}; [S2C Fig](#pone.0161486.s002){ref-type="supplementary-material"}). Together, these results indicate that compounds **1**, **2**, **3**, **5** and **8** are able to inducethe ERSR response.We also investigated the effect of these compounds on two other components of the ERSR pathway. First, using an XBP1 mRNA splicing assay, which informs on activation of the IRE1α branch, we found that U87-MG cells treated with 20 μM of compounds **1**, **3**, **5, 6** and **8** for 16 h, have detectable levels of the XBP1 spliced transcript ([Fig 3B](#pone.0161486.g003){ref-type="fig"}). Second, we measured ATF4-mediated CHOP transcriptional induction to determine activation of the PERK branch \[[@pone.0161486.ref005]\]. We found that U87-MG cells treated with 20 μM of either compound **1** or **5** for 24 h display a 7--10 fold increase in CHOP transcript levels as measured by qRT-PCR ([Fig 2C](#pone.0161486.g002){ref-type="fig"}). Notably, compound **8** was the best-performing compound at increasing CHOP transcript levels (\>60-fold compared to DMSO control). Effect of compounds on cytosolic Ca^2+^ levels {#sec005} ---------------------------------------------- ER stress can be triggered by various stimuli, including disturbances in Ca^2+^ homeostasis. To identify activators that trigger ERSR by depleting intracellular Ca^2+^ stores, we employed a Ca^2+^ mobilization assay, using the fluorescent reporter Fluo-8 \[[@pone.0161486.ref027]\]. In this assay, the ionophore A23187 and thapsigargin, which functions by blocking the sarco/endoplasmic reticulum ATPase (SERCA), lead to an increase of cytosolic Ca^2+^. On the other hand, tunicamycin, an inhibitor of the UDP-N-acetylglucosamine-dolichol-phosphate N-acetylglucosamine-1-phosphate transferase (GPT) that causes accumulation of unfolded glycoproteins in the ER, does not affect cytosolic Ca^2+^ concentrations ([S4A Fig](#pone.0161486.s004){ref-type="supplementary-material"}). The assay was run in a 1,536-well format and compounds that exhibited a high quality CRC and \>30% increase in Fluo-8 fluorescence were considered active. Of the 8 hits, compounds **6** and **8** strongly mobilized intracellular Ca^2+^ levels and compound **2** did as well but to a lesser extent ([S2D Fig](#pone.0161486.s002){ref-type="supplementary-material"}). The elevated levels of cytosolic Ca^2+^ after compound treatment could in principle originate from the extracellular environment or intracellular stores like the ER or mitochondria. To distinguish between these two possibilities, we added 10 mM EGTA to the media to fully chelate extracellular Ca^2+^ before compound treatment ([S4B Fig](#pone.0161486.s004){ref-type="supplementary-material"}). Even in the presence of EGTA, compounds **2**, **6** and **8** were able to increase cytosolic Ca^2+^, indicating that they function to deplete intracellular Ca^2+^ stores ([Fig 2](#pone.0161486.g002){ref-type="fig"} and [S2E Fig](#pone.0161486.s002){ref-type="supplementary-material"}). Effect of compounds on cell death {#sec006} --------------------------------- We sought to further investigate the cytotoxic effect of hit compounds. To verify apoptosis as the mechanism underlying the observed cytotoxicity, we tested compounds for their ability to activate key effector caspases using the Caspase-3/7 Glo detection system (Promega) ([S1 Supporting Information](#pone.0161486.s010){ref-type="supplementary-material"}). Compounds were tested as a dilution series and those that exhibited a high quality CRC and \>30% increase in caspase 3/7 activation were considered active. Of the 8 hits, all the compounds showed significant caspase 3/7 activation except compound **1** ([Fig 2](#pone.0161486.g002){ref-type="fig"}; [S2F Fig](#pone.0161486.s002){ref-type="supplementary-material"}). To assess the potential therapeutic use of the newly-discovered activators, we next tested their cytotoxic effects against two patient-derived suspension cell lines. The cell lines JHH-136 and JHH-520 were generated from grade 4 glioblastomas at the Johns Hopkins Medical Institute \[[@pone.0161486.ref028]\]. Specifically, we performed cell viability assays using the CellTiter-Glo reagent ([S1 Supporting Information](#pone.0161486.s010){ref-type="supplementary-material"}). Of the 8 compounds, only compound **4** failed to elicit a significant decrease in cell viability ([Fig 2](#pone.0161486.g002){ref-type="fig"} and [S2G and S2H Fig](#pone.0161486.s002){ref-type="supplementary-material"}). Next, we implemented a complementary clonogenic assay to examine the effects of compounds **1**, **2**, **3**, **5**, and **8** on cell survival and proliferation. Briefly, cells were plated at low density and proliferated to form colonies in the continuous presence of indicated compounds dozed at 10 and 20 μM. Importantly, the readout involves colony staining using crystal violet and counting as opposed to measuring global ATP levels as done in the CellTiter-Glo assay. As shown in [Fig 3D](#pone.0161486.g003){ref-type="fig"} and [S5 Fig](#pone.0161486.s005){ref-type="supplementary-material"}, at the highest concentration tested of 20 μM, compounds **1**, **3**, **5**, **8** markedly inhibited the colony forming capacity of U87-MG cells relative to DMSO-treated control. While compounds **1** and **3** were less effective at 10 μM, compounds **5** and **8** reduced colony numbers by more than 50% at that concentration. Compound **2** failed to significantly reduce colony numbers at either concentration tested. Three-dimensional (3D) culture platforms are regarded in many ways as more physiologically relevant multicellular models than traditional monolayers. Cells maintained in 3D cultures have been reported to display altered sensitivities toward drugs \[[@pone.0161486.ref029], [@pone.0161486.ref030]\]. Hence, we tested the effect of the activators in a medium-throughput 3D spheroid culture assay. Briefly, cells were cultured in 384-well ultra-low attachment (ULA) plates for 3 days to allow the formation of aggregates. Of note, U87-MG cells formed a more compact spheroid compared to JHH-136 and JHH-520 cells (data not shown). Spheroids were treated with compounds for an additional 5 days and viability was measured using CellTiter-Glo (3D). Compounds **1**, **2**, **4** and **7** were inactive against all three cell lines. Compound **6** displayed activity in U87-MG and JHH-520 spheroids and compounds **3**, and **5** only in U87-MG spheroids. Compound **8** was the only one to elicit toxicity in all three cell lines ([Fig 2](#pone.0161486.g002){ref-type="fig"} and [S2I and S2K Fig](#pone.0161486.s002){ref-type="supplementary-material"}). Structure-Activity Relationship Studies of an ERSR inducer {#sec007} ---------------------------------------------------------- Our panel of secondary screens filtered out the majority of the compounds tested ([Fig 2](#pone.0161486.g002){ref-type="fig"}). Compounds **4**, **6** and **7** could embody weak ERSR activators or false positives of the grp78-luciferase assay, since they failed to induce activation of either one (compound **6**) or both (compound **4** and **7**) of the ERSR branches. Interestingly, they are able to induce apoptosis-mediated cell death, perhaps by a mechanism different from the apoptotic arm of the ERSR. When cells were treated with these three compounds, cell death was evident in monolayer cultures, and in the case of compound **6**, also in 3D cultures. On the other hand, compound **2** is likely a partial ERSR-inducing agent since it failed to induce CHOP mRNA as well as XBP-1 splicing. While it mobilizes intracellular Ca^+2^ and decreases viability of U87-MG cells in 2D CellTiter-Glo-based assays, compound **2** fails to reduce the colony forming capacity of U87-MG cells as well as the viability of spheroids of all three kinds. Based on these results, it is tempting to speculate that continuous exposure of U87-MG cells to compound **2** could induce ERSR but to levels that are still protective to cells. Alternatively, cells could develop resistance and overcome compound **2**-induced ERSR activation. Compounds **1**, **3**, and **5** activate all three branches of the ERSR and induce cell death in 2D cultures; however, they possess a limited ability to induce significant death when cells are cultured in 3D structures, making them less attractive for follow-up studies. The remaining compound **8**, on the other hand, met all the secondary screen criteria of a *bona fide* ERSR activator with intracellular mobilization Ca^+2^ potential and gliotoxic activity in all cell viability assays/formats tested ([Fig 2](#pone.0161486.g002){ref-type="fig"}). We then resynthesized compound **8** and confirmed its ability to activate GRP78 and induce apoptosis in U87-MG cells (data not shown) and focused our medicinal chemistry optimization efforts on compound **8** to investigate systematic structure activity relationships. Briefly, the 2,9-diazaspiro\[5.5\]undecane spirocyclic core ([Fig 4A](#pone.0161486.g004){ref-type="fig"}, yellow circle) is key for the ERSR activity as measured by activity in the grp78-luciferase assay. Attempts to replace the core with several acyclic, monocyclic, bicyclic and fused ring systems resulted in a significant loss of potency ([S2 Table](#pone.0161486.s012){ref-type="supplementary-material"}). Similarly, the diphenylmethyl group on the left side of the molecule is essential to induce grp78 reporter activation ([Fig 4A](#pone.0161486.g004){ref-type="fig"}, red circle). Any structural modifications to the diphenylmethyl group triggered a complete loss of potency ([S3 Table](#pone.0161486.s013){ref-type="supplementary-material"}). Several structural changes to the 3,5-dimethylisoxazole moiety on the right side of the molecule were tolerated ([Fig 4A](#pone.0161486.g004){ref-type="fig"}, blue circle; [S4 Table](#pone.0161486.s014){ref-type="supplementary-material"}). However, the amide functionality proved to be strongly preferred as sulfonamide or methylene groups decreased the potency ([S5 Table](#pone.0161486.s015){ref-type="supplementary-material"}). Replacement of the dimethylisoxazole moiety with other heterocycles improved the potency but aryl/substituted aryl groups decreased the potency. Overall this chemotype exhibited very tight SAR with even subtle changes to the core region or diphenylmethyl groups resulting in a loss of potency. In summary, we synthesized and tested over 150 novel analogs (representative analogs are shown in [S2](#pone.0161486.s012){ref-type="supplementary-material"}--[S5](#pone.0161486.s015){ref-type="supplementary-material"} Tables) around compound **8** with only a few of those showing comparable potency to the original hit. ![Structure-Activity Relationship for compound 8.\ **(A)** Structure of compound **8**. The 2,9-diazaspiro\[5.5\]undecane spirocyclic core, the diphenylmethyl group and the 3,5-dimethylisoxazole moiety are highlighted in yellow, red and blue, respectively. **(B)** U87-MG cells treated with the indicated analogs were analyzed by immunoblot for GRP78 expression. GAPDH levels were used as housekeeping controls. Data are represented as GRP78/GAPDH ratio for each compound and normalized to the GRP78/GAPDH ratio for 20 μM thapsigargin. See [S3 Fig](#pone.0161486.s003){ref-type="supplementary-material"} for blot images. **(C)** U87-MG cells were treated with DMSO, 1 μM thapsigargin or 20 μM of indicated analog for 16 h. XBP-1 mRNA splicing was monitored by RT-PCR using XBP-1-specific primers, which amplify a spliced or unspliced fragment of 304 or 326 bp, respectively. **(D)** U87-MG cells were treated with DMSO, 1 μM thapsigargin or 20 μM of indicated compound for 24 h. CHOP and housekeeping GAPDH mRNA levels were monitored by qRT-PCR. Data is plotted relative to the DMSO treated sample set to 1. Error bars indicate the SD of three replicates. **(E)** U87-MG cells treated with the indicated compounds were tested for their ability to form colonies. Data are represented as the number of colonies, normalized to vehicle DMSO. Error bars indicate SE with n = 3. Note that **8e** is an inactive control. Analogs **8a** and **8d** were tested only at 20 μM. See [S7 Fig](#pone.0161486.s007){ref-type="supplementary-material"} for representative images.](pone.0161486.g004){#pone.0161486.g004} Selected analogs are *bona fide* ERSR inducers with cytotoxic activity in multiple cancer cell lines {#sec008} ---------------------------------------------------------------------------------------------------- We chose a set of 4 active analogs (**8a**, **8b**, **8c** and **8d**) and one inactive control molecule (**8e**) ([Fig 5](#pone.0161486.g005){ref-type="fig"} and [S6A Fig](#pone.0161486.s006){ref-type="supplementary-material"}) for validation through our panel of secondary assays. We first look at the ability of these analogs to activate all three branches of the ERSR pathway. All active analogs increased endogenous GRP78 protein when tested at 20 μM. At lower doses however, only **8** and **8a** significantly increased GRP78 levels ([Fig 4B](#pone.0161486.g004){ref-type="fig"}). All active analogs induced ERSR activation as determined by the UPRE reporter assay, XBP-1 splicing and CHOP qRT-PCR assays ([S6B Fig](#pone.0161486.s006){ref-type="supplementary-material"}, [Fig 3C and 3D](#pone.0161486.g003){ref-type="fig"}, respectively) with compounds **8** and **8d** being the best performing molecules at increasing UPRE reporter levels and compounds **8** and **8a** at increasing CHOP transcript levels. Compound **8** was the most efficacious at mobilizing intracellular Ca^+2^ ([S6C and S6D Fig](#pone.0161486.s006){ref-type="supplementary-material"}). Importantly, the inactive analog **8e** did not induce ERSR nor mobilize intracellular Ca^+2^ stores. Second, we looked at the ability of these compounds to induce cell death. All active analogs induce apoptosis-mediated cell death in U87-MG, JHH-136 and JHH-520 cultures ([S6E--S6H Fig](#pone.0161486.s006){ref-type="supplementary-material"}). Colony forming assays indicated that at 20 μM, all active analogs were able to reduce the proliferating capacity of U87-MG cells ([Fig 4E](#pone.0161486.g004){ref-type="fig"}). When tested at 10 μM, the original hit was more efficacious than analogs **8c** and **8d** (analogs **8a** and **8d** were not tested at this concentration, [Fig 4E](#pone.0161486.g004){ref-type="fig"}). Notably, all analogs were able to decrease cell viability of 3D spheroids when incubated for 5 days ([S6I--S6K Fig](#pone.0161486.s006){ref-type="supplementary-material"}). U87-MG spheroids treated for 48 h with compound **8** had a higher population of dead cells, as measured by propidium iodide staining, compared to the inactive analog **8e** ([Fig 6](#pone.0161486.g006){ref-type="fig"}). Overall, none of the analogs showed significant potency improvements over the original hit compound. [Fig 5](#pone.0161486.g005){ref-type="fig"} summarizes the AC~50~ values of compound **8** analogs in all qHTS assays. The cytotoxic effects for these compounds are not specific for glioma cell lines since treatment of ovarian (HEY-A8 and IGROV-1) and colon (HT-29) with compound **8** and analogs showed similar reduction in viability as seen in glioma (U87-MG and LN-299) cell lines ([Fig 7](#pone.0161486.g007){ref-type="fig"}). ![Chemical structure and AC50 (μM) of compound 8 analogs in qHTS assays.\ Efficacy cutoffs are the same as in [Fig 2](#pone.0161486.g002){ref-type="fig"}.](pone.0161486.g005){#pone.0161486.g005} ![Compound 8 induces cell death in U87-MG spheroids.\ U87-MG spheroids were treated for 48 h with either compound **8** or inactive analog **8e** at the indicated concentrations. Spheroids were stained with Hoechst (blue) and propidium iodide (red) to mark nuclei and dead cells, respectively. For each spheroid, one single Z' plane is shown.](pone.0161486.g006){#pone.0161486.g006} ![Compound 8 analogs reduce the viability of cancer cell lines.\ CellTiter-Glo viability assay of glioma (U87-MG and LN-229), ovarian (IGROV-1 and HEY-A8) and colon (HT-29) cancer cell lines treated for 48 h with compound **8** analogs.](pone.0161486.g007){#pone.0161486.g007} Selected compounds synergize to reduce cell viability {#sec009} ----------------------------------------------------- Compounds that trigger ERSR via different mechanisms/targets could potentially synergize to induce cell death. We selected three validated ERSR inducers with cytotoxicity effects (compounds **8**, **8a** and **8c)**, a validated ERSR inducer with limited cytotoxicity (compound **3**), as well as a weak ERSR inducer (compound **6**) for combinatorial screening in JHH-136 and JHH-520 cell lines. We utilized a combination screening platform previously described \[[@pone.0161486.ref031], [@pone.0161486.ref032]\]. Briefly, we performed a pairwise 6x6 dose response matrix, where compounds were tested in a range of 0--10 μM (final concentration), to assess antagonistic, synergistic, or additive effects on cell viability. The highest dose of each compound (10 μM) was chosen as it is lower than the AC~50~ of each compound in cell viability assays ([Fig 2](#pone.0161486.g002){ref-type="fig"}). Viability response matrices were characterized using the Bliss model and summarized using the DBSumNeg metric \[[@pone.0161486.ref032]\]. For compound **8** and both analogs, we observed a strong synergism with compound **6** but not compound **3**, in both cell lines ([Fig 8](#pone.0161486.g008){ref-type="fig"} and [S8 Fig](#pone.0161486.s008){ref-type="supplementary-material"}). Although compound **6** is a weak ERSR activator, it mobilizes intracellular Ca^2+^ to comparable levels as compound **8** does. It is tempting to speculate that a massive depletion of intracellular Ca^2+^ stores is causing the observed synergism. Importantly, no synergism was observed between compound **8** and its analogs, consistent with the idea that all of them work through the same mechanism/target ([S9 Fig](#pone.0161486.s009){ref-type="supplementary-material"}). No antagonism was observed for any of the combinations tested ([Fig 8](#pone.0161486.g008){ref-type="fig"}; [S8](#pone.0161486.s008){ref-type="supplementary-material"} and [S9](#pone.0161486.s009){ref-type="supplementary-material"} Figs). ![Compound 8 and 6 synergize to reduce the viability of patient-derived glioma cell lines.\ Combination (6 x 6) response profiles for compound **8**, **6**, and **3** in JHH-136 (A) and JHH-520 (B) cells. Each response profile is displayed as heatmaps of cell viability (percent response normalized to thapsigargin control; left panels) and DBSumNeg analysis (right panels).](pone.0161486.g008){#pone.0161486.g008} Discussion {#sec010} ========== We implemented an assay that quantitatively monitors GRP78 levels in human malignant glioma cells upon treatment with small molecules. We devised a compound triage strategy that included multiple quantitative high throughput as well as fixed-dose low throughput assays to enable the confident identification of small molecules with potent ERSR-inducing and apoptotic-mediated cytotoxic activities. Notably, a hit (compound **8**) with such properties was identified among our collection of over 425,000 unique chemical entities. Although further analyses are needed to fully understand the mechanism of action of this compound and its molecular target, it likely triggers ERSR by depleting intracellular Ca^2+^ stores. Our medicinal chemistry optimization efforts around compound **8** indicated that this chemotype exhibits very tight SAR and any significant changes to the molecule resulted in loss of potency. We describe here four top actives (analogs **8a**, **8b**, **8c** and **8d**), which along with the original hit compound, constitute a set of chemical tools worthy of *in vivo* ERSR-induced cytotoxicity studies. To our knowledge, this is the first cell-based qHTS aimed to identify ERSR activators, *via* GRP78 induction, that induce apoptosis-mediated cell death. The work by Kudo et al. utilized a similar screening strategy to identify small molecules that induce GRP78 expression to protect neurons from ERSR-mediated apoptosis \[[@pone.0161486.ref033]\]. The authors identified BIX (Bip inducer X), which was shown to activate ER stress response elements through the ATF6 pathway but did not induce XBP-1 splicing nor CHOP expression. BIX was not included in our compound collection. In the recent report by Bi *et al*. the authors described the generation of a HeLa reporter cell line expressing β-lactamase under the control of the grp78 promoter \[[@pone.0161486.ref034]\]. The authors performed a pilot screen against the NIH Chemical Genomics Center Pharmaceutical Collection (NPC) of 2,800 drugs and identified 6 compounds that induce reporter expression. Four of those six drugs (6-thioguanine, primaquine, amlodipine and roxindole) tested negative in our primary screen; AMI-193 induced luciferase activity in our primary screen with an efficacy below 40% and was not included in follow up studies; the AMI-193-related drug, spiperone, induced reporter activity with an efficacy of \~40% but did not induce significant cell death of glioma cell lines. A different strategy was recently implemented to screen Chinese hamster ovary (CHO) K1 cells expressing luciferase constructs that individually reported on CHOP activation or IRE1α activity (via XBP1 mRNA splicing). This screen identified sulfonamidebenzamides as selective CHOP activators among a collection of 331,676 MLSMR compounds. One of these sulfonamidebenzamide derivatives showed antiproliferative activity against multiple cancer cell lines \[[@pone.0161486.ref035]\]. These compounds tested negative in our grp78-luciferase assay, consistent with GRP78 functioning upstream of CHOP and XBP1. However, the different cell types interrogated in these three studies could account for differential activity of identified ERSR activators. The hits identified in this study provide excellent starting points not only for developing chemical probes but also to investigate the potential of combination therapy with other compounds, including ERSR stressors that function *via* alternative mechanisms. Indeed, we showed that compound **8** and analogs synergize with compound **6** to reduce the viability of patient-derived glioma cells. Other compounds of particular interest for combination studies are those that target autophagy. Autophagy and ERSR-mediated apoptosis are molecularly linked; thapsigargin and tunicamycin have both been shown to induce autophagy in several cell types \[[@pone.0161486.ref036]--[@pone.0161486.ref039]\]. Autophagy is currently considered a promising target for chemotherapy and targeting both pathways poses an attractive paradigm for oncology treatments \[[@pone.0161486.ref040]--[@pone.0161486.ref042]\]. Experimental Procedures {#sec011} ======================= Cell lines and culture conditions {#sec012} --------------------------------- U87-MG, LN-229, and HT-29 cells were obtained from America Type Culture Collection, (ATCC \#HTB-14, CRL-2611, and HTB-38, respectively). IGROV-1 and HEY-A8 were obtained from the NCI-60 panel of human cancer cell lines \[[@pone.0161486.ref043]\]. U87-MG, LN-229, HT-29, and HEY-A8 cells were cultured in Dulbecco\'s Modified Eagle Medium (DMEM; Life Technologies) supplemented with 10% fetal bovine serum (FBS; HyClone), 100 U/ml penicillin and 100 μg/ml streptomycin (referred to as 1% Pen/Strep; Life Technologies). IGROV-1 cells were cultured in RPMI-1640 (Life Technologies), supplemented with 2mM L-Glutamine (Life Technologies), 10% FBS and 1% Pen/Strep. Generation and characterization of JHH-136 and JHH-520 cell lines has been previously described \[[@pone.0161486.ref028]\]. Both cell lines were grown in suspension in Neurocult NS-A Stem Cell media (StemCell Technology), containing 20 ng/ml human EGF (Peprotech), 10 ng/ml human basic FGF (Peprotech) and 0.2% heparin (StemCell Technology). TSCER2 cells, derived from the human lymphoblast cell line TK6 \[[@pone.0161486.ref044]\], were cultured in RPMI 1640 medium (Life Technologies) supplemented with 5% FBS (Gemini Bio-Products), 1 mM sodium pyruvate (Life Technologies) and 1% Pen/Strep. All cultures were maintained in a 37°C incubator with 5% CO~2~ and under a humidified atmosphere. Generation of grp78-luciferase and UPRE-luciferase stable cell lines {#sec013} -------------------------------------------------------------------- The pGL3-GRP78-(-132-+7)-Luc construct containing a firefly luciferase reporter gene under the control of the grp78 promoter was stably transfected into U87-MG cells. Transfection was performed using Lipofectamine 2000 reagent (Invitrogen) according to the manufacturer instructions. A clone that robustly and consistently expressed luciferase following treatment with either thapsigargin or tunicamycin was isolated and used for assay optimization. To this end, cells were seeded at 250,000 cells/well in 24 well dishes in DMEM+10% FBS. Compounds were added as DMSO solutions at the indicated concentrations and incubated for 8, 16, 24 or 48 hr. Luciferase activity was measured by adding a volume of Bright Glo (Promega) reagent as per manufacturer's instructions. The p5xUPRE-GL3 was stably transfected into TSCER2 cells \[[@pone.0161486.ref044]\] using a Gene Pulser apparatus (Bio-Rad, Hercules, CA) at 250 V and 950 μF. A clone that robustly and consistently expressed luciferase following treatment with either tunicamycin or 17-AAG was isolated and used for secondary screens. Colony Forming Assay {#sec014} -------------------- U87-MG cells were plated onto 6-well plates at a density of 1,000 cells/well in DMEM, supplemented with 10%FBS and 1% Pen/Strep and incubated O.N. at 37°C, 5%CO~2~, 95% RH. Cells were treated with either DMSO vehicle or compound solution at the indicated concentration (keeping a final concentration of 0.2% DMSO). Twelve days after compound treatment, cells were fixed, stained and counted as described \[[@pone.0161486.ref045]\]. Western Blot {#sec015} ------------ Assay is based on a previous method with modifications \[[@pone.0161486.ref020]\]. U87-MG cells were seeded (\~3 × 10^5^ cells/well in 6-well plates) and treated with either vehicle DMSO, control thapsigargin or indicated compound at doses of 5, 10, or 20 μM for 16 h. Whole cell lysates were prepared using RIPA buffer (Cell Signaling) and protease inhibitor cocktail (Cell Signaling). Cell lysates were quantified using the Bio-Rad DC Protein Assay. 1 μg/μl of lysates were loaded on 4--12% gradient NuPAGE® Novex® Bis-Tris gels (Invitrogen) in MOPS SDS running buffer. Proteins were transferred to nitrocellulose membranes using the iBlot gel transfer system (Invitrogen) and blocked in TBST buffer (20 mM Tris pH 7.5, 150 mM NaCl, 0.05% Tween20, 5% BSA). Membranes were incubated with rabbit polyclonal anti-GRP78 primary antibody (\# sc-13968, Santa Cruz Biotechnology) at a 1:1,000 dilution and mouse monoclonal anti-GAPDH antibody (\# G8795, Sigma) at a 1:20,000 dilution. Either HRP- or Cy3/Cy5-conjugated secondary antibodies were used as follow: HRP-anti-rabbit IgG (\# sc-2317, Santa Cruz Technology) or HRP-anti-mouse IgG (\# sc-2031, Santa Cruz Biotechnology) were used at 1:2500 dilution and visualized with SuperSignal™ West Dura Chemiluminescent Substrate (Thermo Scientific) on a Bio-Rad Universal Hood II. ECL Plex-anti-rabbit IgG-Cy5 (\# PA45012; GE Healthcare Life Sciences) or ECL Plex-anti-Mouse IgG-Cy3 (\# PA43010, GE Healthcare Life Sciences) were used at 1:2,500 dilution and visualized using the Typhoon FLA 9500 (BPG1/532 nm/Cy3; LPR/635 nm/Cy5; GE). Protein quantification was performed using ImageQuant TL (GE) software. CHOP qRT-PCR and XBP-1 splicing assay {#sec016} ------------------------------------- U87-MG cells were seeded (\~3 × 10^5^ cells/well in 6-well plates) and treated with either DMSO, 1 μM thapsigargin or 20 μM of indicated compounds and incubated for either 24 (CHOP) or 16 h (XBP-1). RNA extraction and cDNA synthesis were performed using the TaqMan Gene Expression Cells-to-Ct Kit (TermoFisher Scientific) as per manufacturer's instructions. Human CHOP and GAPDH transcripts were detected using the FAM-MGB Hs500358796_g1 and Human GAPD endogenous control (VIC-MGB, primer limited) probes, respectively (ThermoFisher Scientific) in a ViiA7 system (Applied Biosystems). XBP-1 splicing fragments were detected as described \[[@pone.0161486.ref034]\]. Spheroid Imaging {#sec017} ---------------- U87-MG were cultured in DMEM, supplemented with 10% FBS and 1% P/S. Cells were plated onto 384-well, ultra-low attachment, spheroid microplates (Corning \#3830) at a 750 cells/well/30 μl density using a Multidrop dispenser and spun down for 30 seconds at 1,000 rpm. Cells were incubated at 37°C, 5% CO~2~, under a humidified atmosphere for 3 days to allow spheroid formation (1 spheroid/well). Compounds were dissolved in growth media and 10 μl/well were added to a final concentration range of 156 nM to 50 μM (final assay contains 0.5% DMSO). To maintain the three dimensional structure, compounds were incubated for 48 h before imaging. Spheroids were stained with Hoechst 33342 (0.5 nM final) and PI (1 μg/ml final) for 2 h and imaged at 20X magnification on one Z' plane using the InCell 6000 (GE) plate image reader. qHTS Assays {#sec018} ----------- Detailed descriptions of all qHTS assays, primary screening, data analysis and associated protocols are included in [S1 Supporting Information](#pone.0161486.s010){ref-type="supplementary-material"}. [S1 Table](#pone.0161486.s011){ref-type="supplementary-material"} summarizes qHTS assay performance. General Chemistry Methods {#sec019} ------------------------- Compound synthesis is described in [S1 Supporting Information](#pone.0161486.s010){ref-type="supplementary-material"}. Supporting Information {#sec020} ====================== ###### Development and characterization of a qHTS grp78-luciferase assay. (TIF) ###### Click here for additional data file. ###### Activity plots for 8 hit compounds in secondary qHTS assays. (TIF) ###### Click here for additional data file. ###### Western blot to assess endogenous GRP78 expression. (TIF) ###### Click here for additional data file. ###### An intracellularCa^2+^ mobilization assay. (TIF) ###### Click here for additional data file. ###### Colony forming assay. (TIF) ###### Click here for additional data file. ###### Activity plots for top compound 8 analogs in secondary validation qHTS assays. (TIF) ###### Click here for additional data file. ###### Colony forming assay. (TIF) ###### Click here for additional data file. ###### Analogs 8a and 8c synergize with compound 6 but not with compound 3, to reduce the viability of patient-derived glioma cell lines. (TIF) ###### Click here for additional data file. ###### Compound combinations that exhibit minimal to no synergism. (TIF) ###### Click here for additional data file. ###### This file contains experimental procedures, supporting figure legends and references. (DOCX) ###### Click here for additional data file. ###### Performance summary of qHTS assays. (PDF) ###### Click here for additional data file. ###### SAR around the core. (PDF) ###### Click here for additional data file. ###### SAR around the diphenylmethyl region. (PDF) ###### Click here for additional data file. ###### SAR around the isoxazole region. (PDF) ###### Click here for additional data file. ###### SAR around the amide region. (PDF) ###### Click here for additional data file. We thank Sam Michael, Carleen Klumpp-Thomas and Charles Bonney for assistance with robotic screens; Paul Shinn, Danielle VanLeer, and Crystal McKnight for management of compound libraries; William Leister, Heather Baker, Elizabeth Fernandez, Burchelle Blackman, and Christopher Leclair for analytical chemistry and purification support; Noel Southall for assistance with analysis of calcium mobilization datasets; Raj Guha for assistance with analysis of combinatorial screening datasets; Mark Henderson for critical comments, and Steven Titus for assistance with spheroid imaging. [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: **Conceptualization:** AS MG DJM AJ.**Data curation:** AJ HS YW NJM AY.**Formal analysis:** AJ HS YW.**Funding acquisition:** AS AJ.**Investigation:** NJM AY WAL KN.**Methodology:** NJM AY WAL KN.**Project administration:** AS AJ DJM NJM.**Resources:** AS AJ DJM DKL SMY ST MS IE TO KM KW GJR.**Software:** AJ HS YW.**Supervision:** AS.**Validation:** NJM AY.**Visualization:** NJM.**Writing -- original draft:** NJM AY GR.**Writing -- review & editing:** NJM AY GR MX.
