text
stringlengths
0
6.48M
meta
dict
U.S. Millennial Parents an Exception to Allowing Robot Surgery on Children We Asked Knowing that surgical robots powered by artificial intelligence are bringing new innovations and accuracy to the operating room, how likely would you allow robots powered by artificial intelligence to conduct surgery on your child? Millennial Parents Said Surgical robots powered by artificial intelligence are bringing new innovations and accuracy to the operating room. Millennial parents in Asia are significantly more likely to allow robots powered by AI to conduct surgery on their Generation Alpha child — even more so in 2019 as compared to 2018 (China: 94% in 2019 vs. 82% in 2018; India: 86% in 2019 vs. 78% in 2018), while in 2019, 51% in the U.K. (a six percent increase over 2018) and 46 percent of Millennial parents in the U.S. ( a 1% increase from 2018), say they would be very likely. In Brazil, 69% of Millennial parents in 2019 say they would be very likely to allow robots powered by AI conduct surgery as compared to 60% in 2018. What’s more, in 2019, 25 percent of Millennial parents in the U.S. and 21 percent in the U.K. say they would be “not likely at all” to allow this surgery on their child. “Robotic surgery is one of the fastest growing and highly promising applications of technology into medicine. The application of robotics surgery is not just limited to joints and abdomens, but also to help procedures for heart, brain, spine and almost everywhere.”
{ "pile_set_name": "Pile-CC" }
A scoutmaster and his wife were driving along a rural lane when they found the road blocked by a herd of cows that had escaped through a broken fence. The scoutmaster tried honking the horn to scare the cattle from the road, but to no avail. For some reason, no sound was heard at all. He got out of the car, lifted the hood, and saw the problem. A wire had come loose from the horn, an easy matter for a scout to fix. As he got back in the car, his wife asked if he'd had any luck fixing the horn. "Of course," he replied. "You know the Scout Motto. Beep repaired." (I can't take credit for this, it comes from a local advertising newspaper that uses jokes as filler.) Life is like playing chess with chessmen who each have thoughts and feelings and motives of their own. A man showed up at a costume party with a girl on his back. Other party goers were confused by the man's costume. Eventually, a woman approached the man and asked about his costume. "I'm a snail," said the man. "But there's a girl on your back," the woman replied. "I know," said the man. "That's Michelle." A chap and his wife are planning a very special dinner party. The wife sends him down to the nearby beach to gather fresh snails, to feature in the appetizers. When he gets to the beach, it is late afternoon. The beach is deserted, save for the most beautiful and sensuous woman he had ever seen. They got to chatting so companionably that he ended up dallying the night away with her. The next morning, he got up and remembered that, not only had he committed adultery, he also blew off his guest and the dinner party. He headed for home, wondering what he can possibly do to save the situation. Suddenly he had a flash of brilliance. As he approached his stoop, he scattered the snails all over the stairs. Then he called out in a loud voice. "Come on boys! We're almost there!" "Time is nature's way of keeping everything from happening all at once. Lately it hasn't been working."Anonymous In the 1800s, the Tates Watch Co. was known for its fine products. But it decided to branch out. It decided its watch cases could hold compasses. It could sell them to pioneers heading west. But their compasses were bad! Many travelers ended up in Mexico or Canada instead of California. That gave birth to the expression, "He who has a Tates is lost." As everyone knows, Alexander the Great was a military genius who conquered a large part of the known world in his time. What is little known is the source of the success of his campaigns. He secret was in the timing of the various portions of his attack. There is a class of chemical reactions called "clock reactions" wherein certain chemicals mixed together in the right proportions will exhibit a color change within a predictable time period; some reactions will oscillate continuously from one color to another. Alexander's alchemists had discovered this, and he used it to gain his military advantage. Strips of cloth that had been dipped into one of these chemical concoctions were distributed to his troops. Thus, he was able to give his troops orders to coordinate their attacks so they would start simultaneously at a particular time in the near future. This strip of cloth has come to be known as Alexander's Rag Time Band. Regards//Larry "To preserve liberty, it is essential that the whole body of the people always possess arms, and be taught alike, especially when young, how to use them." -- Attributed to Richard Henry Lee Groundhogs are also known as "whistlepigs" because when they are outside their burrows it is common to see one or more individuals standing erect on their hind legs watching for danger. When alarmed, they use a high-pitched whistle to alert the rest of the colony. Some settlers in Nevada in the late 1850s, possessed of a warped sense of humor, set out to use this behavior to their advantage. The began collecting groundhogs in live traps and training to whistle on command. Each animal had a distinctive whistle so that, like the infamous barking dogs version of Jingle Bells, these merry pranksters were able to have the groundhogs whistle various religious hymns in four-part harmony. After a great deal of time spent training the groundhogs, they made robes for them out of cloth napkins and took them on tour to their Eastern neighbors in Utah, where they were introduced as The Marmot Table-napkin Choir. Regards//Larry "To preserve liberty, it is essential that the whole body of the people always possess arms, and be taught alike, especially when young, how to use them." -- Attributed to Richard Henry Lee Hey, I'm talking table-napkins in the plural and large rodents that still only run between 4.5 and 9 pounds, and only 30 pounds max. It would be hard to press at all; since it's smaller it would be quicker and easier to press. I could make a costume for my 50-pound Basgle with several large table napkins, but he wouldn't appreciate it, and I don't think I could safely get it on him. Regards//Larry "To preserve liberty, it is essential that the whole body of the people always possess arms, and be taught alike, especially when young, how to use them." -- Attributed to Richard Henry Lee
{ "pile_set_name": "Pile-CC" }
HYDERABAD: The Hyderabadi biryani, a delicacy that has the Nawabi moniker stamped all over it and one with fans all over the globe, is shrinking. An image makeover only in size and price to fall in suit with changing times is the alibi. The aroma and taste of this distinct feature of the 400-year-old city, as old as Hyderabad itself, that first emanated from the Nizam's kitchen along with `mirchi ka salan' and accompanying delicacies, fortunately remain the same, good old and lip-smacking. A dish that has been victim to culinary experiments of almost everyone while trying to whip up their own versions, the `revamped' biryani comes in the form of a `single plate', priced Rs. 30-35, and aimed at working executives, those who saunter into Irani restaurants alone at noon. Mohammed Mohiuddin, a partner of Mehfil Restaurant on Raj Bhavan Road claims first rights to the amendments on the biryani platter. "We are offering a full biryani for Rs. 60. The single biryani is for those who want to have biryani but do not have the appetite to polish off a full plate. Both chicken and mutton single biryani are available, priced at Rs. 35 each," he says. The number of juicy meat pieces too has come down in the `single' plate, naturally. "We used to provide an average of eight pieces, both small and big, in a full plate. Now the pieces, marinated in curd and steamed with biryani rice, are around four," Mr. Mohiuddin explains. The regular quantity is also served for those who can devour it. Necessity-driven Omar Farooq, a Mehfil regular and member of the growing fan club of the fragrant single plate biryani, says the mutation is more of a necessity-driven change than something that could `harm' the originality of Hyderabadi biryani. "It shows that Hyderabadi biryani is an indispensable item on every Hyderabadi's menu. Just to have it, we are only altering the quantity slightly," he says. The renovated biryani platter helps middleclass gourmets who do not want to spend Rs. 60-70, but still want to taste it, and those who would like to have it as a side dish, reasons Mr. Mohiuddin and adds: "It is a legend modified, for the good."
{ "pile_set_name": "Pile-CC" }
Employment Application How / where did you hear about this position? (ie newspaper / internet, etc.) Ideally, how many hours a week do you want to work? What is the shortest shift you would be willing to work? 1-2 hrs 2-3 hrs 3-4 hrs 4 hrs or more Which hours are you available to work? (please select all that apply) Morning (7am-10am) Daytime (10am-3pm) Evening - Sleepover (3pm–10pm) Mondays: Morning Daytime Evening - Sleepover Tuesdays: Morning Daytime Evening - Sleepover Wednesdays: Morning Daytime Evening - Sleepover Thursdays: Morning Daytime Evening - Sleepover Fridays: Morning Daytime Evening - Sleepover Saturdays: Morning Daytime Evening - Sleepover Sundays: Morning Daytime Evening - Sleepover Will these availabilities remain the same for the next 6 months? Yes No Gellibrand operates throughout the Western suburbs of Melbourne. Please check any locations that you do not wish to work at: City of Brimbank City of Darebin City of Hume City of Hobsons Bay City of Maribyrnong City of Melbourne City of Melton City of Wyndham Do you have a driver's license? Yes No If so, what classification of license is it? Learners Probationary (Red) Probationary (Green) International Full Are you an Australian citizen? Yes No If you are not an Australian citizen, what type of Visa do you have? Permanent Student Temporary Spousal Work/Holiday Other (please specify) If you are not an Australian citizen, do you have a work permit? Yes No If so, when does it expire? Do you have a current Workplace Level 2 First Aid Certificate? Yes No If not, would you be willing to get one? (at your own expense) Yes No If we offer you the position, when would you be able to start? Are you currently employed elsewhere, or doing voluntary work? If so, will this continue if you gain employment with us, and in what capacity? In the last 10 years, have you resided continuously in an overseas country for 12 months or more? Yes No If yes, you will be required to provide the relevant overseas criminal or police record check. In some extenuating cases, where this record is unobtainable, character reference checks may be conducted with at least two individuals who personally knew you while you were residing in the other country.
{ "pile_set_name": "Pile-CC" }
The Anastasia Series Anastasia was born in 1979, at the age of ten.She's been around ever since, and she's only thirteen now. I never get tired of writing about her and her family. Katherine Krupnik, her mother, reminds me of myself. Anastasia finds herself in another embarrassing mess when she accidentally puts the bag of her dog's droppings instead of her mother's packages in the mailbox, and things get worse when the police investigate the mailbox.
{ "pile_set_name": "Pile-CC" }
Q: What is the spectral domain? From https://arxiv.org/pdf/1611.08097.pdf, "Geometric deep learning: going beyond Euclidean data". Here are some uses: "methods of signal processing on graphs, which have previously been reviewed in this Magazine [43], can be applied to this setting, in particular, in order to define an operation similar to convolution in the spectral domain" "The first formulation of CNNs on graphs is due to Bruna et al. [52], who used the definition of convolutions in the spectral domain." The key difference between these approaches is in the way a convolution-like operation is formulated on graphs and manifolds. One way is to resort to the analogy of the Convolution Theorem, defining the convolution in the spectral domain. What is the spectral domain, and what does it mean in these contexts? A: When you have time series data such as $x_t$, it is the representation of the data in time domain $t$. You can apply Fourier transform, and bring this series into the frequency space: $$s_w=F(x_t)\equiv\int e^{iwt}x_tdt$$ The new series $s_w$ is called a spectrum, hence, this is the representation of the same data in the spectral domain. Convolution is an operator such as: $$(x*y)_t=\int x_{t+h} y_hdh$$ You can easily show that $$F((x*y)_t)=s_w F(y_t)$$ In other words instead of an expensive operation of convolution in time space (two nested loops), you get a simple multiplication in spectral space (a single loop)
{ "pile_set_name": "StackExchange" }
Q: In proving Sylow's Theorem (1), how could we start by assuming inductively that Sylow p-subgroups exist? In proving this Sylow's Theorem: The proof starts by assuming inductively the existence of Sylow's p-subgroups as following: Isn't it circular? A: This is the usual structure of a strong induction proof. The intuitive idea is that if the statement fails for some set of numbers, there is a smallest one that it fails for. If we show that (it is true for $n=1$ and) for all $n$, the fact that it is true for all numbers $1$ through $n$ implies it is true for $n+1$ shows there is no smallest number that it fails for, so it must be true for all $n$. Here the induction is on the size of $G$. The claim is that if there is a group without a Sylow subgroup, there is one of minimum order. When we consider that group, all smaller groups have Sylow subgroups. We derive a contradiction and conclude that there is no smallest group without a Sylow subgroup. A: Note that it first assumes the existence of Sylow subgroups for all groups of order less then $|G|$. By that assumption, it proves the existence of Sylow subgroup of $G$. Since $|G| = 1$ is a group of order less than any other groups, and $G$ is definitely a Sylow subgroup, it completes the proof.
{ "pile_set_name": "StackExchange" }
Group Blog talking about the NBA 2009 Eastern Conference Champions. Due to the amazing success of the 2009 playoff run comments are now frequently deleted to kill offensive comments, incoherence, or asininity. Comments can no longer be anonymous and require either a Blogger or OpenID account. WOW!!! just when antics Shaq's this past summer(kobe tell me how my ass tastes)were starting to be forgotten this guy goes and runs his mouth about the guy who won him a championship in miami!!! yes, i know pat riley ultimately is wearing the ring but that was SVG's team in miami and not to mention his offensive and defensive schemes!!!! All i have heard about shaq is that he is trying to establish his legacy before he retires, well his legacy is starting to get tarnished by his big mouth!! Just shut up and play ball!!!! You got outplayed and you lost back to back games to both your former teams, now shaq YOU tell ME how my ass tastes!!!! Not to mention, his playoff chances this year get smaller and smaller each loss!!! sorry bout the french guys but this one got under my skin!! Honestly, i was dreaming that the Aristotle would finish his career in Orlando where it began but ..No thanks, Shaq you can keep your ego and that neverending hole you call a mouth in phoenix, and we will stick with the BUM that is a frontrunner for coach of the year and has single-handedly made the orlando magic a contender!!! You know when you think of legendary big man i.e kareem, moses malone, bill rusell you dont hear this type of garbage but i guess that we are suppose to just deal with you, the guy who left every team that he has been with in the middle of an argument or an issue. Oh yeah and SVG does panic but he doesnt panic about someone talking a little smack about him he pancics when his team isnt playing defense or hitting free throws, something you didnt do much of!!! ORLANDO, Fla. -- Stan Van Gundy walked into the Orlando Magic locker room Thursday morning, and before he could even prepare for practice, his players had a message. "You better leave Shaq alone," forward Rashard Lewis told him. And with that, the Flop Flap continued. A day after Shaquille O'Neal called his former coach with the Miami Heat "a master of panic" and "a front-runner," Van Gundy responded by jokingly calling O'Neal a "very sensitive guy." He said everyone needs to "consider the source" before taking the comments too seriously. The Magic coach said he didn't take O'Neal's remarks personal, but admitted O'Neal may have gone too far -- even for his usual jokes. "That's not his normal comments," Van Gundy said after Orlando's practice Thursday. "Obviously I struck a nerve and hurt his feelings. Shaq's a very sensitive guy. If I hurt his feelings, I'm sorry." I'm pretty sure that every player who's ever played for me doesn't hate me," Van Gundy said Thursday. "Now we'd have to do a survey, but I've coached a lot of guys, and I'm pretty sure there's one or two that don't hate me. I don't know that any liked me. But I'm pretty sure there's one or two who don't hate me. So I don't worry about that because, quite honestly, I don't think it's true." Magic players defended their coach but refused to take a jab back at O'Neal. "We like him," Lewis said of Van Gundy. "I mean, sometimes we don't because he screams and yells all the time, but that's just a part of him being the coach. As long as we continue to win games, you can't complain too much." Van Gundy said he was joking when he made the comments and didn't lose any sleep when O'Neal responded. He considers the feud over, but realized O'Neal might again fire back. "I started it. I made my comment," Van Gundy said. "If you're going to dish it out, you've got to be able to take it. And I can take it." Shaq is a thin-skinned classless buffoon... Albeit with four (4) rings, but a classless buffoon non-the less.. Does anyone know what Lewis meant by his comment: "You better leave Shaq alone," forward Rashard Lewis told him.? Is he taking Shaq's side or just covering his ass and not wanting to piss off the Big Dope? I agree with gomezmagic12. When you think of former big men, those guys had class. They didn't need to run their mouths and belittle others to prove their worth. They let their actions on and off the court do their speaking for them. Whenever Shaq starts running his mouth I think back to what a reporter asked him during the Olympics in Greece... A reporter asked him if he had visited the Parthenon during his visit to Greece. The Big Dummies response: “I can’t really remember the names of the clubs that we went to.” Shaq is the master of soundbite's and SVG knows this. ESPN cant wait for things to happen in shaq's world so they can stick a mike in his face,but as SVG stated "consider the source" before we get to riled up about the big ass. I'm glad SVG is a "MAN" and called him out,nobody else seems man enough,SVG just became my hero.
{ "pile_set_name": "Pile-CC" }
Electoral results for the Division of Mitchell This is a list of electoral results for the Division of Mitchell in Australian federal elections from the division's creation in 1949 until the present. Members Election results Elections in the 2010s 2019 2016 2013 2010 Elections in the 2000s 2007 2004 2001 Elections in the 1990s 1998 1996 1993 1990 Elections in the 1980s 1987 1984 1983 1980 Elections in the 1970s 1977 1975 1974 1972 Elections in the 1960s 1969 1966 1963 1961 Elections in the 1950s 1958 1955 1954 1951 Elections in the 1940s 1949 References Australian Electoral Commission. Federal election results Carr, Adam. Psephos Category:Australian federal electoral results by division
{ "pile_set_name": "Wikipedia (en)" }
What I Can Teach You About Clubs It is important that you go for golf tours when you love playing golf. You will be traveling to new places and play games with new people. This exposure to the new environment is beneficial both socially and health wise. You will then enjoy the following benefits when you go for golf trips. When you go for golf trips, you will be traveling with a new purpose. Many people love to travel they get to see the new location. The golf tours allow you to travel with a different purpose. The golf tour will then be an attractive and adventure tour. You will see a new landscape when you can travel to new locations. When you can go to new places through the golf trip, you will enjoy the new climatic experience and seductive experiences. You will be Able to get a new experience when you visit a new location via the golf tour. Also, you will be advantaged to play at different golf courses. With the golf tour, o will be privileged to learn about the different cultures. How golf is played in different parts of the world is not the same. For instance, you will realize that how golf is played in one option is totally different from the others. This is the same as the traditions in these regions could vary. The players would play differently, in as much as the etiquette to be the same. The other advantage that you will enjoy from the golf tip is the ability to play with golf players from every corner of the world. It does not have to be that you travel along with people that you know, so you have to enjoy this experience. You will also enjoy the golf escape as a tourist. The idea of going places will expose you to various cultures. Going for golf trips also give you the freedom to go shopping. Every part of the world is having a product that it is known for, so you will buy them when you go for golf tours. The clothing, accessories are some of the exclusive products that you can find in the new location. The specific products you will only find in a location that will have visited. Lastly, you will be able to turn your hobby into something more interesting. for some people, the act of traveling makes it becomes a hobby. Therefore, you will find better ways of improving your hobby and ply even better.
{ "pile_set_name": "Pile-CC" }
N-acetyl-cysteine reduces neointimal thickening and procoagulant activity after balloon-induced injury in abdominal aortae of New Zealand white rabbits. Procoagulant activity and oxidative stress generated by balloon injury to normal vessels promote the migration of medial smooth muscle cells and their proliferation in the intima. We hypothesised that administering levo N-acetyl-cysteine (NAC) i.v. at the time of injury, and s.c. before and after injury would reduce neointimal formation 4 weeks later and would regulate procoagulant activity in vessels with neointima undergoing ballooning a second time. at the time of injury rabbits received: NAC, unfractionated heparin (HEP) or both (NAC + HEP). Neointimal thickening at 28 days, calculated as the ratio between the intimal and medial area, was attenuated after NAC, HEP and NAC+HEP by 39%, 30% and 47% respectively when compared to untreated injured animals (CONTROLS) (p <0.05). At 28 days, bound thrombin activity and platelet adhesion 1 h after a repeated balloon injury decreased in animals receiving NAC, HEP and NAC+HEP bv 54%, 63% and 64% for thrombin activity (p <0.05 vs CONTROLS), and by 56%, 66% and 75% respectively for 111Indium-platelet deposition (p <0.05 vs CONTROLS). NAC in-vivo was effective in reducing neointimal thickening and procoagulant response after balloon injury.
{ "pile_set_name": "PubMed Abstracts" }
PTI Makes Top 8 of TCG 5K with Junk Rites The two members of ManaDeprived.com’s PTI podcast, Bryan Gottlieb and Joel Paradee, made the top 8 of the TCG 5K with the same deck yesterday. Bryan is an incredible thinker of the game and I absolutely recommend his filthy 75 for your next FNM.
{ "pile_set_name": "Pile-CC" }
1. Technical Field Exemplary embodiments relate generally to a display panel. More particularly, exemplary embodiments of the invention relate to a display panel that includes a plurality of unit pixels, each having a first sub-pixel that emits a red color light (i.e., a red color sub-pixel), a second sub-pixel that emits a green color light (i.e., a green color sub-pixel), and a third sub-pixel that emits a blue color light (i.e., a blue color sub-pixel). 2. Description of the Related Art Generally, a display panel may include a plurality of unit pixels. Each of the unit pixels may include a red color (R) sub-pixel, a green color (G) sub-pixel and a blue color (B) sub-pixel. In such a display panel, the red color sub-pixel, the green color sub-pixel and the blue color sub-pixel may be provided on a substrate using respective masks for forming the red color sub-pixel, the green color sub-pixel and the color blue color sub-pixel. Recently, as a display panel is manufactured to have improved display ability (e.g., a high resolution), an area of respective organic layers of red color sub-pixels, an area of respective organic layers of green color sub-pixels and an area of respective organic layers of blue color sub-pixels are reduced. Accordingly, a distance between opening portions of the masks for forming a plurality of unit pixels of the display panel (e.g., red color sub-pixels, green color sub-pixels and blue color sub-pixels of the unit pixels) may be shortened. As a result, a mechanical strength of the mask may be reduced.
{ "pile_set_name": "USPTO Backgrounds" }
All relevant data are within the paper and its Supporting Information files. Introduction {#sec001} ============ Ornaments are commonly associated with fossil *Homo sapiens* and are thought to represent the special cognitive abilities and symbolic capacities of modern humans \[[@pone.0119802.ref001]--[@pone.0119802.ref004]\]. Studies in recent years have documented Neandertals using or producing art and symbolic items evidenced by unusual lithic objects \[[@pone.0119802.ref005]\], feathers \[[@pone.0119802.ref006]--[@pone.0119802.ref007]\], modified shells \[[@pone.0119802.ref008]--[@pone.0119802.ref009]\], ochre \[[@pone.0119802.ref010]--[@pone.0119802.ref013]\], mobiliary and cave art \[[@pone.0119802.ref014]--[@pone.0119802.ref017]\] and very sporadically raptor talons, consisting of single elements, presumably used as pendants \[[@pone.0119802.ref018]\]. In the Krapina faunal collection, we have identified eight white-tailed eagle talons, suggesting that the claws from a minimum of three eagles were preserved as a group. A single phalanx was found in the same level. Eagle talons rarely occur at European prehistoric sites and at no Neandertal site have eight been found \[[@pone.0119802.ref018]\]. Previously, eagle claws have been described as isolated talons at Mousterian sites stretching from about 100,000 kyr at Pech de l\'Azé (FR) \[[@pone.0119802.ref006]\] to older than 44 kyr at Fumane cave (IT) \[[@pone.0119802.ref007]\]. Other examples of white-tailed eagle bones appear in European Upper Paleolithic and later sites, but they are rare and seldom involve more than one element of the foot. Presence of eight Krapina talons, four showing cut marks, suggests they were disarticulated by cutting the tendons, curated and lost as a unit, probably as a necklace or some other kind of jewelry. The sandstone rock shelter in NW Croatia was excavated under the direction of Gorjanović-Kramberger between 1899--1905 \[[@pone.0119802.ref019]--[@pone.0119802.ref020]\]. Today nothing remains of the site except the eroded, sandstone cliff face. But Gorjanović-Kramberger extensively documented the site in his publications and based on the fauna estimated it to be from a warm, interglacial period, now dated to 130,000 years ago or late MIS 5e by ESR and uranium series \[[@pone.0119802.ref021]\]. According to Miracle \[[@pone.0119802.ref022]\] this age is concordant with cave bear (*Ursus spelaeus*) size and morphology. From the earliest to latest deposits the Krapina male cave bears are all small, significantly reduced in size compared to glacial sites in the region with cave bear remains. From this, Miracle suggests the strata at the site were deposited over a warm, short time period, \<10,000 years \[[@pone.0119802.ref022]\]: "The small size of the Krapina male cave bears is best understood as an adaptation to a full interglacial climate ... Krapina's stratigraphy extended neither into later substages of the last interglacial (e.g. MIS 5a-d) nor into the last glacial MIS 3--4" (p. 85). Only evidence of Neandertals is found at Krapina, confirmed by the appearance of Mousterian tools \[[@pone.0119802.ref023]\] and human remains \[[@pone.0119802.ref019]--[@pone.0119802.ref020]\]. Gorjanović-Kramberger and his assistant Osterman collected hundreds of Neandertal bones and teeth, more than 800 stone tools and almost 2800 animal remains \[[@pone.0119802.ref019]--[@pone.0119802.ref020], [@pone.0119802.ref024]--[@pone.0119802.ref025]\]. Everything at Krapina derived from excavations in stratified levels ([S1 Fig](#pone.0119802.s001){ref-type="supplementary-material"}.) and has been curated in the Croatian Natural History Museum (Zagreb) for more than a century. Animal bones as represented by minimum number of individuals (MNI), consist primarily of large mammals, especially rhinos (21.7%), bears (17.0%), and bison/bos (7.5%), while other species like pigs, deer, and small carnivores make up a lesser extent of the fauna \[[@pone.0119802.ref025]\]. Beavers (*Castor fiber*) are the exception, mostly coming from the fluvial base of the shelter and constitute 17.9% of the bones from site \[[@pone.0119802.ref025]\]. A full listing of mammalian fauna includes 25 taxa and of these 13.6% of show evidence of burning and another 4.1% preserve stone tool cut marks \[[@pone.0119802.ref025]\]. In addition to the mammals, Gorjanović-Kramberger recorded a turtle (*Testudo*) humerus, fresh water mussel shells of at least three taxa, several taxa of different land snail species and a few bird remains \[[@pone.0119802.ref019]--[@pone.0119802.ref020], [@pone.0119802.ref025]\]. Except for some of the bird bones, none of the non-mammalian bones or shells shows signs of human manipulation. Materials and Methods {#sec002} ===================== Krapina specimens 385.1--385.5, 386.1--386.3, 386.18 are housed in the Department of Geology and Paleontology, Croatian Natural History Museum, Demetrova 1, 10000 Zagreb, Croatia. Surface features were first identified by eye, then further documented with a 20x microscope. Subsequent microscopic and microphotographic work was done on an Olympus DP 25 556 camera and an Olympus SZX16 microscope, using Analysis-work software. We attempted to catalog the cut marks and other surface alterations, following the criteria in Domínguez-Rodrigo et al. \[[@pone.0119802.ref026]\]. We found no evidence that the features we describe are the result of weathering, trampling or other natural modifications. We identify smoothing, highly polished facets and abrasion features on the talons. Smoothing occurs on the cut mark edges, so that they are not sharp as in butchering marks found experimental work \[[@pone.0119802.ref027]\] and on many of the other Krapina fauna \[[@pone.0119802.ref025]\], including the human remains \[[@pone.0119802.ref019]\]. We consider this smoothing the result of the talons being wrapped in some kind of fiber. Highly polished facets resemble ebrunated surfaces, where bone-on-bone contact produces a bright, shiny densely packed surface. These are small facets and must have occurred postmortem, since this region of the talon would never be in contact with another talon in life. We identify abrasion as dully-polished, surface modifications, generally on the blade of the talon. These do not reflect light like the highly polished facets described above and are presumably related to when the talons rubbed together when they were part of an assemblage. As in the polished facets, these would not have occurred in the living white-tailed eagle, since the talons are separated from each other. Results and Discussion {#sec003} ====================== Gorjanović-Kramberger first mentioned eagle claws ("?*Aquila* Mehrere Krallen";? golden eagle, several claws) in 1901 \[[@pone.0119802.ref028]\] indicating that the bones were found in the early excavations at the site. After cataloguing the material, the talons were sent to Lambrecht in Budapest, who identified them as the white-tailed eagle (*Haliaëtus albicilla)* and was the first to illustrate most of the claws \[[@pone.0119802.ref029]\] ([S2 Fig](#pone.0119802.s002){ref-type="supplementary-material"}.). In the Krapina faunal collection, there are 29 isolated bird bones ([S1 Table](#pone.0119802.s008){ref-type="supplementary-material"}) with eagles and owls comprising 41.4% of this sample \[[@pone.0119802.ref025]\]. Only the eagle bones show signs of human modification. Based on duplication of sides, we estimate they come from three-four different eagles. Four of eight *Haliaëtus albicilla* talons and a pedal phalanx have multiple cut marks ([S2 Table](#pone.0119802.s009){ref-type="supplementary-material"}). One talon (385.4) bears a pencil mark, presumably made by Gorjanović-Kramberger, identifying it as coming from the uppermost level. Other talons lack pencil designations, but the bones are similar in color and preservation. The uppermost level at Krapina was called by Gorjanović-Kramberger, the "*Ursus spelaeus* zone," due of the large number of cave bear remains found in this stratum \[[@pone.0119802.ref019]--[@pone.0119802.ref020]\]. There is at least one hearth and a few Mousterian tools, mainly Levallois blanks and backed knives \[[@pone.0119802.ref020], [@pone.0119802.ref023]\]. The most striking *Haliaëtus albicilla* claw is Krapina 385.1, a right second talon bearing six cut marks and surface modifications. The three largest cut marks occur across the lateral side of the proximal surface, just distal to the joint with the phalanx. These marks are clearly visible in Lambrecht's 1915 description ([S2 Fig](#pone.0119802.s002){ref-type="supplementary-material"}.), but were not recognized by him or Gorjanović-Kramberger even though the latter extensively documented cut marks on human and animal bones \[[@pone.0119802.ref019]\]. The uppermost cut mark ([Fig. 1a](#pone.0119802.g001){ref-type="fig"}) is the shortest (3.2mm) and is a wide, V-shaped cut. The longest cut mark begins at the joint surface where it is 3.7mm long, breaks as it extends across the foramen, then continues 4.1mm onto the projection ([Fig. 1b](#pone.0119802.g001){ref-type="fig"}). A third cut mark measures 5.7mm and is angled about 20° to the long cut mark ([Fig. 1c](#pone.0119802.g001){ref-type="fig"}). All these cut marks show edge smoothing. On the dorsal surface at the tuberculum extensorium, just perpendicular to the joint is a short (\~1.0mm) cut mark. Two slightly curved, parallel cut marks (2.0mm and 1.3mm) appear about 3mm distal from the edge of the articular surface (not shown). Small areas of surface flattening and abrasion appear on the lateral, proximal margin ([Fig. 1d](#pone.0119802.g001){ref-type="fig"}) and more polishing occurs around the elevated surface lateral and superior to the vascular foramen. ![Krapina 385.1, a right talon 2.\ Three cut marks are preserved on the lateral surface: (a) a short superior cut mark; (b) a long cut mark interrupted by the foramen; (c) a short inferior mark. Edges of most cut marks are not sharp. An abraded area (d) occurs near the proximal edge of the joint.](pone.0119802.g001){#pone.0119802.g001} Krapina 385.2 is a right second talon with no cut marks, but it possesses a small, abraded surface on the lateral aspect of the tuberculum flexorium major ([S3 Fig](#pone.0119802.s003){ref-type="supplementary-material"}.). Krapina 385.3 is a right talon 1 (or 2) with no cut marks, but has numerous areas of polish on its lateral aspect. The most impressive is a long, narrow facet beginning at the bottom third of the talon and narrows to a point 4.5mm proximal to the tip. The polished area is about 10.5mm long with a maximum width of 1.2mm at its most proximal extent ([S4 Fig](#pone.0119802.s004){ref-type="supplementary-material"}.). Krapina 385.4 is a virtually intact left third talon. On the dorsal edge of the proximal joint surface are two short cut marks, paralleling each other ([Fig. 2a](#pone.0119802.g002){ref-type="fig"}). Lateral to these is a broad, V-shaped wedge at the border of the articular surface. The dorsal-most portion shows some polishing and compaction of this surface, which gives it an 'ivory' appearance ([Fig. 2a-b](#pone.0119802.g002){ref-type="fig"}). The inferior-most portion of this facet shows a spalled-off facet with a hinge fracture, which lacks polish. On the medial side there are two small, abraded areas, which have eroded the elevated morphology (not shown). Neither is as compact nor as shiny as the lateral facet. ![Krapina 385.4, a left talon 3.\ Shown are a highly polished area (a) and two cut marks (arrow) above it. A SEM (b) of the polished area is twisted \~90° from the lower magnification image showing the full face of the polished surface and the hinge fracture below it. On the talon a light pencil mark "9" is preserved at the mid-talon position.](pone.0119802.g002){#pone.0119802.g002} Krapina 385.5 ([Fig. 3](#pone.0119802.g003){ref-type="fig"}) is a right talon 1, which shows a natural (excavation?) break across the base of the tuberculum flexorium major on the lateral, proximal surface. This is the only talon with large amounts of adhering cave sediment. There may be additional marks under this sediment, but well-defined cut marks occur across the 'neck' of the talon. Four cut marks appear on the lateral side, distal to the tuberculum flexorium. These short cut marks, off the articular surface, parallel each other and range in length from 1.3--1.6mm. The proximal is the deepest and widest compared to the others. Compared to other specimens, these cut marks show little edge smoothing. ![Krapina 385.5, a right talon 1.\ Lambrecht \[[@pone.0119802.ref029]\] did not include this talon ([S2 Fig](#pone.0119802.s002){ref-type="supplementary-material"}.), presumably because it was damaged.](pone.0119802.g003){#pone.0119802.g003} A right second talon (386.1) shows cut marks along the medial articular margin ([Fig. 4](#pone.0119802.g004){ref-type="fig"}). Measuring 2.4mm--3.5mm, the incisions roughly parallel each other, pierce the articular surface, have some preserved cave sediment and show marginal smoothing. Like 385.3 there is a long (3.2mm) burnished facet on the lateral side, ending at the tip of the talon, which is polished (not shown). There is abrasion on the lateral aspect of the blade with a facet covered in its proximal extent by lacquer (not shown). It measures (3.4mm long with a maximum height of 1.4mm). Distal to this is a long narrow facet (3.4mm long with a maximum height of. 6mm), which narrows to the tip. ![Krapina 386.1, a right talon 2.\ Two cut marks with smoothed edges and a magnification of the area shows that the more proximal one has the broader dimension.](pone.0119802.g004){#pone.0119802.g004} Krapina 386.2 is a left talon 1 with no cut marks, but an area of constricted polishing occurs on the medial face of the tuberculum flexorium major ([S5 Fig](#pone.0119802.s005){ref-type="supplementary-material"}.). Krapina 386.3 is another left third talon with a short cut mark on the superior articular wall, extending about 1.6mm into the articular facet. Just below is a small, highly polished facet on the dorsal lateral side under the lip of the articular facet and a smaller one on the ventral side ([S6 Fig](#pone.0119802.s006){ref-type="supplementary-material"}.). The facet is a flattened surface, similar to the one found on 385.4. Diagonally, on the medial side there is a small crescent facet positioned at the medial ventral portion of the articular lip. Krapina 386.18 is an intact third phalanx of digit 3. It was originally assigned to *Aquila* \[[@pone.0119802.ref030]\], then to *Bubo bubo* \[[@pone.0119802.ref031]\]. Our comparisons with equivalent phalanges of modern *Bubo bubo* and *Haliaëtus albicilla* indicate it is a white-tailed eagle. The phalanx is light in color and similar in preservation to the other Krapina eagle talons. At least 21 cut marks appear on the lateral and dorsal surfaces ([Fig. 5a-c](#pone.0119802.g005){ref-type="fig"}). The most prominent wraps from the lateral to dorsal face at the proximal end. About 5.0mm long, the incision deeply penetrates the cortical bone and the interior of the mark is stained with cave sediment. It is flanked proximally by another distinct mark 4.0mm long, which curves from the plantar to the dorsal edge. Distal to this cut mark are a series of very shallow, faint incisions on the lateral edge. These range in length from 1.6--2.1mm. Continuing more distal, shorter and deeper cut marks are found proximal to the condyle and another two appear on the lateral wall of the condyle. All measure about 2.5mm. Dorsally, cut marks are only found on the distal region across the bone separating the two dorsal fossae. In this location at least six marks pierce the bone, varying in length, width and depth of penetration into the bone. The longest (2.1mm) and widest (.3mm) is at the medial end and is flanked by a distinctive, more proximal cut mark. In these, there is some smoothing of the cut mark edges. The remaining marks are fainter, but have sharper edges. There are no cut marks on the plantar or medial surfaces ([S7 Fig](#pone.0119802.s007){ref-type="supplementary-material"}.). This terminal phalanx articulates with the left talon 3 (385.4), so the two bones are likely from the same individual ([Fig. 6](#pone.0119802.g006){ref-type="fig"}). ![Krapina 385.18, a left digit 3 phalanx with multiple cut marks.\ SEMs include (a) distal cut marks on the dorsal, (b) cut marks on the diaphysis at the distal, lateral edge and (c) a distal, lateral cut mark on the diaphysis.](pone.0119802.g005){#pone.0119802.g005} ![Articulation of Krapina 385.4 and 386.18.\ Dorsal (a) and lateral (b) view; arrow in (b) points to highly polished area on 385.4.](pone.0119802.g006){#pone.0119802.g006} Miracle \[[@pone.0119802.ref025]\], describing the animal remains from Krapina, recorded a high percentage of bones and teeth deriving from large mammals. By MNI birds make up less than 4% of the assemblage and in most cases are represented by isolated specimens ([S1 Table](#pone.0119802.s008){ref-type="supplementary-material"}). This may relate to the size and fragility of the bones or to collector bias, but in the existing avifauna from Krapina there is no evidence that birds were being consumed as in other Middle Paleolithic sites \[[@pone.0119802.ref032]--[@pone.0119802.ref033]\]. For the limited bird remains, most of the non-raptor species are isolated bones and could have entered the sediments without human involvement. This is very unlikely for the white-tailed eagle talons. Modern ornithologists report in central and eastern Croatia that white-tailed eagles build large nests in trees, on cliffs or occasionally on the ground \[[@pone.0119802.ref034]\], so it is likely the birds were acquired elsewhere and brought to the site. White-tailed eagles are impressive birds with aggressive personalities and are not easy to catch or trap, today or in the past \[[@pone.0119802.ref035]--[@pone.0119802.ref036]\]. Modern ones have a two-meter wingspan, a body weight from 3.0--6.5 kgs \[[@pone.0119802.ref037]\] and are the top diurnal, avian predators in Europe today. Based on talon size, white-tailed eagles at Krapina were similar in body size. Compared to other avian species, they are relatively rare in the environment, yet their bones represent the majority of the avifauna sample at Krapina. Cut marks on these eagle bones fit the pattern of stone tool striations as defined by Domínguez-Rodrigo et al. \[[@pone.0119802.ref026]\]. The deposits at Krapina were sandy and in some cases the bones were soft, making trampling or other post-depositional factors a possible explanation for the talon modifications. As shown in the above figures, most cut marks on the Krapina eagle bones are straight, deep V-shaped grooves located in specific areas in the proximal aspects of the talon. We could not evaluate all the categories compiled by Domínguez-Rodrigo et al. \[[@pone.0119802.ref026]\], but in addition to those above, we note that the marks on the talons are localized, never occurring across the blade of the talon or on the plantar surface. On the single phalanx, there are many cut marks, which are more characteristic of human-made cut marks than trampling. These cut marks are straight-walled, V-shaped, and often parallel each other. Some of the cut marks preserve sandy cave sediment ([Fig. 5c](#pone.0119802.g005){ref-type="fig"}) and, like the talons, many of the cut mark edges show smoothing. For the phalanx the cut marks are widespread, but are never on the plantar surface or medial wall and are more common in the proximal and distal ends than the midsection of the bone. Overall, the bone surfaces lack fine striations, typical of trampling. For the talons and the phalanx, we think there is no doubt that they were produced by Neandertal manipulation. The Krapina human remains found lower in the sequence sometimes have cut marks, but these mainly are sharp-edged and seldom show signs of edge smoothing \[[@pone.0119802.ref019]\]. The hominid collection is extensively fragmented \[[@pone.0119802.ref024]\], unlike the eagle talons, which are essentially intact. None of the human remains have densely polished facets or abraded areas like on the talons, but a few the patellae show arthritic, ebrunated surfaces, the result of cartilage breakdown and arthritis. This would not be a likely cause of the polished facets on the talons, but suggests some kind of prolonged contact with another hard surface. Miracle has extensively documented taphonomic features of the vertebrate fauna and notes that "modification of bone surfaces is extremely rare ... \[with\] only 6.6% of the vertebrate fauna showing evidence of weathering," p. 236 \[[@pone.0119802.ref025]\]. Based on his observations and our descriptions of the cut marks and other damages to the talons, there is no evidence that diagenetic factors could have produced the modifications on the eagle talons. We have also surveyed the nonhuman vertebrate faunal remains from levels 8--9 and found no evidence for similar bone modifications, other than the occurrence of cut marks. Review of faunal elements from lower levels at Krapina show no surface modifications like found on the eagle talons. Finally, there are a few other bird remains from Krapina ([S1 Table](#pone.0119802.s008){ref-type="supplementary-material"}) and, while broken, none show cut marks or other indications of human manipulation. Virtually all of the talons show some evidence of cut mark edge smoothing and surface abrasion at various places on the talon and three have nicks in the medial and/or lateral blade margin. (1) [Cut mark smoothing]{.ul}. Compared to other eagle talons documented from Mousterian sites, like Mandrin cave where the cut marks have sharp edges \[[@pone.0119802.ref027]\], most cut mark edges of the Krapina talons are smoothed ([Fig. 7a](#pone.0119802.g007){ref-type="fig"}). Many of the marks are located in positions, which have been reproduced in experimental butchering \[[@pone.0119802.ref027]\], but subsequent, localized edge alterations appear in the Krapina specimens. Other parts of the same talon show no surface modifications, indicating that the edge wear was focused in its occurrence. (2) [Abrasion]{.ul}. All eight talons exhibit shiny surfaces, ranging from small areas of dense, highly polished areas on the proximal ends to longer, shiny areas on the distal talon blades ([Fig. 7b](#pone.0119802.g007){ref-type="fig"}). They are always localized, never appear on the plantar aspects of the talons and seem to be the result of repetitive contact with another object. They could not have been produced in the living white-tailed eagle. (3) [Nicks]{.ul}. In three of the largest talons (385.1, 385.3, 386.1) small nicks interrupt the sharp edge of the blade's medial and/or lateral margins. Sometimes these appear on both margins (385.3 and 386.1) or on only the medial margin (385.1) ([Fig. 7c](#pone.0119802.g007){ref-type="fig"}). They are located about 10mm distal to the articular margin. We cannot rule out taphonomic causes for these indentations into the sharp medial and lateral talon edges, but they are limited in occurrence and are never found elsewhere on the talons or on any of the smaller talons. In contrast the other five talons clearly show sharp, uninterrupted edges all along the blade margins. ![Three examples of human manipulation.\ (a) Smoothed cut marks on the articular facet of 385.1; (b) burnished area near the tip of 386.1; (c) nick on the otherwise sharp plantar margin of 386.1. The nick is partly filled with varnish, applied when the specimen was inventoried in the early 1900s.](pone.0119802.g007){#pone.0119802.g007} For the single phalanx there are only cut marks over the dorsal and lateral surfaces. These appear mainly on the proximal and distal ends, while most of the diaphysis, the medial and the plantar surfaces are free of any manipulation evidence. Like in the talons, many of the cut mark edges tend to be smoothed, but a few show sharp, unmodified margins (see [Fig. 5](#pone.0119802.g005){ref-type="fig"}). Some of these features have not been documented in single talons found at other Mousterian sites, possibly because they were suspended as pendants with no neighboring abrasive surfaces. While on a different medium, in some respects, the abrasion on the talons resembles what has been described as "use wear" surfaces in the shells from Blombos in S. Africa. In *Nassarius kraussianus* specimens polished facets occur on the margins of holes on the shells. Henshilwood et al. \[[@pone.0119802.ref038]\] interpreted these as facets produced when the shells rubbed against each other from being mounted on a string. Vanhaeren et al. \[[@pone.0119802.ref039]\] reproduced edge wear facets by stringing shells together, shaking them and found that edge wear only occurred when "the string was soaked in a solution of diluted vinegar mixed with ochre powder ... and the shells were in direct contact with each other." From these experiments, they contended that an acidic environment, coming from sweat or urine, was essential for producing the polishing. We have not done experimental archaeology or chemical analyses on these or other eagle talons and there are no visible traces of ochre on the talons. While on shell, not talons, following the Blombos bead work \[[@pone.0119802.ref039]\] we propose the densely polished and burnished areas are the result of the talons being strung. Then they rubbed against each other to produce the abrasions. We assume that smoothing of cut mark edges is related to them being tied with a string or sinew. We know Neandertals made twisted fibers at one site \[[@pone.0119802.ref040]\] and there is no reason to suspect the Krapina Neandertals were incapable of modifying fibers to produce a twisted fiber or a sinew filament for stringing together eagle talons. Conclusions {#sec004} =========== Eagle talons are rare at other Neandertal localities and no sites have yielded eight talons from white-tailed eagles or any other raptor. Since three-four different eagles are represented, they must have been acquired in separate events and were preserved as a unit before they were lost in the sediments. Others have noted \[[@pone.0119802.ref006]--[@pone.0119802.ref007], [@pone.0119802.ref027], [@pone.0119802.ref041]--[@pone.0119802.ref043]\] that raptor bones found in late Pleistocene sites signal some kind of symbolic activity. At Krapina, cut marks on the pedal phalanx and talons are not related to feather removal or subsistence, so these must be the result of severing tendons for talon acquisition. Further evidence for combining these in jewelry is edge smoothing of the cut marks, the small polished facets, medial/lateral sheen and nicks on some specimens. All are a likely manifestation of the separating the bones from the foot and the attachment of the talons to a string or sinew. Cut marks on many aspects, but not the plantar surfaces, illustrate the numerous approaches the Neandertals had for severing the bones and mounting them into a piece of jewelry. As in ethnohistoric-present societies, the Neandertals' practice of catching eagles very likely involved planning and ceremony \[[@pone.0119802.ref035]\]. We cannot know the way they were captured, but if collected from carcasses it must have taken keen eyes to locate the dead birds as rare as they were in the prehistoric avifauna. We suspect that the collection of talons from at least three different white-tailed eagles mitigates against recovering carcasses in the field, but more likely represents evidence for live capture. In any case, these talons provide multiple new lines of evidence for Neandertals' abilities and cultural sophistication. They are the earliest evidence for jewelry in the European fossil record and demonstrate that Neandertals possessed a symbolic culture long before more modern human forms arrived in Europe. Supporting Information {#sec005} ====================== ###### Stratigraphic column at Krapina. Gorjanović-Kramberger and his assistant Osterman excavated Krapina in levels. Shortly after 1905, the site was completely emptied of all sediments, so only the eroded back of the site exists today. Gorjanović-Kramberger commissioned an "engineer Kos" to draw the stratigraphy shown here, which other than some sketches in Gorjanović-Kramberger's field notes is the only existing drawing of the site \[[@pone.0119802.ref020]\]. The uppermost part of the sequence (layers 8/9) was identified as the *Ursus spelaeus* zone. From his description, we know the chronological position of all the white-tailed eagle fauna is from the top of the Krapina geological sequence \[[@pone.0119802.ref020]\], designated by the arrows. Most human remains come from level 4, the so-called *Homo sapiens* zone, but a few were discovered in the upper part of the Krapina sequence \[[@pone.0119802.ref019]\]. Based on sedimentation rates and the spread of absolute dates, the Krapina chronological time span is short, less than 10,000 years. In the drawing, "a" represents the Miocene sandstone forming the shelter's walls and ceiling and "b" the fill. (TIF) ###### Click here for additional data file. ###### Lambrecht's illustration of the talons. The first image of seven of the eight Krapina talons was published by Lambrecht, who correctly identified the talons as coming from *Haliaëtus albicilla*. Krapina 385.1 is on the top row left and the three cut marks running across the tuberculum flexorium major are clearly visible (arrow). On the lower row, second from right, is Krapina 385.4 and its polished facet is apparent (arrow). The image is from Lambrecht \[[@pone.0119802.ref044]\], but identical to his 1915 article \[[@pone.0119802.ref029]\]. We added the arrows. (TIF) ###### Click here for additional data file. ###### Medial and lateral views of Krapina 385.2, a right talon 1. (TIF) ###### Click here for additional data file. ###### Medial and lateral views of Krapina 385.3, a right talon 2. The arrows indicate a long burnished area on the distal lateral border. (TIF) ###### Click here for additional data file. ###### Medial and lateral views of 386.2, a left talon 1. (TIF) ###### Click here for additional data file. ###### Medial and lateral views of Krapina 386.3, a left talon 3. Arrows (a-b) point to two small highly polished areas. (TIF) ###### Click here for additional data file. ###### Medial (a) and plantar (b) views of 386.18. Note the absence of cut marks, compared to the highly modified dorsal and lateral surfaces (e.g., Figs. [5](#pone.0119802.g005){ref-type="fig"}--[6](#pone.0119802.g006){ref-type="fig"} in text) (TIF) ###### Click here for additional data file. ###### Other bird remains at Krapina. Their stratigraphic association is unclear and bird remains are very limited in the faunal collection, consisting of single bones. All are fragmentary and none show signs of human manipulation. Most of these were identified by Malez and Malez \[[@pone.0119802.ref030]--[@pone.0119802.ref031]\]. (DOC) ###### Click here for additional data file. ###### Inventory of eagle talons and phalanx with the type of human manipulation. (DOC) ###### Click here for additional data file. We thank for advice on identifications and human manipulations on the talons and phalanx R Timm \[University of Kansas\], L Bondioli, I Fiore and M Gala \[Museo Nazionale Preistorico Etnografico "L. Pigorini," Rome\] and A Gamauf \[Naturhistorisches Museum, Vienna\]. M Peresani \[Università di Ferrara\] provided improvements to the text. We especially thank L Mjeda \[Zagreb\] for the macrophotographs. M Hernitz Kučenjak \[INA-Industrija nafte, Zagreb\] provided help for the microphotographs and M Ristić and M Marciuš \[Institute Ruder Bošković, Zagreb\] produced the SEM images. **Permits:** No permits were required for the described study, which complied with all relevant regulations. All specimens are housed in the Croatian Natural History Museum, Zagreb. [^1]: **Competing Interests:**Co-author David Frayer, is a PLOS ONE Editorial Board member. This does not alter the authors' adherence to PLOS ONE Editorial policies and criteria. [^2]: Conceived and designed the experiments: DR AOS. Analyzed the data: DR AOS DF. Wrote the paper: DR AOS JR DF. Discovered cut marks on the talons during her 2013 inventory of the collections: DR. Confirmed the talons' species identification and identified talon number and side: DR AOS.
{ "pile_set_name": "PubMed Central" }
Guidelines for predicting performance with low vision AIDS. To determine predictors of success in reading with low vision aids, in terms of reading acuity, optimum acuity reserve, and maximum reading speed, for observers with vision loss from various causes. One hundred people with vision loss affecting their daily lives participated. Clinical visual function measurements of distance acuity, contrast sensitivity, binocular threshold visual fields, and near reading performance with a MNRead chart at 40 cm were obtained. Reading performance aided by habitual low vision aids was also assessed with a MNRead chart. Aided reading acuity was best predicted by clinical reading acuity and contrast sensitivity. For most observers, a 2:1 acuity reserve was sufficient to achieve near-maximum reading speed, but one-third of observers with aided reading acuity better than 1.2 M required a higher acuity reserve. Aided maximum reading speed was best predicted by clinically assessed reading speed and by clinical reading acuity. People with vision impairment are likely to achieve 1 M with a low vision aid if their clinically assessed reading acuity is better than 0.85 logMAR. If acuity is worse than this, but contrast sensitivity is better than 1.05 logCS, 1M is also likely to be achieved. A 2:1 acuity reserve is adequate for 75% of observers, but those with good aided reading acuity may require further magnification to achieve best reading speeds. Fluent reading (>80 words per minute) is likely to be achieved if an observer reads fluently with large print at a fixed working distance and if clinically assessed reading acuity is better than 1.0 logMAR.
{ "pile_set_name": "PubMed Abstracts" }
Bluewaters Island Ready to Move in Apartments Why invest in Bluewaters Island Dubai? Gain up to 8% revenue annually Ready to move in luxury aparments 20% down payment only 100% registration fee waiver Ain Dubai – The World’s largest obervatory wheel making it one of the country’s happening tourist destinations
{ "pile_set_name": "Pile-CC" }
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>CFBundleDevelopmentRegion</key> <string>en</string> <key>CFBundleExecutable</key> <string>$(EXECUTABLE_NAME)</string> <key>CFBundleIdentifier</key> <string>$(PRODUCT_BUNDLE_IDENTIFIER)</string> <key>CFBundleInfoDictionaryVersion</key> <string>6.0</string> <key>CFBundleName</key> <string>$(PRODUCT_NAME)</string> <key>CFBundlePackageType</key> <string>APPL</string> <key>CFBundleShortVersionString</key> <string>1.0</string> <key>CFBundleVersion</key> <string>1</string> <key>LSRequiresIPhoneOS</key> <true/> <key>UILaunchStoryboardName</key> <string>LaunchScreen</string> <key>UIRequiredDeviceCapabilities</key> <array> <string>armv7</string> </array> <key>UISupportedInterfaceOrientations</key> <array> <string>UIInterfaceOrientationPortrait</string> <string>UIInterfaceOrientationLandscapeLeft</string> <string>UIInterfaceOrientationLandscapeRight</string> <string>UIInterfaceOrientationPortraitUpsideDown</string> </array> <key>UISupportedInterfaceOrientations~ipad</key> <array> <string>UIInterfaceOrientationPortrait</string> <string>UIInterfaceOrientationPortraitUpsideDown</string> <string>UIInterfaceOrientationLandscapeLeft</string> <string>UIInterfaceOrientationLandscapeRight</string> </array> </dict> </plist>
{ "pile_set_name": "Github" }
July 31, 2002 MURDER BY NUMBERS: Tech Central MURDER BY NUMBERS: Tech Central Station crunches the numbers in regard to casualties in the Israeli-Palestinian conflict. Fascinating stuff, and much more in-depth than most of the simplistic analysis you usually see on the subject. MASTERFUL: That's the only word MASTERFUL: That's the only word I can think of to describe the new Bruce Springsteen album "The Rising." The first major work of American popular culture to respond conclusively to the events of September 11 does just about everything right: it's moving but not schmaltzy, serious but not depressing, honest but not self-righteous, and authoritative but not preachy or condescending. And damn, these are some beautiful songs- the Band is back and at the top of their game, contributing gorgeous melodies and musical arrangments that fit just right. "The Rising" is a sort of concept album in which almost every song relates in some way to 9/11, and each is told from the point of a view of someone different- a fireman, a widow, someone watching the burning towers, and Bruce himself. These evocative reminders of that tragic day all lead into the crescendo at the end of "My City of Ruins": "Come on, rise up!" The very formula that has underlined Springsteen's best songwriting for 30 years ("times may be tough but hey, if you haven't got hope, what have you got?") is sensibly and brilliantly adapted to the World Trade Center tragedy. The best songs: "Into the Fire" (best chorus of any song this year, no question); "Mary's Place," "You're Missing," the title track, and "My City of Ruins." That last track, ironically enough, was written two years ago not about September 11 but about Bruce's deserted adopted hometown of Asbury Park. That was the setting today for the Boss' performance on this morning's "Today" show, where he made clear that he has his relevance and authority back- and much like U2 two years ago, Bruce and the E-Streeters have made an album so great that it's likely to instantly return them to their deserved spot on the musical A-list. And better them than Britney Spears, right? Unlike a way is found to pacify Courtney Love and finally give a release to those long-lost Nirvana tracks, I can't foresee any album this year better than "The Rising." Thanks, Boss. YOU, EDITOR! I LEARNED FROM YOU, EDITOR! I LEARNED FROM WATCHING YOU!: Sean Salley and Andre Smith, the two men convicted of murdering three people above New York's Carnegie Deli last year, were sentenced yesterday to 120 years to life (although something tells me the "life" part will kick in first). The result of a drug-deal-gone-bad, one of the victims was Jennifer Stahl, a 39-year-old sometime actress (she had a bit part in the '80s classic "Dirty Dancing") who went on to become one of Manhattan's most prominent drug dealers. What I'll never forget about this story is that a couple of weeks after the murders, an anonymous Village Voice staffer who had frequently used Stahl as her dealer was somehow allowed to pen an affectionate "farewell-to-my-dealer" piece and have it published in the newspaper. The Voice thus became the only known employer on Earth which, rather than punish drug abuse by its employees, rewards it with column space. The other fascinating thing: It was reported at the time that Salley, one of the murderers, was a former roadie for George Clinton. Was he present for George's legendary "pussy" interview on WBRS radio in November of 1999? It was rumored at the time that at least one female Brandeis student had snuck onto Clinton's tour bus after the concert and left with a member of George's entourage- could Salley have been involved? Guess we'll never know. NO MORE WHITE RAPPERS EMERGE?: NO MORE WHITE RAPPERS EMERGE?: I caught Jerry Nachman's new show tonight on MSNBC just in time to watch a highly surreal segment about racial politics and their relation to rap music. Nachman moderated a debate over whether white people should in fact be allowed to be rappers, which was between a militant black cleric (who said in the interview that white people should be "banned by law" from becoming rap artists), and Coolio, who had a more democratic attitude towards Caucasians rapping. In reality, none of the three belonged in the conversation: Nachman has likely never heard hip-hop in his life; the "cleric" didn't have much of a grasp of constitutional law and also looked like he was about 16 years old, and Coolio (whose career has been on a slide-slide-slippity-slide for the past 6 or 7 years) is hardly the most qualified public ambassador for hip-hop. While the African-Americans who pioneered hip-hop (as well as its listeners at the time) rightly objected to embarrassing white rappers of the past like Vanilla Ice and Snow, most black people I know feel a considerable kinship with Eminem, both for his talent and for much the same reason they identify with Bill Clinton (as Toni Morrison famously said): he was raised poor, never knew his father, and is associated with a traditionally black form of music. After all, Chris Rock pointed out the greatest examples of the 21st-century American melting pot: "the best golfer in the world is black, and the best rapper in the world is white." NACHMAN: NOT OF BRATSLAV: Watching Nachman and realizing that he's the most counterintuitive choice to host a cable news show since Mike Barnicle, I wondered whose idea it was to give him his own show- oh wait, it was Nachman's own idea!, as he is in fact the "Editor in Chief" of MSNBC. I'm glad they brought in Phil Donahue, as its nice to catch a whiff of left-wing populism as an alternative to Bill O'Reilly's tiresome right-wing version of same. And Pat Buchanan, repugnant as he may be, has always been very effective on TV and I'm glad to see him back. But Nachman? Sitting in his ill-fitting suits, on a set that looks to be his basement, and a logo in which his head takes up 95% of the screen? I mean, Fox News boss Roger Ailes is even fatter and balder than Nachman, though at least he has the good sense to remain off-camera. July 30, 2002 MAJOR MINERS: Sunday was my MAJOR MINERS: Sunday was my birthday and as I returned from partying at around 5 AM, I saw the happy news that all nine of the miners in Western Pennsylania had been rescued successfully. There was something so comforting about that- with with all the terrorism, economic sluggishness, corporate corruption, priest-child abuse, kidnapping of little girls, and baseball labor unrest that have dominated the news lately, I think it's wonderful to finally have a national news story that's actual, you know, good news. Also, it's likely that this incident will give miners the well-deserved, long-delayed national appreciation that firemen got after September 11. THE TOTALS ON THE BOARD THE TOTALS ON THE BOARD ARE CORRECT: Going into tomorrow's games, the Minnesota Twins are 22 games over .500, which gives them a 15-game lead over the second-place Chicago White Sox and puts them only 4 games behind the Yankees in the race for homefield advantage in the American League playoffs. That's assuming, of course, that there are in fact American League playoffs- but if Bud Selig couldn't stop the Twins with contraction, let's hope he can't do it with a strike either. ROLEN RIGHT OUT OF TOWN: ROLEN RIGHT OUT OF TOWN: The day after Ozzie Smith was enshrined in the Hall of Fame, the St. Louis Cardinals have added a player to the left side of their infield who may himself be Cooperstown-bound. The Cards today traded for disgruntled Phillies third baseman Scott Rolen, a move that was anticipated for over a year in Philly but was over-shadowed in that city's press by latest Iverson gun-rampage news. In exchange for Rolen the Phils got one of the Three Tenors (Placido Polanco) as well as pitcher Bud Smith, who pitched a no-hitter last year as a rookie but has struggled this year. The move gives Philly a phalanx of promising young pitchers, as well as giving their fans the chance to boo (if not riot) when the Cardinals come to town, as St. Louis now has both Rolen and J.D. Drew. THE TIMES THEY ARE A-CHANGIN', BACK: The fad of Turn Back the Clock uniforms is one I've never liked; I've never seen much point to having players wear clothes from 50 years ago, especially since they cause one to flip past the game and wonder who, exactly, is playing. The trend this year, besides the "Turn Back the Clock Day" seemingly lasting for the entire month of July, is towards '70s-era uniforms- the A's, Braves, and Phillies were among those getting into the act, with the Phils even breaking out the old blue road uniforms.It's cool for about a minute, until we remember why the teams got rid of these fashion embarassments in the first place. The Braves' regular uniforms, however, are themselves throwback unis, as they returned to their 1950s-era red-and-black color scheme in 1987 after a couple of decades of the garish blue outfits that made their unwelcome return this week. I half-expected Dale Murphy to be announced a pitch-hitter in one of this week's games. July 28, 2002 TWO 30-SECOND TRAILERS GO 'ROUND TWO 30-SECOND TRAILERS GO 'ROUND THE OUTSIDE: The New York Times Magazine has a fascinating look at what I do: movie trailer marketing, and specifically the campaign for the upcoming Mel Gibson movie "Signs." The article details the movie's multi-trailer campaign- all versions that my company has itself test-marketed. I don't link to the Times often, but this one is worth it. July 26, 2002 NO RESPECT. NOOOO RESPECT: Charles NO RESPECT. NOOOO RESPECT: Charles Krauthamer in the Washington Post, on Rule #1 of disrespect in politics: "To understand the workings of American politics, you have to understand this fundamental law: Conservatives think liberals are stupid. Liberals think conservatives are evil." I'm happy to report that this blog is neither liberal nor conservative, and neither stupid nor evil. July 25, 2002 HE'S BACK: If it weren't HE'S BACK: If it weren't for the great likelihood that Salon.com will go out of business sooner rather than later, I'd be very, very excited about their recent hiring of Keith Olbermann as a columnist. The greatest ESPN anchor of all time, Keith also wrote an excellent column on ESPN.com for years, and later did the same for Fox Sports Net when he worked there. I'd love to see Olbermann back on TV sometime, but for now, his Salon gig and occasional appearances on Aaron Brown's CNN show will have to suffice. RIVERS CUOMO FOR GOVERNOR: Tonight RIVERS CUOMO FOR GOVERNOR: Tonight I caught Weezer's show at the Jones Beach Ampitheater on Long Island- it was my first time at this excellent venue, as well as my first time seeing this standout band. I can tell you if you'd told me 18 months ago I'd be paying to see Weezer, I'd have looked at you like you had two heads- their recent comeback has been that remarkable. Most surprising about the show was the focus on the band's older material- they played the hell out of both their debut and (surpisingly), "Pinkerton," the band's second and best album that they had until recently almost completely disavowed. They focused much less on last year's "The Green Album" ("Hashpipe" was conspicuously absent from the show) and played minimal music from this year's middling effort "Maladroit." Of 17 songs on the setlist, 11 were from Weezer's pre-breakdown period. Frontman Rivers Cuomo, having gotten rid of his ridiculous-looking beard, exhibited a surprising amount of energy for a singer who rarely moves around or cracks any type of facial expression on stage. My only complaint was that the vast majority of the audience (I'm talking 95%-plus) was 16 years old and younger- these are people who were in third grade when The Blue Album came out. To them, Weezer's just some new band, just like underwhelming opening act Dashboard Confessional. So how 'bout it, Rivers for governor? Those suits he favors are certainly nicer than Andrew's, he's a lot smarter and may not be a native New Yorker, but then neither is Hillary. Too bad 14-year-old girls (half-Japanese or not) can't vote. EVIL DEAD TOO: With the EVIL DEAD TOO: With the consecutive deaths this week of Hamas kingpin Salah Shehada and "Turner Diaries" author William Pierce, it's sure been a rough few days for loathsome, Jew-hating dirtbags. Good riddance, I say. As he was the longtime leader of the organization most responsible for Palestinian society's descent into a Jonestown-like death cult, the only sad thing about Shehada's death is that Israel has had to apologize for it. Because Hamas is an organization that carries out no operation that doesn't involve the suicide of its members, I believe it should be Israel's policy to round up and kill every last member of Hamas, and they shouldn't let anyone in the world let them feel the least bit guilty about it. Pierce, on the other hand, was one of the few Americans in the 20th century who managed to be both a Nazi sympathizer and a Communist sympathizer, though he had a virulant hatred for blacks and Jews in either capacity. Pierce's novel "The Turner Diaries" of course became notorious when it inspired Timothy McVeigh's Oklahoma City bombing on April 19, 1995, and the author later began a second career as a producer and distributor of white power music. I personally want to thank the Grim Reaper for grabbing these two on his most recent jaunt; hey Death- any chance you could pick up Yasser on your way back? QUOTE OF THE DAY: "Worst QUOTE OF THE DAY: "Worst of all, the House began talking about upping the ante on the Senate bill’s surrealist criminal penalties–25-year jail terms for certain corporate misdeeds, for instance. That’s likely to give the non-stoner population its first taste of how the War on Drugs works. Why not give ’em a million-bazillion-quillion years? That’ll show the bastards!" -The great Christopher Caldwell, in one of his first columns since returning to New York Press. July 24, 2002 VINES- VEDI VICIOUS?: As I've VINES- VEDI VICIOUS?: As I've written in the past, I'm as excited as anyone about the new "invasion" of neo-garage bands, and the possibility of their eventually eclipsing the scourge of Nu Metal in popularity. The Strokes, The White Stripes, The Hives, and Andrew WK all suffered quick, vicious backlashes after their initial splashes, although those came primarly from narcissistic New York rock snobs who are so cynical that they apparently aren't allowed to like any new music until after Joey Ramone has risen from the dead. I remain happy that all four of those acts have gotten the attention that they deserve, and I also hope that each of their next albums outsell those of Creed, Staind, and Tool by an exponential margin. Now come The Vines, the Australian-via-LA band that has added a heavy Beatles influence to the Clash/Nirvana hybrid favored by the other groups. However, I'm sad to report, The Vines' new album, "Highly Evolved," just plain sucks. There's nothing special about it, nothing exciting, no urgency, nothing worse noticing about it except the kind of hype associated with Worldcom stock circa 1999. And unlike those critics who dismissed The Strokes before hearing a note based on a reflexive rejection of hype, I've heard the album, listened to it intently, turned it off, and put on Ben Kweller instead. Oh well, at least it only cost $6.99. FROM KITTY TO KARYN: To FROM KITTY TO KARYN: To the list of wacky internet phenomena of the past like PsychoExGirlfriend and "All Your Base Are Belongs to Us," we can now add SaveKaryn.com. It's the self-produced website of a 20-something New Yorker who ran up something like $20,000 in credit card debt in just over two years, money spent almost entirely on clothes, purses, hair care, bikini waxes, and other such accessories considered "necessary" for today's young women. In a bizarre, one-woman collolary to the campaign for Third World debt relief, Karyn uses the site to solicit contributions in order to pay down her bills, and to her credit (no pun intended), she is auctioning off a lot of those items in an effort to bring the debt down. But more disturbingly, Karyn's excuse for her predicament is that "credit cards are evil!" I wouldn't say it's necessarily credit that's the problem (really, it's Karyn's own gross irresponsibility); while the credit card companies clearly prey on irresponsible college-aged students (and have virtually their entire profit margin to thank for it), what we have most to learn from SaveKaryn.com is the damage that beauty addiction can do to young, impressionable people- and this problem isn't necessarily confined to women. Now even magazines geared towards men cater to the viewpoint that males ought to be obsessed with looks, hair care, clothes, and body image as well. The maxim (again, no pun intended) that "men are the new women" has never been more true. How long until a male Karyn copycat arrives on the scene? QUOTE OF THE DAY: "Can QUOTE OF THE DAY: "Can the Celtics keep [Vin Baker] away from all the renowned bakeries in the North End?" -Sports Guy Bill Simmons, blasting Boston's nonsensical recent trade for the portly Baker, on ESPN.com. July 23, 2002 SAME NAME, DIFFERENT GUY, PT. SAME NAME, DIFFERENT GUY, PT. 2: The newly released, critically acclaimed independent film "Tadpole" was directed by a filmmaker named Gary Winick, who is not to be confused with Gary Winnick, the disgraced former CEO of bankrupt telecom firm Global Crossing. There was however no one involved with the film named Sam Waksal, Bernie Ebbers, or Kenneth Lay. July 22, 2002 FROM THE X-FILES OF POLICE FROM THE X-FILES OF POLICE SQUAD: In the latest in a string of recent police-brutality scandals, a group of more than a dozen cops in Milwaukee were caught on tape beating down a suspect- in their own police station. There's no excuse for such stupidity- this is like that guy in the "Big Brother" house who threatened his roommate with a knife and was surprised that he got caught. But the oddest thing about the case is the suspect's name- Billy Miles. That was also the name of the evil alien "super soldier" who menaced Scully and her baby throughout the final two seasons of "The X-Files." Don't be surprised if the cops try the "X-Files" Defense, although I don't suspect it'll be too effective, since it's not likely they'll find 12 jurors anywhere who watched any of the last two seasons of "X-Files." PICK YOUR POISON: The Milwaukee PICK YOUR POISON: The Milwaukee Bucks' Glenn Robinson was arrested over the weekend for threatening his wife with a gun- apparently, threatening one's wife with a gun is the thing to do these days if you're an NBA superstar. Prior to the incident, it had been reported that the Bucks had offered Robinson to the Knicks in exchange for Latrell Sprewell, which begs the natural question: is a team better off with a player who threatens to murder people while armed, or one who does so merely with his bare hands? July 20, 2002 THE 'SEX' QUESTION: I haven't THE 'SEX' QUESTION: I haven't yet decided if I'm going to watch the upcoming fifth season of "Sex and the City"- I've enjoyed the show in the past, yet every time I tune in I do what most men do while watching it- that is, cringe at the evidence of just how insane women can be. And yes, I must say there's a little bit of bitterness on my part in that this is the third season of "Sex and the City" to air since the last "Sopranos" season, and I'm also a little upset that they took one of my favorite all-time actors, Kyle MacLachlan, and made him into a simpering, impotent girly-man. Still, there's no denying that that "Sex and the City," more than Oprah, The Rules, or anything else, has become the primary arbiter of how American women (especially yuppie women) are supposed to think, act, look, dress, and date. I'm still trying to figure out whether or not that's a good thing, but I can say that tomorrow night, while millions of lonely single women nationwide will be watching the season premiere, my friend Dena will be doing something much more fun and productive- she'll be getting married. July 19, 2002 LILLYWHITE, V. 2.0: I picked LILLYWHITE, V. 2.0: I picked up the new Dave Matthews Band album "Busted Stuff" this week and have been listening to it for a couple of days. At first I had trepidation, since like most Dave fans I downloaded most of the album last summer when it was leaked as "The Lillywhite Sessions." However, my opinion of the finished, DMB-endorsed "Busted Stuff" product is a positive one, since they have added two excellent, non-Lillywhite tracks ("You Never Know" and "Where Are You Going," which represents the first time in DMB history where the first single isn't the worst song on the album), and included improved, spruced-up versions of most of the Lillywhite tracks. The best are "Grace is Gone," "Grey Street," and "Bartender"- which were also the three best songs on the original Lillywhite compilation. The oddest thing- Steve Lillywhite, who produced the "Lillywhite Sessions," does not get a producer or songwriter credit on any song on "Busted Stuff." And those who deride DMB as the epitome of "white people music," remember two things: three of the five members of the Dave Matthews Band are black, and Matthews himself was born in South Africa and immigrated to America, so you know what that makes him. hSUSPENDED ANIMATION: Seems like everybody's hSUSPENDED ANIMATION: Seems like everybody's getting suspended this week- Torii Hunter, for three games after the recent brawl between the Twins and the Cleveland (Indians) Baseball Team. Orlando "El Duque" Hernandez, for throwing at a batter. Allen Iverson would be suspended if it weren't the offseason. And ESPN has suspended ESPN Radio and Pardon the Interruption host Tony Kornheiser for one week without pay for criticizing the network on the air. I gotta say I'm with Tony on this one- Kornheiser was criticizing some recent firings and, as anyone who has read Michael Freeman's ESPN: The Uncensored History can tell you that regardless of the network's exemplary on-air reputation, their record in terms of hirings and firings (especially those related to sexual harassment) has been shoddy at best. The Kornheiser/Michael Wilbon pairing is the best thing the network has had going for it since the Olbermann/Patrick SportsCenter team; let's hope they don't mess it up the way they did last time. July 18, 2002 CAN YOU BE A LIBERAL CAN YOU BE A LIBERAL AND A YANKEE FAN?: I don't think you can, but clearly many people disagree with me. To those truly committed to liberalism, it would seem anathema to support the team with the most money and the most power, one that takes a laissez-faire attitude towards those less fortunate, and makes a regular habit of stealing the most valuable goods (Giambi, Mondesi, Weaver) from poorer teams. And if there were no Yankees, there certainly wouldn't be a strike coming up later this season. Clearly, there's a lot of hypocrisy going on in New York, as the same state that supports the Yankees has gone Democratic for president every year since 1984. One of my old professors, indeed, broke with the Communist Party in 1949 because Jackie Robinson had just broken the color line and they wanted my prof to root for the Dodgers rather than the Yankees. A better team to cheer for would be my very own Minnesota Twins. The Twins are the baseball equivilant of the poor inner city kid who gets a scholarship to Harvard, graduates, and becomes a Nobel Prize-winning physicist. They came into the season with the 27th-highest payroll out of 30 in the majors, moved ahead of the pack early, and are now 10 games ahead of the second-place Chicago White Sox. So all you liberals out there- root for the strike to be settled so the Twins-Expos World Series of Destiny may proceed. A NEW LOW FOR THE A NEW LOW FOR THE NEW YORK POST: It was bad enough when they defended brutal cops and outed Mike Piazza. But now the New York Post is enabling a stalker. You may remember back in April when 24-year-old Jersey girl Kristielee Wilcox ran onto the field at Yankee Stadium and handed her number to shortstop Derek Jeter. Wilcox was later arrested and plead guilty, and Jeter (of course) never called. So what does the Post do? They give Wilcox a makeover, and don't even stop there- they dress her in the styles of Jeter's various ex-girlfriends, including Mariah Carey and his current squeeze, actress Jordana Brewster. Am I the only one who sees something wrong with this? The fact that the newspaper is encouraging someone who's clearly very disturbed and delusional to pursue a public figure who has shown that he has no interest, while that public figure is in fact in a public relationship with another public figure? Are these Post editors not getting enough oxygen or something? IDIOTIC MORAL EQUIVILANCY WATCH: "Nor IDIOTIC MORAL EQUIVILANCY WATCH: "Nor will you find any sign of recognition [in the rebuilding proposals] that Ground Zero has become a tragic symbol of the troubled relationship between the United States and the rest of the world." - "Respected" New York Times architecture critic Herbert Muschamp. No, the terrorists aren't evil- they just have a "troubled relationship" with freedom and democracy. Now do you know why I don't read the Times? July 17, 2002 BIN CAUGHT STEALIN': Yesterday I BIN CAUGHT STEALIN': Yesterday I joked about my desire to write a novel with a Jewish character with the name Benjamin Laden, and his struggles in having to live through 9/11. Well, it turns out there really is a guy out there named Ben Laden, and not only is he Jewish, but he's the leader of a klezmer band! According to klezmershack.com, the Pennsylvania-based Benny and the Vildachayas just released a new album, "Get in Trouble," which features such tracks as "What Jew Want," "Hava NaFriggin' Gilah," and "Shul Time." In response to an e-mail query, Mr. Laden himself (yes, that is his real name) says that "If you like cursing and drug references in your Jewish music, we're the band for you." And as a longtime Jewish musician, I certainly can appreciate that. You can order "Get in Trouble" by clicking here, although you'll run the risk of the FBI coming after you for sending $15 to Ben Laden. THE GAME'S THE THING: Brad THE GAME'S THE THING: Brad Zellar, writing in the Minneapolis alternate weekly City Pages, says what I've been saying since at least the '94 strike: regardless of all the crap that happens off the field in regards to labor relations, it's the game that's really most important, and the combined efforts of Bud Selig and Don Fehr can't change that. And it certainly doesn't hurt when your hometown, small market team is 12 games over .500 and 10 games ahead of their nearest rival. LONG MAY YOUR RUN (AND LONG MAY YOUR RUN (AND WALK): Sunday's walk inspired me to finally put my mind to a long term goal: I am going to train for (and run) the New York City Marathon in October of 2003. I figure it'll be just like Sunday, only twice the