{ "pile_set_name": "PubMed Central" }
Q: Android Application MainActivity keeps Resetting Information I am working on a simple application that passes a parcelable from one activity to another. In MainActivity, I have a LinkedList that holds the information taken from the parcelable. However, each time i return to MainActivity, the Object previously stored in the LinkedList (Parcelable) is deleted. What am I doing wrong? I have spent literally the past 3 days trying to figure out why it isn't saving anything but the logic looks solid. So I updated to use startActivityForResult and now the Parcelable in MainActivity is NULL. public class MainActivity extends Activity { int tasks; final static String TASK_KEY = "newTask"; final static String INDEX_KEY = "LLIndex"; Task t; ScrollView scrollView; LinearLayout taskHolder; LinkedList<Task> taskList = new LinkedList<Task>(); @Override protected void onCreate(Bundle savedInstanceState) { Log.d("In onCreate", "here"); super.onCreate(savedInstanceState); setContentView(R.layout.activity_main); TextView tvCounter = (TextView) findViewById(R.id.textView1); taskHolder = (LinearLayout) findViewById(R.id.linearScroll); //Checks for parcelable if(getIntent().hasExtra(Create.TASK_KEY)){ Log.d("Task", "You've got mail!"); Task t = (Task)getIntent().getExtras().getParcelable(Create.TASK_KEY); taskList.add(t); addNewTask(t); } Log.d("LL size", Integer.toString(tasks)); tasks = taskList.size(); tvCounter.setText(Integer.toString(tasks) + " " + getApplicationContext().getResources().getString(R.string.tv_task)); Button plusButton = (Button) findViewById(R.id.button1); plusButton.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View v) { // TODO Auto-generated method stub Intent i = new Intent(MainActivity.this, Create.class); startActivity(i); } }); } void addNewTask(Task t) { tasks++; Log.d("In addNewTask method", t.toString()); LinearLayout newTaskLayout = new LinearLayout(getApplicationContext()); newTaskLayout.setOrientation(LinearLayout.VERTICAL); LayoutParams params = new LayoutParams(LayoutParams.MATCH_PARENT, LayoutParams.WRAP_CONTENT); newTaskLayout.setLayoutParams(params); //int bottom = (int) getResources().getDimension(R.dimen.margin_bottom); //int left = (int) getResources().getDimension(R.dimen.margin_left); //params.setMargins(left, 0, 0, bottom); TextView tvTitle = new TextView(getApplicationContext()); TextView tvDate = new TextView(getApplicationContext()); TextView tvTime = new TextView(getApplicationContext()); tvTitle.setTextColor(Color.BLACK); tvDate.setTextColor(Color.BLACK); tvTime.setTextColor(Color.BLACK); tvTitle.setTypeface(tvTitle.getTypeface(), Typeface.BOLD); tvTitle.setText(t.getName()); tvDate.setText(t.getDate()); tvTime.setText(t.getTime()); newTaskLayout.addView(tvTitle); newTaskLayout.addView(tvDate); newTaskLayout.addView(tvTime); //params = new LayoutParams(LayoutParams.WRAP_CONTENT, LayoutParams.WRAP_CONTENT); //params.setMargins(0, 0, 0, 0); //tvDate.setLayoutParams(params); //tvTime.setLayoutParams(params); //tvTitle.setTextSize(getResources().getDimension(R.dimen.size_of_text)); taskHolder.addView(newTaskLayout); final int index = ((ViewGroup) newTaskLayout.getParent()).indexOfChild(newTaskLayout); newTaskLayout.setOnClickListener(new View.OnClickListener() {//bind listener @Override public void onClick(View v) { // TODO Auto-generated method stub Intent i = new Intent(MainActivity.this,Display.class); i.putExtra(TASK_KEY, taskList.get(index)); i.putExtra(INDEX_KEY, index); startActivity(i); } }); } @Override protected void onActivityResult(int requestCode, int resultCode, Intent data) { Log.d("CheckStartActivity","onActivityResult and resultCode = "+resultCode); // TODO Auto-generated method stub super.onActivityResult(requestCode, resultCode, data); if(resultCode==1){ Toast.makeText(this, "Pass", Toast.LENGTH_LONG).show(); Log.d("Task", "You've got mail!"); if(getIntent().hasExtra(Create.TASK_KEY)){ Task t = (Task)getIntent().getExtras().getParcelable(Create.TASK_KEY); taskList.add(t); addNewTask(t); } Log.d("LL size", Integer.toString(tasks)); tasks = taskList.size(); tvCounter.setText(Integer.toString(tasks) + " " + getApplicationContext().getResources().getString(R.string.tv_task)); } else{ Toast.makeText(this, "Fail", Toast.LENGTH_LONG).show(); } } } Create Class: public class Create extends Activity{ private int year; private int month; private int day; private String name, date, time, priority; final static String TASK_KEY = "newTask"; static final int PICK_CONTACT_REQUEST = 1; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_create); final Calendar cal = Calendar.getInstance(); //Current Date year = cal.get(Calendar.YEAR); month = cal.get(Calendar.MONTH); day = cal.get(Calendar.DAY_OF_MONTH); final EditText etTitle = (EditText) findViewById(R.id.editText1); final EditText etDate = (EditText) findViewById(R.id.editText2); final EditText etTime = (EditText) findViewById(R.id.editText3); final RadioGroup rg = (RadioGroup) findViewById(R.id.radioGroup1); //int selectedId = rg.getCheckedRadioButtonId(); //final RadioButton radioSelected = (RadioButton) findViewById(selectedId); Button save = (Button) findViewById(R.id.button1); save.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View v) { //Get checked radio button RadioButton rb = (RadioButton) findViewById(rg.getCheckedRadioButtonId()); // TODO Auto-generated method stub name = etTitle.getText().toString(); date = etDate.getText().toString(); time = etTime.getText().toString(); priority = (String) rb.getTag(); Task t = new Task(name, date, time, priority); Log.d("task", t.toString()); Intent i = new Intent(Create.this, MainActivity.class); i.putExtra(TASK_KEY, t); //Puts new Task object into Intent to send setResult(1,i); finish(); } }); etDate.setKeyListener(null); etTime.setKeyListener(null); final DatePickerDialog.OnDateSetListener datePick = new DatePickerDialog.OnDateSetListener() { @Override public void onDateSet(DatePicker view, int year, int monthOfYear, int dayOfMonth) { // TODO Auto-generated method stub cal.set(Calendar.YEAR, year); cal.set(Calendar.MONTH, monthOfYear); cal.set(Calendar.DAY_OF_MONTH, dayOfMonth); updateLabel(); } private void updateLabel() { // TODO Auto-generated method stub String myFormat = "MM/dd/yy"; //In which you need put here SimpleDateFormat sdf = new SimpleDateFormat(myFormat, Locale.US); etDate.setText(sdf.format(cal.getTime())); } }; etDate.setOnClickListener(new View.OnClickListener() { public void onClick(View v) { //Do whatever new DatePickerDialog(Create.this, datePick, cal.get(Calendar.YEAR), cal.get(Calendar.MONTH), cal.get(Calendar.DAY_OF_MONTH)).show(); } }); etTime.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View v) { // TODO Auto-generated method stub Calendar curTime = Calendar.getInstance(); int hour = curTime.get(Calendar.HOUR_OF_DAY); int minute = curTime.get(Calendar.MINUTE); TimePickerDialog tp; tp = new TimePickerDialog(Create.this, new TimePickerDialog.OnTimeSetListener() { @Override public void onTimeSet(TimePicker timePicker, int selectedHour, int selectedMinute) { String am_pm; String minuteStr; Log.d("hour", Integer.toString(selectedHour)); if (selectedHour == 0){ selectedHour = 12; am_pm = "AM"; }else if(selectedHour == 12){ selectedHour = 12; am_pm = "PM"; }else if(selectedHour > 12) { selectedHour -= 12; am_pm = "PM"; }else{ am_pm = "AM"; } if(selectedMinute < 10){ minuteStr = "0" + Integer.toString(selectedMinute); }else{ minuteStr = Integer.toString(selectedMinute); } etTime.setText( selectedHour + ":" + minuteStr + " " + am_pm); } }, hour, minute, false);//Yes 24 hour time tp.setTitle("Set Time"); tp.show(); } }); } } A: If I understand the question correctly, you have a list of messages in MainActivity, and you're starting the Create intent to create a new message. Then, on save, you're starting a new MainActivity with the new message to add to the list. The problem with this approach is that a new MainActivity instance will be created each time, with a new (empty) LinkedList in it. I would look at using startActivityForResult() to run the Create activity, and use setResult() and finish() within Create to return the new message. You should also look at saving the contents of the list within 'onSaveInstanceState', to handle the destruction and recreation of your MainActivity (e.g. when the user rotates their device).
{ "pile_set_name": "StackExchange" }
Coulombe Coulombe is a surname. Notable people with the surname include: Benoit Coulombe (born 1958), Canadian scientist Carmen Coulombe (1946–2008), Canadian artist Charles Coulombe (disambiguation), multiple people Clotilde Coulombe (1892–1985), Canadian classical pianist and Roman Catholic nun Danny Coulombe (born 1989), American baseball player Guy Coulombe (1936–2011), Canadian civil servant Joe Coulombe (1930–2020), American businessman and founder of Trader Joe's Martine Coulombe, Canadian politician Patrick Coulombe (born 1985), Canadian ice hockey player See also François Coulombe-Fortier (born 1984), Canadian taekwondo practitioner Coulombe Creek, a river of New York, United States Coulomb (disambiguation)
{ "pile_set_name": "Wikipedia (en)" }
using System.Text; using System.Threading.Tasks; using Microsoft.AspNetCore.Routing; using Microsoft.Extensions.Logging; using Plato.Entities.Extensions; using Plato.Entities.Stores; using PlatoCore.Messaging.Abstractions; using Plato.Ideas.Models; using Plato.Slack.Services; using PlatoCore.Hosting.Web.Abstractions; namespace Plato.Ideas.Slack.Subscribers { public class EntityReplySubscriber : IBrokerSubscriber { private readonly ICapturedRouterUrlHelper _capturedRouterUrlHelper; private readonly ILogger<EntitySubscriber> _logger; private readonly IEntityStore<Idea> _entityStore; private readonly ISlackService _slackService; private readonly IBroker _broker; public EntityReplySubscriber( ICapturedRouterUrlHelper capturedRouterUrlHelper, ILogger<EntitySubscriber> logger, IEntityStore<Idea> entityStore, ISlackService slackService, IBroker broker) { _capturedRouterUrlHelper = capturedRouterUrlHelper; _slackService = slackService; _entityStore = entityStore; _broker = broker; _logger = logger; } // Implementation public void Subscribe() { // Created _broker.Sub<IdeaComment>(new MessageOptions() { Key = "EntityReplyCreated" }, async message => await EntityReplyCreated(message.What)); } public void Unsubscribe() { // Created _broker.Unsub<IdeaComment>(new MessageOptions() { Key = "EntityReplyCreated" }, async message => await EntityReplyCreated(message.What)); } // Private methods async Task<IdeaComment> EntityReplyCreated(IdeaComment reply) { // If the created reply is hidden, no need to send notifications // Replies can be hidden automatically, for example if they are detected as SPAM if (reply.IsHidden()) { return reply; ; } // We need an entity to build the url if (reply.EntityId <= 0) { return reply; } // Get entity var entity = await _entityStore.GetByIdAsync(reply.EntityId); // Ensure the entity exists if (entity == null) { return reply; } // Build url to entity reply var baseUri = await _capturedRouterUrlHelper.GetBaseUrlAsync(); var url = _capturedRouterUrlHelper.GetRouteUrl(baseUri, new RouteValueDictionary() { ["area"] = "Plato.Ideas", ["controller"] = "Home", ["action"] = "Reply", ["opts.id"] = entity.Id, ["opts.alias"] = entity.Alias, ["opts.replyId"] = reply.Id }); // Build the message to post to Slack var sb = new StringBuilder(); sb .Append("RE: ") .Append(entity.Title) .Append(" - ") .Append(baseUri) .Append(url); // Finally post our message to Slack var response = await _slackService.PostAsync(sb.ToString()); // Log any errors that may have occurred if (!response.Success) { if (_logger.IsEnabled(LogLevel.Error)) { _logger.LogError($"An error occurred whilst attempting to post a reply to Slack. Response from POST request to Slack Webhook Url: {response.Error}"); } } // Continue processing the broker pipeline return reply; } } }
{ "pile_set_name": "Github" }
decimal places. -0.000007 Let t = 131.67 + -710.46. Round t to the nearest 100. -600 Suppose 0 = -4*a - 3*u + 16, -2*a + u - 4*u + 8 = 0. Let s = 22 + a. Suppose 21*g + 2000 = s*g. What is g rounded to the nearest 100? 400 Let t = -3853.07 + 3650. Round t to the nearest ten. -200 Let b = 2 - -10.6. Let n = 58502641 + -58502653.6000122. Let d = n + b. Round d to 6 dps. -0.000012 Let c = -5800.99 - -36.89. What is c rounded to the nearest one hundred? -5800 Suppose 3*u = 12, -228*u = 2*l - 231*u + 341212. What is l rounded to the nearest one hundred thousand? -200000 Let u = 2580.311385 + -0.011385. Round u to the nearest ten. 2580 Let b = 0.246 + -0.2892. Let q = 0.043200995 + b. What is q rounded to 7 dps? 0.000001 Suppose 5*d - 4*i + 16 = -8*i, -16 = 3*d - 4*i. Let q be d*(-2055)/(-10)*1. What is q rounded to the nearest one hundred? -800 Let p = -1905.30017521 + 1905.3. What is p rounded to six decimal places? -0.000175 Suppose -4*n + 661200040 = -5*k, -5*n + 867479065 = -5*k + 40979025. Round n to the nearest 1000000. 165000000 Let f be (298/4)/(8/144). Suppose f + 8579 = 32*c. Round c to the nearest one thousand. 0 Let o = 207.118 - 0.118. Let u = o + -207.206. What is u rounded to 2 dps? -0.21 Suppose -17*l + 14 = 99. Let m be 175463*-216 - -3 - l. What is m rounded to the nearest one million? -38000000 Suppose 2*w + g + 20349163 = 0, 0*w - 3*g = -3*w - 30523749. Let t = w + 4714582. Round t to the nearest one million. -5000000 Let a be -99*((-8)/16 - (-1)/(-2)). Suppose a = q + 90. Suppose -3*p = -q*p - 91200000. What is p rounded to the nearest 1000000? -15000000 Let l = -1550.7893 - -1551.7. Let k = 155.144 + -156. Let v = k + l. Round v to 2 decimal places. 0.05 Let n = 3.1456 - 2.167. What is n rounded to one decimal place? 1 Let v = -485 - -484.9038. Let a = -0.10089 - v. Round a to four dps. -0.0047 Suppose 1107440015 = 4*u + 5*m, -4*m - 1938020015 = -7*u - 9*m. What is u rounded to the nearest 1000000? 277000000 Let s = 128 + -10. Let r = -0.0752 + -81.0248. Let o = s + r. Round o to zero dps. 37 Let p be (-50)/(-2)*3/15. Suppose -5*h + 352 = -p*x + 4*x, 0 = 3*x + h + 1008. Round x to the nearest one hundred. -300 Let k = -4253.35 - -4249. What is k rounded to the nearest integer? -4 Suppose 235065300 = 22*w + 19*w. What is w rounded to the nearest one million? 6000000 Suppose 2*x + 37 - 29 = 0. Let o be (-15 + 3 + 2)*x/(-10). Let r be 2/o + (-11999994)/12. Round r to the nearest one hundred thousand. -1000000 Let t = 0.663 - 0.144. Let j = t + -0.518671. Round j to 5 decimal places. 0.00033 Let i = 131.1 + 975.9. Let a = i + -1106.99999137. Round a to six dps. 0.000009 Let k be ((-1584)/(-616))/(((-2)/14)/1). Let g be ((-281400)/k)/14*-3. What is g rounded to the nearest one thousand? -3000 Let b = 144159 - 3980. Suppose b = -3*m - 3881. Round m to the nearest ten thousand. -50000 Let t = 10 - 6. Suppose 3*a - t*n = 62, a - 33 + 11 = n. Let k = 16 + a. Round k to the nearest ten. 40 Let q = -1.29 + 89.29. Let u = q - 198. Let v = -110.00157 - u. Round v to four decimal places. -0.0016 Let z = 8.354866836747335 - -688392135.645129063252665. Let k = z - 688392176. Let f = 32 + k. What is f rounded to 6 dps? -0.000004 Let f = 37337.689827333 - -9.069442667. Let r = f + -37347. Let o = r + 0.24. Round o to 4 dps. -0.0007 Let o = 51681 - -51259. What is o rounded to the nearest 10000? 100000 Let r = 48 + 56. Let o = 54 - r. Let l = o - -50.000052. Round l to 5 decimal places. 0.00005 Let c = 1340.1574 - 1340. Let f = -0.187 + c. What is f rounded to 3 dps? -0.03 Let i = -2147.98 + 2211. Round i to the nearest ten. 60 Let d = -228.4 - -290. Let w = d - -205. Let q = 306 - w. What is q rounded to the nearest ten? 40 Let p = -217.5 - -217.50005515. What is p rounded to 6 decimal places? 0.000055 Let z = 138.3 - -277. Round z to the nearest ten. 420 Let z = 247 + -326.25. Let x = z + 74.137. What is x rounded to 1 decimal place? -5.1 Let s = 24526 - 23406.7. What is s rounded to the nearest 100? 1100 Let t(u) = 1237*u. Let n be t(2). Let m(s) = -s**3 + n*s + 0*s**3 - 2460*s + 8 + 16*s**2. Let y be m(17). What is y rounded to the nearest integer? -43 Let y(i) be the second derivative of i**4/12 + 4*i**3/3 + 10*i**2 - 9*i. Let w be y(-4). Suppose -w*f - f = 58500. What is f rounded to the nearest 1000? -12000 Let n = 8702 - 9294.9. What is n rounded to the nearest ten? -590 Let b = -7629 - -7628.93302. Round b to two dps. -0.07 Let c(s) = -31*s**3 - 6*s - 7. Let j = 79 + -80. Let b be c(j). Round b to the nearest 100. 0 Let b = 811257736.0000126 - 811257894. Let a = b + 158. Round a to 6 dps. 0.000013 Suppose -2*c + 3*b + 35635932 = 0, -1 = b - 3. Let v = -2789165 + 407134. Let x = c - v. Round x to the nearest 1000000. 20000000 Suppose -70 = -6*l - 520. Let p be (-8370000630)/l + -8 + 4/(-10). What is p rounded to the nearest one million? 112000000 Let a(u) = 2*u + 21. Let k be a(-9). Let i be (-5 + 3)*3*k/18. Let y be 7203/(i + 0) - (18 - 21). Round y to the nearest 10000. -10000 Let k = -0.26474 + -0.15819. Round k to 1 dp. -0.4 Let l = 0.722 - 0.6. Let x = l - 0.1792. Round x to 2 decimal places. -0.06 Let y(k) = -k**3 + 99*k**2 + 92*k + 200. Let d be y(43). Round d to the nearest ten thousand. 110000 Let p = 46966.78 + -46969.4799436. Let a = 2.7 + p. Round a to 6 decimal places. 0.000056 Let z = 1022.554 + -1028.7. Let d = -0.54 - -0.586. Let w = z + d. Round w to 0 dps. -6 Let g = 219.226598 + 172415605.773402. Let j = g + -172416229.999619. Let s = j + 405. Round s to four decimal places. 0.0004 Let x be ((519*2)/(81/(-18)))/((-5)/(-18000)). Round x to the nearest 10000. -830000 Let k(o) = -2*o**3 + 23*o**2 - 13*o - 6. Let r = -31 - -42. Let z be k(r). Let i be (-4)/z - (-315003)/(-21). Round i to the nearest ten thousand. -20000 Let p = 0.169 - -126.831. Let z = -126.38 + p. What is z rounded to zero dps? 1 Let t = -224 - -219.55. Let z = 4.3 + t. Let d = z + 0.150006. Round d to 5 dps. 0.00001 Let v = 8774.75 - 8808. Round v to the nearest 10. -30 Let p = 19134.045815 - 19134. What is p rounded to 3 dps? 0.046 Let g = -776 + 773.104. Let r = 8.1 - 11. Let p = r - g. Round p to two dps. 0 Let v = 208 + 152. Let f = v + -775. Let w = -415.0241 - f. What is w rounded to three dps? -0.024 Suppose 3*s - 2*m + 40435186 = 0, 26956758 = -2*s + 23*m - 17*m. Round s to the nearest 1000000. -13000000 Let q = -285 - -245.2. Let d = -40.112 - q. What is d rounded to one dp? -0.3 Let h = 233.004 + -0.004. Let x = h - 233.0000516. Round x to 5 dps. -0.00005 Let g = -1241722629995769456.99999977 + 1241722635418822309. Let w = 5423052906 - g. Let x = -54 + w. What is x rounded to seven decimal places? -0.0000002 Let y = -7.457 + 185.537. Let i = 171 - y. What is i rounded to 1 dp? -7.1 Let x = -31.2 - 5.7. Let a = -36.8237 - x. What is a rounded to two dps? 0.08 Let y = 39.099 - 0.099. Let n = 74712693.99999976 + -74712733. Let u = n + y. What is u rounded to seven decimal places? -0.0000002 Let u = 174 + -185.8. Let y = 0.026824 - 11.862324. Let z = y - u. Round z to 3 dps. -0.036 Let a(b) = -b**2 + 5*b + 1. Let d be a(8). Let m = -23 - d. Suppose -w - 184997 = -5*c, m = 4*c - w + 5*w - 148012. Round c to the nearest ten thousand. 40000 Let p = 7954 - 4519.8. Round p to the nearest one thousand. 3000 Let x = -16 - -2. Let k be (-4)/3*(x/4 - -2). Suppose -15480004 = 2*f - d, -f - 7739992 = -0*f + k*d. Round f to the nearest one million. -8000000 Let w = -38.58 - -38.582056. Round w to 4 dps. 0.0021 Let n = -0.076826335 + 1.686823575. Let f = n + -1.61. Round f to 7 decimal places. -0.0000028 Let n = -4214 - -37750. Let v = -33465.027 + n. Let x = -71 + v. What is x rounded to two dps? -0.03 Suppose 15*c + 2*h - 398654998 = 0, 10*h + 79731004 = 3*c + 6*h. What is c rounded to the nearest 1000000? 27000000 Let q = -825.299994651 + 825.3. Round q to six dps. 0.000005 Let o = 36611695.61997128 + -36611699. Let k = o - -3.38. Round k to 6 dps. -0.000029 Let w = 173.76 - 173.75978298. What is w rounded to 6 decimal places? 0.000217 Let a = 0.9440832 - 0.945. What is a rounded to four dps? -0.0009 Let j = 259.9806 + 0.0194. Let b = j - 261.67. What is b rounded to one decimal place? -1.7 Let y = -2136.12195 - -2136.6. Let d = -7.52205 - y. Let q =
{ "pile_set_name": "DM Mathematics" }
Nuke the comfort zone I think it’s fair to start this post off with a simple assumption: we want to be happy in life. Right? I mean, no one wants to go through our 80+ years on this Earth being miserable. God wants us to be happy too! When you love someone, there’s no greater joy than making them laugh, seeing them smile, and knowing they’re doing well. The problem comes when we confuse comfort and joy. Joy is mobile, energetic. When we are filled with delight, our instinct is to share it. It’s not something to be hoarded, but spread, and the more we give, the happier we are. Comfort, on the other hand, is static. When we’re comfortable, we like to stay where we are. We snuggle down into our nest of comfort-zone items and we start hibernation. It’s an effort to share, and efforts can be uncomfortable. We are a generation, a society, that worships comfort. Every advertisement out there sells us comfort above all. Better cars, better clothes, tastier food—it’s about ‘the zone’. Not only has the goal of life become to be as comfortable as possible, but it is absolutely forbidden to intrude on anyone else’s bubble and push them out of their ‘zone’. Relativism tells us that as my belief is this, and this person’s is that, both are of equal value. Aye, and there’s the rub, as Shakespeare would say. Because both beliefs are of equal value, that suddenly means I have no right to express my belief, since it is the opposite of yours, and my belief might make you uncomfortable. By speaking of my convictions, I am automatically imposing my belief on yours, and this is such a terrible no-no in our world today. We must never impose! Imposing takes away comfort, and discomfort forces you to think of a way to defend your belief. This has led to the birth of what I’ve heard called ‘the PC police’ and goodness it is vicious. Political Correctness has become a muzzle, or rather maybe a leash, to keep us where we are and make sure we don’t step on the grass. This is not life as it was meant to be. I heard a story, recently, of an author who illustrates my point. This lady had a great project. She slaved away for years, polishing and refining and putting heart and soul into her words. There were a few issues, as with every project, and so she had a team of sensitivity readers take a look. Yes, that’s an actual job, and they cost about $300, depending on your manuscript length. Well, it passed the first 12 readers, with only minor corrections. She made them, and was in the final stages of publication, when a new team read through. Nine had no problem with the content. One did. So, she threw out the entire manuscript and—that was it. She said it wasn’t worth the risk of a single person being offended and destroyed years of work. Since when has reading been about comfort? A real book, a well-written, page-turning, age-defying novel—is one that makes you think. It takes you on a journey far out of your comfort zone, and makes you cringe and cry and most importantly it makes. You. Think. Has anyone ever been comfortable reading Fahrenheit 451? Great Gatsby? Heck, the Bible? Pope Benedict XVI said, “The world promises you comfort, but you were not made for comfort. You were made for greatness.” When we grow, there is pain. There is heartache. We are wounded, bruised, battered, stretched, and torn apart. And God puts us back together, stitch by painful stitch, and we get a little taller, a little closer to Heaven. There can be no growth without movement, and no movement without a push outside of our comfort zone. Now I’m not saying run around offending people for the heck of it, that’s another extreme. But don’t hide the Truth, either. Don’t hide your thoughts, don’t bury your beliefs. Argue! Fight! Push boundaries! Embrace discomfort and explore it, move with it. Don’t stand still, run! Every great story begins with a character leaving the comfort zone behind. “It would be delightful to report that they reached the nursery in time,” a narrator in Peter Pan tells us of the Darling parents returning home as their children prepare to journey to Neverland, “But then—there would be no story.” Live your story to the fullest. If you get hurt, and you will, that’s a guarantee, God will pick you up and put you back together. Trust me on that. It’s pretty much His job. I always giggle a little when a couple misunderstands the question on immorality in the online marriage prep course. It’s an understandable misinterpretation: the difference between immorality and im... Saturday is cleaning day at our place, everybody knows it. Even the neighbors when they hear the soundtrack of Pirates of the Caribbeans full blast through all open windows and doors, slightly covere...
{ "pile_set_name": "Pile-CC" }
1. Introduction =============== Knee osteoarthritis (OA) has a high incidence, and the symptoms include joint pain and stiffness, reduced range of motion, and pain that is exacerbated by activities such as climbing stairs, getting up from a chair, and walking for a long time.^\[[@R1],[@R2]\]^ Therefore, appropriate treatment and exercise is important for the older adults with knee OA. One of the treatments, kinesiology taping (KT), is carried out by applying an adhesive strapping tape to the patella or surrounding soft tissue structures. There have been several methods of taping that have been applied.^\[[@R3]--[@R5]\]^ KT alleviates knee pain by improving patellofemoral alignment and relieving the pressure and stress on soft tissues. Because inflammatory soft tissue can become worse when stretched, application of patella taping can provide stability to the knee by reducing the load on the infra-patellar fat pad or pesanserinus.^\[[@R6],[@R7]\]^ Several studies have recently reported the effectiveness of KT in terms of the reduction in the patellofemoral pain and improvement of posture control during functional activities.^\[[@R8],[@R9]\]^ However, KT can be applied using various designs depending on the researcher, and the effect of each is different.^\[[@R10]\]^ In other words, since the effect of KT depends on the application type, it is important to introduce various application methods to prove the effect. Therefore, the purpose of this study was to investigate the effect of knee KT on the gait of the older adults with OA and to establish the clinical basis of this effect. We hypothesized that KT would aid in knee pain reduction and enhance gait and balance ability than non-KT condition. 2. Methods ========== 2.1. Participants ----------------- This study was conducted at an elderly welfare facility in South Korea. A total of 10 volunteer subjects with knee OA were recruited for the study. The inclusion criteria were as follows: 60 years old or older, diagnosed with knee OA by radiography, the surgeon then determined the grade of knee OA (1--3) according to the Kellgren and Lawrence (1957) scale^\[[@R11]\]^ (Table [1](#T1){ref-type="table"}), independent walking is possible, can carry out activities of daily life independently, and visual analog scale (VAS) score of knee pain \>5. The exclusion criteria were as follows: knee swelling, underlying skin disorders, rheumatoid arthritis, previous knee joint surgery, and a planned surgical procedure on the knee joint within the next 6 months. We explained the objective and requirements of our study to all the participants and they voluntarily signed informed consent forms. Ethical approval was obtained from the Seoul Medical Center Institutional Review Board before conducting the experiment (SEOUL 2019-08-014-001). ###### Kellgren-Lawrence classification system. ![](medi-98-e17880-g001) 2.2. Study procedure -------------------- This study was conducted using a one-group, pre and post design. KT (BB Tape, WETAPE Inc., Pyeongtaek, Korea) was applied by one experienced physical therapist on both knees. All participants were assessed in 2 conditions (KT and non-KT) and the order was randomized using a coin toss. The application method of KT is as follows. KT is applied from below the patella to the lateral area of the quadriceps muscle with an approximate 10% to 15% stretch (Fig. [1](#F1){ref-type="fig"}A). KT is applied from below the patella to the medial area of the quadriceps muscle with an approximate 10% to 15% stretch (Fig. [1](#F1){ref-type="fig"}B). KT is applied from below the patella to the distal femur with an approximate 10% to 15% stretch in both upward directions (Fig. [1](#F1){ref-type="fig"}C). KT is applied from above the patella to the proximal tibia with an approximate 10% to 15% stretch in both downward directions (Fig. [1](#F1){ref-type="fig"}D).^\[[@R12]\]^ Each testing session consisted the following actions: application (or not) of KT from below the patella to the quadriceps and proximal tibia, assessment of walking ability, dynamic balance ability, and pain severity. ![Application of kinesiology taping.](medi-98-e17880-g002){#F1} 2.3. Outcome measurements ------------------------- This study utilized the visual analogue scale (VAS) to assess knee pain during resting and walking phases in 2 conditions (KT and non-KT). Knee pain during the resting state was assessed in the standing position before walking, and pain during gait was assessed immediately after walking. VAS is a scale for assessing pain, ranging from 1 to 10 points (0 points with no pain at all, 10 points with maximum pain). The minimal clinically important difference (MCID) of VAS was reported as 1.2 regardless of the degree of pain.^\[[@R13]\]^ Walking ability was assessed using a 10-m walking test (10MWT). The 10MWT is a measure of one\'s walking ability with an intra-rater and inter-rater reliability correlation coefficient of *r* = 0.95 to 0.96.^\[[@R14]\]^ The 10MWT measured the time required for the participant to walk 10 m on a course that was a total distance of 14 m. Tape, at 2 and 12 m, indicated the start and end of the 10-m walking distance. The first and last 2 m of the course were used for acceleration and deceleration and were not timed. Participants were asked to stand at the 2-m tape line ahead of the 10-m line and then walk at a comfortable pace to the 12-m tape line beyond the 10-m line. The MCID of 10MWT was estimated as 0.05 m/s in older adults.^\[[@R15]\]^ Dynamic balance ability was assessed using a timed up and go test (TUG). TUG is a simple test that can quickly measure mobility and balance with an intra-rater and inter-rater reliability correlation coefficient of *r* = 0.98 to 0.99.^\[[@R16]\]^ TUG measured the time that the subject took to rise from a 46-cm height armchair, walk 3 m, turn around as fast as possible in the direction of the affected side, walk back to the chair, and sit down. Participants were also asked to rise from the chair with a "start" command, walk along the floor line marked 3-m long, turn around on the affected side, and walk back to the chair at a regular speed and sit down. The MCID of TUG for a range of measure in patients with knee OA was estimated as 1.10 seconds.^\[[@R17]\]^ 2.4. Data analysis ------------------ We compared differences in the mean values for KT gait and non-KT gait in participants using a Wilcoxon singed rank test. We used the SPSS software (ver. 18.0 for Windows; SPSS, Chicago, IL). Statistical significance was set at *P* \< .05. 3. Results ========== 3.1. General characteristics of the patient ------------------------------------------- A total of 10 participants participated in the study, and there was no dropout. Therefore, data from these 10 patients were analyzed. The general characteristics of the subjects are shown in Table [2](#T2){ref-type="table"}. The flowchart of the study is shown in Fig. [2](#F2){ref-type="fig"}. ###### Demographic characteristics of the subjects. ![](medi-98-e17880-g003) ![Flow chart of the study.](medi-98-e17880-g004){#F2} 3.2. Pain evaluation -------------------- With respect to the evaluation of pain, the KT condition showed a significant decrease in the VAS score during gait as compared with the non-KT condition (6.40 ± 0.51 vs 5.40 ± 0.69, change: 1.00 ± 0.66, *P* = .008). On the other hand, there was no significant difference between the 2 conditions during resting (4.20 ± 0.63 vs 4.00 ± 0.47, change: 0.20 ± 0.42, *P* = .157) (Fig. [3](#F3){ref-type="fig"}, Table [3](#T3){ref-type="table"}). ![Knee pain evaluation. VAS = visual analog scale.](medi-98-e17880-g005){#F3} ###### Pain evaluation of 2 conditions. ![](medi-98-e17880-g006) 3.3. Gait and balance evaluation -------------------------------- In the evaluation of gait ability, the KT condition showed a statistically significant decrease in the 10MWT score when compared with the non-KT condition (10.46 ± 0.82 vs 9.13 ± 0.96, change: 1.32 ± 0.40, *P* = .005). In terms of balance ability, the KT condition showed a statistically significant decrease in the TUG score as compared with the non-KT condition (11.69 ± 1.23 vs 10.24 ± 1.01, change: 1.44 ± 0.72, *P* = .005) (Fig. [4](#F4){ref-type="fig"}, Table [4](#T4){ref-type="table"}). ![Gait and balance evaluation, 10MWT = 10-m walking test, TUG = timed up and go test.](medi-98-e17880-g007){#F4} ###### Gait and balance evaluation of 2 conditions. ![](medi-98-e17880-g008) 3.4. Side effect according to KT -------------------------------- In this study, no side effects owing to KT were reported specifically. However, 2 of the 10 patients reported discomfort after removing KT. 4. Discussion ============= This study investigated the effect of KT on the pain and gait function in the older adults with knee OA. Knee pain was measured using VAS during resting and gait conditions. The results of this study show that the use of KT is effective in decreasing knee pain in older adults with knee OA during walking. Previous studies have reported that KT has an immediate effect in relieving knee pain in knee OA patients.^\[[@R18]--[@R20]\]^ In particular, these patients experience more pain during walking than in the resting condition; this is called movement-evoked pain.^\[[@R13]\]^ The reduction of movement-evoked pain with KT can be explained by the following reasons. Elasticity of the tape and its application under tension leads to a mobilization of the skin during movement and improves blood and lymph circulation.^\[[@R20],[@R21]\]^ Decrease in pain with the application of the KT is likely due to the stimulation of low-threshold cutaneous mechanoreceptors, located in the joints, muscles, tendons, and skin.^\[[@R12],[@R22]\]^ Stimulation of these mechanoreceptors activates large diameter fibers (e.g., A-beta fibers), which reduces pain transduction along the small nociceptive fibers, namely the C and A-delta fibers, via activation of inhibitory interneurons.^\[[@R23],[@R24]\]^ This mechanism is believed to directly influence pain perception. This study also investigated the effect of KT on walking. As a result, KT showed a significant influence on the gait function (e.g., gait speed, balance) of the older adults with knee OA, suggesting that KT had a positive effect on gait function. Knee OA, is one of the main causes of pain among the older adults while walking. Because knee OA causes knee pain and discomfort, it causes instability and fear during gait. In this study, we evaluated the reduction in pain using VAS, which showed a significant decrease in knee pain during gait. This means that the patients walked with less knee pain, fear, or discomfort as compared with that in the non-KT condition. Therefore, this may have had a positive effect on gait speed or stability. Another reason is that KT supports the knee joint to provide stability and helps activate the associated muscles and improves the range of motion. KT is hypothesized to facilitate a small, immediate increase in muscle strength by producing a concentric pull on the fascia, which may stimulate increased muscle concentration.^\[[@R25]\]^ In this study, KT was designed to increase the stability of the joint by reinforcing the lateral and medial collateral ligaments around the femoral patella of the knee joint. It is presumed that this supports the stability of the joint and positively influences mobility parameters such as strength and range of motion. Previous studies have reported that KT not only increases the stability of joints and soft tissues, but also has a temporary effect in increasing muscle activation or strength and range of motion,^\[[@R4],[@R24]\]^ which supports the results of this study. This study had several limitations. First, it is difficult to generalize the results of this study, because the sample size was small. Second, this study only confirmed the immediate effect of KT on pain and gait function; thus, determining the long-term effect is not possible for pain and gait function and sustained effects on changes or benefits such as swelling, joint movement, and muscle activation. Third, this study evaluated the pain and gait ability during KT and non-KT conditions only; thus, the possibility of placebo effect cannot be ruled out. 5. Conclusion ============= This study confirmed that KT reduces the knee pain during walking in among the older adults with knee OA and is a useful method for improving walking ability. Therefore, we recommend KT as an option applicable to the older adult with knee OA. Author contributions ==================== **Conceptualization:** Jung-Hoon Lee. **Formal analysis:** Na-Kyoung Hwang. **Funding acquisition:** Young-Jin Jung, Gihyoun Lee. **Investigation:** Sang-Hoon Lee, Jung-Hoon Lee. **Methodology:** Ji-Su Park, Jung-Hoon Lee. **Project administration:** Young-Jin Jung, Gihyoun Lee. **Supervision:** Young-Jin Jung, Gihyoun Lee. **Writing -- original draft:** Na-Kyoung Hwang. **Writing -- review & editing:** Ji-Su Park, Taehyung Yoon, Sang-Hoon Lee. Abbreviations: 10MWT = 10-m walking test, KT = kinesiology taping, OA = osteoarthritis, TUG = timed up and go test, VAS = visual analog scale. How to cite this article: Park JS, Yoon T, Lee SH, Na-Kyung H, Jung-Hoon L, Jung YJ, Lee G. Immediate effects of kinesiology tape on the pain and gait function in older adults with knee osteoarthritis. *Medicine*. 2019;98:45(e17880). Y-JJ and GL are co-corresponding authors and contributed equally to this work with GL, and Y-JJ. This work was supported by Dongseo University, "Dongseo Cluster Project" Research Fund of 2019 (DSU-2019002). The authors have no conflicts of interest to disclose.
{ "pile_set_name": "PubMed Central" }
Bharti AXA Life's premium grows 28% in Apr-Dec Bharti AXA Life Insurance, a joint venture between Bharti Enterprises and French insurance major AXA, saw its asset under management grow to Rs 5,264 crore as on December 31, 2018 from Rs 4,215 crore on December 31, 2017. Bharti AXA Life Insurance registered a 28 per cent growth in its total premium to Rs 1,359 crore, Photo: Reuters Private sector Bharti AXA Life Insurance registered a 28 per cent growth in its total premium to Rs 1,359 crore during the nine months to December of the current fiscal, and will focus on tier 2 and 3 cities next year to expand business, a top official said. The company's total premium stood at Rs 1,064 crore in the corresponding period of 2017-18. The new business premium surged by 40 per cent to Rs 617 crore during April-December period of 2018-19, while renewal premium grew by 19 per cent to Rs 742 crore. "We have outgrown the life insurance industry in the first nine months of this fiscal. We are confident of achieving a robust growth by the end of the current financial year," Bharti AXA Life Insurance MD and CEO Vikas Seth said. The company expects to achieve a strong double-digit growth by this fiscal end. The annualised new business premium grew 48 per cent to Rs 422 crore in the first nine months of 2018-19 as against Rs 286 crore in the same period last fiscal. Bharti AXA Life Insurance, a joint venture between Bharti Enterprises and French insurance major AXA, saw its asset under management grow to Rs 5,264 crore as on December 31, 2018 from Rs 4,215 crore on December 31, 2017. The company's new business premium stood at Rs 78.62 crore in February 2019, down by 0.98 per cent from year-ago period, as per data from Insurance Regulatory and Development Authority of India (Irdai). However, the renewal premium grew by 29 per cent to Rs 111 crore during last month from Rs 86 crore in the same period of 2017-18. Its total gross written premium posted a growth of 15 per cent to Rs 190 crore during the month as compared to Rs 165 crore. Seth said the company is focusing on tier 2 and tier 3 cities for its expansion drive in the next financial year with a focus on profitable growth. It added 10,000 insurance advisors and set up 50 new branches across the country in the current financial year as part of its expansion plan. "We plan to create a large pool of productive agents, strengthen our existing advisor base and reach out to every nook and corner of the country. Apart from strengthening our distribution bandwidth, we will also be strengthening our agency model for selling various insurance products and servicing customers efficiently," he added. The company said it would focus on traditional products, agent productivity, cost-efficiency and channel and distribution diversification for pursuing its growth aspirations in times to come.
{ "pile_set_name": "Pile-CC" }
The actions of chloride channel blockers, barbiturates and a benzodiazepine on Caenorhabditis elegans glutamate- and ivermectin-gated chloride channel subunits expressed in Xenopus oocytes. The pharmacology of Caenorhabditis elegans glutamate-gated chloride (GluCl) channels was determined by making intracellular voltage-clamp recordings from Xenopus oocytes expressing GluCl subunits. As previously reported (Cully et al. 1994), GluClalpha1beta responded to glutamate (in a picrotoxin sensitive manner) and ivermectin, while GluClbeta responded only to glutamate and GluClalpha1 only to ivermectin. This assay was used to further investigate the action of chloride channel compounds. The arylaminobenzoate, NPPB, reduced the action of glutamate on the heteromeric GluClalpha1beta channel (IC(50) 6.03 +/- 0.81 microM). The disulphonate stilbene, DNDS, blocked the effect of both glutamate and ivermectin on GluClalpha1beta channels, the action of glutamate on GluClbeta subunits, and the effect of ivermectin on GluClalpha1 subunits (IC(50)s 1.58-3.83 microM). Surprisingly, amobarbital and pentobarbital, otherwise known as positive allosteric modulators of ligand-gated chloride channels, acted as antagonists. Both compounds reduced the action of glutamate on the GluClalpha1beta heteromer (IC(50)s of 2.04 +/- 0.5 and 17.56 +/- 2.16 microM, respectively). Pentobarbital reduced the action of glutamate on the GluClbeta homomeric subunit with an IC(50) of 0.59 +/- 0.09 microM, while reducing the responses to ivermectin on both GluClalpha1beta and GluClalpha1 with IC(50)s of 8.7 +/- 0.5 and 12.9 +/- 2.5 microM, respectively. For all the antagonists, the mechanism is apparently non-competitive. The benzodiazepine, flurazepam had no apparent effect on these glutamate- and ivermectin-gated chloride channel subunits. Thus, arylaminobenzoates, disulphonate stilbenes, and barbiturates are non-competitive antagonists of C. elegans GluCl channels.
{ "pile_set_name": "PubMed Abstracts" }
Assessing working memory and language comprehension in Alzheimer's disease. Studies of language impairments in patients with Alzheimer's disease have often assumed that impairments in linguistic working memory underlie comprehension deficits. Assessment of this hypothesis has been hindered both by vagueness of key terms such as "working memory" and by limitations of available working memory tasks, in that many such tasks either seem to have little relationship to language comprehension or are too confusing or difficult for Alzheimer's patients. Four experiments investigated the usefulness of digit ordering, a new task assessing linguistic working memory and/or language processing skill, in normal adults and patients with probable Alzheimer's disease. The digit ordering task was shown to be strongly correlated with the degree of dementia in Alzheimer's patients. The task correlated with measures of language processing on which patients and normal controls performed differently. The results are interpreted as indicating that linguistic representations, linguistic processing, and linguistic working memory are intertwined, such that a deficit of one (e.g., working memory) cannot be said to "cause" a deficit in the other. The implications of this approach are explored in terms of task demands in comprehension and memory measures, and interpretation of previous results in the literature.
{ "pile_set_name": "PubMed Abstracts" }
tag:blogger.com,1999:blog-4023204082711630211.post1860385371365882218..comments2019-09-15T12:48:40.804+01:00Comments on Tasker Dunham's Yorkshire Memories: Brendan and the Shared HouseTasker Dunhamhttp://www.blogger.com/profile/17634612033217902946noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-4023204082711630211.post-9255029627288338792019-02-05T10:12:22.330+00:002019-02-05T10:12:22.330+00:00Thanks for reading. Maybe that kind of house share...Thanks for reading. Maybe that kind of house share was of its time. We&#39;d sit looking at our phones all the time now. Tasker Dunhamhttps://www.blogger.com/profile/17634612033217902946noreply@blogger.comtag:blogger.com,1999:blog-4023204082711630211.post-15333261733425424312019-02-05T07:13:56.826+00:002019-02-05T07:13:56.826+00:00You seem to be my age and I could have been readin...You seem to be my age and I could have been reading about my house shares and friends and conversations except I&#39;m female. I even went to university late too, 1978.Rachel Phillipshttps://www.blogger.com/profile/16053924416805878169noreply@blogger.comtag:blogger.com,1999:blog-4023204082711630211.post-59238657781320570892019-02-03T21:06:56.571+00:002019-02-03T21:06:56.571+00:00Thanks John. If there&#39;s a moral I suppose it i...Thanks John. If there&#39;s a moral I suppose it is that we shouldn&#39;t assume friends will always be there. Tasker Dunhamhttps://www.blogger.com/profile/17634612033217902946noreply@blogger.comtag:blogger.com,1999:blog-4023204082711630211.post-79426906725031036612019-02-03T20:49:45.626+00:002019-02-03T20:49:45.626+00:00I love this slightly melancholic post . Nicely wr...I love this slightly melancholic post . Nicely written John Grayhttps://www.blogger.com/profile/14958171262765033946noreply@blogger.com
{ "pile_set_name": "Pile-CC" }
Bisphosphonates can reduce bone hunger after parathyroidectomy in patients with primary hyperparathyroidism and osteitis fibrosa cystica. To assess the effect of bisphosphonates on post-parathyroidectomy hypocalcemia in patients with osteitis fibrosa cystica. Review of the medical records of six patients using bisphosphonates preoperatively. Mean age was 35.6 ± 10.5 years; serum calcium = 13.51 + 0.87 mg/dL; iPTH = 1,389 + 609 pg/mL. The mean value of urine deoxypyridinoline (UDPD) of three patients was 131 ± 183 nmol/mmol Cr, and of C-telopeptide (CTX), 2,253 ± 1,587 pg/mL. The mean values of bone densitometry (T score) were as follows: 0.673 ± 0.150 g/cm(2) (-4.42 ± 1.23) in lumbar spine (L2-L4); 0.456 ± 0.149 g/cm(2) (-5.58 ± 1.79) in the femoral neck; and 0.316 ± 0.055 g/cm(2) (-5.85 ± 0.53) in radius 33. Patient 1 received oral alendronate, 30 mg/day for four weeks; his calcium decreased from 14 to 11.6 mg/dL, and his UDPD from 342 to 160 nmol/mmol Cr. Patient 2 received oral alendronate, 20 mg/day for six weeks; his calcium decreased from 14 to 11.0 mg/dL and his UDPD from 28.8 to 14 nmol/mmol Cr. Patient 3 received intravenous pamidronate, 90 mg prior to surgery. Patient 4 received oral alendronate, 140 mg/week for six weeks; her calcium decreased from 13.7 to 12.3 mg/dL and her CTX from 2,160 to 1,340 pg/mL. Patient 5 received oral alendronate, 140 mg/ week for six weeks; her calcium levels dropped from 14.3 to 14.1 mg/dL; her CTX did not change. Patient 6 received ibandronate, 150 mg, ten days prior to surgery; his CTX reduced by 62%. No patient developed severe hypocalcemia in the first postoperative week. One year after surgery, the mean gain in bone mineral density was 40% ± 29% in L2-L4, 86 ± 39% in the femoral neck, and 22% ± 11% in radius 33. The preoperative use of bisphosphonates seems to attenuate bone hunger without preventing a significant increase in bone mass in the follow-up of parathyroidectomy.
{ "pile_set_name": "PubMed Abstracts" }
Dr. Mütter's Marvels: A True Tale Of Intrigue And Innovation At The Dawn Of Modern Medicine Dr. Mütter's Marvels: A True Tale Of Intrigue And Innovation At The Dawn Of Modern Medicine A A Dr. Mütter's Marvels: A True Tale Of Intrigue And Innovation At The Dawn Of Modern Medicine Author Cristin O'Keefe Aptowicz Publisher Gotham Books Dr. Mütter’s Marvels invariably invites comparisons to Erik Larson’s popular 2003 book, Devil In The White City. Author Cristin O’Keefe Aptowicz, also an award-winning poet, draws from the same narrative non-fiction tradition that Larson did, but where Devil In The White City forced a thriller out of dual storylines, Aptowicz forges a more natural narrative out of 15 years of research about a man who changed modern medicine. Advertisement Dr. Thomas Mütter is probably best known to contemporary readers by way of his namesake museum in Philadelphia, which houses the many medical oddities the doctor collected during his years as a surgeon. Aptowicz shuns easy sensationalism and focuses on the real stories: the man himself, why he became so interested in these oddities, and how he shaped modern medicine, from plastic surgery to doctor-patient relationships to a then-new belief in pre- and post-surgical care. Though the biographical portrait of the colorful and flamboyant surgeon—he apparently had quite expensive taste in fashionable clothing, even as a child, and as an adult, he became known for his theatrical medical lectures—is moving enough, it’s the details surrounding his life that prove most interesting. Mütter’s medical practice grew out of unfortunate circumstances: In the mid-1800s, factory work was unregulated and dangerous, often leaving workers with chemically derived disfigurements (look up phossy jaw if you must), and women worked in open-fire kitchens wearing layers upon layers of clothing; when the inevitable happened, the women were left with grotesque deformities on top of their burned skin. In these workers, Mütter found patients whose willingness for surgical experimentation revealed their agonized desperation—and formed the basis for his practice. Seeking the people nobody else would treat, and offering them the risky surgeries nobody else would attempt, Mütter brought a then-unprecedented empathy to medicine on top of creating new surgical techniques. He began practicing medicine before it was regulated, and before medical anesthesia had even been discovered. (The Knick, for comparison’s sake, takes place about 60 years later, when germ theory was firmly established but no gloves were used during surgery; the technique described in episode three, though never mentioned by name, is the Mütter flap). Aptowicz examines these details with a historian’s eye but a poet’s touch, resulting in a narrative that’s compelling but not hyperbolic. Aptowicz is refreshingly careful with her language, keeping the narrative speculation to a minimum, painting most of her scenery with the weight of her research. She revels in the details, but largely lets the reader draw their own conclusions. The result is an approachable history of a man and of a time period that does exactly what narrative non-fiction should do: answers the questions the reader never realized they had.