distance, and I'll be running instead of walking. And that time, I probably won't run into Alan Colmes. My other goal for next year is to finally start (and finish) my semi-autobiographical debut novel, tentatively titled "Benjamin Laden and the Axis of Levi." STANDING UP FOR ROBIN: I STANDING UP FOR ROBIN: I watched Robin Williams' "Live On Broadway" special on HBO on Sunday, and while it wasn't the best of what I've heard of the man, it still beat watching most of his recent movies. Williams practically invented the HBO comedy special with his classic 1986 show "Robin Williams at the Met," though the form was later refined by George Carlin and perfected by Chris Rock. Sunday's show can't be talked about in the same breath as the '86 routine or even Rock and Carlin's recent specials on the network, but it was still a laugh-a-minute affair and for that Williams deserves credit. The return of Williams' 5-jokes-per-second style was welcome, as was the material he covered, bouncing back and forth among Bush jokes, Osama jokes, drinking jokes, and sex jokes- the best of which was his closing bit in which he simulated cunnilingus on his legendarily hairy arm. Williams maintained his fixation on making fun of Southern people (making at least four separate "Deliverance" references throughout), and made at least two jokes about Michael Jackson that I myself made last week (though since they're so obvious, I'll let him slide). And finally, Robin drank about 25 water bottles over the course of the evening, recalling his great line from the '86 special: "Little sip of Perrier here- I had to stop drinking alcohol 'cause I used to wake up nude under the hood of my car with my keys in my ass." So I rate the show a B. Not his best work, but not "Death to Smoochy" either. July 16, 2002 MY NECK, MY BACK, MY MY NECK, MY BACK, MY MOMMA?: Perhaps you have heard the new R&B single "My Neck, My Back (Lick It)," by newcomer Khia. Judging by the two times I've heard it and the lyrics, it's every bit as racy, but not nearly as sexy, as the similar "Oops! (Oh My)" by Tweet. So you could imagine my surprise last week when, while listening to the New York hip-hop station Hot 97, an 11-year-old girl called in to request "Lick It." To DJ Angie Martinez's credit, she immediately demanded that the girl put her momma on the line, and Martinez asked whether Momma had in fact heard the song. No, of course. So Martinez played the song. We didn't get to hear the rest of the saga of the girl and her momma, but the loud squeal that could be heard all throughout Brooklyn that day was most likely the result of an audible momma-daughter bitch-slap. THE FIRST STARBUCKS: I mentioned THE FIRST STARBUCKS: I mentioned that on Sunday's all-the-way-down-Broadway walk, we passed 23 separate Starbucks locations- and on that same day, the New York Times published an article on the northernmost of those Starbucks, the one on 138th St. The article dealt with the arrival of the coffeeshop in the West Harlem neighborhood earlier this year, as a symbol of that area's slow but growing gentrification. YASSER SUES?: Nice to see YASSER SUES?: Nice to see Yasser Arafat has embraced the American spirit of litigiousness: following reports of widespread corruption in the Palestinian Authority ("who, me?"), Arafat is now threatening to sue an Israeli newspaper that claimed he personally embezzled $5 million from the PA. It's official: Yasser now ranks a perfect 100 on the Unintentional Comedy Scale. Newspapers have been calling Arafat a terrorist for years, and he's never threatened to sue any of them, but this time, he's sufficiently pissed off that he's taking them to court? It's an Israeli newspaper, so does that mean the trial would be in Israel? Let's see Yasser get a fair, impartial trial, in Israel... All I can say for the charges is the following: I'm about as surprised at hearing that Yasser Arafat is a thief as I was the first time I heard Michael Jackson was a child molester. LAX AND INGLEWOOD: After the LAX AND INGLEWOOD: After the July 4 shooting of two Jews at L.A. International Airport- and following the gutless assurances by officials that "we're not sure" that it was terrorism/anti-Semitism- Jews, conservatives, and Jewish conservatives across the country reacted with the same outrage: how could anyone not recognize that an Arab shooting several Jews at the ticket counter of Israel's national airline not be considered an act of terror. I remember thinking at the time, "this is exactly what African Americans say when cops shoot black people." And then, a week later, it happened- and just a few miles away no less: a black youth was caught on tape in Inglewood, Calif., slammed into a car hood and punched in the face in the process of being restrained by four different white cops. I don't have to tell you what happened next: almost every right-wing pundit who a week before had jumped to the conclusion that the LAX shooting was anti-Semitism seemed equally convinced that the police brutality incident was NOT racism. It's not so much that I disagree with those who feel this way, and for the record I believe that the LAX shooting was almost certainly anti-Jewish-motivated while the Inglewood beating was at best gross police misconduct and at worst racist. What I do disagree with is this bizarre form of conservative identity politics which stipulate that cops are always innocent, black youths always guilty, and that it's not okay for black people to cry discrimination and victimhood, but defensible (indeed, encouraged) for Jewish people to do both. These conclusions very seldom have anything to do with the facts and everything to do with preconceived notions of ideology- and this is clearly one of the most dishonest practices in the current American political conversation. RETURN OF THE COMMISH?: No, not Michael Chiklis (though I do love "The Shield"). It was reported in today's New York Post that former New York Police Commissioner Bill Bratton, the man who oversaw the revolutionary decrease in crime during Mayor Rudy Giuiliani's first term, is on the short list of candidates to take over the LAPD. Bratton, you may remember, was forced out after falling out with Rudy in '96 in a dispute over who was taking credit for the crime drop. Bratton flirted with a run for mayor last year, but Giuliani, who controlled a large block of leftover GOP soft money from his aborted 2000 Senate run, put the kibosh on that plan, forcing Bratton to align himself with losing Democratic candidate Mark Green (Bratton's promise to return as commisioner was the one and only reason to vote for Green; instead, Michael Bloomberg won and we got the return of Dinkins commish Ray Kelly). I wish Bratton luck in his pursuit of the LAPD job, but I still would love to see him come back for that mayoral run, especially if Bloomberg pulls a Ventura and steps down after one term. QUOTE OF THE DAY: Overheard QUOTE OF THE DAY: Overheard today: while a group of NYU kids were attempting to shoot a student film, an elderly, homeless-looking woman who was nearby feeding birds got upset about appearing in the shot and started yelling at them. Her most clever retort: "Who the fuck do you think you are, Antonioni?" July 15, 2002 FROM BROADWAY BRIDGE TO BATTERY FROM BROADWAY BRIDGE TO BATTERY PARK: Today, along with friends Ben and Joelle, I did something I've wanted to do for quite some time: walk the length of Manhattan island, from the northernmost tip (220th Street, across the Harlem River from the Bronx) to the southernmost (Battery Park, facing New York Harbor and the Statue of Liberty). It took the three of us eight and a half hours, but we did it, walking appoximately 260 blocks and 13 miles, all down Broadway, through the neighborhoods of Inwood, Washington Heights, Harlem, Morningside Heights, the Upper West Side, upper midtown, Times Square, Chelsea, the Flatiron District, Greenwich Village, Soho, Tribeca/Chinatown, the Financial District, and finally Battery Park. All of us New York residents but none of us New York natives, the three of us saw this as an opportunity to explore our city, "connecting the dots" of all those places we've been going on the subway for all this time, and just generally getting a better idea of the character of the city we call home (show of hands- how many of you have explored YOUR entire city on foot? Hmmmm?) Discoveries made on the journey: on the entire length of Broadway, there are more Starbucks locations (23) than churches and synagogues (14, 4 respectively) combined. When we reached 171st St., Ben was reminded of a long-ago "Sesame Street" ditty called "The George Washington Bridge Song"- not as popular, apparently, as Simon and Garfunkel''s "59th Street Bridge Song." There is a section of a park near City Hall with the somewhat disjointed but still honorable name "People With AIDS Plaza." Somewhat surprisingly, none of us ran into anyone we knew, although we did see Fox News Channel host Alan Colmes in the Hamburger Heaven restaurant on 32nd Street. And while we were further up in Manhattan than I ever thought possible, we did unfortunately did not get as far north as the 375th Street Y. We have discussed the possibility of making this into an annual event, perhaps going down the East Side next time. But anyone who participates has only one requirement: thou shalt not complain- because if Ben, Joelle, and I can walk that far and for that long without bitching, you can too. JEWISH DEFEATISM WATCH: One interesting JEWISH DEFEATISM WATCH: One interesting nugget unearthed on today's Urban Nature Hike (and there were so many) was discovered when we arrived at a synagogue in the Washington Heights section of Manhattan. On the wall was a poster commemorating the upcoming Jewish holiday of Tisha B'Av (Tisha B'Av, for the Hebraically Challenged, is a holiday commerorating atrocities against the Jews throughout history, from the destruction of the two Temples to the Spanish Inquisition to the Holocaust- key events of which all occurred on the exact date- the 9th of Av- on the Jewish calendar.) The poster, in reference to current events, commented that nowadays, for Jews, "every day is Tisha B'Av." Now, I realize that horrible things have been happening to Jews lately, both from the scourge of the resurgance of worldwide anti-Semitism and Islamo-fascist terrorism in the US and Israel. But the statement that "every day is Tisha B'Av" sounds like nothing more than an invitation for Jews to adopt a posture of permanent victimhood- bad idea. What Jews have worked to build through the years (and especially since the Holocaust and the establishment of the State of Israel) are among the great accomplishments of human history. Jews would be better off recognizing that we have come a long way since all of the events commemorated on Tisha B'Av- we have power now, we have strength now, and the best thing we can do is use that strength in order to overcome those who wish to hurt us. I know some are virtually programmed to turn anything and everything into a Holocaust analogy, as well as to always foresee another Holocaust right around the corner, but this goes deeper- yes, this is a difficult time for the Jewish people. But we'll be kicked out of no country and have no holy place destroyed. A spirited resolve and strong determination are the reason we will prevail- and wallowing in victimhood is most certainly not. GOD BLESS YOU, BILL SELBY: GOD BLESS YOU, BILL SELBY: For a Yankee hater like me, it's always gladdening to see them go down to defeat, preferably in dramatic 9th inning fashion (just like Game 7 of last year's World Series). And if it involves a walk-off grand slam as part of six runs off of "unhittable" closer Mariano Rivera, that's just icing on the cake. Cleveland rookie Bill Selby did just that today at the Jake, and coincidentally he looks just like Barry Pepper, the actor who played heroic home run hitter Roger Maris in the great HBO film "61*." And best of all, since the Indians (or as the Star Tribune calls them, the "Cleveland Baseball Team") are no longer a threat to my 12-games-over-.500 Twinkies, I can root for them against the Yanks with a clear conscience. July 14, 2002 BUD MUST GO: Now, even BUD MUST GO: Now, even Gammons thinks so. Here's Peter: "The perception is that this is a sport rife with self-absorbed, steroid-bloated, greedy millionaires, all led by a man who might not be able to get the Wisconsin Libertarian Party nomination." July 13, 2002 BACK OF MY HEAD ON BACK OF MY HEAD ON TV: For those interested, the recent Andrew Sullivan vs. Richard Goldstein debate/smackdown that I attended will be broadcast on C-SPAN on Saturday, July 13th at 3:50 P.M. and Sunday, July 14th at 1:35 A.M. I may be visible sitting all the way to the right in the third row (right next to the right microphone during the Q&A period), and if they leave the camera on afterwards, as C-SPAN often does, you may be able to see me onstage introducing myself to Andrew. SPRINGTIME FOR SPRINGSTEEN?: Tickets for SPRINGTIME FOR SPRINGSTEEN?: Tickets for Bruce Springsteen and the E Street Band's first two shows in the New York area will go on sale tomorrow morning. I want to see this tour, having never seen Bruce before, but I won't be on the phone tomorrow because I know they'll be adding more shows later on and I might have a better shot then. But even more importantly, I'm not so happy with how this process has happened. Aside from the litany of anti-Ticketmaster complaints, I find it rather upsetting that Bruce's tour was announced five days ago, the for-sale date was announced four days ago, and the tickets are on sale in one day. This leaves fans very little time to get their shit together in terms of ordering tickets- if they even hear about the for-sale date in the first place. Even worse, the tickets are not available at in-store outlets, but rather only by phone and internet. This in fact punishes hardcore fans, like those willing to camp out overnight for tickets (as my uncle did in Michigan to see the last E Street tour, in '84), and rewards those who press "redial" enough times and are lucky enough to get through in the ten minutes before tickets sell out. Whatever; if I'm not able to get tickets for this go-around I may just until next year, when the band returns from Europe to do a spring- and summertime tour. AI: ALLEN INDICTED: A few AI: ALLEN INDICTED: A few observations about Allen Iverson's recent gun-toting rampage and subsequent arrest and indictment: Of course when the Sixers started winning two years ago and Iverson took his place among the NBA's elite players, we all wanted to forget that the man has always been a violent thug and likely will continue to be. And what about his wife? Tawanna Iverson, I suppose, gets to join the Joumanna Kidd Association of wives who remain married to asshole NBA players and don't mind either being grossly mistreated or reading about it in the papers the next morning. She's already forgiven Allen for throwing her out of the house- naked- AND NOT FOR THE FIRST TIME??? HUH? "You went to your cousin's apartment and brandished a gun? For ME?" The funniest part of the whole saga is one line from the New York Post story, presumably meant with no irony at all: "'He's hurting,' said 76ers coach Larry Brown, who talked to Iverson yesterday. The superstar guard told Brown he likely will not be able to practice with the team." And if it hadn't been for the attempted pistol-whipping, you're saying Iverson would've been at practice? Sure. Adrian Wojnarowski has a great take on ESPN.com- the Sixers should stop treating Iverson like a victim and start treating him like an embarrassment. And finally, sorry Sixers fans: if Iverson spends the remainder of contract in jail, he'll still count against the salary cap. BASHING BUD: To those who BASHING BUD: To those who say all I do on this blog is rip on Commissioner Selig, on the level of Sullivan's anti-Paul Krugman fixation, I retort: just wait 'til the strike starts, 'cause you ain't seen nothing yet. One thing Bud's always needed to work on is his timing. Take last year's decision to announce his doomed contraction plan a mere two days after the end of one of the greatest World Series ever. Then this week, the day after Selig's nearly universally reviled decision to call the All Star Game a tie after 11 innings, the Commish let slip in an interview that two major league teams were in "serious financial trouble," that one team was in such straights that they were in danger of not making payroll next Monday, and might even have to fold before the end of the season. The idea in saying so publicly, of course, was to scare the players' union into believing that Selig and the owners aren't bluffing, and therefore really are in the horrible financial hole that they say they are. Sad thing is, the players (and media) called Selig's bluff, every suspect owner denied that it was them that was in trouble, and the Commish had to announce today that in fact every team will make payroll on the 15th of the month. The most ironic thing about the looming strike is that perhaps for the first time in the history of baseball's labor relations, the owners have a pretty clear-cut case that they've got the moral high ground. There really is a need for greater competitive balance and revenue sharing, and of course it's time for baseball to introduce comprehensive testing for steroids and other performance-enhancing drugs. But whether its his horrible speaking style, his conflicts of interest as an owner, or his propensity towards crying wolf with regards to economic troubles, Selig's leadership has been so poor that there's no way he can be an effective spokesman for such issues. Of course, the fact that he's representing billionaires complaining about losing millions doesn't help his cause either. July 12, 2002 MIRROR, MIRROR, YOU SUCK: London's MIRROR, MIRROR, YOU SUCK: London's Daily Mirror newspaper, always one of the world's left-most journals, has really gone off the deep end in the last week, proclaiming the U.S. "the world's foremost rogue state," with columnist John Pilger writing that "WE ARM ISRAEL because we don't want to upset George Bush. Which makes us pathetically UNETHICAL poodles." Stories like this of rabid anti-Israel sentiment in Europe, diligently collected by the Little Green Footballs blog, remind me of one of the lighter moments of my visit to Israel in 1995. We had just learned in our history class all about Britain's 1947 mandate to split what was then called Palestine into two separate states, one for the Jews and one for the Arabs. Then, a few days later we traveled to the Yad V'Shem Holocaust museum, and it turned out that a delegation lead by then-Prime Minister John Major was visiting the same day. As Major's entourage walked by about a hundred feet from us (visible, but clearly way out of earshot), one of my classmates lurched forward and screamed at Major, "It's all your fault! YOU AND YOUR FUCKING MANDATE!" FIT TO BE TIED: The FIT TO BE TIED: The St. Paul Saints, owned by the aforementioned Mike Veeck, has introduced yet another clever promotion: the Bud Selig tie. Yes, the Saints will be making and selling neckties, in honor of the dubious All Star Game tie, with a rather ugly caricature of the onetime "Acting Commissioner For Life" (not that a real life photo would've looked any better.) This follows a similar stunt earlier this year in which fans of the Northern League ballgclub received two-sided seat cushions featuring the Commish and Players Association boss Donald Fehr. Now I've mentioned in the past that Fehr's son was once my roommate in college, and at the same time Selig's nephew was a Brandeis student as well. No word on whether the two ever met/sparred, although this is almost as great a coincidence as when Chelsea Clinton and Ken Starr's daughter both attended Stanford during the 1998 impeachment drama. QUOTE OF THE DAY: "There’s QUOTE OF THE DAY: "There’s nothing quite like watching a major celebrity in the midst of a public meltdown—especially when the celebrity in question is Michael Jackson, and the meltdown is on a scale unseen since Caligula’s final days." -Jim Knipfel, in the New York Press Daily Billboard. July 11, 2002 SHOPPING SPREE AT TARGET (CENTER)?: SHOPPING SPREE AT TARGET (CENTER)?: ESPN.com, in its now no-longer-free Rumor Central section, is reporting on a proposed trade in which the New York Knicks would send Latrell Sprewell to my Minnesota T-Wolves in exchange for Wally Szczerbiak and Rasho Nesterovic. Now, there are numerous reasons why this is a bad idea, not the least of which is that Spree is much older than either Wolves player, or that the New York tabloids will have trouble coming up with snappy headlines with names like "Szczerbiak" and "Nesterovic." The biggest problem is that Latrell Sprewell is a worse fit for the good-citizen, team player, Minnesota Nice sports culture of the Twin Cities than any currently active athlete, with the possible exception of Randy Moss. And you thought Wally couldn't get along with Kevin Garnett? KG and Sprewell would be at each other's throats from day one, no doubt. The only reason the trade would make sense is that it would bring Szczerbiak closer to his native Long Island and Spree nearer to his hometown of Milwaukee. Though somehow the thought of the Coach Choker returning to the Midwest doesn't conjure the same warm fuzzies as Winfield, Molitor, and Morris' Twins homecomings. And besides, isn't it in the Collective Bargaining Agreement that no team can legally take two white players in the same trade? Maybe the Knicks can try and be fined five first-round draft choices. Want a better idea? How about Sprewell to Phoenix for Stephon Marbury? Steph's always wanted to return to the New York (because Jersey wasn't close enough), and the Knicks do need a point guard in the worst way. And while the old white retirees who root for the Suns may not take so kindly to a 6'7" guy with cornrows entering their community, they should be used to it by now: the Suns have had a long line of assholes at the guard position since they were last good (Sam Cassell, Jason Kidd, Penny Hardaway, Marbury), so Spree'd be nothing new. July 10, 2002 QUOTE OF THE DAY: "Suppose QUOTE OF THE DAY: "Suppose it was Judy Garland's birthday and I went to my local gay bathhouse and opened fire on the fetching young men handing out the towels. How many minutes would tick by before the word "homophobia" was heard?" -Mark Steyn, putting the LAX shooting in perspective, in the National Post. NOT LIKE MIKE AT ALL: NOT LIKE MIKE AT ALL: I have a myriad of reasons for not wanting to see the new Lil' Bow Wow basketball movie "Like Mike," and here's two: One, even though Michael Jordan's name comprises half of the film's title, he does not appear in the movie and in fact has nothing to do with it at all. And two, the movie is named after the song from the classic Gatorade commercial ("Like Mike/If I Could Be Like Mike")- but the sountrack not only doesn't include the original song, but there's not even an authorized Lil' Bow Wow remix! You're killin' me guys, you're killin' me. THERE'S NO TIES IN BASEBALL!: THERE'S NO TIES IN BASEBALL!: As I've said before, I've for months been looking forward to watching commissioner Bud Selig being booed in his hometown of Milwaukee at the All-Star Game. While Selig was conspicuously absent from the pregame festivities, we all got our wish when Selig made the nonsensical decision to call the game after the 11th inning, leading to something that's supposed to never, ever, happen in baseball- a tie. With all the horrible stuff Selig has done to the game in the past decade, this may be the most inexplicable- what's wrong with the pitchers pitching four or five innings? The two pitchers in the game at the time (Freddy Garcia and Vincente Padilla) are both starting pitchers, who normally pitch six innings or more. And worst of all, after such a big deal was made about the All-Star MVP Award being renamed for Ted Williams, the first annual Ted Williams Award was given to... no one. The history books will now record 2002 as the year there was no All-Star Game winner and no All-Star MVP- let's hope it's not also the year there was no World Series. But until the shameful ending, it was a standout game- the "30 Greatest Moments" was outstanding and I found almost nothing to disagree with (the omission of the Pine Tar Game is the only real problem I had). And I hope the amazing catch by Torii Hunter in the 1st inning that robbed Barry Bonds of a home run is remembered as the arrival of a brand new baseball superstar. I hope to eventually have the chance to visit Miller Park, as it looks like quite an improvement over the old Milwaukee County Stadium (which I used to visit almost annually). But if I do go, I'll definitely call ahead, just to make sure Bud's not there. THE REV PLAYS IT SAFE: THE REV PLAYS IT SAFE: Al Sharpton's decision yesterday to back down from calling Sony boss Tommy Mottola a racist was likely done with his planned 2004 presidential run in mind- he doesn't want to upset the music industry, because it's likely many of them (especially those in the hip-hop sector) could be more likely to support his candidacy than that of whoever the other major Democratic candidate is. Indeed, I've always maintained that one reason Al Gore lost in 2000 is because he didn't have the "cool" factor going for him, and part of the problem was that he didn't have any rock stars on his side, like Clinton did in '92 (most of them either jumped on the Nader bandwagon, or sat it out altogether). The larger problem with the Sharpton candidacy is that I believe the only reason Sharpton is running (other than, of course, his rampant egotism), is to bring the issue of slavery reparations to the forefront- preferably, for him, in a primetime convention speech. Reparations is the ultimate wedge issue- if the eventual nominee speaks against it, he'll alienate black voters and will thus be unelectable by the base; if he speaks against it, he'll alienate swing voters and be unelectable, period. Sharpton has the potential to do to the Democrats what Pat Buchanan did to the GOP in 1992 with his "culture war" speech. The Dems had better nip this one in the bud, or else it could be the shitstorm of all time. GUESS THE DICTACTOR/CONSUMER ADVOCATE: On GUESS THE DICTACTOR/CONSUMER ADVOCATE: On the heels of Sharpton's powwow last year with Yasser Arafat in Ramallah, two more Americans who claim to be leaders in the fight for "social justice" are visiting this week with brutal, anti-American dictators: Ralph Nader is hangin' with Fidel Castro in Cuba, while Louis Farrakhan is spending quality time in Baghdad with Saddam Hussein (Farrakhan himself infamously visited Moammar Ghadafi a few years ago). Well, you can't really fault Farrakhan, since this is probably his last chance to see Saddam alive. With all the fun American activists have been having with such despotic criminals, could a visit by Michael Moore with the mullahs of Iran be far behind? YOU'RE NOBODY 'TIL SOMEBODY...: Last YOU'RE NOBODY 'TIL SOMEBODY...: Last night's "Nobody Night" promotion, in which the Class A Charleston (SC) River Dogs barred fans from the stadium until after the game became official in the fifth inning, was the latest memorable stunt from the mind of team owner Mike Veeck. The son of legendary baseball owner Bill Veeck (the man responsible for numerous stunts in his long career, most notably the major league appearance of midget Eddie Gaedel in 1951), the younger Veeck got his first shot in baseball working for the White Sox in the '70s, when they were owned by his father. His ideas included "Disco Demolition Night," as well as "Nickel Beer Night," both of which predictably led to near-riots and caused Mike Veeck's decades-long explusion from baseball. Veeck resurfaced in the early '90s as owner of the St. Paul Saints, a team in the independent Northern League that sought to act as a cheaper, more fun, and outdoor alternative to the dome-bound, then-losing Minnesota Twins. The Saints experience included such beauties as a pig who delivered balls to the umpire, a tuba-playing public address announcer, and the "Designated K Man," a player on the opposing team who, if he were to strike out during the game, would entitle every fan in the stadium to a free cheeseburger. The team was also a sort of baseball halfway-house for such former and future major leaguers as Darryl Strawberry, Jack Morris, JD Drew, and Leon "Bull" Durham. I think, in this time of great peril for the national pastime, the best thing Bud Selig could do is get Mike Veeck in as an owner (hmm, I hear the Twins are for sale...). He could do for baseball what Mark Cuban has done for basketball; after all, Bill Veeck was Mark Cuban before Mark Cuban was. July 08, 2002 SECURITY WAS VERY LAX: A SHARPTON VS. JACKSON: No, Al's SHARPTON VS. JACKSON: No, Al's not feuding with Jesse again; this time it's Michael Jackson he's mixed up with. As reported yesterday, Sharpton joined Jackson at a rally on Saturday in which they called Sony Music CEO Tommy Mottola a "mean racist"- but yesterday, Sharpton did a 180, saying that "I have known Tommy for 15 or 20 years, and never once have I known him to say or do anything that would be considered racist." (Mottola's only sin, that I know of, is that he once married Mariah Carey). The statement marked the first time in Sharpton's long public career in which he has publicly declared that someone or something is not racist. Meanwhile, Jackson's anti-Mottola campaign is clearly off to an inauspicious start- after all, it's kind of hard for a performer to blame the failure of his album on an anti-black record exec when the performer isn't actually racist and the artist isn't actually black. How long before Michael turns to Jesse Jackson? Jesse will certainly want to undermine Sharpton and besides, as evidenced by his hiring two years ago of former Congressman Mel Reynolds, Jesse's proven friendly in the past to accused child molesters. WORST SON EVER: If you WORST SON EVER: If you thought John Henry Williams was a bad guy when he made an ass of himself by playing minor league baseball, or by hatching various schemes to make money off of his father Ted's legacy, that was nothing: The younger Williams, who must be a big fan of the film "Vanilla Sky," has hatched a plan to have the Splendid Splinter cryogenically frozen, with the intention of either selling Williams' DNA, or perhaps attempting to bring him back to life sometime next century. Williams' other children, understandably, have taken legal action in order to stop the freezing, although reports today indicate Ted's head is already on ice. In light of these events, I really hope the Red Sox owner (also named, oddly enough, John Henry), has enough sense to release young Williams from his minor league contract. IN THE LAND OF OZ: IN THE LAND OF OZ: "In a recent interview, the liberal novelist Amos Oz confessed he's haunted by his father's observation that, before the Holocaust, European graffiti read, 'JEWS TO PALESTINE,' only to be transformed in our time into, 'JEWS OUT OF PALESTINE.' The message to Jews, noted Oz: 'Don't be here and don't be there. That is, don't be.'" - Yossi Klein Halevi, in an excellent peace in The New Republic on the deep cultural divisions within Israel. LINKAGE: In case you didn't BLACK OR WHITE?: Memo to BLACK OR WHITE?: Memo to Michael Jackson, who over the weekend joined with the Rev. Al Sharpton at a rally at which they referred to Sony Music chairman Tommy Mottola as a racist: before you play the race card, it might be a good idea to pick a race. Because of all the reasons there are to hate Michael Jackson, his "blackness" certainly doesn't make the list (though oddly enough, his skin color does.) Besides, it's kind of a stretch for Jackson to call the Sony boss racist, when as an Italian-American, he actually has darker skin than Jackson. July 07, 2002 GAMMONS ON YANKEES: I hate GAMMONS ON YANKEES: I hate the Yankees, and I've got a hunch ESPN's Peter Gammons, a longtime Boston resident, does too. But he makes an excellent point in today's column: the Yankees may be baseball's richest team, but they're also the smartest, and that's why they've been in the World Series five of the last six years. Not only do they use their revenues in a smart way (as Gammons points out, they've got almost no bad contracts), but they trade intelligently as well. Notice the Yankees' "top prospects" of the last few years that they didn't trade: Derek Jeter, Alfonso Soriano, Nick Johnson, Jorge Posada. And look at the "top prospects" that they did trade: Ruben Rivera, Ricky Ledee, Ed Yarnall, Jake Westbrook. Notice that all of the players they kept became core members of their championship teams, while the ones they didn't keep became nothing. FAREWELL TO A GREAT DIRECTOR: FAREWELL TO A GREAT DIRECTOR: Director John Frankenheimer died yesterday at the age of 72. Best known as the director of the 1962 classic "The Manchurian Candidate," Frankenheimer had a career that spanned six decades and also included such pictures as "Seven Days in May," "The Birdman of Alcatraz," and such TV movies as the recent HBO picture "Path to War." And while the other major celebrity who died over the weekend, Ted Williams, had an infamously evil son, Frankenheimer took a blood test recently that conclusively disproved the rumor that "Pearl Harbor" director Michael Bay is his illegitimate son. So John Frankenheimer's legacy is safe: the conception of the Worst Director on Earth is NOT his fault. THERE GOES THE GREATEST HITTER THERE GOES THE GREATEST HITTER WHO EVER LIVED: Ted Williams, the last player to hit .400 in a season and the most notable player in the history of the Boston Red Sox franchise, passed away on Friday at the age of 83. Born in August of 1918, Williams played for the Sox from 1939 until 1960, taking time off in the process to fight in both World War II and Korea. The Splendid Splinter was a three-time MVP, played in one World Series, hit .406 in 1941, and hit a home run in his final major league at-bat in 1960. While a majority of today's fans never saw Williams play (indeed, his retirement even predates the perview of ESPN Classic), "Teddy Ballgame" is indeed generally considered the greatest hitter of the 20th century. And unfortunately, the only Red Sox championship of his lifetime was the one they won when he was two months old. TERROR ON THE AIRLINE?: Was TERROR ON THE AIRLINE?: Was Thursday's LAX shooting terrorism, a hate crime, or neither? Really, who cares? It was a tragedy in which a crazy man shot and killed two innocent people. Yes, it appears that since the shooter was a man of Middle Eastern descent who both slammed Israel to co-workers and demanded that a neighbor take down their American flag after 9/11, it can't quite be a coincidence that he chose El Al employees to shoot at. The killer apparently has no known links to either Al-Qaida or any of the Palestininian terrorist organizations, bringing up the question of whether it was simply an anti-Semitic killing. But is this shooting a bigger tragedy because the killer was allegedly motivated by anti-Semitism, as opposed to something else? This is the fallacy of thinking related to "hate crimes"- no hate crimes law would've prevented this double-murder, because since the killer was clearly not deterred by the fact that murder is illegal, why would he be deterred by a hate crimes law? Of course, the killer was thankfully shot by security guards, so the idea of punishment is now superfluous. SOCCER SUCKS: The Village Voice SOCCER SUCKS: The Village Voice sports page (so called because it's literally one page) has the best indictment I've ever seen of "soccer snobs" and their constant guilt trip towards America for not liking soccer enough. Writer Allen Barra's best point: "To them, soccer is 'democratic' because it eliminates the swiftest and the most powerful and takes for its physical standard the average European male. In other words, the average soccer nerd's own height and weight." With that, and Sports Guy's suggestion that the President warn other World Cup teams that "hey- these aren't our best athletes," I don't think I'll ever be able to take soccer seriously again. WARNING: This week's issue of the Voice also includes the usual nonsense, including a defense of pedophilia, so as usual read at your own risk. July 03, 2002 YOU DA MONSTER: I finally YOU DA MONSTER: I finally got around to renting the DVD of "Monster's Ball" over the weekend. I thought it was an excellent film that was worthy of both its critical acclaim and Halle Berry's Best Actress Oscar- I'd put it the sixth-best of 2001's films, after "A.I.," "The Royal Tenenbaums," "Mulholland Drive," "Lord of the Rings," and "Memento," and just ahead of "Donnie Darko" and "Black Hawk Down." What I liked most (in addition to Berry's performance) was that the script never took the obvious route- it never suddenly turned into a story about race or about the death penalty, but rather remained a character study, which is what it was meant to be. I also loved the scene in which Hank (Billy Bob Thornton), after sex with Berry's character, walks into Berry's bathroom, sees a picture on the wall of Berry's late ex-husband (played by P. Diddy) and promptly vomits. If I walked into a woman's bathroom, post coitas, and saw a picture of Diddy on the wall, I'd probably vomit too. I bet J.Lo's boyfriends have that same problem. THE BLUEPRINT (NOT JAY-Z): My THE BLUEPRINT (NOT JAY-Z): My profile of New York musician Jason Shain is online in The Blueprint here; Shain's CD can be purchased here. Shain's music is very consistant with the Ryan Adams/Pete Yorn sound, so if that's what you're into, I highly recommend checking it out. Also in The Blueprint this month is one of the most mind-boggling articles I've ever seen- it's a piece about a New York charity aimed at helping out Jewish homeless people, many of whom wish to keep Kosher. Yes, you read that correctly, Jewish homeless people. Let me try to wrap my head around this one: how many Jewish homeless people can there possibly be? Are those that are starving expected to refuse non-Kosher food? Does the organization turn people away who happen to not be Jewish? And most of all, are Jewish homeless somehow more worthy of help than non-Jewish? Or do they just have more to be ashamed of? There are a lot more black homeless people in New York than Jewish ones, yet I've never heard of any African-American organization aimed at only helping black homeless. Either help all the homeless, or don't- there's no reason to make religious or other demographic distinctions. July 01, 2002 HE SPEAKS SO WELL!: Rep. HE SPEAKS SO WELL!: Rep. J.C. Watts (R-OK), the Chairman of the GOP Conference and the highest ranking black Republican in the history of the House of Representatives, announced today that he is retiring from Congress after four terms. When the story was leaked last night, anchors on all three major cable news channels gave Watts the common backhanded compliment that he is "well-spoken," "articulate," and "speaks so well." This insulting condescension toward an educated black man like Watts is such a well-established phenomenon that Chris Rock has joked about it, and it was parodied in the recent "Undercover Brother." Watts, meanwhile, is a former quarterback at Oklahoma who was a teammate of the legendary receiver Buster Rhymes (namesake of the rapper). Rhymes would be a candidate to run for Watts' seat, but he's in jail, convicted last year on the charge of carjacking a 66-year-old woman. Looks like he won't be passin' the Courvesiour anytime soon. I DON'T WANT NO SNUBS: I DON'T WANT NO SNUBS: Time for the dumbest sports story of the year (like it is every year)- the teams have been announced for baseball's All-Star Game, and the sports media is going crazy over which players were "snubbed." (For the record, snubbees include Roberto Alomar, Jim Thome, Ivan Rodriguez, Ryan Klesko, and Larry Walker). First of all, it's only the All-Star Game. Second of all, numerous All-Stars have been gotten injured every year since the dawn of time, meaning that virtually every player who gets snubbed upon the initial announcement eventually gets picked for the game anyway. Every year this happens, and every year the sportswriters forget it. But I remembered.
{ "pile_set_name": "Pile-CC" }
Q: Adding multiple spritesheets in cocos2d I have the following code to set up my spritesheets and batch node: CGSize screenSize = [[CCDirector sharedDirector] winSize]; [[CCSpriteFrameCache sharedSpriteFrameCache] addSpriteFramesWithFile:@"soldier-test.plist"]; [[CCSpriteFrameCache sharedSpriteFrameCache] addSpriteFramesWithFile:@"soldier-running.plist"]; batchNode = [CCSpriteBatchNode batchNodeWithFile:@"soldier-test.png"]; self.player = [Player spriteWithSpriteFrameName:@"shooting s0000.bmp"]; [batchNode addChild:self.player]; [player setPosition:ccp(screenSize.width/2, screenSize.height/2)]; [self addChild:batchNode]; However, when I try to have player (a subclass of CCSprite) perform an action using frames from the second spritesheet, I get assertion errors related to the texture files. Do I need to combine the sheets into one, or is there a way to span one CCSprite over multiple spritesheets? A: A SpriteBatchNode can only have children that all use the same texture. Your player needs to use the texture soldier-test.png if you want to add it to your batchNode. With a TextureAtlas you can put multiple different textures into one big image.
{ "pile_set_name": "StackExchange" }
Riojasuchus Not to be confused with the sauropodomorph dinosaur, Riojasaurus Riojasuchus is an extinct genus of Late Triassic (Norian) quadrupedal crurotarsan archosaur. Riojasuchus is a member of Ornithosuchidae, a family of facultatively bipedal carnivores that were geographically widespread during the Late Triassic. Two other genera, Ornithosuchus and Venaticosuchus, are currently known. The holotype specimen is PVL 3827. It was found in the Los Colorados Formation of the Ischigualasto-Villa Unión Basin in northwestern Argentina. Discovery and naming The holotype specimen is PVL 3827, consisting of a mostly complete crania and a partial postcrania. A majority of the postcranial material was preserved. The skeleton was found with others in the upper section of the Los Colorados Formation. Other than the holotype, it is known from three skeletons. Description The skull of the type specimen is long, and has a large, curved snout and short mandibles. Distinguishing characteristics Many characteristics were identified by Bonaparte in 1969. They are listed below: a preorbital vacuity well bordered by protruding edges of the smaller preorbital opening, found in Ornithosuchus; an outgoing lateral lacrimal edge; an infratemporal fenestra present in the shortest adult skull with mandibular fenestra; the top of the surangular laterally pointed, and with a small prearticular process; short atlas and cervical vertebrae, all with a ventral keel; an ilium, pubis and femur, with the talus and calcaneus of the type of Ornithosuchus and median orbits with a higher bottom than in Ornithosuchus. Classification Riojasuchus is a member of Ornithosuchidae, a family of facultatively bipedal carnivores that were geographically widespread during the Late Triassic. Two other genera, Ornithosuchus and Venaticosuchus, are currently known. The group was originally considered to be related to dinosaurs, before many phylogenetical analysises. Below is a phylogenetic cladogram by Butler et al. in 2011 showing the cladistics of Archosauriformes, focusing mostly on Pseudosuchia: Clade names follow Nesbitt 2011. Paleoecology Fossils of Riojasuchas are found in the Los Colorados Formation, a Late Triassic unit in Argentina, and date to approximately 217 to 215 million years ago. At that age, it is the youngest ornithosuchid known. It lived alongside the protosuchid Hemiprotosuchus; the sphenosuchid Pseudohesperosuchus; the stagonolepidid Neoaetosauroides; the melanorosaurid Strenusaurus; and the riojasaurid Riojasaurus. References Category:Ornithosuchids Category:Triassic archosaurs Category:Norian life Category:Late Triassic reptiles of South America Category:Triassic Argentina Category:Fossils of Argentina Category:Los Colorados Formation Category:Fossil taxa described in 1969 Category:Taxa named by José Bonaparte
{ "pile_set_name": "Wikipedia (en)" }
// Copyright (c) 2006, Google Inc. // All rights reserved. // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are // met: // // * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // * Redistributions in binary form must reproduce the above // copyright notice, this list of conditions and the following disclaimer // in the documentation and/or other materials provided with the // distribution. // * Neither the name of Google Inc. nor the names of its // contributors may be used to endorse or promote products derived from // this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // exception_handler.h: MacOS exception handler // This class can install a Mach exception port handler to trap most common // programming errors. If an exception occurs, a minidump file will be // generated which contains detailed information about the process and the // exception. #ifndef CLIENT_MAC_HANDLER_EXCEPTION_HANDLER_H__ #define CLIENT_MAC_HANDLER_EXCEPTION_HANDLER_H__ #include <mach/mach.h> #include <TargetConditionals.h> #include <string> #include "client/mac/handler/ucontext_compat.h" #include "common/scoped_ptr.h" #if !TARGET_OS_IPHONE #include "client/mac/crash_generation/crash_generation_client.h" #endif namespace google_breakpad { using std::string; struct ExceptionParameters; enum HandlerThreadMessage { // Message ID telling the handler thread to write a dump. kWriteDumpMessage = 0, // Message ID telling the handler thread to write a dump and include // an exception stream. kWriteDumpWithExceptionMessage = 1, // Message ID telling the handler thread to quit. kShutdownMessage = 2 }; class ExceptionHandler { public: // A callback function to run before Breakpad performs any substantial // processing of an exception. A FilterCallback is called before writing // a minidump. context is the parameter supplied by the user as // callback_context when the handler was created. // // If a FilterCallback returns true, Breakpad will continue processing, // attempting to write a minidump. If a FilterCallback returns false, Breakpad // will immediately report the exception as unhandled without writing a // minidump, allowing another handler the opportunity to handle it. typedef bool (*FilterCallback)(void *context); // A callback function to run after the minidump has been written. // |minidump_id| is a unique id for the dump, so the minidump // file is <dump_dir>/<minidump_id>.dmp. // |context| is the value passed into the constructor. // |succeeded| indicates whether a minidump file was successfully written. // Return true if the exception was fully handled and breakpad should exit. // Return false to allow any other exception handlers to process the // exception. typedef bool (*MinidumpCallback)(const char *dump_dir, const char *minidump_id, void *context, bool succeeded); // A callback function which will be called directly if an exception occurs. // This bypasses the minidump file writing and simply gives the client // the exception information. typedef bool (*DirectCallback)( void *context, int exception_type, int exception_code, int exception_subcode, mach_port_t thread_name); // Creates a new ExceptionHandler instance to handle writing minidumps. // Minidump files will be written to dump_path, and the optional callback // is called after writing the dump file, as described above. // If install_handler is true, then a minidump will be written whenever // an unhandled exception occurs. If it is false, minidumps will only // be written when WriteMinidump is called. // If port_name is non-NULL, attempt to perform out-of-process dump generation // If port_name is NULL, in-process dump generation will be used. ExceptionHandler(const string &dump_path, FilterCallback filter, MinidumpCallback callback, void *callback_context, bool install_handler, const char *port_name); // A special constructor if we want to bypass minidump writing and // simply get a callback with the exception information. ExceptionHandler(DirectCallback callback, void *callback_context, bool install_handler); ~ExceptionHandler(); // Get and set the minidump path. string dump_path() const { return dump_path_; } void set_dump_path(const string &dump_path) { dump_path_ = dump_path; dump_path_c_ = dump_path_.c_str(); UpdateNextID(); // Necessary to put dump_path_ in next_minidump_path_. } // Writes a minidump immediately. This can be used to capture the // execution state independently of a crash. Returns true on success. bool WriteMinidump() { return WriteMinidump(false); } bool WriteMinidump(bool write_exception_stream); // Convenience form of WriteMinidump which does not require an // ExceptionHandler instance. static bool WriteMinidump(const string &dump_path, MinidumpCallback callback, void *callback_context) { return WriteMinidump(dump_path, false, callback, callback_context); } static bool WriteMinidump(const string &dump_path, bool write_exception_stream, MinidumpCallback callback, void *callback_context); // Write a minidump of child immediately. This can be used to capture // the execution state of a child process independently of a crash. static bool WriteMinidumpForChild(mach_port_t child, mach_port_t child_blamed_thread, const std::string &dump_path, MinidumpCallback callback, void *callback_context); // Returns whether out-of-process dump generation is used or not. bool IsOutOfProcess() const { #if TARGET_OS_IPHONE return false; #else return crash_generation_client_.get() != NULL; #endif } private: // Install the mach exception handler bool InstallHandler(); // Uninstall the mach exception handler (if any) bool UninstallHandler(bool in_exception); // Setup the handler thread, and if |install_handler| is true, install the // mach exception port handler bool Setup(bool install_handler); // Uninstall the mach exception handler (if any) and terminate the helper // thread bool Teardown(); // Send a mach message to the exception handler. Return true on // success, false otherwise. bool SendMessageToHandlerThread(HandlerThreadMessage message_id); // All minidump writing goes through this one routine. // |task_context| can be NULL. If not, it will be used to retrieve the // context of the current thread, instead of using |thread_get_state|. bool WriteMinidumpWithException(int exception_type, int exception_code, int exception_subcode, breakpad_ucontext_t *task_context, mach_port_t thread_name, bool exit_after_write, bool report_current_thread); // When installed, this static function will be call from a newly created // pthread with |this| as the argument static void *WaitForMessage(void *exception_handler_class); // Signal handler for SIGABRT. static void SignalHandler(int sig, siginfo_t* info, void* uc); // disallow copy ctor and operator= explicit ExceptionHandler(const ExceptionHandler &); void operator=(const ExceptionHandler &); // Generates a new ID and stores it in next_minidump_id_, and stores the // path of the next minidump to be written in next_minidump_path_. void UpdateNextID(); // These functions will suspend/resume all threads except for the // reporting thread bool SuspendThreads(); bool ResumeThreads(); // The destination directory for the minidump string dump_path_; // The basename of the next minidump w/o extension string next_minidump_id_; // The full path to the next minidump to be written, including extension string next_minidump_path_; // Pointers to the UTF-8 versions of above const char *dump_path_c_; const char *next_minidump_id_c_; const char *next_minidump_path_c_; // The callback function and pointer to be passed back after the minidump // has been written FilterCallback filter_; MinidumpCallback callback_; void *callback_context_; // The callback function to be passed back when we don't want a minidump // file to be written DirectCallback directCallback_; // The thread that is created for the handler pthread_t handler_thread_; // The port that is waiting on an exception message to be sent, if the // handler is installed mach_port_t handler_port_; // These variables save the previous exception handler's data so that it // can be re-installed when this handler is uninstalled ExceptionParameters *previous_; // True, if we've installed the exception handler bool installed_exception_handler_; // True, if we're in the process of uninstalling the exception handler and // the thread. bool is_in_teardown_; // Save the last result of the last minidump bool last_minidump_write_result_; // A mutex for use when writing out a minidump that was requested on a // thread other than the exception handler. pthread_mutex_t minidump_write_mutex_; // True, if we're using the mutext to indicate when mindump writing occurs bool use_minidump_write_mutex_; // Old signal handler for SIGABRT. Used to be able to restore it when // uninstalling. scoped_ptr<struct sigaction> old_handler_; #if !TARGET_OS_IPHONE // Client for out-of-process dump generation. scoped_ptr<CrashGenerationClient> crash_generation_client_; #endif }; } // namespace google_breakpad #endif // CLIENT_MAC_HANDLER_EXCEPTION_HANDLER_H__
{ "pile_set_name": "Github" }
Battle of the Iron Triangle The Battle of the Iron Triangle took place from 16 May to 20 November 1974, when the People's Army of Vietnam (PAVN) 9th Division captured Rach Bap and An Dien. The Army of the Republic of Vietnam (ARVN) regained the lost towns in a series of costly counterattacks. Background The Iron Triangle was an important strategic location, bounded on the north by the jungle and overgrown rubber plantations of the Long Nguyen Secret Zone, on the west by the Saigon River and on the east by the smaller but unfordable obstacle of the Thi Thinh River. Phú Cường, the capital of Bình Dương Province, was an important industrial and farming center and contained the ARVN Engineer School. It was linked by a major highway with the large ARVN Phu Loi Base Camp and, farther east, with Bien Hoa Air Base. Lying as it did in the center of the Saigon River corridor, at the junction of Highways 13 and 1, and only 16 km from the outskirts of Saigon, Phú Cường was vital to the defense of Saigon. The terrain within the Iron Triangle was flat, almost featureless, and covered by dense brush and undergrowth. The clearings, especially in the northern part, were thick with elephant grass, higher than a man's head. The surface was scarred by countless bomb and shell craters so that vehicular movement off the narrow, rough dirt roads was nearly impossible; even tracked vehicles had difficulty. A vast network of tunnels and trenches, most of them caved-in and abandoned, laced this ground that had been the scene of battles since the First Indochina War. A weak string of three ARVN outposts protected the northern edge of the Triangle, from Rach Bap () on the west, close by the Saigon River, along local Route 7 to An Dien () on the Thi Thinh River opposite Bến Cát. Each of these outposts, including Base 82 (), which was midway between Rach Bap and An Dien, was manned by a company of the 321st Regional Force (RF) Battalion. Another country road passed by the Rach Bap outpost, local Route 14, which generally paralleled the Saigon River from Tri Tam, through Rach Bap, and veered to the southeast through the Triangle, crossing the Thi Thinh River before it joined Highway 13 north of Phú Cường. The PAVN had blown the bridge on Route 14 over the Thi Thinh a few weeks earlier, but the stream could be spanned by pontoon sections. About midway between Rach Bap and the Thi Thinh crossing of Route 14, the ARVN had another small firebase. Frequent sweeps and some semi-fixed defensive positions north of Củ Chi manned by the ARVN 25th Division and Hậu Nghĩa Province RF screened the western flank of the Triangle, but PAVN resistance in the Ho Bo Woods opposite Rach Bap, and the formidable obstacle of the Saigon River, as well as a lack of resources, limited the influence that the 25th could exert on the situation within the Triangle. The ARVN was strong with infantry, armor, and mutually supporting fire bases and outposts in Bến Cát District east of the Thi Thinh boundary of the Triangle, but only one bridge, a weak span, connected the district town and the Triangle hamlet of An Dien. Battle PAVN attack On 16 May the PAVN 9th Division began their attack on with heavy artillery, rocket, and mortar concentrations falling on Rach Bap, Base 82, and An Dien. The RF company at Base 82 abandoned its bunkers, many of which had collapsed under the weight of the bombardment, late that afternoon. Rach Bap held out until about 03:00 on 17 May, its surviving defenders withdrawing in the direction of An Dien. The fighting was fierce in An Dien on the 16th, but by the night of 17 May, PAVN forces held the flattened village and its defenses. Remnants of an RF battalion, however, held the western end of the Thi Thinh bridge in a shallow blocking position, while the eastern end, by Bến Cát, was secured by ARVN forces. The PAVN dug in around An Dien but was unable to dislodge the RF positions at the bridge. Two infantry regiments of the 9th Division, with about 10 T-54 and PT-76 tanks, were employed against the dispersed 321st RF Battalion. The 2nd Regiment overran Rach Bap and continued the attack south into the Triangle along Route 14, while the 95C Regiment attacked Base 82 and An Dien. The 271st Regiment was held in reserve. Initial ARVN counterattack at An Dien The ARVN at Ben Cat were unable to counterattack the PAVN immediately at An Dien because the bridgehead held by the RF was too shallow to protect the crossing of any large forces, but III Corps commander Lt. Gen. Phạm Quốc Thuần quickly began reinforcing Bến Cát. Task Force 318 arrived in Bến Cát on the afternoon of the 16th and on the 17th began reinforcing the RF holding the bridge and moving against the PAVN's blocking positions west of the bridgehead. The weakness of the ARVN bridgehead and the strength of the enemy positions in An Dien, which included antitank guns and tanks, made it impractical to send any armor of the 318th across the An Dien bridge at this time. Meanwhile, the 322nd Task Force moved from Tây Ninh Province to Phú Cường and was ordered to prepare to attack into the Triangle along Route 14 in order to oppose the PAVN 2nd Regiment, which was moving south from Rach Rap. Republic of Vietnam Air Force (RVNAF) aerial observers and photography on 17 May revealed two T-54 tanks inside Base 82, which RVNAF fighter-bombers destroyed the next day, and four more in the An Dien base. Initial negative reactions at III Corps Headquarters to the seemingly hasty, if not unwarranted, withdrawal of the RF companies from their positions softened somewhat when the size and composition of the PAVN force was revealed. General Thuần greatly underestimated the strength and tenacity with which the PAVN 9th Division would defend An Dien, although he had accurate intelligence concerning the size, composition, and location of his enemy. His initial plans, which proved unrealistic, called for virtually simultaneous recapture of the three lost bases by about 22 May. Except for the few ARVN infantry and engineers that were thrown across the Thi Thinh River to reinforce the An Dien bridgehead, the first major ARVN unit to move into the Triangle was a battalion of the 43rd Infantry Regiment, 18th Division, which crossed on Route 14 north of Phú Cường. Shortly reinforced by the rest of the regiment, this element, followed by the 322nd Armored Task Force, was to attack Rach Bap and Base 82. Meanwhile, the 318th Task Force would cross the An Dien Bridge, pass through An Dien, and proceed to Base 82. Three Ranger battalions attacking south out of Lai Khê were to strike Base 82 from the north. None of this worked as planned. The 43rd Infantry became stalled after advancing only 4 or 5 km north. Then, the tracked vehicles of the 322nd Task Force found the going extremely slow in the dense brush and cratered terrain. General Thuần, concerned that this armored force might become bogged down and have a bridge blown behind it ordered its withdrawal. He discovered, meanwhile, that the An Dien bridge had been seriously weakened by PAVN artillery (including AT-3 missiles) and would not support the tanks of the 318th Task Force. Under PAVN observation and sporadic heavy mortar and artillery fire, ARVN combat engineers attempted to repair the bridge. Casualties mounted, and the work progressed very slowly. About the same time, the 7th Ranger Group, with three battalions, moved southwest out of Lai Khê, crossed the Thi Thinh River and advanced on Base 82. The Rangers were immediately opposed in the thick jungle and rubber plantation by entrenched PAVN 9th Division troops, and their attack stalled well short of the objective. While the ARVN was experiencing great difficulty advancing, it was pounding An Dien with heavy artillery fire. The North Vietnamese responded against ARVN batteries and the stalled Ranger and infantry columns and sent sappers into an RF command post just south of Bến Cát, where they destroyed a 105 mm howitzer and routed most of the small garrison. The RVNAF meanwhile, gave only limited support as plentiful PAVN antiaircraft artillery and SA-7s forced RVNAF aircraft to high altitudes. On 24 May an armored cavalry squadron of the 25th Division launched a diversionary attack from Gò Dầu Hạ east toward the Boi Loi Woods in an attempt to prevent the 9th Division from committing its reserve, the 271st Regiment, against either the 318th or the 322d Task Forces. By the 25th, the armored cavalry squadron had passed Suoi Cau without encountering any resistance, and another supporting maneuver began with two battalions of the 50th Infantry, 25th Division, moving north from Phú Hòa District along the west bank of the Saigon River. On 25 May, General Thuần met with the commander of the 18th Division, Brig. Gen. Lê Minh Đảo, and the commander of the 3rd Armored Brigade, Brig. Gen. Trần Quang Khôi, to coordinate the following morning's attack. At that time, the 43rd Regiment was about 7 km south of An Dien, about to attack north, while the 3rd Armored Brigade was preparing to send a cavalry squadron and a Ranger battalion across the An Dien bridge. Although the PAVN's heavy mortar and artillery fire had so weakened the bridge at An Dien that the cavalry could not follow the Rangers, by nightfall the 64th Ranger Battalion was dug in on the eastern edge of An Dien Village. The 43rd Regiment was again ordered to resume the attack north, and the 7th Ranger Group, coming down from Lai Khe was ordered to take Base 82 by night attack on 27 May. Because no progress was made General Thuần on 28 May decided to try a fresh approach. First he turned the operation over to BG Đảo, told him to move his 52nd Regiment over from Phú Giáo District, gave him operational command of the 7th Ranger Group, which was still north of Base 82, and attached to Đảo's 18th Division a reinforced squadron of the 3rd Armored Brigade. Since it would take two days to relieve the 52nd Regiment on the Phú Giáo front and move it into position at Bến Cát, the new operation was scheduled for 30 May. Delays in the relief and movement forced General Đảo to move the date to 1 June. With the Rangers still holding the shallow bridgehead opposite Bến Cát and the 43rd Regiment making slow progress attacking the dug-in PAVN 272nd Regiment south of An Dien. General Đảo sent the 2nd Battalion, 52nd Regiment across the Thi Thinh River on an assault bridge south of Bến Cát on 1 June. Once across, it turned north to attack the defenses of the PAVN 95C Regiment in An Dien. Meanwhile, the reconnaissance company and an infantry company from the 18th Division crossed the An Dien bridge and advanced toward the village. Casualties on both sides were heavy as the commander of the 52nd Regiment committed his 1st Battalion behind the 2nd. The PAVN responded by assaulting the ARVN infantry that night with infantry and at least 10 tanks. The two battalions of the 52nd held their positions and were reinforced by the 3rd Battalion the next afternoon. Meanwhile, ARVN combat engineers were clearing the road past the An Dien bridge. Working at night with flash lights to avoid PAVN observation and fire, they removed 38 antitank mines from the route of advance. Weakened by casualties, the 52nd Infantry made very little progress on 2 and 3 June, and the 43rd Regiment was still being blocked by the PAVN 272nd Regiment. Đảo then ordered his 48th Infantry across the Thi Thinh south of Bến Cát, to pass through the 52nd and take An Dien. While the PAVN artillery continued to pound ARVN positions, two battalions of the 48th crossed into the Iron Triangle on the night of 2/3 June, The fighting at An Dien wos especially fierce on 3 June as the PAVN used tanks against ARVN infantry. Armed with light antitank weapons, ARVN infantry knocked out at least 4 tanks in the final day of the battle. On 4 June, troops of the 18th ARVN Division finally entered An Dien and on the 5th overran the last position of the 95C Regiment, which had since been reinforced by elements of the 271st Regiment. On the morning of the 5th, two battalions of the 48th and two of the 52nd were holding An Dien bracing for a counterattack. One Ranger battalion was in a blocking position north of the destroyed village, while another secured the An Dien bridge. The 43d Regiment was still stalled by the 272nd Regiment's defenses south of An Dien. The 7th Ranger Group had not been able to advance toward Base 82 from the north, and a new major ARVN attack would be required to advance past the positions held in and around An Dien. PAVN soldiers captured in An Dien told of horrendous losses in the three battalions - the 7th, 8th, and 9th of the 95C Regiment. Fourteen surviving members of the 9th Battalion were captured when the last strongpoint fell on 5 June. They said that casualties in the 8th and 9th Battalions between 16 May and 4 June were 65 percent, that a company of the 7th Battalion had only one man left, that a company of the 8th Battalion was totally destroyed and that the 9th Battalion lost two complete companies. These accounts were confirmed by the large number or bodies left on the battlefield and by the quantity or weapons and equipment captured. ARVN losses were substantial, well over 100 ARVN soldiers had been killed. The expected PAVN counterattack came on the night of 5/6 June as two battalions of the 271st Regiment, supported by up to 14 tanks attacked from two directions. The ARVN held and its infantrymen knocked out 5 tanks and damaged 5 others. The second phase or the Iron Triangle campaign was over with the recapture of An Dien, and General Thuần was anxious to get the attack moving again toward Base 82 and Rach Bap. Although the An Dien bridge would soon be in condition to carry the tanks of the 318th Task Force, one company of armored personnel carriers had already crossed into An Dien, a knocked-out T-54 tank blocked the narrow road from the bridge into An Dien. Swampy ground on each side prevented bypassing the tank and it had to be blown off the road with demolitions. ARVN combat engineers were laboring at this task while infantrymen of the 18th Division were holding the perimeter around An Dien. Base 82 The first attempt to retake Base 82 began on 7 June 1974 when the 318th Task Force finally brought its tanks across the Thi Thinh River and passed through the 18th Division position in An Dien. While the 52nd Infantry remained in reserve holding the An Dien perimeter, two battalions of the 48th Infantry moved south and west to protect the southern flank of Task Force 318 as it advanced along Route 7 towards Base 82. To the south, the 43rd Regiment maintained contact with the 272nd Regiment. Meanwhile, the PAVN 9th Division had withdrawn the remnants of the 95C Regiment from action and placed its 271st Regiment at Base 82, where it prepared deep, mutually supporting defensive positions. Clearly indicating its resolve to conduct a determined defense along Route 7 in the Iron Triangle, COSVN sent the 141st Regiment, 7th Division south from its position along Highway 13, north of Lai Khê, to reinforce the 9th Division north of Base 82. The 9th Division meanwhile began shifting the 272nd Regiment north from the southern part of the Iron Triangle to assist in the defense of Base 82 and Rach Bap. The summer monsoon had arrived in Bình Dương Province and rains and low cloud cover further reduced the effectiveness of RVNAF support for the attack. A dense rubber plantation northwest of Base 82 provided excellent concealment for supporting defensive positions and observation of local Route 7, the only avenue of approach available for ARVN armor. Dense brush covered the southern approaches to the base and concealed more PAVN supporting and reserve positions. The only fairly open terrain was on either side or Route 7 where high grass offered no concealment to the ARVN column but reduced visibility to a few meters. Furthermore, this approach was under the observed fire of the 9th Division's supporting artillery. By the evening of 8 June, Task Force 318 reached its first objective, Hill 25 (), about 1 km short of Base 82. There it fought a battalion of the 271st Regiment, killing 30 and capturing 10 while taking light casualties. The prospects seemed bright for recapturing Base 82 by the following day and General Thuần told BG Đảo that Rach Bap should be taken by 15 June. But on 10 June Task Force 318, advancing very slowly in two columns, one north of Route 7 and one south was struck by a battalion of the 271st Regiment supported by 4 tanks and a heavy concentration of mortar, howitzer and rocket fire. Four of Task Force 318's tanks and one or its personnel carriers were knocked out but personnel losses were light. By nightfall only 200 meters had been gained, the PAVN's minefields and 82-mm. recoilless guns having stopped the task force 800 meters short of Base 82. No progress was made on 11 June, but ARVN artillery and RVNAF pounded the base. Antiaircraft fire was intense and kept the RVNAF fighter-bombers above their most effective attack altitudes. Meanwhile, General Thuần, determined to get the attack moving again, directed BG Khôi to assemble the 315th Task Force at Bến Cát and send it across the Thi Thinh to reinforce the attack. The 315th was to move southwest and attack Base 82 from the south, while the 318th continued its frontal assault. Farther south, another change was taking place, detecting that all but one of the PAVN 2nd Regiment's battalions had moved north toward Route 7, BG Đảo left only one of his 43rd Infantry battalions in the Phu Thu area, placing the balance of the regiment in reserve. By noon on 12 June the 315th Task Force had reached a position about 1,600 meters southeast of Base 82. At this point, BG Đảo changed the original concept of a two-pronged attack from the east and south. As soon as the 315th was ready to attack, he would withdraw the 318th to defend the eastern approaches to Bến Cát that had been weakened by the commitment of the 315th against Base 82. Thick brush, rough terrain, and accurate PAVN artillery fire prevented the 315th from making any gains on 13 June. In fact, as the 318th withdrew from contact, it left positions much closer to the objective than those reached by the 315th. In another change in plans. BG Đảo proposed to General Thuần that two battalions each from the 43rd and 52nd Regiments take over the attack role, while the 315th remained in its defensive perimeter southeast of Base 82. The infantry battalions would move into the rubber plantation and attack from the north. General Thuần agreed and left for Joint General Staff headquarters to ask for a new ammunition allocation for the attack. He returned to his headquarters in ill-humor, for General Đổng Văn Khuyên, the Chief of Logistics, was unable to satisfy this request. By 15 June, the two leading 43rd Infantry battalions, one of which was attempting to swing north of Base 82 from An Dien, had made very little headway against strong resistance and heavy PAVN artillery fire. In contacts south of Route 7 on the 17th, prisoners were taken from the 272nd Regiment, soldiers who had recently arrived in South Vietnam and had been assigned to the 272nd for only three days before their capture. ARVN casualties continued to mount, troops were desperately fatigued, artillery support was too severely rationed, and the weather all but eliminated effective air support. On 21 June, General Thuần ordered a halt in the attempt to take Base 82, while a new approach, better supported by artillery fire, could be devised. Consideration was also given to replacing the 18th Division, whose troops had been in heavy combat for a month, with the 5th Division. Instead of relieving the 18th, General Thuần decided to try his armor again. Holding the infantry in position, he sent the 318th and 322nd Task Forces back into the Triangle, one north of Route 7, the other generally along the road. The PAVN's antitank defenses, primarily employing the 82-mm. recoilless gun, stopped the attack once again, destroying 13 M113 armored personnel carriers and 11 M48 tanks between 27 June and 1 July, even though ARVN artillery and the RVNAF supported the attack with 43,000 rounds and 250 sorties. The tired infantrymen of the 43rd Regiment tried once again to take Base 82 from the south on 1 July but got nowhere. On 2 July, General Thuần finally decided to relieve the 18th Division and replace it with the 5th. The armored task forces would be withdrawn for rest and refitting. General Thuần allowed his commanders ten days to complete the relief. In order not to weaken the 5th Division's defenses north of Lai Khê, elements of the 18th Division's 52nd Regiment, which had seen little action, and two battalions of the 25th Division's 50th Infantry were attached to the 5th Division in the Iron Triangle. The relief was accomplished on schedule, and a relative calm settled over the Base 82 battleground. The PAVN 9th Division also made adjustments during the last part of June and the first weeks of July. While the 272nd Regiment retained defensive positions in the southern part of the Iron Triangle, the 95C Regiment, refitted and with fresh replacements, returned to the Base 82 area and assumed responsibility for its defense. The 271st Regiment, held defensive positions in the Base 82 area, primarily to the north and northeast. Meanwhile, the 141st Regiment of the 7th Division returned to its normal area of operations north of Lai Khê, and artillery support for the 9th Division was assigned to the 42nd Artillery Regiment. The 75th Artillery Regiment moved from the Bến Cát area to support the 7th Division east of Route 13. The 5th Division made no determined effort during July or August to alter the status quo. The PAVN, however, pulled the 95C Regiment out of Base 82 and replaced it with the 141st Regiment in time to meet the next concerted ARVN effort to take Base 82. By autumn the 8th Infantry, 5th Division, had been selected to try to capture Base 82, having replaced its sister regiment, the 7th, in the Iron Triangle. Prior to an attack scheduled for 7 September, ARVN reconnaissance patrols had successfully reached the base's perimeter. The 8th Regiment formed a task force around its 1st and 2nd Battalions, reinforced by the 5th Division Reconnaissance Company and a small armored troop with 3 M41 tanks, 3 M48 tanks and 3 M113s. The 1st Battalion advanced south of Route 7, while the 2nd Battalion, with the reconnaissance company and the armored troops, advanced on an axis north of the road. Unopposed and moving quickly the two battalions reached the outer defenses of Base 82 in the early morning of 7 September but could go no further that day. Faced with barbed wire and mines and under fire from the front and flanks, the 8th Infantry dug in. As the rain of PAVN shells continued, much of it heavy 120 mm mortars, the 8th kept digging and improving fighting positions with logs overhead. On 8 September, the PAVN shelling increased, and at 16:00 it began to rain, ending all RVNAF aerial observation and air support. As the rain increased, so did the PAVN bombardment, 1600 rounds falling in one hour, and the battlefield was obscured in smoke. ARVN infantry could hear the approach of tanks. One column of T-54s came out of the rubber plantation and forest to the north, and another line of six advanced from the south. The three ARVN M48s withdrew, and at 18:00, nearly caught in a double envelopment, the 8th Infantry fell back, first about 300 meters where they attempted to establish a new line, then 300 meters farther back where the troops of the 8th rallied and held on the western slope of Hill 25. With victory seemingly so close, General Thuần was deeply disappointed by the rout of the 8th Regiment, and his disappointment changed to anger when he learned of the relatively light casualties suffered by the 8th: 6 killed, 29 missing, and 67 wounded. But even if the 8th Infantry leaders on the scene could have held their troops in their exposed positions in front of Base 82, the regiment probably could not have survived the PAVN counterattack. In any case, General Thuần ordered an immediate investigation of the circumstances of the 8th Infantry's failure and subsequently dismissed the regimental commander. On 11 September, the 8th Infantry was replaced by the 9th, and all three battalions of the 9th Infantry moved into position on the west slope of Hill 25. Combat losses since the start of the PAVN offensive in May, combined with the slow flow of the replacements into the regiment, had reduced battalion strength to under 300. Between 12 and 18 September, the 9th concentrated on reconnaissance, planning, and improvement of positions. As the 9th Regiment prepared for the attack, the PAVN was beginning to execute another relief in the Bến Cát battlefield. The 141st Regiment made preparations to leave the Base 82 area and turn over its defense once again to the 95C Regiment. With the 2nd Armored Cavalry Squadron protecting the right (north) flank, and two Ranger battalions protecting the left, the 9th Infantry Regiment began its attack toward Base 82. The two attacking battalions, the 3rd Battalion on the right, north of Route 7, and the 2nd on the left, crossed the line of departure on Hill 25 on 19 September. Moving slowly, with excellent reconnaissance and effective artillery support, the ARVN methodically eliminated, one by one, the PAVN's mutually supporting bunkers that lay in a dense pattern all along the route of advance. Although the PAVN defended tenaciously and their artillery support was heavy and accurate, they gradually gave ground. On 29 September, the 1st Battalion relieved the 3rd Battalion, and the attack continued. On 2 October, the 2nd Battalion, 46th Infantry was committed to reinforce the 2nd Battalion, 9th Infantry. Before midnight on 3 October, as PAVN artillery and mortars were still firing heavy barrages, a 12-man assault team from the 1st Battalion, 9th Infantry, attempted to breach the barbed wire and scale the earthen wall. An antipersonnel mine detonated, disclosing the team's position, and heavy fire from the base pinned it down. Very early the next morning, the PAVN counterattacked, forcing the withdrawal of the assault team. But it became apparent to the ARVN commander on the ground that victory was within grasp. A 100-round concentration of 155-mm. howitzer fire which he requested, had the desired effect: PAVN resistance and return fire was notably diminished by 13:00, and 30 minutes later PAVN infantrymen were seen climbing out of their crumbling fortress and running to the rear. At 15:00 on 4 October the 1st Battalion, 9th Regiment, raised South Vietnam's flag over Base 82, ending a bitter four-month struggle. Rach Bap Following the withdrawal from Base 82 COSVN organized a new corps headquarters in the Tay Ninh- Binh Long region and designated it the 301st Corps. This corps would soon direct the combat operations of the 7th and 9th Divisions, separate regiments, and additional formations already en route from North Vietnam. Meanwhile, General Thuần decided to rest the tired troops of the 5th Division and turned his attention to sending his 25th Division to clear out the PAVN bases in the Ho Bo area west of the Iron Triangle. The ARVN defenses around An Dien and Base 82 were taken over by Regional Forces and Rangers. III Corps Headquarters worked on plans to resume the attack to retake Rach Bap, the last outpost still remaining in PAVN hands. General Thuần also recognized the need to clean the PAVN out of the southern part of the Iron Triangle around Phu Thu, and a plan encompassing Rach Bap, Phu Thu and the Phú Hòa area west of the Iron Triangle began to take shape. But on 30 October, before the execution of the plan, President Thieu relieved General Thuan of command of III Corps and replaced him with Lt. Gen. Dư Quốc Đống. General Đống immediately surveyed the situation in the Iron Triangle and reviewed the plan of his predecessor, which as modified became Operation Quyet Thang 18/24 (Will to Victory). Battalions from all three divisions of the Corps were committed; D-Day was 14 November. The 9th Infantry, 5th Division started from An Dien and marched west, along Route 7, past Base 82 toward Rach Bap. The 48th and 52nd Regiments, 18th Division crossed the Thi Thinh River south of Ben Cat and entered the Iron Triangle and attacked west toward the Saigon River. Elements of the 50th Infantry, 25th Division, were already in this area. Meanwhile, the 46th Infantry and one battalion of the 50th moved into the plantations north of Phú Hòa District Town to prevent PAVN infiltration across the Saigon River. Along Route 7, the 9th Infantry advanced without incident until 19 November when sharp fighting west of Base 82 resulted in over 40 ARVN soldiers wounded. The PAVN withdrew leaving 14 dead and many weapons and radios behind. The next morning, Reconnaissance Company, 9th Infantry, entered Rach Bap unopposed. The Iron Triangle campaign was virtually over, although mopping-up operations continued in the south along Route 14 until 24 November. Measured against the costs and violence of the earlier phases of the campaign, this final chapter was anticlimactic. Casualties on both sides were light, and contacts were few and of short duration. The PAVN had given up its last foothold in the Iron Triangle with only token resistance in order to replace losses, reorganize, re-equip and retrain the main forces of the new 301st Corps for the decisive battles to come. Aftermath The drawn out fighting over the small battlefield of the Iron Triangle while ending in South Vietnamese victory showed that the North Vietnamese had achieved combat parity and were pushing against the ARVN's outer line of defense around Saigon. References Iron Triangle the Iron Triangle Category:1974 in Vietnam Iron Triangle the Iron Triangle
{ "pile_set_name": "Wikipedia (en)" }
Q: How and when is the memory of a global or static array allocated? When defining a global or static array in c++ its memory is not immediately reserved at the start of the programme but only once we write to the array. What I found surprising is, if we only write to a small part of the array it still does not reserve the entire memory. Consider the following small example which writes sparsely to the global array: #include <cstdio> #include <cstdlib> #define MAX_SIZE 250000000 double global[MAX_SIZE]; int main(int argc, char** argv) { if(argc<2) { printf("usage: %s <step size>\n", argv[0]); exit(EXIT_FAILURE); } size_t step_size=atoi(argv[1]); for(size_t i=0; i<MAX_SIZE; i+=step_size) { global[i]=(double) i; } printf("finished\n"); getchar(); return EXIT_SUCCESS; } Now executing this for different step sizes and looking at the output of top we get for example: ./a.out 1000000 ./a.out 100000 ./a.out 10000 ./a.out 1000 ./a.out 100 PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 15718 user 20 0 1918m 1868 728 S 0 0.0 0:00.00 a.out 15748 user 20 0 1918m 10m 728 S 0 0.1 0:00.00 a.out 15749 user 20 0 1918m 98m 728 S 1 0.8 0:00.04 a.out 15750 user 20 0 1918m 977m 728 S 0 8.1 0:00.39 a.out 15751 user 20 0 1918m 1.9g 728 S 23 15.9 0:00.80 a.out The RES column indicates memory is only reserved in small blocks, which also means the array is unlikely to be contiguous in physical memory. Anyone got more insight on the lower level of things? This also has the negative side effect that I can easily run many programmes where the sum of all VIRT exceeds the physical memory as long the sum of RES is below. However, as soon as they all write to the global arrays the system runs out of physical memory and programmes get sent sigkill or something. Ideally I'd like to tell the compiler to reserve the memory of global and static variables at the start. Possible? Edit @Magnus: The lines are actually in the right order. :) Take the first line for example ./a.out 1000000 means I'm writing every 1 millionth entry in the array and so only 250 in total. This corresponds to a RES of only 1868k. In the last example ./a.out 100 every one hundreds entry is written and then the total memory is also physically allocated RES=VIRT=1.9g. From the numbers it appears that whenever an entry is written to the array something like a full 4k block is reserved on the physical memory. @Nawaz: The array is contiguous in virtual address space but as I understand the OS might be lazy and only reserve physical memory when it's actually needed. Since this is done in little blocks and not the whole array at once how can it be guaranteed to be contiguous in physical memory? @Nemo: Thanks for that, indeed when calling multiple instances of a.out which pause at the beginning and then write to the array I got oom-killer messages in /var/log/messages, and indeed your sysctrl command prevents me from starting too many a.out instances in the first place. Thanks! Jun 1 17:49:16 localhost kernel: [32590.293421] a.out invoked oom-killer: gfp_mask=0x280da, order=0, oomkilladj=0 Jun 1 17:49:18 localhost kernel: [32592.110033] kded4 invoked oom-killer: gfp_mask=0x201da, order=0, oomkilladj=0 Jun 1 17:49:20 localhost kernel: [32594.718757] firefox invoked oom-killer: gfp_mask=0x201da, order=0, oomkilladj=0 The last two lines slightly worrying. :) @doron: Thanks, great explanation, sorry can't upvote/select. A: You are looking at virtual memory pages being committed. The OS will typically only commit pages when they are expressly written or read by your code. This has nothing to do with C++, which guarantees that arrays are contiguous. If you are asking how to get your OS to commit all your process's pages at start up, you need to use OS specific stuff (if such exists). A: There are two things in play here viz. virtual memory and physical memory. The virtual memory for for the static data, just like the instructions for your program are assigned before your program begins execution. By this I mean that the address, for your program is always defined. The operating system might be lazy, however when it comes to loading both static data and program instructions into physical memory RAM. The way that this works is like this: The process loader assigned process virtual memory for the static data but does not load the data into RAM. When one tries to access these addresses, a processor exception is triggered and we then enter kernel mode. The kernel now loads the data into RAM and links the RAM into the processes virtual address space. The kernel switches back into user mode to the exact point where the processor exception happenned. Since the RAM is now linked into the processes virtual address space, the program will now continue executing as if nothing had ever happenned. This is a total slight of hand which the operating system is allowed to do simply because it is totally undetectable to the running process. Unless of course we are short of memory.
{ "pile_set_name": "StackExchange" }
Parkings lots close due to construction As Liberty University continues to be blanketed with new and continuing construction projects, the administration will be making a slew of parking changes, primarily around the Reber-Thomas Dining Hall and Bailey Lot, which is between the baseball and football stadiums. The Bailey Lot has 170 parking spaces blocked off because of construction. The Bailey area is a primary spot for change because of the new vehicular tunnel that is being constructed under the train tracks nearby, according to Vice President of Research and Analysis Richard Martin. One of the biggest construction projects, which will help address the campus’s parking issues, is a new 1,400-car parking garage going up next to the Reber-Thomas Dining Hall, Martin said. According to Martin, to make travel to and from Reber-Thomas and the parking garage, Reber-Thomas Drive will be converted into a two-lane road. The parking spaces for cars and motorcycles along Reber-Thomas Drive will be relocated to the first row of Speakman near the bookstore, while the Zip Car spots will be moved to the Green Hall Transfer Center. Martin said more changes are coming to the Reber-Thomas parking lot, as 200 parking spaces will be closed off, and the walkway between Reber-Thomas and the Bailey Lot will be shut down. Zone 1 parking pass holders should not be greatly affected, according to Martin, even with a reduced number of parking spots. “I expect to have enough zone 1 parking available for existing zone 1 permit holders on normal class days,” Martin said. “But things will be really tight after 10 a.m. Mondays-Thursdays.” Martin said when there are a lot of guests, zone 1 parking may become unavailable during the afternoon, and permit holders may need to park elsewhere. “During heavy visitor days, some zone 1 permit holders may find it necessary to park in Bailey or Doc’s Diner,” Martin said. “I would strongly recommend that Doc’s Diner or Liberty Mountain Drive parking area be used since the access into and out of Bailey will be limited by the vehicular tunnel project.” According to Martin, the walking times should be relatively similar no matter which parking area mentioned above is chosen. New parking permit assignments for zones one through four have been suspended until after College For a Weekend in November, according to Martin. He said the administration wants to make sure their response to construction and parking changes has been adequate before assigning new passes. The hiatus on issuing of new parking passes has proven difficult for some. Liberty junior Mandy Wine expressed frustration that the only parking permit she is allowed to purchase is for the Residential Annex Park & Ride. Wine said she shares a carpool permit with her roommate but has wanted to get her own pass so she can drive to school with ease. Martin said improvements are also planned for making the zone 4 parking lot on East Campus bigger and bringing more transit coverage to the area. According to Martin, the new residence hall tower being built on Champion’s Circle should not account for a large increase in parking needs, as it is only replacing existing dorm rooms. Even so, Martin said, the new residence hall is next to the East Campus pedestrian tunnel, so students could park with ease in zone 4 if needed. Christmas musical events include concerts, an opera and a showcase of the diversity of the four nights of performance. This is the first year that Christmas on the Boulevard spans four nights, but the School of Music hopes to make it an annual tradition. The seventh annual Christmas on the Boulevard...
{ "pile_set_name": "Pile-CC" }
Keo.co.za brings you the latest from New Zealand’s Super 14 franchises. Blues wary of bottom-feeders Shane Howarth believes the fact that the Cheetahs have nothing to lose makes them a dangerous outfit. The Blues assistant coach said the Cheetahs have the ability to hurt the hosts in Albany, even though the Blues only lost narrowly to the tournament-favourite Sharks last week. “It’s a dangerous game,” he told rugbyheaven.co.nz. “Everyone is writing the Cheetahs off. But we have had a good look at them and they are one of the African sides that like having a go. “They are in that area where it doesn’t really bother them what they do. They can really have a crack now and that’s a dangerous, dangerous side to play.” The Blues can climb the Super 14 ladder to finish the round in the top four if they secure a bonus-point victory, but as Howarth suggests, taking the Cheetahs lightly could prove costly. “It’s not a coach’s cliché that if you are off by 10 percent in this competition you can get hurt by anyone,” he said. “Certainly that’s the attitude we are taking going into this match. We need to be right on top of our game to get over them. They had their moments against the Hurricanes last week.” Rene Ranger returns to partner Joe Rokocoko on the wing while Anthony Tuitavake is back into the centres alongside Michael Hobbs. Injured Crusaders skipper Richie McCaw hopes to be fit for next month’s match against the Sharks. McCaw hurt his knee in Saturday’s loss to the Highlanders and will be out of action for six weeks. The Crusaders are also without Jared Payne, Leon MacDonald, Kade Poki, Casey Laulala and Sean Maitland for various periods while Corey Flynn is out for the season with a broken arm. “It has been a bit of a struggle, I’ve never seen an injury list like this,” Blackadder said, “and it does compound the issues after losing those senior players from last year. “But the positives are that these other guys get to have a go, it is a great chance for them to show what they can do. “Nothing has rocked our self-belief or confidence.” George Whitelock will replace McCaw at openside flank. Mils set to front Highlanders All Blacks fullback Mils Muliaina is likely to face the Highlanders this Saturday. The Chiefs stalwart has missed the last three matches because of a back injury but took part in Tuesday’s training session. He said he’s confident of passing a late fitness test to join a Chiefs side that has been unlucky thus far. “We’re making little wee inroads into the mistakes we are making and it is those crucial little things we have to get right,” Muliaina said. “We’re playing a lot more rugby, but it would be nice to see those passes stick and the mistakes not come in the opposition 22 when we are right on attack.” No 8 Sione Lauaki should also be back but the Chiefs may travel to Invercargill without Sitiveni Sivivatu who is battling a shoulder injury. Sosene Anesi has already been ruled out for the next six weeks also due to a shoulder ailment. Coles handed temporary reprieve Bad boy Dane Coles will see out the Super 14 but may be sentenced if he steps out of line again. The Hurricanes hooker has admitted to abusing and manhandling police officers on 21 February. His attorney argued that the drunken incident was not worth a conviction, but the judge ruled Coles’s previous offences meant Coles wouldn’t be let off the hook completely. He has been handed a reprieve but Judge Jan Kelly said he will have to return to court for sentencing if called upon in the next six months.
{ "pile_set_name": "Pile-CC" }
Q: django-pipeline DEBUG=True, compressed file not found OK. I going mad using django-pipeline and I am one step away from not using it at all. I am not in production yet. All of the below is happening in development (DEBUG=True) mode. My css static files live in a dir called 'project/static/css' and I collect them in a dir called 'project/static_remote/css' (inside my own development server). I have set the following: import os from os.path import abspath, dirname, join # PATH CONFIGURATION here = lambda *x: join(abspath(dirname(__file__)), *x) PROJECT_ROOT = here("..", "..") root = lambda *x: join(abspath(PROJECT_ROOT), *x) # STATIC FILES CONFIGURATION STATIC_ROOT = root('static_remote') STATIC_URL = '/static/' STATICFILES_DIRS = (root('static'), ) STATICFILES_FINDERS = ( 'django.contrib.staticfiles.finders.FileSystemFinder', 'django.contrib.staticfiles.finders.AppDirectoriesFinder', 'pipeline.finders.PipelineFinder', ) STATICFILES_STORAGE = 'pipeline.storage.PipelineStorage' # PIPELINE CONFIGURATION PIPELINE_ENABLED = True PIPELINE_CSS = { 'master': { 'source_filenames': ( 'css/fonts.css', 'css/animate.css', 'css/style.css', 'css/responsive.css', ), 'output_filename': 'css/master.css', }, } When I run collectstatic everything goes well and all the files in the master branch (plus the compressed one, master.css) are copied successfully into the 'project/static_remote/css'. Until here hoorey! BUT, when i runserver then my compressed file is not found by the {% static 'master' %}(href='/static/css/master.css') inside my template (obviously i have {% load pipeline %}). Same thing applies if i run findstatic 'css/master.css'. Why is this happening? All the other files (fonts.css animate.css etc) are found by findstatic. I suspect this is because there is no copy of master.css inside 'project/static/css'. Or is this happening because I have DEBUG = True? If I manually copy 'master.css' from 'project/static_remote/css' to 'project/static/css' then everything works fine, but I do not want that. Any suggestions please? A: When DEBUG = True PIPELINE_ENABLED = False
{ "pile_set_name": "StackExchange" }
Directions 2. In a small bowl, crush rosemary and salt together between your fingers so that rosemary needles are broken up and dispersed into salt, or use a mortar and pestle. Put chickpeas in a medium bowl. Add olive oil and salt/rosemary mixture and toss by hand until chickpeas are well coated. 3. Put chickpeas in a single layer on baking sheet. Bake for 25 minutes, occasionally shaking pan to make sure chickpeas roast evenly. They should be golden brown and fragrant when done. They will be crunchy. 4. Remove from oven and let cool before handling, approximately 10 minutes. Serve warm or at room temperature; these are best the day they're made. Store in a covered container at room temperature for up to three days. Source: Hannaford fresh Magazine, July - August 2007 Nutritional Information * Percent Daily Values are based on 2,000 calorie diet. Your daily values may be higher or lower depending on your calorie needs:
{ "pile_set_name": "Pile-CC" }
Pour in Mount Kisco (and the Value of Being a Pest) Here’s how Anthony Colasacco assembled Westchester’s largest cohort of rare American whiskeys, which you’ll find stationed behind his candlelit wine bar, Pour: “Oh, I just bitch and moan” to the distributors, says Colasacco. “They hate me. I never leave them alone.“ He’s a scourge, and his reach knows no bounds. As I write, Colasacco is haunting Julian Van Winkle, III, the scion of the hallowed Pappy Van Winkle dynasty, pestering him for just one more scarce bottle of Pappy. Pour’s list contains the fabled 16-year-old A.H. Hirsh pot-distilled sour-mash bourbon, which Colasacco offers at $70 per glass, though he’s seen the same whiskey offered at TriBeCa’s Brandy Library for $100. He’s got 34 other American whiskeys—and that’s not counting his Scottish and Irish list—including both Hirsch’s 25-year-old ($35-per-glass) and 28-year-old ($65-per-glass) bourbons. Plus, at Pour, you’ll see Black Maple Hill’s 95-proof small-batch bourbon (for $15 per glass), plus the same distillery’s 16-year bourbon at $35 per glass. And then there is Colasacco’s All-Star team of Pappies. Among chefs and bourbon hounds, no name inspires awe like Pappy Van Winkle. The boutique Kentucky distillery competes with larger companies like Maker’s Mark by deliberately limiting its releases. Effectively, these cultish whiskeys are simply unavailable to the average buyer. Sure, you mind find a Pappy bottle on eBay at a stunning price, but on average, it is unlikely that you’ll find Pappy Van Winkle sitting on a store shelf. And yet, via a heartless campaign of making himself deeply annoying, Anthony Colasacco has assembled a trio of stunning Pappies: the 15-year “Family Reserve” Bourbon (107 proof at $22 per glass), the 20-year “Family Reserve” (90 proof at $32), and the 23-year “Family Reserve” (96 proof at $60 per glass). To sample, visit cozy Pour (241 E Main St, Mount Kisco 914-864-0606; pourmtkisco.com) or wait for upcoming bourbon tastings that offer most of these delicate spirits liquids in small, very precious tastes.
{ "pile_set_name": "Pile-CC" }
The present disclosure relates to modeling the flow of fracturing fluid in a subterranean formation. Fracturing fluid is often injected into subterranean reservoirs, for example, to fracture the reservoir rock. In some instances, a portion of the fracturing fluid may leak off from the fractures into the porous media of the reservoir. In some contexts, computers have been used to model the flow of fluids in subterranean reservoirs.
{ "pile_set_name": "USPTO Backgrounds" }
/* Operating system related utilities. */ #ifndef UV_OS_H_ #define UV_OS_H_ #include <fcntl.h> #include <linux/aio_abi.h> #include <sys/stat.h> #include <sys/types.h> #include <uv.h> /* For backward compat with older libuv */ #if !defined(UV_FS_O_RDONLY) #define UV_FS_O_RDONLY O_RDONLY #endif #if !defined(UV_FS_O_DIRECTORY) #define UV_FS_O_DIRECTORY O_DIRECTORY #endif #if !defined(UV_FS_O_WRONLY) #define UV_FS_O_WRONLY O_WRONLY #endif #if !defined(UV_FS_O_RDWR) #define UV_FS_O_RDWR O_RDWR #endif #if !defined(UV_FS_O_CREAT) #define UV_FS_O_CREAT O_CREAT #endif #if !defined(UV_FS_O_TRUNC) #define UV_FS_O_TRUNC O_TRUNC #endif #if !defined(UV_FS_O_EXCL) #define UV_FS_O_EXCL O_EXCL #endif #if !defined(UV_FS_O_DIRECT) #define UV_FS_O_DIRECT O_DIRECT #endif #if !defined(UV_FS_O_NONBLOCK) #define UV_FS_O_NONBLOCK O_NONBLOCK #endif /* Maximum size of a full file system path string. */ #define UV__PATH_SZ 1024 /* Maximum length of a filename string. */ #define UV__FILENAME_LEN 128 /* Length of path separator. */ #define UV__SEP_LEN 1 /* strlen("/") */ /* True if STR's length is at most LEN. */ #define LEN_AT_MOST_(STR, LEN) (strnlen(STR, LEN + 1) <= LEN) /* Maximum length of a directory path string. */ #define UV__DIR_LEN (UV__PATH_SZ - UV__SEP_LEN - UV__FILENAME_LEN - 1) /* True if the given DIR string has at most UV__DIR_LEN chars. */ #define UV__DIR_HAS_VALID_LEN(DIR) LEN_AT_MOST_(DIR, UV__DIR_LEN) /* True if the given FILENAME string has at most UV__FILENAME_LEN chars. */ #define UV__FILENAME_HAS_VALID_LEN(FILENAME) \ LEN_AT_MOST_(FILENAME, UV__FILENAME_LEN) /* Portable open() */ int UvOsOpen(const char *path, int flags, int mode, uv_file *fd); /* Portable close() */ int UvOsClose(uv_file fd); /* TODO: figure a portable abstraction. */ int UvOsFallocate(uv_file fd, off_t offset, off_t len); /* Portable truncate() */ int UvOsTruncate(uv_file fd, off_t offset); /* Portable fsync() */ int UvOsFsync(uv_file fd); /* Portable fdatasync() */ int UvOsFdatasync(uv_file fd); /* Portable stat() */ int UvOsStat(const char *path, uv_stat_t *sb); /* Portable write() */ int UvOsWrite(uv_file fd, const uv_buf_t bufs[], unsigned int nbufs, int64_t offset); /* Portable unlink() */ int UvOsUnlink(const char *path); /* Portable rename() */ int UvOsRename(const char *path1, const char *path2); /* Join dir and filename into a full OS path. */ void UvOsJoin(const char *dir, const char *filename, char *path); /* TODO: figure a portable abstraction. */ int UvOsIoSetup(unsigned nr, aio_context_t *ctxp); int UvOsIoDestroy(aio_context_t ctx); int UvOsIoSubmit(aio_context_t ctx, long nr, struct iocb **iocbpp); int UvOsIoGetevents(aio_context_t ctx, long min_nr, long max_nr, struct io_event *events, struct timespec *timeout); int UvOsEventfd(unsigned int initval, int flags); int UvOsSetDirectIo(uv_file fd); /* Format an error message caused by a failed system call or stdlib function. */ #define UvOsErrMsg(ERRMSG, SYSCALL, ERRNUM) \ { \ ErrMsgPrintf(ERRMSG, "%s", uv_strerror(ERRNUM)); \ ErrMsgWrapf(ERRMSG, SYSCALL); \ } #endif /* UV_OS_H_ */
{ "pile_set_name": "Github" }
40*s**2 - 20*s Let s(h) = 5*h + h + 7 - 4. Let o(l) = -11*l - 5. Let y = -10 + 15. Let x(g) = y*s(g) + 3*o(g). Let t(c) = -c. What is t(x(z))? 3*z Let o(k) = -2*k**2. Let v(x) = -73*x. Give o(v(z)). -10658*z**2 Let t(d) = -12*d**2. Let s(l) = 21*l. Determine t(s(x)). -5292*x**2 Let k(z) = 5*z**2 - 4*z - 6*z**2 + 4*z. Let g(j) = 12*j. What is g(k(a))? -12*a**2 Let p(j) = 2*j. Let u(b) = -12*b - 15*b**2 + 30*b - 18*b. What is p(u(z))? -30*z**2 Let c(z) = 16*z. Let d(o) = -28*o + 25*o - 14 + 14. What is c(d(p))? -48*p Let t(p) = -p**2. Let k(c) = -50*c - 4. Calculate k(t(s)). 50*s**2 - 4 Let j(q) = 4*q + 5. Let b(x) = -3*x - 4. Let o(n) = 5*b(n) + 4*j(n). Let i(r) = 3*r. Determine o(i(v)). 3*v Suppose -5*a + 5*l + 17 = 3*l, 3*a = -5*l + 4. Suppose 3*y = 3 + 3. Let c(z) = -z**y - 2 + 5 - a. Let s(v) = 3*v. Give s(c(k)). -3*k**2 Let p(c) = -c + 3. Let f(y) = -y + 2. Let v be f(2). Let i(d) = 2 - 6 - 10 + 4*d + v*d. Let u(n) = 6*i(n) + 28*p(n). Let r(s) = -2*s. Calculate r(u(w)). 8*w Let r(h) = -4*h**2. Let w(n) = n**2 + 3*n + 3. Let p(z) = 3*z**2 + 8*z + 8. Let f(a) = 3*p(a) - 8*w(a). Calculate f(r(k)). 16*k**4 Let y = 1 + 3. Let a(z) = y*z + 0*z - z. Let x(n) = -n. Determine a(x(q)). -3*q Let u(w) = -571*w**2. Let c(q) = q. What is c(u(k))? -571*k**2 Let t(g) = 2*g. Let m(n) = 28*n + 27*n - 12*n. Give m(t(u)). 86*u Let v be (55/3)/(14/(-42)). Let z(j) = j + 4. Let o(y) = 15*y + 55. Let p(m) = v*z(m) + 4*o(m). Let a(g) = -3*g. Determine a(p(f)). -15*f Let g(q) = 2*q**2 - 3*q. Suppose 0 = 4*x + 16, -5*j + 5 = -5*x - 0. Let k(l) = l**2 - l. Let w(c) = j*k(c) + g(c). Let n(b) = -5*b. Give n(w(h)). 5*h**2 Let c(i) = i**2. Let o(w) = 218*w. Determine o(c(g)). 218*g**2 Let r(b) = 7*b. Let u(w) be the first derivative of 6 + 0*w - 1/2*w**2. What is r(u(h))? -7*h Let y(x) = -2*x. Let j(h) = 6*h. Let p(m) = 6*m + 0*m - 2*m - 2*m. Let v(c) = -3*j(c) + 8*p(c). Determine v(y(f)). 4*f Let v(c) = -5*c**2. Let t(j) = -14*j - 8. Calculate t(v(d)). 70*d**2 - 8 Let n(q) = -7*q + 3. Let x(u) = 2*u - 6787 + 6787. Determine n(x(c)). -14*c + 3 Let t(i) = -3*i**2. Let z(b) = -5*b. Let s(u) = -66*u. Let p(d) = -4*s(d) + 54*z(d). What is t(p(q))? -108*q**2 Let t(f) = -2*f. Let w(a) be the first derivative of 3*a**2/2 - a + 4. Let p(b) = b - 1. Let r(c) = 3*p(c) - 3*w(c). Determine t(r(k)). 12*k Let a(h) be the second derivative of 13*h**3/6 + 3*h. Let n(i) = -6*i. Let j(y) = -2*a(y) - 5*n(y). Let p(b) = 3 + 2*b**2 - 3. Calculate j(p(o)). 8*o**2 Let o(m) = 6*m - 9 - 3 - 8*m. Let x be o(-9). Let c(t) = x - 3 - 3 - t. Let b(a) = 4*a. Calculate b(c(n)). -4*n Let v be (8/(-6))/((-2)/3). Suppose v = f - 0. Let k(b) = 2*b**2 + 2*b**2 - 6*b**f. Let q(z) = 2*z**2. Give k(q(s)). -8*s**4 Let t(n) = 2*n. Let i(j) = 4683*j. Determine i(t(x)). 9366*x Let w(q) be the second derivative of -2/3*q**3 + 0*q**2 - 2*q + 0. Let l(p) = 2*p. What is l(w(b))? -8*b Let n(w) = w**2. Let z(f) = -f - 1. Let u(d) = 10*d**2 + 40*d + 40. Let a(x) = -u(x) - 40*z(x). What is a(n(i))? -10*i**4 Suppose 0 = 2*g + 2*g + 8, 17 = -r - 5*g. Let w = r + 10. Let l(j) = 2*j - 3 + w. Let s(b) = -b. Give s(l(o)). -2*o Let s(q) = 23*q**2 + 1. Let y(g) = -g. Determine y(s(o)). -23*o**2 - 1 Let d(k) = 5*k**2. Let u(i) = -3*i. Give u(d(w)). -15*w**2 Let b(y) = 7*y**2 + 4*y + 4. Let k(t) = -8*t**2 - 3*t - 3. Let r(z) = -3*b(z) - 4*k(z). Let q(i) = -5*i**2. Calculate q(r(d)). -605*d**4 Let m(u) = -u. Let f(v) be the first derivative of 11*v**3/3 - 2*v + 3. Calculate m(f(k)). -11*k**2 + 2 Let d = 3 + -1. Let s(w) = 2 + d*w - 2. Let l(x) = 0 - 2 - 2*x + 2. Give l(s(u)). -4*u Let d(k) = -5320*k**2. Let x(y) = 2*y**2. Give x(d(w)). 56604800*w**4 Let k(l) = -8*l - 9*l**2 - l + 9*l. Let r(q) = 3*q. Determine r(k(b)). -27*b**2 Let h(g) = 50*g + 35. Let m(u) = 3*u + 2. Let x(o) = 2*h(o) - 35*m(o). Let d(l) = 3 - 3 - l. Determine x(d(p)). 5*p Let p be -3 + (-1 - (-9 - -1)). Let x(d) = -d**2 - d + 5*d - p*d. Let m(h) = -h. Calculate x(m(z)). -z**2 Let x(h) = 2*h + 2 - 2 - h. Let r(p) = -3*p. What is r(x(w))? -3*w Let h(s) = -4*s. Let b(i) = -i - 1. Let l(j) = 8*j + 10. Let o(v) = 10*b(v) + l(v). Determine h(o(q)). 8*q Suppose 6*x - 2*x = 48. Let r(b) = -2*b - 4 - 8 + x. Let a(u) = 3*u. Give r(a(g)). -6*g Let w(d) = 30*d. Let f(u) = 1283 + 2*u**2 - 1283. Calculate f(w(r)). 1800*r**2 Let r(c) = -6966*c. Let k(m) = m. Calculate r(k(s)). -6966*s Let z(x) = 4*x**2. Let p(w) be the second derivative of 4*w**3/3 - 24*w. What is z(p(h))? 256*h**2 Let z be (16 + (-6 - -3))*2. Let t(u) = 26 + 9*u**2 - z. Let f(p) = -2*p. Give f(t(r)). -18*r**2 Let u(q) = -q. Let s(a) = -10*a**2 - a. Give u(s(o)). 10*o**2 + o Let r(s) = -8*s**2. Let d(t) = 255*t - 2. Calculate d(r(x)). -2040*x**2 - 2 Let o(n) = n**2. Let a(r) be the third derivative of 0*r + 3*r**2 + 1/8*r**4 + 0 + 0*r**3. Determine o(a(z)). 9*z**2 Let v(i) = 2*i. Let m(b) = -2*b**2. Let k(x) = 3*x**2. Let j(a) = 3*k(a) + 5*m(a). Calculate v(j(s)). -2*s**2 Let j(w) be the first derivative of 2*w**3/3 + 1. Let c = -2 + 4. Let f(t) = -t**2 - 2*t**2 + t**c + 0*t**2. Give j(f(a)). 8*a**4 Let o(d) = -13*d**2 + 28*d**2 - 11*d**2. Let u(p) = -7*p - 5. Let j(r) = 3*r + 2. Let t(s) = 5*j(s) + 2*u(s). What is o(t(q))? 4*q**2 Let s(y) = 10*y**2. Let b(x) = 3*x**2 - 5*x**2 + 9*x - 9*x. Determine s(b(j)). 40*j**4 Let p(u) = -9*u**2 + 7*u - 7. Let b(d) = -5*d**2 + 4*d - 4. Let o(h) = 7*b(h) - 4*p(h). Let k(f) = 0*f**2 - 2*f**2 + 0*f**2. Calculate k(o(g)). -2*g**4 Let a(f) = -2*f**2. Suppose 6 = 4*u + 2. Suppose -m + 1 + u = 0. Let c(b) = 13*b + 3*b**m - 13*b. Calculate a(c(q)). -18*q**4 Let b(x) = -x**3 - x**2 + 2. Let q be b(0). Let f(j) = j**q + j - j. Let r(d) be the first derivative of d**2/2 + 5. Give f(r(h)). h**2 Let m(n) = 7*n. Let t(r) = 41*r**2. Calculate m(t(w)). 287*w**2 Let v(b) be the third derivative of -b**5/60 - 6*b**2. Let t(g) = -16*g. Give v(t(p)). -256*p**2 Let i(j) = -2238*j**2. Let z(c) = 3*c**2. Give i(z(q)). -20142*q**4 Let m = 7 + -5. Let g(l) = m*l - 1 + 2 - 1. Let o(y) = 5*y. Let c(u) = 10*u. Let k(f) = -3*c(f) + 7*o(f). What is g(k(s))? 10*s Let h(n) = -4*n**2 + 2. Let c(d) = 270*d**2. What is c(h(t))? 4320*t**4 - 4320*t**2 + 1080 Let q(g) = g. Let i(p) = -7*p**2 + 1. What is q(i(u))? -7*u**2 + 1 Let k(x) = x. Let y(j) be the first derivative of j**3/3 + 7. Calculate y(k(u)). u**2 Let y(a) = -2*a**2. Let k(g) = 24*g - 7. What is k(y(l))? -48*l**2 - 7 Let i(q) be the third derivative of -17*q**5/60 - 2*q**2. Let c(k) = -k. What is i(c(y))? -17*y**2 Let a(r) = -r. Let n(z) = -4947*z**2. Give a(n(o)). 4947*o**2 Let v(g) = g**2 + 2. Let q(b) = 4*b**2. Calculate v(q(u)). 16*u**4 + 2 Suppose -5*r - 3*m = -1, 0 = 4*r - m - 4 - 7. Let y(t) = -r*t + 0*t + t. Let q(x) = 7*x + 5. Let f(d) = -6*d - 4. Let g(o) = 5*f(o) + 4*q(o). What is g(y(n))? 2*n Let s(f) = 3*f - 2. Let z(d) = 7*d - 5. Let w(c) = 5*s(c) - 2*z(c). Let g(h) = -12 - 2 + 14 + h. Calculate w(g(r)). r Let j(z) = z. Let q(p) = -14*p**2 - 3*p + 3. Let t(y) = 168*y**2 + 35*y - 35. Let k(a) = -35*q(a) - 3*t(a). Determine k(j(d)). -14*d**2 Let d(v) = 120*v**2. Let g(b) = -4*b. Give g(d(l)). -480*l**2 Let j(h) = -2*h. Let s(b) = -b**3 - b**2 - 2*b + 7*b**2 - 2 - 2*b**2. Let q be s(2). Let l(k) = -k + 2*k**q + k. Determine l(j(w)). 8*w**2 Let k(y) = -29*y**2. Let m(u) = -5*u. Determine m(k(w)). 145*w**2 Let r(o) = -2*o. Let g(k) = 6*k. Let q(i) = -2*g(i) - 7*r(i). Let f(y) = 2 - 2*y - 2. Give q(f(t)). -4*t Let p(k) = 5*k. Let l(r) = -9*r + 13. Let d(g) = 8*g - 12. Let n(q) = -4*d(q) - 3*l(q). Let z(o) = -o + 2. Let b(j) = 2*n(j) - 9*z(j). What is b(p(x))? -5*x Let c(y) be the first derivative of 5*y**2/2 + 1. Let b(m) = 2*m**2. Calculate c(b(o)). 10*o**2 Let i(w) = 4*w + 0*w + 2*w - 4*w. Let s(q) = q + 1. Let g(x) = -7*x - 6. Let n(a) = g(a) + 6*s(a). Give n(i(u)). -2*u Let w(z) = 13*z - 7. Let r(o) = 7*o - 3. Let i(x) = -14*r(x) + 6*w(x). Let p(b) = 2*b. Calculate i(p(y)). -40*y Let a(m) = -179*m. Let r(h) = 9*h**2. Give a(r(f)). -1611*f**2 Let q(w) = -w + 9. Let x be q(7). Let v(f) = 7*f**2 + x*f**2 - 11*f**2. Let h(a) = 6*a**2. Determine v(h(o)). -72*o**4 Let a(w) = -269*w**2. Let r(m) = 3*m. Give r(a(g)). -807*g**2 Let w(j) = -j - 9. Let r(o) = -1. Suppose -16*v - 8 = -12*v. Let l(s) = v*w(s) + 18*r(s). Let z(a) = a**2. Give
{ "pile_set_name": "DM Mathematics" }
Q: Async finish first then mainActivity starts I got a problem I need to solve to be able to parse my menu items in my navigation drawer. Everything works fine: my asyncTask to get my xml feed of the internet and parse it into variables but, I want to use variable as menu items for my navigation drawer. My navigation drawer is called in my MainActivity its onCreate so that will be executed as first at the same time the asyncTask is running. My question to this is: is there a way to finish the asyncTask first and then execute my Mainactivity its lifecycle A: You can create some kind of SplashActivity during which you will download the list from the web and on its onPostExecute you can launch your main activity, passing the data you got with the Intent.
{ "pile_set_name": "StackExchange" }
It was a good day to short a waterfall yesterday so we decided to make a drive to Somersby Falls. Unfortunately there was not as much water is it was on my previous visit. http://www.alexnovy.com/2011/10/06/somersby-waterfall/ Still made a couple of shots.
{ "pile_set_name": "Pile-CC" }
Q: Как задать только для одного "UL LI A"? Как задать только для одного "UL LI A", а то когда задаю, распространяется и на другие подгруппы. Обновление Это не то. Мне только надо, чтобы не распространялась на подгруппы, типа чтобы только на дочернюю, например, <span> </span> типа того. Что прописать чтобы только на меню, а на подгруппы не подействовала. Я не могу изменить html, через css делаю, как это сделать чтобы только на первую ul li a действовала, на саму меню а не на подгруппу? Drupal 7 тема zen Вот css #superfish-1 { padding: 0; margin: 0; font-size: 100%; font-family: Georgia; transition: all 0.3s ease 0.01s; } #superfish-1 li { list-style: none; float: left; height: 55px; padding: 0; margin: 0; width: 150px; text-align: center; position: relative; padding-top: 12px; } #superfish-1 li ul { list-style: none; padding: 0; margin: 0; width: 150px; display: none; position: absolute; left: 0; top: 55px; } #superfish-1 li ul li { float: none; height:55px; margin: 0; width: 150px; text-align: center; background: #7F7F7F; } #superfish-1 li a { display: block; width: 110px; height: 13px; color: #fff; text-decoration: none; } #superfish-1 li:hover ul, #superfish-1 li.jshover ul { display: block; } #superfish-1 li:hover, #superfish-1 li.jshover { background: #424242; } #superfish-1 li a:hover{ transition: all 0.3s ease 0.01s; border-bottom: 7px solid #444; color: #fff; text-decoration: none; } A: <ul class="menu"> <li><a href="#"></a></li> <li><a href="#"></a></li> <li><a href="#"></a></li> </ul> файл style.css в нем .menu{ background:#cc0000; } либо <ul > <li><a href="#"></a></li> <li><a class="menu" href="#"></a></li> <li><a href="#"></a></li> </ul> файл style.css в нем .menu{ background:#cc0000; } может Вам это поможет
{ "pile_set_name": "StackExchange" }
Manga is all the rage in Hollywood at the moment. While "Akira" is on hold for the moment, fans were concerned when Warner Bros.announced that they were bringing "Bleach" to the big screen. And opinions are still split on Spike Lee's redo of "Oldboy," which is now aiming to shoot this fall. Well, we're sure this next project won't be scrutinized any less. While Darren Aronofsky was loosely attached years ago and was eager to make it happen, Deadline reports that "Fast Five" director Justin Lin will take the helm of a Hollywood adaptation of Kazuo Koike's 1970s Japanese manga "Lone Wolf And Cub." The beloved and popular series tells the story of Ogami Itto, an elite Shogun’s executioner, who is falsely accused of a crime by a rival gang who murders his wife. With his three-year-old son in tow, he is forced to wander as an assassin for hire, while seeking revenge. And though fans might be worried, take heart, as the screenwriting talent is top shelf. David Peoples ("Blade Runner," "Unforgiven") is teaming with his wife Janet (they co-wrote "Twelve Monkeys") to pen the script, and they know their way or two around dark or difficult material. That said, Lin directs with all the subtlety of an LMFAO song so it'll be interesting to see how this shakes out. And it should be noted, this has already been adapted several times over. In the '70s there were six films based on the material with Tomisaburo Wakayama in the lead role, with the films often slavishly recreating panels from the manga (in 1980 they were condensed into a single American version called "Shogun Assassin"). Several TV movies and pilots followed, and in 1992 a new movie was made titled "Lone Wolf and Cub: Final Conflict." But what will they do this time around? Change the setting to Manhattan? Maybe instead of a shogun, the lead can be a bitter ex-cop? Franchise? We'll see, but so far…we can't say the choices here are terrible. The screenwriters are strong and Lin is likely looking to prove himself as more than just the director of beefy car movies. So, we'll be cautious in our optimism for now. Comments Even with the Peoples involved, I hope it doesn't get made. The only way to get it done right is with a Japanese cast and crew and filming in Japan. Relocating it to the US would mean that some vital elements from the manga would inevitably get lost in the translation. It was my understanding that the rights situation was quite complicated (didn't Paramount and Darren Arofnosky try to buy a few years back and failed?), so I'm surprised this has been resolved. All things considered, if there ever was a film I hope gets stuck and remains in development hell, it's this one. Just curious, Kevin – did you ever see Better Luck Tomorrow? Because the promise Lin showed in that film is what has made most of his career since then so disappointing – to me, at least. I think he made "Fast Five" as good as the material would let him (which is still to say, not especially good) so I think he's got chops, but to this point he seems to have been stuck with lackluster projects. Joe Carnahan is similar in that way.
{ "pile_set_name": "Pile-CC" }
491 F.3d 1292 Anne S. BECKER, individually and as Trustee of Anne S. Becker Charitable Remainder Unitrust, Defendant-Appellee,v.John A. DAVIS, a.k.a. Jeff Davis, Falcon Financial Management, Inc., Falcon Financial Planning, Inc., Multi-Financial Securities Corporation, successor by merger to IFG Network Securities Inc., Plaintiffs-Appellants,William D. King, et al., Defendants. No. 06-12654. United States Court of Appeals, Eleventh Circuit. July 11, 2007. Burton W. Wiand, Elaine M. Rice, Hala A. Sandridge, Fowler, White, Boggs & Banker, P.A., Tampa, FL, for Plaintiffs-Appellants. David L. Birch, Douglas A. Gross, Hofheimer, Gartlir & Gross, LLP, New York City, for Becker. Appeal from the United States District Court for the Northern District of Florida. Before CARNES, WILSON and HILL, Circuit Judges. WILSON, Circuit Judge: 1 This appeal concerns a motion to compel a plaintiff, Anne S. Becker ("Becker"), to submit the claims in her complaint to arbitration pursuant to the Federal Arbitration Act, 9 U.S.C. §§ 1-16. Becker, on her own behalf and as trustee on behalf of her charitable remainder trust, filed a complaint against various financial advisors alleging that they provided her and the trust with unsound financial advice. We conclude that some of Becker's individual claims are subject to arbitration and others are not. We further conclude that the financial advisors who did not contract with Becker to submit their disputes to arbitration can compel arbitration only to the extent that they allegedly collaborated with those who did so contract. 2 Becker, individually and as the trustee for the Anne S. Becker Charitable Remainder Unitrust ("the Trust") (collectively "the plaintiffs"), filed suit in the United States District Court for the Northern District of Florida against John A. Davis, Jr.; William D. King; Falcon Financial Management, Inc.; Falcon Financial Planning, Inc.; Multi-Financial Securities Corporation, successor by merger to IFG Network Securities, Inc.; IFG Advisory Services Inc., f/k/a Associated Financial Planners, Inc.; Michael T. Hartley; Dale K. Ehrhart; Michael G. Tillman; Michael Tillman, P.A.; and Tillman Hartley LLC. Essentially, the complaint alleges that these defendants provided Becker and the Trust with unsound financial advice that lined the pockets of the the defendants at the expense of plaintiffs. 3 The defendants John A. Davis ("Davis"), Falcon Financial Management, Inc., ("Falcon FM"), Falcon Financial Planning, Inc. ("Falcon FP"), Multi-Financial Securities Corporation, successor to IFG Network Securities, Inc. ("IFG-SEC") and IFG Advisory Services, Inc. ("IFG-AS") (collectively "the defendants") filed a motion to compel arbitration based on three contractual agreements that the Trust entered into with Davis and IFG-SEC. Each of the three agreements contain an arbitration clause. The district court granted the defendants' motion in part and denied the motion in part. The court granted the motion as it related to the claims brought by Becker as trustee on behalf of the Trust. The court denied the motion as it related to the claims brought by Becker in her individual capacity, because she was not a signatory to the agreements. The district court also denied the motion as to Falcon FM and Falcon FP, because they, too, were not signatories to the agreements. The defendants appeal the district court's order. We affirm in part, reverse in part, and remand for the reasons set forth in this opinion. I. BACKGROUND 4 In 1994 Becker inherited approximately $9 million and moved to Florida a year later. Shortly after her arrival in Florida, Becker met Defendant William D. King ("King"), who introduced her to Davis and defendant Michael G. Tillman ("Tillman").1 During all relevant times, Davis was president and principal owner of Falcon FM and Falcon FP. Davis was also a registered representative and registered principal of IFG-SEC and a registered investment advisor of IFG-AS. In late 1996, on the advice of Davis, Becker created the Trust and named herself and Davis as trustees.2 Becker claims that she ultimately placed approximately $3 million, one third of her assets, in the Trust. A. The Complaint 5 On July 15, 2005, Becker and the Trust filed suit against the defendants. The complaint alleges a wide variety of allegations. In general, the complaint alleges that all the defendants were working together to induce Becker and the Trust to adopt a financial strategy that was unsuitable for her personal investment objectives. The complaint also generally alleges that the "Conspiring Defendants"3 failed to disclose that they were engaged in a scheme to defraud Becker and the Trust: 6 (a) by wrongfully creating an inappropriate investment environment and structure to control the use and investment of Plaintiff's assets for an inordinately long period of time; (b) by wrongfully creating an investment vehicle or structure for Plaintiff that would make it very difficult, if not impossible, for her to extricate herself or her assets from the Conspiring Defendants' control; (c) by wrongfully charging Plaintiff and sharing among themselves excessive, illegal, and undisclosed fees and commissions; (d) by wrongfully creating for themselves opportunities to provide and charge Plaintiff for extensive, unnecessary, and improper fee generating "professional" services; and (e) by preparing or causing to be prepared complex documents lacking provisions customarily found in, or containing provisions not usually found in, similar types of documents properly prepared by others, and by inducing Plaintiff to execute them in order to extend improperly their own control over Plaintiff's assets, and to facilitate their continuing Scheme to Defraud; all without regard for Plaintiff's interests, and for the fundamental purpose of maximizing their own profits and wealth at the expense of their client. 7 The complaint more specifically alleges actions by the defendants as to Becker and actions by the defendants as to the Trust. As to Becker as an individual, the complaint alleges, among other things, that Davis, Tillman, and King gave her improper financial advice concerning a real estate transaction where Becker had purchased, along with a partner, Susan Berger, approximately 175 acres of land in Micanopy, Florida to start a business to train and board horses. Becker also alleges that Davis opened a money market account without her consent in the name of "ANNE S. BECKER & JOHN A. DAVIS JR JTWROS (joint tenants with right of survivorship)." Further, based on Davis's advice, Becker also created the Anne S. Becker Irrevocable Trusts. These two trusts were created to provide life insurance benefits to certain beneficiaries. Becker alleges that Davis received, without her knowledge, an insurance agent commission in connection with the insurance policy issued to her and that the trusts themselves were unsuitable for Becker's needs. 8 The complaint alleges, among other things, that pursuant to the advice of Davis and King, the Trust invested in the CNL Income Fund XVIII, Ltd. ("CNL") and the investment in this security was unsuitable for the Trust. Also pursuant to Davis and King's advice, the Trust opened investment accounts with DKE and SEI Investments. The complaint alleges that Davis and his companies received improper fees based on these investments. 9 Based on these and other factual allegations, Becker and the Trust filed a twenty-count complaint. Becker, in her individual capacity, brought fifteen counts. The Trust brought four counts, and Becker and the Trust collectively brought one count.4 B. The Arbitration Agreements 10 During the course of Becker and the Trust's relationship with the defendants, the Trust executed three agreements with IFG-SEC. On November 11, 1996, the Trust executed the Goals Direct Client Services Agreement ("agreement one"). Agreement one, which was signed by Becker, as trustee, and lists Davis as the registered representative of IFG-SEC, opened an investment account with IFG-SEC, which would provide the Trust with broker and portfolio advisor services for the purchase and sale of securities. Agreement one contains an arbitration clause, which states that "[a]ny controversy between us arising out of our business or this agreement shall be submitted to arbitration conducted before the National Association of Securities Dealers Inc., in accordance with their rules." 11 On December 7, 1996, the Trust executed a document that opened another account with IFG-SEC ("agreement two"). Agreement two also contains an arbitration clause, which provides that "[i]t is agreed that any controversy between myself and IFGNS5 arising out of the business of IFGNS or this Agreement . . . shall be submitted to arbitration conducted under the Code of Arbitration Procedure, then applying, of the National Association of Securities Dealers, Inc." The record copy of agreement two is practically illegible, and the line containing the parties signatures is cut off. However, it is clear that the account was opened on behalf of the Trust. 12 On October 18, 1998, the Trust executed a document opening another account with IFG-SEC ("agreement three"). Agreement three is the same document as agreement two and contains the same arbitration clause. Agreement three was signed by Becker as trustee and Davis as a representative of IFG-SEC. However, agreement three contains an additional page that limits the type of services provided by IFG-SEC to the Trust.6 Paragraph twelve on the second page of agreement three states that the representative, "might offer non-securities products and services. I also understand all non-securities products and services are outside Representative's relationship with IFGNS and as such I shall hold IFGNS harmless for any loss I may incur associated with non-securities products and services." Agreement three describes such non-securities products and services as insurance, real estate, accounting, tax preparation, and financial planning, among other things. 13 Relying on these three agreements, the defendants filed a motion to compel arbitration of all the counts against them in the complaint, both the counts brought on behalf of the Trust, as well as the counts brought on behalf of Becker. In its order granting in part and denying in part the defendants' motion, the district court made three separate rulings, each of which is before us on appeal. First, the district court denied the defendants' motion as it related to Becker's individual claims, because Becker, in her individual capacity, was not a signatory to the agreements. Second, the district court found that only the defendants Davis, IFG-SEC, and IFG-AS7 could compel the Trust to arbitrate, for the other defendants, Falcon FM and Falcon FP, were not signatories to the agreements. Third, the district court held that Becker and the Trust's claim for an accounting of the Trust's assets did not arise from the "business" as referred to in the three agreements, and therefore, this claim was not subject to arbitration. 14 To decide this appeal, we review the scope of the three arbitration agreements between the Trust and the defendants, and engage in a painstakingly thorough review of a twenty-count, 110 page complaint. II. STANDARD OF REVIEW 15 "We review de novo a district court's denial of a motion to compel arbitration." Jenkins v. First Am. Cash Advance of Ga., LLC, 400 F.3d 868, 873 (11th Cir.2005). We also review de novo a district court's decision to deny a motion to compel arbitration on the ground that the moving party was not a signatory. MS Dealer Serv. Corp. v. Franklin, 177 F.3d 942, 946 (11th Cir.1999). III. DISCUSSION A. Scope of the Arbitration Agreements 16 The first step in determining the propriety of a motion to compel arbitration pursuant to Section 4 of the Federal Arbitration Act ("FAA") is "to determine whether the parties agreed to arbitrate the dispute." Klay v. All Defendants, 389 F.3d 1191, 1200 (11th Cir.2004) (citing Mitsubishi Motors Corp. v. Soler Chrysler-Plymouth Inc., 473 U.S. 614, 626, 105 S.Ct. 3346, 3353, 87 L.Ed.2d 444 (1985)).8 While there is a liberal federal policy favoring arbitration agreements, "the FAA's strong proarbitration policy only applies to disputes that the parties have agreed to arbitrate." Id. A party cannot be forced to arbitrate any dispute that the party has not agreed to submit to arbitration. See Volt Info. Scis., Inc. v. Bd. of Trs. of the Leland Stanford Junior Univ., 489 U.S. 468, 479, 109 S.Ct. 1248, 1256, 103 L.Ed.2d 488 (1989) ("Arbitration under the [FAA] is a matter of consent, not coercion . . ."). 17 In agreement one, the parties agreed to arbitrate "any controversy between us arising out of our business or this agreement." The arbitration clauses in agreements two and three are substantially similar to agreement one's arbitration clause in that the parties agreed to arbitrate "any controversy between myself and IFGNS arising out of the business of IFGNS or this agreement." All three arbitration clauses state that the arbiter of any potential dispute would be the National Association of Securities Dealers, Inc. ("NASD"). 18 We agree with the district court's finding that the "business" referred to in the arbitration clauses was the business of providing investment services in connection with the buying and selling securities. This is evidenced by the plain language of the agreements. Agreement one outlines that the portfolio advisor will make recommendations to the Trust "with respect to investment and reinvestment of the assets in the Account in no-load investment company shares (no load mutual funds) or in load investment company shares at their net asset value." Agreement one also names a specific representative to handle all sale and purchase orders directed to it by the broker and also to handle other custodial functions performed with respect to the security brokerage account. 19 Agreement three specifically limits the extent of the agreement to cover only security related products and services and expressly excludes non-security services such as advice on accounting, real estate, tax preparation, and financial planning. Agreement three also specifically states that "[the client] appoints IFGNS as my agent for the purpose of carrying out my directions with respect to the purchase and sale of securities and, as such, IFGNS is authorized to open or close brokerage accounts, place and withdraw orders and take such other steps as are reasonable to carry out my directions." Therefore, the parties agreed to arbitrate all disputes concerning the defendants' security related investment advice to the Trust. B. Becker's Individual Claims 1. Becker as a Nonsignatory 20 Having outlined the scope of the arbitration agreements, we next consider whether Becker, as a nonsignatory to these agreements, can be bound by the agreements' arbitration clauses. The defendants argue that the district court erred in finding that Becker did not have to arbitrate her individual claims simply because she was not a signatory to the three agreements. We agree to the extent that Becker's individual claims rely upon the terms of the agreements and attempt to hold the defendants to these terms. 21 "Although arbitration is a contractual right that is generally predicated on an express decision to waive the right to trial in a judicial forum, this court has held that the lack of a written arbitration agreement is not an impediment to arbitration." Sunkist Soft Drinks, Inc. v. Sunkist Growers, Inc., 10 F.3d 753, 756-57 (11th Cir.1993). Certain exceptions, such as equitable estoppel, can bind a nonsignatory to an arbitration agreement. Id. at 757. The defendants cite Blinco v. Green Tree Servicing, LLC, 400 F.3d 1308 (11th Cir.2005); and McBro Planning & Development v. Triangle Electrical Construction Co., 741 F.2d 342 (11th Cir.1984); in support of this argument. 22 In Blinco, Mr. and Mrs. Blinco, a husband and wife, signed and executed a mortgage. Mr. Blinco alone signed and executed the promissory note that contained an arbitration clause. Later, the Blincos brought an action against Green Tree, who owned the mortgage, for violating the Real Estate Settlement Procedures Act. We held that even though Mrs. Blinco was not a signatory on the note, she was bound by the arbitration clause because "[e]quitable estoppel precludes a party from claiming the benefits of a contract while simultaneously attempting to avoid the burdens that contract imposes." Id. at 1312. Since Mrs. Blinco's claims against Green Tree derived from her status as a borrower under the promissory note, we held that she could not rely on the note to establish her claims and at the same time seek to avoid the obligation to arbitrate her claims. Id. 23 In McBro, we also held that a party may be equitably estopped from asserting that the lack of a written arbitration agreement precludes arbitration. 741 F.2d at 344. The plaintiff, a general contractor, entered into an agreement to renovate a hospital. The agreement contained an arbitration clause, as well as references to the construction manager, McBro. The agreement also detailed McBro's duties. After the project began, the general contractor alleged that McBro interfered with its work, and the contractor filed an action alleging, among other things, contractual interference and negligence counts. McBro moved the district court to compel arbitration, and the court granted the motion. The contractor argued that it did not have a written agreement with McBro, and the Federal Arbitration Act requires that there be a written agreement between parties to arbitrate. 24 We affirmed the district court's order compelling arbitration. Id. at 344. We stated that although the contract between the contractor and the hospital actually disclaimed any contractual relationship between the contractor and McBro, "the general conditions of that contract are replete with references to McBro's duties as construction manager . . . [with] regards to the supervision of the project" and "the contractor's claims are `intimately founded in and intertwined with the underlying contract obligations.'" Id. (quoting Hughes Masonry Co. v. Greater Clark County Sch. Bldg. Corp., 659 F.2d 836, 841 n. 9 (7th Cir.1981)). In asserting its claims against McBro, the contractor was relying on the agreement with the hospital as it related to McBro's duties; therefore, the contractor could be equitably estopped from then repudiating the arbitration clause contained in the same agreement. Id. 25 Blinco and McBro establish that if a party relies on the terms of a written agreement in asserting the party's claims, that party is equitably estopped from then seeking to avoid an arbitration clause within the agreement. Therefore, to the extent that Becker is relying upon the terms of the three agreements and attempting to hold the defendants to those terms in asserting her individual claims, she is bound by the arbitration clauses contained in those agreements. Accordingly, we must focus on the nature of Becker's individual claims against the defendants to determine whether her claims fall within the scope of the arbitration clauses contained in the agreements. 2. Applicability of the Arbitration Agreements to Becker's Individual Claims 26 Citing McBro, the defendants argue that since each count in the complaint incorporates allegations that the defendants failed to provide Becker and the Trust with proper investment advice, Becker's individual claims are intertwined with or connected to the agreements that contain the arbitration clauses. Therefore, the defendants argue that all of Becker's individual claims are subject to arbitration. 27 Our holding in McBro does not compel a finding that all the disputes in the complaint are subject to arbitration. In McBro, we adopted the Seventh Circuit's reasoning in Hughes that a plaintiff's claims were subject to arbitration if in the complaint the plaintiff was attempting to hold the defendant to the terms of the agreement that contained an arbitration clause. 741 F.2d at 344. Only then would the plaintiff's claims be "`intimately founded in and intertwined with the underlying contract obligations.'" Id.; see Sunkist, 10 F.3d at 757 (stating that the decision in McBro "rest[ed] on the foundation that ultimately, [the] party must rely upon the terms of the written agreement in asserting [the party's] claims"). 28 In this case, not all aspects of Becker's claims rely upon or attempt to hold the defendants to the terms of the three agreements. For example, in Count Seven, Becker alleges that the defendants breached a fiduciary duty owed to her as an individual.9 Not all aspects of this count concern investment advice to the Trust. Paragraphs 54-64 allege that in early 1996, prior to the creation of the Trust, Becker and her friend Susan Berger purchased approximately 175 acres of land to train and board horses. Becker and Berger owned the farm as joint tenants with right of survivorship, and Becker incorporated the business, naming it Broken Fiddle. Becker borrowed a large sum of money in order to operate the business and secured the note with the farm's mortgage. Becker alleges that the defendants Davis, Tillman, and King gave her poor financial advice as to the structure of the note and mortgage, and they failed to secure Berger's financial obligations to the business. In paragraphs 66-68, Becker alleges that she provided approximately $2 million of financial assistance to Broken Fiddle, and Davis permitted Becker to file a report with the Internal Revenue Service that the financial assistance to the business was a gift and not a loan or an investment. Therefore, Davis allowed Becker to forfeit substantial income tax benefits. 29 In these allegations, Becker is not relying on or attempting to hold the defendants to the terms and duties contained in the three agreements. To find otherwise would lead to an illogical result. The terms and duties contained in the three agreements refer to the defendants' obligations to the Trust concerning security investments. If we were to find that in the above allegations, some of which occurred prior to the creation of the Trust, that Becker is attempting to hold the defendants to the terms and duties in the agreements and therefore send these disputes to arbitration, the NASD would be required to arbitrate a dispute concerning Davis's advice to Becker about the structure of the farm's mortgage and the filing of her personal income tax return. These are not the type of disputes that the parties agreed to arbitrate in the three agreements. Moreover, agreement three specifically excludes real estate and tax preparation disputes from the agreement. Our case law forecloses us from forcing parties to arbitrate disputes that they did not agree to arbitrate. Klay, 389 F.3d at 1200. 30 We acknowledge that many disputes contained within Count Seven are covered by the agreements and are thus subject to arbitration. Paragraph 176 specifically alleges that Davis's decision to invest in CNL was unsuitable for the Trust. This dispute clearly falls within the scope of the arbitration agreements, and Becker, as a nonsignatory, is bound to arbitrate this dispute, because in this instance, she is attempting to hold the defendants to the terms of the agreements. 31 We further acknowledge that the manner in which the complaint is pled is problematic because many, if not all, of Becker's individual claims against the defendants contain both arbitrable and non-arbitrable disputes. For example, in Count Nine, Becker alleges that the defendants engaged in fraud and deceit.10 She generally alleges that "Defendant Davis falsely represented to Plaintiff that everything he did was intended to protect and enhance her financial interests," and that his representations and promises to her were false. Paragraphs 74-88 specifically refer to investments concerning the Trust. These disputes are within the scope of the arbitration agreements and are thus arbitrable. However, paragraphs 90-92 allege that Davis opened a money market account with Scudder Investments in the name of "ANNE S. BECKER & JOHN A. DAVIS JR JTWROS (as joint tenants with right of survivorship)." Becker alleges that she never gave Davis "any right, title, or interest" to her money that was deposited in the account. This aspect of Count Nine is not within the scope of the arbitration agreements, for this allegation does not implicate a dispute concerning the accounts that the Trust opened with IFG-SEC for the purpose of buying and selling securities. It is therefore not subject to arbitration. While it would be much easier to do so, we will not send clearly nonarbitrable disputes to arbitration merely because a count, as pled, contains both arbitrable and non-arbitrable disputes. 32 The complaint's inclusion of both arbitrable and non-arbitrable disputes within a single count is also evident in Count One. In Count One, Becker alleges that the defendants11 violated the Florida Securities and Investor Protection Act.12 Paragraphs 49-53 allege that in February 1996, before the creation of the Trust, Becker entered into an Investment Management Agreement with Defendant DKE on the advice of Davis, and Davis secured an improper "kick back" fee arrangement for the benefit of the defendants. Paragraphs 74-78 allege that pursuant to Davis's advice, the Trust invested in the CNL and this investment was not suitable for the Trust. Count One alleges that in connection with the offer, sale, or purchase of any investment or security, the defendants acts or practices constituted a scheme to defraud in violation of Florida Statute § 517.301(1). 33 At first blush, it appears that Becker is attempting to hold the defendants to the terms and duties contained in the three agreements; therefore, she should not be able to avoid the arbitration clauses contained in those agreements, and Count One should be sent to arbitration. However, Becker opened her individual account with DKE prior to the creation of the Trust. The documents that Becker claimed she signed to open the account with DKE are not part of the record. Therefore, the defendants, to the extent that they were involved in the purchase and sale of securities through Becker's individual DKE account, owed to Becker a duty not to employ a scheme to defraud her based on their investment advice independent of the three agreements that the Trust later entered into with IFG-SEC. Accordingly, to the extent that Count One relies on disputes concerning security investments not connected to the Trust, these disputes are not within the scope of the arbitration agreements entered into by the defendants and the Trust, and these aspects of Count One are not arbitrable. See Bratt Enters., Inc. v. Noble Int'l Ltd., 338 F.3d 609, 613 (6th Cir.2003) (holding that only the aspects of plaintiff's breach of contract claim that the parties had agreed to arbitrate were subject to arbitration). 34 The defendants also argue that Becker's allegation that the very creation of the Trust was an unsuitable investment for her financial objectives, and her allegation as trustee that certain investments for the Trust were unsuitable for the Trust are impossible to separate. We disagree. The Trust was created prior to the time that the Trust opened the accounts with IFG-SEC and entered into the agreements containing the arbitration clauses. Becker alleges that documents used to create the Trust contained unusual provisions to restrict her ability to ever replace Defendant Davis as trustee, and this allowed the defendants to control a large part of her assets and was therefore unsuitable for her personal investment objectives.13 This allegation is separate and distinct from an allegation that the investments that the defendants entered into on behalf of the Trust were unsuitable for the Trust.14 35 The defendants point to the fact that we have stated that "if allegations underlying claims `touch matters' covered by parties' arbitration agreement, then claims must be arbitrated, whatever legal labels attached to them." Indus. Risk Insurers v. M.A.N. Gutehoffnungshutte GmbH, 141 F.3d 1434, 1448 n. 21 (11th Cir.1998) (citing Genesco v. T. Kakiuchi & Co., 815 F.2d 840, 846 (2d Cir.1987)). However, we have also stated that even "broad arbitration clauses cannot be extended to compel parties to arbitrate disputes they have not agreed to arbitrate." Klay, 389 F.3d at 1195. In this case, we are presented with a complaint asserting claims that contain both arbitrable and non-arbitrable disputes. While it might be more efficient to send to arbitration all the disputes contained in all the claims, the parties did not agree to such efficiency. "Congress's preeminent concern in enacting the FAA — the enforcement of private agreements to arbitrate as entered into by parties — requires that the parties only be compelled to arbitrate matters within the scope of their agreement, and this is so even when the result may be piecemeal litigation." Bratt, 338 F.3d at 613. If the defendants, who were providing advice to both Becker and to the Trust, wanted to arbitrate all disputes that arose from advice that the defendants gave to Becker concerning her assets outside of the Trust, then the defendants should have contracted with Becker to do so. 36 Accordingly, we find that the district court erred in categorically refusing to send Becker's individual claims to arbitration because she was not a signatory to the agreements. The three agreements were entered into by the Trust and the defendants and relate to investment advice and services concerning the purchase and sale of securities for the Trust. To the extent that Becker's individual claims concern disputes that rely upon the terms of the three agreements and attempt to hold the defendants to those terms, she cannot avoid the arbitration clauses contained in those agreements. Becker is therefore required to arbitrate any aspect of her individual claims against the defendants that involve disputes concerning or relating to the investment of securities on behalf of the Trust, for the parties agreed to arbitrate these types of disputes. All other aspects of her individual claims involving disputes that do not concern or relate to the investment of securities on behalf of the Trust are not within the scope of the agreements, and are therefore not subject to arbitration. 37 C. The Defendants Falcon FM and Falcon FP as Nonsignatories 38 The defendants argue that the district court erred when it concluded that because the defendants Falcon FM and Falcon FP were not signatories to the agreements, they could not compel arbitration of the claims against them. The defendants argue that since the complaint alleges a conspiracy between signatory defendants and nonsignatory defendants, equitable estoppel allows a nonsignatory defendant to compel arbitration. We agree. 39 The complaint alleges that "[a]ll of Defendant Davis' acts, misrepresentations, omissions, and other wrongdoing complained of herein occurred while [Davis] was acting within the scope and during the course of his employment with the defendants Falcon FM [and] Falcon FP." The complaint further alleges that: 40 Working together while appearing to be independent of one another enabled [all] Defendants to induce Plaintiff to adopt a fundamental financial strategy and structure ... that was unsuitable for her personal investment objectives and financial situation; and enabled them to induce Plaintiff to authorize the implementation of certain of their recommendations and courses of action that were supposedly in her best interest, but in fact were calculated to subtly but intractably victimize Plaintiff and benefit them, instead, by allowing them to obtain a substantial amount of Plaintiff's wealth over many years. 41 Plaintiffs incorporated these allegations into all their claims. 42 We stated that the "`application of equitable estoppel is warranted ... when the signatory [to the contract containing the arbitration clause] raises allegations of ... substantially interdependent and concerted misconduct by both the nonsignatory and one or more of the signatories to the contract.'" MS Dealer, 177 F.3d at 947 (alterations and omissions in original). In MS Dealer, Franklin bought a car from Jim Burke Motors, Inc. Franklin and Jim Burke executed a "Buyers Order" that contained an arbitration agreement. The Buyers Order incorporated by reference a Retail Installment Contract in which Franklin was charged a fee for a service contract through MS Dealer. MS Dealer was not a signatory to either the Buyers Contract or the Retail Installment Contract. 43 After discovering defects in the car, Franklin filed suit against Jim Burke and MS Dealer for breach of contract, fraud, and conspiracy in state court. MS Dealer filed a petition in federal court to compel Franklin to arbitrate her claims against it. The district court denied the petition finding that MS Dealer was not a signatory on the contracts; therefore, it did not have standing to compel arbitration. We reversed. We stated that Franklin's claims against Burke and MS Dealer "are based on the same facts and inherently inseparable." Id. at 948 (internal quotation marks omitted). Franklin's claim that Burke and MS Dealer conspired with each other and schemed to defraud her were "allegations of such pre-arranged, collusive behavior [that they] establish[ ] that [her] claims against [MS Dealer are] intimately founded in an intertwined with obligations imposed by the [Buyers Order.]" Id. (alterations in original) (internal quotation marks omitted). Therefore, Franklin was equitably estopped from avoiding arbitration with MS Dealer. 44 In the case before us, the Trust's claims allege that both signatories (Davis and IFG) and nonsignatories (Falcon FM and Falcon FP) to the agreements collaborated to make unsound financial decisions, which ultimately lost money for the Trust. Therefore, the Trust's allegations of collusive behavior against the signatories and nonsignatories "are intimately founded in and intertwined with obligations imposed" by the agreements the Trust entered into with Davis and IFG-SEC. See id. (internal quotation marks omitted). Accordingly, the Trust is equitably estopped from avoiding arbitration with Falcon FM and Falcon FP. Becker is also equitably estopped from avoiding arbitration with Falcon FM and Falcon FP to the extent that her individual claims involve disputes that rely upon the terms of the agreements. 45 The plaintiffs attempt to distinguish MS Dealer by arguing that the arbitration clause in MS Dealer contained broad language, whereas the arbitration clause before us is more narrowly written. In MS Dealer, the arbitration clause stated that: "Buyer hereby acknowledges and agrees that all disputes and controversies of every kind and nature between buyer and Jim Burke Motors, Inc. arising out of or in connection with the purchase of this vehicle will be resolved by arbitration." Id. at 944 (emphasis added). The arbitration clause in agreement one states that "[a]ny controversy between us arising out of our business or this agreement shall be submitted to arbitration."15 (Emphasis added). The plaintiffs argue that the arbitration clause at issue does not contain the "in connection with" language required to constitute a broad arbitration clause. 46 We have held that there was no meaningful distinction between arbitration clauses that have "arising out of" language and those that have "arising out of and in connection with" language. Gregory v. Electro-Mech. Corp., 83 F.3d 382, 386 (11th Cir.1996). Since federal policy requires us to construe arbitration clauses generously, resolving all doubts in favor of arbitration, see Gregory, 83 F.3d at 385-86, the plaintiffs' attempt to parse the language of the arbitration clauses is not persuasive. D. Count Nineteen 47 The defendants also argue that the district court erred in refusing to send Count Nineteen, Becker and the Trust's claim for an accounting of the Trust, to arbitration. Count Nineteen alleges that Davis as trustee of the Trust breached his duty pursuant to Florida Statutes § 737.303 to provide annual statements of the Trust's account and all other information pertaining to the Trust's assets. The district court stated that this request for an accounting did not arise from the "business" referred to in the three agreements. However, an accounting is a remedy attached to a separate independent cause of action. See Johnson v. Pullman, Inc., 845 F.2d 911, 913 (11th Cir.1988) ("Although plaintiff's complaint contained a count in which an accounting was sought, that relief would not be available here absent some independent cause of action."). 48 Accordingly, if the four substantive claims brought by the Trust against the defendants arise out of the agreements and are therefore subject to arbitration, as the parties agree, the Trust's claim for an accounting, which is merely a remedy for any liability, would also arise out of the agreements. Furthermore, to the extent that Becker's individual claims rely on the terms of the agreements and are therefore subject to arbitration, Becker's individual claim for an accounting of the Trust's assets also rely on the terms of the agreements and are subject to arbitration. Accordingly, we find that the district court erred in not sending Count Nineteen to arbitration. IV. CONCLUSION 49 We find that the district court erred in holding that all aspects of Becker's individual claims were not subject to arbitration because she was not a signatory to the three agreements that contained arbitration clauses. To the extent that Becker's claims concern disputes that rely upon the terms of the agreements and attempt to hold the defendants to these terms, she cannot avoid the arbitration clauses contained in those agreements. We affirm the district court to the extent that Becker's individual claims do not rely on the terms of the agreements. We also find that the district court erred in holding that the defendants Falcon FM and Falcon FP could not compel the Trust and Becker to arbitrate the claims against them concerning matters that arose from the three agreements. Finally, we find that the district court erred in holding that Count Nineteen, the Trust and Becker's claim for an accounting, was not subject to arbitration since a claim for an accounting is only a remedy attached to an independent cause of action. 50 AFFIRMED in part; REVERSED in part and REMANDED to the district court for further proceedings consistent with this opinion. Notes: 1 The defendants King and Tillman are not part of this appeal 2 The documents that created the Trust are not part of the record. The complaint alleges that the Trust was created on December 2, 1996, and one of the agreements that the Trust entered into with IFG-SEC also indicates that the Trust was created on December 2, 1996. However, the Trust opened an account with IFG-SEC on November 11, 1996 3 In the complaint, the "Conspiring Defendants" are the defendants Davis, King, Hartley, and Tillman 4 Counts Thirteen and Eighteen do not seek relief against moving the defendants 5 IFGNS refers to IFG Network Securities, Inc., which is referred to as IFG-SEC in this opinion 6 It is apparent that at least two of the three agreements contained in the record are incomplete. Agreement one is missing pages. Agreement two is virtually illegible and is only one page, even though the document indicates that it had a reverse side to it 7 In its order, the district court refers to the defendants IFG-SEC and IFG-AS as Multi-Financial Securities Corp., the successor corporation 8 The second step in ruling on a motion to compel arbitration is to determine "whether legal constraints external to the parties' agreement foreclosed arbitration."Mitsubishi Motors, 473 U.S. at 628, 105 S.Ct. at 3355. Because the parties dispute only the scope of the agreements, and not their enforcement, we need not discuss the second step of the analysis. 9 In Count Seven, Becker realleges paragraphs 1-113 10 In Count Nine, Becker realleges the factual allegations set forth in paragraphs 1-53 and 69-113 11 Count One does not seek relief against Defendant Falcon FP 12 In Count One, Becker realleges the factual allegations in paragraphs 1-53, 69-88, 90-92, and 110-113 13 The documents that created the Trust are not part of the record 14 The defendants also argue that since the complaint alleges that all of Davis's acts were done in the course and scope of his employment with IFG-SEC and IFG-AS, Becker's individual claims arise out of or relate to the purchase or sales of securities, which is the "business" referred to in the agreements. However, whether or not Davis was acting within the scope of his employment with IFG-SEC and IFG-AS when committing certain acts is a separate question from what type of disputes the parties agreed to arbitrate 15 The arbitration clauses in agreements two and three also employ the "arising out of" language
{ "pile_set_name": "FreeLaw" }
This post has been contributed by a third party. The opinions, facts and any media content here are presented solely by the author, and The Times of Israel assumes no responsibility for them. In case of abuse, report this post. Those who advocate peace cannot allow the murderers to hijack their religion simply because they choose to look the other way through instransigence. Ordinary Muslims cannot continue to objectify themselves as victims in the fight against radical Islam, they have to empower themselves to become the rational voices in their communities rather than to continue to allow the irrational to hijack their religion and continue to wreak terror upon others. The responsibility lies with them and they cannot continue to run from it anymore. This is because radical Islam by its nature, and the religion itself, is based upon conquest and imperialism and only by seriously investigating its history, holding it up to scrutiny and rethinking elements with a defined purpose (the proximate goal being peace), will we realistically be able to fight those who continue to fight against secularisation. London likes to think it is united in the wake of the attack on Parliament earlier this week but the incident only highlights how it has no idea on how to really fight the “war on terror” and to understand how best to approach anti-terror strategies. Platitudes, euphemisms, endless politically correct phrasings and investigations anchored by think-thanks too scared to speak in the name of that same PC mind-set will have no chance against terrorists who lurk in the shadows and simply do not believe in playing fair. Then there’s the little matter of these individuals wanting to kill you just for disagreeing with their ideology. This is not least due to the fact that radical Islamic terrorists, by their nature, are flexible in how they wish to destroy their opponents. They’re flexible in choosing to crash planes into buildings one week, blowing themselves up against military targets the next, driving trucks and cars into innocent people and stabbing unarmed police officers, it’s a veritable roulette table of options for these murdering barbarians. These psychopaths are willing to die in their quest to murder others and they have nothing to hold them back in that regard. Why? These Muslims are arguably that much more motivated to do so, ensuring that they further gains in the afterlife are far more glamorous and worthwhile compared to the nutjob Christian fundamental who is driven by something far less laudable. Saying we are united and will stand firm and release press releases to form such an intent is nice and cuddly but it won’t cripple this horror alone, it won’t be allowed to win against this seasoned, historic and precisely organised source of destruction. This is not least because Europe is fair game for them, it’s a devil’s playground for jihadis. With Trump in charge, America has become that much harder to successfully strike (though they’re doing their best in their attempts) but Europe is not isolated from the courts of radical indoctrination and far less stringent on monitoring those who come into it, leave it, share material and knowledge with known ‘hot-zones’ and are free to criticise one minute, then seek to kill you the next. They pool knowledge to ensure their way of thinking is superior and that their way of spreading their message has been allowed to become inferior and that this must change. The radical conception of Islam is that it was curtailed by Christendom just when it was at its apex. So after two world wars it is now time for the Islamists to put inferiority behind them and return to the superpower status they so covet. This is clear within India where many Muslims are befuddled and inherently angry that their community is now reduced to serfdom, hence why Pakistan seeks to usurp it at every time and call Narendra Modi a terrorist. In London and Britain, we have to realise that radical Muslims are locked in an eternal conquest to fight, that their vision must be extended right around the world and that only a muscular approach will suffice. In London in particular there are far too many Muslims who may not explicitly support terror but at the same time they won’t bring themselves to clearly deny that they do not believe in the global destiny Islam covets for itself; that of superpower status, a particular kind that eclipses that of any kind of Christian power. Europe is a perfect incubator for the institution of the Caliphate that all these radical Islamists so crave. After the crushing of the Ottoman Empire there was a power vacuum that continues to be a thorn in the side of those who want to return Muslims to these particular levers of power; it is not nationalism, it is power itself, a figurative strategy which involves patience, planning, amassing great influence and then overwhelming dissenters and opponents, come what may. In its most fundamental form, it is creating Caliphates across prisms of opportunity and authority and then moving full steam ahead to create a powerhouse of indoctrination. And that is exactly what Pakistan is, a future power base, a ‘land of the pure’ that detested colonial rule and is instead taking the long game, playing nice with the US and China, placating superpowers when it needs to while building a nuclear arsenal-the only Islamic country to do so. It has the will and the population to set its sight on its ultimate objective whilst already harbouring terror activity, it has no intention in moving away from one of its preferred goals, to be the leader of the Islamic world. It’s work with Facebook to stamp out perceived blasphemy on social media is just one small indication of that. So we can hold vigils and hold hands and talk about togetherness but the reality is we can’t beat terrorism, especially this kind of terrorism. We are afraid and we should be afraid. We can strike the cobra in its lair and attempt to contain it, put limits on its reach but until they stop thinking it’s a good idea to kill themselves in order to obliterate others, we are living in Disneyland. We have to start by amping up our intelligence and surveillance game sevenfold, it failed us in Britain by believing Khalid Mahmood to only be a ‘peripheral figure’. We have to ensure people are empowered so that they can report terrorist acts and face them without being labelled as racists and Islamaphobes. The heart of the battle ultimately lies with Muslims themselves, to ensure their overconfidence in the good of the people does not impinge upon the battle to de-radicalise the fringe elements in their own communities. Leftists are of course to blame too, believing their vision of secularism means that alienated Muslims will magically become terrorists after being arbiters of reason one moment and being arbiters of majority thought the day before. They fail to realise that radicalism like this does not come out of a clear blue sky without preparation, planning and root ideals. We cannot allow ordinary Muslims to continue to describe themselves to be victims anymore. If they feel belittled and scrutinised, deal with it. Society isn’t fair and hasn’t really ever been, there isn’t plurality (no matter how we try to convince ourselves otherwise) and we have to empower the rational voices in Muslim communities to speak out, not to muzzle them. We must do this because Islam needs to rethink its history, to fashion a new outlook with regards to its tendency to colonise independent thought and territory. Only Muslims can ensure their communities will be safely secular. And so why is it that some Muslims continue to hate those within their ranks who have taken this precise challenge up? Why is it that some in these communities spit on the moderate voices and the reformists such as Majid Nawaz ,for example, who now unbelievably is supposed to be an Islamaphobe. Islam cannot and should not be shielded from criticism and by fighting its radical elements and encouraging all Muslims to do so, the liberal left must too take responsibility that it is also part of the poison and not the antidote. To complete the subscription process, please click the link in the email we just sent you. By signing up, you agree to our terms You hereby accept The Times of Israel Terms of Use and Privacy Policy, and you agree to receive the latest news & offers from The Times of Israel and its partners or ad sponsors.