{ "pile_set_name": "Pile-CC" }
197 P.3d 27 (2008) 224 Or. App. 45 MOUNTAIN HIGH HOMEOWNERS ASSOCIATION, INC., an Oregon nonprofit corporation, Plaintiff-Respondent, Cross-Appellant, v. Sharon Mitchell JEWETT, Defendant-Appellant, Cross-Respondent. 05CV0341ST; A132919. Court of Appeals of Oregon. Submitted May 2, 2008. Decided November 19, 2008. *28 Sharon Mitchell Jewett, filed the briefs pro se. Gerald A. Martin, Bend, and Francis Hansen & Martin, LLP, filed the brief for respondent-cross-appellant. Before WOLLHEIM, Presiding Judge, and BREWER, Chief Judge, and SERCOMBE, Judge.[*] WOLLHEIM, J. Defendant appeals a general judgment granting plaintiff declaratory and injunctive relief and dismissing defendant's counterclaims. The judgment was entered following the trial court's granting of plaintiff's motion for summary judgment and denial of defendant's cross-motion for summary judgment. The judgment declared, among other things, that documents recorded by plaintiff—and not those recorded by defendant—are the governing documents for the lots in the planned community governed by plaintiff, a homeowners association. Plaintiff cross-appeals, assigning error to the trial court's failure to award attorney fees. We affirm on the appeal without discussion. On the cross-appeal, we reverse and remand. Plaintiff is the homeowners association for a planned community of several subdivisions that consolidated in 1999. Also in 1999, plaintiff recorded with the Deschutes County Clerk several amended declarations of covenants, conditions, and restrictions that incorporated a number of separate planned community associations into a single planned community association, plaintiff Mountain High Homeowners Association, Inc. The third amended declaration (the Amended CCR) incorporated the planned community association formerly known as Willow Creek. In 2000, defendant purchased real property within the planned community formerly known as Willow Creek. At that time, defendant did not discover that her property was subject to the Amended CCR, and she later contested her obligations to pay plaintiff's assessments on her property as required by the Amended CCR. On June 3, 2005, defendant recorded a document entitled Restatement (Willow Creek Restatement) with the Deschutes County clerk. The Willow Creek Restatement states, "This Restatement of Willow Creek Association's Conditions, Covenants, Restrictions and Resolutions (Book) are the governing documents for the Willow Creek Association at Mountain High Homeowner's Association from and after September 20, 1989." *29 Later that same month, plaintiff commenced this proceeding. Plaintiff asserted that the Amended CCR was properly recorded and is the governing document for Mountain High Homeowners Association, Inc., including defendant's property. Plaintiff also complained that the Willow Creek Restatement is "a nullity pursuant to the provisions of ORS Chapter 94" because "(a) The document does not recite that it was approved by 75% of all of the owners eligible to vote.[[1]] "(b) It does not provide, as required by ORS 94.590(6)(b), that the Board of Directors adopted the resolution and is causing the declaration to be restated. "(c) It does not contain, as required by ORS 94.590(6)(d), a certification by the President and Secretary of the Association that the restated declaration included all previously adopted amendments in effect. "(d) It was not executed and acknowledged by the President and Secretary of the Association as required by ORS 94.590(6)(e)." Plaintiff sought a declaration that the Amended CCR is the governing instrument for the consolidated planned community, a declaration that the Willow Creek Restatement is a nullity, and injunctive relief enjoining defendant from recording additional documents with the county clerk that did not comply with the Amended CCR and with the provisions of ORS chapter 94. In addition, plaintiff sought an award of reasonable attorney fees pursuant to ORS 94.719 and ORS 94.780. Defendant counterclaimed for, among other things, a declaration recognizing that the Willow Creek Restatement is the governing instrument of the Willow Creek planned community and for tort remedies. Both parties moved for summary judgment. Plaintiff reiterated, in support of its motion for summary judgment, that the Willow Creek Restatement "is a nullity because it does not comply with the requirements of ORS 94.590(6)." After considering the motions, the trial court granted plaintiff's motion on all of its claims, denied defendant's motion on her counterclaims, and invited plaintiff to submit a statement for attorney fees pursuant to ORCP 68. Plaintiff submitted a statement for an award of attorney fees, relying on ORS 94.719 and ORS 94.780 as authorizing the award of attorney fees to plaintiff. Defendant did not file an objection. The trial court signed a general judgment granting plaintiff's requested declaratory and injunctive relief and dismissing defendant's counterclaims, but declining to award plaintiff any attorney fees. In the judgment, the trial court stated that the Willow Creek Restatement is a nullity because it was "not duly adopted pursuant to the requirements of the Mountain High Declarations of Covenants, Conditions and Restrictions as amended or the applicable provisions of ORS Chapter 94." On cross-appeal, plaintiff argues that the trial court erred by failing to award it attorney fees pursuant to ORS 94.719 and ORS 94.780. We review a party's entitlement to attorney fees as a question of law. Lumbermen's v. Dakota Ventures, 157 Or. App. 370, 374, 971 P.2d 430 (1998). The prevailing party in a proceeding is entitled to attorney fees only if the award is authorized by statute or contract. Domingo v. Anderson, 325 Or. 385, 388, 938 P.2d 206 (1997). In this case, plaintiff claims an entitlement to attorney fees based on ORS 94.719 and ORS 94.780. We begin with ORS 94.719, which provides, in part, that "in any suit or action brought by the declarant, the association or any owner or class of owners to enforce compliance with the terms and provisions of ORS 94.550 to 94.783 or the declaration or bylaws, including all amendments and supplements thereto or any rules or regulations adopted by the association, the prevailing party shall be entitled to recover reasonable attorney fees therein and in any appeal therefrom." Thus, the prevailing party in any action brought by an association to enforce compliance *30 with the terms and provisions of ORS 94.550 to 94.783 is entitled to recover reasonable attorney fees. There is no dispute that plaintiff prevailed in this action or that plaintiff, a homeowners association, is an "association" as that term is used in ORS 94.719. See ORS 94.550(13) (defining "association"). The remaining issue is whether plaintiff's action was brought to enforce compliance with the relevant statutory provisions. Plaintiff's complaint sought a declaration that the Willow Creek Restatement is a nullity because defendant violated various provisions of ORS 94.590 when she recorded the Willow Creek Restatement with the county clerk. Plaintiff reiterated that argument in its motion for summary judgment. In granting plaintiff's motion, the trial court determined that, as a matter of law, defendant's filing violated the provisions of ORS 94.590, and plaintiff was entitled to declaratory relief to enforce the provisions of ORS 94.590. As stated above, we affirm the trial court's granting of plaintiff's motion for summary judgment and denial of defendant's cross-motion for summary judgment without discussion. Because plaintiff is a prevailing party in an action brought by an association to enforce compliance with the terms and provisions of ORS 94.590, ORS 94.719 establishes that plaintiff "shall be entitled to recover reasonable attorney fees." The text of ORS 94.719 requires an award of reasonable attorney fees to plaintiff, and the trial court erred by not awarding plaintiff its reasonable attorney fees. We therefore do not consider whether ORS 94.780 also authorizes an award of reasonable attorney fees. We reverse the general judgment, remand for consideration of the amount of plaintiff's reasonable attorney fees, and otherwise affirm. On appeal, affirmed; on cross-appeal, judgment reversed and remanded as to attorney fees, otherwise affirmed. NOTES [*] Brewer, C.J., vice Edmonds, P.J. [1] ORS 94.590(1)(a) provides that declarations may be amended "only with the approval of owners representing at least 75 percent of the total votes in the planned community or any larger percentage specified in the declaration."
{ "pile_set_name": "FreeLaw" }
Probably the greatest letdown yet for the traditional Holocaust school of thought came during the second week of the Irving vs. Lipstadt libel trial, currently underway in London. While many prominent defenders of the usual story had predicted that Irving would be forced to concede that he was wrong, and that Holocaust Revisionism would be exposed as a "sham," nothing of the kind occurred. In fact, when the world's leading authority on Auschwitz, Robert Jan van Pelt appeared, he was not able to prove the dubious proposition that about one million people had been gassed and cremated at that most notorious concentration camp. Instead, van Pelt was reduced to making the following bizarre claim: We may assert as moral certainty the statement that Auschwitz was an extermination camp where the Germans killed around one million people with the help of gas chambers, and where they incinerated their remains in crematoria ovens. Of course, a "moral" certainty is not a normal certainty. Indeed, we are inclined to regard a "moral certainty" as a "less than certainty" that requires a little moral support. After all, the Law of Gravity is not a "moral certainty," it just is. Dr. Johnson refuted Bishop Berkeley's claim about the unreality of matter by kicking a stone. He did not do so by appealing to the stone's conscience. So the long-awaited proof that van Pelt offered to the court in London requires a little explanation, not least because his explanation, in our view, harbingers not moral certainty, but the certainty of future evil. To clarify why this is so, we have to put van Pelt's appeal to faith in context. For the first fifteen years after World War Two, there was little heard about the Nazi camps, or mass gassings, or anything else. It was generally agreed that millions died in the camps, but there was no systematic discussion of the matter. All of this changed in the 1960's, first, with the publication of two books, William L. Shirer's Rise and Fall of the Third Reich and Raul Hilberg's Destruction of the European Jews. These books had a certain amount of impact, because they repeated, albeit selectively, some of the more gruesome claims made at the Nuremberg Trials. Far more important than either of these books however was the trial of Adolf Eichmann in 1961, and especially the propaganda associated with the Six-Day War in 1967. For the first time, we began to get a differentiated picture of the German atrocities, and one which focused almost completely on the fate of the Jewish people: it was here that we began to get the "Holocaust" that we have come to know and love. It is important to note here that prior to the 1970s, historians rarely spoke in any detail about the Nazi atrocities, save to make a few comments about "millions" or possibly a passing reference to "gas ovens." Since that time such comments, expanded with grisly detail and ideological content, have become almost ritualistic. This is the context in which modern Holocaust revisionism actually arose. Two of the original proponents, Robert Faurisson and Arthur R. Butz, simply took the received Holocaust claims and subjected them to standard historical analysis to see how well they stood up. The claims did not stand well; hence, the demonizing of revisionism began then. But the empirical analysis of Butz, and particularly Faurisson, set the stage for empirical, on-site archaeological and forensic analyses which, by the end of the 1980s, had cast severe doubts on the veracity of Holocaust claims pertaining to mass gassing at precisely the time when such claims began to dominate public discussion. It was in order to salvage the traditional story that the Beate Klarsfeld Foundation published in 1989 a lengthy book by the Frenchman, Jean Claude Pressac, who attempted to prove the mass gassings simply on a documentary and physical basis. However, the problem with Pressac's study is that he was not able to prove the existence of gas chambers at all, he could only suggest it, based on a tortured reading of the remaining documents and on what he called "criminal traces" for the existence of gas chambers. Judging by the content of his previous work, as well as his associations, it would probably be fair to characterize Robert Jan van Pelt as a protégé of Pressac. What he has tried to do in his writings as well as in his expert opinion is to prove that the mass gassings took place more or less as tradition has decreed and more or less on the basis of documents, rather than testimony. But van Pelt's expert report offers a big surprise. In the 330 pages of the report devoted to proving the mass gassing claim, 300 of these pages simply repeat some of the earliest propaganda claims. To be sure, van Pelt makes a few half-hearted gestures in arguing that these early stories "corroborate" each other, but in fact the arguments for "independent corroboration" are groundless. Then, when he turns to the documentary record, van Pelt, like his predecessors, can find no specific references to gassing, no blueprints or architectural drawings that point to the construction of gas chambers, no proof of architectural modifications or even the fitting of the holes and wire mesh columns, all of which are vital to the legendary interpretation. Instead, he offers only a few ambiguous documents and a "moral certainty." And where does van Pelt find "moral certainty? He finds it in the writings of John Wilkins, whose Of the Principles and Duties of Natural Religion from 1675 is one of the classics of" natural religion," a philosophical and theological school that seeks to prove the existence of God, Providence, and thus adherence to the Scriptures on the basis of design in Nature, or, if you prefer, "criminal traces" of the existence of supernatural entities. Let's be clear about what we are saying here, and about what van Pelt is saying here. Religious truth exists for any believer, and no one should have any qualms about that. But at the same time, we recognize that the truths of faith should be restricted to communities of believers; that's one of the reasons why the United States makes a distinction between Church and State. It should also be added that many Jewish groups, and particularly the ADL, have been quite adamant in insisting on the strict separation of sectarian beliefs ("Church") from practically any public, political, or social manifestation ("State"). Van Pelt's "moral certainty" is not only self-consciously based on, but deliberately models, a highly sectarian belief system, which, since it cannot be proved outside of a moral context, can be either accepted or rejected by a rational mind. Therefore, if such a "moral certainty" is used, either for purposes of pleading justification for libel, or for purposes of institutionalizing it as a universal truth, it is violating the right of citizens to reject this truth. It is even more pernicious than that. By definition, the flip side of a "moral certainty" is an "immoral doubt." What this means is that anyone who fails to accept the certainty being offered runs the risk of being ostracized and marginalized as "immoral" simply because they cannot or will not accept the truth of something which someone else believes. This opens the door for persecution, and further libel: after all, if someone is immoral, why should we care about them? Despite the common assurances that "You can't legislate morality," the fact is that once something is defined in the social context as immoral, eventually it becomes criminal as well. There's no real mystery to this, in the sense that legislation is frequently just a way to memorialize our own prejudices. Hence, if we accept the equation of doubt with immorality in this particular case, we are well down the slippery slope that will lead to the eventual criminalization of anyone who is unlucky enough to entertain doubts about the Holocaust story, however the moral certainties of this story are retailed by the then reigning academic experts. But this crime will be unlike other crimes. We can accept that societies will from time to time decide that certain actions must be deemed unlawful. Some of these laws may be problematic, or involve unacceptable interference in the private lives of individuals: prohibition of alcohol, drug use, prostitution, and abortion come to mind as examples. The rights and wrongs of these can be debated, but they all involve actions; not simply words, but deeds. But the foreseen violation of the "moral certainty" of Auschwitz will not involve any action that could conceivably be considered threatening. It would involve nothing more than the mental inability to accept as truth that which your betters insist is the truth. In other words, accepting the idea of the "moral certainty" of mass gassings at Auschwitz will eventually lead to a new species of violation,—criminal acts that happen inside your head. George Orwell had a name for it: Thoughtcrime.
{ "pile_set_name": "Pile-CC" }
Q: how to create dynamic menu with sub-menu with php & mysql I want to have a dynamic menu that feeds from a table using php and mysql. My table looks like this: sec_id sec_name sec_group 1 section 1 group 1 2 section 2 group 1 3 section 3 group 2 4 section 4 group 1 5 section 5 group 3 I can do a query to get and display unique sec_group values but can't figure out a way to include sec_name into each sec_group //Query by unique sec_group $qry_secs="SELECT DISTINCT sec_group FROM tbl_user_sec ORDER BY sec_id ASC"; $result_secs = mysql_query($qry_secs); //echo values while($row_secs = mysql_fetch_assoc($result_secs)){ echo '<ul><li><a href="#">'.$row_secs['sec_group'].'</a></li></ul>'; } Eventually, the HTML should like the code below. <ul> <li><a href="#">Group 1</a> <ul> <li><a href="#">Section 1</a></li> <li><a href="#">Section 2</a></li> <li><a href="#">Section 4</a></li> </ul> </li> <li><a href="#">Group 2</a> <ul> <li><a href="#">Section 3</a></li> </ul> </li> <li><a href="#">Group 3</a> <ul> <li><a href="#">Section 5</a></li> </ul> </li> </ul> any ideas? A: $q = mysql_query("SELECT sec_id, sec_name, sec_group FROM tbl_user_sec ORDER BY sec_id"); // prepare data $groups = Array(); while($w = mysql_fetch_assoc($q)) { if(!isset($groups[$w['sec_group']])) $groups[$w['sec_group']] = Array(); $groups[$w['sec_group']][] = $w; } // display data echo "<ul>"; foreach($groups as $group_name => $sections) { echo '<li><a href="#">'.$group_name.'</a><ul>'; foreach($sections as $section) { echo '<li><a href="#">'.$section['sec_name'].'</a>'; } echo '</ul></li>'; } echo "</ul>"; There is another solution if you don't care about sorting result by sec_id
{ "pile_set_name": "StackExchange" }
Dr. Leonard Shlain, the San Francisco surgeon who was a pioneer in the use of laparoscopic surgery and later wrote three best-selling books combining anthropology, science and art, died May 11 in San Francisco. He was 71 and had been battling brain cancer for two years. Dr. Shlain was “a remarkably innovative surgeon “… who led the way in pioneering new and innovative surgical therapies,” said Dr. Damian Augustyn, chief of staff at California Pacific Medical Center, where Dr. Shlain spent most of his career. Dr. Shlain was among the first to apply laparoscopic techniques — in which surgery is performed through three tiny incisions in the stomach wall, using a tiny video camera and remotely operated instruments — to the removal of gallbladders and the repair of hernias. He patented several instruments for use in the surgeries and flew around the world to teach his techniques to fellow surgeons. But he is probably better known for his three books, which are routinely used in college courses: “Art & Physics,” “Alphabet vs. The Goddess” and “Sex, Time and Power.” His fourth book, “Leonardo’s Brain” about Leonardo da Vinci, will be published next spring. “Art & Physics” draws parallels between the development of realistic paintings and the scientific revolution of the past few centuries. “Alphabet vs. The Goddess” espoused his controversial theory that the development of writing led to the dominance of men over women. Pop singer Björk credited this book as the inspiration for her recent album, “Wanderlust.” The third book, “Sex, Time and Power,” speculated that prehistoric women’s growing recognition of the dangers of child birth played a crucial role in the development of language. Dr. Shlain posited that women began to withhold sex because of the risk, but that they developed a culture in which sex was traded to men for meat, which replaced the iron they lost through menstruation. Men developed and refined language, he said, in their efforts to persuade women to go to bed with them. In a 1991 interview, Dr. Shlain said he began collecting his ideas to fill in gaps in his education. “I had early acceptance to medical school and quickly went into residency. I arrived at the middle of my life feeling I had holes in my experience. “I also found it strange that I couldn’t explain why works of art were great, even when I knew they were.” He started out by giving lectures to doctors, art gallery patrons and others, using their interest or lack of it as a guide to assembling his own ideas about overlaps between various cultural totems. “What I am trying to do is show that we should integrate our knowledge more,” he said. His books were frequently criticized by reviewers and experts in the fields he wrote about. In a 2008 interview, he suggested that he didn’t really care, noting that all the books were best-sellers. Dr. Shlain is survived by his second wife, Ina Gyemant, a retired San Francisco Superior Court judge; a son, Jordan of Ross, Calif.; two daughters, Tiffany Shlain of Mill Valley, and Kimberly Brooks of Los Angeles; two stepchildren, Anne Gyemant Paris of Brussels, Belgium, and Roberto Gyemant Jr. of Mill Valley; a brother, Marvin, of Michigan; a sister, Sylvia Goldstick of Florida; and nine grandchildren.
{ "pile_set_name": "Pile-CC" }
Related News The 11th U.S. Circuit Court of Appeals on Monday issued an order denying the state's petition for a full court hearing. A three-judge panel of the 11th Circuit in August left in place a lower court injunction that blocks part of Georgia's law making it illegal for someone to knowingly harbor or transport an illegal immigrant during the commission of a crime. A federal appeals court in Atlanta has denied requests by Georgia and Alabama to delay action on legal challenges to their tough new laws targeting illegal immigration pending the outcome of a U.S. Supreme Court decision on a similar challenge to Arizona's immigration law.
{ "pile_set_name": "Pile-CC" }
Q: What OpenGL functions modify vertex positions prior to the vertex shader? Let's say there's a color render texture that is 1000 px wide, 500 px tall. And I draw a quad with vertices at the four corners (-1, -1, 0), (1, -1, 0), (-1, 1, 0), (1, 1, 0) to it without any transformation in the vertex shader. Will this always cover the entire texture's surface by default, assuming no other other GL functions prior to this sole draw command were called? What OpenGL functions (that modify vertex positions) could cause this quad to no longer fill the screen? (I'm trying to understand how vertices can be messed with prior to the vertex shader, so I can avoid or use the right functions to always map them so NDC (-1, -1) to (1, 1) represents the entire surface). edit: If the positions are not altered, then I'm also wondering how their mapping to a render buffer might be modified prior to the vertex shader. For instance, will (-1, -1, 0) reliably refer to a fragment at the bottom-left of the render buffer, (0, 0, 0) to the middle, and (1, 1, 0) to the top-right? A: Nothing happens to vertex data "prior to the vertex shader". Nothing can happen to it, because OpenGL doesn't know what the vertex attributes mean. It doesn't know what attribute 2 refers to; it doesn't know what is a position, normal, texture coordinate or anything. As far as OpenGL is concerned, it's all just data. What gives that data meaning is your vertex shader. And only in the way defined by your vertex shader. Data from buffer objects are read in accord with the format specified by your VAO, and are given to the vertex shader invocations which process those vertices.
{ "pile_set_name": "StackExchange" }
1. Field of the Invention The present invention relates to a portable computer, and more particularly, to a cooling apparatus for use in a portable computer for releasing heat generated in the portable computer to the outside. 2. Description of the Related Art Portable computers are devices, including notebook computers, tablet computers and the like, which can be used while users carry them. In the present invention, a notebook computer is used as an example of the portable computer. FIG. 10 shows a perspective view of an external appearance of a general notebook computer. As shown in this figure, the notebook computer 1 is mainly composed of a main body 3 and a display unit 5. The display unit 5 generally includes a display 6 made of a liquid crystal panel and is connected to a rear end of the main body 3 so as to come into close contact with or to be unfolded from a top surface of the main body 3. Both the main body 3 and the display unit 5 generally have a flat hexahedral shape. A keyboard 7 is provided on the top surface of the main body 3. A vent 9 for releasing heat generated in the main body to the outside is formed at one side of the main body 3. That is, an air stream containing the heat generated in the main body 3 is discharged to the outside through the vent 9. As illustrated in FIG. 11, a main board 10 is installed within the main body 3. A microprocessor (CPU) 11 is mounted onto the main board 10. The microprocessor 11 controls the processing works such as command analysis, data operation and data comparison. A cooling fan unit 12 is installed within the main body 3 to release heat generated in the microprocessor 11 to the outside. The cooling fan unit 12 creates an air stream by using a cooling fan 14 installed in a fan housing 13. The fan housing 13 is in thermal contact with the microprocessor 11, and the air stream created by the cooling fan 14 flows toward the vent 9 along one side of the fan housing 13. A cooling fin unit 15 is installed between the vent 9 and the fan housing 13. The cooling fin unit 15 is configured to allow the air stream to pass therethrough. Further, a heat pipe 16 is used to transfer the heat generated from the microprocessor 11 to the cooling fin unit 15. The heat pipe 16 extends from one side of the fan housing 13 installed on the microprocessor 11 to the cooling fin unit 15. Furthermore, a plurality of chips 18 are mounted onto the main board 10. To easily release the heat generated from the chips 18, a cooling plate 19 is installed to come into thermal contact with the chips 18. The cooling plate 19 may be made of an aluminum or copper plate and serves to receive heat generated in the chips through heat conduction and to release the received heat to the outside. However, the aforementioned prior art has the following problems: The system for cooling the interior of the main body 3 has been heretofore focused onto the microprocessor 11. However, the heat generated in the chips 18 has become considerable, as the performance of the notebook computer is improved. Therefore, if the release of heat generated from the chips 18 depends only on the heat conduction through the cooling plate 19, the heat release performance of the main body 3 is greatly reduced and the surface temperature of the main body 3 is thus excessively increased. FIG. 12 shows the heat release performance of various component parts, installed within the main body 3, when the main body 3 is cooled using a conventional cooling mode. In this graph, bars, indicated by dotted lines, represent prescribed values, whereas bars, indicated by solid lines, represent actually measured values.