{ "pile_set_name": "Pile-CC" }
The present invention relates generally to the use and design of optical components for communications systems. The present invention more particularly relates to electromechanical optical devices that reflect and redirect an optical signal. Certain prior art micro-electro-mechanical systems, or MEMS, employ mirrors that are positioned by means of an electrostatic actuator. Typically an actuator tilts the mirror about a single axis. The degree of rotational freedom of the mirror is usually small and tightly limits the maximum available range of a trajectory of a reflection of a light beam. Prior art trajectories of reflected light beams are therefore typically linear, straight and short in length. The modest ranges of prior art trajectories limit the number of receiving waveguides that can be positioned to fall within the prior art trajectory. This prior art limitation in the quantity of waveguides to which the mirror can redirect an incident light beam correspondingly limits the number of light beam or optical signal channels available for optical signal transmission from the mirror. There is, therefore, a long felt need to increase the trajectory length of the receiving plane in order to increase the number of receiving waveguides available for receiving the light beam as reflected by the movable mirror, and to increase the accuracy of positioning of the light beam on a receiving plane or an output device or waveguide. It is an object of the present invention to provide a method and apparatus that increases the length of a trajectory located within a receiving plane for the reflection of a light beam from a movable mirror by movement of the mirror in more than one dimension. It is an object of certain alternate preferred embodiments of the present invention to provide a method and apparatus that increases the accuracy of redirecting a light beam from the movable mirror and onto a receiving plane of the reflected light beam. It is an object of certain still alternate preferred embodiments of the present invention to provide a method and apparatus that increases the number of light beam receiving positions available to receive the reflected light beam, whereby the number of channels transmitting the reflected light beam from the apparatus is increased. It is an additional object of certain other preferred embodiments of the present invention to provide a method and apparatus that decreases the driving voltage required to move a movable mirror. It is an object of certain alternate preferred embodiments of the present invention to provide a method and apparatus that includes and comprises an electro-mechanical semiconductor device to reflect and redirect an optical signal. It is an object of certain further alternate preferred embodiments of the present invention to provide a method and apparatus that comprises a micro-electro-mechanical system, or MEMS, to reflect and redirect an optical signal. It is an object of certain further alternate preferred embodiments of the present invention to provide a method and an apparatus that provides a micromirror that reflects an optical signal along a circular reflection pathway. It is an object of certain still further alternate preferred embodiments of the present invention to provide a method and an apparatus that provides a micromirror that reflects an optical signal within a circular area, or another suitable surface area shape known in the art. It is an object of certain yet alternate preferred embodiments of the present invention to provide a method and an apparatus that provides a micromirror having a pivot point and that enables the movement of the micromirror in least one rotational degree of freedom. It is an object of certain yet alternate preferred embodiments of the present invention to provide a method and an apparatus comprising a micromirror and that enables a micromirror to move within at least two degrees of freedom. It is an object of certain yet other alternate preferred embodiments of the present invention to provide a method and an apparatus comprising a micromirror, wherein the apparatus enables a micromirror to move from one discrete position to at least one other discrete position. According to the method of the present invention, a rolling mirror, having a movable micromirror is provided. The invented rolling mirror redirects a light beam in a trajectory, where the trajectory lies within a receiving plane. Various alternate preferred embodiments of the invented rolling mirror generate trajectories having a suitable two dimensional shape known in the art, for example as selected from the group of shapes consisting of a circle, a substantially circular shape, a partially circular shape, and an ellipse. A preferred embodiment of the invented rolling mirror includes a movable micromirror having a body, a reference surface, an actuator, a suspension element and an optional pivot point. The actuator is operatively coupled with the micromirror and applies force to move the micromirror. The micromirror moves along a path of motion that includes at least one section within which the motion of the micromirror is guided by contact with the reference surface. As the micromirror moves about the reference surface a reflection of a light beam incident to the micromirror is reflected at a movable point within a certain trajectory of a receiving plane. This trajectory is partially determined by the shape of the body of the micromirror and the shape of the reference surface. The reference surface may have one, two, or a plurality of sections. A section may comprise one, two or a plurality of suitable surface shapes known in the art, to include a plane surface, a conical surface, a curved surface, an arced surface, a ramped surface, a spiraled ramp surface and a helical surface. The micromirror has a reflecting surface and a body with a contact edge, and an optional micromirror pivot feature. The contact edge may be located on or proximate to a periphery of the micromirror or the reflecting surface, or alternatively, in certain alternate preferred embodiments of the present invention the contact edge may be located on the micromirror body in a path that is of uniform or of varying distance from the periphery of the micromirror or the reflecting surface. The reflecting surface may be a concave, convex or flat reflecting surface in various preferred embodiments of the present invention. The micromirror may be shaped as a relatively thin body having a larger two-dimensional reflecting surface. Alternatively, the micromirror may have a cone shaped body or a frustum shaped body, or a body shaped according to another suitable shape known in the art. Certain alternate preferred embodiments of the present invention comprise a micromirror body having two or more body layers, where at least two body layers have different cross-sectional sizes or shapes. Certain alternate preferred embodiments of the present invention comprise a cone-like micromirror body, where the cone-like micromirror body is similar to, or topographically equivalent to, or contained within a conical bounding cone. The cone-like micromirror body may have two or more micromirror body layers. The micromirror body layers have different cross-sectional sizes, and the smaller of two body layers, or the smallest body layer of a plurality of body layers, is positioned closer to a center of the actuator or a plurality of actuators. The actuator of the preferred embodiment may be a suitable actuator known in the art, to include one, two or a plurality of actuators selected from the group consisting of an electro-static actuator, a piezo-electric actuator, a thermo-mechanical actuator, an electromagnetic actuator, and a polymer actuator, or other suitable actuators known in the art. One or more polymer actuators may be selected from the group consisting of an electro-active polymer actuator, an optical-active polymer, a chemically active polymer actuator, a magneto-active polymer actuator, an acousto-active polymer actuator and a thermally active polymer actuator, or other suitable polymer actuators known in the art. Certain preferred embodiments of the present invention comprise an actuator assembly, where the actuator assembly has two or more actuator layers, where at least two actuator layers have different cross-sectional sizes or shapes. Certain alternate preferred embodiments of the present invention comprise an actuator comprising a plurality of low profile layers, where the height of most of the layers is small in comparison to the remaining two dimensions of the layer""s cross section, and the layers are assembled together to be contained within a conical bounding surface, and/or the actuator has a shape that is substantially topologically similar to, or equivalent to, a cone. The suspension element is operatively coupled with the micromirror and provides a restoring force that returns the micromirror to a zero actuation position when the actuator provides no force, or force below a minimum level to the micromirror. The suspension element may be or comprise one or more suitable suspension components known in the art, or as selected from the group consisting of a spring, a beam, a tether, and a diaphragm. The suspension element may be at least partly flat, corrugated and/or perforated. In certain alternate preferred embodiments of the present invention the movable micromirror and the reference surface are pivotably coupled wherein the micromirror moves in two dimensions about a pivot point as the actuator moves the micromirror. Certain alternate preferred embodiments of the present invention are integrated on a single substrate. Certain still alternate preferred embodiments of the present invention are incorporated as micro-electro-mechanical systems, or MEMS, or a MEMS device. In operation, the micromirror of certain preferred embodiments is moved about the pivot point while maintaining a point of contact between the contact edge and the reference surface. The position of the micromirror is determined by forces provided by the actuator and the suspension element. The point of contact between the micromirror and the reference surface shifts along the contact edge and along the reference surface as the micromirror moves. Other objects, features, and advantages of the present invention will be apparent from the accompanying drawings and from the detailed description which follows below.
{ "pile_set_name": "USPTO Backgrounds" }
Who's Who (and Who's Not) The first time I got a letter in the mail from Who’s Who saying that they wanted to include me, I thought I was pretty special. I had just gotten my Ph.D. and was at the Harvard Society of Fellows at the time. I called my Dad to brag. He laughed out loud at me. “Only fools put themselves in Who’s Who,” he said. “They ask me every year, and I never fill out the form.” When I studied the materials more closely, I came to concur with him. I can’t remember whether they actually charge you to put a listing in there, or just that you feel like you should buy the book once your name is listed. Whatever it was, I realized that if you care about getting your name in Who’s Who, you don’t belong there. Out of 700 medal claims he researched, only 297 turned out to be verified in official military records — barely 40 percent. For the highest prize, the Medal of Honor, fully 93 percent of those claiming to have won it were lying. When contacted by the Tribune, those who had made fraudulent claims had a range of responses: admitting guilt, saying it was a secretary’s mistake, or arguing that his mission was so secret that the award he won is still classified. My favorite, however, is from Jeremiah Edmund Dorsey, whose excuse was that he meant to list his award as the Republic of Vietnam Honor Medal, not the Medal of Honor. The Republic of Vietnam Honor Medal was given to U.S. soldiers by the former South Vietnamese government, according to the article. COMMENTS: 22 While I have no idea if I’m in the “Who’s Who” (I’m probably not). I’d support a twist – with a taste of information asymmetry – to Groucho Marx’ disrespect for this kind of clubs: If they propose without knowing what I know about myself, they are a bunch of idiots. If they do propose knowing it, tells me a lot about fellow members. Until I saw this article, I thought that the Who’s Who list is simply a way for sophisticated burglars to pick their victims. Now it looks like it has a genuine use. The government can now catch all the yahoos falsly claiming military decorations in 1 place. BTW – I saw a story on the news about some genuine Medal of Honor winners who were exposing the fakers in their spare time. One of them became really depressed when he realized that the genuine Medal of Honor winners were outnumbered by the frauds. How much worse is it if 93% are fakes. The Stolen Valor Act (which I authored and shepherded through Congress), has already faced the Constitutional test TWICE…and won both times. For more informtion on the legislation calling for a national database that would quickly verify awards, as well as preserve the history of TRUE heroes, see http://www.homeofheroes.com/rollofvalor When I was in college, two students started a new “honor society” and invited everyone with a certain GPA (which was almost everyone thanks to grade inflation). Amazing how many people signed up and paid a fee: I tend to take many things with a grain of salt, but this is honestly disgusting that people would falsely claim to receive such high honors, many without even providing a day of service to their country. The saddest part of this story is that for people like Marcus Luttrell (read Lone Survivor for an amazing story of the heroes of SEAL Team 10 in Afghanistan) who truly deserved an honor like the Navy Cross, their deeds are trivialized by people falsely claiming to be on that level. Another thing, I know that a lot of these men who have won such awards are not quick to list it on a CV or a Who’s Who. To me, when I hear someone speak about these awards, they are honored to be recognized, but given the situations they are usually presented under, I think many of them would rather have their comrades by their sides than be able to list a medal on their resumes. It’s one thing to embellish about a job, but to go so far as to say that you are a recipient of a military honor is disgusting. Too many people have died for their friends and brothers and country to allow that kind of behavior. I support the Stolen Valor Act. My first hint that the ‘Who’s Who’ was a joke was when my cousin was invited to the ‘Who’s Who of American Highschool students’, about a month after she dropped out. Ever since, I’m wary of any honor society. Benjamin David Steele on The Consequences of Slavery in Africa "There actually is a lot more to Nunn's research than this, as I understand it. I was reading about it from The Hidden History of the Human Race by Christine..." Read More
{ "pile_set_name": "Pile-CC" }
Saturday, 30 July 2011 Hypothetical my bottom! Well, look at this little piece from the Irish Examiner Speaking on RTÉ’s Liveline programme yesterday, Helen Lucy Burke, who interviewed Mr Norris for Magill magazine in January 2002, questioned his suitability for the presidency as a result of the "startling" views she said he expressed to her in the interview. In the interview Mr Norris was quoted on his opinion on sexual activity in a historical context. "In terms of Classic paedophilia, as practiced by the Greeks for example, where it is an older man introducing a younger man or boy to adult life, I think there can be something to be said for it. And in terms of North African experience this is endemic. "Now again, this is not something that appeals to me, although when I was younger it would most certainly have appealed to me in the sense that I would have greatly relished the prospect of an older, attractive, mature man taking me under his wing, lovingly introducing me to sexual realities, and treating me with affection and teaching me about life — yes, I think that would be lovely; I would have enjoyed that." He was also quoted on his views as to varying levels of seriousness of abuse. "In my opinion, the teacher or Christian Brother who puts his hand into a boy’s pocket during a history lesson, that is one end of the spectrum. But then there is another, there is the person who attacks children of either sex, rapes them, brutalises them, and then murders them. But the way things are presented here it’s almost as if they were all exactly the same and I don’t think they are. And I have to tell you this — I think that the children in some instances are more damaged by the condemnation than by the actual experience." In a statement, Mr Norris said the quotes were "misleading" and taken "out of context" in what was an academic conversation. "During the course of a conversation, Ms Burke and I engaged an academic discussion about Classical Greece and sexual activity in a historical context; it was a hypothetical, intellectual conversation which should not have been seen as a considered representation of my views on some of the issues discussed over dinner. "The article did contain other valid comments from me on human rights and equality issues but the references to sexual activity were what were emphasised and subsequently picked up and taken out of context in other media outlets. "The presentation of references to sexuality in the article attributed to me were misleading in that they do not convey the context in which they were made. People should judge me on my record and actions as a public servant, over the last 35 years and on the causes and campaigns, for which I have fought, and not on an academic conversation with a journalist over dinner. I did not ever and would not approve of the finished article as it appeared." I don't care what the Greeks used to do, and why they did it. It's still immoral and wrong, and this is a man who persecutes the whole entire Church, because of the extremely unfortunate "crisis", is now being a bloody hypocrite and saying men who have sex with boys is alright. Excuse me, but no, it's not.
{ "pile_set_name": "Pile-CC" }
Green Coffee Beans Roasted Coffee Beans The city of Espírito Santo do Pinhal, located in the interior and Mogiana region of the State of São Paulo, is a city known for its excellent geographic location for coffee plantations, in mountainous region, with temperature and climate ideal for coffee, is over 870 meters of altitude, a factor that favors the quality of coffee, the city is Traditionally known as “The Land of Coffee”, given its long history of production and marketing of the product. The region has Geographical Indication (GI) of Provenance since 2016, the Geographical Indication of Origin is the basis of traceability, and represents the quality of the coffee produced in our region. Read More >> Elba Brazilian coffee company has representatives in various countries of the world; in Turkey,China, Germany, Iran, India, Sudan, Egypt, Malaysia, Syria, Bulgaria . The focus of the company is on coffee products, especially on special premium coffee products.What specialize Elba green, is that it has an extensive networks inside and outside Brazil.Due to its great potential Elba green gets the best quality coffee crops compared to others.The company’s production is divided into two main categories: special coffee, carefully selected which has earned a high degree of professional connoisseurs.And daily known coffee to the consumer known as ground packaged coffee.With this power and ability to provide different types of coffee products known and unknown to the consumer, the company started with its branches around the world to share people with the unique taste of Brazilian coffee. Types of coffee Globally there are two types of coffee: Arabica; It is about 70% of the world production and is grown in the high mountains and is the best compared with other types of coffee. Some of Arabica coffee include the flavor of flowers, chocolate, nuts and cherries. The rate of caffeine in it is low, after roasting the percentage of caffeine is approximately 2%, but concerning its price, it is high in comparison with Robusta coffee. The Robusta; it is about 30% of the world’s production and its granules are small and its shape is circular. It is grown in the plains, more bitter than Arabica and it is much more dense. Good quality Robusta is usually used in some Espresso mixtures, to provide special foam for coffee. Concerning its price, it is relatively lower in comparison to Arabica. We are offering to prepare special coffee according to the requirements and desires of our respectable customers. We would be glad to welcome you in our factories and offices whenever you want.
{ "pile_set_name": "Pile-CC" }
// Copyright 2020 PingCAP, Inc. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // See the License for the specific language governing permissions and // limitations under the License. package aggfuncs import ( "unsafe" "github.com/pingcap/tidb/sessionctx" "github.com/pingcap/tidb/util/chunk" ) const ( // DefPartialResult4CountSize is the size of partialResult4Count DefPartialResult4CountSize = int64(unsafe.Sizeof(partialResult4Count(0))) ) type baseCount struct { baseAggFunc } type partialResult4Count = int64 func (e *baseCount) AllocPartialResult() (pr PartialResult, memDelta int64) { return PartialResult(new(partialResult4Count)), DefPartialResult4CountSize } func (e *baseCount) ResetPartialResult(pr PartialResult) { p := (*partialResult4Count)(pr) *p = 0 } func (e *baseCount) AppendFinalResult2Chunk(sctx sessionctx.Context, pr PartialResult, chk *chunk.Chunk) error { p := (*partialResult4Count)(pr) chk.AppendInt64(e.ordinal, *p) return nil } type countOriginal4Int struct { baseCount } func (e *countOriginal4Int) UpdatePartialResult(sctx sessionctx.Context, rowsInGroup []chunk.Row, pr PartialResult) (memDelta int64, err error) { p := (*partialResult4Count)(pr) for _, row := range rowsInGroup { _, isNull, err := e.args[0].EvalInt(sctx, row) if err != nil { return 0, err } if isNull { continue } *p++ } return 0, nil } func (e *countOriginal4Int) Slide(sctx sessionctx.Context, rows []chunk.Row, lastStart, lastEnd uint64, shiftStart, shiftEnd uint64, pr PartialResult) error { p := (*partialResult4Count)(pr) for i := uint64(0); i < shiftStart; i++ { _, isNull, err := e.args[0].EvalInt(sctx, rows[lastStart+i]) if err != nil { return err } if isNull { continue } *p-- } for i := uint64(0); i < shiftEnd; i++ { _, isNull, err := e.args[0].EvalInt(sctx, rows[lastEnd+i]) if err != nil { return err } if isNull { continue } *p++ } return nil } type countOriginal4Real struct { baseCount } func (e *countOriginal4Real) UpdatePartialResult(sctx sessionctx.Context, rowsInGroup []chunk.Row, pr PartialResult) (memDelta int64, err error) { p := (*partialResult4Count)(pr) for _, row := range rowsInGroup { _, isNull, err := e.args[0].EvalReal(sctx, row) if err != nil { return 0, err } if isNull { continue } *p++ } return 0, nil } func (e *countOriginal4Real) Slide(sctx sessionctx.Context, rows []chunk.Row, lastStart, lastEnd uint64, shiftStart, shiftEnd uint64, pr PartialResult) error { p := (*partialResult4Count)(pr) for i := uint64(0); i < shiftStart; i++ { _, isNull, err := e.args[0].EvalReal(sctx, rows[lastStart+i]) if err != nil { return err } if isNull { continue } *p-- } for i := uint64(0); i < shiftEnd; i++ { _, isNull, err := e.args[0].EvalReal(sctx, rows[lastEnd+i]) if err != nil { return err } if isNull { continue } *p++ } return nil } type countOriginal4Decimal struct { baseCount } func (e *countOriginal4Decimal) UpdatePartialResult(sctx sessionctx.Context, rowsInGroup []chunk.Row, pr PartialResult) (memDelta int64, err error) { p := (*partialResult4Count)(pr) for _, row := range rowsInGroup { _, isNull, err := e.args[0].EvalDecimal(sctx, row) if err != nil { return 0, err } if isNull { continue } *p++ } return 0, nil } func (e *countOriginal4Decimal) Slide(sctx sessionctx.Context, rows []chunk.Row, lastStart, lastEnd uint64, shiftStart, shiftEnd uint64, pr PartialResult) error { p := (*partialResult4Count)(pr) for i := uint64(0); i < shiftStart; i++ { _, isNull, err := e.args[0].EvalDecimal(sctx, rows[lastStart+i]) if err != nil { return err } if isNull { continue } *p-- } for i := uint64(0); i < shiftEnd; i++ { _, isNull, err := e.args[0].EvalDecimal(sctx, rows[lastEnd+i]) if err != nil { return err } if isNull { continue } *p++ } return nil } type countOriginal4Time struct { baseCount } func (e *countOriginal4Time) UpdatePartialResult(sctx sessionctx.Context, rowsInGroup []chunk.Row, pr PartialResult) (memDelta int64, err error) { p := (*partialResult4Count)(pr) for _, row := range rowsInGroup { _, isNull, err := e.args[0].EvalTime(sctx, row) if err != nil { return 0, err } if isNull { continue } *p++ } return 0, nil } func (e *countOriginal4Time) Slide(sctx sessionctx.Context, rows []chunk.Row, lastStart, lastEnd uint64, shiftStart, shiftEnd uint64, pr PartialResult) error { p := (*partialResult4Count)(pr) for i := uint64(0); i < shiftStart; i++ { _, isNull, err := e.args[0].EvalTime(sctx, rows[lastStart+i]) if err != nil { return err } if isNull { continue } *p-- } for i := uint64(0); i < shiftEnd; i++ { _, isNull, err := e.args[0].EvalTime(sctx, rows[lastEnd+i]) if err != nil { return err } if isNull { continue } *p++ } return nil } type countOriginal4Duration struct { baseCount } func (e *countOriginal4Duration) UpdatePartialResult(sctx sessionctx.Context, rowsInGroup []chunk.Row, pr PartialResult) (memDelta int64, err error) { p := (*partialResult4Count)(pr) for _, row := range rowsInGroup { _, isNull, err := e.args[0].EvalDuration(sctx, row) if err != nil { return 0, err } if isNull { continue } *p++ } return 0, nil } func (e *countOriginal4Duration) Slide(sctx sessionctx.Context, rows []chunk.Row, lastStart, lastEnd uint64, shiftStart, shiftEnd uint64, pr PartialResult) error { p := (*partialResult4Count)(pr) for i := uint64(0); i < shiftStart; i++ { _, isNull, err := e.args[0].EvalDuration(sctx, rows[lastStart+i]) if err != nil { return err } if isNull { continue } *p-- } for i := uint64(0); i < shiftEnd; i++ { _, isNull, err := e.args[0].EvalDuration(sctx, rows[lastEnd+i]) if err != nil { return err } if isNull { continue } *p++ } return nil } type countOriginal4JSON struct { baseCount } func (e *countOriginal4JSON) UpdatePartialResult(sctx sessionctx.Context, rowsInGroup []chunk.Row, pr PartialResult) (memDelta int64, err error) { p := (*partialResult4Count)(pr) for _, row := range rowsInGroup { _, isNull, err := e.args[0].EvalJSON(sctx, row) if err != nil { return 0, err } if isNull { continue } *p++ } return 0, nil } func (e *countOriginal4JSON) Slide(sctx sessionctx.Context, rows []chunk.Row, lastStart, lastEnd uint64, shiftStart, shiftEnd uint64, pr PartialResult) error { p := (*partialResult4Count)(pr) for i := uint64(0); i < shiftStart; i++ { _, isNull, err := e.args[0].EvalJSON(sctx, rows[lastStart+i]) if err != nil { return err } if isNull { continue } *p-- } for i := uint64(0); i < shiftEnd; i++ { _, isNull, err := e.args[0].EvalJSON(sctx, rows[lastEnd+i]) if err != nil { return err } if isNull { continue } *p++ } return nil } type countOriginal4String struct { baseCount } func (e *countOriginal4String) UpdatePartialResult(sctx sessionctx.Context, rowsInGroup []chunk.Row, pr PartialResult) (memDelta int64, err error) { p := (*partialResult4Count)(pr) for _, row := range rowsInGroup { _, isNull, err := e.args[0].EvalString(sctx, row) if err != nil { return 0, err } if isNull { continue } *p++ } return 0, nil } func (e *countOriginal4String) Slide(sctx sessionctx.Context, rows []chunk.Row, lastStart, lastEnd uint64, shiftStart, shiftEnd uint64, pr PartialResult) error { p := (*partialResult4Count)(pr) for i := uint64(0); i < shiftStart; i++ { _, isNull, err := e.args[0].EvalString(sctx, rows[lastStart+i]) if err != nil { return err } if isNull { continue } *p-- } for i := uint64(0); i < shiftEnd; i++ { _, isNull, err := e.args[0].EvalString(sctx, rows[lastEnd+i]) if err != nil { return err } if isNull { continue } *p++ } return nil } type countPartial struct { baseCount } func (e *countPartial) UpdatePartialResult(sctx sessionctx.Context, rowsInGroup []chunk.Row, pr PartialResult) (memDelta int64, err error) { p := (*partialResult4Count)(pr) for _, row := range rowsInGroup { input, isNull, err := e.args[0].EvalInt(sctx, row) if err != nil { return 0, err } if isNull { continue } *p += input } return 0, nil } func (*countPartial) MergePartialResult(sctx sessionctx.Context, src, dst PartialResult) (memDelta int64, err error) { p1, p2 := (*partialResult4Count)(src), (*partialResult4Count)(dst) *p2 += *p1 return 0, nil }
{ "pile_set_name": "Github" }
Description A delicious and flavoursome all-natural Japanese style teriyaki sauce made from raw coconut sap. The Coconut Company`s organic teriyaki sauce is derived from the raw sap of the flower blossom of the coconut tree, naturally fermented for 10 months without adulteration. A unique and tasty blend of coconut sap, coconut nectar and coconut vinegar with garlic, ginger and sea salt. It has a savoury, slightly sweet yet salty flavour. 100% natural, soy-free, gluten-free with less salt than other teriyaki sauces. This amazing sauce contains an abundance of vitamins and minerals as well as a host of dominant amino acids. The Coconut Company The Coconut Company is all about coconuts. Natural healthy living is at the heart of what they do. They work very closely with their farmer cooperatives and food processors to ensure products are of the very best quality. Raw, natural and organic.
{ "pile_set_name": "Pile-CC" }
Let’s say you wanted to invent a business model where the founders and bosses all get rich, the employees work like dogs for free, the products are remarkably flawed – and you wanted to do it on an enormous scale and impact about a billion people – here’s how you do it: Create a utopian notion called Web 2.0 where free software, digital collectivism, and user-generated content rule and everyone will somehow, magically, be better off. Promote terms like the democracy of data, wisdom of crowds, power of collaboration, empowerment of entrepreneurism, transparency of information, and the fairness of inclusion to get everyone excited. Provide free open-source programs like Linux and JavaScript so junk-food pounding geeks can sit home in their pajamas writing all sorts of buggy programs and apps that sell for less than the price of a cigarette lighter. Launch social media companies like Facebook (FB), Twitter, LinkedIn (LNKD), Pinterest, and YouTube that make billions in profits off user-generated content they don’t have to pay a penny to develop – not surprising since the vast majority of the content is of poor quality, completely false, or the dysfunctional ravings of people craving attention. Propagate the myth that anyone can be an entrepreneur so any loser with a computer and an Internet connection can quit his job at McDonald’s, call himself a CEO, and hang out in the bedroom he grew up in blogging and tweeting with open-source applications like WordPress and Firefox while sponging off his parents. Found a company that conquers and dominates the entire online world without doing evil – so say Google’s billionaire founders – by ensuring that anyone who wants to find or do anything on the Web gets blasted with ads paid for by small business owners who can’t afford to be buried beneath a thousand pages of search results. Ensure there is no possible way to contact an actual human being for support at Internet companies. And, should a user somehow manage to unlock the magic code for customer service, base the group in India or some other country where they can’t really understand or do anything about the problem. Which, of course, leaves the user to search for help online – bombarded by Google ads. Do all the heavy lifting – the movement and storage of billions of terabytes of data that’s emailed, posted, tweeted, and retweeted every day – in the cloud, a euphemism for enormous warehouses of rows and rows of server, network, and storage equipment that’s all made in China and requires shockingly few employees to manage. Generate enormous wealth for founders, executives, and investors without creating any real jobs except for software developers who are under 30. Generate enormous market capitalizations while employing a fraction of the number of people of comparable companies. (Google, for example, is valued at $290 billion and employs just 44,000 people. By contrast, Wells Fargo, GE, and IBM are all worth far less but have five to ten times the number of employees. Bring all the fabulously wealthy leaders in Silicon Valley together from time to time and work them into a groupthink frenzy over global warming and green energy. Use their political clout for environmental legislation and regulation of mainstream industries that aren’t deemed cool, resulting in a chilling affect on job growth and a higher cost of living for those who can least afford it. Create ludicrous hype around crowdfunding as some sort of panacea for would-be entrepreneurs and investors. Create the illusion that it somehow makes sense for people to throw their money away playing venture capitalist or for entrepreneurs to take on the myriad of risks and issues associated with raising capital in this manner. Accelerate the ever-growing gap between the haves and have-nots while fueling the misconception that tech is cool and all the big banking, energy, and pharmaceutical companies are the bad guys. If this sounds like the rant of a reactionary technophobe, nothing could be further from the truth. I’ve had an awesome career in the high-tech industry, live and work in Silicon Valley, and love this place. And I don’t mean to imply that any of this was premeditated with evil intent, but the reality is what it is. Speaking of which, I was inspired by Internet and virtual reality pioneer Jaron Lanier’s brilliant book, “You Are Not A Gadget.” Here’s an excerpt: “There's a dominant dogma in the online culture of the moment that collectives make the best stuff, but it hasn't proven to be true. The most sophisticated, influential and lucrative examples of computer code -- always turn out to be the results of proprietary development. “Actually, Silicon Valley is remarkably good at not making collectivization mistakes when our own fortunes are at stake. If you suggested that, say, Google, Apple and Microsoft should be merged so that all their engineers would be aggregated into a giant wiki-like project -- well you'd be laughed out of Silicon Valley so fast you wouldn't have time to tweet about it. “We're well over a decade into this utopia of demonetized sharing and almost everyone who does the kind of work that has been collectivized online is getting poorer. And it's going to get worse.”
{ "pile_set_name": "Pile-CC" }
NUMBER 13-13-00221-CV COURT OF APPEALS THIRTEENTH DISTRICT OF TEXAS CORPUS CHRISTI - EDINBURG IN RE PADRON PLUMBING, INC. On Petition for Writ of Mandamus. MEMORANDUM OPINION Before Justices Rodriguez, Garza, and Perkes Memorandum Opinion Per Curiam 1 Relator, Padron Plumbing, Inc., filed a petition for writ of mandamus and motion for temporary relief in the above cause on April 26, 2013. The Court granted the motion for temporary relief and requested that the real party in interest, Joe Williamson Construction Co. Inc. (“Williamson”), file a response to the petition. Williamson filed its response to the petition for writ of mandamus on May 15, 2013. Relator shortly thereafter notified this Court that the parties had reached an agreement to compromise and settle their differences in the underlying lawsuit. Relator has now filed an 1 See TEX. R. APP. P. 52.8(d) (“When denying relief, the court may hand down an opinion but is not required to do so.”); TEX. R. APP. P. 47.4 (distinguishing opinions and memorandum opinions). unopposed motion to dismiss this original proceeding on grounds that the parties have fully and finally compromised and settled all matters in controversy between them. The Court, having examined and fully considered “Relator’s Unopposed Motion to Voluntarily Dismiss Original Proceeding,” is of the opinion that the motion should be granted. Accordingly, the Court LIFTS the stay previously imposed by this Court, GRANTS “Relator’s Unopposed Motion to Voluntarily Dismiss Original Proceeding,” and DISMISSES this cause AS MOOT without reference to the merits thereof. Pending motions, if any, are likewise DISMISSED AS MOOT. See TEX. R. APP. P. 52.8(a). IT IS SO ORDERED. PER CURIAM Delivered and filed the 6th day of August, 2013. 2
{ "pile_set_name": "FreeLaw" }
.. doctest-skip-all .. _astroquery.wfau: ******************************** WFAU Queries (`astroquery.wfau`) ******************************** The Wide Field Astronomy Unit (WFAU; www.roe.ac.uk/ifa/wfau) hosts both the Vista Science Archive (VSA, :doc:`../vsa/vsa`) and the UKIDSS archive (:doc:`../ukidss/ukidss`). Please see the UKIDSS documentation pages for instructions and examples. Reference/API ============= .. automodapi:: astroquery.wfau :no-inheritance-diagram:
{ "pile_set_name": "Github" }
Background {#Sec1} ========== Obesity, defined as a body mass index (BMI) \> 30 kg/m^2^, has almost doubled since 1980, with more than 671 million people worldwide now classified as obese \[[@CR1], [@CR2]\]. Health problems associated with obesity impact on quality of life and impose a significant cost burden to health services. Being obese is associated with a higher frequency of cardiovascular disease \[[@CR3]\], of metabolic diseases such as type II diabetes mellitus \[[@CR4]\], of respiratory morbidity secondary to obstructive sleep apnoea (OSA) and obesity hypoventilation syndrome (OHS) \[[@CR5]\]. In Australia, health expenditures of those with a BMI between 30 and 35 kg/m^2^ are 19% higher than those of a normal-weight individual. This increases to 51% in those with a BMI \> 35 kg/m^2^ \[[@CR6]\]. Overall, the total financial cost of obesity is estimated to be 8.3 billion AUD \[[@CR7]\]. Obesity is difficult to treat. Diet, exercise and medications are only modestly effective in aiding weight loss \[[@CR8]\]. In selected individuals, bariatric surgery may offer a means of achieving long-term weight loss, improved health outcomes and a reduction in healthcare spending \[[@CR9]--[@CR11]\]. However, bariatric procedures are complicated by the additional risks associated with anaesthesia and surgery in the obese patient. Obesity and its associated co-morbidities, have been shown to increase the rate of post-operative myocardial infarction, peripheral nerve injury, wound and urinary tract infection and the requirement for re-intubation \[[@CR12]\]. The evidence that obesity increase the incidence of PPCs is mixed. A retrospective observational study by Baltieri et al. described a 37% prevalence of atelectasis in obese patients following bariatric surgery \[[@CR13]\]. Several studies have identified obesity as an independent risk factor for post-operative respiratory complications \[[@CR14]--[@CR17]\], while others have failed to find an association \[[@CR18]--[@CR20]\]. However, respiratory complications are not infrequent amongst the general surgical population and have been shown to increase hospital length of stay and mortality \[[@CR21]\]. Physiological and pathological changes that occur because of obesity adversely affect both lung mechanics and gas exchange. First, there is a reduction in total respiratory system compliance and an increase in airway resistance \[[@CR22], [@CR23]\]. Increased mass loading on the chest wall, cephalad displacement of the diaphragm and an increase in pulmonary blood flow contribute to this \[[@CR24], [@CR25]\]. Taken together, these changes lead to higher work of breathing \[[@CR22]\] and a tendency toward shallow, rapid tidal volumes (Vt) \[[@CR26]\]. Second, breathing at a lower Vt leads to a reduction in end expiratory lung volume (EELV) \[[@CR27]\], increasing the potential for atelectasis and ventilation/perfusion mismatching \[[@CR28], [@CR29]\]. The physiological alterations outlined above are further exacerbated when the patient is in the supine position and by general anaesthesia (GA), with functional residual capacity (FRC) falling by up to 50% on induction \[[@CR30]\]. This reduction persists longer into the post-operative period in obese compared to non-obese individuals \[[@CR16]\]. High flow nasal oxygen therapy {#Sec2} ------------------------------ High flow nasal oxygen (HFNO~2~) therapy was first shown to be an effective treatment for acute respiratory failure in the paediatric and neonatal populations \[[@CR31], [@CR32]\]. Recently, it has gained popularity as a therapy in adult patients, with an expanding list of clinical applications \[[@CR33]\]. High flow nasal cannulae (HFNC) are designed to deliver an air/oxygen blend at a predetermined fraction of inspired oxygen (FiO~2~). The heating and humidification of inspired gases allows for higher flow rates to be tolerated when compared to conventional oxygen delivery devices. Flow rates of up to 70 L/min can be achieved. The process of heating and humidification also reduces mucosal drying, improves muco-ciliary clearance and reduces energy expenditure and work of breathing \[[@CR34]\]. Higher flow rates reduce room air entrainment during inspiration and flush expired air from the upper airway during expiration, leading to the delivery of higher and more consistent FiO~2~ \[[@CR34]\]. There is additional evidence to suggest that the higher flow rates achievable with HFNC generate a degree of positive airway pressure, which increases end expiratory lung volume (EELV) and alveolar recruitment \[[@CR35], [@CR36]\]. Electrical impedance tomography {#Sec3} ------------------------------- Electrical impedance tomography (EIT) is a non-invasive, radiation-free, functional imaging modality \[[@CR37]\]. It uses changes in bio-impedance across lung tissue during the respiratory cycle to provide information on ventilation distribution, lung volumes, and regional lung mechanics \[[@CR38]\]. EIT has been successfully validated against several other imaging and measurement modalities and strong linear correlation between the change in end expiratory lung impedance (EELI) and the EELV has been described \[[@CR39]--[@CR42]\]. Rationale for the study {#Sec4} ----------------------- A rise in the incidence of obesity has resulted in a rapid escalation in the number of bariatric procedures being carried out worldwide. Obese patients undergoing surgery of any kind are at a higher risk of developing post-operative atelectasis secondary to the physiological and pathological changes outlined above. Study data from our group suggests that the use of HFNO~2~ when compared to low-flow oxygen devices significantly increases EELI (which in turn is associated with an increase in EELV). This relationship appears to be enhanced at higher BMIs. In the study of Corley et al., a mean increase in EELI of 1517 ± 46.6 units was associated with a reduction in respiratory rate, an increase in P/F ratio, and a reduction in a standardised dyspnoea score \[[@CR35]\]. We propose to carry out a randomised, controlled pilot study to evaluate the effects of post-operative HFNO~2~ therapy on EELV in the obese population undergoing laparoscopic weight reduction surgery. Data gathered will be used to explore the mechanism of action of HFNO~2~ therapy in this setting and to inform the design of a larger trial with a patient-centred primary outcome. Methods/design {#Sec5} ============== Objectives and design {#Sec6} --------------------- ### Research hypothesis {#Sec7} In obese adult patients undergoing laparoscopic bariatric surgery, prophylactic post-operative HFNO~2~ therapy will increase EELI and therefore EELV, improve respiratory function and reduce the incidence of PPCs. ### Study design {#Sec8} This is a prospective, un-blinded, single centre, randomised, controlled pilot study, with an allocation ratio of 1:1. This protocol has been designed in accordance with the Standardised Protocol Items: Recommendations for Interventional Trials (SPIRIT) guidelines and checklist \[[@CR43]\] (Additional file [1](#MOESM1){ref-type="media"}). A schedule for enrolment, intervention and assessment (SPIRIT figure) is outlined in Fig. [1](#Fig1){ref-type="fig"}.Fig. 1A schedule for enrolment, intervention and assessment (Standardised Protocol Items: Recommendations for Interventional Trials (SPIRIT) figure). HFNO~2~, high flow nasal oxygen; EIT, electrical impedance tomography; PaO~2~/FiO~2~, arterial partial pressure of oxygen/fraction of inspired oxygen; PaCO~2~, arterial partial pressure of carbon dioxide ### Study objectives {#Sec9} The primary objective of this study is to determine the effect of post-operative HFNO~2~ on EELV in obese patients undergoing bariatric surgery. The primary outcome measure is ∆EELI between baseline and 6 h post allocation. Secondary objectives are to determine the effect of HFNO~2~ on oxygenation and respiratory parameters, the incidence of PPCs, hospital length of stay and patient comfort. In addition, this study will provide important data (protocol feasibility, estimates of post-operative complications) and experience (consent and screening procedures, refining data collection processes), which will be used to design a large trial powered to detect differences in patient centred outcomes. ### Study setting {#Sec10} The OXYBAR study will take place at St Andrews War Memorial Hospital (SAWMH), Brisbane, Australia. The hospital provides tertiary level care in a 250-bed facility, with a 15-bed Intensive Care Unit (ICU). ### Sample size and study duration {#Sec11} This is a pilot study and as such no formal power calculation has been made. A convenience sample of 50 patients has been chosen based on anticipated recruitment rates and a feasible study duration. Given our institution's current workload, approximately two patients per week will meet the inclusion/exclusion criteria. Allowing for a 50% consent rate, and 10% loss to long-term follow up, recruitment could be completed in 54 weeks. Given the final follow up occurs 6 weeks post-operatively, data collection may be completed by week 60. Data analysis and write up of results will take an additional 12 weeks. Therefore, completion of the study is expected within an 18-month time frame. ### Allocation {#Sec12} Randomisation will be achieved using a computer-generated random number table, with an allocation ratio of 1:1. Allocation concealment will be maintained using sequentially numbered sealed opaque envelopes. Envelopes will be prepared by an independent person. Each envelope will contain a unique patient identifier code and will allocate the participant to either the intervention group (HFNO~2~) or the control group (standard oxygen therapy). Randomisation will occur post-operatively on admission to the ICU. The theatre team will be blinded to the allocation. Due to the research design, neither the individual collecting data nor the patient can be blinded to treatment allocation. Participants, interventions and outcomes {#Sec13} ---------------------------------------- ### Screening and consent {#Sec14} Patients opting to undergo laparoscopic surgery for weight reduction will be identified by the surgical team in the surgical outpatient clinic. Those that meet the eligibility criteria outlined in Table [1](#Tab1){ref-type="table"} will be given written information regarding the study at this time.Table 1Eligibility criteriaInclusion criteriaExclusion criteriaAge ≥ 18 yearsAge \< 18 yearsBMI ≥ 30 kg/m^2^Refusal to consentUndergoing a laparoscopic procedure for weight reductionAny contraindication to HFNO~2~Informed consent obtainedChest circumference too large for EIT beltSevere chronic lung diseasePreoperative hypoxia SpO~2~ \< 92%*BMI* body mass index, *HFNO*~*2*~ high flow nasal oxygen, *EIT* electrical impedance tomography, *SpO*~*2*~ peripheral oxygen saturation On the morning of surgery, patients will be approached by a member of the study team and informed written consent will be sought. The right of the patient to refuse to participate without giving reasons will be respected. All participants are free to withdraw at any time from the study without giving a reason and without prejudicing further treatment. ### Pre-operative management {#Sec15} Pre-operative management of the patients in both groups will be consistent with current surgical best practice and at the discretion of the responsible surgeon. The study period will begin after informed consent is secured. ### Intra-operative management {#Sec16} The method and conduct of general anaesthesia will be at the discretion of the responsible anaesthetist. Given the nature of the surgery all patients will undergo endotracheal intubation and mechanical ventilation. When deemed appropriate by the anaesthetist, all patients will be extubated in theatre and receive supplemental oxygen at a flow rate of 6 L/min, via a Hudson mask. They will then be transferred to the ICU. On arrival in the ICU all patients will have a baseline EIT file recorded and an arterial blood gas sample will be taken (if an arterial line is present). Patients will then be randomised to either the control or intervention arm. It is not expected that intra-operative management of recruited patients will differ significantly between study groups as all surgeries and GAs will be performed by a single surgeon (PL) and one of two anaesthetists (DF and IR). ### Control group {#Sec17} The control group will continue to receive supplemental oxygen. Oxygen will be titrated to maintain peripheral oxygen saturations (SpO~2~) ≥ 95%. If, after an initial period of stabilisation in the ICU, patients consistently achieve or exceed the SpO~2~ target, therapy may be titrated downwards (including the use of conventional nasal cannulae). A minimum of 2 L/min of supplemental oxygen will be maintained for the duration of the study period. ### Intervention group {#Sec18} Patients will be managed with supplemental oxygen delivered via HFNC (Airvo™ 2, Fisher & Paykel, New Zealand) at an initial FiO~2~ of 0.5 and a flow rate of 50 L/min. Oxygen therapy will then be titrated to maintain SpO~2~ ≥ 95%. A constant flow rate of 50 L/min will be maintained for the duration of the study period. ### Outcome measures {#Sec19} Primary and secondary outcome measures are summarised in Table [2](#Tab2){ref-type="table"}. The primary outcome measure is ∆EELI from baseline to 6 h post-return to ICU.Table 2Summary of primary and secondary outcome measuresPhaseOutcome measureTimingDay 0Change in end expiratory lung impedance (∆EELI)6 hPrimary outcomeDay 0Change in end expiratory lung impedance (∆EELI)15 min, 60 min, and 3 hSecondary outcomesChange in Tidal impedance variation (∆VARt)0, 60 min, 3 h, and 6 hChange in oxygenation (PaO~2~/FiO~2~)Change in arterial CO~2~ (PaCO~2~)Change in respiratory rateChange in modified Borg dyspnoea scoreRequirement for escalation of O~2~ therapyDischargeLength of ICU stayDay 2--3Re-admission to ICULength of hospital stayDiagnosis of a respiratory complicationFollow upHospital re-admissionWeek 6Diagnosis of a respiratory complication*EELI* end expiratory lung impendence, *PaO*~*2*~*/FiO*~*2*~ arterial partial pressure of oxygen/fraction of inspired oxygen; *PaCO*~*2*~ arterial partial pressure of carbon dioxide Data collection, quality and management {#Sec20} --------------------------------------- ### Time points {#Sec21} Pre-operative refers to the period after recruitment, but before surgery and before randomisation. Pre-operative data collected include:Patient demographics (age, gender, height and weight)Modified Borg dyspnoea score of 0 = no dyspnoea to 10 = maximal dyspnoea \[[@CR44]\]Co-morbidity data (including smoking history)Baseline physiological parameters (heart rate, blood pressure, respiratory rate, peripheral oxygen saturation) Baseline refers to the period after surgery and before randomisation. All patients will return from theatre after being extubated by the responsible anaesthetist and after receiving 6 L/min of 0~2~ via a Hudson mask. Baseline data collected include:EIT file recordingArterial blood gas analysis▪ Arterial partial pressure of oxygen (Pa0~2~)▪ Arterial partial pressure of carbon dioxide (PaC0~2~)▪ Calculated Pa0~2~/Fi0~2~ ratioPhysiological parameters (as above)Modified Borg dyspnoea score (as above)Pain score▪ Numerical scale where 0 = no pain and 10 = maximal painOperative data▪ Type of operation preformed▪ Duration of operation▪ Any related complicationsGeneral anaesthesia data▪ Type of anaesthesia administered▪ Amount of analgesia given▪ Any related complications After baseline data have been recorded, randomisation will occur - T0 refers to this point. T15, T60 and T3 refer to 15 min, 60 min, and 3 h after T0, respectively. Data collected include:EIT file recordingArterial blood gas analysisPhysiological parametersModified Borg dyspnoea scorePain score T6 refers to 6 h after T0. Data collected include all data from the above time point in addition to:Data on clinical course, need for oxygen titration or escalation of therapy Discharge refers to the day of discharge from the hospital. Discharge data collected include:Hospital length of stayPhysiological parametersData on clinical course, need for oxygen titration or escalation of therapyICU re-admissionData on the incidence of PPCs PPCs are defined in this study as any pulmonary abnormality, disease or dysfunction that adversely affects the clinical course of a patient in the post-operative period. This includes mild, moderate or severe respiratory failure, acute respiratory distress syndrome (ARDs) new onset bronchospasm, new pulmonary infiltrates on chest x-ray, pulmonary infection and the presence of new plural effusions, atelectasis, cardiopulmonary oedema or pneumothorax \[[@CR45]\]. Six weeks refers to follow up post discharge at the surgical outpatient clinic. Six-week data collected include:Need for hospital re-admissionAny respiratory complications requiring medical intervention ### EIT data measurement {#Sec22} EIT measurements will be performed with the PulmoVista® 500 (Dräger Medical, Lubeck, Germany). Discreet files will be acquired over a 5-min period, with a frame rate of 20 frames/second. Files will be automatically saved to the device hard drive. Analysis will take place off-line using Dräger review software V5.1 and then downloaded using Microsoft Excel (Microsoft, Redmond, USA). All EIT measurements will be recorded with the patient in bed inclined to 30--45°. EIT belt placement will be standardised to the 4th--5th intercostal space, below the breast tissue where appropriate. Belt position will be marked with surgical ink to ensure minimal displacement between readings. ### Data recording {#Sec23} Clinical data will be recorded at the intervals described above. For routinely collected clinical data hospital notes and charts will be the source documents. For study-specific data the case report form (CRF) will be the source document. ### Data quality {#Sec24} The Chief Investigator (CI)/Study Lead (SL) will provide training to site staff on trial processes and procedures. CRF completion and data collection will be the responsibility of the SL and designated team members. The clinical data management process will be governed by internal standard operating procedures (SOPs), designed to ensure adherence to International Conference on Harmonisation Good Clinical Practice (ICH GCP) guidelines. Statistical methods {#Sec25} ------------------- All analyses will be undertaken by an independent biostatistician. The statistician will be blinded to treatment allocation. Analysis will be undertaken on an intention-to-treat basis. Continuous data will be checked for normality and presented as mean (standard deviation) or median (interquartile range). Categorical data will be presented as counts (percentages). Where data are continuous, they will be compared using Student's *t* test or the Mann-Whitney U test as appropriate. Categorical variables will be compared using the chi-squared test. All tests will be two-tailed, and a *p* value \<0.05 will be considered significant. For the primary outcome measure, change in EELI, a mixed-effects regression model will be used. The modelling methodology will follow that used in our previous trial of HFNO~2~ therapy \[[@CR35]\]. Adverse events (AE) and serious adverse events (SAE) {#Sec26} ---------------------------------------------------- AEs and SAEs will be monitored and reported to the Human Research Ethics Committee (HREC). The AE reporting period for the trial begins at randomisation and ends 48 h after randomisation. The CI or their delegated investigator is responsible for recording and reporting of AEs observed during the study period. Events occurring because of the patient's underlying condition will not be reported as an AE. The CI must assess severity, seriousness, causality and expectedness of any AEs in keeping with regulatory requirements. All events meeting the definition of an SAE should be notified to the CI within 24 h of occurrence. Follow-up information should be sought and submitted as it becomes available. The follow-up information should describe whether the event has resolved or persists, if and how it was treated and whether the patient continues in the study or has been withdrawn from treatment. Once received, seriousness, causality and expectedness will be confirmed by the CI (or delegated SL). SAEs will be notified to the Research Ethics Committee (REC) within 72 h. Discussion {#Sec27} ========== HFNO~2~ has become more accessible in recent years and is now commonplace in the ICU, emergency departments and operating theatres. HFNO~2~ therapy is minimally invasive, safe and has few contraindications. We aim to test the hypotheses that respiratory support, in the form of HFNO~2~, leads to an increase in EELV, conferring a reduction in the incidence and duration of post-operative atelectasis. HFNO~2~ provides a degree of positive airway pressure, which may aid alveolar recruitment and prevent de-recruitment \[[@CR35], [@CR36]\]. Corley et al. showed a significant increase in EELV in patients with respiratory compromise, treated with HFNO~2~, following cardiac surgery. This increase in EELV was greater in those with a higher BMI, suggesting a benefit in this cohort. Trial recruitment began in April 2017 at St Andrews War Memorial Hospital, Brisbane and is anticipated to be completed by the end of April 2018. We aim to publish the results as a single manuscript. It is anticipated that the results of this study will be used to inform the operational design and feasibility of a larger randomised controlled trial. Trial status {#Sec28} ------------ This trial is ongoing and actively recruiting. Date recruitment started, 3 April 2017. Date of anticipated completion, 31 June 2018. Additional file =============== {#Sec29} Additional file 1:SPIRIT 2013 checklist: recommended items to address in a clinical trial protocol and related documents. (DOCX 41 kb) AE : Adverse event AUD : Australian dollar BMI : Body mass index CI : Chief Investigator CRF : Case report form EELI : End expiratory lung impendence EELV : End expiratory lung volume EIT : Electrical impendence tomography FiO~2~ : Fraction of inspired oxygen GA : General anaesthesia HFNC : High flow nasal cannulae HFNO~2~ : High flow nasal oxygen ICU : Intensive care unit OHS : Obesity hypoventilation syndrome OSA : Obstructive sleep apnoea PaO~2~, : Arterial partial pressure of oxygen SAE : Serious adverse event SL : Study Lead SOPs : Standard operating procedures SPIRIT : Standardised Protocol Items: Recommendations for Interventional Trials SpO2 : Peripheral oxygen saturation Vt : Tidal volume **Electronic supplementary material** The online version of this article (10.1186/s13063-018-2777-2) contains supplementary material, which is available to authorized users. Funding {#FPar1} ======= Wesley Medical Research, Patient Outcome Research Committee. Funding toward research nurse salary costs. Availability of data and materials {#FPar2} ================================== The datasets generated and analysed during this study will be available from the corresponding author on reasonable request. RF, JM and JF conceived of the original study and design. AC was a major contributor to the study design. MS, HJ, DF, IR, JT, PL and SL were involved in study design and participate in conducting the study. MS and HJ are responsible for data collection and recording. RF was responsible for preparing the manuscript. All authors have read and approved the final manuscript. Ethics approval and consent to participate {#FPar3} ========================================== Ethical approval for this study has been sought and granted by the UnitingCare Health and Human Research Ethics Committee. (HREC). Date of approval, 21 February 2017. Reference number UCH/HERC/1709. The study will be conducted in accordance with the ethical principles originating in the Declaration of Helsinki, those in the National Health and Medical Research Councils National Statement on Ethical Conduct in Human Research and the Australian Code for the Responsible Conduct of Research. Written informed consent is obtained from all patients prior to participation in this study. Consent for publication {#FPar4} ======================= Not applicable. Competing interests {#FPar5} =================== JF has provided consultancy services to Fisher & Paykel Healthcare (FHP). FHP are not involved in the commission, design or analysis of this study. Publisher's Note {#FPar6} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
{ "pile_set_name": "PubMed Central" }
Ruff wasn’t made available for comment following the diagnosis, but the Sabres reported he would be back at practice on Tuesday. Buffalo’s next game is on Wednesday at the First Niagara Center against Boston. The collision occurred when Leopold got tangled with Ville Leino and lost his balance, sliding to the ice and clipping Ruff from behind, taking the coach’s legs out. Ruff went airborne and landed hard on the ice, letting out a very audible scream that alerted those in attendance. “I lost my breath,” Leopold said. “I was looking back and I kind of yelled, ‘Are you all right? Are you all right?’ Right away, ‘No.’ That wasn’t a good thing.”
{ "pile_set_name": "Pile-CC" }
Ruling on studying the books of the People of the Book for the purpose of da‘wah (calling them to Islam), and the ruling on studying comparative religion. Question What ruling on studying the books of the People of the Book for the purpose of da‘wah (calling them to Islam), and the ruling on studying comparative religion? Answer Praise be to Allah. Firstly: The Torah and Gospel were originally from Allah, may He be exalted, and we are obliged to believe in them because Allah, may He be exalted, says (interpretation of the meaning): “Say (O Muslims), ‘We believe in Allah and that which has been sent down to us and that which has been sent down to Ibraaheem (Abraham), Ismaa‘eel (Ishmael), Ishaaq (Isaac), Ya‘qoob (Jacob), and to Al-Asbaat (the twelve sons of Ya‘qoob (Jacob)), and that which has been given to Moosa (Moses) and ‘Eesa (Jesus), and that which has been given to the Prophets from their Lord. We make no distinction between any of them, and to Him we have submitted (in Islam)’” [al-Baqarah 2:136] “O you who believe! Believe in Allah, and His Messenger (Muhammad (blessings and peace of Allah be upon him)), and the Book (the Quran) which He has sent down to His Messenger, and the Scripture which He sent down to those before (him), and whosoever disbelieves in Allah, His Angels, His Books, His Messengers, and the Last Day, then indeed he has strayed far away” [an-Nisa’ 4:136]. But the Torah and Gospel were subjected to distortion and changes. Allah, may He be exalted, says (interpretation of the meaning): “Then woe to those who write the Book with their own hands and then say, "This is from Allah," to purchase with it a little price! Woe to them for what their hands have written and woe to them for that they earn thereby” [al-Baqarah 2:79]. Because of this distortion and the mixing of truth with falsehood in these two Scriptures, it is prohibited to study them. It was narrated from Jaabir ibn ‘Abdullah (may Allah be pleased with him) that ‘Umar ibn al-Khattaab (may Allah be pleased with him) came to the Prophet (blessings and peace of Allah be upon him) with some written material he had got from one of the people of the Book. He read it to the Prophet (blessings and peace of Allah be upon him), and he got angry and said: “Are you confused (about your religion), O son of al-Khattaab? By the One in Whose hand is my soul, I have brought it (the message of Islam) to you clear and pure. Do not ask them about anything, lest they tell you something true and you disbelieve it, or they tell you something false and you believe it. By the One in Whose hand is my soul, if Moosa were alive, he would have no option but to follow me.” Narrated by Ahmad (14736); classed as hasan by al-Albaani in Irwa’ al-Ghaleel, 6/34 Al-Haafiz Ibn Hajar (may Allah have mercy on him) said, after mentioning the isnaads of this hadith: These are all the isnads of this hadith; even though it does not reach such a standard that it may be relied upon as evidence, when they are all taken into consideration, this implies that there is a basis for this report. End quote from Fath al-Baari (13/525) Moreover, the truth that we have in the Holy Qur’an means that there is no need for whatever truth may be in the Torah and Gospel. Allah, may He be exalted, says (interpretation of the meaning): “Is it not sufficient for them that We have sent down to you the Book (the Quran) which is recited to them? Verily, herein is mercy and a reminder (or an admonition) for a people who believe” [al-‘Ankaboot 29:51]. Ibn Taymiyah (may Allah have mercy on him) said: Because the Qur’an is the best of speech, they were prohibited to follow anything else. Allah, may He be exalted, says (interpretation of the meaning): “Is it not sufficient for them that We have sent down to you the Book (the Quran) which is recited to them? Verily, herein is mercy and a reminder (or an admonition) for a people who believe” [al-‘Ankaboot 29:51]. An-Nasaa’i and others narrated from the Prophet (blessings and peace of Allah be upon him) that he saw a page of the Torah in the hand of ‘Umar ibn al-Khattaab (may Allah be pleased with him). He said: “If Moosa were alive, and you were to follow him and leave me, you would go astray.” According to another report: “… he would have no option but to follow me.” According to another version: The face of the Prophet (blessings and peace of Allah be upon him) changed when ‘Umar showed that to him, and one of the Ansaar said to him: O son of al-Khattaab, do you not see the face of the Messenger of Allah (blessings and peace of Allah be upon him)? ‘Umar said: I am content with Allah as my Lord, Islam is my religion, and Muhammad as my Prophet. Hence the Sahaabah forbade the study of any book other than the Qur’an. End quote from Majmoo‘ al-Fataawa (17/41-42) Hence Ibn ‘Abbaas (may Allah be pleased with him) used to say: How can you ask the people of the Book about anything, when your Book that was revealed to the Messenger of Allah (blessings and peace of Allah be upon him) is more recent, and you read it pure and not tampered with? And He has told you that the People of the Book altered the Book of Allah and changed it, and they wrote the Book with their own hands, and said that it is from Allah, to purchase with it a little price. Does not the knowledge that has come to you forbid you to ask them about anything? No, by Allah, we have not seen any man among them ask you about that which was revealed to you. Narrated by al-Bukhaari (7363). Moreover, focusing on the Torah and Gospel is a distraction from that which will benefit the Muslim with regard to his Hereafter. Al-Qurtubi (may Allah have mercy on him) said: If the one who reads it – namely the Qur’an – will have a tenfold reward or more for each letter, according to what we mentioned in the introduction to this book, then turning away from it and towards other Books is misguidance and loss, and it is a bad deal and waste of time. End quote from al-Jaami‘ li Ahkaam al-Qur’an (16/37 8) Secondly: Based on the above, the scholars (may Allah have mercy on them) are of the view that those who study these books – the books of the Jews and Christians – may be divided into two groups: -1- The first group is ordinary people, those who have no knowledge and those who are weak in faith. They are not allowed to study these books so that they will not be confused by that which has been introduced into them of falsehood, and so that they will not be distracted by something that is of no benefit. Al-Haafiz Ibn Hajar (may Allah have mercy on him) said: With regard to this matter, it is important to note that in the case of those who are not well-versed in knowledge and are lacking in faith, it is not permissible for them to read any of those books. End quote from Fath al-Baari (13/525) With regard to this group – ordinary people and those who come under the same heading, or those who seek to benefit in spiritual terms from those books – these are the ones who the scholars stated should not be allowed to read the Torah and Gospel. It says in Mataalib Ooli an-Nuha (1/607): It is not permissible to study the books of the people of the Book, based on textual evidence, because the Prophet (blessings and peace of Allah be upon him) got angry when he saw ‘Umar (may Allah be pleased with him) carrying a page of the Torah. … And they should not read books that contain both truth and falsehood, or narrate what they learn from them, because that may be detrimental to belief. End quote. An-Nawawi (may Allah have mercy on him) said: The books of the Torah and Gospel are among the things that it is prohibited to seek benefit therein, because they changed and altered them. End quote from Rawdat at-Taalibeen (10/259) Shaykh ‘Abd al-‘Azeez ibn Baaz (may Allah have mercy on him) said: Every Muslim is obliged to believe in them and that they (originally) came from Allah: the Torah, the Gospel and the Psalms (Zaboor). So he believes that Allah sent down the Books to the Prophets, and He sent down to them Scriptures containing commands and prohibitions, exhortation and reminders, stories of some events in the past, descriptions of Paradise and Hell, and so on. But he should not read them, because distortions, alterations and changes have been introduced into them. So he should not keep copies of the Torah, Gospel or Psalms, or read them, because doing that is risky, as it may lead to him disbelieving something that is true or believing something that is false. That is because these books have been distorted and changed, and those Jews, Christians and others have introduced alterations and distortions into them, changing the order of things in some cases. Allah has given us a great Book which means that we have no need of them, namely the Holy Qur’an. End quote from Fataawa Noor ‘ala ad-Darb (1/9) Shaykh Ibn ‘Uthaymeen (may Allah have mercy on him) was asked: is it permissible for a Muslim to keep a copy of the Gospel in order to find out what Allah said to His slave and Messenger ‘Eesa (peace be upon him)? He replied: It is not permissible to keep anything of the Scriptures that came before the Qur’an, be it the Gospel, Torah or anything else, for two reasons: 1. because everything in them that is beneficial Allah, may He be glorified and exalted, has explained it in the Holy Qur’an; 2. there is no need for any of these books because we have the Qur’an. Allah, may He be exalted, says (interpretation of the meaning): “It is He Who has sent down the Book (the Quran) to you (Muhammad SAW) with truth, confirming what came before it” [Aal ‘Imraan 3:3] and “And We have sent down to you (O Muhammad (blessings and peace of Allah be upon him)) the Book (this Quran) in truth, confirming the Scripture that came before it and Muhayminan (trustworthy in highness and a witness) over it (old Scriptures). So judge between them by what Allah has revealed” [al-Maa’idah 5:48]. Whatever of good there is in the previous scriptures is also to be found in the Qur’an. With regard to the questioner saying that he wants to find out what Allah said to His slave and Messenger ‘Eesa, we can find what is most beneficial of that in what Allah has told us in the Qur’an, so there is no need to look elsewhere. Moreover, the Gospel as it exists at present has been distorted. The evidence for that is that there are four Gospels which differ from one another; there is not one single Gospel, therefore it cannot be relied upon. End quote from Majmoo‘ Fataawa wa Rasaa’il Ibn ‘Uthaymeen (1/32-33) -2- The second category of people is those who are well versed in knowledge, who use these books to debate with the Jews and Christians, and to establish proof against them. In this case the fear of confusion is less, because the one who is well versed in knowledge has the ability to recognise the falsehood that has been introduced into these books and to be cautious of it, and to refute it and warn others against it. Moreover, by refuting the people of the Book and their falsehood, he is serving an important shar‘i interest that must be served. Hence many scholars read these books for the purpose of debating with the Jews and Christians. Among the most famous of those who refuted the Jews and Christians by quoting their own books to them were: Ibn Taymiyah, in his book al-Jawaab as-Saheeh liman baddala Deen al-Maseeh (The Correct Response to those who altered the Religion of the Messiah); Ibn al-Qayyim in his book Hidaayat al-Hayaara fi Ajwibat al-Yahood wa’n-Nasaara (Guiding to the Confused in Refuting the Jews and Christians); Ibn Hazm in his book al-Fasl fi’l-Milal wa’l-Ahwa’ wa’n-Nahl (Discussion of the Views of Different Religions, Groups and Sects); al-Qurtubi in his book al-I‘laam bima fi Deen an-Nasaara min al-Fasaad wa’l-Awhaam (Highlighting what the Religion of the Christians contains of Corruption and Myths); and many others. Al-Haafiz Ibn Hajar (may Allah have mercy on him) said: … unlike the one who is well versed in knowledge. For him it is permissible to read in the Torah and Gospel, especially when he needs to refute an opponent. This is indicated by the fact that the imams (leading scholars), both in the past and more recently, quoted from the Torah to prove to the Jews that they should believe in Muhammad (blessings and peace of Allah be upon him) on the basis of what they found in their book. If they did not believe that it was permissible to read it, they would not have done that and persisted in doing so, generation after generation. End quote from Fath al-Baari (13/525-526) Ibn Taymiyah (may Allah have mercy on him) said: If it so happens that there are some of the people of the Book who convert to Islam, and they have knowledge of what they have in their language and can translate it to us in Arabic, that may be useful when debating with the Jews and Christians or talking to them, as ‘Abdullah ibn Salaam, Salmaan al-Faarisi, Ka‘b al-Ahbaar and others did; they transmitted what they had of knowledge. In that case we may quote what they have that is in harmony with what the Messenger brought, and that will be proof against them in some ways and against others in other ways, as we have explained elsewhere. End quote from Majmoo‘ al-Fataawa (4/109-110) In Mataalib Ooli an-Nuha (1/607-608), which is a Hanbali book, it says: The idea of it being permissible to read in the books of the innovators may be applicable for one who is well versed in the Qur’an and Sunnah, if he is also very steadfast, strong in faith, smart and alert, very intelligent, and able to derive evidence in order to refute them, discover their secrets and expose them, so that ignorant people will not be taken in by their deceiving arguments and thus become confused. This was done by leading scholars among the best of the Muslims, and they presented strong arguments against the innovators that the latter could not find an answer to. Similarly, they looked in the Torah and found in it mention of our Prophet in many locations; the permissibility of looking in their Book is also applicable in that case. End quote. The Standing Committee for Academic Research and Issuing Fatwas was asked: what is the ruling on reading the Gospel? They replied: The earlier divinely revealed Books have been subjected to a great deal of distortion, additions and subtractions, as Allah has told us. Hence it is not permissible for the Muslim to read them and study them, unless he is one of those who are well versed in knowledge and wants to highlight the distortions and contradictions in those books. End quote from Fataawa al-Lajnah ad-Daa’imah – vol. 1 (3/311) Shaykh ‘Abd al-‘Azeez ibn Baaz (may Allah have mercy on him) said: It is permissible for the well versed scholar to read them in order to refute the opponents of Islam among the Jews and Christians, as the Prophet (blessings and peace of Allah be upon him) called for the Torah when the Jews denied the ruling of stoning, so that he could look at it, and after that they admitted it. The point is that the scholars who have knowledge of Islam may need to look at the Torah, Gospel or Psalms for an Islamic purpose, such as refuting the enemies of Allah, or highlighting the virtue of the Qur’an and what it contains of truth and guidance. As for the common folk and others like them, they should not do any such thing. Rather if they have anything of the Torah, Gospel or Psalms, they must bury it in a clean place or burn it, so that no one will be led astray by it. End quote from Fataawa Noor ‘ala ad-Darb (1/10) Shaykh Ibn ‘Uthaymeen (may Allah have mercy on him) said: As for the seeker of knowledge who has sufficient knowledge that enables him to distinguish truth from falsehood, there is nothing wrong with him learning about them – namely the Gospels – in order to refute what they contain of falsehood and establish proof against their followers. End quote from Majmoo‘ Fataawa wa Rasaa’il Ibn ‘Uthaymeen (1/33) To sum up, for the daa‘iyahs who call people to Allah, may He be exalted, to use the texts of the Torah and Gospel in order to refute the Jews and Christians and highlight their misguidance, this is something that is prescribed and is not an innovation. Rather it is a matter for which there is a basis in the Qur’an and Sunnah. Ibn Taymiyah (may Allah have mercy on him) said: If someone among them is disputing and wants to quote something to undermine the Qur’an on a textual or rational basis, such as quoting something from their books about the Prophets that is contrary to what was brought by Muhammad (blessings and peace of Allah be upon him), or is contrary to what Allah said in their Books, such as when they told the Prophet (blessings and peace of Allah be upon him) that Allah had commanded them to blacken the face of the adulterer, and not stone him, the Prophet (blessings and peace of Allah be upon him) and the believers were able to ask for the Torah and for a trustworthy translator who could read it and translate it into Arabic, such as ‘Abdullah ibn Salaam and others like him. When he said to their rabbi: “Lift up your hand and expose the verse of stoning,” the verse became visible, and the Prophet (blessings and peace of Allah be upon him) stoned the two Jewish adulterers, after having established proof against them from their own book that was in accordance with what Allah had revealed to him about stoning. Likewise, it is possible to read from a translation of it in order to learn what they have, via a trustworthy Muslim translator or those among us who know their language, as in the case of Zayd ibn Thaabit and others like him. … Hence Allah, may He be exalted, said (interpretation of the meaning): “All food was lawful to the Children of Israel, except what Israel made unlawful for himself before the Tawraat (Torah) was revealed. Say (O Muhammad (blessings and peace of Allah be upon him)): "Bring here the Tawraat (Torah) and recite it, if you are truthful” [Aal ‘Imraan 3:93]. Allah has instructed us to ask them to bring the Torah and recite it, if they are being truthful in quoting something that is contrary to that. For they used to “distort the Book with their tongues (as they read), so that you may think it is from the Book, but it is not from the Book” [Aal ‘Imraan 3:78], and “write the Book with their own hands and then say, ‘This is from Allah’” [al-Baqarah 2:79]. So they used to lie in what they said and what they wrote; hence a translation can only be accepted from one who is trustworthy. If one of them quotes a report from the previous Messengers as evidence for something that is contrary to the Qur’an, such as those who say that Moosa said, “Adhere to observance of the Sabbath so long as heaven and earth endure,” we can say to them: “In which book is this? Bring it (and show us).” For we know that this is not in their Books; rather it is nothing but a fabrication.
{ "pile_set_name": "Pile-CC" }
Tusculum, Potts Point Tusculum is a heritage-listed former residence and now offices at 1-3 Manning Street in the inner city Sydney suburb of Potts Point in the City of Sydney local government area of New South Wales, Australia. It was built from 1831 to 1837 to the design of John Verge for successful businessman Alexander Brodie Spark. It was then let to influential cleric William Broughton, the first and only Anglican Bishop of Australia and later inaugural Bishop of Sydney, from 1836 to 1851. It is owned today by the Historic Houses Trust of New South Wales. It was added to the New South Wales State Heritage Register on 2 April 1999. History History of the area In the 1830s the whole area from Potts Point to Kings Cross and up to Oxford Street was known as Darlinghurst- probably named in honour of Governor Ralph Darling (1824–31)'s wife, Eliza. The rocky ridge that extended inland from Potts Point was called Eastern or Woolloomooloo Hill from the early days of white settlement. The earliest grant of land on Woolloomooloo Hill was made to Judge-Advocate John Wylde in 1822. In 1830 Wylde sold six of his 11 acres on the Point to Joseph Hyde Potts, accountant to the Bank of New South Wales, after whom Potts Point is named. By the late 1820s Sydney was a crowded, disorderly and unsanitary town closely settled around the Rocks and Sydney Cove, with a European population of around 12000. Governor Darling was receiving applications from prominent Sydney citizens for better living conditions. The ridge of Woolloomooloo Hill beckoned, offering proximity to town and incomparable views from the Blue Mountains to the heads of Sydney Harbour. In 1828 Darling ordered the subdivision of Woolloomooloo Hill into suitable "town allotments" for large residences and extensive gardens. He then issued "deeds of grant" to select members of colonial society (in particular, his senior civil servants). The first seven grants were issued in 1828, with the other allotments formally granted in 1831. The private residences that were built on the grants were required to meet Darling's so-called "villa conditions" which were possibly determined and overseen by his wife, who had architectural skills. These ensured that only one residence was built on each grant to an approved standard and design, that they were each set within a generous amount of landscaped land and that, in most cases, they faced the town. By the mid-1830s the parade of "white" villas down the spine of Woolloomooloo Hill presented a picturesque sight, and was visible from the harbour and town of Sydney. History of Tusculum Ownership by Alexander Brodie Spark Tusculum was named by its original owner, Alexander Brodie Spark (1792-1856), after a town in the Alban Hills, 10 kilometres south-east of Rome where wealthy Romans built luxurious villas - that of Cicero being especially famous. The name of Spark's other property, "Tempe House" also has classical origins. The building of the house signified Spark's rise to good fortune during the 1820s. He arrived in Sydney as a free settler in 1823. His success in shipping and commerce meant that he was quickly accepted as an influential member of colonial society. Spark had received a literary education, which may account for the naming of his villa. His 1828 grant of over 9 acres was one of the few original grants made to a private citizen. John Verge's plan for Tusculum was approved by Governor Darling in 1830. Spark probably built it as an investment property, as he only lived there for a brief period. The villa was under construction from 1831-5. His failure to occupy it symbolised Spark's financial decline, the collapse of the Bank of Australia and the depression of the 1840s. Spark sent a plan of his proposed house to the Colonial Secretary on 1 June 1830, explaining that the plan had been prepared for some time, but that he had wanted to make it more "ornamental". This is 10 months prior to the first reference to Spark's house in John Verge's ledger. It is possible that Spark may have had the earlier plan prepared independently, and engaged Verge to assist in making it "more ornamental". John Verge's ledger records details of the commission from "Plans" in 1831 to "Details for Pilasters front door of" shortly before completion in 1836. Bishop William Broughton as a tenant Alterations were made in 1836 to suit its first tenant, Bishop William Broughton. The Broughtons made Tusculum a centre of hospitality and, after Government House, it was the most important domestic building in the colony. The Broughton papers contain several references to the unfinished state of the house when he moved in during 1836, and the alterations and improvements he undertook 'to bring the premises into a state of decency.' In Broughton's early years at Tusculum a garden was established - there are references to a kitchen garden, rose trees from England etc. In 1839 he had shelves put up for his library so that his books could be "released from captivity, and placed in security from damp and dust". An interesting letter from Emily Crawley (née Broughton) to Phoebe Boydell, dated 22 September 1850, describes the accommodation arrangements at Tusculum for the Conference of Australasian Bishops held in October that year. Bishop Broughton lived at Tusculum from 1836 to 1851 - for almost the full length of his episcopacy. He appears to have been occasionally unsettled by his accommodation, with numerous references in his letters to his desire to relocate. Broughton had difficulty in obtaining suitable alternative accommodation, and became resigned to the circumstances of Tusculum. Broughton took out another lease on the property for seven years in 1848 at £300 p.a. (letter to Coleridge, 16 February 1848) - 'lt is a sad, imperfect place and anything but episcopal in pretensions: but it is in a cheerful situation and good air, and answers my purposes tolerably well.' By 1843 there was a serious financial crisis in the colony, and the Darlinghurst grantees suffered. They pressed for the freedom to subdivide their land, and Sydney's first exclusive suburb opened up to investors. From the early 1850s, the Gold Rush boosted the economy, and interest in the land available at Darlinghurst grew. The first subdivisions occurred around the edges of the original grants, with blocks of a size that allowed other grand houses to be built and new streets formed. In the 1870s, heavy land taxes imposed by the administration of the Premier, Sir Henry Parkes, led to another wave of subdivisions of the original grants. The late 19th century saw the final demise of the grounds surrounding the original villas, and in some cases, the villas themselves. Broughton was no longer living at Tusculum in 1851, the year prior to his departure. Tusculum was then purchased by William Long. Ownership by William Long The authorship of the substantial alterations undertaken at Tusculum for William Long is not certain. It is likely that John F. Hilly may have been the architect. Hilly did a lot of work in the Potts Point, Darlinghurst and Woolloomooloo areas and owned a local quarry. The cast iron balustrade design on the verandahs at Tusculum is very similar to those at Fiona, Edgecliff (1864), Guntawang (1869–70) and the Prince of Wales Theatre (1863) all works of Hilly. Ownership, 1904 to 1983 Tusculum was auctioned on 21 October 1904. Lewis Edward Isaacs bid £3,750 for Lot 1 which included the house. Isaacs engaged the architect, John Burcham Clamp to undertake extensive alterations to the staircase and stair hall and a tender was let to Mr. John White. Tusculum was purchased by Orwell and Alfred Phillips in 1906. Orwell later purchased his brother's share in the property. It is likely that Burcham Clamp was also responsible for the Billiard Room addition. He did other work for the Phillips family (such as a house at Moss Vale, 1915). In the 1920s and 1930s, the original villas and the later grand 19th century residences were demolished to make way for blocks of flats, hotels and later, soaring towers of units. Today only 5 of the original 17 villas still stand, with the lost villas and other grand houses commemorated in the names of the streets of Potts Point, Darlinghurst and Kings Cross. Following its use as a serviceman's club during World War II and a private nursing home, the building fell into disrepair and was the subject of a compulsory resumption in 1983, being the first under the provisions of the (then) recently gazetted NSW Heritage Act 1977. Lease by the Royal Australian Institute of Architects Subsequently, the Royal Australian Institute of Architects (NSW Chapter) leased Tusculum for 99 years, on the condition that it will be responsible as custodian for the restoration and maintenance of the building and for making it available for public enjoyment. In addition, the NSW Government sold the freehold of the back section of the Tusculum site to the RAIA and the Heritage Council gave permission for a new building to be constructed adjoining the villa. The new building, which was the subject of a national competition, won by the architectural firm Levine & Durbach, houses the RAIA and subsidiary organisations, a 143-seat auditorium, and offices. The restored villa is used for meeting rooms, a gallery and for receptions. The two buildings operate as one complex, a combination of restored nineteenth century heritage and quality 1980s architecture. Clive Lucas, OBE, FRAIA, a prominent conservation architect and the leading authority on John Verge was commissioned by the RAIA to undertake the conservation work. The restoration is intended to evoke the early to mid Victorian period and was completed in 1987 in accordance with the "Draft Conservation Policy" in Reference 1. Both buildings were officially opened by the Premier of NSW on 11 March 1988. Description Tusculum is a large two storey Colonial Regency mansion designed by John Verge, built 1831-35. Constructed from stuccoed brickwork it is surrounded on three sides by a fine Classical two storey verandah of the Ionic order, probably built sometime in the 1870s. Cedar of interiors imported from Lebanon; marble for flooring and chimney pieces imported from Tusculum in Italy. High shuttered French doors open on the broad verandahs. Original low pitched slate roof is now covered with tiles. (Australian Heritage Commission, Register of the National Estate). Tusculum is one of the few remaining Regency houses remaining in Sydney. It is one of the few colonial houses to display the attributes of a villa with basement offices and stair. It was reported to be in very good condition as at 12 January 2005. It retains significant components of the original Verge design, with overlays of other periods particularly 1870s verandah rework and internal stair modifications dating to Edwardian times. Accretions removed in 1980s conservation work include fire-damage. Heritage listing The principal cultural significance of Tusculum is its use as a residence by William Grant Broughton, first Bishop of Australia from 1836 to 1847, (1847-1852, Bishop of Sydney), during almost the entire period of his episcopacy. After Government House, it assumed the status of the most important domestic building in the colony. Designed by the prominent architect, John Verge for entrepreneur A.B. Spark, it was one of the first villas to be erected on Woolloomooloo Hill, as part of an elaborate attempt by the Colonial Government to establish a prestigious enclave for the gentry in the 1830s. It has very strong historical and architectural associations with its contemporary neighbour Rockwall, also designed by Verge. This pair are among a handful of colonial villas to have survived. Apart from Bishop Broughton, the house is associated with many other prominent Sydney figures including Spark, a colonial merchant whose rapid rise and decline with the collapse of the Bank of Australia mirrored the depression of the 1840s. The house signified the rise to respectability of the emancipist and former publican, William Long and his son William Alexander Long (responsible for major alterations and additions in the 1860s), It was associated with the politician the Hon Henry Edward Kater; the prominent lawyer Sir James Martin, the Lord Mayor of Sydney Sir William Manning and Orwell Phillips. It is one of the few colonial houses in Sydney to display the attributes of a villa, with basement work areas and stair, demonstrating the "upstairs/downstairs" nature of domestic administration, typical of nineteenth century English houses. It is an excellent example of the transformation of a Regency villa of high architectural quality into a mid-Victorian Italianate mansion. Tusculum was listed on the New South Wales State Heritage Register on 2 April 1999 having satisfied the following criteria. The place is important in demonstrating the course, or pattern, of cultural or natural history in New South Wales. Designed by the famous architect John Verge, Tusculum is one of the finest Regency mansions in Sydney remaining from the early Colonial period. It was built between 1831-35 for wealthy merchant A B Spark but its first occupant was Bishop Broughton, first Bishop of Australia. The building retains important historical associations with many famous people of the early Colonial era. Together with its neighbour "Rockwall", also by John Verge, Tusculum was one of the first villas built on Woolloomooloo Hill as part of the Colonial Government's attempt to establish a prestigious enclave for the gentry in the 1830s. It retains strong historical and architectural associations with Rockwall, one of the few other colonial villas to have survived. The place is important in demonstrating aesthetic characteristics and/or a high degree of creative or technical achievement in New South Wales. A building of elegant detail and proportion, Tusculum retains strong associations with Rockwall, as two related works by the one architect in the same locale. Tusculum is one of the few colonial houses to display the attributes of a villa, with basement service rooms and stair. It is an excellent example of the transformation of a Regency villa of high architectural quality into a mid-Victorian Italianate mansion. The place has a strong or special association with a particular community or cultural group in New South Wales for social, cultural or spiritual reasons. During its occupation by Bishop Broughton, it assumed the status of the most important domestic building in the colony, after Government House. As a social document, Tusculum demonstrates the "upstairs / downstairs" nature of domestic administration, typical of nineteenth century English houses. In its association with A B Spark, it symbolises a rise in his fortune in the 1820s, financial decline with the collapse of the Bank of Australia, through to the depression of the 1840s. It is the principal physical manifestation of the life of the emancipist William Long and his family whose occupation, alterations and substantial additions indicate his rise to fortune social acceptance as a merchant. Tusculum was one of a few buildings to achieve recognition in the early twentieth century as a residence of significance reflecting a growing maturity. Its resumption by the New South Wales Government was the first instance of the application of the provisions of the NSW Heritage Act, 1977 and indicates awareness and acceptance of the principles of heritage conservation. In the custody of the Royal Australian Institute of Architects NSW Chapter, Tusculum has been restored to evoke the early to mid-Victorian period. It is accessible to the public through public openings and through its use as a conference and meeting venue in association with the activities of the RAIA. The place has potential to yield information that will contribute to an understanding of the cultural or natural history of New South Wales. The site offers potential to explore the construction techniques and materials of Colonial Sydney and of later periods and as an example for comparative analysis of a rare villa design. The place possesses uncommon, rare or endangered aspects of the cultural or natural history of New South Wales. One of a handful of colonial villas and a rare surviving work of John Verge, a prominent architect of colonial times. See also Australian residential architectural styles References Bibliography Attribution External links Category:New South Wales State Heritage Register Category:Potts Point, New South Wales Category:Office buildings in New South Wales Category:Houses in New South Wales Category:Articles incorporating text from the New South Wales State Heritage Register
{ "pile_set_name": "Wikipedia (en)" }
Background {#Sec1} ========== Colorectal cancer (CRC) is one of the leading causes of cancer death. CRC alone accounts for more than 10% of all cancer cases worldwide, and is a heavy burden on human life and economy \[[@CR1], [@CR2]\]. It has been estimated that in total 1,800,977 cases occurred and 861,663 people died in 2018 \[[@CR2]\]. The current standard treatment of CRC, which has significantly improved overall survival (OS), includes surgery followed by adjuvant chemotherapy and in some cases in combination with targeted biologics. However, treatment outcome still remains undesirable. Histological diagnosis has shown valuable but insufficient prediction for prognosis of CRC patients. An increasing evidence proposes that the discovery and development of molecular biomarkers will accelerate the identification of potential high risk CRC patients and their prognostic evaluation. In the last ten years, genomic approaches were used to facilitate the systematic analysis of changes in RNA and protein expression associated with disease diagnosis and outcome \[[@CR3]\]. Long non-coding RNAs (lncRNAs) are newly discovered non-coding RNAs, which have received considerable attention recently in human cancers \[[@CR4]--[@CR6]\]. LncRNAs are defined by no less than 200 nucleotides in length that lack significant protein-coding capability \[[@CR7]\]. Despite of this, lncRNAs are believed to play an important role in regulating gene expression, contribute to multiple biological processes \[[@CR8], [@CR9]\]. A growing number of lncRNAs are found to be intimately associated with prognosis of patients such as HOTAIR in lung cancer \[[@CR10]\], DANCR in hepatocellular carcinoma \[[@CR11]\] and MALAT1 in different cancer types \[[@CR12]\]. A growing number of evidence suggests that the aberrant expressions of lncRNAs have been associated with CRC \[[@CR13]\]. According to a recent study on lncRNA RP11, upregulated expression of RP11 was associated with increased CRC risk and high possibility of metastasis \[[@CR14]\]. However, the research of prognosis-related lncRNA in CRC has not been extensively investigated. Therefore, establishing a prognostic lncRNA signature might be a promising strategy for the prognosis prediction of CRC patients. One vital challenge in searching prognostic lncRNAs is the availability of publicly available data sets, which should contain both lncRNA profiles and clinical prognostic information. RNA-seq is an extensive way to profile lncRNA expression. However, since the small sample size and the restricted access of raw data, applicable RNA-seq data sets of CRC are relatively limited. In contrast, there are a larger number of microarray profiles, including hundreds of CRC samples with clinical information. For example, 585 samples were included in the GSE39582 data set and 557 of them have disease free survival (DFS) time and status. In addition, MMR (mismatch repair), adjuvant chemotherapy, KRAS mutation and seven more clinical variables were included in this data set \[[@CR15]\]. Moreover, microarray based expression profiling may have better sensitivity for low-abundance transcripts \[[@CR16]\], which could benefit relative low expressed lncRNA screening \[[@CR17]\]. Although these original arrays are not designed for lncRNA profiling, previous studies have indicated that lncRNAs can be interrogated by mining the microarray raw data \[[@CR18]--[@CR20]\]. In the present study, we applied this method to re-annotate gene expression of lncRNAs on a data set of 557 patients from GSE39582, as well as another independent GSE17538 cohort. By using the sample-splitting method, Cox regression analysis and Robust likelihood-based survival modeling, we identified a prognostic, seven-lncRNA signature to evaluate the risk score from the GSE39582 training group patients, and validated it in the internal GSE39582 validation group and another independent external GSE17538 cohort. Patients with high risk score have relatively poor prognoses than those with low risk score, in both training and validation datasets. Materials and methods {#Sec2} ===================== CRC data sets {#Sec3} ------------- The purpose of this study was to identify a signature of lncRNAs that can be served as an effective prognostic marker for CRC patients. Data sets and corresponding clinical data were downloaded from the publicly available Gene expression Omnibus (GEO, NCBI, <http://www.ncbi.nlm.nih.gov/geo/>) \[[@CR21]\]. Two large cohorts of CRC microarray data from the Affymetrix Human Genome U133 plus 2.0 platform were included in this study: GSE39582 \[[@CR15]\] and GSE17538 \[[@CR22]\]. There were 585 and 244 CRC patients, respectively. The CRC samples in GSE39582 were randomly split into a training group (*N* = 279) and an internal validation group (*N* = 278). Moreover, the CRC samples in GSE17538 were analyzed as an external validation cohort. Data analysis of microarrays {#Sec4} ---------------------------- Raw microarray data were downloaded as CEL files from GEO and analyzed using "Oligo" package from R software. All analyses were performed as standard instructions and summarized briefly. Firstly, raw data were checked for quality to exclude any experimental artifacts. Then each microarray data set was normalized individually using Guanine Cytosine Robust Multi-Array Average method (GCRMA) \[[@CR23]\]. After background correction and normalization, expression values represented by multiple probes (or probe sets) were collapsed by taking the mean value of the set of probes. All the expression data and sample phenotypes were prepared for subsequent analysis. LncRNA profile annotation {#Sec5} ------------------------- LncRNA profiling on the Affymetrix-based GEO data sets was achieved by a well-established mining method \[[@CR20]\]. Briefly, the information for each lncRNA, incluing Ensembl ID, Ensembl transcript ID and symbol, was downloaded from the GENCODE database (release 19). Meanwhile, the Ensembl transcript ID and the RefSeq ID for lncRNAs were downloaded from the HGNC database. Finally, the symbols and RNA types for each probe were obtained by matching the two datasets. Probes matched more than one lncRNAs were discarded. For multiple probes matching one lncRNA, gene expression was summarized by computing the mean value of the probes to represent the expression level of single lncRNA. Conduction of the risk formula for prognostic prediction {#Sec6} -------------------------------------------------------- The risk score formula was constructed using the GSE39582 training group (*N* = 279). Firstly, by performing univariate Cox proportional hazards regression analysis with R package "survival", the association between the lncRNA expression and patient's DFS was assessed. LncRNA with a parametric *P* value of less than 0.01 was included in the subsequent analysis. Secondly, these significant lncRNAs were further evaluated with a permutation test using Biometric Research Branch-Array (BRB-Array) Tools, which calculated a permutation *P* value for each lncRNA based on 10,000 random permutations \[[@CR24]\]. LncRNA with a permutation *p* values of less than 0.01 was considered statistically significant. Next, lncRNAs that passed the above criteria were employed for subsequent analysis with robust likelihood-based survival modeling, by using "rbsurv" R package \[[@CR25]\]. The parameters involved were set as default except for the maximum number of gene, which was set as 20. To construct a predictive model, the selected lncRNAs were fitted into a multivariable Cox regression model in the training group as described \[[@CR26], [@CR27]\]. Then a risk formula was established based on a linear combination of the expression level of these lncRNAs, weighted by their regression coefficients derived from the multivariate Cox regression model \[[@CR26], [@CR27]\]. Finally, risk score was computed for each patient with this formula and patients were classified into high risk or low risk group, by taking the median risk score as a cutoff point. By using R package "survminer", Kaplan-Meier estimate was assessed to compare the survival difference between the high risk and low risk groups in each data set. The significance was calculated with the log-rank test and set at 0.05. To test whether the risk score was independent of clinical variables, multivariable Cox regression and stratification analysis were performed. All statistical analyses were carried out with the Bioconductor \[[@CR28]\] and R Version 3.5.1 (R Development Core Team 2018). Significance levels for *P* values were set at 0.05 unless indicated. ROC curve {#Sec7} --------- Receiver operating characteristic (ROC) curves were employed to compare the sensitivity and specificity of the survival prediction based on the risk score model. Time-dependent ROC of the risk score were analyzed by "tdROC" R package and visualized with "ggplot2" package. Gene set enrichment analysis (GSEA) {#Sec8} ----------------------------------- GSEA is a powerful computational algorithm that determines whether a pre-defined set of genes shows differences between two groups \[[@CR29]\]. GSEA was performed with the JAVA program (<http://software.broadinstitute.org/gsea/index.jsp>) against MSigDB C2 Reactome gene sets as described previously \[[@CR30]\]. Genes were ranked with the metric of absolute "signal to noise" value and 1000 random sample permutations were carried out. LncRNAs interaction networks {#Sec9} ---------------------------- Proteins and miRNAs interacted with these seven lncRNAs were searched in ENCORI, previously starBase v3.0 (The Encyclopedia of RNA Interactomes, <http://starbase.sysu.edu.cn/index.php>) with default parameters \[[@CR31]\]. Total 55 proteins were identified associated with 6 lncRNAs and 87 miRNAs were interacted with 3 lncRNAs. The networks were visualized with Cytoscape software (v3.7.2) \[[@CR32]\]. Results {#Sec10} ======= Data sets characteristics {#Sec11} ------------------------- The following two large cohorts of CRC microarray data obtained from GEO were included in this study: GSE39582 \[[@CR15]\] and GSE17538 \[[@CR22]\]. There were 585 and 244 CRC patients, respectively. After removal of samples without DFS data, each of 557 and 200 patients were included in our analysis. For Kaplan-Meier analysis, samples were filtered according to the corresponding clinical data, as shown in each figure. Samples in GSE39582 were randomly split into a training group (*N* = 279) and an internal validation group (*N* = 278). In addition, the CRC samples in GSE17538 served as an external validation data set. Additional file [1](#MOESM1){ref-type="media"}: Figure S1 summarizes the work flow of the entire experiment. Identification of seven lncRNAs for prognosis prediction in the training group {#Sec12} ------------------------------------------------------------------------------ After re-annotation, we got 3783 affymetrix probes for HGU133 plus 2.0 microarray. For each data set, 3005 unique lncRNAs were included in our study after standard data processing procedure. The training data set was used for the identification of prognostic lncRNA genes. Univariable Cox regression analysis was performed and a total of 104 lncRNAs correlated with DFS, whose parameter *P*-values were less than 0.01, were chosen for next analysis. By subjecting the 104 lncRNAs to permutation test using BRB-Array tools, we narrowed down this panel to 93 lncRNAs with permutation P-value \< 0.01. Those 93 lncRNAs were further analyzed by Robust likelihood-based survival modeling \[[@CR25]\]. This algorithm selects survival-associated genes based on the partial likelihood of the Cox model and discover multiple sets of genes by iterative forward selection \[[@CR25]\]. Using this method, seven lncRNAs were screened out as the predictor signature and their detailed information were shown in Table [1](#Tab1){ref-type="table"}. Of these, positive coefficients for the six genes (CTD-2354A18.1, NR2F1-AS1, AC073283.1, MIR31HG, AL132709.8, RP11-834C11.4) indicated that their upregulated levels of expression were associated with shorter survival. The negative coefficient indicated that upregulated level of expression of AC069278.4 was associated with longer survival, suggesting that it may be a tumor suppressor gene. Table 1Seven lncRNAs significantly associated with the disease free survival in the training group patients (*N =* 279)Ensembl IDGene symbolPermutation *P* value^a,b^Hazard ratio^a^Coefficient^a^Diseases^c^ENSG00000261780CTD-2354A18.11.00E-075.7431.75Pathogenesis of gastric cancer,Overall survival of colorectal cancerENSG00000237187NR2F1-AS11.00E-074.4511.49Multiple cancerENSG00000225187AC073283.14.00E-043.2691.18NAENSG00000171889MIR31HG1.00E-072.0640.72Senescence,Osteogenesis of adipose stem cells,Progression of multiple cancerENSG00000288302AL132709.81.00E-071.9510.67Ovarian cancerENSG00000250742RP11-834C11.42.00E-041.7690.57NAENSG00000267242AC069278.41.00E-070.174−1.75NAAbbreviations: *NA* Not Available^a^ Derived from the univariable Cox proportional hazards regression analysis in the 279 training group patients^b^ Obtained from permutation test repeated 10,000 times^c^ Detailed in discussion section The seven lncRNA-based risk score model and the survival in the training group {#Sec13} ------------------------------------------------------------------------------ To integrate all these seven lncRNAs identified in our previous step, we performed a Cox multivariable regression analysis on the training group. A prognostic model based on the coefficients was developed and the risk score formula was constructed as the following: risk score = (0.852 × the expression level of *CTD-2354A18.1*) + (0.674 × the expression level of *NR2F1-AS1*) + (0.848 × the expression level of *AC073283.1*) + (0.193 × the expression level of *MIR31HG*) + (0.034 × the expression level of *AL132709.8*) + (0.264× the expression level of *RP11-834C11.4*) + (− 1.226× the expression level of *AC069278.4*). We then calculated the seven-lncRNA signature risk score of each patient in training group using the above formula. The median risk score (5.760) was used as the cutoff point to divide the training set into two groups, high risk (*N* = 139) and low risk groups (*N* = 140). We evaluated the DFS, showing the survival time of high risk group is significantly shorter than the low risk group (log-rank test *P* \< 0.0001) (Fig. [1](#Fig1){ref-type="fig"}a). The association of the seven-lncRNA risk score with DFS was also significant when it was evaluated as a continuous factor in both univariable and multivariable Cox regression model (*P* = 6.03E-14 and *P* = 1.82E-12, respectively) (Table [2](#Tab2){ref-type="table"}). Fig. 1Kaplan-Meier analysis (estimates) of the disease free survival (DFS) of GEO datasets using the seven-lncRNA signature. The Kaplan-Meier plots were used to visualize the DFS probabilities for the patients based on the risk score evaluation. **a** Kaplan--Meier curves for GSE39582 training-group patients (*N* = 279); **b** Kaplan--Meier curves for GSE39582 internal validation-group patients (*N* = 278); **c** Kaplan--Meier curves for the entire GSE39582 patients (combined training and validation group patients, *N* = 557). **d** Kaplan--Meier curves for the external validation GSE19538 patients (*N* = 200). The tick marks on the curves represent the censored events. The differences between the two curves were determined by the two-sided log-rank testTable 2Univariable and multivariable Cox regression analyses in each data setVariablesUnivariable model^a^Multivariable model^a^HR95% CI of HR*P* value^b^HR95% CI of HR*P* value^b^GSE39582 training (*N* = 278) Seven-lncRNA risk score2.712.087--3.519\< 0.0012.7492.111--3.579\< 0.001 Age0.9990.983--1.0140.8771.010.993--1.0270.261 Gender1.4570.951--2.2330.0841.4280.925--2.2050.108 TNM stage I1.00(referent)1.00(referent) TNM stage II10,245,8610.000-0.9945,864,6210.000-0.995 TNM stage III16,355,0140.000-0.9937,823,0160.000-0.994 TNM stage IV52,014,0590.000-0.99342,817,0260.000-0.994GSE39582 validation (*N* = 274) Seven-lncRNA risk score1.9781.558--2.511\< 0.0011.8751.435--2.449\< 0.001 Age10.984--1.0160.9770.9980.982--1.0150.839 Gender1.1170.73--1.7090.6091.5590.996--2.4420.052 TNM stage I1.00(referent)1.00(referent) TNM stage II4.420.598--32.6730.1453.2230.434--23.9440.253 TNM stage III10.6441.465--77.3540.025.9970.808--44.5120.08 TNM stage IV48.8476.533--365.212\< 0.00140.8815.415--308.664\< 0.001Entire GSE39582 (*N* = 552) Seven-lncRNA risk score2.2631.907--2.685\< 0.0012.2481.879--2.69\< 0.001 Age0.9990.988--1.0110.9271.0040.992--1.0150.538 Gender1.2780.946--1.7260.1101.5361.132--2.0840.006 TNM stage I1.00(referent)1.00(referent) TNM stage II7.4791.036--53.9840.0464.6520.642--33.6890.128 TNM stage III14.371.999--103.2740.0086.90.95--50.1150.056 TNM stage IV55.1897.558--402.996\< 0.00142.1345.746--308.933\< 0.001GSE17538 validation (*N* = 200) Seven-lncRNA risk score1.9451.317--2.873\< 0.0011.9051.206--3.0080.0057 Age0.980.962--0.9990.0430.9890.968--1.010.312 Gender0.750.441--1.2760.2890.8480.481--1.4930.567 TNM stage I1.00(referent)1.00(referent) TNM stage II5.1770.668--40.1320.1164.3130.552--33.690.163 TNM stage III10.2781.387--76.1720.0238.0641.076--60.4570.0423 TNM stage IV49.4356.615--369.41\< 0.00140.0525.299--302.762\< 0.001Abbreviations: *HR* hazard ratio, *CI* confidence interval^a^ In both univariable and multivariable Cox regression analyses, risk score and age were evaluated as continuous variables, and gender and TNM stage were evaluated as category variables^b^*P* \< 0.05 was considered statistically significant in all analyses The prognostic values of seven-lncRNA signature in validation groups {#Sec14} -------------------------------------------------------------------- In order to confirm our findings, we used two validation groups to test the above signature. The corresponding risk scores were calculated according to the risk formula. Patients in GSE39582 internal validation set were classified into a high risk (*N* = 139) and a low risk group (*N* = 139) using the median score (5.721) of the validation set as the cutoff point. Consistent with the findings described above, patients in high risk group showed significantly shorter DFS than patients in low risk group (log-rank test *P* \< 0.0001) (Fig. [1](#Fig1){ref-type="fig"}b). Similar results were also observed for the entire GSE39582 data set (cut point 5.742) (Fig. [1](#Fig1){ref-type="fig"}c). For further verification, external validation set GSE17538 was employed and patients in high risk group (*N* = 100) showed shorter DFS than patients in low risk group (cut point 10.04, log-rank test *P* \< 0.0001) (Fig. [1](#Fig1){ref-type="fig"}d). In the Cox regression model, in which the seven-lncRNA risk score was evaluated as a continuous variable, similar correlation could be achieved (Table [2](#Tab2){ref-type="table"}). Risk score distribution and ROC analysis {#Sec15} ---------------------------------------- We also visualized risk score distribution in these data sets. The samples were ranked according to their risk scores (Fig. [2](#Fig2){ref-type="fig"}a) and survival status of patients were showed as in Fig. [2](#Fig2){ref-type="fig"}b. A heatmap was visualized to demonstrate the expression profiles of these seven-lncRNAs (Fig. [2](#Fig2){ref-type="fig"}c). We found that patients with low risk scores tended to express high levels of protective lncRNAs (*AC069278.4*), whereas patients with high risk scores show a preference for high levels of the other six lncRNAs. Similar results can be observed for internal validation group, entire GSE39582 data set, and external GSE17538 cohort (Additional file [1](#MOESM1){ref-type="media"}: Figure S2-S4). Fig. 2LncRNA risk score performance in the GSE39582 training dataset. The distribution of signature risk score, patients' survival status and seven-lncRNA expression were analyzed in the GSE39582 training patients (N = 279). **a** The distribution of lncRNA signature risk score distribution; **b** The survival status and time of corresponding patient; **c** The heatmap of the lncRNA expression value. Rows represent lncRNAs and columns for patients. The black line means the median risk score cutoff dividing patients into low-risk and high-risk groups To further investigate the discrimination power of the signature, ROC curves based on the calculated risk score were created within each inspected data set. The area under the curve (AUC) of GSE39582 training group was 0.75 (95% CI, 0.68--0.82), showing a strong separation ability (Fig. [3](#Fig3){ref-type="fig"}). In addition, the AUCs were 0.69 (95% CI, 0.6--0.76), 0.72 (95% CI, 0.66--0.77), 0.74 (95% CI, 0.64--0.84) for internal validation, entire GSE39582 and external GSE17538 validation data sets, respectively (Fig. [3](#Fig3){ref-type="fig"}). We can learn from this analysis, take in whole, that our seven-lncRNA signature had a strong prognostic value. Fig. 3ROC curves of seven-lncRNA risk score in different datasets. The receiving operating characteristic curve (ROC) of risk score were calculated for GSE39582 training group (green), GSE39582 validation-group (red) entire GSE39582 (purple) and entire GSE39582 (blue) The prognostic values of seven-lncRNA signature is independent of TNM stage {#Sec16} --------------------------------------------------------------------------- To further investigate the prognostic values of the seven-lncRNA signature, Cox regression analyses were performed based on the clinical characteristics, including age, gender, TNM stage in all cohorts (Table [2](#Tab2){ref-type="table"}). Our analysis demonstrated that the seven-lncRNA risk score remained to be significantly associated with DFS when adjusted by other variables in every group. According to TNM stage system for CRC, patients were divided into four subgroups (I, II, III and IV). Data stratification analysis was then conducted and showed that the seven-lncRNA signature had the ability of predicting prognosis in stage IV only. Kaplan--Meier curves for the high and low risk groups in stage IV patients were drawn. The results suggested that patients with high risk scores exhibited poorer DFS than those with low risk scores. Above observations were conducted in the training group (Fig. [4](#Fig4){ref-type="fig"}a, log-rank test *P* = 0.0058), the internal validation group (Fig. [4](#Fig4){ref-type="fig"}b, log-rank test *P* = 0.037), entire GSE39582 (Fig. [4](#Fig4){ref-type="fig"}c, log-rank test *P* \< 0.001) and the GSE17538 validation group (Fig. [4](#Fig4){ref-type="fig"}d, log-rank test *P* = 0.003). Fig. 4The seven-lncRNA signature was associated with prognosis in TNM stage 4 patients. Kaplan-Meier analysis of the disease free survival (DFS) of patients with stage 4 in training group (**a**), internal validation group (**b**), entire GSE39582 dataset (**c**) and GSE19538 validation dataset (**d**). The ROC curves of seven-lncRNA risk score (green), age (red), gender (blue) and stage (purple) were shown in entire GSE39582 (**e**) and GSE17538 (**f**), respectively We also performed ROC analysis to identify the sensitivity and specificity of survival prediction of the seven-lncRNA risk score, age, gender and stage on these patients. As shown in Fig. [4](#Fig4){ref-type="fig"}e, the AUC for age and gender are comparatively low (0.54 and 0.5, respectively) in GSE39582 data set. When compared with TNM stage, the AUC of the seven-lncRNA risk score was much the same (0.72 versus 0.73). Similarly, the AUC results had almost a same pattern like GSE39582 (Fig. [4](#Fig4){ref-type="fig"}f). The AUC for age and gender were low (0.6 and 0.58), and comparatively high for risk score and stage (0.74 versus 0.86). These analyses indicated that seven-lncRNA signature may have a better predictive ability than age and gender, and have an equivalent predictive power with TNM stage IV. Taking together, the seven-lncRNA signature was more favorable in our analysis. The prognostic values of seven-lncRNA signature is independent of adjuvant chemotherapy {#Sec17} --------------------------------------------------------------------------------------- Furthermore, we wanted to know whether the prognostic value of the seven-lncRNA signature was independent of all other clinical characteristics. There was adjuvant chemotherapy, KRAS mutation, mismatch repair (MMR) status and 5 more clinicopathological factors in GSE39582 data set. The corresponding sample number and univariable Cox analysis for each factor were shown in Additional file [2](#MOESM2){ref-type="media"}: Table S1. Unfortunately, of the 244 patients from GSE17538, no additional such clinical information was available for the patients, so the following results were only evaluated in GSE39582 data set. Since adjuvant chemotherapy was significant in univariable Cox analysis (Additional file [2](#MOESM2){ref-type="media"}: Table S1), we then conducted multivariable Cox regression model on those 541 patients. Using risk score, adjuvant chemotherapy, age and gender as covariates, we found that the seven-lncRNA risk score (*P* \< 0.001) and chemotherapy (*P* = 0.013) were both independent prognostic factors (Table [3](#Tab3){ref-type="table"}). In addition, data stratification was performed, which stratified these patients into with chemotherapy or without chemotherapy subgroups. This analysis indicated that within each stratum, the seven-gene risk score could further identify patients with different prognoses (Fig. [5](#Fig5){ref-type="fig"}). For patients with chemotherapy (*N* = 232), the risk score could subdivide them into those likely to have longer DFS and those likely to have shorter DFS (log-rank test *P* = 0.012) (Fig. [5](#Fig5){ref-type="fig"}b). Patients without chemotherapy (*N* = 309) acted in a similar fashion (log-rank test *P* \< 0.001) (Fig. [5](#Fig5){ref-type="fig"}c). The ROC analysis was performed and curves were visualized for the two factors. The AUC for the seven-lncRNA signature and chemotherapy on DFS was 0.72 and 0.59, respectively, indicating a favorable prognostic value in predict patients' survival (Fig. [5](#Fig5){ref-type="fig"}d). Table 3Multivariable Cox regression analysis of the seven-lncRNA risk score and other variables in GSE39582 data setVariablesHR95% CI of HR*P* value^a^Seven-lncRNA risk score (*N* = 541)2.141.783--2.568\< 0.001 Age1.0080.995--1.0210.223 Gender1.3911.013--1.910.041 Adjuvant chemotherapy1.5221.091--2.1240.013Seven-lncRNA risk score (*N* = 536)2.3451.967--2.797\< 0.001 Age0.9960.984--1.0080.469 Gender1.350.99--1.8420.058 KRAS mutation0.6910.509--0.9380.018Seven-lncRNA risk score (*N* = 511)2.1951.853--2.6\< 0.001 Age0.9990.987--1.0120.911 Gender1.1840.869--1.6130.285 MMR status2.6171.378--4.970.003Abbreviations: *HR* hazard ratio, *CI* confidence interval, *MMR* mismatch repairIn Cox regression analyses, risk score was evaluated as continuous variables, all other variables were evaluated as category variables^a^*P* \< 0.05 was considered statistically significant in all analysesFig. 5Kaplan-Meier estimates of the disease free survival (DFS) of patients using the seven-lncRNA signature, stratified by adjuvant chemotherapy. Entire GSE39582 dataset were first stratified by chemotherapy (with or without) and Kaplan-Meier plots were then used to visualize the survival probabilities for patients within each stratum. **a** Kaplan-Meier curves for the entire GSE39582 dataset patients (*N* = 541); **b** Kaplan-Meier curves for patients with adjuvant chemotherapy (*N* = 232); **c** Kaplan-Meier curves for patients without adjuvant chemotherapy (*N* = 309). The tick marks on the curves represent the censored events. The differences between the two curves were determined by the two-sided log-rank test. **d** The ROC curves of seven-lncRNA risk score (blue) and chemotherapy (red) were shown in entire GSE39582 The prognostic values of seven-lncRNA signature is independent of KRAS mutation {#Sec18} ------------------------------------------------------------------------------- KRAS mutation occurs in 30 to 50% of colorectal cancers (CRCs) and has been suggested to be associated with proliferation and decreased apoptosis \[[@CR31]\]. Thus, we tested whether the predictive power of the seven-lncRNA signature was independent of KRAS mutation status in GSE39582 (*N* = 536). In the multivariable Cox regression analysis, we found that the seven-lncRNA risk score (*P* \< 0.0001) and KRAS mutation status (*P* = 0.018) were both independent prognostic factors (Table [3](#Tab3){ref-type="table"}). In the stratification analysis, the seven-gene risk score could further identify patients with different prognoses (Fig. [6](#Fig6){ref-type="fig"}). For patients with WT KRAS (*N* = 322), the risk score could subdivide them into those likely to have longer DFS and those likely to have shorter DFS (log-rank test P \< 0.0001) (Fig. [6](#Fig6){ref-type="fig"}b). Patients with KRAS mutation (*N* = 214) acted in a similar fashion when analyzed with this risk score (log-rank test *P* = 0.00045) (Fig. [6](#Fig6){ref-type="fig"}c). The ROC AUC for the seven-lncRNA signature was 0.72, which is much higher than that of KRAS mutation (0.55), indicating a better predictive ability (Fig. [6](#Fig6){ref-type="fig"}d). Fig. 6Kaplan-Meier estimates of the disease free survival (DFS) of patients using the seven-lncRNA signature, stratified by KRAS mutation status. Entire GSE39582 dataset were first stratified by KRAS mutation status (WT or Mutation) and Kaplan-Meier plots were then used to visualize the survival probabilities for patients within each stratum. **a** Kaplan-Meier curves for the entire GSE39582 dataset patients (*N* = 536); **b** Kaplan-Meier curves for patients with wide-type KRAS gene (WT, *N* = 322); **c** Kaplan-Meier curves for patients with mutated KRAS gene (Mutation, *N* = 214). The tick marks on the curves represent the censored events. The differences between the two curves were determined by the two-sided log-rank test. **d** The ROC curves of seven-lncRNA risk score (blue) and KRAS mutation (red) were shown in entire GSE39582 We further tested the whether the predictive power of the seven-lncRNA signature was independent of MMR status in GSE39582 (*N* = 511). In the multivariable Cox regression analysis, the seven-lncRNA risk score (*P* \< 0.0001) and MMR status (*P* = 0.003) were both independent prognostic factors (Table [3](#Tab3){ref-type="table"}). In the stratification analysis, however, the risk score could identify subgroup patients with proficiency MMR but fail to divide deficiency MMR patients significantly (*P* = 0.092, Additional file [1](#MOESM1){ref-type="media"}: Figure S5). This may be because the sample size is too small (72 patients) to draw any firm conclusions. Concerning the chemotherapy, KRAS mutation and MMT status together, we further performed multivariable Cox analysis with the three factors (Additional file [2](#MOESM2){ref-type="media"}: Table S2). This analysis verified seven-lncRNA signature as an independent factor when putting KRAS mutation, chemotherapy and MMR status together (*P* \< 0.001). Although other clinical variables, such as TP53 mutation, were not significant in univariable Cox regression analysis (*P* \> 0.05, Additional file [2](#MOESM2){ref-type="media"}: Table S1), we still performed multivariable Cox analysis to identify their possible associations with seven-lncRNA signature. As shown in Additional file [2](#MOESM2){ref-type="media"}: Table S3, the results demonstrated that the seven-lncRNA signature was independent of these clinical variables. Furthermore, we examined all clinical variables in one analysis of multivariable Cox regression and proved that the seven-lncRNA signature was an independent influencing factor of all the variables (Additional file [2](#MOESM2){ref-type="media"}: Table S4). In addition, we further performed ROC analysis to compare the discrimination power between seven-lncRNA signature and all other available clinical features in GSE39582 data set. As shown in Additional file [1](#MOESM1){ref-type="media"}: Figure S6, The AUC for the seven-lncRNA signature was comparatively higher than all other factors. These above results indicated that the seven-lncRNA could be used as an effective prognostic signature for CRC patients. Identification of seven-lncRNA signature altered pathways {#Sec19} --------------------------------------------------------- To identify potentially altered signaling pathways, we performed GSEA using the seven-lncRNA signature based risk score classification. Samples from GSE39582 (*N* = 557) were classified into high risk (*N* = 278) or low risk group (*N* = 279) using the median risk score. According to the results, we found that some Reactome pathways were significantly enriched (normalized *P* value \< 0.05, Fig. [7](#Fig7){ref-type="fig"}a, Additional file [3](#MOESM3){ref-type="media"}: Table S5). Of these, several pathways were noticed for their roles in tumorigenesis and tumor progression, including "Integrin cell surface interactions" and "Activation of matrix metalloproteinases". The enrichment plots of "PD 1 pathway" and "ECM proteoglycans" were shown as examples (Fig. [7](#Fig7){ref-type="fig"}b, c). These results suggested that the seven lncRNA based risk score may reflect the status of these signaling pathways. Fig. 7Gene set enrichment analysis identified altered signaling pathways related to risk score. **a** The scatter plot shown pathways enriched in high risk score group patients of GSE39582. Of those, the enrichment plots of "PD 1 pathway" **b** and "ECM proteoglycans" **c** were shown. ES, enrichment score; NES, normalized ES; NOM Pval, normalized *p*-value Additionally, it should be useful to investigate the potential molecular networks that seven lncRNAs were commonly associated with. We searched interacted proteins and miRNAs in ENCORI database (starBase v3.0) \[[@CR31]\] and identified networks of the seven lncRNAs may interacted with (Additional file [4](#MOESM4){ref-type="media"}: Table S6). As shown in Additional file [1](#MOESM1){ref-type="media"}: Figure S7, totally 55 proteins were found to be associated with six lncRNAs and 87 microRNAs were associated with three lncRNAs. Although these findings needed to be further verified, they implicated possible networks for future biological studies of these lncRNAs. Discussion {#Sec20} ========== LncRNAs were proved to be indispensable in comprehensive biological processes through different mechanisms. In recent years increasing evidence has demonstrated that lncRNAs may play important roles in tumorigenesis and tumor progression \[[@CR5], [@CR6]\]. More recently, lncRNAs have been implicated in the pathogenesis and prognosis of CRC \[[@CR25], [@CR26]\]. The investigating of prognostic potential of lncRNAs in CRC is of great value. In the present study, we identified a potential seven-lncRNA signature that was significantly associated with the DFS of CRC patients. Two GEO datasets were employed in this study. After a comprehensive analysis, a seven-lncRNA signature was identified for predicting prognosis of CRC patients. Furthermore, Cox regression, stratification and ROC analysis suggested that the seven-lncRNA signature had a high predictive accuracy in our analyses. For these seven lncRNAs, six of them (CTD-2354A18.1, NR2F1-AS1, AC073283.1, MIR31HG, AL132709.8, RP11-834C11.4) acted as risk factors for CRC, while AC069278.4 was protective factor (Table [1](#Tab1){ref-type="table"}). We searched the literature to characterize these lncRNAs, finding three of them have been reported to correlated with cancer. CTD-2354A18.1 has been reported to be differentially expressed and may play a key role in the pathogenesis of gastric cancer \[[@CR33]\]. In addition, it was regarded to be related to overall survival in CRC patients \[[@CR34]\]. NR2F1-AS1 was shown to be upregulated in multiple cancer, including hepatocellular carcinoma, endometrial cancer, thyroid cancer and esophageal squamous cell carcinoma \[[@CR35]--[@CR38]\]. These different studies have revealed that NR2F1-AS1 can promote cancer progression via interacting with several miRNA and through different signaling pathways, including Hedgehog signaling pathway and PI3K/AKT pathway. Another candidate, MIR31HG gene was thoroughly investigated according to the literature. Montes et al. suggested that MIR31HG could regulate INK4A expression to modulate senescence \[[@CR39]\]. And Jin et al. indicated that Inhibition of MIR31HG promotes osteogenesis of human adipose-derived stem cells \[[@CR40]\]. MIR31HG was also reported to be involved in the progression of multiple cancer, including bladder cancer, pancreatic ductal adenocarcinoma, esophageal squamous cell carcinoma, lung cancer, and et al. \[[@CR41]--[@CR43]\]. In addition, MIR31HG was strongly correlated with miR-31 expression, associating with poor outcome in CRC \[[@CR43]\]. Thus, we infer that MIR31HG may act as an oncogene in CRC tumorigenesis and further investigations are needed as well. For the rest four lncRNAs, they were either poorly investigated or have not been reported at all. For example, although there were no experimental evidences about its function or mechanism in cancer, AL132709.8 was identified as a potential biomarker associated with recurrence of ovarian cancer \[[@CR44]\]. All the above reports provided us the opportunity to better understand the roles that might be played by these lncRNAs. The seven-lncRNA signature is an independent prognostic factors in CRC. Pathological staging is widely used to classify patients for adjuvant chemotherapy in clinical \[[@CR15]\]. Despite of this, appreciable efforts have been made in the past decades to discover the molecular biomarkers that may serve as a determinant to subclass CRC patients \[[@CR45], [@CR46]\]. These studies have determined a series of biomarkers that are thought to be associated with the prognosis of CRC, including MMR status, KRAS mutation, BRAF mutation and et al. \[[@CR45]\]. Among these biomarkers, microsatellite instability, caused by dysfunction of the DNA repair system, is the only marker that was found to be a significant prognostic factor in early CRC \[[@CR47]\]. Therefore, it will be highly desirable to evaluate whether the prognostic value of the seven-lncRNA signature is independent of these well-recognized factors. Here, we found the seven-lncRNA signature was independent of each TNM stage and had a similar ROC AUC value as TNM stage (Table [2](#Tab2){ref-type="table"}). Stratification analysis demonstrated this signature was significantly associated with DFS in patients with stage IV. We assessed the association between all available clinical variables and subsequent multivariate Cox regression and stratification analysis indicated that the prognostic value of our seven-lncRNA signature was independent of these factors. We also performed GSEA to identify the potential biological pathways altered between the high- and low-risk patients. Enriched pathways were noticed for their roles in tumorigenesis and tumor progression. The above findings suggested a possible function role played by these seven lncRNAs. To reveal the potential molecular mechanism of these lncRNAs, we established their interaction networks of proteins and miRNAs. However, only six and three of them were identified in the ENCORI database to be associated with proteins and miRNAs, respectively. Although the roles of these lncRNAs in CRC or other disease are currently unclear, our findings implicated that their molecular mechanism deserve further investigation. However, there are several limitations in our study. Firstly, lncRNAs profiled in this study were re-annotated from Affymetrix Human Genome U133 platform, which probably only represents part of the lncRNA populations. So the lncRNA signature identified here may not represent the most significant one in CRC. Secondly, we have no experimental data and shortage of information on the mechanisms behind the prognostic values of these seven lncRNAs. Although the function of some lncRNAs has been reported, more efforts need to be made to further understand their role in CRC. Finally, we suggested that the lncRNA signature is independent of other features, such as KRAS mutation and adjuvant chemotherapy. Unfortunately, this conclusion can only be tested in GSE39582 data set, because there is no such clinical information in GSE17528 cohort. Conclusions {#Sec21} =========== In summary, by employing large independent patient cohorts, we identified a seven-lncRNA signature to predict the DFS of CRC patients. The seven-lncRNA signature showed great potential of prognostic prediction and independent of several well acknowledged factors. Although these findings needed to be further investigated, they illustrated a promising perspective in the development of prognostic biomarkers and showed useful implications for future biological studies. Supplementary information ========================= {#Sec22} **Additional file 1 Figure S1.** Schematic of the study. **Figure S2.** LncRNA risk score performance in the GSE39582 validation dataset. The distribution of signature risk score, patients' survival status and sevenlncRNA expression were analyzed in the GSE39582 validation patients (*N* = 278). (A) The distribution of lncRNA signature risk score distribution; (B) The survival status and time of corresponding patient; (C) The heatmap of the lncRNA expression value. Rows represent lncRNAs and columns for patients. The black line means the median risk score cutoff dividing patients into low-risk and high-risk groups. **Figure S3.** LncRNA risk score performance in the entire GSE39582 dataset. The distribution of signature risk score, patients' survival status and seven-lncRNA expression were analyzed in the entire GSE39582 patients (*N* = 557). (A) The distribution of lncRNA signature risk score distribution; (B) The survival status and time of corresponding patient; (C) The heatmap of the lncRNA expression value. Rows represent lncRNAs and columns for patients. The black line means the median risk score cutoff dividing patients into low-risk and high-risk groups. **Figure S4.** LncRNA risk score performance in the GSE17538 validation dataset. The distribution of signature risk score, patients' survival status and sevenlncRNA expression were analyzed in the GSE17538 validation patients(*N* = 200). (A) The distribution of lncRNA signature risk score distribution; (B) The survival status and time of corresponding patient; (C) The heatmap of the lncRNA expression value. Rows represent lncRNAs and columns for patients. The black line means the median risk score cutoff dividing patients into low-risk and high-risk groups. **Figure S5.** Kaplan-Meier estimates of the disease free survival (DFS) of patients using the seven-lncRNA signature, stratified by MMR status. Entire GSE39582 dataset were first stratified by MMR status (dMMR or pMMR) and Kaplan-Meier plots were then used to visualize the survival probabilities for patients within each stratum. (A) Kaplan-Meier curves for the entire GSE39582 dataset patients (*N* = 511); (B) Kaplan-Meier curves for patients with dMMR (*N* = 72); (C) Kaplan-Meier curves for patients with pMMR (*N* = 439). The tick marks on the curves represent the censored events. The differences between the two curves were determined by the two-sided log-rank test. dMMR, deficient mismatch repair; pMMR, proficient mismatch repair. (D) The ROC curves of sevenlncRNA risk score (blue) and MMR status (red) were shown in entire GSE39582. **Figure S6.** Receiver operating characteristic (ROC) analysis of Seven-lncRNA risk score and other available clinical features in entire GSE39582 data set. Patients with known information about CIMP status (*N* = 487), BRAF mutation (*N* = 503), CIN status (*N* = 455), CIT subtype (*N* = 537), TP53 mutation (*N* = 344), Tumorlocation (*N* = 557) were evaluated. CIMP, CpG island methylator phenotype; CIN, chromosomal instability; CIT subtype, Cartes d'Identite des Tumeurs molecular subtype. **Figure S7.** LncRNAs interaction networks. (A) The network represents lncRNAs (Yellow diamond) and associated proteins (Purple circle), in which 6 lncRNAs and 55 proteins derived from CLIP-seq data from ENCORI were visualized. (B) The network represents lncRNAs (Yellow diamond) and interacted miRNA (Purple circle), in which 3 lncRNAs and 87 miRNAs derived from ENCORI were shown. **Additional file 2 Table S1** Univariable Cox regression analysis of the seven-lncRNA risk score and other available variables in GSE39582 data set. **Table S2** Multivariable Cox regression analysis of the seven-lncRNA risk score and five other variables in GSE39582 data set (*N* = 473). **Table S3** Multivariable Cox regression analysis of the seven-lncRNA risk score and other variables in GSE39582 data set. **Table S4** Multivariable Cox regression analysis of the seven-lncRNA risk score and all eleven available clinical variables in GSE39582 data set (*N* = 249). **Additional file 3 Table S5.** Gene set enrichment analysis (GSEA) results of GSE39582 cohort. **Additional file 4 Table S6A.** LncRNAs associated protein identified in ENCORI database. Table S6B. LncRNAs associated miRNAs identified in ENCORI database. AUC : Area under the curve BRB-Array : Biometric Research Branch-Array CI : Confidence interval CIMP : CpG island methylator phenotype CIN : Chromosomal instability CRC : Colorectal cancer DFS : Disease free survival GCRMA : Guanine Cytosine Robust Multi-Array Average method GEO : Gene expression Ominus GSEA : Gene set enrichment analysis HR : Hazard ratio lncRNAs: : Long non-coding RNAs miRNA : microRNA MMR : Mismatch repair NA : Not Available ROC : Receiver operating characteristic **Publisher's Note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Supplementary information ========================= **Supplementary information** accompanies this paper at 10.1186/s40364-020-00187-3. We would like to express our great appreciation to Gene Expression Omnibus (GEO) database for providing their platforms and contributors for their valuable data sets. We would also like to thank the R Development Core Team and contributors for R packages used in our study. RH participated in the design of the study, analyzed the data, prepared figures and wrote the manuscript. LZ and YC prepared some figures and Tables. HW participated in the design of the study and coordination. LS conceived and designed the study, analyzed the data and wrote the manuscript. All authors read and approved the final manuscript. This work was supported by the National Natural Science Foundation of China (No.31300726 to LS), the Fundamental Research Funds for the Central Universities (No. 2019CDYGYB024 to LS), the Specialized Research Fund for the Doctoral Program of Higher Education (No.20120191120043 to LS). The data sets used and/or analyzed during the current study are publicly available data from Gene Expression Omnibus (GEO) databases (GSE39582, GSE17538). The figures and materials supporting the conclusions of this article are included within the article and its additional files). Not applicable. Not applicable. The authors declare that they have no competing interests.
{ "pile_set_name": "PubMed Central" }
A movable or removable tab, label, or other device, the presence or absence of which on the casing of a recording medium prevents writing on the medium. Note: An example of a yywrite-protect tab is the sliding tab on a 3½-inch (8.85-cm) magnetic diskette of the type used in conjunction with desktop computers.
{ "pile_set_name": "Pile-CC" }
Lymphoid leucaemia in a dog after chemotherapy for mast cell sarcomas. A 10-year-old Golden Labrador developed a well-differentiated lymphoid cell leucaemia during chemotherapy for a malignant mast cell tumour. Similar treatment had been carried out 2 years previously for another mast cell tumour. The possibility of an association between the anti-neoplastic chemotherapy and the lymphatic leucaemia is discussed.
{ "pile_set_name": "PubMed Abstracts" }
This is a national stage of application No. PCT/FI00/00570, filed on Jun. 22, 2000. Priority is claimed on that application and on the Application No. 991454, filed in Finland on Jun. 24, 1999. The present invention relates to protecting devices against interfering electromagnetic radiation. Electromagnetic radiation generated in a device may disturb either the device""s own operation or the operation of some external device. Generally, the aim is to protect sensitive devices and interfering sources of electromagnetic radiation against radiation by encasing them in packages made from a conductive material and by sealing the packages so tight that no interfering electromagnetic radiation can penetrate the package. This type of or similar protection of devices against electromagnetic radiation is called EMI (electromagnetic interference) shielding. One problematic area in EMI shielding is the sealing of junctions and joint surfaces comprised by devices, device cabinets and boxes. If the joint surfaces are not properly sealed with EMI gaskets, interfering electromagnetic radiation will quite easily pass through the joint. The best protection against interference is achieved when the joint surfaces are tightly sealed together galvanically. This means that resistance between the joint surfaces, so-called xe2x80x98junction resistancexe2x80x99, is as low as possible. However, it is difficult and expensive to manufacture such plane-like joint surfaces, where the surfaces are tightly attached to each other in every place galvanically. Therefore, solutions in which a good contact between the joint surfaces is not formed in every place but at certain distances along the whole length of the joint, are used for sealing joint surfaces. When the distance between the contacts formed is sufficiently short, electromagnetic radiation can no longer penetrate the joint in disturbing quantities. A sufficient contact distance depends on the frequency of the interfering radiation and the required attenuation level. Mechanical properties and the available space also affect the contact distance used. In connection with device cabinets and racks, a typical contact distance can be, e.g. 5-15 mm. EMI sealing is required in various types of electric devices. Among others, EMI gaskets are used in device box and cabinet doors and apertures, as well as in partitions between different units inside device cabinets. There are at least three types of gaskets that are most commonly used for EMI sealing. In one solution, a mantle is knitted from a conductive material around a resilient rubber compound or some other corresponding material. The mantle is knitted from a very thin wire that acts as a conductive fabric. When placed in between joint surfaces, these types of gaskets give an even contact but do not necessarily give a sufficient contact for EMI shielding due to the large contact area. They do not pierce through the surface, which is slightly oxidised or greasy. These types of gaskets may shed short pieces of wire, which can cause a short circuit after being passed on to a printed board. Neither do they endure friction and continuous wear. In a second solution conductive particles are mixed inside a rubber-like sealing compound, the conductive particles forming a galvanic connection between joint surfaces when the joint surfaces are pressed together. However, the electroconductivity of these types of gaskets does not come near to that of, e.g. copper alloyed gaskets. Furthermore, the properties of these types of gaskets may change as they age. A third solution is provided by spring-like gaskets bent from sheet metal. Their electroconductivity is good, but their manufacture is problematic. The manufacture of spring-like sheet metal gaskets requires expensive perforating and bending tools. In addition, the edges of the gaskets are sharp, whereupon one may hurt one""s hand on them, and the length of the gaskets is limited to the length of the sheet used in their manufacture, which normally is about 70 cm, in which case a full-length gasket must be assembled from several pieces. The most significant disadvantage of a spring-like sheet metal gasket is, however, its susceptibility to being damaged due to its poor elastic properties. The gasket has extremely accurate tolerance of compression. If joint surfaces are pressed together too little, the gasket placed in between them will leak, as it is called, i.e. let electromagnetic radiation significantly through it. If again joint surfaces are pressed too much, a permanent deformation will take place in the gasket and its compression force will no longer be sufficient. Also in this case, the joint will begin to leak. FIG. 1 illustrates an EMI gasket presented in the Patent Publication U.S. Pat. No. 5,091,606, which comprises a helical spring made from a circular profiled wire and may comprise a layer made on top of the spring from a conductive and ductile material. When this type of gasket is placed in between the surfaces to be sealed and the surfaces are pressed against each other, a contact is formed between the surfaces. The gasket is intended for sealing shafts and other surfaces with a circular cross-section, and their circumferences. A disadvantage of these types of gaskets is a reasonably complex manufacturing process, as well as the difficulty of fitting the gasket into small spaces. In addition, it is difficult to attach and get it stay in its place in structurally difficult joining points. Now, EMI sealing has been invented, which is particularly well suited, e.g. for the EMI shielding of device cabinet partitions, shoulders, printed boards and other similar type of pieces and parts of the pieces. It is characteristic of an elongated EMI gasket, of the invention, manufactured from an electroconductive wire that the EMI gasket comprises a groove substantially parallel to its longitudinal direction for receiving a piece or a part of the piece inside the EMI gasket. Correspondingly, it is characteristic of a device according to the invention, the device comprising a first part and a second part, joined together, and an elongated EMI gasket for getting said first part and said second part into contact and for preventing electromagnetic interference from penetrating a joining point between the first and second parts, that the EMI gasket comprises a groove substantially parallel to the longitudinal direction of the EMI gasket for receiving at least one of said first and second parts inside the EMI gasket and that the EMI gasket is in contact with both said first part and said second part for forming an electric contact through the EMI gasket between said parts. It is characteristic of a second device according to the invention, the device comprising a first part, a second part and a third part, joined together, and in between them an elongated EMI gasket, made from an electroconductive wire, for getting said parts into contact with each other and for preventing electromagnetic interference from penetrating the joining points between said parts, that the EMI gasket is in contact with said first part and said second part, and that the EMI gasket comprises a groove substantially parallel to the longitudinal direction of the EMI gasket for receiving said third part at least partly inside the EMI gasket and that said groove is bordered by a first edge, which is in contact with said third part for forming an electric contact between said first part; said second part and said third part. In accordance with the invention, the EMI gasket is made from a spring-like electroconductive wire that is bent in the appropriate shape depending on the use, however, so that it comprises a groove substantially parallel to the longitudinal direction of the EMI gasket, from where a piece to be EMI sealed can at least partly penetrate inside the EMI gasket. The piece to be protected against interfering electromagnetic radiation is EMI shielded by pushing the EMI gasket to the edge of the piece and by arranging contacts via the EMI gasket between the piece and some electroconductive surface that is close to it. Other objects and features of the present invention will become apparent from the following detailed description considered in conjunction with the accompanying drawings. It is to be understood, however, that the drawings are intended solely for purposes of illustration and not as a definition of the limits of the invention, for which reference should be made to the appended claims.
{ "pile_set_name": "USPTO Backgrounds" }
In searching for the keys to the phenomenon of rapid human evolution and progress, intellectuals have seized upon the idea of collective intelligence: the notion that what determines the rate of innovation, economic progress, and cultural enrichment of a population is the amount of interaction between individuals.1 In other words, it’s not individual intelligence that matters. What matters most is collective and cumulative intelligence — and that grows with the exchange of ideas and the interaction of people.1 This is why cities foster much more innovation than small towns, and why high-density cities tend to be more dynamic than low-density ones. Serendipitous connections happen more readily when there’s more chance for strangers to rub shoulders together. When ideas from different people come together, innovation is more likely to occur. And the bigger the supply of existing ideas and the faster those ideas combine, the more new ideas are generated.2 The success of multi-cultural America (and highly-dense New York City) in the past century is the epitome of this relationship with its vast open society, through which goods, ideas and people flow freely. As a result of this rapid rate of exchange, America is known for and has greatly benefited from its bounty of innovation and discoveries as well as its cultural richness. But if a population falls, becomes fragmented, or loses density, thereby resulting in less exchange and interaction, cultural evolution may actually regress. So developing and maintaining large, tight-knit, and vibrant social networks is paramount to ensuring a thriving culture.1 During its heyday, Memphis had a tightly-networked talent pool with a high rate of idea exchange and artistic cross-pollination. As a result, Memphis’ rich and innovative culture influenced and inspired America — and the world — with its blues, rock ‘n’ roll, and soul music. That cultural genius is still in our blood and soil, but it seems less cultivated, innovative, and dynamic than before. Why? Because Memphis has suffered from a reduced rate of idea exchange. Three reasons come to mind: First off was the destruction in 1969 of Beale Street, the artistic and cultural hub of black Memphis (and arguably black America at one time). But Beale Street wasn’t just a black cultural hub that helped nurture and fulfill black creativity and artistic talent. White artists also frequented the street and absorbed ideas and inspiration from the rich culture bubbling out of Beale — think Elvis. Severing this vital artistic and cultural hub has had dire consequences on the interim innovation and integration of Memphis arts & culture. Unfortunately, today’s Beale Street — with its tourist-laden national chains and gimmicky bars — doesn’t nearly serve its pre-destruction role of local cultural enrichment. Second, the concurrent and subsequent sprawl of Memphis away from the urban core of downtown has resulted in a severely low-density city, even by national standards. Third, Memphis has been suffering a creative brain drain ever since the period of Beale Street’s destruction and Stax’s bankruptcy. Thousands of ambitious creatives have been leaving Memphis over the years as local opportunities have dried up. What do the loss of our unique cultural hub; the decrease in our urban density; and the draining of our creative pool all have in common? All three of these occurrences greatly reduce the rate at which our population exchanges ideas. That has had quite the negative impact on the evolution of Memphis culture and the dynamism of our arts over the past four decades. Reversing sprawl and increasing our city’s urban density would help Memphis regain its dynamism. To ensure a healthy talent pool, plugging and reversing the Memphis brain drain should be a priority, which the City of Choice initiative aims to do. But given our city’s historical arts & culture forte, nurturing, connecting, and integrating our artists with an arts hub and forum — akin to pre-destruction Beale Street — may be the most critical catalyst this city needs. Memphis Art Park would help address all these issues. It would be a community arts center in the heart of downtown, our urban core. It would help retain and attract the creative class. It would incubate and cater to emerging artists of all kinds, thereby enriching our talent pool. It would serve as an integrative arts & culture hub and forum where filmmakers, musicians, performing artists, dancers, and visual artists of all stripes would congregate, communicate, cross-pollinate, and inspire each other. And it would help tighten and strengthen our creative social network. Most importantly, Memphis Art Park would help increase the rate at which our city’s artists and creatives exchange ideas, which would help reinvigorate the dynamism, richness, and innovation of Memphis culture…and help Memphis get its mojo back.
{ "pile_set_name": "Pile-CC" }
Highly aromatic waste containing polycyclic aromatic hydrocarbons (PAHs) are generated by several industries such as gas plants, blast furnaces coke oven condensation, wood preservation plants, petrochemical industry sites, and other industries. PAHs are of great environmental concern because of their mutagenic and/or carcinogenic potential and their nature to persist in the environment for very longer durations. Various methods have been utilized for treatment/remediation/disposal of highly aromatic waste sludge. These methods generally include permanent removal of the contaminated soil to a secure landfill, incineration, indirect thermal treatment, aeration, venting, air sparging and bioremediation. Of these, removal of contaminated soil to landfills is no longer an attractive alternative on account of the high excavation, transportation, disposal costs, and a high potential for residual liability. Further, the contaminant has to be dumped into specially constructed pits with leachate collection system in the landfill. Due to space constraints and expensive construction of such pits, this option is not practical. Further, this method is not a permanent solution. Incineration and indirect thermal treatment can be achieved either on-site or off-site, but both the processes involve excavation, handling and treatment of whole contaminated soil as well as significant amounts of soil adjacent to the contaminated soil. The soil must then either be transported to the treatment facility or else the treatment apparatus must be installed on-site. In either case, these methods generally involve enormous transportation, handling cost and require large amounts of energy to combust or volatilize the contaminants. Other elaborate and expensive techniques, which have been utilized, involve excavation and treatment of the contaminated soil using multi-step unit operations for separating and recovering the soil from the contaminants. The processes mentioned above are prohibitively expensive. Bioremediation is generally considered to be a promising approach to remediate contaminated soils, which utilizes the ability of certain microbes to transform harmful substances in to nontoxic compounds. Microorganisms, like all living organisms, need nutrients (such as nitrogen, phosphate, and trace metals), carbon and energy to survive. Bioremediation may be affected under aerobic and anaerobic conditions. Main requirements for effective bioremediation are: a biodegradable organic substrate, an appropriate active microbial community (consortium) and bioavailability of contaminants. Sometimes bioremediation requires further biostimulation with nutrients or some specific analogue substrate. Bioremediation is a cost effective, less energy intensive and eco-friendly method for disposal of hydrocarbon sludge. However, biodegradation of highly aromatic waste is a difficult task on account of their polynuclear chemical structure, low aqueous solubility and high toxicity. Various methods have been tried in the prior arts for treatment of the aromatic wastes. U.S. Pat. No. 5,055,196 to Darian et al., discloses a process for treating soil or sludge to remove contaminants. More particularly, this method relates to a process in which inorganic contaminants, such as metal or metal salts, or organic contaminants, such as polychlorinated biphenyls (PCBs), are removed from water-wet soil and sludge by contacting the contaminated water-wet mixture with a solvent containing a comminuting surfactant. U.S. Pat. No. 5,427,944 to Lee et al. teaches a process for biodegradation of polycyclic aromatic hydrocarbon contaminants using a mixed bacteria culture of Achromobacter sp. and Mycobacterium sp and nutrient. The mixed bacteria culture was utilized for in situ or ex situ bioremediation of contaminated soil, or in any of various conventional bioreactors to treat contaminated liquids such as landfill leachates, groundwater or industrial effluents. U.S. Pat. No. 6,251,657 to Hunter et al. discloses an apparatus and method for anaerobic biodegradation, bioremediation or bioprocessing of hydrocarbon dissolved in aqueous matrix, such as wastewater, ground water, or slurry and dissolved alkanes, alkenes, aromatic hydrocarbons and/or halogenated hydrocarbons that are metabolized or co-metabolized by denitrifying bacteria. U.S. Pat. No. 6,381,899 to McDole, describes a method for converting well drilling cuttings that contain petroleum hydrocarbons to an environmentally friendly humus-like product wherein salt, if present, is washed there from, the washed cuttings mixed with a feedstock having a carbon and nitrogen content sufficient to encourage a biopile composting reaction, forming an environmentally acceptable plant growth enhancing humus-like product by continuing the biopile composting reaction until (1) the biopile is reduced in weight and/or volume to a total biopile weight and/or volume that approaches the original weight and/or volume of the drill cuttings before the feedstock was added thereto, and (2) the total petroleum hydrocarbon content of the biopile is reduced to an environmentally friendly level for spreading on the earth's surface. U.S. Pat. No. 6,503,746 to Daane et al. relates to a method of isolating bacterial strains of Paenibacillus validus that degrade polyaromatic hydrocarbons and further use these strains for bioremediation. U.S. Pat. No. 7,118,906 to Raghukumar et al. describes a process for removal of polycyclic hydrocarbons phenanthrene and chrysene from wastewater and other contaminated sites by using white-rot lignin modifying fungus strain Flavodon flavus NRRL 30302. The US 20030100098 to Haggblom et al. discloses a bioremediation method of polycyclic aromatic hydrocarbon employing a PAH degrading bacterial stain P. naphthalenovorans of the Paenibacillus genus. The US 20050221468 discloses a process and a system for in situ remediation of contaminated soil by the distribution of treated sewage effluent into the soil thereby promoting the number and growth of naturally occurring microorganisms for the remediation process. The US 20060275887 to Miller et al. teaches a contaminant-degrading mycobacterium composition for remediation of contaminated soil having selected contaminants such as PAHs, polychlorinated phenols (PCPs), methyl tertiary butyl ethers (MTBEs) and the like. Such a composition includes a seed for plant capable of growing in the presence of contaminant and contaminants degrading mycobacteria on the seed, the mycobacterium being capable of degrading the selected contaminant. The conventional bioremediation techniques utilizing indigenous microorganisms alone or in combination with naturally occurring exogenous microorganisms are not always effective for bioremediation of polycyclic aromatic hydrocarbons. Polycyclic aromatic hydrocarbons (PAHs) are strongly adsorbed with organic material present in the soil, which limits their biodegradation in land farming approach and often-high levels of residual contaminants are left. Hence, the aromatic waste cannot be bioremediated using normal hydrocarbon degrading bacteria and by land farming techniques. Therefore, there exists a need to develop a method which can remove highly aromatic compounds especially PAHs in an eco-friendly, economical and intensive manner.
{ "pile_set_name": "USPTO Backgrounds" }
5-HT1A receptor function in depression: effect of chronic amitriptyline treatment. Hypothermic responses to 5-HT1A receptor activation by the selective ligand ipsapirone (IPS) were attenuated in depressed patients as compared to controls. Chronic treatment with amitriptyline (AMI) further impaired 5-HT1A-mediated hypothermia. The results indicate a subsensitive (presynaptic) 5-HT1A receptor and/or a defective post-receptor signalling pathway in depression and are consistent with the hypothesis that 5-HT1A receptors are down-regulated during AMI treatment.