{ "pile_set_name": "USPTO Backgrounds" }
--- abstract: 'In recent years significant efforts have been made to design and fabricate functional nanomaterials for biomedical applications based on the control of light matter interaction at the nanometer scale. Among many other artificial materials, hyperbolic dispersion metamaterials allow to access unprecedented physical effects and mechanisms due to the extreme anisotropy of their optical constants. The unbound isofrequency surface of hyperbolic metamaterials (HMMs) enable the possibility to support a virtually infinite density of states and ultra-high confinement of electromagnetic fields, allowing perfect absorption of light and extreme sensing properties. Optical sensor technology based on plasmonic metamaterials offers significant opportunities in the field of clinical diagnostics, particularly for the detection of low-molecular-weight biomolecules in highly diluted solutions. In this context, we present a computational effort to engineer a biosensing platform based on hyperbolic metamaterials, supporting highly confined bulk plasmon modes integrated with out-of-plane chiral metasurfaces. The role of the helicoidal chiral metasurface is manifold: i) as a diffractive element to increase the momentum of the incoming light to excite the plasmon sensing modes with linearly and circularly polarized light; ii) as out-of-plane extended sensing surface to capture target analytes away from the substrate thereby the diffusion limit; iii) as a plamonic chiral nanostructure with enhanced sensing performance over circularly polarized reflectance light.' author: - Giovanna Palermo - 'Giuseppe E. Lio' - Marco Esposito - Loredana Ricciardi - Mariachiara Manoccio - Vittorianna Tasco - Adriana Passaseo - Antonio De Luca - Giuseppe Strangi bibliography: - 'Helix\_sensing.bib' - 'Helix\_sensing.bib' title: Biomolecular sensing at the interface between chiral metasurfaces and hyperbolic metamaterials --- In the fight against cancer it is essential to diagnose the disease at an early stage. To date, one of the most widely used methods for the diagnosis and staging of the disease is represented by the tissue biopsy. However, this clinical exam is invasive and it is performed when the site of the tumor has already been identified. In contrast, liquid biopsy has proved to be a valid alternative to detect and monitor cancer biomarkers. [@joosse2013biologic; @palmirotta2018liquid; @cohen2018detection; @gorgannezhad2018circulating; @mattox2019applications; @lim2019liquid] For this reason, researchers are focused to develop extremely sensitive platforms, able to determine specific nucleic acids and proteins in circulating tumor cells (CTCs), in body fluids as blood, urine, sweat and tears. To the present, several investigation techniques have been developed to identify for example the presence of proteins in the blood by means of an electrochemical analysis,[@leca2005biosensors] or in saliva by means of electrochemical immunoassay biosensors. [@corrie2015blood] Optical sensor technology based on plasmonic metamaterials offers significant opportunities in the field of clinical diagnosis, particularly for the detection of low-molecular weight biomolecules in highly diluted solutions.[@sreekanth2016extreme; @baqir2018nanoscale; @sreekanth2016biosensing] Hyperbolic metamaterials (HMMs) represent a novel class of promising artificial plasmonic materials used in the field of bio-sensing, supporting highly confined bulk plasmon polaritons (BPPs) in addition to surface plasmon polaritons (SPPs).[@poddubny2013hyperbolic; @ferrari2015hyperbolic; @shekhar2014strong; @shekhar2014hyperbolic] It has been experimentally demonstrated that it is possible to excite both surface and bulk plasmon polaritons in HMM by means of a hypergrating, consisting of 1D and 2D metallic diffraction gratings, such as stripes, disk or holes gratings.[@sreekanth2013experimental] However, further sensing properties could be reached by engineering the hypergrating features towards the realization of a high sensitivity and high accuracy biosensing platform. Here, we report, for the first time, a numerical simulation of a new biosensing platform based on HMMs integrated with an out-of-plane 3D chiral metasurface hypergrating (CMH), where the fundamental building block is represented by a helical shaped nanostructure. In particular, the implementation of 3D metallic grating could enable the excitation of the high-k modes of the underlying HMM and reduce the diffusion limit by the detection of molecules that do not necessarily flows close to the surface. Moreover, the strong intrinsic chirality belonging to plasmonic nanohelices induces circular polarization dependent BPP mode excitation, resulting in a giant circular dichroism value (CD), boosting the sensing properties of the system. We demonstrate that our advanced biosensing platform exhibits extremely high sensing properties since it takes advantages of the elevated sensitivity of the HMM bulk modes (high Q factor) and the significant accuracy of the circular dichroism (CD) signal of the CMH that exhibits more spectral features to track the environment changes. Moreover, considering the increased out-of-plane surface of the 3D nanohelices, able to that interact with analyte targets, we have introduced the mass sensitivity as analytical figure of merit, that describes the surface coverage-refractive index variation relationship. We have calculated that the minimum quantity of binding analyte that can leads to an appreciable variation in terms of refractive index unit (RIU) results equal to 0.04 pg/mm$^2$. Similarly, we carried out a study of the analyte diffusion calculating the sensitivity changes as a function of the relative surface coverage, at different distance away from the HMM surface, noting that our system allows to detect analytes over the diffusion limit of planar hypergrating. Finally, we quantified the sensitivity and Figure of merit (FOM) of the sensor tracking the spectral shift of the CD features as a function of the glycerol/water concentration ratio leading to a remarkable FOM value of about 20.0 RIU$^{-1}$. These results indicate that our innovative sensing platform offers unique advantages for high sensitivity detection of analytes in many biological applications. Results and discussion ====================== The sketch reported in Figure \[fig:1\]a shows the schematic diagram of a type II HMM configuration consisting of alternating dielectric and metallic thin films. In particular, to obtain a hyperbolic dispersion at optical frequencies (with dielectric permittivity tensor component $\varepsilon_{//} < 0$ and $\varepsilon_{\perp} > 0$, above 418 nm), we designed a HMM composed by indium tin oxide (ITO - 20 nm) and silver (Ag - 20 nm) layers using Effective Medium Theory (EMT)[@choy2015effective] (see Supporting Information). Figure \[fig:1\]b shows the numerical reflectance and transmittance curves of the HMM, provided by COMSOL Multiphysics simulation.[@multiphysics1998introduction] The reflectance and transmittance are calculated by considering a TM-wave (p-polarization) and an incident angle $\theta_i =50^\circ$. The minimum value at about 358 nm in the reflectance curve (and the related maximum in the transmittance one) is referred to as the Ferrel-Berreman mode for silver nanometric layers.[@caligiuri2016dielectric] ![(a) Schematic diagram of the ITO/Ag HMM and (b) corresponding calculated Reflectance and Transmittance spectra. (c) Sketch of one lateral unit cell of the out-of-plane chiral structure composed of a right-handend Au helix on a glass substrate, the relevant structure parameters are illustrated. (d) Calculated Reflectance and Transmittance spectra for the chiral metasurface. The reflectance and transmittance spectra are calculated for TM wave, angle of incidence $\theta_i =50^\circ$.[]{data-label="fig:1"}](Fig1.png){width="0.7\columnwidth"} In order to excite both surface and bulk plasmon modes inside the HMM, we designed an out-of-plane CMH as shown in Figure \[fig:1\]c. The geometrical parameters of the helix array are wire radius ($r$), helix radius ($R_h$), pitch height or axial pitch ($p$), the number of pitches ($N_p$) and the lattice constant ($a$).[@gansel2010gold] Currently CMH with these geometrical features could be fabricated by focused ion beam induced deposition (FIBID),[@esposito2014three] or by the shadow-growth or glancing-angle deposition techniques. [@mark2013hybrid; @hawkeye2007glancing; @robbie1996chiral; @zhao2003designing] The simulations were conducted considering an infinite array of helices both on a glass substrate and onto the HMM structures. This has been possible by simulating a single unit cell of the chiral metasurface composed of a right-handed Au helix arranged in a square lattice. In the first analysis distilled water (n = 1.3330) was considered as the surrounding medium for the chiral metasurface. The reflectance and transmittance curves are calculated for a TM wave and same angle of incidence ($\theta_i =50^\circ$) with respect to the helix axis. The resulting spectra, shown in Figure \[fig:1\]d, are determined by the interplay of internal resonances and their mutual coupling that strongly depends on the structure parameters of the CMH. It is important to note that the calculated reflectance for the chiral metasurface on glass substrate, does not exceed the 40% in all the considered spectral range (400-1600 nm). In order to study the optical behavior in terms of reflectance and transmittance of the chiral metasurface on the HMM (CMH-HMM), we combined the two above mentioned structures into a single 3D geometry built in COMSOL. The obtained 3D system is composed by a parallelepiped 8 times higher than the lattice constant $a$ - Figure \[fig:2\]a. The choice of the box height is fundamental for the optimal propagation of the lightwave inside the system preventing any diffraction or boundary problems. The numerical geometry of the model is sketched in Figure \[fig:2\]a, with, starting from the top, the superstrate containing the Au helix (distilled water as surrounding medium), the multi-layer system (grey stack of ITO/Ag) and the substrate (glass). ![(a) Unit cell of the CMH-HMM simulated geometry. COMSOL permits to simulate sources or detectors of e.m. radiation by creating Ports: in our case, there is a port on the top (P$_{in}$), from where the radiation propagates and a port on the bottom (P$_{out}$), that behaves as a detector. (b) Calculated Reflectance and Transmittance spectra of an Au helix array on HMM - water as surrounding medium - for TM, angle of incidence $\theta_i$=50$^\circ$.[]{data-label="fig:2"}](Fig2.png){width="0.8\columnwidth"} Here, an electromagnetic plane wave impinges on the combined system from the superstrate, with a specific incident angle ($\theta_i$) and polarization (s-polarization (TE) or p-polarization (TM)). Light interacting with the structure is then collected through both its substrate (typically glass) and superstrate, allowing to compute the optical quantities of interest (transmittance (T) and reflectance (R)). This is done by solving the frequency-domain partial differential equation (PDE) that governs the $\mathbf{E}$ and $\mathbf{H}$ fields associated with the electromagnetic wave propagating through the structure: $$\nabla \times\mu_r^{-1}(\nabla \times\mathbf{E})-\omega^2\varepsilon_0\mu_0(\varepsilon_r-i\sigma/\omega\varepsilon_0)\mathbf{E}=0 \label{eq1}$$ In the condition of the electric conductivity $\sigma=0$ and non-magnetic materials ($\mu_r=1$), the previous equation reduces to: $$\nabla \times(\nabla \times\mathbf{E})-k_0\textsuperscript{2}\varepsilon_r\mathbf{E}=0 \label{eq2}$$ Here $k_0$ is the incident wavevector in vacuum or air ($k_0 = 2\pi/\lambda$), while $\varepsilon_r$ represents the material dielectric permittivity. By providing as an input the values of real and imaginary parts of the refractive index of any considered material, the software retrieves the corresponding dielectric permittivity ($\varepsilon_r$) and numerically solves Eq. \[eq2\] to obtain the $\mathbf{E}$ field distribution. Scattering parameters (S-parameter) for transmittance ($S_{21}$) and reflectance ($S_{11}$) are computed (See Supporting information). In order to simulate the behavior of TM and TE light in a 3D environment, it is necessary to properly write the components of the electromagnetic fields with respect to the incidence plane ($xz$) and set the polarizations accordingly: $\mathbf{H}= (0,1,0)$ for TM and $\mathbf{E}=(0,1,0)$ for TE.[@lio2019comprehensive] As we can see in Figure \[fig:2\]b, the calculated transmittance for the CMH-HMM turns out to be zero in all the considered vis-NIR regions, while the reflectance spectrum, calculated for a TM and $\theta_i = 50^\circ$, is totally modified respect to the reflectance of the HMM and the Au helix array considered separately (see Figures 1b-1d). In particular, we can distinguish three reflectance minima at 635 nm (mode A), 710 nm (mode B) and 890 nm (mode C). It is important to note that these reflectance dips are closely related to the geometrical and material properties of the designed CMH. In fact, considering an out-of-plane 3D pillars hypergrating characterized by the same sizes of the wire radius ($r$), or the helix radius ($R_h$) it does not leads to comparable signals usable for sensing (see Supplementary materials). According to the grating coupling technique of surface plasmon excitation,[@sambles1991optical; @sreekanth2013experimental] the surface plasmon modes can be excited when the wavevector of the grating diffraction orders are greater than that of the incident light. Under this condition, diffraction orders are no longer propagating waves, but evanescent field and the enhanced wavevector results to be responsible for the coupling of the incident light to the surface plasmon modes according to the coupling condition:[@barnes2004surface] $$k^2_{SPP}=n^2_0 k^2_0 sin^2 \theta \pm 2 n_0 m k_g k_0 sin \theta cos \phi + (m k_g)^2 \label{eq3}$$ where $n_0$ is the refractive index of the incident medium, $k_0$ is the vacuum wavevector, $m$ is the grating diffraction order and $\theta$ and $\phi$ are the incident grazing and azimuthal angle, respectively. $k_g = 2\pi/ \Lambda$ is the grating wavevector, with $\Lambda$ the grating period, in our case corresponding to the the lattice constant $a$. When $\phi =0$, Eq. \[eq3\] results to be: $k_{SPP}=n_0 k_0 sin \theta \pm m k_g$. By using this equation we calculated the corresponding $k_x$ for our three modes: $k_{xA}$,$k_{xB}$ and $k_{xC}$. By considering the dispersion relations for the SPP and BPP modes given by:[@avrutsky2007highly] $$k_{SPP}= k_0 \sqrt{\varepsilon_d \varepsilon_m \over \varepsilon_d + \varepsilon_m} \label{eq4}$$ $$k_{BPP_N}=k_0 \sqrt{\varepsilon_d - \frac{\lambda^2 N}{\pi^2 t_d t_m } \frac{\varepsilon_d }{\varepsilon_m}} \label{eq5}$$ we can plot the SPP and BPP dispersion curves (Figure \[fig:3\]a) supported by the structure. In the above equations, $t_d$, $\varepsilon_d$ and $t_m$, $\varepsilon_m$ are the thickness and dielectric permittivity of the dielectric and metal, in our case ITO and Ag, respectively, while $N$ represents the order mode ($N$=1,2,3...). In this plot it is possible to identify three points corresponding to the intersection between the $k_x$ component of modes A, B and C and the BPP modes of the structure, Figure \[fig:3\]a. Since both surface and bulk plasmon mode excitation depends on the incident angle, we calculated the reflectance of the CMH-HMM for different angle of incidence (Figure \[fig:3\]b). We observed that there is a blue shift in the reflectance minima when the incident angle is increased. This is attributed to the variation in modal indices with incident angles.[@fan2006all] ![(a) Dispersion relations of SPP and BPP modes and (b) calculated reflection spectra for three different incident angles ($\theta_i$) for the CMH-HMM.[]{data-label="fig:3"}](Fig3.png){width="0.7\columnwidth"} The reported data clearly show that the CMH can excite the BPP modes of the underneath hyperbolic metamaterial. These modes are expected to undergo a frequency shift as a function of the analytes concentration binding at the metasurface, defining the sensitivity of the sensing platform. To this end we use the experimental data of Koohyar et al.[@koohyar2012study] who tabulated the refractive index (RI) variations related to different molar fractions of aqueous solutions of methanol, ethanol, ethylene glycol, 1-propanol and 1, 2, 3-propantriol. In particular, we consider the data corresponding to the aqueous solution of 1, 2, 3-propantriol characterized by an ultra low molecular weight ($C_3H_8O_3 \approx$ 60 Da). Figure \[fig:4\]a shows the calculated reflection spectra of the CMH-HMM sensor in measuring 1, 2, 3-propantriol solutions with different concentrations. The shift of the resonances as a function of the different percentage of propantiol in the aqueous solution allows us to determine the sensitivity of the sensor. The reflectance minima (mode dips) shift towards longer wavelengths with the increase of RI, in the range $0 <\Delta_{RI} <0.0680$, this last case corresponding to a molar fraction of $C_3H_8O_3$ of about 17% in the aqueous solution; the resonance wavelength shift ($\Delta\lambda$) shows a linear behaviour with the RI change ($\Delta_{RI}$), as reported in Figure \[fig:4\]b. ![(a) Performance evaluation of the CMH-HMM sensor: calculated reflectance spectra with different mole fractions of 1, 2, 3-propantriol in distilled water. (b) Resonance wavelength shift for the mode A, mode B and the third mode C as a function of the refractive index variation and corresponding linear fitting. (c)X-Z maps of the electric field intensity through the CMH-HMM structure in logarithmic scale for the three modes.[]{data-label="fig:4"}](Fig4.png){width="0.9\columnwidth"} The spectral sensitivity of the sensor is defined as $S= \Delta n/\Delta \lambda$, where $\Delta n$ represents the change of the refractive index solution flowing on top of the sensor and $\Delta\lambda$ the shift of the sensor resonance in $nm$. In particular, $\Delta \lambda_A$=20 nm and $S_A$=3.3 10$^{-3}$ RIU/nm for the first mode A (635 nm), $\Delta \lambda_B$=26 nm and $S_B$=2.5 10$^{-3}$ RIU/nm for the second mode B (710 nm) and $\Delta \lambda_C$=37 nm and $S_C$=1.8 10$^{-3}$ RIU/nm for the third mode C (890 nm). The corresponding limit of detection (LOD), corresponding to the minimum RI variation that can be distinguished (shift of 1 nm) results to be equal to 0.0015. The difference in sensitivity for the three modes is related to their different $\Delta \lambda$. In particular, mode C is the one that shows the best result in terms of sensitivity respect to the other two modes, this is due to the highly confined field distributions on the superstrate at hyperbolic dispersion (Figure \[fig:4\]c) and to the fact that the transverse decay of the field in the HMM strongly varies from one mode to another. Another important aspect related to the 3D hypergrating is represented by the significantly increase of the out-of-plane sensing surface, where the specific binding of the analytes occurs via functional groups immobilized in this specific case on a helical surface. At the same time, a chiral structure can modify the fluid dynamics around it, inducing an increase of the probability of a specific binding. ![(a) Sketch of the simulated geometry with different percentage of the surface coverage and (b) corresponding reflectance spectra. (c) Resonance wavelength shift for the mode A, B and C as a function of the variation of the surface coverage. []{data-label="fig:5"}](Fig5.png){width="0.7\columnwidth"} Clearly, the wavelength shift of BPP modes is strongly related to the quantity of molecules that bind selectively on the surface of the helices. To demonstrate this behavior numerically, we have considered different percentages of surface coverage of the helicoidal structures, starting from the HMM surface (Figure \[fig:5\]a), where the maximum variation of the considered refractive index ($\Delta_{RI}$=0.0680) affects only particular regions around the helix. To this end, we have considered the two limiting cases: the 0% of surface coverage (s.c.) and the 100%, in which the whole surface of the helix is totally covered by molecules; in this last case we obtain the maximum shift of 31 nm for mode C, 21 nm for mode B and 15 nm for mode A. Then we considered four intermediate cases of partial s.c.: 25%, 33%, 50%, and 75% (Figure \[fig:5\]b). As we can see in Figure \[fig:5\]c the resonance wavelength shift of the helix/HMM modes shows a linear behaviour until 50% of surface coverage, once this value is exceeded the slope of the curve decreases, by showing that the sensitivity is decreasing too. At the same time, it is possible to find the minimum percentage value, that in our case results to be equal to 16%, corresponding to the minimum surface coverage, necessary to have an appreciable shift of the modes. This leads to calculate the mass sensitivity, a key parameter used to describe the performance of a biosensor, that is strongly related to the surface coverage; for the considered system the mass sensitivity results equal to 0.04 $pg/mm^2$ (see Supplementary materials). ![(a)Sketch of the geometry with the surface coverage (s.c.) of 20% at two different heights. (b) Corresponding simulated reflectance spectra and (c) a magnification of them in proximity of the mode A, B and C. []{data-label="fig:6"}](Fig6.png){width="0.6\columnwidth"} The last analysis is dedicated to investigate how the sensitivity changes as function of the relative surface coverage at different heights away from the HMM surface. In particular, it is possible to demonstrate that the local change of refractive index in a small disk surrounding the helix produces appreciable shifts even when the binding is confined exclusively in the upper region of the helix, which represents the maximum distance from the HMM. For this reason a small disk, with $n$=1.401 and corresponding to an adsorbed surface of 20%, is positioned at different distance ($D$) respect to the surface of the HMM (Figure \[fig:6\]a). By plotting the resonance shift of the three modes A, B and C as a function of the distance $D$ normalized to the helix height ($h$) it is possible to see that the proposed biosensing platform is able to appreciate a shift of the considered modes even in the worst case ($D/h$=1) of about 1.4 nm for the mode A, 3.6 nm for the mode B and 3.0 nm for the mode C, as reported in Figure 6b. It is interesting to note that the resonance shift decreases exponentially by moving away from the surface of the HMM. The corresponding sensitivity results to be 48.6 10$^{-3}$RIU/nm for the mode A, 18.9 10$^{-3}$RIU/nm for the mode B and 22.6 10$^{-3}$RIU/nm for the mode C. These results demonstrate the strong sensing power of our innovative system to detect target analytes also away from the surface of the HMM exploiting the increased surface/volume ratio of the 3D CMH exposed to the analyte. On the other hand, considering the intrinsic chirality of the nanohelices, CMH could excite new BPP modes of the HMM by coupling with their circular polarization-dependent plasmon modes. Indeed, as we can see in Figure \[fig:7\]a, for an angle of incidence of $\theta_i$=75$^\circ$, different reflectance dips are obtained for left-handed circular polarized (LCP) and right-handed circular polarized (RCP) light. In particular, the reflectance dips obtained for LCP light, indicated in the figure as BPP$_3$ to BPP$_6$, are strongly related to a coupling between the plasmonic modes of the gold helix array and the HMM underneath. This can be verified through the intersection of the dispersion curves of the HMM with the wavelength corresponding to the reflectance dips that are expressed in terms of energy versus momentum and are indicated in the Figure \[fig:7\]b with the blue triangles. For LCP light, at these wavelengths, respectively: 597 nm, 713nm, 796 nm and 873 nm the electric field intensity |E| results to be confined between the helix antenna surface and the HMM layers - Figure \[fig:7\]c. A similar analysis could be carried out for RCP reflectance dips. ![(a)Reflectance curves of the CMH-HMM for LCP and RCP light, angle of incidence $\theta_i$=75$^\circ$; in the inset a sketch of the simulated unit cell probed with circular polarized light. (b) Intersection of the dispersion curves of the HMM with BPP modes excited by circular polarized light. (c) X-Z maps of the electric field intensity through the CMH-HMM structure in logarithmic scale for LCP light and $\theta_i$=75$^\circ$. (d) Reflectance circular dichroism (RCD) as a function of refractive index variations.[]{data-label="fig:7"}](Fig7.png){width="0.8\columnwidth"} From the analysis of the chiroptical response of the CMH we can calculate the CD signal, typically riches of spectral signatures, such as bipolar peaks and crossing points, increasing the sensitivity and accuracy of the monitoring refractive index changes due to the analyte absorption. This sensing modality offers strong optical contrast even in the presence of highly achiral absorbing media, increasing the signal-to-noise CD measurements of a chiral analyte, an important consideration for use in complex biological media with limited transmission.[@jeong2016dispersion] For this purpose, the resulting reflectance curves obtained for LCP and RCP light, at $\theta_i$=75$^\circ$ are used to calculate the reflectance circular dichroism (RCD) spectrum, which characterizes the reflectance difference between LCP and RCP light, leading to a RCD amplitude (RCD=R$_{LCP}$-R$_{RCP}$). As expected, the RCD spectra for the CMH-HMM exhibit multiple features: different maxima, minima and crossing points (Figure \[fig:7\]d). We have studied the RCD, as a function of the refractive indices variation between 1.333 and 1.401 (glycerol - water mixtures varying from 0 to 17.5% concentration - Figure \[fig:7\]d) to quantify the performance in terms of sensitivity and FOM of our sensor. We can distinguish in the range 700-900 nm a minimum ($\lambda_m$), a crossing point ($\lambda_0$) and a maximum ($\lambda_M$) respectively at 797 nm, 816 nm and 852 nm which significantly shift and modify their intensity as the refractive index changes. These signals show a chiral plasmon sensitivity S$_{CP}$=$\Delta n/\Delta\lambda$ of 2.42 10$^{-3}$RIU/nm for $\lambda_m$, 2.12 10$^{-3}$RIU/nm for $\lambda_0$ and 2.19 10$^{-3}$RIU/nm for $\lambda_M$, respectively. After extracting the classical FWHM for the $\lambda_m$ and $\lambda_M$ modes and the FWHM in the |RCD| spectrum (see Supplementary materials) for $\lambda_0$, we have calculated the FOM,[@mayer2011localized] defined in our case as $FOM$=$(S \cdot FWHM)^{-1}$, that resulted to be, respectively, equal to 18.72, 15.18 and 15.19, very high values if compared to previously reported results. Conclusions =========== In this paper, we have numerically demonstrated how an out-of-plane chiral metasurface hypergrating can be used to excite the plasmonic modes of an underlying hyperbolic metamaterial with linearly and circularly polarized light. The electromagnetic modes resulting from the coupling between the CMH-HMM depend strongly on the material and geometrical parameters of the CMH-HMM. In our numerical study, we have demonstrated how the HMM BPPs modes can be used for the detection of ultra low molecular weight molecules ($\approx$ 60 Da) with extremely low concentrations (mass sensitivity of 0.04 $ pg / mm ^ 2 $) on the whole surface of the helices array. The CMH represents a new versatile way to couple circularly polarized light with the HMM, by exploiting the features of the reflectance circular dichroism (RCD) spectra, rich of signals that can be used to increase the processed data for the detection of analytes by the proposed biosensing platform. This research has been supported by the *“AIM: Attraction and International Mobility”* - PON R&I 2014-2020 Calabria and “Progetto Tecnopolo per la Medicina di precisione, Deliberazione della Giunta Regionale n. 2117” Puglia. The authors thank the Area della Ricerca di Roma 2, Tor Vergata, for the access to the ICT Services (ARToV-CNR) for the use of the COMSOL Multiphysics Platform, Origin Lab and Matlab, and the Infrastructure BeyondNano (PONa3-00362) of CNR-Nanotec for the access to research instruments. Contents: - Electric permittivity of the HMM calculated by means of the effective medium theory - Equations for Scattering parameters $S_{11}$ and $S_{21}$ - Meshed geometry - Unchiral hypergratings - Calculation of the mass sensitivity - Detailed plots for the FOM calculation
{ "pile_set_name": "ArXiv" }
Posts Tagged ‘soy rice amaranth wheat barley oats’ A Note from Madonna: Great article from Metagenics on Soy… I’m in the unique position to have been doing kinesiology for over 20 years… I always joke I’m lucky to have done my naturopathy first as kinesiology was so much fun. I’ve got a 15 step process to find allergies/intolerances/substance issues with people: we have Nutripath food testing to find if people have allergies to substances we use the Food Detective blood test in-house to find if people have intolerances I’ve found generally over the years that organic soy is fine! (Generally, of course!) Georgia and Madonna use kinesiology to target specific substances and see if your body is able to utilise them… if dairy is an issue, is it the casein, the lactose, a DPP4 enzyme deficiency, lectins, hormones? Is Organic OK? if grains are an issues, is it a FODMAP problem, lectins, gluten, gliadins, DPP4 enzyme deficiency, pesticides, GMO? Is Organic OK? The world we live in is a melting pot of mixed cultures which has resulted in the spread of many ingredients and cuisines. One such example is the soybean, finding its way onto the plates of many individuals, and offering a blend of protein, fibre, fats and phytonutrients (e.g. isoflavones). Despite a long traditional use in Asia and the scientifically proven benefits of soy consumption, vocal soy critics have cast concern over this eminent legume, confusing many people about whether soy is safe or not. Whilst some objections against soy for reasons such as overt allergy are well-founded, anti-soy arguments based on misinterpreted data have tainted the perceived safety of soy; leaving many individuals hesitant on whether to enjoy or avoid it. However, research offers remedies to several soy myths, enabling them to be busted – read on for details: Myth #1: Soy is a goitrogen. Fact: Goitrogens are substances that disrupt the production of thyroid hormone by interfering with the uptake of iodine into the thyroid gland. Soy has previously been classified as a goitrogen; however, this was based primarily on observations yielded from in vitro and animal studies,1 which in this instance offer limited relevance to humans due to differing metabolism between human and animals with regards to soy.2 That said, in situations of inadequate dietary iodine intakes, thyroid symptoms caused by this lack may be amplified by simultaneously high intakes of soy.3 Nevertheless, a comprehensive review of 14 human clinical studies provided little evidence that soy exerts anti-thyroid effects in healthy subjects,4 which is further supported by the European Food Safety Authority (EFSA).5 Fact: In the past decade, there has been a surge in the production of genetically modified (GM) crops, with soy representing one of those most commonly affected. Genetically modified organisms (GMO) are those whose genetic material has been altered using genetic engineering techniques designed to produce specific traits. It is true that without sufficient data we can’t predict the effects of modified proteins, so selecting non-GMO soy products avoids unknown risks. As such, non-GMO sources of soy are available, and consuming it in this natural and unadulterated wholefood form is always advised for maximal health benefits. The Humble Soybean Manifests in Many Dietary Ways. Myth #3: You should only eat soy if it’s fermented. Fact: In early China, soy was traditionally cooked like a grain. Processing of this legume then evolved across different regions of Asia to become a variety of modes like those illustrated in Figure 1. This included fermenting (to create tempeh, miso and natto), sprouting, grinding to make a ‘milk,’ and the pressing of unfermented bean curd to create tofu. Fermentation is especially favored in Korea and Japan for producing strong flavours, however doing so is not the golden rule for soy consumption. Similar to other legumes, simply softening soybeans with moisture and heat (e.g. boiling) causes the hardy components within the bean to denature. This allows the nutrients to then become bioavailable and absorbable, and therefore allow us to attain the benefits from consuming them. In summary, soy has not always traditionally been fermented, and it is perfectly safe and appropriate to consume it in its unfermented form. Myth #4: Soy is a phytoestrogen. Fact: The term phytoestrogen describes the ability of certain compounds (found in foods and medicinal herbs) to act similarly to the actions of the hormone oestrogen. However, incorrect interpretations of the term phytoestrogen have raised some concern. As it pertains to soy, experts have corrected the term phytoestrogen, defining the bean instead as a selective oestrogen receptor modulator or ‘SERM’. Being a SERM, soy communicates with the body similarly to oestrogen as it can bind to what’s known as oestrogen ‘receptors’, which then modulates their activity (the ‘output’). For example, soy isoflavones have been shown to down-regulate oestrogen receptor alpha (ER-?) activity. Given that ER-? is associated with negative events such as tumour growth, SERM compounds (like the isoflavones found in soy) are viewed as beneficial, as they can favourably influence the state of play. What’s more, soy isoflavones also bind to the beneficial oestrogen receptor beta (ER- ?), whose activity is associated with protective health benefits in both men and women.9 In summary, a SERM such as soy does not increase oestrogen levels, but balances oestrogen receptor activity, which can lead to more optimal body function. The Balance of Soy It’s important to keep in mind that the health benefits of soy, like many wholefoods, are broad. The soybean is much more than just soy isoflavones – it provides additional health-promoting nutrients including protein, fibre, minerals and B vitamins, all nourishing your body in more ways than one. To enjoy some soy as part of a balanced, check out the healthy Tofu and Veggie Stir-Fry recipe below. You too can reap the benefits of this highly versatile legume. • Heat oil with garlic until garlic is lightly cooked. • Add cauliflower, tofu and broccoli and stir through very quickly. • Add water and continue stirring. • Cook on high heat for approximately four minutes and continue stirring. • Add a little more water if required to prevent sticking. • Add chives. • Turn out and serve. Are Foods Making us sick, causing us pain?! Time to take a new look at research from around the world! I’ve just returned from a anti-ageing & obesity congress on natural medicine, we had speakers from around the world, experts in their fields, researchers in inflammatory processes of foods (and the body), and basically we found that over 30 years, research has been done looking into prevention of many health issues: diabetes, cancer, heart disease and auto-immune diseases… with changing the foods we eat, or negating the inflammatory effects of foods. There are links with really specific genes interacting with certain allergenic foods – these activate our genetic ability to create disease, unfortunately at this stage there is no medical test which finds these connections, however, the following have been found to create issues: Grains, especially wheat and gluten containing foods cause ‘leaky gut’. Every time we eat wheat and gluten, our gut isn’t as strong as it should be and ‘food particles’ are released into the bloodstream creating inflammation. Inflammation causes pain and disease. Wheat and gluten are not good! Saponin and lectin containing foods also create leaky gut and inflammation. Studies were done to find out which foods had the highest amounts of these substances: pretty much all grains contain these in differing amounts, but soy scored the highest andd rice, amaranth, wheat, barley, oats all contained these substances. Dairy milk creates insulin resistance, a pre-diabetic condition. It is also linked to short-sightedness and acne. Interestingly, in our clinic when we’ve improved the insulin resistance in clients, their eyesight often improves, they see things much more clearly. So kids drinking milk, getting acne and needing glasses has now been linked to being a pre-diabetic condition. Insulin in big amounts is very inflammatory! At the very least pop in to our clinic and have your insulin resistance checked out! So basically we found compelling research that the health conditions killing people these days: cancer, heart disease, diabetes, obesity are very much linked to the food choices, including many ‘healthy’ choices, so once again, food needs to be individualised. What to do? The Paleo Diet/Mediterranean Diet/Keto Diet/Shake It Diet These diets consistently help the body heal and repair. They all have: plenty of good quality vegetables (3 handfuls per meal) and fruits (best are the berries, lots of colours, only 1/2 cup per day) plenty of fluids such as herbal teas, dandelion coffee, purified water limited grains limited dairy milk limited coffee, tea and alcohol And then we’re looking at reducing inflammation each time we eat… For example, we could take a couple of purified fish oil capsules such at MetaPure EPA/DHA each time we eat, or some high potency gut bacteria such as Ultra Flora Immune.