{ "pile_set_name": "PubMed Abstracts" }
<?xml version="1.0" encoding="Windows-1252"?> <!-- This project was generated by Bakefile 0.2.9 (http://www.bakefile.org) Do not modify, all changes will be overwritten! --> <VisualStudioProject ProjectType="Visual C++" Version="8.00" Name="render" ProjectGUID="{344FA6C3-6D19-5EAC-87E5-5CCFEF3F977F}" > <Platforms> <Platform Name="Win32" /> <Platform Name="x64" /> </Platforms> <ToolFiles> </ToolFiles> <Configurations> <Configuration Name="Debug|Win32" OutputDirectory="vc_mswud" IntermediateDirectory="vc_mswud\render" ConfigurationType="1" UseOfMFC="0" ATLMinimizesCRunTimeLibraryUsage="false" CharacterSet="1" > <Tool Name="VCPreBuildEventTool" /> <Tool Name="VCCustomBuildTool" /> <Tool Name="VCXMLDataGeneratorTool" /> <Tool Name="VCWebServiceProxyGeneratorTool" /> <Tool Name="VCMIDLTool" PreprocessorDefinitions="WIN32;_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;_WINDOWS;NOPCH" AdditionalIncludeDirectories=".\..\..\lib\vc_lib\mswud;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCCLCompilerTool" Optimization="0" AdditionalIncludeDirectories=".\..\..\lib\vc_lib\mswud;.\..\..\include;.;.\..\..\samples" PreprocessorDefinitions="WIN32;_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;_WINDOWS;NOPCH" MinimalRebuild="true" ExceptionHandling="1" BasicRuntimeChecks="3" RuntimeLibrary="3" BufferSecurityCheck="true" RuntimeTypeInfo="true" ObjectFile="vc_mswud\render\" ProgramDataBaseFileName="vc_mswud\render.pdb" WarningLevel="4" SuppressStartupBanner="true" Detect64BitPortabilityProblems="true" DebugInformationFormat="3" /> <Tool Name="VCManagedResourceCompilerTool" /> <Tool Name="VCResourceCompilerTool" PreprocessorDefinitions="_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;_WINDOWS;NOPCH" Culture="1033" AdditionalIncludeDirectories=".\..\..\lib\vc_lib\mswud;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCPreLinkEventTool" /> <Tool Name="VCLinkerTool" AdditionalOptions="" AdditionalDependencies="wxmsw30ud_core.lib wxbase30ud.lib wxtiffd.lib wxjpegd.lib wxpngd.lib wxzlibd.lib wxregexud.lib wxexpatd.lib kernel32.lib user32.lib gdi32.lib comdlg32.lib winspool.lib winmm.lib shell32.lib comctl32.lib ole32.lib oleaut32.lib uuid.lib rpcrt4.lib advapi32.lib wsock32.lib wininet.lib" OutputFile="vc_mswud\render.exe" LinkIncremental="2" SuppressStartupBanner="true" AdditionalLibraryDirectories=".\..\..\lib\vc_lib" GenerateManifest="true" GenerateDebugInformation="true" ProgramDatabaseFile="vc_mswud\render.pdb" SubSystem="2" TargetMachine="1" /> <Tool Name="VCALinkTool" /> <Tool Name="VCManifestTool" /> <Tool Name="VCXDCMakeTool" /> <Tool Name="VCBscMakeTool" OutputFile="vc_mswud\render_vc8_render.bsc" SuppressStartupBanner="true" /> <Tool Name="VCFxCopTool" /> <Tool Name="VCAppVerifierTool" /> <Tool Name="VCWebDeploymentTool" /> <Tool Name="VCPostBuildEventTool" /> </Configuration> <Configuration Name="Release|Win32" OutputDirectory="vc_mswu" IntermediateDirectory="vc_mswu\render" ConfigurationType="1" UseOfMFC="0" ATLMinimizesCRunTimeLibraryUsage="false" CharacterSet="1" > <Tool Name="VCPreBuildEventTool" /> <Tool Name="VCCustomBuildTool" /> <Tool Name="VCXMLDataGeneratorTool" /> <Tool Name="VCWebServiceProxyGeneratorTool" /> <Tool Name="VCMIDLTool" PreprocessorDefinitions="WIN32;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;_WINDOWS;NOPCH" AdditionalIncludeDirectories=".\..\..\lib\vc_lib\mswu;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCCLCompilerTool" Optimization="2" AdditionalIncludeDirectories=".\..\..\lib\vc_lib\mswu;.\..\..\include;.;.\..\..\samples" PreprocessorDefinitions="WIN32;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;_WINDOWS;NOPCH" ExceptionHandling="1" RuntimeLibrary="2" RuntimeTypeInfo="true" ObjectFile="vc_mswu\render\" ProgramDataBaseFileName="vc_mswu\render.pdb" WarningLevel="4" SuppressStartupBanner="true" Detect64BitPortabilityProblems="true" DebugInformationFormat="3" /> <Tool Name="VCManagedResourceCompilerTool" /> <Tool Name="VCResourceCompilerTool" PreprocessorDefinitions="_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;_WINDOWS;NOPCH" Culture="1033" AdditionalIncludeDirectories=".\..\..\lib\vc_lib\mswu;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCPreLinkEventTool" /> <Tool Name="VCLinkerTool" AdditionalOptions="" AdditionalDependencies="wxmsw30u_core.lib wxbase30u.lib wxtiff.lib wxjpeg.lib wxpng.lib wxzlib.lib wxregexu.lib wxexpat.lib kernel32.lib user32.lib gdi32.lib comdlg32.lib winspool.lib winmm.lib shell32.lib comctl32.lib ole32.lib oleaut32.lib uuid.lib rpcrt4.lib advapi32.lib wsock32.lib wininet.lib" OutputFile="vc_mswu\render.exe" LinkIncremental="1" SuppressStartupBanner="true" AdditionalLibraryDirectories=".\..\..\lib\vc_lib" GenerateManifest="true" GenerateDebugInformation="true" ProgramDatabaseFile="vc_mswu\render.pdb" SubSystem="2" TargetMachine="1" OptimizeReferences="2" EnableCOMDATFolding="2" /> <Tool Name="VCALinkTool" /> <Tool Name="VCManifestTool" /> <Tool Name="VCXDCMakeTool" /> <Tool Name="VCBscMakeTool" OutputFile="vc_mswu\render_vc8_render.bsc" SuppressStartupBanner="true" /> <Tool Name="VCFxCopTool" /> <Tool Name="VCAppVerifierTool" /> <Tool Name="VCWebDeploymentTool" /> <Tool Name="VCPostBuildEventTool" /> </Configuration> <Configuration Name="DLL Debug|Win32" OutputDirectory="vc_mswuddll" IntermediateDirectory="vc_mswuddll\render" ConfigurationType="1" UseOfMFC="0" ATLMinimizesCRunTimeLibraryUsage="false" CharacterSet="1" > <Tool Name="VCPreBuildEventTool" /> <Tool Name="VCCustomBuildTool" /> <Tool Name="VCXMLDataGeneratorTool" /> <Tool Name="VCWebServiceProxyGeneratorTool" /> <Tool Name="VCMIDLTool" PreprocessorDefinitions="WIN32;_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" AdditionalIncludeDirectories=".\..\..\lib\vc_dll\mswud;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCCLCompilerTool" Optimization="0" AdditionalIncludeDirectories=".\..\..\lib\vc_dll\mswud;.\..\..\include;.;.\..\..\samples" PreprocessorDefinitions="WIN32;_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" MinimalRebuild="true" ExceptionHandling="1" BasicRuntimeChecks="3" RuntimeLibrary="3" BufferSecurityCheck="true" RuntimeTypeInfo="true" ObjectFile="vc_mswuddll\render\" ProgramDataBaseFileName="vc_mswuddll\render.pdb" WarningLevel="4" SuppressStartupBanner="true" Detect64BitPortabilityProblems="true" DebugInformationFormat="3" /> <Tool Name="VCManagedResourceCompilerTool" /> <Tool Name="VCResourceCompilerTool" PreprocessorDefinitions="_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" Culture="1033" AdditionalIncludeDirectories=".\..\..\lib\vc_dll\mswud;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCPreLinkEventTool" /> <Tool Name="VCLinkerTool" AdditionalOptions="" AdditionalDependencies="wxmsw30ud_core.lib wxbase30ud.lib wxtiffd.lib wxjpegd.lib wxpngd.lib wxzlibd.lib wxregexud.lib wxexpatd.lib kernel32.lib user32.lib gdi32.lib comdlg32.lib winspool.lib winmm.lib shell32.lib comctl32.lib ole32.lib oleaut32.lib uuid.lib rpcrt4.lib advapi32.lib wsock32.lib wininet.lib" OutputFile="vc_mswuddll\render.exe" LinkIncremental="2" SuppressStartupBanner="true" AdditionalLibraryDirectories=".\..\..\lib\vc_dll" GenerateManifest="true" GenerateDebugInformation="true" ProgramDatabaseFile="vc_mswuddll\render.pdb" SubSystem="2" TargetMachine="1" /> <Tool Name="VCALinkTool" /> <Tool Name="VCManifestTool" /> <Tool Name="VCXDCMakeTool" /> <Tool Name="VCBscMakeTool" OutputFile="vc_mswuddll\render_vc8_render.bsc" SuppressStartupBanner="true" /> <Tool Name="VCFxCopTool" /> <Tool Name="VCAppVerifierTool" /> <Tool Name="VCWebDeploymentTool" /> <Tool Name="VCPostBuildEventTool" /> </Configuration> <Configuration Name="DLL Release|Win32" OutputDirectory="vc_mswudll" IntermediateDirectory="vc_mswudll\render" ConfigurationType="1" UseOfMFC="0" ATLMinimizesCRunTimeLibraryUsage="false" CharacterSet="1" > <Tool Name="VCPreBuildEventTool" /> <Tool Name="VCCustomBuildTool" /> <Tool Name="VCXMLDataGeneratorTool" /> <Tool Name="VCWebServiceProxyGeneratorTool" /> <Tool Name="VCMIDLTool" PreprocessorDefinitions="WIN32;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" AdditionalIncludeDirectories=".\..\..\lib\vc_dll\mswu;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCCLCompilerTool" Optimization="2" AdditionalIncludeDirectories=".\..\..\lib\vc_dll\mswu;.\..\..\include;.;.\..\..\samples" PreprocessorDefinitions="WIN32;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" ExceptionHandling="1" RuntimeLibrary="2" RuntimeTypeInfo="true" ObjectFile="vc_mswudll\render\" ProgramDataBaseFileName="vc_mswudll\render.pdb" WarningLevel="4" SuppressStartupBanner="true" Detect64BitPortabilityProblems="true" DebugInformationFormat="3" /> <Tool Name="VCManagedResourceCompilerTool" /> <Tool Name="VCResourceCompilerTool" PreprocessorDefinitions="_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" Culture="1033" AdditionalIncludeDirectories=".\..\..\lib\vc_dll\mswu;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCPreLinkEventTool" /> <Tool Name="VCLinkerTool" AdditionalOptions="" AdditionalDependencies="wxmsw30u_core.lib wxbase30u.lib wxtiff.lib wxjpeg.lib wxpng.lib wxzlib.lib wxregexu.lib wxexpat.lib kernel32.lib user32.lib gdi32.lib comdlg32.lib winspool.lib winmm.lib shell32.lib comctl32.lib ole32.lib oleaut32.lib uuid.lib rpcrt4.lib advapi32.lib wsock32.lib wininet.lib" OutputFile="vc_mswudll\render.exe" LinkIncremental="1" SuppressStartupBanner="true" AdditionalLibraryDirectories=".\..\..\lib\vc_dll" GenerateManifest="true" GenerateDebugInformation="true" ProgramDatabaseFile="vc_mswudll\render.pdb" SubSystem="2" TargetMachine="1" OptimizeReferences="2" EnableCOMDATFolding="2" /> <Tool Name="VCALinkTool" /> <Tool Name="VCManifestTool" /> <Tool Name="VCXDCMakeTool" /> <Tool Name="VCBscMakeTool" OutputFile="vc_mswudll\render_vc8_render.bsc" SuppressStartupBanner="true" /> <Tool Name="VCFxCopTool" /> <Tool Name="VCAppVerifierTool" /> <Tool Name="VCWebDeploymentTool" /> <Tool Name="VCPostBuildEventTool" /> </Configuration> <Configuration Name="Debug|x64" OutputDirectory="vc_mswud_x64" IntermediateDirectory="vc_mswud_x64\render" ConfigurationType="1" UseOfMFC="0" ATLMinimizesCRunTimeLibraryUsage="false" CharacterSet="1" > <Tool Name="VCPreBuildEventTool" /> <Tool Name="VCCustomBuildTool" /> <Tool Name="VCXMLDataGeneratorTool" /> <Tool Name="VCWebServiceProxyGeneratorTool" /> <Tool Name="VCMIDLTool" PreprocessorDefinitions="WIN32;_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;_WINDOWS;NOPCH" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_lib\mswud;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCCLCompilerTool" Optimization="0" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_lib\mswud;.\..\..\include;.;.\..\..\samples" PreprocessorDefinitions="WIN32;_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;_WINDOWS;NOPCH" MinimalRebuild="true" ExceptionHandling="1" BasicRuntimeChecks="3" RuntimeLibrary="3" BufferSecurityCheck="true" RuntimeTypeInfo="true" ObjectFile="vc_mswud_x64\render\" ProgramDataBaseFileName="vc_mswud_x64\render.pdb" WarningLevel="4" SuppressStartupBanner="true" Detect64BitPortabilityProblems="true" DebugInformationFormat="3" /> <Tool Name="VCManagedResourceCompilerTool" /> <Tool Name="VCResourceCompilerTool" PreprocessorDefinitions="_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;_WINDOWS;NOPCH" Culture="1033" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_lib\mswud;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCPreLinkEventTool" /> <Tool Name="VCLinkerTool" AdditionalOptions="" AdditionalDependencies="wxmsw30ud_core.lib wxbase30ud.lib wxtiffd.lib wxjpegd.lib wxpngd.lib wxzlibd.lib wxregexud.lib wxexpatd.lib kernel32.lib user32.lib gdi32.lib comdlg32.lib winspool.lib winmm.lib shell32.lib comctl32.lib ole32.lib oleaut32.lib uuid.lib rpcrt4.lib advapi32.lib wsock32.lib wininet.lib" OutputFile="vc_mswud_x64\render.exe" LinkIncremental="2" SuppressStartupBanner="true" AdditionalLibraryDirectories=".\..\..\lib\vc_x64_lib" GenerateManifest="true" GenerateDebugInformation="true" ProgramDatabaseFile="vc_mswud_x64\render.pdb" SubSystem="2" TargetMachine="17" /> <Tool Name="VCALinkTool" /> <Tool Name="VCManifestTool" /> <Tool Name="VCXDCMakeTool" /> <Tool Name="VCBscMakeTool" OutputFile="vc_mswud_x64\render_vc8_render.bsc" SuppressStartupBanner="true" /> <Tool Name="VCFxCopTool" /> <Tool Name="VCAppVerifierTool" /> <Tool Name="VCWebDeploymentTool" /> <Tool Name="VCPostBuildEventTool" /> </Configuration> <Configuration Name="Release|x64" OutputDirectory="vc_mswu_x64" IntermediateDirectory="vc_mswu_x64\render" ConfigurationType="1" UseOfMFC="0" ATLMinimizesCRunTimeLibraryUsage="false" CharacterSet="1" > <Tool Name="VCPreBuildEventTool" /> <Tool Name="VCCustomBuildTool" /> <Tool Name="VCXMLDataGeneratorTool" /> <Tool Name="VCWebServiceProxyGeneratorTool" /> <Tool Name="VCMIDLTool" PreprocessorDefinitions="WIN32;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;_WINDOWS;NOPCH" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_lib\mswu;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCCLCompilerTool" Optimization="2" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_lib\mswu;.\..\..\include;.;.\..\..\samples" PreprocessorDefinitions="WIN32;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;_WINDOWS;NOPCH" ExceptionHandling="1" RuntimeLibrary="2" RuntimeTypeInfo="true" ObjectFile="vc_mswu_x64\render\" ProgramDataBaseFileName="vc_mswu_x64\render.pdb" WarningLevel="4" SuppressStartupBanner="true" Detect64BitPortabilityProblems="true" DebugInformationFormat="3" /> <Tool Name="VCManagedResourceCompilerTool" /> <Tool Name="VCResourceCompilerTool" PreprocessorDefinitions="_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;_WINDOWS;NOPCH" Culture="1033" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_lib\mswu;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCPreLinkEventTool" /> <Tool Name="VCLinkerTool" AdditionalOptions="" AdditionalDependencies="wxmsw30u_core.lib wxbase30u.lib wxtiff.lib wxjpeg.lib wxpng.lib wxzlib.lib wxregexu.lib wxexpat.lib kernel32.lib user32.lib gdi32.lib comdlg32.lib winspool.lib winmm.lib shell32.lib comctl32.lib ole32.lib oleaut32.lib uuid.lib rpcrt4.lib advapi32.lib wsock32.lib wininet.lib" OutputFile="vc_mswu_x64\render.exe" LinkIncremental="1" SuppressStartupBanner="true" AdditionalLibraryDirectories=".\..\..\lib\vc_x64_lib" GenerateManifest="true" GenerateDebugInformation="true" ProgramDatabaseFile="vc_mswu_x64\render.pdb" SubSystem="2" TargetMachine="17" OptimizeReferences="2" EnableCOMDATFolding="2" /> <Tool Name="VCALinkTool" /> <Tool Name="VCManifestTool" /> <Tool Name="VCXDCMakeTool" /> <Tool Name="VCBscMakeTool" OutputFile="vc_mswu_x64\render_vc8_render.bsc" SuppressStartupBanner="true" /> <Tool Name="VCFxCopTool" /> <Tool Name="VCAppVerifierTool" /> <Tool Name="VCWebDeploymentTool" /> <Tool Name="VCPostBuildEventTool" /> </Configuration> <Configuration Name="DLL Debug|x64" OutputDirectory="vc_mswuddll_x64" IntermediateDirectory="vc_mswuddll_x64\render" ConfigurationType="1" UseOfMFC="0" ATLMinimizesCRunTimeLibraryUsage="false" CharacterSet="1" > <Tool Name="VCPreBuildEventTool" /> <Tool Name="VCCustomBuildTool" /> <Tool Name="VCXMLDataGeneratorTool" /> <Tool Name="VCWebServiceProxyGeneratorTool" /> <Tool Name="VCMIDLTool" PreprocessorDefinitions="WIN32;_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_dll\mswud;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCCLCompilerTool" Optimization="0" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_dll\mswud;.\..\..\include;.;.\..\..\samples" PreprocessorDefinitions="WIN32;_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" MinimalRebuild="true" ExceptionHandling="1" BasicRuntimeChecks="3" RuntimeLibrary="3" BufferSecurityCheck="true" RuntimeTypeInfo="true" ObjectFile="vc_mswuddll_x64\render\" ProgramDataBaseFileName="vc_mswuddll_x64\render.pdb" WarningLevel="4" SuppressStartupBanner="true" Detect64BitPortabilityProblems="true" DebugInformationFormat="3" /> <Tool Name="VCManagedResourceCompilerTool" /> <Tool Name="VCResourceCompilerTool" PreprocessorDefinitions="_DEBUG;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" Culture="1033" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_dll\mswud;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCPreLinkEventTool" /> <Tool Name="VCLinkerTool" AdditionalOptions="" AdditionalDependencies="wxmsw30ud_core.lib wxbase30ud.lib wxtiffd.lib wxjpegd.lib wxpngd.lib wxzlibd.lib wxregexud.lib wxexpatd.lib kernel32.lib user32.lib gdi32.lib comdlg32.lib winspool.lib winmm.lib shell32.lib comctl32.lib ole32.lib oleaut32.lib uuid.lib rpcrt4.lib advapi32.lib wsock32.lib wininet.lib" OutputFile="vc_mswuddll_x64\render.exe" LinkIncremental="2" SuppressStartupBanner="true" AdditionalLibraryDirectories=".\..\..\lib\vc_x64_dll" GenerateManifest="true" GenerateDebugInformation="true" ProgramDatabaseFile="vc_mswuddll_x64\render.pdb" SubSystem="2" TargetMachine="17" /> <Tool Name="VCALinkTool" /> <Tool Name="VCManifestTool" /> <Tool Name="VCXDCMakeTool" /> <Tool Name="VCBscMakeTool" OutputFile="vc_mswuddll_x64\render_vc8_render.bsc" SuppressStartupBanner="true" /> <Tool Name="VCFxCopTool" /> <Tool Name="VCAppVerifierTool" /> <Tool Name="VCWebDeploymentTool" /> <Tool Name="VCPostBuildEventTool" /> </Configuration> <Configuration Name="DLL Release|x64" OutputDirectory="vc_mswudll_x64" IntermediateDirectory="vc_mswudll_x64\render" ConfigurationType="1" UseOfMFC="0" ATLMinimizesCRunTimeLibraryUsage="false" CharacterSet="1" > <Tool Name="VCPreBuildEventTool" /> <Tool Name="VCCustomBuildTool" /> <Tool Name="VCXMLDataGeneratorTool" /> <Tool Name="VCWebServiceProxyGeneratorTool" /> <Tool Name="VCMIDLTool" PreprocessorDefinitions="WIN32;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_dll\mswu;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCCLCompilerTool" Optimization="2" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_dll\mswu;.\..\..\include;.;.\..\..\samples" PreprocessorDefinitions="WIN32;_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" ExceptionHandling="1" RuntimeLibrary="2" RuntimeTypeInfo="true" ObjectFile="vc_mswudll_x64\render\" ProgramDataBaseFileName="vc_mswudll_x64\render.pdb" WarningLevel="4" SuppressStartupBanner="true" Detect64BitPortabilityProblems="true" DebugInformationFormat="3" /> <Tool Name="VCManagedResourceCompilerTool" /> <Tool Name="VCResourceCompilerTool" PreprocessorDefinitions="_CRT_SECURE_NO_DEPRECATE=1;_CRT_NON_CONFORMING_SWPRINTFS=1;_SCL_SECURE_NO_WARNINGS=1;__WXMSW__;NDEBUG;_UNICODE;WXUSINGDLL;_WINDOWS;NOPCH" Culture="1033" AdditionalIncludeDirectories=".\..\..\lib\vc_x64_dll\mswu;.\..\..\include;.;.\..\..\samples" /> <Tool Name="VCPreLinkEventTool" /> <Tool Name="VCLinkerTool" AdditionalOptions="" AdditionalDependencies="wxmsw30u_core.lib wxbase30u.lib wxtiff.lib wxjpeg.lib wxpng.lib wxzlib.lib wxregexu.lib wxexpat.lib kernel32.lib user32.lib gdi32.lib comdlg32.lib winspool.lib winmm.lib shell32.lib comctl32.lib ole32.lib oleaut32.lib uuid.lib rpcrt4.lib advapi32.lib wsock32.lib wininet.lib" OutputFile="vc_mswudll_x64\render.exe" LinkIncremental="1" SuppressStartupBanner="true" AdditionalLibraryDirectories=".\..\..\lib\vc_x64_dll" GenerateManifest="true" GenerateDebugInformation="true" ProgramDatabaseFile="vc_mswudll_x64\render.pdb" SubSystem="2" TargetMachine="17" OptimizeReferences="2" EnableCOMDATFolding="2" /> <Tool Name="VCALinkTool" /> <Tool Name="VCManifestTool" /> <Tool Name="VCXDCMakeTool" /> <Tool Name="VCBscMakeTool" OutputFile="vc_mswudll_x64\render_vc8_render.bsc" SuppressStartupBanner="true" /> <Tool Name="VCFxCopTool" /> <Tool Name="VCAppVerifierTool" /> <Tool Name="VCWebDeploymentTool" /> <Tool Name="VCPostBuildEventTool" /> </Configuration> </Configurations> <References> </References> <Files> <Filter Name="Source Files" Filter="cpp;c;cc;cxx;def;odl;idl;hpj;bat;asm;asmx" UniqueIdentifier="{4FC737F1-C7A5-4376-A066-2A32D752A2FF}" > <File RelativePath=".\render.cpp" > </File> </Filter> <Filter Name="Resource Files" Filter="rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav" UniqueIdentifier="{67DA6AB6-F800-4c08-8B7A-83BB121AAD01}" > <File RelativePath="..\..\samples\sample.rc" > </File> </Filter> </Files> <Globals> </Globals> </VisualStudioProject>
{ "pile_set_name": "Github" }
Treatment of closed femoral diaphyseal fractures with external fixators in children. From August 1992 to July 1996, 57 patients with closed femoral fractures were treated by external fixator in the Orthopaedic and Traumatology Clinics, School of Medicine, Dicle University. The technique was applied to children with closed femoral fractures. Their mean age was 6 (range 4-12) years old. The mean hospitalisation period was 8 (range 5-15) days. Fixators were removed on an average of 55 (range 38-79) days. The mean follow-up period was 18 (range 9-36) months. Pintract infection was observed in 3 and refracture in 1 patient. Infection was controlled with oral antibiotics and local dressing. An external fixator was applied to a patient in whom refracture developed. No patient had malunion, nonunion, or leg length discrepancy. We propose that external fixation in closed femoral shaft fractures of children could be a rational alternative mode of therapy, since it has some advantages and can be easily removed without undergoing a second round of anaesthesia.
{ "pile_set_name": "PubMed Abstracts" }
Introduction ============ Health Systems and Digital Health Technologies ---------------------------------------------- Digital health technology is an umbrella term encompassing a variety of innovations such as mobile health, health information technology, wearable devices, telehealth and telemedicine, and personalized medicine. Digital health technologies are envisioned as a step forward in empowering patients to participate in their health care decisions and, thereby, *democratize* health care. In publicly funded health systems, digital health technologies are strategies aimed at improving the quality and safety of health care service delivery as well as enhancing patient experiences and outcomes \[[@ref1]-[@ref3]\]. For example, the United Kingdom and Australia have launched large-scale personal health records (PHRs) initiatives---the NHS.UK and My Health Record, respectively---to connect patients with their electronic health and medical records \[[@ref4]-[@ref6]\]. In Canada, federal and provincial governments and health organizations have invested in digital health technologies and innovation across provincial and territorial health systems, including PHRs with a variety of electronic service (e-service) functionalities \[[@ref7]\]. Canada Health Infoway is a federally funded, nonprofit organization whose mandate is to "realize the vision of healthier Canadians through innovative digital health solutions." Through Infoway, Canada has invested in the development, implementation, and evaluation of various digital health solutions, including PHRs. Personal Health Records and Health System Improvement ----------------------------------------------------- A PHR is defined as a digital space, or Web/mobile, application-based, health or medical record that holds all or a portion of clinical information about an individual (eg, laboratory results or prescribed medications) \[[@ref8]-[@ref11]\]. Multiple terms exist to refer to platforms through which patients can access their health care information, including PHR, patient portal, or consumer portal (to maintain consistency, we use PHR throughout). PHRs can be either stand-alone and driven by information entered by individuals and stored on their personal devices or tethered to a health care organization or system. Information shared via PHRs can come from multiple sources and is managed, shared, and controlled by the individual patient; therefore, PHRs should conform to nationally recognized interoperability standards \[[@ref12]\]. PHRs in the scope of analyses presented in this paper: 1. are integrated with point-of-care clinical health information systems, allowing individuals to view their health record information from electronic medical records, hospital (or hospital consortium) information systems, laboratory testing and results information systems, electronic health records (EHRs), or health information exchanges; 2. are tethered to a health care organization or system, and are linked to information provided within the EHR attached to that system (hospital, insurance plan, or other health care organization); and 3. contain connected care functionalities/services such as communication and consultation features with point-of-care clinics, providers, or care organizations. Stand-alone PHRs were considered out of scope, including goal- or outcome-defined clinician-patient coaching models that allow patients to input information and PHRs that do not link to clinical-source information systems. Patients access their PHRs through a secure personal identification authorization process. PHRs can provide a range of e-service functionalities, categorized in-depth by the Center for Information Technology Leadership as comprising 4 overarching types of informational interaction---collection, sharing, self-management, and exchange \[[@ref13]\]. *How* PHRs facilitate these interactions can vary; functions include the ability to (1) view health care information (electronic view \[e-View\]), (2) exchange secure emails and messages with health care providers (electronic visit \[e-Visit\]), (3) renew prescription medication on the Web (electronic prescription renew \[e-Rx renew\]), and (4) visit virtually via videoconference with their health care providers (virtual visit). These functionalities are illustrated in [Figure 1](#figure1){ref-type="fig"}, alongside Canadian adoption and use rates from 2016 and 2017. As such, PHRs have the potential to influence value-based outcomes in terms of avoided direct and indirect costs but also as a mechanism to improve longer-term trends in health literacy, patient satisfaction \[[@ref14]\], access and user-centered design \[[@ref15]-[@ref17]\], and clinical outcomes. The terms p activation, engagement, empowerment, and patient-centered care, although used and measured distinctly, are often used interchangeably and broadly refer to mechanisms by which patients and caregivers interact with their care trajectory and the degree to which they feel confident and satisfied in doing so \[[@ref18]\]. Efforts to enhance patient activation and patient engagement in health and health care, as well as improve patient experience, are increasingly at the forefront of health policy and strategy in both high-resource and low- to middle-income health systems worldwide \[[@ref19]-[@ref21]\]. A growing body of literature highlights how PHRs can increase patient activation by providing seamless access points through which patients access their health care information and communicate with their providers or care teams \[[@ref11],[@ref22],[@ref23]\]. Patients' interaction with their health care information has been shown to positively influence patient engagement, health behaviors, and associated health outcomes in a variety of settings \[[@ref24]-[@ref26]\]. However, this body of work has focused largely on patient activation in health care and health outcomes and less on the *process* by which activation occurs through engagement with digital health solutions \[[@ref27]-[@ref29]\]. For the remainder of the paper, we use the term *patient activation* to refer to the desired outcome of patients' interactions with their PHR and *patient engagement* as the mechanism through which PHRs facilitate patient activation. ![Definition and utilization of electronic service functionalities in Canada (2016-2017).](jmir_v21i6e12277_fig1){#figure1} PHRs have been shown to influence patient engagement by reducing barriers to access to information via seamless Web-based platforms \[[@ref18]\]. In certain high-volume health management organizations in the United States (eg, Kaiser Permanente and Veterans Affairs), where tethered PHRs have been implemented and value-based outcomes evaluated, PHR functionalities involving high levels of patient interaction with their regular health care providers (via e-Visits and virtual visits) have been shown to improve health outcomes, while reducing per capita costs of care \[[@ref21],[@ref41]\]. Despite these benefits, it is important to note that a digital divide exists between those who can and do access these technologies and those for whom there are barriers to using technology to engage with their health care provider. Differences in access are influenced by multiple sociodemographic factors. However, there is little consensus about determinants of access and uptake across intersections of individual-level characteristics: often there are differences in use by socioeconomic status, education, and age, those in lower-income quintiles having lower levels of education and those of older age tend to access digital health technologies less \[[@ref30]-[@ref32]\]. Physical access to internet and to technological devices, in addition to technology-related skills and literacy, all contribute to perpetuating or bridging the digital divide in high-resource contexts \[[@ref33],[@ref34]\]. A recent electronic health equity framework notes the complex interplay of macro (socio-techno-economic-political context), patient (social position and intersection between various demographics), intermediary (material circumstances and social capital), and digital technology implementation factors that influence access to health technologies \[[@ref35]\]. Evaluation of Value-Based Outcomes and Digital Health Technology/Personal Health Records ---------------------------------------------------------------------------------------- Although there are a growing number of economic evaluations of digital health solutions, there are conceptual, methodological, and practical challenges to assessing the economic benefit of implementing and adopting PHRs, both in terms of increased health system efficiency and improved quality of and access to medical care \[[@ref10],[@ref11]\]. These challenges include the lack of a clearly defined perspective resulting from multiple investors and sources of funding, the lack of identified options for comparison, and having comparable costs and outcomes across different PHR interventions/sites \[[@ref11],[@ref36]\]. In addition, economic analyses and evaluations often take place in single health care settings with a focus on a specific patient population, and are not easily interpretable at a systems level. Conversely, analyses focusing solely on the benefits of PHRs and associated cost-savings or financial outcomes for a broader population are often based on relatively few sources of evidence, which may or may not reflect the health system contexts in which the benefit estimates are applied. Using an established approach developed by DeLone and McLean \[[@ref37]\] for evaluating information technology initiatives, Canada Health Infoway (Infoway) has developed a comprehensive benefits evaluation framework for sites implementing PHRs, inclusive of net benefits or value-based outcomes \[[@ref38]\]. This framework facilitates the evaluation of implementation factors as well as aligning outcomes with PHR use. Our objectives in this study were as follows: 1. To synthesize outcomes generated by benefits evaluations conducted at multiple sites implementing PHRs in Canada, across different types of care settings, and serving different patient populations. 2. To estimate the relative economic benefit of implementing PHRs in those different care settings and patient populations compared with business as usual (either before or in the absence of PHR implementation) from 3 perspectives---health system (payer), patient and caregiver, and the economic benefit to society resulting from improved population health (societal perspective). We used contextually specific data as well as cost and outcome data from the peer-reviewed literature to demonstrate the current and potential added value generated by PHR adoption and implementation at a national level across various health care settings, patient populations, and 4 specific PHR functionalities. In addition to estimating value based on resources saved by patients and caregivers and clinician and clinic productivity gains, we used a novel application of various approaches to empirically link PHR use and improved health, health behaviors, and increased life satisfaction. Methods ======= Overview -------- We developed 3 quantitative models to estimate the economic benefit of patients and health care organizations having access to PHRs, relative to what occurred or would occur in the absence of being able to access PHRs (ie, business as usual). Typically, economic analyses of interventions or technologies in health care estimate the comparative effectiveness, utility, or broader opportunity cost between 2 or more alternative interventions \[[@ref11],[@ref39]\]. Given the variability of implementation costs, relative provincial investment in digital health initiatives, and amount of financial support allocated to each PHR implementation site in Canada, we opted to present a cost-outcome description that synthesizes the aggregate population-level economic benefits of PHR adoption and implementation in Canada. Specifically, we applied a 1-sided economic analysis that estimates the economic benefits of the relative health care quality, access, and productivity gains from PHR implementation versus nonimplementation. Each of the 3 models reflects a different perspective from which we conducted our analyses: 1. Patient and caregiver perspective 2. Health systems perspective 3. Societal perspective/improved health Data and Model Inputs --------------------- We drew on the benefits evaluation studies of recent PHR initiatives conducted by Canadian health care organizations (n=12) to derive estimates of any added economic benefits. Data from these evaluations represented PHR sites in 5 provinces (British Columbia, Saskatchewan, Ontario, Quebec, and Nova Scotia). Each study employed a system and use survey that examined the use of PHR functions as well as PHR user experiences and also explored quantitative outcomes of use. In addition, the sites used administrative records and user reports to assess the odds of user versus nonuser requests for health care information, average number of visits avoided (for both groups), and resulting organizational efficiency gains (eg, full-time equivalent staffing saved). Further information regarding the studies included in our 3 quantitative models can be found in [Multimedia Appendices 1](#app1){ref-type="supplementary-material"} and [2](#app2){ref-type="supplementary-material"}. To expand our models to include relevant benefits found in the peer-reviewed literature, we conducted a systematic search of the following electronic bibliographic databases: EconLit, Health Systems Evidence, PsycINFO, and MEDLINE. Our key search terms included personal health record OR patient portal AND (economic benefit OR benefit). The following limits were applied to all searches: (1) keyword search to abstract and title, (2) English or French, and (3) 2010 to 2017. A team of 2 researchers conducted the searches and subsequent stages of review and extraction. ### Selection of Model Inputs For inclusion in our study, the peer-reviewed and gray literature had to (1) provide estimates of the economic benefit of PHR use from the patient, system, or societal perspectives, (2) provide clinical benefits of PHR use, and (3) take place in a high-resource health system context. The excluded studies were those without a counterfactual scenario (ie, PHR use compared with no health system use), those that included PHRs with functionalities out of scope, or intervention studies without a quantified clinical outcome clearly attributable to PHR use. After applying the selection criteria, a total of 81 studies were selected for full-text review, and 21 of these were used as the primary input sources to the quantitative models developed. From studies selected for inclusion (including the benefits evaluations conducted in Canada), 2 researchers reviewed each document and extracted data on clinical and economic benefits of PHR use. A third member of the research team (CL) validated each extracted benefit and model input. The outcomes reported by respondents in these evaluations generated a range of values of effectiveness, using a series of classification factors in the Infoway Benefits Evaluation framework. As seen in [Table 1](#table1){ref-type="table"}, these classification fields included PHR functionality, care setting, benefit domain, and benefit recipient or patient population targeted by the intervention and care setting. ###### Classification factors for benefit estimation. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Field of classification Definition ------------------------------ ----------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- **PHR^a^** **functionality** **The method by which the PHR engages patients/caregivers.** \ Electronic view Primary function of PHR is the viewing of health information. \ Electronic visit A patient e-service that allows patients and their caregivers the ability to communicate with their health care team through secure email or short message service text messaging. \ Virtual visit A patient e-service that allows patients and their caregivers the ability to meet with their health care provider via a face-to-face virtual encounter through functions such as video calls. \ Electronic prescription renew A patient e-service that allows patients and their caregivers to renew prescriptions. **Care setting** **The medical care setting in which the benefit of PHR was found to accrue.** \ Primary care Day-to-day health care delivered by a health care provider (eg, general practitioner's office). \ Specialist care---mental health Health care provided for issues related to mental health, including community-based and inpatient care. \ Specialist care---chronic conditions Health care provided for issues related to other chronic conditions such as diabetes. \ Hospital-based care Inpatient and outpatient care provided in hospital/hospital-affiliated settings. \ Pediatric care Health care provided to children. **Benefit domain** **Areas of value.** \ Quality An increase in health quality as a result of PHR use, such as increased healthy behaviors, improved health outcomes, or increased life satisfaction. \ Productivity An increase in productivity as a result of PHR use, such as saved time or resources. \ Access An increase in access to health care as a result of PHR use. **Benefit recipient** **The recipient of the benefit.** \ Patient/caregiver The benefit accrued directly to the patient or caregiver. \ Health system The benefit accrued to the health system (eg, the primary care provider or the hospital). \ Health outcomes The benefit involved an improvement in population health. **Resource saved** **The way in which patients/caregivers, the health system, and health outcomes benefitted from PHR use.** \ Avoided visits to health care providers The primary way by which patients/caregivers benefitted from PHR use, including saved time and cost related to travel, saved time arranging caregiving and caregiving costs, and avoided time off work. \ Increased productivity among health systems The primary way by which health systems benefitted from PHR use, including avoided visits and reduced calls from patients/caregivers, avoided emergency department visits, and avoided preventable adverse drug events. \ Improved healthy behaviors A way in which health outcomes benefitted from PHR use, such as better medication adherence. \ Increased life satisfaction A way in which health outcomes benefitted from PHR use, using a validated life satisfaction scale. \ Improved health A way in which health outcomes benefitted from PHR use, through changes in patient activation. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ^a^PHR: personal health record. Once we classified areas of value to benefit domains, as outlined above, we created a hierarchy of specific value-based outcomes, as outlined in [Figure 2](#figure2){ref-type="fig"}, such that benefit recipients were the primary classification factor, followed by the associated PHR functionality, care setting, benefit domain, and empirical value of resource saved. Estimates were adjusted to the specific yearly (2016 and 2017) utilization rates for each PHR functionality, the Canadian population aged over 18 years reporting access or use of indicated health services, and affected clinical populations for health outcomes estimates, both nationally and by care setting. ![Hierarchy of benefit classification.](jmir_v21i6e12277_fig2){#figure2} As it is unknown if and to what extent certain PHR functionalities might increase health care costs, we defined and included value-based outcomes in terms of the change in units of resources used (by patients and health systems) relative to a counterfactual scenario. The extracted outcomes data represented the added value of PHR use reported compared with an alternative scenario or counterfactual. For example, 1 health system outcome was *avoided medical errors* achieved through patient use of an electronic prescription renewal when compared with traditional prescription renewal processes. The value to the health system in this regard results from reduced preventable adverse events (primarily drug-related events) and a resulting reduction in unnecessary health system utilization. To avoid double-counting benefits or discounting costs related to PHR implementation in terms of patient and health system resources, we included only benefits that were clearly separate from resource costs. For example, because e-Visit functionalities in primary care settings involve physician time, we did not count avoided in-person visits to primary care physicians as an economic benefit to the health system but did for patients who saved time and financial costs. [Multimedia Appendices 3](#app3){ref-type="supplementary-material"}, [4](#app4){ref-type="supplementary-material"}, and [5](#app5){ref-type="supplementary-material"} provide an overview of the included Infoway studies, the final sample of respondents from which the reported outcomes are derived, the counterfactual/comparison group or alternative scenario used for comparison, and the type of indicators used for the patient, health system, and societal perspectives, respectively. In addition to the outcomes extracted from Canadian PHR initiatives, we drew on various sources to identify relevant estimates for classification factors from publicly available data. See [Multimedia Appendices 1](#app1){ref-type="supplementary-material"} and [2](#app2){ref-type="supplementary-material"} for an overview of the data sources used to estimate economic benefits Canada-wide from patient/caregiver and health system cost perspectives, respectively. Model Estimation ---------------- We defined the economic benefit or value *V* to each perspective as the reported costs to patients and health systems in the absence of PHRs, less the cost savings *S* reported as a result of PHR adoption or implementation within a health care setting. We offset the cost savings reported by subtracting an estimate of the deadweight, or cost savings that may have occurred naturally, in the absence of PHR adoption. V Patient = C PCurrent -- (S T \+ S LF \+ S C -- D) Costs to patients and caregivers were expenses related to attending an in-person appointment with their health care provider. Resources saved by patients included travel costs and travel time, caregiving costs and time spent arranging care, and reduced time away from paid employment. Direct average costs were obtained from primary data collected from patients' and caregivers' self-reporting from Canadian PHR implementations and used as model inputs. In terms of indirect costs, the amount of time saved was obtained from patients' and caregivers' self-reporting and valued using median Canadian income for time away from paid employment. For time costs that did not relate to paid employment, time was valued at 25% and 50% of median income. [Multimedia Appendix 1](#app1){ref-type="supplementary-material"} contains details related to the sources used to value patient/caregiver costs, and [Multimedia Appendix 6](#app6){ref-type="supplementary-material"} provides a narrative summary of how we calculated estimates from this perspective. V Health system = C HSCurrent -- (S U(AV,H0) \+ S PG \+ S PS -- D) From the health system perspective, current costs are a function of the quantity of health care services provided within the relevant health care setting and to the relevant patient population and the cost per service. Resources saved for health systems include health care provider time (reduction in clinician time to complete tasks/patient consultation), increased productivity, and savings resulting from improved patient safety (eg, reduced preventable adverse drug events). For example, patients and caregivers having access to prescription information on the Web can increase patient and caregiver awareness of their current and previous medications, resulting in decreased prescription error on the supply side (pharmacists and health care providers) and increased medication adherence by patients. See [Multimedia Appendices 2](#app2){ref-type="supplementary-material"} and [7](#app7){ref-type="supplementary-material"} for details regarding valuation sources and an overview of methods used to estimate the value of citizens' use of PHR functionalities to health systems in Canada. V Population = C HSCurrent -- (V Satisfaction \+ S Health \+ S Health behavior -- D) Where there are tangible costs avoided to the health system attributable to PHR use (eg, unnecessary in-person visits avoided and provider time on operational tasks mitigated by Web-based communication or automation), estimates of benefit to the health care systems in Canada are more straightforward than for less tangible benefits such as improved health, health care behaviors, and health status. To provide estimates of improvements to behaviors and health status, we converted positive health outcomes reported in the amassed evidence base into specific econometric indicators of resources saved, according to associated PHR functionalities. In addition to estimating the value of improved health behavior and health status of PHR users compared with nonusers, we created a direct empirical link between improvement in life satisfaction reported by adults with severe and persistent mental illness as a result of using PHR functionalities and a household income equivalent. We applied a compensating differential approach developed by Helliwell and Huang (2010) \[[@ref40]\] that takes the difference in life satisfaction before/after for PHR users versus nonusers and then divides this by the coefficient for the marginal effect of life satisfaction on household income for Canadians (beta=0.14). For a detailed overview of the approaches used to estimate the value of improved health behaviors and health status, see [Multimedia Appendix 8](#app8){ref-type="supplementary-material"}. Range of Values --------------- In each of the 3 models, we estimated a range of value for benefits currently realized as well as the potential value for these initial benefit areas with advanced utilization rates. Ranges in current utilization rates of available PHR functionalities were measured in 2016 and 2017 from nationally representative surveys designed by Canada Health Infoway and administered by an independent research organization \[[@ref7],[@ref8]\]. To model potential value-based outcomes, we applied projected utilization rates of 25%, 35%, and 50%. The magnitude of ranges illustrated in our final estimates represent variations in the reported outcomes realized, in the way in which personal time can be valued as a proportion of income, and in reported uses of the health care system. Assumptions ----------- The assumptions underlying our calculations were as follows: 1. The benefits realized by the study sample from source evidence reflect benefits that could be realized by populations with similar case mixes or diagnoses. 2. Benefits realized by health care organizations in terms of increased productivity are transferable to other similar contexts across Canada. 3. The proportion of the population represented by each province in Canada can be used to expand province-level benefits to national-level benefits. Conversely, national-level benefits can be disaggregated into those at the provincial-level. 4. Outcomes related to PHR effectiveness remain constant over time. All the estimates generated by valuing provider time (ie, time saved by health care providers and organizations) were created on the basis of a range of values from the least expensive unit of time (eg, an administrative staff) to the most expensive unit of time (eg, a physician). Results ======= Overview -------- [Table 2](#table2){ref-type="table"} summarizes the outcomes identified in our review by PHR functionality and outlines areas in which PHRs have led to identified benefits and in which care settings those benefits were realized. Current Canadian PHR adoption rates range from 3% to 4% for virtual visit technology to 10% to 12% for e-Rx renew functionalities. The benefits realized included avoided visits and time costs saved across different care settings, such as community-based clinics, primary care clinics, and hospitals. ###### Summary of evidence of Canadians' current use of personal health records and electronic services. Personal health record functionality Electronic view Electronic visit Virtual visit Electronic prescription renew -------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Adoption rate 7%-8% of Canadians can and have accessed their health care information on the Web. 5%-8% of Canadians can and have communicated with their health care provider securely on the Web. 3%-4% of Canadians can and have visited virtually with their health care provider securely on the Web. 10%-12% of Canadians can and have renewed their prescription medication on the Web. Care setting Primary care, hospital care, and community-based mental health services were care settings where Canadians and health systems benefited from accessing their health care information on the Web. Community-based mental health services were the care setting where Canadians and health systems benefited from communicating with their health care provider securely on the Web. Primary care was the care setting where Canadians and health systems currently benefited from visiting virtually with their health care provider on the Web. Primary care networks for people with chronic conditions demonstrated potential benefits to Canadians and health systems. Community-based mental health services and hospitals were the care settings where Canadians and healthy systems benefited from renewing their prescription medication on the Web. Resource saved (patient) Canadians benefited by avoiding visits to primary and mental health care providers. Canadians benefited by avoiding visits to primary and mental health care providers. Canadians benefited by avoiding visits to primary health care providers. Canadians benefited by avoiding visits to primary and mental health care providers. Resource saved (health system) Health systems benefited by increased productivity (time saved because of avoided visits and calls). Health systems benefited by increased productivity (resources saved because of avoided emergency department visits). Health systems benefited by increased productivity (resources saved because of avoided emergency department visits). Potential benefits were also identified through increased access via remote care provision. Health systems benefited by increased productivity (time saved because of avoided visits) and increased quality (preventable adverse drug events avoided). Patient/Caregiver Perspective ----------------------------- ### Current Benefit For patients and caregivers, direct value from PHRs currently manifests in the form of avoided in-person visits to health care providers, leading to savings in travel time and costs, caregiving costs and time arranging care, and time off work. These savings are generally shared across e-View, e-Visit, e-Rx renew, and virtual visit functionalities, with variations resulting from differing adoption rates, care settings, and the number of Canadians accessing certain types of health care services (ie, Canadians with a primary care physician or Canadians having a laboratory test in the past year). Evidence of the value of PHRs for patients and caregivers in Canada has so far been demonstrated in primary care and mental health care settings (see [Multimedia Appendix 9](#app9){ref-type="supplementary-material"}). Given this, model estimates were associated with population-level access estimates in these care settings. The value to Canadians who use currently available PHR functionalities is estimated to be Can \$119 to Can \$150 million per year (aggregated across all Canadians at current adoption rates). [Figure 3](#figure3){ref-type="fig"} demonstrates the way in which this value is distributed across PHR functionalities: overall, our patient model demonstrates that most of the current value (2016-2017) to patients and caregivers is derived from e-Rx-renew (34%), followed by e-Visit (28%), e-View (26%), and virtual visit (12%). Canadians have varying health care needs and, accordingly, different patterns of service use within the health care system. These factors affect the range and magnitude of value to citizens from use of the PHR functionalities estimated in this study and are important to interpret in context. We present below the range of total value for Canadian population subgroups based on frequency of visits per year \[[@ref8]\], represented in terms of avoided costs because of avoided unnecessary in-person visits, weighted by utilization rates of PHR functionalities and the proportion of the population that reported each frequency of visit to their health care provider. The current annual aggregated value to Canadian patients/caregivers based on health system utilization for low-, medium-, and high-volume health system user segments of the Canadian population is as follows: 1. Can \$61 to 153 million for the 41% of the Canadian population that makes 1 to 2 visits to a health care provider per year, 2. Can \$87 to 148 million for the 19% of the Canadian population that makes 3 to 4 visits to a health care provider per year, and 3. Can \$143 to 180 million or more for the 19% of the Canadian population that makes 5 or more visits to a health care provider per year (value estimates are based on 5 visits per year). ![Current annual value to Canadians who use personal health records, by functionality. e-View: electronic view; e-Visit: electronic visit; e-Rx renew: electronic prescription renew.](jmir_v21i6e12277_fig3){#figure3} ### Potential Benefit On the basis of these value estimates, if Canadians were to increase PHR adoption from current adoption rates to 25%, 35%, or 50%, the total value to patients and caregivers would increase to Can \$470 million, Can \$658 million, and Can \$940 million, respectively. [Figure 4](#figure4){ref-type="fig"} represents how increasing adoption rates of each PHR functionality would increase the value from the patient perspective, assuming a steady-state of benefits realized (ie, that the benefits to Canadians remained constant over time). ![Projection of patient/caregiver benefits with increased personal health record adoption. e-view: electronic view; e-visit: electronic visit; e-Rx renew: electronic prescription renew.](jmir_v21i6e12277_fig4){#figure4} Health System Perspective ------------------------- ### Current Benefit From the health system perspective, we found that direct value from PHRs currently manifests in the form of increased productivity, leading to clinic or clinician time saved because of avoided visits and operational and clinician processes involved in responding to and resolving patient phone calls. There is also some evidence of increased health care quality, manifested by avoided preventable adverse drug events. Evidence of the value of PHRs for health systems in Canada has so far been demonstrated in primary care, hospital, pediatric, and mental health care settings, with value also identified internationally in other areas of specialized care (eg, veteran health services and chronic illnesses; see [Multimedia Appendix 10](#app10){ref-type="supplementary-material"}). The non-Canadian evidence mentioned above also shows promising evidence of benefits for virtual visit functionalities. The current estimated value to health systems where PHR functionalities are in use is estimated to be Can \$106 to Can \$134 million a year. [Figure 5](#figure5){ref-type="fig"} demonstrates the way in which that value is distributed across PHR functionalities. Overall, the health system model demonstrates value primarily related to e-View (72%)---the most widely available and utilized functionality---followed by e-Rx renew (15.2%), e-Visit (11.1%), and virtual visit (1.7%). We see below that most of the cost savings to the health system are driven by e-View functionality and are estimated at between Can \$81 and Can \$96 million per year. Under the assumption that the savings associated with virtual visit use for specialized care can be realized in Canada at the same rate it has been realized internationally, savings for that functionality would rise from Can \$27 to Can \$54 million. In addition, in 2 of the identified studies, outcomes of PHR use were measured separately for different functionalities, allowing the model to explore the marginal benefit of increased PHR-enabled provider interaction within the same patient population. Using these studies, the model for valuing health system benefits of PHR use found that with increased opportunities for patients to directly consult or communicate with their providers, the value to the health system increased by 24% to 32%. In other words, moving from being able to passively view health care information on the Web to communicating or consulting virtually with a health care provider generated substantially more value to both patients and the health system. For example, in 1 study \[[@ref31]\], the estimated benefit of patients using only e-Rx renew in a hospital setting was Can \$105 million, whereas the estimated benefit of patients who used the e-Visit function was Can \$127 million. ![Current annual value to health systems where personal health record functionalities are in use. e-view: electronic view; e-visit: electronic visit; e-Rx renew: electronic prescription renew.](jmir_v21i6e12277_fig5){#figure5} ### Potential Benefit Using the estimates of value to health systems in Canada, we found that if Canadians were to increase PHR adoption to 25%, 35%, or 50%, the total value to patients and caregivers would increase to Can \$362 to Can \$391 million, Can \$505 to Can \$543 million, and Can \$720 to Can \$769 million, respectively. [Figure 6](#figure6){ref-type="fig"} represents how increasing adoption rates of each PHR functionality would increase the value from the health system perspective, assuming a steady state of benefits realized. The second set of totals (represented by italicized figure ranges in parentheses below) represent the integration of benefits estimates that assume increased adoption and integrate evidence from jurisdictions outside of Canada with wrap-around PHR functionalities (inclusive of virtual visits). If Canadians had access to comparable PHRs, the total value to health systems in Canada would be Can \$131 to Can \$185 million at current adoption rates, and when projected to 25%, 35%, and 50%, the estimated values would range from Can \$1.3 to Can \$5.4 billion, Can \$1.8 to Can \$7.5 billion, and Can \$2.6 to Can \$10.7 billion, respectively. ![Projection of health system benefits with increased personal health record adoption. e-view: electronic view; e-visit: electronic visit; e-Rx renew: electronic prescription renew.](jmir_v21i6e12277_fig6){#figure6} Societal Perspective -------------------- Most evidence regarding PHR use and health outcomes was generated in hospital or integrated care settings in the United States; 1 study was based in Canada. All of the evidence used as inputs into our population health model related to outcomes of interventions targeted specifically to people with diabetes or people with severe and persistent mental illness. Specific outcomes with sufficient evidence included improved health status through greater glycemic control, increased household income through improved life satisfaction, and increased positive health behaviors through improved medication adherence \[[@ref21],[@ref26],[@ref40]\]. The monetary value of those improved health outcomes breaks down as follows in [Figure 7](#figure7){ref-type="fig"}, with the majority of the economic benefit realized being driven by the e-Visit functionality. [Multimedia Appendices 9](#app9){ref-type="supplementary-material"},[10](#app10){ref-type="supplementary-material"}, and [11](#app11){ref-type="supplementary-material"} provide summaries of each of the 3 quantitative models (patient/caregiver, health system, and population health). ![Value of improved health outcomes due to personal health record use, by functionality. e-view: electronic view; e-visit: electronic visit; e-Rx renew: electronic prescription renew.](jmir_v21i6e12277_fig7){#figure7} Discussion ========== Understanding how implementation of PHRs could benefit patients and caregivers, as well as health care systems in high-resource settings such as Canada, is an important step in exploring ways in which digital health technologies can facilitate improved patient engagement and, ultimately, population health outcomes and system transformation strategies for sustainability. We found that Canadians having Web access to their health care information, as well as communication and consultation services with providers via PHR functionalities, generates a substantial economic benefit from patient, health system, and broader societal perspectives. The hierarchy of classification factors we developed presents a practical approach to estimating economic benefit within the field of digital health and patient empowerment research, where questions of who accrues benefits and from which PHR functionalities are likely to inform decisions as to where and how increased access to PHR functionalities should be supported. Current Benefits ---------------- The majority of the current benefits seen in this study to Canadian patients and caregivers were realized in primary care and mental health settings and were resulting from the use of e-Rx renew functionalities *.* For health systems, the majority of the benefits were realized by citizens' use of e-View functionalities within primary care settings. Comparing these 2 perspectives, the range of estimates for the health systems perspective was much wider than that of the patient/caregiver perspective (1.7%-72% vs 12%-34%, respectively). The relatively large share of benefits driven by e-Views for health systems, particularly in primary care settings, is likely a function of the limited available evidence, as well as the relatively broad population base that reports having access to primary care services in Canada. Patient access to health care information on the Web is therefore clearly linked to cost savings for both patients and health systems. Evidence for benefits related to improved health outcomes was found in relation to PHR functionalities that enabled greater interaction and communication with health care providers and services: e-Visit, virtual visit, and e-Rx renew. This suggests that having access to technology that allows for more timely interactions between patients and health care providers and clinic administration has added benefits and value for the health of participating patients. Potential Benefits ------------------ For patient and health system perspectives, potential benefits were estimated using 2 different methods. The first method projected increases in adoption rates, and the second method relied on evidence from health management organizations in the United States that had implemented PHRs with integrated communication and clinical consultation e-service functionalities (e-Visit and virtual visits) \[[@ref42],[@ref43]\]. Although such integrated PHR models are not yet available in Canada, the health outcomes reported resulted from patient use of PHR consultation and communication functionalities and may indeed be applicable to health outcomes in the Canadian context and that of other international health systems. Evidence from current and emerging models of care provides insight into key factors that facilitate health systems modernization to advance clinic/clinician adoption and integration of virtual care electronic services (e-Services), such as remuneration of health care providers. The majority of potential improvement in health outcomes in our model is driven by increased integration of e-Services within health care organizations and by increased adoption of PHRs by older adults, particularly those in long-term care facilities. We were able to establish a direct link between increased life satisfaction for adults with severe and persistent mental illness who used PHRs compared with those who did not, with an equivalent increase in household income. This contributes to the literature by creating an empirical association between PHR use, patient activation and engagement \[[@ref18]\], well-being, and ultimately economic benefit to populations accessing health care services. Process Matters---Effectiveness and Value of Personal Health Records in Context ------------------------------------------------------------------------------- Our findings are in line with other studies measuring the value of PHR use compared with business as usual or the absence of a PHR initiative within a health care organization \[[@ref22],[@ref23],[@ref44]\]. There is added value of PHR implementation and adoption by patients and health care organizations, compared with settings with a lack of PHR access, but the degree to which realization of economic value offsets costs of investment and implementation of PHRs is difficult to assess. Similarly, it is challenging to understand the opportunity cost of investing in PHR implementation when benefit estimation perspectives and those sectors investing resources may not be wholly connected. Critical Mechanisms and Factors of Success ------------------------------------------ Ultimately, it is likely that PHRs with integrated communication and consultation functionalities will become business as usual in many health care settings and the suite of e-Services available will broaden to include a variety of automated machine learning and artificial intelligence features to support and advance health and wellness needs and facilitated interactions with care providers, organizations, and resources. As availability and adoption become more widespread, factors informing successful implementation, such as integration within health system workflows and provider remuneration structures, will become increasingly important. Limitations ----------- We drew on evidence synthesized from the peer-reviewed literature as well as benefits evaluations of PHR implementation sites in Canada to develop 3 models estimating benefits of PHR use to Canadians and Canadian health systems. As such, our models are limited by the quality of the evidence generated from these studies. Variability in the number of respondents comprising study sample sizes, as well as the typical absence of a comparison group or counterfactual, also limits the generalizability of our estimates and may result in the over- or underestimation of benefits across the 3 models. To estimate the value of PHR use from the patient/caregiver perspectives, we valued indirect costs using median income estimates in Canada and 50% of median hourly income to calculate nonlabor costs. It is likely that the distribution of income varies greatly across participants of the studies from which model inputs were drawn. As those who use PHRs tend to have higher income, this likely underestimates the value to current PHR users; however, it may more realistically represent the broader population who could potentially adopt PHRs. To obtain a Canada-wide set of estimates, we used average costs for health services in Canada; however, these were weighted by the total Canadian population and appropriate adoption rates. Finally, we did not include the cost of investment in PHR development, implementation, and evaluation, therefore, we do not make any claims about the relative benefit with respect to overall cost. We do, wherever possible, account for variable costs by using only the marginal benefit experienced by health care organizations to calculate estimates of economic value by perspective. Implications for Research and Practice -------------------------------------- PHRs with high levels of direct interaction with care teams showed promising potential value if broadly implemented in the Canadian context with a particular focus on advancing adoption among certain clinical populations---namely, high-frequency health system users and their caregivers. Gaps in evidence include information about PHR use and related outcomes across PHR functions, care settings, and patient populations (see [Table 3](#table3){ref-type="table"}). From the patient/caregiver perspective, the care settings of studies that generated value-based estimates across e-Services did not include in-patient hospital care. Further research is needed to understand the value to patients and caregivers of PHR use when interacting with acute in-patient care settings. From the health system perspective, gaps in evidence available for estimating values differed according to PHR functionality. To gain a more fulsome understanding of how viewing medical records benefits both patients and health systems, research is needed to evaluate how this may differ across primary care versus specialized in-patient and outpatient hospital settings. There is also a paucity of information available concerning e-Visit, virtual visit, and e-Rx renew service use and related benefits. Finally, an important area for further research is understanding if and how PHR functionalities---particularly virtual visit---influence health system utilization and health outcomes for individuals with chronic conditions, especially older cohorts of adults. ###### Current gaps in evidence related to personal health records. Personal health record functionality Electronic visit Virtual visit Electronic prescription renew -------------------------------------- ---------------------------------------- ---------------------------- ---------------------------------------------------------------- Care settings with evidence included Community-based mental health services Primary care Community-based mental health and outpatient hospital services Lack of evidence to inform model Primary and outpatient specialist care Outpatient specialist care Primary care Priority research area Yes Yes Yes Overall, more evidence is needed to expand the scope of benefits to include care settings outside of primary care and specialized mental health services, as well as settings advancing access to connected care e-service functionalities (beyond e-View). Understanding the different ways in which different populations benefit---and in which care settings---from saving resources because of PHR use will require further data development, especially regarding: 1. How caregivers use PHRs and how they benefit, 2. How geographic location and proximity to health services influences value for patients, 3. How key determinants of technology adoption may influence who and how patients, caregivers, and health systems use PHRs, and how this relates to any outcomes experienced, and 4. How different populations with high potential value approach PHR use and technology use more broadly. Conclusions ----------- There is clear value to patients, health systems, and society of patients having Web-based access to their health care information and to consultation and communication e-Services with their providers and care organizations. Increasing this value and benefit would include bridging the digital divide and helping to facilitate training for both patients/caregivers and providers/organizations. To our knowledge, this is the first study synthesizing and estimating the value-based outcomes of PHR adoption and use across multiple sites at a national level. In addition, we feel we have contributed to the field by generating care setting and patient population--specific estimates across a range of adoption rates, effectiveness, and cost levels to explore how targeting various populations (eg, high-volume users, adults with severe and persistent mental illness, older adults in long-term care facilities, and individuals with chronic conditions) could yield further economic and health benefits to patients, caregivers, and health systems. Finally, our findings point to priority areas for new research that can allow for robust economic evaluations of PHRs, guide strategic health system policy and strategy, and identify empirical links between PHR use and cost savings, as well as determinants and mediators of PHR use and individual/population health outcomes across modernizing health care systems around the world. Canada Health Infoway Inc funded this study. Canada Health Infoway Inc also covered the publication costs for this study. Canada Health Infoway Inc is an independent, not-for-profit organization funded by the federal government that works to accelerate the development, adoption, and effective use of digital health across Canada. The funders had no role in the extraction of data from source evidence or specification of model estimates. The funders did review and validate model estimates. CL (affiliated with Canada Health Infoway) was a member of the research team and was involved in study design, interpretation, and manuscript development. Conflicts of Interest: CL is a Director at Canada Health Infoway, a federally funded national organization advancing citizen's access to their health information and e-Services across Canada. Source list, patient/caregiver perspective. Source list, health system perspective. Studies and outcomes included for patient/caregiver perspective. Studies and outcomes included in health system perspective. Studies and outcomes included in population health perspective. Narrative summary of patient/caregiver perspective estimates. Narrative summary of health system perspective estimates. Narrative summary of population health perspective estimates. Quantitative model summary, patient/caregiver. Quantitative model summary, health system. Quantitative model summary, population health. EHR : electronic health record e-Rx renew : electronic prescription renew e-Services : electronic services e-View : electronic view e-Visit : electronic visit PHR : personal health record
{ "pile_set_name": "PubMed Central" }
1. Introduction =============== Multi-drug resistance (MDR), which refers to the resistance of cancer cells to multiple structurally and mechanistically unrelated anticancer drugs, is the major obstacle to successful cancer chemotherapy in the clinic \[[@B1-molecules-18-12793],[@B2-molecules-18-12793]\]. P-glycoprotein (P-gp, ABCB1), a member of the ATP-binding cassette (ABC) family, exports structurally diverse compounds from cells through a process driven by ATP hydrolysis \[[@B3-molecules-18-12793],[@B4-molecules-18-12793]\]. High expression and activity of ABCB1 has been linked to the efflux of chemotherapeutic drugs in cancer cells. Indeed, ABCB1 acting as a drug efflux pump is the most important cause of MDR \[[@B5-molecules-18-12793],[@B6-molecules-18-12793]\]. It is well established that many chemotherapeutic agents exert anticancer activity by inducing apoptosis. Most chemotherapeutic agents applied in the treatment of hematologic malignancies cells can induce apoptosis, but MDR tumor cells are generally resistant to apoptosis induction \[[@B7-molecules-18-12793],[@B8-molecules-18-12793]\] and the resistance of leukemic cells to chemotherapy-induced apoptosis remains the most serious problem in the treatment of leukemia \[[@B9-molecules-18-12793],[@B10-molecules-18-12793],[@B11-molecules-18-12793]\]. Currently, the most attractive strategy for overcoming MDR is to use sensitizer or reversal agents, which are combined with chemotherapeutic drugs \[[@B12-molecules-18-12793]\]. Great effort has been taken to find reversal agents from natural products \[[@B13-molecules-18-12793],[@B14-molecules-18-12793],[@B15-molecules-18-12793]\]. In our previous study, we have found that lathyrane diterpene Euphorbia factor L1 (EFL1, [Figure 1](#molecules-18-12793-f001){ref-type="fig"}A) from seeds of *Euphorbia lathyris*, can reverse ABCB1-mediated MDR by inhibiting the efflux function of ABCB1 \[[@B16-molecules-18-12793]\]. In this article, the apoptosis sensitization effect of EFL1 in ABCB1-mediated MDR K562/ADR cells was reported. 2. Results and Discussion ========================= Chemotherapy is a valuable tool used in cancer treatment. However, the emergence of cancer cell resistance to chemotherapy often undermines treatment efficacy. Recently, investigators have carried out numerous studies on drug resistance reversal in cancer cells \[[@B17-molecules-18-12793]\]. The major mechanism of resistance is the over-expression of drug efflux pumps, such as P-glycoprotein (ABCB1, P-gp). Multi-drug resistance (MDR) in hematological malignancies is also the main reason of chemotherapy failure \[[@B18-molecules-18-12793],[@B19-molecules-18-12793]\]. One strategy for reversal of MDR in cells over-expressing ABC transporters is the combined use of anticancer drugs with modulators. We examined the cytotoxicity of EFL1 ([Figure 1](#molecules-18-12793-f001){ref-type="fig"}A) alone in different cell lines by the MTT assay. The IC~50~ values were 33.86 ± 2.51, 39.64 ± 2.93 μM to K562 and K562/ADR cells (treatment time of 96 h), respectively ([Figure 1](#molecules-18-12793-f001){ref-type="fig"}B). More than 90% of cells were viable at the concentrations of EFL1 up to 10.0 μM in all cells under experiments (treatment time of 72 h). We selected EFL1 of 2.5, 5.0 and 10.0 μM to assess reversal of MDR *in vitro* (treatment time of 72 h). In our study, multidrug-resistant K562/ADR cells were less sensitive to adriamycin cytotoxicity and accumulated less adriamycin than K562 cells ([Table 1](#molecules-18-12793-t001){ref-type="table"}). The indicated concentrations of EFL1 were chosen for combination treatment with known anticancer drugs acting as substrates of ABCB1, such as Vincristine (VCR) and doxorubicin (DOX). Our data showed that EFL1 dose-dependently enhanced the cytotoxicity of tested anticancer drugs in MDR cells. EFL1 of 2.5, 5.0 and 10.0 μM showed 1.74, 3.79 and 5.88 reversal fold against resistance to DOX in K562/ADR cells, respectively. EFL1 of 2.5, 5.0 and 10.0 μM showed 2.76, 5.06 and 8.47 reversal fold against resistance to VCR in K562/ADR cells, respectively. However, in drug sensitive K562 cells, the cytotoxicity generated by VCR or DOX was unaffected at the presence of EFL1. To evaluate substrate specificity of the transporter, cisplatin, which is not the substrate of ABCB1, was selected as the control \[[@B16-molecules-18-12793]\]. Intriguingly EFL1 did not significantly alter the IC~50~ values of cisplatin in parental sensitive and ABCB1-mediated MDR cells. These results suggested that EFL1 strongly enhanced the sensitivity of ABCB1-overexpressiong MDR cells to conventional chemotherapeutic agents, while EFL1 did not affect the sensitivity of parental sensitive cells. ![Chemical structure of Euphorbia factor L1 (**A**) and cell growth inhibition results in K562 and K562/ADR cells (**B**).](molecules-18-12793-g001){#molecules-18-12793-f001} molecules-18-12793-t001_Table 1 ###### Effects of EFL1 on reversing ABCB1-mediated drug resistance. IC~50~ ± SD (μM) (fold-reversal) ----------------- ---------------------------------- --------------------------- VCR 0.032 ± 0.001 3.261 ± 0.412 \+ 2.5 μM EFL1 0.032 ± 0.001 (1.00) 1.184 ± 0.027 \*\* (2.76) \+ 5.0 μM EFL1 0.033 ± 0.001 (0.97) 0.644 ± 0.015 \*\* (5.06) \+ 10.0 μM EFL1 0.031 ± 0.001 (1.03) 0.385 ± 0.013\*\* (8.47) Cisplatin 3.642 ± 0.135 3.895 ± 0.167 \+ 10.0 μM EFL1 3.510 ± 0.153 (1.04) 3.933 ± 0.204 (0.99) DOX 0.526 ± 0.0446 14.302 ± 1.237 \+ 2.5 μM EFL1 0.513 ± 0.044 (1.02) 8.210 ± 0.068 \*\*(1.74) \+ 5.0 μM EFL1 0.505 ± 0.040 (1.02) 3.773 ± 0.045 \*\*(3.79) \+ 10.0 μM EFL1 0.502 ± 0.040 (1.05) 2.430 ± 0.072\*\* (5.88) \* and \*\* represent significance at *p* \< 0.05 and *p* \< 0.01, respectively. To investigate the related mechanisms, we examined whether EFL1 affected the accumulation of DOX in parental sensitive and ABCB1-mediated MDR cells. The results ([Figure 2](#molecules-18-12793-f002){ref-type="fig"}) showed that EFL1 increased the accumulation of DOX in K562/ADR cells, as indicated by the significantly higher fluorescence of DOX assayed by flow cytometry. Herein, the *R*-enantiomer of verapamil (R-VRP), being an inhibitor of ABCB1 and reversal agent against ABCB1-mediated MDR, was applied as positive control. In K562/ADR cells, the intracellular accumulation of DOX was enhanced to 1.73-, 1.40-, 1.57- and 1.59-fold *vs.* control for 10.0 μM R-VRP, 2.5, 5.0 and 10.0 μM EFL1, respectively. However, EFL1 did not increase the intracellular accumulation of DOX in K562 cells. These results demonstrated that EFL1 was able to interfere with ABCB1-mediated transport. ![Effects of EFL1 on the accumulation of DOX in K562 and K562/ADR cells. K562 and K562/ADR cells were incubated with 0, 2.5, 5.0 and 10.0 μM EFL1 at 37 °C for 3 h. Then 10 μM DOX of final concentration was added for another 3 h incubation. Intracellular fluorescence was analyzed by flow cytometry with the excitation wave length of 488 nm. R-VRP of 10.0 μM of final concentration was used as the positive control. (**A**) accumulation of DOX in K562 cells. (**B**) accumulation of DOX in K562/ADR cells. (**C**) data analysis of **A** and **B**. All experiments were repeated three times. The relative value was calculated by dividing the fluorescence intensity of sensitive or corresponding drug resistance cells by that of the drug resistance cells without treatment of R-VRP or EFL1, respectively. Columns, means of triplicate determinations. \* and \*\* represent significance at *p* \< 0.05 and *p* \< 0.01, respectively.](molecules-18-12793-g002){#molecules-18-12793-f002} The results of [Figure 2](#molecules-18-12793-f002){ref-type="fig"} indicate that EFL1 could increase intracellular accumulation of ABCB1 substrates. To confirm this, accumulation of rhodamine 123 (Rh123) was determined. Rh123 is also a substrate of ABCB1. At the same time, Rh123 is a fluorescent dye, which can be detected by flow cytometry. [Figure 3](#molecules-18-12793-f003){ref-type="fig"} showed that EFL1 could significantly increase accumulation of Rh123 in K562/ADR cells (*p* \< 0.01 *vs.* control) and did not affect that in K562 cells (*p* \> 0.05 *vs.* control). In K562/ADR cells, the intracellular accumulation of Rh123 was increased to 39.85, 5.06, 7.26 and 9.56 fold *vs.* control for 10.0 μM R-VRP, 2.5, 5.0 and 10.0 μM EFL1, respectively ([Figure 3](#molecules-18-12793-f003){ref-type="fig"}). Taken together, [Figure 2](#molecules-18-12793-f002){ref-type="fig"} and [Figure 3](#molecules-18-12793-f003){ref-type="fig"} provided support for results of [Table 1](#molecules-18-12793-t001){ref-type="table"}. Furthermore, our results exhibited that EFL1 inhibited efflux of Rh123 in K562/ADR cells ([Figure 4](#molecules-18-12793-f004){ref-type="fig"}C,D). At the same time, EFL1 did not affect the efflux of Rh123 in K562 cells ([Figure 4](#molecules-18-12793-f004){ref-type="fig"}A,B). In the absence of Rh123, intracellular Rh123 in K562 cells at time of 2 h was 81.16 ± 1.82%, 80.83 ± 2.12% and 83.68 ± 4.47% of control (initial) for group of untreated, 10.0 μM EFL1 and 10.0 μM VRP, respectively. At the absence of Rh123, intracellular Rh123 in K562/ADR cells at time of 2 h was 42.16 ± 6.78%, 62.62 ± 6.34% and 75.33 ± 4.24% of control (initial) for group of untreated, 10.0 μM EFL1 and 10.0 μM VRP, respectively. ![Effects of EFL1 on the accumulation of Rh123 in K562 and K562/ADR cells. Indicated cells were incubated with 0, 2.5, 5.0 and 10.0 μM EFL1 at 37 °C for 3 h. Subsequently, 5 μM Rh123 of final concentration was added for another 0.5 h incubation. Intracellular fluorescence was determined by flow cytometry with the excitation wavelength of 488 nm. R-VRP of 10.0 μM of final concentration was added as the positive control. (**A**) accumulation of Rh123 in K562 cells. (**B**) accumulation of Rh123 in K562/ADR cells. (**C**) data analysis of **A** and **B**. All these experiments were carried out for three times. The relative value was calculated by dividing the fluorescence intensity of sensitive or corresponding drug resistance cells by that of the drug resistance cells without treatment of R-VRP or EFL1, respectively. Columns, means of triplicate determinations. \* and \*\* represent significance at *p* \< 0.05 and *p* \< 0.01, respectively.](molecules-18-12793-g003){#molecules-18-12793-f003} ![EFL1 inhibited the efflux function of K562/ADR cells and did not influence that of K562 cells. After K562 or K562/ADR cells were treated with 5 μM Rh123 at 37 °C for 30 min, the cells were washed twice by ice-cold PBS and then maintained at 37 °C and absence of Rh123 with culture media containing 10 μM EFL1 or not. At time of 2 h, cells were gathered and washed twice with ice-cold PBS. Subsequently, cells were determined by flow cytometry. (**A**) Rh123 efflux in K562 cells. (**B**) data analysis of **A**. (**C**) Rh123 efflux in K562/ADR cells. (**D**) data analysis of **C**. Columns, means of triplicate determinations. \* and \*\* represent significance at *p* \< 0.05 and *p* \< 0.01, respectively.](molecules-18-12793-g004){#molecules-18-12793-f004} These results indicated that EFL1 could inhibit the efflux function of ABCB1 in K562/ADR cells. It has been proved that EFL1 could increase the ATPase activity of ABCB1 stimulated by VRP by the concentration-dependent manner, acting similarly as verapamil (VRP) and Vandetanib \[[@B16-molecules-18-12793]\]. These indicated that EFL1 reversed ABCB1-mediated MDR via inhibiting function of ABCB1. VCR has been applied to treat leukemia and other cancers, where apoptosis induction is involved in the mechanism of action \[[@B20-molecules-18-12793]\]. Herein, apoptosis induced by VCR in K562 and K562/ADR was investigated. The IC~50~ values for K562 and K562/ADR at the absence of reversal agents were applied, respectively. The results of Annexin V-FITC/PI staining and flow cytometry assay showed that EFL1 sensitized the apoptosis induced by VCR in K562/ADR cells ([Figure 5](#molecules-18-12793-f005){ref-type="fig"}). However, EFL1 did not alter the apoptosis triggered by VCR in K562 cells ([Figure 5](#molecules-18-12793-f005){ref-type="fig"}). After K562 cells were treated for 24 h, the apoptosis rate was 1.4 ± 1.2%, 2.3 ± 0.6%, 16.6 ± 1.4% and 15.7 ± 1.4% for control, 5.0 μM EFL1, 0.03 μM VCR and 5.0 μM EFL1+0.03 μM VCR, respectively. After K562/ADR cells were treated for 24 h, the apoptosis rates were 1.9 ± 1.6%, 2.4 ± 1.0%, 15.5 ± 1.2% and 36.2 ± 3.6% for control, 5.0 μM EFL1, 3.0 μM VCR and 5.0 μM EFL1 + 3.0 μM VCR, respectively. These results were consistent with data of [Figure 2](#molecules-18-12793-f002){ref-type="fig"}, [Figure 3](#molecules-18-12793-f003){ref-type="fig"} and [Figure 4](#molecules-18-12793-f004){ref-type="fig"} and [Table 1](#molecules-18-12793-t001){ref-type="table"}. Apoptosis sensitization mediated by other reversal agents has been reported before \[[@B7-molecules-18-12793]\]. Our results suggested that EFL1 showed similar apoptosis sensitization effects. Furthermore, western blot results confirmed that EFL1 strengthened the activation and cleavage of Caspase-3 and PARP in K562/ADR ([Figure 6](#molecules-18-12793-f006){ref-type="fig"}). After K562/ADR cells were exposed to tested compounds for 48 h, densitometric ratios (%) of activated Caspase-3/GAPDH were 9.23 ± 0.83%, 11.50 ± 1.11%, 33.54 ± 2.16% and 49.90 ± 3.56% for control, 5.0 μM EFL1, 3.0 μM VCR and 5.0 μM EFL1 + 3.0 μM VCR, respectively. Densitometric ratios (%) of cleaved PARP/GAPDH were 17.61 ± 2.39%, 17.80 ± 3.03%, 44.98 ± 3.57% and 74.82 ± 6.62% for control, 5.0 μM EFL1, 3.0 μM VCR and 5.0 μM EFL1 + 3.0 μM VCR, respectively. The results indicated that EFL1 increased the activation and cleavage of Caspase-3 and PARP caused by VCR in K562/ADR cells ([Figure 6](#molecules-18-12793-f006){ref-type="fig"}A,B). Caspase-3 is the executive Caspase leading to cleavage of PARP and other vital proteins in various cells and the cleavage of PARP was observed in our study ([Figure 6](#molecules-18-12793-f006){ref-type="fig"}). Detection of the decrease of the native 116-kDa enzyme and appearance of the 89-kDa fragment of PARP cleavage can be served as a sensitive indicator that cells are undergoing apoptosis \[[@B21-molecules-18-12793]\]. ![Apoptosis sensitization of EFL1 in K562/ADR cells. After cells were treated with indicated drugs for 24 h, cells were collected washed twice with ice-cold PBS. Then 5 × 10^5^ cells were resuspended with 0.5 mL binding buffer containing Annexin-V and PI for 30 min at 37 °C in the dark. After that, the apoptosis was detected by flow cytometry. (**A**) EFL1 sensitized the apoptosis induced by VCR in K562/ADR cells. However, EFL1 did not alter the apoptosis triggered by VCR in K562 cells. (**B**) data analysis of **A**. Columns, means of triplicate determinations. \* and \*\* represent significance at *p* \< 0.05 and *p* \< 0.01.](molecules-18-12793-g005){#molecules-18-12793-f005} Herein, the apoptosis pathway was further investigated, including detection of Caspase-9 and -8 ([Figure 6](#molecules-18-12793-f006){ref-type="fig"}C,D). The results indicated that activation of Caspase-9 was involved by showing decrease of Pro-Caspase-9 when K562/ADR cells were treated with VCR or VCR+EFL1 (*p* \< 0.01 *vs.* control). On the other hand, decrease of Pro-Caspase-8 was not observed (*p* \> 0.05 *vs.* control). It has been reported that activation of Caspase-8 is inhibited by ABCB1 \[[@B7-molecules-18-12793]\], which is consistent with our research. Moreover, release of cytochrome *c* was detected in our research ([Figure 6](#molecules-18-12793-f006){ref-type="fig"}E,F). After K562/ADR cells were treated for 24 h, Densitometric ratios (%) of cytochrome *c*/GAPDH were 11.64 ± 4.08%, 13.69 ± 4.50%, 45.17 ± 9.67% and 102.65 ± 11.56% for control, 5.0 μM EFL1, 3.0 μM VCR and 5.0 μM EFL1 + 3.0 μM VCR, respectively. Our results exhibited that EFL1 could significantly enhance release of cytochrome *c* and then stimulate activation of Caspase-9 (*p* \< 0.01). ![Western blot results of protein related to apoptosis in K562/ADR cells. (**A**) after K562/ADR cells were treated by indicated compounds for 48 h, the total protein was prepared and western blot experiments were carried out. (**B**) Densitometric analysis of western blot results of **A**. (**C**) and (**E**) after K562/ADR cells were treated with indicated compounds for 24 h, whole cell lysates or subcellular fractionation was prepared for western blot. Then, Caspase-8, -9 and cytochrome *c* were determined by western blot. (**D)** and (**F)** Densitometric analysis of western blot results of (**C**) and (**E**), respectively. The values were calculated as (the gray density of investigated protein /the gray density of GAPDH) ×100%. GAPDH detection was applied to confirm the equal protein loading.The results were expressed as mean ± SEM of three experiments. \* and \*\* represent significance at *p* \< 0.05 and *p* \< 0.01.](molecules-18-12793-g006){#molecules-18-12793-f006} More and more studies have showed that inhibition of AKT and ERK1/2 pathways may decrease the resistance in MDR cancer cells \[[@B22-molecules-18-12793],[@B23-molecules-18-12793]\]. To determine whether EFL1 of reversal concentrations attenuate cell survival signaling pathways, the changes of total and phosphorylation forms of AKT and ERK1/2 were investigated in K562 and K562/ADR cells. The results showed that treatment of 10.0 μM EFL1 for 6, 12, 48 h did not alter the phosphorylation forms of AKT and ERK1/2. The densitometric ratios (%) of p-AKT/AKT ([Figure 7](#molecules-18-12793-f007){ref-type="fig"}C,D) in K562 cells for 0, 6, 12 and 48 h/10.0 μM EFL1 were 63.64 ± 0.91%, 65.38 ± 9.85%, 63.41 ± 3.56% and 66.89 ± 5.53%, respectively (*p* \> 0.05). The densitometric ratios (%) of p-ERK/ERK ([Figure 7](#molecules-18-12793-f007){ref-type="fig"}C,D) in K562 cells for 0, 6, 12 and 48 h/10.0 μM EFL1 were 54.65 ± 3.00%, 53.38 ± 2.33%, 58.19 ± 7.59% and 54.63 ± 1.09%, respectively (*p* \> 0.05). The densitometric ratios (%) of p-AKT/AKT ([Figure 7](#molecules-18-12793-f007){ref-type="fig"}E,F) in K562/ADR cells for 0, 6, 12 and 48 h/10.0 μM EFL1 were 88.47 ± 4.68%, 90.85 ± 3.32%, 90.81 ± 2.02% and 90.90 ± 12.88%, respectively (*p* \> 0.05). The densitometric ratios (%) of p-ERK/ERK ([Figure 7](#molecules-18-12793-f007){ref-type="fig"}E,F) in K562/ADR cells for 0, 6, 12 and 48 h/10.0 μM EFL1 were 81.50 ± 3.80%, 80.04 ± 6.93%, 79.95 ± 7.98% and 81.79 ± 2.55%, respectively (*p* \> 0.05). Receptor tyrosine kinases (RTKs) such as vascular endothelial growth factor receptor (VEGFR) and platelet derived growth factor receptor (PDGFR) play a crucial role in modulating cell proliferation, differentiation and survival by activating downstream signaling proteins such as protein kinase B/AKT and extracellular signal-regulated kinase 1/2 (ERK1/2) \[[@B24-molecules-18-12793]\]. Under current understandings, aberrant activation of RTKs is associated with cancer growth, angiogenesis and metastasis \[[@B25-molecules-18-12793]\]. Moreover, several studies have disclosed that activation of AKT and/or ERK pathways is related to resistance to conventional chemotherapeutic drugs \[[@B26-molecules-18-12793],[@B27-molecules-18-12793]\]. Our results demonstrated that total and phosphorylation forms of AKT and ERK remained unchanged in K562 and K562/ADR cells after exposure to 10.0 μM EFL1 for different time ([Figure 7](#molecules-18-12793-f007){ref-type="fig"}). These observations implied that blockade of AKT and ERK activation was not involved in the reversal of ABCB1-mediated MDR in this study of EFL1. Although other compounds from plants of *Euphorbia* have been reported to inhibit phosphorylation form of AKT and ERK \[[@B28-molecules-18-12793],[@B29-molecules-18-12793]\], our results indicated that EFL1 might not be inhibitor of AKT and ERK. It is notable that EFL1 did not down-regulated expression of ABCB1 in K562/ADR cells ([Figure 7](#molecules-18-12793-f007){ref-type="fig"}E,F). The results showed that the densitometric ratios (%) of ABCB1/GAPDH ([Figure 7](#molecules-18-12793-f007){ref-type="fig"}A,B) in K562 and K562/ADR cells were 3.19 ± 0.87 and 72.71 ± 5.94, respectively (*p* \> 0.01). The densitometric ratios (%) of ABCB1/GAPDH ([Figure 7](#molecules-18-12793-f007){ref-type="fig"}E,F) in K562/ADR cells for 0, 6, 12 and 48 h/10.0 μM EFL1 were 83.42 ± 6.97%, 83.21 ± 1.13%, 84.86 ± 4.55% and 86.34 ± 4.70%, respectively (*p* \> 0.05). The data suggested that ABCB1 expression in K562/ADR was much higher than that in K562 cells. Treatment of EFL1 under concentration of 10.0 μM for 6, 12 or 48 h did not change the expression of ABCB1 in K562/ADR cells. In summary, EFL1 elevated sensitivity to chemotherapeutical drugs (e.g., DOX and VCR) in ABCB1-mediated MDR K562/ADR cells and did not affect the sensitivity of sensitive K562 cells. EFL1 might not be inhibitor of AKT and ERK. Although EFL1 did not down-regulate expression of ABCB1, it could inhibit efflux function of ABCB1 and thus enhance the intracellular accumulation of anticancer drugs. Thereafter, EFL1 strengthened the effect of anticancer agents, including sensitizing the apoptosis induced by VCR via mitochondrial pathway. This implied that EFL1 might be used as chemotherapy sensitizer for MDR cancer cells. It is noteworthy that EFL1 can be served as a lead compound, based on which, more powerful reversal agents will be designed. ![EFL1 did not alter expression of p-AKT, p-ERK and ABCB1. (**A**) protein expression of ABCB1 in K562 and K562/ADR cells. (**B**) Densitometric analysis of western blot results of A. The values were calculated as (the gray density of ABCB1/the gray density of GAPDH) × 100%. (**C**) protein expression of AKT, p-AKT, ERK and p-ERK in K562 cells. (**D**, Densitometric analysis of western blot results of C. The values were calculated as (the gray density of p-AKT or p-ERK/the gray density of AKT or ERK) × 100%. (**E**) protein expression of AKT, p-AKT, ERK and p-ERK in K562/ADR cells. (**F**) Densitometric analysis of western blot results of E. The values were calculated as (the gray density of p-AKT or p-ERK/the gray density of AKT or ERK) × 100% or (the gray density of ABCB1/the gray density of GAPDH) × 100%. The results were expressed as mean ± SEM of three experiments. \* and \*\* represent significance at *p* \< 0.05 and *p* \< 0.01. GAPDH of MW 36 KD detection was applied to confirm equal protein loading.](molecules-18-12793-g007){#molecules-18-12793-f007} 3. Experimental =============== 3.1. Reagents ------------- Euphorbia factor L1 (EFL1, [Figure 1](#molecules-18-12793-f001){ref-type="fig"}A) was isolated from Caper Euphorbia seed and identified as having a purity of more than 98%. RPMI 1640 were products of Gibco BRL (Gaithersburg, MD, USA). Antibodies against Caspase-3, -8, -9, cytochrome *c* and PARP were obtained from Signalway Antibody Co., Ltd. (College Park, MD, USA). Antibodies against glyceraldehyde-3-phosphate dehydrogenase (GAPDH), anti-mouse and anti-rabbit IgG-HRP were products of Kangchen Co. (Shanghai, China). 3-(4,5-Dimethylthiazol-yl)-2,5-diphenyllapatinibrazolium bromide (MTT), rhodamine 123 (Rh123), vincristine (VCR), doxorubicin (DOX) and verapamil *R*-enantiomer (R-VRP) were products of Sigma Chemical Co. (St. Louis, MO, USA). Annexin V-FITC/PI Kit was from KeyGEN Biotech (Nanjing, China). Other routine laboratory reagents of analytical or HPLC grade were obtained from commercial sources. 3.2. Cell Lines and Culture Conditions -------------------------------------- Human leukemia cell line K562 and its adriamycin-selected ABCB1-overexpressing K562/ADR cells were maintained in RPMI 1640 medium containing 10% (v/v) heat-inactivated new-born calf serum, 100 U/mL penicillin and 100 μg/mL streptomycin at 37 °C in a humidified 5% CO~2~ incubator. K562/ADR cells were cultured in the medium containing 1 μg/mL adriamycin for maintaining MDR phenotype, and maintained in drug-free medium for at least seven days before used \[[@B18-molecules-18-12793]\]. 3.3. Cell Growth Inhibition Assay --------------------------------- The MTT assay as previously described was performed for the analysis of the cell growth inhibition. The treatment time for reversal experiments ([Table 1](#molecules-18-12793-t001){ref-type="table"}) was 72 h and that for EFL1 IC~50~ values for K562, K562/ADR cells was 96 h ([Figure 1](#molecules-18-12793-f001){ref-type="fig"}B). The concentrations of inhibition growth by 50% (IC~50~) were calculated from survival curves using the Bliss method. The degree of resistance was calculated by dividing the IC~50~ of the MDR cells by that of the parental sensitive cells. The fold-reversal factor of MDR was calculated by dividing the IC~50~ of the chemotherapeutic drugs in the absence of reversal agent by that obtained in the presence of reversal agent \[[@B18-molecules-18-12793]\]. 3.4. DOX and Rh 123 Accumulations --------------------------------- The effect of EFL1 on the accumulation of DOX and Rh 123 was measured by flow cytometry as previously described. Briefly, 5 × 10^5^ cells of K562 or K562/ADR were incubated in 6-well plates and allowed to attach overnight. The cells were treated with indicated concentrations of EFL1 at 37 °C for 3 h. Then 10 μM DOX or 5 μM Rh 123 of final concentration was added and the cells were further cultured for another 3 h or 0.5 h, respectively. Cells were then collected and washed twice with ice-cold PBS buffer. Finally, cells were resuspended in PBS buffer for flow cytometric analysis (BD FASCanto, New York, NY, USA) and 1 × 10^4^ cells were counted for the fluorescence intensity. R-VRP was used as the control inhibitor in the experiments \[[@B30-molecules-18-12793]\]. 3.5. Experiments of Rh123 Efflux -------------------------------- Rh123 efflux experiments were performed by modified methods as described before \[[@B16-molecules-18-12793]\]. After K562 and K562/ADR cells were treated with 5 μM Rh123 at 37 °C for 30 min, the cells were washed twice by ice-cold PBS and then maintained at 37 °C and absence of Rh123 with culture media containing 10 μM EFL1 or not. At time of 2 h, cells were gathered and washed twice with ice-cold PBS. Finally, cells were resuspended in ice-cold PBS buffer for flow cytometric analysis (BD FASCanto) immediately and the fluorescence intensity was determined \[[@B16-molecules-18-12793]\]. 3.6. Annexin V-FITC/PI Assay ---------------------------- Apoptosis rate was determined by measuring surface exposure of phosphatidylserine in apoptotic cells with Annexin V-FITC/PI apoptosis detection kit according to the manufacturer's instruction. After K562 and K562/ADR cells were seeded in 6-well plate for 24 h, 0 or 5 μM EFL1 was added to the cells. Three hours later, indicated concentrations of VCR were added to the cells and the culture continued for 24 h. Then, the cells were collected and washed twice with ice-cold PBS. 5 × 10^5^ cells were resuspended with 0.5 mL binding buffer containing Annexin-V (1:50 according to the manufacturer's instruction) and 40 ng/sample of PI for 30 min at 37 °C in the dark. The number of viable, apoptotic and necrotic cells were quantified by flow cytometer (BD FASCanto) and analyzed by the CellQuest software. At least 10,000 cells were analyzed for each sample. The apoptosis rate (%) = (the number of apoptotic cells/the number of total cells observed) × 100% \[[@B31-molecules-18-12793],[@B32-molecules-18-12793]\]. 3.7. Whole-Cell Lysates and Western Blot Analysis ------------------------------------------------- After 4.0 × 10^6^/well cells were plated on culture dishes (100 × 20 mm) for 24 h, the cells were treated for 48 h. Then, cells were harvested, washed twice with ice-cold PBS. Subsequently, 1.5 mL Eppendorff tubes containing cells was centrifuged at 110 *g* for 5 min and the supernatant was discarded. The pellet was vortexed and 100 µL of 1×loading buffer (50 mM Tris-Cl (pH 6.8), 10% glycerol, 2% sodium dodecylsulphate, 0.25‰ bromphenol blue, 0.1 M dithiothreitol ) for every 5 × 10^6^ cells was added. After being heated at 100 °C for 20 min, the lysates in the Eppendorff were centrifuged at 15, 000 g for 10 min and the supernatant was collected. Equal amounts of lysate protein was separated on 8%--12% sodium dodecylsulfate--polyacrylamide gel electrophoresis (SDS-PAGE) and transferred onto PVDF membrane (Millipore, Billerica, MA, USA). The nonspecific binding sites were blocked with TBST buffer (500 mM NaCl, 20 mM Tris--HCl (pH 7.4), and 0.4% Tween 20) containing 5% nonfat dry milk for 2 h at room temperature. Subsequently, the membranes were incubated overnight at 4 °C with specific primary antibodies diluted in TBST buffer containing 5% nonfat dry milk. Thereafter, the membranes were washed three times with TBST buffer and incubated at room temperature for 1 h with HRP-conjugated secondary antibody. After three washes with TBST buffer, the immunoblots were visualized by Phototope^TM^-HRP Detection Kit (Cell Signaling, Boston, MA, USA) and exposed to Kodak medical X-ray processor (Kodak, Rochester, NY, USA) \[[@B33-molecules-18-12793]\]. 3.8. Subcellular Fractionation and Western Blot Analysis of Cytosolic Cytochrome c ---------------------------------------------------------------------------------- After 3.5 × 10^6^/well cells were plated on culture dishes (100 × 20 mm) for 24 h, the cells were treated for 24 h. Then, cells were harvested and washed twice with ice-cold PBS, suspended with 5-fold volume of ice-cold cell extract buffer (20 mM Hepes-KOH (pH 7.5), 10 mM KCl, 1.5 mM MgCl~2~, 1 mM EDTA, 1 mM EGTA, 1 mM DTT, 250 mM sucrose, 0.1 mM PMSF and 0.02 mM aprotinin) and incubated for 40 min at 4 °C. Then the cells were centrifuged at 110 *g* for 10 min at 4 °C; the supernatant was subsequently centrifuged at 15,000 *g* for 15 min at 4 °C and the final supernatant was used as cytosolic fraction. Then 5×loading buffer (250 mM Tris-Cl (pH 6.8), 50% glycerol, 10% sodium dodecylsulphate, 1.25‰ bromphenol blue, 0.5 M dithiothreitol) was added to the above obtained supernatant and the mixture was boiled at 100 °C for 15 min. Thus, the protein solution was applied to identification of cytosolic cytochrome *c* by immunoblotting with 10% SDS-PAGE and blotting onto PVDF membrane. The cytochrome *c* protein was detected by using anti-cytochrome *c* antibody in the ratio of 1:1,000 \[[@B33-molecules-18-12793]\]. 3.9. Statistical Analysis ------------------------- Results were performed by t-test or one-way ANOVA with SPSS 13.0 software (SPSS Inc., Chicago, IL, USA). Data were presented as means ± SEM of at least triplicate determinations. \* and \*\* represent significance at *p* \< 0.05 and *p* \< 0.01, respectively. Densitometric analysis of western blot results was carried out by Image J (NIH, Bethesda, MD, USA). 4. Conclusions ============== In conclusion, EFL1 could enhance the efficacy of conventional chemotherapeutic agents in MDR K562/ADR cells over-expressing ABCB1 (as summarized in [Figure 8](#molecules-18-12793-f008){ref-type="fig"}). Our results suggest that EFL1 might be useful in combination with ABCB1 substrate chemotherapeutic drugs to overcome multidrug resistance. The mitochondrial pathway involved in the apoptosis sensitization by EFL1. VRP is unavailable in the clinic for its serious cardiovascular side effects when it reaches reversal concentration *in vivo*. We believe that more powerful derivatives active *in vitro* and *in vivo* will be designed on the base of EFL1 as the lead compound. ![Summary of apoptosis sensitization by EFL1 in K562/ADR cell.](molecules-18-12793-g008){#molecules-18-12793-f008} This work was supported by the grants from Guangdong Science and Technology Department & Guangdong Academy of Traditional Chinese Medicine (2012A032500021), research Project of Guangzhou Education Bureau (10A167) and funding from Guangzhou Science and Technology Program (2013J4100033). *Sample Availability*: Samples of Euphorbia factor L1 are available from authors. The authors declare no conflict of interest.
{ "pile_set_name": "PubMed Central" }
Demonstrators participate in a protest against the murder of Rio de Janeiro City councilor Marielle Franco at the Brazilian embassy in San Salvador, El Salvador, March 19, 2018. The sign reads: "Let no woman fight alone" REUTERS/Jose Cabezas
{ "pile_set_name": "Pile-CC" }
Louisiana College junior linebacker Landon Henry (5) and sophomore defensive end Joey Jarreau (49) chase Belhaven University quarterback Ian McGinnis (8) in the Wildcats' 38-7 win last weekend. LC defenders broke an American Southwest Conference record with 10 sacks against Belhaven. Jarreau had 1.5 sacks in the game. Written by Louisiana College goes into its second football game of the season Saturday against Webber International University, coming off a defeat of Mary Hardin-Baylor. No, no. Don't get too excited, Wildcat fans. It wasn't exactly a victory over their football nemesis from Belton, Texas. Yet, in the Wildcats' 38-7 home victory over Belhaven University to open the season last week, LC's defense compiled 10 sacks, which broke the American Southwest Conference single-game record of nine previously held by Mary Hardin-Baylor, set against Austin College in 2003. ...
{ "pile_set_name": "Pile-CC" }
Deloping Delope (French for "throwing away") is the practice of throwing away one's first fire in a pistol duel, an attempt to abort the conflict. According to most traditions, the deloper must first allow his opponent the opportunity to fire after the command ("present") is issued by the second, without hinting at his intentions. The Irish code duello forbids the practice of deloping explicitly. The delope could be attempted for practical reasons, such as if one duellist thought his opponent was superior in skill, so as not to provoke a fatal return shot. Deloping could also be done for moral reasons if the duellist had objections to attempting to kill his opponent or if he were so skilled a marksman as to make the exchange unfair. Deloping in a duel, for whatever reason, could be a risky strategy whether or not the delope was obvious to all present. Deloping with a near miss, in order to save one's honour without killing, could backfire if the opponent believed the effort to be genuine and responded with a fatal shot, which may have occurred with the Burr–Hamilton duel in 1804. Whether the delope was near or wide, the opponent might infer that he was being insulted as "not worth shooting" (an unworthy opponent) and either take care to aim his own shot to kill or insist on a second exchange. For the opponent to insist upon a second shot after a delope was considered bloodthirsty and unbecoming. Often, it would fall to the seconds to end the duel immediately after a delope had been observed. The term delope is specific to the use of firearms in a duel which, historically speaking, were flintlock pistols, notorious for their lack of accuracy at long distances and a particularly skilled marksman might attempt to delope unnoticed with a well-placed "near-miss". The distance between the two combatants had to be great enough that all others present would assume that any miss was due to this inherent inaccuracy and not deliberate. This way the shooter could avoid killing his opponent and, if accused of deloping, claim he had made a genuine effort. The opponent might recognise the "near-miss" as a delope but understand that it was meant for the benefit of witnesses and if the opponent was not insulted, also delope. Both parties could claim they had tried to shoot the other and the duel would end without any fatalities. Notable uses Alexander Hamilton, a 19th-century American politician, is thought to have attempted to delope during his infamous Burr–Hamilton duel (July 11, 1804) with Aaron Burr, the Vice President of the United States. Rather than firing into the ground (as was customary for deloping), Hamilton fired into the air over Burr's head; Burr, perhaps misunderstanding his opponent's intent, fired at Hamilton, mortally wounding him. Burr's animosity towards Hamilton was such that it is not out of the question that Burr understood what Hamilton was doing and intentionally shot to kill, or at least draw blood. Other historians have proposed that Burr shot first and the wounded Hamilton reflexively pulled the trigger, which would not be an instance of delope. Ron Chernow's 2004 biography Alexander Hamilton gives this version. According to his account, the shots were all but simultaneous, with Burr's coming first according to one of the two witnesses (the other witness claimed Hamilton fired first and Burr waited several seconds for the smoke to clear before returning fire). Chernow does note that Hamilton claimed, in a note he left behind should he die, that he intended to throw away his first shot—a claim that Burr would later call "contemptible, if true." Regardless of its accuracy, Burr certainly had no way of knowing. William Pitt the Younger, former Prime Minister of the United Kingdom, chose to delope to indicate "moral superiority", having been forced into a duel with another Member of Parliament. On 21 March 1829, Arthur Wellesley, 1st Duke of Wellington, Prime Minister of Great Britain (22 January 1828 to 16 November 1830), fought a duel with the Earl of Winchilsea. Wellington fired wide and later stated he deloped. Supporters of his opponent claimed he had aimed to kill and Winchilsea was saved by Wellington's poor marksmanship. Winchilsea discharged his pistol into the air. Joseph Howe, Nova Scotian journalist, politician, and public servant, deloped during a duel in 1840. In fiction In the 1975 film Barry Lyndon, the title character is challenged to a duel by his stepson Sir Charles, Lord Bullingdon. A preliminary coin flip gives Lord Bullingdon the privilege of first shot, only to prematurely misfire due to his inexperience with firearms. Barry fires into the ground honourably and hopefully but Bullingdon demands a second round, whereby Barry's leg is critically shot and requires amputation below the knee. In Flashman, by George MacDonald Fraser, title character and scoundrel Harry Paget Flashman gets into a duel with a fellow officer over a woman. He promises a huge bribe to the officer responsible for loading the pistols to ensure that his opponent's pistol will have gunpowder but no bullet. When his opponent appears to miss, Flashman makes a great show of deloping and in doing so, accidentally shoots the top off of an attending doctor's brandy bottle, winning renown as a crack shot as well as a gentleman. When his opponent angrily accuses Flashman of mocking him by deloping, he responds "I didn't presume to tell you where to aim your shot; don't tell me where I should have aimed mine". He later blithely refuses to pay the bribe, noting that the loader cannot publicly complain of bad faith without admitting to a capital crime. In Episode 3, of Book 1 of the television miniseries North and South, the character Charles Main fights a duel in which his opponent fires first and misses, then collapses in fear while waiting for Main's return shot. Main delopes and is surprised when the spectators applaud him—they view his conduct as both courageous and generous as he has refrained from killing his opponent, who had shown himself to be a coward. In the original Star Trek series episode "The Squire of Gothos", the alien being Trelane delopes after being challenged to a duel by Captain Kirk, declaring himself at Kirk's mercy. Kirk then fires past Trelane into the mirror which appears to be the source of Trelane's power in an attempt to escape being forced to remain on Trelane's planet. In AMC's Turn: Washington's Spies Season 1 Episode 7 "Mercy Moment Murder Measure", John Simcoe delopes after Abraham Woodhull misses and Anna Strong and Judge Woodhull try to intervene. Woodhull then demands a reload (thus clearly showing his bloodlust) but the duel is halted. In the BBC series Garrow's Law (based upon the real life 18th century barrister and reformer) Garrow hot-headedly challenges fellow barrister Silvester to a duel but is informed by his instructing attorney John Southouse that Silvester is a crack-shot with a pistol. On the morning of the duel Garrow delopes by firing wide - hoping this will end the duel - but is ordered by Silvester to stand his ground or "risk being considered a poltroon". Silvester then fires but it is a deliberately glancing blow to the arm, which draws blood, but is merely intended to teach Garrow a lesson. In The Even Chance, the first episode of ITV's Horatio Hornblower adaptation, the title character delopes despite being wounded by his opponent, who had fired first. In game theory Deloping may be the best strategy for a duellist with lower accuracy than both his opponents in a truel (against rational opponents) when he is given first fire. Both opponents will recognize each other as the biggest threat and aim at each other, leaving the deloping shooter unharmed. Notes References Category:Dueling
{ "pile_set_name": "Wikipedia (en)" }
Żakowice, Warmian-Masurian Voivodeship Żakowice () is a village in the administrative district of Gmina Susz, within Iława County, Warmian-Masurian Voivodeship, in northern Poland. It lies approximately south-west of Susz, west of Iława, and west of the regional capital Olsztyn. The village has a population of 770. References Category:Villages in Iława County
{ "pile_set_name": "Wikipedia (en)" }
Fluctuating hyper-hypocortisolaemia: a variant of Cushing's syndrome. We present a patient with severe Cushing's syndrome secondary to an invasive pituitary tumour. Cortisol secretion fluctuated between severe hypercortisolaemia associated with features of Cushing's syndrome to recurrent symptomatic hypocortisolaemia. Normal ACTH precursors to ACTH ratio during the various stages of cortisol secretion indicated that periodic decreased prohormone processing did not contribute to the unique presentation in the patient. Thus, the the extreme fluctuations of plasma cortisol levels are most probably due to unexplained erratic changes of ACTH secretion.
{ "pile_set_name": "PubMed Abstracts" }
--- author: - 'A. Antoniadis-Karnavas , S. G. Sousa, E. Delgado-Mena, N. C. Santos, G. D. C. Teixeira, V. Neves' date: 'Received / Accepted' title: 'ODUSSEAS: A machine learning tool to derive effective temperature and metallicity for M dwarf stars' --- [The derivation of spectroscopic parameters for M dwarf stars is very important in the fields of stellar and exoplanet characterization. The goal of this work is the creation of an automatic computational tool, able to derive quickly and reliably the T$_{\mathrm{eff}}$ and \[Fe/H\] of M dwarfs by using their optical spectra, that can be obtained by different spectrographs with different resolutions.]{} [ODUSSEAS (Observing Dwarfs Using Stellar Spectroscopic Energy-Absorption Shapes) is based on the measurement of the pseudo equivalent widths for more than 4000 stellar absorption lines and on the use of the machine learning Python package “scikit-learn” for predicting the stellar parameters.]{} [We show that our tool is able to derive parameters accurately and with high precision, having precision errors of $\sim$30 K for T$_{\mathrm{eff}}$ and $\sim$0.04 dex for \[Fe/H\]. The results are consistent for spectra with resolutions between 48000 and 115000 and SNR above 20. ]{} Introduction ============ Spectra can be used to reveal the chemical composition of the stars, as well as important stellar atmospheric parameters, such as effective temperature (T$_{\mathrm{eff}}$) and \[Fe/H\]. These parameters are crucial for the characterization of the stars and therefore fundamental to understand their formation and evolution. Furthermore, they influence the properties of the planets forming and orbiting around them [@ever13]. However, the spectroscopic analysis to derive these parameters has some difficulties to overcome. One of the main problems is the correct determination of the spectral continuum, which is more problematic in cool and faint stars, such as M dwarfs. Their study is quite difficult and complicated, compared to FGK stars, since in M dwarfs, molecules are the dominant sources of opacity. These molecules create thousands of lines that are poorly known and moreover many of them blend with each other. Therefore, the position of the continuum is hardly identified in their spectra. Methods which rely on the correct determination of the continuum, work better only for the metal poor and earliest types of M dwarfs [@woolf05]. Methods using spectral synthesis have not achieved as precise results as in FGK cases, because of the poor knowledge of many molecular line strengths. Recently, spectral synthesis in the near infrared has presented advances, as shown by several studies. [@one12; @lind16; @raj18; @pass19]. Regarding these limitations, most attempts for determining effective temperature and metallicity, are done with photometric calibrations [@bon05; @johnapps09; @neves12] or spectroscopic indices [@rojas10; @rojas12; @mann13a]. Metallicity uncertainties range from 0.20 dex using photometric calibrations, to 0.10 dex by using spectroscopic scales in the infrared [@rojas12]. For T$_{\mathrm{eff}}$, precisions of 100 K are reported, but significant uncertainties and systematics are still present, ranging from 150 to 300 K. [@casag08; @rojas12]. One of the most popular methods to derive atmospheric stellar parameters for FGK stars is by measuring the equivalent widths (EW) of many metal lines of the spectrum. @neves14 using the MCAL code, measured pseudo EWs in the optical part of the spectrum for 110 M dwarfs observed in the HARPS GTO M dwarf program, by setting a pseudo continuum for each line. They proceeded to the derivation of T$_{\mathrm{eff}}$ and \[Fe/H\] of these stars applying a calibration based on reference photometric T$_{\mathrm{eff}}$ and \[Fe/H\] scales that exist for 65 of them from @casag08 and @neves12 respectively. In the first case, the reference T$_{\mathrm{eff}}$ is the average value of the V - J, V - H, and V - K photometric scales as seen in @casag08, while for \[Fe/H\] the calculation of its reference values was done using stellar parallaxes, V and Ks magnitudes as described in @neves12. Machine learning is an increasingly popular concept in several fields of science. It can be accurate in predicting outcomes without the need of the user explicitly creating a specific model to the problem at hand. The algorithms in machine learning receive input data and by applying statistical analysis, they predict an output value within a reasonable range. The interest for machine learning algorithms and automatic processes in astronomy is emerging from the increasing volume of survey data [@how17]. It can be applied to a wide range of studies, with the input attributes being for example the photometric properties of the sources [@dasa19; @akras19; @rau19; @ucci19]. In our work, we follow the pseudo-EW approach. We present our tool ODUSSEAS (Observing Dwarfs Using Stellar Spectroscopic Energy-Absorption Shapes), which makes use of the machine learning “scikit learn” package of Python. It offers a quick automatic derivation of T$_{\mathrm{eff}}$ and \[Fe/H\] for M dwarf stars, by being provided with their 1D spectra and their resolutions. The main advantage of this tool, compared to other ones that derive stellar parameters such as the MCAL code by @neves14 (which is limited to HARPS range and needs manual adjustment of results for different resolutions), is that it can operate simultaneously in an automatic fashion for spectra of different resolutions and different wavelength ranges in the optical. It is based on a supervised machine learning algorithm, meaning that it is provided with both input and expected output for creating a model. This input to the machine learning function are the values of the pseudo EWs for 65 HARPS spectra and the expected output are the values of their reference T$_{\mathrm{eff}}$ and \[Fe/H\] from @casag08 and @neves12 respectively. After training with a part of these HARPS data, the algorithm produces a model and tests it on the rest of the HARPS data. It predicts their values and compares them with the reference ones given as expected output. Thus, it examines the accuracy and the precision of the model by using several regression metrics described later. Finally, it applies the model to unknown spectra and estimates their stellar parameters. In Sect. \[EWsection\] we describe how the tool computes the pseudo EWs. In Sect. \[mlsection\] we describe our tool and the flow of its process. We explain the characteristics of the machine learning function and its efficiency regarding different regression types, resolutions and wavelength areas. In Sect. \[otherspec\] we apply our tool to spectra obtained by several spectrographs of various resolutions and we examine the results. Finally, Sect. \[sum\] summarizes the work presented in this paper. Pseudo-EW measurements {#EWsection} ====================== Since the identification of the continuum is very difficult in the spectra of M dwarfs, we follow the way of setting a pseudo continuum in each absorption line. The method is based on measurements of the pseudo EWs of absorption lines and blended lines in the range between 530 and 690 nm. We have excluded the parts where the activity-sensitive Na doublet and H$\alpha$ lines and strong telluric lines reside. The linelist consists of 4104 features. It is given in the form of left and right boundaries, between which these absorption features are supposed to be created. This method, based on pseudo EWs and the specific linelist, was used by @neves14. We have created our own Python version of the method to compute the pseudo EWs. Our code reads the linelist and the 1D fits files of the stellar spectra. We have set an option for radial-velocity correction of the input spectra by our code, in the case they are shifted. Then, for each line, it identifies the position of the minimum flux of the feature, which is the central absorption wavelength. Starting from it, the code identifies the maximum in each side of this absorption feature, after having cut this spectral area at the range defined by the respective boundaries provided in the linelist. Eventually, it fits the pseudo continuum along the edges of the absorption feature with a straight line and it obtains the pseudo EW by calculating the area between the pseudo continuum and the flux. Mathematically, the pseudo EW is defined as following, where F$_{pp}$ is the value of the flux between the peaks of the feature (i.e. the pseudo continuum) and F$_{\lambda}$ is the flux of the line at each integration step. $${\mathrm{pseudoEW}} = \Sigma \frac{(F_{pp}-F_{\lambda})}{F_{pp}} \Delta{\lambda}$$ We present such example in Fig. \[EWs\] where we use the star Gl176 and an absorption line at the region around 6530 $\AA$. \ The evaluation of our pseudo-EW measurements, by comparing them with the ones obtained from MCAL code, is presented at Appendix \[A\]. Machine learning on M dwarfs {#mlsection} ============================ We base our tool for the derivation of T$_{\mathrm{eff}}$ and \[Fe/H\] on the machine learning concept. The user needs to run two codes. The “HARPS$\_$dataset.py” creates the databases which contain pseudo-EW measurements in different resolutions and the reference stellar parameters. The “ODUSSEAS.py” measures the pseudo EWs of new stellar spectra and derives their unknown T$_{\mathrm{eff}}$ and \[Fe/H\] via machine learning. Below, we explain the details of their structure, describing the input parameters and how to use the codes. The HARPS dataset ----------------- Each time the code “HARPS$\_$dataset.py” runs, the outcome is a file which is used later as input to the machine learning algorithm when running “ODUSSEAS.py” for training the machine and testing the generated model. It contains the names of 65 stars of the HARPS M dwarf sample, the central wavelengths of the 4104 absorption features from 530 to 690 nm, their pseudo-EW values according to the resolution we convolve the spectra and their reference values of T$_{\mathrm{eff}}$ and \[Fe/H\] from @casag08 and @neves12 respectively. All of these 65 spectra have SNR above 100, as reported by @neves14. They are presented in Table \[refparam\]. The range of the reference stellar parameters is presented in Fig \[range\]. Their photometric derivations have uncertainties of 100 K for T$_{\mathrm{eff}}$ and 0.17 dex for \[Fe/H\], as reported by @casag08 and @neves12 respectively. \ The convolution function we use is the “instrBroadGaussFast” of “pyAstronomy” (<https://github.com/sczesla/PyAstronomy>), which applies Gaussian instrumental broadening. The width of the kernel is determined by the resolution. A description of it can be found at <https://www.hs.uni-hamburg.de/DE/Ins/Per/Czesla/PyA/PyA/pyaslDoc/aslDoc/broad.html>. Since the HARPS spectra have a specific finite resolution, our code calculates the actual resolution to which they need to be convolved by the function, in order to get spectra to the final resolution we really want. This calculation is done considering the following relation: $$\sigma _{conv} = \sqrt{\sigma _{final}^{2} - \sigma _{orig}^{2}}$$ where $\sigma_{conv}$ corresponds to the resolution to which we need to convolve a spectrum with original resolution of $\sigma_{orig}$, in order to get a final resolution of $\sigma_{final}$. The settings input by the user are two. a) Choose whether or not to convolve the reference HARPS spectra to the spectral resolution of our new data. We already provide precomputed pseudo EWs for a range of spectral resolutions in widely used spectrographs. In that case there is no need to convolve again the spectra and recalculate the pseudo EWs. b) The resolution of the data we want to analyse. The “HARPS$\_$dataset.py” is presented schematically in Fig. \[HARPSdia\]. $\begin{array}{c} \includegraphics[width=11cm]{HARPS_flow.png} \\ \end{array}$ ODUSSEAS tool ------------- “ODUSSEAS.py” makes use of two algorithms that we developed: the “New$\_$data.py”, for measuring the pseudo EWs of new spectra to analyze, and the “MachineLearning.py” for the derivation of their T$_{\mathrm{eff}}$ and \[Fe/H\]. The innovative aspect of this tool is the simultaneous predictions for spectra of different resolutions and wavelength ranges. The user has the option to activate the automatic radial velocity correction for the spectra if they are shifted. In addition, the user can set the regression type to be used by the machine learning process. The “ridge” is recommended, but also “ridgeCV” and “linear” work at similar level of efficiency as well. We present the efficiency of all the regression types used in Sect. \[mleff\]. The workflow of “New$\_$data.py” is similar to the “HARPS$\_$dataset.py”. It reads the files and resolutions of new spectra and, if needed, it calculates and corrects their radial velocity shift. In addition, if the original step of a spectrum is not 0.010, i.e. equal to that of the HARPS dataset, it is changed with linear interpolation to this value. Thus, the pseudo EWs are measured in a consistent way. The files containing the pseudo-EW measurements of each spectrum are then used during the operation of “MachineLearning.py”, which returns the values of T$_{\mathrm{eff}}$ and \[Fe/H\] along with the regression metrics of the models that predicted them. The diagram of “ODUSSEAS.py” is presented in Fig. \[Mdwarfsdia\] showing concisely its inputs, operations and output. $\begin{array}{c} \includegraphics[width= 11cm ]{ODU_flow.png} \\ \end{array}$ Machine learning function {#mlf} ------------------------- Here we present in more detail the machine learning function. The machine learning algorithm operates in a loop for each star separately, as each star may have different wavelength range and different resolution. For each star in the filelist, it loads automatically two files: the HARPS dataset of respective resolution, for training and testing the model, and the pseudo EWs of the star for which we want to derive T$_{\mathrm{eff}}$ and \[Fe/H\], in order to apply the model and return the stellar parameters. Based on the wavelength range that each spectrum has, a mask is applied on the HARPS dataset for considering the absorption lines in common. The 65 HARPS stars split into training group consisting of the 70% of the sample (45 stars) and into testing group consisting of the remaining 30% of the population (20 stars). With these numbers selected, the machine learning model can be both trained accurately and tested on a sufficient number of stars. We provide the algorithm with different regression types that can be used: the “linear”, the “ridge”, the “ridgeCV”, the ”multi-task Lasso“ and the ”multi-task Elastic Net". All these kinds of models provide an output value by fitting a linear regression to the input values. The relation between the predicted value *y* (the stellar parameter), the input variables *x* (the pseudo EWs) and the coefficients *w* is expressed as $$y(w,x)=w_{o}+w_{1}x_{1}+...+w_{p}x_{p}$$ The mathematical details of each regression type are described in the official online documentation at <https://scikit-learn.org/stable/modules/linear_model.html>. The performance of machine learning is indicated by the following three kinds of regression metrics that are returned. The mean absolute error is computed when the model is applied on the test dataset. It corresponds to the expected value of the absolute error loss in the predictions. In addition, the “explained variance score” is calculated. The best possible value of this score is 1.0. Variance is the expectation of the squared deviation of a random variable from its mean. It measures how far a set of numbers are spread out from their average value. Furthermore, the “r2 score” computes the coefficient of determination, defined as R$^2$. The coefficient of determination is the proportion of the variance in the dependent variable that is predictable from the independent variables. This score provides a measure of how well future samples are likely to be predicted by the model. Best possible score is 1.0 too. A constant model that always predicts the expected value, disregarding the input features, would get a score of 0.0. In our case of multi-output, the resulting “explained variance” and “r2” scores are by default the averages with uniform weight of the respective scores for T$_{\mathrm{eff}}$ and \[Fe/H\]. The mathematical types of those regression metrics are described in their official online address at <https://scikit-learn.org/stable/modules/model_evaluation.html#regression-metrics>. For each star, the tool makes 100 determinations by splitting randomly the train and test groups each time. After these determinations, it returns the average values of T$_{\mathrm{eff}}$ and \[Fe/H\], the average values of the mean absolute errors of the models, the average scores of machine learning and the dispersion of T$_{\mathrm{eff}}$ and \[Fe/H\] (measured as the standard deviation). This iterative process minimizes the possible dependence of the resulting parameters on how the stars from the HARPS dataset are split for training and testing in one single measurement. Since the reference stars are only 65, which stars end up in the training set could change the results in a measurement. This is the reason we do these multiple runs with shuffling and splitting the reference stars in different train and test groups, and finally we calculate the average values and the dispersion. The final results are automatically saved in the file called “Parameter$\_$Results.dat”. Moreover, it saves a group of plots with the reference and the predicted parameters of model testing, as well as their differences, as a visualization of the model accuracy. An example is presented at Fig. \[ml\]. $\begin{array}{c} \includegraphics[width=\hsize]{Teff_test_comparison.pdf} \\ \includegraphics[width=\hsize]{Diff_Teff_test_comparison.pdf} \\ \\ \includegraphics[width=\hsize]{FeH_test_comparison.pdf} \\ \includegraphics[width=\hsize]{Diff_FeH_test_comparison.pdf} \\ \end{array}$ Machine learning efficiency {#mleff} --------------------------- Firstly, we test the regression models mentioned above to find the best one. We use the original spectra of the HARPS dataset to their real resolution of 115000. For 100 runs with each regression type, we measure the scores and the absolute mean errors of the stellar parameters on the test set. We report the average values around which each model tends to result in Table \[reg\]. The “linear”, “ridge” and “ridgeCV” work very well in general, having “r2” and “explained variance” scores with average values around 0.93 and 0.94 respectively. The range of these scores, in the 100 runs, is usually from 0.87 to 0.99. The average uncertainties of those regression types are $\sim$27 K for T$_{\mathrm{eff}}$ and $\sim$0.04 for \[Fe/H\]. The “ridge” model has slightly greater scores than the “linear” one. “RidgeCV”, which has a built-in cross validation function that applies “leave-one-out” or “k-fold” strategies, does not seem to work better than the classic “ridge” one, at least in this sample of M dwarf measurements. Furthermore, “multi-task Elastic Net” and “multi-task Lasso” give considerably lower scores and higher mean absolute errors. Thus, we suggest “ridge” regression, as it operates best on the spectral values of the M dwarfs. Secondly, we evaluate the “explained variance” and “r2” scores and the mean absolute errors of the algorithm for different resolutions of the spectra. We do it for the HARPS dataset at its actual resolution of 115000 and we repeat this test for convolved datasets at resolutions of other broadly used spectrographs: 110000 (UVES), 94600 (CARMENES) , 75000 (SOPHIE) and 48000 (FEROS). This is done to examine the level of machine learning precision towards lower resolutions. After 100 measurements of each case, we present the average values at Table \[reso\]. To further test the reliability of the method, we examine the efficiency of the machine learning in different wavelength ranges of the spectrum. We divide the linelist, which is from 530 to 690 nm, in four spectral regions and we calculate the respective scores and mean absolute errors. We do this test to check if machine learning works better using the full range or a specific part of the wavelengths. For this test, we use the case of the convolved data at the resolution of 110000. The machine learning operates at its best while using the full range of the initial linelist. In addition, regarding the divided areas, we notice that the bluer the part the higher the scores and the lower the mean absolute errors respectively. In general, the results show that we can get highly precise predictions for stars observed at any part of the 530-to-690 nm spectrum. These results are presented in Table \[linelist\]. [ccccc]{}\ Regression & r2 score & E.V. score & M.A.E. T$_{\mathrm{eff}}$ & M.A.E. \[Fe/H\]\ & & & \[K\] & \[dex\]\ \ Ridge & 0.93 & 0.94 & 27 & 0.037\ RidgeCV & 0.93 & 0.94 & 27 & 0.038\ Linear & 0.93 & 0.93 & 27 & 0.039\ Multi-task Elastic Net & 0.91 & 0.92 & 35 & 0.045\ Multi-task Lasso & 0.88 & 0.89 & 41 & 0.056\ \ \[reg\] [ccccc]{}\ Resolution & r2 score & E.V. score & M.A.E. T$_{\mathrm{eff}}$ & M.A.E. \[Fe/H\]\ & & & \[K\] & \[dex\]\ \ real 115000 & 0.93 & 0.94 & 27 & 0.037\ conv. 110000 & 0.93 & 0.94 & 28 & 0.038\ conv. 94600 & 0.93 & 0.93 & 28 & 0.039\ conv. 75000 & 0.93 & 0.93 & 29 & 0.041\ conv. 48000 & 0.92 & 0.93 & 30 & 0.043\ \ \[reso\] [cccccc]{}\ Wavelength range & Number of lines & r2 score & E.V. score & M.A.E. T$_{\mathrm{eff}}$ & M.A.E. \[Fe/H\]\ (nm) & & & & \[K\] & \[dex\]\ \ 530 - 690 & 4104 & 0.93 & 0.94 & 28 & 0.038\ 530 - 580 & 1300 & 0.92 & 0.93 & 31 & 0.039\ 580 - 630 & 1300 & 0.91 & 0.91 & 48 & 0.044\ 630 - 690 & 1504 & 0.89 & 0.90 & 56 & 0.048\ \ \[linelist\] Derivation of stellar parameters {#otherspec} ================================ We apply our tool to spectra obtained by five widely used instruments of different resolutions: HARPS of 115000, UVES of 110000, CARMENES of 94600, SOPHIE of 75000 and FEROS of 48000. The spectra were taken from the respective public data archives. To test the efficiency of our tool on other-than-HARPS instruments, we use spectra from stars in common with the HARPS dataset, so we can compare their results with the reference parameters of the respective HARPS spectra. To validate further the accuracy of our tool, we proceed to determinations and comparisons on more stars. Finally, we discuss about possible future improvements of our determinations. Resolution and spectral shape {#s1} ----------------------------- We examine the spectral change of M dwarfs according to convolution in different resolutions. The shapes of M dwarf spectra are different when obtained in lower resolutions. In general, the lower the resolution, the shallower the absorption lines. This is illustrated in Fig \[convall\] where three lines of Gl176 are shown in detail, for the original HARPS spectrum and the convolved ones to several resolutions. We also measure these lines and we report their pseudo-EW values in Table \[EWvalues\], to show their differences. The relative differences can vary, as not only the depth changes but also the location of the pseudo continuum is different in each case. They all confirm that the lower resolution always has lower pseudo-EW values. This is why we need to convolve the HARPS spectra to the respective resolutions of the new spectra. Consequently, machine learning compares the pseudo EWs of the same resolution and predicts accurately the stellar parameters. In Fig \[shapeferos\] we show the spectral shapes of Gl674 for three different cases: the original HARPS spectrum with resolution 115000, the convolved HARPS spectrum to the resolution of FEROS (48000) and the original FEROS spectrum that is the lowest resolution we examine. We notice that the convolved HARPS spectrum follows the shape of the FEROS one in a consistent way. In Fig \[hsEW\], we show the comparison of the pseudo EWs of SOPHIE spectrum for Gl908 and the spectrum of the same star by HARPS before and after its convolution. The SOPHIE spectrum, which is of lower resolution, has consistently lower pseudo-EW values than the HARPS one, as expected. After the convolution of HARPS spectrum to the respective resolution, the overall trend of their values become highly compatible. $\begin{array}{c} \includegraphics[width=\hsize]{All5resolutions.pdf} \\ \end{array}$ $\begin{array}{c} \includegraphics[width=\hsize]{2HARPS1FEROS.pdf} \\ \end{array}$ $\begin{array}{c} \includegraphics[width=\hsize]{SH_original.pdf} \\ \includegraphics[width=\hsize]{SH_convolved.pdf} \\ \end{array}$ [cccc]{}\ Resolution & p.EW of $\lambda$ 6536.67 & p.EW of $\lambda$ 6537.08 & p.EW of $\lambda$ 6537.64\ & \[m$\AA$\] & \[m$\AA$\] & \[m$\AA$\]\ \ original 115000 & 14.19 & 29.08 & 27.31\ convolved 110000 & 14.04 & 28.89 & 26.98\ convolved 94600 & 13.39 & 28.27 & 26.35\ convolved 75000 & 11.99 & 27.45 & 25.08\ convolved 48000 & 7.50 & 22.50 & 20.04\ \ \[EWvalues\] Measurements on different spectrographs {#s2} --------------------------------------- We examine the performance of our tool in new spectra. We show the accuracy of the stellar parameters predicted and the precision for each resolution, by presenting the mean absolute errors of the models and the dispersion of the results, as calculated after the 100 determinations for each spectrum. For the case of HARPS, we use a HARPS spectrum of Gl643 with SNR = 83, which is not part of the HARPS dataset used in the machine learning. As reference values for this star, we consider its parameters reported by @neves14. For the cases of the other instruments, we use a UVES spectrum of Gl846 with SNR = 149, a CARMENES spectrum of Gl514 with SNR = 191, a SOPHIE spectrum of Gl908 with SNR = 90 and a FEROS spectrum of Gl674 with SNR = 61. As reference values to those spectra, we consider the values of the respective HARPS ones in the dataset. The results of T$_{\mathrm{eff}}$ and \[Fe/H\] are presented in Table \[newstarspar\]. We notice that the parameters of the new spectra are very close to the respective reference values. The differences in T$_{\mathrm{eff}}$ vary up to $\sim$50 K and the differences in \[Fe/H\] vary up to 0.03 dex. The mean absolute errors of models and the dispersions of values are slightly growing towards lower resolutions. Measurements on different SNR’s {#snr} ------------------------------- Here we examine the possible variation of the results regarding different signal-to-noise ratios (SNR) for a given spectrum. We take the spectrum Gl514 of CARMENES, which has the highest SNR of the ones we examine (equal to 191, as reported in the CARMENES data archive) and we inject amounts of noise which correspond to lower SNR values that we set. Since the final noise is obtained by the quadratic sum of the initial noise and the injected noise, the final SNR values are calculated using the relation below. $$(\frac{1}{SNR})^{2}_{final}=(\frac{1}{SNR})^{2}_{initial} + (\frac{1}{SNR})^{2}_{injected}$$ We create new spectra with final SNR values ranging from 100 to 9. For each spectrum, we measure the stellar parameters and their dispersion. Fig. \[snrcomp\] illustrates the measurements of the CARMENES spectrum while degrading its SNR. Overall, the results are similar to the ones of the original spectrum and the differences are kept roughly constant with respect to the reference values. For SNR values down to 20, we notice that the dispersions are between 17 and 27 K for T$_{\mathrm{eff}}$ and between 0.03 and 0.04 dex for \[Fe/H\], i.e. at similar levels as those of the original spectrum. For SNR values below 20, the dispersions start to increase up to $\sim$50 K and up to $\sim$0.07 dex respectively. Moreover, it seems that there is a slight decrease of the order of 20 K in T$_{\mathrm{eff}}$ and a slight increase of the order of 0.02 dex in \[Fe/H\] for the spectra with SNR below 20. However, these results are within the uncertainties of the tool. Therefore, we conclude that our tool works consistently for spectra with SNR above 20. Bellow this SNR, the errors increase significantly. $\begin{array}{c} \includegraphics[width=9cm]{multiSNR_Teff.pdf} \\ \includegraphics[width=9cm]{multiSNR_FeH.pdf} \\ \end{array}$ Comparison of results between our tool and @neves14 {#oduvn} --------------------------------------------------- Now, we make an overall comparison of our results on a group of HARPS spectra with the ones presented by @neves14. For this purpose, we measure 30 HARPS spectra from the initial GTO sample, for which we do not know their parameters from photometry and are not part of the machine learning dataset we use. Based on the information from @neves14, we have excluded very active stars and stars with SNR lower than 25, below which that method does not apply. Both methods have been tested and do not work properly for very active or young stars, since the pseudo EWs of such spectra are affected and their parameters can not be determined accurately with the pseudo-EW approach we follow. Then, we compare the results we get by our tool with the results presented by @neves14. The errors of the stellar parameters derived using our tool, are 27 K for T$_{\mathrm{eff}}$ and 0.04 dex for \[Fe/H\], as the mean absolute errors are measured when the machine learning model is applied on the test dataset. The errors of the calibration by @neves14, which are quantified from the root mean squared error (RMSE) in that work, are equal to 91 K and 0.08 dex respectively. It is reminded that both methods are tied to the same initial systematic uncertainties of the reference parameters used, which are 100K for T$_{\mathrm{eff}}$ and 0.17 dex for \[Fe/H\]. The results and their differences are presented in Table \[parall\] and Fig. \[paracomp\]. The mean and median difference of T$_{\mathrm{eff}}$ is 11 and 22 K respectively, with a standard deviation of 101 K. Regarding \[Fe/H\], the mean and median difference is -0.04 dex, with a standard deviation of 0.06 dex. Work by @neves14 follows a traditional approach, using a least-squares weighted fit to determine parameters. The regression of our tool reduces those errors of T$_{\mathrm{eff}}$ and \[Fe/H\] from 91 to 27 K and from 0.08 to 0.04 dex respectively. So, our machine learning approach increases significantly the precision of parameter determinations. In terms of speed, the determination for a star by machine learning, even after the multiple runs with shuffling and splitting again the train/test samples, is a matter of few seconds. $\begin{array}{c} \includegraphics[width=\hsize]{TDN.pdf} \\ \includegraphics[width=\hsize]{FDN.pdf}\\ \end{array}$ [ccccccc]{}\ Star & T$_{\mathrm{eff}}$ (AA) & T$_{\mathrm{eff}}$ (Ne14) & T$_{\mathrm{eff}}$ Diff. & \[Fe/H\] (AA) & \[Fe/H\] (Ne14) & \[Fe/H\] Diff.\ & \[$\pm$27 K\] & \[$\pm$91 K\] & \[K\] & \[$\pm$0.04 dex\] & \[$\pm$0.08 dex\] & \[dex\]\ \ CD-44-836A & 3104 & 3032 & 72 & -0.07 & -0.07 & 0.00\ G108-21 & 3214 & 3186 & 28 & -0.02 & -0.02 & 0.00\ GJ1057 & 2926 & 2916 & 10 & -0.11 & -0.10 & -0.01\ GJ1061 & 2772 & 2882 & -110 & -0.25 & -0.09 & -0.16\ GJ1065 & 3106 & 3082 & 24 & -0.32 & -0.23 & -0.09\ GJ1123 & 2971 & 2779 & 192 & -0.02 & 0.15 & -0.17\ GJ1129 & 3037 & 3017 & 20 & -0.02 & 0.05 & -0.07\ GJ1236 & 3225 & 3280 & -55 & -0.44 & -0.47 & 0.03\ GJ1256 & 2964 & 2853 & 111 & -0.02 & 0.06 & -0.08\ GJ1265 & 3020 & 2941 & 79 & -0.28 & -0.20 & -0.08\ Gl12 & 3245 & 3239 & 6 & -0.31 & -0.29 & -0.02\ Gl145 & 3297 & 3270 & 27 & -0.27 & -0.28 & 0.01\ Gl203 & 3174 & 3138 & 36 & -0.31 & -0.22 & -0.09\ Gl299 & 3078 & 3373 & -295 & -0.53 & -0.53 & 0.00\ Gl402 & 3052 & 2943 & 109 & 0.00 & 0.03 & -0.03\ Gl480.1 & 3214 & 3211 & 3 & -0.48 & -0.48 & 0.00\ Gl486 & 3096 & 2941 & 155 & -0.02 & 0.03 & -0.05\ Gl643 & 3113 & 3102 & 11 & -0.29 & -0.26 & -0.03\ Gl754 & 2988 & 3005 & -17 & -0.23 & -0.14 & -0.09\ L707-74 & 3250 & 3353 & -103 & -0.39 & -0.38 & -0.01\ LHS1134 & 3007 & 2950 & 57 & -0.20 & -0.13 & -0.07\ LHS1481 & 3342 & 3510 & -168 & -0.66 & -0.76 & 0.10\ LHS1723 & 3031 & 3167 & -136 & -0.29 & -0.24 & -0.05\ LHS1731 & 3229 & 3273 & -44 & -0.22 & -0.19 & 0.03\ LHS1935 & 3222 & 3181 & 41 & -0.20 & -0.22 & 0.02\ LHS337 & 3003 & 3007 & -4 & -0.33 & -0.27 & -0.06\ LHS3583 & 3205 & 3236 & -31 & -0.13 & -0.22 & 0.09\ LHS3746 & 3111 & 3013 & 98 & -0.17 & -0.13 & -0.04\ LHS543 & 3042 & 2872 & 170 & 0.17 & 0.23 & -0.06\ LP816-60 & 3030 & 2960 & 70 & -0.11 & -0.07 & -0.04\ \ \[parall\] Estimating total uncertainties {#gauss} ------------------------------- Intrinsic uncertainties exist in the T$_{\mathrm{eff}}$ and \[Fe/H\] reference values of the HARPS dataset, since their initial photometric derivations have average uncertainties of 100 K and 0.17 dex respectively. Since these parameters are used as the training values for the machine learning process, we decide to inject these uncertainties by perturbing their values accordingly, in order to see how the final results of the predictions will vary. Therefore, we create gaussian distributions on the parameters for each HARPS training dataset, increasing the dispersion of distribution on the reference parameters each time with step of 10 K and 0.02 dex, until the uncertainties of 100 K and 0.17 dex. This adds different training values to the machine learning algorithm each time. For each step, we create 100 gaussian-distributed training datasets. After these runs of machine learning, we calculate the average values of predicted parameters and their dispersion. In Fig. \[gd\], we present the variations for spectra from the highest resolution (HARPS), the lowest resolution (FEROS) and an intermediate resolution (CARMENES). The datapoints represent the average difference between the resulting parameters and the reference values, after being calculated with the 100 different datasets. The errorbars are the dispersion of it. We notice that the average differences from the reference values are almost the same among them, regardless the amount of uncertainty injected to the gaussian distribution. The average results of T$_{\mathrm{eff}}$ and \[Fe/H\] for the spectra from all the instruments are presented in Table \[gdstarpar\]. We report their maximum errors after considering the maximum gaussian distribution with 100 K and 0.17 dex. Overall, the average values of the parameters remain roughly the same as the ones calculated with no gaussian distribution at all. The mean absolute errors (M.A.E.) of the machine learning models have grown to values between 65 and 80 K for T$_{\mathrm{eff}}$ and between 0.10 to 0.13 dex for \[Fe/H\], depending on the resolution of the HARPS dataset. The dispersion of the derived parameters grows as the resolution of the spectra becomes lower. Specifically, it is smaller than the injected uncertainties for the HARPS spectrum ($\sim$60 K and $\sim$0.10 dex), while for the spectra from other instruments, it is slightly higher than the uncertainties injected ($\sim$110 to $\sim$130 K and $\sim$0.18 to $\sim$0.22 dex respectively). In all the cases though, the resulting average values of stellar parameters are very close to their expected values. Differences of T$_{\mathrm{eff}}$ are up to $\sim$40 K and differences of \[Fe/H\] are up to 0.03 dex, regarding to the expected values. [ccccccccccc]{}\ Star & Spec. & Res. & Ref. & M.L. & M.A.E. & Disp. & Ref. & M.L. & M.A.E. & Disp.\ & & & T$_{\mathrm{eff}}$ & T$_{\mathrm{eff}}$ & T$_{\mathrm{eff}}$ & T$_{\mathrm{eff}}$ & \[Fe/H\] & \[Fe/H\] & \[Fe/H\] & \[Fe/H\]\ & & & \[K\] & \[K\] & \[K\] & \[K\] & \[dex\] & \[dex\] & \[dex\] & \[dex\]\ \ Gl643 & HARPS & 115000 & 3102 & 3113 & 27 & 10 & -0.26 & -0.28 & 0.04 & 0.01\ Gl846 & UVES & 110000 & 3682 & 3691 & 28 & 13 & -0.08 & -0.05 & 0.04 & 0.02\ Gl514 & CARMENES & 94600 & 3574 & 3547 & 28 & 17 & -0.13 & -0.13 & 0.04 & 0.03\ Gl908 & SOPHIE & 75000 & 3587 & 3580 & 28 & 18 & -0.38 & -0.35 & 0.04 & 0.03\ Gl674 & FEROS & 48000 & 3284 & 3338 & 30 & 24 & -0.18 & -0.16 & 0.04 & 0.03\ \ \[newstarspar\] [ccccccccccc]{}\ Star & Spec. & Res. & Ref. & M.L. & M.A.E. & Disp. & Ref. & M.L. & M.A.E. & Disp.\ & & & T$_{\mathrm{eff}}$ & T$_{\mathrm{eff}}$ & T$_{\mathrm{eff}}$ & T$_{\mathrm{eff}}$ & \[Fe/H\] & \[Fe/H\] & \[Fe/H\] & \[Fe/H\]\ & & & \[K\] & \[K\] & \[K\] & \[K\] & \[dex\] & \[dex\] & \[dex\] & \[dex\]\ \ Gl643 & HARPS & 115000 & 3102 & 3126 & 65 & 60 & -0.26 & -0.29 & 0.10 & 0.10\ Gl846 & UVES & 110000 & 3682 & 3678 & 68 & 109 & -0.08 & -0.06 & 0.10 & 0.18\ Gl514 & CARMENES & 94600 & 3574 & 3545 & 77 & 113 & -0.13 & -0.13 & 0.12 & 0.19\ Gl908 & SOPHIE & 75000 & 3587 & 3585 & 78 & 120 & -0.38 & -0.36 & 0.13 & 0.21\ Gl674 & FEROS & 48000 & 3284 & 3324 & 80 & 138 & -0.18 & -0.15 & 0.13 & 0.22\ \ \[gdstarpar\] $\begin{array}{cc} \includegraphics[width=9cm]{G_Teff_Harps.pdf} & \includegraphics[width=9cm]{G_Feh_Harps.pdf} \\ \includegraphics[width=9cm]{G_Teff_Carmenes.pdf} & \includegraphics[width=9cm]{G_Feh_Carmenes.pdf} \\ \includegraphics[width=9cm]{G_Teff_Feros.pdf} & \includegraphics[width=9cm]{G_Feh_Feros.pdf} \\ \end{array}$ Validation of \[Fe/H\] determinations by measuring binary systems {#binaries} ----------------------------------------------------------------- Here, we measure \[Fe/H\] in binary systems, containing M dwarfs which are not part of the reference sample used for machine learning. Thus, we validate our method of \[Fe/H\] prediction in an independent way. We determine \[Fe/H\] both in FGK+M and in M+M systems for an even more intrinsic test of \[Fe/H\] agreement. The \[Fe/H\] determinations of eight FGK+M binary systems, from spectra obtained by UVES and FEROS spectrographs, are presented in Table \[FGKM\]. Regarding the FGK stars, their \[Fe/H\] and respective uncertainties were derived using the methodology described in @sousa and @santos13. The method measures the equivalent widths of FeI and FeII lines and assumes ionization and excitation equilibrium. It makes use of the radiative transfer code MOOG [@sneden] and a grid of Kurucz model atmospheres [@kurucz]. The \[Fe/H\] values of the respective M dwarf secondaries, derived by ODUSSEAS, are presented along with the total uncertainties of our tool at the resolutions of UVES (0.10 dex) and FEROS (0.13 dex). All binaries have differences within the uncertainties of the methods. Furthermore, we proceed to \[Fe/H\] determinations of stars in five M+M binary systems, measuring their available spectra from the CARMENES public archive. In Table \[MM\], we present these results along with their own dispersions, since both are estimated by our tool based on the same reference values with the same initial uncertainties. We notice agreement between the respective members of all the M+M binaries, within the dispersions of their \[Fe/H\] determinations. This is a validation that our tool predicts \[Fe/H\] in a consistent and accurate way. [ccccccc]{}\ Primary & \[Fe/H\] & $\sigma$\[Fe/H\] & Secondary & \[Fe/H\] & $\sigma$\[Fe/H\] & \[Fe/H\] Difference\ & \[dex\] & \[dex\] & & \[dex\] & \[dex\] & \[dex\]\ \ Gl100A & -0.29 & 0.05 & Gl100C & -0.29 & 0.13 & 0.00\ Gl118.1A & 0.02 & 0.05 & Gl118.1B & 0.05 & 0.10 & 0.03\ Gl173.1A & -0.37 & 0.03 & Gl173.1B & -0.29 & 0.10 & 0.08\ Gl157A & -0.08 & 0.04 & Gl157B & 0.02 & 0.13 & 0.10\ NLTT19073 & 0.08 & 0.03 & NLTT19072 & -0.07 & 0.13 & -0.15\ NLTT29534 & 0.00 & 0.03 & NLTT29540 & -0.03 & 0.10 & -0.03\ NLTT34137 & -0.12 & 0.05 & NLTT34150 & -0.13 & 0.10 & -0.01\ NLTT34353 & -0.10 & 0.03 & NLTT34357 & -0.11 & 0.10 & -0.01\ \ \[FGKM\] [ccccccc]{}\ Primary & \[Fe/H\] & Disp. & Secondary & \[Fe/H\] & Disp. & \[Fe/H\] Difference\ & \[dex\] & \[dex\] & & \[dex\] & \[dex\] & \[dex\]\ \ Gl553 & -0.07 & 0.06 & Gl553.1 & -0.10 & 0.07 & 0.03\ Gl875 & -0.15 & 0.05 & Gl875.1 & -0.17 & 0.06 & 0.02\ Gl617A & 0.04 & 0.04 & Gl617B & -0.08 & 0.08 & 0.12\ Gl745A & -0.48 & 0.04 & Gl745B & -0.53 & 0.06 & 0.05\ Gl752A & 0.01 & 0.03 & Gl752B & -0.07 & 0.08 & 0.08\ \ \[MM\] Discussion on the reference parameter scales {#referencescales} -------------------------------------------- Since supervised machine learning determines the parameters based on reference values given to it, their systematics will apply to the results of new stars too. In this work, we have used the reference T$_{\mathrm{eff}}$ and \[Fe/H\] photometric scales of @casag08 and @neves12 respectively, as they are derived in a homogeneous way for a sufficiently big number of spectra available to us. It is important to make a comparison between the reference values we use and values of same stars derived by other recent works, which may be subject to different systematics. Such is @mann15, with which we share 26 common stars of the 65 ones we use as our reference dataset. In Table \[scales\], we compare our reference parameters with determinations by @mann15 and report the differences. These differences are illustrated in Figure \[scalecomp\]. Regarding T$_{\mathrm{eff}}$, we notice that our reference values have a systematic underestimation of 178 K on average with a standard deviation of 73 K. This systematic difference roots back to the different methods of derivation followed. Work by @casag08 is based on the multiple optical-infrared technique (MOITE) for M dwarfs, which is an extension of the infrared flux method (IRFM) as described in @casag06. On the other hand, determinations by @mann15 are done by comparing the optical spectra with the CFIST suite of the BT-SETTL version of the PHOENIX atmosphere models [@allard13]. The detailed description of this method can be found in @mann13b. Regarding \[Fe/H\], we notice no significant systematic difference between the methods of calibration by @neves12 and @mann15. The average difference is 0.06 dex with a standard deviation of 0.11 dex for the sample of stars in common. As a potential future improvement of our determinations, we consider the possibility of replacing our reference dataset. Since new techniques of parameter determination become more accurate and precise and as more spectra will become available to us, their homogeneously derived parameters can be correlated with their pseudo EWs. Thus, we take into account the creation of an improved reference dataset for our machine learning tool. [ccccccc]{}\ Star & T$_{\mathrm{eff}}$ (Ref.) & T$_{\mathrm{eff}}$ (Mann15) & T$_{\mathrm{eff}}$ Diff. & \[Fe/H\] (Ref.) & \[Fe/H\] (Mann15) & \[Fe/H\] Diff.\ & \[$\pm$100 K\] & \[$\pm$60 K\] & \[K\] & \[$\pm$0.17 dex\] & \[$\pm$0.08 dex\] & \[dex\]\ \ Gl54.1 & 2091 & 3056 & -65 & -0.40 & -0.26 & -0.14\ Gl87 & 3565 & 3638 & -73 & -0.30 & -0.36 & 0.06\ Gl105B & 3054 & 3284 & -230 & -0.14 & -0.12 & -0.02\ Gl176 & 3369 & 3680 & -311 & 0.02 & 0.14 & -0.12\ Gl205 & 3497 & 3801 & -304 & 0.17 & 0.49 & -0.32\ G213 & 3026 & 3250 & -224 & -0.19 & -0.22 & -0.03\ Gl250B & 3369 & 3481 & -112 & -0.09 & 0.14 & -0.25\ Gl273 & 3107 & 3317 & -210 & -0.05 & -0.11 & 0.06\ Gl382 & 3429 & 3623 & -194 & 0.04 & 0.13 & -0.09\ Gl393 & 3396 & 3548 & -154 & -0.13 & -0.18 & 0.05\ Gl436 & 3277 & 3479 & -202 & 0.01 & 0.01 & 0.00\ Gl447 & 2952 & 3192 & -240 & -0.23 & -0.02 & -0.21\ Gl514 & 3574 & 3727 & -153 & -0.13 & -0.09 & -0.04\ Gl526 & 3545 & 3649 & -104 & -0.18 & -0.31 & 0.13\ Gl555 & 2987 & 3211 & -224 & 0.13 & 0.17 & -0.04\ Gl581 & 3203 & 3395 & -192 & -0.18 & -0.15 & -0.03\ Gl686 & 3542 & 3657 & -115 & -0.29 & -0.25 & -0.04\ Gl699 & 3094 & 3228 & -134 & -0.59 & -0.40 & -0.19\ Gl701 & 3535 & 3614 & -79 & -0.20 & -0.22 & 0.02\ Gl752A & 3336 & 3558 & -222 & 0.04 & 0.10 & -0.06\ Gl846 & 3682 & 3848 & -166 & -0.08 & 0.02 & -0.10\ Gl849 & 3200 & 3530 & -330 & 0.24 & 0.37 & -0.13\ Gl876 & 3059 & 3247 & -188 & 0.14 & 0.17 & -0.03\ Gl880 & 3488 & 3720 & -232 & 0.05 & 0.21 & -0.16\ Gl887 & 3560 & 3688 & -128 & -0.20 & -0.06 & -0.14\ Gl908 & 3587 & 3646 & -59 & -0.38 & -0.45 & -0.07\ \ \[scales\] $\begin{array}{c} \includegraphics[width=\hsize]{TRM.pdf} \\ \includegraphics[width=\hsize]{FRM.pdf}\\ \end{array}$ Summary {#sum} ======= We present our machine learning tool ODUSSEAS for the derivation of T$_{\mathrm{eff}}$ and \[Fe/H\] in M dwarf stars, whose spectra can have different resolutions and wavelength ranges inside the area from 530 to 690 nm. We explain in detail the way it is built and works. We present the results of the tests we perform and we examine its accuracy and precision from very high resolution of 115000 to resolution of 48000. Our tool seems to be reliable, as it operates with high machine learning scores around 0.94 and achieves excellent predictions of significantly high precision with mean absolute errors of $\sim$30 K for T$_{\mathrm{eff}}$ and $\sim$0.04 dex for \[Fe/H\]. Taking into consideration the intrinsic uncertainties of the reference parameters and perturbing them accordingly, our models have maximum uncertainties of $\sim$80 K for T$_{\mathrm{eff}}$ and $\sim$0.13 dex for \[Fe/H\], which are within the typical uncertainties for M dwarfs. Our parameters for spectra from different spectrographs, occurring from the average of 100 determinations, have consistent values with differences within $\sim$50 K and $\sim$0.03 dex from the expected ones. Spectra should have SNR above 20 for optimal predictions. Our tool is valid for M dwarfs in the intervals 2800 to 4000 K for T$_{\mathrm{eff}}$ and -0.83 to 0.26 dex for \[Fe/H\], except from very active or young stars. It can be tested by downloading the files in the webpage <https://github.com/AlexandrosAntoniadis/ODUSSEAS>, after reading the README instructions for clarifying the technical details. This work was supported by FCT/MCTES through national funds and by FEDER - Fundo Europeu de Desenvolvimento Regional through COMPETE2020 - Programa Operacional Competitividade e Internacionalização by these grants: UID/FIS/04434/2019, UIDB/04434/2020 and UIDP/04434/2020; PTDC/FIS-AST/32113/2017 and POCI-01-0145-FEDER-032113; PTDC/FIS-AST/28953/2017 and POCI- 01-0145-FEDER-028953. A.A.K., S.G.S., E.D.M. and G.D.C.T. acknowledge the support from FCT in the form of the exploratory projects with references IF/00028/2014/CP1215/CT0002, IF/00849/2015/CP1273/CT0003 and IF/00956/2015/CP1273/CT0002. S.G.S. and E.D.M. further acknowledge the support from FCT through the Investigador FCT contracts IF/00028/2014/CP1215/CT0002, IF/00849/2015/CP1273/CT0003 and POCH/FSE (EC). G.D.C.T. further acknowledges the support from an FCT/Portugal PhD grant with reference PD/BD/113478/2015. [200]{} Akras, S., Leal-Ferreira, M. L., Guzman-Ramirez, L., & Ramos-Larios, G. 2019, , 483, 5077 Allard, F., Homeier, D., Freytag, B., et al. 2013, Memorie della Societa Astronomica Italiana Supplementi, 24, 128 Bonfils, X., Delfosse, X., Udry, S., et al. 2005, , 442, 635 Bonfils, X., Delfosse, X., Udry, S., et al. 2013, , 549, A109 Casagrande, L., Portinari, L., & Flynn, C. 2006, , 373, 13 Casagrande, L., Flynn, C., & Bessell, M. 2008, , 389, 585 Das, P., & Sanders, J. L. 2019, , 484, 294 Everett, M. E., Howell, S. B., Silva, D. R., et al. 2013, , 771, 107 Howard, E. M. 2017, Astronomical Data Analysis Software and Systems XXV, 512, 245 Johnson, J. A., & Apps, K. 2009, , 699, 933 Kurucz, R. 1993, ATLAS9 Stellar Atmosphere Programs and 2 km/s grid. Kurucz CD-ROM No. 13. Cambridge, 13 Lindgren, S., Heiter, U., & Seifahrt, A. 2016, , 586, A100 Mann, A. W., Brewer, J. M., Gaidos, E., L[é]{}pine, S., & Hilton, E. J. 2013a, , 145, 52 Mann, A. W., Gaidos, E., & Ansdell, M. 2013b, , 779, 188 Mann, A. W., Feiden, G. A., Gaidos, E., et al. 2015, , 804, 64 Neves, V., Bonfils, X., Santos, N. C., et al. 2012, , 538, A25 Neves, V., Bonfils, X., Santos, N. C., et al. 2014, , 568, A121 nehag, A., Heiter, U., Gustafsson, B., et al. 2012, , 542, A33 Passegger, V. M., Schweitzer, A., Shulyak, D., et al. 2019, , 627, A161 Rajpurohit, A. S., Allard, F., Rajpurohit, S., et al. 2018, , 620, A180 Rau, M. M., Koposov, S. E., Trac, H., & Mandelbaum, R. 2019, , 484, 409 Rojas-Ayala, B., Covey, K. R., Muirhead, P. S., & Lloyd, J. P. 2010, , 720, L113 Rojas-Ayala, B., Covey, K. R., Muirhead, P. S., & Lloyd, J. P. 2012, , 748, 93 Santos, N. C., Sousa, S. G., Mortier, A., et al. 2013, , 556, A150 Sneden, C. A. 1973, Ph.D. Thesis Sousa, S. G., Santos, N. C., Mayor, M., et al. 2008, , 487, 373 Ucci, G., Ferrara, A., Gallerani, S., et al. 2019, , 483, 1295 Woolf, V. M., & Wallerstein, G. 2005, , 356, 963 Evaluation of our pseudo-EW measurements {#A} ======================================== We calculated the pseudo EWs of 4104 lines for the 110 stars of the total HARPS sample. Here we compare our values with the ones obtained by MCAL code. In the upper panel of Fig. \[comp\], we present the comparison of all the pseudo-EW values for the star Gl176 as an example. The units of pseudo EWs are m$\AA$. Inside the plots, AA stands for our measurements and VN stands for the measurements by @neves14. The slope in the diagrams of most stars is almost identical with the identity line, with only few pseudo EWs having considerably different values. In the lower panel of Fig. \[comp\] we show the relative difference (the percentage) of the values against our values. A scatter appears for the pseudo-EW values smaller than 30 m$\AA$, which is normal, as the relative difference for these narrow lines is greater. In contrast, nearly all lines broader than 50 m$\AA$ are measured with significant agreement. The actual quality test for measuring the pseudo EWs, comes from the following comparison. We plot the mean differences and mean relative differences between our method and the code by @neves14 for each line averaged by all the stars, to see how all the lines are measured. The result is very good as it can be seen in Fig. \[d\], with only 184 lines out of 4104 showing a mean relative difference greater than $\pm$15%. $\begin{array}{c} \includegraphics[width=8cm]{pew_AAVN.pdf} \\ \includegraphics[width=8cm]{pew_relAAVN.pdf} \\ \end{array}$ $\begin{array}{c} \includegraphics[width=8cm]{Ave_Dplot.pdf} \\ \includegraphics[width=8cm]{RelAve_Dplot.pdf} \\ \end{array}$
{ "pile_set_name": "ArXiv" }
+ -6 + -7? -4 What is the value of ((-288)/(-135))/32*(14 - 8)? 2/5 (-35)/49 + (-297)/(-378) 1/14 What is ((-168)/(-1092))/(3/(-9))? -6/13 What is the value of (2105 - 2104)*((-8)/58)/2? -2/29 Evaluate (1359/72 - 72/9) + -11. -1/8 (1*(3 - -1))/((-6)/12) -8 Evaluate -6 - (-2)/(-12 + 8)*-24. 6 What is the value of -4 - (1 - (5 + (-55)/15))*0? -4 Calculate 2*(63/(-28) - -2)*24. -12 Calculate 4 - (138/20 - (-1)/10). -3 (4888/282)/((-28)/18*(-24)/28) 13 What is (-452)/(-65) - 76/(-380) - 2/13? 7 What is 25 + -3 - (-4221)/(-189)? -1/3 Calculate ((-28)/35)/(140/(-1225)). 7 (-9284)/(-396) - 23 - 242/18 -13 What is the value of (2280/(-36))/(-5) + -15? -7/3 What is 20/825*(-132)/(-24)? 2/15 What is the value of (-2 - (-24)/11) + (-8664)/1672? -5 What is the value of ((-9)/(-2) + -3)/(11 + 88/(-32))? 2/11 What is 2/(-12)*(4 + (-11)/(594/192))? -2/27 What is (((-64)/128)/((-4)/(-272)))/1? -34 Evaluate ((-24)/(-30))/((-3468)/510). -2/17 Calculate (255920/(-4570))/((-8)/(-2)*1/2). -28 Calculate ((-84)/2310)/(3/15). -2/11 What is (-7)/((-315)/54)*(-100)/12? -10 What is 15 + (-15 - 2) - -24? 22 Evaluate (-2)/(-9) - (-1)/(-3)*8320/(-156). 18 Calculate 451/(-22) + 6/2 + 93/(-62). -19 ((-95)/20 + 5)/((-7)/40 - 0) -10/7 Calculate ((-1121)/(-1239) - 2/(-21))*(8 + -4). 4 336/(-2205) - (4 - 270/63) 2/15 What is 0 + (-2)/3*(-8)/(-112)? -1/21 What is (4 - 9) + (3 - 10 - -4)? -8 Evaluate (1/(-8))/(231/9240). -5 (-4)/(-8 + 684/81) -9 What is 208/(-1848)*3 + (-260)/(-44) + -6? -3/7 -7 - (-276)/48 - ((-292)/(-48) + -7) -1/3 Evaluate (279/54)/(((-1155)/126)/55). -31 Calculate 273/(-1155) - -4*(-3)/33. -3/5 (25 + 6314/(-238))*51/(-3) 26 What is -1 - (-16)/(-864)*-30? -4/9 What is (30/160)/(-3)*-2? 1/8 (5/108)/((-5210)/(-6252)) 1/18 What is the value of (-10542)/390 + (-223 - -250)? -2/65 8 + 1698/(-210) - 8/40 -2/7 (0 - (-26)/12)/(1/(2 - 1)) 13/6 What is the value of (65/(-39))/((-350)/1470)? 7 Calculate (45/(-6))/((15/(-1) - -5)/8). 6 6/6*(-328)/(-24) - (-3)/9 14 Calculate (-1)/(21/(-49)*14/(-24)). -4 Evaluate (-34)/(-11) + (-408)/374. 2 What is (9/135)/((-6)/198)? -11/5 8/3*(-3)/((-9 - 0) + 7) 4 What is the value of (-7 + 56/88*11)*2/(-4)? 0 Calculate (33/770*14)/((-2)/60). -18 -12 + 15 + -9 - 0*3/(-18) -6 (8/14)/(12/7)*-2 -2/3 2/40 - ((-3)/(-30))/(65/(-65)) 3/20 Evaluate 30/190*391/102 + 2/(-19). 1/2 Calculate 0 - (3/10*4)/(90/600). -8 Evaluate 0 + (2 - 1 - (4 - (-3 - -10))). 4 Calculate (3268/(-516) - 21/(-3))*1*-9. -6 What is the value of (69/63 + -1)/(19/(1710/(-20)))? -3/7 (175/(-42) - -11) + -7 + 47/(-6) -8 What is (22 - 30 - (-66)/10)/(1/(-10))? 14 Calculate 14/(-49) - ((-663)/170)/(2 - -19). -1/10 What is the value of (-104)/(-22) - 2/(-4)*-8? 8/11 ((-164)/(-54) - 3)/(4/(-12) + 0) -1/9 (-636)/(-1378)*130/(-4) -15 Evaluate (-14)/12*(-4080)/10710. 4/9 Evaluate (-3)/((-54)/(-44)) + 110/45 + -2. -2 What is (-108)/(-15)*560/224? 18 Calculate 1 - (9 - 18) - (6/(-3) - 22). 34 Calculate 3*-4 + 2 + 206 + -207. -11 Calculate 7 + -6 - (16 + -25 + 6). 4 508/(-616)*-2 - 1 - 188/517 2/7 Evaluate -7 - ((8 - 2) + 3). -16 6528/720 - 72/8 1/15 What is -27 + 23 - 2*-4 - 1040/264? 2/33 Calculate 4 - 76/(-7581)*(-10283)/26. 2/57 What is ((-18)/4)/((10/(-4))/(-5))? -9 What is the value of 6/12*-3*35/(-63)? 5/6 Evaluate (-60)/(-114)*(-7)/(-35) + (-39)/190. -1/10 Calculate 12/(-2) - (-13)/((-4160)/(-1900)). -1/16 What is the value of 970/(-1575) + 315/(-49) + (-14)/(-2)? -2/45 70*1/276 - 80/920 1/6 What is the value of ((-11)/22*-1)/((-3)/(-6))? 1 (2124/616)/9 + (-276)/644 -1/22 Evaluate (-6*1)/(-58 - -60). -3 ((-335)/201)/((-4)/(-6)) - 49/(-2) 22 What is (-11)/132 + (-40)/(-48)? 3/4 Calculate ((-105)/(-30) + 425/(-102))*(1 + -6). 10/3 What is -71 - (-35 - -23) - -42? -17 (-6)/(-10)*(-2)/(52/(-65))*-1 -3/2 What is (-2280)/2970 - ((-12)/(-189) - (-8)/(-28))? -6/11 What is the value of (-322)/(-190) - (2592/(-76) + 34)? 9/5 Evaluate (21/21)/(35 + -56). -1/21 (795/(-212))/(-3 - (-201)/72) 18 ((-58)/(-377))/(5/39) 6/5 (-534)/54 - (-72)/((-48)/(-6)) -8/9 (-9 + 0 + 9)/3 + -15 + 21 6 What is 36*14/84*(-1)/(-21)? 2/7 What is 60/(-3) - (340/(-34) - -1)? -11 What is the value of ((-1792)/1176 + (-2)/(-3))*-21? 18 Evaluate (-13)/(1430/(-255)) + (-30)/12. -2/11 (-10)/(-35)*(-441)/(-18) 7 What is (-1036)/(-364) - (9 + -1)/2 - -1? -2/13 What is (335/20)/(-67) + (-291)/(-12)? 24 Evaluate 4/(-9) + 13/(3627/155). 1/9 Evaluate 12/76 + 25872/(-2128). -12 Evaluate -23 + 16 + (-272)/(-40). -1/5 -5 - (2/(-8)*-10 - 69/138) -7 Calculate (3 - 66/27)*1112/695. 8/9 What is ((-11)/10 - (-6)/(-15))/(480/(-192))? 3/5 Calculate (-42)/1785*-17 + 6/(-10). -1/5 What is (22/121)/((-204)/(-21318))? 19 What is ((-1)/12*-10)/(-3*11/33)? -5/6 What is the value of 60/180*18/8? 3/4 Calculate (580/522)/((-30)/(-12)). 4/9 What is the value of ((-1122)/714)/(2/14)? -11 ((-442)/260)/(-4*(-9)/72) -17/5 Evaluate (1/2*1)/((-431)/2586) - -5. 2 (-1)/16*2 + (-3348)/96 + 30 -5 What is (34/(-4))/(674/(-1348))? 17 What is the value of 1175/(-141)*(-12)/(-10)? -10 Evaluate 21 + (-12 - 19) + 21/1. 11 What is (450/(-120) - -3*1)/(2/(-2))? 3/4 Calculate 2*(6 + 417/(-69)) - 3762/(-8349). 4/11 What is (13/(715/33))/((-12)/380)? -19 What is 1744/(-320) + (-34)/(-136)? -26/5 Calculate (-273)/(-13) + (-15)/(-5) + (-9 - 0). 15 What is (1572/156 + -10)*2? 2/13 Evaluate 1/(-6)*((-143)/22 - -8). -1/4 What is ((-2)/(-6))/(-28 + (-448)/(-14))? 1/12 What is the value of (136/(-340))/((-2)/(-10))? -2 Evaluate (-57 - (-22065)/385) + (-12)/14. -6/11 Calculate 17766/6909*28/(-6). -12 (268/536)/(4/(-6)) -3/4 What is the value of (622 + -628)*2/(-20)? 3/5 Evaluate (-1446)/90 + 8/120. -16 111/(-180) + (-1133)/(-44) + -25 2/15 Evaluate ((-14)/(-35))/(2/(-20)) - (41 - 32). -13 Evaluate (-75 + -12)/29 - 74/(-22). 4/11 What is (-3432)/1287*(9/30)/(-1)? 4/5 What is (-225)/36 - (-7 - 3/(-6)*2)? -1/4 Calculate 63/42 + (-4 - 46*2/(-8)). 9 Calculate ((-6321)/245)/(-43)*(-5 - 0/2). -3 Calculate 0/((-47)/(-799) - (-18)/(-17)). 0 What is the value of (-64)/80*(-3 + 2) - (-2)/(-40)? 3/4 (1/((-28)/(-21)))/(30/(-16)) -2/5 Calculate (15/(-2)*2 - 3)*(-341)/(-2046). -3 192/168*(-6)/(-4)*70/(-30) -4 What is ((-960)/4080)/(30/(-85))? 2/3 What is the value of (16/10)/((-40)/100)*-1? 4 (-988)/10374*((-4)/4 - (-3)/6) 1/21 What is the value of (120/105)/((-36)/42)*3/2? -2 Calculate -8 - (-7 - 572/60)/2. 4/15 Evaluate 12 - ((-2610)/2320)/((-3)/(-16)). 18 Calculate (2 - (3 + -5))*(-134)/(-268). 2 What is (84/210)/(48/(-5))? -1/24 What is the value of -22 + 23 + (-588)/(-21)? 29 Calculate (1/2)/((-12)/(-8)) - (-36)/54. 1 What is the value of (-25)/25*(-228)/6? 38 Evaluate -6*(-6)/(-18) - (-3 - -5). -4 Calculate ((-9)/(-12))/((-15 - 16)/(-992)). 24 What is the value of (10 - (-94)/(-4))/3 + 2/4? -4 Calculate (6 - 90/21)*(11 - (-4 + 8)). 12 What is -1 + 3 + 34/(-4) - 5/10? -7 What is 2/18 + (-40)/210*(-287)/(-6)? -9 Evaluate 0/(-3) + (-15)/225. -1/15 What is (2*-2 + 1)*(17 + (-129)/9)? -8 What is the value of (-2 + (-52)/(-36))*(10 - (-477)/(-45))? 1/3 -21 - (5/40 - (-6063)/(-376)) -5 Evaluate -1 - (43/(-418)*12 - 14/(-77)). 1/19 Calculate (11 - (-13 + 50)) + (-56)/8. -33 Evaluate (-18)/(-405)*(-39)/(-143)*5. 2/33 Evaluate (-1197)/(-132) - 130/13 - 6/(-33). -3/4 (-2 - (-84)/360) + 3/2 -4/15 What is the value of (744/1860)/(313/(-105) - -3)? 21 Calculate 7 - (5/((-20)/(-12)))/(12/32). -1 (3/9 + (1 - 1))/((-25)/375) -5 Calculate (-3570)/(-612) + (-94)/84 + (-4)/(-14). 5 What is the value of ((-12)/17)/(796/(-6766))? 6 What is -3*(-6 - 525/(-90))? 1/2 What is (2/(-4))/((-13)/(468/(-63)))? -2/7 Evaluate (-5 + 289/68)/(((-1)/12)/(-1)). -9 Calculate 0/(-24) - (-6)/(-14). -3/7 What is 3222/2148 - (0/3)/2? 3/2 ((-2)/(-6))/(29/(-450) + (-216)/2700) -30/13 What is (6 - 5)/((-17)/68 - 10/(-8))? 1 What is (-1 + 0)*(11 + 35/(-5) + -6)? 2 What is the value of (-27)/185 + (7 - 116*(-108)/(-1776))? -1/5 Evaluate (13 - 3)/(-57 - -59). 5 Calculate (-7 - -2)*(4 + -3) + 376/76. -1/19 What is the value of 14/(-24)*((12 - -2) + -18)? 7/3 1048/(-262)*(-2)/(-3) -8/3 (8 - 175/7) + 33 16 What is the value of (-1*44/(-1430))/(6/180)? 12/13 What is the value of 4455/(-171) + 23/437? -26 What is the value of 38/(-5) + (13 - 134/10)? -8 What is 2356/133 - 357/21? 5/7 What is 5 - ((-681)/(-126) - (-124)/(-217))? 1/6
{ "pile_set_name": "DM Mathematics" }
The new RS1e from Grado uses a different species of handcrafted mahogany from our previous models. The earpieces utilize an intricate curing process that optimizes the tonal quality while giving them a new look. The RS1e places a 50mm dynamic transducer and an 8 conductor cable design in an open-air configuration. The result is a smooth, controlled, and coherent sound with detailed dynamics. Frequency response ranges from 12-30 kHz and the drivers are matched to 0.05dB. Weighing 9oz, the headphones are an example of the wonders of Mother Nature with a gorgeous light mahogany look. The RS1e is a masterpiece in the Grado collection.