{ "pile_set_name": "Pile-CC" }
Q: Upper bound of a sum It is given that $\sum_{i=1}^{n} x_i^3 \leq C $ Show that there exist a positive real number $K$ which satisfy the following inequality: $\sum_{i=1}^{n}\frac{x_i}{a x_i + b} \leq K$ Where $a,b,C >0$ and $x_i>0 ; \forall i\in\{1,2,3,...,n\}$ I tried to solve this but don't have any idea where to start! I strongly doubt if this inequality is true. Is it possible to disprove in case it's untrue. A: $$ f(x) = \frac{x^{1/3}}{a x^{1/3}+b} $$ is a concave function on $\mathbb{R}^+$, hence the claim follows from Jensen's inequality. It is enough to take $K$ as: $$ K=n \frac{(C/n)^{1/3}}{b+a(C/n)^{1/3}}.$$ $K$ has to depend on $n$, since otherwise we may take $x_i\approx\frac{1}{i^{2/3}}$ and in such a case $$ \sum_{n\geq 1}\frac{x_i}{ax_i+b}$$ is not a convergent series, as Vincenzo Oliva pointed in the comments.
{ "pile_set_name": "StackExchange" }
- High-speed, high-precision and high-response, perfect for gaming and typewriting- LED breathing backlight design is perfect for any working and gaming place especially at night- Electron-optical mouse with adjustable 100DPI - 14400DPI high resolution- Five different user modes for your choice- Five status of the DPI indicator lights: yellow, green, blue, purple and red- Ergonomic design fits your palm to the maximum extent, give the best comfort- Intelligent connectivity, no need of code, plug and play- Can be used for both desktop computer and laptop- Cable length: 180cm
{ "pile_set_name": "Pile-CC" }
/* * Copyright 2009 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.powermock.api.support.membermodification.strategy.impl; import org.powermock.api.support.MethodProxy; import org.powermock.api.support.membermodification.strategy.MethodReplaceStrategy; import org.powermock.reflect.internal.WhiteboxImpl; import java.lang.reflect.InvocationHandler; import java.lang.reflect.Method; import java.lang.reflect.Modifier; public class MethodReplaceStrategyImpl implements MethodReplaceStrategy { private final Method method; public MethodReplaceStrategyImpl(Method method) { if (method == null) { throw new IllegalArgumentException("Cannot replace a null method."); } this.method = method; } @Override public void with(Method method) { if (method == null) { throw new IllegalArgumentException("A metod cannot be replaced with null."); } if (!Modifier.isStatic(this.method.getModifiers())) { throw new IllegalArgumentException(String.format("Replace requires static methods, '%s' is not static", this.method)); } else if (!Modifier.isStatic(method.getModifiers())) { throw new IllegalArgumentException(String.format("Replace requires static methods, '%s' is not static", method)); } else if(!this.method.getReturnType().isAssignableFrom(method.getReturnType())) { throw new IllegalArgumentException(String.format("The replacing method (%s) needs to return %s and not %s.",method.toString(), this.method.getReturnType().getName(), method.getReturnType().getName())); } else if(!WhiteboxImpl.checkIfParameterTypesAreSame(this.method.isVarArgs(),this.method.getParameterTypes(), method.getParameterTypes())) { throw new IllegalArgumentException(String.format("The replacing method, \"%s\", needs to have the same number of parameters of the same type as as method \"%s\".",method.toString(),this.method.toString())); } else { MethodProxy.proxy(this.method, new MethodInvocationHandler(method)); } } @Override public void with(InvocationHandler invocationHandler) { if (invocationHandler == null) { throw new IllegalArgumentException("Invocation handler cannot be null"); } MethodProxy.proxy(method, invocationHandler); } private final class MethodInvocationHandler implements InvocationHandler { private final Method methodDelegator; public MethodInvocationHandler(Method methodDelegator) { this.methodDelegator = methodDelegator; } @Override public Object invoke(Object object, Method invokingMethod, Object[] arguments) throws Throwable { return methodDelegator.invoke(object, arguments); } } }
{ "pile_set_name": "Github" }
Q: What does "bringing prior knowledge of a subject to a text" mean? in the following sentences: A better way is to practice "elaborate rehearsal". This involves assigning semantic meaning to a piece of information so that it can be filed along with other pre-existing long term memories. For example, a reader engages in elaborate rehearsal when he brings prior knowledge of a subject to a text. the sentence *a reader engages in elaborate rehearsal * seem ambiguous to me. Which interpretation of when he brings prior knowledge of a subject to a text is right? 1)when he writes what he knows like an essay. or 2)When he writes some points he thinks is of importance in the margins of a passage he is reading. A: The essay is about two approaches we use to memorize things. "rote rehearsal" - repeating something over and over again. "elaborate rehearsal" - trying to relate a new piece of information to the experience you already have. From the sentence, For example, a reader engages in elaborate rehearsal when he brings prior knowledge of a subject to a text. The essay is about memorizing the stuff you read. And the clause "when he brings prior knowledge of a subject to a text" means "the reader" recalls and relates his "prior knowledge" (or the knowledge he already has; in other words his own experience) that is relevant to the text he is reading. By relating what he is reading to what he already knows, he has better chances to pass information from the short term to long term memory. By doing so, we can say that he (the reader) is engaging in "elaborate rehearsal".
{ "pile_set_name": "StackExchange" }
514 P.2d 1318 (1973) The PEOPLE of the State of Colorado, Plaintiff-Appellee, v. David Patten VAUGHAN, Defendant-Appellant. No. 25279. Supreme Court of Colorado, En Banc. October 1, 1973. *1319 Duke W. Dunbar, Atty. Gen., John P. Moore, Deputy Atty. Gen., Eugene C. Cavaliere, Jerry W. Raisch, Robert C. Lehnert, Asst. Attys. Gen., Denver, for plaintiff-appellee. Blewitt, Bisbee & Geil, John H. Bisbee, Boulder, for defendant-appellant. KELLEY, Justice: The defendant, David Patten Vaughan, was arrested on a public street in Boulder wearing a pair of blue jeans on the seat of which a portion of the American flag had been sewn. In an information filed by the district attorney, it was charged that the defendant, "did unlawfully by his acts mutilate, deface and defile a flag of the United States of America with intent to cast contempt thereupon;" *1320 contrary to 1969 Perm.Supp., C.R.S.1963, 40-23-3(1).[1] In a trial to the court, the court found that the defendant was not making any speeches, and, in fact, no words were spoken by the defendant which were significant. The sole reason for the arrest was the conduct of the defendant. The trial court found the defendant guilty. For reasons hereinafter set forth, we reverse. All fifty states and the United States Government have passed laws relating to flag desecration. Numerous courts, both state[2] and federal,[3] have considered the application of these statutes, reaching somewhat inconsistent results. In considering the arguments of the parties, we are guided by these words of the United States Supreme Court: "The case is made difficult not because the principles of its decision are obscure but because the flag involved is our own. Nevertheless, we apply the limitations of the Constitution with no fear that freedom to be intellectually and spiritually diverse or even contrary will disintegrate the social organization.. . . [F]reedom to differ is not limited to things that do not matter much. That would be a mere shadow of freedom. The test of its substance is the right to differ as to things that touch the heart of the existing order." West Virginia State Board of Education v. Barnette, 319 U.S. 624, 641, 642, 63 S.Ct. 1178, 1187, 87 L.Ed. 1628 (1943). The defendant challenges the validity of the statute on three grounds: (1) it is unconstitutional on its face in that it constitutes an invasion of his right of free expression guaranteed to him by the First and Fourteenth Amendments to the United States Constitution; (2) it is overbroad in that it lends itself to improper application in the area of constitutionally protected expression; and (3) it is so vague and indefinite that men of common intelligence must necessarily guess at its meaning and differ as to its application. I. The threshold question is whether the acts and conduct of defendant, under the circumstances here, constitute "speech" within the meaning of that term in the First Amendment to the United States Constitution.[4] In order to determine *1321 whether defendant's actions are "speech," we must look to judicial interpretation of the First Amendment by the United States Supreme Court. The peculiar symbolic nature of the United States flag was noted by the Supreme Court in Halter v. Nebraska, 205 U.S. 34, 43, 27 S.Ct. 419, 422, 51 L.Ed. 696 (1907): "[T]he flag is the symbol of the nation's power, the emblem of freedom in its truest, best sense. It is not extravagant to say that to all lovers of the country it signifies government resting on the consent of the governed; liberty regulated by law; the protection of the weak against the strong; security against the exercise of arbitrary power; and absolute safety for free institutions against foreign aggression." The continuing vitality of the flag as a symbol in today's world is unquestioned. It drapes the caskets of all who have served in the armed forces and of our national leaders, and signifies our national presence in foreign lands and on the moon. See Joyce v. United States, 147 U.S.App. D.C. 128, 454 F.2d 971 (1971) cert. denied 405 U.S. 969, 92 S.Ct. 1188, 31 L.Ed.2d 242 (1972). West Virginia Board of Education v. Barnette, supra, which held that a state could not compel a flag salute from students as a condition of attendance in the public schools discussed the communicative nature of conduct in relation to the flag: "There is no doubt that, in connection with the pledges, the flag salute is a form of utterance. Symbolism is a primitive but effective way of communicating ideas. The use of an emblem or flag to symbolize some system, idea, institution or personality, is a short cut from mind to mind.... Symbols of State often convey political ideas just as religious symbols come to convey theological ones.... A person gets from a symbol the meaning he puts into it, and what is one man's comfort and inspiration is another's jest and scorn." 319 U.S. 624, 632, 633, 63 S.Ct. 1178, 1182, 87 L.Ed. 1628. See also Stromberg v. California, 283 U.S. 359, 51 S.Ct. 532, 75 L.Ed. 1117 (1931). More recently in Tinker v. Des Moines School District, 393 U.S. 503, 89 S.Ct. 733, 21 L.Ed.2d 731 (1969), the Supreme Court held that the wearing of black armbands by school children to protest United States' involvement in Vietnam was "closely akin to pure speech" and that such symbolic conduct was entitled to comprehensive protection under the First Amendment. The symbolic conduct in Tinker has two analytical aspects which make it "akin to pure speech." First, it was an intentional effort at communication. Secondly, it was widely understood as having a communicative content. When a primary symbol such as the American flag is the object of public activity (other than purely custodial activity) it, by its very nature, conveys a message. Although the content of such expression depends upon the perceptions and values of the viewer, it is nonetheless "closely akin to pure speech," and is expression by the exhibitor which is protected by the First Amendment. Goguen v. Smith, 471 F.2d 88 (1st Cir. 1972); Crosson v. Silver, 319 F.Supp. 1084 (D.Ariz. 1970). See also Long Island Vietnam Moratorium Committee v. Cahn, 437 F.2d 344 (2d Cir. 1970); Hodsdon v. Buckson, 310 F.Supp. 528 (D.Del.1970); Thoms v. Smith, 334 F.Supp. 1203 (D.Conn.1971), aff'd sub nom. Thoms v. Heffernan, 473 F.2d 478 (2d Cir. 1973). Note, Symbolic Conduct, 68 Colum.L.Rev. 1091 (1968). Note, Freedom of Speech and Symbolic Conduct: The Crime of Flag Desecration, 12 Ariz.L.Rev. 71 (1970). *1322 Where a statute proscribes certain acts or conduct when done with the specific intent to cast contempt on the flag, the statute necessarily contemplates that the actor's intellect will be brought to bear upon such acts or conduct. In other words, it is obvious that such statute was not designed to proscribe mutilating or misusing the flag per se. There is no violation of the statute where the proscribed acts are the result of thoughtlessness, inadvertence, accident or the like. A violation occurs only when the specific intent accompanies the acts or conduct. Thus, as noted above, a violation occurs only when the surrounding circumstances manifest the exercise of the intellect in such a manner that inferences may be drawn therefrom that the acts or conduct were done with the specific intent of casting contempt on the flag. It is this manifestation of the exercise of the intellect by the proscribed conduct which constitutes "symbolic speech." From the trial court's finding of guilt we must conclude that the defendant's actions were committed with the specific intent to cast contempt upon the flag. To make this finding the trial court must have found that his conduct manifested an expressive intent and a communicative content. From this we conclude that defendant's conduct was "symbolic speech" and, consequently, is protected "speech" under the First Amendment. The flag affixed to the seat of the defendant's pants was a gesture of defiance and dissent to those who revere the flag as a symbol of the blessings of American citizenship,[5] and evidences an intent to communicate an attitude of political antagonism to those who support legitimate authority represented by the flag. Just as some citizens paste flag decals on their car windows to indicate their support of certain political philosophies, defendant adorned the seat of his jeans with a flag to indicate his contempt for those things which the flag symbolizes. The ideas expressed by defendant's conduct may seem to some to be juvenile and inarticulate, and perhaps his actions are subject to interpretations other than we have given, but this does not strip his "speech" of constitutional protection. The First Amendment is not the exclusive property of the educated and politically sophisticated segment of our population; it is not limited to ideas capable of precise explication. In the words of Mr. Justice Harlan: "[W]ords are often chosen as much for their emotive as their cognitive force. We cannot sanction the view that the Constitution, while solicitous of the cognitive content of individual speech has little or no regard for that emotive function which, practically speaking, may often be the more important element of the overall message sought to be communicated." Cohen v. California, 403 U.S. 15, 26, 91 S.Ct. 1780, 1788, 29 L.Ed.2d 284 (1971). The state can no more censor ideas on the basis of their intellectual or artistic merit than on the basis of their political content. II. Having found that defendant's conduct was expression "closely akin to pure speech" protected by the First Amendment, we must now determine whether the state may constitutionally impose criminal sanctions upon such protected expression. At the outset we emphasize that our ruling is limited to the factual situation presented by this case: a prosecution for mutilating the flag with intent to cast contempt thereupon. We do not reach the question of the state's power to prohibit flag mutilation without regard to the actor's motive. It is well settled that the state has an overriding interest in prohibiting conduct or speech which incites others to unlawful conduct or provokes retaliatory actions amounting to a breach of the peace. Chaplinsky v. New Hampshire, 315 U.S. 568, 62 S.Ct. 766, 86 L.Ed. 1031 *1323 (1942). Thus, a statute narrowly drawn to implement such compelling state interests would withstand constitutional scrutiny even though it has the effect of proscribing some limited forms of expression. In considering the state's argument that the statute in question furthers the legitimate state interests of averting breaches of the peace, preserving the dignity of the symbols of our democracy, and controlling rebellious behavior by setting limits for proper dissent, we must remember the preferred place given in our constitutional scheme to the indispensable democratic freedoms secured by the First Amendment. Thomas v. Collins, 323 U.S. 516, 65 S.Ct. 315, 89 L.Ed. 430 (1945). First Amendment freedoms are the cornerstone of our democracy and the source of the strength and vitality of our society. It is the unfettered and public discussion of ideas of every sort that keeps the institutions of government responsive to the people. See Whitney v. California, 274 U.S. 357, 372, 47 S.Ct. 641, 71 L.Ed. 1095 (1927), (Brandeis, J., concurring). Recognition of the delicate and vulnerable nature of these freedoms and the fact that they "need breathing space to survive" NAACP v. Button, 371 U.S. 415, 83 S.Ct. 328, 9 L.Ed.2d 405 (1963), mandates that we give the closest scrutiny to state action which has the effect of curtailing or "chilling" free expression. NAACP v. Alabama, 357 U.S. 449, 78 S.Ct. 1163, 2 L. Ed.2d 1488 (1958). Not only must a statute infringing upon expression be justified by an overriding state interest, but such a statute may be applied only where there is a clear and present danger to such interest. Schenck v. United States, 249 U.S. 47, 39 S.Ct. 247, 63 L.Ed. 470 (1919); West Virginia State Board of Education v. Barnette, supra. Analyzing the facts of this case in light of the First Amendment cases of the United States Supreme Court, we hold that the portion of the statute in question is unconstitutional on its face. The section challenged, in effect, limits the expression of ideas about the flag to patriotic expressions acceptable to those charged with the enforcement of the criminal law. It attempts to impress a symbolic orthodoxy upon the people of Colorado. The state asserts that the statute furthers the legitimate interests of preserving the symbols of our democracy and setting limits of proper dissent. We hold these interests to be in direct conflict with the fundametal values protected by the First Amendment. Because of the preferred position of freedom of speech in the United States Constitution, these interests are insufficient to uphold the validity of the statute. The final argument advanced by the state is that the statute is designed to avert breaches of the peace. However, the section in question makes no mention of breaches of the peace. It proscribes only words or acts which are done with the intent to cast contempt upon the flag. Had the general assembly intended to prevent or punish breaches of the peace involving the flag, they would have given some indication of that purpose in the statute. We cannot read such a limitation into the statute when the general assembly has shown only an intent to punish words or acts contemptuous of the flag. The state also relies upon two recent decisions of the United States Supreme Court, Street v. New York, 394 U.S. 576, 89 S.Ct. 1354, 22 L.Ed.2d 572 (1969), and United States v. O'Brien, 391 U.S. 367, 88 S.Ct. 1673, 20 L.Ed.2d 672 (1968). In Street, the court did not reach the issue presented by this case. The court there held only that a person could not be punished for casting contempt upon the flag by words. O'Brien presented a case in which the defendant was convicted for knowingly burning his Selective Service Registration Certificate. He did not deny that he had burned the certificate, but argued that his conduct was "symbolic speech" in that he was attempting to persuade others to adopt his anti-war beliefs. The court assumed that the defendant's conduct was symbolic speech and stated as follows: "This court has held that when `speech' and `nonspeach' elements are combined in the same course of conduct, *1324 a sufficiently important governmental interest in regulating the nonspeech element can justify incidental limitations on First Amendment freedoms .... [W]e think it clear that a governmental regulation is sufficiently justified if it is within the constitutional power of the Government; if it furthers an important or substantial governmental interest; if the governmental interest is unrelated to the suppression of free expression; and if the incidental restriction on alleged First Amendment freedoms is no greater than is essential to the furtherance of that interest." 391 U.S. 367, 376, 377, 88 S.Ct. 1673, 1678, 20 L.Ed.2d 672. This case is distinguishable from O'Brien in at least two respects. First, O'Brien dealt with a situation where "speech" and "nonspeech" elements were combined in the same course of conduct. Here we have a silent, passive expression of opinion by act which we have found to be "closely akin to pure speech." The minimal "nonspeech" element of defendant's conduct makes it questionable if the O'Brien analysis is applicable at all. Secondly, the statute in O'Brien was limited to the noncommunicative aspect of the defendant's conduct, and was designed to assure the smooth and efficient functioning of the selective service system. If we assume that O'Brien is applicable, we note that the statute in question here penalizes and thus in large part prohibits the expression of a particular range of ideas about the American flag and through it communication about the present political life of our society. Thus, under the third part of the test set out above, the unrelatedness of the governmental interest to the suppression of free expression, we see that the statute attempts to preserve the dignity of the symbols of government by restricting the scope of expression with respect to such symbols. We have here a situation where the statute in question operates as a direct restraint upon free expression. The situation here is like that presented in Schacht v. United States, 398 U.S. 58, 90 S.Ct. 1555, 26 L.Ed.2d 44 (1970), where a federal statute which permitted the portrayal of a member of the armed forces in a theatrical production "if the portrayal does not tend to discredit that armed force" was held to be an unconstitutional abridgment of freedom of speech. The government cannot penalize what it cannot constitutionally compel. West Virginia State Board of Education v. Barnette, supra; Hodsdon v. Buckson, supra. The dangers of governmental censorship in any form were well expressed by Mr. Justice Jackson. "Those who begin coercive elimination of dissent soon find themselves exterminating dissenters. Compulsory unification of opinion achieves only the unanimity of the graveyard. It seems trite but necessary to say that the First Amendment to our Constitution was designed to avoid these ends by avoiding these beginnings .... Authority here is to be controlled by public opinion, not public opinion by authority." West Virginia State Board of Education v. Barnette, 319 U.S. 624, 641, 63 S.Ct. 1178, 1187, 87 L.Ed. 1628 (1943). Judgment reversed and the cause remanded with directions to dismiss the information filed against the defendant. GROVES, J., specially concurs. GROVES, Justice (specially concurring): After the court declared the statute unconstitutional on its face, it was unnecessary to reach the question as to whether the acts of the defendant were constitutionally protected as free expression. It is the latter proposition announced by the court with which I disagree. While I revere the flag, my disagreement does not stem from any patriotic or emotional state of mind. The record is devoid of any reason why the defendant had contempt for the symbol of our country. There would have been an entire different case if he had been carrying *1325 a sign reading—or if he had testified in court—"I defecate upon the United States because it will not attempt to cure environmental problems." I am unaware of any ruling of the United States Supreme Court that defilement of the flag showing contempt therefor without any particular reason is protected free expression. Until that tribunal advises us otherwise, I would say that, in order for an act or statement to be protected by the First Amendment, there must be some spark of intellect—some indicia of thought—shown as a basis for the contempt directed at the nation's symbol. The spark or indicia of thought need not be sound or meaningful to us, but at least the defendant must have a particular basis or bases for his contempt for the United States. Defilement merely to show an attitude against the United States, without alleged reason, should not be enough to gain constitutional protection. NOTES [1] In pertinent part this statute reads: "Any person who ... shall mutilate, deface, defile, or trample upon any such flag with intent to cast contempt thereupon, either by words or act, is guilty of a misdemeanor." [2] People v. Radich, 26 N.Y.2d 114, 308 N.Y.S. 2d 846, 257 N.Ed.2d 30 (1970), aff'd by equally divided Supreme Court, 401 U.S. 531, 91 S.Ct. 1217, 28 L.Ed.2d 287 (1971). People v. Verch, 63 Misc.2d 477, 311 N.Y.S.2d 637 (1970). People v. Cowgill, 274 Cal.App.2d Supp. 923, 78 Cal.Rptr. 853, appeal dismissed, 396 U.S. 371, 90 S.Ct. 613, 24 L.Ed.2d 590 (1970). State v. Kasnett, 30 Ohio App.2d 77, 283 N.E.2d 636 (1972), reversed, 34 Ohio St.2d 193, 297 N.E.2d 537 (1973). State v. Saionz, 23 Ohio App.2d 79, 52 Ohio Ops.2d 64, 261 N.E.2d 135 (1969). State v. Bunch, 26 Ohio Misc. 161, 54 Ohio Ops.2d 354, 268 N.E. 2d 831 (1970). State v. Turner, 78 Wash.2d 276, 474 P.2d 91. State v. Waterman, 190 N. W.2d 809 (Iowa 1971). State v. Sinniger, 6 Or.App. 145, 486 P.2d 1303 (1971). Commonwealth v. Lorenc, 220 Pa.Super. 64, 281 A.2d 743 (1971). See also 41 A.L.R.3d 493. [3] Goguen v. Smith, 471 F.2d 88 (1st Cir. 1972). Joyce v. United States, 147 U.S.App. D.C. 128, 454 F.2d 971, cert. denied, 405 U.S. 969, 92 S.Ct. 1188, 31 L.Ed.2d 242 (1971). Hoffman v. United States, 144 U.S.App.D.C. 156, 445 F.2d 226 (1971). Long Island Vietnam Moratorium Committee v. Cahn, 437 F.2d 344 (2d Cir. 1970). United States v. Ferguson, 302 F.Supp. 1111 (N.D.Cal. 1969). Sutherland v. DeWulf, 323 F.Supp. 740 (S.D.Ill.1971). Crosson v. Silver, 319 F.Supp. 1084 (D.Ariz.1970). Hodsdon v. Buckson, 310 F.Supp. 528 (D.Del.1970). Parker v. Morgan, 322 F.Supp. 585 (W.D.N. C.1971); Thoms v. Smith, 334 F.Supp. 1203 (D.Conn.1971), aff'd sub nom. Thoms v. Heffernan, 473 F.2d 478 (2d Cir. 1973). [4] U.S.Const. Amend. I: "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble and to petition the government for a redress of grievances." (Emphasis added.) It has long been recognized that the protections of the First Amendment are restraints on state action through the Fourteenth Amendment. See Gitlow v. New York, 268 U.S. 652, 45 S.Ct. 625, 69 L.Ed. 1138 (1925); Whitney v. California, 274 U.S. 357, 47 S.Ct. 641, 71 L.Ed. 1095 (1927). [5] See the language quoted from Halter v. Nebraska, supra, at p. 1321.
{ "pile_set_name": "FreeLaw" }
Q: Can i = v.end() be optimized out of a for loop? I saw something like this just now: vector<int> x { 1, 2, 3, 4 }; for (auto i = x.begin(); i != x.end(); ++i) { // do stuff } is it better to do this: vector<int> x { 1, 2, 3, 4 }; for (auto i = x.begin(), end = x.end(); i != end; ++i) { // do stuff } I guess I figured that the optimizer would take care of this. Am I wrong? A: Yes, the second version can be more optimal, so long as your container is never modified but the compiler cannot tell the container is never modified. The "most optimal" looping structure can be found by examining the C++11 ranged-based for loop. The code: for( auto x : vec_expression ) { // body } is translated roughly into: { auto&& __container = vec_expression; using std::begin; using std::end; auto&& __end = end(container) for( auto __it = begin(container); __it != __end; ++__it ) { auto x = *__it; { // body } } } where any variable starting with __ exists for exposition purposes only, and the using std::begin; using std::end; is magically removed from consideration within // body. (Remember, any variable containing __ is reserved for the compiler implementation). If you have lambda support in your compiler, you can write your own version: template<typename Container, typename Lambda> void foreach( Container&& c, Lambda&& f ) { using std::begin; using std::end; auto&& e = end(c); for( auto it = begin(c); it != e; ++it ) { f(*it); } } which is used like this: foreach( vec_expression, [&]( int x ) { } ); it does not let you break, or return into the outer scope, but it is pretty close to C++11 ranged-based for. If you lack both ranged-based for and lambdas, you could be a completely insane person and implement much of the above as a macro... Do the std::begin work using a helper function with perfect fowarding to avoid polluting the body of the function, mayhap. A: Most probably the optimizer will do the job for you. By the way, why decltype(x.begin()) when there's auto for you? for (auto i = x.begin(); i != x.end(); ++i) { // do stuff } or even: for (auto i : x) { // do stuff } The latter is the range for: http://en.cppreference.com/w/cpp/language/range-for.
{ "pile_set_name": "StackExchange" }
[Feasibility study on an approach for identifying corn kernel varieties with seed coating agents via near infrared spectroscopy]. It is generally accepted that near infrared reflectance spectroscopy (NIRS) can be used to identify variety authenticity of bare maize seeds. In practical, maize seeds are covered with seed coating agents. Therefore it's of huge significance to investigate the feasibility of identifying coated maize seeds by NIRS. This study employed NIRS to quickly determine the variety of coated maize seeds. Influence of seed coating agent on NIR spectra was discussed. The NIR spectra of coated maize seeds were obtained using an innovative method to avoid the impact of the seed coating agent. Coated seeds were cut open, and the sections were scanned by the spectrometer, so as to acquire the information of the seed itself. Then, support vector machine (SVM), soft independent modeling of class analogy (SIMCA), and biomimetic pattern recognition (BPR) was employed to establish the identification model for four maize varieties, and yield 93%, 95.8%, 98% average correct rate respectively. BPR model showed better performance than SVM and SIMCA models. The robustness of identification model was tested by seeds harvested from four regions and model showed good performance.