{ "pile_set_name": "Pile-CC" }
Wednesday, January 12, 2011 I figured it was time to have the first new blog posting of the year, and what better day to do it then on 1/11/11! Last weekend in the 1st weekend of the NFL postseason was more nuts then I thought it would be. The Saints/Seahawks game wound up being a total shocker with the Seahawks pulling the upset. I was bummed about that because I really would of rather wanted to see the Saints play the Bears then the Seahawks, since it would of been a better game and I like Drew Brees, but give credit to Seattle. They played like they wanted to win, alot more then the Saints defense apparently.....geez- they made Marshawn Lynch look like Jim Brown in that last TD run they gave up! I was way happy to see the Philadelphia Eagles lose another postseason playoff game. Their fans deserve it- stay classy Philly fans :D At this point, the NFC team that I'm rooting to see make it to the Super Bowl is the Green Bay Packers. I've always not minded Green Bay & Aaron Rodgers is one of the best QBs and now he's finally getting a chance to shine on the big lights of the playoffs after a win for the first time. At the same time the Atlanta Falcons aren't a team to sleep on either and play great at home. Matty Ice(Matt Ryan) is for real and I can see the winner of the GB/Atlanta being the Super Bowl team. I'm not convinced in the Chicago Bears(to the chargrin of a former co-blogger on here, who the blog is better off without her lazy & coward butt....but anyway lol) As far as the AFC goes, I wasn't shocked to see the Jets win in Indy. I was rooting for the Chiefs to beat the Ravens- but Cassel played away and now the Ravens play another game against the Steelers. Here We Go Steelers Here We Go! Clap Clap. I still think New England is going to cruise into the Super Bowl and win it all, but if the Jets pull off the upset against them on Sunday- it wouldn't surprise me either Here are my picks for this weekend's NFL Divisional Playoff games: Ravens/SteelersGotta pull for the Steelers here. Pittsburgh has always been my #2 team behind the Redskins since my uncle has always been a Steeler fan Packers/FalconsI'm gonna go with the upset and take Green Bay. I think they are getting on a hot streak roll & if the running game plays as good against the Falcons that they did vs the Eagles- its gonna be hard for Atlanta Seahawks/BearsLast week's win was a 1 week wonder & the Seahawks are a crappy road team- going with the Bears here Jets/PatriotsCan't go against Tom Brady in the postseason & its the Deion Branch factor! Pats all the way Hope you all enjoyed my MDB Mania post this week & good luck to everyone on the SFBOM NFL Playoff picks this weekend! Total Page Views Testimonials - The creator of "Skins, Fins & Bears...Oh My!!!" Mark Bodek welcoming you to the site. Taken from a Washington Capitals hockey game in late September 2010 in Washington DC Former 3 time WCW World Champion & YRG Fitness founder DDP...Diamond Dallas Page gives Skins, Fins, and Bears...Oh My! a good word
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention This invention relates to conductive elements e.g. heating elements, comprising a conductive composition deposited onto a support. 2. Discussion of the Prior Art Conductive elements comprising laminates of a porous electrically conductive layer composed of electrically conducting particles bonded together in an open continuous structure, electrodes on the conductive layer in electrical contact therewith and at least one layer covering each surface of the conductive layer are disclosed in U.S. Pat. No. 2,952,761 to R. Smith-Johannsen. Numerous methods for the preparation of similar elements for use as heaters are disclosed in the prior art. See, for example, U.S. Pat. Nos. 2,803,566, 2,891,228 and 2,991,257 all to R. Smith-Johannsen, 3,400,254 to Takemori, 3,876,968 to R. D. Barnes et al. 3,900,654 to J. J. Stinger and 4,169,911 to Yoshida et al. The disclosures of the above patents are incorporated by reference herein. In the prior art processes the conductive composition is applied to a substrate, for example, asbestos fiber mat, glass fabric or thermoplastic film. The structure is then generally laminated to one or more outer layers. When the conductive composition is an aqueous based dispersion of conductive particles, preferred for reasons of economy and safety, as in above-mentioned U.S. Pat. No. 2,952,761, the substrate used in actual practice has generally been an asbestos fiber mat, although use of other substrates is suggested in this patent. When the conductive composition is one containing an organic solvent medium, a wider range of substrates, including thermoplastic films, can be used. For example, in U.S. Pat. No. 3,900,654, a heating element is prepared from a thermoplastic film support with an adherent conductive layer of an electrically conductive material containing carbon black dispersed in a fluorocarbon elastomer. It is mentioned that the support can be composed of a layer of the polymer adhered to another material such as a fibrous sheet. It is also mentioned that the conductive elastomer can be applied from a liquid coating composition in which the elastomer is dispersed in an organic solvent or in water. Conductive elements prepared by processes of the type described above are not entirely satisfactory. While a very useful product can be made by impregnating a uniform asbestos fiber mat with an aqueous dispersion of conductive particles, careful precautions are necessary in handling products including asbestos fibers, and attempts to replace the uniform asbestos fiber mat by other uniform fiber mats have not yielded satisfactory products. More particularly, it is often difficult to obtain good adhesion of the conductive particles to the substrate coated, particularly when the substrate is flexible and/or is not adequately wetted by the liquid composition comprising conductive particles. If wetting is inadequate, so-called "mud-cracking" of the conductive layer can take place when the liquid composition is dried, resulting in unstable electrical properties. Even if satisfactory adhesion can be obtained initially, it is difficult to make a product which has stable electrical properties over an extended period of use, especially when the element is subject to flexing.
{ "pile_set_name": "USPTO Backgrounds" }
NZ: Home of the world's fastest spiders An unassuming spider species which lives in New Zealand and only one other place in the world has been found to have a remarkable skill -- a lightning-fast strike to catch prey. The mecysmaucheniidae, or trap-jaw spider, are tiny arachnids which hunt for prey on the ground, and new research has dug a bit deeper into how they feed. Published in Current Biology today, the study by the Smithsonian Institution shows the high-speed, power-amplified strike has evolved at least four times within the family of spiders. "This research shows how little we know about spiders and how much there is still to discover," lead author Hannah Wood says. She made high-speed video recordings of the spiders as they snared their prey by snapping their jaws shut with incredible power and speed. The predatory behaviour has been seen in some species of ants, but was previously unknown in arachnids. Her study of 14 species in the trap-jaw family showed a range of speeds, and the power of four exceeded the known power output of their muscles. It's left the researchers with questions about where that power comes from, considering the spiders' movements can't come directly from their muscles -- especially the short times and distances covered during their strike. They believe the spiders are able to store energy to produce their quick movements. Anatomical differences in the faster, stronger trap-jaw spiders have already been documented, but Ms Wood says they aren't quite sure how it works and more research needs to be done. Dr Cor Vink, curator of natural history at Canterbury Museum, can't fathom why the trap-jaw would need to attack in this way. "I can't imagine why these spiders would have evolved such an elaborate prey capture mechanism. They don't seem to have specialised in any particular prey and have been reported to feed on a range of insects and spiders." The spiders are also found in southern South America and are one of around 2000 spider species in New Zealand -- around 95 percent are endemic, with at least 700 species undescribed. Associate Professor in the School of Biological Sciences at the University of Canterbury believes the spider's small stature -- they're only a few millimetres long at most -- is probably why their fast strike hadn't been noticed before. She says the find isn't surprising given how little is known about spiders. The spider's speed perhaps allows it to attack its prey efficiently or possibly take larger prey than other spiders can manage, Dr Greg Holwell, from Auckland University's School of Biological Sciences who wasn't involved in the study, suggests. But the trap-jaw spider doesn't have the fastest strike on record -- that honour goes to another spider species, Zearchaea, which also lives in New Zealand.
{ "pile_set_name": "Pile-CC" }
Anti-neutrophil antibodies of the immunoglobulin M class in autoimmune neutropenia. Anti-neutrophil antibodies of the immunoglobulin G (IgG) class have been implicated in the pathogenesis of autoimmune neutropenia, but few reports have described immunoglobulin M (IgM) anti-neutrophil antibodies. To investigate the prevalence of IgM anti-neutrophil antibodies, sera from 130 patients with possible autoimmune neutropenia were studied for IgG and IgM anti-neutrophil antibodies using an immunofluorescence flow cytometric assay. Twenty-five patients (19%) had IgG anti-neutrophil antibodies exclusively, 21 patients (16%) had both IgG and IgM anti-neutrophil antibodies, and 11 patients (8%) had IgM anti-neutrophil antibodies exclusively. Immunoglobulin M anti-neutrophil antibodies were found in adults and children with isolated chronic neutropenia and in patients with Felty's syndrome, systemic lupus erythematosus, immune thrombocytopenic purpura, and human immunodeficiency virus. Patients with neutropenia with only IgM anti-neutrophil antibodies comprised almost 20% of antibody-positive patients in this study.
{ "pile_set_name": "PubMed Abstracts" }
# ***************************************************************************** # Copyright (c) 2020, Intel Corporation All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are met: # # Redistributions of source code must retain the above copyright notice, # this list of conditions and the following disclaimer. # # Redistributions in binary form must reproduce the above copyright notice, # this list of conditions and the following disclaimer in the documentation # and/or other materials provided with the distribution. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, # EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, # PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; # OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR # OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # ***************************************************************************** import numpy as np import pandas as pd from numba import njit @njit def series_mean(): series = pd.Series([3.2, -10, np.nan, 0.23, 9.2]) return series.mean() # Expect value: 0.6575 print(series_mean())
{ "pile_set_name": "Github" }
Delicate vesper mouse The delicate vesper mouse (Calomys tener) is a South American rodent species of the family Cricetidae. It is found in Argentina, Bolivia and Brazil. Its karyotype has 2n = 66 and FN = 66. References Infonatura Itis.gov Category:Calomys Category:Mammals of Brazil Category:Mammals described in 1888
{ "pile_set_name": "Wikipedia (en)" }
Q: Centering bootstrap wells with horizontal alignment I'm using bootstrap wells to make a type of card display that needs to go from the left to the right (horizontal), but for some reason the wells only want to be aligned vertically. body { background-color: #5C67B6; } html, body { height: 100%; padding-top: 70px; } .btn-purple { color: #fff; background-color: #5C67B6; border-color: #5C67B6; /*set the color you want here*/ } .btn-purple:hover, .btn-purple:focus, .btn-purple:active, .btn-purple.active, .open>.dropdown-toggle.btn-purple { color: #fff; background-color: #4b5496; border-color: #4b5496; /*set the color you want here*/ } .container { display: inline-block; } <link href="https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet" /> <link href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet" /> <body> <div class="container content-sm"> <div class="row"> <div class="col-md-4 col-sm-8"> <div class="well"> <img class="center-block" src="https://upload.wikimedia.org/wikipedia/en/thumb/9/9f/Twitter_bird_logo_2012.svg/1259px-Twitter_bird_logo_2012.svg.png" style="border-radius: 50%;" height="80" width="80"> <h3 style="text-align: center;">Test!</h3> <p>The quick brown fox jumped over the lazy brown dog</p> <a href="#" class="btn btn-purple btn-sm"><i class="fa fa-sign-in" aria-hidden="true"></i> Join server!</a> </div> <div class="well"> <img class="center-block" src="https://upload.wikimedia.org/wikipedia/en/thumb/9/9f/Twitter_bird_logo_2012.svg/1259px-Twitter_bird_logo_2012.svg.png" style="border-radius: 50%;" height="80" width="80"> <h3 style="text-align: center;">Test!</h3> <p>The quick brown fox jumped over the lazy brown dog</p> <a href="#" class="btn btn-purple btn-sm"><i class="fa fa-sign-in" aria-hidden="true"></i> Join server!</a> </div> <div class="well"> <img class="center-block" src="https://upload.wikimedia.org/wikipedia/en/thumb/9/9f/Twitter_bird_logo_2012.svg/1259px-Twitter_bird_logo_2012.svg.png" style="border-radius: 50%;" height="80" width="80"> <h3 style="text-align: center;">Test!</h3> <p>The quick brown fox jumped over the lazy brown dog</p> <a href="#" class="btn btn-purple btn-sm"><i class="fa fa-sign-in" aria-hidden="true"></i> Join server!</a> </div> </div> </div> </div> </body> If you check the snippet, you'll see that it's all being positioned vertically after each individual well is placed in. I'm using inline-block for the container and have tried using it for the well with no luck. How can I make it align horizontally? A: First easy option is to just use cols inside your main col, where each well is a .col-md-6 .col-xs-12 or something like that. the snippets below should do what I think you're describing. body { background-color: #5C67B6; } html, body { height: 100%; padding-top: 70px; } .btn-purple { color: #fff; background-color: #5C67B6; border-color: #5C67B6; /*set the color you want here*/ } .btn-purple:hover, .btn-purple:focus, .btn-purple:active, .btn-purple.active, .open>.dropdown-toggle.btn-purple { color: #fff; background-color: #4b5496; border-color: #4b5496; /*set the color you want here*/ } <link href="https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet" /> <link href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet" /> <body> <div class="container content-sm"> <div class="row"> <div class="col-sm-6 col-xs-12"> <div class="well"> <img class="center-block" src="https://upload.wikimedia.org/wikipedia/en/thumb/9/9f/Twitter_bird_logo_2012.svg/1259px-Twitter_bird_logo_2012.svg.png" style="border-radius: 50%;" height="80" width="80"> <h3 style="text-align: center;">Test!</h3> <p>The quick brown fox jumped over the lazy brown dog</p> <a href="#" class="btn btn-purple btn-sm"><i class="fa fa-sign-in" aria-hidden="true"></i> Join server!</a> </div> </div> <div class="col-sm-6 col-xs-12"> <div class="well"> <img class="center-block" src="https://upload.wikimedia.org/wikipedia/en/thumb/9/9f/Twitter_bird_logo_2012.svg/1259px-Twitter_bird_logo_2012.svg.png" style="border-radius: 50%;" height="80" width="80"> <h3 style="text-align: center;">Test!</h3> <p>The quick brown fox jumped over the lazy brown dog</p> <a href="#" class="btn btn-purple btn-sm"><i class="fa fa-sign-in" aria-hidden="true"></i> Join server!</a> </div> </div> <div class="col-sm-6 col-xs-12"> <div class="well"> <img class="center-block" src="https://upload.wikimedia.org/wikipedia/en/thumb/9/9f/Twitter_bird_logo_2012.svg/1259px-Twitter_bird_logo_2012.svg.png" style="border-radius: 50%;" height="80" width="80"> <h3 style="text-align: center;">Test!</h3> <p>The quick brown fox jumped over the lazy brown dog</p> <a href="#" class="btn btn-purple btn-sm"><i class="fa fa-sign-in" aria-hidden="true"></i> Join server!</a> </div> </div> <div class="col-sm-6 col-xs-12"> <div class="well"> <img class="center-block" src="https://upload.wikimedia.org/wikipedia/en/thumb/9/9f/Twitter_bird_logo_2012.svg/1259px-Twitter_bird_logo_2012.svg.png" style="border-radius: 50%;" height="80" width="80"> <h3 style="text-align: center;">Test!</h3> <p>The quick brown fox jumped over the lazy brown dog</p> <a href="#" class="btn btn-purple btn-sm"><i class="fa fa-sign-in" aria-hidden="true"></i> Join server!</a> </div> </div> </div> </div> </body>
{ "pile_set_name": "StackExchange" }
Q: Remove artifacts from OSM roads data in QGIS I downloaded OSM data for Amsterdam from the bbike website. Opening the roads layer in QGIS I get these strange artifacts where road sections cross the whole map in a straight line. What would be the best way to correct/remove them? Has anyone else had this effect with OSM data? A: Same here, it seems to be an internal error in the postprocessing of the OSM data at bbike. You can take the osm.pbf file from the same website, which works for me, or take the shapefiles from Geofabrik and cut out the area you need.
{ "pile_set_name": "StackExchange" }
Q: How to access DataGridView column names safely? When manipulating DataGridView cells, you typically do: MyGrid.CurrentRow.Cells["EmployeeFirstName"].Value = "John"; which is all fine and dandy, but as complexity rises, you start worrying about spelling errors, refactoring issues etc. Historically, I just made the columns public so I could access them directly in the class instance, but I then have to fight the Windows Forms designer which wants to keep them private (supposedly because it's good practice). My current solution is to have a class called Cols, with a bunch of strings: public static class Cols { public static string EmployeeFirstName = "EmployeeFirstName"; ... } Which results in this: MyGrid.CurrentRow.Cells[Cols.EmployeeFirstName].Value = "John"; This gives me some IntelliSense goodness as opposed to waiting for a runtime error. It still seems vaguely hack-ish, though. Is there an even more convenient way to do this? A: If you've created your columns at design-time, you can give them sensible names such as employeeFirstNameColumn. Then you can get to a cell using something like: MyGrid.CurrentRow.Columns[employeeFirstNameColumn.Name] or maybe: MyGrid.CurrentRow.Columns[employeeFirstNameColumn.Index] If you're generating the columns dynamically (AutoGenerateColumns = true), you'll have column indices based on the column indices of the datasource you're binding too. So you may be able to use a similar trick to derive the index (especially if your datasource is a strongly-typed DataSet).
{ "pile_set_name": "StackExchange" }
In order to improve the characteristics of exhaust emissions and reduce combustion noise in engines, particularly diesel engines having a common-rail fuel injection system, a so-called multiple fuel injection pattern is adopted, according to which the fuel quantity to be injected in each cylinder at each engine cycle is split into a plurality of sub-injections. Thus, a typical multiple injection pattern may include a preliminary or pilot injection, which may be in turn split into two or more injection pulses, followed by a so-called main injection pulse, followed by a number of final injection pulses. The pilot injection pulses have an effect both on the level of combustion noise and exhaust emissions, and their duration or energizing time (ET) is generally mapped in memories of the electronic injection control unit. The mapped values of the energizing time are predetermined with reference to an injection system having nominal characteristics (i.e., components having no drifts). However, the fuel quantity which is actually injected by an injector into the corresponding engine cylinder is inevitably affected by drifts, with respect to the desired or nominal value and this, during the vehicle lifetime causes a variation of the combustion noise and exhaust emission characteristics. Generally speaking, drifts of the injected fuel quantity may be caused by drifts of the injectors' characteristics, drifts of the rail-pressure sensors, drifts of the injector back-flow pressure, etc. Among the above-mentioned causes of inaccuracy of the injected fuel quantity, the most critical one is represented by drifts of the injector characteristics. With the present injector manufacturing technologies, the fuel quantity actually injected in each cylinder for each engine cycle can be different from the desired (nominal) fuel quantity. The main reasons for this are the inevitable spread of the characteristics of the fuel injectors due to production tolerances and, subsequently, due to aging of the injection system. As a result of production tolerances and their variations with aging, for a given energizing time at a given fuel-rail pressure, the actually injected fuel quantity can be different injector by injector. The problem of a precise determination of the actually injected fuel quantity is particularly critical for small fuel quantities, for which a good precision and a high repeatability is necessary in order to achieve lower emissions and a reduced combustion noise. US-2002/148441-A discloses a method for obtaining diagnostic information from instantaneous engine speed measurements and U.S. Pat. No. 6,021,758 A discloses a method for engine cylinder balancing using an engine speed signal. As it will become apparent from the following description, the present invention is basically based on processing an engine speed signal, in order to achieve a reliable estimation of the quantity of fuel actually injected by each injector. Accordingly, it is desirable to improve the processing of an engine speed signal, in order to achieve a reliable estimation of the quantity of fuel actually injected by each injector. In addition, other desirable features and characteristics will become apparent from the subsequent detailed description, and the appended claims, taken in conjunction with the accompanying drawings and this background.
{ "pile_set_name": "USPTO Backgrounds" }
[Malignant glaucoma following trabeculectomy--case report]. Presentation of two cases of malignant glaucoma following filtration surgery. Two patients with primary angle closure glaucoma has been treated with trabeculectomy. Flat anterior chamber, elevated IOP and the presence of patent irydectomy has been diagnosed 1 and 5 weeks after operation respectively. First patient in spite of peripheral irydectomy, medication and pars plana vitrectomy had high IOP and flat anterior chamber and has lost her sight. Second patient has improved after pharmacological treatment. Malignant glaucoma is a rare, but very serious complication after trabeculectomy. A very close and regular postoperative examination is necessary for a quick pharmacological or operative intervention.
{ "pile_set_name": "PubMed Abstracts" }
Q: Are there any of the Children of the Forest left, or are they extinct? Asking based on the TV show, information from the books welcome as part of any answer: In the episode "The Door" (S6E5), we see a few of the Children of the Forest defend the outgoing Three-Eyed-Raven. None of the Children present survive that defense. Are there any other Children in Westeros or were those the only ones? One aspect of this is whether... The Others/White Walkers could be created again by any remaining Children, assuming the White Walkers were all killed in GoT S8E3. A: We Do Not Know The only Children of the Forest we see in the series are those at the Cave of the Three Eyed Raven and they get wiped out. I would imagine though that these are supposed to be the last Children of the Forest as they were being slaughtered by men. LEAF: We were at war. We were being slaughtered. Our sacred trees cut down. We needed to defend ourselves. BRAN: From whom? LEAF: From you. From men. Game of Thrones, Season 6 Episode 5, "The Door" In the books the cave is said to be filled with thousands of bones but only 3 living Singers (another name for the Children of the Forest) so we can assume that they are dwindling and are almost wiped out. The caves were timeless, vast, silent. They were home to more than three score living singers and the bones of thousands dead, and extended far below the hollow hill. "Men should not go wandering in this place," Leaf warned them. "The river you hear is swift and black, and flows down and down to a sunless sea. And there are passages that go even deeper, bottomless pits and sudden shafts, forgotten ways that lead to the very center of the earth. Even my people have not explored them all, and we have lived here for a thousand thousand of your man-years." A Dance with Dragons, Bran III Of course we only know of those we see so there could be other groups of Children out there somewhere but until mentioned I doubt it. Note that in the books Leaf "walked the world of men" and so there could be some Children still living amongst men in hiding. Meera said, "You speak the Common Tongue now." "For him. The Bran boy. I was born in the time of the dragon, and for two hundred years I walked the world of men, to watch and listen and learn. I might be walking still, but my legs were sore and my heart was weary, so I turned my feet for home." A Dance with Dragons, Bran II
{ "pile_set_name": "StackExchange" }
1&period; Wireless Waiter Call Button SystemWireless Call Bell System is widely used in the service area&period; It consist of table button for guest use and signal receiver for waiter use&period; When a guest need any service&comma; he or she just press the button near to him or her&comma; then his or her table number will be shown on the display for waiter's attention&period; 2&period; Please be kindly noted as follows&colon;1&rpar; A complete system should consist of transmitter and signal receiver&comma; the two parrs have to work together&period;2&rpar; The package size and total weight should be subject the final quantity you ordered&period; 3&period; Specification&colon; Specification of Display Receiver K-2000&colon;1&period; With high strength high strength ABS shell&comma; durable in use2&period; Using digital code technology and the function is steady and reliable3&period; Show 3-digit number&period;4&period; Show different service type by special letters&lpar;&lpar;C&equals;call&comma; b&equals;Bill&comma; D&equals;drink&rpar;&rpar;&period;5&period; It can work with 400pcs 1-key or multi-key call buttons in max6&period; It can save 30 calling info in turn&comma; and apply in basic service places&period;7&period; Improve service level restaurant server for wireless calling system8&period; Technical parameters&ast;Working voltage&colon; DC12V~18V&ast;Working current&colon; <20mA&ast;Working Frequency&colon; 433&period;92mhz&ast;Dimension&colon; 282&ast;150&ast;34mm Specification of Watch Pager K-300plus&colon;1&period; Can work with 500pcs 1-key and multi-key transmitter in max2&period; Can show 3 group call number in one time3&period;Show 4-digit number from 0001-9999 and first letter can be A-Z4&period;Can indicate different service type via words or letter&period;&lpar;call&semi;bill&semi;drink&semi; dessert &semi; help etc and A-Z&rpar;5&period; Can record when call come in and Can count the call times of each number6&period;Can store 50 calls and track the history calls up and down7&period;Shows current time when stand-by8&period;3 reminder ways&colon;sound promt and vibration or both9&period;Battery is rechargeable10&period;Dimension&colon;50&ast;41&ast;16mm11&period;two display mode&colon;live view and queue view "live view" means&comma; when No&period;1 No&period;2 No&period;3 call in turn&comma; screen is show 0003 0002 0001&period; Newest call number show on the top of screen&period; "queue view" means&comma; when No&period;1 No&period;2 No&period;3 call in turn&comma; screen is show 0001 0002 0003&period; Oldest call number show on the top of screen&period; Specification of call bell K-D1&colon;1&period; Water-proof2&period; Work with our receiver to combined the wireless calling system3&period; Can be installed on each table&comma; when the customer need help only press the button&comma; the calling no will be shown on the screen&comma; so everyone can easy to know who is calling&period;4&period; Single-key&colon; Call5&period; Material&colon; PC6&period; Color&colon;White&semi;Blue&semi;Black&semi;Yellow&semi; Red&period; Technical Parameter&colon;Working voltage&colon; DC12VWorking current&colon; ≤35mAUse Frequency&colon; 433&period;95MHzTransmitted Power&colon; ≤20mWTransmitted Distance>300m in open areaDimension &colon; 60&ast;60&ast;22mmAny language any LOGO acceptable What are the components of the wireless calling system&quest;1&period; Wireless receiver&comma; installed on the count2&period; Call button&comma; installed on each table3&period; Signal repeater &lpar;optional&rpar;&comma; enhance the signal How does the system works&quest;1&period; After your customer gets seated the waiter informs them that when they require service&comma; all they need to do is press the button sitting on their table&period;2&period; When the customer presses the call button on their table&comma; their table number will appear on the reciever with ringing&period; Waiters then head over to the table and provide service to the customer promptly and quickly&period; If you are interested in Wireless Service Waiter Remote Call Bell System&comma; please feel free to contact me&period; I will reply to you in 24 hours&comma; thanks&period;
{ "pile_set_name": "Pile-CC" }
The only valid arguments for a Publish REQUEST are:MessageMessageAttributesMessageStructurePhoneNumberSubjectTargetArnTopicArn You say: The correct answers are: Subject, MessageId, Timestamp And your answer has a screen cap from AWS. But this is a Publish CONFIRMATION return message. That's totally different. A publish request couldn't have a messageId or Timestamp as an argument (An argument is a parameter I send to my SNS topic to publish a message). The messageId and timestamp are data points that SNS creates and returns to me in a confirmation message. I'm guessing that since my reference to the screen cap is now a broken link that things are being fixed? FYI, I took the CDA Exam this morning and passed with a 96%. The very last question may have been similar this question. But the choices were related to reference to an actual Publish Request. So if you learn the attributes of a publish request you will do okay.
{ "pile_set_name": "Pile-CC" }
Electronic Health Technology Views and News IDC Health Insights: Analytics a Top Area of Spending Growth for Healthcare IDC Health Insights estimates that the combined annual growth rate in the analytics market during the 10 years from 2010 through 2020 will be in the 8 percent to 11 percent range; this places analytics among the top areas of spending growth for hospitals and health systems during this decade. This attractive growth rate has led to numerous new products joining an already-crowded supplier landscape. The U.S. healthcare provider analytics market has experienced rapid growth and change since the introduction of accountable care with the patient protection and affordable care act (PPACA) of 2010. Analytics are clearly a critical tool that will allow health systems to understand and respond to the business model change and disruption of accountable care, and many types of analytics models and tools will likely be useful to providers. This IDC MarketScape report focuses on analytics platforms that allow providers to examine clinical and financial data together, and to use this data to provide actionable advice for optimizing delivery of care. Key findings from the report include: Clinical and financial analytics take many forms. This report examines platforms that allow providers to approach analytics in multiple ways, with agile tools that may include clinical and financial analytics, text and data mining, population health analytics, cost and cost accounting analytics, performance and quality management analytics and dashboards, as well as data exploration tools that can be applied to as-yet-undiscovered questions. This report examines the flexibility of analytics platforms as well as the strength and weaknesses of individual analytics applications available on the platform. No analytics solution will meet all needs out-of-the-box. Successful analytics programs will develop and nurture platforms that assemble and manage data, offer tools to ensure data quality, and offer applications that allow providers to explore and assemble data on-demand into analytics models that meet business needs, whether they are long-established business needs or spur-of-the-moment questions. The only valuable analytics are actionable analytics. Analytics are only valuable if they make the right information available, at the right time, at the point of decision making. Solid data and data management approaches are the foundation of analytics platforms, but the rigor of data integrity processes must be balanced. According to IDC Health Insights Research Director, Judy Hanover, “Analytics are clearly a critical tool that will allow health systems to understand and respond to the business model change and disruption of accountable care, and many types of analytics models and tools will likely be useful to providers.” However, the analytics platform market is among the most confusing to health IT buyers. IDC recommends buyers consider not only the toolset and its fit to their current business need when buying analytics solutions, but also the platform and its agility and flexibility when it comes to meeting the demand of future business model changes. Providers need to understand their need for platform and/or specific toolsets and the alignment with their available data science resources when making analytics platform purchasing decisions. Providers should clearly articulate, quantify, and document the organization’s current analytics needs and future business goals to assess the organization’s ability to take on clinical/financial analytics. Hanover concludes, “As accountable care initiatives advance, the ability to look at clinical and financial data together on the same platform, to dive deeper into costs of operations, and leverage analytics in decision making will become vital to success.” IDC MarketScape criteria selection, weightings and vendor scores represent well-researched IDC judgment about the market and specific vendors. IDC analysts tailor the range of standard characteristics by which vendors are measured through structured discussions, surveys, and interviews with market leaders, participants and end users. Market weightings are based on user interviews, buyer surveys and the input of a review board of IDC experts in each market. IDC analysts base individual vendor scores, and ultimately vendor positions within the IDC MarketScape, on detailed surveys and interviews with the vendors, publicly available information and end-user experiences in an effort to provide an accurate and consistent assessment of each vendor’s characteristics, behavior and capability.
{ "pile_set_name": "Pile-CC" }
Use of hyperbaric oxygen as adjunct therapy to surgical debridement of complicated wounds. The use of hyperbaric oxygen therapy is expanding as research continues to validate its use in a variety of chronic and acute illnesses. High-dose oxygen, delivered under pressures greater than sea level, enables the body to increase diffusion of oxygen into tissues and stimulates angiogenesis and the immune response. These effects improve overall wound healing for those suffering from radionecrosis, peripheral vascular disease, and a variety of complicated infections.
{ "pile_set_name": "PubMed Abstracts" }
Q: Stop threads created by Android Service I currently have an app which when a button is pressed starts a service and within the service a thread is created. I then have a second button (which appears once the first it pressed) that should shut down the service and in turn kill the thread, below is my current code however the service seems to stop but the thread keeps going. public class MainActivity extends Activity { private static Button lock = null; private static Button unlock = null; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_main); lock = (Button) this.findViewById(R.id.lock); unlock = (Button) this.findViewById(R.id.unlock); lock.setOnClickListener(btn_lock); unlock.setOnClickListener(btn_unlock); unlock.setVisibility(View.VISIBLE); lock.setVisibility(View.GONE); text.setVisibility(View.GONE); startService(new Intent(this, MainService.class)); } private OnClickListener btn_lock = new OnClickListener() { public void onClick(View v) { unlock.setVisibility(View.VISIBLE); lock.setVisibility(View.GONE); startService(new Intent(MainActivity.this, MainService.class)); } }; private OnClickListener btn_unlock = new OnClickListener() { public void onClick(View v) { unlock.setVisibility(View.GONE); lock.setVisibility(View.VISIBLE); stopService(new Intent(MainActivity.this, MainService.class)); } }; } And then my service class looks like: public class MainService extends Service { Thread 1Thread; @Override public IBinder onBind(Intent arg0) { return null; } @Override public void onCreate() { 1Thread = new Thread() { public void run() { while(true){ try { Thread.sleep(180000); // 3 minutes } catch (InterruptedException e) { // TODO Auto-generated catch block e.printStackTrace(); } Log.i("TEST", "Thread is still here!"); } } }; } @Override public void onDestroy() { 1Thread.interrupt(); } @Override public void onStart(Intent intent, int startId) { 1Thread.start(); } } Hope someone can help and if you need any more info let me know! A: boolean mStatus = true; @Override public void onCreate() { 1Thread = new Thread() { public void run() { while (mStatus) { try { Thread.sleep(180000); // 3 minutes } catch (InterruptedException e) { e.printStackTrace(); continue; } Log.i("TEST", "Thread is still here!"); } }; } @Override public void onDestroy() { mStatus = false; 1Thread.interrupt(); }
{ "pile_set_name": "StackExchange" }
The effect of spontaneous diabetes mellitus on fatty acid oxidation, beta-hydroxybutyrate dehydrogenase activity and respiratory coupling of hepatic mitochondria in the guinea-pig (Cavia porcellus). 1. The purpose of this study was to determine whether hepatic mitochondria of guinea-pigs with spontaneous diabetes mellitus differ from those of non-diabetic guinea-pigs in the oxidation of fatty acids, the activity of beta-hydroxybutyrate dehydrogenase, or respiration-linked oxidative phosphorylation. During the course of the study, a third group of animals (referred to as the unclassified group) was discovered which, on the basis of the clinical chemistry and histological changes in the pancreas, appeared to be in a pre-diabetic or post-diabetic state. 2. No differences in the respiratory control ratios were found between any of the three groups. Fatty-acid oxidation in hepatic mitochondria was greater in both the unclassified and diabetic groups than in the non-diabetic group. Beta-Hydroxybutyrate dehydrogenase activity, however, was increased only in the diabetic group. These findings suggest that increased fatty acid oxidation is probably an intermediate change in the development of or the recovery from diabetes mellitus, whereas the activity of beta-hydroxybutyrate dehydrogenase is affected only in more advanced stages.
{ "pile_set_name": "PubMed Abstracts" }
Using stable isotopes to assess the bioavailability of minerals in food fortification programs. The fortification of various types of food with minerals is often undertaken without consideration of either their bioavailability or the potential nutrient-nutrient interactions resulting from their use. Stable isotopes provide a safe and accessible method of resolving these issues by providing the proper evidence in each case. They must be conducted according to strict safety and ethical guidelines and may be readily conducted in a field setting. Clinical studies in children enable researchers, policymakers, and food manufacturers to obtain the data necessary to determine the best way to fortify specific foods and beverages, in order to optimally enhance the nutritional health of growing children. We have shown the utility of this approach in studies in both developing countries and in the United States.
{ "pile_set_name": "PubMed Abstracts" }
Diabetes distress (DD) refers to the unique emotional burdens, worries and concerns that are part of the spectrum of patient experience when managing a severe, demanding chronic disease like diabetes. High DD is very common and persistent over time among those with diabetes, and it has been significantly associated with poor glycemic control, poor self-care, low diabetes self-efficacy, and poor quality of life, even after controlling for clinical depression. The vast majority of research in DD has focused on adults with type 2 diabetes, a metabolic disease based on genetic predisposition, obesity, sedentary lifestyle and insulin resistance. Far less research has focused on the very different experiences of DD among adults with type 1 diabetes: an autoimmune disease that requires much more intensive and intrusive management than type 2. The proposed research addresses two major gaps in the clinical care of adult patients with type 1 diabetes and DD: to develop a practical, reliable and valid measure of DD for adult patients with type 1 diabetes, with empirically defined cut- points for high DD; and to test a unique, pragmatic, theory based program to reduce high DD among at-risk, poorly controlled type 1 adults. Following a brief measurement study to establish reliable cut-points for high DD, we propose a 2-arm clinical trial to test the comparative effectiveness of an adaptation of Problem Solving Therapy, which now includes a comprehensive focus on emotion, behavior and cognition, with a current standard of care - enhanced diabetes education. Primary outcomes are reduced DD and improved glycemic control. The innovative intervention uses a variety of modalities, some based on electronic and social media (e.g., real time web-based group calls, web-based blogging, personal telephone contact) to enhance participation and retention, and reduce patient burden. We will also assess the impact of selective mediating and moderating variables, collect measures of cost, and will link the findings to dissemination and implementation using RE-AIM.
{ "pile_set_name": "NIH ExPorter" }
Q: take value in input from js I need to take a data from a script and then to use it in a form. So when I click on this span:' <span class="star rate1"></span> The value from the js should go in this post: <input type="hidden" name="rate_product" id="rate_er" /> The js script: $(".rate1").click(function() { var rate = document.getElementById("rate_er"); rate = 1; }); But something is not working. The post is empty. Can u guys help me to find out the problem and what I'm doing wrong? thank you A: Replace this: var rate = document.getElementById("rate_er"); rate = 1; with: $("#rate_er").val(1);
{ "pile_set_name": "StackExchange" }
Yves Baudrier Yves Marie Baudrier (February 11, 1906 – November 9, 1988) was a French composer. Along with André Jolivet, Olivier Messiaen and Jean-Yves Daniel-Lesur, he was a founder of the La jeune France movement. Selected filmography Dilemma of Two Angels (1948) The Man Who Returns from Afar (1950) The Glass Castle (1950) The Night Is My Kingdom (1951) The Seven Deadly Sins (1952) References Bibliography Bondanella, Peter. The Films of Roberto Rossellini. Cambridge University Press, 1993. External links Category:1906 births Category:1988 deaths Category:French composers Category:People from Paris
{ "pile_set_name": "Wikipedia (en)" }
An image-receiving element and a light-sensitive element for forming transfer images by a silver salt diffusion process or a color diffusion transfer process, as well as a chemical reaction mechanism for image formation, are well known in the art. In particular, an image-receiving element for a peel apart type diffusion transfer process is most generally used as a photographic film unit united with a light-sensitive sheet, that is, for a film unit composed of a light-sensitive sheet having on a support at least one light-sensitive silver halide emulsion layer, an image-receiving sheet having on another support at least an image-receiving layer, and between the sheets a pressure rupturable container containing a processing solution. In the film unit, after imagewise exposing the silver halide emulsion layer(s), the film unit is passed through a pair of juxtaposed pressure-applying rollers to rupture the container and to spread the processing solution between the sheets, whereby the development thereof is performed. As the result of the development, image-forming material(s) are imagewise diffused from the emulsion layer(s) or the dye-providing compound-(hereinafter referred to as a coloring material)-containing layer(s) associated therewith into an image-receiving layer formed on another support and fixed therein, to form, thereby, a transferred image. For obtaining desired positive prints or slide, the image-receiving sheet is separated from the light-sensitive sheet but in this case, if the separation of the image-receiving sheet is not performed smoothly or the processing solution remains on the image-receiving sheet, the images formed on the image-receiving sheet are stained, thus greatly reducing the image quality. For easily separating the image-receiving sheet from the light-sensitive sheet and for preventing a processing solution from remaining on the image-receiving layer, it is known to form a layer referred to as a "stripping layer" on the image-receiving layer (at the processing solution spreading side). Examples of materials for this kind of stripping layer are usually water-soluble or hydrophilic polymers such as gum arabic (U.S. Pat. Nos. 2,759,825; 4,009,031, etc.,); hydroxyethyl cellulose (U.S. Pat. No. 2,759,825 and Japanese Patent Application (OPI) No. 8237/72; the term "OPI" indicates an unexamined published patent application open to public inspection); methyl cellulose, ethyl cellulose, and nitrocellulose (U.S. Pat. No. 2,759,825); cellulose acetate hydrogen naphthalate (Canadian Pat. No. 681,777 and Japanese Patent Application (OPI) No. 41,623/72); carboxymethyl cellulose (U.K. Pat. No. 2,012,064); cellulose derivatives (Japanese Patent Publication No. 24,075/70; starch ethers (Japanese Patent Publication No. 35,820/75); galactomannan (U.K. Pat. No. 869,190); pectin (U.S. Pat. No. 2,759,825); phthalated gelatin (Japanese Patent Publication No. 24,075/70 and Japanese Patent Application (OPI) Nos. 74,431,79; 126,535/79); sodium alginate (U.S. Pat. No. 2,759,825); polyvinyl alcohol (U.S. Pat. No. 2,759,825 and U.K. Pat. No. 2,012,064, and Japanese Patent Publication No. 24,075/70); polymethacrylic acid (U.S. Pat. No. 2,759,825); etc. However, these materials have drawbacks in that the physical development center in the image-receiving layer (1) is denatured owing to the hygroscopicity of the material to change the density and color tone of the transferred images; (2) since natural materials are frequently used as the stripping layer materials described above, they sometimes deteriorate or get musty when they are stored as raw materials, i.e., they are unstable with the passage of time in having a tendency to be denatured; and (3) since water is used as a coating solvent for the materials, the energy required for drying is large and it takes a long period of time to dry the coated layer of the material; etc. Furthermore, the use of the above-described materials is frequently accompanied by the problem that the transferred silver images show metallic luster, and the transferred density becomes low due to hindrance in the transfer. For overcoming these problems, it has been proposed to use water-insoluble synthetic polymers such as a vinyl acetate-maleic anhydride copolymer and a methyl methacrylate-acrylic acid copolymer (described in Japanese Patent Publication No. 15,902/70); a barbituric acid-formalin condensation product (described in Japanese Patent Publication No. 4333/74); graft copolymers of gelatin sufficiently reacted with a dicarboxylic anhydride such as phthalic anhydride, etc., and a monomer such as a vinyl ester, vinyl ether, acrylic acid ester, etc., or a mixture thereof (described in Japanese Patent Application (OPI) No. 65,133/81), etc., as the materials for the stripping layers. However, it has now been clarified as a result of our detailed investigations that the use of the polymers described in the above-described patents for the stripping layers is accompanied by the following demerits. That is, these polymers have a poor film-forming property and are resistant to forming a thin uniform coating. As a result thereof, the images obtained by development in the image-receiving sheet using the polymer for the stripping layer are poor in uniformity and form undesirable image unevenness, which greatly reduces the commercial value of the photographic materials. Also, as another method for overcoming the aforesaid difficulties, it has been proposed to use a stripping layer composed of a ternary polymer of styrene, acrylic acid (or methacrylic acid), and methyl acrylate (or methyl methacrylate) dispersed in a water-soluble polymer such as hydroxyethyl cellulose as described in U.S. Pat. No. 4,366,227. However, when photographic material having the image-receiving layer using the polymer for the stripping layer regardless of the water-soluble polymer or water-insoluble polymer is developed at temperatures lower than normal room temperature (about 20.degree. C), the component of the processing solution attached to the image-forming sheet causes so-called "clouding", i.e., is crystallized by drying to form white turbidity of images on the image surfaces. Moreover, when the photographic material having the image-receiving sheet using the polymer for the stripping layer is developed at temperatures higher than normal room temperature, the processing solution partially remains on the surface of the image-receiving sheet.
{ "pile_set_name": "USPTO Backgrounds" }
Mark Gastineau Marcus Dell Gastineau (born November 20, 1956) is an American former football player who was a defensive end for the New York Jets from 1979 to 1988. A five-time Pro Bowler, he was one of the quickest and most feared pass rushers of his generation. Gastineau was ranked the 8th greatest pass rusher in NFL History on NFL Network's Top 10 Pass Rushers. Early life Gastineau was born in Ardmore, Oklahoma, and moved to Springerville, Arizona at the age of seven, when his parents, Ernie and Lou, bought a ranch. Mark broke his leg as a child in such a horrific manner that he was told by doctors that he would never walk again. Mark overcame the injury and the odds and Ernie built his son a rodeo ring, and Mark began entering team-roping events at 12. Mark's other passion was collecting Indian artifacts in Arizona's White Mountains. At Round Valley High School, Gastineau needed urging from his father to play football. Gastineau showed promise, but not enough to attract attention from major colleges. College He entered Eastern Arizona Junior College in 1975 and earned All-America honors in his first season. He transferred to Arizona State University, and spent just one season playing defensive end there before finally settling upon East Central Oklahoma State University, now East Central University, in Ada, Oklahoma. He had 27 quarterback sacks in his college career, and earned Outstanding Defensive Lineman honors for the North in the 1979 Senior Bowl. He became ECU's first-ever draft pick when the New York Jets selected him in the second round of the 1979 NFL Draft. New York Jets Gastineau was among the most talented and honored defensive linemen of his era. He made the Pro Bowl five straight seasons (1981–85) and finished his ten-year career with 74 sacks. He was a First-team All-Pro in years 1982-84 and was consensus All-AFC in each of those years. The "New York Sack Exchange" In New York, Gastineau was a key part of the famed "New York Sack Exchange," the Jets defensive line that also included Joe Klecko, Marty Lyons and Abdul Salaam. The four combined for 66 sacks in 1981, including twenty by Gastineau (In 1981 sacks were unofficial, but Gastineau's 20 sacks trailed Klecko by only ½ a sack), to lead the Jets to their first playoff game since 1969. He was Second-team All-Pro in 1981 as well as being consensus All-AFC. In November 1981, he, Klecko, Lyons and Salaam were invited to ring the ceremonial opening bell at the New York Stock Exchange, which served as the inspiration for their nickname. With Klecko rupturing the patella tendon in his right knee in the second game of the strike shortened 1982 season against the New England Patriots, Gastineau became the new unofficial leader of the "Sack Exchange." Though he was often double teamed, he finished the season with six sacks, and was voted the NFL Defensive Player of the Year by NEA (and awarded the George S. Halas Trophy). The Jets made the playoffs again in 1982, losing the AFC Championship game to the Miami Dolphins. Defensive Player of the Year The 1983 season started with Gastineau and the Jets' first round pick of the 1983 NFL Draft, quarterback Ken O'Brien, being arrested and charged with assault at Studio 54. Despite this off-the-field indiscretion, Gastineau totaled 19 sacks to lead the NFL for the first time. Gastineau was nationally famous for doing his signature "Sack Dance" after sacking an opposing quarterback. However, he had to stop when the NFL declared it "unsportsmanlike taunting" in March 1984 and began fining players for it. The ban on the Sack Dance stemmed from a 1983 game against the Los Angeles Rams, when Gastineau and Rams Pro Football Hall of Fame offensive tackle Jackie Slater got into a fight following a Gastineau sack of Rams quarterback Vince Ferragamo. Gastineau had his best individual season with an NFL record 22 sacks (leading the NFL for the second year in a row), 69 tackles and one fumble recovery for a touchdown in 1984. He was voted the UPI AFC Defensive Player of the Year, and was also named MVP of that season's Pro Bowl after tallying four sacks and a safety in that game. Gastineau's sack record stood for seventeen years until Michael Strahan broke it in 2001. New defensive coordinator Bud Carson installed a 3-4 defense for the 1985 season. Gastineau shifted from left defensive end to right defensive end, although he did move him around to allow for mismatches. Gastineau broke his hand early in that season but still finished second in the league with 13½ sacks and was voted All-Pro by the NEA. The Jets finished 11-5 in 1985 to earn a wildcard spot in the playoffs along with fellow AFC East rivals, the New England Patriots. Gastineau recorded a sack in the Jets' 26-14 loss to the Pats at the Meadowlands. 1986 playoffs For the start of the 1986 season, Gastineau was featured on the cover of Sports Illustrated alongside New York Giants star linebacker Lawrence Taylor. Injuries limited Gastineau to just two sacks in ten games (his lowest total since his rookie season) as he was slowed by groin and abdominal muscle ailments and then by a damaged left knee that required arthroscopic surgery and forced him to miss the last five games of the regular season. Gastineau rebounded in the postseason, however, recording a sack in the Jets 35-15 wildcard round victory over the Kansas City Chiefs and 2½ more in the Divisional Round Playoff game against the Cleveland Browns. Late in the fourth quarter of that game, though, with the Jets leading 20-10 and the Browns facing a second down and 24 from their own 18-yard line, Gastineau was called for a roughing the passer penalty. The play had originally resulted in an incomplete pass by Browns quarterback Bernie Kosar so instead of having a 3rd-and-24 situation, the 15-yard penalty on Gastineau gave the Browns a first down at their own 33. From there, the Browns drove the remaining 67 yards to a touchdown which cut the Jets' lead to 20-17. The Browns would later tie the game with 7 seconds remaining in regulation on a 22-yard field goal by Mark Moseley and win it on a 27-yard field goal by Moseley 2 minutes and 2 seconds into the second overtime period. After the game, Gastineau said that he hadn't been guilty of roughing and that he was "just following through." Teammate Marty Lyons, the Jets' other starting defensive end, defended Gastineau saying, "(Ben Dreith) is a referee who's known to take care of the quarterback." Joe Walton, the Jets' head coach would say only, "It was a very key play, Mark was just trying to do the best he could do." 1987 NFL Players' strike In 1987, Gastineau was the only Jet regular to immediately cross the picket line in that year's players' strike, citing his need to pay alimony. Teammate Dave Jennings said of this understandably unpopular move: "We expected it from Mark. He's always put himself in front of the team." The crossing brought to a head longstanding tensions between Gastineau and his teammates; he had never been popular in the locker room. Gastineau got into a fight with backup center Guy Bingham when he drove into the Jets complex early in the strike. Gastineau was later joined in crossing the picket line by teammates Marty Lyons and Joe Klecko, further undermining the players' strike. Retirement Gastineau led the AFC in sacks seven weeks into the 1988 season. He then abruptly announced his retirement soon after Brigitte Nielsen, to whom he had previously announced his engagement, claimed to be suffering from cancer of the uterus. The announcement was followed by a surge of investigation by local New York papers of whether she was telling the truth, reflecting citywide mistrust of Gastineau. At the time of his retirement, Gastineau was the NFL's all-time leader in sacks. Gastineau tried a comeback, in the Canadian Football League in 1990. He signed a two-year contract with the BC Lions, but got injured and was released after only four games. Gastineau was inducted into the New York Jets Ring of Honor on October 8, 2012. Career statistics Sacks were not an official stat until 1982 Postseason Stats: Played in seven postseason contests, with five starts, and had nine sacks including 4½ in 3 games during the 1982 postseason. Boxing In 1991, Gastineau began a career in boxing, lasting five years. In his first fight, Gastineau knocked out Derrick Dukes in the first round. Dukes, a professional wrestler, later admitted he took a dive. TV newsmagazine show 60 Minutes interviewed several others that fought Gastineau and were told to take dives to make Gastineau look good. His career ended in 1996 when he lost to another former football player, Alonzo Highsmith. In 18 career bouts, his record in boxing was fifteen wins, two losses, and one no-contest. Personal life Gastineau has been married three times. His first wife, Lisa Gastineau and their daughter Brittny Gastineau starred in the E! reality television show, The Gastineau Girls. Gastineau has a son with actress Brigitte Nielsen, Killian Marcus. He was estranged from both children in 2010. Shortly after his release from prison in 2001, Gastineau claims he has put his turbulent past behind him after he had a religious conversion to faith in Jesus Christ. Gastineau has appeared on programs such as The 700 Club to speak of his experience. Gastineau is a member of the choir at Times Square Church, where he married third wife JoAnn in 2007. Legal issues In 1984, Gastineau was found guilty of assaulting a patron at Studio 54. He was sentenced to 90 hours of community service, teaching football to inmates at Rikers Island. In 1991, Gastineau was arrested for picking up a package of amphetamine pills at Phoenix Sky Harbor Airport. He was sentenced to three years probation in 1993. In September, 2000, Gastineau was sentenced to 18 months in jail after failing to complete an anger management course after hitting his second wife, Patricia. Health In January 2017, Gastineau revealed that he had been diagnosed with dementia, Parkinson's disease, and Alzheimer's disease in the previous year. Gastineau said he believed the illnesses could be traced back to football, stating he wanted to continue to teach younger football players how to play the game safely. He blames the brain diseases on poor tackling technique. In March 2019, Gastineau revealed that he had been battling colon cancer. References External links Category:1956 births Category:Living people Category:American football defensive ends Category:American players of Canadian football Category:Canadian football defensive linemen Category:Arizona State Sun Devils football players Category:BC Lions players Category:Eastern Arizona Gila Monsters football players Category:East Central Tigers football players Category:New York Jets players Category:American Conference Pro Bowl players Category:People from Ardmore, Oklahoma Category:Players of American football from Arizona Category:Players of American football from Oklahoma Category:People with dementia Category:People with Alzheimer's disease Category:People with Parkinson's disease Category:People from Springerville, Arizona Category:American male boxers Category:Boxers from Oklahoma Category:Heavyweight boxers
{ "pile_set_name": "Wikipedia (en)" }
# VueQrious > 🤳 A Vue component for QR code generation with [qrious](https://github.com/neocotic/qrious) ## Demo <VueQriousDemo /> ## Usage ```vue <template> <vue-qrious value="https://www.1stg.me" /> </template> <script> import VueQrious from 'vue-qrious' export default { components: { VueQrious, }, } </script> ``` ## Available Props | prop | type (range) | default value | | ----------------- | ------------------------------------ | ------------- | | `background` | `string` (CSS color) | `"#ffffff"` | | `backgroundAlpha` | `number` (0.1-1.0) | `1.0` | | `foreground` | `string` (CSS color) | `"#000000"` | | `foregroundAlpha` | `number` (0.1-1.0) | `1.0` | | `level` | `string` ("L", "M", "Q", "H") | `"L"` | | `mime` | `string` ("image/png", "image/jpeg") | `"image/png"` | | `padding` | `number` | `null` | | `size` | `number` | `100` | | `value` | `string` | ## Changelog Detailed changes for each release are documented in [CHANGELOG.md](./CHANGELOG.md). ## License [MIT][] © [JounQin][]@[1stG.me][] [1stg.me]: https://www.1stg.me [jounqin]: https://GitHub.com/JounQin [mit]: http://opensource.org/licenses/MIT
{ "pile_set_name": "Github" }
import { AbstractState } from "../AbstractState"; import { CanvasEngine } from "../../CanvasEngine"; import { SelectElementAction } from "../../event-bus/actions/SelectElementAction"; export class DefaultState extends AbstractState { constructor(engine: CanvasEngine) { super("default-state", engine); this.registerAction(new SelectElementAction(engine, false)); } }
{ "pile_set_name": "Github" }
Posts, pics, or polls? Which post type generates the greatest engagement in a Facebook physical activity intervention? Social networking websites have attracted considerable attention as a delivery platform for physical activity interventions. Current evidence highlights a need to enhance user engagement with these interventions to actualize their potential. The purpose of this study was to determine which post type generates the most engagement from participants and whether engagement was related to change in physical activity in an intervention delivered via Facebook. Subgroup analysis of the intervention condition of a randomized controlled trial was conducted. The group moderator posted a new message to the private Facebook group each day of the program. The Facebook posts (n = 118) were categorized into the following types: moderator-initiated running program, multimedia, motivational, opinion polls, or discussion question and participant-initiated experience shares, or questions. Four metrics were used to measure volume of engagement with each post type, "likes," "comments," "poll votes," and "photo uploads." One-way ANOVA was used to determine whether engagement differed by post type and an independent samples t-test to determine differences in engagement between moderator and participant-initiated posts. Pearson correlation was used to examine associations between total engagement and change in physical activity. Engagement varied by post type. Polls elicited the greatest engagement (p ≤ .01). The most common form of engagement was "likes," and engagement was higher for moderator-initiated rather than participant-initiated posts (mean = 8.0 [SD 6.8] vs. 5.3 [SD 3.2]; p ≤ .01). Total engagement with the Facebook group was not directly associated with change in physical activity (r = -.13, p = .47). However, engagement was associated with compliance with the running program (r = .37, p = .04) and there was a nonsignificant positive association between compliance and change in physical activity (r = .32, p = .08). Posts requiring a simple response generated the most engagement. Intervention moderators should facilitate familiarity between participants at the intervention outset, to encourage engagement between participants. Engagement was related to change in physical activity, and these recommendations should be incorporated to enhance engagement and efficacy of interventions.
{ "pile_set_name": "PubMed Abstracts" }
Q: CSS/Javascript: How to draw minimal border around an inline element? Consider the following HTML: <p>This is a potentially large paragraph of text, which <span>may get wrapped onto several lines when displayed in the browser. I would like to be able to draw a minimal</span> box round the span</p> I would like to draw a minimal border round the span. That is: If the span is rendered on a single line, the border is equivalent to setting a CSS style of border: 1px solid black; If the span is rendered on multiple lines, the border is drawn around the outermost edges of the span, not between the lines which it crosses. This is equivalent to setting a CSS background color on the span, and drawing the line around the edges of the highlighted area. I am fairly confident this cannot be done with raw CSS alone (in the second case). Solutions involving javascript libraries, or those which are Firefox-specific, are acceptable. This is a mock-up of how the second scenario should look: A: Consider adding an outline, not border http://jsfiddle.net/tarabyte/z9THQ/ span { outline: 2px solid black; } Firefox draws outline between lines. There is a workarond: http://jsfiddle.net/z9THQ/2/ .wrapped { outline: 2px solid black; } .wrapped span { border: 1px solid white; background-color: white; position: relative; z-index: 1000; } <p> This is a potentially large paragraph of text, which <span class="wrapped"><span> may get wrapped onto several lines when displayed in the browser. I would like to be able to draw a minimal </span></span> box round the span </p>
{ "pile_set_name": "StackExchange" }
Raymond incumbents get challenges RAYMOND - Voters will have to make myriad choices to make when they go to the polls March 12. In addition to the 23 warrant articles on the ballot they will be voting for elected officials, and six of seven races on the ballot are being contested. Selectmen Lee Weldy and Wayne Welch are being challenged by three residents in their bids for re-election, including two former selectmen, Greg Bemis and June M. Hartford, and current budget committee member Harry "Bud" McClard. On the school ballot, incumbents Kelly Lehman and current chairman John Stewart are both running for only a one-year seat on the school board against challenger Kyle Scofield, who has been serving on the Lamprey River Elementary School Building Committee. Moe Titcomb, who has filled the seat by appointment since another school board member resigned last year, is not running in that race but is seeking a three-year term on the budget committee. Daniel F. Chouinard, Diane Naoum, Steve Reardon and Steven Wallerstein will compete for two three-year seats on the school board being left open by Stewart and Lehman. Other races are being contested as well. Planning board members Jonathan Wood and Gretchen Gott are both seeking re-election to three-year terms on the planning board but alternate Don Hedman is looking to take one of their seats. Kimberlee Tyndall is challenging incumbent Tina M. Thomas for a three-year term as trustee of the trust funds. Tyndall is also running for an open one-year term on the budget committee. Sandy Ellis is running for the second available three-year term on the budget committee. In the last contested race, Barbara Edgar and Sabrina Maltby are running for a three-year term as library trustee. No candidates filed for an open three-year seat on the ethics committee. A candidates night is being held on Tuesday, Feb. 19 from 7 p.m. to 9:30 p.m. in the Raymond High School Media Center for all town and school candidates to talk to residents about themselves and why they are running for office. TALLAHASSEE, Fla./WASHINGTON — Dozens of teenaged survivors of the second-deadliest public-school shooting in U.S. history marched on Florida's capital Wednesday... U.S. Vice President Mike Pence was scheduled to meet with North Korean officials, including leader Kim Jong Un's sister, while in South Korea for the Winter Olympics this month but the North Koreans...
{ "pile_set_name": "Pile-CC" }
Q: Adding a filter to MongoDB query increases the time taken for count() I have a collection called listings with more than 5 million documents and indexes (relevant only) with keys: {"_id": 1} {"dated": 1} {"causelist_type": 1} I am trying to run the query db.listings.count({ dated: { $in: [ISODate("2018-02-17T00:00:00Z"), ISODate("2018-02-16T00:00:00Z"),ISODate("2018-02-10T00:00:00Z")] }, causelist_type: {$ne: -1} }) It is taking 130s. (Recorded by prepending and appending the command with print(new Date())) But if I remove the filter causelist_type: {$ne: -1}, the query runs almost instantaneously (~1s). explain().queryPlanner for the query with causelist_type clause: { "plannerVersion" : 1, "namespace" : "kl.listings", "indexFilterSet" : false, "parsedQuery" : { "$and" : [ { "dated" : { "$in" : [ ISODate("2018-02-10T00:00:00Z"), ISODate("2018-02-16T00:00:00Z"), ISODate("2018-02-17T00:00:00Z") ] } }, { "$nor" : [{ "causelist_type" : { "$eq" : -1 } }] } ] }, "winningPlan" : { "stage" : "FETCH", "filter" : { "$nor" : [{ "causelist_type" : { "$eq" : -1 } }] }, "inputStage" : { "stage" : "IXSCAN", "keyPattern" : { "dated" : 1 }, "indexName" : "dated_1", "isMultiKey" : false, "isUnique" : false, "isSparse" : false, "isPartial" : false, "indexVersion" : 1, "direction" : "forward", "indexBounds" : { "dated" : [ "[new Date(1518220800000), new Date(1518220800000)]", "[new Date(1518739200000), new Date(1518739200000)]", "[new Date(1518825600000), new Date(1518825600000)]" ] } } }, "rejectedPlans" : [{ "stage" : "FETCH", "filter" : { "dated" : { "$in" : [ ISODate("2018-02-10T00:00:00Z"), ISODate("2018-02-16T00:00:00Z"), ISODate("2018-02-17T00:00:00Z") ] } }, "inputStage" : { "stage" : "IXSCAN", "keyPattern" : { "causelist_type" : 1 }, "indexName" : "causelist_type_1", "isMultiKey" : false, "isUnique" : false, "isSparse" : false, "isPartial" : false, "indexVersion" : 1, "direction" : "forward", "indexBounds" : { "causelist_type" : [ "[MinKey, -1.0)", "(-1.0, MaxKey]" ] } } }] } explain().queryPlanner for the query without causelist_type clause: { "plannerVersion" : 1, "namespace" : "kl.listings", "indexFilterSet" : false, "parsedQuery" : { "dated" : { "$in" : [ ISODate("2018-02-10T00:00:00Z"), ISODate("2018-02-16T00:00:00Z"), ISODate("2018-02-17T00:00:00Z") ] } }, "winningPlan" : { "stage" : "COUNT", "inputStage" : { "stage" : "IXSCAN", "keyPattern" : { "dated" : 1 }, "indexName" : "dated_1", "isMultiKey" : false, "isUnique" : false, "isSparse" : false, "isPartial" : false, "indexVersion" : 1, "direction" : "forward", "indexBounds" : { "dated" : [ "[new Date(1518220800000), new Date(1518220800000)]", "[new Date(1518739200000), new Date(1518739200000)]", "[new Date(1518825600000), new Date(1518825600000)]" ] } } }, "rejectedPlans" : [ ] } I am using MongoDB 3.6.2. What I don't understand is how can adding a 'filter' increase the query time so much when same index is being used in the queries with and without the 'filter'. Let me know if you need any more information. EDIT: I also tried modifying the causelist_type clause to causelist_type: {$eq: -1} and the query runs instantaneously. Please explain. EDIT 2: explain().queryPlanner for the query with causelist_type: {$eq: -1} clause: { "plannerVersion" : 1, "namespace" : "kl.listings", "indexFilterSet" : false, "parsedQuery" : { "$and" : [{ "causelist_type" : { "$eq" : -1 } }, { "dated" : { "$in" : [ ISODate("2018-02-10T00:00:00Z"), ISODate("2018-02-16T00:00:00Z"), ISODate("2018-02-17T00:00:00Z") ] } }] }, "winningPlan" : { "stage" : "FETCH", "filter" : { "causelist_type" : { "$eq" : -1 } }, "inputStage" : { "stage" : "IXSCAN", "keyPattern" : { "dated" : 1 }, "indexName" : "dated_1", "isMultiKey" : false, "isUnique" : false, "isSparse" : false, "isPartial" : false, "indexVersion" : 1, "direction" : "forward", "indexBounds" : { "dated" : [ "[new Date(1518220800000), new Date(1518220800000)]", "[new Date(1518739200000), new Date(1518739200000)]", "[new Date(1518825600000), new Date(1518825600000)]" ] } } }, "rejectedPlans" : [{ "stage" : "FETCH", "filter" : { "dated" : { "$in" : [ ISODate("2018-02-10T00:00:00Z"), ISODate("2018-02-16T00:00:00Z"), ISODate("2018-02-17T00:00:00Z") ] } }, "inputStage" : { "stage" : "IXSCAN", "keyPattern" : { "causelist_type" : 1 }, "indexName" : "causelist_type_1", "isMultiKey" : false, "isUnique" : false, "isSparse" : false, "isPartial" : false, "indexVersion" : 1, "direction" : "forward", "indexBounds" : { "causelist_type" : [ "[-1.0, -1.0]" ] } } }] } Also when I change the causelist_type clause to causelist_type: {$nin: [-1, -2]}, it is fast and uses the same indexes and input stage as causelist_type: {$eq: -1}, just a different filter. And none of them them are using index intersection, as explain results documentation says that we should se "stage" : "AND_SORTED" in cases where index intersection is used. A: Without the causelist_type term in the query, the count query is fully covered by the index on dated, which makes it very fast. Note the "stage" : "COUNT" in the winning plan for this case. Adding the causelist_type to the query requires that every document satisfying the dated part of the query to be read from disk so that its causelist_type value can be checked to see if it's $ne: -1. Note the "stage" : "FETCH" in the winning plan for this case. As for why index intersection isn't being used here with the causelist_type index, that's likely because you're using a $ne query which makes the index much less efficient than a match (as you found when testing with $eq instead).
{ "pile_set_name": "StackExchange" }
Q: Which class does "super" refer to in an inherited method? I am asking this here because I really don't know how I should Google this. I need a confirmation of something that I probably figured out today. Some days ago I thought that if an object inherits a method of its father it means that it basically "has" the method in its code. But then I asked what if we do this: class B extends A { public B() { } public int getValue() { return 2 * super.getValue(); } } class C extends B { public C() { } public int getValue(int b) { return 5 * b; } } And lets say there is a class A that has the getValue() method too. Now an object of class C uses "its" getValue() method (without parameter) that it has inherited from B. But super.getValue() still refers to class A, even though the method calling it was inherited. Inheritance does not mean that class C "has" the method in its code, but that it can use it from B, right? super() still refers to the superclass of its "original" class. Is that insight correct? A: Inheritance does not mean that class C "has" the method in its code, but that it can use it from B, right? Yes. super() still refers to the superclass of its "original" class. Yes. You are correct. super always refers to the Parent class of where it is being used. In this case it is being used in B and it's Parent is A. So referring to there.
{ "pile_set_name": "StackExchange" }