{ "pile_set_name": "PubMed Abstracts" }
The invention relates generally to lights that have a dual function, operating as a flood light or as a spot light. One such Combined Flood and Spot Light is described in U.S. patent application Ser. No. 285,944, filed July 23, 1981, by the Applicant herein. More particularly, the invention relates to lamp bulb mounts, which support and align two lamp bulbs to achieve the dual function light. The invention also relates to lamp bulb sockets that are capable of accepting different types of lamp bulbs. The invention is particularly well suited for portable lights and driving lights. Separate units for flood or fog lighting and for spot lighting have been available for many years. Campers, police officers and fire fighters have used separate units without great inconvenience. The separate units are hung from belts, and whichever unit is desired can be taken in hand when needed. However, it is apparent that a single unit having both capabilities would be highly desirable in any case and particularly so when the lights are mounted on motor vehicles where the space for attachment is more restricted as vehicles become smaller. The present invention is particularly useful in association with a Combined Flood and Spot Light of the type described in Applicant's copending U.S. patent application Ser. No. 285,944, referenced above. Such a light, as described in the copending application, utilizes two bulbs in axial alignment with each other and positioned relative to each other and to a forwardly facing and a rearwardly reflecting reflecting member of the light. A mount that will align and position a pair of light bulbs, while maintaining easy access to both light bulbs for replacement, has not been previously available. Neither has there been available a mount for use with a light which was versatile enough to accept the different types of halogen lamp bulbs which are widely used in automobile driving lights and other high intensity requirements, such as police and fire work.
{ "pile_set_name": "USPTO Backgrounds" }
Comparison of different maximum likelihood estimators in a small sample logistic regression with two independent binary variables. In order to examine the bias of the estimate of the log odds ratio in a 2 x 2 contingency table, Walter computed the entire distribution of the estimated log odds ratio using various small sample sizes. This is equivalent to computing the distribution of the estimated parameter b1 in a logistic regression with one independent binary variable. In this paper, the distributions of the estimated parameters b1 and b2 for two independent binary variables are computed for some small sample logistic regressions using six different estimation methods based on maximum likelihood. These estimates are then compared to the true parameter values. The best estimation method depends on the frequency of the outcome of interest and on whether the bias or mean square error is considered more important.
{ "pile_set_name": "PubMed Abstracts" }
Prayers to the Gods of Olympus Menu Aphrodite Golden Aphrodite, fair and fearsome goddess, mighty one whose will it is that the heart leads us where the mind knows not to go; Aphrodite, whose hand it is that guides us to the cliff’s edge, whose voice it that dares us to jump into the dark, whose gift it is that love’s reward is worth any risk. Blessed Aphrodite, many have sought to turn from you, but fire is fire, and feeling is feeling, and neither can be contained by will alone. Goddess, I thank you for moments free of reason, I thank you for the dominion of desire. Aphrodite, yours is the force of life, yours the call of instinct; goddess whose power it is that leads us to joy or desperation, I praise you for your many gifts, I ask your blessing.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention This invention relates to electrochemical devices, more particularly to electrochemical devices in which a carbonaceous material undergoes oxidation to produce chemicals and/or electricity. This invention also relates to a method for substantially preventing the crossover of some of the carbonaceous material from one side of the electrolyte through the electrolyte to the other side of the electrolyte of the electrochemical devices. More particularly, this invention relates to direct methanol fuel cells and direct methanol fuel cell anode electrode catalysts, which are both proton and electron conductive and which reduce methanol crossover, a common problem in direct methanol fuel cells. 2. Description of Related Art An electrochemical device is a device in which a chemical or chemical compound is modified by electronic means to produce other chemicals and/or electricity. Exemplary of devices which produce electricity are fuel cells, which comprise an anode electrode, a cathode electrode and an electrolyte disposed between the anode electrode and the cathode electrode, in which a fuel such as hydrogen or carbonaceous materials such as methane, methanol, ethane, butane, etc. is introduced into the anode side of the electrolyte and an oxidant, such as air, is introduced into the cathode side of the electrolyte and the fuel and oxidant are reacted, resulting in the generation of electricity. Typically, the carbonaceous fuels are first reformed to produce hydrogen, which is then introduced into the fuel cell. However, it will be apparent that fuel cells which are capable of direct utilization of carbonaceous fuels are a desirable objective since the need for reforming would be eliminated. There exist different types of fuel cells defined, in part, on the basis of the type of electrolyte employed. Molten carbonate fuel cells employ molten carbonates disposed in an electrolyte matrix as an electrolyte; phosphoric acid fuel cells employ phosphoric acid as an electrolyte; solid oxide fuel cells employ solid oxide electrolytes; and polymer electrolyte membrane fuel cells (also referred to as proton exchange membrane fuel cells) employ, as the name suggests, polymeric membranes as an electrolyte. Direct methanol polymer electrolyte membrane fuel cells are prime candidates for both vehicular and stationary uses due to their inherent simplicity (no external reformers) and potential high energy densities (liquid fuels). In addition, direct methanol polymer electrolyte membrane fuel cells have the potential for replacing rechargeable batteries due to the possibility of a zero recharge time. However, the current state of the art in direct methanol polymer electrolyte membrane fuel cells requires external means, such as pumps and blowers for introducing reactants into and removing reaction products from the fuel cell. For example, U.S. Pat. No. 5,573,866 to Van Dine et al. teaches a polymer electrolyte membrane fuel cell which directly oxidizes liquid methanol fuel that is fed into the anode chamber from a liquid methanol storage container. The liquid methanol is mixed with water in the anode chamber. Some of the methanol and water cross over the membrane into the cathode chamber and into a process air stream. The methanol and water are removed from the cathode chamber by evaporation into the process air stream, which is then directed into a condenser/radiator. The methanol and water vapors are condensed in the condenser/radiator, from whence the condensed water and methanol are returned to the anode chamber of the cell. The evaporating cathode process air stream, which is provided to the cathode chamber by means of a fan, provides oxygen for the fuel cell reaction, and also cools the cell. Direct methanol fuel cells (DMFCs) are currently being investigated for a number of different applications from milliwatt to kilowatt scale. The most common obstacles are the lack of catalyst activity at the anode and the inability of the membrane electrolyte to be an effective methanol barrier. Numerous concepts have been promoted for reducing methanol crossover from the anode to the cathode. These include (1) increasing membrane thickness, which disadvantageously increases the internal resistance of the cell, (2) modifying the existing membrane with organic or inorganic materials to form a physical obstacle to hinder methanol crossover, which disadvantageously jeopardizes the performance or stability of the membrane, and (3) finding new polymers that provide high proton conductivity and low methanol crossover, which to date has not been achieved.
{ "pile_set_name": "USPTO Backgrounds" }
###### Strengths and limitations of this study - The 52 telephone interviews were obtained from a wide range of participants in socially diverse settings and provide rich data on the participants' experiences of depression and the treatment received in the Acupuncture, Counselling or Usual Care for Depression (ACUDep) trial. - The thematic analysis was conducted using a bottom-up process to allow the themes to develop directly from the participants' own words, and we present the positive and negative experiences of each form of treatment, whether treatment was beneficial or not. - Our findings identify mechanisms within the processes of change that are specific to acupuncture and counselling that facilitate reduction in the symptoms of depression. - Participants may have attributed changes directly to treatment rather than concurrent, coincidental contextual changes. - There is a possibility of recall bias; however, it is likely that the participants recalled the aspects of treatment that were most salient to them. - Telephone interviews prevented the interviewer gathering non-verbal contextual information, although this form of interview was more acceptable to participants than a face-to-face interview. Introduction {#s1} ============ Chronic pain is commonplace in half to two-thirds of participants with major depressive disorder.[@R1] [@R2] The association between pain and depression becomes stronger as the severity of either increases,[@R3] [@R4] and the impact of both problems on each other plays an important role in the development and maintenance of chronicity in health problems.[@R5] Participants with depression and comorbid pain are difficult to diagnose, feel an increased burden of disease, tend to rely heavily on healthcare services and are more difficult to treat.[@R6] Identifying and managing the pain symptoms that commonly occur alongside symptoms of depression may be important in improving depression response and remission rates.[@R7] Previous qualitative research reports that patients with comorbid pain and depression identify the ineffectiveness of existing pain relief strategies, a lack of tailoring strategies to meet personal needs and difficulties with patient---physician interaction as barriers to the effective self-management of their symptoms.[@R8] Patients appreciate a healthcare approach that is individualised[@R9] and are open to the value of complementary healthcare.[@R10] Two healthcare options that offer these attributes are acupuncture and counselling. There is a growing evidence base in support of the effectiveness of acupuncture for a range of musculoskeletal conditions[@R11] [@R12]; however, despite its widespread use by participants[@R13] there has been limited evidence for acupuncture as an effective treatment option for depression.[@R14] Patients with strong preferences for psychotherapy or counselling for depression are not likely to engage in antidepressant treatment,[@R15] yet the evidence for counselling as a treatment for depression is limited[@R16] despite widespread utilisation in primary care in the UK, with around 90% of general practices providing on-site counselling services.[@R17] To address this evidence gap, a randomised controlled trial Acupuncture, Counselling or Usual Care for Depression (ACUDep) compared acupuncture or counselling to usual care as treatments for primary care patients with ongoing depression.[@R18] The results showed that acupuncture and counselling were clinically effective in reducing depression in the short to medium term. In a quantitative substudy nested within this trial, which focused on the effect of comorbid pain on the outcome of treatment for depression,[@R19] it was found that approximately 50% of the ACUDep participants had comorbid pain with depression and that the participants' pain scores at baseline predicted the outcome of treatment for depression at the 3-month follow-up point. A comparison of the treatments showed that patients with depression and comorbid pain had a better outcome in the short to medium term with acupuncture. The ACUDep trial[@R18] was novel in its' investigation of acupuncture or counselling compared with usual care; yet in focusing on the clinical effectiveness of the treatments offered, the published results did not set out how the process of change occurred as a result of receiving the three treatments of acupuncture, counselling and usual care. To meet this evidence gap the aim of this qualitative study nested within the ACUDep trial is to explore patients' reports of their experiences and identify from their reports how each intervention influences long-term change. Methods {#s2} ======= Design {#s2a} ------ This research comprised a qualitative substudy nested within a three-arm randomised controlled trial conducted between November 2009 and June 2012 of acupuncture or counselling provided as an adjunct to usual care compared with usual care alone.[@R18] In this nested qualitative substudy, a purposive sampling frame was prepared to recruit interviewees in the same 2 : 2 : 1 proportion of the main trial, to include 50% men and 50% women in each arm and to balance whether in pain at baseline or not. The design used a constructivist approach to grounded theory[@R20] to ensure that the theories were constructed by the researchers as a result of their interaction with the area of the research and the participants. Participants {#s2b} ------------ Within the ACUDep trial,[@R18] 755 participants aged 18 and over with a history of on-going depression and score of 20 or more on the Beck Depression Inventory (BDI-II) were recruited by general practitioners at 27 primary care practices across Yorkshire, County Durham and Northumberland. Participants were allocated remotely by the York Trials Unit, with the allocation code concealed from the recruiting researcher, to three groups in the proportions of 2 : 2 : 1 to acupuncture, counselling and usual care alone, respectively. Within the acupuncture arm, 23 acupuncturists registered with the British Acupuncture Council for a minimum of 3 years delivered up to 12 acupuncture treatments per patient, usually weekly. Treatments were tailored to individual participants' needs within a trial protocol,[@R21] which included treating symptoms according to traditional Chinese medicine theory and the integration of relevant life-style support into the treatment strategy based on acupuncture-specific advice if considered appropriate by the acupuncturists. Within the counselling arm, 37 counsellors registered with the British Association of Counselling and Psychotherapy provided up to 12 sessions of humanistic counselling delivered according to a trial protocol[@R22] which stated: 'Counsellors will use empathy and advanced listening skills to help clients express feelings, clarify thoughts, and reframe difficulties, but they will not give advice or set homework'. Deviations from the trial protocol were permissible if considered necessary and recorded in the participant\'s log book. Usual care comprised the treatment that patients typically receive in primary care along with over-the-counter medication. Commonly prescribed medication included antidepressants and analgesics. Participants were followed up over a period of 12 months after randomisation by postal questionnaire at 3, 6, 9 and 12 months. On receipt of their final 12-month postal questionnaire and based on a sampling frame (see online supplement 1), a sample of participants who had previously consented to be contacted for an interview were invited to engage in a telephone interview of approximately 30 min duration. Altogether 52 people consented to a one to one, audiorecorded, semistructured telephone interview for this study. Interviews {#s2c} ---------- A researcher (AH) interviewed all 52 participants. The researcher was unknown to the participants prior to the interview, therefore the interview opened with an introduction designed to set the participant at ease, to reveal the context for their depression and to draw out the participant\'s account of treatment received as part of the trial. Prompts from a prepared topic guide were used to elicit the participants' experiences of depression and treatment (see online supplement 2). All the interviews were conducted between February and May 2012. On average the interviews lasted approximately 25 min (range 11--46 min). Three participants were ill and felt fatigued, but were eager to participate; therefore exploration of the questions for these people was limited in time to prevent over-burdening them. To encourage participants to relax, each participant was asked to introduce themselves by speaking about things they like to do or hoped to do and then how depression had entered their lives, before moving on to the research-related questions within the topic guide. Interviews were audiotaped, transcribed verbatim and checked for accuracy. All recordings were of sufficient clarity and content that no repeat interviews were necessary. Each transcription was checked to remove any names and assigned a participant identification number. Analytical methods {#s2d} ------------------ An inductive thematic analysis[@R23] was used to search across the dataset of 52 transcribed interviews. Using a constructivist approach to grounded theory,[@R20] data were analysed initially by AH by reading each transcript several times, then annotating ideas to generate a list of potential inductive codes developed from the dataset to capture and summarise the participants' experiences. Coding was performed sequentially on each transcript, initially without software, working systematically throughout the entire dataset. As codes were identified, they were recorded and organised on an Excel spread sheet; sections of text that demonstrated that code were then added and collated moving back and forth across the dataset making comparisons with previous data in an iterative process. Coding and extractions were checked by JE to verify that the participants' experiences were reflected and summarised accurately. As coding progressed, comparisons were made between codes and phrases and those with similar context or concepts were grouped together. This process was conducted within each interview and across interviews resulting in a codebook of 33 codes, seven subthemes and two themes associated with the experience of depression ([table 1](#BMJOPEN2014005144TB1){ref-type="table"}) and a codebook of 35 codes and four themes associated with the experience of the treatment ([table 2](#BMJOPEN2014005144TB2){ref-type="table"}). Saturation for the main themes occurred within each treatment option within five to seven interviews. The coding and identification of themes were discussed and developed throughout between AH, HM and JE. ###### Coding tree; a summary of the relationships between codes, subthemes and themes for the experience of depression Codes Subthemes Themes ------------------------------- ----------------- --------------------------------- --- -------- Muscular pain } } Headaches Gastrointestinal pain Pain Disability Search for diagnosis Tired all the time } Exhausted-worn out Debilitated Fatigue No energy Reported symptoms of depression Withdrawal Insomnia } Early wakening Nightmares Sleep disorders Too much sleep Low self-esteem } What other people think } Guilt and self-blame Negative schema Black and white thinking Family life } Motherhood Caring Home life Bereavement Isolation Shift pattern } Work overload Work strain Contextual factors Drive, motivation High bar, aiming high Crime } Bullied/threat/physical abuse Victimhood Self-harm Childhood ###### Coding tree; a summary of the relationships between codes and themes for the positive and negative experiences of treatment; factors that influence long-term change and mediating factors Codes Theme ------------------------------------------------------------------ ---------------------- ------------------------------ ---------------------- ------- Beliefs and attitudes } Pretreatment factors } Previous experience of treatment Mediating factors Participant engagement } In treatment factors Therapeutic relationship Change of perspective (common to all arms) } Reduced medication Relaxation (acupuncture) Complaints and symptoms treated Self-understanding (counselling) Positive experiences Acceptance of situation Empowerment Effective medication (usual care) Referral to National Health Service (NHS) mental health services Adverse events (acupuncture) } Terminology Time consuming Fear of needles Difficulty opening up (counselling) Clichéd phrases Negative experiences Opened a can of worms Expense Side effects of medication Long wait after referral (usual care) Lack of general practitioner time and continuity Ageism Exercise advice } } Dietary advice Reduce alcohol intake Lifestyle strategies Take time out Day-to-day structure Long-term behavioural change Distraction } Thinking strategies learned Self-talk and stoicism Cognitive strategies Social contact Seeking support To understand the participants' individual experiences of depression and the treatments received, the codes and themes were developed into a diagram (see online supplement 3) and populated with the participants' identity numbers. This enabled the researcher (AH) to trace each participant throughout the process and to make distinctions between those with depression and comorbid pain, and those with depression alone. Throughout this paper the themes are illustrated with quotes that capture and embody the participants' experiences embedded within the analytical narrative as suggested by Braun and Clarke.[@R23] Additional illustrative quotes are set out in online supplements 4--8. Results {#s3} ======= Participants recruited {#s3a} ---------------------- Of the 755 participants randomised in the ACUDep trial, 674 completed their 12-month follow-up; 518 had consented to be interviewed and of these 518, 464 (89%) were potentially eligible to join the study. Of the 61 participants invited, four declined participation and three did not respond. A total of 52 participants, comprising 24 men and 28 women with an age range of 22--89 years (mean 46 years, SD 13.8) were interviewed. At baseline, 26 of these participants had reported having moderate or extreme pain or discomfort on the EQ5D questionnaire; these people formed the pain group, the remainder formed the no-pain comparator group. As part of the ACUDep trial, 22 of the 52 had been randomised to receive acupuncture, 20 to counselling and 10 received usual-care alone. A summary is presented in the sampling frame in online supplement 1. On average, those allocated to acupuncture attended 11 sessions (range 4--12) and those allocated to counselling attended 10 sessions (range 6--12). Symptoms experienced with depression and contextual factors {#s3b} ----------------------------------------------------------- Participants reported a range of symptoms they experienced concurrently with depression: predominantly pain, fatigue and sleep disorders (see online supplements 3, 4). Most participants with depression and comorbid pain suffered from either persistent headaches or moderate to extreme muscular--skeletal pain that predated the onset of depression and compromised their mobility, to the extent that four men had considered suicide and one man had attempted suicide. Almost half of those in pain experienced sleep disturbances or an overwhelming loss of energy to the point where much of their time was spent in bed, withdrawing from social and day-to-day activities (see online supplement 3)."There are times when things like headaches and neck aches prevent sleep\...I sort of drift 48 hours without sleeping\...I have in the past been, if you like, down for a prolonged period of time\...just sleep and sleep and sleep and sleep and wake up and do something for half an hour and then go back to sleep again. I can just about function with pain killers\...The only time I did try to top myself that led to even more depression because I couldn\'t even do that right! I'd taken a boat load of the diazepam I was on, to try and calm me down. I\'d sort of stock piled some of that...washed it all down with Glenfiddich, and instead of, you know, just shuffling off quietly, all I did was end up waking up feeling absolutely dreadful in a puddle of my own vomit, and it was one of those things where, you know, it took me weeks afterwards, thinking well, I can\'t even kill myself properly. (p25,M,coun)" With regards to contextual factors, for the majority of the pain group, the pain they experienced had compromised their ability to work. Very few had social support, and for some, their being at home meant that they were the family member available to take on a caring role for a relative, which incurred further stress, ill health and isolation (see online supplement 5)."Because I was off and not working I was able to have the time to look after my elderly mother and aunt who were both in their 80 s. So I was their carer for 4 years and unfortunately I lost both of them and my father 4 years ago, within 6 months of each other\...My IBS is certainly related to depression yeah\...When I was looking after the old dears, as I call them, I was offered an operation twice and I turned it down because I didn\'t want to be, you know, incapacitated and not able to look after them. Once they passed on, I was then able to address my own health problems. (p26,M,coun)" In summary, for the participants with depression and comorbid pain, the symptoms experienced impacted on the most basic level of physiological needs, and reduced their ability to engage in social activity, while the contextual factors compromised their security through reduced income. Together these factors suggest that this group of people have few internal and external resources remaining to effectively manage their depression. Of the participants who were pain free at baseline, several people complained of tension headaches or gastrointestinal symptoms they experienced at times of heightened stress and anxiety. Several others identified distinct patterns of disordered sleep: either difficulty in settling to sleep or a pattern of early wakening. Similar to the pain group, a few tended to withdraw at times when they felt particularly low in mood."I get a lot of stomach problems actually when I feel depressed\...And of course, really tired as well---very, very tired when I\'m feeling down...Sometimes I find it really hard to cope with people. I can possibly be a bit grumpy sometimes, or really quiet. Because I can\'t really face talking to anybody on certain days\...I just can\'t bear it. (p57,F,uc)" Regarding contextual factors, the majority in the no-pain comparator group were in full or part-time employment or were relatively affluent retired professional people. For many, their experience of depression concerned feelings of low self-esteem brought about by high expectations of themselves within their working life, or hectic social schedules. Others experienced low self-esteem and threats to their security from bullying at work or as a victim from domestic violence."We\'re also dance teachers, which is supposed to be a hobby but has somehow involved taking over our lives\...we\'re teaching three nights a week, so it\'s a bit of a commitment for a hobby\...Because when we started teaching last May time\...that did give me more of an impetus to actually make the effort, because once you\'ve got teaching you\'ve got to go, because you\'re going to let people down. And I\'m always glad that I do. If I\'m having low days now, I\'m always glad that I\'ve been, because I\'m concentrating on stuff that\'s completely outside of me or completely outside of my normal life\...One of the things that\'s come through is that I hate letting people down. I\'m very hard on myself. (p45,F,coun)""I tend to keep my things bottled up\...And it really gets me down. My work suffers. My home life suffers. And everything suffers if I\'m really bogged down with something...following a particular incident, or a series of incidents\...I chose to or had to be the brunt for a lot of the aggression and violent behaviour that this man displayed at the time. So if you like, there was a particular traumatic\...there was a starting point for it. (p38,M,coun)" In general, the no-pain comparator group experienced fewer demands physiologically. Most had their basic security and social needs met; this group had larger reserves of internal and external resources available to them to cope with their depression. Processes of change reported by those receiving acupuncture: positive and negative experiences {#s3c} ---------------------------------------------------------------------------------------------- The processes of change identified within the data formed three stages: primarily, developing a therapeutic relationship; second, the individual diagnosis and treatment of symptoms; and finally, engendering changes in health behaviours. Within the pain group and the no-pain comparator group, the positive experiences tended to facilitate the process of change at each stage, while negative experiences contributed to the barriers to change. Most participants welcomed the opportunity to try something different for their depression. The acupuncturists' understanding of their symptoms and explanations of how acupuncture might help their particular problems initiated the development of a therapeutic relationship. In contrast, two people described their acupuncturist as brisk, efficient and professional, yet lacking in bedside manner."She was very positive about things\...I think you have more of an intimate relationship with the person doing that rather than just a person in an office somewhere. You\'re physically involved. (p11,M,acu)""They could do with a course in empathy. (p22,F,acu)" Within the second stage of treatment, for most participants, the therapeutic relationship was further fostered through the acupuncturist listening to the participants' concerns, and treating the symptoms of depression depending on what was diagnosed to be of most important to the participant at that point. Within the pain group, several people experienced relief from musculoskeletal pain which tended to last for a few hours or days after the session and improvement commonly built up over several sessions. Several also reported feeling deeply relaxed during the sessions and an uplifting sense of well-being afterwards."I thought it was quite a strange sort of feeling, but I sort of felt better quite quickly. And then I went to the second and the third, it was...it completely lifted my mood and it made me feel more motivated...It was almost as if a weight had been lifted off my head and all of a sudden I felt like some energy had come back. (p3,M,acu)" With regards to negative experiences, one woman reported extreme tiredness after the acupuncture session, a problem that was addressed by the acupuncturist by adjusting treatment during the next session, and one man with extreme back pain attributed needling pain to his damaged nerves from a previous injury. Both of these participants concluded that the treatment went well; however, they also reported,"It was not for me. (p4,M, acu; p7,F,acu)""she'd actually hit at the root for a problem that I have with my pain, because I think at one time she put a needle in me and I kicked her. Without wanting to I involuntarily kicked her. And she\'d obviously hit upon\-- I think there was one time when I kicked out and more than a few occasions where she\'d twitched a nerve that obviously. (p4,M,acu)" In contrast, within the no-pain group two participants who were worried about the potential pain of needling prior to starting the treatment later attributed the needling sensations to the healing process. Three men thought they would have been equally relaxed if they had just rested or gone for a massage, and two other participants found the sessions too time consuming."A little bit sceptical as to whether the treatments (acupuncture) work anyway. So it was for me like, if I go and get a sport massage, it was like the equivalent of that\... (p13,M,acu)" Factors that influenced long-term change reported by those receiving acupuncture {#s3d} -------------------------------------------------------------------------------- As treatment progressed, many participants reported that their acupuncturist began guiding them to make changes to their lifestyle in order to engender beneficial long-term outcomes. For most people with pain, fear of pain and potential injury posed a barrier to engaging in physical activity. The majority of the pain group reported being encouraged to take up gentle exercise for their overall health and they also distracted themselves during periods of low mood."The things, they seem so small, but they are important. Things like, getting out and going for a walk and getting some fresh air. And just opening your eyes in the mornings and trying to cope with life. (p7,F,acu)""He started about exercise, you know, how that can make you feel more up... (p8,F, acu)""I read a lot and try to keep my mind off it. Really. (p9,F,acu)" One man developed his own technique based on how he felt during the acupuncture to help him manage low moods, while another relied on monthly acupuncture treatments alone to stay well; another considered further treatments but found the cost prohibitive."I sort of developed this technique and I don\'t know, it was like...The way I was feeling during the acupuncture\...I sort of clung on to this feeling that, or this technique of gaining that feeling, so I remember on a couple of occasions where I was out and about walking, and thinking about things that would normally would start leading me to start feeling a bit down, but it was like I\'d been given this tool in my head and I just sort of---it just sort of went onto auto-pilot. It was like pulling those feelings away and just sort of throwing them away\...Well, it lasted for a while but it started subsiding. (p1,M,acu)""I go for acupuncture now once a month and I find that any more than a month and I can feel myself sort of slipping and feeling really, you know, starting to get worse again. And then I go and I feel much, much better... (p3,M,acu)" The advice given to the no-pain comparator group was qualitatively different. Acupuncturists advised on dietary change, the reduction of caffeine and alcohol, and relaxation, which varied with the presenting symptoms and by gender. Those participants with the least rapport also tended to be those who were less willing to make behavioural changes."She also helped with giving me other things that I can do. Suggesting different foods for me to eat to make me feel more energetic\...I was cold all the time and that made me feel more lethargic as well, because all I wanted to do was stay in and go to bed and stay warm. So she was suggesting that I literally ate warmer foods, and she gave me a list of sort of Chinese medicine sort of foods that they had. (p20,F,acu)" In general, the process of change evolved in three stages. The therapeutic relationship and active engagement in recovery acted as mediators of the outcome throughout each stage of the process. In the short term, acupuncture often relieved physiological symptoms of depression and of comorbid pain. Longer-term improvement in depression was developed through the participants' active engagement in health promoting behaviours, supported by a positive therapeutic relationship. Several participants with comorbid pain had less physical ability to engage in lifestyle changes and tended to be the passive recipients of care. These participants often had fewer external resources in the form of finance and social contact to manage their depression and comorbid symptoms in the longer term. Additional quotes are presented in online supplement 6. Processes of change reported by those receiving counselling: positive and negative experiences {#s3e} ---------------------------------------------------------------------------------------------- Based on their previous experiences of counselling the majority of participants spoke of their low expectations of counselling. However, when engaged with the counselling process within the trial, most reported being relieved to have someone to talk to in confidence. For the pain and the no-pain groups, the process of change followed a common pathway: beginning with the participants' disclosure of personal information and being listened to."I found that process to be very valuable...I found X was very much listening and empathising, but maybe offered interpretation a bit more than the National Health person. (p37,M,coun)" For most participants this two-way active engagement appeared to nurture a therapeutic relationship between the participant and counsellor. Four male participants welcomed the opportunity to speak to a male counsellor, a choice which put them at their ease, and facilitated the process. Three others found difficulty engaging with their counsellor and attributed this problem to a personality clash. This presented an early barrier to the process of change."A lot of it does depend on who the counsellor is...I\'m saying probably same sex works better. They probably have a clearer understanding of the male mind\...I found him particularly sympathetic and, you know, very constructive. I think that was\...I was very pleased with the way it went\... (p40,M,coun)""Every single counselling cliché that you have about, oh it\'s parenting issues---she kind of wheeled them all out one after the other and they were already things that I\'d thought about, considered and looked at and examined to the nth degree and then thought, no that\'s not the problem\...It felt like she was reading a script almost---like a guidebook to deal with this kind of disorder\...it was almost the complete opposite of what I felt like I needed. (p28,M,coun)" A second stage of the process of change was often identified as occurring around midway within the course of treatment. The iterative process of participants' disclosure continued, with deeper exploration of their past, which helped to clarify the participants' understanding of themselves and their situation."At the end of it, it actually for me opened up a can of worms really, and I think it did me more harm than good. A lot of my problems, especially with low self-esteem, come from the way I was brought up by my parents and my father especially. And its stuff that I\'d never addressed and it brought it all out, actually. And I actually felt worse at the end of it\...I don\'t feel so bad about it now, because I recognise why I am like I am and some of the problems I have, where they come from\...Although I say they\'d opened up a can of worms, and brought some upsetting experiences back\...I think it was good to do that. Because those sort of things had been bottled up for many, many years\...it\'s actually made me address them. (p26,M,coun)""It made me realize that I just held everything in. From being a little girl, everything that had ever bothered me it was never talked about. You know, I\'m quite lucky that I\'ve never had any real abuse or anything like that. It\'s just that I\'ve got memories of being a child and things were said and it hurt. And I just locked it away. And I did that for years. (p41,F,coun)" Several participants realised what factors triggered and perpetuated negative thoughts, some of which were unfounded. For one man with chronic pain, this meant going through a grieving process for the loss of his former way of life before setting in place new ways of thinking and coping."You know, I think that was the big thing that I got from it, you know---that I could see myself more positively after having the time with him. And understand that some of the negative thoughts that were coming to my mind were not reality, if you like. To let them sail past and focus on the good things that I\'ve done in the past. (p38,M,coun)""Everything that defined what I was has now gone. And it took an awful lot of grief, if you like, to come round to the fact that it was worth trying again. (p25,M,coun)" The use of metaphors was particularly useful for de-cluttering unnecessary thoughts about their past, regaining perspective, setting their problems into context and focusing on what was important."the discussions were much more free than I\'d kind of anticipated they might have been, was using metaphors and analogies and stuff like that, to be able to describe things and move through things. And the pictures were just coming to me in my head, like. I had one which was sort of like a circuit board and it felt like some of the wires were not quite wired up properly and they weren\'t working and stuff like that. And I can kind of track the metaphors throughout the whole process and it feels like it was much more of a---like it all opened up. (p38,M,coun)" Factors that influenced long-term change reported by those receiving counselling {#s3f} -------------------------------------------------------------------------------- The final stage in the process of change was directed towards enabling the participants to maintain progress independently. Gender differences became apparent in the coping strategies adopted; the majority of women took up health and well-being strategies. Compared with the women in the pain group, the women in the no-pain comparator group were able to use a wider range of resources to cope with, and engage in social activities more easily. One woman recalls being given cognitive behavioural homework to overcome a particular anxiety."She gave me sort of little exercises. I found it very difficult to walk down to a friend of mine. She lives in quite a built up area\...People were sitting out in their gardens and I found it very intimidating. I didn\'t like it. I'd become really sweaty, short of breath walking down through her estate to go and see hear\...basically she just taught me to get a grip on myself really, by pointing out, you know, that everything was going to be all right\...short sharp steps really. And that I\'d got the coping mechanisms and I could do it. (p32,F,coun)" Many male participants appear to have continued to practise the cognitive strategies learned within the earlier sessions, and applied them to their life outside the sessions. However, male participants with depression and comorbid pain found greater difficulty sustaining these strategies and returned to their general practitioner for further help. In summary, the majority of participants had had previous experience of counselling; however, their initial low expectations of success receded as the course of treatment progressed. A few counsellors practiced a more directive intervention than humanistic counselling, according to the need of the participant. The process of change comprised three stages, each mediated by the quality of the relationship and the participant\'s active engagement. Additional quotes are presented in online supplement 7. Processes of change reported by those receiving usual care {#s3g} ---------------------------------------------------------- Participants in all three arms received usual care throughout the trial. The process of change within usual care was less evident. Differences in the appraisal of general practitioner care were apparent: three older participants with depression and comorbid pain who were allocated to usual care alone reported a lack of understanding and continuity of general practitioner and they felt abandoned without hope. One 89-year-old woman reported:"I would never go to a doctor again. I am, because I suffer a lot of pain that I needn\'t have done if he\'d been different...if he\'d have listened to me instead of just pooh-poohing it off and saying, oh no, it\'s not that. If he\'d have really listened to what I was saying, he could have done more for me\...he\'s ignored what I\'ve told him. Well, in fact he\'s very often just ignored it all together. Pretended I hadn\'t said it\...You see, at my age you can\'t really change doctors. There\'s not many doctors want to take somebody on that\'s 90 years old, do they? When I\'m having a really bad day\...you know, and I feel I can\'t turn even to the doctors, you know, then yeah, I do get depressed. (p51,F,uc)" In contrast, the majority of participants who were pain free pointed to a relationship based on trust as being a component of their steady improvement over time. For most people, a regular monthly 10 min consultation was helpful and constructive. A few felt that their general practitioner had made additional time for them when they were most in need."He sees me every month. I have monthly meetings with him just to have a general chat about how things are\... I get on fine with him. As I say, I can talk about just about anything with him, so I suppose in a way, he\'s sort of, if anything he\'s been maybe a counsellor for me, because, you know, I can sit and talk to him about stuff\... (p58,M,uc)" All participants at some time had been prescribed antidepressant medication. The majority of participants on long-term antidepressant medication raised concerns about the side effects; participants in the pain group were particularly concerned about the potential effects of mixing medication for their other medical problems with their antidepressants. A few acknowledged that they needed antidepressants to maintain long-term stability."Staying on medication, it has transformed my life and made everybody else\'s life around me better as well. And I wish I\'d have done it sooner\...It must be four or five years now and yes, it\'s been life transforming\...When I started on my medication and I could realize the difference---the two people I was, almost. (p7,F,acu)" In addition to medication, during the period of the trial general practitioners referred participants to a range of secondary services: two young women received three sessions with a mental health link worker, an intervention which had enabled them to regain control of their lives; three others had been advised to try online cognitive behavioural therapy which two found to be easily accessible and effective; one man at risk of suicide was referred for urgent psychiatric help."I was referred rapidly to A&E and was assessed by X the psychiatrist. And I was put on to intensive home treatment. Which was invaluable. As a condition of not being sectioned\... (p59,M,uc)" Referrals for younger patients had been beneficial although the waiting times were long and not always found to be acceptable, leaving most patients without adequate support in a time of crisis, and without sufficient money to pay for private care."I go to the doctors and I have to wait a matter of I don\'t know how many months before I can get, you know, onto the counselling and you know, it\'s just like the moment\'s gone, sort of thing\...Unfortunately that can cost a lot of money---I\'m on benefit. I can\'t afford it\...I don\'t hold out much hope. (p50,F,uc)" Factors that influenced long-term change reported by those receiving usual care: positive and negative experiences {#s3h} ------------------------------------------------------------------------------------------------------------------ For those who received help via a referral, the advice followed a familiar pattern: to engage in lifestyle changes, to add structure to the daily routine, and to use distraction to reduce the focus on the symptoms and negative feelings. However, without support the stoicism of 'forcing myself' was a prominent default strategy among most usual care participants."I force myself to do things and then I generally feel better (p57,F,uc)""It\'s forcing myself. Well, it\'s a survival strategy\... (p59,M,uc)" Overall, the continuity of always seeing the same general practitioner was reported to be important and beneficial. By contrast, some older participants with depression and comorbid pain remained caught in a seemingly hopeless cycle of seeking diagnosis and treatment for a physical complaint and without resources to seek private healthcare services. Most patients who received acupuncture or counselling were also happy with the attention from their general practitioner, but had welcomed the additional treatment provided within the trial as an adjunct to their usual care. Online supplement 8 presents a number of representative quotes. Discussion {#s4} ========== Principal findings {#s4a} ------------------ The participants' experiences of depression were a complex interplay of internal and contextual factors. Compared with participants with depression alone, participants with depression and comorbid pain had fewer internal and external resources available to effectively manage their depression in the longer term. Acupuncture and counselling treatments were individualised interventions that operated from different perspectives. Acupuncturists appeared to work from a more physical perspective to directly relieve the symptoms of depression as they presented and then helped the patient engage in health behaviours that had a positive influence on long-term change. In contrast, counsellors helped guide the patient to identify and confront underlying causes of depression and then find their own way forward. Usual care relied primarily on pharmacological interventions. Processes of change comprising three stages were identified within acupuncture and counselling, each with specific active components. For both interventions, participants reported that the establishment of a therapeutic relationship and their active engagement helped them develop coping strategies that in turn helped them be more effective in reducing their depression in the longer term. Gender differences were apparent; the majority of women utilised a wide range of health behaviours, distraction and social contact, while men relied predominantly on cognitive strategies to manage unhelpful negative thought processes. Strengths and limitations {#s4b} ------------------------- Qualitative analysis of participants' reports of acupuncture and counselling compared with usual care provided within a randomised controlled trial is novel. This study was nested within a 12-month randomised controlled trial of the effectiveness of acupuncture or counselling for depression compared with usual care. The 52 telephone interviews were obtained from a wide range of participants in socially diverse settings. The interviews provided rich data on the participants' experiences of depression and the treatment received in the trial. The thematic analysis was conducted using a bottom-up process to allow the themes to develop directly from the participants' own words. We have presented the positive and negative experiences of each form of treatment, whether treatment was beneficial or not, and we are able to enrich the quantitative results of effectiveness of the treatments offered with the qualitative data. These qualitative findings are concordant with, and supplement the quantitative data[@R19] from the ACUDep trial which showed that participants with moderate to extreme pain at baseline had worse outcomes at 3 months for depression than the no-pain comparator group in all three treatment arms. Our findings extend the findings of the trial\'s quantitative data in two ways: first, they offer insight into how pain and disability may erode the internal resources available for the effective management of depression. Moreover, these limitations compromise the person\'s security by reducing ability to generate external resources such as financial income and social contact. Second, based directly on participants' accounts, our findings identify mechanisms within the processes of change that are specific to acupuncture and counselling that facilitate reduction in the symptoms of depression. Our study has some limitations. Participants may have attributed changes directly to treatment rather than concurrent, coincidental contextual changes. To capture the participants' experience in the longer term the interviews were conducted after the participants completed their 12-month follow-up questionnaire. We accept there is a possibility of recall bias as it has long been known that there is a significant, stable association between depression and memory impairment[@R24] which may have altered what was recalled and how it was recalled. This lack of recall is reflected in the brevity of some of the interviews. Although all the research questions in the topic guide were covered in the interviews, the poor recall of some experiences did not permit a lengthy exploration. However, our aim was to learn more of the experiences of depression and treatment in the longer term and it is likely that the participants recalled the aspects of treatment that were most salient to them. The lack of face-to face contact during the telephone interviews prevented the interviewer gathering non-verbal contextual information such as social cues, body language, appearance and setting to supplement the verbal answers of the interviewees. A face-to-face interview may have resulted in slightly longer interview; nevertheless, a recorded telephone interview was convenient and might be considered to be more acceptable to participants in terms of time and anonymity. Comparison to other studies {#s4c} --------------------------- That depression in the presence of pain is associated with a poorer response to treatment for the depression corresponds with previous studies of depression and pain comorbidity.[@R2] [@R7] Patients with depression and comorbid pain tend to exhibit a cognitive bias specific to negative aspects of health and are more likely to report less favourable outcomes of treatment.[@R25] [@R26] Many of the pain group participants had a musculoskeletal problem alongside their depression, and reported of fatigue and sleep disturbances. This cluster of symptoms has also been identified in 36% of older people suffering from osteoarthritis of the hip and knee.[@R27] The characterisation of depression as a cycle of pain, fatigue and withdrawal that impacts on daily functioning and social activities is consistent with evidence showing that these factors create an enduring cycle of depression.[@R6] [@R28] The cyclical nature of pain problems are known to activate catastrophic worry and accentuate the symptoms of depression; coping strategies such as relaxation and distraction techniques are a good way of regulating emotions if the pain is not too intense.[@R5] Older people with chronic pain and depression were identified in this study as the least satisfied with their primary care service, a finding which echoes earlier findings where patients with multiple physical symptoms and depression posed a greater clinical burden[@R2] [@R7] and were perceived as 'difficult' by general practitioners.[@R1] With regards to the mechanisms of change, our findings identify three clear stages within acupuncture and counselling. The establishment of the therapeutic alliance in the early stages is an essential component from the outset of treatment. This extends the findings from within a pragmatic trial of acupuncture for back pain[@R29] [@R30] and supports an earlier model of the process and mechanisms that contribute to ongoing change in counselling developed from the user perspective.[@R31] Historically, the therapeutic alliance has been regarded pejoratively as a placebo 'feel good factor' based on the grounds that most individuals seek positive feedback to reinforce their own behaviour.[@R32] However, where this argument focuses on 'visiting' a therapist for advice and help, it misses the point that the intervention-specific advice and positive reinforcement used in conjunction with the participants' active engagement in their rehabilitation will activate beneficial behavioural change.[@R8] An earlier study found that some participants had difficulty putting self-care advice into practice, even when they were intellectually committed and suggests that practitioners may need to follow-up more carefully on the advice they have given.[@R33] Implications for practice and future research {#s4d} --------------------------------------------- Previous work has advocated that the management of depression and comorbid pain should involve the treatment of physical and psychological components together, and the treatments should be customised and directed to addressing comorbidities.[@R34] Psychiatrists and general practitioners often feel ill-equipped to adequately manage the complex presentation of symptoms associated with depression and comorbid pain. A shift in care is required from the current focus on the medical aspects of physical health to an all-encompassing approach that takes into account the biopsychosocial effects of depression and comorbid pain.[@R35] Future research should investigate the effectiveness of using a sequential strategy of acupuncture for early relief of symptoms, especially where there are physical symptoms, followed by counselling to address deeper psychological issues and develop cognitive coping strategies to break out of the cycle of depression. In the meantime, for those who have depression and physical symptoms, our evidence suggests that acupuncture could be a useful initial referral option. Conclusion {#s5} ========== Differences in the way depression is experienced by people with depression and comorbid pain impact on the participants' engagement with treatment and on the response to treatment for depression. The processes of acupuncture and counselling had specific identifiable effects that were beneficial to the majority of participants. The therapeutic relationship and participants' active engagement in recovery may play distinct roles in driving long-term management of depression and comorbid pain. This study has implications for policymakers and providers of care for primary care patients with depression and comorbid pain. Providers of care may wish to consider a short course of acupuncture to relieve symptoms of depression in patients who present with depression and comorbid pain, prior to a referral for counselling if needed. Supplementary Material ====================== ###### Author\'s manuscript ###### Reviewer comments The authors acknowledge the contribution of the patients, counsellors, acupuncturists and general medical practitioners; the ACUDep trial management team; and Anne Burton for transcription services. **Contributors:** AH is a research fellow from a nursing background whose research focuses on the non-pharmacological management of chronic pain and depression and also conducted the interviews and analysis, interpreted the data, drafted and revised the article. JE is a qualitative researcher and research administrator whose interests are based on feminist theology and older peoples' lives and assisted with coding, advised on analysis and gave final approval for publication. HM is a practising acupuncturist and senior research fellow specialising in the effectiveness, cost-effectiveness, mechanisms and safety in the evaluation of complementary medicine and revised critically important intellectual content and gave final approval for publication. **Funding:** This article presents independent research funded by the National Institute for Health Research (NIHR) under its Programme Grants for Applied Research Programme (RP-PG-0707--10186). The views expressed are those of the author(s) and not necessarily those of the National Health Service, the NIHR or the Department of Health. The funders, and the University of York in its role as sponsor for the study, had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. **Competing interests:** None. **Ethics approval:** The topic guide had been piloted previously and granted ethical approval by the University of York NHS Research Ethics Committee (09/H1311/75). **Provenance and peer review:** Not commissioned; externally peer reviewed. **Data sharing statement:** No additional data are available.
{ "pile_set_name": "PubMed Central" }
The Dutch House was an experiment in what Denieuwegeneratie refers to as both sustainable hardware and software. Sustainable hardware consists of locally-sourced lark timber used to frame the ample facade that allows residents to peer out into the woods, unfinished concrete that was necessary to retain the mountain, and a canopy that regulates sunshine year-round. Sustainable software installed by Arup in Amsterdam consists of the photovoltaic panels that power the home, LED lighting that reduces overall energy consumption (bolstering the effect of the earth home’s insulating properties), and a wood pellet used to keep the home warm during wicked winters. CO2 monitored ventilation ensures that the barest amount of energy is consumed to keep air quality high and a greywater circuit allows this family to keep their water footprint low as well. There is much more to say about this extraordinary home, which showcases bedrooms decked out to suit quirky individual tastes. Part of the home has a cave-like feel, though slits in the mountain permit daylighting, while the living areas are open and vast – like the forest beyond. All in all, if this is an experiment, sign us up for the next round of tests!
{ "pile_set_name": "Pile-CC" }
For Forrest Point bartender Dustin Olson, coming face to face with a drink called the Jungle Bird wasn’t just about finding a tipple that epitomized balance (though that was an “A-ha” moment for him). The discovery also showed Olson that he was on the right path. Olson supported his passion for the performing arts by working in the restaurant industry, slinging drinks and food in all sorts of establishments, from the type Pete Wells would review to sports bars. “Looking back at a career in the business that had been 20 years long, I decided to take things a little more seriously,” he says. He had minimal experience with cocktails, though, and he wasn’t in tune with New York’s emerging cocktail scene until a chance encounter with Ward III’s Michael Neff landed him a spot trailing at one of the city’s best rum houses. That kickstarted a career shift to mixology. “Mikey Diehl. Michael Neff. Ken McCoy. Vincent Favela…I had a lot of people who were willing to teach me,” Olson says. He seized the opportunity and was immediately thrown into the thick of things due to the bar’s renowned bespoke cocktail menu. “The bespoke program is trial by fire,” he says. “You need to get your templates and your classics down very quickly. A lot of what you are doing is snake-charming. At the end of the day, you’re using one of 10 templates.” It was at Ward III that Olson learned about the Jungle Bird. “I rose through the ranks at Ward III with Mikey Diehl, whose knowledge of all things tiki made the slow Sunday shifts we shared a whole lot more interesting,” he says. “One night, he introduced me to the Jungle Bird as a rare example of a classic tiki cocktail that prominently featured a bitter element. I was hooked, and started making it for anyone who deferred to me for their choice of drink. Even those who didn’t necessarily enjoy it (which did not happen often) couldn’t deny that, at the very least, it had a whole lot to say. To me, it was a lesson in the glass…I’m not sure there’s a cocktail that provides a better lesson in using a bitter component to achieve balance. If I said I was making you a drink that had Black Strap rum, pineapple juice, and simple syrup in it, you’d likely book a dentist appointment before taking a sip. Yet with the addition of Campari, you have a drink that’s complex, delicious, and, yes, wonderfully balanced…I tasted it and I was like, ‘That’s a cocktail.’ “ Olson also marveled at how seemingly disparate components worked together. “Black Strap rum is quite difficult to work with,” he says. “It’s got a very heavy maple component. It’s very rich. The maple overwhelmed everything. We had it in an atomizer….Pineapple juice and orange juice are a bit tricky. You’re dealing with a lot of elements here that can overwhelm a cocktail.” Check out Olson’s recipe: The Jungle Bird A note from Olson: “The original recipe calls for 4 ounces of pineapple juice and Jamaican rum. From what I understand, it was Giuseppe Gonzalez who introduced the Black Strap, and recent versions call for 1.5 ounces of pineapple juice. Mr. Diehl prefers even less pineapple, and I concur. Here’s the one I make.” Build all ingredients in a shaker. Add ice, shake (with conviction), and strain over fresh ice in an Old Fashioned glass. Garnish with any tiki accoutrements you deem appropriate. In addition to Ward III, Olson enjoys grabbing a Jungle Bird at Featherweight and notes that most competent bartenders should know how to make one, though “extra consideration should be paid to bars that employ fresh pineapple juice.” Olson often follows that with a Haitian Divorce. “Tom Richter did a series of Old Fashioned variations using Pedro Ximenez sherry as a sweetener while running the program at The Beagle (RIP),” he says. “Thankfully, he’s brought them over to Dear Irving and Raine’s Law Room. You’d also be able to order them at Milk & Honey or Attaboy. My personal favorite is the Haitian Divorce.”
{ "pile_set_name": "Pile-CC" }
Pancreatic cancer is one of the most devastating human cancers and is the fourth leading cause of overall cancer-related mortality in the United States. Currently, there is no clinically effective therapy for pancreatic cancer. The only chance for complete recovery is surgical resection; however, only 15-20% of patients have a resectable tumor, and of those only 20% survive up to five years after surgery. Pancreatic cancer metastasizes early and extensively, and invades surrounding tissues aggressively. In addition to its rapid progression, nearly all conventional chemotherapies and radiation treatments are ineffective against pancreatic cancer. Even when diagnosed early, patients with pancreatic cancer have <1% chance of a complete recovery. The high resistance of pancreatic cancer to available conventional chemotherapies along with its aggressive nature highlights the urgent need to develop novel effective adjunct therapies to combat this devastating cancer. Pancreatic cancer cells are known to be remarkably tolerant to nutrient and oxygen deprivation under hypovascular conditions. Hypoxic and nutrient-deprived pancreatic cells which have adapted to survive under these conditions in tumors, both elude conventional anticancer therapies and also drive forward disease progression. Therefore, agents that eliminate the ability of cancer cells to survive under nutrient starvation conditions are potentially useful anticancer agents. In 2006, a coumarin-based natural product, angelmarin, was isolated from the root of the Japanese medicinal plant, Angelica pubescens. Angelmarin was found to exhibit cytotoxicity of 0.01 μg/mL against the pancreatic cancer cell line PANC-1 under nutrient starvation conditions within 24 hours. Angelmarin is a coumarin-based natural product with a molecular formula of C23H20O6 and a chemical name of 11-O-(p-hydroxy-cinnamoyl) columbianetin. Coumarins are ubiquitous structures present in a large number of natural compounds comprising a broad range of powerful physiological activities including anticancer, anti-viral, antifungal, anti-inflammatory, antioxidant, anticoagulant, antibacterial, antitubercular, and analgesic activities. Because of their diverse pharmacological properties, coumarins have attracted intense interest in recent years. Among these properties, the cytotoxic activities of coumarins have been the most extensively studied and coumarin compounds have served as valuable leads for further design and synthesis of more active anticancer analogues.
{ "pile_set_name": "USPTO Backgrounds" }
Andrew Joseph Steven Andrew Joseph Steven (born 21 May 1985) is a Scottish professional basketball player with the Scotland national basketball team. Currently playing in Spain for Quintanar del Rey in the national 1 division. He also has had short spells with the Scottish Rocks in two separate occasions. He played for St. Mirren basketball club for 9 years before moving to Spain on 30 August 2007. He scored 28 points in a record breaking victory for Scotland Universities against England in his second year with the team (2005–2007). He currently holds a BUSA record for most points in a game at 86, in an overtime win against Napier University. He plays the shooting guard position and wears the number 6 jersey. References Category:1985 births Category:Living people Category:Sportspeople from East Ayrshire Category:Scottish men's basketball players Category:Shooting guards Category:Glasgow Rocks players
{ "pile_set_name": "Wikipedia (en)" }
Q: Is there any point to adding additional security inside SSL? If I were to add additional encryption inside my HTTPS stream, would I be making worthwhile improvements? Problem: The NSA stores a massive amount of data, perhaps most of it is encrypted and at some later date they may be able to decrypt it. Possible solution: Generate a private/public key pair on the server, use the public key client side to encrypt the sensitive data and send back to the server over HTTPS. This means that you're encrypting it twice with public key cryptography, once with HTTPS and a second time via a library such as Stanford Javascript Crypto Library In the case that the SSL certificate is compromised, the second layer of encryption protects your data. Question: I am not asking how to do this, I am asking is it worthwhile to do this? Another way of asking this question is: "If SSL is compromised by the NSA now or in the future, and we know that the NSA is collecting all the internet traffic, is it wise to add another layer of encryption?" A: A bit opinion-based, but I'd say No. If the NSA can read TLS because an error in the protocol and/or implementation: While TLS has and had problems, it also has the whole world using it. Homebrew solutions are unlikely to be better. (To start with, This means that you're encrypting it twice with public key cryptography is wrong. TLS doesn't encrypt the whole data with a public-key-scheme. That would be insane.) If the NSA can read TLS because they have enough compuation power to crack everything in a reasonable time: One or two times doesn't make much difference anymore. If the NSA is using malware, bribes etc. to get access to certificates and/or directly inject something to Apache etc., another layer of transport encryption won't help. And so on...
{ "pile_set_name": "StackExchange" }
Q: xen - server won't rejoin pool after patch/boot Have a pool of 3 servers. All are Xen v6.2. Applied latest patches this morning in the usual fashion: Patch pool master Move VMs off of slave machine 1 and restart it Repeat with slave 2 and then master This has worked previously. This morning the first slave won't come out of maintenance mode. Have attempted multiple reboots, 'restart toolstack' and even removing it from the pool. Most report "Cannot forward messages because the server cannot be contacted. The server may be switched off or there may be a network connectivity problem." I know this isn't the case as I can SSH to the machine from elsewhere in the subnet. Suggestions as to where I went wrong and how to fix this? A: You should restart the MASTER first, then the slaves. This has been the recommended sequence for as long as I can remember. Reboot the XenServer host. Reboot the pool master first. Do not place the pool master into maintenance mode because this designates another host to be the pool master. You will then have a slave with a higher version than the pool master. Recovery would involve reinstalling XenServer; there is not a rollback process for XenServer hotfixes. Source: http://support.citrix.com/article/CTX132791 If you didn't put the original master into maintenance mode, then you might be able to get away with forcing the master to restart, then the slave will be able to talk to it again.
{ "pile_set_name": "StackExchange" }
Cytotoxic T lymphocyte antigen 4 gene polymorphism associated with ST-segment elevation acute myocardial infarction. Cytotoxic T lymphocyte antigen 4 (CTLA-4) is a particularly important molecule in down-regulating T-cell expansion and cytokine production. The purpose of the present study was to determine the frequency distribution of an A/G single nucleotide polymorphism at position 49 in exon 1 of the CTLA-4 gene, which may be a functional related-genetic risk marker for the development of ST-segment elevation (ST-se) acute myocardial infarction (AMI). A total of 503 consecutive patients, consisting of 250 ST-se AMI patients undergoing primary coronary angioplasty (group 1), 203 angina pectoris patients undergoing elective coronary angioplasty (group 2) and 50 patients with chest pain and normal coronary angiographic findings (group 3), were enrolled in the present study. The frequency of the G/G genotype was significantly higher in group 1 (53.2%) than in groups 2 (33.0%) and 3 (36.0%) (p=0.0005). In group 1, patients with a G/G genotype had significantly higher levels of high-sensitivity C-reactive protein and white blood cell counts, and much higher incidences of multi-vessel disease, greater lesion lengths, advanced congestive heart failure (>or=class 3) and 30-day mortality, than patients with G/A or A/A genotypes (p values<0.05 in all cases). Multivariate analysis of the enrolled baseline variables (age, gender, diabetes mellitus, smoking, hypertension and hypercholesterolemia) and the genotypes (G/G, A/G and A/A) demonstrated that G/G genotype is the only independent predictor of development of AMI (p<0.0001). The G/G genotype polymorphism of the CTLA-4 gene is associated with increased risk of AMI.
{ "pile_set_name": "PubMed Abstracts" }